%%% -*-bibtex-*- %%% %%% IACR ePrint bibliography %%% automatically scraped from the ePrint server @misc{cryptoeprint:1996:001, author = {Ran Canetti and Rosario Gennaro}, title = {Incoercible Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 1996/001}, year = {1996}, url = {https://eprint.iacr.org/1996/001}, } @misc{cryptoeprint:1996:002, author = {Ran Canetti, Cynthia Dwork, Moni Naor, Rafi Ostrovsky}, title = {Deniable Encryption}, howpublished = {Cryptology ePrint Archive, Report 1996/002}, year = {1996}, url = {http://eprint.iacr.org/1996/002}, } @misc{cryptoeprint:1996:003, author = {Ronald Cramer and Ivan Damgaard}, title = {On Monotone Function Closure of Statistical Zero-Knowledge}, howpublished = {Cryptology ePrint Archive, Report 1996/003}, year = {1996}, url = {http://eprint.iacr.org/1996/003}, } @misc{cryptoeprint:1996:004, author = {Ronald Cramer and Ivan Damgaard}, title = {Linear Zero-Knowledge - A note on Efficient Zero-Knowledge Proofs and Arguments}, howpublished = {Cryptology ePrint Archive, Report 1996/004}, year = {1996}, url = {http://eprint.iacr.org/1996/004}, } @misc{cryptoeprint:1996:005, author = {Rafail Ostrovsky, Victor Shoup}, title = {Private Information Storage}, howpublished = {Cryptology ePrint Archive, Report 1996/005}, year = {1996}, url = {http://eprint.iacr.org/1996/005}, } @misc{cryptoeprint:1996:006, author = {Andris Ambainis}, title = {Upper bound on the communication complexity of private information retrieval}, howpublished = {Cryptology ePrint Archive, Report 1996/006}, year = {1996}, url = {http://eprint.iacr.org/1996/006}, } @misc{cryptoeprint:1996:007, author = {Moni Naor and Adi Shamir}, title = {Visual Cryptography II: Improving the Contrast Via the Cover Base}, howpublished = {Cryptology ePrint Archive, Report 1996/007}, year = {1996}, url = {http://eprint.iacr.org/1996/007}, } @misc{cryptoeprint:1996:008, author = {Moni Naor and Avishai Wool}, title = {Access Control and Signatures via Quorum Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 1996/008}, year = {1996}, url = {http://eprint.iacr.org/1996/008}, } @misc{cryptoeprint:1996:009, author = {Oded Goldreich, Shafi Goldwasser, and Shai Halevi}, title = {Collision-Free Hashing from Lattice Problems}, howpublished = {Cryptology ePrint Archive, Report 1996/009}, year = {1996}, url = {http://eprint.iacr.org/1996/009}, } @misc{cryptoeprint:1996:010, author = {Gilles Brassard, Claude Crepeau, Miklos Santha}, title = {Oblivious Transfers and Intersecting Codes}, howpublished = {Cryptology ePrint Archive, Report 1996/010}, year = {1996}, url = {http://eprint.iacr.org/1996/010}, } @misc{cryptoeprint:1996:011, author = {Moni Naor and Omer Reingold}, title = {On the Construction of Pseudo-Random Permutations: Luby-Rackoff Revisited}, howpublished = {Cryptology ePrint Archive, Report 1996/011}, year = {1996}, url = {http://eprint.iacr.org/1996/011}, } @misc{cryptoeprint:1996:012, author = {Yair Frankel, Peter Gemmell, Philip D. MacKenzie, Moti Yung}, title = {Proactive RSA}, howpublished = {Cryptology ePrint Archive, Report 1996/012}, year = {1996}, url = {http://eprint.iacr.org/1996/012}, } @misc{cryptoeprint:1996:013, author = {Carlo Blundo, Alfredo De Santis, and Douglas R. Stinson}, title = {On the Contrast in Visual Cryptography Schemes}, howpublished = {Cryptology ePrint Archive, Report 1996/013}, year = {1996}, url = {http://eprint.iacr.org/1996/013}, } @misc{cryptoeprint:1996:014, author = {Oded Goldreich}, title = {The Graph Clustering Problem has a Perfect Zero-Knowledge Proof}, howpublished = {Cryptology ePrint Archive, Report 1996/014}, year = {1996}, url = {http://eprint.iacr.org/1996/014}, } @misc{cryptoeprint:1996:015, author = {Mihir Bellare and Shafi Goldwasser}, title = {Verifiable Partial Key Escrow}, howpublished = {Cryptology ePrint Archive, Report 1996/015}, year = {1996}, url = {http://eprint.iacr.org/1996/015}, } @misc{cryptoeprint:1996:016, author = {Oded Goldreich, Shafi Goldwasser, and Shai Halevi}, title = {Public-Key Cryptosystems from Lattice Reduction Problems}, howpublished = {Cryptology ePrint Archive, Report 1996/016}, year = {1996}, url = {http://eprint.iacr.org/1996/016}, } @misc{cryptoeprint:1997:001, author = {Mihir Bellare and Daniele Micciancio}, title = {A New Paradigm for Collision-free Hashing: Incrementality at Reduced Cost}, howpublished = {Cryptology ePrint Archive, Report 1997/001}, year = {1997}, url = {http://eprint.iacr.org/1997/001}, } @misc{cryptoeprint:1997:002, author = {Mihir Bellare and Markus Jakobsson and Moti Yung}, title = {Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function}, howpublished = {Cryptology ePrint Archive, Report 1997/002}, year = {1997}, url = {http://eprint.iacr.org/1997/002}, } @misc{cryptoeprint:1997:003, author = {Claude Crepeau}, title = {Efficient Cryptographic Protocols Based on Noisy Channels.}, howpublished = {Cryptology ePrint Archive, Report 1997/003}, year = {1997}, url = {http://eprint.iacr.org/1997/003}, } @misc{cryptoeprint:1997:004, author = {Mihir Bellare}, title = {A note on negligible functions}, howpublished = {Cryptology ePrint Archive, Report 1997/004}, year = {1997}, url = {http://eprint.iacr.org/1997/004}, } @misc{cryptoeprint:1997:005, author = {S. Decatur, O. Goldreich, D. Ron}, title = {A Probabilistic Error-Correcting Scheme}, howpublished = {Cryptology ePrint Archive, Report 1997/005}, year = {1997}, url = {http://eprint.iacr.org/1997/005}, } @misc{cryptoeprint:1997:006, author = {Yuval Ishai and Eyal Kushilevitz}, title = {Protecting Data Privacy in Private Information Retrieval Schemes}, howpublished = {Cryptology ePrint Archive, Report 1997/006}, year = {1997}, url = {http://eprint.iacr.org/1997/006}, } @misc{cryptoeprint:1997:007, author = {Ran Canetti}, title = {Towards realizing random oracles: Hash functions that hide all partial information}, howpublished = {Cryptology ePrint Archive, Report 1997/007}, year = {1997}, url = {http://eprint.iacr.org/1997/007}, } @misc{cryptoeprint:1997:008, author = {Harald Ritter, Carsten Roessner}, title = {Factoring via Strong Lattice Reduction Algorithms}, howpublished = {Cryptology ePrint Archive, Report 1997/008}, year = {1997}, url = {http://eprint.iacr.org/1997/008}, } @misc{cryptoeprint:1997:009, author = {}, title = {Collision-Resistant Hashing: Towards Making UOWHFs Practical}, howpublished = {Cryptology ePrint Archive, Report 1997/009}, year = {1997}, url = {http://eprint.iacr.org/1997/009}, } @misc{cryptoeprint:1997:010, author = {Erez Petrank and Charles Rackoff }, title = {CBC MAC for Real-Time Data Sources }, howpublished = {Cryptology ePrint Archive, Report 1997/010}, year = {1997}, url = {http://eprint.iacr.org/1997/010}, } @misc{cryptoeprint:1997:011, author = {Joe Kilian and Erez Petrank }, title = {Identity Escrow }, howpublished = {Cryptology ePrint Archive, Report 1997/011}, year = {1997}, url = {http://eprint.iacr.org/1997/011}, } @misc{cryptoeprint:1997:012, author = {Oded Goldreich, Birgit Pfitzmann, and Ronald L. Rivest}, title = {Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop.}, howpublished = {Cryptology ePrint Archive, Report 1997/012}, year = {1997}, url = {http://eprint.iacr.org/1997/012}, } @misc{cryptoeprint:1997:013, author = {Moni Naor, Benny Pinkas.}, title = {Visual Authentication and Identification}, howpublished = {Cryptology ePrint Archive, Report 1997/013}, year = {1997}, url = {http://eprint.iacr.org/1997/013}, } @misc{cryptoeprint:1997:014, author = {Eli Biham, Dan Boneh and Omer Reingold}, title = {Generalized Diffie-Hellman Modulo a Composite is not Weaker than Factoring}, howpublished = {Cryptology ePrint Archive, Report 1997/014}, year = {1997}, url = {http://eprint.iacr.org/1997/014}, } @misc{cryptoeprint:1997:015, author = {N. Asokan, V. Shoup, M. Waidner}, title = {Optimistic fair Exchange of Digital Signatures}, howpublished = {Cryptology ePrint Archive, Report 1997/015}, year = {1997}, url = {http://eprint.iacr.org/1997/015}, } @misc{cryptoeprint:1998:001, author = {Gerrit Bleumer}, title = {On Protocol Divertibility}, howpublished = {Cryptology ePrint Archive, Report 1998/001}, year = {1998}, url = {http://eprint.iacr.org/1998/001}, } @misc{cryptoeprint:1998:002, author = {A. De Santis, G. Di Crescenzo, O. Goldreich, and G. Persiano.}, title = {The Graph Clustering Problem has a Perfect Zero-Knowledge Proof}, howpublished = {Cryptology ePrint Archive, Report 1998/002}, year = {1998}, url = {http://eprint.iacr.org/1998/002}, } @misc{cryptoeprint:1998:003, author = {Benny Chor, Niv Gilboa, and Moni Naor}, title = {Private Information Retrieval by Keywords}, howpublished = {Cryptology ePrint Archive, Report 1998/003}, year = {1998}, url = {http://eprint.iacr.org/1998/003}, } @misc{cryptoeprint:1998:004, author = {Giovanni Di-Crescenzo and Yuval Ishai and Rafail Ostrovsky}, title = {Universal Service Providers for Database Private Information Retrieval}, howpublished = {Cryptology ePrint Archive, Report 1998/004}, year = {1998}, url = {http://eprint.iacr.org/1998/004}, } @misc{cryptoeprint:1998:005, author = {Oded Goldreich and Shafi Goldwasser}, title = {On the possibility of basing Cryptography on the assumption that $P \neq NP$}, howpublished = {Cryptology ePrint Archive, Report 1998/005}, year = {1998}, url = {http://eprint.iacr.org/1998/005}, } @misc{cryptoeprint:1998:006, author = {Ronald Cramer and Victor Shoup}, title = {A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack}, howpublished = {Cryptology ePrint Archive, Report 1998/006}, year = {1998}, url = {http://eprint.iacr.org/1998/006}, } @misc{cryptoeprint:1998:007, author = {Mihir Bellare, Juan A. Garay, and Tal Rabin}, title = {Fast Batch Verification for Modular Exponentiation and Digital Signatures}, howpublished = {Cryptology ePrint Archive, Report 1998/007}, year = {1998}, url = {http://eprint.iacr.org/1998/007}, } @misc{cryptoeprint:1998:008, author = {Rosario Gennaro and Daniele Micciancio and Tal Rabin}, title = {An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products}, howpublished = {Cryptology ePrint Archive, Report 1998/008}, year = {1998}, url = {http://eprint.iacr.org/1998/008}, } @misc{cryptoeprint:1998:009, author = {Mihir Bellare, Ran Canetti, and Hugo Krawczyk}, title = {A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols }, howpublished = {Cryptology ePrint Archive, Report 1998/009}, year = {1998}, url = {http://eprint.iacr.org/1998/009}, } @misc{cryptoeprint:1998:010, author = {Hugo Krawczyk and Tal Rabin }, title = {Chameleon Hashing and Signatures}, howpublished = {Cryptology ePrint Archive, Report 1998/010}, year = {1998}, url = {http://eprint.iacr.org/1998/010}, } @misc{cryptoeprint:1998:011, author = {Ran Canetti, Oded Goldreich, Shai Halevi}, title = {The Random Oracle Methodology, Revisited}, howpublished = {Cryptology ePrint Archive, Report 1998/011}, year = {1998}, url = {http://eprint.iacr.org/1998/011}, } @misc{cryptoeprint:1998:012, author = {Ran Canetti, Shai Halevi, Amir Herzberg}, title = {Maintaining Authenticated Communication in the Presence of Break-ins}, howpublished = {Cryptology ePrint Archive, Report 1998/012}, year = {1998}, url = {http://eprint.iacr.org/1998/012}, } @misc{cryptoeprint:1998:013, author = {Yael Gertner, Shafi Goldwasser, Tal Malkin}, title = {A Random Server Model for Private Information Retrieval (or How to Achieve Information Theoretic PIR Avoiding Data Replication)}, howpublished = {Cryptology ePrint Archive, Report 1998/013}, year = {1998}, url = {http://eprint.iacr.org/1998/013}, } @misc{cryptoeprint:1998:014, author = {Ran Canetti, Eyal Kushilevitz, Rafail Ostrovsky, Adi Rosen}, title = {Randomness versus Fault-Tolerance}, howpublished = {Cryptology ePrint Archive, Report 1998/014}, year = {1998}, url = {http://eprint.iacr.org/1998/014}, } @misc{cryptoeprint:1998:015, author = {Shai Halevi and Silvio Micali}, title = {More on Proofs of Knowledge}, howpublished = {Cryptology ePrint Archive, Report 1998/015}, year = {1998}, url = {http://eprint.iacr.org/1998/015}, } @misc{cryptoeprint:1998:016, author = {Hoi-Kwong Lo and H. F. Chau }, title = {Quantum Computers Render Quantum Key Distribution Unconditionally Secure Over Arbitrarily Long Distances }, howpublished = {Cryptology ePrint Archive, Report 1998/016}, year = {1998}, url = {http://eprint.iacr.org/1998/016}, } @misc{cryptoeprint:1998:017, author = {H. F. Chau and H.-K. Lo }, title = {Making An Empty Promise With A Quantum Computer (Or, A Brief Review on the Impossibility of Quantum Bit Commitment) }, howpublished = {Cryptology ePrint Archive, Report 1998/017}, year = {1998}, url = {http://eprint.iacr.org/1998/017}, } @misc{cryptoeprint:1998:018, author = {Ran Canetti }, title = {Security and Composition of Multi-party Cryptographic Protocols}, howpublished = {Cryptology ePrint Archive, Report 1998/018}, year = {1998}, url = {http://eprint.iacr.org/1998/018}, } @misc{cryptoeprint:1998:019, author = {Mihir Bellare, Shai Halevi, Amit Sahai and Salil Vadhan}, title = {Many-to-one Trapdoor Functions and their Relation to Public-key Cryptosystems }, howpublished = {Cryptology ePrint Archive, Report 1998/019}, year = {1998}, url = {http://eprint.iacr.org/1998/019}, } @misc{cryptoeprint:1998:020, author = {Claus P. Schnorr}, title = {Almost All Discrete Log Bits Are Simultaneously Secure }, howpublished = {Cryptology ePrint Archive, Report 1998/020}, year = {1998}, url = {http://eprint.iacr.org/1998/020}, } @misc{cryptoeprint:1998:021, author = {Mihir Bellare,Anand Desai, David Pointcheval and Phillip Rogaway}, title = {Relations among Notions of Security for Public-Key Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 1998/021}, year = {1998}, url = {http://eprint.iacr.org/1998/021}, } @misc{cryptoeprint:1998:022, author = {Hoi-Kwong Lo }, title = {Insecurity of Quantum Computations }, howpublished = {Cryptology ePrint Archive, Report 1998/022}, year = {1998}, url = {http://eprint.iacr.org/1998/022}, } @misc{cryptoeprint:1998:023, author = {William Aiello, Mihir Bellare, Giovanni Di Crescenzo and Ramarathnam Venkatesan}, title = {Security amplification by composition: The case of doubly-iterated, ideal ciphers }, howpublished = {Cryptology ePrint Archive, Report 1998/023}, year = {1998}, url = {http://eprint.iacr.org/1998/023}, } @misc{cryptoeprint:1998:024, author = {John Pliam}, title = {The Disparity between Work and Entropy in Cryptology}, howpublished = {Cryptology ePrint Archive, Report 1998/024}, year = {1998}, url = {http://eprint.iacr.org/1998/024}, } @misc{cryptoeprint:1998:025, author = {Juan A. Garay, Rosario Gennaro, Charanjit Jutla, and Tal Rabin }, title = {Secure Distributed Storage and Retrieval }, howpublished = {Cryptology ePrint Archive, Report 1998/025}, year = {1998}, url = {http://eprint.iacr.org/1998/025}, } @misc{cryptoeprint:1998:026, author = {Oded Goldreich and Salil Vadhan}, title = {Comparing Entropies in Statistical Zero-Knowledge with Applications to the Structure of SZK }, howpublished = {Cryptology ePrint Archive, Report 1998/026}, year = {1998}, url = {http://eprint.iacr.org/1998/026}, } @misc{cryptoeprint:1999:001, author = {Ronald Cramer and Victor Shoup}, title = {Signature Schemes Based on the Strong RSA Assumption}, howpublished = {Cryptology ePrint Archive, Report 1999/001}, year = {1999}, url = {http://eprint.iacr.org/1999/001}, } @misc{cryptoeprint:1999:002, author = {Oded Goldreich, Dana Ron and Madhu Sudan }, title = {Chinese Remaindering with Errors }, howpublished = {Cryptology ePrint Archive, Report 1999/002}, year = {1999}, url = {http://eprint.iacr.org/1999/002}, } @misc{cryptoeprint:1999:003, author = {Ivan Damgard }, title = {An error in the mixed adversary protocol by Fitzi, Hirt and Maurer }, howpublished = {Cryptology ePrint Archive, Report 1999/003}, year = {1999}, url = {http://eprint.iacr.org/1999/003}, } @misc{cryptoeprint:1999:004, author = {Shai Halevi, Hugo Krawczyk }, title = {Public-key cryptography and password protocols }, howpublished = {Cryptology ePrint Archive, Report 1999/004}, year = {1999}, url = {http://eprint.iacr.org/1999/004}, } @misc{cryptoeprint:1999:005, author = {Daniele Micciancio }, title = {Lattice Based Cryptography: A Global Improvement }, howpublished = {Cryptology ePrint Archive, Report 1999/005}, year = {1999}, url = {http://eprint.iacr.org/1999/005}, } @misc{cryptoeprint:1999:006, author = {Roger Fischlin}, title = {Fast Proof of Plaintext-Knowledge and Deniable Authentication Based on Chinese Remainder Theorem}, howpublished = {Cryptology ePrint Archive, Report 1999/006}, year = {1999}, url = {http://eprint.iacr.org/1999/006}, } @misc{cryptoeprint:1999:007, author = {Michel Abdalla, Mihir Bellare and Phillip Rogaway }, title = {DHAES: An Encryption Scheme Based on the Diffie-Hellman Problem}, howpublished = {Cryptology ePrint Archive, Report 1999/007}, year = {1999}, url = {http://eprint.iacr.org/1999/007}, } @misc{cryptoeprint:1999:008, author = {Jan Camenisch and Ivan Damgaard }, title = {Verifiable Encryption and Applications to Group Signatures and Signature Sharing }, howpublished = {Cryptology ePrint Archive, Report 1999/008}, year = {1999}, url = {http://eprint.iacr.org/1999/008}, } @misc{cryptoeprint:1999:009, author = {Satoshi Hada and Toshiaki Tanaka}, title = {On the Existence of 3-Round Zero-Knowledge Protocols}, howpublished = {Cryptology ePrint Archive, Report 1999/009}, year = {1999}, url = {http://eprint.iacr.org/1999/009}, } @misc{cryptoeprint:1999:010, author = {Satoshi Hada and Toshiaki Tanaka}, title = {A Relationship between One-Wayness and Correlation Intractability}, howpublished = {Cryptology ePrint Archive, Report 1999/010}, year = {1999}, url = {http://eprint.iacr.org/1999/010}, } @misc{cryptoeprint:1999:011, author = {Victor Shoup}, title = {Practical Threshold Signatures }, howpublished = {Cryptology ePrint Archive, Report 1999/011}, year = {1999}, url = {http://eprint.iacr.org/1999/011}, } @misc{cryptoeprint:1999:012, author = {Victor Shoup}, title = {On Formal Models for Secure Key Exchange }, howpublished = {Cryptology ePrint Archive, Report 1999/012}, year = {1999}, url = {http://eprint.iacr.org/1999/012}, } @misc{cryptoeprint:1999:013, author = {Rosario Gennaro, Shai Halevi and Tal Rabin }, title = {Secure Hash-and-Sign Signatures without the Random Oracle }, howpublished = {Cryptology ePrint Archive, Report 1999/013}, year = {1999}, url = {http://eprint.iacr.org/1999/013}, } @misc{cryptoeprint:1999:014, author = {Ivan Damgard }, title = {Concurrent Zero-Knowledge is Easy in Practice }, howpublished = {Cryptology ePrint Archive, Report 1999/014}, year = {1999}, url = {http://eprint.iacr.org/1999/014}, } @misc{cryptoeprint:1999:015, author = {Oded Goldreich, Shafi Goldwasser and Silvio Micali }, title = {Interleaved Zero-Knowledge in the Public-Key Model }, howpublished = {Cryptology ePrint Archive, Report 1999/015}, year = {1999}, url = {http://eprint.iacr.org/1999/015}, } @misc{cryptoeprint:1999:016, author = {Mihir Bellare and Sara Miner }, title = {A forward-secure digital signature scheme }, howpublished = {Cryptology ePrint Archive, Report 1999/016}, year = {1999}, url = {http://eprint.iacr.org/1999/016}, } @misc{cryptoeprint:1999:017, author = {Victor Shoup}, title = {A Composition Theorem for Universal One-Way Hash Functions }, howpublished = {Cryptology ePrint Archive, Report 1999/017}, year = {1999}, url = {http://eprint.iacr.org/1999/017}, } @misc{cryptoeprint:1999:018, author = {Mihir Bellare and Amit Sahai }, title = {Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization }, howpublished = {Cryptology ePrint Archive, Report 1999/018}, year = {1999}, url = {http://eprint.iacr.org/1999/018}, } @misc{cryptoeprint:1999:019, author = {Johan Hastad and Mats Naslund }, title = {Security of all RSA and Discrete Log Bits }, howpublished = {Cryptology ePrint Archive, Report 1999/019}, year = {1999}, url = {http://eprint.iacr.org/1999/019}, } @misc{cryptoeprint:1999:020, author = {Silvio Micali and Leonid Reyzin }, title = {Improving the Exact Security of Digital Signature Schemes }, howpublished = {Cryptology ePrint Archive, Report 1999/020}, year = {1999}, url = {http://eprint.iacr.org/1999/020}, } @misc{cryptoeprint:1999:021, author = {Maurizio Kliban Boyarsky }, title = {Public-Key Cryptography and Password Protocols: The Multi-User Case }, howpublished = {Cryptology ePrint Archive, Report 1999/021}, year = {1999}, url = {http://eprint.iacr.org/1999/021}, } @misc{cryptoeprint:1999:022, author = {Ran Canetti, Oded Goldreich, Shafi Goldwasser and Silvio Micali}, title = {Resettable Zero-Knowledge }, howpublished = {Cryptology ePrint Archive, Report 1999/022}, year = {1999}, url = {http://eprint.iacr.org/1999/022}, } @misc{cryptoeprint:1999:023, author = {Cynthia Dwork, Moni Naor and Amit Sahai}, title = {Concurrent Zero-Knowledge}, howpublished = {Cryptology ePrint Archive, Report 1999/023}, year = {1999}, url = {http://eprint.iacr.org/1999/023}, } @misc{cryptoeprint:1999:024, author = {M. Bellare and R. Impagliazzo}, title = {A tool for obtaining tighter security analyses of pseudorandom function based constructions, with applications to PRP to PRF conversion }, howpublished = {Cryptology ePrint Archive, Report 1999/024}, year = {1999}, url = {http://eprint.iacr.org/1999/024}, } @misc{cryptoeprint:2000:001, author = {Oded Goldreich }, title = {On Security Preserving Reductions -- Revised Terminology }, howpublished = {Cryptology ePrint Archive, Report 2000/001}, year = {2000}, url = {http://eprint.iacr.org/2000/001}, } @misc{cryptoeprint:2000:002, author = {Michel Abdalla and Leonid Reyzin}, title = {A New Forward-Secure Digital Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2000/002}, year = {2000}, url = {http://eprint.iacr.org/2000/002}, } @misc{cryptoeprint:2000:003, author = {Marc Fischlin }, title = {Implications of the Nontriviality of Entropy Approximation }, howpublished = {Cryptology ePrint Archive, Report 2000/003}, year = {2000}, url = {http://eprint.iacr.org/2000/003}, } @misc{cryptoeprint:2000:004, author = {J.N. Staddon and D.R. Stinson and R. Wei}, title = {Combinatorial Properties of Frameproof and Traceability Codes }, howpublished = {Cryptology ePrint Archive, Report 2000/004}, year = {2000}, url = {http://eprint.iacr.org/2000/004}, } @misc{cryptoeprint:2000:005, author = {Yuriy Tarannikov}, title = {On Resilient Boolean Functions with Maximal Possible Nonlinearity}, howpublished = {Cryptology ePrint Archive, Report 2000/005}, year = {2000}, url = {http://eprint.iacr.org/2000/005}, } @misc{cryptoeprint:2000:006, author = {Tak-Ming Law }, title = {An Encryption Algorithm and Key-stream Generator for Chinese Text Messages by Character Internal Code Structure}, howpublished = {Cryptology ePrint Archive, Report 2000/006}, year = {2000}, url = {http://eprint.iacr.org/2000/006}, } @misc{cryptoeprint:2000:007, author = {Tak-Ming Law}, title = {Public Electronic Contract Protocol}, howpublished = {Cryptology ePrint Archive, Report 2000/007}, year = {2000}, url = {http://eprint.iacr.org/2000/007}, } @misc{cryptoeprint:2000:008, author = {Ivan Damg{\aa}rd and Mads Jurik}, title = {Efficient Protocols based on Probabilistic Encryption using Composite Degree Residue Classes}, howpublished = {Cryptology ePrint Archive, Report 2000/008}, year = {2000}, url = {http://eprint.iacr.org/2000/008}, } @misc{cryptoeprint:2000:009, author = {Palash Sarkar and Subhamoy Maitra}, title = {New Directions in Design of Resilient Boolean Functions}, howpublished = {Cryptology ePrint Archive, Report 2000/009}, year = {2000}, url = {http://eprint.iacr.org/2000/009}, } @misc{cryptoeprint:2000:010, author = {Mihir Bellare and Alexandra Boldyreva}, title = {The Security of Chaffing and Winnowing}, howpublished = {Cryptology ePrint Archive, Report 2000/010}, year = {2000}, url = {http://eprint.iacr.org/2000/010}, } @misc{cryptoeprint:2000:011, author = {Gideon Samid}, title = {Tailored Key Encryption (TaKE) Tailoring a key for a given pair of plaintext/ciphertext}, howpublished = {Cryptology ePrint Archive, Report 2000/011}, year = {2000}, url = {http://eprint.iacr.org/2000/011}, } @misc{cryptoeprint:2000:012, author = {DaeHun Nyang and JooSeok Song}, title = {Chosen Message Attack Against Goldreich-Goldwasser-Halevi's Signature Scheme from Crypto'97}, howpublished = {Cryptology ePrint Archive, Report 2000/012}, year = {2000}, url = {http://eprint.iacr.org/2000/012}, } @misc{cryptoeprint:2000:013, author = {Joe Kilian and Erez Petrank}, title = {Concurrent Zero-Knowledge in Poly-logarithmic Rounds}, howpublished = {Cryptology ePrint Archive, Report 2000/013}, year = {2000}, url = {http://eprint.iacr.org/2000/013}, } @misc{cryptoeprint:2000:014, author = {Mihir Bellare and David Pointcheval and Phillip Rogaway}, title = {Authenticated Key Exchange Secure Against Dictionary Attacks}, howpublished = {Cryptology ePrint Archive, Report 2000/014}, year = {2000}, url = {http://eprint.iacr.org/2000/014}, } @misc{cryptoeprint:2000:015, author = {Mihir Bellare and Marc Fischlin and Shafi Goldwasser and Silvio Micali}, title = {Identification Protocols Secure Against Reset Attacks}, howpublished = {Cryptology ePrint Archive, Report 2000/015}, year = {2000}, url = {http://eprint.iacr.org/2000/015}, } @misc{cryptoeprint:2000:016, author = {Benne de Weger}, title = {Cryptanalysis of RSA with small prime difference}, howpublished = {Cryptology ePrint Archive, Report 2000/016}, year = {2000}, url = {http://eprint.iacr.org/2000/016}, } @misc{cryptoeprint:2000:017, author = {Rosario Gennaro and Luca Trevisan}, title = {Lower Bounds on the Efficiency of Generic Cryptographic Constructions}, howpublished = {Cryptology ePrint Archive, Report 2000/017}, year = {2000}, url = {http://eprint.iacr.org/2000/017}, } @misc{cryptoeprint:2000:018, author = {A. Aiello, S. Bhatt, R. Ostrovsky, S. Rajagopalan.}, title = {Fast Verification of Any Remote Procedure Call: Short Witness-Indistinguishable One-Round Proofs for NP}, howpublished = {Cryptology ePrint Archive, Report 2000/018}, year = {2000}, url = {http://eprint.iacr.org/2000/018}, } @misc{cryptoeprint:2000:019, author = {Anna Lysyanskaya}, title = {Threshold Cryptography Secure Against the Adaptive Adversary, Concurrently}, howpublished = {Cryptology ePrint Archive, Report 2000/019}, year = {2000}, url = {http://eprint.iacr.org/2000/019}, } @misc{cryptoeprint:2000:020, author = {Maria Isabel Gonzalez Vasco and Igor E. Shparlinski}, title = {On the Security of Diffie--Hellman Bits}, howpublished = {Cryptology ePrint Archive, Report 2000/020}, year = {2000}, url = {http://eprint.iacr.org/2000/020}, } @misc{cryptoeprint:2000:021, author = {Shahrokh Saeednia}, title = {An Efficient Identification Scheme Based on Permuted Patterns}, howpublished = {Cryptology ePrint Archive, Report 2000/021}, year = {2000}, url = {http://eprint.iacr.org/2000/021}, } @misc{cryptoeprint:2000:022, author = {Thomas Schweinberger and Victor Shoup}, title = {ACE: The Advanced Cryptographic Engine}, howpublished = {Cryptology ePrint Archive, Report 2000/022}, year = {2000}, url = {http://eprint.iacr.org/2000/022}, } @misc{cryptoeprint:2000:023, author = {Igor Shparlinski}, title = {Security of Polynomial Transformations of the Diffie--Hellman Key}, howpublished = {Cryptology ePrint Archive, Report 2000/023}, year = {2000}, url = {http://eprint.iacr.org/2000/023}, } @misc{cryptoeprint:2000:024, author = {Maria Isabel Gonzalez Vasco and Igor E. Shparlinski}, title = {Security of the Most Significant Bits of the Shamir Message Passing Scheme}, howpublished = {Cryptology ePrint Archive, Report 2000/024}, year = {2000}, url = {http://eprint.iacr.org/2000/024}, } @misc{cryptoeprint:2000:025, author = {Mihir Bellare and Chanathip Namprempre}, title = {Authenticated Encryption: Relations among notions and analysis of the generic composition paradigm}, howpublished = {Cryptology ePrint Archive, Report 2000/025}, year = {2000}, url = {http://eprint.iacr.org/2000/025}, } @misc{cryptoeprint:2000:026, author = {Taekyoung Kwon}, title = {Authentication and Key Agreement via Memorable Password}, howpublished = {Cryptology ePrint Archive, Report 2000/026}, year = {2000}, url = {http://eprint.iacr.org/2000/026}, } @misc{cryptoeprint:2000:027, author = {Ahto Buldas and Peeter Laud and Helger Lipmaa}, title = {Accountable Certificate Management using Undeniable Attestations}, howpublished = {Cryptology ePrint Archive, Report 2000/027}, year = {2000}, url = {http://eprint.iacr.org/2000/027}, } @misc{cryptoeprint:2000:028, author = {Christian Cachin}, title = {An Information-Theoretic Model for Steganography}, howpublished = {Cryptology ePrint Archive, Report 2000/028}, year = {2000}, url = {http://eprint.iacr.org/2000/028}, } @misc{cryptoeprint:2000:029, author = {Anand Desai and Sara Miner}, title = {Concrete Security Characterizations of PRFs and PRPs: Reductions and Applications}, howpublished = {Cryptology ePrint Archive, Report 2000/029}, year = {2000}, url = {http://eprint.iacr.org/2000/029}, } @misc{cryptoeprint:2000:030, author = {Joan Feigenbaum and Jessica Fong and Martin Strauss and Rebecca N. Wright}, title = {Secure Multiparty Computation of Approximations}, howpublished = {Cryptology ePrint Archive, Report 2000/030}, year = {2000}, url = {http://eprint.iacr.org/2000/030}, } @misc{cryptoeprint:2000:031, author = {Michel Abdalla and Sara Miner and Chanathip Namprempre}, title = {Forward Security in Threshold Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2000/031}, year = {2000}, url = {http://eprint.iacr.org/2000/031}, } @misc{cryptoeprint:2000:032, author = {Birgit Pfitzmann, Ahmad-Reza Sadeghi}, title = {Anonymous Fingerprinting with Direct Non-Repudiation}, howpublished = {Cryptology ePrint Archive, Report 2000/032}, year = {2000}, url = {http://eprint.iacr.org/2000/032}, } @misc{cryptoeprint:2000:033, author = {Kazumaro Aoki}, title = {The Complete Distribution of Linear Probabilities of MARS' s-box}, howpublished = {Cryptology ePrint Archive, Report 2000/033}, year = {2000}, url = {http://eprint.iacr.org/2000/033}, } @misc{cryptoeprint:2000:034, author = {Christian Cachin and Klaus Kursawe and Victor Shoup}, title = {Random Oracles in Constantinople: Practical Asynchronous Byzantine Agreement using Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2000/034}, year = {2000}, url = {http://eprint.iacr.org/2000/034}, } @misc{cryptoeprint:2000:035, author = {Alejandro Hevia and Marcos Kiwi}, title = {Electronic Jury Voting Protocols}, howpublished = {Cryptology ePrint Archive, Report 2000/035}, year = {2000}, url = {http://eprint.iacr.org/2000/035}, } @misc{cryptoeprint:2000:036, author = {Jean-Pierre Seifert}, title = {Using fewer Qubits in Shor's Factorization Algorithm via Simultaneous Diophantine Approximation}, howpublished = {Cryptology ePrint Archive, Report 2000/036}, year = {2000}, url = {http://eprint.iacr.org/2000/036}, } @misc{cryptoeprint:2000:037, author = {Ronald Cramer and Ivan Damg{\aa}rd and Ueli Maurer}, title = {General Secure Multi-Party Computation from any Linear Secret Sharing Scheme}, howpublished = {Cryptology ePrint Archive, Report 2000/037}, year = {2000}, url = {http://eprint.iacr.org/2000/037}, } @misc{cryptoeprint:2000:038, author = {Ronald Cramer and Ivan Damg{\aa}rd and Stefan Dziembowski}, title = {On the Complexity of Verifiable Secret Sharing and Multi-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2000/038}, year = {2000}, url = {http://eprint.iacr.org/2000/038}, } @misc{cryptoeprint:2000:039, author = {Charanjit S. Jutla}, title = {Encryption Modes with Almost Free Message Integrity}, howpublished = {Cryptology ePrint Archive, Report 2000/039}, year = {2000}, url = {http://eprint.iacr.org/2000/039}, } @misc{cryptoeprint:2000:040, author = {Eric FILIOL}, title = {Decimation Attack of Stream Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2000/040}, year = {2000}, url = {http://eprint.iacr.org/2000/040}, } @misc{cryptoeprint:2000:041, author = {Sanjeev Kumar Mishra}, title = {On Symmetrically Private Information Retrieval}, howpublished = {Cryptology ePrint Archive, Report 2000/041}, year = {2000}, url = {http://eprint.iacr.org/2000/041}, } @misc{cryptoeprint:2000:042, author = {Moni Naor and Omer Reingold}, title = {Constructing Pseudo-Random Permutations with a Prescribed Structure}, howpublished = {Cryptology ePrint Archive, Report 2000/042}, year = {2000}, url = {http://eprint.iacr.org/2000/042}, } @misc{cryptoeprint:2000:043, author = {C. Blundo and B. Masucci and D.R. Stinson and R. Wei}, title = {Constructions and Bounds for Unconditionally Secure Commitment Schemes}, howpublished = {Cryptology ePrint Archive, Report 2000/043}, year = {2000}, url = {http://eprint.iacr.org/2000/043}, } @misc{cryptoeprint:2000:044, author = {Victor Boyko and Philip MacKenzie and Sarvar Patel}, title = {Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman}, howpublished = {Cryptology ePrint Archive, Report 2000/044}, year = {2000}, url = {http://eprint.iacr.org/2000/044}, } @misc{cryptoeprint:2000:045, author = {Ronald Cramer and Ivan Damg{\aa}rd and Philip MacKenzie}, title = {Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2000/045}, year = {2000}, url = {http://eprint.iacr.org/2000/045}, } @misc{cryptoeprint:2000:046, author = {Stefan Lucks}, title = {The Saturation Attack - a Bait for Twofish}, howpublished = {Cryptology ePrint Archive, Report 2000/046}, year = {2000}, url = {http://eprint.iacr.org/2000/046}, } @misc{cryptoeprint:2000:047, author = {Subhamoy Maitra}, title = {Highly Nonlinear Balanced Boolean Functions with very good Autocorrelation Property}, howpublished = {Cryptology ePrint Archive, Report 2000/047}, year = {2000}, url = {http://eprint.iacr.org/2000/047}, } @misc{cryptoeprint:2000:048, author = {Enes Pasalic and Thomas Johansson and Subhamoy Maitra and Palash Sarkar}, title = {New Constructions of Resilent and Correlation Immune Boolean Functions achieving Upper Bounds on Nonlinearity}, howpublished = {Cryptology ePrint Archive, Report 2000/048}, year = {2000}, url = {http://eprint.iacr.org/2000/048}, } @misc{cryptoeprint:2000:049, author = {Palash Sarkar}, title = {Spectral Domain Analysis of Correlation Immune and Resilient Boolean Functions}, howpublished = {Cryptology ePrint Archive, Report 2000/049}, year = {2000}, url = {http://eprint.iacr.org/2000/049}, } @misc{cryptoeprint:2000:050, author = {Yuriy Tarannikov and Denis Kirienko}, title = {Spectral Analysis of High Order Correlation Immune Functions}, howpublished = {Cryptology ePrint Archive, Report 2000/050}, year = {2000}, url = {http://eprint.iacr.org/2000/050}, } @misc{cryptoeprint:2000:051, author = {Matthew Kwan}, title = {Reducing the Gate Count of Bitslice DES}, howpublished = {Cryptology ePrint Archive, Report 2000/051}, year = {2000}, url = {http://eprint.iacr.org/2000/051}, } @misc{cryptoeprint:2000:052, author = {Slobodan Petrovic and Amparo Fúster-Sabater}, title = {CRYPTANALYSIS OF THE A5/2 ALGORITHM}, howpublished = {Cryptology ePrint Archive, Report 2000/052}, year = {2000}, url = {http://eprint.iacr.org/2000/052}, } @misc{cryptoeprint:2000:053, author = {Thomas Johansson and Enes Pasalic}, title = {A Construction of Resilient Functions with High Nonlinearity}, howpublished = {Cryptology ePrint Archive, Report 2000/053}, year = {2000}, url = {http://eprint.iacr.org/2000/053}, } @misc{cryptoeprint:2000:054, author = {Subhamoy Maitra}, title = {Correlation Immune Boolean Functions with Very High Nonlinearity}, howpublished = {Cryptology ePrint Archive, Report 2000/054}, year = {2000}, url = {http://eprint.iacr.org/2000/054}, } @misc{cryptoeprint:2000:055, author = {Ronald Cramer and Ivan Damg{\aa}rd and Jesper Buus Nielsen}, title = {Multiparty Computation from Threshold Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2000/055}, year = {2000}, url = {http://eprint.iacr.org/2000/055}, } @misc{cryptoeprint:2000:056, author = {Amit Sahai and Salil Vadhan}, title = {A Complete Problem for Statistical Zero Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2000/056}, year = {2000}, url = {http://eprint.iacr.org/2000/056}, } @misc{cryptoeprint:2000:057, author = {Oded Goldreich and Yehuda Lindell}, title = {Session-Key Generation using Human Passwords Only}, howpublished = {Cryptology ePrint Archive, Report 2000/057}, year = {2000}, url = {http://eprint.iacr.org/2000/057}, } @misc{cryptoeprint:2000:058, author = {Sara Miner and Jessica Staddon}, title = {Graph-Based Authentication of Digital Streams}, howpublished = {Cryptology ePrint Archive, Report 2000/058}, year = {2000}, url = {http://eprint.iacr.org/2000/058}, } @misc{cryptoeprint:2000:059, author = {Gideon Samid}, title = {Essential Shannon Security with Keys Smaller Than the Encrypted Message}, howpublished = {Cryptology ePrint Archive, Report 2000/059}, year = {2000}, url = {http://eprint.iacr.org/2000/059}, } @misc{cryptoeprint:2000:060, author = {Victor Shoup}, title = {OAEP Reconsidered}, howpublished = {Cryptology ePrint Archive, Report 2000/060}, year = {2000}, url = {http://eprint.iacr.org/2000/060}, } @misc{cryptoeprint:2000:061, author = {Eiichiro Fujisaki and Tatsuaki Okamoto and David Pointcheval and Jacques Stern}, title = {RSA-OAEP is Secure under the RSA Assumption}, howpublished = {Cryptology ePrint Archive, Report 2000/061}, year = {2000}, url = {http://eprint.iacr.org/2000/061}, } @misc{cryptoeprint:2000:062, author = {Gideon Samid}, title = {Non-Deforming Digital Watermarks}, howpublished = {Cryptology ePrint Archive, Report 2000/062}, year = {2000}, url = {http://eprint.iacr.org/2000/062}, } @misc{cryptoeprint:2000:063, author = {Oded Goldreich}, title = {Candidate One-Way Functions Based on Expander Graphs}, howpublished = {Cryptology ePrint Archive, Report 2000/063}, year = {2000}, url = {http://eprint.iacr.org/2000/063}, } @misc{cryptoeprint:2000:064, author = {Oded Goldreich and Vered Rosen}, title = {On the Security of Modular Exponentiation with Application to the Construction of Pseudorandom Generators}, howpublished = {Cryptology ePrint Archive, Report 2000/064}, year = {2000}, url = {http://eprint.iacr.org/2000/064}, } @misc{cryptoeprint:2000:065, author = {Masashi Mitomo and Kaoru Kurosawa}, title = {How to Encrypt Long Messages without Large Size Symmetric/Asymmetric Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2000/065}, year = {2000}, url = {http://eprint.iacr.org/2000/065}, } @misc{cryptoeprint:2000:066, author = {Birgit Pfitzmann and Michael Waidner}, title = {A Model for Asynchronous Reactive Systems and its Application to Secure Message Transmission}, howpublished = {Cryptology ePrint Archive, Report 2000/066}, year = {2000}, url = {http://eprint.iacr.org/2000/066}, } @misc{cryptoeprint:2000:067, author = {Ran Canetti}, title = {Universally Composable Security: A New Paradigm for Cryptographic Protocols}, howpublished = {Cryptology ePrint Archive, Report 2000/067}, year = {2000}, url = {http://eprint.iacr.org/2000/067}, } @misc{cryptoeprint:2000:068, author = {Tak-Ming Law}, title = {A Content Certified E-mail Protocol with a Public Mailbox}, howpublished = {Cryptology ePrint Archive, Report 2000/068}, year = {2000}, url = {http://eprint.iacr.org/2000/068}, } @misc{cryptoeprint:2000:069, author = {Yuriy Tarannikov}, title = {New constructions of resilient Boolean functions with maximal nonlinearity}, howpublished = {Cryptology ePrint Archive, Report 2000/069}, year = {2000}, url = {http://eprint.iacr.org/2000/069}, } @misc{cryptoeprint:2001:001, author = {Helger Lipmaa, Shiho Moriai}, title = {Efficient Algorithms for Computing Differential Properties of Addition}, howpublished = {Cryptology ePrint Archive, Report 2001/001}, year = {2001}, url = {http://eprint.iacr.org/2001/001}, } @misc{cryptoeprint:2001:002, author = {M. Bellare and C. Namprempre and D. Pointcheval and M. Semanko}, title = {The One-More-RSA-Inversion Problems and the Security of Chaum's Blind Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2001/002}, year = {2001}, url = {http://eprint.iacr.org/2001/002}, } @misc{cryptoeprint:2001:003, author = {Antoine Joux and Kim Nguyen}, title = {Separating Decision Diffie-Hellman from Diffie-Hellman in cryptographic groups}, howpublished = {Cryptology ePrint Archive, Report 2001/003}, year = {2001}, url = {http://eprint.iacr.org/2001/003}, } @misc{cryptoeprint:2001:004, author = {Nicolas T. Courtois}, title = {MinRank problem and Zero-knowledge authentication}, howpublished = {Cryptology ePrint Archive, Report 2001/004}, year = {2001}, url = {http://eprint.iacr.org/2001/004}, } @misc{cryptoeprint:2001:005, author = {Ilya Mironov}, title = {A Note on Cryptanalysis of the Preliminary Version of the NTRU Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2001/005}, year = {2001}, url = {http://eprint.iacr.org/2001/005}, } @misc{cryptoeprint:2001:006, author = {Christian Cachin and Klaus Kursawe and Frank Petzold and Victor Shoup}, title = {Secure and Efficient Asynchronous Broadcast Protocols}, howpublished = {Cryptology ePrint Archive, Report 2001/006}, year = {2001}, url = {http://eprint.iacr.org/2001/006}, } @misc{cryptoeprint:2001:007, author = {Ron RIvest & Robert Silverman}, title = {Are 'Strong' Primes Needed for RSA}, howpublished = {Cryptology ePrint Archive, Report 2001/007}, year = {2001}, url = {http://eprint.iacr.org/2001/007}, } @misc{cryptoeprint:2001:008, author = {Pierre-Alain Fouque and Jacques Stern}, title = {Fully Distributed Threshold RSA under Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2001/008}, year = {2001}, url = {http://eprint.iacr.org/2001/008}, } @misc{cryptoeprint:2001:009, author = {Wen-Guey Tzeng, Zhi-Jia Tzeng}, title = {Robust key-evolving public key encryption schemes}, howpublished = {Cryptology ePrint Archive, Report 2001/009}, year = {2001}, url = {http://eprint.iacr.org/2001/009}, } @misc{cryptoeprint:2001:010, author = {Nicolas Courtois, Matthieu Finiasz and Nicolas Sendrier}, title = {How to achieve a McEliece-based Digital Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2001/010}, year = {2001}, url = {http://eprint.iacr.org/2001/010}, } @misc{cryptoeprint:2001:011, author = {Wenbo Mao}, title = {New Zero-knowledge Undeniable Signatures - Forgery of Signature Equivalent to Factorisation}, howpublished = {Cryptology ePrint Archive, Report 2001/011}, year = {2001}, url = {http://eprint.iacr.org/2001/011}, } @misc{cryptoeprint:2001:012, author = {John Black and Phillip Rogaway}, title = {Ciphers with Arbitrary Finite Domains}, howpublished = {Cryptology ePrint Archive, Report 2001/012}, year = {2001}, url = {http://eprint.iacr.org/2001/012}, } @misc{cryptoeprint:2001:013, author = {Anna M. Johnston}, title = {Digitally Watermarking RSA Moduli}, howpublished = {Cryptology ePrint Archive, Report 2001/013}, year = {2001}, url = {http://eprint.iacr.org/2001/013}, } @misc{cryptoeprint:2001:014, author = {Wenbo Mao}, title = {Timed-Release Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2001/014}, year = {2001}, url = {http://eprint.iacr.org/2001/014}, } @misc{cryptoeprint:2001:015, author = {Shai Halevi}, title = {An observation regarding Jutla's modes of operation}, howpublished = {Cryptology ePrint Archive, Report 2001/015}, year = {2001}, url = {http://eprint.iacr.org/2001/015}, } @misc{cryptoeprint:2001:016, author = {Alice Silverberg and Jessica Staddon and Judy Walker}, title = {Efficient Traitor Tracing Algorithms using List Decoding}, howpublished = {Cryptology ePrint Archive, Report 2001/016}, year = {2001}, url = {http://eprint.iacr.org/2001/016}, } @misc{cryptoeprint:2001:017, author = {Ran Canetti and Ivan Damgard and Stefan Dziembowski and Yuval Ishai and Tal Malkin}, title = {On adaptive vs. non-adaptive security of multiparty protocols}, howpublished = {Cryptology ePrint Archive, Report 2001/017}, year = {2001}, url = {http://eprint.iacr.org/2001/017}, } @misc{cryptoeprint:2001:018, author = {Peter Gemmell and Anna Johnston}, title = {Analysis of a Subset Sum Randomizer}, howpublished = {Cryptology ePrint Archive, Report 2001/018}, year = {2001}, url = {http://eprint.iacr.org/2001/018}, } @misc{cryptoeprint:2001:019, author = {Jan Camenisch and Anna Lysyanskaya}, title = {An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation}, howpublished = {Cryptology ePrint Archive, Report 2001/019}, year = {2001}, url = {http://eprint.iacr.org/2001/019}, } @misc{cryptoeprint:2001:020, author = {D.R. Stinson}, title = {Some observations on the theory of cryptographic hash functions}, howpublished = {Cryptology ePrint Archive, Report 2001/020}, year = {2001}, url = {http://eprint.iacr.org/2001/020}, } @misc{cryptoeprint:2001:021, author = {Biham Eli, Orr Dunkelman, Nathan Keller}, title = {The Rectangle Attack - Rectangling the Serpent}, howpublished = {Cryptology ePrint Archive, Report 2001/021}, year = {2001}, url = {http://eprint.iacr.org/2001/021}, } @misc{cryptoeprint:2001:022, author = {Klaus Kursawe and Victor Shoup}, title = {Optimistic Asynchronous Atomic Broadcast}, howpublished = {Cryptology ePrint Archive, Report 2001/022}, year = {2001}, url = {http://eprint.iacr.org/2001/022}, } @misc{cryptoeprint:2001:023, author = {Martin Hirt and Ueli Maurer}, title = {Robustness for Free in Unconditional Multi-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2001/023}, year = {2001}, url = {http://eprint.iacr.org/2001/023}, } @misc{cryptoeprint:2001:024, author = {Joan Feigenbaum and Yuval Ishai and Tal Malkin and Kobbi Nissim and Martin Strauss and Rebecca N. Wright}, title = {Secure Multiparty Computation of Approximations}, howpublished = {Cryptology ePrint Archive, Report 2001/024}, year = {2001}, url = {http://eprint.iacr.org/2001/024}, } @misc{cryptoeprint:2001:025, author = {Steven D. Galbraith}, title = {Cryptanalysis of some elliptic curve based cryptosystems of Paillier}, howpublished = {Cryptology ePrint Archive, Report 2001/025}, year = {2001}, url = {http://eprint.iacr.org/2001/025}, } @misc{cryptoeprint:2001:026, author = {Phillip Rogaway and Mihir Bellare and John Black and Ted Krovetz}, title = {OCB Mode}, howpublished = {Cryptology ePrint Archive, Report 2001/026}, year = {2001}, url = {http://eprint.iacr.org/2001/026}, } @misc{cryptoeprint:2001:027, author = {John Black and Phillip Rogaway}, title = {A Block-Cipher Mode of Operation for Parallelizable Message Authentication}, howpublished = {Cryptology ePrint Archive, Report 2001/027}, year = {2001}, url = {http://eprint.iacr.org/2001/027}, } @misc{cryptoeprint:2001:028, author = {Alexander Russell and Hong Wang}, title = {Efficient Encryption for Rich Message Spaces Under General Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2001/028}, year = {2001}, url = {http://eprint.iacr.org/2001/028}, } @misc{cryptoeprint:2001:029, author = {Nicolas T. Courtois}, title = {On multivariate signature-only public key cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2001/029}, year = {2001}, url = {http://eprint.iacr.org/2001/029}, } @misc{cryptoeprint:2001:030, author = {Amos Beimel and Yuval Ishai}, title = {On the Power of Nonlinear Secret-Sharing}, howpublished = {Cryptology ePrint Archive, Report 2001/030}, year = {2001}, url = {http://eprint.iacr.org/2001/030}, } @misc{cryptoeprint:2001:031, author = {Jonathan Katz and Rafail Ostrovsky and Moti Yung}, title = {Efficient Password-Authenticated Key Exchange Using Human-Memorable Passwords}, howpublished = {Cryptology ePrint Archive, Report 2001/031}, year = {2001}, url = {http://eprint.iacr.org/2001/031}, } @misc{cryptoeprint:2001:032, author = {Giovanni Di Crescenzo and Jonathan Katz and Rafail Ostrovsky and Adam Smith}, title = {Efficient and Non-Interactive Non-Malleable Commitment}, howpublished = {Cryptology ePrint Archive, Report 2001/032}, year = {2001}, url = {http://eprint.iacr.org/2001/032}, } @misc{cryptoeprint:2001:033, author = {Liam Keliher and Henk Meijer and Stafford Tavares}, title = {Dual of New Method for Upper Bounding the Maximum Average Linear Hull Probability for SPNs}, howpublished = {Cryptology ePrint Archive, Report 2001/033}, year = {2001}, url = {http://eprint.iacr.org/2001/033}, } @misc{cryptoeprint:2001:034, author = {Tal Malkin and Daniele Micciancio and Sara Miner}, title = {Composition and Efficiency Tradeoffs for Forward-Secure Digital Signatures}, howpublished = {Cryptology ePrint Archive, Report 2001/034}, year = {2001}, url = {http://eprint.iacr.org/2001/034}, } @misc{cryptoeprint:2001:035, author = {Mihir Bellare and Bennet Yee}, title = {Forward-Security in Private-Key Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2001/035}, year = {2001}, url = {http://eprint.iacr.org/2001/035}, } @misc{cryptoeprint:2001:036, author = {Moni Naor and Vanessa Teague}, title = {Anti-persistence: History Independent Data Structures}, howpublished = {Cryptology ePrint Archive, Report 2001/036}, year = {2001}, url = {http://eprint.iacr.org/2001/036}, } @misc{cryptoeprint:2001:037, author = {Josyula R. Rao and Pankaj Rohatgi}, title = {EMpowering Side-Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2001/037}, year = {2001}, url = {http://eprint.iacr.org/2001/037}, } @misc{cryptoeprint:2001:038, author = {Louis Granboulan}, title = {Flaws in differential cryptanalysis of Skipjack}, howpublished = {Cryptology ePrint Archive, Report 2001/038}, year = {2001}, url = {http://eprint.iacr.org/2001/038}, } @misc{cryptoeprint:2001:039, author = {Taekyoung Kwon}, title = {Robust Software Tokens: Towards Securing a Digital Identity}, howpublished = {Cryptology ePrint Archive, Report 2001/039}, year = {2001}, url = {http://eprint.iacr.org/2001/039}, } @misc{cryptoeprint:2001:040, author = {Ran Canetti and Hugo Krawczyk}, title = {Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels}, howpublished = {Cryptology ePrint Archive, Report 2001/040}, year = {2001}, url = {http://eprint.iacr.org/2001/040}, } @misc{cryptoeprint:2001:041, author = {Michael Jacobson and Alfred Menezes and Andreas Stein}, title = {Solving Elliptic Curve Discrete Logarithm Problems Using Weil Descent}, howpublished = {Cryptology ePrint Archive, Report 2001/041}, year = {2001}, url = {http://eprint.iacr.org/2001/041}, } @misc{cryptoeprint:2001:042, author = {Hugo Krawczyk}, title = {Simple Forward-Secure Signatures From Any Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2001/042}, year = {2001}, url = {http://eprint.iacr.org/2001/042}, } @misc{cryptoeprint:2001:043, author = {Marina Pudovkina}, title = {Cryptanalysis of the Vesta-2M Stream Cipher}, howpublished = {Cryptology ePrint Archive, Report 2001/043}, year = {2001}, url = {http://eprint.iacr.org/2001/043}, } @misc{cryptoeprint:2001:044, author = {Birgit Baum-Waidner}, title = {Optimistic Asynchronous Multi-Party Contract Signing with Reduced Number of Rounds}, howpublished = {Cryptology ePrint Archive, Report 2001/044}, year = {2001}, url = {http://eprint.iacr.org/2001/044}, } @misc{cryptoeprint:2001:045, author = {Hugo Krawczyk}, title = {The order of encryption and authentication for protecting communications (Or: how secure is SSL?)}, howpublished = {Cryptology ePrint Archive, Report 2001/045}, year = {2001}, url = {http://eprint.iacr.org/2001/045}, } @misc{cryptoeprint:2001:046, author = {Boris Ryabko}, title = {The simple ideal cipher system}, howpublished = {Cryptology ePrint Archive, Report 2001/046}, year = {2001}, url = {http://eprint.iacr.org/2001/046}, } @misc{cryptoeprint:2001:047, author = {T.MOH}, title = {ON THE METHOD OF "XL" AND ITS INEFFICIENCY TO TTM}, howpublished = {Cryptology ePrint Archive, Report 2001/047}, year = {2001}, url = {http://eprint.iacr.org/2001/047}, } @misc{cryptoeprint:2001:048, author = {Gene Itkis and Leonid Reyzin}, title = {Forward-Secure Signatures with Optimal Signing and Verifying}, howpublished = {Cryptology ePrint Archive, Report 2001/048}, year = {2001}, url = {http://eprint.iacr.org/2001/048}, } @misc{cryptoeprint:2001:049, author = {Marina Pudovkina}, title = {A known plaintext attack on the ISAAC keystream generator}, howpublished = {Cryptology ePrint Archive, Report 2001/049}, year = {2001}, url = {http://eprint.iacr.org/2001/049}, } @misc{cryptoeprint:2001:050, author = {Steven D Galbraith}, title = {Elliptic curve Paillier schemes}, howpublished = {Cryptology ePrint Archive, Report 2001/050}, year = {2001}, url = {http://eprint.iacr.org/2001/050}, } @misc{cryptoeprint:2001:051, author = {Ran Canetti, Joe Kilian, Erez Petrank, Alon Rosen}, title = {Black-Box Concurrent Zero-Knowledge Requires $\tilde\Omega(\log n)$ Rounds}, howpublished = {Cryptology ePrint Archive, Report 2001/051}, year = {2001}, url = {http://eprint.iacr.org/2001/051}, } @misc{cryptoeprint:2001:052, author = {Alexis Warner Machado}, title = {Differential Probability of Modular Addition with a Constant Operand}, howpublished = {Cryptology ePrint Archive, Report 2001/052}, year = {2001}, url = {http://eprint.iacr.org/2001/052}, } @misc{cryptoeprint:2001:053, author = {Jakob Jonsson}, title = {Security Proofs for the RSA-PSS Signature Scheme and Its Variants}, howpublished = {Cryptology ePrint Archive, Report 2001/053}, year = {2001}, url = {http://eprint.iacr.org/2001/053}, } @misc{cryptoeprint:2001:054, author = {S.D. Galbraith and F. Hess and N.P. Smart}, title = {Extending the GHS Weil Descent Attack}, howpublished = {Cryptology ePrint Archive, Report 2001/054}, year = {2001}, url = {http://eprint.iacr.org/2001/054}, } @misc{cryptoeprint:2001:055, author = {Ran Canetti and Marc Fischlin}, title = {Universally Composable Commitments}, howpublished = {Cryptology ePrint Archive, Report 2001/055}, year = {2001}, url = {http://eprint.iacr.org/2001/055}, } @misc{cryptoeprint:2001:056, author = {P. Junod}, title = {On the Complexity of Matsui's Attack}, howpublished = {Cryptology ePrint Archive, Report 2001/056}, year = {2001}, url = {http://eprint.iacr.org/2001/056}, } @misc{cryptoeprint:2001:057, author = {Philip MacKenzie}, title = {On the Security of the SPEKE Password-Authenticated Key Exchange Protocol}, howpublished = {Cryptology ePrint Archive, Report 2001/057}, year = {2001}, url = {http://eprint.iacr.org/2001/057}, } @misc{cryptoeprint:2001:058, author = {Nicolas T. Courtois}, title = {Efficient Zero-knowledge Authentication Based on a Linear Algebra Problem MinRank}, howpublished = {Cryptology ePrint Archive, Report 2001/058}, year = {2001}, url = {http://eprint.iacr.org/2001/058}, } @misc{cryptoeprint:2001:059, author = {Dalit Naor and Moni Naor and Jeff Lotspiech}, title = {Revocation and Tracing Schemes for Stateless Receivers}, howpublished = {Cryptology ePrint Archive, Report 2001/059}, year = {2001}, url = {http://eprint.iacr.org/2001/059}, } @misc{cryptoeprint:2001:060, author = {Mihir Bellare and Ravi Sandhu}, title = {The Security of Practical Two-Party RSA Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2001/060}, year = {2001}, url = {http://eprint.iacr.org/2001/060}, } @misc{cryptoeprint:2001:061, author = {Alexander Kholosha}, title = {Clock-Controlled Shift Registers for Key-Stream Generation}, howpublished = {Cryptology ePrint Archive, Report 2001/061}, year = {2001}, url = {http://eprint.iacr.org/2001/061}, } @misc{cryptoeprint:2001:062, author = {Jean-Sébastien Coron}, title = {Optimal security proofs for PSS and other signature schemes}, howpublished = {Cryptology ePrint Archive, Report 2001/062}, year = {2001}, url = {http://eprint.iacr.org/2001/062}, } @misc{cryptoeprint:2001:063, author = {Boaz Barak and Oded Goldreich and Shafi Goldwasser and Yehuda Lindell}, title = {Resettably-Sound Zero-Knowledge and its Applications}, howpublished = {Cryptology ePrint Archive, Report 2001/063}, year = {2001}, url = {http://eprint.iacr.org/2001/063}, } @misc{cryptoeprint:2001:064, author = {Ivan Damgard and Eiichiro Fujisaki}, title = {An Integer Commitment Scheme based on Groups with Hidden Order}, howpublished = {Cryptology ePrint Archive, Report 2001/064}, year = {2001}, url = {http://eprint.iacr.org/2001/064}, } @misc{cryptoeprint:2001:065, author = {Marina Pudovkina}, title = {Analysis of chosen plaintext attacks on the WAKE Stream Cipher}, howpublished = {Cryptology ePrint Archive, Report 2001/065}, year = {2001}, url = {http://eprint.iacr.org/2001/065}, } @misc{cryptoeprint:2001:066, author = {SEONG-HUN PAENG and DAESUNG KWON and KIL-CHAN HA and JAE HEON KIM}, title = {IMPROVED PUBLIC KEY CRYPTOSYSTEM USING FINITE NON ABELIAN GROUPS}, howpublished = {Cryptology ePrint Archive, Report 2001/066}, year = {2001}, url = {http://eprint.iacr.org/2001/066}, } @misc{cryptoeprint:2001:067, author = {Jeff Jianxin Yan and Yongdong Wu}, title = {An Attack on A Traitor Tracing Scheme}, howpublished = {Cryptology ePrint Archive, Report 2001/067}, year = {2001}, url = {http://eprint.iacr.org/2001/067}, } @misc{cryptoeprint:2001:068, author = {J.Nakahara Jr and P.S.L.M.Barreto and B.Preneel and J.Vandewalle and H.Y.Kim}, title = {SQUARE Attacks on Reduced-Round PES and IDEA Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2001/068}, year = {2001}, url = {http://eprint.iacr.org/2001/068}, } @misc{cryptoeprint:2001:069, author = {Boaz Barak and Oded Goldreich and Russell Impagliazzo and Steven Rudich and Amit Sahai and Salil Vadhan and Ke Yang}, title = {On the (Im)possibility of Obfuscating Programs}, howpublished = {Cryptology ePrint Archive, Report 2001/069}, year = {2001}, url = {http://eprint.iacr.org/2001/069}, } @misc{cryptoeprint:2001:070, author = {Kenji Ohkuma and Hideo Shimizu and Fumihiko Sano and Shinichi Kawamura}, title = {Security Assessment of Hierocrypt and Rijndael against the Differential and Linear Cryptanalysis (Extended Abstract)}, howpublished = {Cryptology ePrint Archive, Report 2001/070}, year = {2001}, url = {http://eprint.iacr.org/2001/070}, } @misc{cryptoeprint:2001:071, author = {Kaoru Kurosawa}, title = {Multi-Recipient Public-Key Encryption with Shortened Ciphertext}, howpublished = {Cryptology ePrint Archive, Report 2001/071}, year = {2001}, url = {http://eprint.iacr.org/2001/071}, } @misc{cryptoeprint:2001:072, author = {T.Moh and Jiun-Ming Chen}, title = {On the Goubin-Courtois Attack on TTM}, howpublished = {Cryptology ePrint Archive, Report 2001/072}, year = {2001}, url = {http://eprint.iacr.org/2001/072}, } @misc{cryptoeprint:2001:073, author = {Wen-Guey Tzeng}, title = {Efficient oblivious transfer schemes}, howpublished = {Cryptology ePrint Archive, Report 2001/073}, year = {2001}, url = {http://eprint.iacr.org/2001/073}, } @misc{cryptoeprint:2001:074, author = {Eliane Jaulmes and Antoine Joux and Frederic Valette}, title = {On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit - A New Construction}, howpublished = {Cryptology ePrint Archive, Report 2001/074}, year = {2001}, url = {http://eprint.iacr.org/2001/074}, } @misc{cryptoeprint:2001:075, author = {Moni Naor and Omer Reingold and Alon Rosen}, title = {Pseudo-Random Functions and Factoring}, howpublished = {Cryptology ePrint Archive, Report 2001/075}, year = {2001}, url = {http://eprint.iacr.org/2001/075}, } @misc{cryptoeprint:2001:076, author = {Moni Naor and Kobbi Nissim}, title = {Communication Complexity and Secure Function Evaluation }, howpublished = {Cryptology ePrint Archive, Report 2001/076}, year = {2001}, url = {http://eprint.iacr.org/2001/076}, } @misc{cryptoeprint:2001:077, author = {Markku-Juhani Olavi Saarinen}, title = {A Time-Memory Tradeoff Attack Against LILI-128}, howpublished = {Cryptology ePrint Archive, Report 2001/077}, year = {2001}, url = {http://eprint.iacr.org/2001/077}, } @misc{cryptoeprint:2001:078, author = {Steve Babbage}, title = {The COS Stream Ciphers are Extremely Weak}, howpublished = {Cryptology ePrint Archive, Report 2001/078}, year = {2001}, url = {http://eprint.iacr.org/2001/078}, } @misc{cryptoeprint:2001:079, author = {Jee Hea An}, title = {Authenticated Encryption in the Public-Key Setting: Security Notions and Analyses}, howpublished = {Cryptology ePrint Archive, Report 2001/079}, year = {2001}, url = {http://eprint.iacr.org/2001/079}, } @misc{cryptoeprint:2001:080, author = {Eric Filiol and Caroline Fontaine}, title = {COS Ciphers are not "extremely weak"! - The Design Rationale of COS Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2001/080}, year = {2001}, url = {http://eprint.iacr.org/2001/080}, } @misc{cryptoeprint:2001:081, author = {Masao Mori}, title = {A Sufficient Condition for Secure Ping--Pong Protocols}, howpublished = {Cryptology ePrint Archive, Report 2001/081}, year = {2001}, url = {http://eprint.iacr.org/2001/081}, } @misc{cryptoeprint:2001:082, author = {Ariel Glenn and Ian Goldberg and Frédéric Légaré and Anton Stiglic}, title = {A Description of Protocols for Private Credentials}, howpublished = {Cryptology ePrint Archive, Report 2001/082}, year = {2001}, url = {http://eprint.iacr.org/2001/082}, } @misc{cryptoeprint:2001:083, author = {Maria Fedorova and Yuriy Tarannikov}, title = {On the Constructing of Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices}, howpublished = {Cryptology ePrint Archive, Report 2001/083}, year = {2001}, url = {http://eprint.iacr.org/2001/083}, } @misc{cryptoeprint:2001:084, author = {Markus Maurer and Alfred Menezes and Edlyn Teske}, title = {Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree}, howpublished = {Cryptology ePrint Archive, Report 2001/084}, year = {2001}, url = {http://eprint.iacr.org/2001/084}, } @misc{cryptoeprint:2001:085, author = {Ronald Cramer and Victor Shoup}, title = {Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2001/085}, year = {2001}, url = {http://eprint.iacr.org/2001/085}, } @misc{cryptoeprint:2001:086, author = {Helger Lipmaa}, title = {Statistical Zero-Knowledge Proofs from Diophantine Equations}, howpublished = {Cryptology ePrint Archive, Report 2001/086}, year = {2001}, url = {http://eprint.iacr.org/2001/086}, } @misc{cryptoeprint:2001:087, author = {C. Blundo and S. Martìn and B. Masucci and C. Padrò}, title = {A Linear Algebraic Approach to Metering Schemes}, howpublished = {Cryptology ePrint Archive, Report 2001/087}, year = {2001}, url = {http://eprint.iacr.org/2001/087}, } @misc{cryptoeprint:2001:088, author = {Ignacio Gracia and Sebastià Martín and Carles Padró}, title = {Improving the trade-off between storage and communication in broadcast encryption schemes}, howpublished = {Cryptology ePrint Archive, Report 2001/088}, year = {2001}, url = {http://eprint.iacr.org/2001/088}, } @misc{cryptoeprint:2001:089, author = {Carles Padró and Ignacio Gracia and Sebastià Martín and Paz Morillo}, title = {Linear broadcast encryption schemes}, howpublished = {Cryptology ePrint Archive, Report 2001/089}, year = {2001}, url = {http://eprint.iacr.org/2001/089}, } @misc{cryptoeprint:2001:090, author = {Dan Boneh and Matthew Franklin}, title = {Identity Based Encryption From the Weil Pairing}, howpublished = {Cryptology ePrint Archive, Report 2001/090}, year = {2001}, url = {http://eprint.iacr.org/2001/090}, } @misc{cryptoeprint:2001:091, author = {Ivan Damgård and Jesper B. Nielsen}, title = {Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor}, howpublished = {Cryptology ePrint Archive, Report 2001/091}, year = {2001}, url = {http://eprint.iacr.org/2001/091}, } @misc{cryptoeprint:2001:092, author = {Matthias Krause}, title = {BDD-based Cryptanalysis of Keystream Generators}, howpublished = {Cryptology ePrint Archive, Report 2001/092}, year = {2001}, url = {http://eprint.iacr.org/2001/092}, } @misc{cryptoeprint:2001:093, author = {Jonathan Katz and Moti Yung}, title = {Threshold Cryptosystems Based on Factoring}, howpublished = {Cryptology ePrint Archive, Report 2001/093}, year = {2001}, url = {http://eprint.iacr.org/2001/093}, } @misc{cryptoeprint:2001:094, author = {M. Chateauneuf and A.C.H. Ling and D.R. Stinson}, title = {Slope packings and coverings, and generic algorithms for the discrete logarithm problem}, howpublished = {Cryptology ePrint Archive, Report 2001/094}, year = {2001}, url = {http://eprint.iacr.org/2001/094}, } @misc{cryptoeprint:2001:095, author = {Helger Lipmaa and N. Asokan and Valtteri Niemi}, title = {Secure Vickrey Auctions without Threshold Trust}, howpublished = {Cryptology ePrint Archive, Report 2001/095}, year = {2001}, url = {http://eprint.iacr.org/2001/095}, } @misc{cryptoeprint:2001:096, author = {Amod Agashe and Kristin Lauter and Ramarathnam Venkatesan}, title = {Constructing elliptic curves with a given number of points over a finite field }, howpublished = {Cryptology ePrint Archive, Report 2001/096}, year = {2001}, url = {http://eprint.iacr.org/2001/096}, } @misc{cryptoeprint:2001:097, author = {Sarvar Patel}, title = {An Efficient MAC for Short Messages}, howpublished = {Cryptology ePrint Archive, Report 2001/097}, year = {2001}, url = {http://eprint.iacr.org/2001/097}, } @misc{cryptoeprint:2001:098, author = {Paulo S. L. M. Barreto and Hae Yong Kim}, title = {Fast hashing onto elliptic curves over fields of characteristic 3}, howpublished = {Cryptology ePrint Archive, Report 2001/098}, year = {2001}, url = {http://eprint.iacr.org/2001/098}, } @misc{cryptoeprint:2001:099, author = {Kaoru Kurosawa and Takuya Yoshida}, title = {Linear Code Implies Public-Key Traitor Tracing}, howpublished = {Cryptology ePrint Archive, Report 2001/099}, year = {2001}, url = {http://eprint.iacr.org/2001/099}, } @misc{cryptoeprint:2001:100, author = {Shahrokh Saeednia}, title = {A Note on Girault's Self-Certified Model}, howpublished = {Cryptology ePrint Archive, Report 2001/100}, year = {2001}, url = {http://eprint.iacr.org/2001/100}, } @misc{cryptoeprint:2001:101, author = {Giuseppe Ateniese and Dawn Song and Gene Tsudik}, title = {Quasi-Efficient Revocation of Group Signatures}, howpublished = {Cryptology ePrint Archive, Report 2001/101}, year = {2001}, url = {http://eprint.iacr.org/2001/101}, } @misc{cryptoeprint:2001:102, author = {Ivan Damg{\aa}rd and Gudmund Frandsen}, title = {An Extended Quadratic Frobenius Primality Test with Average Case Error Estimates}, howpublished = {Cryptology ePrint Archive, Report 2001/102}, year = {2001}, url = {http://eprint.iacr.org/2001/102}, } @misc{cryptoeprint:2001:103, author = {Antonio Bellezza}, title = {Countermeasures against Side-Channel Attacks for Elliptic Curve Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2001/103}, year = {2001}, url = {http://eprint.iacr.org/2001/103}, } @misc{cryptoeprint:2001:104, author = {Oded Goldreich}, title = {Concurrent Zero-Knowledge With Timing, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2001/104}, year = {2001}, url = {http://eprint.iacr.org/2001/104}, } @misc{cryptoeprint:2001:105, author = {Boaz Barak and Oded Goldreich}, title = {Universal Arguments and their Applications}, howpublished = {Cryptology ePrint Archive, Report 2001/105}, year = {2001}, url = {http://eprint.iacr.org/2001/105}, } @misc{cryptoeprint:2001:106, author = {Steve Babbage}, title = {Cryptanalysis of the COS (2,128) Stream Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2001/106}, year = {2001}, url = {http://eprint.iacr.org/2001/106}, } @misc{cryptoeprint:2001:107, author = {Yehuda Lindell}, title = {Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2001/107}, year = {2001}, url = {http://eprint.iacr.org/2001/107}, } @misc{cryptoeprint:2001:108, author = {Ronald Cramer and Victor Shoup}, title = {Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack}, howpublished = {Cryptology ePrint Archive, Report 2001/108}, year = {2001}, url = {http://eprint.iacr.org/2001/108}, } @misc{cryptoeprint:2001:109, author = {Yunlei ZHAO}, title = {New Notions of Soundness and Simultaneous Resettability in the Public-Key Model}, howpublished = {Cryptology ePrint Archive, Report 2001/109}, year = {2001}, url = {http://eprint.iacr.org/2001/109}, } @misc{cryptoeprint:2001:110, author = {Louis Granboulan}, title = {RSA hybrid encryption schemes}, howpublished = {Cryptology ePrint Archive, Report 2001/110}, year = {2001}, url = {http://eprint.iacr.org/2001/110}, } @misc{cryptoeprint:2001:111, author = {N.P. Smart}, title = {An Identity Based Authenticated Key Agreement Protocol Based on the Weil Pairing}, howpublished = {Cryptology ePrint Archive, Report 2001/111}, year = {2001}, url = {http://eprint.iacr.org/2001/111}, } @misc{cryptoeprint:2001:112, author = {Victor Shoup}, title = {A Proposal for an ISO Standard for Public Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2001/112}, year = {2001}, url = {http://eprint.iacr.org/2001/112}, } @misc{cryptoeprint:2001:113, author = {Jan Camenisch and Anna Lysyanskaya}, title = {Efficient Revocation of Anonymous Group Membership}, howpublished = {Cryptology ePrint Archive, Report 2001/113}, year = {2001}, url = {http://eprint.iacr.org/2001/113}, } @misc{cryptoeprint:2002:001, author = {Markus Jakobsson}, title = {Fractal Hash Sequence Representation and Traversal}, howpublished = {Cryptology ePrint Archive, Report 2002/001}, year = {2002}, url = {http://eprint.iacr.org/2002/001}, } @misc{cryptoeprint:2002:002, author = {Jens Groth}, title = {Evaluating Security of Voting Schemes in the Universal Composability Framework}, howpublished = {Cryptology ePrint Archive, Report 2002/002}, year = {2002}, url = {http://eprint.iacr.org/2002/002}, } @misc{cryptoeprint:2002:003, author = {Jorge Nakahara Jr and Bart Preneel and Joos Vandewalle}, title = {Square Attacks on Reduced-Round Variants of the Skipjack Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2002/003}, year = {2002}, url = {http://eprint.iacr.org/2002/003}, } @misc{cryptoeprint:2002:004, author = {Kenneth G. Paterson}, title = {ID-based Signatures from Pairings on Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2002/004}, year = {2002}, url = {http://eprint.iacr.org/2002/004}, } @misc{cryptoeprint:2002:005, author = {Hongjun Wu and Feng Bao}, title = {Cryptanalysis of Stream Cipher COS (2,128) Mode I}, howpublished = {Cryptology ePrint Archive, Report 2002/005}, year = {2002}, url = {http://eprint.iacr.org/2002/005}, } @misc{cryptoeprint:2002:006, author = {Karl Rubin and Alice Silverberg}, title = {The best and worst of supersingular abelian varieties in cryptology}, howpublished = {Cryptology ePrint Archive, Report 2002/006}, year = {2002}, url = {http://eprint.iacr.org/2002/006}, } @misc{cryptoeprint:2002:007, author = {Wieland Fischer and Christophe Giraud and Erik Woodward Knudsen and Jean-Pierre Seifert}, title = {Parallel scalar multiplication on general elliptic curves over $\mathbb{F}_p$ hedged against Non-Differential Side-Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2002/007}, year = {2002}, url = {http://eprint.iacr.org/2002/007}, } @misc{cryptoeprint:2002:008, author = {Paulo S.L.M. Barreto and Hae Y. Kim and Ben Lynn and Michael Scott}, title = {Efficient Algorithms for Pairing-Based Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2002/008}, year = {2002}, url = {http://eprint.iacr.org/2002/008}, } @misc{cryptoeprint:2002:009, author = {Yongdae Kim and Adrian Perrig and Gene Tsudik}, title = {Tree-based Group Key Agreement}, howpublished = {Cryptology ePrint Archive, Report 2002/009}, year = {2002}, url = {http://eprint.iacr.org/2002/009}, } @misc{cryptoeprint:2002:010, author = {Serge Lefranc and David Naccache}, title = {Cut and Paste Attacks with Java}, howpublished = {Cryptology ePrint Archive, Report 2002/010}, year = {2002}, url = {http://eprint.iacr.org/2002/010}, } @misc{cryptoeprint:2002:011, author = {Jean-Sebastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval and Christophe Tymen}, title = {Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages}, howpublished = {Cryptology ePrint Archive, Report 2002/011}, year = {2002}, url = {http://eprint.iacr.org/2002/011}, } @misc{cryptoeprint:2002:012, author = {F. Hess}, title = {Exponent Group Signature Schemes and Efficient Identity Based Signature Schemes Based on Pairings}, howpublished = {Cryptology ePrint Archive, Report 2002/012}, year = {2002}, url = {http://eprint.iacr.org/2002/012}, } @misc{cryptoeprint:2002:013, author = {Ivan Damgard and Maciej Koprowski}, title = {Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups}, howpublished = {Cryptology ePrint Archive, Report 2002/013}, year = {2002}, url = {http://eprint.iacr.org/2002/013}, } @misc{cryptoeprint:2002:014, author = {Leonid Reyzin and Natan Reyzin}, title = {Better than BiBa: Short One-time Signatures with Fast Signing and Verifying}, howpublished = {Cryptology ePrint Archive, Report 2002/014}, year = {2002}, url = {http://eprint.iacr.org/2002/014}, } @misc{cryptoeprint:2002:015, author = {Eva Jencusova}, title = {Security proofs of cryptographic protocols}, howpublished = {Cryptology ePrint Archive, Report 2002/015}, year = {2002}, url = {http://eprint.iacr.org/2002/015}, } @misc{cryptoeprint:2002:016, author = {Ron Steinfeld and Laurence Bull and Yuliang Zheng}, title = {Content Extraction Signatures}, howpublished = {Cryptology ePrint Archive, Report 2002/016}, year = {2002}, url = {http://eprint.iacr.org/2002/016}, } @misc{cryptoeprint:2002:017, author = {Marc Fischlin}, title = {The Cramer-Shoup Strong-RSA Signature Scheme Revisited}, howpublished = {Cryptology ePrint Archive, Report 2002/017}, year = {2002}, url = {http://eprint.iacr.org/2002/017}, } @misc{cryptoeprint:2002:018, author = {Jae Choon Cha and Jung Hee Cheon}, title = {An Identity-Based Signature from Gap Diffie-Hellman Groups}, howpublished = {Cryptology ePrint Archive, Report 2002/018}, year = {2002}, url = {http://eprint.iacr.org/2002/018}, } @misc{cryptoeprint:2002:019, author = {Shai Halevi and Don Coppersmith and Charanjit Jutla}, title = {Scream: a software-efficient stream cipher}, howpublished = {Cryptology ePrint Archive, Report 2002/019}, year = {2002}, url = {http://eprint.iacr.org/2002/019}, } @misc{cryptoeprint:2002:020, author = {Don Coppersmith and Shai Halevi and Charanjit Jutla}, title = {Cryptanalysis of stream ciphers with linear masking}, howpublished = {Cryptology ePrint Archive, Report 2002/020}, year = {2002}, url = {http://eprint.iacr.org/2002/020}, } @misc{cryptoeprint:2002:021, author = {Kanstantsin Miranovich}, title = {Spectral Analysis of Boolean Functions under Non-uniformity of Arguments}, howpublished = {Cryptology ePrint Archive, Report 2002/021}, year = {2002}, url = {http://eprint.iacr.org/2002/021}, } @misc{cryptoeprint:2002:022, author = {Michel Abdalla and Jee Hea An and Mihir Bellare and Chanathip Namprempre}, title = {From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security}, howpublished = {Cryptology ePrint Archive, Report 2002/022}, year = {2002}, url = {http://eprint.iacr.org/2002/022}, } @misc{cryptoeprint:2002:023, author = {Don Coppersmith and Markus Jakobsson}, title = {Almost Optimal Hash Sequence Traversal}, howpublished = {Cryptology ePrint Archive, Report 2002/023}, year = {2002}, url = {http://eprint.iacr.org/2002/023}, } @misc{cryptoeprint:2002:024, author = {Juan Garay and Markus Jakobsson}, title = {Timed Release of Standard Digital Signatures}, howpublished = {Cryptology ePrint Archive, Report 2002/024}, year = {2002}, url = {http://eprint.iacr.org/2002/024}, } @misc{cryptoeprint:2002:025, author = {Markus Jakobsson and Ari Juels and Ron Rivest}, title = {Making Mix Nets Robust For Electronic Voting By Randomized Partial Checking}, howpublished = {Cryptology ePrint Archive, Report 2002/025}, year = {2002}, url = {http://eprint.iacr.org/2002/025}, } @misc{cryptoeprint:2002:026, author = {Daniel R. L. Brown}, title = {Generic Groups, Collision Resistance, and ECDSA}, howpublished = {Cryptology ePrint Archive, Report 2002/026}, year = {2002}, url = {http://eprint.iacr.org/2002/026}, } @misc{cryptoeprint:2002:027, author = {Jonathan Katz}, title = {Efficient and Non-Malleable Proofs of Plaintext Knowledge and Applications}, howpublished = {Cryptology ePrint Archive, Report 2002/027}, year = {2002}, url = {http://eprint.iacr.org/2002/027}, } @misc{cryptoeprint:2002:028, author = {Jung Hee Cheon}, title = {A Universal Forgery of Hess's Second ID-based Signature against the Known-message Attack}, howpublished = {Cryptology ePrint Archive, Report 2002/028}, year = {2002}, url = {http://eprint.iacr.org/2002/028}, } @misc{cryptoeprint:2002:029, author = {Joy Algesheimer and Jan Camenisch and Victor Shoup}, title = {Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products}, howpublished = {Cryptology ePrint Archive, Report 2002/029}, year = {2002}, url = {http://eprint.iacr.org/2002/029}, } @misc{cryptoeprint:2002:030, author = {Boris Ryabko}, title = {Adaptive chi-square test and its application to some cryptographic problems.}, howpublished = {Cryptology ePrint Archive, Report 2002/030}, year = {2002}, url = {http://eprint.iacr.org/2002/030}, } @misc{cryptoeprint:2002:031, author = {Palash Sarkar and Paul J. Schellenberg}, title = {A Parallelizable Design Principle for Cryptographic Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2002/031}, year = {2002}, url = {http://eprint.iacr.org/2002/031}, } @misc{cryptoeprint:2002:032, author = {Y. Choie and E. Jeong and E. Lee}, title = {Supersingular Hyperelliptic Curve of Genus 2 over Finite Fields}, howpublished = {Cryptology ePrint Archive, Report 2002/032}, year = {2002}, url = {http://eprint.iacr.org/2002/032}, } @misc{cryptoeprint:2002:033, author = {Yodai Watanabe and Junji Shikata and Hideki Imai}, title = {Equivalence between semantic security and indistinguishability against chosen ciphertext attacks}, howpublished = {Cryptology ePrint Archive, Report 2002/033}, year = {2002}, url = {http://eprint.iacr.org/2002/033}, } @misc{cryptoeprint:2002:034, author = {Jakob Jonsson}, title = {An OAEP Variant With a Tight Security Proof}, howpublished = {Cryptology ePrint Archive, Report 2002/034}, year = {2002}, url = {http://eprint.iacr.org/2002/034}, } @misc{cryptoeprint:2002:035, author = {Sattam S. Al-Riyami and Kenneth G. Paterson}, title = {Tripartite Authenticated Key Agreement Protocols from Pairings}, howpublished = {Cryptology ePrint Archive, Report 2002/035}, year = {2002}, url = {http://eprint.iacr.org/2002/035}, } @misc{cryptoeprint:2002:036, author = {Ronald Cramer and Serge Fehr}, title = {Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups}, howpublished = {Cryptology ePrint Archive, Report 2002/036}, year = {2002}, url = {http://eprint.iacr.org/2002/036}, } @misc{cryptoeprint:2002:037, author = {David Galindo and Sebasti\`a Mart\'{\i}n and Paz Morillo and Jorge L. Villar }, title = {An efficient semantically secure elliptic curve cryptosystem based on KMOV}, howpublished = {Cryptology ePrint Archive, Report 2002/037}, year = {2002}, url = {http://eprint.iacr.org/2002/037}, } @misc{cryptoeprint:2002:038, author = {Javier Herranz and Carles Padr\'o and Germ\'an S\'aez}, title = {A Distributed RSA Signature Scheme for General Access Structures}, howpublished = {Cryptology ePrint Archive, Report 2002/038}, year = {2002}, url = {http://eprint.iacr.org/2002/038}, } @misc{cryptoeprint:2002:039, author = {Jiang Shaoquan and Zhang Yufeng}, title = {Partial Key Escrow Monitoring Scheme}, howpublished = {Cryptology ePrint Archive, Report 2002/039}, year = {2002}, url = {http://eprint.iacr.org/2002/039}, } @misc{cryptoeprint:2002:040, author = {Shafi Goldwasser and Yehuda Lindell}, title = {Secure Computation Without Agreement}, howpublished = {Cryptology ePrint Archive, Report 2002/040}, year = {2002}, url = {http://eprint.iacr.org/2002/040}, } @misc{cryptoeprint:2002:041, author = {Eli Biham and Orr Dunkelman and Nathan Keller}, title = {New Results on Boomerang and Rectangle Attack}, howpublished = {Cryptology ePrint Archive, Report 2002/041}, year = {2002}, url = {http://eprint.iacr.org/2002/041}, } @misc{cryptoeprint:2002:042, author = {Edith Elkind and Amit Sahai}, title = {A Unified Methodology For Constructing Public-Key Encryption Schemes Secure Against Adaptive Chosen-Ciphertext Attack}, howpublished = {Cryptology ePrint Archive, Report 2002/042}, year = {2002}, url = {http://eprint.iacr.org/2002/042}, } @misc{cryptoeprint:2002:043, author = {Boaz Barak and Yehuda Lindell}, title = {Strict Polynomial-time in Simulation and Extraction}, howpublished = {Cryptology ePrint Archive, Report 2002/043}, year = {2002}, url = {http://eprint.iacr.org/2002/043}, } @misc{cryptoeprint:2002:044, author = {Nicolas Courtois and Josef Pieprzyk}, title = {Cryptanalysis of Block Ciphers with Overdefined Systems of Equations}, howpublished = {Cryptology ePrint Archive, Report 2002/044}, year = {2002}, url = {http://eprint.iacr.org/2002/044}, } @misc{cryptoeprint:2002:045, author = {Dr. K. S. Ooi, Brain Chin Vito}, title = {Cryptanalysis of S-DES}, howpublished = {Cryptology ePrint Archive, Report 2002/045}, year = {2002}, url = {http://eprint.iacr.org/2002/045}, } @misc{cryptoeprint:2002:046, author = {Jee Hea An and Yevgeniy Dodis and Tal Rabin}, title = {On the Security of Joint Signature and Encryption}, howpublished = {Cryptology ePrint Archive, Report 2002/046}, year = {2002}, url = {http://eprint.iacr.org/2002/046}, } @misc{cryptoeprint:2002:047, author = {Ran Canetti and Tal Rabin}, title = {Universal Composition with Joint State}, howpublished = {Cryptology ePrint Archive, Report 2002/047}, year = {2002}, url = {http://eprint.iacr.org/2002/047}, } @misc{cryptoeprint:2002:048, author = {Maria Isabel Gonzalez Vasco and Consuelo Martinez and Rainer Steinwandt}, title = {Towards a Uniform Description of Several Group Based Cryptographic Primitives}, howpublished = {Cryptology ePrint Archive, Report 2002/048}, year = {2002}, url = {http://eprint.iacr.org/2002/048}, } @misc{cryptoeprint:2002:049, author = {Alexander Kholosha and Henk C.A. van Tilborg}, title = {Tensor Transform of Boolean Functions and Related Algebraic and Probabilistic Properties}, howpublished = {Cryptology ePrint Archive, Report 2002/049}, year = {2002}, url = {http://eprint.iacr.org/2002/049}, } @misc{cryptoeprint:2002:050, author = {Jaume Martí-Farré and Carles Padró}, title = {Secret sharing schemes with three or four minimal qualified subsets}, howpublished = {Cryptology ePrint Archive, Report 2002/050}, year = {2002}, url = {http://eprint.iacr.org/2002/050}, } @misc{cryptoeprint:2002:051, author = {Javier Herranz and Germ\'an S\'aez}, title = {Fully Distributed Proxy Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2002/051}, year = {2002}, url = {http://eprint.iacr.org/2002/051}, } @misc{cryptoeprint:2002:052, author = {Stefan Lucks}, title = {A Variant of the Cramer-Shoup Cryptosystem for Groups with Unknwon Order}, howpublished = {Cryptology ePrint Archive, Report 2002/052}, year = {2002}, url = {http://eprint.iacr.org/2002/052}, } @misc{cryptoeprint:2002:053, author = {Matthias Fitzi and Martin Hirt and Thomas Holenstein and J\"urg Wullschleger}, title = {Extended Validity and Consistency in Byzantine Agreement}, howpublished = {Cryptology ePrint Archive, Report 2002/053}, year = {2002}, url = {http://eprint.iacr.org/2002/053}, } @misc{cryptoeprint:2002:054, author = {Gene Itkis and Leonid Reyzin}, title = {SiBIR: Signer-Base Intrusion-Resilient Signatures }, howpublished = {Cryptology ePrint Archive, Report 2002/054}, year = {2002}, url = {http://eprint.iacr.org/2002/054}, } @misc{cryptoeprint:2002:055, author = {Manoj Prabhakaran and Amit Sahai}, title = {Concurrent Zero Knowledge Proofs with Logarithmic Round-Complexity}, howpublished = {Cryptology ePrint Archive, Report 2002/055}, year = {2002}, url = {http://eprint.iacr.org/2002/055}, } @misc{cryptoeprint:2002:056, author = {Craig Gentry and Alice Silverberg}, title = {Hierarchical ID-Based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2002/056}, year = {2002}, url = {http://eprint.iacr.org/2002/056}, } @misc{cryptoeprint:2002:057, author = {Yehuda Lindell}, title = {A Simpler Construction of CCA2-Secure Public-Key Encryption Under General Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2002/057}, year = {2002}, url = {http://eprint.iacr.org/2002/057}, } @misc{cryptoeprint:2002:058, author = {Palash Sarkar}, title = {Construction of UOWHF: Tree Hashing Revisited}, howpublished = {Cryptology ePrint Archive, Report 2002/058}, year = {2002}, url = {http://eprint.iacr.org/2002/058}, } @misc{cryptoeprint:2002:059, author = {Ran Canetti and Hugo Krawczyk}, title = {Universally Composable Notions of Key Exchange and Secure Channels}, howpublished = {Cryptology ePrint Archive, Report 2002/059}, year = {2002}, url = {http://eprint.iacr.org/2002/059}, } @misc{cryptoeprint:2002:060, author = {Jonathan Katz}, title = {A Forward-Secure Public-Key Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2002/060}, year = {2002}, url = {http://eprint.iacr.org/2002/060}, } @misc{cryptoeprint:2002:061, author = {Vlastimil Klima and Tomas Rosa}, title = {Strengthened Encryption in the CBC Mode}, howpublished = {Cryptology ePrint Archive, Report 2002/061}, year = {2002}, url = {http://eprint.iacr.org/2002/061}, } @misc{cryptoeprint:2002:062, author = {Dieter Schmidt}, title = {ABC - A Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2002/062}, year = {2002}, url = {http://eprint.iacr.org/2002/062}, } @misc{cryptoeprint:2002:063, author = {M Jason Hinek and Mo King Low and Edlyn Teske}, title = {On some Attacks on Multi-prime RSA}, howpublished = {Cryptology ePrint Archive, Report 2002/063}, year = {2002}, url = {http://eprint.iacr.org/2002/063}, } @misc{cryptoeprint:2002:064, author = {Mihir Bellare and Adriana Palacio}, title = {Protecting against Key Exposure: Strongly Key-Insulated Encryption with Optimal Threshold}, howpublished = {Cryptology ePrint Archive, Report 2002/064}, year = {2002}, url = {http://eprint.iacr.org/2002/064}, } @misc{cryptoeprint:2002:065, author = {Chanathip Namprempre}, title = {Secure Channels based on Authenticated Encryption Schemes: A Simple Characterization}, howpublished = {Cryptology ePrint Archive, Report 2002/065}, year = {2002}, url = {http://eprint.iacr.org/2002/065}, } @misc{cryptoeprint:2002:066, author = {John Black and Phillip Rogaway and Thomas Shrimpton}, title = {Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV}, howpublished = {Cryptology ePrint Archive, Report 2002/066}, year = {2002}, url = {http://eprint.iacr.org/2002/066}, } @misc{cryptoeprint:2002:067, author = {Ilya Mironov}, title = {(Not So) Random Shuffles of RC4}, howpublished = {Cryptology ePrint Archive, Report 2002/067}, year = {2002}, url = {http://eprint.iacr.org/2002/067}, } @misc{cryptoeprint:2002:068, author = {Scott Fluhrer}, title = {Improved key recovery of level 1 of the Bluetooth Encryption System}, howpublished = {Cryptology ePrint Archive, Report 2002/068}, year = {2002}, url = {http://eprint.iacr.org/2002/068}, } @misc{cryptoeprint:2002:069, author = {Vanesa Daza and Javier Herranz and Carles Padr\'o and Germ\'an S\'aez}, title = {A Distributed and Computationally Secure Key Distribution Scheme}, howpublished = {Cryptology ePrint Archive, Report 2002/069}, year = {2002}, url = {http://eprint.iacr.org/2002/069}, } @misc{cryptoeprint:2002:070, author = {Jens-Matthias Bohli and Maria Isabel Gonzalez Vasco and Consuelo Martinez and Rainer Steinwandt}, title = {Weak Keys in MST1}, howpublished = {Cryptology ePrint Archive, Report 2002/070}, year = {2002}, url = {http://eprint.iacr.org/2002/070}, } @misc{cryptoeprint:2002:071, author = {Vlastimil Klima and Tomas Rosa}, title = {Further Results and Considerations on Side Channel Attacks on RSA}, howpublished = {Cryptology ePrint Archive, Report 2002/071}, year = {2002}, url = {http://eprint.iacr.org/2002/071}, } @misc{cryptoeprint:2002:072, author = {Ben Lynn}, title = {Authenticated Identity-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2002/072}, year = {2002}, url = {http://eprint.iacr.org/2002/072}, } @misc{cryptoeprint:2002:073, author = {C.\ Aum\"uller and P.\ Bier and P. Hofreiter and W. Fischer and J.-P. Seifert}, title = {Fault attacks on RSA with CRT: Concrete Results and Practical Countermeasures}, howpublished = {Cryptology ePrint Archive, Report 2002/073}, year = {2002}, url = {http://eprint.iacr.org/2002/073}, } @misc{cryptoeprint:2002:074, author = {Louis Granboulan}, title = {How to repair ESIGN}, howpublished = {Cryptology ePrint Archive, Report 2002/074}, year = {2002}, url = {http://eprint.iacr.org/2002/074}, } @misc{cryptoeprint:2002:075, author = {J.\ Bl\"oemer and J.-P.\ Seifert}, title = {Fault based cryptanalysis of the Advanced Encryption Standard}, howpublished = {Cryptology ePrint Archive, Report 2002/075}, year = {2002}, url = {http://eprint.iacr.org/2002/075}, } @misc{cryptoeprint:2002:076, author = {Vlastimil Klima and Tomas Rosa}, title = {Attack on Private Signature Keys of the OpenPGP Format, PGP(TM) Programs and Other Applications Compatible with OpenPGP}, howpublished = {Cryptology ePrint Archive, Report 2002/076}, year = {2002}, url = {http://eprint.iacr.org/2002/076}, } @misc{cryptoeprint:2002:077, author = {Yevgeniy Dodis and Jonathan Katz and Shouhuai Xu and Moti Yung}, title = {Key-Insulated Public-Key Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2002/077}, year = {2002}, url = {http://eprint.iacr.org/2002/077}, } @misc{cryptoeprint:2002:078, author = {Mihir Bellare and Tadayoshi Kohno and Chanathip Namprempre}, title = {Breaking and Provably Repairing the SSH Authenticated Encryption Scheme: A Case Study of the Encode-then-Encrypt-and-MAC Paradigm}, howpublished = {Cryptology ePrint Archive, Report 2002/078}, year = {2002}, url = {http://eprint.iacr.org/2002/078}, } @misc{cryptoeprint:2002:079, author = {Erik Zenner}, title = {On the efficiency of the Clock Control Guessing Attack}, howpublished = {Cryptology ePrint Archive, Report 2002/079}, year = {2002}, url = {http://eprint.iacr.org/2002/079}, } @misc{cryptoeprint:2002:080, author = {Dan Boneh and Alice Silverberg}, title = {Applications of Multilinear Forms to Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2002/080}, year = {2002}, url = {http://eprint.iacr.org/2002/080}, } @misc{cryptoeprint:2002:081, author = {Vanesa Daza and Javier Herranz and Germ\'an S\'aez}, title = {Some Applications of Threshold Signature Schemes to Distributed Protocols}, howpublished = {Cryptology ePrint Archive, Report 2002/081}, year = {2002}, url = {http://eprint.iacr.org/2002/081}, } @misc{cryptoeprint:2002:082, author = {Howard Barnum and Claude Crepeau and Daniel Gottesman and Adam Smith and Alain Tapp}, title = {Authentication of Quantum Messages}, howpublished = {Cryptology ePrint Archive, Report 2002/082}, year = {2002}, url = {http://eprint.iacr.org/2002/082}, } @misc{cryptoeprint:2002:083, author = {David Galindo and Sebasti\`a Mart\'{\i}n and Paz Morillo and Jorge L. Villar}, title = {A semantically secure elliptic curve RSA scheme with small expansion factor}, howpublished = {Cryptology ePrint Archive, Report 2002/083}, year = {2002}, url = {http://eprint.iacr.org/2002/083}, } @misc{cryptoeprint:2002:084, author = {Amir Herzberg}, title = {Towards Provably-Secure Timed E-Commerce: The Trusted Delivery Layer}, howpublished = {Cryptology ePrint Archive, Report 2002/084}, year = {2002}, url = {http://eprint.iacr.org/2002/084}, } @misc{cryptoeprint:2002:085, author = {Matthias Fitzi and Juan A. Garay}, title = {Efficient and Player-Optimal Strong Consensus}, howpublished = {Cryptology ePrint Archive, Report 2002/085}, year = {2002}, url = {http://eprint.iacr.org/2002/085}, } @misc{cryptoeprint:2002:086, author = {Alexander W. Dent}, title = {Adapting the weaknesses of the Random Oracle model to the Generic Group model.}, howpublished = {Cryptology ePrint Archive, Report 2002/086}, year = {2002}, url = {http://eprint.iacr.org/2002/086}, } @misc{cryptoeprint:2002:087, author = {Nicolas T. Courtois}, title = {Higher Order Correlation Attacks, XL algorithm and Cryptanalysis of Toyocrypt}, howpublished = {Cryptology ePrint Archive, Report 2002/087}, year = {2002}, url = {http://eprint.iacr.org/2002/087}, } @misc{cryptoeprint:2002:088, author = {Paulo S. L. M. Barreto and Ben Lynn and Michael Scott}, title = {Constructing Elliptic Curves with Prescribed Embedding Degrees}, howpublished = {Cryptology ePrint Archive, Report 2002/088}, year = {2002}, url = {http://eprint.iacr.org/2002/088}, } @misc{cryptoeprint:2002:089, author = {Oded Goldreich, Yoad Lustig and Moni Naor}, title = {On Chosen Ciphertext Security of Multiple Encryptions}, howpublished = {Cryptology ePrint Archive, Report 2002/089}, year = {2002}, url = {http://eprint.iacr.org/2002/089}, } @misc{cryptoeprint:2002:090, author = {Daniele Micciancio and Erez Petrank}, title = {Efficient and Concurrent Zero-Knowledge from any public coin HVZK protocol}, howpublished = {Cryptology ePrint Archive, Report 2002/090}, year = {2002}, url = {http://eprint.iacr.org/2002/090}, } @misc{cryptoeprint:2002:091, author = {Jovan Dj. Goli\'{c}}, title = {Multiplicative Masking and Power Analysis of AES}, howpublished = {Cryptology ePrint Archive, Report 2002/091}, year = {2002}, url = {http://eprint.iacr.org/2002/091}, } @misc{cryptoeprint:2002:092, author = {Kaoru Kurosawa and Tetsu Iwata}, title = {TMAC: Two-Key CBC MAC}, howpublished = {Cryptology ePrint Archive, Report 2002/092}, year = {2002}, url = {http://eprint.iacr.org/2002/092}, } @misc{cryptoeprint:2002:093, author = {Ari Juels and Madhu Sudan}, title = {A Fuzzy Vault Scheme}, howpublished = {Cryptology ePrint Archive, Report 2002/093}, year = {2002}, url = {http://eprint.iacr.org/2002/093}, } @misc{cryptoeprint:2002:094, author = {R. Dupont and A. Enge and F. Morain}, title = {Building curves with arbitrary small MOV degree over finite prime fields}, howpublished = {Cryptology ePrint Archive, Report 2002/094}, year = {2002}, url = {http://eprint.iacr.org/2002/094}, } @misc{cryptoeprint:2002:095, author = {Ali Adel Kanso}, title = {The (a, b)-Shrinking Generator}, howpublished = {Cryptology ePrint Archive, Report 2002/095}, year = {2002}, url = {http://eprint.iacr.org/2002/095}, } @misc{cryptoeprint:2002:096, author = {James Xiao and Yongxin Zhou}, title = {Generating Large Non-Singular Matrices over an Arbitrary Field with Blocks of Full Rank}, howpublished = {Cryptology ePrint Archive, Report 2002/096}, year = {2002}, url = {http://eprint.iacr.org/2002/096}, } @misc{cryptoeprint:2002:097, author = {Huafei Zhu}, title = {A new public key encryption scheme provably secure against adaptive chosen cipher-text attack}, howpublished = {Cryptology ePrint Archive, Report 2002/097}, year = {2002}, url = {http://eprint.iacr.org/2002/097}, } @misc{cryptoeprint:2002:098, author = {John Malone-Lee}, title = {Identity-Based Signcryption}, howpublished = {Cryptology ePrint Archive, Report 2002/098}, year = {2002}, url = {http://eprint.iacr.org/2002/098}, } @misc{cryptoeprint:2002:099, author = {Eric Filiol}, title = {A New Statistical Testing for Symmetric Ciphers and Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2002/099}, year = {2002}, url = {http://eprint.iacr.org/2002/099}, } @misc{cryptoeprint:2002:100, author = {J. Black and P. Rogaway and T. Shrimpton}, title = {Encryption-Scheme Security in the Presence of Key-Dependent Messages}, howpublished = {Cryptology ePrint Archive, Report 2002/100}, year = {2002}, url = {http://eprint.iacr.org/2002/100}, } @misc{cryptoeprint:2002:101, author = {Simon R. Blackburn}, title = {An Upper Bound on the Size of a Code with the $k$-Identifiable Parent Property}, howpublished = {Cryptology ePrint Archive, Report 2002/101}, year = {2002}, url = {http://eprint.iacr.org/2002/101}, } @misc{cryptoeprint:2002:102, author = {Ventzislav Nikov and Svetla Nikova and Bart Preneel and Joos Vandewalle}, title = {Applying General Access Structure to Metering Schemes}, howpublished = {Cryptology ePrint Archive, Report 2002/102}, year = {2002}, url = {http://eprint.iacr.org/2002/102}, } @misc{cryptoeprint:2002:103, author = {Yevgeniy Dodis and Leonid Reyzin}, title = {On the Power of Claw-Free Permutations}, howpublished = {Cryptology ePrint Archive, Report 2002/103}, year = {2002}, url = {http://eprint.iacr.org/2002/103}, } @misc{cryptoeprint:2002:104, author = {Anton Kozlov and Leonid Reyzin}, title = {Forward-Secure Signatures with Fast Key Update}, howpublished = {Cryptology ePrint Archive, Report 2002/104}, year = {2002}, url = {http://eprint.iacr.org/2002/104}, } @misc{cryptoeprint:2002:105, author = {Jan Denef and Frederik Vercauteren}, title = {An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in Characteristic 2}, howpublished = {Cryptology ePrint Archive, Report 2002/105}, year = {2002}, url = {http://eprint.iacr.org/2002/105}, } @misc{cryptoeprint:2002:106, author = {Jaume Marti-Farre and Carles Padro}, title = {Secret sharing schemes on access structures with intersection number equal to one}, howpublished = {Cryptology ePrint Archive, Report 2002/106}, year = {2002}, url = {http://eprint.iacr.org/2002/106}, } @misc{cryptoeprint:2002:107, author = {Tanja Lange }, title = {Efficient Arithmetic on Hyperelliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2002/107}, year = {2002}, url = {http://eprint.iacr.org/2002/107}, } @misc{cryptoeprint:2002:108, author = {Ali Adel Kanso}, title = {Clock-Controlled Alternating Step Generator}, howpublished = {Cryptology ePrint Archive, Report 2002/108}, year = {2002}, url = {http://eprint.iacr.org/2002/108}, } @misc{cryptoeprint:2002:109, author = {Qi Cheng}, title = {A New Class of Unsafe Primes}, howpublished = {Cryptology ePrint Archive, Report 2002/109}, year = {2002}, url = {http://eprint.iacr.org/2002/109}, } @misc{cryptoeprint:2002:110, author = {Oded Goldreich}, title = {The GGM Construction does NOT yield Correlation Intractable Function Ensembles}, howpublished = {Cryptology ePrint Archive, Report 2002/110}, year = {2002}, url = {http://eprint.iacr.org/2002/110}, } @misc{cryptoeprint:2002:111, author = {Joanne Fuller and William Millan}, title = {On Linear Redundancy in the AES S-Box}, howpublished = {Cryptology ePrint Archive, Report 2002/111}, year = {2002}, url = {http://eprint.iacr.org/2002/111}, } @misc{cryptoeprint:2002:112, author = {Kirsten Eisentraeger, Kristin Lauter, and Peter L. Montgomery}, title = {An Efficient Procedure to Double and Add Points on an Elliptic Curve}, howpublished = {Cryptology ePrint Archive, Report 2002/112}, year = {2002}, url = {http://eprint.iacr.org/2002/112}, } @misc{cryptoeprint:2002:113, author = {Yacov Yacobi}, title = {A Note on the Bilinear Diffie-Hellman Assumption}, howpublished = {Cryptology ePrint Archive, Report 2002/113}, year = {2002}, url = {http://eprint.iacr.org/2002/113}, } @misc{cryptoeprint:2002:114, author = {N.P. Smart and J. Westwood}, title = {Point Multiplication on Ordinary Elliptic Curves over Fields of Characteristic Three}, howpublished = {Cryptology ePrint Archive, Report 2002/114}, year = {2002}, url = {http://eprint.iacr.org/2002/114}, } @misc{cryptoeprint:2002:115, author = {Jean-Sébastien Coron and Marc Joye and David Naccache and Pascal Paillier}, title = {Universal Padding Schemes for RSA}, howpublished = {Cryptology ePrint Archive, Report 2002/115}, year = {2002}, url = {http://eprint.iacr.org/2002/115}, } @misc{cryptoeprint:2002:116, author = {Claude Castelluccia}, title = {How to convert any ID-based Signature Schemes }, howpublished = {Cryptology ePrint Archive, Report 2002/116}, year = {2002}, url = {http://eprint.iacr.org/2002/116}, } @misc{cryptoeprint:2002:117, author = {Jung Hee Cheon and Dong Hoon Lee}, title = {Diffie-Hellman Problems and Bilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2002/117}, year = {2002}, url = {http://eprint.iacr.org/2002/117}, } @misc{cryptoeprint:2002:118, author = {Alexandra Boldyreva}, title = {Efficient threshold signature, multisignature and blind signature schemes based on the Gap-Diffie-Hellman-group signature scheme}, howpublished = {Cryptology ePrint Archive, Report 2002/118}, year = {2002}, url = {http://eprint.iacr.org/2002/118}, } @misc{cryptoeprint:2002:119, author = {Bodo M\"oller}, title = {Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes}, howpublished = {Cryptology ePrint Archive, Report 2002/119}, year = {2002}, url = {http://eprint.iacr.org/2002/119}, } @misc{cryptoeprint:2002:120, author = {Ran Canetti and Hugo Krawczyk}, title = {Security Analysis of IKE's Signature-based Key-Exchange Protocol}, howpublished = {Cryptology ePrint Archive, Report 2002/120}, year = {2002}, url = {http://eprint.iacr.org/2002/120}, } @misc{cryptoeprint:2002:121, author = {Tanja Lange}, title = {Efficient Arithmetic on Genus 2 Hyperelliptic Curves over Finite Fields via Explicit Formulae}, howpublished = {Cryptology ePrint Archive, Report 2002/121}, year = {2002}, url = {http://eprint.iacr.org/2002/121}, } @misc{cryptoeprint:2002:122, author = {Fangguo Zhang, Shengli Liu and Kwangjo Kim}, title = {ID-Based One Round Authenticated Tripartite Key Agreement Protocol with Pairings}, howpublished = {Cryptology ePrint Archive, Report 2002/122}, year = {2002}, url = {http://eprint.iacr.org/2002/122}, } @misc{cryptoeprint:2002:123, author = {Kaoru Kurosawa, Tetsu Iwata and Takayuki Yoshiwara}, title = {New covering radius of Reed-Muller codes for $t$-resilient functions}, howpublished = {Cryptology ePrint Archive, Report 2002/123}, year = {2002}, url = {http://eprint.iacr.org/2002/123}, } @misc{cryptoeprint:2002:124, author = {Helger Lipmaa}, title = {On Optimal Hash Tree Traversal for Interval Time-Stamping}, howpublished = {Cryptology ePrint Archive, Report 2002/124}, year = {2002}, url = {http://eprint.iacr.org/2002/124}, } @misc{cryptoeprint:2002:125, author = {Olivier Billet and Marc Joye}, title = {The Jacobi Model of an Elliptic Curve and Side-Channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2002/125}, year = {2002}, url = {http://eprint.iacr.org/2002/125}, } @misc{cryptoeprint:2002:126, author = {Ahmad-Reza Sadeghi and Michael Steiner}, title = {Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference}, howpublished = {Cryptology ePrint Archive, Report 2002/126}, year = {2002}, url = {http://eprint.iacr.org/2002/126}, } @misc{cryptoeprint:2002:127, author = {Kaoru Kurosawa}, title = {Power of a Public Random Permutation and its Application to Authenticated-Encryption}, howpublished = {Cryptology ePrint Archive, Report 2002/127}, year = {2002}, url = {http://eprint.iacr.org/2002/127}, } @misc{cryptoeprint:2002:128, author = {Yvo Desmedt and Yongge Wang}, title = {Perfectly Secure Message Transmission Revisited}, howpublished = {Cryptology ePrint Archive, Report 2002/128}, year = {2002}, url = {http://eprint.iacr.org/2002/128}, } @misc{cryptoeprint:2002:129, author = {Tomas Rosa}, title = {Key-collisions in (EC)DSA: Attacking Non-repudiation}, howpublished = {Cryptology ePrint Archive, Report 2002/129}, year = {2002}, url = {http://eprint.iacr.org/2002/129}, } @misc{cryptoeprint:2002:130, author = {Kazukuni Kobara and Hideki Imai}, title = {OAEP++ : A Very Simple Way to Apply OAEP to Deterministic OW-CPA Primitives}, howpublished = {Cryptology ePrint Archive, Report 2002/130}, year = {2002}, url = {http://eprint.iacr.org/2002/130}, } @misc{cryptoeprint:2002:131, author = {Nenad Dedic and Leonid Reyzin and Salil Vadhan}, title = {An Improved Pseudorandom Generator Based on Hardness of Factoring}, howpublished = {Cryptology ePrint Archive, Report 2002/131}, year = {2002}, url = {http://eprint.iacr.org/2002/131}, } @misc{cryptoeprint:2002:132, author = {Charanjit S. Jutla}, title = {Tight Lower Bound on Linear Authenticated Encryption}, howpublished = {Cryptology ePrint Archive, Report 2002/132}, year = {2002}, url = {http://eprint.iacr.org/2002/132}, } @misc{cryptoeprint:2002:133, author = {Yevgeniy Dodis}, title = {Efficient Construction of (Distributed) Verifiable Random Functions}, howpublished = {Cryptology ePrint Archive, Report 2002/133}, year = {2002}, url = {http://eprint.iacr.org/2002/133}, } @misc{cryptoeprint:2002:134, author = {Christian Cachin and Klaus Kursawe and Anna Lysyanskaya and Reto Strobl}, title = {Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2002/134}, year = {2002}, url = {http://eprint.iacr.org/2002/134}, } @misc{cryptoeprint:2002:135, author = {Amir Herzberg}, title = {Folklore, Practice and Theory of Robust Combiners}, howpublished = {Cryptology ePrint Archive, Report 2002/135}, year = {2002}, url = {http://eprint.iacr.org/2002/135}, } @misc{cryptoeprint:2002:136, author = {R\'egis Dupont and Andreas Enge}, title = {Practical Non-Interactive Key Distribution Based on Pairings}, howpublished = {Cryptology ePrint Archive, Report 2002/136}, year = {2002}, url = {http://eprint.iacr.org/2002/136}, } @misc{cryptoeprint:2002:137, author = {Nicholas J. Hopper and John Langford and Luis von Ahn}, title = {Provably Secure Steganography}, howpublished = {Cryptology ePrint Archive, Report 2002/137}, year = {2002}, url = {http://eprint.iacr.org/2002/137}, } @misc{cryptoeprint:2002:138, author = {Nicolas T. Courtois and Magnus Daum and Patrick Felke}, title = {On the Security of HFE, HFEv- and Quartz}, howpublished = {Cryptology ePrint Archive, Report 2002/138}, year = {2002}, url = {http://eprint.iacr.org/2002/138}, } @misc{cryptoeprint:2002:139, author = {Maria Isabel Gonzalez Vasco and Rainer Steinwandt }, title = {Reaction Attacks on Public Key Cryptosystems Based on the Word Problem }, howpublished = {Cryptology ePrint Archive, Report 2002/139}, year = {2002}, url = {http://eprint.iacr.org/2002/139}, } @misc{cryptoeprint:2002:140, author = {Ran Canetti and Yehuda Lindell and Rafail Ostrovsky and Amit Sahai}, title = {Universally Composable Two-Party and Multi-Party Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2002/140}, year = {2002}, url = {http://eprint.iacr.org/2002/140}, } @misc{cryptoeprint:2002:141, author = {Ventzislav Nikov and Svetla Nikova and Bart Preneel and Joos Vandewalle}, title = {Applying General Access Structure to Proactive Secret Sharing Schemes}, howpublished = {Cryptology ePrint Archive, Report 2002/141}, year = {2002}, url = {http://eprint.iacr.org/2002/141}, } @misc{cryptoeprint:2002:142, author = {Greg Rose and Philip Hawkes}, title = {On the Applicability of Distinguishing Attacks Against Stream Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2002/142}, year = {2002}, url = {http://eprint.iacr.org/2002/142}, } @misc{cryptoeprint:2002:143, author = {Willi Geiselmann and Willi Meier and Rainer Steinwandt}, title = {An Attack on the Isomorphisms of Polynomials Problem with One Secret}, howpublished = {Cryptology ePrint Archive, Report 2002/143}, year = {2002}, url = {http://eprint.iacr.org/2002/143}, } @misc{cryptoeprint:2002:144, author = {A.M. Youssef and S.E. Tavares}, title = {On Some Algebraic Structures in the AES Round Function}, howpublished = {Cryptology ePrint Archive, Report 2002/144}, year = {2002}, url = {http://eprint.iacr.org/2002/144}, } @misc{cryptoeprint:2002:145, author = {P.J. Leadbitter, N.P. Smart}, title = {Cryptanalysis of MQV with partially known nonces}, howpublished = {Cryptology ePrint Archive, Report 2002/145}, year = {2002}, url = {http://eprint.iacr.org/2002/145}, } @misc{cryptoeprint:2002:146, author = {Jun-Bum Shin and Kwang H. Lee}, title = {Bauer-Berson-Feiertag attack revisited}, howpublished = {Cryptology ePrint Archive, Report 2002/146}, year = {2002}, url = {http://eprint.iacr.org/2002/146}, } @misc{cryptoeprint:2002:147, author = {Tanja Lange}, title = {Inversion-Free Arithmetic on Genus 2 Hyperelliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2002/147}, year = {2002}, url = {http://eprint.iacr.org/2002/147}, } @misc{cryptoeprint:2002:148, author = {Phillip Rogaway}, title = {The EMD Mode of Operation (A Tweaked, Wide-Blocksize, Strong PRP)}, howpublished = {Cryptology ePrint Archive, Report 2002/148}, year = {2002}, url = {http://eprint.iacr.org/2002/148}, } @misc{cryptoeprint:2002:149, author = {Nicolas T. Courtois}, title = {About Filliol's Observations on DES, AES and Hash Functions (draft)}, howpublished = {Cryptology ePrint Archive, Report 2002/149}, year = {2002}, url = {http://eprint.iacr.org/2002/149}, } @misc{cryptoeprint:2002:150, author = {Guilin Wang, Jianying Zhou, and Robert H. Deng}, title = {Cryptanalysis of the Lee-Hwang Group-Oriented Undeniable Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2002/150}, year = {2002}, url = {http://eprint.iacr.org/2002/150}, } @misc{cryptoeprint:2002:151, author = {Jason E. Holt and Kent E. Seamons}, title = {Selective disclosure credential sets}, howpublished = {Cryptology ePrint Archive, Report 2002/151}, year = {2002}, url = {http://eprint.iacr.org/2002/151}, } @misc{cryptoeprint:2002:152, author = {Jorge Nakahara Jr and Bart Preneel and Joos Vandewalle}, title = {A note on Weak Keys of PES, IDEA and some Extended Variants}, howpublished = {Cryptology ePrint Archive, Report 2002/152}, year = {2002}, url = {http://eprint.iacr.org/2002/152}, } @misc{cryptoeprint:2002:153, author = {Tanja Lange }, title = {Weighted Coordinates on Genus 2 Hyperelliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2002/153}, year = {2002}, url = {http://eprint.iacr.org/2002/153}, } @misc{cryptoeprint:2002:154, author = {Roberto M. Avanzi}, title = {On multi-exponentiation in cryptography}, howpublished = {Cryptology ePrint Archive, Report 2002/154}, year = {2002}, url = {http://eprint.iacr.org/2002/154}, } @misc{cryptoeprint:2002:155, author = {Steven D. Galbraith, Herbie J. Hopkins, Igor E. Shparlinski}, title = {Secure Bilinear Diffie-Hellman Bits}, howpublished = {Cryptology ePrint Archive, Report 2002/155}, year = {2002}, url = {http://eprint.iacr.org/2002/155}, } @misc{cryptoeprint:2002:156, author = {Jianying Zhou, Feng Bao, and Robert Deng}, title = {Validating Digital Signatures without Time-Stamping and Certificate Revocation}, howpublished = {Cryptology ePrint Archive, Report 2002/156}, year = {2002}, url = {http://eprint.iacr.org/2002/156}, } @misc{cryptoeprint:2002:157, author = {Elad Barkan and Eli Biham}, title = {In How Many Ways Can You Write Rijndael?}, howpublished = {Cryptology ePrint Archive, Report 2002/157}, year = {2002}, url = {http://eprint.iacr.org/2002/157}, } @misc{cryptoeprint:2002:158, author = {Elad Barkan and Eli Biham}, title = {The Book of Rijndaels}, howpublished = {Cryptology ePrint Archive, Report 2002/158}, year = {2002}, url = {http://eprint.iacr.org/2002/158}, } @misc{cryptoeprint:2002:159, author = {Tadayoshi Kohno}, title = {Related-Key and Key-Collision Attacks Against RMAC}, howpublished = {Cryptology ePrint Archive, Report 2002/159}, year = {2002}, url = {http://eprint.iacr.org/2002/159}, } @misc{cryptoeprint:2002:160, author = {Matt Blaze}, title = {Cryptology and Physical Security: Rights Amplification in Master-Keyed Mechanical Locks}, howpublished = {Cryptology ePrint Archive, Report 2002/160}, year = {2002}, url = {http://eprint.iacr.org/2002/160}, } @misc{cryptoeprint:2002:161, author = {Jan Camenisch and Victor Shoup}, title = {Practical Verifiable Encryption and Decryption of Discrete Logarithms}, howpublished = {Cryptology ePrint Archive, Report 2002/161}, year = {2002}, url = {http://eprint.iacr.org/2002/161}, } @misc{cryptoeprint:2002:162, author = {Salil P. Vadhan}, title = {On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model}, howpublished = {Cryptology ePrint Archive, Report 2002/162}, year = {2002}, url = {http://eprint.iacr.org/2002/162}, } @misc{cryptoeprint:2002:163, author = {N. Asokan and Valtteri Niemi and Kaisa Nyberg}, title = {Man-in-the-Middle in Tunnelled Authentication Protocols}, howpublished = {Cryptology ePrint Archive, Report 2002/163}, year = {2002}, url = {http://eprint.iacr.org/2002/163}, } @misc{cryptoeprint:2002:164, author = {Mike Scott}, title = {Authenticated ID-based Key Exchange and remote log-in with simple token and PIN number}, howpublished = {Cryptology ePrint Archive, Report 2002/164}, year = {2002}, url = {http://eprint.iacr.org/2002/164}, } @misc{cryptoeprint:2002:165, author = {Ari Juels and Dario Catalano and Markus Jakobsson}, title = {Coercion-Resistant Electronic Elections}, howpublished = {Cryptology ePrint Archive, Report 2002/165}, year = {2002}, url = {http://eprint.iacr.org/2002/165}, } @misc{cryptoeprint:2002:166, author = {Ho-Kyu Lee and Hyang-Sook Lee and Young-Ran Lee}, title = {Multi-Party Authenticated Key Agreement Protocols from Multilinear Forms}, howpublished = {Cryptology ePrint Archive, Report 2002/166}, year = {2002}, url = {http://eprint.iacr.org/2002/166}, } @misc{cryptoeprint:2002:167, author = {Fangguo Zhang and Kwangjo Kim}, title = {Cryptanalysis of Two New Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2002/167}, year = {2002}, url = {http://eprint.iacr.org/2002/167}, } @misc{cryptoeprint:2002:168, author = {Ki Hyoung Ko and Doo Ho Choi and Mi Sung Cho and Jang Won Lee}, title = {New Signature Scheme Using Conjugacy Problem}, howpublished = {Cryptology ePrint Archive, Report 2002/168}, year = {2002}, url = {http://eprint.iacr.org/2002/168}, } @misc{cryptoeprint:2002:169, author = {D. Page}, title = {Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel}, howpublished = {Cryptology ePrint Archive, Report 2002/169}, year = {2002}, url = {http://eprint.iacr.org/2002/169}, } @misc{cryptoeprint:2002:170, author = {Jack Lloyd}, title = {An Analysis of RMAC}, howpublished = {Cryptology ePrint Archive, Report 2002/170}, year = {2002}, url = {http://eprint.iacr.org/2002/170}, } @misc{cryptoeprint:2002:171, author = {Marina Pudovkina }, title = {Statistical weaknesses in the alleged RC4 keystream generator}, howpublished = {Cryptology ePrint Archive, Report 2002/171}, year = {2002}, url = {http://eprint.iacr.org/2002/171}, } @misc{cryptoeprint:2002:172, author = {Louis Granboulan}, title = {PECDSA. How to build a DL-based digital signature scheme with the best proven security}, howpublished = {Cryptology ePrint Archive, Report 2002/172}, year = {2002}, url = {http://eprint.iacr.org/2002/172}, } @misc{cryptoeprint:2002:173, author = {Giuseppe Ateniese and Breno de Medeiros}, title = {Efficient Group Signatures without Trapdoors}, howpublished = {Cryptology ePrint Archive, Report 2002/173}, year = {2002}, url = {http://eprint.iacr.org/2002/173}, } @misc{cryptoeprint:2002:174, author = {Alexander W. Dent}, title = {A Designer's Guide to KEMs}, howpublished = {Cryptology ePrint Archive, Report 2002/174}, year = {2002}, url = {http://eprint.iacr.org/2002/174}, } @misc{cryptoeprint:2002:175, author = {Dan Boneh and Craig Gentry and Ben Lynn and Hovav Shacham}, title = {Aggregate and Verifiably Encrypted Signatures from Bilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2002/175}, year = {2002}, url = {http://eprint.iacr.org/2002/175}, } @misc{cryptoeprint:2002:176, author = {Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba}, title = {Theoretical Analysis of ``Correlations in RC6'' }, howpublished = {Cryptology ePrint Archive, Report 2002/176}, year = {2002}, url = {http://eprint.iacr.org/2002/176}, } @misc{cryptoeprint:2002:177, author = {Jianhong Zhang Jilin Wang Yumin Wang}, title = {two attacks on xia-you Group Signature}, howpublished = {Cryptology ePrint Archive, Report 2002/177}, year = {2002}, url = {http://eprint.iacr.org/2002/177}, } @misc{cryptoeprint:2002:178, author = {Fangguo Zhang, Shengli Liu and Kwangjo Kim}, title = {Attack on A New Public Key Cryptosystem from ISC'02 (LNCS 2433)}, howpublished = {Cryptology ePrint Archive, Report 2002/178}, year = {2002}, url = {http://eprint.iacr.org/2002/178}, } @misc{cryptoeprint:2002:179, author = {Juan Manuel Garcia Garcia and Rolando Menchaca Garcia}, title = {Parallel Algorithm for Multiplication on Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2002/179}, year = {2002}, url = {http://eprint.iacr.org/2002/179}, } @misc{cryptoeprint:2002:180, author = {Tetsu Iwata and Kaoru Kurosawa}, title = {OMAC: One-Key CBC MAC}, howpublished = {Cryptology ePrint Archive, Report 2002/180}, year = {2002}, url = {http://eprint.iacr.org/2002/180}, } @misc{cryptoeprint:2002:181, author = {Eisaku Furukawa and Mitsuru Kawazoe and Tetsuya Takahashi}, title = {Counting Points for Hyperelliptic Curves of type $y^2=x^5+ax$ over Finite Prime Fields}, howpublished = {Cryptology ePrint Archive, Report 2002/181}, year = {2002}, url = {http://eprint.iacr.org/2002/181}, } @misc{cryptoeprint:2002:182, author = {Wakaha Ogata and Kaoru Kurosawa}, title = {Oblivious Keyword Search}, howpublished = {Cryptology ePrint Archive, Report 2002/182}, year = {2002}, url = {http://eprint.iacr.org/2002/182}, } @misc{cryptoeprint:2002:183, author = {Claude Cr\'epeau and Alain Slakmon}, title = {Simple backdoors to RSA key generation}, howpublished = {Cryptology ePrint Archive, Report 2002/183}, year = {2002}, url = {http://eprint.iacr.org/2002/183}, } @misc{cryptoeprint:2002:184, author = {Liqun Chen and Caroline Kudla}, title = {Identity Based Authenticated Key Agreement Protocols from Pairings}, howpublished = {Cryptology ePrint Archive, Report 2002/184}, year = {2002}, url = {http://eprint.iacr.org/2002/184}, } @misc{cryptoeprint:2002:185, author = {Greg Rose and Philip Hawkes}, title = {Turing, a fast stream cipher}, howpublished = {Cryptology ePrint Archive, Report 2002/185}, year = {2002}, url = {http://eprint.iacr.org/2002/185}, } @misc{cryptoeprint:2002:186, author = {Oded Goldreich}, title = {Zero-Knowledge twenty years after its invention}, howpublished = {Cryptology ePrint Archive, Report 2002/186}, year = {2002}, url = {http://eprint.iacr.org/2002/186}, } @misc{cryptoeprint:2002:187, author = {Herv\'e SIBERT and Patrick DEHORNOY and Marc GIRAULT}, title = {Entity Authentication Schemes Using Braid Word Reduction}, howpublished = {Cryptology ePrint Archive, Report 2002/187}, year = {2002}, url = {http://eprint.iacr.org/2002/187}, } @misc{cryptoeprint:2002:188, author = {Daewan Han and Jin Hong and Jae Woo Han and Daesung Kwon}, title = {Key recovery attacks on NTRU without ciphertext validation routine}, howpublished = {Cryptology ePrint Archive, Report 2002/188}, year = {2002}, url = {http://eprint.iacr.org/2002/188}, } @misc{cryptoeprint:2002:189, author = {Kaoru Kurosawa and Wakaha Ogata}, title = {Bit-Slice Auction Circuit}, howpublished = {Cryptology ePrint Archive, Report 2002/189}, year = {2002}, url = {http://eprint.iacr.org/2002/189}, } @misc{cryptoeprint:2002:190, author = {Eric Hall and Charanjit S. Jutla}, title = {Parallelizable Authentication Trees}, howpublished = {Cryptology ePrint Archive, Report 2002/190}, year = {2002}, url = {http://eprint.iacr.org/2002/190}, } @misc{cryptoeprint:2002:191, author = {Frederik Armknecht}, title = {A Linearization Attack on the Bluetooth Key Stream Generator}, howpublished = {Cryptology ePrint Archive, Report 2002/191}, year = {2002}, url = {http://eprint.iacr.org/2002/191}, } @misc{cryptoeprint:2002:192, author = {Emmanuel Bresson and Olivier Chevassut and David Pointcheval}, title = {Security Proofs for an Efficient Password-Based Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2002/192}, year = {2002}, url = {http://eprint.iacr.org/2002/192}, } @misc{cryptoeprint:2002:193, author = {Michael J. Collins}, title = {A Note on Ideal Tripartite Access Structures}, howpublished = {Cryptology ePrint Archive, Report 2002/193}, year = {2002}, url = {http://eprint.iacr.org/2002/193}, } @misc{cryptoeprint:2002:194, author = {P. Tuyls, H.D.L. Hollmann, J.H.v. Lint, L. Tolhuizen}, title = {A polarisation based Visual Crypto System and its Secret Sharing Schemes}, howpublished = {Cryptology ePrint Archive, Report 2002/194}, year = {2002}, url = {http://eprint.iacr.org/2002/194}, } @misc{cryptoeprint:2002:195, author = {H.D.L. Hollmann, J.H.v. Lint, L. Tolhuizen, P. Tuyls}, title = {An addition to the paper: A polarisation based visual crypto system and its secret sharing schemes}, howpublished = {Cryptology ePrint Archive, Report 2002/195}, year = {2002}, url = {http://eprint.iacr.org/2002/195}, } @misc{cryptoeprint:2003:001, author = {Philip Hawkes and Gregory G. Rose}, title = {A Mode of Operation with Partial Encryption and Message Integrity}, howpublished = {Cryptology ePrint Archive, Report 2003/001}, year = {2003}, url = {http://eprint.iacr.org/2003/001}, } @misc{cryptoeprint:2003:002, author = {John Proos}, title = {Imperfect Decryption and an Attack on the NTRU Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2003/002}, year = {2003}, url = {http://eprint.iacr.org/2003/002}, } @misc{cryptoeprint:2003:003, author = {Eric FILIOL}, title = {Plaintext-dependant Repetition Codes Cryptanalysis of Block Ciphers - The AES Case}, howpublished = {Cryptology ePrint Archive, Report 2003/003}, year = {2003}, url = {http://eprint.iacr.org/2003/003}, } @misc{cryptoeprint:2003:004, author = {Divya Nalla, and K.C.Reddy}, title = {ID-based tripartite Authenticated Key Agreement Protocols from pairings}, howpublished = {Cryptology ePrint Archive, Report 2003/004}, year = {2003}, url = {http://eprint.iacr.org/2003/004}, } @misc{cryptoeprint:2003:005, author = {Keith M. Martin, Rei Safavi-Naini, Huaxiong Wang and Peter R. Wild}, title = {Distributing the Encryption and Decryption of a Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2003/005}, year = {2003}, url = {http://eprint.iacr.org/2003/005}, } @misc{cryptoeprint:2003:006, author = {Ventzislav Nikov, Svetla Nikova, Bart Preneel}, title = {Multi-Party Computation from any Linear Secret Sharing Scheme Secure against Adaptive Adversary: The Zero-Error Case}, howpublished = {Cryptology ePrint Archive, Report 2003/006}, year = {2003}, url = {http://eprint.iacr.org/2003/006}, } @misc{cryptoeprint:2003:007, author = {Huafei Zhu}, title = {A Price Negotiable Transaction System}, howpublished = {Cryptology ePrint Archive, Report 2003/007}, year = {2003}, url = {http://eprint.iacr.org/2003/007}, } @misc{cryptoeprint:2003:008, author = {Christophe Giraud}, title = {DFA on AES}, howpublished = {Cryptology ePrint Archive, Report 2003/008}, year = {2003}, url = {http://eprint.iacr.org/2003/008}, } @misc{cryptoeprint:2003:009, author = {Palash Sarkar}, title = {Domain Extenders for UOWHF: A Finite Binary Tree Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2003/009}, year = {2003}, url = {http://eprint.iacr.org/2003/009}, } @misc{cryptoeprint:2003:010, author = {P. Dusart, G. Letourneux and O. Vivolo}, title = {Differential Fault Analysis on A.E.S.}, howpublished = {Cryptology ePrint Archive, Report 2003/010}, year = {2003}, url = {http://eprint.iacr.org/2003/010}, } @misc{cryptoeprint:2003:011, author = {Fangguo Zhang and Kwangjo Kim}, title = {Cryptanalysis of Lee-Hwang-Li's Key Authentication Scheme}, howpublished = {Cryptology ePrint Archive, Report 2003/011}, year = {2003}, url = {http://eprint.iacr.org/2003/011}, } @misc{cryptoeprint:2003:012, author = {Marina Pudovkina}, title = {The number of initial states of the RC4 cipher with the same cycle structure }, howpublished = {Cryptology ePrint Archive, Report 2003/012}, year = {2003}, url = {http://eprint.iacr.org/2003/012}, } @misc{cryptoeprint:2003:013, author = {Colin D. Walter}, title = {Security Constraints on the Oswald-Aigner Exponentiation Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2003/013}, year = {2003}, url = {http://eprint.iacr.org/2003/013}, } @misc{cryptoeprint:2003:014, author = {Palash Sarkar}, title = {Hiji-bij-bij: A New Stream Cipher with a Self-Synchronizing Mode of Operation}, howpublished = {Cryptology ePrint Archive, Report 2003/014}, year = {2003}, url = {http://eprint.iacr.org/2003/014}, } @misc{cryptoeprint:2003:015, author = {Michael Backes and Birgit Pfitzmann and Michael Waidner}, title = {A Universally Composable Cryptographic Library}, howpublished = {Cryptology ePrint Archive, Report 2003/015}, year = {2003}, url = {http://eprint.iacr.org/2003/015}, } @misc{cryptoeprint:2003:016, author = {Cheng-Kang Chu and Li-Shan Liu and Wen-Guey Tzeng}, title = {A Threshold GQ Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2003/016}, year = {2003}, url = {http://eprint.iacr.org/2003/016}, } @misc{cryptoeprint:2003:017, author = {Simon R. Blackburn}, title = {Perfect Hash Families with Few Functions}, howpublished = {Cryptology ePrint Archive, Report 2003/017}, year = {2003}, url = {http://eprint.iacr.org/2003/017}, } @misc{cryptoeprint:2003:018, author = {HO-KYU LEE, HYANG-SOOK LEE, YOUNG-RAN LEE}, title = {An Authenticated Group Key Agreement Protocol on Braid groups}, howpublished = {Cryptology ePrint Archive, Report 2003/018}, year = {2003}, url = {http://eprint.iacr.org/2003/018}, } @misc{cryptoeprint:2003:019, author = {Jung Hee Cheon and Byungheup Jun}, title = {A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem}, howpublished = {Cryptology ePrint Archive, Report 2003/019}, year = {2003}, url = {http://eprint.iacr.org/2003/019}, } @misc{cryptoeprint:2003:020, author = {Bernhard L\"ohlein}, title = {Attacks based on Conditional Correlations against the Nonlinear Filter Generator}, howpublished = {Cryptology ePrint Archive, Report 2003/020}, year = {2003}, url = {http://eprint.iacr.org/2003/020}, } @misc{cryptoeprint:2003:021, author = {Edith Elkind and Helger Lipmaa}, title = {Interleaving Cryptography and Mechanism Design: The Case of Online Auctions}, howpublished = {Cryptology ePrint Archive, Report 2003/021}, year = {2003}, url = {http://eprint.iacr.org/2003/021}, } @misc{cryptoeprint:2003:022, author = {Nicolas T. Courtois and Robert T. Johnson and Pascal Junod and Thomas Pornin and Michael Scott}, title = {Did Filiol Break AES ?}, howpublished = {Cryptology ePrint Archive, Report 2003/022}, year = {2003}, url = {http://eprint.iacr.org/2003/022}, } @misc{cryptoeprint:2003:023, author = {Benoît Libert and Jean-Jacques Quisquater}, title = {New identity based signcryption schemes from pairings}, howpublished = {Cryptology ePrint Archive, Report 2003/023}, year = {2003}, url = {http://eprint.iacr.org/2003/023}, } @misc{cryptoeprint:2003:024, author = {Dennis Hofheinz and Joern Mueller-Quade and Rainer Steinwandt}, title = {On Modeling IND-CCA Security in Cryptographic Protocols}, howpublished = {Cryptology ePrint Archive, Report 2003/024}, year = {2003}, url = {http://eprint.iacr.org/2003/024}, } @misc{cryptoeprint:2003:025, author = {D.Grigoriev. I.Ponomarenko }, title = {Homomorphic public-key cryptosystems and encrypting boolean circuits}, howpublished = {Cryptology ePrint Archive, Report 2003/025}, year = {2003}, url = {http://eprint.iacr.org/2003/025}, } @misc{cryptoeprint:2003:026, author = {Jan Pelzl and Thomas Wollinger and Jorge Guajardo and Christof Paar}, title = {Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves (Update)}, howpublished = {Cryptology ePrint Archive, Report 2003/026}, year = {2003}, url = {http://eprint.iacr.org/2003/026}, } @misc{cryptoeprint:2003:027, author = {Andris Ambainis and Markus Jakobsson and Helger Lipmaa}, title = {Cryptographic Randomized Response Techniques}, howpublished = {Cryptology ePrint Archive, Report 2003/027}, year = {2003}, url = {http://eprint.iacr.org/2003/027}, } @misc{cryptoeprint:2003:028, author = {Mathieu Ciet and Marc Joye}, title = {Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults}, howpublished = {Cryptology ePrint Archive, Report 2003/028}, year = {2003}, url = {http://eprint.iacr.org/2003/028}, } @misc{cryptoeprint:2003:029, author = {Wenbo Mao and John Malone-Lee}, title = {Universal Padding Schemes for RSA with Optimal Bandwidth of Message Recovery}, howpublished = {Cryptology ePrint Archive, Report 2003/029}, year = {2003}, url = {http://eprint.iacr.org/2003/029}, } @misc{cryptoeprint:2003:030, author = {Ronald Cramer and Serge Fehr and Yuval Ishai and Eyal Kushilevitz}, title = {Efficient Multi-Party Computation over Rings}, howpublished = {Cryptology ePrint Archive, Report 2003/030}, year = {2003}, url = {http://eprint.iacr.org/2003/030}, } @misc{cryptoeprint:2003:031, author = {Gene Itkis}, title = {Cryptographic Tamper Evidence}, howpublished = {Cryptology ePrint Archive, Report 2003/031}, year = {2003}, url = {http://eprint.iacr.org/2003/031}, } @misc{cryptoeprint:2003:032, author = {Rosario Gennaro and Yehuda Lindell}, title = {A Framework for Password-Based Authenticated Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2003/032}, year = {2003}, url = {http://eprint.iacr.org/2003/032}, } @misc{cryptoeprint:2003:033, author = {Gilles Piret and Jean-Jacques Quisquater}, title = {Integral Cryptanalysis on reduced-round Safer++}, howpublished = {Cryptology ePrint Archive, Report 2003/033}, year = {2003}, url = {http://eprint.iacr.org/2003/033}, } @misc{cryptoeprint:2003:034, author = {Shafi Goldwasser and Yael Tauman}, title = {On the (In)security of the Fiat-Shamir Paradigm}, howpublished = {Cryptology ePrint Archive, Report 2003/034}, year = {2003}, url = {http://eprint.iacr.org/2003/034}, } @misc{cryptoeprint:2003:035, author = {Kamil Kulesza and Zbigniew Kotulski and Josef Pieprzyk}, title = {On alternative approach for verifiable secret sharing}, howpublished = {Cryptology ePrint Archive, Report 2003/035}, year = {2003}, url = {http://eprint.iacr.org/2003/035}, } @misc{cryptoeprint:2003:036, author = {Jean-Sebastien Coron}, title = {Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem}, howpublished = {Cryptology ePrint Archive, Report 2003/036}, year = {2003}, url = {http://eprint.iacr.org/2003/036}, } @misc{cryptoeprint:2003:037, author = {Juan A. Garay and Philip MacKenzie and Ke Yang}, title = {Strengthening Zero-Knowledge Protocols using Signatures}, howpublished = {Cryptology ePrint Archive, Report 2003/037}, year = {2003}, url = {http://eprint.iacr.org/2003/037}, } @misc{cryptoeprint:2003:038, author = {Kazukuni Kobara and Hideki Imai}, title = {Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2003/038}, year = {2003}, url = {http://eprint.iacr.org/2003/038}, } @misc{cryptoeprint:2003:039, author = {Karl Rubin and Alice Silverberg}, title = {Torus-based cryptography}, howpublished = {Cryptology ePrint Archive, Report 2003/039}, year = {2003}, url = {http://eprint.iacr.org/2003/039}, } @misc{cryptoeprint:2003:040, author = {Kishan Chand Gupta and Palash Sarkar}, title = {Computing Partial Walsh Transform from the Algebraic Normal Form of a Boolean Function }, howpublished = {Cryptology ePrint Archive, Report 2003/040}, year = {2003}, url = {http://eprint.iacr.org/2003/040}, } @misc{cryptoeprint:2003:041, author = {Jovan Dj. Golic and Renato Menicocci}, title = {A new statistical distinguisher for the shrinking generator}, howpublished = {Cryptology ePrint Archive, Report 2003/041}, year = {2003}, url = {http://eprint.iacr.org/2003/041}, } @misc{cryptoeprint:2003:042, author = {Juan A. Garay and Carl Pomerance}, title = {Timed Fair Exchange of Standard Signatures}, howpublished = {Cryptology ePrint Archive, Report 2003/042}, year = {2003}, url = {http://eprint.iacr.org/2003/042}, } @misc{cryptoeprint:2003:043, author = {Yevgeniy Dodis and Michael J. Freedman and Shabsi Walfish}, title = {Parallel Signcryption with OAEP, PSS-R, and other Feistel Paddings}, howpublished = {Cryptology ePrint Archive, Report 2003/043}, year = {2003}, url = {http://eprint.iacr.org/2003/043}, } @misc{cryptoeprint:2003:044, author = {Divya Nalla, K.C.Reddy }, title = {Signcryption scheme for Identity-based Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2003/044}, year = {2003}, url = {http://eprint.iacr.org/2003/044}, } @misc{cryptoeprint:2003:045, author = {L. Hern\'{a}ndez Encinas and J. Mu\~{n}oz Masqu\'{e} and A. Queiruga Dios}, title = {An algorithm to obtain an RSA modulus with a large private key}, howpublished = {Cryptology ePrint Archive, Report 2003/045}, year = {2003}, url = {http://eprint.iacr.org/2003/045}, } @misc{cryptoeprint:2003:046, author = {Guilin Wang, and Bo Zhu}, title = {Remarks on Saeednia's Identity-based Society Oriented Signature Scheme with Anonymous Signers}, howpublished = {Cryptology ePrint Archive, Report 2003/046}, year = {2003}, url = {http://eprint.iacr.org/2003/046}, } @misc{cryptoeprint:2003:047, author = {Masao KASAHARA and Ryuichi SAKAI}, title = {A Construction of 100 bit Public-Key Cryptosystem and Digital Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2003/047}, year = {2003}, url = {http://eprint.iacr.org/2003/047}, } @misc{cryptoeprint:2003:048, author = {E. Martinez-Moro, J. Mozo-Fernandez, C. Munuera }, title = {Compounding Secret Sharing Schemes}, howpublished = {Cryptology ePrint Archive, Report 2003/048}, year = {2003}, url = {http://eprint.iacr.org/2003/048}, } @misc{cryptoeprint:2003:049, author = {Igor Shparlinski and Arne Winterhof}, title = {Hidden Number Problem in Small Subgroups}, howpublished = {Cryptology ePrint Archive, Report 2003/049}, year = {2003}, url = {http://eprint.iacr.org/2003/049}, } @misc{cryptoeprint:2003:050, author = {Yevgeniy Dodis and Jee Hea An}, title = {Concealment and its Applications to Authenticated Encryption}, howpublished = {Cryptology ePrint Archive, Report 2003/050}, year = {2003}, url = {http://eprint.iacr.org/2003/050}, } @misc{cryptoeprint:2003:051, author = {Markus Dichtl}, title = {How to Predict the Output of a Hardware Random Number Generator}, howpublished = {Cryptology ePrint Archive, Report 2003/051}, year = {2003}, url = {http://eprint.iacr.org/2003/051}, } @misc{cryptoeprint:2003:052, author = {Vlastimil Klima and Ondrej Pokorny and Tomas Rosa}, title = {Attacking RSA-based Sessions in SSL/TLS}, howpublished = {Cryptology ePrint Archive, Report 2003/052}, year = {2003}, url = {http://eprint.iacr.org/2003/052}, } @misc{cryptoeprint:2003:053, author = {Iwan Duursma and Hyang-Sook Lee}, title = {Tate-pairing implementations for tripartite key agreement}, howpublished = {Cryptology ePrint Archive, Report 2003/053}, year = {2003}, url = {http://eprint.iacr.org/2003/053}, } @misc{cryptoeprint:2003:054, author = {Ryuichi SAKAI and Masao KASAHARA}, title = {ID based Cryptosystems with Pairing on Elliptic Curve}, howpublished = {Cryptology ePrint Archive, Report 2003/054}, year = {2003}, url = {http://eprint.iacr.org/2003/054}, } @misc{cryptoeprint:2003:055, author = {Xiaofeng Chen and Fangguo Zhang and Yumin Wang}, title = {A New Approach to Prevent Blackmailing in E-Cash}, howpublished = {Cryptology ePrint Archive, Report 2003/055}, year = {2003}, url = {http://eprint.iacr.org/2003/055}, } @misc{cryptoeprint:2003:056, author = {Huafei Zhu and Bao Feng and Robert H. Deng}, title = {Computing of Trust in Distributed Networks}, howpublished = {Cryptology ePrint Archive, Report 2003/056}, year = {2003}, url = {http://eprint.iacr.org/2003/056}, } @misc{cryptoeprint:2003:057, author = {Mario Di Raimondo and Rosario Gennaro}, title = {Secure Multiplication of Shared Secrets in the Exponent}, howpublished = {Cryptology ePrint Archive, Report 2003/057}, year = {2003}, url = {http://eprint.iacr.org/2003/057}, } @misc{cryptoeprint:2003:058, author = {Edlyn Teske}, title = {An Elliptic Curve Trapdoor System}, howpublished = {Cryptology ePrint Archive, Report 2003/058}, year = {2003}, url = {http://eprint.iacr.org/2003/058}, } @misc{cryptoeprint:2003:059, author = {Huafei Zhu and Bao Feng and Robert H. Deng}, title = {A Transitive Signature Scheme Provably Secure Against Adaptive Chosen-message Attack}, howpublished = {Cryptology ePrint Archive, Report 2003/059}, year = {2003}, url = {http://eprint.iacr.org/2003/059}, } @misc{cryptoeprint:2003:060, author = {Jong Won Lee}, title = {Isomorphism Classes of Picard Curves over Finite Fields}, howpublished = {Cryptology ePrint Archive, Report 2003/060}, year = {2003}, url = {http://eprint.iacr.org/2003/060}, } @misc{cryptoeprint:2003:061, author = {Ilia Toli}, title = {Hidden Polynomial Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2003/061}, year = {2003}, url = {http://eprint.iacr.org/2003/061}, } @misc{cryptoeprint:2003:062, author = {Rana Barua and Ratna Dutta and Palash Sarkar}, title = {Extending Joux's Protocol to Multi Party Key Agreement}, howpublished = {Cryptology ePrint Archive, Report 2003/062}, year = {2003}, url = {http://eprint.iacr.org/2003/062}, } @misc{cryptoeprint:2003:063, author = {Dennis Hofheinz and Joern Mueller-Quade and Rainer Steinwandt }, title = {Initiator-Resilient Universally Composable Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2003/063}, year = {2003}, url = {http://eprint.iacr.org/2003/063}, } @misc{cryptoeprint:2003:064, author = {Pascal Junod}, title = {On the Optimality of Linear, Differential and Sequential Distinguishers}, howpublished = {Cryptology ePrint Archive, Report 2003/064}, year = {2003}, url = {http://eprint.iacr.org/2003/064}, } @misc{cryptoeprint:2003:065, author = {Mihir Bellare and Tadayoshi Kohno}, title = {Hash Function Balance and its Impact on Birthday Attacks}, howpublished = {Cryptology ePrint Archive, Report 2003/065}, year = {2003}, url = {http://eprint.iacr.org/2003/065}, } @misc{cryptoeprint:2003:066, author = {Divya Nalla, K.C.Reddy }, title = {Signcryption scheme for Identity-based Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2003/066}, year = {2003}, url = {http://eprint.iacr.org/2003/066}, } @misc{cryptoeprint:2003:067, author = {Javier Herranz and Germ\'an S\'aez}, title = {Forking Lemmas in the Ring Signatures' Scenario}, howpublished = {Cryptology ePrint Archive, Report 2003/067}, year = {2003}, url = {http://eprint.iacr.org/2003/067}, } @misc{cryptoeprint:2003:068, author = {Hung-Min Sun and Bin-Tsan Hsieh}, title = {On the Security of Some Proxy Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2003/068}, year = {2003}, url = {http://eprint.iacr.org/2003/068}, } @misc{cryptoeprint:2003:069, author = {M. Bellare and P. Rogaway and D. Wagner}, title = {EAX: A Conventional Authenticated-Encryption Mode}, howpublished = {Cryptology ePrint Archive, Report 2003/069}, year = {2003}, url = {http://eprint.iacr.org/2003/069}, } @misc{cryptoeprint:2003:070, author = {P. Rogaway and D. Wagner}, title = {A Critique of CCM}, howpublished = {Cryptology ePrint Archive, Report 2003/070}, year = {2003}, url = {http://eprint.iacr.org/2003/070}, } @misc{cryptoeprint:2003:071, author = {Markus Jakobsson and John Linn and Joy Algesheimer}, title = {How to Protect Against a Militant Spammer}, howpublished = {Cryptology ePrint Archive, Report 2003/071}, year = {2003}, url = {http://eprint.iacr.org/2003/071}, } @misc{cryptoeprint:2003:072, author = {Amit K Awasthi and Sunder Lal}, title = {Proxy Blind Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2003/072}, year = {2003}, url = {http://eprint.iacr.org/2003/072}, } @misc{cryptoeprint:2003:073, author = {Sunder Lal and Amit K Awasthi}, title = {A Scheme for obtaining a Warrant Message from the Digital Proxy Signatures}, howpublished = {Cryptology ePrint Archive, Report 2003/073}, year = {2003}, url = {http://eprint.iacr.org/2003/073}, } @misc{cryptoeprint:2003:074, author = {Natsuki Ishida and Shin'ichiro Matsuo and Wakaha Ogata}, title = {Divisible Voting Scheme}, howpublished = {Cryptology ePrint Archive, Report 2003/074}, year = {2003}, url = {http://eprint.iacr.org/2003/074}, } @misc{cryptoeprint:2003:075, author = {Kaoru Kurosawa}, title = {Almost Security of Cryptographic Boolean Functions}, howpublished = {Cryptology ePrint Archive, Report 2003/075}, year = {2003}, url = {http://eprint.iacr.org/2003/075}, } @misc{cryptoeprint:2003:076, author = {N. Vijayarangan, Nitin Agarwal, S. Kasilingam}, title = {Goldbach’s Conjecture on ECDSA Protocols}, howpublished = {Cryptology ePrint Archive, Report 2003/076}, year = {2003}, url = {http://eprint.iacr.org/2003/076}, } @misc{cryptoeprint:2003:077, author = {Mihir Bellare and Alexandra Boldyreva and Adriana Palacio}, title = {An Uninstantiable Random-Oracle-Model Scheme for a Hybrid Encryption Problem}, howpublished = {Cryptology ePrint Archive, Report 2003/077}, year = {2003}, url = {http://eprint.iacr.org/2003/077}, } @misc{cryptoeprint:2003:078, author = {Yodai Watanabe and Junji Shikata}, title = {Relation among simulator-based and comparison-based definitions of semantic security}, howpublished = {Cryptology ePrint Archive, Report 2003/078}, year = {2003}, url = {http://eprint.iacr.org/2003/078}, } @misc{cryptoeprint:2003:079, author = {Stéphane Flon and Roger Oyono}, title = {Fast arithmetic on Jacobians of Picard curves}, howpublished = {Cryptology ePrint Archive, Report 2003/079}, year = {2003}, url = {http://eprint.iacr.org/2003/079}, } @misc{cryptoeprint:2003:080, author = {Ivan Damgård and Jens Groth}, title = {Non-interactive and Reusable Non-malleable Commitment Schemes}, howpublished = {Cryptology ePrint Archive, Report 2003/080}, year = {2003}, url = {http://eprint.iacr.org/2003/080}, } @misc{cryptoeprint:2003:081, author = {Philip Hawkes and Greg Rose}, title = {Primitive Specification for SOBER-128}, howpublished = {Cryptology ePrint Archive, Report 2003/081}, year = {2003}, url = {http://eprint.iacr.org/2003/081}, } @misc{cryptoeprint:2003:082, author = {Tetsu Iwata and Kaoru Kurosawa}, title = {Stronger Security Bounds for OMAC, TMAC and XCBC}, howpublished = {Cryptology ePrint Archive, Report 2003/082}, year = {2003}, url = {http://eprint.iacr.org/2003/082}, } @misc{cryptoeprint:2003:083, author = {Ran Canetti and Shai Halevi and Jonathan Katz}, title = {A Forward-Secure Public-Key Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2003/083}, year = {2003}, url = {http://eprint.iacr.org/2003/083}, } @misc{cryptoeprint:2003:084, author = {Jintai Ding, Timonthy Hodges}, title = {Cryptanalysis of an implementation scheme of the Tamed Transformation Method cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2003/084}, year = {2003}, url = {http://eprint.iacr.org/2003/084}, } @misc{cryptoeprint:2003:085, author = {Jintai Ding, Dieter Schmidt }, title = {A defect of the implementation schemes of the TTM cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2003/085}, year = {2003}, url = {http://eprint.iacr.org/2003/085}, } @misc{cryptoeprint:2003:086, author = {Paulo S. L. M. Barreto and Ben Lynn and Michael Scott}, title = {On the Selection of Pairing-Friendly Groups}, howpublished = {Cryptology ePrint Archive, Report 2003/086}, year = {2003}, url = {http://eprint.iacr.org/2003/086}, } @misc{cryptoeprint:2003:087, author = {huafei zhu}, title = {A Practical Elliptic Curve Public Key Encryption Scheme Provably Secure Against Adaptive Chosen-message Attack}, howpublished = {Cryptology ePrint Archive, Report 2003/087}, year = {2003}, url = {http://eprint.iacr.org/2003/087}, } @misc{cryptoeprint:2003:088, author = {A.G.Rostovtsev and E.B.Makhovenko}, title = {Elliptic Curve Point Multiplication}, howpublished = {Cryptology ePrint Archive, Report 2003/088}, year = {2003}, url = {http://eprint.iacr.org/2003/088}, } @misc{cryptoeprint:2003:089, author = {Christopher Wolf}, title = {Efficient Public Key Generation for Multivariate Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2003/089}, year = {2003}, url = {http://eprint.iacr.org/2003/089}, } @misc{cryptoeprint:2003:090, author = {Chih-Yin Lin and Tzong-Chen Wu and Fangguo Zhang}, title = {A Structured Multisignature Scheme from the Gap Diffie-Hellman Group}, howpublished = {Cryptology ePrint Archive, Report 2003/090}, year = {2003}, url = {http://eprint.iacr.org/2003/090}, } @misc{cryptoeprint:2003:091, author = {Anna Lysyanskaya and Silvio Micali and Leonid Reyzin and Hovav Shacham}, title = {Sequential Aggregate Signatures from Trapdoor Permutations}, howpublished = {Cryptology ePrint Archive, Report 2003/091}, year = {2003}, url = {http://eprint.iacr.org/2003/091}, } @misc{cryptoeprint:2003:092, author = {Muxiang Zhang}, title = {Provably-Secure Enhancement on 3GPP Authentication and Key Agreement Protocol}, howpublished = {Cryptology ePrint Archive, Report 2003/092}, year = {2003}, url = {http://eprint.iacr.org/2003/092}, } @misc{cryptoeprint:2003:093, author = {Leonid Reyzin and Scott Russell}, title = {Simple Stateless Steganography}, howpublished = {Cryptology ePrint Archive, Report 2003/093}, year = {2003}, url = {http://eprint.iacr.org/2003/093}, } @misc{cryptoeprint:2003:094, author = {Tanja Lange}, title = {Trace Zero Subvariety for Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2003/094}, year = {2003}, url = {http://eprint.iacr.org/2003/094}, } @misc{cryptoeprint:2003:095, author = {Yevgeniy Dodis and Nelly Fazio}, title = {Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack}, howpublished = {Cryptology ePrint Archive, Report 2003/095}, year = {2003}, url = {http://eprint.iacr.org/2003/095}, } @misc{cryptoeprint:2003:096, author = {Alexandra Boldyreva and Adriana Palacio and Bogdan Warinschi}, title = {Secure Proxy Signature Schemes for Delegation of Signing Rights}, howpublished = {Cryptology ePrint Archive, Report 2003/096}, year = {2003}, url = {http://eprint.iacr.org/2003/096}, } @misc{cryptoeprint:2003:097, author = {Jan Pelzl and Thomas Wollinger and Christof Paar}, title = {Low Cost Security: Explicit Formulae for Genus 4 Hyperelliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2003/097}, year = {2003}, url = {http://eprint.iacr.org/2003/097}, } @misc{cryptoeprint:2003:098, author = {Vlastimil Klima and Tomas Rosa}, title = {Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format}, howpublished = {Cryptology ePrint Archive, Report 2003/098}, year = {2003}, url = {http://eprint.iacr.org/2003/098}, } @misc{cryptoeprint:2003:099, author = {Matthew J. Campagna}, title = {Algorithms in Braid Groups}, howpublished = {Cryptology ePrint Archive, Report 2003/099}, year = {2003}, url = {http://eprint.iacr.org/2003/099}, } @misc{cryptoeprint:2003:100, author = {Yehuda Lindell}, title = {Protocols for Bounded-Concurrent Secure Two-Party Computation in the Plain Model}, howpublished = {Cryptology ePrint Archive, Report 2003/100}, year = {2003}, url = {http://eprint.iacr.org/2003/100}, } @misc{cryptoeprint:2003:101, author = {Ilia Toli}, title = {Cryptanalysis of HFE}, howpublished = {Cryptology ePrint Archive, Report 2003/101}, year = {2003}, url = {http://eprint.iacr.org/2003/101}, } @misc{cryptoeprint:2003:102, author = {J. Hughes, and A. Tannenbaum}, title = {Length-Based Attacks for Certain Group Based Encryption Rewriting Systems}, howpublished = {Cryptology ePrint Archive, Report 2003/102}, year = {2003}, url = {http://eprint.iacr.org/2003/102}, } @misc{cryptoeprint:2003:103, author = {Zhongliang Chen}, title = {Security analysis on Nalla-Reddy's ID-based tripartite authenticated key agreement protocols}, howpublished = {Cryptology ePrint Archive, Report 2003/103}, year = {2003}, url = {http://eprint.iacr.org/2003/103}, } @misc{cryptoeprint:2003:104, author = {Fangguo Zhang and Reihaneh Safavi-Naini and Chih-Yin Lin }, title = {New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing}, howpublished = {Cryptology ePrint Archive, Report 2003/104}, year = {2003}, url = {http://eprint.iacr.org/2003/104}, } @misc{cryptoeprint:2003:105, author = {Helger Lipmaa}, title = {On Diophantine Complexity and Statistical Zero-Knowledge Arguments}, howpublished = {Cryptology ePrint Archive, Report 2003/105}, year = {2003}, url = {http://eprint.iacr.org/2003/105}, } @misc{cryptoeprint:2003:106, author = {Tadayoshi Kohno and John Viega and Doug Whiting}, title = {CWC: A high-performance conventional authenticated encryption mode}, howpublished = {Cryptology ePrint Archive, Report 2003/106}, year = {2003}, url = {http://eprint.iacr.org/2003/106}, } @misc{cryptoeprint:2003:107, author = {David Galindo and Sebasti\`a Mart\'{\i}n and Paz Morillo and Jorge L. Villar}, title = {Fujisaki-Okamoto IND-CCA hybrid encryption revisited}, howpublished = {Cryptology ePrint Archive, Report 2003/107}, year = {2003}, url = {http://eprint.iacr.org/2003/107}, } @misc{cryptoeprint:2003:108, author = {Tri Van Le}, title = {Novel Cyclic and Algebraic Properties of AES}, howpublished = {Cryptology ePrint Archive, Report 2003/108}, year = {2003}, url = {http://eprint.iacr.org/2003/108}, } @misc{cryptoeprint:2003:109, author = {Alex Biryukov and Christophe De Canni\`ere and Gustaf Dellkrantz}, title = {Crytanalysis of SAFER++}, howpublished = {Cryptology ePrint Archive, Report 2003/109}, year = {2003}, url = {http://eprint.iacr.org/2003/109}, } @misc{cryptoeprint:2003:110, author = {Yukio Itakura and Shigeo Tsujii}, title = {Proposal on Personal Authentication System in which Biological Information is embedded in Cryptosystem Key}, howpublished = {Cryptology ePrint Archive, Report 2003/110}, year = {2003}, url = {http://eprint.iacr.org/2003/110}, } @misc{cryptoeprint:2003:111, author = {Jiqiang Lv and Jingwei Liu and Xinmei Wang}, title = {Further Cryptanalysis of some Proxy Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2003/111}, year = {2003}, url = {http://eprint.iacr.org/2003/111}, } @misc{cryptoeprint:2003:112, author = {Gene Tsudik and Shouhuai Xu}, title = {Accumulating Composites and Improved Group Signing}, howpublished = {Cryptology ePrint Archive, Report 2003/112}, year = {2003}, url = {http://eprint.iacr.org/2003/112}, } @misc{cryptoeprint:2003:113, author = {Hung-Min Sun and Bin-Tsan Hsieh}, title = {Security Analysis of Shim's Authenticated Key Agreement Protocols from Pairings}, howpublished = {Cryptology ePrint Archive, Report 2003/113}, year = {2003}, url = {http://eprint.iacr.org/2003/113}, } @misc{cryptoeprint:2003:114, author = {Michael Backes}, title = {Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2003/114}, year = {2003}, url = {http://eprint.iacr.org/2003/114}, } @misc{cryptoeprint:2003:115, author = {Kyungah Shim}, title = {Cryptanalysis of ID-based Tripartite Authenticated Key Agreement Protocols}, howpublished = {Cryptology ePrint Archive, Report 2003/115}, year = {2003}, url = {http://eprint.iacr.org/2003/115}, } @misc{cryptoeprint:2003:116, author = {Xiaofeng Chen and Fangguo Zhang and Kwangjo Kim }, title = {A New ID-based Group Signature Scheme from Bilinear Pairings}, howpublished = {Cryptology ePrint Archive, Report 2003/116}, year = {2003}, url = {http://eprint.iacr.org/2003/116}, } @misc{cryptoeprint:2003:117, author = {Chih-Yin Lin and Tzong-Chen Wu}, title = {An identity-based ring signature scheme from bilinear pairings}, howpublished = {Cryptology ePrint Archive, Report 2003/117}, year = {2003}, url = {http://eprint.iacr.org/2003/117}, } @misc{cryptoeprint:2003:118, author = {Pim Tuyls, Tom Kevenaar, Geert-Jan Schrijen, Toine Staring, Marten van Dijk}, title = {Visual Crypto Displays Enabling Secure Communications}, howpublished = {Cryptology ePrint Archive, Report 2003/118}, year = {2003}, url = {http://eprint.iacr.org/2003/118}, } @misc{cryptoeprint:2003:119, author = {Thomas Wollinger and Christof Paar}, title = {How Secure Are FPGAs in Cryptographic Applications?}, howpublished = {Cryptology ePrint Archive, Report 2003/119}, year = {2003}, url = {http://eprint.iacr.org/2003/119}, } @misc{cryptoeprint:2003:120, author = {Silvio Micali and Leonid Reyzin}, title = {Physically Observable Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2003/120}, year = {2003}, url = {http://eprint.iacr.org/2003/120}, } @misc{cryptoeprint:2003:121, author = {Michael Backes and Birgit Pfitzmann}, title = {A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol}, howpublished = {Cryptology ePrint Archive, Report 2003/121}, year = {2003}, url = {http://eprint.iacr.org/2003/121}, } @misc{cryptoeprint:2003:122, author = {Kyungah Shim}, title = {Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party Key Agreement Protocols}, howpublished = {Cryptology ePrint Archive, Report 2003/122}, year = {2003}, url = {http://eprint.iacr.org/2003/122}, } @misc{cryptoeprint:2003:123, author = {Vladimir Shpilrain}, title = {Assessing security of some group based cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2003/123}, year = {2003}, url = {http://eprint.iacr.org/2003/123}, } @misc{cryptoeprint:2003:124, author = {Kishan Chand Gupta and Palash Sarkar }, title = {A General Correlation Theorem}, howpublished = {Cryptology ePrint Archive, Report 2003/124}, year = {2003}, url = {http://eprint.iacr.org/2003/124}, } @misc{cryptoeprint:2003:125, author = {Nicolas T. Courtois}, title = {Algebraic Attacks on Combiners with Memory and Several Outputs}, howpublished = {Cryptology ePrint Archive, Report 2003/125}, year = {2003}, url = {http://eprint.iacr.org/2003/125}, } @misc{cryptoeprint:2003:126, author = {Sattam S. Al-Riyami and Kenneth G. Paterson}, title = {Certificateless Public Key Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2003/126}, year = {2003}, url = {http://eprint.iacr.org/2003/126}, } @misc{cryptoeprint:2003:127, author = {B. Ya. Ryabko and V.A. Monarev}, title = {Using Information Theory Approach to Randomness Testing}, howpublished = {Cryptology ePrint Archive, Report 2003/127}, year = {2003}, url = {http://eprint.iacr.org/2003/127}, } @misc{cryptoeprint:2003:128, author = {Alfred Menezes and Edlyn Teske and Annegret Weng}, title = {Weak Fields for ECC}, howpublished = {Cryptology ePrint Archive, Report 2003/128}, year = {2003}, url = {http://eprint.iacr.org/2003/128}, } @misc{cryptoeprint:2003:129, author = {Fangguo Zhang and Reihaneh Safavi-Naini and Willy Susilo}, title = {Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03 }, howpublished = {Cryptology ePrint Archive, Report 2003/129}, year = {2003}, url = {http://eprint.iacr.org/2003/129}, } @misc{cryptoeprint:2003:130, author = {Tetsu Iwata and Tohru Yagi and Kaoru Kurosawa}, title = {On the Pseudorandomness of KASUMI Type Permutations}, howpublished = {Cryptology ePrint Archive, Report 2003/130}, year = {2003}, url = {http://eprint.iacr.org/2003/130}, } @misc{cryptoeprint:2003:131, author = {Kristian Gjøsteen}, title = {Homomorphic public-key systems based on subgroup membership problems}, howpublished = {Cryptology ePrint Archive, Report 2003/131}, year = {2003}, url = {http://eprint.iacr.org/2003/131}, } @misc{cryptoeprint:2003:132, author = {Adi Shamir and Boaz Tsaban}, title = {Guaranteeing the diversity of number generators}, howpublished = {Cryptology ePrint Archive, Report 2003/132}, year = {2003}, url = {http://eprint.iacr.org/2003/132}, } @misc{cryptoeprint:2003:133, author = {Soumen Maity and Subhamoy Maitra}, title = {Minimum Distance between Bent and 1-resilient Boolean Functions}, howpublished = {Cryptology ePrint Archive, Report 2003/133}, year = {2003}, url = {http://eprint.iacr.org/2003/133}, } @misc{cryptoeprint:2003:134, author = {Sugata Gangopadhyay and Subhamoy Maitra}, title = {Direct Sum of Non Normal and Normal Bent Functions Always Produces Non Normal Bent Functions}, howpublished = {Cryptology ePrint Archive, Report 2003/134}, year = {2003}, url = {http://eprint.iacr.org/2003/134}, } @misc{cryptoeprint:2003:135, author = {Wen-Ling Wu and Deng-Guo Feng}, title = {Collision Attack on Reduced-Round Camellia}, howpublished = {Cryptology ePrint Archive, Report 2003/135}, year = {2003}, url = {http://eprint.iacr.org/2003/135}, } @misc{cryptoeprint:2003:136, author = {Boaz Tsaban and Uzi Vishne}, title = {Efficient linear feedback shift registers with maximal period}, howpublished = {Cryptology ePrint Archive, Report 2003/136}, year = {2003}, url = {http://eprint.iacr.org/2003/136}, } @misc{cryptoeprint:2003:137, author = {Boaz Tsaban}, title = {Bernoulli numbers and the probability of a birthday surprise}, howpublished = {Cryptology ePrint Archive, Report 2003/137}, year = {2003}, url = {http://eprint.iacr.org/2003/137}, } @misc{cryptoeprint:2003:138, author = {Boaz Tsaban}, title = {Permutation graphs, fast forward permutations, and}, howpublished = {Cryptology ePrint Archive, Report 2003/138}, year = {2003}, url = {http://eprint.iacr.org/2003/138}, } @misc{cryptoeprint:2003:139, author = {Enjian Bai and Guozhen Xiao}, title = {On the Randomness of the Editing Generator}, howpublished = {Cryptology ePrint Archive, Report 2003/139}, year = {2003}, url = {http://eprint.iacr.org/2003/139}, } @misc{cryptoeprint:2003:140, author = {Konstantin Hypp\"onen and David Naccache and Elena Trichina and Alexei Tchoulkine}, title = {Trading-Off Type-Inference Memory Complexity Against Communication}, howpublished = {Cryptology ePrint Archive, Report 2003/140}, year = {2003}, url = {http://eprint.iacr.org/2003/140}, } @misc{cryptoeprint:2003:141, author = {Yehuda Lindell}, title = {General Composition and Universal Composability in Secure Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2003/141}, year = {2003}, url = {http://eprint.iacr.org/2003/141}, } @misc{cryptoeprint:2003:142, author = {Mridul Nandi}, title = {A New Tree based Domain Extension of UOWHF}, howpublished = {Cryptology ePrint Archive, Report 2003/142}, year = {2003}, url = {http://eprint.iacr.org/2003/142}, } @misc{cryptoeprint:2003:143, author = {Friederike Brezing and Annegret Weng}, title = {Elliptic curves suitable for pairing based cryptography}, howpublished = {Cryptology ePrint Archive, Report 2003/143}, year = {2003}, url = {http://eprint.iacr.org/2003/143}, } @misc{cryptoeprint:2003:144, author = {Divya Nalla}, title = {ID-based tripartite key agreement with signatures}, howpublished = {Cryptology ePrint Archive, Report 2003/144}, year = {2003}, url = {http://eprint.iacr.org/2003/144}, } @misc{cryptoeprint:2003:145, author = {Michael Backes and Birgit Pfitzmann and Michael Waidner}, title = {Symmetric Authentication Within a Simulatable Cryptographic Library}, howpublished = {Cryptology ePrint Archive, Report 2003/145}, year = {2003}, url = {http://eprint.iacr.org/2003/145}, } @misc{cryptoeprint:2003:146, author = {Yevgeniy Dodis and Leonid Reyzin}, title = {Breaking and Repairing Optimistic Fair Exchange from PODC 2003}, howpublished = {Cryptology ePrint Archive, Report 2003/146}, year = {2003}, url = {http://eprint.iacr.org/2003/146}, } @misc{cryptoeprint:2003:147, author = {Shai Halevi and Phillip Rogaway}, title = {A Parallelizable Enciphering Mode}, howpublished = {Cryptology ePrint Archive, Report 2003/147}, year = {2003}, url = {http://eprint.iacr.org/2003/147}, } @misc{cryptoeprint:2003:148, author = {Shai Halevi and Phillip Rogaway}, title = {A Tweakable Enciphering Mode}, howpublished = {Cryptology ePrint Archive, Report 2003/148}, year = {2003}, url = {http://eprint.iacr.org/2003/148}, } @misc{cryptoeprint:2003:149, author = {Danfeng Yao and Anna Lysyanskaya}, title = {Forward-Secure Hierarchical ID-Based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2003/149}, year = {2003}, url = {http://eprint.iacr.org/2003/149}, } @misc{cryptoeprint:2003:150, author = {Ran Canetti and Oded Goldreich and Shai Halevi}, title = {On the random-oracle methodology as applied to length-restricted signature schemes}, howpublished = {Cryptology ePrint Archive, Report 2003/150}, year = {2003}, url = {http://eprint.iacr.org/2003/150}, } @misc{cryptoeprint:2003:151, author = {Jaume Martí-Farré and Carles Padró}, title = {Secret sharing schemes on sparse homogeneous access structures with rank three}, howpublished = {Cryptology ePrint Archive, Report 2003/151}, year = {2003}, url = {http://eprint.iacr.org/2003/151}, } @misc{cryptoeprint:2003:152, author = {Eric Brier and Christophe Clavier and Francis Olivier}, title = {Optimal Statistical Power Analysis}, howpublished = {Cryptology ePrint Archive, Report 2003/152}, year = {2003}, url = {http://eprint.iacr.org/2003/152}, } @misc{cryptoeprint:2003:153, author = {Zhen-Feng ZHANG and Jing XU and Deng-Guo FENG}, title = {Attack on an Identification Scheme Based on Gap Diffie-Hellman Problem}, howpublished = {Cryptology ePrint Archive, Report 2003/153}, year = {2003}, url = {http://eprint.iacr.org/2003/153}, } @misc{cryptoeprint:2003:154, author = {Cheryl Beaver and Timothy Draelos and Richard Schroeppel and Mark Torgerson}, title = {ManTiCore: Encryption with Joint Cipher-State Authentication}, howpublished = {Cryptology ePrint Archive, Report 2003/154}, year = {2003}, url = {http://eprint.iacr.org/2003/154}, } @misc{cryptoeprint:2003:155, author = {huafei zhu}, title = {A Formal Proof of Zhu's Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2003/155}, year = {2003}, url = {http://eprint.iacr.org/2003/155}, } @misc{cryptoeprint:2003:156, author = {Tri Van Le}, title = {Efficient Provably Secure Public Key Steganography}, howpublished = {Cryptology ePrint Archive, Report 2003/156}, year = {2003}, url = {http://eprint.iacr.org/2003/156}, } @misc{cryptoeprint:2003:157, author = {Kaoru Kurosawa and Tsuyoshi Takagi }, title = {Some RSA-based Encryption Schemes with Tight Security Reduction }, howpublished = {Cryptology ePrint Archive, Report 2003/157}, year = {2003}, url = {http://eprint.iacr.org/2003/157}, } @misc{cryptoeprint:2003:158, author = {Mridul Nandi}, title = {A Sufficient Condition and Optimal Domain Extension of UOWHF}, howpublished = {Cryptology ePrint Archive, Report 2003/158}, year = {2003}, url = {http://eprint.iacr.org/2003/158}, } @misc{cryptoeprint:2003:159, author = {Cesar Alison Monteiro Paixão}, title = {An efficient variant of the RSA cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2003/159}, year = {2003}, url = {http://eprint.iacr.org/2003/159}, } @misc{cryptoeprint:2003:160, author = {Jiun-Ming Chen and Bo-Yin Yang}, title = {A More Secure and Efficacious TTS Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2003/160}, year = {2003}, url = {http://eprint.iacr.org/2003/160}, } @misc{cryptoeprint:2003:161, author = {Ueli Maurer and Renato Renner and Clemens Holenstein}, title = {Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology}, howpublished = {Cryptology ePrint Archive, Report 2003/161}, year = {2003}, url = {http://eprint.iacr.org/2003/161}, } @misc{cryptoeprint:2003:162, author = {Alex Biryukov and Joseph Lano and Bart Preneel}, title = {Cryptanalysis of the Alleged SecurID Hash Function}, howpublished = {Cryptology ePrint Archive, Report 2003/162}, year = {2003}, url = {http://eprint.iacr.org/2003/162}, } @misc{cryptoeprint:2003:163, author = {Xavier Boyen}, title = {Multipurpose Identity-Based Signcryption : A Swiss Army Knife for Identity-Based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2003/163}, year = {2003}, url = {http://eprint.iacr.org/2003/163}, } @misc{cryptoeprint:2003:164, author = {Joonsang Baek and Yuliang Zheng}, title = {Identity-Based Threshold Decryption}, howpublished = {Cryptology ePrint Archive, Report 2003/164}, year = {2003}, url = {http://eprint.iacr.org/2003/164}, } @misc{cryptoeprint:2003:165, author = {Andreas Winter, Anderson C. A. Nascimento, Hideki Imai}, title = {Commitment Capacity of Discrete Memoryless Channels}, howpublished = {Cryptology ePrint Archive, Report 2003/165}, year = {2003}, url = {http://eprint.iacr.org/2003/165}, } @misc{cryptoeprint:2003:166, author = {Igor Semaev}, title = {A reduction of the space for the parallelized Pollard lambda search on elliptic curves over prime finite fields and on anomalous binary elliptic curves}, howpublished = {Cryptology ePrint Archive, Report 2003/166}, year = {2003}, url = {http://eprint.iacr.org/2003/166}, } @misc{cryptoeprint:2003:167, author = {Giuseppe Ateniese and Breno de Medeiros }, title = {Identity-based Chameleon Hash and Applications}, howpublished = {Cryptology ePrint Archive, Report 2003/167}, year = {2003}, url = {http://eprint.iacr.org/2003/167}, } @misc{cryptoeprint:2003:168, author = {Jean-Camille Birget and Dawei Hong and Nasir Memon}, title = {Robust discretization, with an application to graphical passwords}, howpublished = {Cryptology ePrint Archive, Report 2003/168}, year = {2003}, url = {http://eprint.iacr.org/2003/168}, } @misc{cryptoeprint:2003:169, author = {Boris Pogorelov and Marina Pudovkina }, title = {Properties of the Transformation Semigroup of the Solitaire Stream Cipher }, howpublished = {Cryptology ePrint Archive, Report 2003/169}, year = {2003}, url = {http://eprint.iacr.org/2003/169}, } @misc{cryptoeprint:2003:170, author = {Mahalingam Ramkumar and Nasir Memon}, title = {HARPS: HAshed Random Preloaded Subset Key Distribution}, howpublished = {Cryptology ePrint Archive, Report 2003/170}, year = {2003}, url = {http://eprint.iacr.org/2003/170}, } @misc{cryptoeprint:2003:171, author = {Jonathan Katz and Moti Yung}, title = {Scalable Protocols for Authenticated Group Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2003/171}, year = {2003}, url = {http://eprint.iacr.org/2003/171}, } @misc{cryptoeprint:2003:172, author = {Nick Howgrave-Graham and Joseph H. Silverman and Ari Singer and William Whyte}, title = {NAEP: Provable Security in the Presence of Decryption Failures}, howpublished = {Cryptology ePrint Archive, Report 2003/172}, year = {2003}, url = {http://eprint.iacr.org/2003/172}, } @misc{cryptoeprint:2003:173, author = {Palash Sarkar}, title = {Domain Extender for Collision Resistant Hash Functions: Improving Upon Merkle-Damgaard Iteration}, howpublished = {Cryptology ePrint Archive, Report 2003/173}, year = {2003}, url = {http://eprint.iacr.org/2003/173}, } @misc{cryptoeprint:2003:174, author = {Ran Canetti and Hugo Krawczyk and Jesper Nielsen}, title = {Relaxing Chosen-Ciphertext Security}, howpublished = {Cryptology ePrint Archive, Report 2003/174}, year = {2003}, url = {http://eprint.iacr.org/2003/174}, } @misc{cryptoeprint:2003:175, author = {David Naccache}, title = {Double-Speed Safe Prime Generation}, howpublished = {Cryptology ePrint Archive, Report 2003/175}, year = {2003}, url = {http://eprint.iacr.org/2003/175}, } @misc{cryptoeprint:2003:176, author = {S. Gangopadhyay and P. H. Keskar and S. Maitra}, title = {Patterson-Wiedemann Construction Revisited}, howpublished = {Cryptology ePrint Archive, Report 2003/176}, year = {2003}, url = {http://eprint.iacr.org/2003/176}, } @misc{cryptoeprint:2003:177, author = {Tadayoshi Kohno and Adriana Palacio and John Black}, title = {Building Secure Cryptographic Transforms, or How to Encrypt and MAC}, howpublished = {Cryptology ePrint Archive, Report 2003/177}, year = {2003}, url = {http://eprint.iacr.org/2003/177}, } @misc{cryptoeprint:2003:178, author = {Huafei Zhu}, title = {Constructing Optimistic Fair Exchange Protocols from Committed Signatures}, howpublished = {Cryptology ePrint Archive, Report 2003/178}, year = {2003}, url = {http://eprint.iacr.org/2003/178}, } @misc{cryptoeprint:2003:179, author = {Bartosz Zoltak}, title = {VMPC One-Way Function}, howpublished = {Cryptology ePrint Archive, Report 2003/179}, year = {2003}, url = {http://eprint.iacr.org/2003/179}, } @misc{cryptoeprint:2003:180, author = {Pradeep Kumar Mishra and Palash Sarkar}, title = {Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2003/180}, year = {2003}, url = {http://eprint.iacr.org/2003/180}, } @misc{cryptoeprint:2003:181, author = {Rui Zhang and Goichiro Hanaoka and Junji Shikata and Hideki Imai}, title = {On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?}, howpublished = {Cryptology ePrint Archive, Report 2003/181}, year = {2003}, url = {http://eprint.iacr.org/2003/181}, } @misc{cryptoeprint:2003:182, author = {Ran Canetti, Shai Halevi, and Jonathan Katz}, title = {Chosen-Ciphertext Security from Identity-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2003/182}, year = {2003}, url = {http://eprint.iacr.org/2003/182}, } @misc{cryptoeprint:2003:183, author = {Craig Gentry}, title = {Certificate-Based Encryption and the Certificate Revocation Problem}, howpublished = {Cryptology ePrint Archive, Report 2003/183}, year = {2003}, url = {http://eprint.iacr.org/2003/183}, } @misc{cryptoeprint:2003:184, author = {Nicolas T. Courtois and Guilhem Castagnos and Louis Goubin}, title = {What do DES S-boxes Say to Each Other ?}, howpublished = {Cryptology ePrint Archive, Report 2003/184}, year = {2003}, url = {http://eprint.iacr.org/2003/184}, } @misc{cryptoeprint:2003:185, author = {Bartosz Zoltak}, title = {VMPC Stream Cipher}, howpublished = {Cryptology ePrint Archive, Report 2003/185}, year = {2003}, url = {http://eprint.iacr.org/2003/185}, } @misc{cryptoeprint:2003:186, author = {Michael J. Wiener}, title = {Safe Prime Generation with a Combined Sieve}, howpublished = {Cryptology ePrint Archive, Report 2003/186}, year = {2003}, url = {http://eprint.iacr.org/2003/186}, } @misc{cryptoeprint:2003:187, author = {Tatsuaki Okamoto and Ryo Kashima}, title = {Resource Bounded Unprovability of Computational Lower Bounds }, howpublished = {Cryptology ePrint Archive, Report 2003/187}, year = {2003}, url = {http://eprint.iacr.org/2003/187}, } @misc{cryptoeprint:2003:188, author = {Fei Hu and Chwan-Hwa Wu and J. D. Irwin }, title = {A New Forward Secure Signature Scheme using Bilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2003/188}, year = {2003}, url = {http://eprint.iacr.org/2003/188}, } @misc{cryptoeprint:2003:189, author = {Zuhua Shao}, title = {Cryptanalysis of publicly verifiable authenticated encryption}, howpublished = {Cryptology ePrint Archive, Report 2003/189}, year = {2003}, url = {http://eprint.iacr.org/2003/189}, } @misc{cryptoeprint:2003:190, author = {Rana Barua and Ratna Dutta and Palash Sarkar}, title = {Extending Joux's Protocol to Multi Party Key Agreement}, howpublished = {Cryptology ePrint Archive, Report 2003/190}, year = {2003}, url = {http://eprint.iacr.org/2003/190}, } @misc{cryptoeprint:2003:191, author = {David Naccache and Nigel Smart and Jacques Stern}, title = {Projective Coordinates Leak}, howpublished = {Cryptology ePrint Archive, Report 2003/191}, year = {2003}, url = {http://eprint.iacr.org/2003/191}, } @misc{cryptoeprint:2003:192, author = {Ron Steinfeld and Laurence Bull and Huaxiong Wang and Josef Pieprzyk}, title = {Universal Designated-Verifier Signatures}, howpublished = {Cryptology ePrint Archive, Report 2003/192}, year = {2003}, url = {http://eprint.iacr.org/2003/192}, } @misc{cryptoeprint:2003:193, author = {Ron Steinfeld and Huaxiong Wang and Josef Pieprzyk}, title = {Efficient Extension of Standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures}, howpublished = {Cryptology ePrint Archive, Report 2003/193}, year = {2003}, url = {http://eprint.iacr.org/2003/193}, } @misc{cryptoeprint:2003:194, author = {Guilin Wang}, title = {Security Analysis of Several Group Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2003/194}, year = {2003}, url = {http://eprint.iacr.org/2003/194}, } @misc{cryptoeprint:2003:195, author = {Dan Boneh and Giovanni Di Crescenzo and Rafail Ostrovsky and Giuseppe Persiano}, title = {Public Key Encryption with keyword Search}, howpublished = {Cryptology ePrint Archive, Report 2003/195}, year = {2003}, url = {http://eprint.iacr.org/2003/195}, } @misc{cryptoeprint:2003:196, author = {Guilin Wang, Feng Bao, Jianying Zhou, and Robert H. Deng}, title = {Security Analysis of Some Proxy Signatures}, howpublished = {Cryptology ePrint Archive, Report 2003/196}, year = {2003}, url = {http://eprint.iacr.org/2003/196}, } @misc{cryptoeprint:2003:197, author = {Javier Herranz and German Saez}, title = {Revisiting fully distributed proxy signature schemes}, howpublished = {Cryptology ePrint Archive, Report 2003/197}, year = {2003}, url = {http://eprint.iacr.org/2003/197}, } @misc{cryptoeprint:2003:198, author = {Kishan Chand Gupta and Palash Sarkar}, title = {Construction of Perfect Nonlinear and Maximally Nonlinear Multi-Output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria}, howpublished = {Cryptology ePrint Archive, Report 2003/198}, year = {2003}, url = {http://eprint.iacr.org/2003/198}, } @misc{cryptoeprint:2003:199, author = {Simon R. Blackburn and Kenneth G. Paterson}, title = {Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan}, howpublished = {Cryptology ePrint Archive, Report 2003/199}, year = {2003}, url = {http://eprint.iacr.org/2003/199}, } @misc{cryptoeprint:2003:200, author = {Zheng Dong , Shengli Liu & kefei Chen}, title = {Cryptanalysis of B.Lee-S.Kim-K.Kim Proxy Signature}, howpublished = {Cryptology ePrint Archive, Report 2003/200}, year = {2003}, url = {http://eprint.iacr.org/2003/200}, } @misc{cryptoeprint:2003:201, author = {Zheng dong & KF.chen}, title = {an attack on a multisignature scheme}, howpublished = {Cryptology ePrint Archive, Report 2003/201}, year = {2003}, url = {http://eprint.iacr.org/2003/201}, } @misc{cryptoeprint:2003:202, author = {Willi Geiselmann and Rainer Steinwandt}, title = {Yet Another Sieving Device}, howpublished = {Cryptology ePrint Archive, Report 2003/202}, year = {2003}, url = {http://eprint.iacr.org/2003/202}, } @misc{cryptoeprint:2003:203, author = {Masanobu Katagi and Izuru Kitamura and Toru Akishita and Tsuyoshi Takagi}, title = {Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems using Degenerate Divisors}, howpublished = {Cryptology ePrint Archive, Report 2003/203}, year = {2003}, url = {http://eprint.iacr.org/2003/203}, } @misc{cryptoeprint:2003:204, author = {ZENG Xiangyong and HU Lei}, title = {A Composition Construction of Bent-Like Boolean Functions from Quadratic Polynomials}, howpublished = {Cryptology ePrint Archive, Report 2003/204}, year = {2003}, url = {http://eprint.iacr.org/2003/204}, } @misc{cryptoeprint:2003:205, author = {Scott Contini and Yiqun Lisa Yin}, title = {Improved Cryptanalysis of SecurID}, howpublished = {Cryptology ePrint Archive, Report 2003/205}, year = {2003}, url = {http://eprint.iacr.org/2003/205}, } @misc{cryptoeprint:2003:206, author = {Benoît Libert and Jean-Jacques Quisquater}, title = {Identity Based Undeniable Signatures}, howpublished = {Cryptology ePrint Archive, Report 2003/206}, year = {2003}, url = {http://eprint.iacr.org/2003/206}, } @misc{cryptoeprint:2003:207, author = {Guilin Wang, and Sihan Qing}, title = {Security Flaws in Several Group Signatures Proposed by Popescu}, howpublished = {Cryptology ePrint Archive, Report 2003/207}, year = {2003}, url = {http://eprint.iacr.org/2003/207}, } @misc{cryptoeprint:2003:208, author = {Fangguo Zhang and Reihaneh Safavi-Naini and Willy Susilo}, title = {ID-Based Chameleon Hashes from Bilinear Pairings}, howpublished = {Cryptology ePrint Archive, Report 2003/208}, year = {2003}, url = {http://eprint.iacr.org/2003/208}, } @misc{cryptoeprint:2003:209, author = {Daniel Augot and Matthieu Finiasz and Pierre Loidreau}, title = {Using the Trace Operator to repair the Polynomial Reconstruction based Cryptosystem presented at Eurocrypt 2003}, howpublished = {Cryptology ePrint Archive, Report 2003/209}, year = {2003}, url = {http://eprint.iacr.org/2003/209}, } @misc{cryptoeprint:2003:210, author = {Ventzislav Nikov and Svetla Nikova}, title = {On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes}, howpublished = {Cryptology ePrint Archive, Report 2003/210}, year = {2003}, url = {http://eprint.iacr.org/2003/210}, } @misc{cryptoeprint:2003:211, author = {Nicolas T. Courtois, Louis Goubin and Jacques Patarin}, title = {SFLASHv3, a fast asymmetric signature scheme}, howpublished = {Cryptology ePrint Archive, Report 2003/211}, year = {2003}, url = {http://eprint.iacr.org/2003/211}, } @misc{cryptoeprint:2003:212, author = {Jan Pelzl and Thomas Wollinger and Christof Paar}, title = {High Performance Arithmetic for Hyperelliptic Curve Cryptosystems of Genus Two}, howpublished = {Cryptology ePrint Archive, Report 2003/212}, year = {2003}, url = {http://eprint.iacr.org/2003/212}, } @misc{cryptoeprint:2003:213, author = {Y.Choie and E.Jeong}, title = {Isomorphism Classes of Hyperelliptic Curves of Genus 2 over $\mathbb{F}_{2^n}$}, howpublished = {Cryptology ePrint Archive, Report 2003/213}, year = {2003}, url = {http://eprint.iacr.org/2003/213}, } @misc{cryptoeprint:2003:214, author = {Rosario Gennaro}, title = {Multi-Trapdoor Commitments and their Applications to Non-Malleable Protocols}, howpublished = {Cryptology ePrint Archive, Report 2003/214}, year = {2003}, url = {http://eprint.iacr.org/2003/214}, } @misc{cryptoeprint:2003:215, author = {Bo Yang and Ramesh Karri and David Mcgrew}, title = {Divide and Concatenate: A Scalable Hardware Architecture for Universal MAC}, howpublished = {Cryptology ePrint Archive, Report 2003/215}, year = {2003}, url = {http://eprint.iacr.org/2003/215}, } @misc{cryptoeprint:2003:216, author = {Eu-Jin Goh}, title = {Secure Indexes}, howpublished = {Cryptology ePrint Archive, Report 2003/216}, year = {2003}, url = {http://eprint.iacr.org/2003/216}, } @misc{cryptoeprint:2003:217, author = {Eric Brier and David Naccache and Pascal Paillier}, title = {Chemical Combinatorial Attacks on Keyboards}, howpublished = {Cryptology ePrint Archive, Report 2003/217}, year = {2003}, url = {http://eprint.iacr.org/2003/217}, } @misc{cryptoeprint:2003:218, author = {David Wagner}, title = {A Security Evaluation of Whitenoise}, howpublished = {Cryptology ePrint Archive, Report 2003/218}, year = {2003}, url = {http://eprint.iacr.org/2003/218}, } @misc{cryptoeprint:2003:219, author = {Jean-Sebastien Coron}, title = {Cryptanalysis of the Repaired Public-key Encryption Scheme Based on the Polynomial Reconstruction Problem}, howpublished = {Cryptology ePrint Archive, Report 2003/219}, year = {2003}, url = {http://eprint.iacr.org/2003/219}, } @misc{cryptoeprint:2003:220, author = {Willi Geiselmann and Rainer Steinwandt}, title = {A short comment on the affine parts of SFLASH^{v3}}, howpublished = {Cryptology ePrint Archive, Report 2003/220}, year = {2003}, url = {http://eprint.iacr.org/2003/220}, } @misc{cryptoeprint:2003:221, author = {Jung Hee Cheon and Hyun Soo Nam}, title = {A Cryptanalysis of the Original Domingo-Ferrer's Algebraic Privacy Homomophism}, howpublished = {Cryptology ePrint Archive, Report 2003/221}, year = {2003}, url = {http://eprint.iacr.org/2003/221}, } @misc{cryptoeprint:2003:222, author = {Chunming Tang and Zhuojun Liu and Mingsheng Wang}, title = {A Verifiable Secret Sharing Scheme with Statistical zero-knowledge}, howpublished = {Cryptology ePrint Archive, Report 2003/222}, year = {2003}, url = {http://eprint.iacr.org/2003/222}, } @misc{cryptoeprint:2003:223, author = {Simon R. Blackburn, Carlos Cid and Steven D. Galbraith}, title = {Cryptanalysis of a Cryptosystem based on Drinfeld modules}, howpublished = {Cryptology ePrint Archive, Report 2003/223}, year = {2003}, url = {http://eprint.iacr.org/2003/223}, } @misc{cryptoeprint:2003:224, author = {}, title = {}, howpublished = {Cryptology ePrint Archive, Report 2003/224}, year = {2003}, url = {http://eprint.iacr.org/2003/224}, } @misc{cryptoeprint:2003:225, author = {Palash Sarkar}, title = {Masking Based Domain Extenders for UOWHFs: Bounds and Constructions}, howpublished = {Cryptology ePrint Archive, Report 2003/225}, year = {2003}, url = {http://eprint.iacr.org/2003/225}, } @misc{cryptoeprint:2003:226, author = {Guilin Wang}, title = {On the Security of a Group Signature Scheme with Forward Security}, howpublished = {Cryptology ePrint Archive, Report 2003/226}, year = {2003}, url = {http://eprint.iacr.org/2003/226}, } @misc{cryptoeprint:2003:227, author = {Willi Geiselmann and Rainer Steinwandt}, title = {Attacks on a Secure Group Communication Scheme With Hierarchical Access Control}, howpublished = {Cryptology ePrint Archive, Report 2003/227}, year = {2003}, url = {http://eprint.iacr.org/2003/227}, } @misc{cryptoeprint:2003:228, author = {Huafei Zhu}, title = {Verifiably Committed Signatures Provably Secure in The Standard Complexity Model}, howpublished = {Cryptology ePrint Archive, Report 2003/228}, year = {2003}, url = {http://eprint.iacr.org/2003/228}, } @misc{cryptoeprint:2003:229, author = {Dong Hoon Lee and Jaeheon Kim and Jin Hong and Jae Woo Han and Dukjae Moon}, title = {Algebraic Attacks on Summation Generators}, howpublished = {Cryptology ePrint Archive, Report 2003/229}, year = {2003}, url = {http://eprint.iacr.org/2003/229}, } @misc{cryptoeprint:2003:230, author = {Daniel Augot and Matthieu Finiasz and Nicolas Sendrier }, title = {A Fast Provably Secure Cryptographic Hash Function}, howpublished = {Cryptology ePrint Archive, Report 2003/230}, year = {2003}, url = {http://eprint.iacr.org/2003/230}, } @misc{cryptoeprint:2003:231, author = {Michael Backes and Christian Cachin}, title = {Public-Key Steganography with Active Attacks}, howpublished = {Cryptology ePrint Archive, Report 2003/231}, year = {2003}, url = {http://eprint.iacr.org/2003/231}, } @misc{cryptoeprint:2003:232, author = {Chunming Tang and Zhuojun Liu and Jinwang Liu}, title = {The Statistical Zero-knowledge Proof for Blum Integer Based on Discrete Logarithm}, howpublished = {Cryptology ePrint Archive, Report 2003/232}, year = {2003}, url = {http://eprint.iacr.org/2003/232}, } @misc{cryptoeprint:2003:233, author = {Luis von Ahn and Nicholas J. Hopper}, title = {Public Key Steganography}, howpublished = {Cryptology ePrint Archive, Report 2003/233}, year = {2003}, url = {http://eprint.iacr.org/2003/233}, } @misc{cryptoeprint:2003:234, author = {Gene Itkis and Peng Xie}, title = {Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary}, howpublished = {Cryptology ePrint Archive, Report 2003/234}, year = {2003}, url = {http://eprint.iacr.org/2003/234}, } @misc{cryptoeprint:2003:235, author = {Yevgeniy Dodis and Rafail Ostrovsky and Leonid Reyzin and Adam Smith}, title = {Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data}, howpublished = {Cryptology ePrint Archive, Report 2003/235}, year = {2003}, url = {http://eprint.iacr.org/2003/235}, } @misc{cryptoeprint:2003:236, author = {Elena Trichina}, title = {Combinational Logic Design for AES SubByte Transformation on Masked Data}, howpublished = {Cryptology ePrint Archive, Report 2003/236}, year = {2003}, url = {http://eprint.iacr.org/2003/236}, } @misc{cryptoeprint:2003:237, author = {Benoit Chevallier-Mames and Mathieu Ciet and Marc Joye}, title = {Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity}, howpublished = {Cryptology ePrint Archive, Report 2003/237}, year = {2003}, url = {http://eprint.iacr.org/2003/237}, } @misc{cryptoeprint:2003:238, author = {Xinjun Du and Ying Wang and Jianhua Ge and Yumin Wang}, title = {Chameleon Signature from Bilinear Pairing}, howpublished = {Cryptology ePrint Archive, Report 2003/238}, year = {2003}, url = {http://eprint.iacr.org/2003/238}, } @misc{cryptoeprint:2003:239, author = {Ran Canetti}, title = {Universally Composable Signatures, Certification and Authentication}, howpublished = {Cryptology ePrint Archive, Report 2003/239}, year = {2003}, url = {http://eprint.iacr.org/2003/239}, } @misc{cryptoeprint:2003:240, author = {Michael Backes and Dennis Hofheinz}, title = {How to Break and Repair a Universally Composable Signature Functionality}, howpublished = {Cryptology ePrint Archive, Report 2003/240}, year = {2003}, url = {http://eprint.iacr.org/2003/240}, } @misc{cryptoeprint:2003:241, author = {Shaoquan Jiang ang Guang Gong}, title = {Hybrid Broadcast Encryption and Security Analysis}, howpublished = {Cryptology ePrint Archive, Report 2003/241}, year = {2003}, url = {http://eprint.iacr.org/2003/241}, } @misc{cryptoeprint:2003:242, author = {Kirsten Eisentraeger and Kristin Lauter and Peter L. Montgomery}, title = {Improved Weil and Tate pairings for elliptic and hyperelliptic curves}, howpublished = {Cryptology ePrint Archive, Report 2003/242}, year = {2003}, url = {http://eprint.iacr.org/2003/242}, } @misc{cryptoeprint:2003:243, author = {Guilin Wang}, title = {An Attack on Not-interactive Designated Verifier Proofs for Undeniable Signatures}, howpublished = {Cryptology ePrint Archive, Report 2003/243}, year = {2003}, url = {http://eprint.iacr.org/2003/243}, } @misc{cryptoeprint:2003:244, author = {Tri Van Le and Kaoru Kurosawa}, title = {Efficient Public Key Steganography Secure Against Adaptively Chosen Stegotext Attacks}, howpublished = {Cryptology ePrint Archive, Report 2003/244}, year = {2003}, url = {http://eprint.iacr.org/2003/244}, } @misc{cryptoeprint:2003:245, author = {Willi Geiselmann and Rainer Steinwandt}, title = {A Key Substitution Attack on SFLASH^{v3}}, howpublished = {Cryptology ePrint Archive, Report 2003/245}, year = {2003}, url = {http://eprint.iacr.org/2003/245}, } @misc{cryptoeprint:2003:246, author = {Xin L¨¹ and Deng-Guo Feng}, title = {Quantum Digital Signature Based on Quantum One-way Functions}, howpublished = {Cryptology ePrint Archive, Report 2003/246}, year = {2003}, url = {http://eprint.iacr.org/2003/246}, } @misc{cryptoeprint:2003:247, author = {Xinjun Du and Ying Wang and Jianhua Ge and Yumin Wang}, title = {ID-based Authenticated Two Round Multi-Party Key Agreement}, howpublished = {Cryptology ePrint Archive, Report 2003/247}, year = {2003}, url = {http://eprint.iacr.org/2003/247}, } @misc{cryptoeprint:2003:248, author = {Izuru Kitamura and Masanobu Katagi}, title = {Efficient Implementation of Genus Three Hyperelliptic Curve Cryptography over GF(2^n)}, howpublished = {Cryptology ePrint Archive, Report 2003/248}, year = {2003}, url = {http://eprint.iacr.org/2003/248}, } @misc{cryptoeprint:2003:249, author = {Stephen Boren and Andre Brisson}, title = {Software Specifications For Tinnitus Utilizing Whitenoise(Revised Feb 2004)}, howpublished = {Cryptology ePrint Archive, Report 2003/249}, year = {2003}, url = {http://eprint.iacr.org/2003/249}, } @misc{cryptoeprint:2003:250, author = {Hongjun Wu}, title = {Breaking the Stream Cipher Whitenoise}, howpublished = {Cryptology ePrint Archive, Report 2003/250}, year = {2003}, url = {http://eprint.iacr.org/2003/250}, } @misc{cryptoeprint:2003:251, author = {EunKyung Jeong}, title = {Isomorphism Classes of Hyperelliptic Curves of genus 3 over finite fields}, howpublished = {Cryptology ePrint Archive, Report 2003/251}, year = {2003}, url = {http://eprint.iacr.org/2003/251}, } @misc{cryptoeprint:2003:252, author = {Philip MacKenzie and Ke Yang}, title = {On Simulation-Sound Trapdoor Commitments}, howpublished = {Cryptology ePrint Archive, Report 2003/252}, year = {2003}, url = {http://eprint.iacr.org/2003/252}, } @misc{cryptoeprint:2003:253, author = {Roberto Maria Avanzi}, title = {Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations}, howpublished = {Cryptology ePrint Archive, Report 2003/253}, year = {2003}, url = {http://eprint.iacr.org/2003/253}, } @misc{cryptoeprint:2003:254, author = {Yitchak Gertner and Amir Herzberg}, title = {Committing Encryption and Publicly-Verifiable SignCryption}, howpublished = {Cryptology ePrint Archive, Report 2003/254}, year = {2003}, url = {http://eprint.iacr.org/2003/254}, } @misc{cryptoeprint:2003:255, author = {Peter Fairbrother}, title = {Improved Constructions for Universal Re-encryption.}, howpublished = {Cryptology ePrint Archive, Report 2003/255}, year = {2003}, url = {http://eprint.iacr.org/2003/255}, } @misc{cryptoeprint:2003:256, author = {Jianying Zhou}, title = {On the Security of a Multi-Party Certified Email Protocol}, howpublished = {Cryptology ePrint Archive, Report 2003/256}, year = {2003}, url = {http://eprint.iacr.org/2003/256}, } @misc{cryptoeprint:2003:257, author = {Mathieu Ciet and Marc Joye and Kristin Lauter and Peter L. Montgomery}, title = {Trading Inversions for Multiplications in Elliptic Curve Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2003/257}, year = {2003}, url = {http://eprint.iacr.org/2003/257}, } @misc{cryptoeprint:2003:258, author = {Marcin Rogawski}, title = {Analysis of Implementation Hierocrypt-3 algorithm (and its comparison to Camellia algorithm) using ALTERA devices.}, howpublished = {Cryptology ePrint Archive, Report 2003/258}, year = {2003}, url = {http://eprint.iacr.org/2003/258}, } @misc{cryptoeprint:2003:259, author = {Fangguo Zhang and Xiaofeng Chen}, title = {Attack on Two ID-based Authenticated Group Key Agreement Schemes}, howpublished = {Cryptology ePrint Archive, Report 2003/259}, year = {2003}, url = {http://eprint.iacr.org/2003/259}, } @misc{cryptoeprint:2003:260, author = {Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang}, title = {An Improved ID-based Authenticated Group Key Agreement Scheme}, howpublished = {Cryptology ePrint Archive, Report 2003/260}, year = {2003}, url = {http://eprint.iacr.org/2003/260}, } @misc{cryptoeprint:2003:261, author = {Javier Herranz and Germ\'an S\'aez}, title = {A provably secure ID-based ring signature scheme}, howpublished = {Cryptology ePrint Archive, Report 2003/261}, year = {2003}, url = {http://eprint.iacr.org/2003/261}, } @misc{cryptoeprint:2003:262, author = {Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu and K.P. Chow}, title = {A Secure Modified ID-Based Undeniable Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2003/262}, year = {2003}, url = {http://eprint.iacr.org/2003/262}, } @misc{cryptoeprint:2003:263, author = {Manik Lal Das and Ashutosh Saxena and V P Gulati}, title = {Security Analysis of Lal and Awasthi's Proxy Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2003/263}, year = {2003}, url = {http://eprint.iacr.org/2003/263}, } @misc{cryptoeprint:2003:264, author = {Pradeep Kumar Mishra and Palash Sarkar}, title = {Inversion of Several Field Elements: A New Parallel Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2003/264}, year = {2003}, url = {http://eprint.iacr.org/2003/264}, } @misc{cryptoeprint:2003:265, author = {Yunlei ZHAO}, title = {Concurrent/Resettable Zero-Knowledge With Concurrent Soundness in the Bare Public-Key Model and Its Applications}, howpublished = {Cryptology ePrint Archive, Report 2003/265}, year = {2003}, url = {http://eprint.iacr.org/2003/265}, } @misc{cryptoeprint:2004:002, author = {Yuichi Komano and Kazuo Ohta}, title = {Efficient Universal Padding Schemes for Multiplicative Trapdoor One-way Permutation}, howpublished = {Cryptology ePrint Archive, Report 2004/002}, year = {2004}, url = {http://eprint.iacr.org/2004/002}, } @misc{cryptoeprint:2004:003, author = {Erik Zenner}, title = {On the Role of the Inner State Size in Stream Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2004/003}, year = {2004}, url = {http://eprint.iacr.org/2004/003}, } @misc{cryptoeprint:2004:004, author = {None}, title = {None}, howpublished = {Cryptology ePrint Archive, Report 2004/004}, year = {2004}, url = {http://eprint.iacr.org/2004/004}, } @misc{cryptoeprint:2004:005, author = {Huafei Zhu}, title = {Universal Undeniable Signatures}, howpublished = {Cryptology ePrint Archive, Report 2004/005}, year = {2004}, url = {http://eprint.iacr.org/2004/005}, } @misc{cryptoeprint:2004:006, author = {Boaz Barak and Yehuda Lindell and Tal Rabin}, title = {Protocol Initialization for the Framework of Universal Composability}, howpublished = {Cryptology ePrint Archive, Report 2004/006}, year = {2004}, url = {http://eprint.iacr.org/2004/006}, } @misc{cryptoeprint:2004:007, author = {Aggelos Kiayias and Yiannis Tsiounis and Moti Yung}, title = {Traceable Signatures}, howpublished = {Cryptology ePrint Archive, Report 2004/007}, year = {2004}, url = {http://eprint.iacr.org/2004/007}, } @misc{cryptoeprint:2004:008, author = {Mihir Bellare and Adriana Palacio}, title = {The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols}, howpublished = {Cryptology ePrint Archive, Report 2004/008}, year = {2004}, url = {http://eprint.iacr.org/2004/008}, } @misc{cryptoeprint:2004:009, author = {Juan A. Garay and Philip MacKenzie and Ke Yang}, title = {Efficient and Secure Multi-Party Computation with Faulty Majority and Complete Fairness}, howpublished = {Cryptology ePrint Archive, Report 2004/009}, year = {2004}, url = {http://eprint.iacr.org/2004/009}, } @misc{cryptoeprint:2004:010, author = {Tom St Denis}, title = {Fast Pseudo-Hadamard Transforms}, howpublished = {Cryptology ePrint Archive, Report 2004/010}, year = {2004}, url = {http://eprint.iacr.org/2004/010}, } @misc{cryptoeprint:2004:011, author = {Adam J. Slagell}, title = {Known-Plaintext Attack Against a Permutation Based Video}, howpublished = {Cryptology ePrint Archive, Report 2004/011}, year = {2004}, url = {http://eprint.iacr.org/2004/011}, } @misc{cryptoeprint:2004:012, author = {Maria Isabel Gonzalez Vasco and Rainer Steinwandt }, title = {Pitfalls in public key cryptosystems based on free partially commutative monoids and groups }, howpublished = {Cryptology ePrint Archive, Report 2004/012}, year = {2004}, url = {http://eprint.iacr.org/2004/012}, } @misc{cryptoeprint:2004:013, author = {Jean-Sebastien Coron and Antoine Joux}, title = {Cryptanalysis of a Provably Secure Cryptographic Hash Function}, howpublished = {Cryptology ePrint Archive, Report 2004/013}, year = {2004}, url = {http://eprint.iacr.org/2004/013}, } @misc{cryptoeprint:2004:014, author = {Sugata Gangopadhyay and Subhamoy Maitra}, title = {Crosscorrelation Spectra of Dillon and Patterson-Wiedemann type Boolean Functions}, howpublished = {Cryptology ePrint Archive, Report 2004/014}, year = {2004}, url = {http://eprint.iacr.org/2004/014}, } @misc{cryptoeprint:2004:015, author = {Trond St{\o}len Gustavsen and Kristian Ranestad}, title = {An AGM-type elliptic curve point counting algorithm in characteristic three}, howpublished = {Cryptology ePrint Archive, Report 2004/015}, year = {2004}, url = {http://eprint.iacr.org/2004/015}, } @misc{cryptoeprint:2004:016, author = {Dennis Hofheinz and Joern Mueller-Quade}, title = {A Synchronous Model for Multi-Party Computation and the Incompleteness of Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2004/016}, year = {2004}, url = {http://eprint.iacr.org/2004/016}, } @misc{cryptoeprint:2004:017, author = {M. Scott}, title = {Cryptanalysis of an ID-based Password Authentication Scheme using Smart Cards and Fingerprints}, howpublished = {Cryptology ePrint Archive, Report 2004/017}, year = {2004}, url = {http://eprint.iacr.org/2004/017}, } @misc{cryptoeprint:2004:018, author = {Song-Ju Kim and Ken Umeno and Akio Hasegawa}, title = {Corrections of the NIST Statistical Test Suite for Randomness}, howpublished = {Cryptology ePrint Archive, Report 2004/018}, year = {2004}, url = {http://eprint.iacr.org/2004/018}, } @misc{cryptoeprint:2004:019, author = {Tetsu Iwata and Tadayoshi Kohno}, title = {New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2004/019}, year = {2004}, url = {http://eprint.iacr.org/2004/019}, } @misc{cryptoeprint:2004:020, author = {Yevgeniy Dodis and Michael J. Freedman and Stanislaw Jarecki and Shabsi Walfish}, title = {Optimal Signcryption from Any Trapdoor Permutation}, howpublished = {Cryptology ePrint Archive, Report 2004/020}, year = {2004}, url = {http://eprint.iacr.org/2004/020}, } @misc{cryptoeprint:2004:021, author = {Claude Barral and Jean-S\'{e}bastien Coron and David Naccache}, title = {Externalized Fingerprint Matching}, howpublished = {Cryptology ePrint Archive, Report 2004/021}, year = {2004}, url = {http://eprint.iacr.org/2004/021}, } @misc{cryptoeprint:2004:022, author = {Steven M. Bellovin and William R. Cheswick}, title = {Privacy-Enhanced Searches Using Encrypted Bloom Filters}, howpublished = {Cryptology ePrint Archive, Report 2004/022}, year = {2004}, url = {http://eprint.iacr.org/2004/022}, } @misc{cryptoeprint:2004:023, author = {Asnat Dadon-Elichai}, title = {RDS: Remote Distributed Scheme for Protecting Mobile Agents}, howpublished = {Cryptology ePrint Archive, Report 2004/023}, year = {2004}, url = {http://eprint.iacr.org/2004/023}, } @misc{cryptoeprint:2004:024, author = {Sergey Agievich and Andrey Afonenko}, title = {Exponential S-boxes}, howpublished = {Cryptology ePrint Archive, Report 2004/024}, year = {2004}, url = {http://eprint.iacr.org/2004/024}, } @misc{cryptoeprint:2004:025, author = {Hamilton E. Link and William D. Neumann}, title = {Clarifying Obfuscation: Improving the Security of White-Box Encoding}, howpublished = {Cryptology ePrint Archive, Report 2004/025}, year = {2004}, url = {http://eprint.iacr.org/2004/025}, } @misc{cryptoeprint:2004:026, author = {Tom St Denis}, title = {The CSQUARE Transform}, howpublished = {Cryptology ePrint Archive, Report 2004/026}, year = {2004}, url = {http://eprint.iacr.org/2004/026}, } @misc{cryptoeprint:2004:027, author = {Joseph K. Liu and Victor K. Wei and Duncan S. Wong}, title = {Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups}, howpublished = {Cryptology ePrint Archive, Report 2004/027}, year = {2004}, url = {http://eprint.iacr.org/2004/027}, } @misc{cryptoeprint:2004:028, author = {Joseph K. Liu and Victor K. Wei and Duncan S. Wong}, title = {Custodian-Hiding Verifiable Encryption}, howpublished = {Cryptology ePrint Archive, Report 2004/028}, year = {2004}, url = {http://eprint.iacr.org/2004/028}, } @misc{cryptoeprint:2004:029, author = {Guido Bertoni and Luca Breveglieri and Thomas Wollinger and Christof Paar}, title = {Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2004/029}, year = {2004}, url = {http://eprint.iacr.org/2004/029}, } @misc{cryptoeprint:2004:030, author = {Colin Stahlke}, title = {Point Compression on Jacobians of Hyperelliptic Curves over $\F_q$.}, howpublished = {Cryptology ePrint Archive, Report 2004/030}, year = {2004}, url = {http://eprint.iacr.org/2004/030}, } @misc{cryptoeprint:2004:031, author = {Igor Semaev}, title = {Summation polynomials and the discrete logarithm problem on elliptic curves}, howpublished = {Cryptology ePrint Archive, Report 2004/031}, year = {2004}, url = {http://eprint.iacr.org/2004/031}, } @misc{cryptoeprint:2004:032, author = {Michael Scott and Paulo S. L. M. Barreto}, title = {Compressed Pairings}, howpublished = {Cryptology ePrint Archive, Report 2004/032}, year = {2004}, url = {http://eprint.iacr.org/2004/032}, } @misc{cryptoeprint:2004:033, author = {Muxiang Zhang}, title = {New Approaches to Password Authenticated Key Exchange based on RSA}, howpublished = {Cryptology ePrint Archive, Report 2004/033}, year = {2004}, url = {http://eprint.iacr.org/2004/033}, } @misc{cryptoeprint:2004:034, author = {Gideon Samid}, title = {s(n) An Arithmetic Function of Some Interest, and Related Arithmetic}, howpublished = {Cryptology ePrint Archive, Report 2004/034}, year = {2004}, url = {http://eprint.iacr.org/2004/034}, } @misc{cryptoeprint:2004:035, author = {Phillip Rogaway and Thomas Shrimpton}, title = {Cryptographic Hash-Function Basics: Definitions, Implications and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance}, howpublished = {Cryptology ePrint Archive, Report 2004/035}, year = {2004}, url = {http://eprint.iacr.org/2004/035}, } @misc{cryptoeprint:2004:036, author = {Yan-Cheng Chang}, title = {Single Database Private Information Retrieval with Logarithmic Communication}, howpublished = {Cryptology ePrint Archive, Report 2004/036}, year = {2004}, url = {http://eprint.iacr.org/2004/036}, } @misc{cryptoeprint:2004:037, author = {Fuw-Yi Yang and Jinn-Ke Jan}, title = {A Provably Secure Scheme for Restrictive Partially Blind Signatures}, howpublished = {Cryptology ePrint Archive, Report 2004/037}, year = {2004}, url = {http://eprint.iacr.org/2004/037}, } @misc{cryptoeprint:2004:038, author = {Xiaofeng Chen and Fangguo Zhang and Kwangjo Kim }, title = {Chameleon Hashing without Key Exposure}, howpublished = {Cryptology ePrint Archive, Report 2004/038}, year = {2004}, url = {http://eprint.iacr.org/2004/038}, } @misc{cryptoeprint:2004:039, author = {Victor K. Wei}, title = {A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups}, howpublished = {Cryptology ePrint Archive, Report 2004/039}, year = {2004}, url = {http://eprint.iacr.org/2004/039}, } @misc{cryptoeprint:2004:040, author = {Lizhen Yang, Kefei Chen}, title = {Cryptanalysis of a timestamp-based password authentication scheme}, howpublished = {Cryptology ePrint Archive, Report 2004/040}, year = {2004}, url = {http://eprint.iacr.org/2004/040}, } @misc{cryptoeprint:2004:041, author = {Cheng-Kang Chu and Wen-Guey Tzeng}, title = {Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-Adaptive Queries}, howpublished = {Cryptology ePrint Archive, Report 2004/041}, year = {2004}, url = {http://eprint.iacr.org/2004/041}, } @misc{cryptoeprint:2004:042, author = {Joseph K. Liu and Victor K. Wei and Duncan S. Wong}, title = {Cryptanalyzing Bresson, et al.'s Spontaneous Anonymous Threshold Signature for Ad Hoc Groups and Patching via Updating Cramer, et al.'s Threshold Proof-of-Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2004/042}, year = {2004}, url = {http://eprint.iacr.org/2004/042}, } @misc{cryptoeprint:2004:043, author = {Xiutao Feng, Quanlong Wang and Zongduo Dai}, title = {Multi-sequences with d-perfect property}, howpublished = {Cryptology ePrint Archive, Report 2004/043}, year = {2004}, url = {http://eprint.iacr.org/2004/043}, } @misc{cryptoeprint:2004:044, author = {Zhou Sujing}, title = {Transitive Signatures Based on Non-adaptive Standard Signatures}, howpublished = {Cryptology ePrint Archive, Report 2004/044}, year = {2004}, url = {http://eprint.iacr.org/2004/044}, } @misc{cryptoeprint:2004:045, author = {Yehuda Lindell}, title = {Lower Bounds and Impossibility Results for Concurrent Self Composition}, howpublished = {Cryptology ePrint Archive, Report 2004/045}, year = {2004}, url = {http://eprint.iacr.org/2004/045}, } @misc{cryptoeprint:2004:046, author = {Lih-Chung Wang and Fei-Hwang Chang}, title = {Revision of Tractable Rational Map Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2004/046}, year = {2004}, url = {http://eprint.iacr.org/2004/046}, } @misc{cryptoeprint:2004:047, author = {Yodai Watanabe}, title = {On a zero-knowledge property of arguments of knowledge based on secure public key encryption schemes}, howpublished = {Cryptology ePrint Archive, Report 2004/047}, year = {2004}, url = {http://eprint.iacr.org/2004/047}, } @misc{cryptoeprint:2004:048, author = {Bartosz Zoltak}, title = {Tail-MAC: A Message Authentication Scheme for Stream Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2004/048}, year = {2004}, url = {http://eprint.iacr.org/2004/048}, } @misc{cryptoeprint:2004:049, author = {Christophe Clavier}, title = {Side Channel Analysis for Reverse Engineering (SCARE) - An Improved Attack Against a Secret A3/A8 GSM Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2004/049}, year = {2004}, url = {http://eprint.iacr.org/2004/049}, } @misc{cryptoeprint:2004:050, author = {Lizhen Yang, Xiaoyun Wang, Dong Zheng, Kefei Chen}, title = {Yet another attack on a password authentication scheme based on quadratic residues with parameters unknown 1}, howpublished = {Cryptology ePrint Archive, Report 2004/050}, year = {2004}, url = {http://eprint.iacr.org/2004/050}, } @misc{cryptoeprint:2004:051, author = {Yan-Cheng Chang and Michael Mitzenmacher}, title = {Privacy Preserving Keyword Searches on Remote Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2004/051}, year = {2004}, url = {http://eprint.iacr.org/2004/051}, } @misc{cryptoeprint:2004:052, author = {Tal Malkin and Satoshi Obana and Moti Yung}, title = {The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures}, howpublished = {Cryptology ePrint Archive, Report 2004/052}, year = {2004}, url = {http://eprint.iacr.org/2004/052}, } @misc{cryptoeprint:2004:053, author = {Juan Garay and Philip MacKenzie and Ke Yang}, title = {Efficient and Universally Composable Committed Oblivious Transfer and Applications}, howpublished = {Cryptology ePrint Archive, Report 2004/053}, year = {2004}, url = {http://eprint.iacr.org/2004/053}, } @misc{cryptoeprint:2004:054, author = {Guilin Wang, Feng Bao, Jianying Zhou, and Robert H. Deng}, title = {Comments on a Threshold Proxy Signature Scheme Based on the RSA Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2004/054}, year = {2004}, url = {http://eprint.iacr.org/2004/054}, } @misc{cryptoeprint:2004:055, author = {Christophe Doche}, title = {Redundant Trinomials for Finite Fields of Characteristic $2$}, howpublished = {Cryptology ePrint Archive, Report 2004/055}, year = {2004}, url = {http://eprint.iacr.org/2004/055}, } @misc{cryptoeprint:2004:057, author = {Alex Biryukov and Christophe De Canni\`ere and Michael Quisquater}, title = {On Multiple Linear Approximations}, howpublished = {Cryptology ePrint Archive, Report 2004/057}, year = {2004}, url = {http://eprint.iacr.org/2004/057}, } @misc{cryptoeprint:2004:058, author = {Michael Scott and Paulo S.L.M Barreto}, title = {Generating more MNT elliptic curves}, howpublished = {Cryptology ePrint Archive, Report 2004/058}, year = {2004}, url = {http://eprint.iacr.org/2004/058}, } @misc{cryptoeprint:2004:059, author = {Michael Backes and Birgit Pfitzmann}, title = {Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library}, howpublished = {Cryptology ePrint Archive, Report 2004/059}, year = {2004}, url = {http://eprint.iacr.org/2004/059}, } @misc{cryptoeprint:2004:060, author = {Benjamin Lynn and Manoj Prabhakaran and Amit Sahai}, title = {Positive Results and Techniques for Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2004/060}, year = {2004}, url = {http://eprint.iacr.org/2004/060}, } @misc{cryptoeprint:2004:061, author = {Bo-Yin Yang and Jiun-Ming Chen}, title = {TTS: Rank Attacks in Tame-Like Multivariate PKCs}, howpublished = {Cryptology ePrint Archive, Report 2004/061}, year = {2004}, url = {http://eprint.iacr.org/2004/061}, } @misc{cryptoeprint:2004:062, author = {John Black and Martin Cochran and Thomas Shrimpton}, title = {On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2004/062}, year = {2004}, url = {http://eprint.iacr.org/2004/062}, } @misc{cryptoeprint:2004:063, author = {Helger Lipmaa}, title = {An Oblivious Transfer Protocol with Log-Squared Communication}, howpublished = {Cryptology ePrint Archive, Report 2004/063}, year = {2004}, url = {http://eprint.iacr.org/2004/063}, } @misc{cryptoeprint:2004:064, author = {Ratna Dutta and Rana Barua and Palash Sarkar}, title = {Pairing-Based Cryptographic Protocols : A Survey}, howpublished = {Cryptology ePrint Archive, Report 2004/064}, year = {2004}, url = {http://eprint.iacr.org/2004/064}, } @misc{cryptoeprint:2004:065, author = {Ian Blake, Kumar Murty, and Guangwu Xu}, title = {Refinements of Miller's Algorithm for Computing Weil/Tate Pairing}, howpublished = {Cryptology ePrint Archive, Report 2004/065}, year = {2004}, url = {http://eprint.iacr.org/2004/065}, } @misc{cryptoeprint:2004:066, author = {Kris Tiri and Ingrid Verbauwhede}, title = {A Dynamic and Differential CMOS Logic Style to Resist Power and Timing Attacks on Security IC’s.}, howpublished = {Cryptology ePrint Archive, Report 2004/066}, year = {2004}, url = {http://eprint.iacr.org/2004/066}, } @misc{cryptoeprint:2004:067, author = {Kris Tiri and Ingrid Verbauwhede}, title = {Charge Recycling Sense Amplifier Based Logic: Securing Low Power Security IC’s against Differential Power Analysis}, howpublished = {Cryptology ePrint Archive, Report 2004/067}, year = {2004}, url = {http://eprint.iacr.org/2004/067}, } @misc{cryptoeprint:2004:068, author = {Kris Tiri and Ingrid Verbauwhede}, title = {Synthesis of Secure FPGA Implementations}, howpublished = {Cryptology ePrint Archive, Report 2004/068}, year = {2004}, url = {http://eprint.iacr.org/2004/068}, } @misc{cryptoeprint:2004:069, author = {Wonil Lee and Mridul Nandi and Palash Sarkar and Donghoon Chang and Sangjin Lee and Kouichi Sakurai}, title = {A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model}, howpublished = {Cryptology ePrint Archive, Report 2004/069}, year = {2004}, url = {http://eprint.iacr.org/2004/069}, } @misc{cryptoeprint:2004:070, author = {Steven D Galbraith and Victor Rotger}, title = {Easy decision-Diffie-Hellman groups}, howpublished = {Cryptology ePrint Archive, Report 2004/070}, year = {2004}, url = {http://eprint.iacr.org/2004/070}, } @misc{cryptoeprint:2004:071, author = {Benits Jr, Waldyr and Terada, Routo}, title = {An IBE Scheme to Exchange Authenticated Secret Keys}, howpublished = {Cryptology ePrint Archive, Report 2004/071}, year = {2004}, url = {http://eprint.iacr.org/2004/071}, } @misc{cryptoeprint:2004:072, author = {Christopher Wolf and Bart Preneel}, title = {Asymmetric Cryptography: Hidden Field Equations}, howpublished = {Cryptology ePrint Archive, Report 2004/072}, year = {2004}, url = {http://eprint.iacr.org/2004/072}, } @misc{cryptoeprint:2004:073, author = {Pierrick Gaudry}, title = {Index calculus for abelian varieties and the elliptic curve discrete logarithm problem}, howpublished = {Cryptology ePrint Archive, Report 2004/073}, year = {2004}, url = {http://eprint.iacr.org/2004/073}, } @misc{cryptoeprint:2004:074, author = {Liam Keliher and Henk Meijer and Stafford Tavares}, title = {Completion of Computation of Improved Upper Bound on the Maximum Average Linear Hull Probabilty for Rijndael}, howpublished = {Cryptology ePrint Archive, Report 2004/074}, year = {2004}, url = {http://eprint.iacr.org/2004/074}, } @misc{cryptoeprint:2004:075, author = {Alexis W. Machado}, title = {An Hybrid Mode of Operation}, howpublished = {Cryptology ePrint Archive, Report 2004/075}, year = {2004}, url = {http://eprint.iacr.org/2004/075}, } @misc{cryptoeprint:2004:076, author = {Aggelos Kiayias and Moti Yung}, title = {Group Signatures: Provable Security, Efficient Constructions and Anonymity from Trapdoor-Holders}, howpublished = {Cryptology ePrint Archive, Report 2004/076}, year = {2004}, url = {http://eprint.iacr.org/2004/076}, } @misc{cryptoeprint:2004:077, author = {Mihir Bellare and Haixia Shi and Chong Zhang}, title = {Foundations of Group Signatures: The Case of Dynamic Groups}, howpublished = {Cryptology ePrint Archive, Report 2004/077}, year = {2004}, url = {http://eprint.iacr.org/2004/077}, } @misc{cryptoeprint:2004:078, author = {Tadayoshi Kohno}, title = {Analysis of the WinZip encryption method}, howpublished = {Cryptology ePrint Archive, Report 2004/078}, year = {2004}, url = {http://eprint.iacr.org/2004/078}, } @misc{cryptoeprint:2004:079, author = {Zhaohui Cheng and Luminita Vasiu and Richard Comley}, title = {Pairing-Based One-Round Tripartite Key Agreement Protocols}, howpublished = {Cryptology ePrint Archive, Report 2004/079}, year = {2004}, url = {http://eprint.iacr.org/2004/079}, } @misc{cryptoeprint:2004:080, author = {Marius Oliver Gheorghita}, title = {HENKOS Stream Cipher}, howpublished = {Cryptology ePrint Archive, Report 2004/080}, year = {2004}, url = {http://eprint.iacr.org/2004/080}, } @misc{cryptoeprint:2004:081, author = {Philip Hawkes and Gregory G. Rose}, title = {Rewriting Variables: the Complexity of Fast Algebraic Attacks on Stream Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2004/081}, year = {2004}, url = {http://eprint.iacr.org/2004/081}, } @misc{cryptoeprint:2004:082, author = {Michael Backes and Birgit Pfitzmann and Michael Waidner}, title = {The Reactive Simulatability (RSIM) Framework for Asynchronous Systems}, howpublished = {Cryptology ePrint Archive, Report 2004/082}, year = {2004}, url = {http://eprint.iacr.org/2004/082}, } @misc{cryptoeprint:2004:083, author = {Bo Yang and Kaijie Wu and Ramesh Karri }, title = {Scan Based Side Channel Attack on Data Encryption Standard}, howpublished = {Cryptology ePrint Archive, Report 2004/083}, year = {2004}, url = {http://eprint.iacr.org/2004/083}, } @misc{cryptoeprint:2004:084, author = {David Galindo and Sebastia Martin and Jorge L. Villar }, title = {Evaluating elliptic curve based KEMs in the light of pairings}, howpublished = {Cryptology ePrint Archive, Report 2004/084}, year = {2004}, url = {http://eprint.iacr.org/2004/084}, } @misc{cryptoeprint:2004:085, author = {Tom St Denis}, title = {The CS2 Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2004/085}, year = {2004}, url = {http://eprint.iacr.org/2004/085}, } @misc{cryptoeprint:2004:086, author = {Amit Sahai and Brent Waters}, title = {Fuzzy Identity Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2004/086}, year = {2004}, url = {http://eprint.iacr.org/2004/086}, } @misc{cryptoeprint:2004:087, author = {K. Rubin and A. Silverberg}, title = {Using primitive subgroups to do more with fewer bits}, howpublished = {Cryptology ePrint Archive, Report 2004/087}, year = {2004}, url = {http://eprint.iacr.org/2004/087}, } @misc{cryptoeprint:2004:088, author = {Noel McCullagh}, title = {Efficient Batch Verification of Signature Schemes based on Bilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2004/088}, year = {2004}, url = {http://eprint.iacr.org/2004/088}, } @misc{cryptoeprint:2004:089, author = {Mahalingam Ramkumar and Nasir Memon}, title = {Security of Random Key Pre-distribution Schemes With Limited Tamper Resistance}, howpublished = {Cryptology ePrint Archive, Report 2004/089}, year = {2004}, url = {http://eprint.iacr.org/2004/089}, } @misc{cryptoeprint:2004:090, author = {Ratna Dutta and Rana Barua and and Palash Sarkar}, title = {Provably Secure Authenticated Tree Based Group Key Agreement Protocol}, howpublished = {Cryptology ePrint Archive, Report 2004/090}, year = {2004}, url = {http://eprint.iacr.org/2004/090}, } @misc{cryptoeprint:2004:091, author = {Einar Mykletun and Maithili Narasimha and Gene Tsudik}, title = {Signature Bouquets: Immutability for Aggregated/Condensed Signatures}, howpublished = {Cryptology ePrint Archive, Report 2004/091}, year = {2004}, url = {http://eprint.iacr.org/2004/091}, } @misc{cryptoeprint:2004:092, author = {Hongjun Wu}, title = {A New Stream Cipher HC-256}, howpublished = {Cryptology ePrint Archive, Report 2004/092}, year = {2004}, url = {http://eprint.iacr.org/2004/092}, } @misc{cryptoeprint:2004:093, author = {Giuseppe Ateniese and Breno de Medeiros}, title = {A Provably Secure Nyberg-Rueppel Signature Variant with Applications}, howpublished = {Cryptology ePrint Archive, Report 2004/093}, year = {2004}, url = {http://eprint.iacr.org/2004/093}, } @misc{cryptoeprint:2004:094, author = {Alex Biryukov}, title = {Block Ciphers and Stream Ciphers: The State of the Art }, howpublished = {Cryptology ePrint Archive, Report 2004/094}, year = {2004}, url = {http://eprint.iacr.org/2004/094}, } @misc{cryptoeprint:2004:095, author = {Kazumaro Aoki and Yuji Kida and Takeshi Shimoyama and Hiroki Ueda}, title = {GNFS Factoring Statistics of RSA-100, 110, ..., 150}, howpublished = {Cryptology ePrint Archive, Report 2004/095}, year = {2004}, url = {http://eprint.iacr.org/2004/095}, } @misc{cryptoeprint:2004:096, author = {Yi Mu and Fangguo Zhang and Willy Susilo}, title = {On the Ambiguity of Concurrent Signatures}, howpublished = {Cryptology ePrint Archive, Report 2004/096}, year = {2004}, url = {http://eprint.iacr.org/2004/096}, } @misc{cryptoeprint:2004:097, author = {Vipul Goyal}, title = {How To Re-initialize a Hash Chain}, howpublished = {Cryptology ePrint Archive, Report 2004/097}, year = {2004}, url = {http://eprint.iacr.org/2004/097}, } @misc{cryptoeprint:2004:098, author = {María Isabel González Vasco and David Pérez García}, title = {Attacking a Public Key Cryptosystem Based on Tree Replacement}, howpublished = {Cryptology ePrint Archive, Report 2004/098}, year = {2004}, url = {http://eprint.iacr.org/2004/098}, } @misc{cryptoeprint:2004:099, author = {Rosario Gennaro and Hugo Krawczyk and Tal Rabin}, title = {Secure Hashed Diffie-Hellman over Non-DDH Groups}, howpublished = {Cryptology ePrint Archive, Report 2004/099}, year = {2004}, url = {http://eprint.iacr.org/2004/099}, } @misc{cryptoeprint:2004:100, author = {Hagai Bar-El, Hamid Choukri, David Naccache, Michael Tunstall and Claire Whelan}, title = {The Sorcerer’s Apprentice Guide to Fault Attacks}, howpublished = {Cryptology ePrint Archive, Report 2004/100}, year = {2004}, url = {http://eprint.iacr.org/2004/100}, } @misc{cryptoeprint:2004:101, author = {Johannes Blömer, Jorge Guajardo Merchan and Volker Krummel}, title = {Provably Secure Masking of AES}, howpublished = {Cryptology ePrint Archive, Report 2004/101}, year = {2004}, url = {http://eprint.iacr.org/2004/101}, } @misc{cryptoeprint:2004:102, author = {Benoît Libert and Jean-Jacques Quisquater}, title = {The Exact Security of an Identity Based Signature and its Applications}, howpublished = {Cryptology ePrint Archive, Report 2004/102}, year = {2004}, url = {http://eprint.iacr.org/2004/102}, } @misc{cryptoeprint:2004:103, author = {Jintai Ding and Dieter Schmidt}, title = {Cryptanalysis of SFlash v3}, howpublished = {Cryptology ePrint Archive, Report 2004/103}, year = {2004}, url = {http://eprint.iacr.org/2004/103}, } @misc{cryptoeprint:2004:104, author = {Lan Nguyen and Rei Safavi-Naini}, title = {Efficient and Provably Secure Trapdoor-free Group Signature Schemes from Bilinear Pairings}, howpublished = {Cryptology ePrint Archive, Report 2004/104}, year = {2004}, url = {http://eprint.iacr.org/2004/104}, } @misc{cryptoeprint:2004:105, author = {Alessandro Acquisti}, title = {Receipt-Free Homomorphic Elections and Write-in Ballots}, howpublished = {Cryptology ePrint Archive, Report 2004/105}, year = {2004}, url = {http://eprint.iacr.org/2004/105}, } @misc{cryptoeprint:2004:106, author = {P. Tuyls and J. Goseling}, title = {Capacity and Examples of Template Protecting Biometric Authentication Systems}, howpublished = {Cryptology ePrint Archive, Report 2004/106}, year = {2004}, url = {http://eprint.iacr.org/2004/106}, } @misc{cryptoeprint:2004:107, author = {Bertrand BYRAMJEE and Sylvain DUQUESNE}, title = {Classification of genus 2 curves over $\mathbb{F}_{2^n}$ and optimization of their arithmetic}, howpublished = {Cryptology ePrint Archive, Report 2004/107}, year = {2004}, url = {http://eprint.iacr.org/2004/107}, } @misc{cryptoeprint:2004:108, author = {Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu and K.P. Chow}, title = {Two Improved Partially Blind Signature Schemes from Bilinear Pairings}, howpublished = {Cryptology ePrint Archive, Report 2004/108}, year = {2004}, url = {http://eprint.iacr.org/2004/108}, } @misc{cryptoeprint:2004:109, author = {Robert Bradshaw and Jason Holt and Kent Seamons}, title = {Concealing Complex Policies with Hidden Credentials}, howpublished = {Cryptology ePrint Archive, Report 2004/109}, year = {2004}, url = {http://eprint.iacr.org/2004/109}, } @misc{cryptoeprint:2004:110, author = {Carlisle Adams}, title = {Designing Against the `Overdefined System of Equations' Attack}, howpublished = {Cryptology ePrint Archive, Report 2004/110}, year = {2004}, url = {http://eprint.iacr.org/2004/110}, } @misc{cryptoeprint:2004:111, author = {Gregory V. Bard}, title = {The Vulnerability of SSL to Chosen Plaintext Attack}, howpublished = {Cryptology ePrint Archive, Report 2004/111}, year = {2004}, url = {http://eprint.iacr.org/2004/111}, } @misc{cryptoeprint:2004:112, author = {M. Sugita and M. Kawazoe and H. Imai}, title = {Relation between XL algorithm and Groebner Bases Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2004/112}, year = {2004}, url = {http://eprint.iacr.org/2004/112}, } @misc{cryptoeprint:2004:113, author = {Dominik Raub and Rainer Steinwandt and Joern Mueller-Quade}, title = {On the Security and Composability of the One Time Pad}, howpublished = {Cryptology ePrint Archive, Report 2004/113}, year = {2004}, url = {http://eprint.iacr.org/2004/113}, } @misc{cryptoeprint:2004:114, author = {Liqun Chen and John Malone-Lee}, title = {Improved Identity-Based Signcryption}, howpublished = {Cryptology ePrint Archive, Report 2004/114}, year = {2004}, url = {http://eprint.iacr.org/2004/114}, } @misc{cryptoeprint:2004:115, author = {Junghyun Nam, Sungduk Kim, Seungjoo Kim, and Dongho Won}, title = {Provably-Secure and Communication-Efficient Scheme for Dynamic Group Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2004/115}, year = {2004}, url = {http://eprint.iacr.org/2004/115}, } @misc{cryptoeprint:2004:116, author = {Ran Canetti and Eyal Kushilevitz and Yehuda Lindell}, title = {On the Limitations of Universally Composable Two-Party Computation Without Set-up Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2004/116}, year = {2004}, url = {http://eprint.iacr.org/2004/116}, } @misc{cryptoeprint:2004:117, author = {Noel McCullagh and Paulo S. L. M. Barreto}, title = {Efficient and Forward-Secure Identity-Based Signcryption}, howpublished = {Cryptology ePrint Archive, Report 2004/117}, year = {2004}, url = {http://eprint.iacr.org/2004/117}, } @misc{cryptoeprint:2004:118, author = {Stéphane Flon and Roger Oyono and Christophe Ritzenthaler }, title = {Fast addition on non-hyperelliptic genus $3$ curves }, howpublished = {Cryptology ePrint Archive, Report 2004/118}, year = {2004}, url = {http://eprint.iacr.org/2004/118}, } @misc{cryptoeprint:2004:119, author = {Masayuki Abe and Serge Fehr}, title = {Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2004/119}, year = {2004}, url = {http://eprint.iacr.org/2004/119}, } @misc{cryptoeprint:2004:120, author = {Bartosz Zoltak}, title = {Security of Symmetric Encryption Schemes with One-Way IND-CNA Key Setup}, howpublished = {Cryptology ePrint Archive, Report 2004/120}, year = {2004}, url = {http://eprint.iacr.org/2004/120}, } @misc{cryptoeprint:2004:121, author = {Tsz Hon Yuen and Victor K. Wei}, title = {Fast and Proven Secure Blind Identity-Based Signcryption from Pairings}, howpublished = {Cryptology ePrint Archive, Report 2004/121}, year = {2004}, url = {http://eprint.iacr.org/2004/121}, } @misc{cryptoeprint:2004:122, author = {Noel McCullagh and Paulo S. L. M. Barreto}, title = {A New Two-Party Identity-Based Authenticated Key Agreement}, howpublished = {Cryptology ePrint Archive, Report 2004/122}, year = {2004}, url = {http://eprint.iacr.org/2004/122}, } @misc{cryptoeprint:2004:123, author = {Dong-Guk Han and Jongin Lim and Kouichi Sakurai}, title = {On security of XTR public key cryptosystems against Side Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2004/123}, year = {2004}, url = {http://eprint.iacr.org/2004/123}, } @misc{cryptoeprint:2004:124, author = {Douglas Wikström}, title = {Universally Composable DKG with Linear Number of Exponentiations}, howpublished = {Cryptology ePrint Archive, Report 2004/124}, year = {2004}, url = {http://eprint.iacr.org/2004/124}, } @misc{cryptoeprint:2004:125, author = {Shai Halevi}, title = {EME*: extending EME to handle arbitrary-length messages with associated data}, howpublished = {Cryptology ePrint Archive, Report 2004/125}, year = {2004}, url = {http://eprint.iacr.org/2004/125}, } @misc{cryptoeprint:2004:126, author = {Haining Fan and Yiqi Dai}, title = {Two Software Normal Basis Multiplication Algorithms for GF(2n)}, howpublished = {Cryptology ePrint Archive, Report 2004/126}, year = {2004}, url = {http://eprint.iacr.org/2004/126}, } @misc{cryptoeprint:2004:127, author = {Junghyun Nam, Jinwoo Lee, Seungjoo Kim, and Dongho Won}, title = {DDH-based Group Key Agreement in a Mobile Environment}, howpublished = {Cryptology ePrint Archive, Report 2004/127}, year = {2004}, url = {http://eprint.iacr.org/2004/127}, } @misc{cryptoeprint:2004:128, author = {Debra L. Cook and Moti Yung and Angelos D. Keromytis}, title = {Elastic Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2004/128}, year = {2004}, url = {http://eprint.iacr.org/2004/128}, } @misc{cryptoeprint:2004:129, author = {Joe Suzuki}, title = {Generalizing Kedlaya's order counting based on Miura Theory}, howpublished = {Cryptology ePrint Archive, Report 2004/129}, year = {2004}, url = {http://eprint.iacr.org/2004/129}, } @misc{cryptoeprint:2004:130, author = {David Woodruff and Jessica Staddon}, title = {Private Inference Control}, howpublished = {Cryptology ePrint Archive, Report 2004/130}, year = {2004}, url = {http://eprint.iacr.org/2004/130}, } @misc{cryptoeprint:2004:131, author = {Jung Hee Cheon and Yongdae Kim and Hyo Jin Yoon}, title = {A New ID-based Signature with Batch Verification}, howpublished = {Cryptology ePrint Archive, Report 2004/131}, year = {2004}, url = {http://eprint.iacr.org/2004/131}, } @misc{cryptoeprint:2004:132, author = {R. Granger and D. Page and M. Stam}, title = {On Small Characteristic Algebraic Tori in Pairing-Based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2004/132}, year = {2004}, url = {http://eprint.iacr.org/2004/132}, } @misc{cryptoeprint:2004:133, author = {Claude Castelluccia and Stanislaw Jarecki and Gene Tsudik}, title = {Secret Handshakes from CA-Oblivious Encryption}, howpublished = {Cryptology ePrint Archive, Report 2004/133}, year = {2004}, url = {http://eprint.iacr.org/2004/133}, } @misc{cryptoeprint:2004:134, author = {Elisabeth Oswald and Stefan Mangard and Norbert Pramstaller}, title = {Secure and Efficient Masking of AES - A Mission Impossible?}, howpublished = {Cryptology ePrint Archive, Report 2004/134}, year = {2004}, url = {http://eprint.iacr.org/2004/134}, } @misc{cryptoeprint:2004:135, author = {Vipul Goyal}, title = {More Efficient Server Assisted One Time Signatures}, howpublished = {Cryptology ePrint Archive, Report 2004/135}, year = {2004}, url = {http://eprint.iacr.org/2004/135}, } @misc{cryptoeprint:2004:136, author = {Vipul Goyal and Virendra Kumar and Mayank Singh and Ajith Abraham and Sugata Sanyal}, title = {CompChall: Addressing Password Guessing Attacks}, howpublished = {Cryptology ePrint Archive, Report 2004/136}, year = {2004}, url = {http://eprint.iacr.org/2004/136}, } @misc{cryptoeprint:2004:137, author = {Haining Fan and Yiqi Dai}, title = {New GF(2n) Parallel Multiplier Using Redundant Representation}, howpublished = {Cryptology ePrint Archive, Report 2004/137}, year = {2004}, url = {http://eprint.iacr.org/2004/137}, } @misc{cryptoeprint:2004:138, author = {Benoit Chevallier-Mames and David Naccache and Pascal Paillier and David Pointcheval}, title = {How to Disembed a Program?}, howpublished = {Cryptology ePrint Archive, Report 2004/138}, year = {2004}, url = {http://eprint.iacr.org/2004/138}, } @misc{cryptoeprint:2004:139, author = {Manoj Prabhakaran and Amit Sahai}, title = {New Notions of Security: Achieving Universal Composability without Trusted Setup}, howpublished = {Cryptology ePrint Archive, Report 2004/139}, year = {2004}, url = {http://eprint.iacr.org/2004/139}, } @misc{cryptoeprint:2004:140, author = {P. Kitsos and M. D. Galanis and O. Koufopavlou }, title = {Architectures and Hardware Implementations of the 64-bit MISTY1 Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2004/140}, year = {2004}, url = {http://eprint.iacr.org/2004/140}, } @misc{cryptoeprint:2004:141, author = {Debra L. Cook and Moti Yung and Angelos D. Keromytis}, title = {Elastic AES}, howpublished = {Cryptology ePrint Archive, Report 2004/141}, year = {2004}, url = {http://eprint.iacr.org/2004/141}, } @misc{cryptoeprint:2004:142, author = {Yiliang HAN and Xiaoyuan YANG}, title = {Elliptic Curve based Signcryption and its Multi-party Schemes}, howpublished = {Cryptology ePrint Archive, Report 2004/142}, year = {2004}, url = {http://eprint.iacr.org/2004/142}, } @misc{cryptoeprint:2004:143, author = {Nicolas T. Courtois}, title = {Short Signatures, Provable Security, Generic Attacks and Computational Security of Multivariate Polynomial Schemes such as HFE, Quartz and Sflash }, howpublished = {Cryptology ePrint Archive, Report 2004/143}, year = {2004}, url = {http://eprint.iacr.org/2004/143}, } @misc{cryptoeprint:2004:144, author = {Alexander Maximov and Martin Hell and Subhamoy Maitra}, title = {Plateaued Rotation Symmetric Boolean Functions on Odd Number of Variables}, howpublished = {Cryptology ePrint Archive, Report 2004/144}, year = {2004}, url = {http://eprint.iacr.org/2004/144}, } @misc{cryptoeprint:2004:145, author = {Vincent Carlier, Hervé Chabanne, Emmanuelle Dottax and Hervé Pelletier}, title = {Electromagnetic Side Channels of an FPGA Implementation of AES}, howpublished = {Cryptology ePrint Archive, Report 2004/145}, year = {2004}, url = {http://eprint.iacr.org/2004/145}, } @misc{cryptoeprint:2004:146, author = {Eli Biham, Rafi Chen}, title = {Near-Collisions of SHA-0}, howpublished = {Cryptology ePrint Archive, Report 2004/146}, year = {2004}, url = {http://eprint.iacr.org/2004/146}, } @misc{cryptoeprint:2004:147, author = {Matthew J. Campagna and Amit Sethi}, title = {Key Recovery Method for CRT Implementation of RSA}, howpublished = {Cryptology ePrint Archive, Report 2004/147}, year = {2004}, url = {http://eprint.iacr.org/2004/147}, } @misc{cryptoeprint:2004:148, author = {Zuowen Tan and Zhuojun Liu}, title = {Provably Secure Delegation-by-Certification Proxy Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2004/148}, year = {2004}, url = {http://eprint.iacr.org/2004/148}, } @misc{cryptoeprint:2004:149, author = {E. Trichina and L. Korkishko}, title = {Secure and Efficient AES Software Implementation for Smart Caards}, howpublished = {Cryptology ePrint Archive, Report 2004/149}, year = {2004}, url = {http://eprint.iacr.org/2004/149}, } @misc{cryptoeprint:2004:150, author = {Young-Ran Lee and Hyang-Sook Lee}, title = {An Authenticated Certificateless Public Key Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2004/150}, year = {2004}, url = {http://eprint.iacr.org/2004/150}, } @misc{cryptoeprint:2004:151, author = {Mitsuhiro Haneda and Mitsuru Kawazoe and Tetsuya Takahashi}, title = {Suitable Curves for Genus-4 HCC over Prime Fields: Point Counting Formulae for Hyperelliptic Curves of type $y^2=x^{2k+1}+ax$}, howpublished = {Cryptology ePrint Archive, Report 2004/151}, year = {2004}, url = {http://eprint.iacr.org/2004/151}, } @misc{cryptoeprint:2004:152, author = {Neal Koblitz and Alfred Menezes}, title = {Another Look at ``Provable Security''}, howpublished = {Cryptology ePrint Archive, Report 2004/152}, year = {2004}, url = {http://eprint.iacr.org/2004/152}, } @misc{cryptoeprint:2004:153, author = {P. Gaudry and E. Thom{\'e} and N. Th{\'e}riault and C. Diem}, title = {A double large prime variation for small genus hyperelliptic index calculus}, howpublished = {Cryptology ePrint Archive, Report 2004/153}, year = {2004}, url = {http://eprint.iacr.org/2004/153}, } @misc{cryptoeprint:2004:154, author = {Amir Herzberg}, title = {Controlling Spam by Secure Internet Content Selection}, howpublished = {Cryptology ePrint Archive, Report 2004/154}, year = {2004}, url = {http://eprint.iacr.org/2004/154}, } @misc{cryptoeprint:2004:155, author = {Amir Herzberg and Ahmad Gbara}, title = {Security and Identification Indicators for Browsers against Spoofing and Phishing Attacks}, howpublished = {Cryptology ePrint Archive, Report 2004/155}, year = {2004}, url = {http://eprint.iacr.org/2004/155}, } @misc{cryptoeprint:2004:156, author = {Kenneth G. Paterson and Fred Piper and Ruediger Schack}, title = {Why Quantum Cryptography?}, howpublished = {Cryptology ePrint Archive, Report 2004/156}, year = {2004}, url = {http://eprint.iacr.org/2004/156}, } @misc{cryptoeprint:2004:157, author = {R. Granger and D. Page and M. Stam}, title = {Hardware and Software Normal Basis Arithmetic for Pairing Based Cryptography in Characteristic Three}, howpublished = {Cryptology ePrint Archive, Report 2004/157}, year = {2004}, url = {http://eprint.iacr.org/2004/157}, } @misc{cryptoeprint:2004:158, author = {Olivier Benoit and Nora Dabbous and Laurent Gauteron and Pierre Girard and Helena Handschuh and David Naccache and St\'ephane Soci\'e and Claire Whelan}, title = {Mobile Terminal Security}, howpublished = {Cryptology ePrint Archive, Report 2004/158}, year = {2004}, url = {http://eprint.iacr.org/2004/158}, } @misc{cryptoeprint:2004:159, author = {Gergely Acs and Levente Buttyan and Istvan Vajda}, title = {Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks}, howpublished = {Cryptology ePrint Archive, Report 2004/159}, year = {2004}, url = {http://eprint.iacr.org/2004/159}, } @misc{cryptoeprint:2004:160, author = {Yevgeniy Dodis and Nelly Fazio and Aggelos Kiayias and Moti Yung}, title = {Scalable Public-Key Tracing and Revoking}, howpublished = {Cryptology ePrint Archive, Report 2004/160}, year = {2004}, url = {http://eprint.iacr.org/2004/160}, } @misc{cryptoeprint:2004:161, author = {Ko-ichi Nagao}, title = {Improvement of ThLeriault Algorithm of Index Calculus for Jacobian of Hyperelliptic Curves of Small Genus}, howpublished = {Cryptology ePrint Archive, Report 2004/161}, year = {2004}, url = {http://eprint.iacr.org/2004/161}, } @misc{cryptoeprint:2004:162, author = {Ivan Damgaard and Thomas Pedersen and Louis Salvail}, title = {On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-way Quantum Transmission}, howpublished = {Cryptology ePrint Archive, Report 2004/162}, year = {2004}, url = {http://eprint.iacr.org/2004/162}, } @misc{cryptoeprint:2004:163, author = {Manoj Kumar}, title = {On the Weaknesses and Improvements of an Efficient Password Based Remote User Authentication Scheme Using Smart Cards}, howpublished = {Cryptology ePrint Archive, Report 2004/163}, year = {2004}, url = {http://eprint.iacr.org/2004/163}, } @misc{cryptoeprint:2004:164, author = {Man Ho Au and Victor K. Wei}, title = {ID-based Cryptography from Composite Degree Residuosity}, howpublished = {Cryptology ePrint Archive, Report 2004/164}, year = {2004}, url = {http://eprint.iacr.org/2004/164}, } @misc{cryptoeprint:2004:165, author = {D. Page and N.P. Smart and F. Vercauteren}, title = {A comparison of MNT curves and supersingular curves}, howpublished = {Cryptology ePrint Archive, Report 2004/165}, year = {2004}, url = {http://eprint.iacr.org/2004/165}, } @misc{cryptoeprint:2004:166, author = {Eliane Jaulmes and Reynald Lercier}, title = {FRMAC, a Fast Randomized Message Authentication Code}, howpublished = {Cryptology ePrint Archive, Report 2004/166}, year = {2004}, url = {http://eprint.iacr.org/2004/166}, } @misc{cryptoeprint:2004:167, author = {Fuw-Yi Yang and Jinn-Ke Jan}, title = {A Secure and Efficient Key Exchange Protocol for Mobile Communications}, howpublished = {Cryptology ePrint Archive, Report 2004/167}, year = {2004}, url = {http://eprint.iacr.org/2004/167}, } @misc{cryptoeprint:2004:168, author = {T.Moh and J.M.Chen and Boyin Yang}, title = {Building Instances of TTM Immune to the Goubin-Courtois Attack and the Ding-Schmidt Attack}, howpublished = {Cryptology ePrint Archive, Report 2004/168}, year = {2004}, url = {http://eprint.iacr.org/2004/168}, } @misc{cryptoeprint:2004:169, author = {Alexander W. Dent and Allan Tomlinson}, title = {Regional Blackouts: Protection of Broadcast Content on 3G Networks.}, howpublished = {Cryptology ePrint Archive, Report 2004/169}, year = {2004}, url = {http://eprint.iacr.org/2004/169}, } @misc{cryptoeprint:2004:170, author = {Rafail Ostrovsky and Charles Rackoff and Adam Smith}, title = {Efficient Consistency Proofs for Generalized Queries on a Committed Database}, howpublished = {Cryptology ePrint Archive, Report 2004/170}, year = {2004}, url = {http://eprint.iacr.org/2004/170}, } @misc{cryptoeprint:2004:171, author = {Dan Boneh and Xavier Boyen}, title = {Short Signatures Without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2004/171}, year = {2004}, url = {http://eprint.iacr.org/2004/171}, } @misc{cryptoeprint:2004:172, author = {Dan Boneh and Xavier Boyen}, title = {Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2004/172}, year = {2004}, url = {http://eprint.iacr.org/2004/172}, } @misc{cryptoeprint:2004:173, author = {Dan Boneh and Xavier Boyen}, title = {Secure Identity Based Encryption Without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2004/173}, year = {2004}, url = {http://eprint.iacr.org/2004/173}, } @misc{cryptoeprint:2004:174, author = {Dan Boneh and Xavier Boyen and Hovav Shacham}, title = {Short Group Signatures}, howpublished = {Cryptology ePrint Archive, Report 2004/174}, year = {2004}, url = {http://eprint.iacr.org/2004/174}, } @misc{cryptoeprint:2004:175, author = {Yehuda Lindell and Benny Pinkas}, title = {A Proof of Yao's Protocol for Secure Two-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2004/175}, year = {2004}, url = {http://eprint.iacr.org/2004/175}, } @misc{cryptoeprint:2004:176, author = {Andrew Burnett and Adam Duffy and Tom Dowling}, title = {A Biometric Identity Based Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2004/176}, year = {2004}, url = {http://eprint.iacr.org/2004/176}, } @misc{cryptoeprint:2004:177, author = {S. G. Barwick and W.-A. Jackson and K. M. Martin}, title = {Updating the Parameters of a Threshold Scheme by Minimal Broadcast}, howpublished = {Cryptology ePrint Archive, Report 2004/177}, year = {2004}, url = {http://eprint.iacr.org/2004/177}, } @misc{cryptoeprint:2004:178, author = {S. G. Barwick and W.-A. Jackson and K. M. Martin and C. M. O'Keefe}, title = {Optimal Updating of Ideal Threshold Schemes}, howpublished = {Cryptology ePrint Archive, Report 2004/178}, year = {2004}, url = {http://eprint.iacr.org/2004/178}, } @misc{cryptoeprint:2004:179, author = {Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu}, title = {Identity Based Threshold Ring Signature}, howpublished = {Cryptology ePrint Archive, Report 2004/179}, year = {2004}, url = {http://eprint.iacr.org/2004/179}, } @misc{cryptoeprint:2004:180, author = {Brent R. Waters}, title = {Efficient Identity-Based Encryption Without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2004/180}, year = {2004}, url = {http://eprint.iacr.org/2004/180}, } @misc{cryptoeprint:2004:181, author = {Yehuda Lindell and Anna Lysyanskaya and Tal Rabin}, title = {On the Composition of Authenticated Byzantine Agreement}, howpublished = {Cryptology ePrint Archive, Report 2004/181}, year = {2004}, url = {http://eprint.iacr.org/2004/181}, } @misc{cryptoeprint:2004:182, author = {Minh-Huyen Nguyen and Salil Vadhan}, title = {Simpler Session-Key Generation from Short Random Passwords}, howpublished = {Cryptology ePrint Archive, Report 2004/182}, year = {2004}, url = {http://eprint.iacr.org/2004/182}, } @misc{cryptoeprint:2004:183, author = {Bo Gyeong Kang and Je Hong Park and Sang Geun Hahn }, title = {A New Forward Secure Signature Scheme }, howpublished = {Cryptology ePrint Archive, Report 2004/183}, year = {2004}, url = {http://eprint.iacr.org/2004/183}, } @misc{cryptoeprint:2004:184, author = {Amit K Awasthi and Sunder Lal}, title = {ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings}, howpublished = {Cryptology ePrint Archive, Report 2004/184}, year = {2004}, url = {http://eprint.iacr.org/2004/184}, } @misc{cryptoeprint:2004:185, author = {Frederik Armknecht}, title = {On the Existence of low-degree Equations for Algebraic Attacks}, howpublished = {Cryptology ePrint Archive, Report 2004/185}, year = {2004}, url = {http://eprint.iacr.org/2004/185}, } @misc{cryptoeprint:2004:186, author = {Manoj Kumar}, title = {A New Remote User Authentication Scheme Using Smart Cards with Forward Secrecy}, howpublished = {Cryptology ePrint Archive, Report 2004/186}, year = {2004}, url = {http://eprint.iacr.org/2004/186}, } @misc{cryptoeprint:2004:187, author = {Mathieu Ciet and Michael Neve and Eric Peeters and Jean-Jacques Quisquater}, title = {Parallel FPGA Implementation of RSA with Residue Number Systems - Can side-channel threats be avoided? - Extended version}, howpublished = {Cryptology ePrint Archive, Report 2004/187}, year = {2004}, url = {http://eprint.iacr.org/2004/187}, } @misc{cryptoeprint:2004:188, author = {Vincent Carlier and Hervé Chabanne and Emmanuelle Dottax}, title = {Grey Box Implementation of Block Ciphers Preserving the Confidentiality of their Design}, howpublished = {Cryptology ePrint Archive, Report 2004/188}, year = {2004}, url = {http://eprint.iacr.org/2004/188}, } @misc{cryptoeprint:2004:189, author = {Denis Charles and Kristin Lauter}, title = {Computing Modular Polynomials}, howpublished = {Cryptology ePrint Archive, Report 2004/189}, year = {2004}, url = {http://eprint.iacr.org/2004/189}, } @misc{cryptoeprint:2004:190, author = {Javier Herranz and Germ\'an S\'aez}, title = {Distributed Ring Signatures for Identity-Based Scenarios}, howpublished = {Cryptology ePrint Archive, Report 2004/190}, year = {2004}, url = {http://eprint.iacr.org/2004/190}, } @misc{cryptoeprint:2004:191, author = {Pradeep Kumar Mishra}, title = {Scalar Multiplication in Elliptic Curve Cryptosystems: Pipelining with Pre-computations}, howpublished = {Cryptology ePrint Archive, Report 2004/191}, year = {2004}, url = {http://eprint.iacr.org/2004/191}, } @misc{cryptoeprint:2004:192, author = {Manoj Kumar}, title = {Security Pitfalls of an efficient remote user authentication scheme using smart cards}, howpublished = {Cryptology ePrint Archive, Report 2004/192}, year = {2004}, url = {http://eprint.iacr.org/2004/192}, } @misc{cryptoeprint:2004:193, author = {David A. McGrew and John Viega}, title = {The Security and Performance of the Galois/Counter Mode of Operation (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2004/193}, year = {2004}, url = {http://eprint.iacr.org/2004/193}, } @misc{cryptoeprint:2004:194, author = {Rosario Gennaro and Victor Shoup}, title = {A Note on An Encryption Scheme of Kurosawa and Desmedt}, howpublished = {Cryptology ePrint Archive, Report 2004/194}, year = {2004}, url = {http://eprint.iacr.org/2004/194}, } @misc{cryptoeprint:2004:195, author = {Katsuyuki Okeya and Katja Schmidt-Samoa and Christian Spahn and Tsuyoshi Takagi}, title = {Signed Binary Representations Revisited}, howpublished = {Cryptology ePrint Archive, Report 2004/195}, year = {2004}, url = {http://eprint.iacr.org/2004/195}, } @misc{cryptoeprint:2004:196, author = {Shaoquan Jiang and Guang Gong}, title = {Password Based Key Exchange with Mutual Authentication}, howpublished = {Cryptology ePrint Archive, Report 2004/196}, year = {2004}, url = {http://eprint.iacr.org/2004/196}, } @misc{cryptoeprint:2004:197, author = {Helmut Kahl}, title = {SPA-based attack against the modular reduction within a partially secured RSA-CRT implementation}, howpublished = {Cryptology ePrint Archive, Report 2004/197}, year = {2004}, url = {http://eprint.iacr.org/2004/197}, } @misc{cryptoeprint:2004:198, author = {Laszlo Hars}, title = {Long Modular Multiplication for Cryptographic Applications}, howpublished = {Cryptology ePrint Archive, Report 2004/198}, year = {2004}, url = {http://eprint.iacr.org/2004/198}, } @misc{cryptoeprint:2004:199, author = {Xiaoyun Wang and Dengguo Feng and Xuejia Lai and Hongbo Yu}, title = {Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD}, howpublished = {Cryptology ePrint Archive, Report 2004/199}, year = {2004}, url = {http://eprint.iacr.org/2004/199}, } @misc{cryptoeprint:2004:200, author = {An Braeken, Svetla Nikova, Ventzislav Nikov}, title = {On Cheating Immune Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2004/200}, year = {2004}, url = {http://eprint.iacr.org/2004/200}, } @misc{cryptoeprint:2004:201, author = {Chunming Tang and Dingyi Pei and Zhuojun Liu and Yong He}, title = {Non-Interactive and Information-Theoretic Secure Publicly Verifiable Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2004/201}, year = {2004}, url = {http://eprint.iacr.org/2004/201}, } @misc{cryptoeprint:2004:202, author = {Yuri Borissov, An Braeken, Svetla Nikova}, title = {Covering Radius of the $(n-3)$-rd Order Reed-Muller Code in the Set of Resilient Functions}, howpublished = {Cryptology ePrint Archive, Report 2004/202}, year = {2004}, url = {http://eprint.iacr.org/2004/202}, } @misc{cryptoeprint:2004:203, author = {John Black and Martin Cochran and Ryan Gardner}, title = {How to Cheat at Chess: A Security Analysis of the Internet Chess Club}, howpublished = {Cryptology ePrint Archive, Report 2004/203}, year = {2004}, url = {http://eprint.iacr.org/2004/203}, } @misc{cryptoeprint:2004:204, author = {Markus Volkmer and Andre Schaumburg}, title = {Authenticated tree parity machine key exchange}, howpublished = {Cryptology ePrint Archive, Report 2004/204}, year = {2004}, url = {http://eprint.iacr.org/2004/204}, } @misc{cryptoeprint:2004:205, author = {Ernie Brickell and Jan Camenisch and Liqun Chen}, title = {Direct Anonymous Attestation }, howpublished = {Cryptology ePrint Archive, Report 2004/205}, year = {2004}, url = {http://eprint.iacr.org/2004/205}, } @misc{cryptoeprint:2004:206, author = {Jing Xu and Zhenfeng Zhang and Dengguo Feng}, title = {ID-Based Proxy Signature Using Bilinear Pairings}, howpublished = {Cryptology ePrint Archive, Report 2004/206}, year = {2004}, url = {http://eprint.iacr.org/2004/206}, } @misc{cryptoeprint:2004:207, author = {Philip Hawkes and Michael Paddon and Gregory G. Rose}, title = {On Corrective Patterns for the SHA-2 Family}, howpublished = {Cryptology ePrint Archive, Report 2004/207}, year = {2004}, url = {http://eprint.iacr.org/2004/207}, } @misc{cryptoeprint:2004:208, author = {Jean-Sebastien Coron and Alexander May}, title = {Deterministic Polynomial Time Equivalence of Computing the RSA Secret Key and Factoring}, howpublished = {Cryptology ePrint Archive, Report 2004/208}, year = {2004}, url = {http://eprint.iacr.org/2004/208}, } @misc{cryptoeprint:2004:209, author = {Christoph Ludwig}, title = {The Security and Efficiency of Micciancio's Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2004/209}, year = {2004}, url = {http://eprint.iacr.org/2004/209}, } @misc{cryptoeprint:2004:210, author = {Alexander W. Dent}, title = {Hybrid Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2004/210}, year = {2004}, url = {http://eprint.iacr.org/2004/210}, } @misc{cryptoeprint:2004:211, author = {Ian F. Blake and Aldar C-F. Chan}, title = {Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing}, howpublished = {Cryptology ePrint Archive, Report 2004/211}, year = {2004}, url = {http://eprint.iacr.org/2004/211}, } @misc{cryptoeprint:2004:212, author = {Danfeng Yao and Nelly Fazio and Yevgeniy Dodis and Anna Lysyanskaya}, title = {ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption}, howpublished = {Cryptology ePrint Archive, Report 2004/212}, year = {2004}, url = {http://eprint.iacr.org/2004/212}, } @misc{cryptoeprint:2004:213, author = {Fangguo Zhang}, title = {Cryptanalysis of Chang et al.'s Signature Scheme with Message Recovery}, howpublished = {Cryptology ePrint Archive, Report 2004/213}, year = {2004}, url = {http://eprint.iacr.org/2004/213}, } @misc{cryptoeprint:2004:214, author = {An Braeken, Christopher Wolf, and Bart Preneel}, title = {Classification of Highly Nonlinear Boolean Power Functions with a Randomised Algorithm for Checking Normality}, howpublished = {Cryptology ePrint Archive, Report 2004/214}, year = {2004}, url = {http://eprint.iacr.org/2004/214}, } @misc{cryptoeprint:2004:215, author = {Mihir Bellare and Gregory Neven}, title = {Transitive Signatures: New Schemes and Proofs}, howpublished = {Cryptology ePrint Archive, Report 2004/215}, year = {2004}, url = {http://eprint.iacr.org/2004/215}, } @misc{cryptoeprint:2004:216, author = {Markus Volkmer and Sebastian Wallner}, title = {Tree Parity Machine Rekeying Architectures}, howpublished = {Cryptology ePrint Archive, Report 2004/216}, year = {2004}, url = {http://eprint.iacr.org/2004/216}, } @misc{cryptoeprint:2004:217, author = {Aggelos Kiayias and Moti Yung}, title = {Cryptanalyzing the Polynomial-Reconstruction based Public-Key System Under Optimal Parameter Choice}, howpublished = {Cryptology ePrint Archive, Report 2004/217}, year = {2004}, url = {http://eprint.iacr.org/2004/217}, } @misc{cryptoeprint:2004:218, author = {Eiichiro Fujisaki}, title = {Plaintext-Simulatability}, howpublished = {Cryptology ePrint Archive, Report 2004/218}, year = {2004}, url = {http://eprint.iacr.org/2004/218}, } @misc{cryptoeprint:2004:219, author = {Yevgeniy Dodis and Adam Smith}, title = {Entropic Security and the Encryption of High Entropy Messages}, howpublished = {Cryptology ePrint Archive, Report 2004/219}, year = {2004}, url = {http://eprint.iacr.org/2004/219}, } @misc{cryptoeprint:2004:220, author = {Heiko Stamer and Friedrich Otto}, title = {On Oleshchuk's Public Key Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2004/220}, year = {2004}, url = {http://eprint.iacr.org/2004/220}, } @misc{cryptoeprint:2004:221, author = {Mihir Bellare and Adriana Palacio}, title = {Towards Plaintext-Aware Public-Key Encryption without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2004/221}, year = {2004}, url = {http://eprint.iacr.org/2004/221}, } @misc{cryptoeprint:2004:222, author = {An Braeken and Christopher Wolf and Bart Preneel}, title = {A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2004/222}, year = {2004}, url = {http://eprint.iacr.org/2004/222}, } @misc{cryptoeprint:2004:223, author = {Xinxin Fan and Yumin Wang}, title = {Inversion-Free Arithmetic on Genus 3 Hyperelliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2004/223}, year = {2004}, url = {http://eprint.iacr.org/2004/223}, } @misc{cryptoeprint:2004:224, author = {Marc Joye and David Naccache and St\'ephanie Porte}, title = {The Polynomial Composition Problem in $(\mathbb{Z}/n\mathbb{Z})[X]$}, howpublished = {Cryptology ePrint Archive, Report 2004/224}, year = {2004}, url = {http://eprint.iacr.org/2004/224}, } @misc{cryptoeprint:2004:225, author = {Jovan Dj. Golic}, title = {Vectorial Boolean functions and induced algebraic equations}, howpublished = {Cryptology ePrint Archive, Report 2004/225}, year = {2004}, url = {http://eprint.iacr.org/2004/225}, } @misc{cryptoeprint:2004:226, author = {Boaz Barak and Yehuda Lindell and Salil Vadhan}, title = {Lower Bounds for Non-Black-Box Zero Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2004/226}, year = {2004}, url = {http://eprint.iacr.org/2004/226}, } @misc{cryptoeprint:2004:227, author = {Johannes Blömer and Martin Otto and Jean-Pierre Seifert}, title = {Sign Change Fault Attacks On Elliptic Curve Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2004/227}, year = {2004}, url = {http://eprint.iacr.org/2004/227}, } @misc{cryptoeprint:2004:228, author = {Honggang Hu and Dengguo Feng}, title = {DISTRIBUTION OF R-PATTERNS IN THE KERDOCK-CODE BINARY SEQUENCES AND THE HIGHEST LEVEL SEQUENCES OF PRIMITIVE SEQUENCES OVER $Z_{2^l}$}, howpublished = {Cryptology ePrint Archive, Report 2004/228}, year = {2004}, url = {http://eprint.iacr.org/2004/228}, } @misc{cryptoeprint:2004:229, author = {Xin L¨¹ and Zhi Ma and Dengguo Feng}, title = {Secure Direct Communication Using Quantum Calderbank-Shor-Steane Codes}, howpublished = {Cryptology ePrint Archive, Report 2004/229}, year = {2004}, url = {http://eprint.iacr.org/2004/229}, } @misc{cryptoeprint:2004:230, author = {Fuw-Yi Yang and Jinn-Ke Jan}, title = {A Provable Secure Scheme for Partially Blind Signatures}, howpublished = {Cryptology ePrint Archive, Report 2004/230}, year = {2004}, url = {http://eprint.iacr.org/2004/230}, } @misc{cryptoeprint:2004:231, author = {Jung Hee Cheon and Nicholas Hopper and Yongdae Kim and Ivan Osipkov}, title = {Timed-Release and Key-Insulated Public Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2004/231}, year = {2004}, url = {http://eprint.iacr.org/2004/231}, } @misc{cryptoeprint:2004:232, author = {Frederik Armknecht and Joseph Lano and Bart Preneel}, title = {Extending the Resynchronization Attack}, howpublished = {Cryptology ePrint Archive, Report 2004/232}, year = {2004}, url = {http://eprint.iacr.org/2004/232}, } @misc{cryptoeprint:2004:233, author = {Michel Abdalla and Pierre-Alain Fouque and David Pointcheval}, title = {Password-Based Authenticated Key Exchange in the Three-Party Setting}, howpublished = {Cryptology ePrint Archive, Report 2004/233}, year = {2004}, url = {http://eprint.iacr.org/2004/233}, } @misc{cryptoeprint:2004:234, author = {Zuo-Wen Tan and Zhuo-Jun Liu}, title = {On the security of some nonrepudiable threshold proxy signature schemes with known signers}, howpublished = {Cryptology ePrint Archive, Report 2004/234}, year = {2004}, url = {http://eprint.iacr.org/2004/234}, } @misc{cryptoeprint:2004:235, author = {Alfred Menezes and Edlyn Teske}, title = {Cryptographic Implications of Hess' Generalized GHS Attack}, howpublished = {Cryptology ePrint Archive, Report 2004/235}, year = {2004}, url = {http://eprint.iacr.org/2004/235}, } @misc{cryptoeprint:2004:236, author = {FU Xiaotong, XU Chunxiang and XIAO Guozhen}, title = {Forgery Attacks on Chang et al.'s signature scheme with message recovery}, howpublished = {Cryptology ePrint Archive, Report 2004/236}, year = {2004}, url = {http://eprint.iacr.org/2004/236}, } @misc{cryptoeprint:2004:237, author = {Christopher Wolf and An Braeken and Bart Preneel}, title = {Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC}, howpublished = {Cryptology ePrint Archive, Report 2004/237}, year = {2004}, url = {http://eprint.iacr.org/2004/237}, } @misc{cryptoeprint:2004:238, author = {Amit K Awasthi and Sunder Lal}, title = {Security Analysis of A Dynamic ID-based Remote User Authentication Scheme}, howpublished = {Cryptology ePrint Archive, Report 2004/238}, year = {2004}, url = {http://eprint.iacr.org/2004/238}, } @misc{cryptoeprint:2004:239, author = {Arkady Berenstein and Leon Chernyak}, title = {Geometric Key Establishment}, howpublished = {Cryptology ePrint Archive, Report 2004/239}, year = {2004}, url = {http://eprint.iacr.org/2004/239}, } @misc{cryptoeprint:2004:240, author = {Seigo Arita and Kazuto Matsuo and Koh-ichi Nagao and Mahoro Shimura}, title = {A Weil Descent Attack against Elliptic Curve Cryptosystems over Quartic Extension Fields}, howpublished = {Cryptology ePrint Archive, Report 2004/240}, year = {2004}, url = {http://eprint.iacr.org/2004/240}, } @misc{cryptoeprint:2004:241, author = {Colm O hEigeartaigh}, title = {A Comparison of Point Counting methods for Hyperelliptic Curves over Prime Fields and Fields of Characteristic 2}, howpublished = {Cryptology ePrint Archive, Report 2004/241}, year = {2004}, url = {http://eprint.iacr.org/2004/241}, } @misc{cryptoeprint:2004:242, author = {Vladimir Shpilrain and Gabriel Zapata}, title = {Combinatorial group theory and public key cryptography}, howpublished = {Cryptology ePrint Archive, Report 2004/242}, year = {2004}, url = {http://eprint.iacr.org/2004/242}, } @misc{cryptoeprint:2004:243, author = {Giuseppe Ateniese and Breno de Medeiros}, title = {On the Key Exposure Problem in Chameleon Hashes}, howpublished = {Cryptology ePrint Archive, Report 2004/243}, year = {2004}, url = {http://eprint.iacr.org/2004/243}, } @misc{cryptoeprint:2004:244, author = {Sherman S.M. Chow and Tsz Hon Yuen and Lucas C.K. Hui and S.M. Yiu}, title = {Signcryption in Hierarchical Identity Based Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2004/244}, year = {2004}, url = {http://eprint.iacr.org/2004/244}, } @misc{cryptoeprint:2004:245, author = {Ronald Cramer and Vanesa Daza and Ignacio Gracia and Jorge Jimenez Urroz and Gregor Leander and Jaume Marti-Farre and Carles Padro}, title = {On codes, matroids and secure multi-party computation from linear secret sharing schemes}, howpublished = {Cryptology ePrint Archive, Report 2004/245}, year = {2004}, url = {http://eprint.iacr.org/2004/245}, } @misc{cryptoeprint:2004:246, author = {Nenad Dedic and Gene Itkis and Leonid Reyzin and Scott Russell}, title = {Upper and Lower Bounds on Black-Box Steganography}, howpublished = {Cryptology ePrint Archive, Report 2004/246}, year = {2004}, url = {http://eprint.iacr.org/2004/246}, } @misc{cryptoeprint:2004:247, author = {Jovan Dj. Golic and Guglielmo Morgari}, title = {Vectorial fast correlation attacks}, howpublished = {Cryptology ePrint Archive, Report 2004/247}, year = {2004}, url = {http://eprint.iacr.org/2004/247}, } @misc{cryptoeprint:2004:248, author = {An Braeken and Yuri Borissov and Svetla Nikova and Bart Preneel}, title = {Classification of Boolean Functions of 6 Variables or Less with Respect to Cryptographic Properties}, howpublished = {Cryptology ePrint Archive, Report 2004/248}, year = {2004}, url = {http://eprint.iacr.org/2004/248}, } @misc{cryptoeprint:2004:249, author = {Zhaohui Cheng and Richard Comley}, title = {Attacks On An ISO/IEC 11770-2 Key Establishment Protocol}, howpublished = {Cryptology ePrint Archive, Report 2004/249}, year = {2004}, url = {http://eprint.iacr.org/2004/249}, } @misc{cryptoeprint:2004:250, author = {Jing Xu and Zhenfeng Zhang and Dengguo Feng}, title = {Identity Based Threshold Proxy Signature}, howpublished = {Cryptology ePrint Archive, Report 2004/250}, year = {2004}, url = {http://eprint.iacr.org/2004/250}, } @misc{cryptoeprint:2004:251, author = {Junghyun Nam, Seungjoo Kim, and Dongho Won}, title = {Attacks on Bresson-Chevassut-Essiari-Pointcheval's Group Key Agreement Scheme for Low-Power Mobile Devices}, howpublished = {Cryptology ePrint Archive, Report 2004/251}, year = {2004}, url = {http://eprint.iacr.org/2004/251}, } @misc{cryptoeprint:2004:252, author = {Mihir Bellare and Chanathip Namprempre and Gregory Neven}, title = {Security Proofs for Identity-Based Identification and Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2004/252}, year = {2004}, url = {http://eprint.iacr.org/2004/252}, } @misc{cryptoeprint:2004:253, author = {Stefan Lucks}, title = {Design Principles for Iterated Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2004/253}, year = {2004}, url = {http://eprint.iacr.org/2004/253}, } @misc{cryptoeprint:2004:254, author = {Jovan Dj. Golic}, title = {New paradigms for digital generation and post-processing of random data}, howpublished = {Cryptology ePrint Archive, Report 2004/254}, year = {2004}, url = {http://eprint.iacr.org/2004/254}, } @misc{cryptoeprint:2004:255, author = {Izuru Kitamura and Masanobu Katagi and Tsuyoshi Takagi}, title = {A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two}, howpublished = {Cryptology ePrint Archive, Report 2004/255}, year = {2004}, url = {http://eprint.iacr.org/2004/255}, } @misc{cryptoeprint:2004:256, author = {Claude Carlet and Sihem Mesnager}, title = {On the supports of the Walsh transforms of Boolean functions}, howpublished = {Cryptology ePrint Archive, Report 2004/256}, year = {2004}, url = {http://eprint.iacr.org/2004/256}, } @misc{cryptoeprint:2004:257, author = {Junghyun Nam, Seungjoo Kim, and Dongho Won}, title = {A Weakness in Jung-Paeng-Kim's ID-based Conference Key Distribution Scheme}, howpublished = {Cryptology ePrint Archive, Report 2004/257}, year = {2004}, url = {http://eprint.iacr.org/2004/257}, } @misc{cryptoeprint:2004:258, author = {S.S. Al-Riyami and J. Malone-Lee and N.P. Smart}, title = {Escrow-Free Encryption Supporting Cryptographic Workflow}, howpublished = {Cryptology ePrint Archive, Report 2004/258}, year = {2004}, url = {http://eprint.iacr.org/2004/258}, } @misc{cryptoeprint:2004:259, author = {An Braeken, Ventzislav Nikov, Svetla Nikova, Bart Preneel}, title = {On Boolean Functions with Generalized Cryptographic Properties}, howpublished = {Cryptology ePrint Archive, Report 2004/259}, year = {2004}, url = {http://eprint.iacr.org/2004/259}, } @misc{cryptoeprint:2004:260, author = {Junghyun Nam, Seungjoo Kim, Hyungkyu Yang, and Dongho Won}, title = {Secure Group Communications over Combined Wired/Wireless Networks}, howpublished = {Cryptology ePrint Archive, Report 2004/260}, year = {2004}, url = {http://eprint.iacr.org/2004/260}, } @misc{cryptoeprint:2004:261, author = {Dan Boneh and Jonathan Katz}, title = {Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2004/261}, year = {2004}, url = {http://eprint.iacr.org/2004/261}, } @misc{cryptoeprint:2004:262, author = {Lihua Liu and Zhengjun Cao}, title = {Universal Forgeability of a Forward-Secure Blind Signature Scheme Proposed by Duc et al.}, howpublished = {Cryptology ePrint Archive, Report 2004/262}, year = {2004}, url = {http://eprint.iacr.org/2004/262}, } @misc{cryptoeprint:2004:263, author = {Christopher Wolf and Bart Preneel}, title = {Applications of $\mathcal{M}$ultivariate $\mathcal{Q}$uadratic Public Key Systems}, howpublished = {Cryptology ePrint Archive, Report 2004/263}, year = {2004}, url = {http://eprint.iacr.org/2004/263}, } @misc{cryptoeprint:2004:264, author = {Philip Hawkes and Michael Paddon and Gregory G. Rose}, title = {Musings on the Wang et al. MD5 Collision}, howpublished = {Cryptology ePrint Archive, Report 2004/264}, year = {2004}, url = {http://eprint.iacr.org/2004/264}, } @misc{cryptoeprint:2004:265, author = {Yongge Wang and Bei-Tseng Chu }, title = {sSCADA: Securing SCADA Infrastructure Communications}, howpublished = {Cryptology ePrint Archive, Report 2004/265}, year = {2004}, url = {http://eprint.iacr.org/2004/265}, } @misc{cryptoeprint:2004:266, author = {M. Khabbazian and T.A. Gulliver}, title = {A New Minimal Average Weight Representation for Left-to-Right Point Multiplication Methods}, howpublished = {Cryptology ePrint Archive, Report 2004/266}, year = {2004}, url = {http://eprint.iacr.org/2004/266}, } @misc{cryptoeprint:2004:267, author = {Patrick P. Tsang and Victor K. Wei and Tony K. Chan and Man Ho Au and Joseph K. Liu and Duncan S. Wong}, title = {Separable Linkable Threshold Ring Signatures}, howpublished = {Cryptology ePrint Archive, Report 2004/267}, year = {2004}, url = {http://eprint.iacr.org/2004/267}, } @misc{cryptoeprint:2004:268, author = {Zhengjun Cao and Lihua Liu}, title = {Untraceability of Wang-Fu Group Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2004/268}, year = {2004}, url = {http://eprint.iacr.org/2004/268}, } @misc{cryptoeprint:2004:269, author = {Lifeng Guo}, title = {Cryptanalysis of Threshold-Multisignature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2004/269}, year = {2004}, url = {http://eprint.iacr.org/2004/269}, } @misc{cryptoeprint:2004:270, author = {Fuw-Yi Yang and Jinn-Ke Jan}, title = {An Enhanced and Secure Protocol for Authenticated Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2004/270}, year = {2004}, url = {http://eprint.iacr.org/2004/270}, } @misc{cryptoeprint:2004:271, author = {Philip Hawkes and Michael Paddon and Gregory G. Rose}, title = {The Mundja Streaming MAC}, howpublished = {Cryptology ePrint Archive, Report 2004/271}, year = {2004}, url = {http://eprint.iacr.org/2004/271}, } @misc{cryptoeprint:2004:272, author = {Tom Shrimpton}, title = {A Characterization of Authenticated-Encryption as a Form of Chosen-Ciphertext Security}, howpublished = {Cryptology ePrint Archive, Report 2004/272}, year = {2004}, url = {http://eprint.iacr.org/2004/272}, } @misc{cryptoeprint:2004:273, author = {Lifeng Guo}, title = {Cryptanalysis of Threshold-Multisignature schemes}, howpublished = {Cryptology ePrint Archive, Report 2004/273}, year = {2004}, url = {http://eprint.iacr.org/2004/273}, } @misc{cryptoeprint:2004:274, author = {Meng Qing-shu and Yang min and Zhang huan-guo and Cui jing-song}, title = {A NOVEL ALGORITHM ENUMERATING BENT FUNCTIONS}, howpublished = {Cryptology ePrint Archive, Report 2004/274}, year = {2004}, url = {http://eprint.iacr.org/2004/274}, } @misc{cryptoeprint:2004:275, author = {Wei-Chi Ku and Chun-Ming Ho}, title = {An e-Voting Scheme with Improved Resistance to Bribe and Coercion}, howpublished = {Cryptology ePrint Archive, Report 2004/275}, year = {2004}, url = {http://eprint.iacr.org/2004/275}, } @misc{cryptoeprint:2004:276, author = {C. Carlet}, title = {Improving the algebraic immunity of resilient and nonlinear functions and constructing bent functions}, howpublished = {Cryptology ePrint Archive, Report 2004/276}, year = {2004}, url = {http://eprint.iacr.org/2004/276}, } @misc{cryptoeprint:2004:277, author = {David Naccache and Phong Q. Nguyen and Michael Tunstall and Claire Whelan}, title = {Experimenting with Faults, Lattices and the DSA}, howpublished = {Cryptology ePrint Archive, Report 2004/277}, year = {2004}, url = {http://eprint.iacr.org/2004/277}, } @misc{cryptoeprint:2004:278, author = {David A. McGrew and Scott R. Fluhrer}, title = {The Extended Codebook (XCB) Mode of Operation}, howpublished = {Cryptology ePrint Archive, Report 2004/278}, year = {2004}, url = {http://eprint.iacr.org/2004/278}, } @misc{cryptoeprint:2004:279, author = {Jean-Claude Bajard and Laurent Imbert and Graham A. Jullien}, title = {Parallel Montgomery Multiplication in $GF(2^k)$ using Trinomial Residue Arithmetic}, howpublished = {Cryptology ePrint Archive, Report 2004/279}, year = {2004}, url = {http://eprint.iacr.org/2004/279}, } @misc{cryptoeprint:2004:280, author = {Zhengjun Cao}, title = {Cryptanalysis of Park-Lee Nominative Proxy Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2004/280}, year = {2004}, url = {http://eprint.iacr.org/2004/280}, } @misc{cryptoeprint:2004:281, author = {Patrick P. Tsang and Victor K. Wei}, title = {Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation}, howpublished = {Cryptology ePrint Archive, Report 2004/281}, year = {2004}, url = {http://eprint.iacr.org/2004/281}, } @misc{cryptoeprint:2004:282, author = {Ventzislav Nikov and Svetla Nikova}, title = {New Monotone Span Programs from Old}, howpublished = {Cryptology ePrint Archive, Report 2004/282}, year = {2004}, url = {http://eprint.iacr.org/2004/282}, } @misc{cryptoeprint:2004:283, author = {D. Page and F. Vercauteren}, title = {Fault and Side-Channel Attacks on Pairing Based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2004/283}, year = {2004}, url = {http://eprint.iacr.org/2004/283}, } @misc{cryptoeprint:2004:284, author = {Qingshu Meng and Huanguo Zhang and Min Yang and Jingsong Cui}, title = {ON THE DEGREE OF HOMOGENEOUS BENT FUNCTIONS}, howpublished = {Cryptology ePrint Archive, Report 2004/284}, year = {2004}, url = {http://eprint.iacr.org/2004/284}, } @misc{cryptoeprint:2004:285, author = {Annegret Weng}, title = {Generation of random Picard curves for cryptography}, howpublished = {Cryptology ePrint Archive, Report 2004/285}, year = {2004}, url = {http://eprint.iacr.org/2004/285}, } @misc{cryptoeprint:2004:286, author = {Daniele Micciancio}, title = {Generalized compact knapsacks, cyclic lattices, and efficient one-way functions from worst-case complexity assumptions}, howpublished = {Cryptology ePrint Archive, Report 2004/286}, year = {2004}, url = {http://eprint.iacr.org/2004/286}, } @misc{cryptoeprint:2004:287, author = {Duong Quang Viet and Kaoru Kurosawa}, title = {Almost Ideal Contrast Visual Cryptography with Reversing}, howpublished = {Cryptology ePrint Archive, Report 2004/287}, year = {2004}, url = {http://eprint.iacr.org/2004/287}, } @misc{cryptoeprint:2004:288, author = {Yong Li and Dingyi Pei}, title = {A New Designated Confirmer Signature Variant with Intended Recipient}, howpublished = {Cryptology ePrint Archive, Report 2004/288}, year = {2004}, url = {http://eprint.iacr.org/2004/288}, } @misc{cryptoeprint:2004:289, author = {Kai Wirt}, title = {Fault attack on the DVB Common Scrambling Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2004/289}, year = {2004}, url = {http://eprint.iacr.org/2004/289}, } @misc{cryptoeprint:2004:290, author = {Wakaha Ogata and Kaoru Kurosawa and Swee-Huay Heng }, title = {The Security of the FDH Variant of Chaum's Undeniable Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2004/290}, year = {2004}, url = {http://eprint.iacr.org/2004/290}, } @misc{cryptoeprint:2004:291, author = {Martin Boesgaard and Thomas Pedersen and Mette Vesterager and Erik Zenner}, title = {The Rabbit Stream Cipher - Design and Security Analysis}, howpublished = {Cryptology ePrint Archive, Report 2004/291}, year = {2004}, url = {http://eprint.iacr.org/2004/291}, } @misc{cryptoeprint:2004:292, author = {Ruishan Zhang and Kefei Chen}, title = {Asynchronous Proactive RSA}, howpublished = {Cryptology ePrint Archive, Report 2004/292}, year = {2004}, url = {http://eprint.iacr.org/2004/292}, } @misc{cryptoeprint:2004:293, author = {Jana Dittmann and Stefan Katzenbeisser and Christian Schallhart and Helmut Veith}, title = {Provably Secure Authentication of Digital Media Through Invertible Watermarks}, howpublished = {Cryptology ePrint Archive, Report 2004/293}, year = {2004}, url = {http://eprint.iacr.org/2004/293}, } @misc{cryptoeprint:2004:294, author = {Souradyuti Paul and Bart Preneel}, title = {Solving Systems of Differential Equations of Addition}, howpublished = {Cryptology ePrint Archive, Report 2004/294}, year = {2004}, url = {http://eprint.iacr.org/2004/294}, } @misc{cryptoeprint:2004:295, author = {Jiang Wu and Ruizhong Wei}, title = {An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security}, howpublished = {Cryptology ePrint Archive, Report 2004/295}, year = {2004}, url = {http://eprint.iacr.org/2004/295}, } @misc{cryptoeprint:2004:296, author = {Mridul Nandi}, title = {Designs of Efficient Secure Large Hash Values}, howpublished = {Cryptology ePrint Archive, Report 2004/296}, year = {2004}, url = {http://eprint.iacr.org/2004/296}, } @misc{cryptoeprint:2004:297, author = {Johannes Buchmann and Carlos Coronado and Martin Döring and Daniela Engelbert and Christoph Ludwig and Raphael Overbeck and Arthur Schmidt and Ulrich Vollmer and Ralf-Philipp Weinmann}, title = {Post-Quantum Signatures}, howpublished = {Cryptology ePrint Archive, Report 2004/297}, year = {2004}, url = {http://eprint.iacr.org/2004/297}, } @misc{cryptoeprint:2004:298, author = {Zuo-Wen Tan,Zhuo-Jun Liu}, title = {Nominative Proxy Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2004/298}, year = {2004}, url = {http://eprint.iacr.org/2004/298}, } @misc{cryptoeprint:2004:299, author = {Zhengjun Cao and Sherman S.M. Chow}, title = {Security Flaws in a Pairing-based Group Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2004/299}, year = {2004}, url = {http://eprint.iacr.org/2004/299}, } @misc{cryptoeprint:2004:300, author = {Michael Backes and Birgit Pfitzmann}, title = {Relating Symbolic and Cryptographic Secrecy}, howpublished = {Cryptology ePrint Archive, Report 2004/300}, year = {2004}, url = {http://eprint.iacr.org/2004/300}, } @misc{cryptoeprint:2004:301, author = {Bartosz Zoltak}, title = {VMPC-MAC: A Stream Cipher Based Authenticated Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2004/301}, year = {2004}, url = {http://eprint.iacr.org/2004/301}, } @misc{cryptoeprint:2004:302, author = {Lifeng Guo}, title = {Security of Wang-Li Threshold Signature Scheme }, howpublished = {Cryptology ePrint Archive, Report 2004/302}, year = {2004}, url = {http://eprint.iacr.org/2004/302}, } @misc{cryptoeprint:2004:303, author = {Soonhak Kwon}, title = {Efficient Tate Pairing Computation for Supersingular Elliptic Curves over Binary Fields}, howpublished = {Cryptology ePrint Archive, Report 2004/303}, year = {2004}, url = {http://eprint.iacr.org/2004/303}, } @misc{cryptoeprint:2004:304, author = {John Kelsey and Bruce Schneier}, title = {Second Preimages on n-bit Hash Functions for Much Less than 2^n Work}, howpublished = {Cryptology ePrint Archive, Report 2004/304}, year = {2004}, url = {http://eprint.iacr.org/2004/304}, } @misc{cryptoeprint:2004:305, author = {Paulo S. L. M. Barreto}, title = {A note on efficient computation of cube roots in characteristic 3}, howpublished = {Cryptology ePrint Archive, Report 2004/305}, year = {2004}, url = {http://eprint.iacr.org/2004/305}, } @misc{cryptoeprint:2004:306, author = {Daniel R. L. Brown and Robert P. Gallant}, title = {The Static Diffie-Hellman Problem}, howpublished = {Cryptology ePrint Archive, Report 2004/306}, year = {2004}, url = {http://eprint.iacr.org/2004/306}, } @misc{cryptoeprint:2004:307, author = {Zhengjun Cao}, title = {Universal Forgeability of Wang-Wu-Wang Key-Insulated Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2004/307}, year = {2004}, url = {http://eprint.iacr.org/2004/307}, } @misc{cryptoeprint:2004:308, author = {Guohong Xie}, title = {Cryptanalysis of Noel McCullagh and Paulo S. L. M. Barreto¡¯s two-party identity-based key agreement}, howpublished = {Cryptology ePrint Archive, Report 2004/308}, year = {2004}, url = {http://eprint.iacr.org/2004/308}, } @misc{cryptoeprint:2004:309, author = {Mihir Bellare and Oded Goldreich and Anton Mityagin}, title = {The Power of Verification Queries in Message Authentication and Authenticated Encryption}, howpublished = {Cryptology ePrint Archive, Report 2004/309}, year = {2004}, url = {http://eprint.iacr.org/2004/309}, } @misc{cryptoeprint:2004:310, author = {Yevgeniy Dodis and Aleksandr Yampolskiy}, title = {A Verifiable Random Function With Short Proofs and Keys}, howpublished = {Cryptology ePrint Archive, Report 2004/310}, year = {2004}, url = {http://eprint.iacr.org/2004/310}, } @misc{cryptoeprint:2004:311, author = {Marten Trolin and Douglas Wikstrom}, title = {Hierarchical Group Signatures}, howpublished = {Cryptology ePrint Archive, Report 2004/311}, year = {2004}, url = {http://eprint.iacr.org/2004/311}, } @misc{cryptoeprint:2004:312, author = {David Jao and Stephen D. Miller and Ramarathnam Venkatesan}, title = {Ramanujan Graphs and the Random Reducibility of Discrete Log on Isogenous Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2004/312}, year = {2004}, url = {http://eprint.iacr.org/2004/312}, } @misc{cryptoeprint:2004:313, author = {Fuw-Yi Yang, Jinn-Ke Jan, and Woei-Jiunn Jeng}, title = {Cryptanalysis of a threshold proxy signature with known signers}, howpublished = {Cryptology ePrint Archive, Report 2004/313}, year = {2004}, url = {http://eprint.iacr.org/2004/313}, } @misc{cryptoeprint:2004:314, author = {AbdelNasir Alshamsi and Takamichi Saito}, title = {A Technical Comparison of IPSec and SSL}, howpublished = {Cryptology ePrint Archive, Report 2004/314}, year = {2004}, url = {http://eprint.iacr.org/2004/314}, } @misc{cryptoeprint:2004:315, author = {Qin Wang, Zhenfu Cao}, title = {Security Arguments for Partial Delegation with Warrant Proxy Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2004/315}, year = {2004}, url = {http://eprint.iacr.org/2004/315}, } @misc{cryptoeprint:2004:316, author = {Zhengjun Cao}, title = {On a Threshold Group Signature Scheme and a Fair Blind Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2004/316}, year = {2004}, url = {http://eprint.iacr.org/2004/316}, } @misc{cryptoeprint:2004:317, author = {Ran Canetti and Shai Halevi and Jonathan Katz}, title = {Adaptively-Secure, Non-Interactive Public-Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2004/317}, year = {2004}, url = {http://eprint.iacr.org/2004/317}, } @misc{cryptoeprint:2004:318, author = {Martin Hirt and Jesper Buus Nielsen}, title = {Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2004/318}, year = {2004}, url = {http://eprint.iacr.org/2004/318}, } @misc{cryptoeprint:2004:319, author = {Martin Boesgaard and Ove Scavenius and Thomas Pedersen and Thomas Christensen and Erik Zenner}, title = {Badger - A Fast and Provably Secure MAC}, howpublished = {Cryptology ePrint Archive, Report 2004/319}, year = {2004}, url = {http://eprint.iacr.org/2004/319}, } @misc{cryptoeprint:2004:320, author = {Alfonso De Gregorio}, title = {Upper Bounds for the Selection of the Cryptographic Key Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults}, howpublished = {Cryptology ePrint Archive, Report 2004/320}, year = {2004}, url = {http://eprint.iacr.org/2004/320}, } @misc{cryptoeprint:2004:321, author = {Vladimir Shpilrain and Alexander Ushakov}, title = {The conjugacy search problem in public key cryptography: unnecessary and insufficient}, howpublished = {Cryptology ePrint Archive, Report 2004/321}, year = {2004}, url = {http://eprint.iacr.org/2004/321}, } @misc{cryptoeprint:2004:322, author = {Ai-fen Sui and Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu and K.P. Chow and W.W. Tsang and C.F. Chong and K.H. Pun and H.W. Chan}, title = {Separable and Anonymous Identity-Based Key Issuing}, howpublished = {Cryptology ePrint Archive, Report 2004/322}, year = {2004}, url = {http://eprint.iacr.org/2004/322}, } @misc{cryptoeprint:2004:323, author = {Tanja Lange}, title = {A note on L\'opez-Dahab coordinates}, howpublished = {Cryptology ePrint Archive, Report 2004/323}, year = {2004}, url = {http://eprint.iacr.org/2004/323}, } @misc{cryptoeprint:2004:324, author = {G. Laccetti and G. Schmid}, title = {On a Probabilistic Approach to the Security Analysis of Cryptographic Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2004/324}, year = {2004}, url = {http://eprint.iacr.org/2004/324}, } @misc{cryptoeprint:2004:325, author = {Mitsuhiro HATTORI and Shoichi HIROSE and Susumu YOSHIDA}, title = {Complexity of the Collision and Near-Collision Attack on SHA-0 with Different Message Schedules}, howpublished = {Cryptology ePrint Archive, Report 2004/325}, year = {2004}, url = {http://eprint.iacr.org/2004/325}, } @misc{cryptoeprint:2004:326, author = {Zhengjun Cao}, title = {Cryptanalysis of Qiu-Gu-Chen Variant Group Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2004/326}, year = {2004}, url = {http://eprint.iacr.org/2004/326}, } @misc{cryptoeprint:2004:327, author = {Sherman S.M. Chow and S.M. Yiu and Lucas C.K. Hui}, title = {Efficient Identity Based Ring Signature}, howpublished = {Cryptology ePrint Archive, Report 2004/327}, year = {2004}, url = {http://eprint.iacr.org/2004/327}, } @misc{cryptoeprint:2004:328, author = {Mridul Nandi and Wonil Lee and Kouichi Sakurai and Sangjin Lee}, title = {Security Analysis of a 2/3-rate Double Length Compression Function in Black-Box Model}, howpublished = {Cryptology ePrint Archive, Report 2004/328}, year = {2004}, url = {http://eprint.iacr.org/2004/328}, } @misc{cryptoeprint:2004:329, author = {Ran Canetti and Shai Halevi and Michael Steiner}, title = {Hardness amplification of weakly verifiable puzzles}, howpublished = {Cryptology ePrint Archive, Report 2004/329}, year = {2004}, url = {http://eprint.iacr.org/2004/329}, } @misc{cryptoeprint:2004:330, author = {M. Nandi and D. R. Stinson}, title = {Multicollision Attacks on Generalized Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2004/330}, year = {2004}, url = {http://eprint.iacr.org/2004/330}, } @misc{cryptoeprint:2004:331, author = {Mihir Bellare and Phillip Rogaway}, title = {Code-Based Game-Playing Proofs and the Security of Triple Encryption}, howpublished = {Cryptology ePrint Archive, Report 2004/331}, year = {2004}, url = {http://eprint.iacr.org/2004/331}, } @misc{cryptoeprint:2004:332, author = {Victor Shoup}, title = {Sequences of games: a tool for taming complexity in security proofs}, howpublished = {Cryptology ePrint Archive, Report 2004/332}, year = {2004}, url = {http://eprint.iacr.org/2004/332}, } @misc{cryptoeprint:2004:333, author = {Marius-Calin Silaghi}, title = {Secure Multi-party Computation for selecting a solution according to a uniform distribution over all solutions of a general combinatorial problem}, howpublished = {Cryptology ePrint Archive, Report 2004/333}, year = {2004}, url = {http://eprint.iacr.org/2004/333}, } @misc{cryptoeprint:2004:334, author = {Ran Canetti and Jonathan Herzog}, title = {Universally Composable Symbolic Analysis of Cryptographic Protocols (The case of encryption-based mutual authentication and key exchange)}, howpublished = {Cryptology ePrint Archive, Report 2004/334}, year = {2004}, url = {http://eprint.iacr.org/2004/334}, } @misc{cryptoeprint:2004:335, author = {Haitner Iftach and Shaltiel Ronen }, title = {Statistical Zero-Knowledge Arguments for NP Using Approximable-Preimage-Size One-Way Functions }, howpublished = {Cryptology ePrint Archive, Report 2004/335}, year = {2004}, url = {http://eprint.iacr.org/2004/335}, } @misc{cryptoeprint:2004:336, author = {Stefan Wolf and J\"urg Wullschleger}, title = {Oblivious Transfer Is Symmetric}, howpublished = {Cryptology ePrint Archive, Report 2004/336}, year = {2004}, url = {http://eprint.iacr.org/2004/336}, } @misc{cryptoeprint:2004:337, author = {Wu Wenling and Zhang Wentao and Lin Dongdai }, title = {Security on Generalized Feistel Scheme with SP Round Function}, howpublished = {Cryptology ePrint Archive, Report 2004/337}, year = {2004}, url = {http://eprint.iacr.org/2004/337}, } @misc{cryptoeprint:2004:338, author = {Yumiko Hanaoka and Goichiro Hanaoka and Junji Shikata and Hideki Imai}, title = {Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application}, howpublished = {Cryptology ePrint Archive, Report 2004/338}, year = {2004}, url = {http://eprint.iacr.org/2004/338}, } @misc{cryptoeprint:2004:339, author = {Don Coppersmith and Nick Howgrave-Graham and S. V. Nagaraj}, title = {Divisors in Residue Classes, Constructively}, howpublished = {Cryptology ePrint Archive, Report 2004/339}, year = {2004}, url = {http://eprint.iacr.org/2004/339}, } @misc{cryptoeprint:2004:340, author = {Morris Dworkin}, title = {Request for Review of Key Wrap Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2004/340}, year = {2004}, url = {http://eprint.iacr.org/2004/340}, } @misc{cryptoeprint:2004:341, author = {Omer Horvitz and Jonathan Katz and Chiu-Yuen Koo and Ruggero Morselli}, title = {Reducing Complexity Assumptions for Statistically-Hiding Commitment}, howpublished = {Cryptology ePrint Archive, Report 2004/341}, year = {2004}, url = {http://eprint.iacr.org/2004/341}, } @misc{cryptoeprint:2004:342, author = {Mustapha Hedabou and Pierre Pinel and Lucien Bénéteau}, title = {A comb method to render ECC resistant against Side Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2004/342}, year = {2004}, url = {http://eprint.iacr.org/2004/342}, } @misc{cryptoeprint:2004:343, author = {Kim-Kwang Raymond Choo}, title = {Revisit Of McCullagh--Barreto Two-Party ID-Based Authenticated Key Agreement Protocols}, howpublished = {Cryptology ePrint Archive, Report 2004/343}, year = {2004}, url = {http://eprint.iacr.org/2004/343}, } @misc{cryptoeprint:2004:344, author = {Nick Howgrave-Graham and Joseph H. Silverman and Ari Singer and William Whyte}, title = {Modified Parameter Attacks: Practical Attacks against CCA2 Secure Cryptosystems and Countermeasures}, howpublished = {Cryptology ePrint Archive, Report 2004/344}, year = {2004}, url = {http://eprint.iacr.org/2004/344}, } @misc{cryptoeprint:2004:345, author = {Kim-Kwang Raymond Choo and Colin Boyd and Yvonne Hitchcock and Greg Maitland}, title = {On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited}, howpublished = {Cryptology ePrint Archive, Report 2004/345}, year = {2004}, url = {http://eprint.iacr.org/2004/345}, } @misc{cryptoeprint:2004:346, author = {Daisuke Suzuki and Minoru Saeki and Tetsuya Ichikawa}, title = {Random Switching Logic: A Countermeasure against DPA based on Transition Probability}, howpublished = {Cryptology ePrint Archive, Report 2004/346}, year = {2004}, url = {http://eprint.iacr.org/2004/346}, } @misc{cryptoeprint:2004:347, author = {Marco Macchetti}, title = {Addendum to ``On the Generalized Linear Equivalence of Functions over Finite Fields''}, howpublished = {Cryptology ePrint Archive, Report 2004/347}, year = {2004}, url = {http://eprint.iacr.org/2004/347}, } @misc{cryptoeprint:2004:348, author = {Junghyun Nam, Seungjoo Kim, and Dongho Won}, title = {A weakness in Sun-Chen-Hwang's three-party key agreement protocols using passwords}, howpublished = {Cryptology ePrint Archive, Report 2004/348}, year = {2004}, url = {http://eprint.iacr.org/2004/348}, } @misc{cryptoeprint:2004:349, author = {Dong Jin PARK and Pil Joong LEE}, title = {A DPA Attack on the Improved Ha-Moon Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2004/349}, year = {2004}, url = {http://eprint.iacr.org/2004/349}, } @misc{cryptoeprint:2004:350, author = {Jintai Ding and Dieter Schmidt}, title = {Multivariable public--key cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2004/350}, year = {2004}, url = {http://eprint.iacr.org/2004/350}, } @misc{cryptoeprint:2004:351, author = {ZhenFeng ZHANG and YongBin ZHOU and DengGuo FENG}, title = {Efficient and Optimistic Fair Exchanges Based on Standard RSA with Provable Security}, howpublished = {Cryptology ePrint Archive, Report 2004/351}, year = {2004}, url = {http://eprint.iacr.org/2004/351}, } @misc{cryptoeprint:2004:352, author = {Marten van Dijk and Robert Granger and Dan Page and Karl Rubin and Alice Silverberg and Martijn Stam and David Woodruff}, title = {Practical Cryptography in High Dimensional Tori}, howpublished = {Cryptology ePrint Archive, Report 2004/352}, year = {2004}, url = {http://eprint.iacr.org/2004/352}, } @misc{cryptoeprint:2004:353, author = {Patrick Fitzpatrick and Christopher Wolf}, title = {Direct Division in Factor Rings}, howpublished = {Cryptology ePrint Archive, Report 2004/353}, year = {2004}, url = {http://eprint.iacr.org/2004/353}, } @misc{cryptoeprint:2004:354, author = {Alexander Maximov}, title = {Classes of Plateaued Rotation Symmetric Boolean Functions under Transformation of Walsh Spectra}, howpublished = {Cryptology ePrint Archive, Report 2004/354}, year = {2004}, url = {http://eprint.iacr.org/2004/354}, } @misc{cryptoeprint:2004:355, author = {Pei-yih Ting and Po-Yueh Hung}, title = {A Small-Scale Voting Protocol Hiding Vote-Counts of All Candidates}, howpublished = {Cryptology ePrint Archive, Report 2004/355}, year = {2004}, url = {http://eprint.iacr.org/2004/355}, } @misc{cryptoeprint:2004:356, author = {Ondrej Mikle}, title = {Practical Attacks on Digital Signatures Using MD5 Message Digest}, howpublished = {Cryptology ePrint Archive, Report 2004/356}, year = {2004}, url = {http://eprint.iacr.org/2004/356}, } @misc{cryptoeprint:2004:357, author = {Dan Kaminsky}, title = {MD5 To Be Considered Harmful Someday}, howpublished = {Cryptology ePrint Archive, Report 2004/357}, year = {2004}, url = {http://eprint.iacr.org/2004/357}, } @misc{cryptoeprint:2004:358, author = {Xavier Boyen}, title = {Reusable Cryptographic Fuzzy Extractors}, howpublished = {Cryptology ePrint Archive, Report 2004/358}, year = {2004}, url = {http://eprint.iacr.org/2004/358}, } @misc{cryptoeprint:2004:359, author = {Eike Kiltz and Gregor Leander and John Malone-Lee}, title = {Secure Computation of the Mean and Related Statistics}, howpublished = {Cryptology ePrint Archive, Report 2004/359}, year = {2004}, url = {http://eprint.iacr.org/2004/359}, } @misc{cryptoeprint:2004:360, author = {Christopher Wolf and Bart Preneel}, title = {Equivalent Keys in HFE, C$^*$, and variations}, howpublished = {Cryptology ePrint Archive, Report 2004/360}, year = {2004}, url = {http://eprint.iacr.org/2004/360}, } @misc{cryptoeprint:2004:361, author = {Christopher Wolf and Bart Preneel}, title = {Superfluous Keys in Multivariate Quadratic Asymmetric Systems}, howpublished = {Cryptology ePrint Archive, Report 2004/361}, year = {2004}, url = {http://eprint.iacr.org/2004/361}, } @misc{cryptoeprint:2004:362, author = {Kristian Gjøsteen}, title = {A new security proof for Damgård's ElGamal}, howpublished = {Cryptology ePrint Archive, Report 2004/362}, year = {2004}, url = {http://eprint.iacr.org/2004/362}, } @misc{cryptoeprint:2004:363, author = {Qiang Tang and Chris J. Mitchell}, title = {Rethinking the security of some authenticated group key agreement schemes}, howpublished = {Cryptology ePrint Archive, Report 2004/363}, year = {2004}, url = {http://eprint.iacr.org/2004/363}, } @misc{cryptoeprint:2004:364, author = {Krystian Matusiewicz and Josef Pieprzyk}, title = {Finding good differential patterns for attacks on SHA-1}, howpublished = {Cryptology ePrint Archive, Report 2004/364}, year = {2004}, url = {http://eprint.iacr.org/2004/364}, } @misc{cryptoeprint:2004:365, author = {Steven D. Galbraith, and J. McKee and P. Valenca}, title = {Ordinary abelian varieties having small embedding degree}, howpublished = {Cryptology ePrint Archive, Report 2004/365}, year = {2004}, url = {http://eprint.iacr.org/2004/365}, } @misc{cryptoeprint:2004:366, author = {Shigeo Tsujii and Kohtaro Tadaki and Ryou Fujita}, title = {Piece In Hand Concept for Enhancing the Security of Multivariate Type Public Key Cryptosystems: Public Key Without Containing All the Information of Secret Key}, howpublished = {Cryptology ePrint Archive, Report 2004/366}, year = {2004}, url = {http://eprint.iacr.org/2004/366}, } @misc{cryptoeprint:2004:367, author = {Patrick Felke}, title = {On the Affine Transformations of HFE-Cryptosystems and Systems with Branches}, howpublished = {Cryptology ePrint Archive, Report 2004/367}, year = {2004}, url = {http://eprint.iacr.org/2004/367}, } @misc{cryptoeprint:2004:368, author = {Martin Hirt and Jesper Buus Nielsen and Bartosz Przydatek}, title = {Cryptographic Asynchronous Multi-Party Computation with Optimal Resilience}, howpublished = {Cryptology ePrint Archive, Report 2004/368}, year = {2004}, url = {http://eprint.iacr.org/2004/368}, } @misc{cryptoeprint:2004:369, author = {Filipe Rosado da-Fonseca}, title = {SCA1 Model: Towards a concrete security approach to the design of cryptosystems secure against side-channel attacks}, howpublished = {Cryptology ePrint Archive, Report 2004/369}, year = {2004}, url = {http://eprint.iacr.org/2004/369}, } @misc{cryptoeprint:2004:370, author = {Victor K. Wei}, title = {Tracing-by-Linking Group Signautres}, howpublished = {Cryptology ePrint Archive, Report 2004/370}, year = {2004}, url = {http://eprint.iacr.org/2004/370}, } @misc{cryptoeprint:2004:371, author = {Vipul Goyal}, title = {Construction and Traversal of Hash Chain with Public Links}, howpublished = {Cryptology ePrint Archive, Report 2004/371}, year = {2004}, url = {http://eprint.iacr.org/2004/371}, } @misc{cryptoeprint:2004:372, author = {Xingyang Guo}, title = {On The Security of Two Key-Updating Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2004/372}, year = {2004}, url = {http://eprint.iacr.org/2004/372}, } @misc{cryptoeprint:2004:373, author = {Chunming Tang and Dingyi Pei and Zhuojun Liu}, title = {Delegateable Signature Using Witness Indistinguishable and Witness Hiding Proofs}, howpublished = {Cryptology ePrint Archive, Report 2004/373}, year = {2004}, url = {http://eprint.iacr.org/2004/373}, } @misc{cryptoeprint:2004:374, author = {Shujun Li and Chengqing Li and Guanrong Chen and Nikolaos G. Bourbakis and Kwok-Tung Lo}, title = {A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks}, howpublished = {Cryptology ePrint Archive, Report 2004/374}, year = {2004}, url = {http://eprint.iacr.org/2004/374}, } @misc{cryptoeprint:2004:375, author = {Paulo S. L. M. Barreto and Steven Galbraith and Colm O hEigeartaigh and Michael Scott}, title = {Efficient Pairing Computation on Supersingular Abelian Varieties}, howpublished = {Cryptology ePrint Archive, Report 2004/375}, year = {2004}, url = {http://eprint.iacr.org/2004/375}, } @misc{cryptoeprint:2004:376, author = {Shujun Li and Chengqing Li and Guanrong Chen and Kwok-Tung Lo}, title = {Cryptanalysis of RCES/RSES Image Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2004/376}, year = {2004}, url = {http://eprint.iacr.org/2004/376}, } @misc{cryptoeprint:2004:377, author = {Javier Herranz and Germ\'an S\'aez}, title = {New Distributed Ring Signatures for General Families of Signing Subsets}, howpublished = {Cryptology ePrint Archive, Report 2004/377}, year = {2004}, url = {http://eprint.iacr.org/2004/377}, } @misc{cryptoeprint:2005:001, author = {Hoeteck Wee}, title = {On Obfuscating Point Functions}, howpublished = {Cryptology ePrint Archive, Report 2005/001}, year = {2005}, url = {http://eprint.iacr.org/2005/001}, } @misc{cryptoeprint:2005:002, author = {Jason E. Holt and Kent E. Seamons}, title = {Logcrypt: Forward Security and Public Verification for Secure Audit Logs}, howpublished = {Cryptology ePrint Archive, Report 2005/002}, year = {2005}, url = {http://eprint.iacr.org/2005/002}, } @misc{cryptoeprint:2005:003, author = {Vlastimil Klima}, title = {Cryptanalysis of Hiji-bij-bij (HBB)}, howpublished = {Cryptology ePrint Archive, Report 2005/003}, year = {2005}, url = {http://eprint.iacr.org/2005/003}, } @misc{cryptoeprint:2005:004, author = {Jacques Patarin and Audrey Montreuil}, title = {Benes and Butterfly schemes revisited}, howpublished = {Cryptology ePrint Archive, Report 2005/004}, year = {2005}, url = {http://eprint.iacr.org/2005/004}, } @misc{cryptoeprint:2005:005, author = {Shai Halevi}, title = {A sufficient condition for key-privacy}, howpublished = {Cryptology ePrint Archive, Report 2005/005}, year = {2005}, url = {http://eprint.iacr.org/2005/005}, } @misc{cryptoeprint:2005:006, author = {Pradeep Kumar Mishra and Kishan Chand Gupta}, title = {A Metric on the Set of Elliptic Curves over ${\mathbf F}_p$.}, howpublished = {Cryptology ePrint Archive, Report 2005/006}, year = {2005}, url = {http://eprint.iacr.org/2005/006}, } @misc{cryptoeprint:2005:007, author = {Hongjun Wu}, title = {The Misuse of RC4 in Microsoft Word and Excel}, howpublished = {Cryptology ePrint Archive, Report 2005/007}, year = {2005}, url = {http://eprint.iacr.org/2005/007}, } @misc{cryptoeprint:2005:008, author = {J. Wu and R. Wei}, title = {Comments on ``Distributed Symmetric Key Management for Mobile Ad hoc Networks" from INFOCOM 2004}, howpublished = {Cryptology ePrint Archive, Report 2005/008}, year = {2005}, url = {http://eprint.iacr.org/2005/008}, } @misc{cryptoeprint:2005:009, author = {Bernd Schomburg}, title = {Mixing properties of triangular feedback shift registers}, howpublished = {Cryptology ePrint Archive, Report 2005/009}, year = {2005}, url = {http://eprint.iacr.org/2005/009}, } @misc{cryptoeprint:2005:010, author = {Vincent Rijmen and Elisabeth Oswald}, title = {Update on SHA-1}, howpublished = {Cryptology ePrint Archive, Report 2005/010}, year = {2005}, url = {http://eprint.iacr.org/2005/010}, } @misc{cryptoeprint:2005:011, author = {Yuanchao Zhao and Daoben Li}, title = {An Improved Elegant Method to Re-initialize Hash Chains}, howpublished = {Cryptology ePrint Archive, Report 2005/011}, year = {2005}, url = {http://eprint.iacr.org/2005/011}, } @misc{cryptoeprint:2005:012, author = {Zhaohui Cheng and Richard Comley}, title = {Efficient Certificateless Public Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2005/012}, year = {2005}, url = {http://eprint.iacr.org/2005/012}, } @misc{cryptoeprint:2005:013, author = {Hung-Yu Chien}, title = {Comments: Insider attack on Cheng et al.'s pairing-based tripartite key agreement protocols}, howpublished = {Cryptology ePrint Archive, Report 2005/013}, year = {2005}, url = {http://eprint.iacr.org/2005/013}, } @misc{cryptoeprint:2005:014, author = {Ludovic Perret}, title = {A Chosen Ciphertext Attack on a Public Key Cryptosystem Based on Lyndon Words}, howpublished = {Cryptology ePrint Archive, Report 2005/014}, year = {2005}, url = {http://eprint.iacr.org/2005/014}, } @misc{cryptoeprint:2005:015, author = {Dan Boneh and Xavier Boyen and Eu-Jin Goh}, title = {Hierarchical Identity Based Encryption with Constant Size Ciphertext}, howpublished = {Cryptology ePrint Archive, Report 2005/015}, year = {2005}, url = {http://eprint.iacr.org/2005/015}, } @misc{cryptoeprint:2005:016, author = {Magnus Daum}, title = {Narrow T-functions}, howpublished = {Cryptology ePrint Archive, Report 2005/016}, year = {2005}, url = {http://eprint.iacr.org/2005/016}, } @misc{cryptoeprint:2005:017, author = {Roberto M. Avanzi}, title = {Side Channel Attacks on Implementations of Curve-Based Cryptographic Primitives}, howpublished = {Cryptology ePrint Archive, Report 2005/017}, year = {2005}, url = {http://eprint.iacr.org/2005/017}, } @misc{cryptoeprint:2005:018, author = {Dan Boneh and Craig Gentry and Brent Waters}, title = {Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys}, howpublished = {Cryptology ePrint Archive, Report 2005/018}, year = {2005}, url = {http://eprint.iacr.org/2005/018}, } @misc{cryptoeprint:2005:019, author = {Jes{\'u}s F. Almansa}, title = {The Full Abstraction of the UC Framework}, howpublished = {Cryptology ePrint Archive, Report 2005/019}, year = {2005}, url = {http://eprint.iacr.org/2005/019}, } @misc{cryptoeprint:2005:020, author = {R. Janvier and Y. Lakhnech and L. Mazare}, title = {(De)Compositions of Cryptographic Schemes and their Applications to Protocols}, howpublished = {Cryptology ePrint Archive, Report 2005/020}, year = {2005}, url = {http://eprint.iacr.org/2005/020}, } @misc{cryptoeprint:2005:021, author = {Eabhnat N\'{\i} Fhloinn and Michael Purser}, title = {Partial Hiding in Public-Key Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2005/021}, year = {2005}, url = {http://eprint.iacr.org/2005/021}, } @misc{cryptoeprint:2005:022, author = {ChangKyun Kim and JaeCheol Ha and SangJae Moon and Sung-Ming Yen and Wei-Chih Lien and Sung-Hyun Kim}, title = {An Improved and Efficient Countermeasure against Power Analysis Attacks}, howpublished = {Cryptology ePrint Archive, Report 2005/022}, year = {2005}, url = {http://eprint.iacr.org/2005/022}, } @misc{cryptoeprint:2005:023, author = {Masao Kasahara}, title = {A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness}, howpublished = {Cryptology ePrint Archive, Report 2005/023}, year = {2005}, url = {http://eprint.iacr.org/2005/023}, } @misc{cryptoeprint:2005:024, author = {A. A. Kalele and V. R. Sule}, title = {Weak keys of the Diffe Hellman key exchange I}, howpublished = {Cryptology ePrint Archive, Report 2005/024}, year = {2005}, url = {http://eprint.iacr.org/2005/024}, } @misc{cryptoeprint:2005:025, author = {Meng Qing-shu and Yang min and Zhang Huan-guo and Liu Yu-zhen}, title = {Analysis of Affinely Equivalent Boolean Functions}, howpublished = {Cryptology ePrint Archive, Report 2005/025}, year = {2005}, url = {http://eprint.iacr.org/2005/025}, } @misc{cryptoeprint:2005:026, author = {Jovan Dj. Golic}, title = {Techniques for random maskin in hardware}, howpublished = {Cryptology ePrint Archive, Report 2005/026}, year = {2005}, url = {http://eprint.iacr.org/2005/026}, } @misc{cryptoeprint:2005:027, author = {Masayuki ABE and Rosario Gennaro and Kaoru Kurosawa}, title = {Tag-KEM/DEM: A New Framework for Hybrid Encryption}, howpublished = {Cryptology ePrint Archive, Report 2005/027}, year = {2005}, url = {http://eprint.iacr.org/2005/027}, } @misc{cryptoeprint:2005:028, author = {Giuseppe Ateniese and Kevin Fu and Matthew Green and Susan Hohenberger}, title = {Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage}, howpublished = {Cryptology ePrint Archive, Report 2005/028}, year = {2005}, url = {http://eprint.iacr.org/2005/028}, } @misc{cryptoeprint:2005:029, author = {Boaz Barak and Shai Halevi}, title = {A model and architecture for pseudo-random generation with applications to /dev/random}, howpublished = {Cryptology ePrint Archive, Report 2005/029}, year = {2005}, url = {http://eprint.iacr.org/2005/029}, } @misc{cryptoeprint:2005:030, author = {A. A. Kalele and V. R. Sule}, title = {Weak keys of the Diffie Hellman key exchange II : Pairing based schemes on elliptic curves.}, howpublished = {Cryptology ePrint Archive, Report 2005/030}, year = {2005}, url = {http://eprint.iacr.org/2005/030}, } @misc{cryptoeprint:2005:031, author = {Iwan Duursma and Negar Kiyavash}, title = {The Vector Decomposition Problem for Elliptic and Hyperelliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2005/031}, year = {2005}, url = {http://eprint.iacr.org/2005/031}, } @misc{cryptoeprint:2005:032, author = {Dennis Hofheinz and Dominique Unruh}, title = {On the Notion of Statistical Security in Simulatability Definitions}, howpublished = {Cryptology ePrint Archive, Report 2005/032}, year = {2005}, url = {http://eprint.iacr.org/2005/032}, } @misc{cryptoeprint:2005:033, author = {Serge Mister and Robert Zuccherato}, title = {An Attack on CFB Mode Encryption As Used By OpenPGP}, howpublished = {Cryptology ePrint Archive, Report 2005/033}, year = {2005}, url = {http://eprint.iacr.org/2005/033}, } @misc{cryptoeprint:2005:034, author = {Gene Tsudik and Shouhuai Xu}, title = {Flexible Framework for Secret Handshakes (Multi-Party Anonymous and Un-observable Authentication)}, howpublished = {Cryptology ePrint Archive, Report 2005/034}, year = {2005}, url = {http://eprint.iacr.org/2005/034}, } @misc{cryptoeprint:2005:035, author = {Benoit Chevallier-Mames}, title = {An Efficient CDH-based Signature Scheme With a Tight Security Reduction}, howpublished = {Cryptology ePrint Archive, Report 2005/035}, year = {2005}, url = {http://eprint.iacr.org/2005/035}, } @misc{cryptoeprint:2005:036, author = {Yael Kalai and Yehuda Lindell and Manoj Prabhakaran}, title = {Concurrent Composition of Secure Protocols in the Timing Model}, howpublished = {Cryptology ePrint Archive, Report 2005/036}, year = {2005}, url = {http://eprint.iacr.org/2005/036}, } @misc{cryptoeprint:2005:037, author = {Claude Castelluccia and Einar Mykletun and Gene Tsudik}, title = {Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes}, howpublished = {Cryptology ePrint Archive, Report 2005/037}, year = {2005}, url = {http://eprint.iacr.org/2005/037}, } @misc{cryptoeprint:2005:038, author = {Yi-Hwa Chen and Jinn-Ke Jan}, title = {Cryptanalysis of improvement of digital signature with message recovery using self-certified public keys and its variants}, howpublished = {Cryptology ePrint Archive, Report 2005/038}, year = {2005}, url = {http://eprint.iacr.org/2005/038}, } @misc{cryptoeprint:2005:039, author = {Joan Daemen and Gilles Van Assche}, title = {Distinguishing Stream Ciphers with Convolutional Filters}, howpublished = {Cryptology ePrint Archive, Report 2005/039}, year = {2005}, url = {http://eprint.iacr.org/2005/039}, } @misc{cryptoeprint:2005:040, author = {Juan M. Estevez-Tapiador and Almudena Alcaide}, title = {Unfairness of a protocol for certified delivery}, howpublished = {Cryptology ePrint Archive, Report 2005/040}, year = {2005}, url = {http://eprint.iacr.org/2005/040}, } @misc{cryptoeprint:2005:041, author = {Lihua Liu and Zhengjun Cao}, title = {On the Security of a Group Signature Scheme with Strong Separability}, howpublished = {Cryptology ePrint Archive, Report 2005/041}, year = {2005}, url = {http://eprint.iacr.org/2005/041}, } @misc{cryptoeprint:2005:042, author = {Logachev~O.A. and Salnikov~A.A. and Yaschenko~V.V.}, title = {Polyhedrons over Finite Abelian Groups and Their Cryptographic Applications}, howpublished = {Cryptology ePrint Archive, Report 2005/042}, year = {2005}, url = {http://eprint.iacr.org/2005/042}, } @misc{cryptoeprint:2005:043, author = {Hsiao-Ying Lin and Wen-Guey Tzeng}, title = {An Efficient Solution to The Millionaires' Problem Based on Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2005/043}, year = {2005}, url = {http://eprint.iacr.org/2005/043}, } @misc{cryptoeprint:2005:044, author = {Sergey Agievich}, title = {On the affine classification of cubic bent functions}, howpublished = {Cryptology ePrint Archive, Report 2005/044}, year = {2005}, url = {http://eprint.iacr.org/2005/044}, } @misc{cryptoeprint:2005:045, author = {Nick Howgrave-Graham and Joseph H. Silverman and William Whyte}, title = {Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3}, howpublished = {Cryptology ePrint Archive, Report 2005/045}, year = {2005}, url = {http://eprint.iacr.org/2005/045}, } @misc{cryptoeprint:2005:046, author = {Mario Di Raimondo and Rosario Gennaro}, title = {New Approaches for Deniable Authentication}, howpublished = {Cryptology ePrint Archive, Report 2005/046}, year = {2005}, url = {http://eprint.iacr.org/2005/046}, } @misc{cryptoeprint:2005:047, author = {Qiang Tang and Chris J. Mitchell}, title = {Cryptanalysis of an anonymous wireless authentication and conference key distribution scheme}, howpublished = {Cryptology ePrint Archive, Report 2005/047}, year = {2005}, url = {http://eprint.iacr.org/2005/047}, } @misc{cryptoeprint:2005:048, author = {Qiang Tang and Chris J. Mitchell}, title = {Cryptanalysis of two identification schemes based on an ID-based cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2005/048}, year = {2005}, url = {http://eprint.iacr.org/2005/048}, } @misc{cryptoeprint:2005:049, author = {Gildas Avoine}, title = {Adversarial Model for Radio Frequency Identification}, howpublished = {Cryptology ePrint Archive, Report 2005/049}, year = {2005}, url = {http://eprint.iacr.org/2005/049}, } @misc{cryptoeprint:2005:050, author = {Poorvi L. Vora}, title = {David Chaum's Voter Verification using Encrypted Paper Receipts}, howpublished = {Cryptology ePrint Archive, Report 2005/050}, year = {2005}, url = {http://eprint.iacr.org/2005/050}, } @misc{cryptoeprint:2005:051, author = {Zhengjun Cao}, title = {A Note on Shor's Quantum Algorithm for Prime Factorization}, howpublished = {Cryptology ePrint Archive, Report 2005/051}, year = {2005}, url = {http://eprint.iacr.org/2005/051}, } @misc{cryptoeprint:2005:052, author = {Ziv Kfir and Avishai Wool}, title = {Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems}, howpublished = {Cryptology ePrint Archive, Report 2005/052}, year = {2005}, url = {http://eprint.iacr.org/2005/052}, } @misc{cryptoeprint:2005:053, author = {Hung-Min Sun and Mu-En Wu}, title = {An Approach Towards Rebalanced RSA-CRT with Short Public Exponent}, howpublished = {Cryptology ePrint Archive, Report 2005/053}, year = {2005}, url = {http://eprint.iacr.org/2005/053}, } @misc{cryptoeprint:2005:054, author = {Yi-Hwa Chen and Jinn-Ke Jan}, title = {Comment on cryptanalysis of Tseng et al.¡¦s authenticated encryption schemes}, howpublished = {Cryptology ePrint Archive, Report 2005/054}, year = {2005}, url = {http://eprint.iacr.org/2005/054}, } @misc{cryptoeprint:2005:055, author = {Zhengjun Cao}, title = {Untraceability of Two Group Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2005/055}, year = {2005}, url = {http://eprint.iacr.org/2005/055}, } @misc{cryptoeprint:2005:056, author = {Daniel R. L. Brown}, title = {Deniable Authentication with RSA and Multicasting}, howpublished = {Cryptology ePrint Archive, Report 2005/056}, year = {2005}, url = {http://eprint.iacr.org/2005/056}, } @misc{cryptoeprint:2005:057, author = {Victor K. Wei}, title = {Tight Reductions among Strong Die-Hellman Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2005/057}, year = {2005}, url = {http://eprint.iacr.org/2005/057}, } @misc{cryptoeprint:2005:058, author = {K. Bentahar and P. Farshim and J. Malone-Lee and N.P. Smart}, title = {Generic Constructions of Identity-Based and Certificateless KEMs}, howpublished = {Cryptology ePrint Archive, Report 2005/058}, year = {2005}, url = {http://eprint.iacr.org/2005/058}, } @misc{cryptoeprint:2005:059, author = {Laszlo Csirmaz}, title = {Secret sharing schemes on graphs}, howpublished = {Cryptology ePrint Archive, Report 2005/059}, year = {2005}, url = {http://eprint.iacr.org/2005/059}, } @misc{cryptoeprint:2005:060, author = {Jan Camenisch and Susan Hohenberger and Anna Lysyanskaya}, title = {Compact E-Cash}, howpublished = {Cryptology ePrint Archive, Report 2005/060}, year = {2005}, url = {http://eprint.iacr.org/2005/060}, } @misc{cryptoeprint:2005:061, author = {Olivier Chevassut and Pierre-Alain Fouque and Pierrick Gaudry and David Pointcheval}, title = {Key Derivation and Randomness Extraction}, howpublished = {Cryptology ePrint Archive, Report 2005/061}, year = {2005}, url = {http://eprint.iacr.org/2005/061}, } @misc{cryptoeprint:2005:062, author = {LiHua Liu and Zhengjun Cao }, title = {Cryptanalysis of One Fair E-cash System}, howpublished = {Cryptology ePrint Archive, Report 2005/062}, year = {2005}, url = {http://eprint.iacr.org/2005/062}, } @misc{cryptoeprint:2005:063, author = {Dieter Schmidt}, title = {On the Key Schedule of Blowfish}, howpublished = {Cryptology ePrint Archive, Report 2005/063}, year = {2005}, url = {http://eprint.iacr.org/2005/063}, } @misc{cryptoeprint:2005:064, author = {Anish Mathuria and Vipul Jain}, title = {On Efficient Key Agreement Protocols}, howpublished = {Cryptology ePrint Archive, Report 2005/064}, year = {2005}, url = {http://eprint.iacr.org/2005/064}, } @misc{cryptoeprint:2005:065, author = {T. Kerins and W. P. Marnane and E. M. Popovici and P. S. L. M. Barreto}, title = {Efficient hardware for the Tate pairing calculation in characteristic three}, howpublished = {Cryptology ePrint Archive, Report 2005/065}, year = {2005}, url = {http://eprint.iacr.org/2005/065}, } @misc{cryptoeprint:2005:066, author = {Eike Kiltz}, title = {Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation}, howpublished = {Cryptology ePrint Archive, Report 2005/066}, year = {2005}, url = {http://eprint.iacr.org/2005/066}, } @misc{cryptoeprint:2005:067, author = {Arjen Lenstra and Xiaoyun Wang and Benne de Weger}, title = {Colliding X.509 Certificates}, howpublished = {Cryptology ePrint Archive, Report 2005/067}, year = {2005}, url = {http://eprint.iacr.org/2005/067}, } @misc{cryptoeprint:2005:068, author = {Zhaneta Tasheva and Borislav Bedzhev and Borislav Stoyanov}, title = {N-adic Summation-Shrinking Generator. Basic properties and empirical evidences.}, howpublished = {Cryptology ePrint Archive, Report 2005/068}, year = {2005}, url = {http://eprint.iacr.org/2005/068}, } @misc{cryptoeprint:2005:069, author = {V. S. Dimitrov and L. Imbert and P. K. Mishra}, title = {Fast Elliptic Curve Point Multiplication using Double-Base Chains}, howpublished = {Cryptology ePrint Archive, Report 2005/069}, year = {2005}, url = {http://eprint.iacr.org/2005/069}, } @misc{cryptoeprint:2005:070, author = {Jean-Camille Birget and Spyros S. Magliveras and Michal Sramka}, title = {On public-key cryptosystems based on combinatorial group theory}, howpublished = {Cryptology ePrint Archive, Report 2005/070}, year = {2005}, url = {http://eprint.iacr.org/2005/070}, } @misc{cryptoeprint:2005:071, author = {Dabi Zou and Dongdai Lin}, title = {A fast parallel scalar multiplication against side-channel analysis for elliptic curve cryptosystem over prime fields}, howpublished = {Cryptology ePrint Archive, Report 2005/071}, year = {2005}, url = {http://eprint.iacr.org/2005/071}, } @misc{cryptoeprint:2005:072, author = {Johannes Buchmann and Christoph Ludwig}, title = {Practical Lattice Basis Sampling Reduction}, howpublished = {Cryptology ePrint Archive, Report 2005/072}, year = {2005}, url = {http://eprint.iacr.org/2005/072}, } @misc{cryptoeprint:2005:073, author = {Nam-Su Jho, Jung Hee Cheon, Myung-Hwan Kim, and Eun Sun Yoo}, title = {BROADCAST ENCRYPTION $\pi$}, howpublished = {Cryptology ePrint Archive, Report 2005/073}, year = {2005}, url = {http://eprint.iacr.org/2005/073}, } @misc{cryptoeprint:2005:074, author = {Mathieu Baudet and V{\'e}ronique Cortier and Steve Kremer}, title = {Computationally sound implementations of equational theories against passive adversaries}, howpublished = {Cryptology ePrint Archive, Report 2005/074}, year = {2005}, url = {http://eprint.iacr.org/2005/074}, } @misc{cryptoeprint:2005:075, author = {Vlastimil Klima}, title = {Finding MD5 Collisions – a Toy For a Notebook}, howpublished = {Cryptology ePrint Archive, Report 2005/075}, year = {2005}, url = {http://eprint.iacr.org/2005/075}, } @misc{cryptoeprint:2005:076, author = {Neal Koblitz and Alfred Menezes}, title = {Pairing-Based Cryptography at High Security Levels}, howpublished = {Cryptology ePrint Archive, Report 2005/076}, year = {2005}, url = {http://eprint.iacr.org/2005/076}, } @misc{cryptoeprint:2005:077, author = {Christopher Wolf and Bart Preneel}, title = {Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations}, howpublished = {Cryptology ePrint Archive, Report 2005/077}, year = {2005}, url = {http://eprint.iacr.org/2005/077}, } @misc{cryptoeprint:2005:078, author = {Wieland Fischer and Jean-Pierre Seifert}, title = {Duality between Multiplication and Modular Reduction}, howpublished = {Cryptology ePrint Archive, Report 2005/078}, year = {2005}, url = {http://eprint.iacr.org/2005/078}, } @misc{cryptoeprint:2005:079, author = {Marius C Silaghi}, title = {Zero-Knowledge Proofs for Mix-nets of Secret Shares and a Version of ElGamal with Modular Homomorphism}, howpublished = {Cryptology ePrint Archive, Report 2005/079}, year = {2005}, url = {http://eprint.iacr.org/2005/079}, } @misc{cryptoeprint:2005:080, author = {R. Venkatesh and C. Sanjeevakumar and M. Kasi Rajan and L. Sudarsan and N. Srinivasan}, title = {A QKD Protocol Extendable to Support Entanglement and Reduce Unauthorized Information Gain by Randomizing the Bases Lists with Key Values and Invalidate Explicit Privacy Amplification}, howpublished = {Cryptology ePrint Archive, Report 2005/080}, year = {2005}, url = {http://eprint.iacr.org/2005/080}, } @misc{cryptoeprint:2005:081, author = {Norbert Pramstaller and Christian Rechberger and Vincent Rijmen}, title = {Smashing SMASH}, howpublished = {Cryptology ePrint Archive, Report 2005/081}, year = {2005}, url = {http://eprint.iacr.org/2005/081}, } @misc{cryptoeprint:2005:082, author = {Lars R. Knudsen}, title = {Some properties of an FSE 2005 Hash Proposal}, howpublished = {Cryptology ePrint Archive, Report 2005/082}, year = {2005}, url = {http://eprint.iacr.org/2005/082}, } @misc{cryptoeprint:2005:083, author = {Kristian Gjøsteen}, title = {Security notions for disk encryption}, howpublished = {Cryptology ePrint Archive, Report 2005/083}, year = {2005}, url = {http://eprint.iacr.org/2005/083}, } @misc{cryptoeprint:2005:084, author = {Goce Jakimoski and Yvo Desmedt}, title = {On Resistance of DES to Related-Key Differential Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2005/084}, year = {2005}, url = {http://eprint.iacr.org/2005/084}, } @misc{cryptoeprint:2005:085, author = {R. Overbeck}, title = {A new structural attack for GPT and variants}, howpublished = {Cryptology ePrint Archive, Report 2005/085}, year = {2005}, url = {http://eprint.iacr.org/2005/085}, } @misc{cryptoeprint:2005:086, author = {Henry Ng}, title = {Simple Pseudorandom Number Generator with Strengthened Double Encryption (Cilia)}, howpublished = {Cryptology ePrint Archive, Report 2005/086}, year = {2005}, url = {http://eprint.iacr.org/2005/086}, } @misc{cryptoeprint:2005:087, author = {Rostovtsev A.G. and Shemyakina O.V.}, title = {AES side channel attack protection using random isomorphisms}, howpublished = {Cryptology ePrint Archive, Report 2005/087}, year = {2005}, url = {http://eprint.iacr.org/2005/087}, } @misc{cryptoeprint:2005:088, author = {Joan Daemen and Vincent Rijmen}, title = {The Pelican MAC Function}, howpublished = {Cryptology ePrint Archive, Report 2005/088}, year = {2005}, url = {http://eprint.iacr.org/2005/088}, } @misc{cryptoeprint:2005:089, author = {Hans Dobbertin and Gregor Leander}, title = {Cryptographer's Toolkit for Construction of $8$-Bit Bent Functions}, howpublished = {Cryptology ePrint Archive, Report 2005/089}, year = {2005}, url = {http://eprint.iacr.org/2005/089}, } @misc{cryptoeprint:2005:090, author = {Jin Hong and Palash Sarkar}, title = {Rediscovery of Time Memory Tradeoffs}, howpublished = {Cryptology ePrint Archive, Report 2005/090}, year = {2005}, url = {http://eprint.iacr.org/2005/090}, } @misc{cryptoeprint:2005:091, author = {Markus Jakobsson and Adam Young}, title = {Distributed Phishing Attacks}, howpublished = {Cryptology ePrint Archive, Report 2005/091}, year = {2005}, url = {http://eprint.iacr.org/2005/091}, } @misc{cryptoeprint:2005:092, author = {Charanjit Jutla}, title = {PRF Domain Extension Using DAGs}, howpublished = {Cryptology ePrint Archive, Report 2005/092}, year = {2005}, url = {http://eprint.iacr.org/2005/092}, } @misc{cryptoeprint:2005:093, author = {Guohong Xie}, title = {An ID-Based Key Agreement Scheme from pairing}, howpublished = {Cryptology ePrint Archive, Report 2005/093}, year = {2005}, url = {http://eprint.iacr.org/2005/093}, } @misc{cryptoeprint:2005:094, author = {M. Choudary Gorantla and Raju Gangishetti and Ashutosh Saxena}, title = {A Survey on ID-Based Cryptographic Primitives}, howpublished = {Cryptology ePrint Archive, Report 2005/094}, year = {2005}, url = {http://eprint.iacr.org/2005/094}, } @misc{cryptoeprint:2005:095, author = {Ari Juels and David Molnar and David Wagner}, title = {Security and Privacy Issues in E-passports}, howpublished = {Cryptology ePrint Archive, Report 2005/095}, year = {2005}, url = {http://eprint.iacr.org/2005/095}, } @misc{cryptoeprint:2005:096, author = {David Jedlicka}, title = {Almost Perfect Nonlinear Monomials over GF($2^n$) for Infinitely Many $n$}, howpublished = {Cryptology ePrint Archive, Report 2005/096}, year = {2005}, url = {http://eprint.iacr.org/2005/096}, } @misc{cryptoeprint:2005:097, author = {Yassine Lakhnech and Laurent Mazare}, title = {Computationally Sound Verification of Security Protocols Using Diffie-Hellman Exponentiation}, howpublished = {Cryptology ePrint Archive, Report 2005/097}, year = {2005}, url = {http://eprint.iacr.org/2005/097}, } @misc{cryptoeprint:2005:098, author = {Yassine Lakhnech and Laurent Mazare}, title = {Probabilistic Opacity for a Passive Adversary and its Application to Chaum's Voting Scheme }, howpublished = {Cryptology ePrint Archive, Report 2005/098}, year = {2005}, url = {http://eprint.iacr.org/2005/098}, } @misc{cryptoeprint:2005:099, author = {Miodrag J. Mihaljevic and Marc P.C. Fossorier and Hideki Imai}, title = {Time-Data-Memory Trade-Off Based Cryptanalysis of Certain Broadcast Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2005/099}, year = {2005}, url = {http://eprint.iacr.org/2005/099}, } @misc{cryptoeprint:2005:100, author = {Qingshu Meng and Huanguo Zhang and Jingsong Cui and Min Yang}, title = {almost enumeration of 8-variable bent functions}, howpublished = {Cryptology ePrint Archive, Report 2005/100}, year = {2005}, url = {http://eprint.iacr.org/2005/100}, } @misc{cryptoeprint:2005:101, author = {Gergei Bana}, title = {Soundness and Completeness of Formal Logics of Symmetric Encryption}, howpublished = {Cryptology ePrint Archive, Report 2005/101}, year = {2005}, url = {http://eprint.iacr.org/2005/101}, } @misc{cryptoeprint:2005:102, author = {Vlastimil Klima}, title = {Finding MD5 Collisions on a Notebook PC Using Multi-message Modifications}, howpublished = {Cryptology ePrint Archive, Report 2005/102}, year = {2005}, url = {http://eprint.iacr.org/2005/102}, } @misc{cryptoeprint:2005:103, author = {Fangguo Zhang and Xiaofeng Chen}, title = {Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05}, howpublished = {Cryptology ePrint Archive, Report 2005/103}, year = {2005}, url = {http://eprint.iacr.org/2005/103}, } @misc{cryptoeprint:2005:104, author = {Nick Howgrave-Graham and Jeff Hoffstein and Jill Pipher and William Whyte}, title = {On estimating the lattice security of NTRU}, howpublished = {Cryptology ePrint Archive, Report 2005/104}, year = {2005}, url = {http://eprint.iacr.org/2005/104}, } @misc{cryptoeprint:2005:105, author = {Chris Peikert}, title = {On Error Correction in the Exponent}, howpublished = {Cryptology ePrint Archive, Report 2005/105}, year = {2005}, url = {http://eprint.iacr.org/2005/105}, } @misc{cryptoeprint:2005:106, author = {Boaz Barak and Amit Sahai}, title = {How To Play Almost Any Mental Game Over The Net --- Concurrent Composition via Super-Polynomial Simulation}, howpublished = {Cryptology ePrint Archive, Report 2005/106}, year = {2005}, url = {http://eprint.iacr.org/2005/106}, } @misc{cryptoeprint:2005:107, author = {Ophir Levy and Avishai Wool}, title = {A Uniform Framework for Cryptanalysis of the Bluetooth $E_0$ Cipher}, howpublished = {Cryptology ePrint Archive, Report 2005/107}, year = {2005}, url = {http://eprint.iacr.org/2005/107}, } @misc{cryptoeprint:2005:108, author = {Yongge Wang}, title = {Efficient Identity-Based and Authenticated Key Agreement Protocol}, howpublished = {Cryptology ePrint Archive, Report 2005/108}, year = {2005}, url = {http://eprint.iacr.org/2005/108}, } @misc{cryptoeprint:2005:109, author = {Sahadeo Padhye}, title = {A Public Key Cryptosystem Based on Singular Cubic Curve}, howpublished = {Cryptology ePrint Archive, Report 2005/109}, year = {2005}, url = {http://eprint.iacr.org/2005/109}, } @misc{cryptoeprint:2005:110, author = {Ayan Mahalanobis}, title = {Diffie-Hellman key exchange protocol and non-abelian nilpotent groups.}, howpublished = {Cryptology ePrint Archive, Report 2005/110}, year = {2005}, url = {http://eprint.iacr.org/2005/110}, } @misc{cryptoeprint:2005:111, author = {Kooshiar Azimian, Javad Mohajeri and Mahmoud Salmasizadeh}, title = {Weak Composite Diffie-Hellman is not Weaker than Factoring}, howpublished = {Cryptology ePrint Archive, Report 2005/111}, year = {2005}, url = {http://eprint.iacr.org/2005/111}, } @misc{cryptoeprint:2005:112, author = {Bo Gyeong Kang and Je Hong Park}, title = {On the relationship between squared pairings and plain pairings}, howpublished = {Cryptology ePrint Archive, Report 2005/112}, year = {2005}, url = {http://eprint.iacr.org/2005/112}, } @misc{cryptoeprint:2005:113, author = {Majid Khabbazian, T. Aaron Gulliver and Vijay K. Bhargava}, title = {Partially Fixed Point Multiplication}, howpublished = {Cryptology ePrint Archive, Report 2005/113}, year = {2005}, url = {http://eprint.iacr.org/2005/113}, } @misc{cryptoeprint:2005:114, author = {Gene Itkis and Robert McNerney Jr. and Scott W. Russell}, title = {Intrusion-Resilient Secure Channels}, howpublished = {Cryptology ePrint Archive, Report 2005/114}, year = {2005}, url = {http://eprint.iacr.org/2005/114}, } @misc{cryptoeprint:2005:115, author = {Marco Macchetti}, title = {Characteristics of Key-Dependent S-Boxes: the Case of Twofish}, howpublished = {Cryptology ePrint Archive, Report 2005/115}, year = {2005}, url = {http://eprint.iacr.org/2005/115}, } @misc{cryptoeprint:2005:116, author = {Nigel Smart and Frederik Vercauteren}, title = {On Computable Isomorphisms in Efficient Asymmetric Pairing Based Systems}, howpublished = {Cryptology ePrint Archive, Report 2005/116}, year = {2005}, url = {http://eprint.iacr.org/2005/116}, } @misc{cryptoeprint:2005:117, author = {David Galindo}, title = {Boneh-Franklin Identity Based Encryption Revisited}, howpublished = {Cryptology ePrint Archive, Report 2005/117}, year = {2005}, url = {http://eprint.iacr.org/2005/117}, } @misc{cryptoeprint:2005:118, author = {Deepak Kumar Dalai and Subhamoy Maitra}, title = {Results on Rotation Symmetric Bent Functions}, howpublished = {Cryptology ePrint Archive, Report 2005/118}, year = {2005}, url = {http://eprint.iacr.org/2005/118}, } @misc{cryptoeprint:2005:119, author = {Claus Diem}, title = {Index Calculus in Class Groups of Plane Curves of Small Degree}, howpublished = {Cryptology ePrint Archive, Report 2005/119}, year = {2005}, url = {http://eprint.iacr.org/2005/119}, } @misc{cryptoeprint:2005:120, author = {Malapati Raja Sekhar and Takeshi Okamoto and Eiji Okamato}, title = {On Designatedly Verified (Non-interactive) Watermarking Schemes}, howpublished = {Cryptology ePrint Archive, Report 2005/120}, year = {2005}, url = {http://eprint.iacr.org/2005/120}, } @misc{cryptoeprint:2005:121, author = {Julie Thorpe and P.C. van Oorschot and Anil Somayaji}, title = {Pass-thoughts: Authenticating With Our Minds}, howpublished = {Cryptology ePrint Archive, Report 2005/121}, year = {2005}, url = {http://eprint.iacr.org/2005/121}, } @misc{cryptoeprint:2005:122, author = {Xinyi Huang and Willy Susilo and Yi Mu}, title = {Breaking and Repairing Trapdoor-free Group Signature Schemes from Asiacrypt 2004}, howpublished = {Cryptology ePrint Archive, Report 2005/122}, year = {2005}, url = {http://eprint.iacr.org/2005/122}, } @misc{cryptoeprint:2005:123, author = {Lan Nguyen}, title = {Accumulators from Bilinear Pairings and Applications to ID-based Ring Signatures and Group Membership Revocation}, howpublished = {Cryptology ePrint Archive, Report 2005/123}, year = {2005}, url = {http://eprint.iacr.org/2005/123}, } @misc{cryptoeprint:2005:124, author = {Eike Kiltz and Anton Mityagin and Saurabh Panjwani and Barath Raghavan}, title = {Append-Only Signatures}, howpublished = {Cryptology ePrint Archive, Report 2005/124}, year = {2005}, url = {http://eprint.iacr.org/2005/124}, } @misc{cryptoeprint:2005:125, author = {Nicolas Th\'eriault}, title = {SPA Resistant Left-to-Right Integer Recodings}, howpublished = {Cryptology ePrint Archive, Report 2005/125}, year = {2005}, url = {http://eprint.iacr.org/2005/125}, } @misc{cryptoeprint:2005:126, author = {Shahram Khazaei, Mahmood Salmasizadeh and Javad Mohajeri}, title = {On the Statistically Optimal Divide and Conquer Correlation Attack on the Shrinking Generator}, howpublished = {Cryptology ePrint Archive, Report 2005/126}, year = {2005}, url = {http://eprint.iacr.org/2005/126}, } @misc{cryptoeprint:2005:127, author = {Thomas Groß and Birgit Pfitzmann and Ahmad-Reza Sadeghi}, title = {Browser Model for Security Analysis of Browser-Based Protocols}, howpublished = {Cryptology ePrint Archive, Report 2005/127}, year = {2005}, url = {http://eprint.iacr.org/2005/127}, } @misc{cryptoeprint:2005:128, author = {Xijin Tang and Yong Feng}, title = {Improve the Behavior of XL Family by Reducing the Excrescent Multiply Monomials}, howpublished = {Cryptology ePrint Archive, Report 2005/128}, year = {2005}, url = {http://eprint.iacr.org/2005/128}, } @misc{cryptoeprint:2005:129, author = {Zhaohui Cheng and Manos Nistazakis and Richard Comley and Luminita Vasiu}, title = {On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases}, howpublished = {Cryptology ePrint Archive, Report 2005/129}, year = {2005}, url = {http://eprint.iacr.org/2005/129}, } @misc{cryptoeprint:2005:130, author = {pinhui ke,changzhu ling,wenqiao yan}, title = {Results on Rotation Symmetric Boolean Functions on Even Number Variable}, howpublished = {Cryptology ePrint Archive, Report 2005/130}, year = {2005}, url = {http://eprint.iacr.org/2005/130}, } @misc{cryptoeprint:2005:131, author = {Ratna Dutta and Rana Barua}, title = {Dynamic Group Key Agreement in Tree-Based Setting}, howpublished = {Cryptology ePrint Archive, Report 2005/131}, year = {2005}, url = {http://eprint.iacr.org/2005/131}, } @misc{cryptoeprint:2005:132, author = {Jiejun Kong}, title = {Formal Notions of Anonymity for Peer-to-peer Networks}, howpublished = {Cryptology ePrint Archive, Report 2005/132}, year = {2005}, url = {http://eprint.iacr.org/2005/132}, } @misc{cryptoeprint:2005:133, author = {Paulo S. L. M. Barreto and Michael Naehrig}, title = {Pairing-Friendly Elliptic Curves of Prime Order}, howpublished = {Cryptology ePrint Archive, Report 2005/133}, year = {2005}, url = {http://eprint.iacr.org/2005/133}, } @misc{cryptoeprint:2005:134, author = {Mahalingam Ramkumar}, title = {Broadcast Authentication With Hashed Random Preloaded Subsets}, howpublished = {Cryptology ePrint Archive, Report 2005/134}, year = {2005}, url = {http://eprint.iacr.org/2005/134}, } @misc{cryptoeprint:2005:135, author = {Jacques Patarin and Paul Camion}, title = {Design of near-optimal pseudorandom functions and pseudorandom permutations in the information-theoretic model}, howpublished = {Cryptology ePrint Archive, Report 2005/135}, year = {2005}, url = {http://eprint.iacr.org/2005/135}, } @misc{cryptoeprint:2005:136, author = {Jung Hee Cheon and Nam-su Jho and Myung-Hwan Kim and Eun Sun Yoo}, title = {Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption}, howpublished = {Cryptology ePrint Archive, Report 2005/136}, year = {2005}, url = {http://eprint.iacr.org/2005/136}, } @misc{cryptoeprint:2005:137, author = {Douglas Wikström}, title = {A Sender Verifiable Mix-Net and a New Proof of a Shuffle}, howpublished = {Cryptology ePrint Archive, Report 2005/137}, year = {2005}, url = {http://eprint.iacr.org/2005/137}, } @misc{cryptoeprint:2005:138, author = {Mahalingam Ramkumar}, title = {I-HARPS: An Efficient Key Pre-distribution Scheme}, howpublished = {Cryptology ePrint Archive, Report 2005/138}, year = {2005}, url = {http://eprint.iacr.org/2005/138}, } @misc{cryptoeprint:2005:139, author = {Michael Scott}, title = {Scaling security in pairing-based protocols}, howpublished = {Cryptology ePrint Archive, Report 2005/139}, year = {2005}, url = {http://eprint.iacr.org/2005/139}, } @misc{cryptoeprint:2005:140, author = {Ivan Damg{\aa}rd and Matthias Fitzi and Jesper Buus Nielsen and Tomas Toft}, title = {How to Split a Shared Secret into Shared Bits in Constant-Round}, howpublished = {Cryptology ePrint Archive, Report 2005/140}, year = {2005}, url = {http://eprint.iacr.org/2005/140}, } @misc{cryptoeprint:2005:141, author = {Qiang Tang and Chris J. Mitchell}, title = {Enhanced password-based key establishment protocol}, howpublished = {Cryptology ePrint Archive, Report 2005/141}, year = {2005}, url = {http://eprint.iacr.org/2005/141}, } @misc{cryptoeprint:2005:142, author = {Mahalingam Ramkumar}, title = {Broadcast Encryption with Random Key Pre-distribution Schemes}, howpublished = {Cryptology ePrint Archive, Report 2005/142}, year = {2005}, url = {http://eprint.iacr.org/2005/142}, } @misc{cryptoeprint:2005:143, author = {Liangliang Xiao and Mulan Liu and Zhifang Zhang}, title = {Multiparty Computation Based on Connectivity of Graphs}, howpublished = {Cryptology ePrint Archive, Report 2005/143}, year = {2005}, url = {http://eprint.iacr.org/2005/143}, } @misc{cryptoeprint:2005:144, author = {Dieter Schmidt}, title = {Kaweichel, an Extension of Blowfish for 64-Bit Architectures}, howpublished = {Cryptology ePrint Archive, Report 2005/144}, year = {2005}, url = {http://eprint.iacr.org/2005/144}, } @misc{cryptoeprint:2005:145, author = {Ee-Chien Chang and Qiming Li}, title = {Small Secure Sketch for Point-Set Difference}, howpublished = {Cryptology ePrint Archive, Report 2005/145}, year = {2005}, url = {http://eprint.iacr.org/2005/145}, } @misc{cryptoeprint:2005:146, author = {Bo Yang, Sambit Mishra, Ramesh Karri}, title = {A High Speed Architecture for Galois/Counter Mode of Operation (GCM)}, howpublished = {Cryptology ePrint Archive, Report 2005/146}, year = {2005}, url = {http://eprint.iacr.org/2005/146}, } @misc{cryptoeprint:2005:147, author = {Jong Youl Choi and Philippe Golle and Markus Jakobsson}, title = {Tamper-Evident Digital Signatures: Protecting Certification Authorities Against Malware}, howpublished = {Cryptology ePrint Archive, Report 2005/147}, year = {2005}, url = {http://eprint.iacr.org/2005/147}, } @misc{cryptoeprint:2005:148, author = {Toshihiko Matsuo and Shin'ichiro Matsuo}, title = {On Universal Composable Security of Time-Stamping Protocols}, howpublished = {Cryptology ePrint Archive, Report 2005/148}, year = {2005}, url = {http://eprint.iacr.org/2005/148}, } @misc{cryptoeprint:2005:149, author = {Aldar C-F. Chan and Ian F. Blake}, title = {Conditionally Verifiable Signatures}, howpublished = {Cryptology ePrint Archive, Report 2005/149}, year = {2005}, url = {http://eprint.iacr.org/2005/149}, } @misc{cryptoeprint:2005:150, author = {Benoit Chevallier-Mames and Jean-Sebastien Coron and Noel McCullagh and David Naccache and Michael Scott}, title = {Secure Delegation of Elliptic-Curve Pairing}, howpublished = {Cryptology ePrint Archive, Report 2005/150}, year = {2005}, url = {http://eprint.iacr.org/2005/150}, } @misc{cryptoeprint:2005:151, author = {Yusuke Naito and Yu Sasaki and Noboru Kunihiro and Kazuo Ohta}, title = {Improved Collision Attack on MD4}, howpublished = {Cryptology ePrint Archive, Report 2005/151}, year = {2005}, url = {http://eprint.iacr.org/2005/151}, } @misc{cryptoeprint:2005:152, author = {Richard Ostertag and Martin Stanek}, title = {On High-Rate Cryptographic Compression Functions}, howpublished = {Cryptology ePrint Archive, Report 2005/152}, year = {2005}, url = {http://eprint.iacr.org/2005/152}, } @misc{cryptoeprint:2005:153, author = {Sahadeo Padhye}, title = {On Security of Koyama Schemes}, howpublished = {Cryptology ePrint Archive, Report 2005/153}, year = {2005}, url = {http://eprint.iacr.org/2005/153}, } @misc{cryptoeprint:2005:154, author = {Marius C. Silaghi and Gerhard Friedrich}, title = {Secure Stochastic Multi-party Computation for Combinatorial Problems and a Privacy Concept that Explicitely Factors out Knowledge about the Protocol}, howpublished = {Cryptology ePrint Archive, Report 2005/154}, year = {2005}, url = {http://eprint.iacr.org/2005/154}, } @misc{cryptoeprint:2005:155, author = {Eli Biham and Jennifer Seberry}, title = {Py (Roo): A Fast and Secure Stream Cipher using Rolling Arrays}, howpublished = {Cryptology ePrint Archive, Report 2005/155}, year = {2005}, url = {http://eprint.iacr.org/2005/155}, } @misc{cryptoeprint:2005:156, author = {Qiang Tang and Chris J. Mitchell}, title = {On the security of some password-based key agreement schemes}, howpublished = {Cryptology ePrint Archive, Report 2005/156}, year = {2005}, url = {http://eprint.iacr.org/2005/156}, } @misc{cryptoeprint:2005:157, author = {Colm O'Keeffe and Emanuel Popovici}, title = {FOX Algorithm Implementation: a hardware design approach}, howpublished = {Cryptology ePrint Archive, Report 2005/157}, year = {2005}, url = {http://eprint.iacr.org/2005/157}, } @misc{cryptoeprint:2005:158, author = {Arkady Berenstein and Leon Chernyak}, title = {Geometric Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2005/158}, year = {2005}, url = {http://eprint.iacr.org/2005/158}, } @misc{cryptoeprint:2005:159, author = {Emanuele Viola}, title = {On Constructing Parallel Pseudorandom Generators from One-Way Functions}, howpublished = {Cryptology ePrint Archive, Report 2005/159}, year = {2005}, url = {http://eprint.iacr.org/2005/159}, } @misc{cryptoeprint:2005:160, author = {M. Barbosa and R. Noad and D. Page and N.P. Smart}, title = {First Steps Toward a Cryptography-Aware Language and Compiler}, howpublished = {Cryptology ePrint Archive, Report 2005/160}, year = {2005}, url = {http://eprint.iacr.org/2005/160}, } @misc{cryptoeprint:2005:161, author = {David A. McGrew and Scott R. Fluhrer}, title = {Multiple forgery attacks against Message Authentication Codes }, howpublished = {Cryptology ePrint Archive, Report 2005/161}, year = {2005}, url = {http://eprint.iacr.org/2005/161}, } @misc{cryptoeprint:2005:162, author = {Lan Nguyen and Rei Safavi-Naini and Kaoru Kurosawa}, title = {A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2005/162}, year = {2005}, url = {http://eprint.iacr.org/2005/162}, } @misc{cryptoeprint:2005:163, author = {Jonathan Katz and Ji Sun Shin}, title = {Modeling Insider Attacks on Group Key-Exchange Protocols}, howpublished = {Cryptology ePrint Archive, Report 2005/163}, year = {2005}, url = {http://eprint.iacr.org/2005/163}, } @misc{cryptoeprint:2005:164, author = {Mohammad Ali Orumiehchi ha and Dr.R. Mirghadri}, title = {A Distinguish attack on COSvd Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2005/164}, year = {2005}, url = {http://eprint.iacr.org/2005/164}, } @misc{cryptoeprint:2005:165, author = {Makoto Matsumoto and Takuji Nishimura and Mariko Hagita and Mutsuo Saito }, title = {CRYPTOGRAPHIC MERSENNE TWISTER AND FUBUKI STREAM/BLOCK CIPHER }, howpublished = {Cryptology ePrint Archive, Report 2005/165}, year = {2005}, url = {http://eprint.iacr.org/2005/165}, } @misc{cryptoeprint:2005:166, author = {Eunjeong Lee and Yoonjin Lee}, title = {Tate pairing computation on the divisors of hyperelliptic curves for cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2005/166}, year = {2005}, url = {http://eprint.iacr.org/2005/166}, } @misc{cryptoeprint:2005:167, author = {YoungJu Choie and Jaemyung Kim and Eunjeong Lee}, title = {Efficient Computation of the Tate Pairing on Hyperelliptic Curves for Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2005/167}, year = {2005}, url = {http://eprint.iacr.org/2005/167}, } @misc{cryptoeprint:2005:168, author = {Lan Nguyen and Rei Safavi-Naini}, title = {Dynamic k-Times Anonymous Authentication}, howpublished = {Cryptology ePrint Archive, Report 2005/168}, year = {2005}, url = {http://eprint.iacr.org/2005/168}, } @misc{cryptoeprint:2005:169, author = {Shai Halevi and Paul A. Karger and Dalit Naor}, title = {Enforcing Confinement in Distributed Storage and a Cryptographic Model for Access Control}, howpublished = {Cryptology ePrint Archive, Report 2005/169}, year = {2005}, url = {http://eprint.iacr.org/2005/169}, } @misc{cryptoeprint:2005:170, author = {Ivan Damg{\aa}rd and Kasper Dupont and Michael {\O}stergaard Pedersen}, title = {Unclonable Group Identification}, howpublished = {Cryptology ePrint Archive, Report 2005/170}, year = {2005}, url = {http://eprint.iacr.org/2005/170}, } @misc{cryptoeprint:2005:171, author = {Prateek Gupta and Vitaly Shmatikov}, title = {Towards computationally sound symbolic analysis of key exchange protocols}, howpublished = {Cryptology ePrint Archive, Report 2005/171}, year = {2005}, url = {http://eprint.iacr.org/2005/171}, } @misc{cryptoeprint:2005:172, author = {Radu Sion and Bogdan Carbunar}, title = {Conjunctive Keyword Search on Encrypted Data with Completeness and Computational Privacy}, howpublished = {Cryptology ePrint Archive, Report 2005/172}, year = {2005}, url = {http://eprint.iacr.org/2005/172}, } @misc{cryptoeprint:2005:173, author = {Qiang Tang and Chris J. Mitchell}, title = {Weaknesses in a leakage-resilient authenticated key transport protocol}, howpublished = {Cryptology ePrint Archive, Report 2005/173}, year = {2005}, url = {http://eprint.iacr.org/2005/173}, } @misc{cryptoeprint:2005:174, author = {Manuel Barbosa and Dan Page}, title = {On the Automatic Construction of Indistinguishable Operations}, howpublished = {Cryptology ePrint Archive, Report 2005/174}, year = {2005}, url = {http://eprint.iacr.org/2005/174}, } @misc{cryptoeprint:2005:175, author = {Yassir Nawaz and Kishan Chand Gupta and Guang Gong}, title = {A 32-bit RC4-like Keystream Generator}, howpublished = {Cryptology ePrint Archive, Report 2005/175}, year = {2005}, url = {http://eprint.iacr.org/2005/175}, } @misc{cryptoeprint:2005:176, author = {Hugo Krawczyk}, title = {HMQV: A High-Performance Secure Diffie-Hellman Protocol }, howpublished = {Cryptology ePrint Archive, Report 2005/176}, year = {2005}, url = {http://eprint.iacr.org/2005/176}, } @misc{cryptoeprint:2005:177, author = {Laszlo Csirmaz}, title = {Secret sharing on the $d$-dimensional cube}, howpublished = {Cryptology ePrint Archive, Report 2005/177}, year = {2005}, url = {http://eprint.iacr.org/2005/177}, } @misc{cryptoeprint:2005:178, author = {Zhou Sujing and Lin Dongdai}, title = {Analyzing Unlinkability of Some Group Signatures}, howpublished = {Cryptology ePrint Archive, Report 2005/178}, year = {2005}, url = {http://eprint.iacr.org/2005/178}, } @misc{cryptoeprint:2005:179, author = {Stefan Dziembowski}, title = {Intrusion-Resilience via the Bounded-Storage Model}, howpublished = {Cryptology ePrint Archive, Report 2005/179}, year = {2005}, url = {http://eprint.iacr.org/2005/179}, } @misc{cryptoeprint:2005:180, author = {XU Chunxiang and ZHOU Junhui and QIN Zhiguang}, title = {A Note on Secure Key Issuing in ID-based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2005/180}, year = {2005}, url = {http://eprint.iacr.org/2005/180}, } @misc{cryptoeprint:2005:181, author = {Shai Halevi}, title = {A plausible approach to computer-aided cryptographic proofs}, howpublished = {Cryptology ePrint Archive, Report 2005/181}, year = {2005}, url = {http://eprint.iacr.org/2005/181}, } @misc{cryptoeprint:2005:182, author = {Chih-I Wang, Chun-I Fan, and D. J. Guan}, title = {Cryptanalysis on Chang-Yang-Hwang Protected Password Change Protocol}, howpublished = {Cryptology ePrint Archive, Report 2005/182}, year = {2005}, url = {http://eprint.iacr.org/2005/182}, } @misc{cryptoeprint:2005:183, author = {Thierry Moreau}, title = {PEKE, Probabilistic Encryption Key Exchange, 10 Years Later, Including the PEKEv1.25 Specifications}, howpublished = {Cryptology ePrint Archive, Report 2005/183}, year = {2005}, url = {http://eprint.iacr.org/2005/183}, } @misc{cryptoeprint:2005:184, author = {Dongvu Tonien and Reihaneh Safavi-Naini}, title = {Recursive Constructions of Secure Codes and Hash Families Using Difference Function Families}, howpublished = {Cryptology ePrint Archive, Report 2005/184}, year = {2005}, url = {http://eprint.iacr.org/2005/184}, } @misc{cryptoeprint:2005:185, author = {Qiang Tang and Chris J. Mitchell}, title = {Security properties of two provably secure conference key agreement protocols}, howpublished = {Cryptology ePrint Archive, Report 2005/185}, year = {2005}, url = {http://eprint.iacr.org/2005/185}, } @misc{cryptoeprint:2005:186, author = {Xuesheng Zhong}, title = {Linkability of Several Blind Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2005/186}, year = {2005}, url = {http://eprint.iacr.org/2005/186}, } @misc{cryptoeprint:2005:187, author = {Michael O. Rabin}, title = {How To Exchange Secrets with Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2005/187}, year = {2005}, url = {http://eprint.iacr.org/2005/187}, } @misc{cryptoeprint:2005:188, author = {Victor K. Wei and Tsz Hon Yuen and Fangguo Zhang}, title = {Group Signature where Group Manager, Members and Open Authority are Identity-Based}, howpublished = {Cryptology ePrint Archive, Report 2005/188}, year = {2005}, url = {http://eprint.iacr.org/2005/188}, } @misc{cryptoeprint:2005:189, author = {Daniel R. L. Brown}, title = {A Weak-Randomizer Attack on RSA-OAEP with e = 3}, howpublished = {Cryptology ePrint Archive, Report 2005/189}, year = {2005}, url = {http://eprint.iacr.org/2005/189}, } @misc{cryptoeprint:2005:190, author = {SeongHan Shin and Kazukuni Kobara and Hideki Imai}, title = {Security Proof of "Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA"}, howpublished = {Cryptology ePrint Archive, Report 2005/190}, year = {2005}, url = {http://eprint.iacr.org/2005/190}, } @misc{cryptoeprint:2005:191, author = {Joonsang Baek and Reihaneh Safavi-Naini and Willy Susilo}, title = {Public Key Encryption with Keyword Search Revisited}, howpublished = {Cryptology ePrint Archive, Report 2005/191}, year = {2005}, url = {http://eprint.iacr.org/2005/191}, } @misc{cryptoeprint:2005:192, author = {Carlos Coronado}, title = {On the security and the efficiency of the Merkle signature scheme}, howpublished = {Cryptology ePrint Archive, Report 2005/192}, year = {2005}, url = {http://eprint.iacr.org/2005/192}, } @misc{cryptoeprint:2005:193, author = {Scott Contini and Arjen K. Lenstra and Ron Steinfeld}, title = {VSH, an Efficient and Provable Collision Resistant Hash Function}, howpublished = {Cryptology ePrint Archive, Report 2005/193}, year = {2005}, url = {http://eprint.iacr.org/2005/193}, } @misc{cryptoeprint:2005:194, author = {Ryutaroh Matsumoto, Kaoru Kurosawa, Toshiya Itoh, Toshimitsu Konno, and Tomohiko Uyematsu}, title = {Primal-Dual Distance Bounds of Linear Codes with Application to Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2005/194}, year = {2005}, url = {http://eprint.iacr.org/2005/194}, } @misc{cryptoeprint:2005:195, author = {Arjen K. Lenstra and Benjamin M.M. de Weger}, title = {Twin RSA}, howpublished = {Cryptology ePrint Archive, Report 2005/195}, year = {2005}, url = {http://eprint.iacr.org/2005/195}, } @misc{cryptoeprint:2005:196, author = {Ran Canetti and Shai Halevi and Jonathan Katz and Yehuda Lindell and Philip MacKenzie}, title = {Universally Composable Password-Based Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2005/196}, year = {2005}, url = {http://eprint.iacr.org/2005/196}, } @misc{cryptoeprint:2005:197, author = {Qiang Tang and Liqun Chen}, title = {Weaknesses in two group Diffie-Hellman key exchange protocols}, howpublished = {Cryptology ePrint Archive, Report 2005/197}, year = {2005}, url = {http://eprint.iacr.org/2005/197}, } @misc{cryptoeprint:2005:198, author = {Ahto Buldas and Peeter Laud and Märt Saarepera and Jan Willemson}, title = {Universally Composable Time-Stamping Schemes with Audit}, howpublished = {Cryptology ePrint Archive, Report 2005/198}, year = {2005}, url = {http://eprint.iacr.org/2005/198}, } @misc{cryptoeprint:2005:199, author = {Lan Nguyen and Rei Safavi-Naini and Kaoru Kurosawa}, title = {Verifiable Shuffles: A Formal Model and a Paillier-based 3-Round Construction with Provable Security}, howpublished = {Cryptology ePrint Archive, Report 2005/199}, year = {2005}, url = {http://eprint.iacr.org/2005/199}, } @misc{cryptoeprint:2005:200, author = {Johannes Buchmann and Andrei Pychkine and Ralf-Philipp Weinmann}, title = {Block ciphers sensitive to Groebner Basis Attacks }, howpublished = {Cryptology ePrint Archive, Report 2005/200}, year = {2005}, url = {http://eprint.iacr.org/2005/200}, } @misc{cryptoeprint:2005:201, author = {Zhaohui Cheng and Liqun Chen}, title = {On Security Proof of McCullagh-Barreto's Key Agreement Protocol and its Variants}, howpublished = {Cryptology ePrint Archive, Report 2005/201}, year = {2005}, url = {http://eprint.iacr.org/2005/201}, } @misc{cryptoeprint:2005:202, author = {Nicolas Courtois}, title = {The Best Differential Characteristics and Subtleties of the Biham-Shamir Attacks on DES}, howpublished = {Cryptology ePrint Archive, Report 2005/202}, year = {2005}, url = {http://eprint.iacr.org/2005/202}, } @misc{cryptoeprint:2005:203, author = {Nicolas Courtois and Blandine Debraize and Eric Garrido}, title = {On Exact Algebraic [Non-]Immunity of S-boxes Based on Power Functions}, howpublished = {Cryptology ePrint Archive, Report 2005/203}, year = {2005}, url = {http://eprint.iacr.org/2005/203}, } @misc{cryptoeprint:2005:204, author = {Nicolas Courtois and Louis Goubin}, title = {An Algebraic Masking Method to Protect AES Against Power Attacks}, howpublished = {Cryptology ePrint Archive, Report 2005/204}, year = {2005}, url = {http://eprint.iacr.org/2005/204}, } @misc{cryptoeprint:2005:205, author = {Alfred Menezes}, title = {Another look at HMQV}, howpublished = {Cryptology ePrint Archive, Report 2005/205}, year = {2005}, url = {http://eprint.iacr.org/2005/205}, } @misc{cryptoeprint:2005:206, author = {Kim-Kwang Raymond Choo and Colin Boyd and Yvonne Hitchcock}, title = {On Session Key Construction in Provably-Secure Key Establishment Protocols: Revisiting Chen & Kudla (2003) and McCullagh & Barreto (2005) ID-Based Protocols}, howpublished = {Cryptology ePrint Archive, Report 2005/206}, year = {2005}, url = {http://eprint.iacr.org/2005/206}, } @misc{cryptoeprint:2005:207, author = {Alex Biryukov}, title = {Some Thoughts on Time-Memory-Data Tradeoffs}, howpublished = {Cryptology ePrint Archive, Report 2005/207}, year = {2005}, url = {http://eprint.iacr.org/2005/207}, } @misc{cryptoeprint:2005:208, author = {Daniel R. L. Brown}, title = {On Finding Roots Without Factoring and A Special Purpose Factoring Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2005/208}, year = {2005}, url = {http://eprint.iacr.org/2005/208}, } @misc{cryptoeprint:2005:209, author = {Jin Wook Byun and Dong Hoon Lee}, title = {Comments on Weaknesses in Two Group Diffie-Hellman Key Exchange Protocols}, howpublished = {Cryptology ePrint Archive, Report 2005/209}, year = {2005}, url = {http://eprint.iacr.org/2005/209}, } @misc{cryptoeprint:2005:210, author = {John Black}, title = {The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function}, howpublished = {Cryptology ePrint Archive, Report 2005/210}, year = {2005}, url = {http://eprint.iacr.org/2005/210}, } @misc{cryptoeprint:2005:211, author = {Anupam Datta and Ante Derek and John C. Mitchell and Ajith Ramanathan and Andre Scedrov}, title = {Games and the Impossibility of Realizable Ideal Functionality}, howpublished = {Cryptology ePrint Archive, Report 2005/211}, year = {2005}, url = {http://eprint.iacr.org/2005/211}, } @misc{cryptoeprint:2005:212, author = {Joan Daemen and Vincent Rijmen}, title = {Probability distributions of Correlation and Differentials in Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2005/212}, year = {2005}, url = {http://eprint.iacr.org/2005/212}, } @misc{cryptoeprint:2005:213, author = {Eonkyung Lee}, title = {A Counter-based MAC Revisited: Towards Better Security}, howpublished = {Cryptology ePrint Archive, Report 2005/213}, year = {2005}, url = {http://eprint.iacr.org/2005/213}, } @misc{cryptoeprint:2005:214, author = {Sourav Mukhopadhyay and Palash Sarkar}, title = {TMTO With Multiple Data: Analysis and New Single Table Trade-offs}, howpublished = {Cryptology ePrint Archive, Report 2005/214}, year = {2005}, url = {http://eprint.iacr.org/2005/214}, } @misc{cryptoeprint:2005:215, author = {Jason E. Holt}, title = {Reconciling CA-Oblivious Encryption, Hidden Credentials, OSBE and Secret Handshakes}, howpublished = {Cryptology ePrint Archive, Report 2005/215}, year = {2005}, url = {http://eprint.iacr.org/2005/215}, } @misc{cryptoeprint:2005:216, author = {Hassan Jameel and Sungyoung Lee}, title = {A Secret Sharing Scheme for Preventing the Cheaters from Acquiring the Secret}, howpublished = {Cryptology ePrint Archive, Report 2005/216}, year = {2005}, url = {http://eprint.iacr.org/2005/216}, } @misc{cryptoeprint:2005:217, author = {M. Barbosa and P. Farshim}, title = {Efficient Identity-Based Key Encapsulation to Multiple Parties}, howpublished = {Cryptology ePrint Archive, Report 2005/217}, year = {2005}, url = {http://eprint.iacr.org/2005/217}, } @misc{cryptoeprint:2005:218, author = {W. Charles Holland and Boaz Tsaban}, title = {The conjugacy problem and related problems in lattice-ordered groups}, howpublished = {Cryptology ePrint Archive, Report 2005/218}, year = {2005}, url = {http://eprint.iacr.org/2005/218}, } @misc{cryptoeprint:2005:219, author = {Hongjun Wu}, title = {Cryptanalysis of a 32-bit RC4-like Stream Cipher}, howpublished = {Cryptology ePrint Archive, Report 2005/219}, year = {2005}, url = {http://eprint.iacr.org/2005/219}, } @misc{cryptoeprint:2005:220, author = {Michael Backes and Birgit Pfitzmann}, title = {Limits of the Cryptographic Realization of Dolev-Yao-style XOR}, howpublished = {Cryptology ePrint Archive, Report 2005/220}, year = {2005}, url = {http://eprint.iacr.org/2005/220}, } @misc{cryptoeprint:2005:221, author = {Ratna Dutta and Rana Barua}, title = {Constant Round Dynamic Group Key Agreement}, howpublished = {Cryptology ePrint Archive, Report 2005/221}, year = {2005}, url = {http://eprint.iacr.org/2005/221}, } @misc{cryptoeprint:2005:222, author = {Min Feng and Bin B.Zhu and Maozhi Xu and Shipeng Li}, title = {Efficient Comb Elliptic Curve Multiplication Methods Resistant to Power Analysis}, howpublished = {Cryptology ePrint Archive, Report 2005/222}, year = {2005}, url = {http://eprint.iacr.org/2005/222}, } @misc{cryptoeprint:2005:223, author = {Ayan Mahalanobis}, title = {Diffie-Hellman Key Exchange Protocol, Its Generalization and Nilpotent Groups}, howpublished = {Cryptology ePrint Archive, Report 2005/223}, year = {2005}, url = {http://eprint.iacr.org/2005/223}, } @misc{cryptoeprint:2005:224, author = {L. Chen and Z. Cheng and J. Malone-Lee and N.P. Smart}, title = {An Efficient ID-KEM Based On The Sakai-Kasahara Key Construction}, howpublished = {Cryptology ePrint Archive, Report 2005/224}, year = {2005}, url = {http://eprint.iacr.org/2005/224}, } @misc{cryptoeprint:2005:225, author = {Roberto M. Avanzi and Clemens Heuberger and Helmut Prodinger}, title = {Minimality of the Hamming Weight of the \tau-NAF for Koblitz Curves and Improved Combination with Point Halving}, howpublished = {Cryptology ePrint Archive, Report 2005/225}, year = {2005}, url = {http://eprint.iacr.org/2005/225}, } @misc{cryptoeprint:2005:226, author = {Liqun Chen and Zhaohui Cheng}, title = {Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2005/226}, year = {2005}, url = {http://eprint.iacr.org/2005/226}, } @misc{cryptoeprint:2005:227, author = {K. Maneva-Jakimoska and G. Jakimoski and M. Burmester}, title = {Threshold Ring Signatures Efficient for Large Sets of Signers}, howpublished = {Cryptology ePrint Archive, Report 2005/227}, year = {2005}, url = {http://eprint.iacr.org/2005/227}, } @misc{cryptoeprint:2005:228, author = {Xinxin Fan and Thomas Wollinger and Yumin Wang}, title = {Efficient Doubling on Genus 3 Curves over Binary Fields}, howpublished = {Cryptology ePrint Archive, Report 2005/228}, year = {2005}, url = {http://eprint.iacr.org/2005/228}, } @misc{cryptoeprint:2005:229, author = {Deepak Kumar Dalai and Subhamoy Maitra and Sumanta Sarkar}, title = {Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity}, howpublished = {Cryptology ePrint Archive, Report 2005/229}, year = {2005}, url = {http://eprint.iacr.org/2005/229}, } @misc{cryptoeprint:2005:230, author = {Fangguo Zhang and Xiaofeng Chen}, title = {Yet Another Short Signatures Without Random Oracles from Bilinear Pairings}, howpublished = {Cryptology ePrint Archive, Report 2005/230}, year = {2005}, url = {http://eprint.iacr.org/2005/230}, } @misc{cryptoeprint:2005:231, author = {Boaz Tsaban}, title = {Fast generators for the Diffie-Hellman key agreement protocol and malicious standards}, howpublished = {Cryptology ePrint Archive, Report 2005/231}, year = {2005}, url = {http://eprint.iacr.org/2005/231}, } @misc{cryptoeprint:2005:232, author = {Markus Volkmer and Sebastian Wallner}, title = {Lightweight Key Exchange and Stream Cipher based solely on Tree Parity Machines}, howpublished = {Cryptology ePrint Archive, Report 2005/232}, year = {2005}, url = {http://eprint.iacr.org/2005/232}, } @misc{cryptoeprint:2005:233, author = {Luke O'Connor}, title = {On the Entropy of Arcfour Keys}, howpublished = {Cryptology ePrint Archive, Report 2005/233}, year = {2005}, url = {http://eprint.iacr.org/2005/233}, } @misc{cryptoeprint:2005:234, author = {William Millan and Ed Dawson}, title = {LILI-II is not Broken}, howpublished = {Cryptology ePrint Archive, Report 2005/234}, year = {2005}, url = {http://eprint.iacr.org/2005/234}, } @misc{cryptoeprint:2005:235, author = {Markus Volkmer and Sebastian Wallner}, title = {Tree Parity Machine Rekeying Architectures for Embedded Security}, howpublished = {Cryptology ePrint Archive, Report 2005/235}, year = {2005}, url = {http://eprint.iacr.org/2005/235}, } @misc{cryptoeprint:2005:236, author = {Pu Duan and Shi Cui and Choong Wah Chan}, title = {Effective Polynomial Families for Generating More Pairing-Friendly Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2005/236}, year = {2005}, url = {http://eprint.iacr.org/2005/236}, } @misc{cryptoeprint:2005:237, author = {Henri Gilbert and Matt Robshaw and Herve Sibert}, title = {An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol}, howpublished = {Cryptology ePrint Archive, Report 2005/237}, year = {2005}, url = {http://eprint.iacr.org/2005/237}, } @misc{cryptoeprint:2005:238, author = {Raylin Tso and Takeshi Okamoto and Eiji Okamoto}, title = {Simple and Provable Secure Strong Designated Verifier Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2005/238}, year = {2005}, url = {http://eprint.iacr.org/2005/238}, } @misc{cryptoeprint:2005:239, author = {Raylin Tso and Ying Miao and Takeshi Okamoto and Eiji Okamoto}, title = {A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment}, howpublished = {Cryptology ePrint Archive, Report 2005/239}, year = {2005}, url = {http://eprint.iacr.org/2005/239}, } @misc{cryptoeprint:2005:240, author = {Fangguo Zhang and Xiaofeng Chen}, title = {Attack on Okamoto et al.'s New Short Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2005/240}, year = {2005}, url = {http://eprint.iacr.org/2005/240}, } @misc{cryptoeprint:2005:241, author = {Hao Chen and Liqing Xu}, title = {On the binary sequences with high $GF(2)$ linear complexities and low $GF(p)$ linear complexities}, howpublished = {Cryptology ePrint Archive, Report 2005/241}, year = {2005}, url = {http://eprint.iacr.org/2005/241}, } @misc{cryptoeprint:2005:242, author = {Rafail Ostrovsky and William E. Skeith III}, title = {Private Searching On Streaming Data}, howpublished = {Cryptology ePrint Archive, Report 2005/242}, year = {2005}, url = {http://eprint.iacr.org/2005/242}, } @misc{cryptoeprint:2005:243, author = {Nicolas T. Courtois}, title = {Cryptanalysis of Sfinks}, howpublished = {Cryptology ePrint Archive, Report 2005/243}, year = {2005}, url = {http://eprint.iacr.org/2005/243}, } @misc{cryptoeprint:2005:244, author = {Boaz Tsaban}, title = {Theoretical cryptanalysis of the Klimov-Shamir number generator TF-1}, howpublished = {Cryptology ePrint Archive, Report 2005/244}, year = {2005}, url = {http://eprint.iacr.org/2005/244}, } @misc{cryptoeprint:2005:245, author = {An Braeken and Bart Preneel}, title = {On the Algebraic Immunity of Symmetric Boolean Functions}, howpublished = {Cryptology ePrint Archive, Report 2005/245}, year = {2005}, url = {http://eprint.iacr.org/2005/245}, } @misc{cryptoeprint:2005:246, author = {Jens Groth}, title = {A Verifiable Secret Shuffle of Homomorphic Encryptions}, howpublished = {Cryptology ePrint Archive, Report 2005/246}, year = {2005}, url = {http://eprint.iacr.org/2005/246}, } @misc{cryptoeprint:2005:247, author = {Charanjit S. Jutla and Anindya C. Patthak}, title = {A Simple and Provably Good Code for SHA Message Expansion}, howpublished = {Cryptology ePrint Archive, Report 2005/247}, year = {2005}, url = {http://eprint.iacr.org/2005/247}, } @misc{cryptoeprint:2005:248, author = {Michael Szydlo and Yiqun Lisa Yin}, title = {Collision-Resistant usage of MD5 and SHA-1 via Message Preprocessing}, howpublished = {Cryptology ePrint Archive, Report 2005/248}, year = {2005}, url = {http://eprint.iacr.org/2005/248}, } @misc{cryptoeprint:2005:249, author = {Yijuan Shi and Jianhua Li}, title = {Efficient Certificateless Public Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2005/249}, year = {2005}, url = {http://eprint.iacr.org/2005/249}, } @misc{cryptoeprint:2005:250, author = {Shishir Nagaraja, Ross Anderson}, title = {The topology of covert conflict}, howpublished = {Cryptology ePrint Archive, Report 2005/250}, year = {2005}, url = {http://eprint.iacr.org/2005/250}, } @misc{cryptoeprint:2005:251, author = {Nicolas Courtois}, title = {Feistel Schemes and Bi-Linear Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2005/251}, year = {2005}, url = {http://eprint.iacr.org/2005/251}, } @misc{cryptoeprint:2005:252, author = {Michael Scott}, title = {Faster Pairings using an Elliptic Curve with an Efficient Endomorphism}, howpublished = {Cryptology ePrint Archive, Report 2005/252}, year = {2005}, url = {http://eprint.iacr.org/2005/252}, } @misc{cryptoeprint:2005:253, author = {David Galindo and Ichiro Hasuo}, title = {Security Notions for Identity Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2005/253}, year = {2005}, url = {http://eprint.iacr.org/2005/253}, } @misc{cryptoeprint:2005:254, author = {Michel Abdalla and Mihir Bellare and Dario Catalano and Eike Kiltz and Tadayoshi Kohno and Tanja Lange and John Malone-Lee and Gregory Neven and Pascal Paillier and Haixia Shi}, title = {Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions}, howpublished = {Cryptology ePrint Archive, Report 2005/254}, year = {2005}, url = {http://eprint.iacr.org/2005/254}, } @misc{cryptoeprint:2005:255, author = {Jintai Ding and Jason E. Gower}, title = {Inoculating Multivariate Schemes Against Differential Attacks}, howpublished = {Cryptology ePrint Archive, Report 2005/255}, year = {2005}, url = {http://eprint.iacr.org/2005/255}, } @misc{cryptoeprint:2005:256, author = {Reihaneh Safavi-Naini and Dongvu Tonien}, title = {Fuzzy Universal Hashing and Approximate Authentication}, howpublished = {Cryptology ePrint Archive, Report 2005/256}, year = {2005}, url = {http://eprint.iacr.org/2005/256}, } @misc{cryptoeprint:2005:257, author = {Jin Hong and Woo-Hwan Kim}, title = {TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY}, howpublished = {Cryptology ePrint Archive, Report 2005/257}, year = {2005}, url = {http://eprint.iacr.org/2005/257}, } @misc{cryptoeprint:2005:258, author = {Nuttapong Attrapadung and Yang Cui and Goichiro Hanaoka and Hideki Imai and Kanta Matsuura and Peng Yang and Rui Zhang}, title = {Relations Among Notions of Security for Identity Based Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2005/258}, year = {2005}, url = {http://eprint.iacr.org/2005/258}, } @misc{cryptoeprint:2005:259, author = {Bo Gyeong Kang and Moon Sung Lee and Je Hong Park}, title = {Efficient Delegation of Pairing Computation}, howpublished = {Cryptology ePrint Archive, Report 2005/259}, year = {2005}, url = {http://eprint.iacr.org/2005/259}, } @misc{cryptoeprint:2005:260, author = {Bo Gyeong Kang and Je Hong Park}, title = {Powered Tate Pairing Computation}, howpublished = {Cryptology ePrint Archive, Report 2005/260}, year = {2005}, url = {http://eprint.iacr.org/2005/260}, } @misc{cryptoeprint:2005:261, author = {Alexander W. Dent}, title = {The Cramer-Shoup Encryption Scheme is Plaintext Aware in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2005/261}, year = {2005}, url = {http://eprint.iacr.org/2005/261}, } @misc{cryptoeprint:2005:262, author = {Ivan Damg{\aa}rd and Yuval Ishai}, title = {Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator}, howpublished = {Cryptology ePrint Archive, Report 2005/262}, year = {2005}, url = {http://eprint.iacr.org/2005/262}, } @misc{cryptoeprint:2005:263, author = {Jun Yajima and Takeshi Shimoyama}, title = {Wang's sufficient conditions of MD5 are not sufficient}, howpublished = {Cryptology ePrint Archive, Report 2005/263}, year = {2005}, url = {http://eprint.iacr.org/2005/263}, } @misc{cryptoeprint:2005:264, author = {Boaz Tsaban}, title = {On an authentication scheme based on the Root Problem in the braid group}, howpublished = {Cryptology ePrint Archive, Report 2005/264}, year = {2005}, url = {http://eprint.iacr.org/2005/264}, } @misc{cryptoeprint:2005:265, author = {Kristin Lauter and Anton Mityagin}, title = {Security Analysis of KEA Authenticated Key Exchange Protocol}, howpublished = {Cryptology ePrint Archive, Report 2005/265}, year = {2005}, url = {http://eprint.iacr.org/2005/265}, } @misc{cryptoeprint:2005:266, author = {Charanjit S. Jutla and Anindya C. Patthak}, title = {A Matching Lower Bound on the Minimum Weight of SHA-1 Expansion Code}, howpublished = {Cryptology ePrint Archive, Report 2005/266}, year = {2005}, url = {http://eprint.iacr.org/2005/266}, } @misc{cryptoeprint:2005:267, author = {Cees J.A. Jansen}, title = {Stream Cipher Design based on Jumping Finite State Machines}, howpublished = {Cryptology ePrint Archive, Report 2005/267}, year = {2005}, url = {http://eprint.iacr.org/2005/267}, } @misc{cryptoeprint:2005:268, author = {Shujun Li and Heung-Yeung Shum}, title = {Secure Human-Computer Identification (Interface) Systems against Peeping Attacks: SecHCI}, howpublished = {Cryptology ePrint Archive, Report 2005/268}, year = {2005}, url = {http://eprint.iacr.org/2005/268}, } @misc{cryptoeprint:2005:269, author = {Junghyun Nam, Seungjoo Kim, and Dongho Won}, title = {Security Weakness in a Three-Party Password-Based Key Exchange Protocol Using Weil Pairing}, howpublished = {Cryptology ePrint Archive, Report 2005/269}, year = {2005}, url = {http://eprint.iacr.org/2005/269}, } @misc{cryptoeprint:2005:270, author = {Kim-Kwang Raymond Choo and Colin Boyd and Yvonne Hitchcock}, title = {Examining Indistinguishability-Based Proof Models for Key Establishment Protocols}, howpublished = {Cryptology ePrint Archive, Report 2005/270}, year = {2005}, url = {http://eprint.iacr.org/2005/270}, } @misc{cryptoeprint:2005:271, author = {Dag Arne Osvik and Adi Shamir and Eran Tromer}, title = {Cache attacks and Countermeasures: the Case of AES}, howpublished = {Cryptology ePrint Archive, Report 2005/271}, year = {2005}, url = {http://eprint.iacr.org/2005/271}, } @misc{cryptoeprint:2005:272, author = {Amitabh Saxena and Ben Soh}, title = {An Authentication Protocol For Mobile Agents Using Bilinear Pairings}, howpublished = {Cryptology ePrint Archive, Report 2005/272}, year = {2005}, url = {http://eprint.iacr.org/2005/272}, } @misc{cryptoeprint:2005:273, author = {P G Vaidya and Sajini Anand}, title = {CRYPTOGRAPHY BASED ON CHAOTIC SYNCHRONIZATION: ROUND III}, howpublished = {Cryptology ePrint Archive, Report 2005/273}, year = {2005}, url = {http://eprint.iacr.org/2005/273}, } @misc{cryptoeprint:2005:274, author = {Jeff Hoffstein and Nick Howgrave-Graham and Jill Pipher and Joseph H. Silverman and William Whyte}, title = {Performance Improvements and a Baseline Parameter Generation Algorithm for NTRUSign}, howpublished = {Cryptology ePrint Archive, Report 2005/274}, year = {2005}, url = {http://eprint.iacr.org/2005/274}, } @misc{cryptoeprint:2005:275, author = {Dongvu Tonien and Reihaneh Safavi-Naini}, title = {Explicit Construction of Secure Frameproof Codes}, howpublished = {Cryptology ePrint Archive, Report 2005/275}, year = {2005}, url = {http://eprint.iacr.org/2005/275}, } @misc{cryptoeprint:2005:276, author = {Jung Hee Cheon and Dong Hoon Lee}, title = {Use of Sparse and/or Complex Exponents in Batch Verification of Exponentiations}, howpublished = {Cryptology ePrint Archive, Report 2005/276}, year = {2005}, url = {http://eprint.iacr.org/2005/276}, } @misc{cryptoeprint:2005:277, author = {Fumiyuki Momose and Jinhui Chao}, title = {Scholten Forms and Elliptic/Hyperelliptic Curves with Weak Weil Restrictions}, howpublished = {Cryptology ePrint Archive, Report 2005/277}, year = {2005}, url = {http://eprint.iacr.org/2005/277}, } @misc{cryptoeprint:2005:278, author = {Katja Schmidt-Samoa}, title = {A New Rabin-type Trapdoor Permutation Equivalent to Factoring and Its Applications}, howpublished = {Cryptology ePrint Archive, Report 2005/278}, year = {2005}, url = {http://eprint.iacr.org/2005/278}, } @misc{cryptoeprint:2005:279, author = {Bao Li and Hongda Li and Guangwu Xu and Haixia Xu}, title = {Efficient reduction of 1 out of $n$ oblivious transfers in random oracle model}, howpublished = {Cryptology ePrint Archive, Report 2005/279}, year = {2005}, url = {http://eprint.iacr.org/2005/279}, } @misc{cryptoeprint:2005:280, author = {D. Page}, title = {Partitioned Cache Architecture as a Side-Channel Defence Mechanism}, howpublished = {Cryptology ePrint Archive, Report 2005/280}, year = {2005}, url = {http://eprint.iacr.org/2005/280}, } @misc{cryptoeprint:2005:281, author = {John Kelsey and Tadayoshi Kohno}, title = {Herding Hash Functions and the Nostradamus Attack}, howpublished = {Cryptology ePrint Archive, Report 2005/281}, year = {2005}, url = {http://eprint.iacr.org/2005/281}, } @misc{cryptoeprint:2005:282, author = {James Aspnes and Zoë Diamadi and Kristian Gjøsteen and René Peralta and Aleksandr Yampolskiy}, title = {Spreading Alerts Quietly and the Subgroup Escape Problem}, howpublished = {Cryptology ePrint Archive, Report 2005/282}, year = {2005}, url = {http://eprint.iacr.org/2005/282}, } @misc{cryptoeprint:2005:283, author = {Samad Nasserian, Gene Tsudik}, title = {Revisiting Oblivious Signature-Based Envelopes}, howpublished = {Cryptology ePrint Archive, Report 2005/283}, year = {2005}, url = {http://eprint.iacr.org/2005/283}, } @misc{cryptoeprint:2005:284, author = {Ariel Futoransky and Emiliano Kargieman and Carlos Sarraute and Ariel Waissbein}, title = {Foundations and Applications for Secure Triggers}, howpublished = {Cryptology ePrint Archive, Report 2005/284}, year = {2005}, url = {http://eprint.iacr.org/2005/284}, } @misc{cryptoeprint:2005:285, author = {Li Banghe}, title = {Generalizations of RSA public key cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2005/285}, year = {2005}, url = {http://eprint.iacr.org/2005/285}, } @misc{cryptoeprint:2005:286, author = {Daniele Micciancio and Shien Jin Ong and Amit Sahai and Salil Vadhan}, title = {Concurrent Zero Knowledge without Complexity Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2005/286}, year = {2005}, url = {http://eprint.iacr.org/2005/286}, } @misc{cryptoeprint:2005:287, author = {Yijuan Shi and Jianhua Li}, title = {Provable Efficient Certificateless Public Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2005/287}, year = {2005}, url = {http://eprint.iacr.org/2005/287}, } @misc{cryptoeprint:2005:288, author = {Xavier Boyen and Qixiang Mei and Brent Waters}, title = {Direct Chosen Ciphertext Security from Identity-Based Techniques}, howpublished = {Cryptology ePrint Archive, Report 2005/288}, year = {2005}, url = {http://eprint.iacr.org/2005/288}, } @misc{cryptoeprint:2005:289, author = {Ratna Dutta and Rana Barua}, title = {Overview of Key Agreement Protocols}, howpublished = {Cryptology ePrint Archive, Report 2005/289}, year = {2005}, url = {http://eprint.iacr.org/2005/289}, } @misc{cryptoeprint:2005:290, author = {Jens Groth and Rafail Ostrovsky and Amit Sahai}, title = {Perfect Non-Interactive Zero Knowledge for NP}, howpublished = {Cryptology ePrint Archive, Report 2005/290}, year = {2005}, url = {http://eprint.iacr.org/2005/290}, } @misc{cryptoeprint:2005:291, author = {Ivan Damg{\aa}rd and Serge Fehr and Louis Salvail and Christian Schaffner}, title = {Cryptography In the Bounded Quantum-Storage Model}, howpublished = {Cryptology ePrint Archive, Report 2005/291}, year = {2005}, url = {http://eprint.iacr.org/2005/291}, } @misc{cryptoeprint:2005:292, author = {Wu Wenling, Zhang Wentao, and Feng Dengguo}, title = {Improved Integral Cryptanalysis of FOX Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2005/292}, year = {2005}, url = {http://eprint.iacr.org/2005/292}, } @misc{cryptoeprint:2005:293, author = {Colm O hEigeartaigh}, title = {Speeding Up Pairing Computation}, howpublished = {Cryptology ePrint Archive, Report 2005/293}, year = {2005}, url = {http://eprint.iacr.org/2005/293}, } @misc{cryptoeprint:2005:294, author = {Michael Backes and Dennis Hofheinz and J\"orn M\"uller-Quade and Dominique Unruh}, title = {On Fairness in Simulatability-based Cryptographic Systems}, howpublished = {Cryptology ePrint Archive, Report 2005/294}, year = {2005}, url = {http://eprint.iacr.org/2005/294}, } @misc{cryptoeprint:2005:295, author = {HE GE}, title = {Hidden Exponent RSA and Efficient Key Distribution}, howpublished = {Cryptology ePrint Archive, Report 2005/295}, year = {2005}, url = {http://eprint.iacr.org/2005/295}, } @misc{cryptoeprint:2005:296, author = {Markus Volkmer and Sebastian Wallner}, title = {A Key Establishment IP-Core for Ubiquitous Computing}, howpublished = {Cryptology ePrint Archive, Report 2005/296}, year = {2005}, url = {http://eprint.iacr.org/2005/296}, } @misc{cryptoeprint:2005:297, author = {Maithili Narasimha and Gene Tsudik}, title = {DSAC: An Approach to Ensure Integrity of Outsourced Databases using Signature Aggregation and Chaining}, howpublished = {Cryptology ePrint Archive, Report 2005/297}, year = {2005}, url = {http://eprint.iacr.org/2005/297}, } @misc{cryptoeprint:2005:298, author = {Gal Badishi and Amir Herzberg and Idit Keidar}, title = {Keeping Denial-of-Service Attackers in the Dark}, howpublished = {Cryptology ePrint Archive, Report 2005/298}, year = {2005}, url = {http://eprint.iacr.org/2005/298}, } @misc{cryptoeprint:2005:299, author = {Marcin Kontak and Janusz Szmidt}, title = {Nonlinearity of the Round Function}, howpublished = {Cryptology ePrint Archive, Report 2005/299}, year = {2005}, url = {http://eprint.iacr.org/2005/299}, } @misc{cryptoeprint:2005:300, author = {Songping Li and Quan Yuan and Jin Li}, title = {Towards Security Two-part Authenticated Key Agreement Protocols}, howpublished = {Cryptology ePrint Archive, Report 2005/300}, year = {2005}, url = {http://eprint.iacr.org/2005/300}, } @misc{cryptoeprint:2005:301, author = {Paris Kitsos}, title = {On the Hardware Implementation of the MICKEY-128 Stream Cipher}, howpublished = {Cryptology ePrint Archive, Report 2005/301}, year = {2005}, url = {http://eprint.iacr.org/2005/301}, } @misc{cryptoeprint:2005:302, author = {Angela Murphy and Noel Fitzpatrick}, title = {Elliptic Curves for Pairing Applications}, howpublished = {Cryptology ePrint Archive, Report 2005/302}, year = {2005}, url = {http://eprint.iacr.org/2005/302}, } @misc{cryptoeprint:2005:303, author = {Kevin Fu and Seny Kamara and Tadayoshi Kohno}, title = {Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage}, howpublished = {Cryptology ePrint Archive, Report 2005/303}, year = {2005}, url = {http://eprint.iacr.org/2005/303}, } @misc{cryptoeprint:2005:304, author = {Adam Bender and Jonathan Katz and Ruggero Morselli}, title = {Ring Signatures: Stronger Definitions, and Constructions without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2005/304}, year = {2005}, url = {http://eprint.iacr.org/2005/304}, } @misc{cryptoeprint:2005:305, author = {Anna Lysyanskaya and Maria Meyerovich}, title = {Steganography with Imperfect Samplers}, howpublished = {Cryptology ePrint Archive, Report 2005/305}, year = {2005}, url = {http://eprint.iacr.org/2005/305}, } @misc{cryptoeprint:2005:306, author = {Yasuyuki MURAKAMI, Masao KASAHARA}, title = {Murakami-Kasahara ID-based Key Sharing Scheme Revisited ---In Comparison with Maurer-Yacobi Schemes---}, howpublished = {Cryptology ePrint Archive, Report 2005/306}, year = {2005}, url = {http://eprint.iacr.org/2005/306}, } @misc{cryptoeprint:2005:307, author = {K. Bentahar}, title = {The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2005/307}, year = {2005}, url = {http://eprint.iacr.org/2005/307}, } @misc{cryptoeprint:2005:308, author = {Chunbo Ma, Jun Ao, and Dake He}, title = {Adaptable Group-Oriented Signature}, howpublished = {Cryptology ePrint Archive, Report 2005/308}, year = {2005}, url = {http://eprint.iacr.org/2005/308}, } @misc{cryptoeprint:2005:309, author = {Quan Yuan and Songping Li}, title = {A New Efficient ID-Based Authenticated Key Agreement Protocol}, howpublished = {Cryptology ePrint Archive, Report 2005/309}, year = {2005}, url = {http://eprint.iacr.org/2005/309}, } @misc{cryptoeprint:2005:310, author = {Hiroyuki OKAZAKI and Ryuichi SAKAI and Masao KASAHARA}, title = {Meta Ring Signature}, howpublished = {Cryptology ePrint Archive, Report 2005/310}, year = {2005}, url = {http://eprint.iacr.org/2005/310}, } @misc{cryptoeprint:2005:311, author = {Cecile Canovas and Jessy Clediere}, title = {What do S-boxes Say in Differential Side Channel Attacks?}, howpublished = {Cryptology ePrint Archive, Report 2005/311}, year = {2005}, url = {http://eprint.iacr.org/2005/311}, } @misc{cryptoeprint:2005:312, author = {Xijin Tang and Yong Feng}, title = {A New Efficient Algorithm for Solving Systems of Multivariate Polynomial Equations}, howpublished = {Cryptology ePrint Archive, Report 2005/312}, year = {2005}, url = {http://eprint.iacr.org/2005/312}, } @misc{cryptoeprint:2005:313, author = {Javier Herranz}, title = {Deterministic Identity-Based Signatures for Partial Aggregation}, howpublished = {Cryptology ePrint Archive, Report 2005/313}, year = {2005}, url = {http://eprint.iacr.org/2005/313}, } @misc{cryptoeprint:2005:314, author = {P. Gaudry}, title = {Fast genus 2 arithmetic based on Theta functions}, howpublished = {Cryptology ePrint Archive, Report 2005/314}, year = {2005}, url = {http://eprint.iacr.org/2005/314}, } @misc{cryptoeprint:2005:315, author = {David Molnar and Andrea Soppera and David Wagner}, title = {A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags}, howpublished = {Cryptology ePrint Archive, Report 2005/315}, year = {2005}, url = {http://eprint.iacr.org/2005/315}, } @misc{cryptoeprint:2005:316, author = {Dong-Guk Han and Tsuyoshi Takagi and Tae Hyun Kim and Ho Won Kim and Kyo Il Chung}, title = {Collision Attack on XTR and a Countermeasure with a Fixed Pattern}, howpublished = {Cryptology ePrint Archive, Report 2005/316}, year = {2005}, url = {http://eprint.iacr.org/2005/316}, } @misc{cryptoeprint:2005:317, author = {Sherman S. M. Chow and Joseph K. Liu and Victor K. Wei and Tsz Hon Yuen}, title = {Ring Signatures without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2005/317}, year = {2005}, url = {http://eprint.iacr.org/2005/317}, } @misc{cryptoeprint:2005:318, author = {Michael J. Wiener}, title = {Bounds on Birthday Attack Times}, howpublished = {Cryptology ePrint Archive, Report 2005/318}, year = {2005}, url = {http://eprint.iacr.org/2005/318}, } @misc{cryptoeprint:2005:319, author = {Xiaofeng Chen and Fangguo Zhang and Shengli Liu}, title = {ID-based Restrictive Partially Blind Signatures and Applications}, howpublished = {Cryptology ePrint Archive, Report 2005/319}, year = {2005}, url = {http://eprint.iacr.org/2005/319}, } @misc{cryptoeprint:2005:320, author = {Nuttapong Attrapadung and Benoit Chevallier-Mames and Jun Furukawa and Takeshi Gomi and Goichiro Hanaoka and Hideki Imai and Rui Zhang}, title = {Efficient Identity-Based Encryption with Tight Security Reduction}, howpublished = {Cryptology ePrint Archive, Report 2005/320}, year = {2005}, url = {http://eprint.iacr.org/2005/320}, } @misc{cryptoeprint:2005:321, author = {Liam Keliher and Jiayuan Sui}, title = {Exact Maximum Expected Differential and Linear Probability for 2-Round Advanced Encryption Standard (AES)}, howpublished = {Cryptology ePrint Archive, Report 2005/321}, year = {2005}, url = {http://eprint.iacr.org/2005/321}, } @misc{cryptoeprint:2005:322, author = {Min yang and Qingshu Meng and Huanguo Zhang}, title = {Evolutionary Design of Trace Form Bent Functions}, howpublished = {Cryptology ePrint Archive, Report 2005/322}, year = {2005}, url = {http://eprint.iacr.org/2005/322}, } @misc{cryptoeprint:2005:323, author = {Steven D. Galbraith}, title = {The Weil pairing on elliptic curves over C}, howpublished = {Cryptology ePrint Archive, Report 2005/323}, year = {2005}, url = {http://eprint.iacr.org/2005/323}, } @misc{cryptoeprint:2005:324, author = {Nicolas G\"urel}, title = {Extracting bits from coordinates of a point of an elliptic curve}, howpublished = {Cryptology ePrint Archive, Report 2005/324}, year = {2005}, url = {http://eprint.iacr.org/2005/324}, } @misc{cryptoeprint:2005:325, author = {HE GE}, title = {An Effective Method to Implement Group Signature with Revocation}, howpublished = {Cryptology ePrint Archive, Report 2005/325}, year = {2005}, url = {http://eprint.iacr.org/2005/325}, } @misc{cryptoeprint:2005:326, author = {Man Ho Au and Joseph K. Liu and Patrick P. Tsang and Duncan S. Wong}, title = {A Suite of ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity}, howpublished = {Cryptology ePrint Archive, Report 2005/326}, year = {2005}, url = {http://eprint.iacr.org/2005/326}, } @misc{cryptoeprint:2005:327, author = {Jongsung Kim and Alex Biryukov and Bart Preneel and Sangjin Lee}, title = {On the Security of Encryption Modes of MD4, MD5 and HAVAL}, howpublished = {Cryptology ePrint Archive, Report 2005/327}, year = {2005}, url = {http://eprint.iacr.org/2005/327}, } @misc{cryptoeprint:2005:328, author = {Jonathan Katz and Chiu-Yuen Koo}, title = {On Constructing Universal One-Way Hash Functions from Arbitrary One-Way Functions}, howpublished = {Cryptology ePrint Archive, Report 2005/328}, year = {2005}, url = {http://eprint.iacr.org/2005/328}, } @misc{cryptoeprint:2005:329, author = {Amir Herzberg}, title = {Cryptographic Protocols to Prevent Spam}, howpublished = {Cryptology ePrint Archive, Report 2005/329}, year = {2005}, url = {http://eprint.iacr.org/2005/329}, } @misc{cryptoeprint:2005:330, author = {Robert Ronan and Colm O hEigeartaigh and Colin Murphy and Michael Scott and Tim Kerins and W.P. Marnane}, title = {A Dedicated Processor for the eta Pairing}, howpublished = {Cryptology ePrint Archive, Report 2005/330}, year = {2005}, url = {http://eprint.iacr.org/2005/330}, } @misc{cryptoeprint:2005:331, author = {Julien Bringer and Hervé Chabanne and Quoc Dung Do}, title = {A Fuzzy Sketch with Trapdoor}, howpublished = {Cryptology ePrint Archive, Report 2005/331}, year = {2005}, url = {http://eprint.iacr.org/2005/331}, } @misc{cryptoeprint:2005:332, author = {An Braeken and Yuri Borissov and Svetla Nikova and Bart Preneel}, title = {Classification of Cubic $(n-4)$-resilient Boolean Functions}, howpublished = {Cryptology ePrint Archive, Report 2005/332}, year = {2005}, url = {http://eprint.iacr.org/2005/332}, } @misc{cryptoeprint:2005:333, author = {Ivan Damg{\aa}rd and Kasper Dupont}, title = {Universally Composable Disk Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2005/333}, year = {2005}, url = {http://eprint.iacr.org/2005/333}, } @misc{cryptoeprint:2005:334, author = {Michael Backes and Christian Cachin and Alina Oprea}, title = {Secure Key-Updating for Lazy Revocation}, howpublished = {Cryptology ePrint Archive, Report 2005/334}, year = {2005}, url = {http://eprint.iacr.org/2005/334}, } @misc{cryptoeprint:2005:335, author = {Amitabh Saxena and Ben Soh}, title = {One-Way Signature Chaining - A New Paradigm For Group Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2005/335}, year = {2005}, url = {http://eprint.iacr.org/2005/335}, } @misc{cryptoeprint:2005:336, author = {David Freeman}, title = {Pairing-based identification schemes}, howpublished = {Cryptology ePrint Archive, Report 2005/336}, year = {2005}, url = {http://eprint.iacr.org/2005/336}, } @misc{cryptoeprint:2005:337, author = {Liangliang Xiao, Mulan Liu, and Zhifang Zhang}, title = {Statistical Multiparty Computation Based on Random Walks on Graphs}, howpublished = {Cryptology ePrint Archive, Report 2005/337}, year = {2005}, url = {http://eprint.iacr.org/2005/337}, } @misc{cryptoeprint:2005:338, author = {Lu Xiao and Howard M. Heys}, title = {An Improved Power Analysis Attack Against Camellia's Key Schedule}, howpublished = {Cryptology ePrint Archive, Report 2005/338}, year = {2005}, url = {http://eprint.iacr.org/2005/338}, } @misc{cryptoeprint:2005:339, author = {Zhaohui Cheng and Liqun Chen and Richard Comley and Qiang Tang}, title = {Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings}, howpublished = {Cryptology ePrint Archive, Report 2005/339}, year = {2005}, url = {http://eprint.iacr.org/2005/339}, } @misc{cryptoeprint:2005:340, author = {Christophe Giraud and Emmanuel Prouff}, title = {A New Approach to Counteract DPA Attacks on Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2005/340}, year = {2005}, url = {http://eprint.iacr.org/2005/340}, } @misc{cryptoeprint:2005:341, author = {Marten Trolin}, title = {A Universally Composable Scheme for Electronic Cash}, howpublished = {Cryptology ePrint Archive, Report 2005/341}, year = {2005}, url = {http://eprint.iacr.org/2005/341}, } @misc{cryptoeprint:2005:342, author = {Pu Duan and Shi Cui and Choong Wah Chan}, title = {Special Polynomial Families for Generating More Suitable Elliptic Curves for Pairing-Based Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2005/342}, year = {2005}, url = {http://eprint.iacr.org/2005/342}, } @misc{cryptoeprint:2005:343, author = {Amitabh Saxena and Serguey Priymak and Ben Soh}, title = {Zero-Knowledge Blind Identification For Smart Cards Using Bilinear Pairings}, howpublished = {Cryptology ePrint Archive, Report 2005/343}, year = {2005}, url = {http://eprint.iacr.org/2005/343}, } @misc{cryptoeprint:2005:344, author = {Tapan Rai}, title = {Countering chosen-ciphertext attacks against noncommutative polly cracker-type cryptosystems.}, howpublished = {Cryptology ePrint Archive, Report 2005/344}, year = {2005}, url = {http://eprint.iacr.org/2005/344}, } @misc{cryptoeprint:2005:345, author = {Aggelos Kiayias and Moti Yung}, title = {Group Signatures with Efficient Concurrent Join}, howpublished = {Cryptology ePrint Archive, Report 2005/345}, year = {2005}, url = {http://eprint.iacr.org/2005/345}, } @misc{cryptoeprint:2005:346, author = {Kun Peng, Colin Boyd and Ed Dawson}, title = {Batch Verification of Validity of Bids in Homomorphic E-auction}, howpublished = {Cryptology ePrint Archive, Report 2005/346}, year = {2005}, url = {http://eprint.iacr.org/2005/346}, } @misc{cryptoeprint:2005:347, author = {Song Han and Elizabeth Chang and Tharam Dillon}, title = {Knapsack Diffie-Hellman: A New Family of Diffie-Hellman}, howpublished = {Cryptology ePrint Archive, Report 2005/347}, year = {2005}, url = {http://eprint.iacr.org/2005/347}, } @misc{cryptoeprint:2005:348, author = {Alexander W. Dent and Caroline Kudla}, title = {On Proofs of Security for Certificateless Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2005/348}, year = {2005}, url = {http://eprint.iacr.org/2005/348}, } @misc{cryptoeprint:2005:349, author = {Ivan B. Damgaard and Serge Fehr and Louis Salvail and Christian Schaffner}, title = {Oblivious Transfer and Linear Functions}, howpublished = {Cryptology ePrint Archive, Report 2005/349}, year = {2005}, url = {http://eprint.iacr.org/2005/349}, } @misc{cryptoeprint:2005:350, author = {Charanjit S. Jutla and Anindya C. Patthak}, title = {Is SHA-1 conceptually sound?}, howpublished = {Cryptology ePrint Archive, Report 2005/350}, year = {2005}, url = {http://eprint.iacr.org/2005/350}, } @misc{cryptoeprint:2005:351, author = {Kim-Kwang Raymond Choo and Colin Boyd and Yvonne Hitchcock}, title = {Errors in Computational Complexity Proofs for Protocols}, howpublished = {Cryptology ePrint Archive, Report 2005/351}, year = {2005}, url = {http://eprint.iacr.org/2005/351}, } @misc{cryptoeprint:2005:352, author = {Danilo Gligoroski}, title = {Candidate One-Way Functions and One-Way Permutations Based on Quasigroup String Transformations}, howpublished = {Cryptology ePrint Archive, Report 2005/352}, year = {2005}, url = {http://eprint.iacr.org/2005/352}, } @misc{cryptoeprint:2005:353, author = {Jianhong Zhang, Wei Zou, }, title = {On the Security of A Group Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2005/353}, year = {2005}, url = {http://eprint.iacr.org/2005/353}, } @misc{cryptoeprint:2005:354, author = {Rongxing Lu and Zhenfu Cao and Renwang Su and Jun Shao}, title = {Pairing-Based Two-Party Authenticated Key Agreement Protocol}, howpublished = {Cryptology ePrint Archive, Report 2005/354}, year = {2005}, url = {http://eprint.iacr.org/2005/354}, } @misc{cryptoeprint:2005:355, author = {Rongxing Lu and Zhenfu Cao}, title = {ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks}, howpublished = {Cryptology ePrint Archive, Report 2005/355}, year = {2005}, url = {http://eprint.iacr.org/2005/355}, } @misc{cryptoeprint:2005:356, author = {Fabien Coelho}, title = {Exponential Memory-Bound Functions for Proof of Work Protocols}, howpublished = {Cryptology ePrint Archive, Report 2005/356}, year = {2005}, url = {http://eprint.iacr.org/2005/356}, } @misc{cryptoeprint:2005:357, author = {Kyung-Ah Shim}, title = {Cryptanalysis of Two ID-based Authenticated Key Agreement Protocols from Pairings}, howpublished = {Cryptology ePrint Archive, Report 2005/357}, year = {2005}, url = {http://eprint.iacr.org/2005/357}, } @misc{cryptoeprint:2005:358, author = {Haining Fan and Duo Liu and Yiqi Dai}, title = {Normal Basis Multiplication Algorithms for GF(2n) (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2005/358}, year = {2005}, url = {http://eprint.iacr.org/2005/358}, } @misc{cryptoeprint:2005:359, author = {L. Budaghyan and C. Carlet and P. Felke and G. Leander}, title = {An infinite class of quadratic APN functions which are not equivalent to power mappings}, howpublished = {Cryptology ePrint Archive, Report 2005/359}, year = {2005}, url = {http://eprint.iacr.org/2005/359}, } @misc{cryptoeprint:2005:360, author = {Jens Matthias-Bohli and Maria Isabel Gonzalez Vasco and Rainer Steinwandt}, title = {Burmester-Desmedt Tree-Based Key Transport Revisited: Provable Security}, howpublished = {Cryptology ePrint Archive, Report 2005/360}, year = {2005}, url = {http://eprint.iacr.org/2005/360}, } @misc{cryptoeprint:2005:361, author = {Yuan Li and T.W.Cusick}, title = {Strict Avalanche Criterion Over Finite Fields}, howpublished = {Cryptology ePrint Archive, Report 2005/361}, year = {2005}, url = {http://eprint.iacr.org/2005/361}, } @misc{cryptoeprint:2005:362, author = {Michael Scott and Paulo S. L. M. Barreto}, title = {On a (Flawed) Proposal to Build More Pairing-Friendly Curves}, howpublished = {Cryptology ePrint Archive, Report 2005/362}, year = {2005}, url = {http://eprint.iacr.org/2005/362}, } @misc{cryptoeprint:2005:363, author = {Florian Luca and Igor E. Shparlinski}, title = {Elliptic Curves with Low Embedding Degree}, howpublished = {Cryptology ePrint Archive, Report 2005/363}, year = {2005}, url = {http://eprint.iacr.org/2005/363}, } @misc{cryptoeprint:2005:364, author = {Amitabh Saxena}, title = {Additive Proofs of Knowledge - A New Notion For Non-Interactive Proofs}, howpublished = {Cryptology ePrint Archive, Report 2005/364}, year = {2005}, url = {http://eprint.iacr.org/2005/364}, } @misc{cryptoeprint:2005:365, author = {Boaz Barak and Shien Jin Ong and Salil Vadhan}, title = {Derandomization in Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2005/365}, year = {2005}, url = {http://eprint.iacr.org/2005/365}, } @misc{cryptoeprint:2005:366, author = {Qiang Tang and Chris J. Mitchell}, title = {Efficient Compilers for Authenticated Group Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2005/366}, year = {2005}, url = {http://eprint.iacr.org/2005/366}, } @misc{cryptoeprint:2005:367, author = {Dong Jin Park, Juyoung Cha, and Pil Joong Lee}, title = {Searchable Keyword-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2005/367}, year = {2005}, url = {http://eprint.iacr.org/2005/367}, } @misc{cryptoeprint:2005:368, author = {David Molnar and Matt Piotrowski and David Schultz and David Wagner}, title = {The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks }, howpublished = {Cryptology ePrint Archive, Report 2005/368}, year = {2005}, url = {http://eprint.iacr.org/2005/368}, } @misc{cryptoeprint:2005:369, author = {David Naccache}, title = {Secure and {\sl Practical} Identity-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2005/369}, year = {2005}, url = {http://eprint.iacr.org/2005/369}, } @misc{cryptoeprint:2005:370, author = {Juan A. Garay and Philip MacKenzie and Manoj Prabhakaran and Ke Yang}, title = {Resource Fairness and Composability of Cryptographic Protocols}, howpublished = {Cryptology ePrint Archive, Report 2005/370}, year = {2005}, url = {http://eprint.iacr.org/2005/370}, } @misc{cryptoeprint:2005:371, author = {Dongvu Tonien}, title = {On a Traitor Tracing Scheme from ACISP 2003}, howpublished = {Cryptology ePrint Archive, Report 2005/371}, year = {2005}, url = {http://eprint.iacr.org/2005/371}, } @misc{cryptoeprint:2005:372, author = {Dao-Shun Wang, Lei Zhang, Ning Ma and Lian-Sheng Huang}, title = {Secret color images sharing schemes based on XOR operation}, howpublished = {Cryptology ePrint Archive, Report 2005/372}, year = {2005}, url = {http://eprint.iacr.org/2005/372}, } @misc{cryptoeprint:2005:373, author = {Yong Ho Hwang and Pil Joong Lee}, title = {Efficient Broadcast Encryption Scheme with Log-Key Storage}, howpublished = {Cryptology ePrint Archive, Report 2005/373}, year = {2005}, url = {http://eprint.iacr.org/2005/373}, } @misc{cryptoeprint:2005:374, author = {Kunpeng Wang, Bao Li}, title = {Computation of Tate Pairing for Supersingular Curves over characteristic 5 and 7}, howpublished = {Cryptology ePrint Archive, Report 2005/374}, year = {2005}, url = {http://eprint.iacr.org/2005/374}, } @misc{cryptoeprint:2005:375, author = {Paul Crowley}, title = {Truncated differential cryptanalysis of five rounds of Salsa20}, howpublished = {Cryptology ePrint Archive, Report 2005/375}, year = {2005}, url = {http://eprint.iacr.org/2005/375}, } @misc{cryptoeprint:2005:376, author = {Carles Padro and Ignacio Gracia}, title = {Representing small identically self-dual matroids by self-dual codes}, howpublished = {Cryptology ePrint Archive, Report 2005/376}, year = {2005}, url = {http://eprint.iacr.org/2005/376}, } @misc{cryptoeprint:2005:377, author = {Sherman S.M. Chow}, title = {Exclusion-Intersection Encryption and Its Application to Searchable Encryption}, howpublished = {Cryptology ePrint Archive, Report 2005/377}, year = {2005}, url = {http://eprint.iacr.org/2005/377}, } @misc{cryptoeprint:2005:378, author = {Sven Laur and Helger Lipmaa}, title = {A New Protocol for Conditional Disclosure of Secrets And Its Applications}, howpublished = {Cryptology ePrint Archive, Report 2005/378}, year = {2005}, url = {http://eprint.iacr.org/2005/378}, } @misc{cryptoeprint:2005:379, author = {Jonathan Katz and Yehuda Lindell}, title = {Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs}, howpublished = {Cryptology ePrint Archive, Report 2005/379}, year = {2005}, url = {http://eprint.iacr.org/2005/379}, } @misc{cryptoeprint:2005:380, author = {Daniel R. L. Brown}, title = {Breaking RSA May Be As Difficult As Factoring}, howpublished = {Cryptology ePrint Archive, Report 2005/380}, year = {2005}, url = {http://eprint.iacr.org/2005/380}, } @misc{cryptoeprint:2005:381, author = {Xavier Boyen and Brent Waters}, title = {Compact Group Signatures Without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2005/381}, year = {2005}, url = {http://eprint.iacr.org/2005/381}, } @misc{cryptoeprint:2005:382, author = {Kaoru Kurosawa and Tsuyoshi Takagi }, title = {One-Wayness Equivalent to General Factoring}, howpublished = {Cryptology ePrint Archive, Report 2005/382}, year = {2005}, url = {http://eprint.iacr.org/2005/382}, } @misc{cryptoeprint:2005:383, author = {Debdeep Mukhopadhyay and Dipanwita RoyChowdhury}, title = {Key Mixing in Block Ciphers through Addition modulo $2^n$}, howpublished = {Cryptology ePrint Archive, Report 2005/383}, year = {2005}, url = {http://eprint.iacr.org/2005/383}, } @misc{cryptoeprint:2005:384, author = {Dong-Guk Han and Tetsuya Izu and Tsuyoshi Takagi}, title = {Some Explicit Formulae of NAF and its Left-to-Right Analogue}, howpublished = {Cryptology ePrint Archive, Report 2005/384}, year = {2005}, url = {http://eprint.iacr.org/2005/384}, } @misc{cryptoeprint:2005:385, author = {Giuseppe Ateniese and Jan Camenisch and Susan Hohenberger and Breno de Medeiros}, title = {Practical Group Signatures without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2005/385}, year = {2005}, url = {http://eprint.iacr.org/2005/385}, } @misc{cryptoeprint:2005:386, author = {Fangguo Zhang, Xiaofeng Chen, Willy Susilo and Yi Mu}, title = {A New Short Signature Scheme Without Random Oracles from Bilinear Pairings}, howpublished = {Cryptology ePrint Archive, Report 2005/386}, year = {2005}, url = {http://eprint.iacr.org/2005/386}, } @misc{cryptoeprint:2005:387, author = {C. Carlet}, title = {On highly nonlinear S-boxes and their inability to thwart DPA attacks (completed version)}, howpublished = {Cryptology ePrint Archive, Report 2005/387}, year = {2005}, url = {http://eprint.iacr.org/2005/387}, } @misc{cryptoeprint:2005:388, author = {YongBin Zhou and DengGuo Feng}, title = {Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing}, howpublished = {Cryptology ePrint Archive, Report 2005/388}, year = {2005}, url = {http://eprint.iacr.org/2005/388}, } @misc{cryptoeprint:2005:389, author = {KyungKeun Lee and JoongHyo Oh and SangJae Moon}, title = {How to Generate Universally Verifiable Signatures in Ad-Hoc Networks}, howpublished = {Cryptology ePrint Archive, Report 2005/389}, year = {2005}, url = {http://eprint.iacr.org/2005/389}, } @misc{cryptoeprint:2005:390, author = {Praveen Gauravaram and William Millan and Juanma Gonzalez Nieto and Edward Dawson}, title = {3C- A Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function}, howpublished = {Cryptology ePrint Archive, Report 2005/390}, year = {2005}, url = {http://eprint.iacr.org/2005/390}, } @misc{cryptoeprint:2005:391, author = {Praveen Gauravaram and William Millan and Juanma Gonzalez Nieto }, title = {Some thoughts on Collision Attacks in the Hash Functions MD5, SHA-0 and SHA-1}, howpublished = {Cryptology ePrint Archive, Report 2005/391}, year = {2005}, url = {http://eprint.iacr.org/2005/391}, } @misc{cryptoeprint:2005:392, author = {Sahadeo Padhye}, title = {An Efficient Variant of RSA Cryptosystem with Semantic Security}, howpublished = {Cryptology ePrint Archive, Report 2005/392}, year = {2005}, url = {http://eprint.iacr.org/2005/392}, } @misc{cryptoeprint:2005:393, author = {Christopher Wolf}, title = {Multivariate Quadratic Polynomials in Public Key Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2005/393}, year = {2005}, url = {http://eprint.iacr.org/2005/393}, } @misc{cryptoeprint:2005:394, author = {Ben Adida and Douglas Wikstr\"{o}m}, title = {How to Shuffle in Public}, howpublished = {Cryptology ePrint Archive, Report 2005/394}, year = {2005}, url = {http://eprint.iacr.org/2005/394}, } @misc{cryptoeprint:2005:395, author = {Jens-Matthias Bohli and Maria Isabel Gonzalez Vasco and Rainer Steinwandt}, title = {Secure Group Key Establishment Revisited}, howpublished = {Cryptology ePrint Archive, Report 2005/395}, year = {2005}, url = {http://eprint.iacr.org/2005/395}, } @misc{cryptoeprint:2005:396, author = {Pallavi Joshi and Debdeep Mukhopadhyay and Dipanwita RoyChowdhury}, title = {Design and Analysis of a Robust and Efficient Block Cipher using Cellular Automata}, howpublished = {Cryptology ePrint Archive, Report 2005/396}, year = {2005}, url = {http://eprint.iacr.org/2005/396}, } @misc{cryptoeprint:2005:397, author = {Neil Kauer and Tony Suarez and Yuliang Zheng}, title = {Enhancing the MD-Strengthening and Designing Scalable Families of One-Way Hash Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2005/397}, year = {2005}, url = {http://eprint.iacr.org/2005/397}, } @misc{cryptoeprint:2005:398, author = {IAIK Krypto Group}, title = {Preliminary Analysis of DHA-256}, howpublished = {Cryptology ePrint Archive, Report 2005/398}, year = {2005}, url = {http://eprint.iacr.org/2005/398}, } @misc{cryptoeprint:2005:399, author = {Yuriy Tarannikov}, title = {On affine rank of spectrum support for plateaued function}, howpublished = {Cryptology ePrint Archive, Report 2005/399}, year = {2005}, url = {http://eprint.iacr.org/2005/399}, } @misc{cryptoeprint:2005:400, author = {Yu Sasaki and Yusuke Naito and Noboru Kunihiro and Kazuo Ohta}, title = {Improved Collision Attack on MD5}, howpublished = {Cryptology ePrint Archive, Report 2005/400}, year = {2005}, url = {http://eprint.iacr.org/2005/400}, } @misc{cryptoeprint:2005:401, author = {Bruno Blanchet}, title = {A Computationally Sound Mechanized Prover for Security Protocols}, howpublished = {Cryptology ePrint Archive, Report 2005/401}, year = {2005}, url = {http://eprint.iacr.org/2005/401}, } @misc{cryptoeprint:2005:402, author = {Dong-Guk Han and Tsuyoshi Takagi }, title = {Some Analysis of Radix-r Representations}, howpublished = {Cryptology ePrint Archive, Report 2005/402}, year = {2005}, url = {http://eprint.iacr.org/2005/402}, } @misc{cryptoeprint:2005:403, author = {Scott Contini}, title = {Collisions in the Original Version of a Chaotic Hash Function}, howpublished = {Cryptology ePrint Archive, Report 2005/403}, year = {2005}, url = {http://eprint.iacr.org/2005/403}, } @misc{cryptoeprint:2005:404, author = {Gaurav S. Kc and Paul A. Karger}, title = {Preventing Attacks on Machine Readable Travel Documents (MRTDs)}, howpublished = {Cryptology ePrint Archive, Report 2005/404}, year = {2005}, url = {http://eprint.iacr.org/2005/404}, } @misc{cryptoeprint:2005:405, author = {Tor E. Bj{\o}rstad and Alexander W. Dent}, title = {Building Better Signcryption Schemes with Tag-KEMs}, howpublished = {Cryptology ePrint Archive, Report 2005/405}, year = {2005}, url = {http://eprint.iacr.org/2005/405}, } @misc{cryptoeprint:2005:406, author = {Dominique Unruh}, title = {Relations amount Statistical Security Notions - or - Why Exponential Adversaries are Unlimited}, howpublished = {Cryptology ePrint Archive, Report 2005/406}, year = {2005}, url = {http://eprint.iacr.org/2005/406}, } @misc{cryptoeprint:2005:407, author = {Guomin Yang and Duncan S. Wong and Xiaotie Deng and Huaxiong Wang}, title = {Anonymous Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2005/407}, year = {2005}, url = {http://eprint.iacr.org/2005/407}, } @misc{cryptoeprint:2005:408, author = {Sorin Iftene}, title = {Compartmented Secret Sharing Based on the Chinese Remainder Theorem}, howpublished = {Cryptology ePrint Archive, Report 2005/408}, year = {2005}, url = {http://eprint.iacr.org/2005/408}, } @misc{cryptoeprint:2005:409, author = {David Cash and Yan Zong Ding and Wenke Lee and Richard Lipton}, title = {Intrusion-Resilient Authentication in the Limited Communication Model}, howpublished = {Cryptology ePrint Archive, Report 2005/409}, year = {2005}, url = {http://eprint.iacr.org/2005/409}, } @misc{cryptoeprint:2005:410, author = {Victor K. Wei}, title = {Short (resp. Fast) CCA2-Fully-Anonymous Group Signatures using IND-CPA-Encrypted Escrows}, howpublished = {Cryptology ePrint Archive, Report 2005/410}, year = {2005}, url = {http://eprint.iacr.org/2005/410}, } @misc{cryptoeprint:2005:411, author = {Victor K. Wei}, title = {More Compact E-Cash with Efficient Coin Tracing}, howpublished = {Cryptology ePrint Archive, Report 2005/411}, year = {2005}, url = {http://eprint.iacr.org/2005/411}, } @misc{cryptoeprint:2005:412, author = {Tsz Hon Yuen and Victor K. Wei}, title = {Constant-Size Hierarchical Identity-Based Signature/Signcryption without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2005/412}, year = {2005}, url = {http://eprint.iacr.org/2005/412}, } @misc{cryptoeprint:2005:413, author = {Sean O'Neil and Benjamin Gittins and Howard A. Landman}, title = {VEST Hardware-Dedicated Stream Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2005/413}, year = {2005}, url = {http://eprint.iacr.org/2005/413}, } @misc{cryptoeprint:2005:414, author = {Sean O'Neil and Benjamin Gittins}, title = {Authenticated Encryption Mode of VEST Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2005/414}, year = {2005}, url = {http://eprint.iacr.org/2005/414}, } @misc{cryptoeprint:2005:415, author = {Benjamin Gittins and Howard A. Landman and Sean O'Neil and Ron Kelson}, title = {A Presentation on VEST Hardware Performance, Chip Area Measurements, Power Consumption Estimates and Benchmarking in Relation to the AES, SHA-256 and SHA-512}, howpublished = {Cryptology ePrint Archive, Report 2005/415}, year = {2005}, url = {http://eprint.iacr.org/2005/415}, } @misc{cryptoeprint:2005:416, author = {Kenneth G. Paterson and Arnold K.L. Yau}, title = {Cryptography in Theory and Practice: The Case of Encryption in IPsec}, howpublished = {Cryptology ePrint Archive, Report 2005/416}, year = {2005}, url = {http://eprint.iacr.org/2005/416}, } @misc{cryptoeprint:2005:417, author = {Lucas Ballard and Matthew Green and Breno de Medeiros and Fabian Monrose}, title = {Correlation-Resistant Storage via Keyword-Searchable Encryption}, howpublished = {Cryptology ePrint Archive, Report 2005/417}, year = {2005}, url = {http://eprint.iacr.org/2005/417}, } @misc{cryptoeprint:2005:418, author = {Chris Crutchfield and David Molnar and David Turner and David Wagner}, title = {Generic On-Line/Off-Line Threshold Signatures}, howpublished = {Cryptology ePrint Archive, Report 2005/418}, year = {2005}, url = {http://eprint.iacr.org/2005/418}, } @misc{cryptoeprint:2005:419, author = {Douglas Stebila and Nicolas Th\'eriault}, title = {Unified Point Addition Formul{\ae} and Side-Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2005/419}, year = {2005}, url = {http://eprint.iacr.org/2005/419}, } @misc{cryptoeprint:2005:420, author = {Christophe Doche and Thomas Icart and David R. Kohel}, title = {Efficient Scalar Multiplication by Isogeny Decompositions}, howpublished = {Cryptology ePrint Archive, Report 2005/420}, year = {2005}, url = {http://eprint.iacr.org/2005/420}, } @misc{cryptoeprint:2005:421, author = {Michael Backes and Birgit Pfitzmann and Andre Scedrov}, title = {Key-dependent Message Security under Active Attacks -- BRSIM/UC-Soundness of Symbolic Encryption with Key Cycles}, howpublished = {Cryptology ePrint Archive, Report 2005/421}, year = {2005}, url = {http://eprint.iacr.org/2005/421}, } @misc{cryptoeprint:2005:422, author = {Zhou Sujing and Lin Dongdai}, title = {On Anonymity of Group Signatures}, howpublished = {Cryptology ePrint Archive, Report 2005/422}, year = {2005}, url = {http://eprint.iacr.org/2005/422}, } @misc{cryptoeprint:2005:423, author = {Jin Li and Fangguo Zhang}, title = {ID-based signature and Key-insulated threshold signature}, howpublished = {Cryptology ePrint Archive, Report 2005/423}, year = {2005}, url = {http://eprint.iacr.org/2005/423}, } @misc{cryptoeprint:2005:424, author = {Sven Laur and N. Asokan and Kaisa Nyberg}, title = {Efficient Mutual Data Authentication Using Manually Authenticated Strings}, howpublished = {Cryptology ePrint Archive, Report 2005/424}, year = {2005}, url = {http://eprint.iacr.org/2005/424}, } @misc{cryptoeprint:2005:425, author = {Jie Liang and Xuejia Lai}, title = {Improved Collision Attack on Hash Function MD5}, howpublished = {Cryptology ePrint Archive, Report 2005/425}, year = {2005}, url = {http://eprint.iacr.org/2005/425}, } @misc{cryptoeprint:2005:426, author = {Zhenfeng Zhang and Dengguo Feng}, title = {On the Security of a Certificateless Public-Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2005/426}, year = {2005}, url = {http://eprint.iacr.org/2005/426}, } @misc{cryptoeprint:2005:427, author = {Joseph K. Liu and Duncan S. Wong}, title = {Solutions to Key Exposure Problem in Ring Signature}, howpublished = {Cryptology ePrint Archive, Report 2005/427}, year = {2005}, url = {http://eprint.iacr.org/2005/427}, } @misc{cryptoeprint:2005:428, author = {Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik and Ersin Uzun}, title = {Loud and Clear: Human-Verifiable Authentication Based on Audio}, howpublished = {Cryptology ePrint Archive, Report 2005/428}, year = {2005}, url = {http://eprint.iacr.org/2005/428}, } @misc{cryptoeprint:2005:429, author = {Victor K. Wei}, title = {Signature from a New Subgroup Assumption}, howpublished = {Cryptology ePrint Archive, Report 2005/429}, year = {2005}, url = {http://eprint.iacr.org/2005/429}, } @misc{cryptoeprint:2005:430, author = {Duo Lei}, title = {F-HASH: Securing Hash Functions Using Feistel Chaining}, howpublished = {Cryptology ePrint Archive, Report 2005/430}, year = {2005}, url = {http://eprint.iacr.org/2005/430}, } @misc{cryptoeprint:2005:431, author = {Bo Gyeong Kang and Je Hong Park}, title = {Is it possible to have CBE from CL-PKE?}, howpublished = {Cryptology ePrint Archive, Report 2005/431}, year = {2005}, url = {http://eprint.iacr.org/2005/431}, } @misc{cryptoeprint:2005:432, author = {Dieter Schmidt}, title = {On the Security of Kaweichel}, howpublished = {Cryptology ePrint Archive, Report 2005/432}, year = {2005}, url = {http://eprint.iacr.org/2005/432}, } @misc{cryptoeprint:2005:433, author = {Giuseppe Ateniese and Susan Hohenberger}, title = {Proxy Re-Signatures: New Definitions, Algorithms, and Applications}, howpublished = {Cryptology ePrint Archive, Report 2005/433}, year = {2005}, url = {http://eprint.iacr.org/2005/433}, } @misc{cryptoeprint:2005:434, author = {Daniel R. L. Brown}, title = {Prompted User Retrieval of Secret Entropy: The Passmaze Protocol}, howpublished = {Cryptology ePrint Archive, Report 2005/434}, year = {2005}, url = {http://eprint.iacr.org/2005/434}, } @misc{cryptoeprint:2005:435, author = {Aggelos Kiayias and Hong-Sheng Zhou}, title = {Concurrent Blind Signatures without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2005/435}, year = {2005}, url = {http://eprint.iacr.org/2005/435}, } @misc{cryptoeprint:2005:436, author = {Doreen Hertel}, title = {A Note on the Kasami Power Function}, howpublished = {Cryptology ePrint Archive, Report 2005/436}, year = {2005}, url = {http://eprint.iacr.org/2005/436}, } @misc{cryptoeprint:2005:437, author = {Enes Pasalic}, title = {On Boolean functions with maximum algebraic immunity}, howpublished = {Cryptology ePrint Archive, Report 2005/437}, year = {2005}, url = {http://eprint.iacr.org/2005/437}, } @misc{cryptoeprint:2005:438, author = {Yevgeniy Dodis}, title = {Minimal Assumptions for Efficient Mercurial Commitments}, howpublished = {Cryptology ePrint Archive, Report 2005/438}, year = {2005}, url = {http://eprint.iacr.org/2005/438}, } @misc{cryptoeprint:2005:439, author = {T. C. Lam}, title = {A note on the n-spendable extension of Ferguson's single-term off-line coins}, howpublished = {Cryptology ePrint Archive, Report 2005/439}, year = {2005}, url = {http://eprint.iacr.org/2005/439}, } @misc{cryptoeprint:2005:440, author = {Julien Bringer and Hervé Chabanne and Emmanuelle Dottax}, title = {HB++: a Lightweight Authentication Protocol Secure against Some Attacks}, howpublished = {Cryptology ePrint Archive, Report 2005/440}, year = {2005}, url = {http://eprint.iacr.org/2005/440}, } @misc{cryptoeprint:2005:441, author = {Mikhail Lobanov}, title = {Tight bound between nonlinearity and algebraic immunity}, howpublished = {Cryptology ePrint Archive, Report 2005/441}, year = {2005}, url = {http://eprint.iacr.org/2005/441}, } @misc{cryptoeprint:2005:442, author = {Dalit Naor and Amir Shenhav and Avishai Wool}, title = {One-Time Signatures Revisited: Have They Become Practical?}, howpublished = {Cryptology ePrint Archive, Report 2005/442}, year = {2005}, url = {http://eprint.iacr.org/2005/442}, } @misc{cryptoeprint:2005:443, author = {Duo Lei}, title = {Revised: Block Cipher Based Hash Function Construction From PGV}, howpublished = {Cryptology ePrint Archive, Report 2005/443}, year = {2005}, url = {http://eprint.iacr.org/2005/443}, } @misc{cryptoeprint:2005:444, author = {Sid Stamm and Markus Jakobsson}, title = {Privacy-Preserving Polling using Playing Cards}, howpublished = {Cryptology ePrint Archive, Report 2005/444}, year = {2005}, url = {http://eprint.iacr.org/2005/444}, } @misc{cryptoeprint:2005:445, author = {HE GE}, title = {An Anonymous Authentication Scheme for Trusted Computing Platform}, howpublished = {Cryptology ePrint Archive, Report 2005/445}, year = {2005}, url = {http://eprint.iacr.org/2005/445}, } @misc{cryptoeprint:2005:446, author = {Mark Manulis}, title = {Democratic Group Signatures on Example of Joint Ventures}, howpublished = {Cryptology ePrint Archive, Report 2005/446}, year = {2005}, url = {http://eprint.iacr.org/2005/446}, } @misc{cryptoeprint:2005:447, author = {Vladimir Shpilrain and Alexander Ushakov}, title = {A new key exchange protocol based on the decomposition problem}, howpublished = {Cryptology ePrint Archive, Report 2005/447}, year = {2005}, url = {http://eprint.iacr.org/2005/447}, } @misc{cryptoeprint:2005:448, author = {Souradyuti Paul and Bart Preneel}, title = {On the (In)security of Stream Ciphers Based on Arrays and Modular Addition (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2005/448}, year = {2005}, url = {http://eprint.iacr.org/2005/448}, } @misc{cryptoeprint:2005:449, author = {Longjiang Qu and Guozhu Feng and Chao Li}, title = {On the Boolean functions With Maximum Possible Algebraic Immunity : Construction and A Lower Bound of the Count}, howpublished = {Cryptology ePrint Archive, Report 2005/449}, year = {2005}, url = {http://eprint.iacr.org/2005/449}, } @misc{cryptoeprint:2005:450, author = {Jue-Sam Chou, Yalin Chen, Jyun-Yu Lin}, title = {Improvement of Manik et al.¡¦s remote user authentication scheme}, howpublished = {Cryptology ePrint Archive, Report 2005/450}, year = {2005}, url = {http://eprint.iacr.org/2005/450}, } @misc{cryptoeprint:2005:451, author = {Jue-Sam Chou and Yalin Chen and Ming-De Yang}, title = {Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols}, howpublished = {Cryptology ePrint Archive, Report 2005/451}, year = {2005}, url = {http://eprint.iacr.org/2005/451}, } @misc{cryptoeprint:2005:452, author = {Ran Canetti and Ling Cheung and Dilsun Kaynar and Moses Liskov and Nancy Lynch and Olivier Pereira and Roberto Segala}, title = {Using Probabilistic I/O Automata to Analyze an Oblivious Transfer Protocol}, howpublished = {Cryptology ePrint Archive, Report 2005/452}, year = {2005}, url = {http://eprint.iacr.org/2005/452}, } @misc{cryptoeprint:2005:453, author = {Pinhui Ke and Jie Zhang and Qiaoyan Wen}, title = {Further Constructions of Almost Resilient Functions}, howpublished = {Cryptology ePrint Archive, Report 2005/453}, year = {2005}, url = {http://eprint.iacr.org/2005/453}, } @misc{cryptoeprint:2005:454, author = {Keisuke Hakuta and Hisayoshi Sato and Tsuyoshi Takagi}, title = {Efficient Arithmetic on Subfield Elliptic Curves over Small Odd Characteristics}, howpublished = {Cryptology ePrint Archive, Report 2005/454}, year = {2005}, url = {http://eprint.iacr.org/2005/454}, } @misc{cryptoeprint:2005:455, author = {Robert W. Zhu and Xiaojian Tian and Duncan S. Wong}, title = {Enhancing CK-Model for Key Compromise Impersonation Resilience and Identity-based Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2005/455}, year = {2005}, url = {http://eprint.iacr.org/2005/455}, } @misc{cryptoeprint:2005:456, author = {Fuw-Yi Yang}, title = {A Secure Scheme for Authenticated Encryption}, howpublished = {Cryptology ePrint Archive, Report 2005/456}, year = {2005}, url = {http://eprint.iacr.org/2005/456}, } @misc{cryptoeprint:2005:457, author = {Jue-Sam Chou and Chu-Hsing Lin and Chia-Hung Chiu}, title = {Weakness of shim¡¦s New ID-based tripartite multiple-key agreement protocol}, howpublished = {Cryptology ePrint Archive, Report 2005/457}, year = {2005}, url = {http://eprint.iacr.org/2005/457}, } @misc{cryptoeprint:2005:458, author = {James A. Muir}, title = {Seifert's RSA Fault Attack: Simplified Analysis and Generalizations}, howpublished = {Cryptology ePrint Archive, Report 2005/458}, year = {2005}, url = {http://eprint.iacr.org/2005/458}, } @misc{cryptoeprint:2005:459, author = {Anja Groch and Dennis Hofheinz and Rainer Steinwandt}, title = {A Practical Attack on the Root Problem in Braid Groups}, howpublished = {Cryptology ePrint Archive, Report 2005/459}, year = {2005}, url = {http://eprint.iacr.org/2005/459}, } @misc{cryptoeprint:2005:460, author = {Tomas Rosa}, title = {One-Time HNP or Attacks on a Flawed El Gamal Revisited}, howpublished = {Cryptology ePrint Archive, Report 2005/460}, year = {2005}, url = {http://eprint.iacr.org/2005/460}, } @misc{cryptoeprint:2005:461, author = {Jonathan Katz and Ji Sun Shin}, title = {Parallel and Concurrent Security of the HB and HB+ Protocols}, howpublished = {Cryptology ePrint Archive, Report 2005/461}, year = {2005}, url = {http://eprint.iacr.org/2005/461}, } @misc{cryptoeprint:2005:462, author = {Martin Seysen}, title = {A Simplified Quadratic Frobenius Primality Test}, howpublished = {Cryptology ePrint Archive, Report 2005/462}, year = {2005}, url = {http://eprint.iacr.org/2005/462}, } @misc{cryptoeprint:2005:463, author = {Victor K. Wei and Tsz Hon Yuen}, title = {More short signatures without random oracles}, howpublished = {Cryptology ePrint Archive, Report 2005/463}, year = {2005}, url = {http://eprint.iacr.org/2005/463}, } @misc{cryptoeprint:2005:464, author = {Christopher Wolf and Bart Preneel}, title = {Equivalent Keys in Multivariate Quadratic Public Key Systems}, howpublished = {Cryptology ePrint Archive, Report 2005/464}, year = {2005}, url = {http://eprint.iacr.org/2005/464}, } @misc{cryptoeprint:2005:465, author = {S.G. Barwick and W.-A. Jackson}, title = {A sequence approach to constructing perfect hash families}, howpublished = {Cryptology ePrint Archive, Report 2005/465}, year = {2005}, url = {http://eprint.iacr.org/2005/465}, } @misc{cryptoeprint:2005:466, author = {Jue-Sam Chou and Ming-De Yang and Guey-Chuen Lee}, title = {Cryptanalysis of the Yang -Wang's password authentication schemes}, howpublished = {Cryptology ePrint Archive, Report 2005/466}, year = {2005}, url = {http://eprint.iacr.org/2005/466}, } @misc{cryptoeprint:2005:467, author = {Ricardo Corin and Jerry den Hartog}, title = {A Probabilistic Hoare-style logic for Game-based Cryptographic Proofs (Extended Version)}, howpublished = {Cryptology ePrint Archive, Report 2005/467}, year = {2005}, url = {http://eprint.iacr.org/2005/467}, } @misc{cryptoeprint:2005:468, author = {Vanessa Gratzer and David Naccache}, title = {Blind Attacks on Engineering Samples}, howpublished = {Cryptology ePrint Archive, Report 2005/468}, year = {2005}, url = {http://eprint.iacr.org/2005/468}, } @misc{cryptoeprint:2005:469, author = {C. Carlet}, title = {A lower bound on the higher order nonlinearity of algebraic immune functions}, howpublished = {Cryptology ePrint Archive, Report 2005/469}, year = {2005}, url = {http://eprint.iacr.org/2005/469}, } @misc{cryptoeprint:2006:001, author = {Doerte K. Rappe}, title = {Homomorphic Cryptosystems and their Applications}, howpublished = {Cryptology ePrint Archive, Report 2006/001}, year = {2006}, url = {http://eprint.iacr.org/2006/001}, } @misc{cryptoeprint:2006:002, author = {S.G. Barwick and W.-A. Jackson.}, title = {Geometric constructions of optimal linear perfect hash families}, howpublished = {Cryptology ePrint Archive, Report 2006/002}, year = {2006}, url = {http://eprint.iacr.org/2006/002}, } @misc{cryptoeprint:2006:003, author = {Dragos Trinca}, title = {Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2006/003}, year = {2006}, url = {http://eprint.iacr.org/2006/003}, } @misc{cryptoeprint:2006:004, author = {Lea Kissner and David Molnar}, title = {Provably Secure Subsitution of Cryptographic Tools}, howpublished = {Cryptology ePrint Archive, Report 2006/004}, year = {2006}, url = {http://eprint.iacr.org/2006/004}, } @misc{cryptoeprint:2006:005, author = {Colm O hEigeartaigh and Michael Scott}, title = {Pairing Calculation on Supersingular Genus 2 Curves}, howpublished = {Cryptology ePrint Archive, Report 2006/005}, year = {2006}, url = {http://eprint.iacr.org/2006/005}, } @misc{cryptoeprint:2006:006, author = {Lijun Liao}, title = {Group Key Agreement for Ad Hoc Networks}, howpublished = {Cryptology ePrint Archive, Report 2006/006}, year = {2006}, url = {http://eprint.iacr.org/2006/006}, } @misc{cryptoeprint:2006:007, author = {Lifeng Guo and Guilin Wang and Duncan S. Wong}, title = {Further Discussions on the Security of a Nominative Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2006/007}, year = {2006}, url = {http://eprint.iacr.org/2006/007}, } @misc{cryptoeprint:2006:008, author = {James A. Muir}, title = {A Simple Left-to-Right Algorithm for the Computation of the Arithmetic Weight of Integers}, howpublished = {Cryptology ePrint Archive, Report 2006/008}, year = {2006}, url = {http://eprint.iacr.org/2006/008}, } @misc{cryptoeprint:2006:009, author = {Iliano Cervesato and Aaron D. Jaggard and Andre Scedrov and Joe-Kay Tsay and Christopher Walstad}, title = {Breaking and Fixing Public-Key Kerberos}, howpublished = {Cryptology ePrint Archive, Report 2006/009}, year = {2006}, url = {http://eprint.iacr.org/2006/009}, } @misc{cryptoeprint:2006:010, author = {Steve Babbage and Matthew Dodd}, title = {Finding Characteristic Polynomials with Jump Indices}, howpublished = {Cryptology ePrint Archive, Report 2006/010}, year = {2006}, url = {http://eprint.iacr.org/2006/010}, } @misc{cryptoeprint:2006:011, author = {Christina Lindenberg and Kai Wirt and Johannes Buchmann}, title = {Formal Proof for the Correctness of RSA-PSS}, howpublished = {Cryptology ePrint Archive, Report 2006/011}, year = {2006}, url = {http://eprint.iacr.org/2006/011}, } @misc{cryptoeprint:2006:012, author = {Paz Morillo and Carla R`{a}fols}, title = {Certificate-Based Encryption Without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2006/012}, year = {2006}, url = {http://eprint.iacr.org/2006/012}, } @misc{cryptoeprint:2006:013, author = {Hung-Yu Chien}, title = {Comments on a Provably Secure Three-Party Password-Based Authenticated Key Exchange Protocol Using Weil Pairings}, howpublished = {Cryptology ePrint Archive, Report 2006/013}, year = {2006}, url = {http://eprint.iacr.org/2006/013}, } @misc{cryptoeprint:2006:014, author = {Flavio D. Garcia and Peter van Rossum}, title = {Sound Computational Interpretation of Formal Hashes}, howpublished = {Cryptology ePrint Archive, Report 2006/014}, year = {2006}, url = {http://eprint.iacr.org/2006/014}, } @misc{cryptoeprint:2006:015, author = {Gene Tsudik}, title = {A Family of Dunces: Trivial RFID Identification and Authentication Protocols}, howpublished = {Cryptology ePrint Archive, Report 2006/015}, year = {2006}, url = {http://eprint.iacr.org/2006/015}, } @misc{cryptoeprint:2006:016, author = {Yusuke Naito and Yu Sasaki and Takeshi Shimoyama and Jun Yajima and Noboru Kunihiro and Kazuo Ohta}, title = {Message Modification for Step 21-23 on SHA-0}, howpublished = {Cryptology ePrint Archive, Report 2006/016}, year = {2006}, url = {http://eprint.iacr.org/2006/016}, } @misc{cryptoeprint:2006:017, author = {Yevgeniy Dodis and Aleksandr Yampolskiy and Moti Yung}, title = {Threshold and Proactive Pseudo-Random Permutations}, howpublished = {Cryptology ePrint Archive, Report 2006/017}, year = {2006}, url = {http://eprint.iacr.org/2006/017}, } @misc{cryptoeprint:2006:018, author = {Deepak Kumar Dalai and Kishan Chand Gupta and Subhamoy Maitra}, title = {Notion of Algebraic Immunity and Its evaluation Related to Fast Algebraic Attacks}, howpublished = {Cryptology ePrint Archive, Report 2006/018}, year = {2006}, url = {http://eprint.iacr.org/2006/018}, } @misc{cryptoeprint:2006:019, author = {Ulrich Kaiser}, title = {Hermes8 : A Low-Complexity Low-Power Stream Cipher}, howpublished = {Cryptology ePrint Archive, Report 2006/019}, year = {2006}, url = {http://eprint.iacr.org/2006/019}, } @misc{cryptoeprint:2006:020, author = {Adam Smith}, title = {Scrambling Adversarial Errors Using Few Random Bits, Optimal Information Reconciliation, and Better Private Codes}, howpublished = {Cryptology ePrint Archive, Report 2006/020}, year = {2006}, url = {http://eprint.iacr.org/2006/020}, } @misc{cryptoeprint:2006:021, author = {Denis Charles and Eyal Goren and Kristin Lauter}, title = {Cryptographic hash functions from expander graphs}, howpublished = {Cryptology ePrint Archive, Report 2006/021}, year = {2006}, url = {http://eprint.iacr.org/2006/021}, } @misc{cryptoeprint:2006:023, author = {HE GE}, title = {A Method to Implement Direct Anonymous Attestation}, howpublished = {Cryptology ePrint Archive, Report 2006/023}, year = {2006}, url = {http://eprint.iacr.org/2006/023}, } @misc{cryptoeprint:2006:024, author = {George Danezis and Claudia Diaz}, title = {Improving the Decoding Efficiency of Private Search}, howpublished = {Cryptology ePrint Archive, Report 2006/024}, year = {2006}, url = {http://eprint.iacr.org/2006/024}, } @misc{cryptoeprint:2006:025, author = {Denis Charles and Kamal Jain and Kristin Lauter}, title = {Signatures for Network Coding}, howpublished = {Cryptology ePrint Archive, Report 2006/025}, year = {2006}, url = {http://eprint.iacr.org/2006/025}, } @misc{cryptoeprint:2006:026, author = {David Freeman}, title = {Constructing Pairing-Friendly Elliptic Curves with Embedding Degree 10}, howpublished = {Cryptology ePrint Archive, Report 2006/026}, year = {2006}, url = {http://eprint.iacr.org/2006/026}, } @misc{cryptoeprint:2006:027, author = {Vladimir Bayev}, title = {Finding Low Degree Annihilators for a Boolean Function Using Polynomial Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2006/027}, year = {2006}, url = {http://eprint.iacr.org/2006/027}, } @misc{cryptoeprint:2006:028, author = {Thulasi Goriparthi, Manik Lal Das, Atul Negi and Ashutosh Saxena}, title = {Cryptanalysis of recently proposed Remote User Authentication Schemes}, howpublished = {Cryptology ePrint Archive, Report 2006/028}, year = {2006}, url = {http://eprint.iacr.org/2006/028}, } @misc{cryptoeprint:2006:029, author = {Stéphanie Alt}, title = {Authenticated Hybrid Encryption for Multiple Recipients}, howpublished = {Cryptology ePrint Archive, Report 2006/029}, year = {2006}, url = {http://eprint.iacr.org/2006/029}, } @misc{cryptoeprint:2006:030, author = {Paul Crowley}, title = {Improved cryptanalysis of Py}, howpublished = {Cryptology ePrint Archive, Report 2006/030}, year = {2006}, url = {http://eprint.iacr.org/2006/030}, } @misc{cryptoeprint:2006:031, author = {Le Trieu Phong and Wakaha Ogata}, title = {On a Variation of Kurosawa-Desmedt Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2006/031}, year = {2006}, url = {http://eprint.iacr.org/2006/031}, } @misc{cryptoeprint:2006:032, author = {Deepak Kumar Dalai and Subhamoy Maitra}, title = {Reducing the Number of Homogeneous Linear Equations in Finding Annihilators}, howpublished = {Cryptology ePrint Archive, Report 2006/032}, year = {2006}, url = {http://eprint.iacr.org/2006/032}, } @misc{cryptoeprint:2006:033, author = {Isabelle Déchène}, title = {Arithmetic of Generalized Jacobians}, howpublished = {Cryptology ePrint Archive, Report 2006/033}, year = {2006}, url = {http://eprint.iacr.org/2006/033}, } @misc{cryptoeprint:2006:034, author = {Eike Kiltz and David Galindo}, title = {Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2006/034}, year = {2006}, url = {http://eprint.iacr.org/2006/034}, } @misc{cryptoeprint:2006:035, author = {Francisco Rodríguez-Henríquez and Guillermo Morales-Luna and Nazar A. Saqib and Nareli Cruz-Cortés}, title = {Parallel Itoh-Tsujii Multiplicative Inversion Algorithm for a Special Class of Trinomials}, howpublished = {Cryptology ePrint Archive, Report 2006/035}, year = {2006}, url = {http://eprint.iacr.org/2006/035}, } @misc{cryptoeprint:2006:036, author = {Sean O'Neil}, title = {Vector Stream Cipher Instant Key Recovery}, howpublished = {Cryptology ePrint Archive, Report 2006/036}, year = {2006}, url = {http://eprint.iacr.org/2006/036}, } @misc{cryptoeprint:2006:037, author = {Ted Krovetz}, title = {Message Authentication on 64-bit Architectures}, howpublished = {Cryptology ePrint Archive, Report 2006/037}, year = {2006}, url = {http://eprint.iacr.org/2006/037}, } @misc{cryptoeprint:2006:038, author = {Jintai Ding and Jason E. Gower and Dieter S. Schmidt}, title = {Zhuang-Zi: A New Algorithm for Solving Multivariate Polynomial Equations over a Finite Field}, howpublished = {Cryptology ePrint Archive, Report 2006/038}, year = {2006}, url = {http://eprint.iacr.org/2006/038}, } @misc{cryptoeprint:2006:039, author = {Joan Daemen and Vincent Rijmen}, title = {Two-Round AES Differentials}, howpublished = {Cryptology ePrint Archive, Report 2006/039}, year = {2006}, url = {http://eprint.iacr.org/2006/039}, } @misc{cryptoeprint:2006:040, author = {Mark Manulis and Ahmad-Reza Sadeghi and Joerg Schwenk}, title = {Linkable Democratic Group Signatures}, howpublished = {Cryptology ePrint Archive, Report 2006/040}, year = {2006}, url = {http://eprint.iacr.org/2006/040}, } @misc{cryptoeprint:2006:041, author = {Birgit Pfitzmann and Matthias Schunter and Michael Waidner}, title = {Reactively Simulatable Certified Mail}, howpublished = {Cryptology ePrint Archive, Report 2006/041}, year = {2006}, url = {http://eprint.iacr.org/2006/041}, } @misc{cryptoeprint:2006:042, author = {Sourav Mukhopadhyay and Palash Sarkar}, title = {Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2006/042}, year = {2006}, url = {http://eprint.iacr.org/2006/042}, } @misc{cryptoeprint:2006:043, author = {Mihir Bellare}, title = {New Proofs for NMAC and HMAC: Security Without Collision-Resistance}, howpublished = {Cryptology ePrint Archive, Report 2006/043}, year = {2006}, url = {http://eprint.iacr.org/2006/043}, } @misc{cryptoeprint:2006:044, author = {Ivan Damgard and Rune Thorbek}, title = {Linear Integer Secret Sharing and Distributed Exponentiation}, howpublished = {Cryptology ePrint Archive, Report 2006/044}, year = {2006}, url = {http://eprint.iacr.org/2006/044}, } @misc{cryptoeprint:2006:045, author = {Dan Boneh and Amit Sahai and Brent Waters}, title = {Fully Collusion Resistant Traitor Tracing}, howpublished = {Cryptology ePrint Archive, Report 2006/045}, year = {2006}, url = {http://eprint.iacr.org/2006/045}, } @misc{cryptoeprint:2006:046, author = {Shaoquan Jiang}, title = {Efficient Primitives from Exponentiation in Zp}, howpublished = {Cryptology ePrint Archive, Report 2006/046}, year = {2006}, url = {http://eprint.iacr.org/2006/046}, } @misc{cryptoeprint:2006:047, author = {Christoph Sprenger and Michael Backes and David Basin and Birgit Pfitzmann and Michael Waidner}, title = {Cryptographically Sound Theorem Proving}, howpublished = {Cryptology ePrint Archive, Report 2006/047}, year = {2006}, url = {http://eprint.iacr.org/2006/047}, } @misc{cryptoeprint:2006:048, author = {Javier Herranz and German Saez}, title = {New Results on Multipartite Access Structures}, howpublished = {Cryptology ePrint Archive, Report 2006/048}, year = {2006}, url = {http://eprint.iacr.org/2006/048}, } @misc{cryptoeprint:2006:049, author = {Joo Yeon Cho and Josef Pieprzyk}, title = {Crossword Puzzle Attack on NLS}, howpublished = {Cryptology ePrint Archive, Report 2006/049}, year = {2006}, url = {http://eprint.iacr.org/2006/049}, } @misc{cryptoeprint:2006:050, author = {Nitesh Saxena and Jan-Erik Ekberg and Kari Kostiainen and N. Asokan}, title = {Secure Device Pairing based on a Visual Channel}, howpublished = {Cryptology ePrint Archive, Report 2006/050}, year = {2006}, url = {http://eprint.iacr.org/2006/050}, } @misc{cryptoeprint:2006:051, author = {Shigeo Tsujii and Kohtaro Tadaki and Ryou Fujita}, title = {Proposal for Piece In Hand Matrix Ver.2: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2006/051}, year = {2006}, url = {http://eprint.iacr.org/2006/051}, } @misc{cryptoeprint:2006:052, author = {Ernie Brickell and Gary Graunke and Michael Neve and Jean-Pierre Seifert}, title = {Software mitigations to hedge AES against cache-based software side channel vulnerabilities}, howpublished = {Cryptology ePrint Archive, Report 2006/052}, year = {2006}, url = {http://eprint.iacr.org/2006/052}, } @misc{cryptoeprint:2006:053, author = {J. J. Climent and E. Gorla and J. Rosenthal}, title = {Cryptanalysis of the CFVZ cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2006/053}, year = {2006}, url = {http://eprint.iacr.org/2006/053}, } @misc{cryptoeprint:2006:054, author = {Ilan Kirschenbaum and Avishai Wool}, title = {How to Build a Low-Cost, Extended-Range RFID Skimmer}, howpublished = {Cryptology ePrint Archive, Report 2006/054}, year = {2006}, url = {http://eprint.iacr.org/2006/054}, } @misc{cryptoeprint:2006:055, author = {M. Nandi and D. R. Stinson}, title = {Multicollision Attacks on some Generalized Sequential Hash Functions }, howpublished = {Cryptology ePrint Archive, Report 2006/055}, year = {2006}, url = {http://eprint.iacr.org/2006/055}, } @misc{cryptoeprint:2006:056, author = {Anupam Datta and Ante Derek and John C. Mitchell and Bogdan Warinschi}, title = {Key Exchange Protocols: Security Definition, Proof Method and Applications}, howpublished = {Cryptology ePrint Archive, Report 2006/056}, year = {2006}, url = {http://eprint.iacr.org/2006/056}, } @misc{cryptoeprint:2006:057, author = {Vladimir Kolesnikov and Charles Rackoff}, title = {Key Exchange Using Passwords and Long Keys}, howpublished = {Cryptology ePrint Archive, Report 2006/057}, year = {2006}, url = {http://eprint.iacr.org/2006/057}, } @misc{cryptoeprint:2006:058, author = {Michael Backes and Sebastian Mödersheim and Birgit Pfitzmann and Luca Viganò}, title = {Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario}, howpublished = {Cryptology ePrint Archive, Report 2006/058}, year = {2006}, url = {http://eprint.iacr.org/2006/058}, } @misc{cryptoeprint:2006:059, author = {R. Granger and D. Page and N.P. Smart}, title = {High Security Pairing-Based Cryptography Revisited}, howpublished = {Cryptology ePrint Archive, Report 2006/059}, year = {2006}, url = {http://eprint.iacr.org/2006/059}, } @misc{cryptoeprint:2006:060, author = {Chunxiang Gu and Yuefei Zhu and Xiaoyu Pan}, title = {An Efficient ID-based Signature Scheme from Pairings}, howpublished = {Cryptology ePrint Archive, Report 2006/060}, year = {2006}, url = {http://eprint.iacr.org/2006/060}, } @misc{cryptoeprint:2006:061, author = {Praveen Gauravaram and William Millan and Ed Dawson and Kapali Viswanathan}, title = {}, howpublished = {Cryptology ePrint Archive, Report 2006/061}, year = {2006}, url = {http://eprint.iacr.org/2006/061}, } @misc{cryptoeprint:2006:062, author = {Debrup Chakraborty and Palash Sarkar}, title = {A New Mode of Encryption Secure Against Symmetric Nonce Respecting Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2006/062}, year = {2006}, url = {http://eprint.iacr.org/2006/062}, } @misc{cryptoeprint:2006:063, author = {Boris Ryabko and Daniil Ryabko}, title = {Provably Secure Universal Steganographic Systems}, howpublished = {Cryptology ePrint Archive, Report 2006/063}, year = {2006}, url = {http://eprint.iacr.org/2006/063}, } @misc{cryptoeprint:2006:064, author = {Julien Bringer and Hervé Chabanne and Emmanuelle Dottax}, title = {Perturbing and Protecting a Traceable Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2006/064}, year = {2006}, url = {http://eprint.iacr.org/2006/064}, } @misc{cryptoeprint:2006:065, author = {Jonathan Katz and Chiu-Yuen Koo}, title = {On Expected Constant-Round Protocols for Byzantine Agreement}, howpublished = {Cryptology ePrint Archive, Report 2006/065}, year = {2006}, url = {http://eprint.iacr.org/2006/065}, } @misc{cryptoeprint:2006:066, author = {John Solis and Gene Tsudik}, title = {Simple and Flexible Private Revocation Checking}, howpublished = {Cryptology ePrint Archive, Report 2006/066}, year = {2006}, url = {http://eprint.iacr.org/2006/066}, } @misc{cryptoeprint:2006:067, author = {Roberto Avanzi and Francesco Sica}, title = {Scalar Multiplication on Koblitz Curves using Double Bases}, howpublished = {Cryptology ePrint Archive, Report 2006/067}, year = {2006}, url = {http://eprint.iacr.org/2006/067}, } @misc{cryptoeprint:2006:068, author = {Michael Backes and Birgit Pfitzmann and Michael Waidner}, title = {Limits of the Reactive Simulatability/UC of Dolev-Yao Models with Hashes}, howpublished = {Cryptology ePrint Archive, Report 2006/068}, year = {2006}, url = {http://eprint.iacr.org/2006/068}, } @misc{cryptoeprint:2006:069, author = {Bruno Blanchet and David Pointcheval}, title = {Automated Security Proofs with Sequences of Games}, howpublished = {Cryptology ePrint Archive, Report 2006/069}, year = {2006}, url = {http://eprint.iacr.org/2006/069}, } @misc{cryptoeprint:2006:070, author = {Sergey Doroshenko and Boris Ryabko}, title = {The experimental distinguishing attack on RC4}, howpublished = {Cryptology ePrint Archive, Report 2006/070}, year = {2006}, url = {http://eprint.iacr.org/2006/070}, } @misc{cryptoeprint:2006:071, author = {Ueli Maurer and Johan Sjödin}, title = {A Fast and Key-Efficient Reduction of Chosen- Ciphertext to Known-Plaintext Security}, howpublished = {Cryptology ePrint Archive, Report 2006/071}, year = {2006}, url = {http://eprint.iacr.org/2006/071}, } @misc{cryptoeprint:2006:072, author = {Yaniv Shaked and Avishai Wool}, title = {Cryptanalysis of the Bluetooth E0 Cipher using OBDD's}, howpublished = {Cryptology ePrint Archive, Report 2006/072}, year = {2006}, url = {http://eprint.iacr.org/2006/072}, } @misc{cryptoeprint:2006:073, author = {Brian LaMacchia and Kristin Lauter and Anton Mityagin}, title = {Stronger Security of Authenticated Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2006/073}, year = {2006}, url = {http://eprint.iacr.org/2006/073}, } @misc{cryptoeprint:2006:074, author = {Yu Sasaki and Yusuke Naito and Jun Yajima and Takeshi Shimoyama and Noboru Kunihiro and Kazuo Ohta}, title = {How to Construct Sufficient Condition in Searching Collisions of MD5}, howpublished = {Cryptology ePrint Archive, Report 2006/074}, year = {2006}, url = {http://eprint.iacr.org/2006/074}, } @misc{cryptoeprint:2006:075, author = {TOMOHIRO HARAYAMA}, title = {ON THE WEIL SUM EVALUATION OF CENTRAL POLYNOMIAL IN MULTIVARIATE QUADRATIC CRYPTOSYSTEM}, howpublished = {Cryptology ePrint Archive, Report 2006/075}, year = {2006}, url = {http://eprint.iacr.org/2006/075}, } @misc{cryptoeprint:2006:076, author = {Amitabh Saxena and Ben Soh}, title = {A Cryptosystem Based on Hidden Order Groups and Its Applications in Highly Dynamic Group Key Agreement}, howpublished = {Cryptology ePrint Archive, Report 2006/076}, year = {2006}, url = {http://eprint.iacr.org/2006/076}, } @misc{cryptoeprint:2006:077, author = {Jaume Marti-Farre and Carles Padro}, title = {On Secret Sharing Schemes, Matroids and Polymatroids}, howpublished = {Cryptology ePrint Archive, Report 2006/077}, year = {2006}, url = {http://eprint.iacr.org/2006/077}, } @misc{cryptoeprint:2006:078, author = {Yevgeniy Dodis and Prashant Puniya}, title = {Verifiable Random Permutations}, howpublished = {Cryptology ePrint Archive, Report 2006/078}, year = {2006}, url = {http://eprint.iacr.org/2006/078}, } @misc{cryptoeprint:2006:079, author = {Jens-Matthias Bohli and Benjamin Glas and Rainer Steinwandt}, title = {Towards Provably Secure Group Key Agreement Building on Group Theory}, howpublished = {Cryptology ePrint Archive, Report 2006/079}, year = {2006}, url = {http://eprint.iacr.org/2006/079}, } @misc{cryptoeprint:2006:080, author = {Kenneth G. Paterson and Jacob C. N. Schuldt}, title = {Efficient Identity-based Signatures Secure in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2006/080}, year = {2006}, url = {http://eprint.iacr.org/2006/080}, } @misc{cryptoeprint:2006:081, author = {David Molnar and Tadayoshi Kohno and Naveen Sastry and David Wagner}, title = {Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine}, howpublished = {Cryptology ePrint Archive, Report 2006/081}, year = {2006}, url = {http://eprint.iacr.org/2006/081}, } @misc{cryptoeprint:2006:082, author = {HariGovind V. Ramasamy and Christian Cachin}, title = {Parsimonious Asynchronous Byzantine-Fault-Tolerant Atomic Broadcast}, howpublished = {Cryptology ePrint Archive, Report 2006/082}, year = {2006}, url = {http://eprint.iacr.org/2006/082}, } @misc{cryptoeprint:2006:083, author = {Amir Herzberg}, title = {Browsers Defenses Against Phishing, Spoofing and Malware}, howpublished = {Cryptology ePrint Archive, Report 2006/083}, year = {2006}, url = {http://eprint.iacr.org/2006/083}, } @misc{cryptoeprint:2006:084, author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai}, title = {Cryptography from Anonymity}, howpublished = {Cryptology ePrint Archive, Report 2006/084}, year = {2006}, url = {http://eprint.iacr.org/2006/084}, } @misc{cryptoeprint:2006:085, author = {Xavier Boyen and Brent Waters}, title = {Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)}, howpublished = {Cryptology ePrint Archive, Report 2006/085}, year = {2006}, url = {http://eprint.iacr.org/2006/085}, } @misc{cryptoeprint:2006:086, author = {Zvi Gutterman and Benny Pinkas and Tzachy Reinman}, title = {Analysis of the Linux Random Number Generator}, howpublished = {Cryptology ePrint Archive, Report 2006/086}, year = {2006}, url = {http://eprint.iacr.org/2006/086}, } @misc{cryptoeprint:2006:087, author = {Barath Raghavan and Saurabh Panjwani and Anton Mityagin}, title = {Analysis of the SPV Secure Routing Protocol: Weaknesses and Lessons}, howpublished = {Cryptology ePrint Archive, Report 2006/087}, year = {2006}, url = {http://eprint.iacr.org/2006/087}, } @misc{cryptoeprint:2006:088, author = {Sven Laur and Helger Lipmaa}, title = {Consistent Adaptive Two-Party Computations}, howpublished = {Cryptology ePrint Archive, Report 2006/088}, year = {2006}, url = {http://eprint.iacr.org/2006/088}, } @misc{cryptoeprint:2006:089, author = {Goce Jakimoski and Yvo Desmedt}, title = {A Tree-based Model of Unicast Stream Authentication}, howpublished = {Cryptology ePrint Archive, Report 2006/089}, year = {2006}, url = {http://eprint.iacr.org/2006/089}, } @misc{cryptoeprint:2006:090, author = {Ee-Chien Chang and Vadym Fedyukovych and Qiming Li}, title = {Secure Sketch for Multi-Sets}, howpublished = {Cryptology ePrint Archive, Report 2006/090}, year = {2006}, url = {http://eprint.iacr.org/2006/090}, } @misc{cryptoeprint:2006:091, author = {Moni Naor and Guy Rothblum}, title = {The Complexity of Online Memory Checking}, howpublished = {Cryptology ePrint Archive, Report 2006/091}, year = {2006}, url = {http://eprint.iacr.org/2006/091}, } @misc{cryptoeprint:2006:092, author = {Abderrahmane Nitaj}, title = {Cryptanalysis of RSA with constrained keys}, howpublished = {Cryptology ePrint Archive, Report 2006/092}, year = {2006}, url = {http://eprint.iacr.org/2006/092}, } @misc{cryptoeprint:2006:093, author = {Abderrahmane Nitaj}, title = {RSA and a higher degree diophantine equation}, howpublished = {Cryptology ePrint Archive, Report 2006/093}, year = {2006}, url = {http://eprint.iacr.org/2006/093}, } @misc{cryptoeprint:2006:094, author = {Peng Wang and Dengguo Feng and Wenling Wu}, title = {Cryptanalysis of the MEM Mode of Operation}, howpublished = {Cryptology ePrint Archive, Report 2006/094}, year = {2006}, url = {http://eprint.iacr.org/2006/094}, } @misc{cryptoeprint:2006:095, author = {John Black and Martin Cochran}, title = {MAC Reforgeability}, howpublished = {Cryptology ePrint Archive, Report 2006/095}, year = {2006}, url = {http://eprint.iacr.org/2006/095}, } @misc{cryptoeprint:2006:096, author = {Steve Lu and Rafail Ostrovsky and Amit Sahai and Hovav Shacham and Brent Waters}, title = {Sequential Aggregate Signatures and Multisignatures without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2006/096}, year = {2006}, url = {http://eprint.iacr.org/2006/096}, } @misc{cryptoeprint:2006:097, author = {Kenneth G. Paterson}, title = {A Cryptographic Tour of the IPsec Standards}, howpublished = {Cryptology ePrint Archive, Report 2006/097}, year = {2006}, url = {http://eprint.iacr.org/2006/097}, } @misc{cryptoeprint:2006:098, author = {Makoto Sugita, Mitsuru Kawazoe, Hideki Imai}, title = {Gr\"obner Basis Based Cryptanalysis of SHA-1}, howpublished = {Cryptology ePrint Archive, Report 2006/098}, year = {2006}, url = {http://eprint.iacr.org/2006/098}, } @misc{cryptoeprint:2006:099, author = {Dongvu Tonien and Reihaneh Safavi-Naini}, title = {An Efficient Single-Key Pirates Tracing Scheme Using Cover-Free Families}, howpublished = {Cryptology ePrint Archive, Report 2006/099}, year = {2006}, url = {http://eprint.iacr.org/2006/099}, } @misc{cryptoeprint:2006:100, author = {Zhou Sujing, Lin Dongdai}, title = {A Shorter Group Signature with Verifier-Location Revocation and Backward Unlinkability}, howpublished = {Cryptology ePrint Archive, Report 2006/100}, year = {2006}, url = {http://eprint.iacr.org/2006/100}, } @misc{cryptoeprint:2006:101, author = {B. Skoric and S. Maubach and T. Kevenaar and P. Tuyls}, title = {Information-theoretic analysis of coating PUFs}, howpublished = {Cryptology ePrint Archive, Report 2006/101}, year = {2006}, url = {http://eprint.iacr.org/2006/101}, } @misc{cryptoeprint:2006:102, author = {Tatsuaki Okamoto}, title = {Efficient Blind and Partially Blind Signatures Without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2006/102}, year = {2006}, url = {http://eprint.iacr.org/2006/102}, } @misc{cryptoeprint:2006:103, author = {Markku-Juhani O. Saarinen}, title = {Security of VSH in the Real World}, howpublished = {Cryptology ePrint Archive, Report 2006/103}, year = {2006}, url = {http://eprint.iacr.org/2006/103}, } @misc{cryptoeprint:2006:104, author = {Marc Stevens}, title = {Fast Collision Attack on MD5}, howpublished = {Cryptology ePrint Archive, Report 2006/104}, year = {2006}, url = {http://eprint.iacr.org/2006/104}, } @misc{cryptoeprint:2006:105, author = {Vlastimil Klima}, title = {Tunnels in Hash Functions: MD5 Collisions Within a Minute}, howpublished = {Cryptology ePrint Archive, Report 2006/105}, year = {2006}, url = {http://eprint.iacr.org/2006/105}, } @misc{cryptoeprint:2006:106, author = {Chao-Liang Liu and Gwoboa Horng and Te-Yu Chen}, title = {Further Refinement of Pairing Computation Based on Miller's Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2006/106}, year = {2006}, url = {http://eprint.iacr.org/2006/106}, } @misc{cryptoeprint:2006:107, author = {Oliver Schirokauer}, title = {The number field sieve for integers of low weight}, howpublished = {Cryptology ePrint Archive, Report 2006/107}, year = {2006}, url = {http://eprint.iacr.org/2006/107}, } @misc{cryptoeprint:2006:108, author = {Chunxiang Gu and Yuefei Zhu and Yajuan Zhang}, title = {Efficient Public Key Encryption with Keyword Search Schemes from Pairings}, howpublished = {Cryptology ePrint Archive, Report 2006/108}, year = {2006}, url = {http://eprint.iacr.org/2006/108}, } @misc{cryptoeprint:2006:109, author = {Willi Geiselmann and Fabian Januszewski and Hubert Koepfer and Jan Pelzl and Rainer Steinwandt}, title = {A Simpler Sieving Device: Combining ECM and TWIRL}, howpublished = {Cryptology ePrint Archive, Report 2006/109}, year = {2006}, url = {http://eprint.iacr.org/2006/109}, } @misc{cryptoeprint:2006:110, author = {F. Hess and N.P. Smart and F. Vercauteren}, title = {The Eta Pairing Revisited}, howpublished = {Cryptology ePrint Archive, Report 2006/110}, year = {2006}, url = {http://eprint.iacr.org/2006/110}, } @misc{cryptoeprint:2006:111, author = {Martin Stanek}, title = {Attacking LCCC Batch Verification of RSA Signatures}, howpublished = {Cryptology ePrint Archive, Report 2006/111}, year = {2006}, url = {http://eprint.iacr.org/2006/111}, } @misc{cryptoeprint:2006:112, author = {Markus Volkmer}, title = {Entity Authentication and Authenticated Key Exchange with Tree Parity Machines}, howpublished = {Cryptology ePrint Archive, Report 2006/112}, year = {2006}, url = {http://eprint.iacr.org/2006/112}, } @misc{cryptoeprint:2006:113, author = {Miaomiao Zhang and Gongliang Chen and Jianhua Li and Licheng Wang and Haifeng Qian}, title = {A New Construction of Time Capsule Signature}, howpublished = {Cryptology ePrint Archive, Report 2006/113}, year = {2006}, url = {http://eprint.iacr.org/2006/113}, } @misc{cryptoeprint:2006:114, author = {Ryuichi Harasawa and Yutaka Sueyoshi and Aichi Kudo}, title = {Tate pairing for $y^{2}=x^{5}-\alpha x$ in Characteristic Five}, howpublished = {Cryptology ePrint Archive, Report 2006/114}, year = {2006}, url = {http://eprint.iacr.org/2006/114}, } @misc{cryptoeprint:2006:115, author = {Alexander Rostovtsev}, title = {Fast exponentiation via prime finite field isomorphism}, howpublished = {Cryptology ePrint Archive, Report 2006/115}, year = {2006}, url = {http://eprint.iacr.org/2006/115}, } @misc{cryptoeprint:2006:116, author = {Mario Lamberger and Norbert Pramstaller and Vincent Rijmen}, title = {Second Preimages for Iterated Hash Functions Based on a b-Block Bypass}, howpublished = {Cryptology ePrint Archive, Report 2006/116}, year = {2006}, url = {http://eprint.iacr.org/2006/116}, } @misc{cryptoeprint:2006:117, author = {Daniel R. L. Brown}, title = {Conjectured Security of the ANSI-NIST Elliptic Curve RNG}, howpublished = {Cryptology ePrint Archive, Report 2006/117}, year = {2006}, url = {http://eprint.iacr.org/2006/117}, } @misc{cryptoeprint:2006:118, author = {Sugata Gangopadhyay and Deepmala Sharma}, title = {On construction of non-normal Boolean functions}, howpublished = {Cryptology ePrint Archive, Report 2006/118}, year = {2006}, url = {http://eprint.iacr.org/2006/118}, } @misc{cryptoeprint:2006:119, author = {Ratna Dutta and Rana Barua}, title = {Repairing Attacks on a Password-Based Group Key Agreement }, howpublished = {Cryptology ePrint Archive, Report 2006/119}, year = {2006}, url = {http://eprint.iacr.org/2006/119}, } @misc{cryptoeprint:2006:120, author = {Jason E. Holt}, title = {Key Privacy for Identity Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2006/120}, year = {2006}, url = {http://eprint.iacr.org/2006/120}, } @misc{cryptoeprint:2006:121, author = {Jos\'e de Jes\'us Angel Angel and Guillermo Morales-Luna}, title = {Counting Prime Numbers with Short Binary Signed Representation}, howpublished = {Cryptology ePrint Archive, Report 2006/121}, year = {2006}, url = {http://eprint.iacr.org/2006/121}, } @misc{cryptoeprint:2006:122, author = {Eike Kiltz}, title = {Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts}, howpublished = {Cryptology ePrint Archive, Report 2006/122}, year = {2006}, url = {http://eprint.iacr.org/2006/122}, } @misc{cryptoeprint:2006:123, author = {Douglas Wikström}, title = {Designated Confirmer Signatures Revisited}, howpublished = {Cryptology ePrint Archive, Report 2006/123}, year = {2006}, url = {http://eprint.iacr.org/2006/123}, } @misc{cryptoeprint:2006:124, author = {K.W. Wong and Edward C.W. Lee and L.M. Cheng and Xiaofeng Liao}, title = {Fast Elliptic Scalar Multiplication using New Double-base Chain and Point Halving}, howpublished = {Cryptology ePrint Archive, Report 2006/124}, year = {2006}, url = {http://eprint.iacr.org/2006/124}, } @misc{cryptoeprint:2006:125, author = {Eunjeong Lee and Hyang-Sook Lee and Yoonjin Lee}, title = {Fast computation of Tate pairing on general divisors of genus 3 hyperelliptic curves}, howpublished = {Cryptology ePrint Archive, Report 2006/125}, year = {2006}, url = {http://eprint.iacr.org/2006/125}, } @misc{cryptoeprint:2006:126, author = {Yiliang Han and Xiaoyuan Yang}, title = {ECGSC: Elliptic Curve based Generalized Signcryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2006/126}, year = {2006}, url = {http://eprint.iacr.org/2006/126}, } @misc{cryptoeprint:2006:127, author = {Sourav Mukhopadhyay and Palash Sarkar}, title = {A New Cryptanalytic Time/Memory/Data Trade-off Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2006/127}, year = {2006}, url = {http://eprint.iacr.org/2006/127}, } @misc{cryptoeprint:2006:128, author = {Denis Charles}, title = {On the existence of distortion maps on ordinary elliptic curves}, howpublished = {Cryptology ePrint Archive, Report 2006/128}, year = {2006}, url = {http://eprint.iacr.org/2006/128}, } @misc{cryptoeprint:2006:129, author = {Wei Han and Dong Zheng and Ke-fei Chen}, title = {Some Remarks on the TKIP Key Mixing Function of IEEE 802.11i}, howpublished = {Cryptology ePrint Archive, Report 2006/129}, year = {2006}, url = {http://eprint.iacr.org/2006/129}, } @misc{cryptoeprint:2006:130, author = {Dennis Hofheinz and Dominique Unruh}, title = {Simulatable Security and Polynomially Bounded Concurrent Composition}, howpublished = {Cryptology ePrint Archive, Report 2006/130}, year = {2006}, url = {http://eprint.iacr.org/2006/130}, } @misc{cryptoeprint:2006:131, author = {Mike Burmester and Tri van Le and Breno de Medeiros}, title = {Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols}, howpublished = {Cryptology ePrint Archive, Report 2006/131}, year = {2006}, url = {http://eprint.iacr.org/2006/131}, } @misc{cryptoeprint:2006:132, author = {Michael Backes and Markus Duermuth and Dennis Hofheinz and Ralf Kuesters}, title = {Conditional Reactive Simulatability}, howpublished = {Cryptology ePrint Archive, Report 2006/132}, year = {2006}, url = {http://eprint.iacr.org/2006/132}, } @misc{cryptoeprint:2006:133, author = {Francisco Rodr\'{i}guez-Henr\'{i}quez and Guillermo Morales-Luna and Julio L\'{o}pez-Hern\'{a}ndez}, title = {Low Complexity Bit-Parallel Square Root Computation over GF($2^m$) for all Trinomials }, howpublished = {Cryptology ePrint Archive, Report 2006/133}, year = {2006}, url = {http://eprint.iacr.org/2006/133}, } @misc{cryptoeprint:2006:134, author = {K. Phani Kumar and G. Shailaja and Ashutosh Saxena}, title = {Identity Based Strong Designated Verifier Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2006/134}, year = {2006}, url = {http://eprint.iacr.org/2006/134}, } @misc{cryptoeprint:2006:135, author = {Duo Lei, Da Lin2, Li Chao, Keqin Feng, and Longjiang Qu}, title = {The Design Principle of Hash Function with Merkle-Damg{\aa}rd Construction}, howpublished = {Cryptology ePrint Archive, Report 2006/135}, year = {2006}, url = {http://eprint.iacr.org/2006/135}, } @misc{cryptoeprint:2006:136, author = {Gregory V. Bard}, title = {A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL}, howpublished = {Cryptology ePrint Archive, Report 2006/136}, year = {2006}, url = {http://eprint.iacr.org/2006/136}, } @misc{cryptoeprint:2006:137, author = {Ari Juels and Stephen A. Weis}, title = {Defining Strong Privacy for RFID}, howpublished = {Cryptology ePrint Archive, Report 2006/137}, year = {2006}, url = {http://eprint.iacr.org/2006/137}, } @misc{cryptoeprint:2006:138, author = {Onur Ac\i{}i\c{c}mez and \c{C}etin Kaya Ko\c{c}}, title = {Trace-Driven Cache Attacks on AES}, howpublished = {Cryptology ePrint Archive, Report 2006/138}, year = {2006}, url = {http://eprint.iacr.org/2006/138}, } @misc{cryptoeprint:2006:139, author = {Francois-Xavier Standaert and Tal G. Malkin and Moti Yung}, title = {A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks}, howpublished = {Cryptology ePrint Archive, Report 2006/139}, year = {2006}, url = {http://eprint.iacr.org/2006/139}, } @misc{cryptoeprint:2006:140, author = {Jiejun Kong}, title = {GVG-RP: A Net-centric Negligibility-based Security Model for Self-organizing Networks}, howpublished = {Cryptology ePrint Archive, Report 2006/140}, year = {2006}, url = {http://eprint.iacr.org/2006/140}, } @misc{cryptoeprint:2006:141, author = {Shahram Khazaei and Mahdi M. Hasanzadeh and Mohammad S. Kiaei}, title = {Linear Sequential Circuit Approximation of Grain and Trivium Stream Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2006/141}, year = {2006}, url = {http://eprint.iacr.org/2006/141}, } @misc{cryptoeprint:2006:142, author = {S. Dov Gordon and Jonathan Katz}, title = {Rational Secret Sharing, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2006/142}, year = {2006}, url = {http://eprint.iacr.org/2006/142}, } @misc{cryptoeprint:2006:143, author = {Guillaume Fumaroli and David Vigilant}, title = {Blinded Fault Resistant Exponentiation}, howpublished = {Cryptology ePrint Archive, Report 2006/143}, year = {2006}, url = {http://eprint.iacr.org/2006/143}, } @misc{cryptoeprint:2006:144, author = {Michael Scott and Neil Costigan and Wesam Abdulwahab}, title = {Implementing Cryptographic Pairings on Smartcards}, howpublished = {Cryptology ePrint Archive, Report 2006/144}, year = {2006}, url = {http://eprint.iacr.org/2006/144}, } @misc{cryptoeprint:2006:145, author = {Alexander Rostovtsev and Anton Stolbunov}, title = {PUBLIC-KEY CRYPTOSYSTEM BASED ON ISOGENIES}, howpublished = {Cryptology ePrint Archive, Report 2006/145}, year = {2006}, url = {http://eprint.iacr.org/2006/145}, } @misc{cryptoeprint:2006:146, author = {Flavio D. Garcia and Peter van Rossum}, title = {Completeness of Formal Hashes in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2006/146}, year = {2006}, url = {http://eprint.iacr.org/2006/146}, } @misc{cryptoeprint:2006:147, author = {Duo Lei}, title = {New Integrated proof Method on Iterated Hash Structure and New Structures}, howpublished = {Cryptology ePrint Archive, Report 2006/147}, year = {2006}, url = {http://eprint.iacr.org/2006/147}, } @misc{cryptoeprint:2006:148, author = {Akinori Kawachi and Takeshi Koshiba and Harumichi Nishimura and Tomoyuki Yamakami}, title = {Computational Indistinguishability between Quantum States and Its Cryptographic Application}, howpublished = {Cryptology ePrint Archive, Report 2006/148}, year = {2006}, url = {http://eprint.iacr.org/2006/148}, } @misc{cryptoeprint:2006:149, author = {C. Carlet}, title = {A method of construction of balanced functions with optimum algebraic immunity}, howpublished = {Cryptology ePrint Archive, Report 2006/149}, year = {2006}, url = {http://eprint.iacr.org/2006/149}, } @misc{cryptoeprint:2006:150, author = {D\'ecio Luiz Gazzoni Filho and Paulo S\'ergio Licciardi Messeder Barreto}, title = {Demonstrating data possession and uncheatable data transfer}, howpublished = {Cryptology ePrint Archive, Report 2006/150}, year = {2006}, url = {http://eprint.iacr.org/2006/150}, } @misc{cryptoeprint:2006:151, author = {Ralf Kuesters}, title = {Simulation-Based Security with Inexhaustible Interactive Turing Machines}, howpublished = {Cryptology ePrint Archive, Report 2006/151}, year = {2006}, url = {http://eprint.iacr.org/2006/151}, } @misc{cryptoeprint:2006:152, author = {G. Shailaja and K. Phani Kumar and Ashutosh Saxena}, title = {Pairing based Mutual Authentication Scheme Using Smart Cards}, howpublished = {Cryptology ePrint Archive, Report 2006/152}, year = {2006}, url = {http://eprint.iacr.org/2006/152}, } @misc{cryptoeprint:2006:153, author = {Anupam Datta and Ralf Kuesters and John C. Mitchell and Ajith Ramanathan}, title = {On the Relationships Between Notions of Simulation-Based Security}, howpublished = {Cryptology ePrint Archive, Report 2006/153}, year = {2006}, url = {http://eprint.iacr.org/2006/153}, } @misc{cryptoeprint:2006:154, author = {Xiaolei Dong and Licheng Wang and Zhenfu Cao}, title = {New Public Key Authentication Frameworks with Lite Certification Authority}, howpublished = {Cryptology ePrint Archive, Report 2006/154}, year = {2006}, url = {http://eprint.iacr.org/2006/154}, } @misc{cryptoeprint:2006:155, author = {Rosario Gennaro and Silvio Micali}, title = {Independent Zero-Knowledge Sets}, howpublished = {Cryptology ePrint Archive, Report 2006/155}, year = {2006}, url = {http://eprint.iacr.org/2006/155}, } @misc{cryptoeprint:2006:156, author = {Alexander W. Dent}, title = {The Hardness of the DHK Problem in the Generic Group Model}, howpublished = {Cryptology ePrint Archive, Report 2006/156}, year = {2006}, url = {http://eprint.iacr.org/2006/156}, } @misc{cryptoeprint:2006:157, author = {Timothy Atkinson and Marius C. Silaghi}, title = {An efficient way to access an array at a secret index}, howpublished = {Cryptology ePrint Archive, Report 2006/157}, year = {2006}, url = {http://eprint.iacr.org/2006/157}, } @misc{cryptoeprint:2006:158, author = {Chunxiang Gu and Yuefei Zhu}, title = {An Efficient ID-based Proxy Signature Scheme from Pairings}, howpublished = {Cryptology ePrint Archive, Report 2006/158}, year = {2006}, url = {http://eprint.iacr.org/2006/158}, } @misc{cryptoeprint:2006:159, author = {Joonsang Baek and Guilin Wang}, title = {Repairing a Security-Mediated Certificateless Encryption Scheme from PKC 2006}, howpublished = {Cryptology ePrint Archive, Report 2006/159}, year = {2006}, url = {http://eprint.iacr.org/2006/159}, } @misc{cryptoeprint:2006:160, author = {L. Chen and Z. Cheng and N.P. Smart}, title = {A Built-in Decisional Function and Security Proof of ID-based Key Agreement Protocols from Pairings}, howpublished = {Cryptology ePrint Archive, Report 2006/160}, year = {2006}, url = {http://eprint.iacr.org/2006/160}, } @misc{cryptoeprint:2006:161, author = {Zhangyi Wang and Huanguo Zhang and Zhongping Qin and Qingshu Meng}, title = {Cryptanalysis of 4-Pass HAVAL}, howpublished = {Cryptology ePrint Archive, Report 2006/161}, year = {2006}, url = {http://eprint.iacr.org/2006/161}, } @misc{cryptoeprint:2006:162, author = {D. Engelbert, R. Overbeck and A. Schmidt}, title = {A Summary of McEliece-Type Cryptosystems and their Security}, howpublished = {Cryptology ePrint Archive, Report 2006/162}, year = {2006}, url = {http://eprint.iacr.org/2006/162}, } @misc{cryptoeprint:2006:163, author = {Gregory V. Bard}, title = {Achieving a log(n) Speed Up for Boolean Matrix Operations and Calculating the Complexity of the Dense Linear Algebra step of Algebraic Stream Cipher Attacks and of Integer Factorization Methods}, howpublished = {Cryptology ePrint Archive, Report 2006/163}, year = {2006}, url = {http://eprint.iacr.org/2006/163}, } @misc{cryptoeprint:2006:164, author = {Zhengjun Cao}, title = {Classification of Signature-only Signature Models}, howpublished = {Cryptology ePrint Archive, Report 2006/164}, year = {2006}, url = {http://eprint.iacr.org/2006/164}, } @misc{cryptoeprint:2006:165, author = {S.D. Galbraith and K.G. Paterson and N.P. Smart}, title = {Pairings for Cryptographers}, howpublished = {Cryptology ePrint Archive, Report 2006/165}, year = {2006}, url = {http://eprint.iacr.org/2006/165}, } @misc{cryptoeprint:2006:166, author = {Sorin Iftene}, title = {General Secret Sharing Based on the Chinese Remainder Theorem}, howpublished = {Cryptology ePrint Archive, Report 2006/166}, year = {2006}, url = {http://eprint.iacr.org/2006/166}, } @misc{cryptoeprint:2006:167, author = {Yunho Lee and Kwangwoo Lee and Seungjoo Kim and Dongho Won}, title = {Towards Trustworthy e-Voting using Paper Receipts}, howpublished = {Cryptology ePrint Archive, Report 2006/167}, year = {2006}, url = {http://eprint.iacr.org/2006/167}, } @misc{cryptoeprint:2006:168, author = {Nicolas T. Courtois}, title = {How Fast can be Algebraic Attacks on Block Ciphers ?}, howpublished = {Cryptology ePrint Archive, Report 2006/168}, year = {2006}, url = {http://eprint.iacr.org/2006/168}, } @misc{cryptoeprint:2006:169, author = {Steven D. Galbraith and Colm O hEigeartaigh and Caroline Sheedy}, title = {Simplified pairing computation and security implications}, howpublished = {Cryptology ePrint Archive, Report 2006/169}, year = {2006}, url = {http://eprint.iacr.org/2006/169}, } @misc{cryptoeprint:2006:170, author = {Carlo Blundo and Stelvio Cimato and Alfredo De Santis}, title = {Visual Cryptography Schemes with Optimal Pixel Expansion}, howpublished = {Cryptology ePrint Archive, Report 2006/170}, year = {2006}, url = {http://eprint.iacr.org/2006/170}, } @misc{cryptoeprint:2006:171, author = {Prateek Gupta and Vitaly Shmatikov}, title = {Key confirmation and adaptive corruptions in the protocol security logic}, howpublished = {Cryptology ePrint Archive, Report 2006/171}, year = {2006}, url = {http://eprint.iacr.org/2006/171}, } @misc{cryptoeprint:2006:172, author = {R Granger and N.P. Smart}, title = {On Computing Products of Pairings}, howpublished = {Cryptology ePrint Archive, Report 2006/172}, year = {2006}, url = {http://eprint.iacr.org/2006/172}, } @misc{cryptoeprint:2006:173, author = {Le Trieu Phong and Ogata Wakaha}, title = {Some Practical Public-Key Encryption Schemes in both Standard Model and Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2006/173}, year = {2006}, url = {http://eprint.iacr.org/2006/173}, } @misc{cryptoeprint:2006:174, author = {V. R. Sule}, title = {Frobenius expansion and the Diffie Hellman problem}, howpublished = {Cryptology ePrint Archive, Report 2006/174}, year = {2006}, url = {http://eprint.iacr.org/2006/174}, } @misc{cryptoeprint:2006:175, author = {Moni Naor and Gil Segev and Adam Smith}, title = {Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models}, howpublished = {Cryptology ePrint Archive, Report 2006/175}, year = {2006}, url = {http://eprint.iacr.org/2006/175}, } @misc{cryptoeprint:2006:176, author = {Antoine Joux and Reynald Lercier}, title = {Counting points on elliptic curves in medium characteristic}, howpublished = {Cryptology ePrint Archive, Report 2006/176}, year = {2006}, url = {http://eprint.iacr.org/2006/176}, } @misc{cryptoeprint:2006:177, author = {Dennis Hofheinz and Joern Mueller-Quade and Dominique Unruh}, title = {On the (Im-)Possibility of Extending Coin Toss}, howpublished = {Cryptology ePrint Archive, Report 2006/177}, year = {2006}, url = {http://eprint.iacr.org/2006/177}, } @misc{cryptoeprint:2006:178, author = {Amitabh Saxena and Ben Soh}, title = {A New Cryptosystem Based On Hidden Order Groups}, howpublished = {Cryptology ePrint Archive, Report 2006/178}, year = {2006}, url = {http://eprint.iacr.org/2006/178}, } @misc{cryptoeprint:2006:179, author = {Chang Shu and Soonhak Kwon and Kris Gaj}, title = {FPGA Accelerated Tate Pairing Based Cryptosystems over Binary Fields}, howpublished = {Cryptology ePrint Archive, Report 2006/179}, year = {2006}, url = {http://eprint.iacr.org/2006/179}, } @misc{cryptoeprint:2006:180, author = {Dmitry Khovratovich}, title = {Divisibility of the Hamming Weight by $2^k$ and Monomial Criteria for Boolean Functions}, howpublished = {Cryptology ePrint Archive, Report 2006/180}, year = {2006}, url = {http://eprint.iacr.org/2006/180}, } @misc{cryptoeprint:2006:181, author = {Sel\c{c}uk Kavut and Subhamoy Maitra and Melek D. Y{\"u}cel}, title = {There exist Boolean functions on $n$ (odd) variables having nonlinearity $> 2^{n-1} - 2^{\frac{n-1}{2}}$ if and only if $n > 7$}, howpublished = {Cryptology ePrint Archive, Report 2006/181}, year = {2006}, url = {http://eprint.iacr.org/2006/181}, } @misc{cryptoeprint:2006:182, author = {Arvind Narayanan and Vitaly Shmatikov}, title = {On the Limits of Point Function Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2006/182}, year = {2006}, url = {http://eprint.iacr.org/2006/182}, } @misc{cryptoeprint:2006:183, author = {Claude Cr\'epeau and George Savvides and Christian Schaffner and J\"urg Wullschleger}, title = {Information-Theoretic Conditions for Two-Party Secure Function Evaluation}, howpublished = {Cryptology ePrint Archive, Report 2006/183}, year = {2006}, url = {http://eprint.iacr.org/2006/183}, } @misc{cryptoeprint:2006:184, author = {Melissa Chase and Anna Lysyanskaya}, title = {On Signatures of Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2006/184}, year = {2006}, url = {http://eprint.iacr.org/2006/184}, } @misc{cryptoeprint:2006:185, author = {Minh-Huyen Nguyen and Shien Jin Ong and Salil Vadhan}, title = {Statistical Zero-Knowledge Arguments for NP from Any One-Way Function}, howpublished = {Cryptology ePrint Archive, Report 2006/185}, year = {2006}, url = {http://eprint.iacr.org/2006/185}, } @misc{cryptoeprint:2006:186, author = {Mihir Bellare and Alexandra Boldyreva and Adam O'Neill}, title = {Deterministic and Efficiently Searchable Encryption}, howpublished = {Cryptology ePrint Archive, Report 2006/186}, year = {2006}, url = {http://eprint.iacr.org/2006/186}, } @misc{cryptoeprint:2006:187, author = {Jongsung Kim and Alex Biryukov and Bart Preneel and Seokhie Hong}, title = {On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1}, howpublished = {Cryptology ePrint Archive, Report 2006/187}, year = {2006}, url = {http://eprint.iacr.org/2006/187}, } @misc{cryptoeprint:2006:188, author = {Tetsu Iwata}, title = {New Blockcipher Modes of Operation with Beyond the Birthday Bound Security}, howpublished = {Cryptology ePrint Archive, Report 2006/188}, year = {2006}, url = {http://eprint.iacr.org/2006/188}, } @misc{cryptoeprint:2006:189, author = {D. R. Stinson}, title = {Unconditionally secure chaffing and winnowing with short authentication tags}, howpublished = {Cryptology ePrint Archive, Report 2006/189}, year = {2006}, url = {http://eprint.iacr.org/2006/189}, } @misc{cryptoeprint:2006:190, author = {Berry Schoenmakers and Andrey Sidorenko}, title = {Cryptanalysis of the Dual Elliptic Curve Pseudorandom Generator}, howpublished = {Cryptology ePrint Archive, Report 2006/190}, year = {2006}, url = {http://eprint.iacr.org/2006/190}, } @misc{cryptoeprint:2006:191, author = {Sahadeo Padhye}, title = {A PUBLIC KEY CRYPTOSYSTEM BASED ON PELL EQUATION}, howpublished = {Cryptology ePrint Archive, Report 2006/191}, year = {2006}, url = {http://eprint.iacr.org/2006/191}, } @misc{cryptoeprint:2006:192, author = {Osman Kocar}, title = {DPA attacks on keys stored in CMOS cryptographic devices through the influence of the leakage behavior}, howpublished = {Cryptology ePrint Archive, Report 2006/192}, year = {2006}, url = {http://eprint.iacr.org/2006/192}, } @misc{cryptoeprint:2006:193, author = {Victor K. Wei and Tsz Hon Yuen}, title = {(Hierarchical Identity-Based) Threshold Ring Signatures}, howpublished = {Cryptology ePrint Archive, Report 2006/193}, year = {2006}, url = {http://eprint.iacr.org/2006/193}, } @misc{cryptoeprint:2006:194, author = {Joseph K. Liu and Man Ho Au}, title = {Self-Generated-Certificate Public Key Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2006/194}, year = {2006}, url = {http://eprint.iacr.org/2006/194}, } @misc{cryptoeprint:2006:195, author = {Raylin Tso and Chunxiang Gu and Takeshi Okamoto and Eiji Okamoto}, title = {An Efficient ID-based Digital Signature with Message Recovery Based on Pairing}, howpublished = {Cryptology ePrint Archive, Report 2006/195}, year = {2006}, url = {http://eprint.iacr.org/2006/195}, } @misc{cryptoeprint:2006:196, author = {S.~Doroshenko \and A.~Fionov \and A.~Lubkin \and V.~Monarev \and B.~Ryabko}, title = {On ZK-Crypt, Book Stack, and Statistical Tests}, howpublished = {Cryptology ePrint Archive, Report 2006/196}, year = {2006}, url = {http://eprint.iacr.org/2006/196}, } @misc{cryptoeprint:2006:197, author = {Marc P.C. Fossorier and Miodrag J. Mihaljevic and Hideki Imai and Yang Cui and Kanta Matsuura}, title = {A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication}, howpublished = {Cryptology ePrint Archive, Report 2006/197}, year = {2006}, url = {http://eprint.iacr.org/2006/197}, } @misc{cryptoeprint:2006:198, author = {Sven Laur and Helger Lipmaa and Taneli Mielikäinen}, title = {Cryptographically Private Support Vector Machines}, howpublished = {Cryptology ePrint Archive, Report 2006/198}, year = {2006}, url = {http://eprint.iacr.org/2006/198}, } @misc{cryptoeprint:2006:199, author = {L. Chen and Z. Cheng and N.P. Smart}, title = {Identity-based Key Agreement Protocols From Pairings}, howpublished = {Cryptology ePrint Archive, Report 2006/199}, year = {2006}, url = {http://eprint.iacr.org/2006/199}, } @misc{cryptoeprint:2006:200, author = {Guanfei Fang and Genxun huang}, title = {Improvement of recently proposed Remote User Authentication Schemes}, howpublished = {Cryptology ePrint Archive, Report 2006/200}, year = {2006}, url = {http://eprint.iacr.org/2006/200}, } @misc{cryptoeprint:2006:201, author = {Chang'an Zhao and Fangguo Zhang and Jiwu Huang}, title = {Efficient Tate Pairing Computation Using Double-Base Chains}, howpublished = {Cryptology ePrint Archive, Report 2006/201}, year = {2006}, url = {http://eprint.iacr.org/2006/201}, } @misc{cryptoeprint:2006:202, author = {Ryuichi Harasawa, Yutaka Sueyoshi, and Aichi Kudo}, title = {Ate pairing for $y^{2}=x^{5}-\alpha x$ in characteristic five}, howpublished = {Cryptology ePrint Archive, Report 2006/202}, year = {2006}, url = {http://eprint.iacr.org/2006/202}, } @misc{cryptoeprint:2006:203, author = {Sanjit Chatterjee and Palash Sarkar}, title = {Generalization of the Selective-ID Security Model for HIBE Protocols}, howpublished = {Cryptology ePrint Archive, Report 2006/203}, year = {2006}, url = {http://eprint.iacr.org/2006/203}, } @misc{cryptoeprint:2006:204, author = {Pradeep Kumar Mishra and Pinakpani Pal and Palash Sarkar.}, title = {Towards Minimizing Memory Requirement for Implementation of Hyperelliptic Curve Crytosystems}, howpublished = {Cryptology ePrint Archive, Report 2006/204}, year = {2006}, url = {http://eprint.iacr.org/2006/204}, } @misc{cryptoeprint:2006:205, author = {Man Ho Au and Joseph K. Liu and Y. H. Yuen and Duncan S. Wong}, title = {ID-Based Ring Signature Scheme secure in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2006/205}, year = {2006}, url = {http://eprint.iacr.org/2006/205}, } @misc{cryptoeprint:2006:206, author = {Ron Steinfeld and Josef Pieprzyk and Huaxiong Wang}, title = {On the Provable Security of an Efficient RSA-Based Pseudorandom Generator}, howpublished = {Cryptology ePrint Archive, Report 2006/206}, year = {2006}, url = {http://eprint.iacr.org/2006/206}, } @misc{cryptoeprint:2006:207, author = {Javier Herranz and Dennis Hofheinz and Eike Kiltz}, title = {The Kurosawa-Desmedt Key Encapsulation is not Chosen-Ciphertext Secure}, howpublished = {Cryptology ePrint Archive, Report 2006/207}, year = {2006}, url = {http://eprint.iacr.org/2006/207}, } @misc{cryptoeprint:2006:208, author = {Shuhong Wang and Xuhua Ding and Robert Deng and Feng Bao}, title = {Private Information Retrieval Using Trusted Hardware}, howpublished = {Cryptology ePrint Archive, Report 2006/208}, year = {2006}, url = {http://eprint.iacr.org/2006/208}, } @misc{cryptoeprint:2006:209, author = {Clemens Heuberger and James A. Muir}, title = {Minimal Weight and Colexicographically Minimal Integer Representations}, howpublished = {Cryptology ePrint Archive, Report 2006/209}, year = {2006}, url = {http://eprint.iacr.org/2006/209}, } @misc{cryptoeprint:2006:210, author = {Reza Curtmola and Juan Garay and Seny Kamara and Rafail Ostrovsky}, title = {Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions }, howpublished = {Cryptology ePrint Archive, Report 2006/210}, year = {2006}, url = {http://eprint.iacr.org/2006/210}, } @misc{cryptoeprint:2006:211, author = {Alexander W. Dent}, title = {A Survey of Certificateless Encryption Schemes and Security Models}, howpublished = {Cryptology ePrint Archive, Report 2006/211}, year = {2006}, url = {http://eprint.iacr.org/2006/211}, } @misc{cryptoeprint:2006:212, author = {Kemal BICAKCI and Bruno Crispo and Andrew S. Tanenbaum}, title = {Reverse SSL: Improved Server Performance and DoS Resistance for SSL Handshakes}, howpublished = {Cryptology ePrint Archive, Report 2006/212}, year = {2006}, url = {http://eprint.iacr.org/2006/212}, } @misc{cryptoeprint:2006:213, author = {Ueli Maurer and Yvonne Anne Oswald and Krzysztof Pietrzak and Johan Sj{\"o}din}, title = {Luby-Rackoff Ciphers from Weak Round Functions?}, howpublished = {Cryptology ePrint Archive, Report 2006/213}, year = {2006}, url = {http://eprint.iacr.org/2006/213}, } @misc{cryptoeprint:2006:214, author = {Jens-Matthias Bohli and Maria Isabel Gonzalez Vasco and Rainer Steinwandt}, title = {Password-Authenticated Constant-Round Group Key Establishment with a Common Reference String}, howpublished = {Cryptology ePrint Archive, Report 2006/214}, year = {2006}, url = {http://eprint.iacr.org/2006/214}, } @misc{cryptoeprint:2006:215, author = {Shujun Li and Chengqing Li and Kowk-Tung Lo and Guanrong Chen}, title = {Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion}, howpublished = {Cryptology ePrint Archive, Report 2006/215}, year = {2006}, url = {http://eprint.iacr.org/2006/215}, } @misc{cryptoeprint:2006:216, author = {Meloni Nicolas}, title = {Fast and Secure Elliptic Curve Scalar Multiplication Over Prime Fields Using Special Addition Chains}, howpublished = {Cryptology ePrint Archive, Report 2006/216}, year = {2006}, url = {http://eprint.iacr.org/2006/216}, } @misc{cryptoeprint:2006:217, author = {Andrey Pestunov}, title = {Statistical Analysis of the MARS Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2006/217}, year = {2006}, url = {http://eprint.iacr.org/2006/217}, } @misc{cryptoeprint:2006:218, author = {Veronique Cortier, Steve Kremer, Ralf Kuesters, Bogdan Warinschi}, title = {Computationally Sound Symbolic Secrecy in the Presence of Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2006/218}, year = {2006}, url = {http://eprint.iacr.org/2006/218}, } @misc{cryptoeprint:2006:219, author = {Michael Backes and Iliano Cervesato and Aaron D. Jaggard and Andre Scedrov and Joe-Kai Tsay}, title = {Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos}, howpublished = {Cryptology ePrint Archive, Report 2006/219}, year = {2006}, url = {http://eprint.iacr.org/2006/219}, } @misc{cryptoeprint:2006:220, author = {Daniel R. L. Brown}, title = {Multi-Dimensional Montgomery Ladders for Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2006/220}, year = {2006}, url = {http://eprint.iacr.org/2006/220}, } @misc{cryptoeprint:2006:221, author = {Phillip Rogaway and Thomas Shrimpton}, title = {Deterministic Authenticated-Encryption: A Provable-Security Treatment of the Key-Wrap Problem}, howpublished = {Cryptology ePrint Archive, Report 2006/221}, year = {2006}, url = {http://eprint.iacr.org/2006/221}, } @misc{cryptoeprint:2006:222, author = {R. Overbeck}, title = {Decoding Interleaved Gabidulin Codes and Ciphertext-Security for GPT variants}, howpublished = {Cryptology ePrint Archive, Report 2006/222}, year = {2006}, url = {http://eprint.iacr.org/2006/222}, } @misc{cryptoeprint:2006:223, author = {Daniel R. L. Brown}, title = {What Hashes Make RSA-OAEP Secure?}, howpublished = {Cryptology ePrint Archive, Report 2006/223}, year = {2006}, url = {http://eprint.iacr.org/2006/223}, } @misc{cryptoeprint:2006:224, author = {Andr\'{e} Weimerskirch and Christof Paar}, title = {Generalizations of the Karatsuba Algorithm for Efficient Implementations}, howpublished = {Cryptology ePrint Archive, Report 2006/224}, year = {2006}, url = {http://eprint.iacr.org/2006/224}, } @misc{cryptoeprint:2006:225, author = {Giuseppe Ateniese and Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci}, title = {Provably-Secure Time-Bound Hierarchical Key Assignment Schemes}, howpublished = {Cryptology ePrint Archive, Report 2006/225}, year = {2006}, url = {http://eprint.iacr.org/2006/225}, } @misc{cryptoeprint:2006:226, author = {Guilin Wang, Feng Bao, and Jianying Zhou}, title = {The Fairness of Perfect Concurrent Signatures}, howpublished = {Cryptology ePrint Archive, Report 2006/226}, year = {2006}, url = {http://eprint.iacr.org/2006/226}, } @misc{cryptoeprint:2006:227, author = {L. Batina and J. Guajardo and T. Kerins and N. Mentens and P. Tuyls and I. Verbauwhede}, title = {An Elliptic Curve Processor Suitable For RFID-Tags}, howpublished = {Cryptology ePrint Archive, Report 2006/227}, year = {2006}, url = {http://eprint.iacr.org/2006/227}, } @misc{cryptoeprint:2006:228, author = {Mihir Bellare and Amit Sahai}, title = {Non-Malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-based Characterization}, howpublished = {Cryptology ePrint Archive, Report 2006/228}, year = {2006}, url = {http://eprint.iacr.org/2006/228}, } @misc{cryptoeprint:2006:229, author = {Neal Koblitz and Alfred Menezes}, title = {Another Look at "Provable Security". II}, howpublished = {Cryptology ePrint Archive, Report 2006/229}, year = {2006}, url = {http://eprint.iacr.org/2006/229}, } @misc{cryptoeprint:2006:230, author = {Neal Koblitz and Alfred Menezes}, title = {Another Look at Generic Groups}, howpublished = {Cryptology ePrint Archive, Report 2006/230}, year = {2006}, url = {http://eprint.iacr.org/2006/230}, } @misc{cryptoeprint:2006:231, author = {Sebastien Canard and Aline Gouget and Emeline Hufschmitt}, title = {A handy multi-coupon system}, howpublished = {Cryptology ePrint Archive, Report 2006/231}, year = {2006}, url = {http://eprint.iacr.org/2006/231}, } @misc{cryptoeprint:2006:232, author = {Roman Popovych}, title = {Improvement to AKS algorithm}, howpublished = {Cryptology ePrint Archive, Report 2006/232}, year = {2006}, url = {http://eprint.iacr.org/2006/232}, } @misc{cryptoeprint:2006:233, author = {Ayan Mahalanobis}, title = {A simple generalization of El-Gamal cryptosystem to non-abelian groups}, howpublished = {Cryptology ePrint Archive, Report 2006/233}, year = {2006}, url = {http://eprint.iacr.org/2006/233}, } @misc{cryptoeprint:2006:234, author = {Ivan Damg{\aa}rd and Michael {\O}stergaard}, title = {RFID Security: Tradeoffs between Security and Efficiency}, howpublished = {Cryptology ePrint Archive, Report 2006/234}, year = {2006}, url = {http://eprint.iacr.org/2006/234}, } @misc{cryptoeprint:2006:235, author = {Abderrahmane Nitaj}, title = {Application of ECM to a Class of RSA keys}, howpublished = {Cryptology ePrint Archive, Report 2006/235}, year = {2006}, url = {http://eprint.iacr.org/2006/235}, } @misc{cryptoeprint:2006:236, author = {Shidi Xu, Yi Mu, Willy Susilo, Xiaofeng Chen, Xinyi Huang, Fangguo Zhang}, title = {Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security}, howpublished = {Cryptology ePrint Archive, Report 2006/236}, year = {2006}, url = {http://eprint.iacr.org/2006/236}, } @misc{cryptoeprint:2006:237, author = {Claire Whelan and Mike Scott}, title = {Side Channel Analysis of Practical Pairing Implementations: Which Path is More Secure?}, howpublished = {Cryptology ePrint Archive, Report 2006/237}, year = {2006}, url = {http://eprint.iacr.org/2006/237}, } @misc{cryptoeprint:2006:238, author = {Hyun-A Park, Yu Jeong Lee, and Dong Hoon Lee}, title = {Searchable Index Schemes for Groups : Security vs. Efficiency}, howpublished = {Cryptology ePrint Archive, Report 2006/238}, year = {2006}, url = {http://eprint.iacr.org/2006/238}, } @misc{cryptoeprint:2006:239, author = {Yi Deng and Dongdai Lin}, title = {Resettable Zero Knowledge in the Bare Public-Key Model under Standard Assumption}, howpublished = {Cryptology ePrint Archive, Report 2006/239}, year = {2006}, url = {http://eprint.iacr.org/2006/239}, } @misc{cryptoeprint:2006:240, author = {W. Castryck and J. Denef and F. Vercauteren }, title = {Computing Zeta Functions of Nondegenerate Curves}, howpublished = {Cryptology ePrint Archive, Report 2006/240}, year = {2006}, url = {http://eprint.iacr.org/2006/240}, } @misc{cryptoeprint:2006:241, author = {Marten Trolin}, title = {A Stronger Definition for Anonymous Electronic Cash}, howpublished = {Cryptology ePrint Archive, Report 2006/241}, year = {2006}, url = {http://eprint.iacr.org/2006/241}, } @misc{cryptoeprint:2006:242, author = {Haina Zhang , Shaohui Wang, Xiaoyun Wang}, title = {The Probability Advantages of Two Linear Expressions in Symmetric Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2006/242}, year = {2006}, url = {http://eprint.iacr.org/2006/242}, } @misc{cryptoeprint:2006:243, author = {Tae Hyun Kim and Tsuyoshi Takagi and Dong-Guk Han and Ho Won Kim and Jongin Lim}, title = {Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields}, howpublished = {Cryptology ePrint Archive, Report 2006/243}, year = {2006}, url = {http://eprint.iacr.org/2006/243}, } @misc{cryptoeprint:2006:244, author = {Dima Ruinskiy, Adi Shamir, Boaz Tsaban}, title = {Length-based cryptanalysis: The case of Thompson's Group}, howpublished = {Cryptology ePrint Archive, Report 2006/244}, year = {2006}, url = {http://eprint.iacr.org/2006/244}, } @misc{cryptoeprint:2006:245, author = {K. Phani Kumar and G. Shailaja and Ashutosh Saxena}, title = {Secure and Efficient Threshold Key Issuing Protocol for ID-based Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2006/245}, year = {2006}, url = {http://eprint.iacr.org/2006/245}, } @misc{cryptoeprint:2006:246, author = {Jaroslav HRUBY}, title = {ON THE POSTQUANTUM CIPHER SCHEME}, howpublished = {Cryptology ePrint Archive, Report 2006/246}, year = {2006}, url = {http://eprint.iacr.org/2006/246}, } @misc{cryptoeprint:2006:247, author = {Marcel Martin}, title = {Factoring Class Polynomials over the Genus Field}, howpublished = {Cryptology ePrint Archive, Report 2006/247}, year = {2006}, url = {http://eprint.iacr.org/2006/247}, } @misc{cryptoeprint:2006:248, author = {Steven D. Galbraith}, title = {Disguising tori and elliptic curves}, howpublished = {Cryptology ePrint Archive, Report 2006/248}, year = {2006}, url = {http://eprint.iacr.org/2006/248}, } @misc{cryptoeprint:2006:249, author = {Selcuk Kavut and Subhamoy Maitra and Sumanta Sarkar and Melek D. Yucel}, title = {Enumeration of 9-variable Rotation Symmetric Boolean Functions having Nonlinearity > 240}, howpublished = {Cryptology ePrint Archive, Report 2006/249}, year = {2006}, url = {http://eprint.iacr.org/2006/249}, } @misc{cryptoeprint:2006:250, author = {Orr Dunkelman and Nathan Keller}, title = {Linear Cryptanalysis of CTC}, howpublished = {Cryptology ePrint Archive, Report 2006/250}, year = {2006}, url = {http://eprint.iacr.org/2006/250}, } @misc{cryptoeprint:2006:251, author = {Gregory V. Bard}, title = {Accelerating Cryptanalysis with the Method of Four Russians}, howpublished = {Cryptology ePrint Archive, Report 2006/251}, year = {2006}, url = {http://eprint.iacr.org/2006/251}, } @misc{cryptoeprint:2006:252, author = {Maurizio A. Strangio}, title = {On the Resilience of Key Agreement Protocols to Key Compromise Impersonation}, howpublished = {Cryptology ePrint Archive, Report 2006/252}, year = {2006}, url = {http://eprint.iacr.org/2006/252}, } @misc{cryptoeprint:2006:253, author = {Ilya Mironov and Anton Mityagin and Kobbi Nissim}, title = {Hard Instances of the Constrained Discrete Logarithm Problem}, howpublished = {Cryptology ePrint Archive, Report 2006/253}, year = {2006}, url = {http://eprint.iacr.org/2006/253}, } @misc{cryptoeprint:2006:254, author = {Ilya Mironov and Lintao Zhang}, title = {Applications of SAT Solvers to Cryptanalysis of Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2006/254}, year = {2006}, url = {http://eprint.iacr.org/2006/254}, } @misc{cryptoeprint:2006:255, author = {Man Ho Au and Jing Chen and Joseph K. Liu and Yi Mu and Duncan S. Wong and Guomin Yang}, title = {Malicious KGC Attacks in Certificateless Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2006/255}, year = {2006}, url = {http://eprint.iacr.org/2006/255}, } @misc{cryptoeprint:2006:256, author = {Rafail Ostrovsky and Giuseppe Persiano and Ivan Visconti}, title = {Constant-Round Concurrent NMWI and its relation to NMZK}, howpublished = {Cryptology ePrint Archive, Report 2006/256}, year = {2006}, url = {http://eprint.iacr.org/2006/256}, } @misc{cryptoeprint:2006:257, author = {Peter Birkner}, title = {Efficient Divisor Class Halving on Genus Two Curves}, howpublished = {Cryptology ePrint Archive, Report 2006/257}, year = {2006}, url = {http://eprint.iacr.org/2006/257}, } @misc{cryptoeprint:2006:258, author = {Philippe Golle and David Wagner}, title = {Cryptanalysis of a Cognitive Authentication Scheme}, howpublished = {Cryptology ePrint Archive, Report 2006/258}, year = {2006}, url = {http://eprint.iacr.org/2006/258}, } @misc{cryptoeprint:2006:259, author = {Douglas Wikstrom}, title = {Simplified Submission of Inputs to Protocols}, howpublished = {Cryptology ePrint Archive, Report 2006/259}, year = {2006}, url = {http://eprint.iacr.org/2006/259}, } @misc{cryptoeprint:2006:260, author = {Alexander W. Dent}, title = {A Note On Game-Hopping Proofs}, howpublished = {Cryptology ePrint Archive, Report 2006/260}, year = {2006}, url = {http://eprint.iacr.org/2006/260}, } @misc{cryptoeprint:2006:261, author = {Frederic Didier}, title = {Using Wiedemann's algorithm to compute the immunity against algebraic and fast algebraic attacks}, howpublished = {Cryptology ePrint Archive, Report 2006/261}, year = {2006}, url = {http://eprint.iacr.org/2006/261}, } @misc{cryptoeprint:2006:262, author = {Simon Kramer}, title = {Logical Concepts in Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2006/262}, year = {2006}, url = {http://eprint.iacr.org/2006/262}, } @misc{cryptoeprint:2006:263, author = {Dragos Trinca}, title = {Efficient FPGA Implementations and Cryptanalysis of Automata-based Dynamic Convolutional Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2006/263}, year = {2006}, url = {http://eprint.iacr.org/2006/263}, } @misc{cryptoeprint:2006:264, author = {Mridul Nandi}, title = {A Simple and Unified Method of Proving Unpredictability}, howpublished = {Cryptology ePrint Archive, Report 2006/264}, year = {2006}, url = {http://eprint.iacr.org/2006/264}, } @misc{cryptoeprint:2006:265, author = {Javier Herranz and Dennis Hofheinz and Eike Kiltz}, title = {KEM/DEM: Necessary and Sufficient Conditions for Secure Hybrid Encryption}, howpublished = {Cryptology ePrint Archive, Report 2006/265}, year = {2006}, url = {http://eprint.iacr.org/2006/265}, } @misc{cryptoeprint:2006:266, author = {Michael Backes and Peeter Laud}, title = {Computationally Sound Secrecy Proofs by Mechanized Flow Analysis}, howpublished = {Cryptology ePrint Archive, Report 2006/266}, year = {2006}, url = {http://eprint.iacr.org/2006/266}, } @misc{cryptoeprint:2006:267, author = {Mihir Bellare and Tadayoshi Kohno and Victor Shoup}, title = {Stateful Public-Key Cryptosystems: How to Encrypt with One 160-bit Exponentiation}, howpublished = {Cryptology ePrint Archive, Report 2006/267}, year = {2006}, url = {http://eprint.iacr.org/2006/267}, } @misc{cryptoeprint:2006:268, author = {Waka Nagao and Yoshifumi Manabe and Tatsuaki Okamoto}, title = {On the Equivalence of Several Security Notions of Key Encapsulation Mechanism}, howpublished = {Cryptology ePrint Archive, Report 2006/268}, year = {2006}, url = {http://eprint.iacr.org/2006/268}, } @misc{cryptoeprint:2006:269, author = {Steve Babbage and Carlos Cid and Norbert Pramstaller and Havard Raddum}, title = {An Analysis of the Hermes8 Stream Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2006/269}, year = {2006}, url = {http://eprint.iacr.org/2006/269}, } @misc{cryptoeprint:2006:270, author = {Guomin Yang and Duncan S. Wong and Huaxiong Wang and Xiaotie Deng}, title = {Formal Analysis and Systematic Construction of Two-factor Authentication Scheme}, howpublished = {Cryptology ePrint Archive, Report 2006/270}, year = {2006}, url = {http://eprint.iacr.org/2006/270}, } @misc{cryptoeprint:2006:271, author = {Gregory V. Bard}, title = {Modes of Encryption Secure against Blockwise-Adaptive Chosen-Plaintext Attack}, howpublished = {Cryptology ePrint Archive, Report 2006/271}, year = {2006}, url = {http://eprint.iacr.org/2006/271}, } @misc{cryptoeprint:2006:272, author = {Olivier Benoit and Michael Tunstall}, title = {Efficient Use of Random Delays}, howpublished = {Cryptology ePrint Archive, Report 2006/272}, year = {2006}, url = {http://eprint.iacr.org/2006/272}, } @misc{cryptoeprint:2006:273, author = {Mikio Fujii}, title = {Secure Positioning of Mobile Terminals with Simplex Radio Communication}, howpublished = {Cryptology ePrint Archive, Report 2006/273}, year = {2006}, url = {http://eprint.iacr.org/2006/273}, } @misc{cryptoeprint:2006:274, author = {Debasis Giri and P. D. Srivastava}, title = {An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings}, howpublished = {Cryptology ePrint Archive, Report 2006/274}, year = {2006}, url = {http://eprint.iacr.org/2006/274}, } @misc{cryptoeprint:2006:275, author = {Debrup Chakraborty and Palash Sarkar}, title = {A New Mode of Encryption Providing A Tweakable Strong Pseudo-Random}, howpublished = {Cryptology ePrint Archive, Report 2006/275}, year = {2006}, url = {http://eprint.iacr.org/2006/275}, } @misc{cryptoeprint:2006:276, author = {Ran Canetti and Shai Halevi and Michael Steiner}, title = {Mitigating Dictionary Attacks on Password-Protected Local Storage}, howpublished = {Cryptology ePrint Archive, Report 2006/276}, year = {2006}, url = {http://eprint.iacr.org/2006/276}, } @misc{cryptoeprint:2006:277, author = {Oded Goldreich}, title = {On Expected Probabilistic Polynomial-Time Adversaries -- A suggestion for restricted definitions and their benefits}, howpublished = {Cryptology ePrint Archive, Report 2006/277}, year = {2006}, url = {http://eprint.iacr.org/2006/277}, } @misc{cryptoeprint:2006:278, author = {Alexander W. Dent}, title = {Fundamental problems in provable security and cryptography}, howpublished = {Cryptology ePrint Archive, Report 2006/278}, year = {2006}, url = {http://eprint.iacr.org/2006/278}, } @misc{cryptoeprint:2006:279, author = {Sanjit Chatterjee and Palash Sarkar}, title = {On (Hierarchical) Identity Based Encryption Protocols with Short Public Parameters \\ (With an Exposition of Waters' Artificial Abort Technique)}, howpublished = {Cryptology ePrint Archive, Report 2006/279}, year = {2006}, url = {http://eprint.iacr.org/2006/279}, } @misc{cryptoeprint:2006:280, author = {Mario Di Raimondo and Rosario Gennaro and Hugo Krawczyk}, title = {Deniable Authentication and Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2006/280}, year = {2006}, url = {http://eprint.iacr.org/2006/280}, } @misc{cryptoeprint:2006:281, author = {Phillip Rogaway}, title = {Formalizing Human Ignorance: Collision-Resistant Hashing without the Keys}, howpublished = {Cryptology ePrint Archive, Report 2006/281}, year = {2006}, url = {http://eprint.iacr.org/2006/281}, } @misc{cryptoeprint:2006:282, author = {Victor K. Wei and Fangguo Zhang }, title = {Chosen Ciphertext Secure Broadcast Threshold Encryption (resp. Threshold-Traitor Tracing)}, howpublished = {Cryptology ePrint Archive, Report 2006/282}, year = {2006}, url = {http://eprint.iacr.org/2006/282}, } @misc{cryptoeprint:2006:283, author = {Carl Bosley and Yevgeniy Dodis}, title = {Does Privacy Require True Randomness?}, howpublished = {Cryptology ePrint Archive, Report 2006/283}, year = {2006}, url = {http://eprint.iacr.org/2006/283}, } @misc{cryptoeprint:2006:284, author = {Junghyun Nam, Youngsook Lee, and Dongho Won}, title = {Constant Round Group Key Exchange with Logarithmic Computational Complexity}, howpublished = {Cryptology ePrint Archive, Report 2006/284}, year = {2006}, url = {http://eprint.iacr.org/2006/284}, } @misc{cryptoeprint:2006:285, author = {Mihir Bellare and Chanathip Namprempre and Gregory Neven}, title = {Unrestricted Aggregate Signatures}, howpublished = {Cryptology ePrint Archive, Report 2006/285}, year = {2006}, url = {http://eprint.iacr.org/2006/285}, } @misc{cryptoeprint:2006:286, author = {Sujing Zhou and Dongdai Lin}, title = {Shorter Verifier-Local Revocation Group Signatures From Bilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2006/286}, year = {2006}, url = {http://eprint.iacr.org/2006/286}, } @misc{cryptoeprint:2006:287, author = {Dan Boneh and Brent Waters}, title = {Conjunctive, Subset, and Range Queries on Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2006/287}, year = {2006}, url = {http://eprint.iacr.org/2006/287}, } @misc{cryptoeprint:2006:288, author = {Onur Aciicmez and Jean-Pierre Seifert and Cetin Kaya Koc}, title = {Predicting Secret Keys via Branch Prediction}, howpublished = {Cryptology ePrint Archive, Report 2006/288}, year = {2006}, url = {http://eprint.iacr.org/2006/288}, } @misc{cryptoeprint:2006:289, author = {Hovav Shacham and Brent Waters}, title = {Efficient Ring Signatures without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2006/289}, year = {2006}, url = {http://eprint.iacr.org/2006/289}, } @misc{cryptoeprint:2006:290, author = {Christian Rechberger and Vincent Rijmen}, title = {On Authentication with HMAC and Non-Random Properties}, howpublished = {Cryptology ePrint Archive, Report 2006/290}, year = {2006}, url = {http://eprint.iacr.org/2006/290}, } @misc{cryptoeprint:2006:291, author = {Jean-Marc Couveignes}, title = {Hard Homogeneous Spaces}, howpublished = {Cryptology ePrint Archive, Report 2006/291}, year = {2006}, url = {http://eprint.iacr.org/2006/291}, } @misc{cryptoeprint:2006:292, author = {Oriol Farras and Jaume Marti-Farre and Carles Padro}, title = {Ideal Multipartite Secret Sharing Schemes}, howpublished = {Cryptology ePrint Archive, Report 2006/292}, year = {2006}, url = {http://eprint.iacr.org/2006/292}, } @misc{cryptoeprint:2006:293, author = {Zulfikar Ramzan and David P. Woodruff}, title = {Fast Algorithms for the Free Riders Problem in Broadcast Encryption}, howpublished = {Cryptology ePrint Archive, Report 2006/293}, year = {2006}, url = {http://eprint.iacr.org/2006/293}, } @misc{cryptoeprint:2006:294, author = {John P Steinberger}, title = {The Collision Intractability of MDC-2 in the Ideal Cipher Model}, howpublished = {Cryptology ePrint Archive, Report 2006/294}, year = {2006}, url = {http://eprint.iacr.org/2006/294}, } @misc{cryptoeprint:2006:295, author = {Feng Yi and Daoshun Wang and Yiqi Dai}, title = {Visual secret sharing scheme with autostereogram}, howpublished = {Cryptology ePrint Archive, Report 2006/295}, year = {2006}, url = {http://eprint.iacr.org/2006/295}, } @misc{cryptoeprint:2006:296, author = {David Galindo and Javier Herranz and Eike Kiltz}, title = {On the Generic Construction of Identity-Based Signatures with Additional Properties}, howpublished = {Cryptology ePrint Archive, Report 2006/296}, year = {2006}, url = {http://eprint.iacr.org/2006/296}, } @misc{cryptoeprint:2006:297, author = {Xavier Boyen and Hovav Shacham and Emily Shen and Brent Waters}, title = {Forward-Secure Signatures with Untrusted Update}, howpublished = {Cryptology ePrint Archive, Report 2006/297}, year = {2006}, url = {http://eprint.iacr.org/2006/297}, } @misc{cryptoeprint:2006:298, author = {Dan Boneh and Brent Waters}, title = {A Fully Collusion Resistant Broadcast, Trace, and Revoke System}, howpublished = {Cryptology ePrint Archive, Report 2006/298}, year = {2006}, url = {http://eprint.iacr.org/2006/298}, } @misc{cryptoeprint:2006:299, author = {Yuto Kawahara and Tsuyoshi Takagi and Eiji Okamoto}, title = {Efficient Implementation of Tate Pairing on a Mobile Phone using Java}, howpublished = {Cryptology ePrint Archive, Report 2006/299}, year = {2006}, url = {http://eprint.iacr.org/2006/299}, } @misc{cryptoeprint:2006:300, author = {Bennian Dou and Chun-hua Chen and Roberto Araujo}, title = {Attacks and Modifications of CJC's E-voting Scheme}, howpublished = {Cryptology ePrint Archive, Report 2006/300}, year = {2006}, url = {http://eprint.iacr.org/2006/300}, } @misc{cryptoeprint:2006:301, author = {Johann Barbier and \'Eric Filiol and Kichenakoumar Mayoura}, title = {New features for JPEG Steganalysis}, howpublished = {Cryptology ePrint Archive, Report 2006/301}, year = {2006}, url = {http://eprint.iacr.org/2006/301}, } @misc{cryptoeprint:2006:302, author = {Atefeh Mashatan and Douglas R. Stinson}, title = {Noninteractive two-channel message authentication based on hybrid-collision resistant hash functions. }, howpublished = {Cryptology ePrint Archive, Report 2006/302}, year = {2006}, url = {http://eprint.iacr.org/2006/302}, } @misc{cryptoeprint:2006:303, author = {Eric Filiol}, title = {Zero-knowledge-like Proof of Cryptanalysis of Bluetooth Encryption}, howpublished = {Cryptology ePrint Archive, Report 2006/303}, year = {2006}, url = {http://eprint.iacr.org/2006/303}, } @misc{cryptoeprint:2006:304, author = {Michel Abdalla and Dario Catalano and Alexander W. Dent and John Malone-Lee and Gregory Neven and Nigel P. Smart}, title = {Identity-Based Encryption Gone Wild}, howpublished = {Cryptology ePrint Archive, Report 2006/304}, year = {2006}, url = {http://eprint.iacr.org/2006/304}, } @misc{cryptoeprint:2006:305, author = {V.S. Dimitrov and K.U. Jaervinen and M.J. Jacobson, Jr. and W.F. Chan and Z. Huang}, title = {Provably Sublinear Point Multiplication on Koblitz Curves and its Hardware Implementation}, howpublished = {Cryptology ePrint Archive, Report 2006/305}, year = {2006}, url = {http://eprint.iacr.org/2006/305}, } @misc{cryptoeprint:2006:306, author = {Alexander W. Dent and Qiang Tang}, title = {Revisiting the Security Model for Timed-Release Public-Key Encryption with Pre-Open Capability}, howpublished = {Cryptology ePrint Archive, Report 2006/306}, year = {2006}, url = {http://eprint.iacr.org/2006/306}, } @misc{cryptoeprint:2006:307, author = {Jintai Ding and Lei Hu and Bo-Yin Yang and Jiun-Ming Chen}, title = {Note on Design Criteria for Rainbow-Type Multivariates}, howpublished = {Cryptology ePrint Archive, Report 2006/307}, year = {2006}, url = {http://eprint.iacr.org/2006/307}, } @misc{cryptoeprint:2006:308, author = {Jun Shao and Zhenfu Cao and Licheng Wang}, title = {Efficient ID-based Threshold Signature Schemes without Pairings}, howpublished = {Cryptology ePrint Archive, Report 2006/308}, year = {2006}, url = {http://eprint.iacr.org/2006/308}, } @misc{cryptoeprint:2006:309, author = {Vipul Goyal and Omkant Pandey and Amit Sahai and Brent Waters}, title = {Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2006/309}, year = {2006}, url = {http://eprint.iacr.org/2006/309}, } @misc{cryptoeprint:2006:310, author = {Abhishek Parakh}, title = {A d-Sequence based Recursive Random Number Generator}, howpublished = {Cryptology ePrint Archive, Report 2006/310}, year = {2006}, url = {http://eprint.iacr.org/2006/310}, } @misc{cryptoeprint:2006:311, author = {Bennian Dou and Chungen Xu}, title = {Analysis of Some Attacks on Awasthi and Lal’s Proxy Blind Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2006/311}, year = {2006}, url = {http://eprint.iacr.org/2006/311}, } @misc{cryptoeprint:2006:312, author = {Iwan M. Duursma and SeungKook Park}, title = {ElGamal type signature schemes for n-dimensional vector spaces}, howpublished = {Cryptology ePrint Archive, Report 2006/312}, year = {2006}, url = {http://eprint.iacr.org/2006/312}, } @misc{cryptoeprint:2006:313, author = {Lars Elmegaard-Fessel}, title = {Efficient Scalar Multiplication and Security against Power Analysis in Cryptosystems based on the NIST Elliptic Curves Over Prime Fields}, howpublished = {Cryptology ePrint Archive, Report 2006/313}, year = {2006}, url = {http://eprint.iacr.org/2006/313}, } @misc{cryptoeprint:2006:314, author = {Yi Deng and Giovanni Di Crescenzo and Dongdai Lin}, title = {Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model}, howpublished = {Cryptology ePrint Archive, Report 2006/314}, year = {2006}, url = {http://eprint.iacr.org/2006/314}, } @misc{cryptoeprint:2006:315, author = {Michael Backes and Joern-Mueller Quade and Dominique Unruh}, title = {On the Necessity of Rewinding in Secure Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2006/315}, year = {2006}, url = {http://eprint.iacr.org/2006/315}, } @misc{cryptoeprint:2006:316, author = {Sarang Aravamuthan and Viswanatha Rao Thumparthy}, title = {A Parallelization of ECDSA Resistant to Simple Power Analysis Attacks}, howpublished = {Cryptology ePrint Archive, Report 2006/316}, year = {2006}, url = {http://eprint.iacr.org/2006/316}, } @misc{cryptoeprint:2006:317, author = {Krystian Matusiewicz and Scott Contini and Josef Pieprzyk}, title = {Weaknesses of the FORK-256 compression function}, howpublished = {Cryptology ePrint Archive, Report 2006/317}, year = {2006}, url = {http://eprint.iacr.org/2006/317}, } @misc{cryptoeprint:2006:318, author = {Chunbo Ma, Jun Ao, and Jianhua Li}, title = {Chameleon-Based Deniable Authenticated Key Agreement Protocol}, howpublished = {Cryptology ePrint Archive, Report 2006/318}, year = {2006}, url = {http://eprint.iacr.org/2006/318}, } @misc{cryptoeprint:2006:319, author = {Scott Contini and Yiqun Lisa Yin}, title = {Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions}, howpublished = {Cryptology ePrint Archive, Report 2006/319}, year = {2006}, url = {http://eprint.iacr.org/2006/319}, } @misc{cryptoeprint:2006:320, author = {Johannes Buchmann and Luis Carlos Coronado Garcia and Erik Dahmen and Martin Doering and Elena Klintsevich}, title = {CMSS -- An Improved Merkle Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2006/320}, year = {2006}, url = {http://eprint.iacr.org/2006/320}, } @misc{cryptoeprint:2006:321, author = {Reza Rezaeian Farashahi and Berry Schoenmakers and Andrey Sidorenko}, title = {Efficient Pseudorandom Generators Based on the DDH Assumption}, howpublished = {Cryptology ePrint Archive, Report 2006/321}, year = {2006}, url = {http://eprint.iacr.org/2006/321}, } @misc{cryptoeprint:2006:322, author = {Yassir Nawaz and Kishan Chand Gupta and Guang Gong}, title = {Algebraic Immunity of S-boxes Based on Power Mappings: Analysis and Construction}, howpublished = {Cryptology ePrint Archive, Report 2006/322}, year = {2006}, url = {http://eprint.iacr.org/2006/322}, } @misc{cryptoeprint:2006:323, author = {Gergei Bana and Payman Mohassel and Till Stegers}, title = {Computational Soundness of Formal Indistinguishability and Static Equivalence}, howpublished = {Cryptology ePrint Archive, Report 2006/323}, year = {2006}, url = {http://eprint.iacr.org/2006/323}, } @misc{cryptoeprint:2006:324, author = {Sarang Aravamuthan and Sachin Lodha}, title = {The Average Transmission Overhead of Broadcast Encryption}, howpublished = {Cryptology ePrint Archive, Report 2006/324}, year = {2006}, url = {http://eprint.iacr.org/2006/324}, } @misc{cryptoeprint:2006:325, author = {Victor K. Wei}, title = {Invisible Designated Confirmer Signatures without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2006/325}, year = {2006}, url = {http://eprint.iacr.org/2006/325}, } @misc{cryptoeprint:2006:326, author = {Jonathan Katz and Adam Smith}, title = {Analyzing the HB and HB+ Protocols in the ``Large Error'' Case}, howpublished = {Cryptology ePrint Archive, Report 2006/326}, year = {2006}, url = {http://eprint.iacr.org/2006/326}, } @misc{cryptoeprint:2006:327, author = {Jean-Luc Beuchat and Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto}, title = {An Algorithm for the $\eta_T$ Pairing Calculation in Characteristic Three and its Hardware Implementation}, howpublished = {Cryptology ePrint Archive, Report 2006/327}, year = {2006}, url = {http://eprint.iacr.org/2006/327}, } @misc{cryptoeprint:2006:328, author = {Sk. Md. Mizanur Rahman and Atsuo Inomata and Takeshi Okamoto and Masahiro Mambo and Eiji Okamoto}, title = {Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks}, howpublished = {Cryptology ePrint Archive, Report 2006/328}, year = {2006}, url = {http://eprint.iacr.org/2006/328}, } @misc{cryptoeprint:2006:329, author = {Shi-hua Zou and Ji-wen Zeng and Jun-jie Quan}, title = {Designated Verifier Signature Scheme Based on Braid Groups}, howpublished = {Cryptology ePrint Archive, Report 2006/329}, year = {2006}, url = {http://eprint.iacr.org/2006/329}, } @misc{cryptoeprint:2006:330, author = {Christophe Doche and Laurent Imbert}, title = {Extended Double-Base Number System with applications to Elliptic Curve Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2006/330}, year = {2006}, url = {http://eprint.iacr.org/2006/330}, } @misc{cryptoeprint:2006:331, author = {Isabelle Dechene}, title = {On the Security of Generalized Jacobian Cryptosystems }, howpublished = {Cryptology ePrint Archive, Report 2006/331}, year = {2006}, url = {http://eprint.iacr.org/2006/331}, } @misc{cryptoeprint:2006:332, author = {Matthew Franklin and Mark Gondree and Payman Mohassel}, title = {Improved Efficiency for Private Stable Matching}, howpublished = {Cryptology ePrint Archive, Report 2006/332}, year = {2006}, url = {http://eprint.iacr.org/2006/332}, } @misc{cryptoeprint:2006:333, author = {S. D. Galbraith and B. A. Smith}, title = {Discrete Logarithms in Generalized Jacobians}, howpublished = {Cryptology ePrint Archive, Report 2006/333}, year = {2006}, url = {http://eprint.iacr.org/2006/333}, } @misc{cryptoeprint:2006:334, author = {Florian Mendel}, title = {Colliding Message Pair for 53-Step HAS-160}, howpublished = {Cryptology ePrint Archive, Report 2006/334}, year = {2006}, url = {http://eprint.iacr.org/2006/334}, } @misc{cryptoeprint:2006:335, author = {Jue-Sam Chou and Yalin Chen and Jin-Cheng Huang}, title = {A ID-Based Deniable Authentication Protocol on pairings}, howpublished = {Cryptology ePrint Archive, Report 2006/335}, year = {2006}, url = {http://eprint.iacr.org/2006/335}, } @misc{cryptoeprint:2006:336, author = {Jintai Ding, Lei Hu, Xuyun Nie, Jianyu li, John Wagner}, title = {High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2006/336}, year = {2006}, url = {http://eprint.iacr.org/2006/336}, } @misc{cryptoeprint:2006:337, author = {D.R. Stinson and J. Wu}, title = {An Efficient and Secure Two-flow Zero-Knowledge Identification Protocol}, howpublished = {Cryptology ePrint Archive, Report 2006/337}, year = {2006}, url = {http://eprint.iacr.org/2006/337}, } @misc{cryptoeprint:2006:338, author = {Fagen Li, Yupu Hu, and Shuanggen Liu}, title = {Efficient and Provably Secure Multi-Recipient Signcryption from Bilinear Pairings}, howpublished = {Cryptology ePrint Archive, Report 2006/338}, year = {2006}, url = {http://eprint.iacr.org/2006/338}, } @misc{cryptoeprint:2006:339, author = {Jun Xu and Jiwen Zeng and Xiaomin Zha}, title = {A New family of Ideal Multipartite Access Structure Based on MSP}, howpublished = {Cryptology ePrint Archive, Report 2006/339}, year = {2006}, url = {http://eprint.iacr.org/2006/339}, } @misc{cryptoeprint:2006:340, author = {Chengqing Li}, title = {Cryptanalyses of Some Multimedia Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2006/340}, year = {2006}, url = {http://eprint.iacr.org/2006/340}, } @misc{cryptoeprint:2006:341, author = {Nathan Keller and Stephen D. Miller and Ilya Mironov and Ramarathnam Venkatesan}, title = {MV3: A new word based stream cipher using rapid mixing and revolving buffers}, howpublished = {Cryptology ePrint Archive, Report 2006/341}, year = {2006}, url = {http://eprint.iacr.org/2006/341}, } @misc{cryptoeprint:2006:342, author = {Jue-Sam Chou and Yalin Chen and Jin-Cheng Huang}, title = {A Novel Secure Electronic Voting Protocol Based On Bilinear Pairings}, howpublished = {Cryptology ePrint Archive, Report 2006/342}, year = {2006}, url = {http://eprint.iacr.org/2006/342}, } @misc{cryptoeprint:2006:343, author = {M. Choudary Gorantla And Ashutosh Saxena}, title = {Verifiably Encrypted Signature Scheme with Threshold Adjudication}, howpublished = {Cryptology ePrint Archive, Report 2006/343}, year = {2006}, url = {http://eprint.iacr.org/2006/343}, } @misc{cryptoeprint:2006:344, author = {Lihua Wang and Takeshi Okamoto and Masahiro Mambo and Eiji Okamoto}, title = {A Subject-Delegated Decryption Scheme with ``Tightly" Limited Authority}, howpublished = {Cryptology ePrint Archive, Report 2006/344}, year = {2006}, url = {http://eprint.iacr.org/2006/344}, } @misc{cryptoeprint:2006:345, author = {Atkinson, T. and Bartak,R. and Silaghi,M.-C. and Tuleu,E. and Zanker,M.}, title = {Private and Efficient Stable Marriages (Matching)}, howpublished = {Cryptology ePrint Archive, Report 2006/345}, year = {2006}, url = {http://eprint.iacr.org/2006/345}, } @misc{cryptoeprint:2006:346, author = {Qiong Huang and Duncan S. Wong and Yiming Zhao}, title = {Generic Transformation to Strongly Unforgeable Signatures}, howpublished = {Cryptology ePrint Archive, Report 2006/346}, year = {2006}, url = {http://eprint.iacr.org/2006/346}, } @misc{cryptoeprint:2006:347, author = {Fumiyuki Momose and Jinhui Chao}, title = {Classification of Weil Restrictions Obtained by (2,...,2) Coverings of P^1}, howpublished = {Cryptology ePrint Archive, Report 2006/347}, year = {2006}, url = {http://eprint.iacr.org/2006/347}, } @misc{cryptoeprint:2006:348, author = {Krzysztof Pietrzak}, title = {Non-Trivial Black-Box Combiners for Collision-Resistant Hash-Functions don't Exist}, howpublished = {Cryptology ePrint Archive, Report 2006/348}, year = {2006}, url = {http://eprint.iacr.org/2006/348}, } @misc{cryptoeprint:2006:349, author = {D. Page}, title = {A Note On Side-Channels Resulting From Dynamic Compilation}, howpublished = {Cryptology ePrint Archive, Report 2006/349}, year = {2006}, url = {http://eprint.iacr.org/2006/349}, } @misc{cryptoeprint:2006:350, author = {Wenling Wu, Wentao Zhang, and Dengguo Feng}, title = {Impossible Differential Cryptanalysis of ARIA and Camellia}, howpublished = {Cryptology ePrint Archive, Report 2006/350}, year = {2006}, url = {http://eprint.iacr.org/2006/350}, } @misc{cryptoeprint:2006:351, author = {Onur Aciicmez and Cetin Kaya Koc and Jean-Pierre Seifert}, title = {On the Power of Simple Branch Prediction Analysis}, howpublished = {Cryptology ePrint Archive, Report 2006/351}, year = {2006}, url = {http://eprint.iacr.org/2006/351}, } @misc{cryptoeprint:2006:352, author = {Amir Herzberg and Igal Yoffe}, title = {Foundations of Secure E-Commerce: The Order Layer}, howpublished = {Cryptology ePrint Archive, Report 2006/352}, year = {2006}, url = {http://eprint.iacr.org/2006/352}, } @misc{cryptoeprint:2006:353, author = {Zhenjie Huang and Kefei Chen and Yumin Wang}, title = {Analysis and Improvements of Two Identity-Based Perfect Concurrent Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2006/353}, year = {2006}, url = {http://eprint.iacr.org/2006/353}, } @misc{cryptoeprint:2006:354, author = {Li An-Ping}, title = {A new stream cipher: DICING}, howpublished = {Cryptology ePrint Archive, Report 2006/354}, year = {2006}, url = {http://eprint.iacr.org/2006/354}, } @misc{cryptoeprint:2006:355, author = {Boaz Barak and Manoj Prabhakaran and Amit Sahai}, title = {Concurrent Non-Malleable Zero Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2006/355}, year = {2006}, url = {http://eprint.iacr.org/2006/355}, } @misc{cryptoeprint:2006:356, author = {Emilia K\"{a}sper and Sven Laur and Helger Lipmaa}, title = {Black-Box Knowledge Extraction Revisited: Universal Approach with Precise Bounds}, howpublished = {Cryptology ePrint Archive, Report 2006/356}, year = {2006}, url = {http://eprint.iacr.org/2006/356}, } @misc{cryptoeprint:2006:357, author = {Su-Jeong Choi and Simon R. Blackburn and Peter R. Wild}, title = {Cryptanalysis of a homomorphic public-key cryptosystem over a finite group}, howpublished = {Cryptology ePrint Archive, Report 2006/357}, year = {2006}, url = {http://eprint.iacr.org/2006/357}, } @misc{cryptoeprint:2006:358, author = {Dalia Khader}, title = {Public Key Encryption with Keyword Search based on K-Resilient IBE}, howpublished = {Cryptology ePrint Archive, Report 2006/358}, year = {2006}, url = {http://eprint.iacr.org/2006/358}, } @misc{cryptoeprint:2006:359, author = {Mihir Bellare and Oded Goldreich}, title = {On Probabilistic versus Deterministic Provers in the Definition of Proofs Of Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2006/359}, year = {2006}, url = {http://eprint.iacr.org/2006/359}, } @misc{cryptoeprint:2006:360, author = {Marc Stevens and Arjen Lenstra and Benne de Weger}, title = {Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities}, howpublished = {Cryptology ePrint Archive, Report 2006/360}, year = {2006}, url = {http://eprint.iacr.org/2006/360}, } @misc{cryptoeprint:2006:361, author = {Sherman S.M. Chow and Willy Susilo}, title = {Generic Construction of (Identity-based) Perfect Concurrent Signatures}, howpublished = {Cryptology ePrint Archive, Report 2006/361}, year = {2006}, url = {http://eprint.iacr.org/2006/361}, } @misc{cryptoeprint:2006:362, author = {Palash Sarkar and Sanjit Chatterjee}, title = {Construction of a Hybrid (Hierarchical) Identity-Based Encryption Protocol Secure Against Adaptive Attacks}, howpublished = {Cryptology ePrint Archive, Report 2006/362}, year = {2006}, url = {http://eprint.iacr.org/2006/362}, } @misc{cryptoeprint:2006:363, author = {Ventzislav Nikov and Svetla Nikova and Bart Preneel}, title = {A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols}, howpublished = {Cryptology ePrint Archive, Report 2006/363}, year = {2006}, url = {http://eprint.iacr.org/2006/363}, } @misc{cryptoeprint:2006:364, author = {Gregory V. Bard}, title = {Spelling-Error Tolerant, Order-Independent Pass-Phrases via the Damerau-Levenshtein String-Edit Distance Metric}, howpublished = {Cryptology ePrint Archive, Report 2006/364}, year = {2006}, url = {http://eprint.iacr.org/2006/364}, } @misc{cryptoeprint:2006:365, author = {Xianhui Lu, Xuejia Lai, Dake He,Guomin Li}, title = {Revisit of KD04}, howpublished = {Cryptology ePrint Archive, Report 2006/365}, year = {2006}, url = {http://eprint.iacr.org/2006/365}, } @misc{cryptoeprint:2006:366, author = {Kristian Gj\o steen}, title = {A Latency-Free Election Scheme}, howpublished = {Cryptology ePrint Archive, Report 2006/366}, year = {2006}, url = {http://eprint.iacr.org/2006/366}, } @misc{cryptoeprint:2006:367, author = {Xuefei Cao and Kenneth G. Paterson and Weidong Kou}, title = {An Attack on a Certificateless Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2006/367}, year = {2006}, url = {http://eprint.iacr.org/2006/367}, } @misc{cryptoeprint:2006:368, author = {Man Ho Au and Joseph K. Liu and Tsz Hon Yuen and Duncan S. Wong}, title = {Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2006/368}, year = {2006}, url = {http://eprint.iacr.org/2006/368}, } @misc{cryptoeprint:2006:369, author = {Guido Bertoni and Joan Daemen and Micha\"el Peeters and Gilles Van Assche}, title = {RadioGat\'un, a belt-and-mill hash function}, howpublished = {Cryptology ePrint Archive, Report 2006/369}, year = {2006}, url = {http://eprint.iacr.org/2006/369}, } @misc{cryptoeprint:2006:370, author = {Ventzislav Nikov}, title = {A DoS Attack Against the Integrity-Less ESP (IPSec)}, howpublished = {Cryptology ePrint Archive, Report 2006/370}, year = {2006}, url = {http://eprint.iacr.org/2006/370}, } @misc{cryptoeprint:2006:371, author = {Robert Ronan and Colm o hEigeartaigh and Colin Murphy and Tim Kerins and Paulo S. L. M. Barreto}, title = {Hardware Implementation of the $\eta_T$ Pairing in Characteristic 3}, howpublished = {Cryptology ePrint Archive, Report 2006/371}, year = {2006}, url = {http://eprint.iacr.org/2006/371}, } @misc{cryptoeprint:2006:372, author = {David Freeman and Michael Scott and Edlyn Teske}, title = {A taxonomy of pairing-friendly elliptic curves}, howpublished = {Cryptology ePrint Archive, Report 2006/372}, year = {2006}, url = {http://eprint.iacr.org/2006/372}, } @misc{cryptoeprint:2006:373, author = {Joseph K. Liu and Man Ho Au and Willy Susilo}, title = {Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2006/373}, year = {2006}, url = {http://eprint.iacr.org/2006/373}, } @misc{cryptoeprint:2006:374, author = {Joseph Bonneau}, title = {Robust Final-Round Cache-Trace Attacks Against AES}, howpublished = {Cryptology ePrint Archive, Report 2006/374}, year = {2006}, url = {http://eprint.iacr.org/2006/374}, } @misc{cryptoeprint:2006:375, author = {Steven D. Galbraith and Jordi Pujol\`as and Christophe Ritzenthaler and Benjamin Smith}, title = {Distortion maps for genus two curves}, howpublished = {Cryptology ePrint Archive, Report 2006/375}, year = {2006}, url = {http://eprint.iacr.org/2006/375}, } @misc{cryptoeprint:2006:376, author = {Vlastimil KLIMA}, title = {A New Concept of Hash Functions SNMAC Using a Special Block Cipher and NMAC/HMAC Constructions}, howpublished = {Cryptology ePrint Archive, Report 2006/376}, year = {2006}, url = {http://eprint.iacr.org/2006/376}, } @misc{cryptoeprint:2006:377, author = {James Birkett, Alexander W. Dent, Gregory Neven and Jacob Schuldt}, title = {Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards}, howpublished = {Cryptology ePrint Archive, Report 2006/377}, year = {2006}, url = {http://eprint.iacr.org/2006/377}, } @misc{cryptoeprint:2006:378, author = {YesemKurt}, title = {A New Key Exchange Primitive Based on the Triple Decomposition Problem}, howpublished = {Cryptology ePrint Archive, Report 2006/378}, year = {2006}, url = {http://eprint.iacr.org/2006/378}, } @misc{cryptoeprint:2006:379, author = {Matthew J. Campagna}, title = {Security Bounds for the NIST Codebook-based Deterministic Random Bit Generator}, howpublished = {Cryptology ePrint Archive, Report 2006/379}, year = {2006}, url = {http://eprint.iacr.org/2006/379}, } @misc{cryptoeprint:2006:380, author = {Einar Mykletun and Gene Tsudik}, title = {On Security of Sovereign Joins}, howpublished = {Cryptology ePrint Archive, Report 2006/380}, year = {2006}, url = {http://eprint.iacr.org/2006/380}, } @misc{cryptoeprint:2006:381, author = {Fuw-Yi Yang}, title = {Cryptanalysis on an Algorithm for Efficient Digital Signatures}, howpublished = {Cryptology ePrint Archive, Report 2006/381}, year = {2006}, url = {http://eprint.iacr.org/2006/381}, } @misc{cryptoeprint:2006:382, author = {E-yong Kim and Hwangnam Kim and Kunsoo Park}, title = {Provisioning Protected Resource Sharing in Multi-Hop Wireless Networks}, howpublished = {Cryptology ePrint Archive, Report 2006/382}, year = {2006}, url = {http://eprint.iacr.org/2006/382}, } @misc{cryptoeprint:2006:383, author = {Thomas Sirvent}, title = {Traitor tracing scheme with constant ciphertext rate against powerful pirates}, howpublished = {Cryptology ePrint Archive, Report 2006/383}, year = {2006}, url = {http://eprint.iacr.org/2006/383}, } @misc{cryptoeprint:2006:384, author = {Shenghui Su, Yixian Yang, Bo Yang, and Shaolan Zhang}, title = {The Design and Analysis of a Hash Ring-iterative Structure}, howpublished = {Cryptology ePrint Archive, Report 2006/384}, year = {2006}, url = {http://eprint.iacr.org/2006/384}, } @misc{cryptoeprint:2006:385, author = {Emmanuel Bresson and Mark Manulis and Joerg Schwenk}, title = {On Security Models and Compilers for Group Key Exchange Protocols}, howpublished = {Cryptology ePrint Archive, Report 2006/385}, year = {2006}, url = {http://eprint.iacr.org/2006/385}, } @misc{cryptoeprint:2006:386, author = {Mark Wooding}, title = {The Wrestlers Protocol: A simple, practical, secure, deniable protocol for key-exchange}, howpublished = {Cryptology ePrint Archive, Report 2006/386}, year = {2006}, url = {http://eprint.iacr.org/2006/386}, } @misc{cryptoeprint:2006:387, author = {Phong Q. Nguyen}, title = {A Note on the Security of NTRUSign}, howpublished = {Cryptology ePrint Archive, Report 2006/387}, year = {2006}, url = {http://eprint.iacr.org/2006/387}, } @misc{cryptoeprint:2006:388, author = {Mark Manulis}, title = {Survey on Security Requirements and Models for Group Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2006/388}, year = {2006}, url = {http://eprint.iacr.org/2006/388}, } @misc{cryptoeprint:2006:389, author = {Eiichiro Fujisaki and Koutarou Suzuki}, title = {Traceable Ring Signature}, howpublished = {Cryptology ePrint Archive, Report 2006/389}, year = {2006}, url = {http://eprint.iacr.org/2006/389}, } @misc{cryptoeprint:2006:390, author = {Xianhui Lu, Xuejia Lai, Dake He,Guomin Li}, title = {Revisit of CS98}, howpublished = {Cryptology ePrint Archive, Report 2006/390}, year = {2006}, url = {http://eprint.iacr.org/2006/390}, } @misc{cryptoeprint:2006:391, author = {Ronald Cramer and Dennis Hofheinz and Eike Kiltz}, title = {A Note on Bounded Chosen Ciphertext Security from Black-box Semantical Security}, howpublished = {Cryptology ePrint Archive, Report 2006/391}, year = {2006}, url = {http://eprint.iacr.org/2006/391}, } @misc{cryptoeprint:2006:392, author = {Katherine E. Stange}, title = {The Tate Pairing via Elliptic Nets}, howpublished = {Cryptology ePrint Archive, Report 2006/392}, year = {2006}, url = {http://eprint.iacr.org/2006/392}, } @misc{cryptoeprint:2006:393, author = {Sujing Zhou, Dongdai Lin}, title = {The Identity Escrow (Group Signature) Scheme at CT-RSA'05 Is Not Non-frameable}, howpublished = {Cryptology ePrint Archive, Report 2006/393}, year = {2006}, url = {http://eprint.iacr.org/2006/393}, } @misc{cryptoeprint:2006:394, author = {Sunder Lal and Vandani Verma}, title = {Identity Based Strong Designated Verifier Proxy Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2006/394}, year = {2006}, url = {http://eprint.iacr.org/2006/394}, } @misc{cryptoeprint:2006:395, author = {Mark Manulis}, title = {Security-Focused Survey on Group Key Exchange Protocols}, howpublished = {Cryptology ePrint Archive, Report 2006/395}, year = {2006}, url = {http://eprint.iacr.org/2006/395}, } @misc{cryptoeprint:2006:396, author = {Madhukar Anand and Eric Cronin and Micah Sherr and Matt Blaze and Sampath Kannan}, title = {Security Protocols with Isotropic Channels}, howpublished = {Cryptology ePrint Archive, Report 2006/396}, year = {2006}, url = {http://eprint.iacr.org/2006/396}, } @misc{cryptoeprint:2006:397, author = {David P. Woodruff}, title = {Revisiting the Efficiency of Malicious Two-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2006/397}, year = {2006}, url = {http://eprint.iacr.org/2006/397}, } @misc{cryptoeprint:2006:398, author = {Amir Herzberg and Igal Yoffe}, title = {The Layered Games Framework for Specifications and Analysis of Security Protocols}, howpublished = {Cryptology ePrint Archive, Report 2006/398}, year = {2006}, url = {http://eprint.iacr.org/2006/398}, } @misc{cryptoeprint:2006:399, author = {Mihir Bellare and Thomas Ristenpart}, title = {Multi-Property-Preserving Hash Domain Extension and the EMD Transform}, howpublished = {Cryptology ePrint Archive, Report 2006/399}, year = {2006}, url = {http://eprint.iacr.org/2006/399}, } @misc{cryptoeprint:2006:400, author = {Vipul Goyal and Ryan Moriarty and Rafail Ostrovsky and Amit Sahai}, title = {Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions}, howpublished = {Cryptology ePrint Archive, Report 2006/400}, year = {2006}, url = {http://eprint.iacr.org/2006/400}, } @misc{cryptoeprint:2006:401, author = {Jean-Philippe Aumasson}, title = {On the cost of cryptanalytic attacks}, howpublished = {Cryptology ePrint Archive, Report 2006/401}, year = {2006}, url = {http://eprint.iacr.org/2006/401}, } @misc{cryptoeprint:2006:402, author = {Nicolas T. Courtois and Gregory V. Bard}, title = {Algebraic Cryptanalysis of the Data Encryption Standard}, howpublished = {Cryptology ePrint Archive, Report 2006/402}, year = {2006}, url = {http://eprint.iacr.org/2006/402}, } @misc{cryptoeprint:2006:403, author = {Willi Geiselmann and Rainer Steinwandt}, title = {Non-Wafer-Scale Sieving Hardware for the NFS: Another Attempt to Cope with 1024-bit}, howpublished = {Cryptology ePrint Archive, Report 2006/403}, year = {2006}, url = {http://eprint.iacr.org/2006/403}, } @misc{cryptoeprint:2006:404, author = {Till Stegers}, title = {Faugere's F5 Algorithm Revisited}, howpublished = {Cryptology ePrint Archive, Report 2006/404}, year = {2006}, url = {http://eprint.iacr.org/2006/404}, } @misc{cryptoeprint:2006:405, author = {Aslak Bakke Buan and Kristian Gj\o steen and Lillian Kr\aa kmo}, title = {Universally Composable Blind Signatures in the Plain Model}, howpublished = {Cryptology ePrint Archive, Report 2006/405}, year = {2006}, url = {http://eprint.iacr.org/2006/405}, } @misc{cryptoeprint:2006:406, author = {Yuto Nakano and Hidenori Kuwakado and Masakatu Morii}, title = {Redundancy of the Wang-Yu Sufficient Conditions}, howpublished = {Cryptology ePrint Archive, Report 2006/406}, year = {2006}, url = {http://eprint.iacr.org/2006/406}, } @misc{cryptoeprint:2006:407, author = {Jens Groth and Rafail Ostrovsky}, title = {Cryptography in the Multi-string Model}, howpublished = {Cryptology ePrint Archive, Report 2006/407}, year = {2006}, url = {http://eprint.iacr.org/2006/407}, } @misc{cryptoeprint:2006:408, author = {Goichiro Hanaoka and Hideki Imai}, title = {A Generic Construction of CCA-Secure Cryptosystems without NIZKP for a Bounded Number of Decryption Queries}, howpublished = {Cryptology ePrint Archive, Report 2006/408}, year = {2006}, url = {http://eprint.iacr.org/2006/408}, } @misc{cryptoeprint:2006:409, author = {Li An-Ping}, title = {A NEW MAC: LAMA}, howpublished = {Cryptology ePrint Archive, Report 2006/409}, year = {2006}, url = {http://eprint.iacr.org/2006/409}, } @misc{cryptoeprint:2006:410, author = {Alexandre Pinto and André Souto and Armando Matos and Luís Antunes}, title = {Galois Field Commitment Scheme}, howpublished = {Cryptology ePrint Archive, Report 2006/410}, year = {2006}, url = {http://eprint.iacr.org/2006/410}, } @misc{cryptoeprint:2006:411, author = {Donghoon Chang}, title = {Preimage Attack on Hashing with Polynomials proposed at ICISC'06}, howpublished = {Cryptology ePrint Archive, Report 2006/411}, year = {2006}, url = {http://eprint.iacr.org/2006/411}, } @misc{cryptoeprint:2006:412, author = {Donghoon Chang}, title = {Preimage Attacks on CellHash, SubHash and Strengthened Versions of CellHash and SubHash}, howpublished = {Cryptology ePrint Archive, Report 2006/412}, year = {2006}, url = {http://eprint.iacr.org/2006/412}, } @misc{cryptoeprint:2006:413, author = {Donghoon Chang}, title = {Preimage Attack on Parallel FFT-Hashing}, howpublished = {Cryptology ePrint Archive, Report 2006/413}, year = {2006}, url = {http://eprint.iacr.org/2006/413}, } @misc{cryptoeprint:2006:414, author = {Shien Jin Ong and Salil Vadhan}, title = {Zero Knowledge and Soundness are Symmetric}, howpublished = {Cryptology ePrint Archive, Report 2006/414}, year = {2006}, url = {http://eprint.iacr.org/2006/414}, } @misc{cryptoeprint:2006:415, author = {Laura Hitt}, title = {On the Minimal Embedding Field}, howpublished = {Cryptology ePrint Archive, Report 2006/415}, year = {2006}, url = {http://eprint.iacr.org/2006/415}, } @misc{cryptoeprint:2006:416, author = {Claude Castelluccia}, title = {Authenticated Interleaved Encryption \\ }, howpublished = {Cryptology ePrint Archive, Report 2006/416}, year = {2006}, url = {http://eprint.iacr.org/2006/416}, } @misc{cryptoeprint:2006:417, author = {T.Moh}, title = {The Recent Attack of Nie et al On TTM is Faulty}, howpublished = {Cryptology ePrint Archive, Report 2006/417}, year = {2006}, url = {http://eprint.iacr.org/2006/417}, } @misc{cryptoeprint:2006:418, author = {Jae Hong Seo, HyoJin Yoon, Seongan Lim, Jung Hee Cheon and Dowon Hong}, title = {Analysis of Privacy-Preserving Element Reduction of Multiset}, howpublished = {Cryptology ePrint Archive, Report 2006/418}, year = {2006}, url = {http://eprint.iacr.org/2006/418}, } @misc{cryptoeprint:2006:419, author = {Ilia Toli}, title = {Some New Hidden Ideal Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2006/419}, year = {2006}, url = {http://eprint.iacr.org/2006/419}, } @misc{cryptoeprint:2006:420, author = {Shenghui Su, and Shuwang Lu}, title = {The REESSE1+ Public-key Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2006/420}, year = {2006}, url = {http://eprint.iacr.org/2006/420}, } @misc{cryptoeprint:2006:421, author = {Jin Zhou, TingMao Chang, YaJuan Zhang, YueFei Zhu}, title = {Universally Composable Three-Party Key Distribution}, howpublished = {Cryptology ePrint Archive, Report 2006/421}, year = {2006}, url = {http://eprint.iacr.org/2006/421}, } @misc{cryptoeprint:2006:422, author = {Joern Mueller-Quade and Dominique Unruh}, title = {Long-term Security and Universal Composability}, howpublished = {Cryptology ePrint Archive, Report 2006/422}, year = {2006}, url = {http://eprint.iacr.org/2006/422}, } @misc{cryptoeprint:2006:423, author = {Masayuki Abe and Serge Fehr}, title = {Perfect NIZK with Adaptive Soundness}, howpublished = {Cryptology ePrint Archive, Report 2006/423}, year = {2006}, url = {http://eprint.iacr.org/2006/423}, } @misc{cryptoeprint:2006:424, author = {Prateek Gupta and Vitaly Shmatikov}, title = {Security Analysis of Voice-over-IP Protocols}, howpublished = {Cryptology ePrint Archive, Report 2006/424}, year = {2006}, url = {http://eprint.iacr.org/2006/424}, } @misc{cryptoeprint:2006:425, author = {anoymous}, title = {A protocol}, howpublished = {Cryptology ePrint Archive, Report 2006/425}, year = {2006}, url = {http://eprint.iacr.org/2006/425}, } @misc{cryptoeprint:2006:426, author = {Christophe Tartary and Huaxiong Wang}, title = {The Bilinear Pairing-based Accumulator Proposed at CT-RSA'05 is not Collision Resistant}, howpublished = {Cryptology ePrint Archive, Report 2006/426}, year = {2006}, url = {http://eprint.iacr.org/2006/426}, } @misc{cryptoeprint:2006:427, author = {Aya Comuta and Mitsuru Kawazoe and Tetsuya Takahashi}, title = {Pairing-friendly elliptic curves with small security loss by Cheon's algorithm}, howpublished = {Cryptology ePrint Archive, Report 2006/427}, year = {2006}, url = {http://eprint.iacr.org/2006/427}, } @misc{cryptoeprint:2006:428, author = {Lilya Budaghyan and Claude Carlet and Gregor Leander}, title = {Another class of quadratic APN binomials over $\F_{2^n}$: the case $n$ divisible by 4}, howpublished = {Cryptology ePrint Archive, Report 2006/428}, year = {2006}, url = {http://eprint.iacr.org/2006/428}, } @misc{cryptoeprint:2006:429, author = {Sugata Gangopadhyay and Deepmala Sharma}, title = {On a new invariant of Boolean functions}, howpublished = {Cryptology ePrint Archive, Report 2006/429}, year = {2006}, url = {http://eprint.iacr.org/2006/429}, } @misc{cryptoeprint:2006:430, author = {Nicholas Hopper and David Molnar and David Wagner}, title = {From Weak to Strong Watermarking}, howpublished = {Cryptology ePrint Archive, Report 2006/430}, year = {2006}, url = {http://eprint.iacr.org/2006/430}, } @misc{cryptoeprint:2006:431, author = {Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto}, title = {Some Efficient Algorithms for the Final Exponentiation of $\eta_T$ Pairing}, howpublished = {Cryptology ePrint Archive, Report 2006/431}, year = {2006}, url = {http://eprint.iacr.org/2006/431}, } @misc{cryptoeprint:2006:432, author = {Ran Canetti and Yevgeniy Dodis and Rafael Pass and Shabsi Walfish}, title = {Universally Composable Security with Global Setup}, howpublished = {Cryptology ePrint Archive, Report 2006/432}, year = {2006}, url = {http://eprint.iacr.org/2006/432}, } @misc{cryptoeprint:2006:433, author = {Reihaneh Safavi-Naini and Peter Wild}, title = {Information Theoretic Bounds on Authentication Systems in Query Model}, howpublished = {Cryptology ePrint Archive, Report 2006/433}, year = {2006}, url = {http://eprint.iacr.org/2006/433}, } @misc{cryptoeprint:2006:434, author = {Deepak Kumar Dalai and Subhamoy Maitra}, title = {Balanced Boolean Functions with (more than) Maximum Algebraic Immunity}, howpublished = {Cryptology ePrint Archive, Report 2006/434}, year = {2006}, url = {http://eprint.iacr.org/2006/434}, } @misc{cryptoeprint:2006:435, author = {Shaddin F. Doghmi and Joshua D. Guttman and F. Javier Thayer}, title = {Searching for Shapes in Cryptographic Protocols (extended version)}, howpublished = {Cryptology ePrint Archive, Report 2006/435}, year = {2006}, url = {http://eprint.iacr.org/2006/435}, } @misc{cryptoeprint:2006:436, author = {Iftach Haitner and Omer Reingold}, title = {Statistically-Hiding Commitment from Any One-Way Function}, howpublished = {Cryptology ePrint Archive, Report 2006/436}, year = {2006}, url = {http://eprint.iacr.org/2006/436}, } @misc{cryptoeprint:2006:437, author = {An Braeken, Ventzislav Nikov, Svetla Nikova}, title = {On Zigzag Functions and Related Objects in New Metric}, howpublished = {Cryptology ePrint Archive, Report 2006/437}, year = {2006}, url = {http://eprint.iacr.org/2006/437}, } @misc{cryptoeprint:2006:438, author = {Jean-Philippe Aumasson}, title = {On the pseudo-random generator ISAAC}, howpublished = {Cryptology ePrint Archive, Report 2006/438}, year = {2006}, url = {http://eprint.iacr.org/2006/438}, } @misc{cryptoeprint:2006:439, author = {Jun Zhong Dake He}, title = {A New Type of Group Blind Signature Scheme Based on Bilinear Pairings}, howpublished = {Cryptology ePrint Archive, Report 2006/439}, year = {2006}, url = {http://eprint.iacr.org/2006/439}, } @misc{cryptoeprint:2006:440, author = {Jun Zhong Dake He}, title = {A New Type of Group Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2006/440}, year = {2006}, url = {http://eprint.iacr.org/2006/440}, } @misc{cryptoeprint:2006:441, author = {Donghoon Chang, Mridul Nandi}, title = {General Distinguishing Attacks on NMAC and HMAC with Birthday Attack Complexity}, howpublished = {Cryptology ePrint Archive, Report 2006/441}, year = {2006}, url = {http://eprint.iacr.org/2006/441}, } @misc{cryptoeprint:2006:442, author = {Je Hong Park}, title = {An attack on the certificateless signature scheme from EUC Workshops 2006}, howpublished = {Cryptology ePrint Archive, Report 2006/442}, year = {2006}, url = {http://eprint.iacr.org/2006/442}, } @misc{cryptoeprint:2006:443, author = {Yvo Desmedt and Tanja Lange and Mike Burmester}, title = {Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups}, howpublished = {Cryptology ePrint Archive, Report 2006/443}, year = {2006}, url = {http://eprint.iacr.org/2006/443}, } @misc{cryptoeprint:2006:444, author = {Chris Peikert and Alon Rosen}, title = {Lattices that Admit Logarithmic Worst-Case to Average-Case Connection Factors}, howpublished = {Cryptology ePrint Archive, Report 2006/444}, year = {2006}, url = {http://eprint.iacr.org/2006/444}, } @misc{cryptoeprint:2006:445, author = {Lilya Budaghyan and Claude Carlet and Gregor Leander}, title = {A class of quadratic APN binomials inequivalent to power functions}, howpublished = {Cryptology ePrint Archive, Report 2006/445}, year = {2006}, url = {http://eprint.iacr.org/2006/445}, } @misc{cryptoeprint:2006:446, author = {Shengbao Wang and Zhenfu Cao and Kim-Kwang Raymond Choo}, title = {New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles)}, howpublished = {Cryptology ePrint Archive, Report 2006/446}, year = {2006}, url = {http://eprint.iacr.org/2006/446}, } @misc{cryptoeprint:2006:447, author = {Yael Gertner and Tal Malkin and Steven Myers}, title = {Towards a Separation of Semantic and CCA Security for Public Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2006/447}, year = {2006}, url = {http://eprint.iacr.org/2006/447}, } @misc{cryptoeprint:2006:448, author = {Tri van Le, Mike Burmester, Breno de Medeiros}, title = {Universally Composable and Forward Secure RFID Authentication and Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2006/448}, year = {2006}, url = {http://eprint.iacr.org/2006/448}, } @misc{cryptoeprint:2006:449, author = {Mihir Bellare and Phillip Rogaway}, title = {Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals}, howpublished = {Cryptology ePrint Archive, Report 2006/449}, year = {2006}, url = {http://eprint.iacr.org/2006/449}, } @misc{cryptoeprint:2006:450, author = {M. Barbosa and P. Farshim}, title = {Secure Cryptographic Workflow in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2006/450}, year = {2006}, url = {http://eprint.iacr.org/2006/450}, } @misc{cryptoeprint:2006:451, author = {Jongsung Kim}, title = {Combined Differential, Linear and Related-Key Attacks on Block Ciphers and MAC Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2006/451}, year = {2006}, url = {http://eprint.iacr.org/2006/451}, } @misc{cryptoeprint:2006:452, author = {TingMao Chang, Jin Zhou, YaJuan Zhang, YueFei Zhu}, title = {Hybrid Protocol For Password-based Key Exchange in Three-party Setting}, howpublished = {Cryptology ePrint Archive, Report 2006/452}, year = {2006}, url = {http://eprint.iacr.org/2006/452}, } @misc{cryptoeprint:2006:453, author = {Zhenfeng Zhang and Dengguo Feng}, title = {Key Replacement Attack on a Certificateless Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2006/453}, year = {2006}, url = {http://eprint.iacr.org/2006/453}, } @misc{cryptoeprint:2006:454, author = {Jan Camenisch and Susan Hohenberger and Markulf Kohlweiss and Anna Lysyanskaya and Mira Meyerovich}, title = {How to Win the Clone Wars: \\ Efficient Periodic n-Times Anonymous Authentication}, howpublished = {Cryptology ePrint Archive, Report 2006/454}, year = {2006}, url = {http://eprint.iacr.org/2006/454}, } @misc{cryptoeprint:2006:455, author = {Jonathan Katz}, title = {On Achieving the ''Best of Both Worlds'' in Secure Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2006/455}, year = {2006}, url = {http://eprint.iacr.org/2006/455}, } @misc{cryptoeprint:2006:456, author = {Ueli Maurer and Krzysztof Pietrzak and Renato Renner}, title = {Indistinguishability Amplification}, howpublished = {Cryptology ePrint Archive, Report 2006/456}, year = {2006}, url = {http://eprint.iacr.org/2006/456}, } @misc{cryptoeprint:2006:457, author = {Li An-Ping}, title = {Linear Approximating to Integer Addition}, howpublished = {Cryptology ePrint Archive, Report 2006/457}, year = {2006}, url = {http://eprint.iacr.org/2006/457}, } @misc{cryptoeprint:2006:458, author = {Aggelos Kiayias and Moti Yung}, title = {Copyrighting Public-key Functions and Applications to Black-box Traitor Tracing}, howpublished = {Cryptology ePrint Archive, Report 2006/458}, year = {2006}, url = {http://eprint.iacr.org/2006/458}, } @misc{cryptoeprint:2006:459, author = {Claude Carlet}, title = {Recursive lower bounds on the nonlinearity profile of Boolean functions and their applications}, howpublished = {Cryptology ePrint Archive, Report 2006/459}, year = {2006}, url = {http://eprint.iacr.org/2006/459}, } @misc{cryptoeprint:2006:460, author = {Donghoon Chang}, title = {Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006}, howpublished = {Cryptology ePrint Archive, Report 2006/460}, year = {2006}, url = {http://eprint.iacr.org/2006/460}, } @misc{cryptoeprint:2006:461, author = {Oded Goldreich}, title = {On Post-Modern Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2006/461}, year = {2006}, url = {http://eprint.iacr.org/2006/461}, } @misc{cryptoeprint:2006:462, author = {Lei Duo and Chao Li}, title = {Improved Collision and Preimage Resistance Bounds on PGV Schemes}, howpublished = {Cryptology ePrint Archive, Report 2006/462}, year = {2006}, url = {http://eprint.iacr.org/2006/462}, } @misc{cryptoeprint:2006:463, author = {Dennis Hofheinz and John Malone-Lee and Martijn Stam}, title = {Obfuscation for Cryptographic Purposes}, howpublished = {Cryptology ePrint Archive, Report 2006/463}, year = {2006}, url = {http://eprint.iacr.org/2006/463}, } @misc{cryptoeprint:2006:464, author = {Giuseppe Ateniese and Jan Camenisch and Marc Joye and Gene Tsudik}, title = {Remarks on "Analysis of One Popular Group Signature Scheme'' in Asiacrypt 2006}, howpublished = {Cryptology ePrint Archive, Report 2006/464}, year = {2006}, url = {http://eprint.iacr.org/2006/464}, } @misc{cryptoeprint:2006:465, author = {Ran Canetti}, title = {Security and Composition of Cryptographic Protocols: A Tutorial}, howpublished = {Cryptology ePrint Archive, Report 2006/465}, year = {2006}, url = {http://eprint.iacr.org/2006/465}, } @misc{cryptoeprint:2006:466, author = {Jason E. Gower}, title = {Prime Order Primitive Subgroups in Torus-Based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2006/466}, year = {2006}, url = {http://eprint.iacr.org/2006/466}, } @misc{cryptoeprint:2006:467, author = {Donghoon Chang and Moti Yung}, title = {Do We Need to Vary the Constants? (Methodological Investigation of Block-Cipher Based Hash Functions)}, howpublished = {Cryptology ePrint Archive, Report 2006/467}, year = {2006}, url = {http://eprint.iacr.org/2006/467}, } @misc{cryptoeprint:2006:468, author = {Julien Bringer and Herve Chabanne and Emmanuelle Dottax}, title = {White Box Cryptography: Another Attempt}, howpublished = {Cryptology ePrint Archive, Report 2006/468}, year = {2006}, url = {http://eprint.iacr.org/2006/468}, } @misc{cryptoeprint:2006:469, author = {David Mireles}, title = {An Attack on Disguised Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2006/469}, year = {2006}, url = {http://eprint.iacr.org/2006/469}, } @misc{cryptoeprint:2006:470, author = {Qiang Tang}, title = {On the security of a group key agreement protocol}, howpublished = {Cryptology ePrint Archive, Report 2006/470}, year = {2006}, url = {http://eprint.iacr.org/2006/470}, } @misc{cryptoeprint:2006:471, author = {Augusto Jun Devegili and Colm \'O~h\'Eigeartaigh and Michael Scott and Ricardo Dahab}, title = {Multiplication and Squaring on Pairing-Friendly Fields}, howpublished = {Cryptology ePrint Archive, Report 2006/471}, year = {2006}, url = {http://eprint.iacr.org/2006/471}, } @misc{cryptoeprint:2006:472, author = {Luis Teixeira d'Aguiar Norton Brandao}, title = {A Framework for Interactive Argument Systems using Quasigroupic Homorphic Commitment}, howpublished = {Cryptology ePrint Archive, Report 2006/472}, year = {2006}, url = {http://eprint.iacr.org/2006/472}, } @misc{cryptoeprint:2006:473, author = {Matthew Green and Giuseppe Ateniese}, title = {Identity-Based Proxy Re-encryption}, howpublished = {Cryptology ePrint Archive, Report 2006/473}, year = {2006}, url = {http://eprint.iacr.org/2006/473}, } @misc{cryptoeprint:2006:474, author = {Chang-An Zhao and Fangguo Zhang and Jiwu Huang}, title = {Speeding up the Bilinear Pairings Computation on Curves with Automorphisms}, howpublished = {Cryptology ePrint Archive, Report 2006/474}, year = {2006}, url = {http://eprint.iacr.org/2006/474}, } @misc{cryptoeprint:2006:475, author = {Håvard Raddum and Igor Semaev}, title = {New Technique for Solving Sparse Equation Systems}, howpublished = {Cryptology ePrint Archive, Report 2006/475}, year = {2006}, url = {http://eprint.iacr.org/2006/475}, } @misc{cryptoeprint:2006:476, author = {Jeong Ok Kwon and Ik Rae Jeong and Kouichi Sakurai and Dong Hoon Lee }, title = {Password-Authenticated Multi-Party Key Exchange with Different Passwords }, howpublished = {Cryptology ePrint Archive, Report 2006/476}, year = {2006}, url = {http://eprint.iacr.org/2006/476}, } @misc{cryptoeprint:2006:477, author = {William R. Speirs II and Samuel S. Wagstaff, Jr.}, title = {Dynamic Cryptographic Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2006/477}, year = {2006}, url = {http://eprint.iacr.org/2006/477}, } @misc{cryptoeprint:2006:478, author = {Donghoon Chang}, title = {Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA}, howpublished = {Cryptology ePrint Archive, Report 2006/478}, year = {2006}, url = {http://eprint.iacr.org/2006/478}, } @misc{cryptoeprint:2006:479, author = {Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci}, title = {Efficient Provably-Secure Hierarchical Key Assignment Schemes}, howpublished = {Cryptology ePrint Archive, Report 2006/479}, year = {2006}, url = {http://eprint.iacr.org/2006/479}, } @misc{cryptoeprint:2006:480, author = {Shengli Liu and Fangguo Zhang}, title = {Cryptanalysis of REESSE1+ Public Key Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2006/480}, year = {2006}, url = {http://eprint.iacr.org/2006/480}, } @misc{cryptoeprint:2006:481, author = {Donghoon Chang}, title = {A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2006/481}, year = {2006}, url = {http://eprint.iacr.org/2006/481}, } @misc{cryptoeprint:2006:482, author = {Giovanni Agosta and Gerardo Pelosi}, title = {Countermeasures for the Simple Branch Prediction Analysis}, howpublished = {Cryptology ePrint Archive, Report 2006/482}, year = {2006}, url = {http://eprint.iacr.org/2006/482}, } @misc{cryptoeprint:2006:483, author = {Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci}, title = {New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes}, howpublished = {Cryptology ePrint Archive, Report 2006/483}, year = {2006}, url = {http://eprint.iacr.org/2006/483}, } @misc{cryptoeprint:2006:484, author = {Xianhui Lu , Dake He, Guomin Li}, title = {A New Identity Based Encryption Scheme From Pairing}, howpublished = {Cryptology ePrint Archive, Report 2006/484}, year = {2006}, url = {http://eprint.iacr.org/2006/484}, } @misc{cryptoeprint:2006:485, author = {Hidenori Kuwakado and Masakatu Morii}, title = {Indifferentiability of Single-Block-Length and Rate-1 Compression Functions}, howpublished = {Cryptology ePrint Archive, Report 2006/485}, year = {2006}, url = {http://eprint.iacr.org/2006/485}, } @misc{cryptoeprint:2006:486, author = {Arnab Roy and Anupam Datta and Ante Derek and John C. Mitchell}, title = {Inductive Trace Properties for Computational Security}, howpublished = {Cryptology ePrint Archive, Report 2006/486}, year = {2006}, url = {http://eprint.iacr.org/2006/486}, } @misc{cryptoeprint:2007:001, author = {Laura Hitt}, title = {Families of genus 2 curves with small embedding degree}, howpublished = {Cryptology ePrint Archive, Report 2007/001}, year = {2007}, url = {http://eprint.iacr.org/2007/001}, } @misc{cryptoeprint:2007:002, author = {Huang Lin and Zhenfu Cao}, title = {Cryptanalysis of An Oblivious Polynomial Evaluation Protocol Based On Polynomial Reconstruction Problem}, howpublished = {Cryptology ePrint Archive, Report 2007/002}, year = {2007}, url = {http://eprint.iacr.org/2007/002}, } @misc{cryptoeprint:2007:003, author = {Johann Groszschaedl and Alexander Szekely and Stefan Tillich}, title = {The Energy Cost of Cryptographic Key Establishment in Wireless Sensor Networks}, howpublished = {Cryptology ePrint Archive, Report 2007/003}, year = {2007}, url = {http://eprint.iacr.org/2007/003}, } @misc{cryptoeprint:2007:004, author = {*Jue-Sam Chou, Yalin Chen, Chung-Ju Chan}, title = {Cryptanalysis of Hwang-Chang’s a Time-Stamp Protocol for Digital Watermarking}, howpublished = {Cryptology ePrint Archive, Report 2007/004}, year = {2007}, url = {http://eprint.iacr.org/2007/004}, } @misc{cryptoeprint:2007:005, author = {Lan Nguyen}, title = {Privacy-Protecting Coupon System Revisited}, howpublished = {Cryptology ePrint Archive, Report 2007/005}, year = {2007}, url = {http://eprint.iacr.org/2007/005}, } @misc{cryptoeprint:2007:006, author = {Lan Nguyen}, title = {Efficient Dynamic k-Times Anonymous Authentication}, howpublished = {Cryptology ePrint Archive, Report 2007/006}, year = {2007}, url = {http://eprint.iacr.org/2007/006}, } @misc{cryptoeprint:2007:007, author = {Wei Gao and Xueli Wang and Guilin Wang and Fei Li}, title = {One-Round ID-Based Blind Signature Scheme without ROS Assumption}, howpublished = {Cryptology ePrint Archive, Report 2007/007}, year = {2007}, url = {http://eprint.iacr.org/2007/007}, } @misc{cryptoeprint:2007:008, author = {Dong Hoon Lee and Je Hong Park and Jaewoo Han}, title = {Security analysis of the variant of the self-shrinking generator proposed at ICISC 2006}, howpublished = {Cryptology ePrint Archive, Report 2007/008}, year = {2007}, url = {http://eprint.iacr.org/2007/008}, } @misc{cryptoeprint:2007:009, author = {Zhenfu Cao, Xiaolei Dong and Licheng Wang}, title = {New Public Key Cryptosystems Using Polynomials over Non-commutative Rings}, howpublished = {Cryptology ePrint Archive, Report 2007/009}, year = {2007}, url = {http://eprint.iacr.org/2007/009}, } @misc{cryptoeprint:2007:010, author = {David Freeman and Kristin Lauter}, title = {Computing endomorphism rings of Jacobians of genus 2 curves over finite fields}, howpublished = {Cryptology ePrint Archive, Report 2007/010}, year = {2007}, url = {http://eprint.iacr.org/2007/010}, } @misc{cryptoeprint:2007:011, author = {Jin Zhou and TingMao Chang and YaJuan Zhang and YueFei Zhu}, title = {Universally Composable Key-evolving Signature}, howpublished = {Cryptology ePrint Archive, Report 2007/011}, year = {2007}, url = {http://eprint.iacr.org/2007/011}, } @misc{cryptoeprint:2007:012, author = {Atefeh Mashatan and Douglas R. Stinson}, title = {Interactive two-channel message authentication based on interactive-collision Resistant hash functions}, howpublished = {Cryptology ePrint Archive, Report 2007/012}, year = {2007}, url = {http://eprint.iacr.org/2007/012}, } @misc{cryptoeprint:2007:013, author = {Seiichi Matsuda and Naoki Kanayama and Florian Hess and Eiji Okamoto}, title = {Optimised versions of the Ate and Twisted Ate Pairings}, howpublished = {Cryptology ePrint Archive, Report 2007/013}, year = {2007}, url = {http://eprint.iacr.org/2007/013}, } @misc{cryptoeprint:2007:014, author = {Shai Halevi}, title = {Invertible Universal Hashing and the TET Encryption Mode}, howpublished = {Cryptology ePrint Archive, Report 2007/014}, year = {2007}, url = {http://eprint.iacr.org/2007/014}, } @misc{cryptoeprint:2007:015, author = {Aggelos Kiayias and Yiannis Tsiounis and Moti Yung}, title = {Group Encryption}, howpublished = {Cryptology ePrint Archive, Report 2007/015}, year = {2007}, url = {http://eprint.iacr.org/2007/015}, } @misc{cryptoeprint:2007:016, author = {Sean O'Neil and Benjamin Gittins and Howard A. Landman}, title = {VEST Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2007/016}, year = {2007}, url = {http://eprint.iacr.org/2007/016}, } @misc{cryptoeprint:2007:017, author = {Bo Qin and Qianhong Wu and Willy Susilo and Yi Mu and Yumin Wang}, title = {Group Decryption}, howpublished = {Cryptology ePrint Archive, Report 2007/017}, year = {2007}, url = {http://eprint.iacr.org/2007/017}, } @misc{cryptoeprint:2007:018, author = {Sherman S.M. Chow and Kim-Kwang Raymond Choo}, title = {Strongly-Secure Identity-based Key Agreement and Anonymous Extension}, howpublished = {Cryptology ePrint Archive, Report 2007/018}, year = {2007}, url = {http://eprint.iacr.org/2007/018}, } @misc{cryptoeprint:2007:019, author = {Changshe Ma, Jian Weng and Dong Zheng}, title = {Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2007/019}, year = {2007}, url = {http://eprint.iacr.org/2007/019}, } @misc{cryptoeprint:2007:020, author = {Leonardo B. Oliveira and Diego Aranha and Eduardo Morais and Felipe Daguano and Julio Lo'pez and Ricardo Dahab}, title = {TinyTate: Identity-Based Encryption for Sensor Networks}, howpublished = {Cryptology ePrint Archive, Report 2007/020}, year = {2007}, url = {http://eprint.iacr.org/2007/020}, } @misc{cryptoeprint:2007:021, author = {Alexander Maximov and Alex Biryukov}, title = {Two Trivial Attacks on Trivium}, howpublished = {Cryptology ePrint Archive, Report 2007/021}, year = {2007}, url = {http://eprint.iacr.org/2007/021}, } @misc{cryptoeprint:2007:022, author = {O. A. Logachev}, title = {On Perfectly Balanced Boolean Functions}, howpublished = {Cryptology ePrint Archive, Report 2007/022}, year = {2007}, url = {http://eprint.iacr.org/2007/022}, } @misc{cryptoeprint:2007:023, author = {Masayuki Abe and Yang Cui and Hideki Imai and Eike Kiltz}, title = {Efficient Hybrid Encryption from ID-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2007/023}, year = {2007}, url = {http://eprint.iacr.org/2007/023}, } @misc{cryptoeprint:2007:024, author = {Gregory V. Bard, and Nicolas T. Courtois, and Chris Jefferson.}, title = {Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers}, howpublished = {Cryptology ePrint Archive, Report 2007/024}, year = {2007}, url = {http://eprint.iacr.org/2007/024}, } @misc{cryptoeprint:2007:025, author = {Rafail Ostrovsky and Omkant Pandey and Amit Sahai}, title = {Private Locally Decodable Codes}, howpublished = {Cryptology ePrint Archive, Report 2007/025}, year = {2007}, url = {http://eprint.iacr.org/2007/025}, } @misc{cryptoeprint:2007:026, author = {Shengbao Wang and Zhenfu Cao and Maurizio Adriano Strangio and Lihua Wang}, title = {Cryptanalysis and Improvement of an Elliptic Curve Diffie-Hellman Key Agreement Protocol}, howpublished = {Cryptology ePrint Archive, Report 2007/026}, year = {2007}, url = {http://eprint.iacr.org/2007/026}, } @misc{cryptoeprint:2007:027, author = {Nachiketh R. Potlapally}, title = {Verifying Data Integrity with Few Queries to Untrusted Memory}, howpublished = {Cryptology ePrint Archive, Report 2007/027}, year = {2007}, url = {http://eprint.iacr.org/2007/027}, } @misc{cryptoeprint:2007:028, author = {Debrup Chakraborty and Palash Sarkar}, title = {HCH: A New Tweakable Enciphering Scheme Using the Hash-Counter-Hash Approach}, howpublished = {Cryptology ePrint Archive, Report 2007/028}, year = {2007}, url = {http://eprint.iacr.org/2007/028}, } @misc{cryptoeprint:2007:029, author = {Debrup Chakraborty and Palash Sarkar}, title = {A General Construction of Tweakable Block Ciphers and Different Modes of Operations}, howpublished = {Cryptology ePrint Archive, Report 2007/029}, year = {2007}, url = {http://eprint.iacr.org/2007/029}, } @misc{cryptoeprint:2007:030, author = {Yang Cui and Eiichiro Fujisaki and Goichiro Hanaoka and Hideki Imai and Rui Zhang}, title = {Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions}, howpublished = {Cryptology ePrint Archive, Report 2007/030}, year = {2007}, url = {http://eprint.iacr.org/2007/030}, } @misc{cryptoeprint:2007:031, author = {Mridul Nandi and Avradip Mandal}, title = {Improved Security Analysis of PMAC}, howpublished = {Cryptology ePrint Archive, Report 2007/031}, year = {2007}, url = {http://eprint.iacr.org/2007/031}, } @misc{cryptoeprint:2007:032, author = {Avradip Mandal and Mridul Nandi}, title = {An improved collision probability for CBC-MAC and PMAC}, howpublished = {Cryptology ePrint Archive, Report 2007/032}, year = {2007}, url = {http://eprint.iacr.org/2007/032}, } @misc{cryptoeprint:2007:033, author = {Eike Kiltz}, title = {From Selective-ID to Full Security: The Case of the Inversion-Based Boneh-Boyen IBE Scheme}, howpublished = {Cryptology ePrint Archive, Report 2007/033}, year = {2007}, url = {http://eprint.iacr.org/2007/033}, } @misc{cryptoeprint:2007:034, author = {Li An-Ping}, title = {A New Type of Cipher: DICING_CSB}, howpublished = {Cryptology ePrint Archive, Report 2007/034}, year = {2007}, url = {http://eprint.iacr.org/2007/034}, } @misc{cryptoeprint:2007:035, author = {Louis Goubin and Jean-Michel Masereel and Michael Quisquater}, title = {Cryptanalysis of white box DES implementations}, howpublished = {Cryptology ePrint Archive, Report 2007/035}, year = {2007}, url = {http://eprint.iacr.org/2007/035}, } @misc{cryptoeprint:2007:036, author = {Eike Kiltz}, title = {Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman}, howpublished = {Cryptology ePrint Archive, Report 2007/036}, year = {2007}, url = {http://eprint.iacr.org/2007/036}, } @misc{cryptoeprint:2007:037, author = {Nicholas Kolokotronis and Konstantinos Limniotis and Nicholas Kalouptsidis}, title = {Best Quadratic Approximations of Cubic Boolean Functions}, howpublished = {Cryptology ePrint Archive, Report 2007/037}, year = {2007}, url = {http://eprint.iacr.org/2007/037}, } @misc{cryptoeprint:2007:038, author = {Joo Yeon Cho and Josef Pieprzyk}, title = {Multiple Modular Additions and Crossword Puzzle Attack on NLSv2}, howpublished = {Cryptology ePrint Archive, Report 2007/038}, year = {2007}, url = {http://eprint.iacr.org/2007/038}, } @misc{cryptoeprint:2007:039, author = {Onur Aciicmez and Shay Gueron and Jean-Pierre Seifert}, title = {New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures}, howpublished = {Cryptology ePrint Archive, Report 2007/039}, year = {2007}, url = {http://eprint.iacr.org/2007/039}, } @misc{cryptoeprint:2007:040, author = {Pradeep Kumar Mishra and Vassil Dimitrov}, title = {Efficient Quintuple Formulas for Elliptic Curves and Efficient Scalar Multiplication Using Multibase Number Representation}, howpublished = {Cryptology ePrint Archive, Report 2007/040}, year = {2007}, url = {http://eprint.iacr.org/2007/040}, } @misc{cryptoeprint:2007:041, author = {B. Skoric and S. Katzenbeisser and M.U. Celik}, title = {Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes}, howpublished = {Cryptology ePrint Archive, Report 2007/041}, year = {2007}, url = {http://eprint.iacr.org/2007/041}, } @misc{cryptoeprint:2007:042, author = {J. Wu and D. R. Stinson}, title = {Authorship Proof for Textual Document}, howpublished = {Cryptology ePrint Archive, Report 2007/042}, year = {2007}, url = {http://eprint.iacr.org/2007/042}, } @misc{cryptoeprint:2007:043, author = {Orhun Kara}, title = {Reflection Attacks on Product Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2007/043}, year = {2007}, url = {http://eprint.iacr.org/2007/043}, } @misc{cryptoeprint:2007:044, author = {Philip Hawkes and Cameron McDonald and Michael Paddon and Gregory Rose and Miriam Wiggers de Vries}, title = {Design and Primitive Specification for Shannon}, howpublished = {Cryptology ePrint Archive, Report 2007/044}, year = {2007}, url = {http://eprint.iacr.org/2007/044}, } @misc{cryptoeprint:2007:045, author = {Jean-Luc Beuchat and Nicolas Brisebarre and Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto}, title = {A Coprocessor for the Final Exponentiation of the $\eta_T$ Pairing in Characteristic Three}, howpublished = {Cryptology ePrint Archive, Report 2007/045}, year = {2007}, url = {http://eprint.iacr.org/2007/045}, } @misc{cryptoeprint:2007:046, author = {Kaoru Kurosawa and Takeshi Koshiba}, title = {Direct Reduction of String (1,2)-OT to Rabin's OT}, howpublished = {Cryptology ePrint Archive, Report 2007/046}, year = {2007}, url = {http://eprint.iacr.org/2007/046}, } @misc{cryptoeprint:2007:047, author = {Joonsang Baek and Willy Susilo and Jianying Zhou}, title = {New Constructions of Fuzzy Identity-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2007/047}, year = {2007}, url = {http://eprint.iacr.org/2007/047}, } @misc{cryptoeprint:2007:048, author = {Daniel R. L. Brown and Kristian Gj{\o}steen}, title = {A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator}, howpublished = {Cryptology ePrint Archive, Report 2007/048}, year = {2007}, url = {http://eprint.iacr.org/2007/048}, } @misc{cryptoeprint:2007:049, author = {jin zhou and ya-juan zhang and yue-fei zhu}, title = {Security Arguments for a Class of ID-based Signatures}, howpublished = {Cryptology ePrint Archive, Report 2007/049}, year = {2007}, url = {http://eprint.iacr.org/2007/049}, } @misc{cryptoeprint:2007:050, author = {Vlastimil KLIMA}, title = {Special block cipher family DN and new generation SNMAC-type hash function family HDN}, howpublished = {Cryptology ePrint Archive, Report 2007/050}, year = {2007}, url = {http://eprint.iacr.org/2007/050}, } @misc{cryptoeprint:2007:051, author = {Tri van Le, Mike Burmester and Breno de Medeiros}, title = {Forward-secure RFID Authentication and Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2007/051}, year = {2007}, url = {http://eprint.iacr.org/2007/051}, } @misc{cryptoeprint:2007:052, author = {Di Ma, and Gene Tsudik}, title = {Forward-Secure Sequential Aggregate Authentication}, howpublished = {Cryptology ePrint Archive, Report 2007/052}, year = {2007}, url = {http://eprint.iacr.org/2007/052}, } @misc{cryptoeprint:2007:053, author = {M. Barbosa and A. Moss and D. Page}, title = {Compiler Assisted Elliptic Curve Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2007/053}, year = {2007}, url = {http://eprint.iacr.org/2007/053}, } @misc{cryptoeprint:2007:054, author = {Souradyuti Paul}, title = {Cryptanalysis of Stream Ciphers Based on Arrays and Modular Addition}, howpublished = {Cryptology ePrint Archive, Report 2007/054}, year = {2007}, url = {http://eprint.iacr.org/2007/054}, } @misc{cryptoeprint:2007:055, author = {Andrey Bogdanov}, title = {Cryptanalysis of the KeeLoq block cipher}, howpublished = {Cryptology ePrint Archive, Report 2007/055}, year = {2007}, url = {http://eprint.iacr.org/2007/055}, } @misc{cryptoeprint:2007:056, author = {Somesh Jha and Stefan Katzenbeisser and Christian Schallhart and Helmut Veith and Stephen Chenney}, title = {Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments}, howpublished = {Cryptology ePrint Archive, Report 2007/056}, year = {2007}, url = {http://eprint.iacr.org/2007/056}, } @misc{cryptoeprint:2007:057, author = {David Freeman}, title = {Constructing pairing-friendly genus 2 curves over prime fields with ordinary Jacobians}, howpublished = {Cryptology ePrint Archive, Report 2007/057}, year = {2007}, url = {http://eprint.iacr.org/2007/057}, } @misc{cryptoeprint:2007:058, author = {Lilya Budaghyan}, title = {The simplest method for constructing APN polynomials EA-inequivalent to power functions}, howpublished = {Cryptology ePrint Archive, Report 2007/058}, year = {2007}, url = {http://eprint.iacr.org/2007/058}, } @misc{cryptoeprint:2007:059, author = {Rafail Ostrovsky and William E. Skeith III}, title = {A Survey of Single Database PIR: Techniques and Applications}, howpublished = {Cryptology ePrint Archive, Report 2007/059}, year = {2007}, url = {http://eprint.iacr.org/2007/059}, } @misc{cryptoeprint:2007:060, author = {Yonatan Aumann and Yehuda Lindell}, title = {Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2007/060}, year = {2007}, url = {http://eprint.iacr.org/2007/060}, } @misc{cryptoeprint:2007:061, author = {Neil Costigan and Michael Scott}, title = {Accelerating SSL using the Vector processors in IBM's Cell Broadband Engine for Sony's Playstation 3}, howpublished = {Cryptology ePrint Archive, Report 2007/061}, year = {2007}, url = {http://eprint.iacr.org/2007/061}, } @misc{cryptoeprint:2007:062, author = {Nicolas T. Courtois and Gregory V. Bard and David Wagner}, title = {Algebraic and Slide Attacks on KeeLoq}, howpublished = {Cryptology ePrint Archive, Report 2007/062}, year = {2007}, url = {http://eprint.iacr.org/2007/062}, } @misc{cryptoeprint:2007:063, author = {Lilya Budaghyan and Claude Carlet and Gregor Leander}, title = {Constructing new APN functions from known ones}, howpublished = {Cryptology ePrint Archive, Report 2007/063}, year = {2007}, url = {http://eprint.iacr.org/2007/063}, } @misc{cryptoeprint:2007:064, author = {Rafail Ostrovsky and William E. Skeith III}, title = {Algebraic Lower Bounds for Computing on Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2007/064}, year = {2007}, url = {http://eprint.iacr.org/2007/064}, } @misc{cryptoeprint:2007:065, author = {Kaoru Kurosawa and Wataru Kishimoto and Takeshi Koshiba}, title = {How to Derive Lower Bound on Oblivious Transfer Reduction}, howpublished = {Cryptology ePrint Archive, Report 2007/065}, year = {2007}, url = {http://eprint.iacr.org/2007/065}, } @misc{cryptoeprint:2007:066, author = {Tetsuya Izu and Jun Kogure and Takeshi Koshiba and Takeshi Shimoyama}, title = {Low-Density Attack Revisited}, howpublished = {Cryptology ePrint Archive, Report 2007/066}, year = {2007}, url = {http://eprint.iacr.org/2007/066}, } @misc{cryptoeprint:2007:067, author = {withdrawn}, title = {withdrawn}, howpublished = {Cryptology ePrint Archive, Report 2007/067}, year = {2007}, url = {http://eprint.iacr.org/2007/067}, } @misc{cryptoeprint:2007:068, author = {Man Ho Au and Joseph K. Liu and Tsz Hon Yuen and Duncan S. Wong}, title = {Efficient Hierarchical Identity Based Signature in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2007/068}, year = {2007}, url = {http://eprint.iacr.org/2007/068}, } @misc{cryptoeprint:2007:069, author = {Dennis Y. W. Liu and Duncan S. Wong and Xinyi Huang and Guilin Wang and Qiong Huang and Yi Mu and Willy Susilo}, title = {Nominative Signature: Application, Security Model and Construction}, howpublished = {Cryptology ePrint Archive, Report 2007/069}, year = {2007}, url = {http://eprint.iacr.org/2007/069}, } @misc{cryptoeprint:2007:070, author = {Alexander Maximov}, title = {Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers (Corrected)}, howpublished = {Cryptology ePrint Archive, Report 2007/070}, year = {2007}, url = {http://eprint.iacr.org/2007/070}, } @misc{cryptoeprint:2007:071, author = {Ahto Buldas and Sven Laur}, title = {Knowledge-Binding Commitments with Applications in Time-Stamping (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2007/071}, year = {2007}, url = {http://eprint.iacr.org/2007/071}, } @misc{cryptoeprint:2007:072, author = {Namin Yu and Howard M. Heys}, title = {A Hybrid Approach to Concurrent Error Detection for a Compact ASIC Implementation of the Advanced Encryption Standard}, howpublished = {Cryptology ePrint Archive, Report 2007/072}, year = {2007}, url = {http://eprint.iacr.org/2007/072}, } @misc{cryptoeprint:2007:073, author = {Dan Boneh and Eyal Kushilevitz and Rafail Ostrovsky and William E. Skeith III}, title = {Public Key Encryption that Allows PIR Queries}, howpublished = {Cryptology ePrint Archive, Report 2007/073}, year = {2007}, url = {http://eprint.iacr.org/2007/073}, } @misc{cryptoeprint:2007:074, author = {Hovav Shacham}, title = {A Cramer-Shoup Encryption Scheme from the Linear Assumption and from Progressively Weaker Linear Variants}, howpublished = {Cryptology ePrint Archive, Report 2007/074}, year = {2007}, url = {http://eprint.iacr.org/2007/074}, } @misc{cryptoeprint:2007:075, author = {Gautham Sekar and Souradyuti Paul and Bart Preneel}, title = {Weaknesses in the Pseudorandom Bit Generation Algorithms of the Stream Ciphers TPypy and TPy}, howpublished = {Cryptology ePrint Archive, Report 2007/075}, year = {2007}, url = {http://eprint.iacr.org/2007/075}, } @misc{cryptoeprint:2007:076, author = {Kaoru Kurosawa and Kazuhiro Suzuki}, title = {Almost Secure (1-Round, n-Channel) Message Transmission Scheme}, howpublished = {Cryptology ePrint Archive, Report 2007/076}, year = {2007}, url = {http://eprint.iacr.org/2007/076}, } @misc{cryptoeprint:2007:077, author = {Sugata Gangopadhyay}, title = {On bent functions with zero second derivatives}, howpublished = {Cryptology ePrint Archive, Report 2007/077}, year = {2007}, url = {http://eprint.iacr.org/2007/077}, } @misc{cryptoeprint:2007:078, author = {Zuzana Beerliova-Trubiniova and Matthias Fitzi and Martin Hirt and Ueli Maurer and Vassilis Zikas}, title = {MPC vs. SFE: Perfect Security in a Unified Corruption Model}, howpublished = {Cryptology ePrint Archive, Report 2007/078}, year = {2007}, url = {http://eprint.iacr.org/2007/078}, } @misc{cryptoeprint:2007:079, author = {Kazuhiro Suzuki and Kaoru Kurosawa}, title = {How To Find Many Collisions of 3-Pass HAVAL}, howpublished = {Cryptology ePrint Archive, Report 2007/079}, year = {2007}, url = {http://eprint.iacr.org/2007/079}, } @misc{cryptoeprint:2007:080, author = {Sujing Zhou, Dongdai Lin}, title = {Weakly only Unforgeable Signature and Its Application in Group Signature }, howpublished = {Cryptology ePrint Archive, Report 2007/080}, year = {2007}, url = {http://eprint.iacr.org/2007/080}, } @misc{cryptoeprint:2007:081, author = {Maurizio Adriano Strangio}, title = {Revisiting an Efficient Elliptic Curve Key Agreement Protocol}, howpublished = {Cryptology ePrint Archive, Report 2007/081}, year = {2007}, url = {http://eprint.iacr.org/2007/081}, } @misc{cryptoeprint:2007:082, author = {Shaoquan Jiang}, title = {Deniable Authentication on the Internet}, howpublished = {Cryptology ePrint Archive, Report 2007/082}, year = {2007}, url = {http://eprint.iacr.org/2007/082}, } @misc{cryptoeprint:2007:083, author = {Brett Hemenway and Rafail Ostrovsky}, title = {Public Key Encryption Which is Simultaneously a Locally-Decodable Error-Correcting Code}, howpublished = {Cryptology ePrint Archive, Report 2007/083}, year = {2007}, url = {http://eprint.iacr.org/2007/083}, } @misc{cryptoeprint:2007:084, author = {Sanjit Chatterjee and Palash Sarkar}, title = {Constant Size Ciphertext HIBE in the Augmented Selective-ID Model and its Extensions}, howpublished = {Cryptology ePrint Archive, Report 2007/084}, year = {2007}, url = {http://eprint.iacr.org/2007/084}, } @misc{cryptoeprint:2007:085, author = {Hongbo Yu, Xiaoyun Wang}, title = {MultiCollision Attack on the Compression Functions of MD4 and 3-Pass HAVAL}, howpublished = {Cryptology ePrint Archive, Report 2007/085}, year = {2007}, url = {http://eprint.iacr.org/2007/085}, } @misc{cryptoeprint:2007:086, author = {Ivan Damgard and Rune Thorbek}, title = {Non-Interactive Proofs for Integer Multiplication}, howpublished = {Cryptology ePrint Archive, Report 2007/086}, year = {2007}, url = {http://eprint.iacr.org/2007/086}, } @misc{cryptoeprint:2007:087, author = {Jie Liu and Jianhua Li}, title = {Improvement on a Digital Signature Scheme without using One-way Hash and Message Redundancy}, howpublished = {Cryptology ePrint Archive, Report 2007/087}, year = {2007}, url = {http://eprint.iacr.org/2007/087}, } @misc{cryptoeprint:2007:088, author = {Domingo Gomez and Jaime Gutierrez and Alvar Ibeas}, title = {An Algorithm for Finding Small Roots of Multivariate Polynomials over the Integers}, howpublished = {Cryptology ePrint Archive, Report 2007/088}, year = {2007}, url = {http://eprint.iacr.org/2007/088}, } @misc{cryptoeprint:2007:089, author = {Ueli Maurer and Dominik Raub}, title = {Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations}, howpublished = {Cryptology ePrint Archive, Report 2007/089}, year = {2007}, url = {http://eprint.iacr.org/2007/089}, } @misc{cryptoeprint:2007:090, author = {Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez and Guanrong Chen}, title = {On the security of an image encryption scheme}, howpublished = {Cryptology ePrint Archive, Report 2007/090}, year = {2007}, url = {http://eprint.iacr.org/2007/090}, } @misc{cryptoeprint:2007:091, author = {Jean-Luc Beuchat and Nicolas Brisebarre and J\'er\'emie Detrey and Eiji Okamoto}, title = {Arithmetic Operators for Pairing-Based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2007/091}, year = {2007}, url = {http://eprint.iacr.org/2007/091}, } @misc{cryptoeprint:2007:092, author = {Grzegorz Wojtenko}, title = {PRIME POINTS ON ELLIPTIC CURVES AND ITS IMPACT ON ECDLP}, howpublished = {Cryptology ePrint Archive, Report 2007/092}, year = {2007}, url = {http://eprint.iacr.org/2007/092}, } @misc{cryptoeprint:2007:093, author = {Claudio Soriente, Gene Tsudik, Ersin Uzun}, title = {HAPADEP: Human Asisted Pure Audio Device Pairing}, howpublished = {Cryptology ePrint Archive, Report 2007/093}, year = {2007}, url = {http://eprint.iacr.org/2007/093}, } @misc{cryptoeprint:2007:094, author = {Xavier Boyen}, title = {Mesh Signatures : How to Leak a Secret with Unwitting and Unwilling Participants}, howpublished = {Cryptology ePrint Archive, Report 2007/094}, year = {2007}, url = {http://eprint.iacr.org/2007/094}, } @misc{cryptoeprint:2007:095, author = {Qiong Huang and Duncan S. Wong}, title = {Generic Certificateless Encryption in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2007/095}, year = {2007}, url = {http://eprint.iacr.org/2007/095}, } @misc{cryptoeprint:2007:096, author = {R. Wm. Gosper and Rich Schroeppel}, title = {Somos Sequence Near-Addition Formulas and Modular Theta Functions}, howpublished = {Cryptology ePrint Archive, Report 2007/096}, year = {2007}, url = {http://eprint.iacr.org/2007/096}, } @misc{cryptoeprint:2007:097, author = {Christian Robenhagen Ravnsh{\o}j}, title = {Large Cyclic Subgroups of Jacobians of Hyperelliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2007/097}, year = {2007}, url = {http://eprint.iacr.org/2007/097}, } @misc{cryptoeprint:2007:098, author = {Lilya Budaghyan and Claude Carlet}, title = {Classes of Quadratic APN Trinomials and Hexanomials and Related Structures}, howpublished = {Cryptology ePrint Archive, Report 2007/098}, year = {2007}, url = {http://eprint.iacr.org/2007/098}, } @misc{cryptoeprint:2007:099, author = {Jaime Gutierrez and Alvar Ibeas}, title = {Inferring sequences produced by a linear congruential generator on elliptic curves missing high--order bits}, howpublished = {Cryptology ePrint Archive, Report 2007/099}, year = {2007}, url = {http://eprint.iacr.org/2007/099}, } @misc{cryptoeprint:2007:100, author = {Shengbao Wang and Zhenfu Cao}, title = {Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications}, howpublished = {Cryptology ePrint Archive, Report 2007/100}, year = {2007}, url = {http://eprint.iacr.org/2007/100}, } @misc{cryptoeprint:2007:101, author = {Yu Sasaki and Go Yamamoto and Kazumaro Aoki}, title = {Practical Password Recovery on an MD5 Challenge and Response}, howpublished = {Cryptology ePrint Archive, Report 2007/101}, year = {2007}, url = {http://eprint.iacr.org/2007/101}, } @misc{cryptoeprint:2007:102, author = {Ran Canetti and Ling Cheung and Nancy Lynch and Olivier Pereira}, title = {On the Role of Scheduling in Simulation-Based Security}, howpublished = {Cryptology ePrint Archive, Report 2007/102}, year = {2007}, url = {http://eprint.iacr.org/2007/102}, } @misc{cryptoeprint:2007:103, author = {Roberto Avanzi}, title = {Another Look at Square Roots and Traces (and Quadratic Equations) in Fields of Even Characteristic}, howpublished = {Cryptology ePrint Archive, Report 2007/103}, year = {2007}, url = {http://eprint.iacr.org/2007/103}, } @misc{cryptoeprint:2007:104, author = {Brecht Wyseur and Wil Michiels and Paul Gorissen and Bart Preneel}, title = {Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings}, howpublished = {Cryptology ePrint Archive, Report 2007/104}, year = {2007}, url = {http://eprint.iacr.org/2007/104}, } @misc{cryptoeprint:2007:105, author = {Nicholas A. Howgrave-Graham}, title = {Isodual Reduction of Lattices}, howpublished = {Cryptology ePrint Archive, Report 2007/105}, year = {2007}, url = {http://eprint.iacr.org/2007/105}, } @misc{cryptoeprint:2007:106, author = {Masao KASAHARA}, title = {A generalization of Secret Sharing Scheme on the Basis of Recovering Algorithm, K-RA}, howpublished = {Cryptology ePrint Archive, Report 2007/106}, year = {2007}, url = {http://eprint.iacr.org/2007/106}, } @misc{cryptoeprint:2007:107, author = {Yasuyuki MURAKAMI, Takeshi NASAKO}, title = {Knapsack Public-Key Cryptosystem Using Chinese Remainder Theorem}, howpublished = {Cryptology ePrint Archive, Report 2007/107}, year = {2007}, url = {http://eprint.iacr.org/2007/107}, } @misc{cryptoeprint:2007:108, author = {Joo Yeon Cho and Josef Pieprzyk}, title = {An Improved Distinguisher for Dragon}, howpublished = {Cryptology ePrint Archive, Report 2007/108}, year = {2007}, url = {http://eprint.iacr.org/2007/108}, } @misc{cryptoeprint:2007:109, author = {Thomas Ristenpart and Phillip Rogaway}, title = {How to Enrich the Message Space of a Cipher}, howpublished = {Cryptology ePrint Archive, Report 2007/109}, year = {2007}, url = {http://eprint.iacr.org/2007/109}, } @misc{cryptoeprint:2007:110, author = {Woo Sug Kang}, title = {Construction of Pairing-Friendly Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2007/110}, year = {2007}, url = {http://eprint.iacr.org/2007/110}, } @misc{cryptoeprint:2007:111, author = {Qingsong Ye and Huaxiong Wang and Christophe Tartary}, title = {Privacy-Preserving Distributed Set Intersection}, howpublished = {Cryptology ePrint Archive, Report 2007/111}, year = {2007}, url = {http://eprint.iacr.org/2007/111}, } @misc{cryptoeprint:2007:112, author = {Koh-ichi Nagao}, title = {Decomposed Attack for the Jacobian of a Hyperelliptic Curve over an Extension Field}, howpublished = {Cryptology ePrint Archive, Report 2007/112}, year = {2007}, url = {http://eprint.iacr.org/2007/112}, } @misc{cryptoeprint:2007:113, author = {Meng-Hui Lim and Sanggon Lee and Youngho Park and Hoonjae Lee}, title = {An Enhanced ID-based Deniable Authentication Protocol on Pairings}, howpublished = {Cryptology ePrint Archive, Report 2007/113}, year = {2007}, url = {http://eprint.iacr.org/2007/113}, } @misc{cryptoeprint:2007:114, author = {Guang Zeng and Wenbao Han and Kaicheng He}, title = {High Efficiency Feedback Shift Register: $\sigma-$LFSR}, howpublished = {Cryptology ePrint Archive, Report 2007/114}, year = {2007}, url = {http://eprint.iacr.org/2007/114}, } @misc{cryptoeprint:2007:115, author = {Carl Bracken and Eimear Byrne and Nadya Markin and Gary McGuire}, title = {Quadratic Almost Perfect Nonlinear Functions With Many Terms}, howpublished = {Cryptology ePrint Archive, Report 2007/115}, year = {2007}, url = {http://eprint.iacr.org/2007/115}, } @misc{cryptoeprint:2007:116, author = {D.R. Stinson and J. Wu}, title = {A Zero-Knowledge Identification and Key Agreement Protocol}, howpublished = {Cryptology ePrint Archive, Report 2007/116}, year = {2007}, url = {http://eprint.iacr.org/2007/116}, } @misc{cryptoeprint:2007:117, author = {Sihem Mesnager}, title = {Improving the lower bound on the higher order nonlinearity of Boolean functions with prescribed algebraic immunity}, howpublished = {Cryptology ePrint Archive, Report 2007/117}, year = {2007}, url = {http://eprint.iacr.org/2007/117}, } @misc{cryptoeprint:2007:118, author = {Shai Halevi and Yael Tauman Kalai}, title = {Smooth Projective Hashing and Two-Message Oblivious Transfer }, howpublished = {Cryptology ePrint Archive, Report 2007/118}, year = {2007}, url = {http://eprint.iacr.org/2007/118}, } @misc{cryptoeprint:2007:119, author = {Manoj Prabhakaran and Mike Rosulek}, title = {Rerandomizable RCCA Encryption}, howpublished = {Cryptology ePrint Archive, Report 2007/119}, year = {2007}, url = {http://eprint.iacr.org/2007/119}, } @misc{cryptoeprint:2007:120, author = {Erik Tews and Ralf-Philipp Weinmann and Andrei Pyshkin}, title = {Breaking 104 bit WEP in less than 60 seconds}, howpublished = {Cryptology ePrint Archive, Report 2007/120}, year = {2007}, url = {http://eprint.iacr.org/2007/120}, } @misc{cryptoeprint:2007:121, author = {Alexander W. Dent and Benoit Libert and Kenneth G. Paterson}, title = {Certificateless Encryption Schemes Strongly Secure in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2007/121}, year = {2007}, url = {http://eprint.iacr.org/2007/121}, } @misc{cryptoeprint:2007:122, author = {Qiang Tang}, title = {On the Security of three Versions of the WAI Protocol in Chinese WLAN Implementation Plan}, howpublished = {Cryptology ePrint Archive, Report 2007/122}, year = {2007}, url = {http://eprint.iacr.org/2007/122}, } @misc{cryptoeprint:2007:123, author = {Berkant Ustaoglu}, title = {Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS}, howpublished = {Cryptology ePrint Archive, Report 2007/123}, year = {2007}, url = {http://eprint.iacr.org/2007/123}, } @misc{cryptoeprint:2007:124, author = {Benjamin Gittins and Howard Landman}, title = {Rebuttal of overtaking VEST}, howpublished = {Cryptology ePrint Archive, Report 2007/124}, year = {2007}, url = {http://eprint.iacr.org/2007/124}, } @misc{cryptoeprint:2007:125, author = {Jean Paul Degabriele and Kenneth G. Paterson}, title = {Attacking the IPsec Standards in Encryption-only Configurations}, howpublished = {Cryptology ePrint Archive, Report 2007/125}, year = {2007}, url = {http://eprint.iacr.org/2007/125}, } @misc{cryptoeprint:2007:126, author = {Sujing Zhou and Dongdai Lin}, title = {An Interesting Member ID-based Group Signature}, howpublished = {Cryptology ePrint Archive, Report 2007/126}, year = {2007}, url = {http://eprint.iacr.org/2007/126}, } @misc{cryptoeprint:2007:127, author = {Vanesa Daza and Javier Herranz and Paz Morillo and Carla R\`afols}, title = {CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts}, howpublished = {Cryptology ePrint Archive, Report 2007/127}, year = {2007}, url = {http://eprint.iacr.org/2007/127}, } @misc{cryptoeprint:2007:128, author = {Bruno Blanchet}, title = {Computationally Sound Mechanized Proofs of Correspondence Assertions}, howpublished = {Cryptology ePrint Archive, Report 2007/128}, year = {2007}, url = {http://eprint.iacr.org/2007/128}, } @misc{cryptoeprint:2007:129, author = {Cameron McDonald, Chris Charnes, Josef Pieprzyk}, title = {An Algebraic Analysis of Trivium Ciphers based on the Boolean Satisfiability Problem}, howpublished = {Cryptology ePrint Archive, Report 2007/129}, year = {2007}, url = {http://eprint.iacr.org/2007/129}, } @misc{cryptoeprint:2007:130, author = {Tian Yuan and Chen Zhi-Yu and Jin Yuee and Jin Feng and Ma Huihui}, title = {Some Results on Anonymity in Hybrid Encryption}, howpublished = {Cryptology ePrint Archive, Report 2007/130}, year = {2007}, url = {http://eprint.iacr.org/2007/130}, } @misc{cryptoeprint:2007:131, author = {Mohammad Reza Reyhanitabar and Shuhong Wang and Reihaneh Safavi-Naini}, title = {Noninteractive Manual Channel Message Authentication Based On eTCR Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2007/131}, year = {2007}, url = {http://eprint.iacr.org/2007/131}, } @misc{cryptoeprint:2007:132, author = {Aggelos Kiayias and Hong-Sheng Zhou}, title = {Equivocal Blind Signatures and Adaptive UC-Security}, howpublished = {Cryptology ePrint Archive, Report 2007/132}, year = {2007}, url = {http://eprint.iacr.org/2007/132}, } @misc{cryptoeprint:2007:133, author = {Helger Lipmaa}, title = {New Communication-Efficient Oblivious Transfer Protocols Based on Pairings}, howpublished = {Cryptology ePrint Archive, Report 2007/133}, year = {2007}, url = {http://eprint.iacr.org/2007/133}, } @misc{cryptoeprint:2007:134, author = {Osman Kocar}, title = {Estimation of keys stored in CMOS cryptographic device after baking by using the charge shift }, howpublished = {Cryptology ePrint Archive, Report 2007/134}, year = {2007}, url = {http://eprint.iacr.org/2007/134}, } @misc{cryptoeprint:2007:135, author = {Jingwei Liu and Rong Sun and Weidong Kou and Xinmei Wang }, title = {Efficient ID-based Signature Without Trusted PKG}, howpublished = {Cryptology ePrint Archive, Report 2007/135}, year = {2007}, url = {http://eprint.iacr.org/2007/135}, } @misc{cryptoeprint:2007:136, author = {Jingwei Liu and Rong Sun and Weidong Kou and Xinmei Wang}, title = {Fair Exchange Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2007/136}, year = {2007}, url = {http://eprint.iacr.org/2007/136}, } @misc{cryptoeprint:2007:137, author = {Jintai Ding and Bo-yin Yang}, title = {Multivariates Polynomials for Hashing}, howpublished = {Cryptology ePrint Archive, Report 2007/137}, year = {2007}, url = {http://eprint.iacr.org/2007/137}, } @misc{cryptoeprint:2007:138, author = {Rongquan Feng and Hongfeng Wu}, title = {Efficient Pairing Computation on Curves}, howpublished = {Cryptology ePrint Archive, Report 2007/138}, year = {2007}, url = {http://eprint.iacr.org/2007/138}, } @misc{cryptoeprint:2007:139, author = {Amir Herzberg and Igal Yoffe}, title = {The Delivery and Evidences Layer}, howpublished = {Cryptology ePrint Archive, Report 2007/139}, year = {2007}, url = {http://eprint.iacr.org/2007/139}, } @misc{cryptoeprint:2007:140, author = {Aggelos Kiayias and Hong-Sheng Zhou}, title = {Hidden Identity-Based Signatures}, howpublished = {Cryptology ePrint Archive, Report 2007/140}, year = {2007}, url = {http://eprint.iacr.org/2007/140}, } @misc{cryptoeprint:2007:141, author = {Vivien Dubois and Pierre-Alain Fouque and Adi Shamir and Jacques Stern}, title = {Practical Cryptanalysis of SFLASH}, howpublished = {Cryptology ePrint Archive, Report 2007/141}, year = {2007}, url = {http://eprint.iacr.org/2007/141}, } @misc{cryptoeprint:2007:142, author = {Meng-Hui Lim and Sanggon Lee and Youngho Park and Hoonjae Lee}, title = {An Enhanced One-round Pairing-based Tripartite Authenticated Key Agreement Protocol}, howpublished = {Cryptology ePrint Archive, Report 2007/142}, year = {2007}, url = {http://eprint.iacr.org/2007/142}, } @misc{cryptoeprint:2007:143, author = {Ben Adida and Douglas Wikström}, title = {Offline/Online Mixing}, howpublished = {Cryptology ePrint Archive, Report 2007/143}, year = {2007}, url = {http://eprint.iacr.org/2007/143}, } @misc{cryptoeprint:2007:144, author = {T.Moh}, title = {Two New Examples of TTM}, howpublished = {Cryptology ePrint Archive, Report 2007/144}, year = {2007}, url = {http://eprint.iacr.org/2007/144}, } @misc{cryptoeprint:2007:145, author = {Iftach Haitner and Jonathan J. Hoch and Omer Reingold and Gil Segev}, title = {Finding Collisions in Interactive Protocols -- A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments}, howpublished = {Cryptology ePrint Archive, Report 2007/145}, year = {2007}, url = {http://eprint.iacr.org/2007/145}, } @misc{cryptoeprint:2007:146, author = {Bessie C. Hu and Duncan S. Wong and Qiong Huang and Guomin Yang and Xiaotie Deng}, title = {Time Capsule Signature: Efficient and Provably Secure Constructions}, howpublished = {Cryptology ePrint Archive, Report 2007/146}, year = {2007}, url = {http://eprint.iacr.org/2007/146}, } @misc{cryptoeprint:2007:147, author = {Vladimir Shpilrain and Gabriel Zapata}, title = {Using decision problems in public key cryptography}, howpublished = {Cryptology ePrint Archive, Report 2007/147}, year = {2007}, url = {http://eprint.iacr.org/2007/147}, } @misc{cryptoeprint:2007:148, author = {Man Ho Au and Willy Susilo and Yi Mu}, title = {Practical Compact E-Cash}, howpublished = {Cryptology ePrint Archive, Report 2007/148}, year = {2007}, url = {http://eprint.iacr.org/2007/148}, } @misc{cryptoeprint:2007:149, author = {Ki Hyoung Ko and Jang Won Lee and Tony Thomas}, title = {Towards Generating Secure Keys for Braid Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2007/149}, year = {2007}, url = {http://eprint.iacr.org/2007/149}, } @misc{cryptoeprint:2007:150, author = {Christian Robenhagen Ravnshoj}, title = {Generators of Jacobians of Hyperelliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2007/150}, year = {2007}, url = {http://eprint.iacr.org/2007/150}, } @misc{cryptoeprint:2007:151, author = {Tal Moran and Moni Naor and Gil Segev}, title = {Deterministic History-Independent Strategies for Storing Information on Write-Once Memories}, howpublished = {Cryptology ePrint Archive, Report 2007/151}, year = {2007}, url = {http://eprint.iacr.org/2007/151}, } @misc{cryptoeprint:2007:152, author = {Nicolas T. Courtois}, title = {CTC2 and Fast Algebraic Attacks on Block Ciphers Revisited}, howpublished = {Cryptology ePrint Archive, Report 2007/152}, year = {2007}, url = {http://eprint.iacr.org/2007/152}, } @misc{cryptoeprint:2007:153, author = {Aggelos Kiayias and Moti Yung}, title = {Cryptographic Hardness based on the Decoding of Reed-Solomon Codes}, howpublished = {Cryptology ePrint Archive, Report 2007/153}, year = {2007}, url = {http://eprint.iacr.org/2007/153}, } @misc{cryptoeprint:2007:154, author = {Danilo Gligoroski and Svein Johan Knapskog}, title = {Edon--${\cal R}(256,384,512)$ -- an Efficient Implementation of Edon--${\cal R}$ Family of Cryptographic Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2007/154}, year = {2007}, url = {http://eprint.iacr.org/2007/154}, } @misc{cryptoeprint:2007:155, author = {Jens Groth and Amit Sahai}, title = {Efficient Non-interactive Proof Systems for Bilinear Groups}, howpublished = {Cryptology ePrint Archive, Report 2007/155}, year = {2007}, url = {http://eprint.iacr.org/2007/155}, } @misc{cryptoeprint:2007:156, author = {Gergei Bana and Koji Hasebe and Mitsuhiro Okada}, title = {Computational Semantics for Basic Protocol Logic - A Stochastic Approach}, howpublished = {Cryptology ePrint Archive, Report 2007/156}, year = {2007}, url = {http://eprint.iacr.org/2007/156}, } @misc{cryptoeprint:2007:157, author = {David A. Madore}, title = {ConSum v0: An Experimental Cipher}, howpublished = {Cryptology ePrint Archive, Report 2007/157}, year = {2007}, url = {http://eprint.iacr.org/2007/157}, } @misc{cryptoeprint:2007:158, author = {Mridul Nandi}, title = {A Simple Security Analysis of Hash-CBC and a New Efficient One-Key Online Cipher}, howpublished = {Cryptology ePrint Archive, Report 2007/158}, year = {2007}, url = {http://eprint.iacr.org/2007/158}, } @misc{cryptoeprint:2007:159, author = {Dalia Khader}, title = {Attribute Based Group Signatures}, howpublished = {Cryptology ePrint Archive, Report 2007/159}, year = {2007}, url = {http://eprint.iacr.org/2007/159}, } @misc{cryptoeprint:2007:160, author = {Muxiang Zhang}, title = {Analysis of Collusion-Attack Free ID-Based Non-Interactive Key Sharing}, howpublished = {Cryptology ePrint Archive, Report 2007/160}, year = {2007}, url = {http://eprint.iacr.org/2007/160}, } @misc{cryptoeprint:2007:161, author = {Ling Cheung and Joseph A. Cooley and Roger Khazan and Calvin Newport}, title = {Collusion-Resistant Group Key Management Using Attribute-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2007/161}, year = {2007}, url = {http://eprint.iacr.org/2007/161}, } @misc{cryptoeprint:2007:162, author = {Jens-Matthias Bohli and Joern Mueller-Quade and Stefan Roehrich}, title = {Bingo Voting: Secure and coercion-free voting using a trusted random number generator}, howpublished = {Cryptology ePrint Archive, Report 2007/162}, year = {2007}, url = {http://eprint.iacr.org/2007/162}, } @misc{cryptoeprint:2007:163, author = {Meng-Hui Lim and Sanggon Lee and Youngho Park and Sangjae Moon}, title = {Secure Deniable Authenticated Key Establishment for Internet Protocols}, howpublished = {Cryptology ePrint Archive, Report 2007/163}, year = {2007}, url = {http://eprint.iacr.org/2007/163}, } @misc{cryptoeprint:2007:164, author = {Onur Aciicmez}, title = {Yet Another MicroArchitectural Attack: Exploiting I-cache}, howpublished = {Cryptology ePrint Archive, Report 2007/164}, year = {2007}, url = {http://eprint.iacr.org/2007/164}, } @misc{cryptoeprint:2007:165, author = {Arnab Roy and Anupam Datta and Ante Derek and John C. Mitchell}, title = {Inductive Proof Method for Computational Secrecy}, howpublished = {Cryptology ePrint Archive, Report 2007/165}, year = {2007}, url = {http://eprint.iacr.org/2007/165}, } @misc{cryptoeprint:2007:166, author = {Junghyun Nam}, title = {Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords}, howpublished = {Cryptology ePrint Archive, Report 2007/166}, year = {2007}, url = {http://eprint.iacr.org/2007/166}, } @misc{cryptoeprint:2007:167, author = {Yi-Ru Liu, Wen-Guey Tzeng}, title = {Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time (Version 2)}, howpublished = {Cryptology ePrint Archive, Report 2007/167}, year = {2007}, url = {http://eprint.iacr.org/2007/167}, } @misc{cryptoeprint:2007:168, author = {Dominique Unruh}, title = {Random Oracles and Auxiliary Input}, howpublished = {Cryptology ePrint Archive, Report 2007/168}, year = {2007}, url = {http://eprint.iacr.org/2007/168}, } @misc{cryptoeprint:2007:169, author = {Michael Backes and Dominique Unruh}, title = {On the Security of Protocols with Logarithmic Communication Complexity}, howpublished = {Cryptology ePrint Archive, Report 2007/169}, year = {2007}, url = {http://eprint.iacr.org/2007/169}, } @misc{cryptoeprint:2007:170, author = {Stephane Lemieux and Adrian Tang}, title = {Clone Resistant Mutual Authentication for Low-Cost RFID Technology}, howpublished = {Cryptology ePrint Archive, Report 2007/170}, year = {2007}, url = {http://eprint.iacr.org/2007/170}, } @misc{cryptoeprint:2007:171, author = {Ran Canetti and Susan Hohenberger}, title = {Chosen-Ciphertext Secure Proxy Re-Encryption}, howpublished = {Cryptology ePrint Archive, Report 2007/171}, year = {2007}, url = {http://eprint.iacr.org/2007/171}, } @misc{cryptoeprint:2007:172, author = {Jan Camenisch and Susan Hohenberger and Michael {\O}stergaard Pedersen}, title = {Batch Verification of Short Signatures}, howpublished = {Cryptology ePrint Archive, Report 2007/172}, year = {2007}, url = {http://eprint.iacr.org/2007/172}, } @misc{cryptoeprint:2007:173, author = {Xu An Wang and Xiaoyuan Yang and Yiliang Han}, title = {Provable Secure Generalized Signcryption}, howpublished = {Cryptology ePrint Archive, Report 2007/173}, year = {2007}, url = {http://eprint.iacr.org/2007/173}, } @misc{cryptoeprint:2007:174, author = {Cevahir Demirkiran and Enric Nart}, title = {Counting hyperelliptic curves that admit a Koblitz model}, howpublished = {Cryptology ePrint Archive, Report 2007/174}, year = {2007}, url = {http://eprint.iacr.org/2007/174}, } @misc{cryptoeprint:2007:175, author = {Christian Robenhagen Ravnshoj}, title = {Embedding Degree of Hyperelliptic Curves with Complex Multiplication}, howpublished = {Cryptology ePrint Archive, Report 2007/175}, year = {2007}, url = {http://eprint.iacr.org/2007/175}, } @misc{cryptoeprint:2007:176, author = {Elena Andreeva and Gregory Neven and Bart Preneel and Thomas Shrimpton}, title = {Seven-Property-Preserving Iterated Hashing: ROX }, howpublished = {Cryptology ePrint Archive, Report 2007/176}, year = {2007}, url = {http://eprint.iacr.org/2007/176}, } @misc{cryptoeprint:2007:177, author = {Dan Boneh and Craig Gentry and Michael Hamburg}, title = {Space-Efficient Identity Based Encryption Without Pairings}, howpublished = {Cryptology ePrint Archive, Report 2007/177}, year = {2007}, url = {http://eprint.iacr.org/2007/177}, } @misc{cryptoeprint:2007:178, author = {Dakshi Agrawal and Charanjit Jutla}, title = {Utility Sampling for Trust Metrics in PKI}, howpublished = {Cryptology ePrint Archive, Report 2007/178}, year = {2007}, url = {http://eprint.iacr.org/2007/178}, } @misc{cryptoeprint:2007:179, author = {Kwang Ho Kim and So In Kim and Ju Song Choe}, title = {New Fast Algorithms for Arithmetic on Elliptic Curves over Fields of Characteristic Three}, howpublished = {Cryptology ePrint Archive, Report 2007/179}, year = {2007}, url = {http://eprint.iacr.org/2007/179}, } @misc{cryptoeprint:2007:180, author = {*Jue-Sam Chou 1, Yalin Chen 2, Tsung-Heng Chen 3}, title = {A Novel Secure Session Key Generation using two-level architecture For Cluster-Based Ad Hoc Networks Based On ID-Based Bilinear Paring}, howpublished = {Cryptology ePrint Archive, Report 2007/180}, year = {2007}, url = {http://eprint.iacr.org/2007/180}, } @misc{cryptoeprint:2007:181, author = {Kwang Ho Kim and So In Kim}, title = {A New Method for Speeding Up Arithmetic on Elliptic Curves over Binary Fields}, howpublished = {Cryptology ePrint Archive, Report 2007/181}, year = {2007}, url = {http://eprint.iacr.org/2007/181}, } @misc{cryptoeprint:2007:182, author = {Yevgeniy Dodis and Pil Joong Lee and Dae Hyun Yum}, title = {Optimistic Fair Exchange in a Multi-user Setting}, howpublished = {Cryptology ePrint Archive, Report 2007/182}, year = {2007}, url = {http://eprint.iacr.org/2007/182}, } @misc{cryptoeprint:2007:183, author = {Ling Cheung and Calvin Newport}, title = {Provably Secure Ciphertext Policy ABE}, howpublished = {Cryptology ePrint Archive, Report 2007/183}, year = {2007}, url = {http://eprint.iacr.org/2007/183}, } @misc{cryptoeprint:2007:184, author = {Chunbo Ma, Jun Ao, and Jianhua Li}, title = {Provable password-based tripartite key agreement protocol}, howpublished = {Cryptology ePrint Archive, Report 2007/184}, year = {2007}, url = {http://eprint.iacr.org/2007/184}, } @misc{cryptoeprint:2007:185, author = {Deukjo Hong and Donghoon Chang and Jaechul Sung and Sangjin Lee and Seokhie Hong and Jesang Lee and Dukjae Moon and Sungtaek Chee}, title = {New FORK-256}, howpublished = {Cryptology ePrint Archive, Report 2007/185}, year = {2007}, url = {http://eprint.iacr.org/2007/185}, } @misc{cryptoeprint:2007:186, author = {Jens Groth}, title = {Fully Anonymous Group Signatures without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2007/186}, year = {2007}, url = {http://eprint.iacr.org/2007/186}, } @misc{cryptoeprint:2007:187, author = {Andrew Moss and Dan Page and Nigel Smart}, title = {Executing Modular Exponentiation on a Graphics Accelerator}, howpublished = {Cryptology ePrint Archive, Report 2007/187}, year = {2007}, url = {http://eprint.iacr.org/2007/187}, } @misc{cryptoeprint:2007:188, author = {Kim-Kwang Raymond Choo}, title = {A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model}, howpublished = {Cryptology ePrint Archive, Report 2007/188}, year = {2007}, url = {http://eprint.iacr.org/2007/188}, } @misc{cryptoeprint:2007:189, author = {Meng-Hui Lim and Sanggon Lee}, title = {An Improved One-Round ID-Based Tripartite Authenticated Key Agreement Protocol}, howpublished = {Cryptology ePrint Archive, Report 2007/189}, year = {2007}, url = {http://eprint.iacr.org/2007/189}, } @misc{cryptoeprint:2007:190, author = {Tian Yuan}, title = {Some General Results on Chosen-ciphertext Anonymity in Public-key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2007/190}, year = {2007}, url = {http://eprint.iacr.org/2007/190}, } @misc{cryptoeprint:2007:191, author = {Andrew C. C. Yao, Frances F. Yao, Yunlei Zhao, Bin Zhu}, title = {Deniable Internet Key-Exchange}, howpublished = {Cryptology ePrint Archive, Report 2007/191}, year = {2007}, url = {http://eprint.iacr.org/2007/191}, } @misc{cryptoeprint:2007:192, author = {Michael Scott}, title = {Optimal Irreducible Polynomials for GF(2^m) Arithmetic}, howpublished = {Cryptology ePrint Archive, Report 2007/192}, year = {2007}, url = {http://eprint.iacr.org/2007/192}, } @misc{cryptoeprint:2007:193, author = {Sunder Lal and Vandani Verma}, title = {Some Identity Based Strong Bi-Designated Verifier Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2007/193}, year = {2007}, url = {http://eprint.iacr.org/2007/193}, } @misc{cryptoeprint:2007:194, author = {Ernie Brickell and Jiangtao Li}, title = {Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities}, howpublished = {Cryptology ePrint Archive, Report 2007/194}, year = {2007}, url = {http://eprint.iacr.org/2007/194}, } @misc{cryptoeprint:2007:195, author = {Ling Cheung and Sayan Mitra and Olivier Pereira}, title = {Verifying Statistical Zero Knowledge with Approximate Implementations}, howpublished = {Cryptology ePrint Archive, Report 2007/195}, year = {2007}, url = {http://eprint.iacr.org/2007/195}, } @misc{cryptoeprint:2007:196, author = {Rafael Castro and Ricardo Dahab}, title = {An Efficient Certificateless Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2007/196}, year = {2007}, url = {http://eprint.iacr.org/2007/196}, } @misc{cryptoeprint:2007:197, author = {Mihir Bellare and Alexandra Boldyreva and Lars Knudsen and Chanathip Namprempre}, title = {On-Line Ciphers and the Hash-CBC Constructions}, howpublished = {Cryptology ePrint Archive, Report 2007/197}, year = {2007}, url = {http://eprint.iacr.org/2007/197}, } @misc{cryptoeprint:2007:198, author = {Benedikt Gierlichs and Lejla Batina and Pim Tuyls}, title = {Mutual Information Analysis -- A Universal Differential Side-Channel Attack}, howpublished = {Cryptology ePrint Archive, Report 2007/198}, year = {2007}, url = {http://eprint.iacr.org/2007/198}, } @misc{cryptoeprint:2007:199, author = {David Nowak}, title = {A Framework for Game-Based Security Proofs}, howpublished = {Cryptology ePrint Archive, Report 2007/199}, year = {2007}, url = {http://eprint.iacr.org/2007/199}, } @misc{cryptoeprint:2007:200, author = {Philip Atzemoglou and Tal Malkin}, title = {ProSiBIR: Proactive Signer-Base Intrusion Resilient Signatures}, howpublished = {Cryptology ePrint Archive, Report 2007/200}, year = {2007}, url = {http://eprint.iacr.org/2007/200}, } @misc{cryptoeprint:2007:201, author = {Hovav Shacham}, title = {The BBG HIBE Has Limited Delegation}, howpublished = {Cryptology ePrint Archive, Report 2007/201}, year = {2007}, url = {http://eprint.iacr.org/2007/201}, } @misc{cryptoeprint:2007:202, author = {Giuseppe Ateniese and Randal Burns and Reza Curtmola and Joseph Herring and Lea Kissner and Zachary Peterson and Dawn Song}, title = {Provable Data Possession at Untrusted Stores}, howpublished = {Cryptology ePrint Archive, Report 2007/202}, year = {2007}, url = {http://eprint.iacr.org/2007/202}, } @misc{cryptoeprint:2007:203, author = {Xin Jiang and Jintai Ding and Lei Hu}, title = {Kipnis-Shamir's Attack on HFE Revisited}, howpublished = {Cryptology ePrint Archive, Report 2007/203}, year = {2007}, url = {http://eprint.iacr.org/2007/203}, } @misc{cryptoeprint:2007:204, author = {Shu Yun Lim and Chuan Chin Pu and Hyo Taek Lim and Hoon Jae Lee}, title = {Dragon-MAC: Securing Wireless Sensor Networks with Authenticated Encryption}, howpublished = {Cryptology ePrint Archive, Report 2007/204}, year = {2007}, url = {http://eprint.iacr.org/2007/204}, } @misc{cryptoeprint:2007:205, author = {Kazumaro Aoki and Jens Franke and Thorsten Kleinjung and Arjen Lenstra and Dag Arne Osvik}, title = {A kilobit special number field sieve factorization}, howpublished = {Cryptology ePrint Archive, Report 2007/205}, year = {2007}, url = {http://eprint.iacr.org/2007/205}, } @misc{cryptoeprint:2007:206, author = {Pierre-Alain Fouque and Gaetan Leurent and Phong Nguyen}, title = {Automatic Search of Differential Path in MD4}, howpublished = {Cryptology ePrint Archive, Report 2007/206}, year = {2007}, url = {http://eprint.iacr.org/2007/206}, } @misc{cryptoeprint:2007:207, author = {Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe}, title = {On an Improved Correlation Analysis of Stream Ciphers Using Muti-Output Boolean Functions and the Related Generalized Notion of Nonlinearity}, howpublished = {Cryptology ePrint Archive, Report 2007/207}, year = {2007}, url = {http://eprint.iacr.org/2007/207}, } @misc{cryptoeprint:2007:208, author = {Goutam Paul and Subhamoy Maitra}, title = {RC4 State Information at Any Stage Reveals the Secret Key}, howpublished = {Cryptology ePrint Archive, Report 2007/208}, year = {2007}, url = {http://eprint.iacr.org/2007/208}, } @misc{cryptoeprint:2007:209, author = {Liqun Chen and Qiang Tang}, title = {Bilateral Unknown Key-Share Attacks in Key Agreement Protocols}, howpublished = {Cryptology ePrint Archive, Report 2007/209}, year = {2007}, url = {http://eprint.iacr.org/2007/209}, } @misc{cryptoeprint:2007:210, author = {Xianhui Lu, Xuejia Lai, Dake He, Guomin Li}, title = {Efficient chosen ciphertext secure PKE scheme with short ciphertext}, howpublished = {Cryptology ePrint Archive, Report 2007/210}, year = {2007}, url = {http://eprint.iacr.org/2007/210}, } @misc{cryptoeprint:2007:211, author = {Chunbo Ma, Jun Ao, and Jianhua Li}, title = {Scalable Storage Scheme from Forward Key Rotation}, howpublished = {Cryptology ePrint Archive, Report 2007/211}, year = {2007}, url = {http://eprint.iacr.org/2007/211}, } @misc{cryptoeprint:2007:212, author = {Andrey Khalyavin}, title = {The constructing of $3$-resilient Boolean functions of $9$ variables with nonlinearity $240$.}, howpublished = {Cryptology ePrint Archive, Report 2007/212}, year = {2007}, url = {http://eprint.iacr.org/2007/212}, } @misc{cryptoeprint:2007:213, author = {Sujing Zhou and Dongdai Lin}, title = {Unlinkable Randomizable Signature and Its Application in Group Signature}, howpublished = {Cryptology ePrint Archive, Report 2007/213}, year = {2007}, url = {http://eprint.iacr.org/2007/213}, } @misc{cryptoeprint:2007:214, author = {Eligijus Sakalauskas and Kestutis Luksys}, title = {Matrix Power S-Box Construction}, howpublished = {Cryptology ePrint Archive, Report 2007/214}, year = {2007}, url = {http://eprint.iacr.org/2007/214}, } @misc{cryptoeprint:2007:215, author = {Jesper Buus Nielsen}, title = {Extending Oblivious Transfers Efficiently - How to get Robustness Almost for Free}, howpublished = {Cryptology ePrint Archive, Report 2007/215}, year = {2007}, url = {http://eprint.iacr.org/2007/215}, } @misc{cryptoeprint:2007:216, author = {Pawel Pszona and Grzegorz Stachowiak}, title = {Unlinkable Divisible Digital Cash without Trusted Third Party}, howpublished = {Cryptology ePrint Archive, Report 2007/216}, year = {2007}, url = {http://eprint.iacr.org/2007/216}, } @misc{cryptoeprint:2007:217, author = {Ryuichi Sakai and Jun Furukawa}, title = {Identity-Based Broadcast Encryption}, howpublished = {Cryptology ePrint Archive, Report 2007/217}, year = {2007}, url = {http://eprint.iacr.org/2007/217}, } @misc{cryptoeprint:2007:218, author = {Eli Biham and Orr Dunkelman}, title = {Differential Cryptanalysis in Stream Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2007/218}, year = {2007}, url = {http://eprint.iacr.org/2007/218}, } @misc{cryptoeprint:2007:219, author = {Liufei Wu1, 2, Yuqing Zhang1, Fengjiao Wang1}, title = {A New Provably Secure Authentication and Key Agreement Protocol for SIP Using ECC}, howpublished = {Cryptology ePrint Archive, Report 2007/219}, year = {2007}, url = {http://eprint.iacr.org/2007/219}, } @misc{cryptoeprint:2007:220, author = {Fengjiao WANG and Yuqing ZHANG}, title = {A New Provably Secure Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-key Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2007/220}, year = {2007}, url = {http://eprint.iacr.org/2007/220}, } @misc{cryptoeprint:2007:221, author = {Michel Abdalla and Eike Kiltz and Gregory Neven}, title = {Generalized Key Delegation for Hierarchical Identity-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2007/221}, year = {2007}, url = {http://eprint.iacr.org/2007/221}, } @misc{cryptoeprint:2007:222, author = {Francois-Xavier Standaert and Eric Peeters and Cedric Archambeau and Jean-Jacques Quisquater}, title = {Towards Security Limits in Side-Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2007/222}, year = {2007}, url = {http://eprint.iacr.org/2007/222}, } @misc{cryptoeprint:2007:223, author = {John Black and Martin Cochran and Thomas Shrimpton}, title = {On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2007/223}, year = {2007}, url = {http://eprint.iacr.org/2007/223}, } @misc{cryptoeprint:2007:224, author = {*Jue-Sam Chou 1, Guey-Chuen Lee 2, Chung-Ju Chan 3}, title = {A Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems}, howpublished = {Cryptology ePrint Archive, Report 2007/224}, year = {2007}, url = {http://eprint.iacr.org/2007/224}, } @misc{cryptoeprint:2007:225, author = {Shengli Liu and Xiaofeng Chen and Fangguo Zhang}, title = {On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature}, howpublished = {Cryptology ePrint Archive, Report 2007/225}, year = {2007}, url = {http://eprint.iacr.org/2007/225}, } @misc{cryptoeprint:2007:226, author = {Douglas R. Stinson}, title = {Generalized mix functions and orthogonal equitable rectangles}, howpublished = {Cryptology ePrint Archive, Report 2007/226}, year = {2007}, url = {http://eprint.iacr.org/2007/226}, } @misc{cryptoeprint:2007:227, author = {Darakhshan J. Mir and Poorvi L. Vora}, title = {Related-Key Statistical Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2007/227}, year = {2007}, url = {http://eprint.iacr.org/2007/227}, } @misc{cryptoeprint:2007:228, author = {Miaoqing Huang and Kris Gaj and Soonhak Kwon and Tarek El-Ghazawi}, title = {AN OPTIMIZED HARDWARE ARCHITECTURE OF MONTGOMERY MULTIPLICATION ALGORITHM}, howpublished = {Cryptology ePrint Archive, Report 2007/228}, year = {2007}, url = {http://eprint.iacr.org/2007/228}, } @misc{cryptoeprint:2007:229, author = {Ueli Maurer and Stefano Tessaro}, title = {Domain Extension of Public Random Functions: Beyond the Birthday Barrier}, howpublished = {Cryptology ePrint Archive, Report 2007/229}, year = {2007}, url = {http://eprint.iacr.org/2007/229}, } @misc{cryptoeprint:2007:230, author = {Gautham Sekar and Souradyuti Paul and Bart Preneel}, title = {New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py}, howpublished = {Cryptology ePrint Archive, Report 2007/230}, year = {2007}, url = {http://eprint.iacr.org/2007/230}, } @misc{cryptoeprint:2007:231, author = {Paul Bunn and Rafail Ostrovsky}, title = {Secure Two-Party k-Means Clustering}, howpublished = {Cryptology ePrint Archive, Report 2007/231}, year = {2007}, url = {http://eprint.iacr.org/2007/231}, } @misc{cryptoeprint:2007:232, author = {Xianhui Lu, Xuejia Lai, Dake He}, title = {A new paradigm of chosen ciphertext secure public key encryption scheme}, howpublished = {Cryptology ePrint Archive, Report 2007/232}, year = {2007}, url = {http://eprint.iacr.org/2007/232}, } @misc{cryptoeprint:2007:233, author = {Michael Backes and Markus Duermuth and Ralf Kuesters}, title = {On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2007/233}, year = {2007}, url = {http://eprint.iacr.org/2007/233}, } @misc{cryptoeprint:2007:234, author = {Alexandra Boldyreva and Virendra Kumar}, title = {Provable-Security Analysis of Authenticated Encryption in Kerberos}, howpublished = {Cryptology ePrint Archive, Report 2007/234}, year = {2007}, url = {http://eprint.iacr.org/2007/234}, } @misc{cryptoeprint:2007:235, author = {Matthew Green and Susan Hohenberger}, title = {Blind Identity-Based Encryption and Simulatable Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2007/235}, year = {2007}, url = {http://eprint.iacr.org/2007/235}, } @misc{cryptoeprint:2007:236, author = {Sherman S.M. Chow and Wun-She Yap}, title = {Certificateless Ring Signatures}, howpublished = {Cryptology ePrint Archive, Report 2007/236}, year = {2007}, url = {http://eprint.iacr.org/2007/236}, } @misc{cryptoeprint:2007:237, author = {Marek Klonowski and Miros\l{}aw Kuty\l{}owski and Micha\l{} Ren and Katarzyna Rybarczyk}, title = {Forward-secure Key Evolution in Wireless Sensor Networks}, howpublished = {Cryptology ePrint Archive, Report 2007/237}, year = {2007}, url = {http://eprint.iacr.org/2007/237}, } @misc{cryptoeprint:2007:238, author = {Stuart Haber}, title = {Long-lived digital integrity using short-lived hash functions}, howpublished = {Cryptology ePrint Archive, Report 2007/238}, year = {2007}, url = {http://eprint.iacr.org/2007/238}, } @misc{cryptoeprint:2007:239, author = {William R. Speirs and Ian Molloy}, title = {Making Large Hash Functions From Small Compression Functions}, howpublished = {Cryptology ePrint Archive, Report 2007/239}, year = {2007}, url = {http://eprint.iacr.org/2007/239}, } @misc{cryptoeprint:2007:240, author = {George I. Davida and Jeremy A. Hansen}, title = {A Four-Component Framework for Designing and Analyzing Cryptographic Hash Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2007/240}, year = {2007}, url = {http://eprint.iacr.org/2007/240}, } @misc{cryptoeprint:2007:241, author = {Dalia Khader}, title = {Attribute Based Group Signature with Revocation}, howpublished = {Cryptology ePrint Archive, Report 2007/241}, year = {2007}, url = {http://eprint.iacr.org/2007/241}, } @misc{cryptoeprint:2007:242, author = {Khoongming Khoo, Guanhan Chew, Guang Gong and Hian-Kiat Lee}, title = {Time-Memory-Data Trade-off Attack on Stream Ciphers based on Maiorana-McFarland Functions}, howpublished = {Cryptology ePrint Archive, Report 2007/242}, year = {2007}, url = {http://eprint.iacr.org/2007/242}, } @misc{cryptoeprint:2007:243, author = {Ari Juels and Burton S. Kaliski Jr.}, title = {PORs: Proofs of Retrievability for Large Files}, howpublished = {Cryptology ePrint Archive, Report 2007/243}, year = {2007}, url = {http://eprint.iacr.org/2007/243}, } @misc{cryptoeprint:2007:244, author = {Martin Hlavac and Tomas Rosa}, title = {A Note on the Relay Attacks on e-passports: The Case of Czech e-passports}, howpublished = {Cryptology ePrint Archive, Report 2007/244}, year = {2007}, url = {http://eprint.iacr.org/2007/244}, } @misc{cryptoeprint:2007:245, author = {Mikhail J. Atallah and Marina Blanton and Keith B. Frikken}, title = {Incorporating Temporal Capabilities in Existing Key Management Schemes}, howpublished = {Cryptology ePrint Archive, Report 2007/245}, year = {2007}, url = {http://eprint.iacr.org/2007/245}, } @misc{cryptoeprint:2007:246, author = {Claudio Soriente and Gene Tsudik and Ersin Uzun}, title = {BEDA: Button-Enabled Device Pairing}, howpublished = {Cryptology ePrint Archive, Report 2007/246}, year = {2007}, url = {http://eprint.iacr.org/2007/246}, } @misc{cryptoeprint:2007:247, author = {Chang-An Zhao and Fangguo Zhang and Jiwu Huang}, title = {A Note on the Ate Pairing}, howpublished = {Cryptology ePrint Archive, Report 2007/247}, year = {2007}, url = {http://eprint.iacr.org/2007/247}, } @misc{cryptoeprint:2007:248, author = {Warren D. Smith}, title = {1. AES seems weak. 2. Linear time secure cryptography }, howpublished = {Cryptology ePrint Archive, Report 2007/248}, year = {2007}, url = {http://eprint.iacr.org/2007/248}, } @misc{cryptoeprint:2007:249, author = {Serge Fehr and Christian Schaffner}, title = {Randomness Extraction via Delta-Biased Masking in the Presence of a Quantum Attacker}, howpublished = {Cryptology ePrint Archive, Report 2007/249}, year = {2007}, url = {http://eprint.iacr.org/2007/249}, } @misc{cryptoeprint:2007:250, author = {Hongzhen Du and Qiaoyan Wen}, title = {Efficient and Provably-Secure Certificateless Short Signature Scheme from Bilinear Pairings}, howpublished = {Cryptology ePrint Archive, Report 2007/250}, year = {2007}, url = {http://eprint.iacr.org/2007/250}, } @misc{cryptoeprint:2007:251, author = {V{\'e}ronique Cortier and Ralf Kuesters and Bogdan Warinschi}, title = {A Cryptographic Model for Branching Time Security Properties -- the Case of Contract Signing Protocols}, howpublished = {Cryptology ePrint Archive, Report 2007/251}, year = {2007}, url = {http://eprint.iacr.org/2007/251}, } @misc{cryptoeprint:2007:252, author = {Roberto Araujo, Ricardo Felipe Custodio, and Jeroen van de Graaf}, title = {A Verifiable Voting Protocol based on Farnel}, howpublished = {Cryptology ePrint Archive, Report 2007/252}, year = {2007}, url = {http://eprint.iacr.org/2007/252}, } @misc{cryptoeprint:2007:253, author = {K. Rubin and A. Silverberg}, title = {Choosing the correct elliptic curve in the CM method}, howpublished = {Cryptology ePrint Archive, Report 2007/253}, year = {2007}, url = {http://eprint.iacr.org/2007/253}, } @misc{cryptoeprint:2007:254, author = {Jun Shao and Zhenfu Cao and Licheng Wang and Xiaohui Liang}, title = {Fully Secure Proxy Re-Encryption without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2007/254}, year = {2007}, url = {http://eprint.iacr.org/2007/254}, } @misc{cryptoeprint:2007:255, author = {S.Narayan}, title = {Efficient Identity Based Signature in Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2007/255}, year = {2007}, url = {http://eprint.iacr.org/2007/255}, } @misc{cryptoeprint:2007:256, author = {S. D. Galbraith and F. Hess and F. Vercauteren}, title = {Aspects of Pairing Inversion}, howpublished = {Cryptology ePrint Archive, Report 2007/256}, year = {2007}, url = {http://eprint.iacr.org/2007/256}, } @misc{cryptoeprint:2007:257, author = {Dai-Rui Lin and Chih-I Wang}, title = {A Forward-Secure Signature with Backward-Secure Detection}, howpublished = {Cryptology ePrint Archive, Report 2007/257}, year = {2007}, url = {http://eprint.iacr.org/2007/257}, } @misc{cryptoeprint:2007:258, author = {Ulrich Kaiser}, title = {UICE: A High-Performance Cryptographic Module for SoC and RFID Applications}, howpublished = {Cryptology ePrint Archive, Report 2007/258}, year = {2007}, url = {http://eprint.iacr.org/2007/258}, } @misc{cryptoeprint:2007:259, author = {Ziran Tu and Yingpu Deng}, title = {Algebraic Immunity Hierarchy of Boolean Functions}, howpublished = {Cryptology ePrint Archive, Report 2007/259}, year = {2007}, url = {http://eprint.iacr.org/2007/259}, } @misc{cryptoeprint:2007:260, author = {Dennis Y. W. Liu and Qiong Huang and Duncan S. Wong}, title = {An Efficient One-move Nominative Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2007/260}, year = {2007}, url = {http://eprint.iacr.org/2007/260}, } @misc{cryptoeprint:2007:261, author = {Subhamoy Maitra and Goutam Paul}, title = {New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4}, howpublished = {Cryptology ePrint Archive, Report 2007/261}, year = {2007}, url = {http://eprint.iacr.org/2007/261}, } @misc{cryptoeprint:2007:262, author = {Yong Ho Hwang and Joseph K. Liu and Sherman S.M. Chow}, title = {Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2007/262}, year = {2007}, url = {http://eprint.iacr.org/2007/262}, } @misc{cryptoeprint:2007:263, author = {Johannes Buchmann and Martin D{\"o}ring and Richard Lindner}, title = {Efficiency Improvement for NTRU}, howpublished = {Cryptology ePrint Archive, Report 2007/263}, year = {2007}, url = {http://eprint.iacr.org/2007/263}, } @misc{cryptoeprint:2007:264, author = {Thomas Ristenpart and Scott Yilek}, title = {The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks}, howpublished = {Cryptology ePrint Archive, Report 2007/264}, year = {2007}, url = {http://eprint.iacr.org/2007/264}, } @misc{cryptoeprint:2007:265, author = {Jonathan Katz}, title = {Which Languages Have 4-Round Zero-Knowledge Proofs?}, howpublished = {Cryptology ePrint Archive, Report 2007/265}, year = {2007}, url = {http://eprint.iacr.org/2007/265}, } @misc{cryptoeprint:2007:266, author = {Wei Han and Dong Zheng and Ke-fei Chen}, title = {Filling the Gap between Voters and Cryptography in e-Voting}, howpublished = {Cryptology ePrint Archive, Report 2007/266}, year = {2007}, url = {http://eprint.iacr.org/2007/266}, } @misc{cryptoeprint:2007:267, author = {Erel Geron and Avishai Wool}, title = {CRUST: Cryptographic Remote Untrusted Storage without Public Keys}, howpublished = {Cryptology ePrint Archive, Report 2007/267}, year = {2007}, url = {http://eprint.iacr.org/2007/267}, } @misc{cryptoeprint:2007:268, author = {Erik Dahmen and Katsuyuki Okeya and Daniel Schepers}, title = {Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2007/268}, year = {2007}, url = {http://eprint.iacr.org/2007/268}, } @misc{cryptoeprint:2007:269, author = {Jeroen van de Graaf}, title = {Merging Pret-a-Voter and PunchScan}, howpublished = {Cryptology ePrint Archive, Report 2007/269}, year = {2007}, url = {http://eprint.iacr.org/2007/269}, } @misc{cryptoeprint:2007:270, author = {David Chaum and Jeroen van de Graaf and Peter Y. A. Ryan and Poorvi L. Vora}, title = {Secret Ballot Elections with Unconditional Integrity}, howpublished = {Cryptology ePrint Archive, Report 2007/270}, year = {2007}, url = {http://eprint.iacr.org/2007/270}, } @misc{cryptoeprint:2007:271, author = {Mihir Bellare and Thomas Ristenpart}, title = {Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms}, howpublished = {Cryptology ePrint Archive, Report 2007/271}, year = {2007}, url = {http://eprint.iacr.org/2007/271}, } @misc{cryptoeprint:2007:272, author = {Willi Geiselmann and Rainer Steinwandt}, title = {Cryptanalysis of a Hash Function Proposed at ICISC 2006}, howpublished = {Cryptology ePrint Archive, Report 2007/272}, year = {2007}, url = {http://eprint.iacr.org/2007/272}, } @misc{cryptoeprint:2007:273, author = {Mihir Bellare and Sarah Shoup}, title = {Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2007/273}, year = {2007}, url = {http://eprint.iacr.org/2007/273}, } @misc{cryptoeprint:2007:274, author = {Chunbo Ma, Jun Ao, and Jianhua Li}, title = {Group-based Proxy Re-encryption scheme}, howpublished = {Cryptology ePrint Archive, Report 2007/274}, year = {2007}, url = {http://eprint.iacr.org/2007/274}, } @misc{cryptoeprint:2007:275, author = {Zhixiong CHEN and Guozhen XIAO}, title = {`Good' Pseudo-Random Binary Sequences from Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2007/275}, year = {2007}, url = {http://eprint.iacr.org/2007/275}, } @misc{cryptoeprint:2007:276, author = {Simon R. Blackburn and Tuvi Etzion and Siaw-Lynn Ng}, title = {Prolific Codes with the Identifiable Parent Property}, howpublished = {Cryptology ePrint Archive, Report 2007/276}, year = {2007}, url = {http://eprint.iacr.org/2007/276}, } @misc{cryptoeprint:2007:277, author = {Praveen Gauravaram and John Kelsey}, title = {Cryptanalysis of a class of cryptographic hash functions}, howpublished = {Cryptology ePrint Archive, Report 2007/277}, year = {2007}, url = {http://eprint.iacr.org/2007/277}, } @misc{cryptoeprint:2007:278, author = {Eli Biham and Orr Dunkelman}, title = {A Framework for Iterative Hash Functions - HAIFA}, howpublished = {Cryptology ePrint Archive, Report 2007/278}, year = {2007}, url = {http://eprint.iacr.org/2007/278}, } @misc{cryptoeprint:2007:279, author = {Chris Peikert and Brent Waters}, title = {Lossy Trapdoor Functions and Their Applications}, howpublished = {Cryptology ePrint Archive, Report 2007/279}, year = {2007}, url = {http://eprint.iacr.org/2007/279}, } @misc{cryptoeprint:2007:280, author = {Igor Semaev}, title = {On solving sparse algebraic equations over finite fields II}, howpublished = {Cryptology ePrint Archive, Report 2007/280}, year = {2007}, url = {http://eprint.iacr.org/2007/280}, } @misc{cryptoeprint:2007:281, author = {Grzegorz Wojtenko}, title = {A Pollard-like pseudorandom number generator over EC}, howpublished = {Cryptology ePrint Archive, Report 2007/281}, year = {2007}, url = {http://eprint.iacr.org/2007/281}, } @misc{cryptoeprint:2007:282, author = {Johannes Bl\"omer \and Volker Krummel}, title = {Analysis of countermeasures against access driven cache attacks on AES}, howpublished = {Cryptology ePrint Archive, Report 2007/282}, year = {2007}, url = {http://eprint.iacr.org/2007/282}, } @misc{cryptoeprint:2007:283, author = {Mark Manulis and Joerg Schwenk}, title = {Provably Secure Framework for Information Aggregation is Sensor Networks}, howpublished = {Cryptology ePrint Archive, Report 2007/283}, year = {2007}, url = {http://eprint.iacr.org/2007/283}, } @misc{cryptoeprint:2007:284, author = {No Author}, title = {No title}, howpublished = {Cryptology ePrint Archive, Report 2007/284}, year = {2007}, url = {http://eprint.iacr.org/2007/284}, } @misc{cryptoeprint:2007:285, author = {H{\aa}vard Raddum and Igor Semaev}, title = {Solving MRHS linear equations}, howpublished = {Cryptology ePrint Archive, Report 2007/285}, year = {2007}, url = {http://eprint.iacr.org/2007/285}, } @misc{cryptoeprint:2007:286, author = {Daniel J. Bernstein and Tanja Lange}, title = {Faster addition and doubling on elliptic curves}, howpublished = {Cryptology ePrint Archive, Report 2007/286}, year = {2007}, url = {http://eprint.iacr.org/2007/286}, } @misc{cryptoeprint:2007:287, author = {Kevin Henry and Douglas R. Stinson and Jiayuan Sui}, title = {The Effectiveness of Receipt-Based Attacks on ThreeBallot}, howpublished = {Cryptology ePrint Archive, Report 2007/287}, year = {2007}, url = {http://eprint.iacr.org/2007/287}, } @misc{cryptoeprint:2007:288, author = {Dennis Hofheinz and Eike Kiltz}, title = {Secure Hybrid Encryption from Weakened Key Encapsulation}, howpublished = {Cryptology ePrint Archive, Report 2007/288}, year = {2007}, url = {http://eprint.iacr.org/2007/288}, } @misc{cryptoeprint:2007:289, author = {Michael Backes and Matteo Maffei and Dominique Unruh}, title = {Zero-Knowledge in the Applied Pi-calculus and Automated Verification of the Direct Anonymous Attestation Protocol}, howpublished = {Cryptology ePrint Archive, Report 2007/289}, year = {2007}, url = {http://eprint.iacr.org/2007/289}, } @misc{cryptoeprint:2007:290, author = {Sumanta Sarkar and Subhamoy Maitra}, title = {Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity on Odd Number of Variables}, howpublished = {Cryptology ePrint Archive, Report 2007/290}, year = {2007}, url = {http://eprint.iacr.org/2007/290}, } @misc{cryptoeprint:2007:291, author = {James Birkett and Alexander W. Dent}, title = {Relations Among Notions of Plaintext Awareness}, howpublished = {Cryptology ePrint Archive, Report 2007/291}, year = {2007}, url = {http://eprint.iacr.org/2007/291}, } @misc{cryptoeprint:2007:292, author = {Mridul Nandi}, title = {Improved security analysis of OMAC}, howpublished = {Cryptology ePrint Archive, Report 2007/292}, year = {2007}, url = {http://eprint.iacr.org/2007/292}, } @misc{cryptoeprint:2007:293, author = {Eun Sun Yoo, Koutarou Suzuki and Myung-Hwan Kim}, title = {Fully Resilient Traitor Tracing Scheme using Key Update}, howpublished = {Cryptology ePrint Archive, Report 2007/293}, year = {2007}, url = {http://eprint.iacr.org/2007/293}, } @misc{cryptoeprint:2007:294, author = {Julien Bringer and Herve Chabanne and Thomas Icart}, title = {Improved Privacy of the Tree-Based Hash protocols using Physically Unclonable Function}, howpublished = {Cryptology ePrint Archive, Report 2007/294}, year = {2007}, url = {http://eprint.iacr.org/2007/294}, } @misc{cryptoeprint:2007:295, author = {Markku-Juhani O. Saarinen}, title = {Linearization Attacks Against Syndrome Based Hashes}, howpublished = {Cryptology ePrint Archive, Report 2007/295}, year = {2007}, url = {http://eprint.iacr.org/2007/295}, } @misc{cryptoeprint:2007:296, author = {Doo Ho Choi, Dong-Guk Han, and Howon Kim}, title = {Construction of Efficient and Secure Pairing Algorithm and its Application}, howpublished = {Cryptology ePrint Archive, Report 2007/296}, year = {2007}, url = {http://eprint.iacr.org/2007/296}, } @misc{cryptoeprint:2007:297, author = {Laszlo Csirmaz}, title = {Secret sharing on infinite graphs}, howpublished = {Cryptology ePrint Archive, Report 2007/297}, year = {2007}, url = {http://eprint.iacr.org/2007/297}, } @misc{cryptoeprint:2007:298, author = {David A. McGrew and Scott R. Fluhrer}, title = {The Security of the Extended Codebook (XCB) Mode of Operation}, howpublished = {Cryptology ePrint Archive, Report 2007/298}, year = {2007}, url = {http://eprint.iacr.org/2007/298}, } @misc{cryptoeprint:2007:299, author = {Michael Scott and Piotr Szczechowiak}, title = {Optimizing Multiprecision Multiplication for Public Key Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2007/299}, year = {2007}, url = {http://eprint.iacr.org/2007/299}, } @misc{cryptoeprint:2007:300, author = {Renji Tao}, title = {A Note on Automata-based Dynamic Convolutional Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2007/300}, year = {2007}, url = {http://eprint.iacr.org/2007/300}, } @misc{cryptoeprint:2007:301, author = {Yuri Borissov and Moon Ho Lee and Svetla Nikova}, title = {On Asymptotic Behavior of the Ratio Between the Numbers of Binary Primitive and Irreducible Polynomials}, howpublished = {Cryptology ePrint Archive, Report 2007/301}, year = {2007}, url = {http://eprint.iacr.org/2007/301}, } @misc{cryptoeprint:2007:302, author = {Hidenori Kuwakado and Masakatu Morii}, title = {Compression Functions Suitable for the Multi-Property-Preserving Transform}, howpublished = {Cryptology ePrint Archive, Report 2007/302}, year = {2007}, url = {http://eprint.iacr.org/2007/302}, } @misc{cryptoeprint:2007:303, author = {Manoj Kumar}, title = {A Forward Secure Remote User Authentication Scheme}, howpublished = {Cryptology ePrint Archive, Report 2007/303}, year = {2007}, url = {http://eprint.iacr.org/2007/303}, } @misc{cryptoeprint:2007:304, author = {Simon R. Blackburn, Tuvi Etzion, Douglas R. Stinson and Gregory M. Zaverucha}, title = {A Bound on the Size of Separating Hash Families}, howpublished = {Cryptology ePrint Archive, Report 2007/304}, year = {2007}, url = {http://eprint.iacr.org/2007/304}, } @misc{cryptoeprint:2007:305, author = {Goutam Paul and Subhamoy Maitra and Rohit Srivastava}, title = {On Non-Randomness of the Permutation after RC4 Key Scheduling}, howpublished = {Cryptology ePrint Archive, Report 2007/305}, year = {2007}, url = {http://eprint.iacr.org/2007/305}, } @misc{cryptoeprint:2007:306, author = {Thanh-Ha Le and Quoc-Thinh Nguyen-Vuong and Cécile Canovas and Jessy Clédière }, title = {Novel Approaches for Improving the Power Consumption Models in Correlation Analysis}, howpublished = {Cryptology ePrint Archive, Report 2007/306}, year = {2007}, url = {http://eprint.iacr.org/2007/306}, } @misc{cryptoeprint:2007:307, author = {Oleg A. Logachev}, title = {Locally Invertible Boolean Mappings}, howpublished = {Cryptology ePrint Archive, Report 2007/307}, year = {2007}, url = {http://eprint.iacr.org/2007/307}, } @misc{cryptoeprint:2007:308, author = {Selcuk Kavut and Melek Diker Yucel}, title = {Generalized Rotation Symmetric and Dihedral Symmetric Boolean Functions - 9 variable Boolean Functions with Nonlinearity 242}, howpublished = {Cryptology ePrint Archive, Report 2007/308}, year = {2007}, url = {http://eprint.iacr.org/2007/308}, } @misc{cryptoeprint:2007:309, author = {Subhamoy Maitra}, title = {Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound}, howpublished = {Cryptology ePrint Archive, Report 2007/309}, year = {2007}, url = {http://eprint.iacr.org/2007/309}, } @misc{cryptoeprint:2007:310, author = {Kwang Ho Kim}, title = {A Note on Point Multiplication on Supersingular Elliptic Curves over Ternary Fields}, howpublished = {Cryptology ePrint Archive, Report 2007/310}, year = {2007}, url = {http://eprint.iacr.org/2007/310}, } @misc{cryptoeprint:2007:311, author = {Jean-Luc Beuchat and Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto}, title = {A Refined Algorithm for the $\eta_T$ Pairing Calculation in Characteristic Three}, howpublished = {Cryptology ePrint Archive, Report 2007/311}, year = {2007}, url = {http://eprint.iacr.org/2007/311}, } @misc{cryptoeprint:2007:312, author = {Hyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn Chung, and Justin Zhan }, title = {Secure Similarity Search}, howpublished = {Cryptology ePrint Archive, Report 2007/312}, year = {2007}, url = {http://eprint.iacr.org/2007/312}, } @misc{cryptoeprint:2007:313, author = {Shengbao Wang and Zhenfu Cao and Zhaohui Cheng and Kim-Kwang Raymond Choo}, title = {Perfect Forward Secure Identity-Based Authenticated Key Agreement Protocol in the Escrow Mode}, howpublished = {Cryptology ePrint Archive, Report 2007/313}, year = {2007}, url = {http://eprint.iacr.org/2007/313}, } @misc{cryptoeprint:2007:314, author = {G. Barthe and B. Gr{\'e}goire and R. Janvier and S. Zanella B{\'e}guelin}, title = {Formal Certification of Code-Based Cryptographic Proofs}, howpublished = {Cryptology ePrint Archive, Report 2007/314}, year = {2007}, url = {http://eprint.iacr.org/2007/314}, } @misc{cryptoeprint:2007:315, author = {Shai Halevi and Hugo Krawczyk}, title = {Security under Key-Dependent Inputs}, howpublished = {Cryptology ePrint Archive, Report 2007/315}, year = {2007}, url = {http://eprint.iacr.org/2007/315}, } @misc{cryptoeprint:2007:316, author = {Sunder Lal and Priyam Sharma}, title = {SECURITY PROOF FOR SHENGBAO WANG’S IDENTITY-BASED ENCRYPTION SCHEME}, howpublished = {Cryptology ePrint Archive, Report 2007/316}, year = {2007}, url = {http://eprint.iacr.org/2007/316}, } @misc{cryptoeprint:2007:317, author = {Palash Sarkar}, title = {Improving Upon the TET Mode of Operation}, howpublished = {Cryptology ePrint Archive, Report 2007/317}, year = {2007}, url = {http://eprint.iacr.org/2007/317}, } @misc{cryptoeprint:2007:318, author = {Michael Neve and Kris Tiri}, title = {On the complexity of side-channel attacks on AES-256 -- methodology and quantitative results on cache attacks}, howpublished = {Cryptology ePrint Archive, Report 2007/318}, year = {2007}, url = {http://eprint.iacr.org/2007/318}, } @misc{cryptoeprint:2007:319, author = {Guomin Yang and Duncan S. Wong and Qiong Huang and Xiaotie Deng}, title = {A New Security Definition for Public Key Encryption Schemes and Its Applications}, howpublished = {Cryptology ePrint Archive, Report 2007/319}, year = {2007}, url = {http://eprint.iacr.org/2007/319}, } @misc{cryptoeprint:2007:320, author = {Zhengjun Cao}, title = {On the Big Gap Between $|p|$ and $|q|$ in DSA}, howpublished = {Cryptology ePrint Archive, Report 2007/320}, year = {2007}, url = {http://eprint.iacr.org/2007/320}, } @misc{cryptoeprint:2007:321, author = {Selcuk Kavut and Melek Diker Yucel}, title = {Balanced Boolean Functions with Nonlinearity > 2^{n-1} - 2^{(n-1)/2}}, howpublished = {Cryptology ePrint Archive, Report 2007/321}, year = {2007}, url = {http://eprint.iacr.org/2007/321}, } @misc{cryptoeprint:2007:322, author = {Jintai Ding and Richard Lindner}, title = {Identifying Ideal Lattices}, howpublished = {Cryptology ePrint Archive, Report 2007/322}, year = {2007}, url = {http://eprint.iacr.org/2007/322}, } @misc{cryptoeprint:2007:323, author = {Rafail Ostrovsky and Amit Sahai and Brent Waters}, title = {Attribute-Based Encryption with Non-Monotonic Access Structures}, howpublished = {Cryptology ePrint Archive, Report 2007/323}, year = {2007}, url = {http://eprint.iacr.org/2007/323}, } @misc{cryptoeprint:2007:324, author = {Mike Burmester and Breno de Medeiros}, title = {Towards provable security for route discovery protocols in mobile ad hoc networks}, howpublished = {Cryptology ePrint Archive, Report 2007/324}, year = {2007}, url = {http://eprint.iacr.org/2007/324}, } @misc{cryptoeprint:2007:325, author = {Rosario Gennaro}, title = {Faster and Shorter Password-Authenticated Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2007/325}, year = {2007}, url = {http://eprint.iacr.org/2007/325}, } @misc{cryptoeprint:2007:326, author = {Jun Shao and Zhenfu Cao and Licheng Wang and Rongxing Lu}, title = {Efficient Password-based Authenticated Key Exchange without Public Information}, howpublished = {Cryptology ePrint Archive, Report 2007/326}, year = {2007}, url = {http://eprint.iacr.org/2007/326}, } @misc{cryptoeprint:2007:327, author = {Ivan Damgaard and Serge Fehr and Louis Salvail and Christian Schaffner}, title = {Secure Identification and QKD in the Bounded-Quantum-Storage Model}, howpublished = {Cryptology ePrint Archive, Report 2007/327}, year = {2007}, url = {http://eprint.iacr.org/2007/327}, } @misc{cryptoeprint:2007:328, author = {Ivan Damgaard and Serge Fehr and Renato Renner and Louis Salvail and Christian Schaffner}, title = {A Tight High-Order Entropic Quantum Uncertainty Relation With Applications}, howpublished = {Cryptology ePrint Archive, Report 2007/328}, year = {2007}, url = {http://eprint.iacr.org/2007/328}, } @misc{cryptoeprint:2007:329, author = {David Lubicz and Thomas Sirvent}, title = {A Tunable Broadcast Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2007/329}, year = {2007}, url = {http://eprint.iacr.org/2007/329}, } @misc{cryptoeprint:2007:330, author = {Yossi Oren}, title = {Remote Power Analysis of {RFID} Tags}, howpublished = {Cryptology ePrint Archive, Report 2007/330}, year = {2007}, url = {http://eprint.iacr.org/2007/330}, } @misc{cryptoeprint:2007:331, author = {Ivan Damgaard and Jesper Buus Nielsen and Daniel Wichs }, title = {Isolated Proofs of Knowledge and Isolated Zero Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2007/331}, year = {2007}, url = {http://eprint.iacr.org/2007/331}, } @misc{cryptoeprint:2007:332, author = {Ivan Damgaard and Jesper Buus Nielsen and Daniel Wichs }, title = {Universally Composable Multiparty Computation with Partially Isolated Parties}, howpublished = {Cryptology ePrint Archive, Report 2007/332}, year = {2007}, url = {http://eprint.iacr.org/2007/332}, } @misc{cryptoeprint:2007:333, author = {Dennis Hofheinz and Dominique Unruh}, title = {Towards Key-Dependent Message Security in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2007/333}, year = {2007}, url = {http://eprint.iacr.org/2007/333}, } @misc{cryptoeprint:2007:334, author = {Nishanth Chandran and Vipul Goyal and Amit Sahai}, title = {New Constructions for UC Secure Computation using Tamper-proof Hardware}, howpublished = {Cryptology ePrint Archive, Report 2007/334}, year = {2007}, url = {http://eprint.iacr.org/2007/334}, } @misc{cryptoeprint:2007:335, author = {Sergei Evdokimov and Oliver Guenther}, title = {Encryption Techniques for Secure Database Outsourcing}, howpublished = {Cryptology ePrint Archive, Report 2007/335}, year = {2007}, url = {http://eprint.iacr.org/2007/335}, } @misc{cryptoeprint:2007:336, author = {Onur Aciicmez and Werner Schindler}, title = {A Major Vulnerability in RSA Implementations due to MicroArchitectural Analysis Threat}, howpublished = {Cryptology ePrint Archive, Report 2007/336}, year = {2007}, url = {http://eprint.iacr.org/2007/336}, } @misc{cryptoeprint:2007:337, author = {W. Bamberger and O. Welter and S. Spitz and M. Marhöfer}, title = {Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication (Revised)}, howpublished = {Cryptology ePrint Archive, Report 2007/337}, year = {2007}, url = {http://eprint.iacr.org/2007/337}, } @misc{cryptoeprint:2007:338, author = {Wei Dai and Ted Krovetz}, title = {VHASH Security}, howpublished = {Cryptology ePrint Archive, Report 2007/338}, year = {2007}, url = {http://eprint.iacr.org/2007/338}, } @misc{cryptoeprint:2007:339, author = {Chengqing Li and Guanrong Chen}, title = {On the security of a class of image encryption schemes}, howpublished = {Cryptology ePrint Archive, Report 2007/339}, year = {2007}, url = {http://eprint.iacr.org/2007/339}, } @misc{cryptoeprint:2007:340, author = {Motoi Yoshitomi and Tsuyoshi Takagi and Shinsaku Kiyomoto and Toshiaki Tanaka}, title = {Efficient Implementation of the Pairing on Mobilephones using BREW}, howpublished = {Cryptology ePrint Archive, Report 2007/340}, year = {2007}, url = {http://eprint.iacr.org/2007/340}, } @misc{cryptoeprint:2007:341, author = {Matthew Franklin and Mark Gondree and Payman Mohassel}, title = {Multi-Party Indirect Indexing and Applications}, howpublished = {Cryptology ePrint Archive, Report 2007/341}, year = {2007}, url = {http://eprint.iacr.org/2007/341}, } @misc{cryptoeprint:2007:342, author = {Fengjiao Wang and Yuqing Zhang}, title = {A New Security Model for Cross-Realm C2C-PAKE Protocol}, howpublished = {Cryptology ePrint Archive, Report 2007/342}, year = {2007}, url = {http://eprint.iacr.org/2007/342}, } @misc{cryptoeprint:2007:343, author = {Laura Hitt}, title = {Updated standards for validating elliptic curves}, howpublished = {Cryptology ePrint Archive, Report 2007/343}, year = {2007}, url = {http://eprint.iacr.org/2007/343}, } @misc{cryptoeprint:2007:344, author = {Liufei Wu,Yuqing Zhang, FengjiaoWang}, title = {Security Analysis of WAPI Authentication and Key Exchange Protocol}, howpublished = {Cryptology ePrint Archive, Report 2007/344}, year = {2007}, url = {http://eprint.iacr.org/2007/344}, } @misc{cryptoeprint:2007:345, author = {Wilson Kan}, title = {Analysis of Underlying Assumptions in NIST DRBGs}, howpublished = {Cryptology ePrint Archive, Report 2007/345}, year = {2007}, url = {http://eprint.iacr.org/2007/345}, } @misc{cryptoeprint:2007:346, author = {Shailesh Vaya}, title = {Secure computation on incomplete networks}, howpublished = {Cryptology ePrint Archive, Report 2007/346}, year = {2007}, url = {http://eprint.iacr.org/2007/346}, } @misc{cryptoeprint:2007:347, author = {Aaram Yun and Je Hong Park and Jooyoung Lee}, title = {Lai-Massey Scheme and Quasi-Feistel Networks}, howpublished = {Cryptology ePrint Archive, Report 2007/347}, year = {2007}, url = {http://eprint.iacr.org/2007/347}, } @misc{cryptoeprint:2007:348, author = {Chris Peikert and Vinod Vaikuntanathan and Brent Waters}, title = {A Framework for Efficient and Composable Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2007/348}, year = {2007}, url = {http://eprint.iacr.org/2007/348}, } @misc{cryptoeprint:2007:349, author = {Manoj Prabhakaran and Rui Xue}, title = {Statistically Hiding Sets}, howpublished = {Cryptology ePrint Archive, Report 2007/349}, year = {2007}, url = {http://eprint.iacr.org/2007/349}, } @misc{cryptoeprint:2007:350, author = {David Goldenberg and Susan Hohenberger and Moses Liskov and Elizabeth Crump Schwartz and Hakan Seyalioglu}, title = {On Tweaking Luby-Rackoff Blockciphers}, howpublished = {Cryptology ePrint Archive, Report 2007/350}, year = {2007}, url = {http://eprint.iacr.org/2007/350}, } @misc{cryptoeprint:2007:351, author = {Iftach Haitner and Jonathan J. Hoch and Gil Segev}, title = {A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval}, howpublished = {Cryptology ePrint Archive, Report 2007/351}, year = {2007}, url = {http://eprint.iacr.org/2007/351}, } @misc{cryptoeprint:2007:352, author = {Somitra Kumar Sanadhya and Palash Sarkar}, title = {New Local Collisions for the SHA-2 Hash Family}, howpublished = {Cryptology ePrint Archive, Report 2007/352}, year = {2007}, url = {http://eprint.iacr.org/2007/352}, } @misc{cryptoeprint:2007:353, author = {Chris Studholme and Ian Blake}, title = {Multiparty Computation to Generate Secret Permutations}, howpublished = {Cryptology ePrint Archive, Report 2007/353}, year = {2007}, url = {http://eprint.iacr.org/2007/353}, } @misc{cryptoeprint:2007:354, author = {Cheng-Kang Chu and Wen-Guey Tzeng}, title = {Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures}, howpublished = {Cryptology ePrint Archive, Report 2007/354}, year = {2007}, url = {http://eprint.iacr.org/2007/354}, } @misc{cryptoeprint:2007:355, author = {Laszlo Csirmaz}, title = {Secret sharing on the infinite ladder}, howpublished = {Cryptology ePrint Archive, Report 2007/355}, year = {2007}, url = {http://eprint.iacr.org/2007/355}, } @misc{cryptoeprint:2007:356, author = {Christophe Petit and Francois-Xavier Standaert and Olivier Pereira and Tal G. Malkin and Moti Yung}, title = {A Block Cipher based PRNG Secure Against Side-Channel Key Recovery}, howpublished = {Cryptology ePrint Archive, Report 2007/356}, year = {2007}, url = {http://eprint.iacr.org/2007/356}, } @misc{cryptoeprint:2007:357, author = {Michael Braun and Anton Kargl}, title = {A Note on Signature Standards}, howpublished = {Cryptology ePrint Archive, Report 2007/357}, year = {2007}, url = {http://eprint.iacr.org/2007/357}, } @misc{cryptoeprint:2007:358, author = {Jonathan Katz and Chiu-Yuen Koo and Ranjit Kumaresan}, title = {Improving the Round Complexity of VSS in Point-to-Point Networks}, howpublished = {Cryptology ePrint Archive, Report 2007/358}, year = {2007}, url = {http://eprint.iacr.org/2007/358}, } @misc{cryptoeprint:2007:359, author = {Stefan Dziembowski and Krzysztof Pietrzak}, title = {Intrusion-Resilient Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2007/359}, year = {2007}, url = {http://eprint.iacr.org/2007/359}, } @misc{cryptoeprint:2007:360, author = {Andy Rupp and Gregor Leander and Endre Bangerter and Ahmad-Reza Sadeghi and Alexander W. Dent}, title = {Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems}, howpublished = {Cryptology ePrint Archive, Report 2007/360}, year = {2007}, url = {http://eprint.iacr.org/2007/360}, } @misc{cryptoeprint:2007:361, author = {Toshihiko Matsuo}, title = {Proxy Re-encryption Systems for Identity-based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2007/361}, year = {2007}, url = {http://eprint.iacr.org/2007/361}, } @misc{cryptoeprint:2007:362, author = {Mohamed Abo El-Fotouh and Klaus Diepold}, title = {Statistical Testing for Disk Encryption Modes of Operations}, howpublished = {Cryptology ePrint Archive, Report 2007/362}, year = {2007}, url = {http://eprint.iacr.org/2007/362}, } @misc{cryptoeprint:2007:363, author = {{\L}ukasz Chmielewski and Jaap-Henk Hoepman}, title = {Fuzzy Private Matching (Extended Abstract)}, howpublished = {Cryptology ePrint Archive, Report 2007/363}, year = {2007}, url = {http://eprint.iacr.org/2007/363}, } @misc{cryptoeprint:2007:364, author = {Doug Kuhlman and Ryan Moriarty and Tony Braskich and Steve Emeott and Mahesh Tripunitara}, title = {A Proof of Security of a Mesh Security Architecture}, howpublished = {Cryptology ePrint Archive, Report 2007/364}, year = {2007}, url = {http://eprint.iacr.org/2007/364}, } @misc{cryptoeprint:2007:365, author = {Christian Robenhagen Ravnshoj}, title = {Pairings on Jacobians of Hyperelliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2007/365}, year = {2007}, url = {http://eprint.iacr.org/2007/365}, } @misc{cryptoeprint:2007:366, author = {Jintai Ding and Bo-Yin Yang and Chen-Mou Cheng and Owen Chen and Vivien Dubois}, title = {Breaking the Symmetry: a Way to Resist the New Differential Attack}, howpublished = {Cryptology ePrint Archive, Report 2007/366}, year = {2007}, url = {http://eprint.iacr.org/2007/366}, } @misc{cryptoeprint:2007:367, author = {Jintai Ding and John Wagner}, title = {Cryptanalysis of Rational Multivariate Public Key Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2007/367}, year = {2007}, url = {http://eprint.iacr.org/2007/367}, } @misc{cryptoeprint:2007:368, author = {Vipul Goyal}, title = {Reducing Trust in the PKG in Identity Based Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2007/368}, year = {2007}, url = {http://eprint.iacr.org/2007/368}, } @misc{cryptoeprint:2007:369, author = {Vipul Goyal and Jonathan Katz}, title = {Universally Composable Multi-Party Computation with an Unreliable Common Reference String}, howpublished = {Cryptology ePrint Archive, Report 2007/369}, year = {2007}, url = {http://eprint.iacr.org/2007/369}, } @misc{cryptoeprint:2007:370, author = {Claude Carlet and Xiangyong Zeng and Chunlei Li and Lei Hu}, title = {FURTHER PROPERTIES OF SEVERAL CLASSES OF BOOLEAN FUNCTIONS WITH OPTIMUM ALGEBRAIC IMMUNITY}, howpublished = {Cryptology ePrint Archive, Report 2007/370}, year = {2007}, url = {http://eprint.iacr.org/2007/370}, } @misc{cryptoeprint:2007:371, author = {Chunbo Ma, Jun Ao, and Jianhua Li}, title = {Group-oriented encryption secure against collude attack}, howpublished = {Cryptology ePrint Archive, Report 2007/371}, year = {2007}, url = {http://eprint.iacr.org/2007/371}, } @misc{cryptoeprint:2007:372, author = {Zhengjun Cao}, title = {On the Authentication of One Popular Signcryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2007/372}, year = {2007}, url = {http://eprint.iacr.org/2007/372}, } @misc{cryptoeprint:2007:373, author = {Markku-Juhani O. Saarinen}, title = {A Meet-in-the-Middle Collision Attack Against the New FORK-256}, howpublished = {Cryptology ePrint Archive, Report 2007/373}, year = {2007}, url = {http://eprint.iacr.org/2007/373}, } @misc{cryptoeprint:2007:374, author = {Mathias Herrmann and Alexander May}, title = {On Factoring Arbitrary Integers with Known Bits}, howpublished = {Cryptology ePrint Archive, Report 2007/374}, year = {2007}, url = {http://eprint.iacr.org/2007/374}, } @misc{cryptoeprint:2007:375, author = {Gregory Hirshman}, title = {Further Musings on the Wang et al. MD5 Collision: Improvements and Corrections on the Work of Hawkes, Paddon, and Rose}, howpublished = {Cryptology ePrint Archive, Report 2007/375}, year = {2007}, url = {http://eprint.iacr.org/2007/375}, } @misc{cryptoeprint:2007:376, author = {Zhengjun Cao}, title = {An Efficient Range-Bounded Commitment Scheme}, howpublished = {Cryptology ePrint Archive, Report 2007/376}, year = {2007}, url = {http://eprint.iacr.org/2007/376}, } @misc{cryptoeprint:2007:377, author = {Rongquan Feng, Hongfeng Wu}, title = {Fast Point Multiplication on Elliptic Curves of Even Order}, howpublished = {Cryptology ePrint Archive, Report 2007/377}, year = {2007}, url = {http://eprint.iacr.org/2007/377}, } @misc{cryptoeprint:2007:378, author = {Sean O'Neil}, title = {Algebraic Structure Defectoscopy}, howpublished = {Cryptology ePrint Archive, Report 2007/378}, year = {2007}, url = {http://eprint.iacr.org/2007/378}, } @misc{cryptoeprint:2007:379, author = {Xiangyong Zeng and Lei Hu and Yang Yang and Wenfeng Jiang}, title = {On The Inequivalence Of Ness-Helleseth APN Functions}, howpublished = {Cryptology ePrint Archive, Report 2007/379}, year = {2007}, url = {http://eprint.iacr.org/2007/379}, } @misc{cryptoeprint:2007:380, author = {Francois Arnault, Thierry P. Berger, Cédric Lauradoux and Marine Minier}, title = {X-FCSR: a new software oriented stream cipher based upon FCSRs}, howpublished = {Cryptology ePrint Archive, Report 2007/380}, year = {2007}, url = {http://eprint.iacr.org/2007/380}, } @misc{cryptoeprint:2007:381, author = {Xuyun Nie and Xin Jiang and Lei Hu and Jintai Ding}, title = {Cryptanalysis of Two New Instances of TTM Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2007/381}, year = {2007}, url = {http://eprint.iacr.org/2007/381}, } @misc{cryptoeprint:2007:382, author = {K. Kobara and K. Morozov and R. Overbeck}, title = {Oblivious Transfer via McEliece's PKC and Permuted Kernels}, howpublished = {Cryptology ePrint Archive, Report 2007/382}, year = {2007}, url = {http://eprint.iacr.org/2007/382}, } @misc{cryptoeprint:2007:383, author = {Meng-Hui Lim and Sanggon Lee and Hoonjae Lee}, title = {Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication Protocol}, howpublished = {Cryptology ePrint Archive, Report 2007/383}, year = {2007}, url = {http://eprint.iacr.org/2007/383}, } @misc{cryptoeprint:2007:384, author = {Mira Belenkiy and Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya}, title = {Non-Interactive Anonymous Credentials}, howpublished = {Cryptology ePrint Archive, Report 2007/384}, year = {2007}, url = {http://eprint.iacr.org/2007/384}, } @misc{cryptoeprint:2007:385, author = {Danilo Gligoroski}, title = {On the insecurity of interchanged use of OFB and CBC modes of operation}, howpublished = {Cryptology ePrint Archive, Report 2007/385}, year = {2007}, url = {http://eprint.iacr.org/2007/385}, } @misc{cryptoeprint:2007:386, author = {Tsz Hon Yuen and Man Ho Au and Joseph K. Liu and Willy Susilo}, title = {(Convertible) Undeniable Signatures without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2007/386}, year = {2007}, url = {http://eprint.iacr.org/2007/386}, } @misc{cryptoeprint:2007:387, author = {John A. Clark and Juan M. E. Tapiador}, title = {Analysis of Local Optima in Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2007/387}, year = {2007}, url = {http://eprint.iacr.org/2007/387}, } @misc{cryptoeprint:2007:388, author = {Peter Gazi and Martin Stanek}, title = {On Ciphertext Undetectability}, howpublished = {Cryptology ePrint Archive, Report 2007/388}, year = {2007}, url = {http://eprint.iacr.org/2007/388}, } @misc{cryptoeprint:2007:389, author = {Dragos Florin Ciocan and Salil Vadhan}, title = {Interactive and Noninteractive Zero Knowledge Coincide in the Help Model}, howpublished = {Cryptology ePrint Archive, Report 2007/389}, year = {2007}, url = {http://eprint.iacr.org/2007/389}, } @misc{cryptoeprint:2007:390, author = {Augusto Jun Devegili and Michael Scott and Ricardo Dahab}, title = {Implementing Cryptographic Pairings over Barreto-Naehrig Curves}, howpublished = {Cryptology ePrint Archive, Report 2007/390}, year = {2007}, url = {http://eprint.iacr.org/2007/390}, } @misc{cryptoeprint:2007:391, author = {Reza Ebrahimi Atani, Shahabaddin Ebrahimi Atani, Sattar Mirzakuchaki}, title = {A novel public key crypto system based on semi-modules over quotient semi-rings}, howpublished = {Cryptology ePrint Archive, Report 2007/391}, year = {2007}, url = {http://eprint.iacr.org/2007/391}, } @misc{cryptoeprint:2007:392, author = {Andy Parrish and Jonathan Trostle}, title = {A Fast Protocol for Computationally Private Information Retrieval}, howpublished = {Cryptology ePrint Archive, Report 2007/392}, year = {2007}, url = {http://eprint.iacr.org/2007/392}, } @misc{cryptoeprint:2007:393, author = {Haining Fan and Jiaguang Sun and Ming Gu and Kwok-Yan Lam}, title = {Overlap-free Karatsuba-Ofman Polynomial Multiplication Algorithms for Hardware Implementations}, howpublished = {Cryptology ePrint Archive, Report 2007/393}, year = {2007}, url = {http://eprint.iacr.org/2007/393}, } @misc{cryptoeprint:2007:394, author = {Juan A. Garay and Rafail Ostrovsky}, title = {Almost-everywhere Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2007/394}, year = {2007}, url = {http://eprint.iacr.org/2007/394}, } @misc{cryptoeprint:2007:395, author = {Charles Bouillaguet and Pierre-Alain Fouque and Adi Shamir and Sebastien Zimmer}, title = {Second Preimage Attacks on Dithered Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2007/395}, year = {2007}, url = {http://eprint.iacr.org/2007/395}, } @misc{cryptoeprint:2007:396, author = {Jun Shao and Zhenfu Cao and Licheng Wang and Xiaohui Liang}, title = {Proxy Re-Signature Schemes without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2007/396}, year = {2007}, url = {http://eprint.iacr.org/2007/396}, } @misc{cryptoeprint:2007:397, author = {Chengqing Li, Shujun Li, Muhammad Asim, Juana Nunez, Gonzalo Alvarez and Guanrong Chen}, title = {On the security defects of an image encryption scheme}, howpublished = {Cryptology ePrint Archive, Report 2007/397}, year = {2007}, url = {http://eprint.iacr.org/2007/397}, } @misc{cryptoeprint:2007:398, author = {Li Kang and Xiaohu Tang and Xianhui Lu and Jia Fan}, title = {A Short Signature Scheme in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2007/398}, year = {2007}, url = {http://eprint.iacr.org/2007/398}, } @misc{cryptoeprint:2007:399, author = {Carl Ellison}, title = {Ceremony Design and Analysis}, howpublished = {Cryptology ePrint Archive, Report 2007/399}, year = {2007}, url = {http://eprint.iacr.org/2007/399}, } @misc{cryptoeprint:2007:400, author = {Sunder Lal and Priyam Sharma}, title = {REMARKS ON IBE SCHEME OF WANG AND CAO}, howpublished = {Cryptology ePrint Archive, Report 2007/400}, year = {2007}, url = {http://eprint.iacr.org/2007/400}, } @misc{cryptoeprint:2007:401, author = {Neal Koblitz}, title = {Another Look at Automated Theorem-Proving}, howpublished = {Cryptology ePrint Archive, Report 2007/401}, year = {2007}, url = {http://eprint.iacr.org/2007/401}, } @misc{cryptoeprint:2007:402, author = {Mike Burmester and Breno de Medeiros and Rossana Motta}, title = {Robust, Anonymous RFID Authentication with Constant Key-Lookup}, howpublished = {Cryptology ePrint Archive, Report 2007/402}, year = {2007}, url = {http://eprint.iacr.org/2007/402}, } @misc{cryptoeprint:2007:403, author = {Danilo Gligoroski and Svein Johan Knapskog}, title = {Turbo SHA-2}, howpublished = {Cryptology ePrint Archive, Report 2007/403}, year = {2007}, url = {http://eprint.iacr.org/2007/403}, } @misc{cryptoeprint:2007:404, author = {Jonathan Katz and Amit Sahai and Brent Waters}, title = {Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products}, howpublished = {Cryptology ePrint Archive, Report 2007/404}, year = {2007}, url = {http://eprint.iacr.org/2007/404}, } @misc{cryptoeprint:2007:405, author = {Michael Feng-Hao Liu and Chi-Jen Lu and Bo-Yin Yang and Jintai Ding }, title = {Secure PRNGs from Specialized Polynomial Maps over Any $F_q$ }, howpublished = {Cryptology ePrint Archive, Report 2007/405}, year = {2007}, url = {http://eprint.iacr.org/2007/405}, } @misc{cryptoeprint:2007:406, author = {Ran Canetti and Ling Cheung and Dilsun Kaynar and Nancy Lynch and Olivier Pereira}, title = {Modeling Computational Security in Long-Lived Systems}, howpublished = {Cryptology ePrint Archive, Report 2007/406}, year = {2007}, url = {http://eprint.iacr.org/2007/406}, } @misc{cryptoeprint:2007:407, author = {Mike Burmester and Breno de Medeiros and Rossana Motta}, title = {Provably Secure Grouping-proofs for RFID tags}, howpublished = {Cryptology ePrint Archive, Report 2007/407}, year = {2007}, url = {http://eprint.iacr.org/2007/407}, } @misc{cryptoeprint:2007:408, author = {Meiqin Wang}, title = {Differential Cryptanalysis of PRESENT}, howpublished = {Cryptology ePrint Archive, Report 2007/408}, year = {2007}, url = {http://eprint.iacr.org/2007/408}, } @misc{cryptoeprint:2007:409, author = {Thomas Shrimpton and Martijn Stam}, title = {Building a Collision-Resistant Compression Function from Non-Compressing Primitives}, howpublished = {Cryptology ePrint Archive, Report 2007/409}, year = {2007}, url = {http://eprint.iacr.org/2007/409}, } @misc{cryptoeprint:2007:410, author = {Daniel J. Bernstein and Tanja Lange}, title = {Inverted Edwards coordinates}, howpublished = {Cryptology ePrint Archive, Report 2007/410}, year = {2007}, url = {http://eprint.iacr.org/2007/410}, } @misc{cryptoeprint:2007:411, author = {Meng-Hui Lim and Sanggon Lee and Hoonjae Lee}, title = {Cryptanalysis on Improved One-round Lin-Li's Tripartite Key Agreement Protocol}, howpublished = {Cryptology ePrint Archive, Report 2007/411}, year = {2007}, url = {http://eprint.iacr.org/2007/411}, } @misc{cryptoeprint:2007:412, author = {Gideon Samid}, title = {Proposing a Master One-Way Function }, howpublished = {Cryptology ePrint Archive, Report 2007/412}, year = {2007}, url = {http://eprint.iacr.org/2007/412}, } @misc{cryptoeprint:2007:413, author = {Michael Vielhaber}, title = {Breaking ONE.FIVIUM by AIDA an Algebraic IV Differential Attack}, howpublished = {Cryptology ePrint Archive, Report 2007/413}, year = {2007}, url = {http://eprint.iacr.org/2007/413}, } @misc{cryptoeprint:2007:414, author = {Daniel J. Bernstein and Peter Birkner and Tanja Lange and Christiane Peters}, title = {Optimizing double-base elliptic-curve single-scalar multiplication}, howpublished = {Cryptology ePrint Archive, Report 2007/414}, year = {2007}, url = {http://eprint.iacr.org/2007/414}, } @misc{cryptoeprint:2007:415, author = {Meng-Hui Lim and Sanggon Lee and Hoonjae Lee}, title = {Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol}, howpublished = {Cryptology ePrint Archive, Report 2007/415}, year = {2007}, url = {http://eprint.iacr.org/2007/415}, } @misc{cryptoeprint:2007:416, author = {Donghoon Chang, Mridul Nandi, Jesang Lee, Jaechul Sung and Seokhie Hong}, title = {Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function}, howpublished = {Cryptology ePrint Archive, Report 2007/416}, year = {2007}, url = {http://eprint.iacr.org/2007/416}, } @misc{cryptoeprint:2007:417, author = {Jean-Luc Beuchat and Nicolas Brisebarre and J\'er\'emie Detrey and Eiji Okamoto and Masaaki Shirase and Tsuyoshi Takagi}, title = {Algorithms and Arithmetic Operators for Computing the $\eta_T$ Pairing in Characteristic Three}, howpublished = {Cryptology ePrint Archive, Report 2007/417}, year = {2007}, url = {http://eprint.iacr.org/2007/417}, } @misc{cryptoeprint:2007:418, author = {Amit K Awasthi}, title = {An Improved Remote User Authentication Scheme with Smart Cards using Bilinear Pairings}, howpublished = {Cryptology ePrint Archive, Report 2007/418}, year = {2007}, url = {http://eprint.iacr.org/2007/418}, } @misc{cryptoeprint:2007:419, author = {Leo Dorrendorf and Zvi Gutterman and Benny Pinkas}, title = {Cryptanalysis of the Random Number Generator of the Windows Operating System}, howpublished = {Cryptology ePrint Archive, Report 2007/419}, year = {2007}, url = {http://eprint.iacr.org/2007/419}, } @misc{cryptoeprint:2007:420, author = {Jiayuan Sui and Douglas R. Stinson}, title = {A Critical Analysis and Improvement of AACS Drive-Host Authentication}, howpublished = {Cryptology ePrint Archive, Report 2007/420}, year = {2007}, url = {http://eprint.iacr.org/2007/420}, } @misc{cryptoeprint:2007:421, author = {Andr\'e Chailloux and Iordanis Kerenidis}, title = {The role of help in Classical and Quantum Zero-Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2007/421}, year = {2007}, url = {http://eprint.iacr.org/2007/421}, } @misc{cryptoeprint:2007:422, author = {Man Ho Au and Siu-Ming Yiu}, title = {Structural Identity-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2007/422}, year = {2007}, url = {http://eprint.iacr.org/2007/422}, } @misc{cryptoeprint:2007:423, author = {Laila El Aimani and Joachim von zur Gathen}, title = {Finding Low Weight Polynomial Multiples Using Lattices}, howpublished = {Cryptology ePrint Archive, Report 2007/423}, year = {2007}, url = {http://eprint.iacr.org/2007/423}, } @misc{cryptoeprint:2007:424, author = {Antoine Joux and David Naccache and Emmanuel Thomé}, title = {When e-th Roots Become Easier Than Factoring}, howpublished = {Cryptology ePrint Archive, Report 2007/424}, year = {2007}, url = {http://eprint.iacr.org/2007/424}, } @misc{cryptoeprint:2007:425, author = {Koray Karabina and Edlyn Teske}, title = {On prime-order elliptic curves with embedding degrees k=3,4 and 6}, howpublished = {Cryptology ePrint Archive, Report 2007/425}, year = {2007}, url = {http://eprint.iacr.org/2007/425}, } @misc{cryptoeprint:2007:426, author = {Christine Abegail Antonio, Satoru Tanaka, and Ken Nakamula}, title = {Implementing Cryptographic Pairings over Curves of Embedding Degrees 8 and 10}, howpublished = {Cryptology ePrint Archive, Report 2007/426}, year = {2007}, url = {http://eprint.iacr.org/2007/426}, } @misc{cryptoeprint:2007:427, author = {Sumanta Sarkar and Subhamoy Maitra}, title = {Idempotents in the Neighbourhood of Patterson-Wiedemann Functions having Walsh Spectra Zeros}, howpublished = {Cryptology ePrint Archive, Report 2007/427}, year = {2007}, url = {http://eprint.iacr.org/2007/427}, } @misc{cryptoeprint:2007:428, author = {Benjamin Smith}, title = {Isogenies and the Discrete Logarithm Problem on Jacobians of Genus 3 Hyperelliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2007/428}, year = {2007}, url = {http://eprint.iacr.org/2007/428}, } @misc{cryptoeprint:2007:429, author = {Michael Naehrig and Paulo S. L. M. Barreto and Peter Schwabe}, title = {On compressible pairings and their computation}, howpublished = {Cryptology ePrint Archive, Report 2007/429}, year = {2007}, url = {http://eprint.iacr.org/2007/429}, } @misc{cryptoeprint:2007:430, author = {Scott Contini and Krystian Matusiewicz and Josef Pieprzyk and Ron Steinfeld and Jian Guo and San Ling and Huaxiong Wang}, title = {Cryptanalysis of LASH}, howpublished = {Cryptology ePrint Archive, Report 2007/430}, year = {2007}, url = {http://eprint.iacr.org/2007/430}, } @misc{cryptoeprint:2007:431, author = {Tzer-jen Wei}, title = {Notions of Efficiency in Simulation Paradigm}, howpublished = {Cryptology ePrint Archive, Report 2007/431}, year = {2007}, url = {http://eprint.iacr.org/2007/431}, } @misc{cryptoeprint:2007:432, author = {Craig Gentry and Chris Peikert and Vinod Vaikuntanathan}, title = {Trapdoors for Hard Lattices and New Cryptographic Constructions}, howpublished = {Cryptology ePrint Archive, Report 2007/432}, year = {2007}, url = {http://eprint.iacr.org/2007/432}, } @misc{cryptoeprint:2007:433, author = {Fabien Coelho}, title = {An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol based on Merkle Trees}, howpublished = {Cryptology ePrint Archive, Report 2007/433}, year = {2007}, url = {http://eprint.iacr.org/2007/433}, } @misc{cryptoeprint:2007:434, author = {Xibin Lin and Chang-An Zhao and Fangguo Zhang and Yanming Wang}, title = {Computing the Ate Pairing on Elliptic Curves with Embedding Degree $k=9$}, howpublished = {Cryptology ePrint Archive, Report 2007/434}, year = {2007}, url = {http://eprint.iacr.org/2007/434}, } @misc{cryptoeprint:2007:435, author = {Daniel R. L. Brown}, title = {Irreducibility to the One-More Evaluation Problems: More May Be Less}, howpublished = {Cryptology ePrint Archive, Report 2007/435}, year = {2007}, url = {http://eprint.iacr.org/2007/435}, } @misc{cryptoeprint:2007:436, author = {Gautham Sekar and Souradyuti Paul and Bart Preneel}, title = {New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B}, howpublished = {Cryptology ePrint Archive, Report 2007/436}, year = {2007}, url = {http://eprint.iacr.org/2007/436}, } @misc{cryptoeprint:2007:437, author = {Cuauhtemoc Mancillas-Lopez and Debrup Chakraborty and Francisco Rodriguez-Henriquez}, title = {Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes}, howpublished = {Cryptology ePrint Archive, Report 2007/437}, year = {2007}, url = {http://eprint.iacr.org/2007/437}, } @misc{cryptoeprint:2007:438, author = {Alexandra Boldyreva and Craig Gentry and Adam O'Neill and Dae Hyun Yum}, title = {Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures, with Applications to Secure Routing}, howpublished = {Cryptology ePrint Archive, Report 2007/438}, year = {2007}, url = {http://eprint.iacr.org/2007/438}, } @misc{cryptoeprint:2007:439, author = {Nam-Su Jho and Myung-Hwan Kim and Do Won Hong and Byung-Gil Lee}, title = {Multiparty Key Agreement Using Bilinear Map}, howpublished = {Cryptology ePrint Archive, Report 2007/439}, year = {2007}, url = {http://eprint.iacr.org/2007/439}, } @misc{cryptoeprint:2007:440, author = {Sunder Lal and K.K.Goyal}, title = {An Improved Remote User Authentication Scheme using Bilinear Pairings}, howpublished = {Cryptology ePrint Archive, Report 2007/440}, year = {2007}, url = {http://eprint.iacr.org/2007/440}, } @misc{cryptoeprint:2007:441, author = {Huseyin Hisil and Kenneth Koon-Ho Wong and Gary Carter and Ed Dawson}, title = {Faster Group Operations on Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2007/441}, year = {2007}, url = {http://eprint.iacr.org/2007/441}, } @misc{cryptoeprint:2007:442, author = {Neal Koblitz and Alfred Menezes}, title = {Another Look at Non-Standard Discrete Log and Diffie-Hellman Problems}, howpublished = {Cryptology ePrint Archive, Report 2007/442}, year = {2007}, url = {http://eprint.iacr.org/2007/442}, } @misc{cryptoeprint:2007:443, author = {Moulay Abdelaziz EL AABID and Sylvain GUILLEY and Philippe HOOGVORST}, title = {Template Attacks with a Power Model}, howpublished = {Cryptology ePrint Archive, Report 2007/443}, year = {2007}, url = {http://eprint.iacr.org/2007/443}, } @misc{cryptoeprint:2007:444, author = {Lobanov Mikhail}, title = {Tight bounds between algebraic immunity and nonlinearities of high orders}, howpublished = {Cryptology ePrint Archive, Report 2007/444}, year = {2007}, url = {http://eprint.iacr.org/2007/444}, } @misc{cryptoeprint:2007:445, author = {Gerold Grünauer}, title = {Proposal of a new efficient public key system for encryption and digital signatures}, howpublished = {Cryptology ePrint Archive, Report 2007/445}, year = {2007}, url = {http://eprint.iacr.org/2007/445}, } @misc{cryptoeprint:2007:446, author = {Carlos AGUILAR MELCHOR and Philippe GABORIT}, title = {A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol}, howpublished = {Cryptology ePrint Archive, Report 2007/446}, year = {2007}, url = {http://eprint.iacr.org/2007/446}, } @misc{cryptoeprint:2007:447, author = {Xianhui Lu, Xuejia Lai, Dake He, Guomin Li}, title = {Weak adaptive chosen ciphertext secure hybrid encryption scheme}, howpublished = {Cryptology ePrint Archive, Report 2007/447}, year = {2007}, url = {http://eprint.iacr.org/2007/447}, } @misc{cryptoeprint:2007:448, author = {Sergiy Pometun}, title = {Generalized Correlation and Higher Order Nonlinearity for Probabilistic Algebraic Attacks Description}, howpublished = {Cryptology ePrint Archive, Report 2007/448}, year = {2007}, url = {http://eprint.iacr.org/2007/448}, } @misc{cryptoeprint:2007:449, author = {Jacques Patarin and Valérie Nachef and Côme Berbain}, title = {Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions}, howpublished = {Cryptology ePrint Archive, Report 2007/449}, year = {2007}, url = {http://eprint.iacr.org/2007/449}, } @misc{cryptoeprint:2007:450, author = {Xiaohui Liang and Zhenfu Cao and Jun Shao and Huang Lin }, title = {Short Group Signature without Random Oracles }, howpublished = {Cryptology ePrint Archive, Report 2007/450}, year = {2007}, url = {http://eprint.iacr.org/2007/450}, } @misc{cryptoeprint:2007:451, author = {Omkant Pandey and Rafael Pass and Amit Sahai and Wei-Lung Dustin Tseng and Muthuramakrishnan Venkitasubramaniam}, title = {Precise Concurrent Zero Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2007/451}, year = {2007}, url = {http://eprint.iacr.org/2007/451}, } @misc{cryptoeprint:2007:452, author = {Ezekiel J. Kachisa and Edward F. Schaefer and Michael Scott }, title = {Constructing Brezing-Weng pairing friendly elliptic curves using elements in the cyclotomic field}, howpublished = {Cryptology ePrint Archive, Report 2007/452}, year = {2007}, url = {http://eprint.iacr.org/2007/452}, } @misc{cryptoeprint:2007:453, author = {Kenneth G. Paterson and Sriramkrishnan Srinivasan}, title = {On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups}, howpublished = {Cryptology ePrint Archive, Report 2007/453}, year = {2007}, url = {http://eprint.iacr.org/2007/453}, } @misc{cryptoeprint:2007:454, author = {Rafael Castro and Ricardo Dahab}, title = {Efficient Certificateless Signatures Suitable for Aggregation}, howpublished = {Cryptology ePrint Archive, Report 2007/454}, year = {2007}, url = {http://eprint.iacr.org/2007/454}, } @misc{cryptoeprint:2007:455, author = {Daniel J. Bernstein and Tanja Lange}, title = {Analysis and optimization of elliptic-curve single-scalar multiplication}, howpublished = {Cryptology ePrint Archive, Report 2007/455}, year = {2007}, url = {http://eprint.iacr.org/2007/455}, } @misc{cryptoeprint:2007:456, author = {Ning Ding and Dawu Gu}, title = {Precise Zero-Knowledge in Concurrent Setting}, howpublished = {Cryptology ePrint Archive, Report 2007/456}, year = {2007}, url = {http://eprint.iacr.org/2007/456}, } @misc{cryptoeprint:2007:457, author = {Christine Abegail Antonio and Tanaka Satoru and Ken Nakamula}, title = {Comparing Implementation Efficiency of Ordinary and Squared Pairings}, howpublished = {Cryptology ePrint Archive, Report 2007/457}, year = {2007}, url = {http://eprint.iacr.org/2007/457}, } @misc{cryptoeprint:2007:458, author = {Nenad Dedic and Danny Harnik and Leonid Reyzin}, title = {Saving Private Randomness in One-Way Functions and Pseudorandom Generators}, howpublished = {Cryptology ePrint Archive, Report 2007/458}, year = {2007}, url = {http://eprint.iacr.org/2007/458}, } @misc{cryptoeprint:2007:459, author = {Man Ho Au and Willy Susilo and Yi Mu}, title = {Practical Anonymous Divisible E-Cash From Bounded Accumulators}, howpublished = {Cryptology ePrint Archive, Report 2007/459}, year = {2007}, url = {http://eprint.iacr.org/2007/459}, } @misc{cryptoeprint:2007:460, author = {Timothy Atkinson and Marius Silaghi}, title = {Guarantees for Customers of Incentive Anonymizing Networks}, howpublished = {Cryptology ePrint Archive, Report 2007/460}, year = {2007}, url = {http://eprint.iacr.org/2007/460}, } @misc{cryptoeprint:2007:461, author = {QiangTang and Dongyao Ji}, title = {Verifiable Attribute-based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2007/461}, year = {2007}, url = {http://eprint.iacr.org/2007/461}, } @misc{cryptoeprint:2007:462, author = {Siamak F Shahandashti and Reihaneh Safavi-Naini}, title = {Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures}, howpublished = {Cryptology ePrint Archive, Report 2007/462}, year = {2007}, url = {http://eprint.iacr.org/2007/462}, } @misc{cryptoeprint:2007:463, author = {Gen Takahashi and Fumitaka Hoshino and Tetsutaro Kobayashi}, title = {Efficient GF(3m) Multiplication Algorithm for eta T Pairing}, howpublished = {Cryptology ePrint Archive, Report 2007/463}, year = {2007}, url = {http://eprint.iacr.org/2007/463}, } @misc{cryptoeprint:2007:464, author = {Boaz Barak and Ran Canetti and Yehuda Lindell and Rafael Pass and Tal Rabin}, title = {Secure Computation Without Authentication}, howpublished = {Cryptology ePrint Archive, Report 2007/464}, year = {2007}, url = {http://eprint.iacr.org/2007/464}, } @misc{cryptoeprint:2007:465, author = {Zheng Gong and Xuejia Lai and Kefei Chen}, title = {A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2007/465}, year = {2007}, url = {http://eprint.iacr.org/2007/465}, } @misc{cryptoeprint:2007:466, author = {Wei Wang and Xiaoyun Wang}, title = {Improved Impossible Differential Cryptanalysis of CLEFIA}, howpublished = {Cryptology ePrint Archive, Report 2007/466}, year = {2007}, url = {http://eprint.iacr.org/2007/466}, } @misc{cryptoeprint:2007:467, author = {Andr\'e Chailloux and Dragos Florin Ciocan and Iordanis Kerenidis and Salil Vadhan}, title = {Interactive and Noninteractive Zero Knowledge are Equivalent in the Help Model}, howpublished = {Cryptology ePrint Archive, Report 2007/467}, year = {2007}, url = {http://eprint.iacr.org/2007/467}, } @misc{cryptoeprint:2007:468, author = {Xianhui Lu, Xuejia Lai, Dake He, Guomin Li}, title = {On the hash function of ODH assumption}, howpublished = {Cryptology ePrint Archive, Report 2007/468}, year = {2007}, url = {http://eprint.iacr.org/2007/468}, } @misc{cryptoeprint:2007:469, author = {Xun Yi and Raylin Tso and Eiji Okamoto}, title = {Group Password-Authenticated Key Exchange from Identity-Based Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2007/469}, year = {2007}, url = {http://eprint.iacr.org/2007/469}, } @misc{cryptoeprint:2007:470, author = {Bodo Möller and Andy Rupp}, title = {Faster Multi-Exponentiation through Caching: Accelerating (EC)DSA Signature Verification}, howpublished = {Cryptology ePrint Archive, Report 2007/470}, year = {2007}, url = {http://eprint.iacr.org/2007/470}, } @misc{cryptoeprint:2007:471, author = {Erik Tews}, title = {Attacks on the WEP protocol}, howpublished = {Cryptology ePrint Archive, Report 2007/471}, year = {2007}, url = {http://eprint.iacr.org/2007/471}, } @misc{cryptoeprint:2007:472, author = {Jean-Philippe Aumasson and Simon Fischer and Shahram Khazaei and Willi Meier and Christian Rechberger}, title = {New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba}, howpublished = {Cryptology ePrint Archive, Report 2007/472}, year = {2007}, url = {http://eprint.iacr.org/2007/472}, } @misc{cryptoeprint:2007:473, author = {Tatsuaki Okamoto}, title = {Authenticated Key Exchange and Key Encapsulation Without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2007/473}, year = {2007}, url = {http://eprint.iacr.org/2007/473}, } @misc{cryptoeprint:2007:474, author = {Martin Cochran}, title = {Notes on the Wang et al. $2^{63}$ SHA-1 Differential Path}, howpublished = {Cryptology ePrint Archive, Report 2007/474}, year = {2007}, url = {http://eprint.iacr.org/2007/474}, } @misc{cryptoeprint:2007:475, author = {Ran Canetti}, title = {Obtaining Universally Composable Security: Towards the Bare Bones of Trust}, howpublished = {Cryptology ePrint Archive, Report 2007/475}, year = {2007}, url = {http://eprint.iacr.org/2007/475}, } @misc{cryptoeprint:2007:476, author = {Xu Zijie}, title = {Dynamic SHA}, howpublished = {Cryptology ePrint Archive, Report 2007/476}, year = {2007}, url = {http://eprint.iacr.org/2007/476}, } @misc{cryptoeprint:2007:477, author = {Andrey Bogdanov and Andrey Pyshkin}, title = {Algebraic Side-Channel Collision Attacks on AES}, howpublished = {Cryptology ePrint Archive, Report 2007/477}, year = {2007}, url = {http://eprint.iacr.org/2007/477}, } @misc{cryptoeprint:2007:478, author = {Dafna Kidron and Yehuda Lindell}, title = {Impossibility Results for Universal Composability in Public-Key Models and with Fixed Inputs}, howpublished = {Cryptology ePrint Archive, Report 2007/478}, year = {2007}, url = {http://eprint.iacr.org/2007/478}, } @misc{cryptoeprint:2007:479, author = {J. Wu and D.R. Stinson}, title = {An Efficient Identification Protocol and the Knowledge-of-Exponent Assumption}, howpublished = {Cryptology ePrint Archive, Report 2007/479}, year = {2007}, url = {http://eprint.iacr.org/2007/479}, } @misc{cryptoeprint:2007:480, author = {Junko Takahashi and Toshinori Fukunaga}, title = {Differential Fault Analysis on the AES Key Schedule}, howpublished = {Cryptology ePrint Archive, Report 2007/480}, year = {2007}, url = {http://eprint.iacr.org/2007/480}, } @misc{cryptoeprint:2007:481, author = {Xianhui Lu, Xuejia Lai, Dake He}, title = {MAC-free variant of KD04}, howpublished = {Cryptology ePrint Archive, Report 2007/481}, year = {2007}, url = {http://eprint.iacr.org/2007/481}, } @misc{cryptoeprint:2007:482, author = {Leonardo B. Oliveira and Michael Scott and Julio López and Ricardo Dahab}, title = {TinyPBC: Pairings for Authenticated Identity-Based Non-Interactive Key Distribution in Sensor Networks}, howpublished = {Cryptology ePrint Archive, Report 2007/482}, year = {2007}, url = {http://eprint.iacr.org/2007/482}, } @misc{cryptoeprint:2008:001, author = {Shengbao Wang and Zhenfu Cao and Kim-Kwang Raymond Choo and Lihua Wang}, title = {Security Proof for the Improved Ryu-Yoon-Yoo Identity-Based Key Agreement Protocol}, howpublished = {Cryptology ePrint Archive, Report 2008/001}, year = {2008}, url = {http://eprint.iacr.org/2008/001}, } @misc{cryptoeprint:2008:002, author = {Piyi Yang and Zhenfu Cao and Xiaolei Dong}, title = {Fuzzy Identity Based Signature}, howpublished = {Cryptology ePrint Archive, Report 2008/002}, year = {2008}, url = {http://eprint.iacr.org/2008/002}, } @misc{cryptoeprint:2008:003, author = {Vlastimil Klima}, title = {On Collisions of Hash Functions Turbo SHA-2}, howpublished = {Cryptology ePrint Archive, Report 2008/003}, year = {2008}, url = {http://eprint.iacr.org/2008/003}, } @misc{cryptoeprint:2008:004, author = {Palash Sarkar}, title = {Efficient Tweakable Enciphering Schemes from (Block-Wise) Universal Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2008/004}, year = {2008}, url = {http://eprint.iacr.org/2008/004}, } @misc{cryptoeprint:2008:005, author = {Francois Mace and Francois-Xavier Standaert and Jean-Jacques Quisquater}, title = {Information Theoretic Evaluation of Side-Channel Resistant Logic Styles}, howpublished = {Cryptology ePrint Archive, Report 2008/005}, year = {2008}, url = {http://eprint.iacr.org/2008/005}, } @misc{cryptoeprint:2008:006, author = {Ralf Kuesters and Max Tuengerthal}, title = {Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation}, howpublished = {Cryptology ePrint Archive, Report 2008/006}, year = {2008}, url = {http://eprint.iacr.org/2008/006}, } @misc{cryptoeprint:2008:007, author = {Colin Boyd and Yvonne Cliff and Juan M. Gonzalez Nieto and Kenneth G. Paterson }, title = {Efficient One-round Key Exchange in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2008/007}, year = {2008}, url = {http://eprint.iacr.org/2008/007}, } @misc{cryptoeprint:2008:008, author = {Zhitu su, Hui Li and Jianfeng Ma}, title = {Factoring Polynomials for Constructing Pairing-friendly Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2008/008}, year = {2008}, url = {http://eprint.iacr.org/2008/008}, } @misc{cryptoeprint:2008:009, author = {Jacques Patarin}, title = {Generic Attacks for the Xor of k random permutations}, howpublished = {Cryptology ePrint Archive, Report 2008/009}, year = {2008}, url = {http://eprint.iacr.org/2008/009}, } @misc{cryptoeprint:2008:010, author = {Jacques Patarin}, title = {A Proof of Security in O(2^n) for the Xor of Two Random Permutations}, howpublished = {Cryptology ePrint Archive, Report 2008/010}, year = {2008}, url = {http://eprint.iacr.org/2008/010}, } @misc{cryptoeprint:2008:011, author = {Ayan Mahalanobis}, title = {A simple generalization of the {E}l{G}amal cryptosystem to non-abelian groups II}, howpublished = {Cryptology ePrint Archive, Report 2008/011}, year = {2008}, url = {http://eprint.iacr.org/2008/011}, } @misc{cryptoeprint:2008:012, author = {Daniel R. L. Brown}, title = {The Encrypted Elliptic Curve Hash}, howpublished = {Cryptology ePrint Archive, Report 2008/012}, year = {2008}, url = {http://eprint.iacr.org/2008/012}, } @misc{cryptoeprint:2008:013, author = {Daniel J. Bernstein and Peter Birkner and Marc Joye and Tanja Lange and Christiane Peters}, title = {Twisted Edwards Curves}, howpublished = {Cryptology ePrint Archive, Report 2008/013}, year = {2008}, url = {http://eprint.iacr.org/2008/013}, } @misc{cryptoeprint:2008:014, author = {Jan Camenisch and Gregory Neven and abhi shelat}, title = {Simulatable Adaptive Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2008/014}, year = {2008}, url = {http://eprint.iacr.org/2008/014}, } @misc{cryptoeprint:2008:015, author = {Anna Lisa Ferrara and Matthew Green and Susan Hohenberger and Michael Ostergaard Pedersen}, title = {Practical Short Signature Batch Verification}, howpublished = {Cryptology ePrint Archive, Report 2008/015}, year = {2008}, url = {http://eprint.iacr.org/2008/015}, } @misc{cryptoeprint:2008:016, author = {Daniel J. Bernstein and Peter Birkner and Tanja Lange and Christiane Peters}, title = {ECM using Edwards curves}, howpublished = {Cryptology ePrint Archive, Report 2008/016}, year = {2008}, url = {http://eprint.iacr.org/2008/016}, } @misc{cryptoeprint:2008:017, author = {Alexander Maximov and Dmitry Khovratovich}, title = {New State Recovery Attack on RC4}, howpublished = {Cryptology ePrint Archive, Report 2008/017}, year = {2008}, url = {http://eprint.iacr.org/2008/017}, } @misc{cryptoeprint:2008:018, author = {Mira Belenkiy}, title = {Disjunctive Multi-Level Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2008/018}, year = {2008}, url = {http://eprint.iacr.org/2008/018}, } @misc{cryptoeprint:2008:019, author = {Steven D. Galbraith and Xibin Lin}, title = {Computing Pairings Using x-Coordinates Only}, howpublished = {Cryptology ePrint Archive, Report 2008/019}, year = {2008}, url = {http://eprint.iacr.org/2008/019}, } @misc{cryptoeprint:2008:020, author = {Eike Kiltz and Yevgeniy Vahlis}, title = {CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption}, howpublished = {Cryptology ePrint Archive, Report 2008/020}, year = {2008}, url = {http://eprint.iacr.org/2008/020}, } @misc{cryptoeprint:2008:021, author = {Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff}, title = {Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2008/021}, year = {2008}, url = {http://eprint.iacr.org/2008/021}, } @misc{cryptoeprint:2008:022, author = {M. Gebhardt and G. Illies and W. Schindler}, title = {Computing Almost Exact Probabilities of Differential Hash Collision Paths by Applying Appropriate Stochastic Methods}, howpublished = {Cryptology ePrint Archive, Report 2008/022}, year = {2008}, url = {http://eprint.iacr.org/2008/022}, } @misc{cryptoeprint:2008:023, author = {Sherman S.M. Chow and Volker Roth and Eleanor G. Rieffel}, title = {General Certificateless Encryption and Timed-Release Encryption}, howpublished = {Cryptology ePrint Archive, Report 2008/023}, year = {2008}, url = {http://eprint.iacr.org/2008/023}, } @misc{cryptoeprint:2008:024, author = {Sunder Lal and Vandani Verma}, title = {Identity Based Strong Bi-Designated Verifier Proxy Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2008/024}, year = {2008}, url = {http://eprint.iacr.org/2008/024}, } @misc{cryptoeprint:2008:025, author = {Christian Robenhagen Ravnshoj}, title = {Non-Cyclic Subgroups of Jacobians of Genus Two Curves with Complex Multiplication}, howpublished = {Cryptology ePrint Archive, Report 2008/025}, year = {2008}, url = {http://eprint.iacr.org/2008/025}, } @misc{cryptoeprint:2008:026, author = {Mitsuru Kawazoe and Tetsuya Takahashi}, title = {Pairing-friendly Hyperelliptic Curves with Ordinary Jacobians of Type $y^2=x^5+ax$}, howpublished = {Cryptology ePrint Archive, Report 2008/026}, year = {2008}, url = {http://eprint.iacr.org/2008/026}, } @misc{cryptoeprint:2008:027, author = {Girraj Kumar Verma}, title = {Blind Signature Scheme over Braid Groups}, howpublished = {Cryptology ePrint Archive, Report 2008/027}, year = {2008}, url = {http://eprint.iacr.org/2008/027}, } @misc{cryptoeprint:2008:028, author = {Henri Gilbert and Matthew J.B. Robshaw and Yannick Seurin}, title = {HB#: Increasing the Security and Efficiency of HB+}, howpublished = {Cryptology ePrint Archive, Report 2008/028}, year = {2008}, url = {http://eprint.iacr.org/2008/028}, } @misc{cryptoeprint:2008:029, author = {Christian Robenhagen Ravnshoj}, title = {Non-Cyclic Subgroups of Jacobians of Genus Two Curves}, howpublished = {Cryptology ePrint Archive, Report 2008/029}, year = {2008}, url = {http://eprint.iacr.org/2008/029}, } @misc{cryptoeprint:2008:030, author = {Ronald Cramer and Yevgeniy Dodis and Serge Fehr and Carles Padr\'o and Daniel Wichs}, title = {Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors}, howpublished = {Cryptology ePrint Archive, Report 2008/030}, year = {2008}, url = {http://eprint.iacr.org/2008/030}, } @misc{cryptoeprint:2008:031, author = {Dalia Khader}, title = {Authenticating with Attributes}, howpublished = {Cryptology ePrint Archive, Report 2008/031}, year = {2008}, url = {http://eprint.iacr.org/2008/031}, } @misc{cryptoeprint:2008:032, author = {Boaz Barak, Mohammad Mahmoody-Ghidary}, title = {Merkle Puzzles are Optimal}, howpublished = {Cryptology ePrint Archive, Report 2008/032}, year = {2008}, url = {http://eprint.iacr.org/2008/032}, } @misc{cryptoeprint:2008:033, author = {Boaz Barak, Mohammad Mahmoody-Ghidardy}, title = {Lower Bounds on Signatures From Symmetric Primitives}, howpublished = {Cryptology ePrint Archive, Report 2008/033}, year = {2008}, url = {http://eprint.iacr.org/2008/033}, } @misc{cryptoeprint:2008:034, author = {Chunming Tang and Dingyi Pei and Zhuojun Liu and Zheng-an Yao and Mingsheng Wang}, title = {Perfectly Hiding Commitment Scheme with Two-Round from Any One-Way Permutation}, howpublished = {Cryptology ePrint Archive, Report 2008/034}, year = {2008}, url = {http://eprint.iacr.org/2008/034}, } @misc{cryptoeprint:2008:035, author = {Yehuda Lindell}, title = {Efficient Fully-Simulatable Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2008/035}, year = {2008}, url = {http://eprint.iacr.org/2008/035}, } @misc{cryptoeprint:2008:036, author = {Jacques Patarin}, title = {Generic Attacks on Feistel Schemes}, howpublished = {Cryptology ePrint Archive, Report 2008/036}, year = {2008}, url = {http://eprint.iacr.org/2008/036}, } @misc{cryptoeprint:2008:037, author = {Georg Fuchsbauer and David Pointcheval}, title = {Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures}, howpublished = {Cryptology ePrint Archive, Report 2008/037}, year = {2008}, url = {http://eprint.iacr.org/2008/037}, } @misc{cryptoeprint:2008:038, author = {Hassan Elkamchouchi and Yasmine Abouelseoud}, title = {A New Blind Identity-Based Signature Scheme with Message Recovery}, howpublished = {Cryptology ePrint Archive, Report 2008/038}, year = {2008}, url = {http://eprint.iacr.org/2008/038}, } @misc{cryptoeprint:2008:039, author = {Shuhong Wang and Reihaneh Safavi-Naini}, title = {New Results on Unconditionally Secure Multireceiver Manual Authentication}, howpublished = {Cryptology ePrint Archive, Report 2008/039}, year = {2008}, url = {http://eprint.iacr.org/2008/039}, } @misc{cryptoeprint:2008:040, author = {Eunjeong Lee, Hyang-Sook Lee, and Cheol-Min Park}, title = {Efficient and Generalized Pairing Computation on Abelian Varieties}, howpublished = {Cryptology ePrint Archive, Report 2008/040}, year = {2008}, url = {http://eprint.iacr.org/2008/040}, } @misc{cryptoeprint:2008:041, author = {Hassan Elkamchouchi and Yasmine Abouelseoud}, title = {A New Proxy Identity-Based Signcryption Scheme for Partial Delegation of Signing Rights}, howpublished = {Cryptology ePrint Archive, Report 2008/041}, year = {2008}, url = {http://eprint.iacr.org/2008/041}, } @misc{cryptoeprint:2008:042, author = {Julien Bringer and Herve Chabanne}, title = {Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks}, howpublished = {Cryptology ePrint Archive, Report 2008/042}, year = {2008}, url = {http://eprint.iacr.org/2008/042}, } @misc{cryptoeprint:2008:043, author = {Nasour Bagheri, Majid Naderi, Babak Sadeghiyan}, title = {Cryptanalysis of CRUSH hash structure}, howpublished = {Cryptology ePrint Archive, Report 2008/043}, year = {2008}, url = {http://eprint.iacr.org/2008/043}, } @misc{cryptoeprint:2008:044, author = {Ari Juels and Ravikanth Pappu and Bryan Parno}, title = {Unidirectional Key Distribution Across Time and Space with Applications to RFID Security}, howpublished = {Cryptology ePrint Archive, Report 2008/044}, year = {2008}, url = {http://eprint.iacr.org/2008/044}, } @misc{cryptoeprint:2008:045, author = {Rosario Gennaro and Shai Halevi and Hugo Krawczyk and Tal Rabin}, title = {Threshold RSA for Dynamic and Ad-Hoc Groups}, howpublished = {Cryptology ePrint Archive, Report 2008/045}, year = {2008}, url = {http://eprint.iacr.org/2008/045}, } @misc{cryptoeprint:2008:046, author = {Tal Moran and Gil Segev}, title = {David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware}, howpublished = {Cryptology ePrint Archive, Report 2008/046}, year = {2008}, url = {http://eprint.iacr.org/2008/046}, } @misc{cryptoeprint:2008:047, author = {Vicente Benjumea and Seung Geol Choi and Javier Lopez and Moti Yung}, title = {Fair Traceable Multi-Group Signatures}, howpublished = {Cryptology ePrint Archive, Report 2008/047}, year = {2008}, url = {http://eprint.iacr.org/2008/047}, } @misc{cryptoeprint:2008:048, author = {Donghoon Chang, Jaechul Sung, Seokhie Hong and Sangjin Lee}, title = {Improved Cryptanalysis of APOP-MD4 and NMAC-MD4 using New Differential Paths}, howpublished = {Cryptology ePrint Archive, Report 2008/048}, year = {2008}, url = {http://eprint.iacr.org/2008/048}, } @misc{cryptoeprint:2008:049, author = {Yehuda Lindell and Benny Pinkas}, title = {An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2008/049}, year = {2008}, url = {http://eprint.iacr.org/2008/049}, } @misc{cryptoeprint:2008:050, author = {Sunder Lal and Prashant Kushwah}, title = {Multi-PKG ID based signcryption}, howpublished = {Cryptology ePrint Archive, Report 2008/050}, year = {2008}, url = {http://eprint.iacr.org/2008/050}, } @misc{cryptoeprint:2008:051, author = {Patrick Longa and Ali Miri}, title = {New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields (full version)}, howpublished = {Cryptology ePrint Archive, Report 2008/051}, year = {2008}, url = {http://eprint.iacr.org/2008/051}, } @misc{cryptoeprint:2008:052, author = {Patrick Longa and Ali Miri}, title = {New Multibase Non-Adjacent Form Scalar Multiplication and its Application to Elliptic Curve Cryptosystems (extended version)}, howpublished = {Cryptology ePrint Archive, Report 2008/052}, year = {2008}, url = {http://eprint.iacr.org/2008/052}, } @misc{cryptoeprint:2008:053, author = {Miroslava Sotakova}, title = {Breaking One-Round Key-Agreement Protocols in the Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2008/053}, year = {2008}, url = {http://eprint.iacr.org/2008/053}, } @misc{cryptoeprint:2008:054, author = {Jin Hong and Kyung Chul Jeong and Eun Young Kwon and In-Sok Lee and Daegun Ma}, title = {Variants of the Distinguished Point Method for Cryptanalytic Time Memory Trade-offs (Full version)}, howpublished = {Cryptology ePrint Archive, Report 2008/054}, year = {2008}, url = {http://eprint.iacr.org/2008/054}, } @misc{cryptoeprint:2008:055, author = {S.Sharmila Deva Selvi and S.Sree Vivek}, title = {cryptanalysis and Improvement of a Recently Proposed Remote User Authentication Scheme Using Smart Cards}, howpublished = {Cryptology ePrint Archive, Report 2008/055}, year = {2008}, url = {http://eprint.iacr.org/2008/055}, } @misc{cryptoeprint:2008:056, author = {Vladislav Kovtun, Thomas Wollinger}, title = {Fast explicit formulae for genus 2 hyperelliptic curves using projective coordinates (Updated)}, howpublished = {Cryptology ePrint Archive, Report 2008/056}, year = {2008}, url = {http://eprint.iacr.org/2008/056}, } @misc{cryptoeprint:2008:057, author = {Vladislav Kovtun, Jan Pelzl and Alexandr Kuznetsov}, title = {Software Implementation of Genus-2 Hyperelliptic Curve Cryptosystems Over Prime Fields}, howpublished = {Cryptology ePrint Archive, Report 2008/057}, year = {2008}, url = {http://eprint.iacr.org/2008/057}, } @misc{cryptoeprint:2008:058, author = {Thomas Eisenbarth and Timo Kasper and Amir Moradi and Christof Paar and Mahmoud Salmasizadeh and Mohammad T. Manzuri Shalmani}, title = {Physical Cryptanalysis of KeeLoq Code Hopping Applications}, howpublished = {Cryptology ePrint Archive, Report 2008/058}, year = {2008}, url = {http://eprint.iacr.org/2008/058}, } @misc{cryptoeprint:2008:059, author = {Stefan Popoveniuc and Jonathan Stanton}, title = {Buying random votes is as hard as buying no-votes}, howpublished = {Cryptology ePrint Archive, Report 2008/059}, year = {2008}, url = {http://eprint.iacr.org/2008/059}, } @misc{cryptoeprint:2008:060, author = {Nicholas T. Sullivan}, title = {Fast Algorithms for Arithmetic on Elliptic Curves Over Prime Fields}, howpublished = {Cryptology ePrint Archive, Report 2008/060}, year = {2008}, url = {http://eprint.iacr.org/2008/060}, } @misc{cryptoeprint:2008:061, author = {David Freeman and Peter Stevenhagen and Marco Streng}, title = {Abelian varieties with prescribed embedding degree}, howpublished = {Cryptology ePrint Archive, Report 2008/061}, year = {2008}, url = {http://eprint.iacr.org/2008/061}, } @misc{cryptoeprint:2008:062, author = {Juliana Belding and Reinier Broker and Andreas Enge and Kristin Lauter}, title = {Computing Hilbert Class Polynomials}, howpublished = {Cryptology ePrint Archive, Report 2008/062}, year = {2008}, url = {http://eprint.iacr.org/2008/062}, } @misc{cryptoeprint:2008:063, author = {Gregory Neven}, title = {Efficient Sequential Aggregate Signed Data}, howpublished = {Cryptology ePrint Archive, Report 2008/063}, year = {2008}, url = {http://eprint.iacr.org/2008/063}, } @misc{cryptoeprint:2008:064, author = {Pavol Zajac}, title = {Remarks on the NFS complexity}, howpublished = {Cryptology ePrint Archive, Report 2008/064}, year = {2008}, url = {http://eprint.iacr.org/2008/064}, } @misc{cryptoeprint:2008:065, author = {Junghyun Nam}, title = {Infringing and Improving Password Security of a Three-Party Key Exchange Protocol}, howpublished = {Cryptology ePrint Archive, Report 2008/065}, year = {2008}, url = {http://eprint.iacr.org/2008/065}, } @misc{cryptoeprint:2008:066, author = {Junjie Jiang and Jing Chen and Jian Wang and Duncan S. Wong and Xiaotie Deng}, title = {High Performance Architecture for Elliptic Curve Scalar Multiplication over GF(2^m)}, howpublished = {Cryptology ePrint Archive, Report 2008/066}, year = {2008}, url = {http://eprint.iacr.org/2008/066}, } @misc{cryptoeprint:2008:067, author = {David Cash and Eike Kiltz and Victor Shoup}, title = {The Twin Diffie-Hellman Problem and Applications}, howpublished = {Cryptology ePrint Archive, Report 2008/067}, year = {2008}, url = {http://eprint.iacr.org/2008/067}, } @misc{cryptoeprint:2008:068, author = {Peter Bogetoft and Dan Lund Christensen and Ivan Damgard and Martin Geisler and Thomas Jakobsen and Mikkel Kr{\o}igaard and Janus Dam Nielsen and Jesper Buus Nielsen and Kurt Nielsen and Jakob Pagter and Michael Schwartzbach and Tomas Toft}, title = {Multiparty Computation Goes Live}, howpublished = {Cryptology ePrint Archive, Report 2008/068}, year = {2008}, url = {http://eprint.iacr.org/2008/068}, } @misc{cryptoeprint:2008:069, author = {Marius Oliver Gheorghita}, title = {HENKOS Cryptanalysis-Related keys attack}, howpublished = {Cryptology ePrint Archive, Report 2008/069}, year = {2008}, url = {http://eprint.iacr.org/2008/069}, } @misc{cryptoeprint:2008:070, author = {Christian Robenhagen Ravnshoj}, title = {Generators of Jacobians of Genus Two Curves}, howpublished = {Cryptology ePrint Archive, Report 2008/070}, year = {2008}, url = {http://eprint.iacr.org/2008/070}, } @misc{cryptoeprint:2008:071, author = {Martijn Stam}, title = {Another Glance At Blockcipher Based Hashing}, howpublished = {Cryptology ePrint Archive, Report 2008/071}, year = {2008}, url = {http://eprint.iacr.org/2008/071}, } @misc{cryptoeprint:2008:072, author = {Alexandre M. Deusajute and Paulo S. L. M. Barreto}, title = {The SIP Security Enhanced by Using Pairing-assisted Massey-Omura Signcryption}, howpublished = {Cryptology ePrint Archive, Report 2008/072}, year = {2008}, url = {http://eprint.iacr.org/2008/072}, } @misc{cryptoeprint:2008:073, author = {Hovav Shacham and Brent Waters}, title = {Compact Proofs of Retrievability}, howpublished = {Cryptology ePrint Archive, Report 2008/073}, year = {2008}, url = {http://eprint.iacr.org/2008/073}, } @misc{cryptoeprint:2008:074, author = {Bae Eun Jung and Hee Jean Kim}, title = {On the Chikazawa-Inoue ID based key system}, howpublished = {Cryptology ePrint Archive, Report 2008/074}, year = {2008}, url = {http://eprint.iacr.org/2008/074}, } @misc{cryptoeprint:2008:075, author = {Jonathan J. Hoch and Adi Shamir}, title = {On the Strength of the Concatenated Hash Combiner when All the Hash Functions are Weak}, howpublished = {Cryptology ePrint Archive, Report 2008/075}, year = {2008}, url = {http://eprint.iacr.org/2008/075}, } @misc{cryptoeprint:2008:076, author = {Kashif Ali and Howard M. Heys}, title = {Results from a Search for the Best Linear Approximation of a Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2008/076}, year = {2008}, url = {http://eprint.iacr.org/2008/076}, } @misc{cryptoeprint:2008:077, author = {Shigeo Tsujii and Kohtaro Tadaki and Ryou Fujita}, title = {Nonlinear Piece In Hand Matrix Method for Enhancing Security of Multivariate Public Key Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2008/077}, year = {2008}, url = {http://eprint.iacr.org/2008/077}, } @misc{cryptoeprint:2008:078, author = {Donghoon Chang and Mridul Nandi}, title = {A Short Proof of the PRP/PRF Switching Lemma}, howpublished = {Cryptology ePrint Archive, Report 2008/078}, year = {2008}, url = {http://eprint.iacr.org/2008/078}, } @misc{cryptoeprint:2008:079, author = {Manoj Prabhakaran and Mike Rosulek}, title = {Homomorphic Encryption with CCA Security}, howpublished = {Cryptology ePrint Archive, Report 2008/079}, year = {2008}, url = {http://eprint.iacr.org/2008/079}, } @misc{cryptoeprint:2008:080, author = {Aniket Kate and Greg Zaverucha and Ian Goldberg}, title = {Pairing-Based Onion Routing with Improved Forward Secrecy}, howpublished = {Cryptology ePrint Archive, Report 2008/080}, year = {2008}, url = {http://eprint.iacr.org/2008/080}, } @misc{cryptoeprint:2008:081, author = {Marcel Medwed and Elisabeth Oswald}, title = {Template Attacks on ECDSA}, howpublished = {Cryptology ePrint Archive, Report 2008/081}, year = {2008}, url = {http://eprint.iacr.org/2008/081}, } @misc{cryptoeprint:2008:082, author = {Roberto Araujo and Peter Y. A. Ryan}, title = {Improving the Farnel, Threeballot, and Randell-Ryan Voting Schemes}, howpublished = {Cryptology ePrint Archive, Report 2008/082}, year = {2008}, url = {http://eprint.iacr.org/2008/082}, } @misc{cryptoeprint:2008:083, author = {Hung-Min Sun, Wei-Chih Ting, and King-Hang Wang}, title = {On the Security of Chien's Ultralightweight RFID Authentication Protocol}, howpublished = {Cryptology ePrint Archive, Report 2008/083}, year = {2008}, url = {http://eprint.iacr.org/2008/083}, } @misc{cryptoeprint:2008:084, author = {Sunder Lal and Prashant Kushwah}, title = {ID based generalized signcryption }, howpublished = {Cryptology ePrint Archive, Report 2008/084}, year = {2008}, url = {http://eprint.iacr.org/2008/084}, } @misc{cryptoeprint:2008:085, author = {Chang-An Zhao and Fangguo Zhang and Jiwu Huang}, title = {All Pairings Are in a Group}, howpublished = {Cryptology ePrint Archive, Report 2008/085}, year = {2008}, url = {http://eprint.iacr.org/2008/085}, } @misc{cryptoeprint:2008:086, author = {Arpita Patra and Ashish Choudhary and Madhu Gayatri and C. Pandu Rangan}, title = {Efficient Perfectly Reliable and Secure Communication Tolerating Mobile Adversary}, howpublished = {Cryptology ePrint Archive, Report 2008/086}, year = {2008}, url = {http://eprint.iacr.org/2008/086}, } @misc{cryptoeprint:2008:087, author = {Amir Herzberg and Haya Shulman and Amitabh Saxena and Bruno Crispo}, title = {Towards a Theory of White-Box Security}, howpublished = {Cryptology ePrint Archive, Report 2008/087}, year = {2008}, url = {http://eprint.iacr.org/2008/087}, } @misc{cryptoeprint:2008:088, author = {Mahabir Prasad Jhanwar and Rana Barua}, title = {A Public Key Encryption In Standard Model Using Cramer-Shoup Paradigm}, howpublished = {Cryptology ePrint Archive, Report 2008/088}, year = {2008}, url = {http://eprint.iacr.org/2008/088}, } @misc{cryptoeprint:2008:089, author = {S{\o}ren S. Thomsen}, title = {An improved preimage attack on MD2}, howpublished = {Cryptology ePrint Archive, Report 2008/089}, year = {2008}, url = {http://eprint.iacr.org/2008/089}, } @misc{cryptoeprint:2008:090, author = {Mridul Nandi}, title = {Improving upon HCTR and matching attacks for Hash-Counter-Hash approach}, howpublished = {Cryptology ePrint Archive, Report 2008/090}, year = {2008}, url = {http://eprint.iacr.org/2008/090}, } @misc{cryptoeprint:2008:091, author = {Mridul Nandi}, title = {A Generic Method to Extend Message Space of a Strong Pseudorandom Permutation}, howpublished = {Cryptology ePrint Archive, Report 2008/091}, year = {2008}, url = {http://eprint.iacr.org/2008/091}, } @misc{cryptoeprint:2008:092, author = {Mridul Nandi}, title = {An Efficient SPRP-secure Construction based on Pseudo Random Involution}, howpublished = {Cryptology ePrint Archive, Report 2008/092}, year = {2008}, url = {http://eprint.iacr.org/2008/092}, } @misc{cryptoeprint:2008:093, author = {Girraj Kumar Verma}, title = {New ID-based Fair Blind Signatures}, howpublished = {Cryptology ePrint Archive, Report 2008/093}, year = {2008}, url = {http://eprint.iacr.org/2008/093}, } @misc{cryptoeprint:2008:094, author = {Kaoru Kurosawa and Jun Furukawa}, title = {Universally Composable Undeniable Signature}, howpublished = {Cryptology ePrint Archive, Report 2008/094}, year = {2008}, url = {http://eprint.iacr.org/2008/094}, } @misc{cryptoeprint:2008:095, author = {Chifumi Sato and Takeshi Okamoto and Eiji Okamoto}, title = {Strongly Unforgeable ID-based Signatures Without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2008/095}, year = {2008}, url = {http://eprint.iacr.org/2008/095}, } @misc{cryptoeprint:2008:096, author = {F. Vercauteren}, title = {Optimal Pairings}, howpublished = {Cryptology ePrint Archive, Report 2008/096}, year = {2008}, url = {http://eprint.iacr.org/2008/096}, } @misc{cryptoeprint:2008:097, author = {Shien Jin Ong and David Parkes and Alon Rosen and Salil Vadhan}, title = {Fairness with an Honest Minority and a Rational Majority}, howpublished = {Cryptology ePrint Archive, Report 2008/097}, year = {2008}, url = {http://eprint.iacr.org/2008/097}, } @misc{cryptoeprint:2008:098, author = {Xu-An Wang and Xiaoyuan Yang and Yiliang Han}, title = {On Security Notions for Verifiable Encrypted Signature}, howpublished = {Cryptology ePrint Archive, Report 2008/098}, year = {2008}, url = {http://eprint.iacr.org/2008/098}, } @misc{cryptoeprint:2008:099, author = {Kristin E. Lauter and Katherine E. Stange}, title = {The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences}, howpublished = {Cryptology ePrint Archive, Report 2008/099}, year = {2008}, url = {http://eprint.iacr.org/2008/099}, } @misc{cryptoeprint:2008:100, author = {Patrick Longa}, title = {Accelerating the Scalar Multiplication on Elliptic Curve Cryptosystems over Prime Fields}, howpublished = {Cryptology ePrint Archive, Report 2008/100}, year = {2008}, url = {http://eprint.iacr.org/2008/100}, } @misc{cryptoeprint:2008:101, author = {Arpita Patra and Ashish Choudhary and AshwinKumar B.V and C. Pandu Rangan}, title = {Probabilistic Verifiable Secret Sharing Tolerating Adaptive Adversary}, howpublished = {Cryptology ePrint Archive, Report 2008/101}, year = {2008}, url = {http://eprint.iacr.org/2008/101}, } @misc{cryptoeprint:2008:102, author = {Shai Halevi and Tal Rabin}, title = {Degradation and Amplification of Computational Hardness}, howpublished = {Cryptology ePrint Archive, Report 2008/102}, year = {2008}, url = {http://eprint.iacr.org/2008/102}, } @misc{cryptoeprint:2008:103, author = {Jun Shao and Dongsheng Xing and Zhenfu Cao}, title = {Identity-Based Proxy Re-encryption Schemes with Multiuse, Unidirection, and CCA Security}, howpublished = {Cryptology ePrint Archive, Report 2008/103}, year = {2008}, url = {http://eprint.iacr.org/2008/103}, } @misc{cryptoeprint:2008:104, author = {Ernie Brickell, Liqun Chen and Jiangtao Li}, title = {Simplified Security Notions of Direct Anonymous Attestation and a Concrete Scheme from Pairings}, howpublished = {Cryptology ePrint Archive, Report 2008/104}, year = {2008}, url = {http://eprint.iacr.org/2008/104}, } @misc{cryptoeprint:2008:105, author = {W. Michiels and P. Gorissen and H.D.L. Hollmann}, title = {Cryptanalysis of White-Box Implementations}, howpublished = {Cryptology ePrint Archive, Report 2008/105}, year = {2008}, url = {http://eprint.iacr.org/2008/105}, } @misc{cryptoeprint:2008:106, author = {Laurent Evain}, title = {Knapsack cryptosystems built on NP-hard instances}, howpublished = {Cryptology ePrint Archive, Report 2008/106}, year = {2008}, url = {http://eprint.iacr.org/2008/106}, } @misc{cryptoeprint:2008:107, author = {Helger Lipmaa}, title = {Private Branching Programs: On Communication-Efficient Cryptocomputing}, howpublished = {Cryptology ePrint Archive, Report 2008/107}, year = {2008}, url = {http://eprint.iacr.org/2008/107}, } @misc{cryptoeprint:2008:108, author = {Jintai Ding AND Bo-Yin Yang AND Owen Chen AND Ming-Shing Chen AND Doug Cheng}, title = {New Differential-Algebraic Attacks and Reparametrization of Rainbow}, howpublished = {Cryptology ePrint Archive, Report 2008/108}, year = {2008}, url = {http://eprint.iacr.org/2008/108}, } @misc{cryptoeprint:2008:109, author = {Florian Mendel and Martin Schläffer}, title = {Collisions for Round-Reduced LAKE}, howpublished = {Cryptology ePrint Archive, Report 2008/109}, year = {2008}, url = {http://eprint.iacr.org/2008/109}, } @misc{cryptoeprint:2008:110, author = {Zheng Gong and Xuejia Lai and Kefei Chen}, title = {On the Design of Secure and Fast Double Block Length Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2008/110}, year = {2008}, url = {http://eprint.iacr.org/2008/110}, } @misc{cryptoeprint:2008:111, author = {Yuriy Izbenko and Vladislav Kovtun and Alexandr Kuznetsov}, title = {THE DESIGN OF BOOLEAN FUNCTIONS BY MODIFIED HILL CLIMBING METHOD}, howpublished = {Cryptology ePrint Archive, Report 2008/111}, year = {2008}, url = {http://eprint.iacr.org/2008/111}, } @misc{cryptoeprint:2008:112, author = {Dong Zheng and Xiangxue Li and Changshe Ma and Kefei Chen and Jianhua Li}, title = {Democratic Group Signatures with Threshold Traceability}, howpublished = {Cryptology ePrint Archive, Report 2008/112}, year = {2008}, url = {http://eprint.iacr.org/2008/112}, } @misc{cryptoeprint:2008:113, author = {Daniel Mall and Qing Zhong}, title = {Open Source Is Not Enough. Attacking the EC-package of Bouncycastle version 1.x_132}, howpublished = {Cryptology ePrint Archive, Report 2008/113}, year = {2008}, url = {http://eprint.iacr.org/2008/113}, } @misc{cryptoeprint:2008:114, author = {Giuseppe Ateniese and Roberto Di Pietro and Luigi V. Mancini and Gene Tsudik}, title = {Scalable and Efficient Provable Data Possession}, howpublished = {Cryptology ePrint Archive, Report 2008/114}, year = {2008}, url = {http://eprint.iacr.org/2008/114}, } @misc{cryptoeprint:2008:115, author = {Jean-Luc Beuchat and Nicolas Brisebarre and Jérémie Detrey and Eiji Okamoto and Francisco Rodríguez-Henríquez}, title = {A Comparison Between Hardware Accelerators for the Modified Tate Pairing over $\mathbb{F}_{2^m}$ and $\mathbb{F}_{3^m}$}, howpublished = {Cryptology ePrint Archive, Report 2008/115}, year = {2008}, url = {http://eprint.iacr.org/2008/115}, } @misc{cryptoeprint:2008:116, author = {Alon Rosen and Gil Segev}, title = {Chosen-Ciphertext Security via Correlated Products}, howpublished = {Cryptology ePrint Archive, Report 2008/116}, year = {2008}, url = {http://eprint.iacr.org/2008/116}, } @misc{cryptoeprint:2008:117, author = {Steven D. Galbraith and Michael Scott}, title = {Exponentiation in pairing-friendly groups using homomorphisms}, howpublished = {Cryptology ePrint Archive, Report 2008/117}, year = {2008}, url = {http://eprint.iacr.org/2008/117}, } @misc{cryptoeprint:2008:118, author = {Patrick Longa and Catherine Gebotys}, title = {Setting Speed Records with the (Fractional) Multibase Non-Adjacent Form Method for Efficient Elliptic Curve Scalar Multiplication}, howpublished = {Cryptology ePrint Archive, Report 2008/118}, year = {2008}, url = {http://eprint.iacr.org/2008/118}, } @misc{cryptoeprint:2008:119, author = {Benoit Chevallier-Mames and David Naccache and Jacques Stern}, title = {Linear Bandwidth Naccache-Stern Encryption}, howpublished = {Cryptology ePrint Archive, Report 2008/119}, year = {2008}, url = {http://eprint.iacr.org/2008/119}, } @misc{cryptoeprint:2008:120, author = {Denis Osin and Vladimir Shpilrain}, title = {Public key encryption and encryption emulation attacks}, howpublished = {Cryptology ePrint Archive, Report 2008/120}, year = {2008}, url = {http://eprint.iacr.org/2008/120}, } @misc{cryptoeprint:2008:121, author = {Mark Wooding}, title = {New proofs for old modes}, howpublished = {Cryptology ePrint Archive, Report 2008/121}, year = {2008}, url = {http://eprint.iacr.org/2008/121}, } @misc{cryptoeprint:2008:122, author = {Seog Chung Seo and Dong-Guk Han and Seokhie Hong}, title = {TinyECCK: Efficient Elliptic Curve Cryptography Implementation over $GF(2^m)$ on 8-bit MICAz Mote}, howpublished = {Cryptology ePrint Archive, Report 2008/122}, year = {2008}, url = {http://eprint.iacr.org/2008/122}, } @misc{cryptoeprint:2008:123, author = {Mehrdad Khatir and Amir Moradi}, title = {Secure Adiabatic Logic: a Low-Energy DPA-Resistant Logic Style}, howpublished = {Cryptology ePrint Archive, Report 2008/123}, year = {2008}, url = {http://eprint.iacr.org/2008/123}, } @misc{cryptoeprint:2008:124, author = {Daniel Loebenberger}, title = {A Simple Derivation for the Frobenius Pseudoprime Test}, howpublished = {Cryptology ePrint Archive, Report 2008/124}, year = {2008}, url = {http://eprint.iacr.org/2008/124}, } @misc{cryptoeprint:2008:125, author = {Florian Hess}, title = {Pairing Lattices}, howpublished = {Cryptology ePrint Archive, Report 2008/125}, year = {2008}, url = {http://eprint.iacr.org/2008/125}, } @misc{cryptoeprint:2008:126, author = {Philippe Golle}, title = {Machine Learning Attacks Against the ASIRRA CAPTCHA}, howpublished = {Cryptology ePrint Archive, Report 2008/126}, year = {2008}, url = {http://eprint.iacr.org/2008/126}, } @misc{cryptoeprint:2008:127, author = {Nidia Cortez-Duarte and Francisco Rodr\'iguez-Henr\'iquez and Jean-Luc Beuchat and Eiji Okamoto}, title = {A Pipelined Karatsuba-Ofman Multiplier over GF($3^{97}$) Amenable for Pairing Computation}, howpublished = {Cryptology ePrint Archive, Report 2008/127}, year = {2008}, url = {http://eprint.iacr.org/2008/127}, } @misc{cryptoeprint:2008:128, author = {Hidehiko Nakagami and Ryoichi Teramura and Toshihiro Ohigashi and Hidenori Kuwakado and Masakatu Morii}, title = {A Chosen IV Attack Using Phase Shifting Equivalent Keys against DECIM v2}, howpublished = {Cryptology ePrint Archive, Report 2008/128}, year = {2008}, url = {http://eprint.iacr.org/2008/128}, } @misc{cryptoeprint:2008:129, author = {Mohamed Layouni}, title = {Controlling access to personal data through Accredited Symmetrically Private Information Retrieval}, howpublished = {Cryptology ePrint Archive, Report 2008/129}, year = {2008}, url = {http://eprint.iacr.org/2008/129}, } @misc{cryptoeprint:2008:130, author = {Florian Mendel and Norbert Pramstaller and Christian Rechberger and Vincent Rijmen}, title = {Analysis of Step-Reduced SHA-256}, howpublished = {Cryptology ePrint Archive, Report 2008/130}, year = {2008}, url = {http://eprint.iacr.org/2008/130}, } @misc{cryptoeprint:2008:131, author = {Sebastiaan Indesteege and Florian Mendel and Bart Preneel and Christian Rechberger}, title = {Collisions and other Non-Random Properties for Step-Reduced SHA-256}, howpublished = {Cryptology ePrint Archive, Report 2008/131}, year = {2008}, url = {http://eprint.iacr.org/2008/131}, } @misc{cryptoeprint:2008:132, author = {Juan A. Garay and Aggelos Kiayias and Hong-Sheng Zhou}, title = {Sound and Fine-grain Specification of Cryptographic Tasks}, howpublished = {Cryptology ePrint Archive, Report 2008/132}, year = {2008}, url = {http://eprint.iacr.org/2008/132}, } @misc{cryptoeprint:2008:133, author = {P. Gaudry and D. Lubicz}, title = {The arithmetic of characteristic 2 Kummer surfaces}, howpublished = {Cryptology ePrint Archive, Report 2008/133}, year = {2008}, url = {http://eprint.iacr.org/2008/133}, } @misc{cryptoeprint:2008:134, author = {Alon Rosen and Gil Segev}, title = {Efficient Lossy Trapdoor Functions based on the Composite Residuosity Assumption}, howpublished = {Cryptology ePrint Archive, Report 2008/134}, year = {2008}, url = {http://eprint.iacr.org/2008/134}, } @misc{cryptoeprint:2008:135, author = {Clemens Heuberger and James A. Muir}, title = {Unbalanced Digit Sets and the Closest Choice Strategy for Minimal Weight Integer Representations}, howpublished = {Cryptology ePrint Archive, Report 2008/135}, year = {2008}, url = {http://eprint.iacr.org/2008/135}, } @misc{cryptoeprint:2008:136, author = {Man Ho Au and Willy Susilo and Yi Mu}, title = {Constant-Size Dynamic $k$-TAA}, howpublished = {Cryptology ePrint Archive, Report 2008/136}, year = {2008}, url = {http://eprint.iacr.org/2008/136}, } @misc{cryptoeprint:2008:137, author = {Gaetan Bisson and Takakazu Satoh}, title = {More Discriminants with the Brezing-Weng Method}, howpublished = {Cryptology ePrint Archive, Report 2008/137}, year = {2008}, url = {http://eprint.iacr.org/2008/137}, } @misc{cryptoeprint:2008:138, author = {Rafael Dowsley and Jeroen van de Graaf and J\"{o}rn M\"{u}ller-Quade and Anderson C. A. Nascimento}, title = {Oblivious Transfer based on the McEliece Assumptions}}, howpublished = {Cryptology ePrint Archive, Report 2008/138}, year = {2008}, url = {http://eprint.iacr.org/2008/138}, } @misc{cryptoeprint:2008:139, author = {Liming Fang and Jiandong Wang and Yongjun Ren and Jinyue Xia and Shizhu Bian}, title = {Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM}, howpublished = {Cryptology ePrint Archive, Report 2008/139}, year = {2008}, url = {http://eprint.iacr.org/2008/139}, } @misc{cryptoeprint:2008:140, author = {K.Y. Cheong and Takeshi Koshiba}, title = {Reducing Complexity Assumptions for Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2008/140}, year = {2008}, url = {http://eprint.iacr.org/2008/140}, } @misc{cryptoeprint:2008:141, author = {Arpita Patra and Ashish Choudhary and Kannan Srinathan and C. Pandu Rangan}, title = {Unconditionally Reliable and Secure Message Transmission in Undirected Synchronous Networks: Possibility, Feasibility and Optimality}, howpublished = {Cryptology ePrint Archive, Report 2008/141}, year = {2008}, url = {http://eprint.iacr.org/2008/141}, } @misc{cryptoeprint:2008:142, author = {Somitra Kumar Sanadhya and Palash Sarkar}, title = {Attacking Reduced Round SHA-256}, howpublished = {Cryptology ePrint Archive, Report 2008/142}, year = {2008}, url = {http://eprint.iacr.org/2008/142}, } @misc{cryptoeprint:2008:143, author = {M. Barbosa and P. Farshim}, title = {Certificateless Signcryption}, howpublished = {Cryptology ePrint Archive, Report 2008/143}, year = {2008}, url = {http://eprint.iacr.org/2008/143}, } @misc{cryptoeprint:2008:144, author = {Shiva Prasad Kasiviswanathan and Adam Smith}, title = {A Note on Differential Privacy: Defining Resistance to Arbitrary Side Information}, howpublished = {Cryptology ePrint Archive, Report 2008/144}, year = {2008}, url = {http://eprint.iacr.org/2008/144}, } @misc{cryptoeprint:2008:145, author = {Jithra Adikari and Vassil S. Dimitrov and Pradeep K. Mishra}, title = {Fast Multiple Point Multiplication on Elliptic Curves over Prime and Binary Fields using the Double-Base Number System}, howpublished = {Cryptology ePrint Archive, Report 2008/145}, year = {2008}, url = {http://eprint.iacr.org/2008/145}, } @misc{cryptoeprint:2008:146, author = {Xu Zijie}, title = {Dynamic SHA-2}, howpublished = {Cryptology ePrint Archive, Report 2008/146}, year = {2008}, url = {http://eprint.iacr.org/2008/146}, } @misc{cryptoeprint:2008:147, author = {Timo Gendrullis and Martin Novotny and Andy Rupp}, title = {A Real-World Attack Breaking A5/1 within Hours}, howpublished = {Cryptology ePrint Archive, Report 2008/147}, year = {2008}, url = {http://eprint.iacr.org/2008/147}, } @misc{cryptoeprint:2008:148, author = {Roberto M. Avanzi and Clemens Heuberger and Helmut Prodinger}, title = {Redundant $\tau$-adic Expansions I: Non-Adjacent Digit Sets and their Applications to Scalar Multiplication}, howpublished = {Cryptology ePrint Archive, Report 2008/148}, year = {2008}, url = {http://eprint.iacr.org/2008/148}, } @misc{cryptoeprint:2008:149, author = {Daniel R. L. Brown}, title = {Toy Factoring by Newton's Method}, howpublished = {Cryptology ePrint Archive, Report 2008/149}, year = {2008}, url = {http://eprint.iacr.org/2008/149}, } @misc{cryptoeprint:2008:150, author = {Amir Herzberg and Haya Shulman}, title = {Robust Combiners for White-Box Security}, howpublished = {Cryptology ePrint Archive, Report 2008/150}, year = {2008}, url = {http://eprint.iacr.org/2008/150}, } @misc{cryptoeprint:2008:151, author = {Bing Sun,Ruilin Li, Mian Wang, Ping Li and Chao Li}, title = {Impossible Differential Cryptanalysis of CLEFIA}, howpublished = {Cryptology ePrint Archive, Report 2008/151}, year = {2008}, url = {http://eprint.iacr.org/2008/151}, } @misc{cryptoeprint:2008:152, author = {Michael Backes and Dominique Unruh}, title = {Computational Soundness of Symbolic Zero-Knowledge Proofs Against Active Attackers}, howpublished = {Cryptology ePrint Archive, Report 2008/152}, year = {2008}, url = {http://eprint.iacr.org/2008/152}, } @misc{cryptoeprint:2008:153, author = {Clemens Heuberger}, title = {Redundant $\tau$-adic Expansions II: Non-Optimality and Chaotic Behaviour}, howpublished = {Cryptology ePrint Archive, Report 2008/153}, year = {2008}, url = {http://eprint.iacr.org/2008/153}, } @misc{cryptoeprint:2008:154, author = {Yue Zhou and Chao Li}, title = {The Walsh Spectrum of a New Family of APN Functions}, howpublished = {Cryptology ePrint Archive, Report 2008/154}, year = {2008}, url = {http://eprint.iacr.org/2008/154}, } @misc{cryptoeprint:2008:155, author = {David Freeman}, title = {A Generalized Brezing-Weng Algorithm for Constructing Pairing-Friendly Ordinary Abelian Varieties}, howpublished = {Cryptology ePrint Archive, Report 2008/155}, year = {2008}, url = {http://eprint.iacr.org/2008/155}, } @misc{cryptoeprint:2008:156, author = {Kristina Altmann and Tibor Jager and Andy Rupp}, title = {On Black-Box Ring Extraction and Integer Factorization}, howpublished = {Cryptology ePrint Archive, Report 2008/156}, year = {2008}, url = {http://eprint.iacr.org/2008/156}, } @misc{cryptoeprint:2008:157, author = {Lucie Langer and Axel Schmidt and Johannes Buchmann}, title = {Secure Online Elections in Practice}, howpublished = {Cryptology ePrint Archive, Report 2008/157}, year = {2008}, url = {http://eprint.iacr.org/2008/157}, } @misc{cryptoeprint:2008:158, author = {Di Ma and Gene Tsudik}, title = {DISH: Distributed Self-Healing in Unattended Sensor Networks}, howpublished = {Cryptology ePrint Archive, Report 2008/158}, year = {2008}, url = {http://eprint.iacr.org/2008/158}, } @misc{cryptoeprint:2008:159, author = {Bin Wang}, title = {A non-interactive deniable authentication scheme based on designated verifier proofs}, howpublished = {Cryptology ePrint Archive, Report 2008/159}, year = {2008}, url = {http://eprint.iacr.org/2008/159}, } @misc{cryptoeprint:2008:160, author = {Girraj Kumar Verma}, title = {A Proxy Signature Scheme over Braid Groups}, howpublished = {Cryptology ePrint Archive, Report 2008/160}, year = {2008}, url = {http://eprint.iacr.org/2008/160}, } @misc{cryptoeprint:2008:161, author = {Reinier Broker and Kristin Lauter }, title = {Modular polynomials for genus 2}, howpublished = {Cryptology ePrint Archive, Report 2008/161}, year = {2008}, url = {http://eprint.iacr.org/2008/161}, } @misc{cryptoeprint:2008:162, author = {Michael Backes and Boris Köpf}, title = {Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks}, howpublished = {Cryptology ePrint Archive, Report 2008/162}, year = {2008}, url = {http://eprint.iacr.org/2008/162}, } @misc{cryptoeprint:2008:163, author = {Matthew Green and Susan Hohenberger}, title = {Universally Composable Adaptive Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2008/163}, year = {2008}, url = {http://eprint.iacr.org/2008/163}, } @misc{cryptoeprint:2008:164, author = {Iftach Haitner and Thomas Holenstein}, title = {On the (Im)Possibility of Key Dependent Encryption}, howpublished = {Cryptology ePrint Archive, Report 2008/164}, year = {2008}, url = {http://eprint.iacr.org/2008/164}, } @misc{cryptoeprint:2008:165, author = {Pinhui Ke}, title = {Improved lower bound on the number of balanced symmetric functions over GF(p)}, howpublished = {Cryptology ePrint Archive, Report 2008/165}, year = {2008}, url = {http://eprint.iacr.org/2008/165}, } @misc{cryptoeprint:2008:166, author = {Nicolas T. Courtois and Karsten Nohl and Sean O'Neil}, title = {Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards}, howpublished = {Cryptology ePrint Archive, Report 2008/166}, year = {2008}, url = {http://eprint.iacr.org/2008/166}, } @misc{cryptoeprint:2008:167, author = {Omkant Pandey}, title = {Non-black-box Techniques Are Not Necessary for Constant Round Non-malleable Protocols}, howpublished = {Cryptology ePrint Archive, Report 2008/167}, year = {2008}, url = {http://eprint.iacr.org/2008/167}, } @misc{cryptoeprint:2008:168, author = {Dennis Hofheinz}, title = {Possibility and impossibility results for selective decommitments}, howpublished = {Cryptology ePrint Archive, Report 2008/168}, year = {2008}, url = {http://eprint.iacr.org/2008/168}, } @misc{cryptoeprint:2008:169, author = {Côme Berbain and Aline Gouget and Hervé Sibert}, title = {Understanding Phase Shifting Equivalent Keys and Exhaustive Search}, howpublished = {Cryptology ePrint Archive, Report 2008/169}, year = {2008}, url = {http://eprint.iacr.org/2008/169}, } @misc{cryptoeprint:2008:170, author = {Simon R. Blackburn}, title = {Cryptanalysing the Critical Group}, howpublished = {Cryptology ePrint Archive, Report 2008/170}, year = {2008}, url = {http://eprint.iacr.org/2008/170}, } @misc{cryptoeprint:2008:171, author = {Daniel J. Bernstein and Tanja Lange and Reza Rezaeian Farashahi}, title = {Binary Edwards Curves}, howpublished = {Cryptology ePrint Archive, Report 2008/171}, year = {2008}, url = {http://eprint.iacr.org/2008/171}, } @misc{cryptoeprint:2008:172, author = {Arpita Patra and Ashish Choudhary and Ashwinkumar B.V and C. Pandu Rangan}, title = {On Round Complexity of Unconditionally Secure VSS}, howpublished = {Cryptology ePrint Archive, Report 2008/172}, year = {2008}, url = {http://eprint.iacr.org/2008/172}, } @misc{cryptoeprint:2008:173, author = {Christophe Petit and Kristin Lauter and Jean-Jacques Quisquater}, title = {Full Cryptanalysis of LPS and Morgenstern Hash Function}, howpublished = {Cryptology ePrint Archive, Report 2008/173}, year = {2008}, url = {http://eprint.iacr.org/2008/173}, } @misc{cryptoeprint:2008:174, author = {Somitra Kumar Sanadhya and Palash Sarkar}, title = {Non-Linear Reduced Round Attacks Against SHA-2 Hash family}, howpublished = {Cryptology ePrint Archive, Report 2008/174}, year = {2008}, url = {http://eprint.iacr.org/2008/174}, } @misc{cryptoeprint:2008:175, author = {Kevin D. Bowers and Ari Juels and Alina Oprea}, title = {Proofs of Retrievability: Theory and Implementation }, howpublished = {Cryptology ePrint Archive, Report 2008/175}, year = {2008}, url = {http://eprint.iacr.org/2008/175}, } @misc{cryptoeprint:2008:176, author = {Wang yongjuan and Fan shuqin and Han wenbao}, title = {New construction of Boolean functions with maximun algebraic immunity}, howpublished = {Cryptology ePrint Archive, Report 2008/176}, year = {2008}, url = {http://eprint.iacr.org/2008/176}, } @misc{cryptoeprint:2008:177, author = {Martin Albrecht and Carlos Cid}, title = {Algebraic Techniques in Differential Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2008/177}, year = {2008}, url = {http://eprint.iacr.org/2008/177}, } @misc{cryptoeprint:2008:178, author = {Kemal Bicakci}, title = {Optimal Discretization for High-Entropy Graphical Passwords}, howpublished = {Cryptology ePrint Archive, Report 2008/178}, year = {2008}, url = {http://eprint.iacr.org/2008/178}, } @misc{cryptoeprint:2008:179, author = {Chunxiang Gu and Yuefei Zhu}, title = {An Efficient ID-based Ring Signature Scheme from Pairings}, howpublished = {Cryptology ePrint Archive, Report 2008/179}, year = {2008}, url = {http://eprint.iacr.org/2008/179}, } @misc{cryptoeprint:2008:180, author = {Alexander Rostovtsev}, title = {Imaginary quadratic orders with given prime factor of class number}, howpublished = {Cryptology ePrint Archive, Report 2008/180}, year = {2008}, url = {http://eprint.iacr.org/2008/180}, } @misc{cryptoeprint:2008:181, author = {Grzegorz Stachowiak}, title = {Proofs of Knowledge with Several Challenge Values}, howpublished = {Cryptology ePrint Archive, Report 2008/181}, year = {2008}, url = {http://eprint.iacr.org/2008/181}, } @misc{cryptoeprint:2008:182, author = {Javier Herranz}, title = {Restricted Adaptive Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2008/182}, year = {2008}, url = {http://eprint.iacr.org/2008/182}, } @misc{cryptoeprint:2008:183, author = {Jean-Philippe Aumasson and Willi Meier and Florian Mendel}, title = {Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5}, howpublished = {Cryptology ePrint Archive, Report 2008/183}, year = {2008}, url = {http://eprint.iacr.org/2008/183}, } @misc{cryptoeprint:2008:184, author = {W. Erik Anderson}, title = {On the Secure Obfuscation of Deterministic Finite Automata}, howpublished = {Cryptology ePrint Archive, Report 2008/184}, year = {2008}, url = {http://eprint.iacr.org/2008/184}, } @misc{cryptoeprint:2008:185, author = {Di Ma and Gene Tsudik}, title = {A New Approach to Secure Logging}, howpublished = {Cryptology ePrint Archive, Report 2008/185}, year = {2008}, url = {http://eprint.iacr.org/2008/185}, } @misc{cryptoeprint:2008:186, author = {Mehul A. Shah and Ram Swaminathan and Mary Baker}, title = {Privacy-Preserving Audit and Extraction of Digital Contents}, howpublished = {Cryptology ePrint Archive, Report 2008/186}, year = {2008}, url = {http://eprint.iacr.org/2008/186}, } @misc{cryptoeprint:2008:187, author = {Fagen Li and Yong Yu}, title = {An Efficient and Provably Secure ID-Based Threshold Signcryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2008/187}, year = {2008}, url = {http://eprint.iacr.org/2008/187}, } @misc{cryptoeprint:2008:188, author = {Amir Moradi and Thomas Eisenbarth and Axel Poschmann and Carsten Rolfes and Christof Paar and Mohammad T. Manzuri Shalmani and Mahmoud Salmasizadeh}, title = {Information Leakage of Flip-Flops in DPA-Resistant Logic Styles}, howpublished = {Cryptology ePrint Archive, Report 2008/188}, year = {2008}, url = {http://eprint.iacr.org/2008/188}, } @misc{cryptoeprint:2008:189, author = {Thomas Ristenpart and Thomas Shrimpton}, title = {How to Build a Hash Function from any Collision-Resistant Function}, howpublished = {Cryptology ePrint Archive, Report 2008/189}, year = {2008}, url = {http://eprint.iacr.org/2008/189}, } @misc{cryptoeprint:2008:190, author = {Daniel R. L. Brown}, title = {User-Sure-and-Safe Key Retrieval}, howpublished = {Cryptology ePrint Archive, Report 2008/190}, year = {2008}, url = {http://eprint.iacr.org/2008/190}, } @misc{cryptoeprint:2008:191, author = {None }, title = {None }, howpublished = {Cryptology ePrint Archive, Report 2008/191}, year = {2008}, url = {http://eprint.iacr.org/2008/191}, } @misc{cryptoeprint:2008:192, author = {Amir Moradi and Mehrdad Khatir and Mahmoud Salmasizadeh and Mohammad T. Manzuri Shalmani}, title = {Investigating the DPA-Resistance Property of Charge Recovery Logics}, howpublished = {Cryptology ePrint Archive, Report 2008/192}, year = {2008}, url = {http://eprint.iacr.org/2008/192}, } @misc{cryptoeprint:2008:193, author = {Wei Han and Tao Hao and Dong Zheng and Ke-fei Chen and Xiaofeng Chen}, title = {A Tamper-Evident Voting Machine Resistant to Covert Channels}, howpublished = {Cryptology ePrint Archive, Report 2008/193}, year = {2008}, url = {http://eprint.iacr.org/2008/193}, } @misc{cryptoeprint:2008:194, author = {Steven D. Galbraith and Xibin Lin and Michael Scott}, title = {Endomorphisms for faster elliptic curve cryptography on a large class of curves}, howpublished = {Cryptology ePrint Archive, Report 2008/194}, year = {2008}, url = {http://eprint.iacr.org/2008/194}, } @misc{cryptoeprint:2008:195, author = {Jin Zhengping and Zuo Huijuan and Du hongzhen and Wen Qiaoyan}, title = {An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs}, howpublished = {Cryptology ePrint Archive, Report 2008/195}, year = {2008}, url = {http://eprint.iacr.org/2008/195}, } @misc{cryptoeprint:2008:196, author = {Zhengbang Zha and Gohar M. Kyureghyan and Xueli Wang}, title = {A New Family of Perfect Nonlinear Binomials}, howpublished = {Cryptology ePrint Archive, Report 2008/196}, year = {2008}, url = {http://eprint.iacr.org/2008/196}, } @misc{cryptoeprint:2008:197, author = {Yehuda Lindell and Benny Pinkas}, title = {Secure Multiparty Computation for Privacy-Preserving Data Mining}, howpublished = {Cryptology ePrint Archive, Report 2008/197}, year = {2008}, url = {http://eprint.iacr.org/2008/197}, } @misc{cryptoeprint:2008:198, author = {Anoop MS}, title = {Security needs in embedded systems}, howpublished = {Cryptology ePrint Archive, Report 2008/198}, year = {2008}, url = {http://eprint.iacr.org/2008/198}, } @misc{cryptoeprint:2008:199, author = {David G. Harris}, title = {Simultaneous field divisions: an extension of Montgomery's trick}, howpublished = {Cryptology ePrint Archive, Report 2008/199}, year = {2008}, url = {http://eprint.iacr.org/2008/199}, } @misc{cryptoeprint:2008:200, author = {J. Wu and D.R. Stinson}, title = {On The Security of The ElGamal Encryption Scheme and Damgard’s Variant}, howpublished = {Cryptology ePrint Archive, Report 2008/200}, year = {2008}, url = {http://eprint.iacr.org/2008/200}, } @misc{cryptoeprint:2008:201, author = {J. Wu and D.R. Stinson}, title = {How To Ensure Forward and Backward Untraceability of RFID Identification Schemes By Using A Robust PRBG}, howpublished = {Cryptology ePrint Archive, Report 2008/201}, year = {2008}, url = {http://eprint.iacr.org/2008/201}, } @misc{cryptoeprint:2008:202, author = {Zhitu Su, Hui Li and JianFeng Ma}, title = {Polynomials for Ate Pairing and $\mathbf{Ate}_{i}$ Pairing}, howpublished = {Cryptology ePrint Archive, Report 2008/202}, year = {2008}, url = {http://eprint.iacr.org/2008/202}, } @misc{cryptoeprint:2008:203, author = {Fons Bruekers and Stefan Katzenbeisser and Klaus Kursawe and Pim Tuyls}, title = {Privacy-Preserving Matching of DNA Profiles}, howpublished = {Cryptology ePrint Archive, Report 2008/203}, year = {2008}, url = {http://eprint.iacr.org/2008/203}, } @misc{cryptoeprint:2008:204, author = {Yanbin Pan and Yingpu Deng}, title = {Cryptanalysis of the Cai-Cusick Lattice-based Public-key Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2008/204}, year = {2008}, url = {http://eprint.iacr.org/2008/204}, } @misc{cryptoeprint:2008:205, author = {Philipp Grabher and Johann Groszschaedl and Dan Page}, title = {On Software Parallel Implementation of Cryptographic Pairings}, howpublished = {Cryptology ePrint Archive, Report 2008/205}, year = {2008}, url = {http://eprint.iacr.org/2008/205}, } @misc{cryptoeprint:2008:206, author = {Dov Gordon and Jonathan Katz}, title = {Partial Fairness in Secure Two-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2008/206}, year = {2008}, url = {http://eprint.iacr.org/2008/206}, } @misc{cryptoeprint:2008:207, author = {Ben Adida and C. Andrew Neff}, title = {Efficient Receipt-Free Ballot Casting Resistant to Covert Channels}, howpublished = {Cryptology ePrint Archive, Report 2008/207}, year = {2008}, url = {http://eprint.iacr.org/2008/207}, } @misc{cryptoeprint:2008:208, author = {Naoki Ogura and Shigenori Uchiyama}, title = {Remarks on the Attack of Fouque et al. against the {\ell}IC Scheme}, howpublished = {Cryptology ePrint Archive, Report 2008/208}, year = {2008}, url = {http://eprint.iacr.org/2008/208}, } @misc{cryptoeprint:2008:209, author = {Chang-An Zhao and Fangguo Zhang}, title = {Computing the Bilinear Pairings on Elliptic Curves with Automorphisms}, howpublished = {Cryptology ePrint Archive, Report 2008/209}, year = {2008}, url = {http://eprint.iacr.org/2008/209}, } @misc{cryptoeprint:2008:210, author = {Haimin Jin and Duncan S. Wong and Yinlong Xu}, title = {Complexity Analysis of a Fast Modular Multiexponentiation Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2008/210}, year = {2008}, url = {http://eprint.iacr.org/2008/210}, } @misc{cryptoeprint:2008:211, author = {Goichiro Hanaoka and Kaoru Kurosawa}, title = {Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption}, howpublished = {Cryptology ePrint Archive, Report 2008/211}, year = {2008}, url = {http://eprint.iacr.org/2008/211}, } @misc{cryptoeprint:2008:212, author = {Chang-An Zhao and Fangguo Zhang}, title = {Reducing the Complexity of the Weil Pairing Computation}, howpublished = {Cryptology ePrint Archive, Report 2008/212}, year = {2008}, url = {http://eprint.iacr.org/2008/212}, } @misc{cryptoeprint:2008:213, author = {Shuhong Wang}, title = {The Multireceiver Commitment Schemes}, howpublished = {Cryptology ePrint Archive, Report 2008/213}, year = {2008}, url = {http://eprint.iacr.org/2008/213}, } @misc{cryptoeprint:2008:214, author = {Douglas Stebila and Poornaprajna Udupi and Sheueling Chang}, title = {Multi-Factor Password-Authenticated Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2008/214}, year = {2008}, url = {http://eprint.iacr.org/2008/214}, } @misc{cryptoeprint:2008:215, author = {Naoki Hashizume and Fumiyuki Momose and Jinhui Chao}, title = {On Implementation of GHS Attack against Elliptic Curve Cryptosystems over Cubic Extension Fields of Odd Characteristics}, howpublished = {Cryptology ePrint Archive, Report 2008/215}, year = {2008}, url = {http://eprint.iacr.org/2008/215}, } @misc{cryptoeprint:2008:216, author = {Palash Sarkar}, title = {A New Universal Hash Function and Other Cryptographic Algorithms Suitable for Resource Constrained Devices}, howpublished = {Cryptology ePrint Archive, Report 2008/216}, year = {2008}, url = {http://eprint.iacr.org/2008/216}, } @misc{cryptoeprint:2008:217, author = {Antoine Joux and Reynald Lercier and David Naccache and Emmanuel Thom\'e}, title = {Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete Logarithms}, howpublished = {Cryptology ePrint Archive, Report 2008/217}, year = {2008}, url = {http://eprint.iacr.org/2008/217}, } @misc{cryptoeprint:2008:218, author = {Wouter Castryck and Steven Galbraith and Reza Rezaeian Farashahi}, title = {Efficient arithmetic on elliptic curves using a mixed Edwards-Montgomery representation}, howpublished = {Cryptology ePrint Archive, Report 2008/218}, year = {2008}, url = {http://eprint.iacr.org/2008/218}, } @misc{cryptoeprint:2008:219, author = {Dan P. Milleville}, title = {Analysis and Details of the Random Cipher Output Mode Of Operation Primitives}, howpublished = {Cryptology ePrint Archive, Report 2008/219}, year = {2008}, url = {http://eprint.iacr.org/2008/219}, } @misc{cryptoeprint:2008:220, author = {Ivan Damgård and Jesper Buus Nielsen and Claudio Orlandi}, title = {Essentially Optimal Universally Composable Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2008/220}, year = {2008}, url = {http://eprint.iacr.org/2008/220}, } @misc{cryptoeprint:2008:221, author = {Ivan Damgard and Rune Thorbek}, title = {Efficient Conversion of Secret-shared Values Between Different Fields}, howpublished = {Cryptology ePrint Archive, Report 2008/221}, year = {2008}, url = {http://eprint.iacr.org/2008/221}, } @misc{cryptoeprint:2008:222, author = {Gideon Samid}, title = {Encryption-On-Demand: Practical and Theoretical Considerations}, howpublished = {Cryptology ePrint Archive, Report 2008/222}, year = {2008}, url = {http://eprint.iacr.org/2008/222}, } @misc{cryptoeprint:2008:223, author = {Bert W. Leung and Felix Y. Ng and Duncan S. Wong}, title = {On the Security of a Visual Cryptography Scheme for Color Images}, howpublished = {Cryptology ePrint Archive, Report 2008/223}, year = {2008}, url = {http://eprint.iacr.org/2008/223}, } @misc{cryptoeprint:2008:224, author = {Hai huang and Zhenfu Cao}, title = {An ID-based Authenticated Key Exchange Protocol based on Bilinear Diffie-Hellman Problem}, howpublished = {Cryptology ePrint Archive, Report 2008/224}, year = {2008}, url = {http://eprint.iacr.org/2008/224}, } @misc{cryptoeprint:2008:225, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Ragavendran Gopalakrishnan and Naga Naresh Karuturi and C. Pandu Rangan}, title = {Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme}, howpublished = {Cryptology ePrint Archive, Report 2008/225}, year = {2008}, url = {http://eprint.iacr.org/2008/225}, } @misc{cryptoeprint:2008:226, author = {Chunbo Ma and Jun Ao}, title = {Proxy Key Re-encapsulation Mechanism for Group Communications}, howpublished = {Cryptology ePrint Archive, Report 2008/226}, year = {2008}, url = {http://eprint.iacr.org/2008/226}, } @misc{cryptoeprint:2008:227, author = {Ruilin Li, Bing Sun, Peng Zhang and Chao Li}, title = {New Impossible Differential Cryptanalysis of ARIA}, howpublished = {Cryptology ePrint Archive, Report 2008/227}, year = {2008}, url = {http://eprint.iacr.org/2008/227}, } @misc{cryptoeprint:2008:228, author = {Subhamoy Maitra and Santanu Sarkar}, title = {Revisiting Wiener's Attack -- New Weak Keys in RSA}, howpublished = {Cryptology ePrint Archive, Report 2008/228}, year = {2008}, url = {http://eprint.iacr.org/2008/228}, } @misc{cryptoeprint:2008:229, author = {Julien Bringer and Herve Chabanne and Thomas Icart}, title = {Identification and Privacy: Zero-Knowledge is not Enough}, howpublished = {Cryptology ePrint Archive, Report 2008/229}, year = {2008}, url = {http://eprint.iacr.org/2008/229}, } @misc{cryptoeprint:2008:230, author = {Tao Xie and DengGuo Feng and FanBao Liu}, title = {A New Collision Differential For MD5 With Its Full Differential Path}, howpublished = {Cryptology ePrint Archive, Report 2008/230}, year = {2008}, url = {http://eprint.iacr.org/2008/230}, } @misc{cryptoeprint:2008:231, author = {Jose Carrijo and Rafael Tonicelli and Hideki Imai and Anderson C A Nascimento}, title = {A Novel Probabilistic Passive Attack on the Protocols HB and HB+}, howpublished = {Cryptology ePrint Archive, Report 2008/231}, year = {2008}, url = {http://eprint.iacr.org/2008/231}, } @misc{cryptoeprint:2008:232, author = {Ashish Choudhary and Arpita Patra and AshwinKumar B.V and Kannan Srinathan and C. Pandu Rangan}, title = {Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary}, howpublished = {Cryptology ePrint Archive, Report 2008/232}, year = {2008}, url = {http://eprint.iacr.org/2008/232}, } @misc{cryptoeprint:2008:233, author = {Yi Deng and Dongdai Lin}, title = {On Resettably-Sound Resttable Zero Knowledege Arguments}, howpublished = {Cryptology ePrint Archive, Report 2008/233}, year = {2008}, url = {http://eprint.iacr.org/2008/233}, } @misc{cryptoeprint:2008:234, author = {Helger Lipmaa}, title = {On CCA1-Security of Elgamal And Damg{\aa}rd's Elgamal}, howpublished = {Cryptology ePrint Archive, Report 2008/234}, year = {2008}, url = {http://eprint.iacr.org/2008/234}, } @misc{cryptoeprint:2008:235, author = {Rafail Ostrovsky and Giuseppe Persiano and Ivan Visconti}, title = {Constant-Round Concurrent Non-Malleable Commitments and Decommitments}, howpublished = {Cryptology ePrint Archive, Report 2008/235}, year = {2008}, url = {http://eprint.iacr.org/2008/235}, } @misc{cryptoeprint:2008:236, author = {P. Morrissey and N.P.Smart and B. Warinschi}, title = {A Modular Security Analysis of the TLS Handshake Protocol}, howpublished = {Cryptology ePrint Archive, Report 2008/236}, year = {2008}, url = {http://eprint.iacr.org/2008/236}, } @misc{cryptoeprint:2008:237, author = {O.A. Logachev and D.S. Nazarova}, title = {Local Affinity Based Inversion of Filter Generators}, howpublished = {Cryptology ePrint Archive, Report 2008/237}, year = {2008}, url = {http://eprint.iacr.org/2008/237}, } @misc{cryptoeprint:2008:238, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Ragavendran Gopalakrishnan and Naga Naresh Karuturi and C. Pandu Rangan}, title = {Cryptanalysis of ID-Based Signcryption Scheme for Multiple Receivers}, howpublished = {Cryptology ePrint Archive, Report 2008/238}, year = {2008}, url = {http://eprint.iacr.org/2008/238}, } @misc{cryptoeprint:2008:239, author = {Atefeh Mashatan and Douglas R. Stinson}, title = {Recognition in Ad Hoc Pervasive Networks}, howpublished = {Cryptology ePrint Archive, Report 2008/239}, year = {2008}, url = {http://eprint.iacr.org/2008/239}, } @misc{cryptoeprint:2008:240, author = {Stefan Dziembowski and Krzysztof Pietrzak}, title = {Leakage-Resilient Cryptography in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2008/240}, year = {2008}, url = {http://eprint.iacr.org/2008/240}, } @misc{cryptoeprint:2008:241, author = {Zbigniew Golebiewski and Krzysztof Majcher and Filip Zagorski and Marcin Zawada}, title = {Practical Attacks on HB and HB+ Protocols}, howpublished = {Cryptology ePrint Archive, Report 2008/241}, year = {2008}, url = {http://eprint.iacr.org/2008/241}, } @misc{cryptoeprint:2008:242, author = {Shaojing Fu Chao Li Bing Sun}, title = {Enumeration of Homogeneous Rotation Symmetric functions over GF(p)}, howpublished = {Cryptology ePrint Archive, Report 2008/242}, year = {2008}, url = {http://eprint.iacr.org/2008/242}, } @misc{cryptoeprint:2008:243, author = {Yacov Yacobi}, title = {On the economic payoff of forensic systems when used to trace Counterfeited Software and content}, howpublished = {Cryptology ePrint Archive, Report 2008/243}, year = {2008}, url = {http://eprint.iacr.org/2008/243}, } @misc{cryptoeprint:2008:244, author = {Claude Carlet and Keqin Feng}, title = {New balanced Boolean functions satisfying all the main cryptographic criteria}, howpublished = {Cryptology ePrint Archive, Report 2008/244}, year = {2008}, url = {http://eprint.iacr.org/2008/244}, } @misc{cryptoeprint:2008:245, author = {Markus Grassl and Rainer Steinwandt}, title = {Cryptanalysis of an Authentication Scheme Using Truncated Polynomials}, howpublished = {Cryptology ePrint Archive, Report 2008/245}, year = {2008}, url = {http://eprint.iacr.org/2008/245}, } @misc{cryptoeprint:2008:246, author = {Jean-Sebastien Coron and Jacques Patarin and Yannick Seurin}, title = {The Random Oracle Model and the Ideal Cipher Model are Equivalent}, howpublished = {Cryptology ePrint Archive, Report 2008/246}, year = {2008}, url = {http://eprint.iacr.org/2008/246}, } @misc{cryptoeprint:2008:247, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Naga Naresh Karuturi and Ragavendran Gopalakrishnan and Pandu Rangan Chandrasekaran}, title = {Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-hoc Networks}, howpublished = {Cryptology ePrint Archive, Report 2008/247}, year = {2008}, url = {http://eprint.iacr.org/2008/247}, } @misc{cryptoeprint:2008:248, author = {Fengjiao Wang and Yuqing Zhang}, title = {Cryptanalysis of a client-to-client password-authenticated key agreement protocol}, howpublished = {Cryptology ePrint Archive, Report 2008/248}, year = {2008}, url = {http://eprint.iacr.org/2008/248}, } @misc{cryptoeprint:2008:249, author = {Shaojing Fu, Chao Li, Bing sun}, title = {Construction of Resilient Functions with Multiple Cryptographic Criteria}, howpublished = {Cryptology ePrint Archive, Report 2008/249}, year = {2008}, url = {http://eprint.iacr.org/2008/249}, } @misc{cryptoeprint:2008:250, author = {Steven Galbraith and Xibin Lin and David Mireles}, title = {Pairings on hyperelliptic curves with a real model}, howpublished = {Cryptology ePrint Archive, Report 2008/250}, year = {2008}, url = {http://eprint.iacr.org/2008/250}, } @misc{cryptoeprint:2008:251, author = {Sebastian Gajek and Mark Manulis and Olivier Pereira and Ahmad-Reza Sadeghi and Jörg Schwenk}, title = {Universally Composable Security Analysis of TLS---Secure Sessions with Handshake and Record Layer Protocols}, howpublished = {Cryptology ePrint Archive, Report 2008/251}, year = {2008}, url = {http://eprint.iacr.org/2008/251}, } @misc{cryptoeprint:2008:252, author = {Nick Varnovsky}, title = {Provable Security of Digital Signatures in the Tamper-Proof Device Model}, howpublished = {Cryptology ePrint Archive, Report 2008/252}, year = {2008}, url = {http://eprint.iacr.org/2008/252}, } @misc{cryptoeprint:2008:253, author = {Yiliang Han, Xiaolin Gui, Xu'an Wang}, title = {Multi-Recipient Signcryption for Secure Wireless Group Communication}, howpublished = {Cryptology ePrint Archive, Report 2008/253}, year = {2008}, url = {http://eprint.iacr.org/2008/253}, } @misc{cryptoeprint:2008:254, author = {Zhenchao ZHU and Yuqing ZHANG and FengjiaoWANG}, title = {An Efficient Identity-based Ring Signcryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2008/254}, year = {2008}, url = {http://eprint.iacr.org/2008/254}, } @misc{cryptoeprint:2008:255, author = {Xin Liao and Qiao-yan Wen}, title = {Embedding in Two Least Significant Bits with Wet Paper Coding}, howpublished = {Cryptology ePrint Archive, Report 2008/255}, year = {2008}, url = {http://eprint.iacr.org/2008/255}, } @misc{cryptoeprint:2008:256, author = {JAIYEOLA Temitope Gbolahan}, title = {ON MIDDLE UNIVERSAL WEAK AND CROSS INVERSE PROPERTY LOOPS WITH EQUAL LENGHT OF INVERES CYCLES}, howpublished = {Cryptology ePrint Archive, Report 2008/256}, year = {2008}, url = {http://eprint.iacr.org/2008/256}, } @misc{cryptoeprint:2008:257, author = {JAIYEOLA Temitope Gbolahan}, title = {ON MIDDLE UNIVERSAL $m$-INVERSE QUASIGROUPS AND THEIR APPLICATIONS TO CRYPTOGRAPHY}, howpublished = {Cryptology ePrint Archive, Report 2008/257}, year = {2008}, url = {http://eprint.iacr.org/2008/257}, } @misc{cryptoeprint:2008:258, author = {JAIYEOLA Temitope Gbolahan and ADENIRAN John Olushola}, title = {ON A CRYPTOGRAPHIC IDENTITY IN OSBORN LOOPS}, howpublished = {Cryptology ePrint Archive, Report 2008/258}, year = {2008}, url = {http://eprint.iacr.org/2008/258}, } @misc{cryptoeprint:2008:259, author = {ZHAO Lu, WEN Qiao-yan}, title = {2-Adic Complexity of a Sequence Obtained from a Periodic Binary Sequence by Either Inserting or Deleting k Symbols within One Period}, howpublished = {Cryptology ePrint Archive, Report 2008/259}, year = {2008}, url = {http://eprint.iacr.org/2008/259}, } @misc{cryptoeprint:2008:260, author = {Divesh Aggarwal and Ueli Maurer}, title = {FACTORING IS EQUIVALENT TO GENERIC RSA}, howpublished = {Cryptology ePrint Archive, Report 2008/260}, year = {2008}, url = {http://eprint.iacr.org/2008/260}, } @misc{cryptoeprint:2008:261, author = {F. Vercauteren}, title = {The Hidden Root Problem}, howpublished = {Cryptology ePrint Archive, Report 2008/261}, year = {2008}, url = {http://eprint.iacr.org/2008/261}, } @misc{cryptoeprint:2008:262, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, title = {Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited}, howpublished = {Cryptology ePrint Archive, Report 2008/262}, year = {2008}, url = {http://eprint.iacr.org/2008/262}, } @misc{cryptoeprint:2008:263, author = {Michael Gorski, Stefan Lucks, Thomas Peyrin}, title = {Slide Attacks on a Class of Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2008/263}, year = {2008}, url = {http://eprint.iacr.org/2008/263}, } @misc{cryptoeprint:2008:264, author = {Jörn Müller-Quade and Dominik Raub}, title = {A Complete Treatment of 2-party SFE in the Information-Theoretic Setting with Applications to Long-Term Security}, howpublished = {Cryptology ePrint Archive, Report 2008/264}, year = {2008}, url = {http://eprint.iacr.org/2008/264}, } @misc{cryptoeprint:2008:265, author = {Steven D. Galbraith and Michael Harrison and David J. Mireles Morales}, title = {Efficient Hyperelliptic Arithmetic using Balanced Representation for Divisors}, howpublished = {Cryptology ePrint Archive, Report 2008/265}, year = {2008}, url = {http://eprint.iacr.org/2008/265}, } @misc{cryptoeprint:2008:266, author = {Anne Broadbent and Alain Tapp}, title = {Information-Theoretically Secure Voting Without an Honest Majority}, howpublished = {Cryptology ePrint Archive, Report 2008/266}, year = {2008}, url = {http://eprint.iacr.org/2008/266}, } @misc{cryptoeprint:2008:267, author = {Mihir Bellare and Marc Fischlin and Adam O'Neill and Thomas Ristenpart}, title = {Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2008/267}, year = {2008}, url = {http://eprint.iacr.org/2008/267}, } @misc{cryptoeprint:2008:268, author = {Craig Gentry and Brent Waters}, title = {Adaptive Security in Broadcast Encryption Systems}, howpublished = {Cryptology ePrint Archive, Report 2008/268}, year = {2008}, url = {http://eprint.iacr.org/2008/268}, } @misc{cryptoeprint:2008:269, author = {Somitra Kumar Sanadhya and Palash Sarkar}, title = {Searching for Low Weight Codewords in Linear Binary Codes}, howpublished = {Cryptology ePrint Archive, Report 2008/269}, year = {2008}, url = {http://eprint.iacr.org/2008/269}, } @misc{cryptoeprint:2008:270, author = {Somitra Kumar Sanadhya and Palash Sarkar}, title = {New Collision attacks Against Up To 24-step SHA-2}, howpublished = {Cryptology ePrint Archive, Report 2008/270}, year = {2008}, url = {http://eprint.iacr.org/2008/270}, } @misc{cryptoeprint:2008:271, author = {Somitra Kumar Sanadhya and Palash Sarkar}, title = {Attacking Step Reduced SHA-2 Family in a Unified Framework}, howpublished = {Cryptology ePrint Archive, Report 2008/271}, year = {2008}, url = {http://eprint.iacr.org/2008/271}, } @misc{cryptoeprint:2008:272, author = {Somitra Kumar Sanadhya and Palash Sarkar}, title = {Some Observations on Strengthening the SHA-2 Family}, howpublished = {Cryptology ePrint Archive, Report 2008/272}, year = {2008}, url = {http://eprint.iacr.org/2008/272}, } @misc{cryptoeprint:2008:273, author = {Amitabh Saxena and Brecht Wyseur}, title = {On White-Box Cryptography and Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2008/273}, year = {2008}, url = {http://eprint.iacr.org/2008/273}, } @misc{cryptoeprint:2008:274, author = {Fangguo Zhang}, title = {Twisted Ate Pairing on Hyperelliptic Curves and Applications}, howpublished = {Cryptology ePrint Archive, Report 2008/274}, year = {2008}, url = {http://eprint.iacr.org/2008/274}, } @misc{cryptoeprint:2008:275, author = {Joseph K. Liu \and Joonsang Baek \and Willy Susilo \and Jianying Zhou}, title = {Certificate-Based Signature Schemes without Pairings or Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2008/275}, year = {2008}, url = {http://eprint.iacr.org/2008/275}, } @misc{cryptoeprint:2008:276, author = {Chandrasekar S. and Ambika K. and Pandu Rangan C.}, title = {Signcryption with Proxy Re-encryption}, howpublished = {Cryptology ePrint Archive, Report 2008/276}, year = {2008}, url = {http://eprint.iacr.org/2008/276}, } @misc{cryptoeprint:2008:277, author = {Vadym Fedyukovych}, title = {A strategy for any DAA Issuer and an additional verification by a Host}, howpublished = {Cryptology ePrint Archive, Report 2008/277}, year = {2008}, url = {http://eprint.iacr.org/2008/277}, } @misc{cryptoeprint:2008:278, author = {Bhavana Kanukurthi and Leonid Reyzin}, title = {An Improved Robust Fuzzy Extractor}, howpublished = {Cryptology ePrint Archive, Report 2008/278}, year = {2008}, url = {http://eprint.iacr.org/2008/278}, } @misc{cryptoeprint:2008:279, author = {Elaine Shi and Brent Waters}, title = {Delegating Capabilities in Predicate Encryption Systems}, howpublished = {Cryptology ePrint Archive, Report 2008/279}, year = {2008}, url = {http://eprint.iacr.org/2008/279}, } @misc{cryptoeprint:2008:280, author = {Jean-Luc Beuchat and Hiroshi Doi and Kaoru Fujita and Atsuo Inomata and Akira Kanaoka and Masayoshi Katouno and Masahiro Mambo and Eiji Okamoto and Takeshi Okamoto and Takaaki Shiga and Masaaki Shirase and Ryuji Soga and Tsuyoshi Takagi and Ananda Vithanage and Hiroyasu Yamamoto}, title = {FPGA and ASIC Implementations of the $\eta_T$ Pairing in Characteristic Three}, howpublished = {Cryptology ePrint Archive, Report 2008/280}, year = {2008}, url = {http://eprint.iacr.org/2008/280}, } @misc{cryptoeprint:2008:281, author = {Taehyun Kim, Jongsung Kim, Seokhie Hong and Jaechul Sung}, title = {Linear and Differential Cryptanalysis of Reduced SMS4 Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2008/281}, year = {2008}, url = {http://eprint.iacr.org/2008/281}, } @misc{cryptoeprint:2008:282, author = {Jihye Kim and Gene Tsudik}, title = {Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks}, howpublished = {Cryptology ePrint Archive, Report 2008/282}, year = {2008}, url = {http://eprint.iacr.org/2008/282}, } @misc{cryptoeprint:2008:283, author = {Jorge Munilla and Alberto Peinado}, title = {Attacks on Singelee and Preneel's protocol}, howpublished = {Cryptology ePrint Archive, Report 2008/283}, year = {2008}, url = {http://eprint.iacr.org/2008/283}, } @misc{cryptoeprint:2008:284, author = {P. Ivanov and J. F. Voloch}, title = {Breaking the Akiyama-Goto cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2008/284}, year = {2008}, url = {http://eprint.iacr.org/2008/284}, } @misc{cryptoeprint:2008:285, author = {Jithra Adikari and Vassil Dimitrov and Laurent Imbert}, title = {Hybrid Binary-Ternary Joint Sparse Form and its Application in Elliptic Curve Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2008/285}, year = {2008}, url = {http://eprint.iacr.org/2008/285}, } @misc{cryptoeprint:2008:286, author = {Daniel R. L. Brown}, title = {One-Up Problem for (EC)DSA}, howpublished = {Cryptology ePrint Archive, Report 2008/286}, year = {2008}, url = {http://eprint.iacr.org/2008/286}, } @misc{cryptoeprint:2008:287, author = {Anuj Gupta and Prasant Gopal and Piyush Bansal and Kannan Srinathan}, title = {Authenticated Byzantine Generals Strike Again}, howpublished = {Cryptology ePrint Archive, Report 2008/287}, year = {2008}, url = {http://eprint.iacr.org/2008/287}, } @misc{cryptoeprint:2008:288, author = {Zhengjun Cao}, title = {How to Launch A Birthday Attack Against DES}, howpublished = {Cryptology ePrint Archive, Report 2008/288}, year = {2008}, url = {http://eprint.iacr.org/2008/288}, } @misc{cryptoeprint:2008:289, author = {Dan Bogdanov and Sven Laur and Jan Willemson}, title = {Sharemind: a framework for fast privacy-preserving computations}, howpublished = {Cryptology ePrint Archive, Report 2008/289}, year = {2008}, url = {http://eprint.iacr.org/2008/289}, } @misc{cryptoeprint:2008:290, author = {Brent Waters}, title = {Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization}, howpublished = {Cryptology ePrint Archive, Report 2008/290}, year = {2008}, url = {http://eprint.iacr.org/2008/290}, } @misc{cryptoeprint:2008:291, author = {Ran Canetti and Dror Eiger and Shafi Goldwasser and Dah-Yoh Lim}, title = {How to Protect Yourself without Perfect Shredding}, howpublished = {Cryptology ePrint Archive, Report 2008/291}, year = {2008}, url = {http://eprint.iacr.org/2008/291}, } @misc{cryptoeprint:2008:292, author = {Sorina Ionica and Antoine Joux}, title = {Another approach to pairing computation in Edwards coordinates}, howpublished = {Cryptology ePrint Archive, Report 2008/292}, year = {2008}, url = {http://eprint.iacr.org/2008/292}, } @misc{cryptoeprint:2008:293, author = {Roberto Di Pietro and Luigi V. Mancini and Claudio Soriente and Angelo Spognardi and Gene Tsudik}, title = {Playing Hide-and-Seek with a Focused Mobile Adversary: Maximizing Data Survival in Unattended Sensor Networks}, howpublished = {Cryptology ePrint Archive, Report 2008/293}, year = {2008}, url = {http://eprint.iacr.org/2008/293}, } @misc{cryptoeprint:2008:294, author = {Atefeh Mashatan and Douglas R. Stinson}, title = {A New Message Recognition Protocol for Ad Hoc Pervasive Networks}, howpublished = {Cryptology ePrint Archive, Report 2008/294}, year = {2008}, url = {http://eprint.iacr.org/2008/294}, } @misc{cryptoeprint:2008:295, author = {Naga Naresh Karuturi and Ragavendran Gopalakrishnan and Rahul Srinivasan and Pandu Rangan Chandrasekaran}, title = {Foundations of Group Key Management – Framework, Security Model and a Generic Construction}, howpublished = {Cryptology ePrint Archive, Report 2008/295}, year = {2008}, url = {http://eprint.iacr.org/2008/295}, } @misc{cryptoeprint:2008:296, author = {Hung-Min Sun, Mu-En Wu, Ron Steinfeld, Jian Guo, and Huaxiong Wang}, title = {Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits}, howpublished = {Cryptology ePrint Archive, Report 2008/296}, year = {2008}, url = {http://eprint.iacr.org/2008/296}, } @misc{cryptoeprint:2008:297, author = {Hongzhen Du and Qiaoyan Wen}, title = {Attack on Kang et al.'s Identity-Based Strong Designated Verifier Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2008/297}, year = {2008}, url = {http://eprint.iacr.org/2008/297}, } @misc{cryptoeprint:2008:298, author = {Ryou Fujita and Kohtaro Tadaki and Shigeo Tsujii}, title = {Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2008/298}, year = {2008}, url = {http://eprint.iacr.org/2008/298}, } @misc{cryptoeprint:2008:299, author = {David J. Mireles Morales}, title = {An analysis of the infrastructure in real function fields}, howpublished = {Cryptology ePrint Archive, Report 2008/299}, year = {2008}, url = {http://eprint.iacr.org/2008/299}, } @misc{cryptoeprint:2008:300, author = {David J. Mireles Morales}, title = {Cheon's algorithm, pairing inversion and the discrete logarithm problem}, howpublished = {Cryptology ePrint Archive, Report 2008/300}, year = {2008}, url = {http://eprint.iacr.org/2008/300}, } @misc{cryptoeprint:2008:301, author = {Yunfeng Li, Dake He, Xianhui Lu}, title = {Accountability of Perfect Concurrent Signature}, howpublished = {Cryptology ePrint Archive, Report 2008/301}, year = {2008}, url = {http://eprint.iacr.org/2008/301}, } @misc{cryptoeprint:2008:302, author = {M. Barbosa, S. Cauchie, T. Brouard and S. Melo de Sousa}, title = {Secure Biometric Authentication With Improved Accuracy}, howpublished = {Cryptology ePrint Archive, Report 2008/302}, year = {2008}, url = {http://eprint.iacr.org/2008/302}, } @misc{cryptoeprint:2008:303, author = {S. Dov Gordon and Carmit Hazay and Jonathan Katz and Yehuda Lindell}, title = {Complete Fairness in Secure Two-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2008/303}, year = {2008}, url = {http://eprint.iacr.org/2008/303}, } @misc{cryptoeprint:2008:304, author = {Eike Kiltz and Krzysztof Pietrzak and Martijn Stam and Moti Yung}, title = {A New Randomness Extraction Paradigm for Hybrid Encryption}, howpublished = {Cryptology ePrint Archive, Report 2008/304}, year = {2008}, url = {http://eprint.iacr.org/2008/304}, } @misc{cryptoeprint:2008:305, author = {Xun Sun and Jian-hua Li and Gong-liang Chen and Shu-tang Yang}, title = {Identity-Based Directed Signature Scheme from Bilinear Pairings}, howpublished = {Cryptology ePrint Archive, Report 2008/305}, year = {2008}, url = {http://eprint.iacr.org/2008/305}, } @misc{cryptoeprint:2008:306, author = {M. B. Paterson and D. R. Stinson and R. Wei}, title = {Combinatorial batch codes}, howpublished = {Cryptology ePrint Archive, Report 2008/306}, year = {2008}, url = {http://eprint.iacr.org/2008/306}, } @misc{cryptoeprint:2008:307, author = {Liming Fang}, title = {Full Security: Fuzzy Identity Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2008/307}, year = {2008}, url = {http://eprint.iacr.org/2008/307}, } @misc{cryptoeprint:2008:308, author = {Rosario Gennaro and Shai Halevi and Hugo Krawczyk and Tal Rabin and Steffen Reidt and Stephen D. Wolthusen}, title = {Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs}, howpublished = {Cryptology ePrint Archive, Report 2008/308}, year = {2008}, url = {http://eprint.iacr.org/2008/308}, } @misc{cryptoeprint:2008:309, author = {Amit Sahai and Brent Waters}, title = {Revocation Systems with Very Small Private Keys}, howpublished = {Cryptology ePrint Archive, Report 2008/309}, year = {2008}, url = {http://eprint.iacr.org/2008/309}, } @misc{cryptoeprint:2008:310, author = {T. van Deursen and S. Radomirovic}, title = {Attacks on RFID Protocols}, howpublished = {Cryptology ePrint Archive, Report 2008/310}, year = {2008}, url = {http://eprint.iacr.org/2008/310}, } @misc{cryptoeprint:2008:311, author = {Orr Dunkelman and Nathan Keller}, title = {Treatment of the Initial Value in Time-Memory-Data Tradeoff Attacks on Stream Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2008/311}, year = {2008}, url = {http://eprint.iacr.org/2008/311}, } @misc{cryptoeprint:2008:312, author = {Xianhui Lu, Xuejia Lai, Dake He}, title = {Improved efficiency of Kiltz07-KEM}, howpublished = {Cryptology ePrint Archive, Report 2008/312}, year = {2008}, url = {http://eprint.iacr.org/2008/312}, } @misc{cryptoeprint:2008:313, author = {Yves Edel and Alexander Pott}, title = {A new almost perfect nonlinear function which is not quadratic}, howpublished = {Cryptology ePrint Archive, Report 2008/313}, year = {2008}, url = {http://eprint.iacr.org/2008/313}, } @misc{cryptoeprint:2008:314, author = {Miroslaw Kutylowski \and Filip Zagorski}, title = {Scratch, Click & Vote: E2E voting over the Internet}, howpublished = {Cryptology ePrint Archive, Report 2008/314}, year = {2008}, url = {http://eprint.iacr.org/2008/314}, } @misc{cryptoeprint:2008:315, author = {Santanu Sarkar and Subhamoy Maitra and Sumanta Sarkar}, title = {RSA Cryptanalysis with Increased Bounds on the Secret Exponent using Less Lattice Dimension}, howpublished = {Cryptology ePrint Archive, Report 2008/315}, year = {2008}, url = {http://eprint.iacr.org/2008/315}, } @misc{cryptoeprint:2008:316, author = {Dan Boneh and David Freeman and Jonathan Katz and Brent Waters}, title = {Signing a Linear Subspace: Signature Schemes for Network Coding}, howpublished = {Cryptology ePrint Archive, Report 2008/316}, year = {2008}, url = {http://eprint.iacr.org/2008/316}, } @misc{cryptoeprint:2008:317, author = {Abdulwahed M. Ismail and Mohamad Rushdan}, title = {Elliptic Curves Scalar Multiplication Combining Multi-base Number Representation with Point halving}, howpublished = {Cryptology ePrint Archive, Report 2008/317}, year = {2008}, url = {http://eprint.iacr.org/2008/317}, } @misc{cryptoeprint:2008:318, author = {Daniel J. Bernstein and Tanja Lange and Christiane Peters}, title = {Attacking and defending the McEliece cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2008/318}, year = {2008}, url = {http://eprint.iacr.org/2008/318}, } @misc{cryptoeprint:2008:319, author = {Ventzislav Nikov and Marc Vauclair}, title = {Yet Another Secure Distance-Bounding Protocol}, howpublished = {Cryptology ePrint Archive, Report 2008/319}, year = {2008}, url = {http://eprint.iacr.org/2008/319}, } @misc{cryptoeprint:2008:320, author = {Danilo Gligoroski and Smile Markovski and Svein J. Knapskog}, title = {Public Key Block Cipher Based on Multivariate Quadratic Quasigroups}, howpublished = {Cryptology ePrint Archive, Report 2008/320}, year = {2008}, url = {http://eprint.iacr.org/2008/320}, } @misc{cryptoeprint:2008:321, author = {Ivan Damg{\aa}rd and Martin Geisler and Mikkel Kr{\o}igaard}, title = {A correction to ``Efficient and Secure Comparison for On-Line Auctions''}, howpublished = {Cryptology ePrint Archive, Report 2008/321}, year = {2008}, url = {http://eprint.iacr.org/2008/321}, } @misc{cryptoeprint:2008:322, author = {Markus Rückert}, title = {Efficient Quantum-immune Blind Signatures}, howpublished = {Cryptology ePrint Archive, Report 2008/322}, year = {2008}, url = {http://eprint.iacr.org/2008/322}, } @misc{cryptoeprint:2008:323, author = {Bin Wang}, title = {A new identity based proxy signature scheme}, howpublished = {Cryptology ePrint Archive, Report 2008/323}, year = {2008}, url = {http://eprint.iacr.org/2008/323}, } @misc{cryptoeprint:2008:324, author = {Varad Kirtane and C.Pandu Rangan}, title = {RSA-TBOS Signcryption with Proxy Re-encryption.}, howpublished = {Cryptology ePrint Archive, Report 2008/324}, year = {2008}, url = {http://eprint.iacr.org/2008/324}, } @misc{cryptoeprint:2008:325, author = {Chunbo Ma and Jun Ao}, title = {Revisit of Group-based Unidirectional Proxy Re-encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2008/325}, year = {2008}, url = {http://eprint.iacr.org/2008/325}, } @misc{cryptoeprint:2008:326, author = {M. B. Paterson and D. R. Stinson}, title = {Two attacks on a sensor network key distribution scheme of Cheng and Agrawal}, howpublished = {Cryptology ePrint Archive, Report 2008/326}, year = {2008}, url = {http://eprint.iacr.org/2008/326}, } @misc{cryptoeprint:2008:327, author = {Le Trieu Phong and Wakaha Ogata}, title = {Blind HIBE and its Applications to Identity-Based Blind Signature and Blind Decryption}, howpublished = {Cryptology ePrint Archive, Report 2008/327}, year = {2008}, url = {http://eprint.iacr.org/2008/327}, } @misc{cryptoeprint:2008:328, author = {Hemanta Maji and Manoj Prabhakaran and Mike Rosulek}, title = {Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance}, howpublished = {Cryptology ePrint Archive, Report 2008/328}, year = {2008}, url = {http://eprint.iacr.org/2008/328}, } @misc{cryptoeprint:2008:329, author = {Whitfield Diffie and George Ledin (translators)}, title = {SMS4 Encryption Algorithm for Wireless Networks}, howpublished = {Cryptology ePrint Archive, Report 2008/329}, year = {2008}, url = {http://eprint.iacr.org/2008/329}, } @misc{cryptoeprint:2008:330, author = {Xianhui Lu, Xuejia Lai, Dake He}, title = {Chosen ciphertext secure public key encryption under DDH assumption with short ciphertext}, howpublished = {Cryptology ePrint Archive, Report 2008/330}, year = {2008}, url = {http://eprint.iacr.org/2008/330}, } @misc{cryptoeprint:2008:331, author = {Manoj Kumar}, title = {A Secure Remote User Authentication Scheme with Smart Cards}, howpublished = {Cryptology ePrint Archive, Report 2008/331}, year = {2008}, url = {http://eprint.iacr.org/2008/331}, } @misc{cryptoeprint:2008:332, author = {Mahalingam Ramkumar}, title = {Efficient Key Distribution Schemes for Large Scale Mobile Computing Applications}, howpublished = {Cryptology ePrint Archive, Report 2008/332}, year = {2008}, url = {http://eprint.iacr.org/2008/332}, } @misc{cryptoeprint:2008:333, author = {Johannes Buchmann and Richard Lindner and Markus Rückert}, title = {Explicit hard instances of the shortest vector problem}, howpublished = {Cryptology ePrint Archive, Report 2008/333}, year = {2008}, url = {http://eprint.iacr.org/2008/333}, } @misc{cryptoeprint:2008:334, author = {Darrel Hankerson and Koray Karabina and Alfred Menezes}, title = {Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields}, howpublished = {Cryptology ePrint Archive, Report 2008/334}, year = {2008}, url = {http://eprint.iacr.org/2008/334}, } @misc{cryptoeprint:2008:335, author = {Boaz Barak and Avi Wigderson}, title = {Public Key Cryptography from Different Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2008/335}, year = {2008}, url = {http://eprint.iacr.org/2008/335}, } @misc{cryptoeprint:2008:336, author = {Anish Mathuria and G. Sriram}, title = {New attacks on ISO key establishment protocols}, howpublished = {Cryptology ePrint Archive, Report 2008/336}, year = {2008}, url = {http://eprint.iacr.org/2008/336}, } @misc{cryptoeprint:2008:337, author = {Wei Zhao and Dingfeng Ye}, title = {Modified Huang-Wang's Convertible Nominative Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2008/337}, year = {2008}, url = {http://eprint.iacr.org/2008/337}, } @misc{cryptoeprint:2008:338, author = {Koji Nuida and Satoshi Fujitsu and Manabu Hagiwara and Takashi Kitagawa and Hajime Watanabe and Kazuto Ogawa and Hideki Imai}, title = {An improvement of discrete Tardos fingerprinting codes}, howpublished = {Cryptology ePrint Archive, Report 2008/338}, year = {2008}, url = {http://eprint.iacr.org/2008/338}, } @misc{cryptoeprint:2008:339, author = {Mohamed El-Hadedy and Danilo Gligoroski and Svein J. Knapskog}, title = {High Performance Implementation of a Public Key Block Cipher - MQQ, for FPGA Platforms}, howpublished = {Cryptology ePrint Archive, Report 2008/339}, year = {2008}, url = {http://eprint.iacr.org/2008/339}, } @misc{cryptoeprint:2008:340, author = {Yasufumi Hashimoto and Kouichi Sakurai}, title = {On construction of signature schemes based on birational permutations over noncommutative rings}, howpublished = {Cryptology ePrint Archive, Report 2008/340}, year = {2008}, url = {http://eprint.iacr.org/2008/340}, } @misc{cryptoeprint:2008:341, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Rahul Srinivasan and Pandu Rangan Chandrasekaran}, title = {Efficient ID-Based Signcryption Schemes for Multiple Receivers}, howpublished = {Cryptology ePrint Archive, Report 2008/341}, year = {2008}, url = {http://eprint.iacr.org/2008/341}, } @misc{cryptoeprint:2008:342, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Neha Jain and Pandu Rangan Chandrasekaran}, title = {Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2008/342}, year = {2008}, url = {http://eprint.iacr.org/2008/342}, } @misc{cryptoeprint:2008:343, author = {Jooyoung Lee and Yongjin Yeom}, title = {Efficient RFID authentication protocols based on pseudorandom sequence generators}, howpublished = {Cryptology ePrint Archive, Report 2008/343}, year = {2008}, url = {http://eprint.iacr.org/2008/343}, } @misc{cryptoeprint:2008:344, author = {Jooyoung Lee and Je Hong Park}, title = {Authenticated Key Exchange Secure under the Computational Diffie-Hellman Assumption}, howpublished = {Cryptology ePrint Archive, Report 2008/344}, year = {2008}, url = {http://eprint.iacr.org/2008/344}, } @misc{cryptoeprint:2008:345, author = {Jooyoung Lee and Choon Sik Park}, title = {An Efficient Authenticated Key Exchange Protocol with a Tight Security Reduction}, howpublished = {Cryptology ePrint Archive, Report 2008/345}, year = {2008}, url = {http://eprint.iacr.org/2008/345}, } @misc{cryptoeprint:2008:346, author = {Ee-Chien Chang and Jia Xu}, title = {Remote Integrity Check with Dishonest Storage Server}, howpublished = {Cryptology ePrint Archive, Report 2008/346}, year = {2008}, url = {http://eprint.iacr.org/2008/346}, } @misc{cryptoeprint:2008:347, author = {Chengfang Fang and Ee-Chien Chang}, title = {Information Leakage in Optimal Anonymized and Diversified Data}, howpublished = {Cryptology ePrint Archive, Report 2008/347}, year = {2008}, url = {http://eprint.iacr.org/2008/347}, } @misc{cryptoeprint:2008:348, author = {Jovan Golic and Guglielmo Morgari}, title = {Iterative Probabilistic Reconstruction of RC4 Internal States}, howpublished = {Cryptology ePrint Archive, Report 2008/348}, year = {2008}, url = {http://eprint.iacr.org/2008/348}, } @misc{cryptoeprint:2008:349, author = {Andrey Bogdanov and Thomas Eisenbarth and Andy Rupp and Christopher Wolf}, title = {Time-Area Optimized Public-Key Engines: MQ-Cryptosystems as Replacement for Elliptic Curves?}, howpublished = {Cryptology ePrint Archive, Report 2008/349}, year = {2008}, url = {http://eprint.iacr.org/2008/349}, } @misc{cryptoeprint:2008:350, author = {Yiyuan Luo, Xuejia Lai}, title = {Higher Order Differential Cryptanalysis of Multivariate Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2008/350}, year = {2008}, url = {http://eprint.iacr.org/2008/350}, } @misc{cryptoeprint:2008:351, author = {Vanesa Daza and Javier Herranz and German Saez}, title = {Flaws in Some Efficient Self-Healing Key Distribution Schemes with Revocation}, howpublished = {Cryptology ePrint Archive, Report 2008/351}, year = {2008}, url = {http://eprint.iacr.org/2008/351}, } @misc{cryptoeprint:2008:352, author = {Alexandra Boldyreva and Serge Fehr and Adam O'Neill}, title = {On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2008/352}, year = {2008}, url = {http://eprint.iacr.org/2008/352}, } @misc{cryptoeprint:2008:353, author = {Prasanth Kumar Thandra and S.A.V. Satya Murty and R Balasubramanian}, title = {Weaknesses in HENKOS Stream Cipher}, howpublished = {Cryptology ePrint Archive, Report 2008/353}, year = {2008}, url = {http://eprint.iacr.org/2008/353}, } @misc{cryptoeprint:2008:354, author = {Xu an Wang }, title = {On DDos Attack against Proxy in Re-encryption and Re-signature}, howpublished = {Cryptology ePrint Archive, Report 2008/354}, year = {2008}, url = {http://eprint.iacr.org/2008/354}, } @misc{cryptoeprint:2008:355, author = {Vadym Fedyukovych}, title = {An argument for rank metric}, howpublished = {Cryptology ePrint Archive, Report 2008/355}, year = {2008}, url = {http://eprint.iacr.org/2008/355}, } @misc{cryptoeprint:2008:356, author = {Saied Hosseini Khayat}, title = {Using Commutative Encryption to Share a Secret}, howpublished = {Cryptology ePrint Archive, Report 2008/356}, year = {2008}, url = {http://eprint.iacr.org/2008/356}, } @misc{cryptoeprint:2008:357, author = {Vadym Fedyukovych and Vitaliy Sharapov}, title = {A protocol for K-multiple substring matching}, howpublished = {Cryptology ePrint Archive, Report 2008/357}, year = {2008}, url = {http://eprint.iacr.org/2008/357}, } @misc{cryptoeprint:2008:358, author = {Moni Naor and Gil Segev and Udi Wieder}, title = {History-Independent Cuckoo Hashing}, howpublished = {Cryptology ePrint Archive, Report 2008/358}, year = {2008}, url = {http://eprint.iacr.org/2008/358}, } @misc{cryptoeprint:2008:359, author = {Vadym Fedyukovych}, title = {Argument of knowledge of a bounded error}, howpublished = {Cryptology ePrint Archive, Report 2008/359}, year = {2008}, url = {http://eprint.iacr.org/2008/359}, } @misc{cryptoeprint:2008:360, author = {Saurabh Dutta and Jyotsna Kumar mandal}, title = {An Approach to ensure Information Security through 252-Bit Integrated Encryption System (IES)}, howpublished = {Cryptology ePrint Archive, Report 2008/360}, year = {2008}, url = {http://eprint.iacr.org/2008/360}, } @misc{cryptoeprint:2008:361, author = {William Whyte (editor) and Nick Howgrave-Graham and Jeff Hoffstein and Jill PIpher and Joseph H. Silverman and Phil Hirschhorn}, title = {IEEE P1363.1 Draft 10: Draft Standard for Public Key Cryptographic Techniques Based on Hard Problems over Lattices.}, howpublished = {Cryptology ePrint Archive, Report 2008/361}, year = {2008}, url = {http://eprint.iacr.org/2008/361}, } @misc{cryptoeprint:2008:362, author = {Jin Hong}, title = {The Cost of False Alarms in Hellman and Rainbow Tradeoffs}, howpublished = {Cryptology ePrint Archive, Report 2008/362}, year = {2008}, url = {http://eprint.iacr.org/2008/362}, } @misc{cryptoeprint:2008:363, author = {Vadym Fedyukovych}, title = {An argument for Hamiltonicity}, howpublished = {Cryptology ePrint Archive, Report 2008/363}, year = {2008}, url = {http://eprint.iacr.org/2008/363}, } @misc{cryptoeprint:2008:364, author = {Ilya O Levin}, title = {Zcipher Algorithm Specification}, howpublished = {Cryptology ePrint Archive, Report 2008/364}, year = {2008}, url = {http://eprint.iacr.org/2008/364}, } @misc{cryptoeprint:2008:365, author = {Luke O'Connor}, title = {Entropy Bounds for Traffic Confirmation}, howpublished = {Cryptology ePrint Archive, Report 2008/365}, year = {2008}, url = {http://eprint.iacr.org/2008/365}, } @misc{cryptoeprint:2008:366, author = {Than Quang Khoat and Nguyen Hong Tan}, title = {Unique Shortest Vector Problem for max norm is NP-hard}, howpublished = {Cryptology ePrint Archive, Report 2008/366}, year = {2008}, url = {http://eprint.iacr.org/2008/366}, } @misc{cryptoeprint:2008:367, author = {Peeter Laud and Long Ngo}, title = {{Threshold Homomorphic Encryption in the Universally Composable Cryptographic Library}, howpublished = {Cryptology ePrint Archive, Report 2008/367}, year = {2008}, url = {http://eprint.iacr.org/2008/367}, } @misc{cryptoeprint:2008:368, author = {Varad Kirtane and C. Pandu Rangan}, title = {Side Channel Attack Resistant Implementation of Multi-Power RSA using Hensel Lifting}, howpublished = {Cryptology ePrint Archive, Report 2008/368}, year = {2008}, url = {http://eprint.iacr.org/2008/368}, } @misc{cryptoeprint:2008:369, author = {Shahram Khazaei and Willi Meier}, title = {New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2008/369}, year = {2008}, url = {http://eprint.iacr.org/2008/369}, } @misc{cryptoeprint:2008:370, author = {Sorin Iftene and Stefan Ciobaca and Manuela Grindei}, title = {Compartmented Threshold RSA Based on the Chinese Remainder Theorem}, howpublished = {Cryptology ePrint Archive, Report 2008/370}, year = {2008}, url = {http://eprint.iacr.org/2008/370}, } @misc{cryptoeprint:2008:371, author = {Kannan Srinathan and Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, title = {Unconditionally Reliable Message Transmission in Directed Hypergraphs}, howpublished = {Cryptology ePrint Archive, Report 2008/371}, year = {2008}, url = {http://eprint.iacr.org/2008/371}, } @misc{cryptoeprint:2008:372, author = {Shaojing Fu, Chao Li, Longjiang Qu, Ping Li}, title = {Enumeration of Balanced Symmetric Functions over GF(p)}, howpublished = {Cryptology ePrint Archive, Report 2008/372}, year = {2008}, url = {http://eprint.iacr.org/2008/372}, } @misc{cryptoeprint:2008:373, author = {Fagen Li and Masaaki Shirase and Tsuyoshi Takagi }, title = {Analysis and Improvement of Authenticatable Ring Signcryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2008/373}, year = {2008}, url = {http://eprint.iacr.org/2008/373}, } @misc{cryptoeprint:2008:374, author = {Masayuki Abe and Eike Kiltz and Tatsuaki Okamoto}, title = {Chosen Ciphertext Security with Optimal Ciphertext Overhead}, howpublished = {Cryptology ePrint Archive, Report 2008/374}, year = {2008}, url = {http://eprint.iacr.org/2008/374}, } @misc{cryptoeprint:2008:375, author = {Jan Camenisch and Nishanth Chandran and Victor Shoup}, title = {A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks}, howpublished = {Cryptology ePrint Archive, Report 2008/375}, year = {2008}, url = {http://eprint.iacr.org/2008/375}, } @misc{cryptoeprint:2008:376, author = {Cas J.F. Cremers}, title = {Session-state Reveal is stronger than Ephemeral Key Reveal: Breaking the NAXOS key exchange protocol}, howpublished = {Cryptology ePrint Archive, Report 2008/376}, year = {2008}, url = {http://eprint.iacr.org/2008/376}, } @misc{cryptoeprint:2008:377, author = {Michael Vielhaber}, title = {TRIVIUM's output partially autocancels}, howpublished = {Cryptology ePrint Archive, Report 2008/377}, year = {2008}, url = {http://eprint.iacr.org/2008/377}, } @misc{cryptoeprint:2008:378, author = {Carlos Aguilar Melchor and Philippe Gaborit and Javier Herranz}, title = {Additive Homomorphic Encryption with t-Operand Multiplications}, howpublished = {Cryptology ePrint Archive, Report 2008/378}, year = {2008}, url = {http://eprint.iacr.org/2008/378}, } @misc{cryptoeprint:2008:379, author = {Mihir Bellare and Todor Ristov}, title = {Hash Functions from Sigma Protocols and Improvements to VSH}, howpublished = {Cryptology ePrint Archive, Report 2008/379}, year = {2008}, url = {http://eprint.iacr.org/2008/379}, } @misc{cryptoeprint:2008:380, author = {Andreas Noack and Stefan Spitz}, title = {Dynamic Threshold Cryptosystem without Group Manager}, howpublished = {Cryptology ePrint Archive, Report 2008/380}, year = {2008}, url = {http://eprint.iacr.org/2008/380}, } @misc{cryptoeprint:2008:381, author = {Daniel J. Bernstein and Peter Schwabe}, title = {New AES software speed records}, howpublished = {Cryptology ePrint Archive, Report 2008/381}, year = {2008}, url = {http://eprint.iacr.org/2008/381}, } @misc{cryptoeprint:2008:382, author = {Mark Manulis and Damien Leroy and Francois Koeune and Olivier Bonaventure and Jean-Jacques Quisquater}, title = {Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home}, howpublished = {Cryptology ePrint Archive, Report 2008/382}, year = {2008}, url = {http://eprint.iacr.org/2008/382}, } @misc{cryptoeprint:2008:383, author = {Craig Gentry and Shai Halevi}, title = {Hierarchical Identity Based Encryption with Polynomially Many Levels}, howpublished = {Cryptology ePrint Archive, Report 2008/383}, year = {2008}, url = {http://eprint.iacr.org/2008/383}, } @misc{cryptoeprint:2008:384, author = {Pascal Junod and Alexandre Karlov and Arjen K. Lenstra}, title = {Improving the Boneh-Franklin Traitor Tracing Scheme}, howpublished = {Cryptology ePrint Archive, Report 2008/384}, year = {2008}, url = {http://eprint.iacr.org/2008/384}, } @misc{cryptoeprint:2008:385, author = {Itai Dinur and Adi Shamir}, title = {Cube Attacks on Tweakable Black Box Polynomials}, howpublished = {Cryptology ePrint Archive, Report 2008/385}, year = {2008}, url = {http://eprint.iacr.org/2008/385}, } @misc{cryptoeprint:2008:386, author = {Michael Lifliand}, title = {Shared Key Encryption by the State Machine with Two-Dimensional Random Look-up Table}, howpublished = {Cryptology ePrint Archive, Report 2008/386}, year = {2008}, url = {http://eprint.iacr.org/2008/386}, } @misc{cryptoeprint:2008:387, author = {Xu an Wang and Xiaoyuan Yang }, title = {On the Insecurity of Proxy Re-encryption from IBE to IBE in P1363.3/D1}, howpublished = {Cryptology ePrint Archive, Report 2008/387}, year = {2008}, url = {http://eprint.iacr.org/2008/387}, } @misc{cryptoeprint:2008:388, author = {Christophe Doche and David R. Kohel and Francesco Sica}, title = {Double-Base Number System for Multi-Scalar Multiplications}, howpublished = {Cryptology ePrint Archive, Report 2008/388}, year = {2008}, url = {http://eprint.iacr.org/2008/388}, } @misc{cryptoeprint:2008:389, author = {Murat Ak and Kamer Kaya and Ali Aydin Selcuk}, title = {Optimal Subset-Difference Broadcast Encryption with Free Riders}, howpublished = {Cryptology ePrint Archive, Report 2008/389}, year = {2008}, url = {http://eprint.iacr.org/2008/389}, } @misc{cryptoeprint:2008:390, author = {Ann Hibner Koblitz and Neal Koblitz and Alfred Menezes}, title = {Elliptic Curve Cryptography: The Serpentine Course of a Paradigm Shift}, howpublished = {Cryptology ePrint Archive, Report 2008/390}, year = {2008}, url = {http://eprint.iacr.org/2008/390}, } @misc{cryptoeprint:2008:391, author = {Tao Xie FanBao Liu DengGuo Feng}, title = {Could The 1-MSB Input Difference Be The Fastest Collision Attack For MD5 ?}, howpublished = {Cryptology ePrint Archive, Report 2008/391}, year = {2008}, url = {http://eprint.iacr.org/2008/391}, } @misc{cryptoeprint:2008:392, author = {TAIN Yuan and WANG Ying}, title = {A UC/GUC-Secure Protocol for Set-Intersection Computation}, howpublished = {Cryptology ePrint Archive, Report 2008/392}, year = {2008}, url = {http://eprint.iacr.org/2008/392}, } @misc{cryptoeprint:2008:393, author = {Pranav K. Vasishta and Prasant Gopal and Anuj Gupta and Piyush Bansal and Kannan Srinathan}, title = {Topology Knowledge Versus Fault Tolerance: The Case of Probabilistic Communication Or: How Far Must You See to Hear Reliably?}, howpublished = {Cryptology ePrint Archive, Report 2008/393}, year = {2008}, url = {http://eprint.iacr.org/2008/393}, } @misc{cryptoeprint:2008:394, author = {Jin Li and Kwangjo Kim}, title = {Attribute-Based Ring Signatures}, howpublished = {Cryptology ePrint Archive, Report 2008/394}, year = {2008}, url = {http://eprint.iacr.org/2008/394}, } @misc{cryptoeprint:2008:395, author = {Jiali Choy and Khoongming Khoo}, title = {New Applications of Differential Bounds of the SDS Structure}, howpublished = {Cryptology ePrint Archive, Report 2008/395}, year = {2008}, url = {http://eprint.iacr.org/2008/395}, } @misc{cryptoeprint:2008:396, author = {Subhamoy Maitra and Goutam Paul}, title = {Analysis of RC4 and Proposal of Additional Layers for Better Security Margin}, howpublished = {Cryptology ePrint Archive, Report 2008/396}, year = {2008}, url = {http://eprint.iacr.org/2008/396}, } @misc{cryptoeprint:2008:397, author = {Uttam Kr. Mondal , Satyendra Nath Mandal and J. PalChoudhury}, title = {A Framework for the Development Playfair Cipher Considering Probability of Occurrence of Characters in English Literature}, howpublished = {Cryptology ePrint Archive, Report 2008/397}, year = {2008}, url = {http://eprint.iacr.org/2008/397}, } @misc{cryptoeprint:2008:398, author = {Takakazu Satoh}, title = {Generating genus two hyperelliptic curves over large characteristic finite fields}, howpublished = {Cryptology ePrint Archive, Report 2008/398}, year = {2008}, url = {http://eprint.iacr.org/2008/398}, } @misc{cryptoeprint:2008:399, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, title = {Round Efficient Unconditionally Secure Multiparty Computation Protocol}, howpublished = {Cryptology ePrint Archive, Report 2008/399}, year = {2008}, url = {http://eprint.iacr.org/2008/399}, } @misc{cryptoeprint:2008:400, author = {Yalin Chen and Hung-Min Sun and Chun-Hui Huang and Jue-Sam Chou}, title = {Comments on two password based protocols}, howpublished = {Cryptology ePrint Archive, Report 2008/400}, year = {2008}, url = {http://eprint.iacr.org/2008/400}, } @misc{cryptoeprint:2008:401, author = {Mridul Nandi}, title = {Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC }, howpublished = {Cryptology ePrint Archive, Report 2008/401}, year = {2008}, url = {http://eprint.iacr.org/2008/401}, } @misc{cryptoeprint:2008:402, author = {Jean-Charles Faugère and Ludovic Perret}, title = {Algebraic Cryptanalysis of Curry and Flurry using Correlated Messages}, howpublished = {Cryptology ePrint Archive, Report 2008/402}, year = {2008}, url = {http://eprint.iacr.org/2008/402}, } @misc{cryptoeprint:2008:403, author = {Markus Dichtl and Bernd Meyer and Hermann Seuschek }, title = {SPICE Simulation of a "Provably Secure" True Random Number Generator}, howpublished = {Cryptology ePrint Archive, Report 2008/403}, year = {2008}, url = {http://eprint.iacr.org/2008/403}, } @misc{cryptoeprint:2008:404, author = {Emanuele Cesena}, title = {Pairing with Supersingular Trace Zero Varieties Revisited}, howpublished = {Cryptology ePrint Archive, Report 2008/404}, year = {2008}, url = {http://eprint.iacr.org/2008/404}, } @misc{cryptoeprint:2008:405, author = {Deike Priemuth-Schmid and Alex Biryukov}, title = {Slid Pairs in Salsa20 and Trivium}, howpublished = {Cryptology ePrint Archive, Report 2008/405}, year = {2008}, url = {http://eprint.iacr.org/2008/405}, } @misc{cryptoeprint:2008:406, author = {Gildas Avoine and Aslan Tchamkerten}, title = {An asymptotically optimal RFID protocol against relay attacks}, howpublished = {Cryptology ePrint Archive, Report 2008/406}, year = {2008}, url = {http://eprint.iacr.org/2008/406}, } @misc{cryptoeprint:2008:407, author = {Donghoon Chang and Jaechul Sung and Seokhie Hong and Sangjin Lee}, title = {Indifferentiable Security Analysis of choppfMD, chopMD, a chopMDP, chopWPH, chopNI, chopEMD, chopCS, chopESh, a pfCM-chopMD Hash Domain Extensions}, howpublished = {Cryptology ePrint Archive, Report 2008/407}, year = {2008}, url = {http://eprint.iacr.org/2008/407}, } @misc{cryptoeprint:2008:408, author = {Christopher Billings}, title = {The Enigmatique Toolkit}, howpublished = {Cryptology ePrint Archive, Report 2008/408}, year = {2008}, url = {http://eprint.iacr.org/2008/408}, } @misc{cryptoeprint:2008:409, author = {Jun Kurihara and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka}, title = {A New $(k,n)$-Threshold Secret Sharing Scheme and Its Extension}, howpublished = {Cryptology ePrint Archive, Report 2008/409}, year = {2008}, url = {http://eprint.iacr.org/2008/409}, } @misc{cryptoeprint:2008:410, author = {Xu an Wang and Xiaoyuan Yang }, title = {On the Role of KGC for Proxy Re-encryption in Identity Based Setting}, howpublished = {Cryptology ePrint Archive, Report 2008/410}, year = {2008}, url = {http://eprint.iacr.org/2008/410}, } @misc{cryptoeprint:2008:411, author = {Bo Zhu, Yanfei Zheng, Yaowei Zhou and Kefei Chen}, title = {Cryptanalysis of LU Decomposition-based Key Pre-distribution Scheme for Wireless Sensor Networks}, howpublished = {Cryptology ePrint Archive, Report 2008/411}, year = {2008}, url = {http://eprint.iacr.org/2008/411}, } @misc{cryptoeprint:2008:412, author = {Keith M. Martin and Maura B. Paterson and Douglas R. Stinson}, title = {Key Predistribution for Homogeneous Wireless Sensor Networks with Group Deployment of Nodes}, howpublished = {Cryptology ePrint Archive, Report 2008/412}, year = {2008}, url = {http://eprint.iacr.org/2008/412}, } @misc{cryptoeprint:2008:413, author = {Vladimir Kolesnikov and Charles Rackoff}, title = {Password Mistyping in Two-Factor-Authenticated Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2008/413}, year = {2008}, url = {http://eprint.iacr.org/2008/413}, } @misc{cryptoeprint:2008:414, author = {Matthias Fitzi and Jesper Buus Nielsen}, title = {On the Number of Synchronous Rounds Required for Byzantine Agreement}, howpublished = {Cryptology ePrint Archive, Report 2008/414}, year = {2008}, url = {http://eprint.iacr.org/2008/414}, } @misc{cryptoeprint:2008:415, author = {Ivan Damgård, Martin Geisler, Mikkel Krøigaard, Jesper Buus Nielsen}, title = {Asynchronous Multiparty Computation: Theory and Implementation}, howpublished = {Cryptology ePrint Archive, Report 2008/415}, year = {2008}, url = {http://eprint.iacr.org/2008/415}, } @misc{cryptoeprint:2008:416, author = {Zuzana Beerliova-Trubiniova, Martin Hirt, Jesper Buus Nielsen}, title = {Almost-Asynchronous MPC with Faulty Minority}, howpublished = {Cryptology ePrint Archive, Report 2008/416}, year = {2008}, url = {http://eprint.iacr.org/2008/416}, } @misc{cryptoeprint:2008:417, author = {N.Benger, M.Charlemagne}, title = {Minimal Embedding Field of Supersingular Curves}, howpublished = {Cryptology ePrint Archive, Report 2008/417}, year = {2008}, url = {http://eprint.iacr.org/2008/417}, } @misc{cryptoeprint:2008:418, author = {Peter Bro Miltersen and Jesper Buus Nielsen and Nikos Triandopoulos}, title = {Privacy-Enhancing First-Price Auctions Using Rational Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2008/418}, year = {2008}, url = {http://eprint.iacr.org/2008/418}, } @misc{cryptoeprint:2008:419, author = {Liqun Chen and Chris J. Mitchell}, title = {Parsing ambiguities in authentication and key establishment protocols}, howpublished = {Cryptology ePrint Archive, Report 2008/419}, year = {2008}, url = {http://eprint.iacr.org/2008/419}, } @misc{cryptoeprint:2008:420, author = {J\"urg Wullschleger}, title = {Oblivious Transfer from Weak Noisy Channels}, howpublished = {Cryptology ePrint Archive, Report 2008/420}, year = {2008}, url = {http://eprint.iacr.org/2008/420}, } @misc{cryptoeprint:2008:421, author = {Kaoru Kurosawa and Kazuhiro Suzuki}, title = {Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme}, howpublished = {Cryptology ePrint Archive, Report 2008/421}, year = {2008}, url = {http://eprint.iacr.org/2008/421}, } @misc{cryptoeprint:2008:422, author = {Frederik Armknecht and Ahmad-Reza Sadeghi}, title = {A New Approach for Algebraically Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2008/422}, year = {2008}, url = {http://eprint.iacr.org/2008/422}, } @misc{cryptoeprint:2008:423, author = {Dennis Hofheinz and Enav Weinreb}, title = {Searchable encryption with decryption in the standard model}, howpublished = {Cryptology ePrint Archive, Report 2008/423}, year = {2008}, url = {http://eprint.iacr.org/2008/423}, } @misc{cryptoeprint:2008:424, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, title = {Efficient Asynchronous Verifiable Secret Sharing and Byzantine Agreement with Optimal Resilience}, howpublished = {Cryptology ePrint Archive, Report 2008/424}, year = {2008}, url = {http://eprint.iacr.org/2008/424}, } @misc{cryptoeprint:2008:425, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, title = {Efficient Asynchronous Multiparty Computation with Optimal Resilience}, howpublished = {Cryptology ePrint Archive, Report 2008/425}, year = {2008}, url = {http://eprint.iacr.org/2008/425}, } @misc{cryptoeprint:2008:426, author = {Deepmala Sharma and Sugata Gangopadhyay}, title = {On Kasami Bent Functions}, howpublished = {Cryptology ePrint Archive, Report 2008/426}, year = {2008}, url = {http://eprint.iacr.org/2008/426}, } @misc{cryptoeprint:2008:427, author = {Jesper Buus Nielsen and Claudio Orlandi}, title = {LEGO for Two Party Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2008/427}, year = {2008}, url = {http://eprint.iacr.org/2008/427}, } @misc{cryptoeprint:2008:428, author = {Mira Belenkiy and Jan Camenisch and Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Hovav Shacham}, title = {Delegatable Anonymous Credentials}, howpublished = {Cryptology ePrint Archive, Report 2008/428}, year = {2008}, url = {http://eprint.iacr.org/2008/428}, } @misc{cryptoeprint:2008:429, author = {Nishanth Chandran and Rafail Ostrovsky and William E. Skeith III}, title = {Public-Key Encryption with Efficient Amortized Updates}, howpublished = {Cryptology ePrint Archive, Report 2008/429}, year = {2008}, url = {http://eprint.iacr.org/2008/429}, } @misc{cryptoeprint:2008:430, author = {Joshua D. Guttman}, title = {Cryptographic Protocol Composition via the Authentication Tests}, howpublished = {Cryptology ePrint Archive, Report 2008/430}, year = {2008}, url = {http://eprint.iacr.org/2008/430}, } @misc{cryptoeprint:2008:431, author = {Alptekin Kupcu and Anna Lysyanskaya}, title = {Usable Optimistic Fair Exchange}, howpublished = {Cryptology ePrint Archive, Report 2008/431}, year = {2008}, url = {http://eprint.iacr.org/2008/431}, } @misc{cryptoeprint:2008:432, author = {Chris Erway and Alptekin Kupcu and Charalampos Papamanthou and Roberto Tamassia}, title = {Dynamic Provable Data Possession}, howpublished = {Cryptology ePrint Archive, Report 2008/432}, year = {2008}, url = {http://eprint.iacr.org/2008/432}, } @misc{cryptoeprint:2008:433, author = {Guillermo Morales-Luna}, title = {On differences of quadratic residues}, howpublished = {Cryptology ePrint Archive, Report 2008/433}, year = {2008}, url = {http://eprint.iacr.org/2008/433}, } @misc{cryptoeprint:2008:434, author = {Yu Zhang}, title = {The computational SLR: a logic for reasoning about computational indistinguishability}, howpublished = {Cryptology ePrint Archive, Report 2008/434}, year = {2008}, url = {http://eprint.iacr.org/2008/434}, } @misc{cryptoeprint:2008:435, author = {Stanislav Bulygin and Michael Brickenstein}, title = {Obtaining and solving systems of equations in key variables only for the small variants of AES}, howpublished = {Cryptology ePrint Archive, Report 2008/435}, year = {2008}, url = {http://eprint.iacr.org/2008/435}, } @misc{cryptoeprint:2008:436, author = {Zhibin Zhou and Dijiang Huang}, title = {BGKM: An Efficient Secure Broadcasting Group Key Management Scheme}, howpublished = {Cryptology ePrint Archive, Report 2008/436}, year = {2008}, url = {http://eprint.iacr.org/2008/436}, } @misc{cryptoeprint:2008:437, author = {David Naccache and Igor Shparlinski}, title = {Divisibility, Smoothness and Cryptographic Applications}, howpublished = {Cryptology ePrint Archive, Report 2008/437}, year = {2008}, url = {http://eprint.iacr.org/2008/437}, } @misc{cryptoeprint:2008:438, author = {Michael Gorski and Stefan Lucks}, title = {New Related-Key Boomerang Attacks on AES}, howpublished = {Cryptology ePrint Archive, Report 2008/438}, year = {2008}, url = {http://eprint.iacr.org/2008/438}, } @misc{cryptoeprint:2008:439, author = {Alexander Rostovtsev}, title = {Linear equivalence between elliptic curves in Weierstrass and Hesse form}, howpublished = {Cryptology ePrint Archive, Report 2008/439}, year = {2008}, url = {http://eprint.iacr.org/2008/439}, } @misc{cryptoeprint:2008:440, author = {Michel Abdalla and Mihir Bellare and Chanathip Namprempre and Gregory Neven}, title = {Robust Public-Key and Identity-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2008/440}, year = {2008}, url = {http://eprint.iacr.org/2008/440}, } @misc{cryptoeprint:2008:441, author = {Gaetan Leurent and Phong Q. Nguyen}, title = {How Risky is the Random-Oracle Model?}, howpublished = {Cryptology ePrint Archive, Report 2008/441}, year = {2008}, url = {http://eprint.iacr.org/2008/441}, } @misc{cryptoeprint:2008:442, author = {Anton Kargl and Stefan Pyka and Hermann Seuschek}, title = {Fast Arithmetic on ATmega128 for Elliptic Curve Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2008/442}, year = {2008}, url = {http://eprint.iacr.org/2008/442}, } @misc{cryptoeprint:2008:443, author = {Enes Pasalic}, title = {Transforming chosen IV attack into a key differential attack: how to break TRIVIUM and similar designs}, howpublished = {Cryptology ePrint Archive, Report 2008/443}, year = {2008}, url = {http://eprint.iacr.org/2008/443}, } @misc{cryptoeprint:2008:444, author = {Rachel Shipsey and Christine Swart}, title = {Elliptic divisibility sequences and the elliptic curve discrete logarithm problem}, howpublished = {Cryptology ePrint Archive, Report 2008/444}, year = {2008}, url = {http://eprint.iacr.org/2008/444}, } @misc{cryptoeprint:2008:445, author = {Thomas Chardin and Raphaël Marinier}, title = {Cryptanalysis of the Improved Cellular Message Encryption Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2008/445}, year = {2008}, url = {http://eprint.iacr.org/2008/445}, } @misc{cryptoeprint:2008:446, author = {Mike Burmester and Reihaneh Safavi-Naini and Gelareh Taban}, title = {Secure Random Key Pre-Distribution Against Semi-Honest Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2008/446}, year = {2008}, url = {http://eprint.iacr.org/2008/446}, } @misc{cryptoeprint:2008:447, author = {Chong-zhi Gao and Baodian Wei and Chunming Tang}, title = {Divisible On-line/Off-line Signatures}, howpublished = {Cryptology ePrint Archive, Report 2008/447}, year = {2008}, url = {http://eprint.iacr.org/2008/447}, } @misc{cryptoeprint:2008:448, author = {Yair Amir and Paul Bunn and Rafail Ostrovsky}, title = {Authenticated Adversarial Routing}, howpublished = {Cryptology ePrint Archive, Report 2008/448}, year = {2008}, url = {http://eprint.iacr.org/2008/448}, } @misc{cryptoeprint:2008:449, author = {Joonsang Baek and Willy Susilo and Joseph K. Liu and Jianying Zhou}, title = {A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack}, howpublished = {Cryptology ePrint Archive, Report 2008/449}, year = {2008}, url = {http://eprint.iacr.org/2008/449}, } @misc{cryptoeprint:2008:450, author = {Yongdong WU and Robert H. Deng}, title = {On the Security of Fully Collusion Resistant Traitor Tracing Schemes}, howpublished = {Cryptology ePrint Archive, Report 2008/450}, year = {2008}, url = {http://eprint.iacr.org/2008/450}, } @misc{cryptoeprint:2008:451, author = {Mohamed Saied Emam Mohamed and Jintai Ding and Johannes Buchmann}, title = {Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL}, howpublished = {Cryptology ePrint Archive, Report 2008/451}, year = {2008}, url = {http://eprint.iacr.org/2008/451}, } @misc{cryptoeprint:2008:452, author = {Rui Xue and Dengguo Feng}, title = {Injective Trapdoor Functions are Necessary and Sufficient for CCA2 Secure Public-Key Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2008/452}, year = {2008}, url = {http://eprint.iacr.org/2008/452}, } @misc{cryptoeprint:2008:453, author = {Ahmad-Reza Sadeghi and Thomas Schneider}, title = {Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification}, howpublished = {Cryptology ePrint Archive, Report 2008/453}, year = {2008}, url = {http://eprint.iacr.org/2008/453}, } @misc{cryptoeprint:2008:454, author = {Hemanta Maji and Manoj Prabhakaran and Mike Rosulek}, title = {Complexity of Multiparty Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation}, howpublished = {Cryptology ePrint Archive, Report 2008/454}, year = {2008}, url = {http://eprint.iacr.org/2008/454}, } @misc{cryptoeprint:2008:455, author = {Igor Semaev}, title = {New hash function designs}, howpublished = {Cryptology ePrint Archive, Report 2008/455}, year = {2008}, url = {http://eprint.iacr.org/2008/455}, } @misc{cryptoeprint:2008:456, author = {Dustin Moody}, title = {The Diffie-Hellman problem and generalization of Verheul's theorem}, howpublished = {Cryptology ePrint Archive, Report 2008/456}, year = {2008}, url = {http://eprint.iacr.org/2008/456}, } @misc{cryptoeprint:2008:457, author = {Rafael Dowsley and Jeroen van de Graaf and Jörn Müller-Quade and Anderson C. A. Nascimento}, title = {On the Composability of Statistically Secure Bit Commitments}, howpublished = {Cryptology ePrint Archive, Report 2008/457}, year = {2008}, url = {http://eprint.iacr.org/2008/457}, } @misc{cryptoeprint:2008:458, author = {S. Dov Gordon and Jonathan Katz}, title = {Complete Fairness in Multi-Party Computation Without an Honest Majority}, howpublished = {Cryptology ePrint Archive, Report 2008/458}, year = {2008}, url = {http://eprint.iacr.org/2008/458}, } @misc{cryptoeprint:2008:459, author = {Andrej Dujella}, title = {A variant of Wiener's attack on RSA}, howpublished = {Cryptology ePrint Archive, Report 2008/459}, year = {2008}, url = {http://eprint.iacr.org/2008/459}, } @misc{cryptoeprint:2008:460, author = {Donghoon Chang and Seokhie Hong and Jaechul Sung and Sangjin Lee}, title = {Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications based on the Extension}, howpublished = {Cryptology ePrint Archive, Report 2008/460}, year = {2008}, url = {http://eprint.iacr.org/2008/460}, } @misc{cryptoeprint:2008:461, author = {Arpita Patra and Ashish Choudhary and Kannan Srinathan and C. Pandu Rangan}, title = {On Communication Complexity of Perfectly Reliable and Secure Communication in Directed Networks}, howpublished = {Cryptology ePrint Archive, Report 2008/461}, year = {2008}, url = {http://eprint.iacr.org/2008/461}, } @misc{cryptoeprint:2008:462, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, title = {Unconditionally Secure Multiparty Set Intersection Re-Visited}, howpublished = {Cryptology ePrint Archive, Report 2008/462}, year = {2008}, url = {http://eprint.iacr.org/2008/462}, } @misc{cryptoeprint:2008:463, author = {Giuseppe Ateniese and Karyn Benson and Susan Hohenberger}, title = {Key-Private Proxy Re-Encryption}, howpublished = {Cryptology ePrint Archive, Report 2008/463}, year = {2008}, url = {http://eprint.iacr.org/2008/463}, } @misc{cryptoeprint:2008:464, author = {Michael Kounavis and Shay Gueron}, title = {Vortex: A New Family of One Way Hash Functions based on Rijndael Rounds and Carry-less Multiplication}, howpublished = {Cryptology ePrint Archive, Report 2008/464}, year = {2008}, url = {http://eprint.iacr.org/2008/464}, } @misc{cryptoeprint:2008:465, author = {Yuval Ishai and Manoj Prabhakaran and Amit Sahai}, title = {Secure Arithmetic Computation with No Honest Majority}, howpublished = {Cryptology ePrint Archive, Report 2008/465}, year = {2008}, url = {http://eprint.iacr.org/2008/465}, } @misc{cryptoeprint:2008:466, author = {Maria Isabel Gonzalez Vasco and Rainer Steinwandt}, title = {Combined (identity-based) public key schemes}, howpublished = {Cryptology ePrint Archive, Report 2008/466}, year = {2008}, url = {http://eprint.iacr.org/2008/466}, } @misc{cryptoeprint:2008:467, author = {Dmitry Khovratovich and Ivica Nikolic}, title = {Cryptanalysis of EnRUPT}, howpublished = {Cryptology ePrint Archive, Report 2008/467}, year = {2008}, url = {http://eprint.iacr.org/2008/467}, } @misc{cryptoeprint:2008:468, author = {Rafael Dowsley and Jörn Müller-Quade and Anderson C. A. Nascimento}, title = {A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2008/468}, year = {2008}, url = {http://eprint.iacr.org/2008/468}, } @misc{cryptoeprint:2008:469, author = {Stephane Manuel}, title = {Classification and Generation of Disturbance Vectors for Collision Attacks against SHA-1}, howpublished = {Cryptology ePrint Archive, Report 2008/469}, year = {2008}, url = {http://eprint.iacr.org/2008/469}, } @misc{cryptoeprint:2008:470, author = {Paolo D'Arco and Alfredo De Santis}, title = {From Weaknesses to Secret Disclosure in a Recent Ultra-Lightweight RFID Authentication Protocol}, howpublished = {Cryptology ePrint Archive, Report 2008/470}, year = {2008}, url = {http://eprint.iacr.org/2008/470}, } @misc{cryptoeprint:2008:471, author = {Endre Bangerter and Jan Camenisch and Stephan Krenn and Ahmad-Reza Sadeghi and Thomas Schneider}, title = {Automatic Generation of Sound Zero-Knowledge Protocols}, howpublished = {Cryptology ePrint Archive, Report 2008/471}, year = {2008}, url = {http://eprint.iacr.org/2008/471}, } @misc{cryptoeprint:2008:472, author = {Martin Beck and Erik Tews}, title = {Practical attacks against WEP and WPA}, howpublished = {Cryptology ePrint Archive, Report 2008/472}, year = {2008}, url = {http://eprint.iacr.org/2008/472}, } @misc{cryptoeprint:2008:473, author = {Sandy Harris}, title = {Exploring Cipherspace: Combining stream ciphers and block ciphers }, howpublished = {Cryptology ePrint Archive, Report 2008/473}, year = {2008}, url = {http://eprint.iacr.org/2008/473}, } @misc{cryptoeprint:2008:474, author = {Scott Coull and Matthew Green and Susan Hohenberger}, title = {Controlling Access to an Oblivious Database using Stateful Anonymous Credentials}, howpublished = {Cryptology ePrint Archive, Report 2008/474}, year = {2008}, url = {http://eprint.iacr.org/2008/474}, } @misc{cryptoeprint:2008:475, author = {George Danezis and Ian Goldberg}, title = {Sphinx: A Compact and Provably Secure Mix Format}, howpublished = {Cryptology ePrint Archive, Report 2008/475}, year = {2008}, url = {http://eprint.iacr.org/2008/475}, } @misc{cryptoeprint:2008:476, author = {Erik-Oliver Blass and Anil Kurmus and Refik Molva and Guevara Noubir and Abdullatif Shikfa}, title = {The $F_f$-Family of Protocols for RFID-Privacy and Authentication}, howpublished = {Cryptology ePrint Archive, Report 2008/476}, year = {2008}, url = {http://eprint.iacr.org/2008/476}, } @misc{cryptoeprint:2008:477, author = {Ton van Deursen and Sasa Radomirovic}, title = {On a New Formal Proof Model for RFID Location Privacy}, howpublished = {Cryptology ePrint Archive, Report 2008/477}, year = {2008}, url = {http://eprint.iacr.org/2008/477}, } @misc{cryptoeprint:2008:478, author = {M. J. Hinek and S. Jiang and R. Safavi-Naini and S. F. Shahandashti}, title = {Attribute-Based Encryption with Key Cloning Protection}, howpublished = {Cryptology ePrint Archive, Report 2008/478}, year = {2008}, url = {http://eprint.iacr.org/2008/478}, } @misc{cryptoeprint:2008:479, author = {Xia Jinyue and Wang Jiandong and Fang Liming and Ren Yongjun andBian Shizhu}, title = {Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols}, howpublished = {Cryptology ePrint Archive, Report 2008/479}, year = {2008}, url = {http://eprint.iacr.org/2008/479}, } @misc{cryptoeprint:2008:480, author = {Daniel J. Bernstein and Tien-Ren Chen and Chen-Mou Cheng and Tanja Lange and Bo-Yin Yang}, title = {ECM on Graphics Cards}, howpublished = {Cryptology ePrint Archive, Report 2008/480}, year = {2008}, url = {http://eprint.iacr.org/2008/480}, } @misc{cryptoeprint:2008:481, author = {Chris Peikert}, title = {Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem}, howpublished = {Cryptology ePrint Archive, Report 2008/481}, year = {2008}, url = {http://eprint.iacr.org/2008/481}, } @misc{cryptoeprint:2008:482, author = {Tibor Jager and Jörg Schwenk}, title = {The Quadratic Residuosity Problem May Be Equivalent to Factoring }, howpublished = {Cryptology ePrint Archive, Report 2008/482}, year = {2008}, url = {http://eprint.iacr.org/2008/482}, } @misc{cryptoeprint:2008:483, author = {Kamer Kaya and Ali Aydın Selçuk}, title = {Sharing DSS by the Chinese Remainder Theorem}, howpublished = {Cryptology ePrint Archive, Report 2008/483}, year = {2008}, url = {http://eprint.iacr.org/2008/483}, } @misc{cryptoeprint:2008:484, author = {Boris Skoric and Chibuzo Obi and Evgeny Verbitskiy and Berry Schoenmakers}, title = {Sharp lower bounds on the extractable randomness from non-uniform sources}, howpublished = {Cryptology ePrint Archive, Report 2008/484}, year = {2008}, url = {http://eprint.iacr.org/2008/484}, } @misc{cryptoeprint:2008:485, author = {Rongquan Feng and Zilong Wang and Hongfeng Wu}, title = {Fast Point Multiplication Formulae on Elliptic Curves of Weierstrass Form}, howpublished = {Cryptology ePrint Archive, Report 2008/485}, year = {2008}, url = {http://eprint.iacr.org/2008/485}, } @misc{cryptoeprint:2008:486, author = {Jean-Philippe Aumasson and Willi Meier and María Naya-Plasencia and Thomas Peyrin}, title = {Inside the Hypercube}, howpublished = {Cryptology ePrint Archive, Report 2008/486}, year = {2008}, url = {http://eprint.iacr.org/2008/486}, } @misc{cryptoeprint:2008:487, author = {Yinxia Sun and Futai Zhang}, title = {Secure Certificateless Public Key Encryption without Redundancy}, howpublished = {Cryptology ePrint Archive, Report 2008/487}, year = {2008}, url = {http://eprint.iacr.org/2008/487}, } @misc{cryptoeprint:2008:488, author = {Georg Fuchsbauer and Jonathan Katz and Eric Levieil and David Naccache}, title = {Efficient Rational Secret Sharing in the Standard Communication Model}, howpublished = {Cryptology ePrint Archive, Report 2008/488}, year = {2008}, url = {http://eprint.iacr.org/2008/488}, } @misc{cryptoeprint:2008:489, author = {Kevin D. Bowers and Ari Juels and Alina Oprea}, title = {HAIL: A High-Availability and Integrity Layer for Cloud Storage}, howpublished = {Cryptology ePrint Archive, Report 2008/489}, year = {2008}, url = {http://eprint.iacr.org/2008/489}, } @misc{cryptoeprint:2008:490, author = {Michael Scott and Naomi Benger and Manuel Charlemagne and Luis J. Dominguez Perez and Ezekiel J. Kachisa}, title = {On the final exponentiation for calculating pairings on ordinary elliptic curves}, howpublished = {Cryptology ePrint Archive, Report 2008/490}, year = {2008}, url = {http://eprint.iacr.org/2008/490}, } @misc{cryptoeprint:2008:491, author = {Laura Hitt O'Connor and Gary McGuire and Michael Naehrig and Marco Streng}, title = {CM construction of genus 2 curves with p-rank 1}, howpublished = {Cryptology ePrint Archive, Report 2008/491}, year = {2008}, url = {http://eprint.iacr.org/2008/491}, } @misc{cryptoeprint:2008:492, author = {Ran Canetti and Ling Cheung and Dilsun Kaynar and Nancy Lynch and Olivier Pereira}, title = {Modeling Computational Security in Long-Lived Systems, Version 2}, howpublished = {Cryptology ePrint Archive, Report 2008/492}, year = {2008}, url = {http://eprint.iacr.org/2008/492}, } @misc{cryptoeprint:2008:493, author = {Johannes Buchmann and Richard Lindner}, title = {Secure Parameters for SWIFFT}, howpublished = {Cryptology ePrint Archive, Report 2008/493}, year = {2008}, url = {http://eprint.iacr.org/2008/493}, } @misc{cryptoeprint:2008:494, author = {Bhavana Kanukurthi and Leonid Reyzin}, title = {Key Agreement from Close Secrets over Unsecured Channels}, howpublished = {Cryptology ePrint Archive, Report 2008/494}, year = {2008}, url = {http://eprint.iacr.org/2008/494}, } @misc{cryptoeprint:2008:495, author = {Ran Canetti and Mayank Varia}, title = {Non-Malleable Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2008/495}, year = {2008}, url = {http://eprint.iacr.org/2008/495}, } @misc{cryptoeprint:2008:496, author = {Debra L. Cook and Moti Yung and Angelos Keromytis}, title = {Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs}, howpublished = {Cryptology ePrint Archive, Report 2008/496}, year = {2008}, url = {http://eprint.iacr.org/2008/496}, } @misc{cryptoeprint:2008:497, author = {Peng Wang and Dengguo Feng and Wenling Wu and Liting Zhang}, title = {On the Correctness of An Approach Against Side-channel attacks}, howpublished = {Cryptology ePrint Archive, Report 2008/497}, year = {2008}, url = {http://eprint.iacr.org/2008/497}, } @misc{cryptoeprint:2008:498, author = {Anna Chen an Ming-Shing Chen and Tien-Ren Chen and Chen-Mou Cheng and Eric Kuo and Frost Lee and Bo-Yin Yang}, title = {Small Odd Prime Field Multivariate PKCs}, howpublished = {Cryptology ePrint Archive, Report 2008/498}, year = {2008}, url = {http://eprint.iacr.org/2008/498}, } @misc{cryptoeprint:2008:499, author = {Subhamoy Maitra and Goutam Paul and Shashwat Raizada and Palash Sarkar}, title = {A Linear Approximation to Addition of Three Integers and Its Implication to HC-128}, howpublished = {Cryptology ePrint Archive, Report 2008/499}, year = {2008}, url = {http://eprint.iacr.org/2008/499}, } @misc{cryptoeprint:2008:500, author = {Hai Huang and Zhenfu Cao}, title = {Strongly Secure Authenticated Key Exchange Protocol Based on Computational Diffie-Hellman Problem}, howpublished = {Cryptology ePrint Archive, Report 2008/500}, year = {2008}, url = {http://eprint.iacr.org/2008/500}, } @misc{cryptoeprint:2008:501, author = {Ewan Fleischmann and Michael Gorski}, title = {Some Observations on SHAMATA}, howpublished = {Cryptology ePrint Archive, Report 2008/501}, year = {2008}, url = {http://eprint.iacr.org/2008/501}, } @misc{cryptoeprint:2008:502, author = {Vanesa Daza and Javier Herranz and Paz Morillo and Carla Rafols}, title = {Extended Access Structures and Their Cryptographic Applications}, howpublished = {Cryptology ePrint Archive, Report 2008/502}, year = {2008}, url = {http://eprint.iacr.org/2008/502}, } @misc{cryptoeprint:2008:503, author = {Yevgeniy Dodis and Daniel Wichs}, title = {One-Round Authenticated Key Agreement from Weak Secrets}, howpublished = {Cryptology ePrint Archive, Report 2008/503}, year = {2008}, url = {http://eprint.iacr.org/2008/503}, } @misc{cryptoeprint:2008:504, author = {Vadim Lyubashevsky}, title = {The $n^c$-Unique Shortest Vector Problem is Hard}, howpublished = {Cryptology ePrint Archive, Report 2008/504}, year = {2008}, url = {http://eprint.iacr.org/2008/504}, } @misc{cryptoeprint:2008:505, author = {Tibor Jager and Andy Rupp}, title = {Lower Bounds on Black-Box Ring Extraction}, howpublished = {Cryptology ePrint Archive, Report 2008/505}, year = {2008}, url = {http://eprint.iacr.org/2008/505}, } @misc{cryptoeprint:2008:506, author = {Kannan Srinathan and Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, title = {Unconditionally Secure Message Transmission in Arbitrary Directed Synchronous Networks Tolerating Generalized Mixed Adversary}, howpublished = {Cryptology ePrint Archive, Report 2008/506}, year = {2008}, url = {http://eprint.iacr.org/2008/506}, } @misc{cryptoeprint:2008:507, author = {Bin Wang}, title = {A non-delegatable identity-based strong designated verifier signature scheme}, howpublished = {Cryptology ePrint Archive, Report 2008/507}, year = {2008}, url = {http://eprint.iacr.org/2008/507}, } @misc{cryptoeprint:2008:508, author = {Fabrice J.P.R. Pautot}, title = {Some Formal Solutions in Side-channel Cryptanalysis - An Introduction}, howpublished = {Cryptology ePrint Archive, Report 2008/508}, year = {2008}, url = {http://eprint.iacr.org/2008/508}, } @misc{cryptoeprint:2008:509, author = {Jian Weng and Robert H. Deng and Shengli Liu and Kefei Chen and Junzuo Lai and Xuan Wang}, title = {Chosen-Ciphertext Secure Proxy Re-Encryption Schemes without Pairings}, howpublished = {Cryptology ePrint Archive, Report 2008/509}, year = {2008}, url = {http://eprint.iacr.org/2008/509}, } @misc{cryptoeprint:2008:510, author = {Nadia Heninger and Hovav Shacham}, title = {Improved RSA Private Key Reconstruction for Cold Boot Attacks}, howpublished = {Cryptology ePrint Archive, Report 2008/510}, year = {2008}, url = {http://eprint.iacr.org/2008/510}, } @misc{cryptoeprint:2008:511, author = {Ewan Fleischmann and Christian Forler and Michael Gorski}, title = {Classification of the SHA-3 Candidates}, howpublished = {Cryptology ePrint Archive, Report 2008/511}, year = {2008}, url = {http://eprint.iacr.org/2008/511}, } @misc{cryptoeprint:2008:512, author = {Sihem Mesnager}, title = {A new class of Bent functions in Polynomial Forms}, howpublished = {Cryptology ePrint Archive, Report 2008/512}, year = {2008}, url = {http://eprint.iacr.org/2008/512}, } @misc{cryptoeprint:2008:513, author = {Adem Atalay, Orhun Kara and Ferhat Karakoç}, title = {Improved Cryptanalysis of SHAMATA-BC}, howpublished = {Cryptology ePrint Archive, Report 2008/513}, year = {2008}, url = {http://eprint.iacr.org/2008/513}, } @misc{cryptoeprint:2008:514, author = {Tapan Rai and Stanislav Bulygin}, title = {Noncommutative Polly Cracker-type cryptosystems and chosen-ciphertext security}, howpublished = {Cryptology ePrint Archive, Report 2008/514}, year = {2008}, url = {http://eprint.iacr.org/2008/514}, } @misc{cryptoeprint:2008:515, author = {Thomas Fuhr and Thomas Peyrin}, title = {Cryptanalysis of RadioGatun}, howpublished = {Cryptology ePrint Archive, Report 2008/515}, year = {2008}, url = {http://eprint.iacr.org/2008/515}, } @misc{cryptoeprint:2008:516, author = {Zheng Yuan and Keting Jia and Wei Wang and Xiaoyun Wang}, title = {Distinguishing and Forgery Attacks on Alred and Its AES-based Instance Alpha-MAC}, howpublished = {Cryptology ePrint Archive, Report 2008/516}, year = {2008}, url = {http://eprint.iacr.org/2008/516}, } @misc{cryptoeprint:2008:517, author = {Francois-Xavier Standaert and Philippe Bulens and Giacomo de Meulenaer and Nicolas Veyrat-Charvillon}, title = {Improving the Rules of the DPA Contest}, howpublished = {Cryptology ePrint Archive, Report 2008/517}, year = {2008}, url = {http://eprint.iacr.org/2008/517}, } @misc{cryptoeprint:2008:518, author = {Natarajan Vijayarangan}, title = {A NEW HASH ALGORITHM$:$ Khichidi$-$1}, howpublished = {Cryptology ePrint Archive, Report 2008/518}, year = {2008}, url = {http://eprint.iacr.org/2008/518}, } @misc{cryptoeprint:2008:519, author = {Li Ji and Xu Liangyu and Guan Xu}, title = {Collision attack on NaSHA-512}, howpublished = {Cryptology ePrint Archive, Report 2008/519}, year = {2008}, url = {http://eprint.iacr.org/2008/519}, } @misc{cryptoeprint:2008:520, author = {Shuang Wu and Dengguo Feng and Wenling Wu}, title = {Cryptanalysis of the Hash Function LUX-256}, howpublished = {Cryptology ePrint Archive, Report 2008/520}, year = {2008}, url = {http://eprint.iacr.org/2008/520}, } @misc{cryptoeprint:2008:521, author = {Joel Alwen and Chris Peikert}, title = {Generating Shorter Bases for Hard Random Lattices}, howpublished = {Cryptology ePrint Archive, Report 2008/521}, year = {2008}, url = {http://eprint.iacr.org/2008/521}, } @misc{cryptoeprint:2008:522, author = {Huseyin Hisil and Kenneth Koon-Ho Wong and Gary Carter and Ed Dawson}, title = {Twisted Edwards Curves Revisited}, howpublished = {Cryptology ePrint Archive, Report 2008/522}, year = {2008}, url = {http://eprint.iacr.org/2008/522}, } @misc{cryptoeprint:2008:523, author = {Jeongdae Hong and Jung Woo Kim and Jihye Kim and Kunsoo Park and Jung Hee Cheon}, title = {Privacy Preserving Multiset Union with ElGamal Encryption}, howpublished = {Cryptology ePrint Archive, Report 2008/523}, year = {2008}, url = {http://eprint.iacr.org/2008/523}, } @misc{cryptoeprint:2008:524, author = {Li Hongda and Feng dengguo and Li Bao and Xue Haixia}, title = {Round-Optimal Zero-Knowledge Proofs of Knowledge for NP}, howpublished = {Cryptology ePrint Archive, Report 2008/524}, year = {2008}, url = {http://eprint.iacr.org/2008/524}, } @misc{cryptoeprint:2008:525, author = {R. Bhaskar, K. Chandrasekaran, S. Lokam, P.L. Montgomery, R. Venkatesan, Y. Yacobi}, title = {On The Diffie-Hellman Assumption}, howpublished = {Cryptology ePrint Archive, Report 2008/525}, year = {2008}, url = {http://eprint.iacr.org/2008/525}, } @misc{cryptoeprint:2008:526, author = {Patrick Longa, and Catherine Gebotys}, title = {Novel Precomputation Schemes for Elliptic Curve Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2008/526}, year = {2008}, url = {http://eprint.iacr.org/2008/526}, } @misc{cryptoeprint:2008:527, author = {Michal Rjaško}, title = {Properties of Cryptographic Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2008/527}, year = {2008}, url = {http://eprint.iacr.org/2008/527}, } @misc{cryptoeprint:2008:528, author = {Georg Fuchsbauer and David Pointcheval}, title = {Encrypting Proofs on Pairings and Its Application to Anonymity for Signatures}, howpublished = {Cryptology ePrint Archive, Report 2008/528}, year = {2008}, url = {http://eprint.iacr.org/2008/528}, } @misc{cryptoeprint:2008:529, author = {Zhimin Chen, Sergey Morozov, Patrick Schaumont}, title = {A Hardware Interface for Hashing Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2008/529}, year = {2008}, url = {http://eprint.iacr.org/2008/529}, } @misc{cryptoeprint:2008:530, author = {Michael Scott and Naomi Benger and Manuel Charlemagne and Luis J. Dominguez Perez and Ezekiel J. Kachisa}, title = {Fast hashing to G2 on pairing friendly curves}, howpublished = {Cryptology ePrint Archive, Report 2008/530}, year = {2008}, url = {http://eprint.iacr.org/2008/530}, } @misc{cryptoeprint:2008:531, author = {Scott Fluhrer}, title = {Collision Attack on the Waterfall Hash Function}, howpublished = {Cryptology ePrint Archive, Report 2008/531}, year = {2008}, url = {http://eprint.iacr.org/2008/531}, } @misc{cryptoeprint:2008:532, author = {Xu Liangyu and Li Ji}, title = {Semi-free start collision attack on Blender}, howpublished = {Cryptology ePrint Archive, Report 2008/532}, year = {2008}, url = {http://eprint.iacr.org/2008/532}, } @misc{cryptoeprint:2008:533, author = {Jonathan Katz and Yehuda Lindell}, title = {Collusion-Free Multiparty Computation in the Mediated Model}, howpublished = {Cryptology ePrint Archive, Report 2008/533}, year = {2008}, url = {http://eprint.iacr.org/2008/533}, } @misc{cryptoeprint:2008:534, author = {Juan A. Garay and Daniel Wichs and Hong-Sheng Zhou}, title = {Somewhat Non-Committing Encryption and Efficient Adaptively Secure Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2008/534}, year = {2008}, url = {http://eprint.iacr.org/2008/534}, } @misc{cryptoeprint:2008:535, author = {Abhishek Parakh and Subhash Kak}, title = {A Recursive Threshold Visual Cryptography Scheme}, howpublished = {Cryptology ePrint Archive, Report 2008/535}, year = {2008}, url = {http://eprint.iacr.org/2008/535}, } @misc{cryptoeprint:2008:536, author = {Emily Shen and Elaine Shi and Brent Waters}, title = {Predicate Privacy in Encryption Systems }, howpublished = {Cryptology ePrint Archive, Report 2008/536}, year = {2008}, url = {http://eprint.iacr.org/2008/536}, } @misc{cryptoeprint:2008:537, author = {SeongHan Shin and Kazukuni Kobara and Hideki Imai}, title = {A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol}, howpublished = {Cryptology ePrint Archive, Report 2008/537}, year = {2008}, url = {http://eprint.iacr.org/2008/537}, } @misc{cryptoeprint:2008:538, author = {Ivan Damgård and Nikos Triandopoulos}, title = {Supporting Non-membership Proofs with Bilinear-map Accumulators}, howpublished = {Cryptology ePrint Archive, Report 2008/538}, year = {2008}, url = {http://eprint.iacr.org/2008/538}, } @misc{cryptoeprint:2008:539, author = {Jan Camenisch and Markulf Kohlweiss and Claudio Soriente}, title = {An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials}, howpublished = {Cryptology ePrint Archive, Report 2008/539}, year = {2008}, url = {http://eprint.iacr.org/2008/539}, } @misc{cryptoeprint:2008:540, author = {Jiqiang Lu and Orr Dunkelman and Nathan Keller and Jongsung Kim}, title = {New Impossible Differential Attacks on AES}, howpublished = {Cryptology ePrint Archive, Report 2008/540}, year = {2008}, url = {http://eprint.iacr.org/2008/540}, } @misc{cryptoeprint:2008:541, author = {Yi Deng}, title = {Resettably-Sound Resettable Zero Knowledge Arguments for NP}, howpublished = {Cryptology ePrint Archive, Report 2008/541}, year = {2008}, url = {http://eprint.iacr.org/2008/541}, } @misc{cryptoeprint:2008:542, author = {Keting Jia and Xiaoyun Wang and Zheng Yuan and Guangwu Xu }, title = {Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs}, howpublished = {Cryptology ePrint Archive, Report 2008/542}, year = {2008}, url = {http://eprint.iacr.org/2008/542}, } @misc{cryptoeprint:2008:543, author = {Chia-Hsin Owen Chen and Ming-Shing Chen and Jintai Ding and Fabian Werner and Bo-Yin Yang}, title = {Odd-Char Multivariate Hidden Field Equations}, howpublished = {Cryptology ePrint Archive, Report 2008/543}, year = {2008}, url = {http://eprint.iacr.org/2008/543}, } @misc{cryptoeprint:2008:544, author = {*Yalin Chen 1, Chun-Hui Huang 2, Jue-Sam Chou3 }, title = {Comments on two multi-server authentication protocols}, howpublished = {Cryptology ePrint Archive, Report 2008/544}, year = {2008}, url = {http://eprint.iacr.org/2008/544}, } @misc{cryptoeprint:2008:545, author = {Vipul Goyal and Amit Sahai}, title = {Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy}, howpublished = {Cryptology ePrint Archive, Report 2008/545}, year = {2008}, url = {http://eprint.iacr.org/2008/545}, } @misc{cryptoeprint:2009:001, author = {Brian Baldwin and Richard Moloney and Andrew Byrne and Gary McGuire and William P. Marnane}, title = {A Hardware Analysis of Twisted Edwards Curves for an Elliptic Curve Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2009/001}, year = {2009}, url = {http://eprint.iacr.org/2009/001}, } @misc{cryptoeprint:2009:002, author = {Julien Brouchier and Nora Dabbous and Tom Kean and Carol Marsh and David Naccache}, title = {Thermocommunication}, howpublished = {Cryptology ePrint Archive, Report 2009/002}, year = {2009}, url = {http://eprint.iacr.org/2009/002}, } @misc{cryptoeprint:2009:003, author = {L. H. Nguyen and A. W. Roscoe}, title = {Separating two roles of hashing in one-way message authentication}, howpublished = {Cryptology ePrint Archive, Report 2009/003}, year = {2009}, url = {http://eprint.iacr.org/2009/003}, } @misc{cryptoeprint:2009:004, author = {Palash Sarkar}, title = {On Stateless Schemes for Message Authentication Using Pseudorandom Functions}, howpublished = {Cryptology ePrint Archive, Report 2009/004}, year = {2009}, url = {http://eprint.iacr.org/2009/004}, } @misc{cryptoeprint:2009:005, author = {Wei Wang and Xiaoyun Wang and Guangwu Xu}, title = {Impossible Differential Cryptanalysis of Pelican, MT-MAC-AES and PC-MAC-AES}, howpublished = {Cryptology ePrint Archive, Report 2009/005}, year = {2009}, url = {http://eprint.iacr.org/2009/005}, } @misc{cryptoeprint:2009:006, author = {Vlastimil Klima}, title = {Huge Multicollisions and Multipreimages of Hash Functions BLENDER-n}, howpublished = {Cryptology ePrint Archive, Report 2009/006}, year = {2009}, url = {http://eprint.iacr.org/2009/006}, } @misc{cryptoeprint:2009:007, author = {Jens Groth}, title = {Homomorphic Trapdoor Commitments to Group Elements}, howpublished = {Cryptology ePrint Archive, Report 2009/007}, year = {2009}, url = {http://eprint.iacr.org/2009/007}, } @misc{cryptoeprint:2009:008, author = {Roman Popovych}, title = {A note on Agrawal conjecture}, howpublished = {Cryptology ePrint Archive, Report 2009/008}, year = {2009}, url = {http://eprint.iacr.org/2009/008}, } @misc{cryptoeprint:2009:009, author = {Christoph Lucas and Dominik Raub and Ueli Maurer}, title = {Combining Computational and Information-Theoretic Security in Multi-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2009/009}, year = {2009}, url = {http://eprint.iacr.org/2009/009}, } @misc{cryptoeprint:2009:010, author = {Zhibin Zhou and Dijiang Huang}, title = {ID-GC: An Efficient Identity-based Group Key Management Scheme}, howpublished = {Cryptology ePrint Archive, Report 2009/010}, year = {2009}, url = {http://eprint.iacr.org/2009/010}, } @misc{cryptoeprint:2009:011, author = {D. Canright and Lejla Batina}, title = {A Very Compact "Perfectly Masked" S-Box for AES (corrected)}, howpublished = {Cryptology ePrint Archive, Report 2009/011}, year = {2009}, url = {http://eprint.iacr.org/2009/011}, } @misc{cryptoeprint:2009:012, author = {D. Canright}, title = {Avoid Mask Re-use in Masked Galois Multipliers}, howpublished = {Cryptology ePrint Archive, Report 2009/012}, year = {2009}, url = {http://eprint.iacr.org/2009/012}, } @misc{cryptoeprint:2009:013, author = {Yehuda Lindell}, title = {Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1}, howpublished = {Cryptology ePrint Archive, Report 2009/013}, year = {2009}, url = {http://eprint.iacr.org/2009/013}, } @misc{cryptoeprint:2009:014, author = {Simon R. Blackburn and Tuvi Etzion and Keith M. Martin and Maura B. Paterson}, title = {Key Predistribution Techniques for Grid-Based Wireless Sensor Networks}, howpublished = {Cryptology ePrint Archive, Report 2009/014}, year = {2009}, url = {http://eprint.iacr.org/2009/014}, } @misc{cryptoeprint:2009:015, author = {S S Bedi and N Rajesh Pillai}, title = {Cube Attacks on Trivium}, howpublished = {Cryptology ePrint Archive, Report 2009/015}, year = {2009}, url = {http://eprint.iacr.org/2009/015}, } @misc{cryptoeprint:2009:016, author = {Neil Costigan and Peter Schwabe}, title = {Fast elliptic-curve cryptography on the Cell Broadband Engine}, howpublished = {Cryptology ePrint Archive, Report 2009/016}, year = {2009}, url = {http://eprint.iacr.org/2009/016}, } @misc{cryptoeprint:2009:017, author = {Chunbo Ma and Jun Ao}, title = {Anonymous signature scheme}, howpublished = {Cryptology ePrint Archive, Report 2009/017}, year = {2009}, url = {http://eprint.iacr.org/2009/017}, } @misc{cryptoeprint:2009:018, author = {prasanth Kumar Thandra, S.A.V. Satya Murty}, title = {Huge 2ndpreimages and collisions of khichidi-1}, howpublished = {Cryptology ePrint Archive, Report 2009/018}, year = {2009}, url = {http://eprint.iacr.org/2009/018}, } @misc{cryptoeprint:2009:019, author = {Matthew Franklin and Mark Gondree and Payman Mohassel}, title = {Communication-Efficient Private Protocols for Longest Common Subsequence}, howpublished = {Cryptology ePrint Archive, Report 2009/019}, year = {2009}, url = {http://eprint.iacr.org/2009/019}, } @misc{cryptoeprint:2009:020, author = {Jiali Choy and Khoongming Khoo and Chuan-Wen Loe}, title = {Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack}, howpublished = {Cryptology ePrint Archive, Report 2009/020}, year = {2009}, url = {http://eprint.iacr.org/2009/020}, } @misc{cryptoeprint:2009:021, author = {Julien Cathalo and David Naccache and Jean-Jacques Quisquater}, title = {Comparing With RSA}, howpublished = {Cryptology ePrint Archive, Report 2009/021}, year = {2009}, url = {http://eprint.iacr.org/2009/021}, } @misc{cryptoeprint:2009:022, author = {Roman Popovych}, title = {Correctness of Li Generalization of RSA Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2009/022}, year = {2009}, url = {http://eprint.iacr.org/2009/022}, } @misc{cryptoeprint:2009:023, author = {Dennis Hofheinz and Dominique Unruh and Jörn Müller-Quade}, title = {Polynomial Runtime and Composability}, howpublished = {Cryptology ePrint Archive, Report 2009/023}, year = {2009}, url = {http://eprint.iacr.org/2009/023}, } @misc{cryptoeprint:2009:024, author = {Emmanuelle Dottax and Christophe Giraud and Matthieu Rivain and Yannick Sierra}, title = {On Second-Order Fault Analysis Resistance for CRT-RSA Implementations}, howpublished = {Cryptology ePrint Archive, Report 2009/024}, year = {2009}, url = {http://eprint.iacr.org/2009/024}, } @misc{cryptoeprint:2009:025, author = {Ee-Chien Chang and Chee Liang Lim and Jia Xu}, title = {Short Redactable Signatures Using Random Trees}, howpublished = {Cryptology ePrint Archive, Report 2009/025}, year = {2009}, url = {http://eprint.iacr.org/2009/025}, } @misc{cryptoeprint:2009:026, author = {Zhimin Li and Daofeng Li}, title = {Collision Attack on NaSHA-384/512}, howpublished = {Cryptology ePrint Archive, Report 2009/026}, year = {2009}, url = {http://eprint.iacr.org/2009/026}, } @misc{cryptoeprint:2009:027, author = {Markus Rückert and Dominique Schröder}, title = {Security of Verifiably Encrypted Signatures}, howpublished = {Cryptology ePrint Archive, Report 2009/027}, year = {2009}, url = {http://eprint.iacr.org/2009/027}, } @misc{cryptoeprint:2009:028, author = {Susan Hohenberger and Brent Waters}, title = {Realizing Hash-and-Sign Signatures under Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2009/028}, year = {2009}, url = {http://eprint.iacr.org/2009/028}, } @misc{cryptoeprint:2009:029, author = {Marius Oliver Gheorghita}, title = {Nofish - A new stream cipher}, howpublished = {Cryptology ePrint Archive, Report 2009/029}, year = {2009}, url = {http://eprint.iacr.org/2009/029}, } @misc{cryptoeprint:2009:030, author = {B. Skoric and P. Tuyls}, title = {An efficient fuzzy extractor for limited noise}, howpublished = {Cryptology ePrint Archive, Report 2009/030}, year = {2009}, url = {http://eprint.iacr.org/2009/030}, } @misc{cryptoeprint:2009:031, author = {Yehuda Lindell}, title = {Adaptively Secure Two-Party Computation with Erasures}, howpublished = {Cryptology ePrint Archive, Report 2009/031}, year = {2009}, url = {http://eprint.iacr.org/2009/031}, } @misc{cryptoeprint:2009:032, author = {MITSUNARI Shigeo}, title = {A Fast Implementation of $\eta_T$ Pairing in Characteristic Three on Intel Core 2 Duo Processor}, howpublished = {Cryptology ePrint Archive, Report 2009/032}, year = {2009}, url = {http://eprint.iacr.org/2009/032}, } @misc{cryptoeprint:2009:033, author = {Yaser Esmaeili Salehani and S. Amir Hossein Ayatollah Esfahani Tabatabaei and Mohammad Reza Sohizadeh Abyaneh and Mehdi Mohammad Hassanzadeh }, title = {NESHA-256, NEw 256-bit Secure Hash Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2009/033}, year = {2009}, url = {http://eprint.iacr.org/2009/033}, } @misc{cryptoeprint:2009:034, author = {S. Markovski, A. Mileva, V. Dimitrova and D. Gligoroski}, title = {On a Conditional Collision Attack on NaSHA-512}, howpublished = {Cryptology ePrint Archive, Report 2009/034}, year = {2009}, url = {http://eprint.iacr.org/2009/034}, } @misc{cryptoeprint:2009:035, author = {Xiaofeng Chen and Fangguo Zhang and Haibo Tian and Baodian Wei and Kwangjo Kim}, title = {Key-Exposure Free Chameleon Hashing and Signatures Based on Discrete Logarithm Systems}, howpublished = {Cryptology ePrint Archive, Report 2009/035}, year = {2009}, url = {http://eprint.iacr.org/2009/035}, } @misc{cryptoeprint:2009:036, author = {Carmit Hazay and Yehuda Lindell}, title = {Constructions of Truly Practical Secure Protocols using Standard Smartcards}, howpublished = {Cryptology ePrint Archive, Report 2009/036}, year = {2009}, url = {http://eprint.iacr.org/2009/036}, } @misc{cryptoeprint:2009:037, author = {M. Jason Hinek and Charles C. Y. Lam}, title = {Common Modulus Attacks on Small Private Exponent RSA and Some Fast Variants (in Practice)}, howpublished = {Cryptology ePrint Archive, Report 2009/037}, year = {2009}, url = {http://eprint.iacr.org/2009/037}, } @misc{cryptoeprint:2009:038, author = {Bhupendra Singh and Lexy Alexander and Sanjay Burman}, title = {On Algebraic Relations of Serpent S-Boxes}, howpublished = {Cryptology ePrint Archive, Report 2009/038}, year = {2009}, url = {http://eprint.iacr.org/2009/038}, } @misc{cryptoeprint:2009:039, author = {Mihir Bellare and Shanshan Duan and Adriana Palacio}, title = {Key Insulation and Intrusion Resilience Over a Public Channel}, howpublished = {Cryptology ePrint Archive, Report 2009/039}, year = {2009}, url = {http://eprint.iacr.org/2009/039}, } @misc{cryptoeprint:2009:040, author = {Yusuke Naito and Kazuki Yoneyama and Lei Wang and Kazuo Ohta}, title = {How to Prove the Security of Practical Cryptosystems with Merkle-Damg{\aa}rd Hashing by Adopting Indifferentiability}, howpublished = {Cryptology ePrint Archive, Report 2009/040}, year = {2009}, url = {http://eprint.iacr.org/2009/040}, } @misc{cryptoeprint:2009:041, author = {Yevgeniy Dodis and Salil Vadhan and Daniel Wichs}, title = {Proofs of Retrievability via Hardness Amplification}, howpublished = {Cryptology ePrint Archive, Report 2009/041}, year = {2009}, url = {http://eprint.iacr.org/2009/041}, } @misc{cryptoeprint:2009:042, author = {Lilya Budaghyan and Claude Carlet}, title = {On CCZ-equivalence and its use in secondary constructions of bent functions}, howpublished = {Cryptology ePrint Archive, Report 2009/042}, year = {2009}, url = {http://eprint.iacr.org/2009/042}, } @misc{cryptoeprint:2009:043, author = {Karthik Chandrashekar Iyer and Aravinda Subramanya}, title = {Image Encryption by Pixel Property Separation}, howpublished = {Cryptology ePrint Archive, Report 2009/043}, year = {2009}, url = {http://eprint.iacr.org/2009/043}, } @misc{cryptoeprint:2009:044, author = {Dmitry Frumkin and Adi Shamir}, title = {Un-Trusted-HB: Security Vulnerabilities of Trusted-HB}, howpublished = {Cryptology ePrint Archive, Report 2009/044}, year = {2009}, url = {http://eprint.iacr.org/2009/044}, } @misc{cryptoeprint:2009:045, author = {Carmit Hazay and Yehuda Lindell}, title = {Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2009/045}, year = {2009}, url = {http://eprint.iacr.org/2009/045}, } @misc{cryptoeprint:2009:046, author = {Simon R. Blackburn and Tuvi Etzion and Siaw-Lynn Ng}, title = {Traceability Codes}, howpublished = {Cryptology ePrint Archive, Report 2009/046}, year = {2009}, url = {http://eprint.iacr.org/2009/046}, } @misc{cryptoeprint:2009:047, author = {Palash Sarkar}, title = {On Approximating Addition by Exclusive OR}, howpublished = {Cryptology ePrint Archive, Report 2009/047}, year = {2009}, url = {http://eprint.iacr.org/2009/047}, } @misc{cryptoeprint:2009:048, author = {Palash Sarkar}, title = {Trade-Off Between Key Size and Efficiency in Universal Hashing Using Polynomials}, howpublished = {Cryptology ePrint Archive, Report 2009/048}, year = {2009}, url = {http://eprint.iacr.org/2009/048}, } @misc{cryptoeprint:2009:049, author = {Aileen Zhang, Chu-Wee Lim and Khoongming Khoo}, title = {Extensions of the Cube Attack}, howpublished = {Cryptology ePrint Archive, Report 2009/049}, year = {2009}, url = {http://eprint.iacr.org/2009/049}, } @misc{cryptoeprint:2009:050, author = {Jan Camenisch and Aggelos Kiayias and Moti Yung}, title = {On the Portability of Generalized Schnorr Proofs}, howpublished = {Cryptology ePrint Archive, Report 2009/050}, year = {2009}, url = {http://eprint.iacr.org/2009/050}, } @misc{cryptoeprint:2009:051, author = {Mohammad Reza Reyhanitabar and Willy Susilo and Yi Mu}, title = {Enhanced Target Collision Resistant Hash Functions Revisited}, howpublished = {Cryptology ePrint Archive, Report 2009/051}, year = {2009}, url = {http://eprint.iacr.org/2009/051}, } @misc{cryptoeprint:2009:052, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, title = {Cryptanalysis of Ring Signature and Ring Signcryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2009/052}, year = {2009}, url = {http://eprint.iacr.org/2009/052}, } @misc{cryptoeprint:2009:053, author = {Lilya Budaghyan and Tor Helleseth}, title = {New commutative semifields defined by PN multinomials}, howpublished = {Cryptology ePrint Archive, Report 2009/053}, year = {2009}, url = {http://eprint.iacr.org/2009/053}, } @misc{cryptoeprint:2009:054, author = {Ewan Fleischmann and Michael Gorski and Stefan Lucks}, title = {On the Security of Tandem-DM}, howpublished = {Cryptology ePrint Archive, Report 2009/054}, year = {2009}, url = {http://eprint.iacr.org/2009/054}, } @misc{cryptoeprint:2009:055, author = {Ralf Kuesters and Max Tuengerthal}, title = {Universally Composable Symmetric Encryption}, howpublished = {Cryptology ePrint Archive, Report 2009/055}, year = {2009}, url = {http://eprint.iacr.org/2009/055}, } @misc{cryptoeprint:2009:056, author = {David Kammer and Diandian Zhang and Peter Schwabe and Hanno Scharwaechter and Markus Langenberg and Dominik Auras and Gerd Ascheid and Rainer Leupers and Rudolf Mathar and Heinrich Meyr}, title = {Designing an ASIP for Cryptographic Pairings over Barreto-Naehrig Curves}, howpublished = {Cryptology ePrint Archive, Report 2009/056}, year = {2009}, url = {http://eprint.iacr.org/2009/056}, } @misc{cryptoeprint:2009:057, author = {Gregory M. Zaverucha and Douglas R. Stinson}, title = {Anonymity in Shared Symmetric Key Primitives}, howpublished = {Cryptology ePrint Archive, Report 2009/057}, year = {2009}, url = {http://eprint.iacr.org/2009/057}, } @misc{cryptoeprint:2009:058, author = {Takakazu Satoh}, title = {On Generalization of Cheon's Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2009/058}, year = {2009}, url = {http://eprint.iacr.org/2009/058}, } @misc{cryptoeprint:2009:059, author = {Laszlo Csirmaz}, title = {On the impossibility of graph secret sharing}, howpublished = {Cryptology ePrint Archive, Report 2009/059}, year = {2009}, url = {http://eprint.iacr.org/2009/059}, } @misc{cryptoeprint:2009:060, author = {Sanjit Chatterjee and Darrel Hankerson and Edward Knapp and Alfred Menezes}, title = {Comparing Two Pairing-Based Aggregate Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2009/060}, year = {2009}, url = {http://eprint.iacr.org/2009/060}, } @misc{cryptoeprint:2009:061, author = {Shigeo Tsujii and Kohtaro Tadaki and Ryou Fujita and Masahito Gotaishi and Toshinobu Kaneko}, title = {Security Enhancement of Various MPKCs by 2-layer Nonlinear Piece In Hand Method}, howpublished = {Cryptology ePrint Archive, Report 2009/061}, year = {2009}, url = {http://eprint.iacr.org/2009/061}, } @misc{cryptoeprint:2009:062, author = {Subhamoy Maitra and Santanu Sarkar}, title = {Polynomial-Time Equivalence of Computing the CRT-RSA Secret Key(s) and Factoring}, howpublished = {Cryptology ePrint Archive, Report 2009/062}, year = {2009}, url = {http://eprint.iacr.org/2009/062}, } @misc{cryptoeprint:2009:063, author = {Lilya Budaghyan and Claude Carlet}, title = {CCZ-equivalence and Boolean functions}, howpublished = {Cryptology ePrint Archive, Report 2009/063}, year = {2009}, url = {http://eprint.iacr.org/2009/063}, } @misc{cryptoeprint:2009:064, author = {Céline Blondeau and Benoît Gérard}, title = {On the Data Complexity of Statistical Attacks Against Block Ciphers }, howpublished = {Cryptology ePrint Archive, Report 2009/064}, year = {2009}, url = {http://eprint.iacr.org/2009/064}, } @misc{cryptoeprint:2009:065, author = {Alexandra Boldyreva and David Cash and Marc Fischlin and Bogdan Warinschi}, title = {Foundations of Non-Malleable Hash and One-Way Functions}, howpublished = {Cryptology ePrint Archive, Report 2009/065}, year = {2009}, url = {http://eprint.iacr.org/2009/065}, } @misc{cryptoeprint:2009:066, author = {Jooyoung Lee and Je Hong Park}, title = {Adaptive Preimage Resistance and Permutation-based Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2009/066}, year = {2009}, url = {http://eprint.iacr.org/2009/066}, } @misc{cryptoeprint:2009:067, author = {Chuan-Kun Wu}, title = {On fractional correlation immunity of majority functions}, howpublished = {Cryptology ePrint Archive, Report 2009/067}, year = {2009}, url = {http://eprint.iacr.org/2009/067}, } @misc{cryptoeprint:2009:068, author = {Johann Barbier and Eric Filiol}, title = {Overview of Turbo-Code Reconstruction Techniques}, howpublished = {Cryptology ePrint Archive, Report 2009/068}, year = {2009}, url = {http://eprint.iacr.org/2009/068}, } @misc{cryptoeprint:2009:069, author = {Alptekin Kupcu and Anna Lysyanskaya}, title = {Framework for Analyzing Optimistic Fair Exchange with Distributed Arbiters}, howpublished = {Cryptology ePrint Archive, Report 2009/069}, year = {2009}, url = {http://eprint.iacr.org/2009/069}, } @misc{cryptoeprint:2009:070, author = {Omran Ahmadi and Francisco Rodr\'iguez-Henr\'iquez}, title = {Low Complexity Cubing and Cube Root Computation over $\F_{3^m}$ in Standard Basis}, howpublished = {Cryptology ePrint Archive, Report 2009/070}, year = {2009}, url = {http://eprint.iacr.org/2009/070}, } @misc{cryptoeprint:2009:071, author = {Laszlo Csirmaz and Gabor Tardos}, title = {Secret sharing on trees: problem solved}, howpublished = {Cryptology ePrint Archive, Report 2009/071}, year = {2009}, url = {http://eprint.iacr.org/2009/071}, } @misc{cryptoeprint:2009:072, author = {Luis J Dominguez Perez, Ezekiel J Kachisa, and Michael Scott}, title = {Implementing cryptographic pairings: a magma tutorial}, howpublished = {Cryptology ePrint Archive, Report 2009/072}, year = {2009}, url = {http://eprint.iacr.org/2009/072}, } @misc{cryptoeprint:2009:073, author = {GU Chun-Xiang, Guang Yan, ZHU Yue-Fei}, title = {Automatic Approach of Provable Security and its Application for OAEP+}, howpublished = {Cryptology ePrint Archive, Report 2009/073}, year = {2009}, url = {http://eprint.iacr.org/2009/073}, } @misc{cryptoeprint:2009:074, author = {Kirill Morozov and George Savvides}, title = {Computational Oblivious Transfer and Interactive Hashing}, howpublished = {Cryptology ePrint Archive, Report 2009/074}, year = {2009}, url = {http://eprint.iacr.org/2009/074}, } @misc{cryptoeprint:2009:075, author = {Yusuke Naito and Kazuki Yoneyama and Lei Wang and Kazuo Ohta}, title = {Davies-Meyer Merkle-Damg{\aa}rd Revisited:\\Variants of Indifferentiability and Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2009/075}, year = {2009}, url = {http://eprint.iacr.org/2009/075}, } @misc{cryptoeprint:2009:076, author = {Zhixiong Chen and Chenhuang Wu}, title = {Construction of large families of pseudorandom subsets using elliptic curves}, howpublished = {Cryptology ePrint Archive, Report 2009/076}, year = {2009}, url = {http://eprint.iacr.org/2009/076}, } @misc{cryptoeprint:2009:077, author = {Charles Bouillaguet and Orr Dunkelman and Pierre-Alain Fouque and Antoine Joux}, title = {On the Security of Iterated Hashing based on Forgery-resistant Compression Functions}, howpublished = {Cryptology ePrint Archive, Report 2009/077}, year = {2009}, url = {http://eprint.iacr.org/2009/077}, } @misc{cryptoeprint:2009:078, author = {Stefan Lucks and Andreas Schuler and Erik Tews and Ralf-Philipp Weinmann and Matthias Wenzel}, title = {Attacks on the DECT authentication mechanisms}, howpublished = {Cryptology ePrint Archive, Report 2009/078}, year = {2009}, url = {http://eprint.iacr.org/2009/078}, } @misc{cryptoeprint:2009:079, author = {David Basin and Cas Cremers}, title = {From Dolev-Yao to Strong Adaptive Corruption: Analyzing Security in the Presence of Compromising Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2009/079}, year = {2009}, url = {http://eprint.iacr.org/2009/079}, } @misc{cryptoeprint:2009:080, author = {Michael Backes and Dennis Hofheinz and Dominique Unruh}, title = {A general framework for computational soundness proofs - or - The computational soundness of the applied pi-calculus}, howpublished = {Cryptology ePrint Archive, Report 2009/080}, year = {2009}, url = {http://eprint.iacr.org/2009/080}, } @misc{cryptoeprint:2009:081, author = {Cong Wang and Qian Wang and Kui Ren and Wenjing Lou}, title = {Ensuring Data Storage Security in Cloud Computing}, howpublished = {Cryptology ePrint Archive, Report 2009/081}, year = {2009}, url = {http://eprint.iacr.org/2009/081}, } @misc{cryptoeprint:2009:082, author = {Douglas Stebila and Michele Mosca and Norbert L\"utkenhaus}, title = {The Case for Quantum Key Distribution}, howpublished = {Cryptology ePrint Archive, Report 2009/082}, year = {2009}, url = {http://eprint.iacr.org/2009/082}, } @misc{cryptoeprint:2009:083, author = {Vladimir Bozovic and Daniel Socek and Rainer Steinwandt and Viktoria I. Villanyi}, title = {Multi-authority attribute based encryption with honest-but-curious central authority}, howpublished = {Cryptology ePrint Archive, Report 2009/083}, year = {2009}, url = {http://eprint.iacr.org/2009/083}, } @misc{cryptoeprint:2009:084, author = {Mihir Bellare and Thomas Ristenpart}, title = {Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme}, howpublished = {Cryptology ePrint Archive, Report 2009/084}, year = {2009}, url = {http://eprint.iacr.org/2009/084}, } @misc{cryptoeprint:2009:085, author = {Tao Feng and Xian Guo and Jianfeng Ma and Xinghua Li }, title = {UC-Secure Source Routing Protocol}, howpublished = {Cryptology ePrint Archive, Report 2009/085}, year = {2009}, url = {http://eprint.iacr.org/2009/085}, } @misc{cryptoeprint:2009:086, author = {P.N.J. Eagle and S.D. Galbraith}, title = {Point Compression for Koblitz Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2009/086}, year = {2009}, url = {http://eprint.iacr.org/2009/086}, } @misc{cryptoeprint:2009:087, author = {Arpita Patra, Ashish Choudhary, C. Pandu Rangan}, title = {Unconditionally Secure Asynchronous Multiparty Computation with Quadratic Communication}, howpublished = {Cryptology ePrint Archive, Report 2009/087}, year = {2009}, url = {http://eprint.iacr.org/2009/087}, } @misc{cryptoeprint:2009:088, author = {Brett Hemenway and Rafail Ostrovsky}, title = {Re-randomizable Encryption implies Selective Opening Security}, howpublished = {Cryptology ePrint Archive, Report 2009/088}, year = {2009}, url = {http://eprint.iacr.org/2009/088}, } @misc{cryptoeprint:2009:089, author = {Boris Köpf and Markus Dürmuth}, title = {A Provably Secure And Efficient Countermeasure Against Timing Attacks}, howpublished = {Cryptology ePrint Archive, Report 2009/089}, year = {2009}, url = {http://eprint.iacr.org/2009/089}, } @misc{cryptoeprint:2009:090, author = {Alexander W. Dent}, title = {A Brief History of Provably-Secure Public-Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2009/090}, year = {2009}, url = {http://eprint.iacr.org/2009/090}, } @misc{cryptoeprint:2009:091, author = {Koichiro Noro and Kunikatsu Kobayashi}, title = {Knapsack Cryptosystem on Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2009/091}, year = {2009}, url = {http://eprint.iacr.org/2009/091}, } @misc{cryptoeprint:2009:092, author = {Jung Hee Cheon and Jeongdae Hong and Gene Tsudik}, title = {Reducing RFID Reader Load with the Meet-in-the-Middle Strategy}, howpublished = {Cryptology ePrint Archive, Report 2009/092}, year = {2009}, url = {http://eprint.iacr.org/2009/092}, } @misc{cryptoeprint:2009:093, author = {Peter Gazi and Ueli Maurer}, title = {Cascade Encryption Revisited}, howpublished = {Cryptology ePrint Archive, Report 2009/093}, year = {2009}, url = {http://eprint.iacr.org/2009/093}, } @misc{cryptoeprint:2009:094, author = {Sugata Gangopadhyay, Sumanta Sarkar, Ruchi Telang}, title = {On the Lower Bounds of the Second Order Nonlinearity of some Boolean Functions }, howpublished = {Cryptology ePrint Archive, Report 2009/094}, year = {2009}, url = {http://eprint.iacr.org/2009/094}, } @misc{cryptoeprint:2009:095, author = {Ernie Brickell and Jiangtao Li}, title = {Enhanced Privacy ID from Bilinear Pairing}, howpublished = {Cryptology ePrint Archive, Report 2009/095}, year = {2009}, url = {http://eprint.iacr.org/2009/095}, } @misc{cryptoeprint:2009:096, author = {M.I. Gonzalez Vasco and A. L. Perez del Pozo and P. Taborda Duarte}, title = {A note on the security of MST3}, howpublished = {Cryptology ePrint Archive, Report 2009/096}, year = {2009}, url = {http://eprint.iacr.org/2009/096}, } @misc{cryptoeprint:2009:097, author = {Brian J. Matt}, title = {Identification of Multiple Invalid Signatures in Pairing-based Batched Signatures}, howpublished = {Cryptology ePrint Archive, Report 2009/097}, year = {2009}, url = {http://eprint.iacr.org/2009/097}, } @misc{cryptoeprint:2009:098, author = {Martin Albrecht and Craig Gentry and Shai Halevi and Jonathan Katz}, title = {Attacking Cryptographic Schemes Based on "Perturbation Polynomials"}, howpublished = {Cryptology ePrint Archive, Report 2009/098}, year = {2009}, url = {http://eprint.iacr.org/2009/098}, } @misc{cryptoeprint:2009:099, author = {Hugue Blier and Alain Tapp}, title = {A Single Initialization Server for Multi-Party Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2009/099}, year = {2009}, url = {http://eprint.iacr.org/2009/099}, } @misc{cryptoeprint:2009:100, author = {Gaetan Bisson and Andrew V. Sutherland}, title = {Computing the endomorphism ring of an ordinary elliptic curve over a finite field}, howpublished = {Cryptology ePrint Archive, Report 2009/100}, year = {2009}, url = {http://eprint.iacr.org/2009/100}, } @misc{cryptoeprint:2009:101, author = {Mihir Bellare and Scott Yilek}, title = {Encryption Schemes Secure under Selective Opening Attack}, howpublished = {Cryptology ePrint Archive, Report 2009/101}, year = {2009}, url = {http://eprint.iacr.org/2009/101}, } @misc{cryptoeprint:2009:102, author = {Raphael Overbeck}, title = {A Step Towards QC Blind Signatures}, howpublished = {Cryptology ePrint Archive, Report 2009/102}, year = {2009}, url = {http://eprint.iacr.org/2009/102}, } @misc{cryptoeprint:2009:103, author = {Takakazu Satoh}, title = {The Brezing-Weng-Freeman Method for Certain Genus two Hyperelliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2009/103}, year = {2009}, url = {http://eprint.iacr.org/2009/103}, } @misc{cryptoeprint:2009:104, author = {Dieter Schmidt}, title = {1024 - A High Security Software Oriented Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2009/104}, year = {2009}, url = {http://eprint.iacr.org/2009/104}, } @misc{cryptoeprint:2009:105, author = {Moni Naor and Gil Segev}, title = {Public-Key Cryptosystems Resilient to Key Leakage}, howpublished = {Cryptology ePrint Archive, Report 2009/105}, year = {2009}, url = {http://eprint.iacr.org/2009/105}, } @misc{cryptoeprint:2009:106, author = {Yu Sasaki}, title = {A Collision Attack on AURORA-512}, howpublished = {Cryptology ePrint Archive, Report 2009/106}, year = {2009}, url = {http://eprint.iacr.org/2009/106}, } @misc{cryptoeprint:2009:107, author = {Mira Belenkiy and Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya}, title = {Compact E-Cash and Simulatable VRFs Revisited}, howpublished = {Cryptology ePrint Archive, Report 2009/107}, year = {2009}, url = {http://eprint.iacr.org/2009/107}, } @misc{cryptoeprint:2009:108, author = {Santanu Sarkar and Subhamoy Maitra}, title = {Further Results on Implicit Factoring in Polynomial Time}, howpublished = {Cryptology ePrint Archive, Report 2009/108}, year = {2009}, url = {http://eprint.iacr.org/2009/108}, } @misc{cryptoeprint:2009:109, author = {Haina Zhang and Xiaoyun Wang}, title = {Cryptanalysis of Stream Cipher Grain Family}, howpublished = {Cryptology ePrint Archive, Report 2009/109}, year = {2009}, url = {http://eprint.iacr.org/2009/109}, } @misc{cryptoeprint:2009:110, author = {Haina Zhang and Xiaoyun Wang}, title = {On the Security of Stream Cipher CryptMT v3}, howpublished = {Cryptology ePrint Archive, Report 2009/110}, year = {2009}, url = {http://eprint.iacr.org/2009/110}, } @misc{cryptoeprint:2009:111, author = {Marc Stevens and Alex Sotirov and Jake Appelbaum and Arjen Lenstra and David Molnar and Dag Arne Osvik and Benne de Weger}, title = {Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate}, howpublished = {Cryptology ePrint Archive, Report 2009/111}, year = {2009}, url = {http://eprint.iacr.org/2009/111}, } @misc{cryptoeprint:2009:112, author = {Yu Sasaki}, title = {A 2nd-Preimage Attack on AURORA-512}, howpublished = {Cryptology ePrint Archive, Report 2009/112}, year = {2009}, url = {http://eprint.iacr.org/2009/112}, } @misc{cryptoeprint:2009:113, author = {Niels Ferguson and Stefan Lucks}, title = {Attacks on AURORA-512 and the Double-Mix Merkle-Damgaard Transform}, howpublished = {Cryptology ePrint Archive, Report 2009/113}, year = {2009}, url = {http://eprint.iacr.org/2009/113}, } @misc{cryptoeprint:2009:114, author = {Anupam Pattanayak and B. Majhi}, title = {Weakness of Key Predistribution Scheme Proposed by J. Dong et al.}, howpublished = {Cryptology ePrint Archive, Report 2009/114}, year = {2009}, url = {http://eprint.iacr.org/2009/114}, } @misc{cryptoeprint:2009:115, author = {Sree Vivek S and Sharmila Deva Selvi S and Deepanshu Shukla and Pandu Rangan C}, title = {Scalable Compilers for Tree Based Key Establishment - Two/Three Party to Group}, howpublished = {Cryptology ePrint Archive, Report 2009/115}, year = {2009}, url = {http://eprint.iacr.org/2009/115}, } @misc{cryptoeprint:2009:116, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, title = {Unconditionally Secure Multiparty Set Intersection Re-Visited}, howpublished = {Cryptology ePrint Archive, Report 2009/116}, year = {2009}, url = {http://eprint.iacr.org/2009/116}, } @misc{cryptoeprint:2009:117, author = {Alexander Rostovtsev}, title = {Changing probabilities of differentials and linear sums via isomorphisms of ciphers}, howpublished = {Cryptology ePrint Archive, Report 2009/117}, year = {2009}, url = {http://eprint.iacr.org/2009/117}, } @misc{cryptoeprint:2009:118, author = {Jin Li and Kui Ren and Kwangjo Kim}, title = {A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control}, howpublished = {Cryptology ePrint Archive, Report 2009/118}, year = {2009}, url = {http://eprint.iacr.org/2009/118}, } @misc{cryptoeprint:2009:119, author = {Marcel Medwed}, title = {A Continuous Fault Countermeasure for AES Providing a Constant Error Detection Rate}, howpublished = {Cryptology ePrint Archive, Report 2009/119}, year = {2009}, url = {http://eprint.iacr.org/2009/119}, } @misc{cryptoeprint:2009:120, author = {Danilo Gligoroski and Rune Steinsmo \O deg\aa rd}, title = {On the Complexity of Khovratovich et.al's Preimage Attack on Edon-R}, howpublished = {Cryptology ePrint Archive, Report 2009/120}, year = {2009}, url = {http://eprint.iacr.org/2009/120}, } @misc{cryptoeprint:2009:121, author = {Mart\'{i}n Augusto Gagliotti Vigil and Ricardo Felipe Cust\'{o}dio and Nelson da Silva and Ricardo Moraes}, title = {Optimized Public Key Infrastructure -- A PKI to Support Efficient Document's Signatures}, howpublished = {Cryptology ePrint Archive, Report 2009/121}, year = {2009}, url = {http://eprint.iacr.org/2009/121}, } @misc{cryptoeprint:2009:122, author = {Jean-Luc Beuchat and Jérémie Detrey and Nicolas Estibals and Eiji Okamoto and Francisco Rodríguez-Henríquez}, title = {Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers}, howpublished = {Cryptology ePrint Archive, Report 2009/122}, year = {2009}, url = {http://eprint.iacr.org/2009/122}, } @misc{cryptoeprint:2009:123, author = {N. A. Carella, CUNY, N.Y.}, title = {On the Complexity of Integer Factorization}, howpublished = {Cryptology ePrint Archive, Report 2009/123}, year = {2009}, url = {http://eprint.iacr.org/2009/123}, } @misc{cryptoeprint:2009:124, author = {Annika Paus and Ahmad-Reza Sadeghi and Thomas Schneider}, title = {Practical Secure Evaluation of Semi-Private Functions}, howpublished = {Cryptology ePrint Archive, Report 2009/124}, year = {2009}, url = {http://eprint.iacr.org/2009/124}, } @misc{cryptoeprint:2009:125, author = {Yu Sasaki}, title = {A Full Key Recovery Attack on HMAC-AURORA-512}, howpublished = {Cryptology ePrint Archive, Report 2009/125}, year = {2009}, url = {http://eprint.iacr.org/2009/125}, } @misc{cryptoeprint:2009:126, author = {Siamak F Shahandashti and Reihaneh Safavi-Naini}, title = {Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems}, howpublished = {Cryptology ePrint Archive, Report 2009/126}, year = {2009}, url = {http://eprint.iacr.org/2009/126}, } @misc{cryptoeprint:2009:127, author = {Itai Dinur and Adi Shamir}, title = {Side Channel Cube Attacks on Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2009/127}, year = {2009}, url = {http://eprint.iacr.org/2009/127}, } @misc{cryptoeprint:2009:128, author = {Lu Xiao and Gregory G. Rose}, title = {Attacks on a Lightweight Cipher Based on a Multiple Recursive Generator}, howpublished = {Cryptology ePrint Archive, Report 2009/128}, year = {2009}, url = {http://eprint.iacr.org/2009/128}, } @misc{cryptoeprint:2009:129, author = {Emilia Kasper and Peter Schwabe}, title = {Faster and Timing-Attack Resistant AES-GCM}, howpublished = {Cryptology ePrint Archive, Report 2009/129}, year = {2009}, url = {http://eprint.iacr.org/2009/129}, } @misc{cryptoeprint:2009:130, author = {Yindong Chen and Peizhong Lu}, title = {Constructions of Even-variable Boolean Function with Optimum Algebraic Immunity}, howpublished = {Cryptology ePrint Archive, Report 2009/130}, year = {2009}, url = {http://eprint.iacr.org/2009/130}, } @misc{cryptoeprint:2009:131, author = {Anupam Pattanayak and B. Majhi}, title = {Key Predistribution Schemes in Distributed Wireless Sensor Network using Combinatorial Designs Revisited}, howpublished = {Cryptology ePrint Archive, Report 2009/131}, year = {2009}, url = {http://eprint.iacr.org/2009/131}, } @misc{cryptoeprint:2009:132, author = {Yanbin Pan and Yingpu Deng}, title = {A New Lattice for Implicit Factoring}, howpublished = {Cryptology ePrint Archive, Report 2009/132}, year = {2009}, url = {http://eprint.iacr.org/2009/132}, } @misc{cryptoeprint:2009:133, author = {Jonathan Katz}, title = {Signature Schemes with Bounded Leakage Resilience}, howpublished = {Cryptology ePrint Archive, Report 2009/133}, year = {2009}, url = {http://eprint.iacr.org/2009/133}, } @misc{cryptoeprint:2009:134, author = {Yindong Chen and Peizhong Lu}, title = {A First Order Recursive Construction of Boolean Function with Optimum Algebraic Immunity}, howpublished = {Cryptology ePrint Archive, Report 2009/134}, year = {2009}, url = {http://eprint.iacr.org/2009/134}, } @misc{cryptoeprint:2009:135, author = {Gaëtan Leurent}, title = {Key Recovery Attack against Secret-prefix Edon-R}, howpublished = {Cryptology ePrint Archive, Report 2009/135}, year = {2009}, url = {http://eprint.iacr.org/2009/135}, } @misc{cryptoeprint:2009:136, author = {Yvonne Cliff and Colin Boyd and Juan Gonzalez Nieto}, title = {How to Extract and Expand Randomness: A Summary and Explanation of Existing Results}, howpublished = {Cryptology ePrint Archive, Report 2009/136}, year = {2009}, url = {http://eprint.iacr.org/2009/136}, } @misc{cryptoeprint:2009:137, author = {Nicolas T. Courtois}, title = {The Dark Side of Security by Obscurity and Cloning MiFare Classic Rail and Building Passes Anywhere, Anytime}, howpublished = {Cryptology ePrint Archive, Report 2009/137}, year = {2009}, url = {http://eprint.iacr.org/2009/137}, } @misc{cryptoeprint:2009:138, author = {Jen-Chun Chang and Hsin-Lung Wu}, title = {A Hybrid RFID Protocol against Tracking Attacks}, howpublished = {Cryptology ePrint Archive, Report 2009/138}, year = {2009}, url = {http://eprint.iacr.org/2009/138}, } @misc{cryptoeprint:2009:139, author = {Chunbo Ma and Jun Ao}, title = {Certificateless Group Oriented Signature Secure Against Key Replacement Attack}, howpublished = {Cryptology ePrint Archive, Report 2009/139}, year = {2009}, url = {http://eprint.iacr.org/2009/139}, } @misc{cryptoeprint:2009:140, author = {Mohamed Abo El-Fotouh and Klaus Diepold}, title = {The Analysis of Galois Substitution Counter Mode (GSCM)}, howpublished = {Cryptology ePrint Archive, Report 2009/140}, year = {2009}, url = {http://eprint.iacr.org/2009/140}, } @misc{cryptoeprint:2009:141, author = {Oriol Farras and Carles Padro}, title = {Ideal Hierarchical Secret Sharing Schemes}, howpublished = {Cryptology ePrint Archive, Report 2009/141}, year = {2009}, url = {http://eprint.iacr.org/2009/141}, } @misc{cryptoeprint:2009:142, author = {Ronald Cramer and Dennis Hofheinz and Eike Kiltz}, title = {Chosen-ciphertext Secure Encryption from Hard Algebraic Set Systems}, howpublished = {Cryptology ePrint Archive, Report 2009/142}, year = {2009}, url = {http://eprint.iacr.org/2009/142}, } @misc{cryptoeprint:2009:143, author = {Soyoung Park and Sang-Ho Lee and Joohan Lee}, title = {Multiple and Unlinkable Public Key Encryption without Certificates}, howpublished = {Cryptology ePrint Archive, Report 2009/143}, year = {2009}, url = {http://eprint.iacr.org/2009/143}, } @misc{cryptoeprint:2009:144, author = {S.Sharmila Deva Selvi and S.Sree Vivek and C.Pandu Rangan}, title = {On the security of Identity Based Ring Signcryption Schemes }, howpublished = {Cryptology ePrint Archive, Report 2009/144}, year = {2009}, url = {http://eprint.iacr.org/2009/144}, } @misc{cryptoeprint:2009:145, author = {Jooyoung Lee and Daesung Kwon}, title = {Security of Single-permutation-based Compression Functions}, howpublished = {Cryptology ePrint Archive, Report 2009/145}, year = {2009}, url = {http://eprint.iacr.org/2009/145}, } @misc{cryptoeprint:2009:146, author = {Georg Fuchsbauer and David Pointcheval and Damien Vergnaud}, title = {Anonymously Transferable Constant-Size E-Tickets}, howpublished = {Cryptology ePrint Archive, Report 2009/146}, year = {2009}, url = {http://eprint.iacr.org/2009/146}, } @misc{cryptoeprint:2009:147, author = {Deukjo Hong and Woo-Hwan Kim and Bonwook Koo}, title = {Preimage Attack on ARIRANG}, howpublished = {Cryptology ePrint Archive, Report 2009/147}, year = {2009}, url = {http://eprint.iacr.org/2009/147}, } @misc{cryptoeprint:2009:148, author = {Yutaka Kawai and Kazuki Yoneyama and Kazuo Ohta}, title = {Secret Handshake: Strong Anonymity Definition and Construction}, howpublished = {Cryptology ePrint Archive, Report 2009/148}, year = {2009}, url = {http://eprint.iacr.org/2009/148}, } @misc{cryptoeprint:2009:149, author = {Mike Burmester, Breno de Medeiros, Jorge Munilla, and Alberto Peinado}, title = {Secure EPC Gen2 Compliant Radio Frequency}, howpublished = {Cryptology ePrint Archive, Report 2009/149}, year = {2009}, url = {http://eprint.iacr.org/2009/149}, } @misc{cryptoeprint:2009:150, author = {Long H. Nguyen and Andrew W. Roscoe}, title = {Efficient group authentication protocols based on human interaction}, howpublished = {Cryptology ePrint Archive, Report 2009/150}, year = {2009}, url = {http://eprint.iacr.org/2009/150}, } @misc{cryptoeprint:2009:151, author = {Shaohua Zhang}, title = {Euclid's Algorithm, Guass' Elimination and Buchberger's Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2009/151}, year = {2009}, url = {http://eprint.iacr.org/2009/151}, } @misc{cryptoeprint:2009:152, author = {Michael Sirivianos}, title = {FaceTrust: Assessing the Credibility of Online Personas via Social Networks}, howpublished = {Cryptology ePrint Archive, Report 2009/152}, year = {2009}, url = {http://eprint.iacr.org/2009/152}, } @misc{cryptoeprint:2009:153, author = {Long H. Nguyen and Andrew W. Roscoe}, title = {New combinatorial bounds for universal hash functions}, howpublished = {Cryptology ePrint Archive, Report 2009/153}, year = {2009}, url = {http://eprint.iacr.org/2009/153}, } @misc{cryptoeprint:2009:154, author = {Yasufumi Hashimoto}, title = {Algorithms to solve massively under-defined systems of multivariate quadratic equations}, howpublished = {Cryptology ePrint Archive, Report 2009/154}, year = {2009}, url = {http://eprint.iacr.org/2009/154}, } @misc{cryptoeprint:2009:155, author = {Christophe Arene and Tanja Lange and Michael Naehrig and Christophe Ritzenthaler}, title = {Faster Pairing Computation}, howpublished = {Cryptology ePrint Archive, Report 2009/155}, year = {2009}, url = {http://eprint.iacr.org/2009/155}, } @misc{cryptoeprint:2009:156, author = {Anupam Pattanayak and B. Majhi}, title = {A Deterministic Approach of Merging of Blocks in Transversal Design based Key Predistribution}, howpublished = {Cryptology ePrint Archive, Report 2009/156}, year = {2009}, url = {http://eprint.iacr.org/2009/156}, } @misc{cryptoeprint:2009:157, author = {Peter Birkner and Nicolas Thériault}, title = {Efficient Halving for Genus 3 Curves over Binary Fields}, howpublished = {Cryptology ePrint Archive, Report 2009/157}, year = {2009}, url = {http://eprint.iacr.org/2009/157}, } @misc{cryptoeprint:2009:158, author = {Manoj Kumar}, title = {Security Analysis of a Proxy Signature Scheme over Braid Groups}, howpublished = {Cryptology ePrint Archive, Report 2009/158}, year = {2009}, url = {http://eprint.iacr.org/2009/158}, } @misc{cryptoeprint:2009:159, author = {Stefan Tillich}, title = {Hardware Implementation of the SHA-3 Candidate Skein}, howpublished = {Cryptology ePrint Archive, Report 2009/159}, year = {2009}, url = {http://eprint.iacr.org/2009/159}, } @misc{cryptoeprint:2009:160, author = {Joel Alwen and Yevgeniy Dodis and Daniel Wichs}, title = {Public Key Cryptography in the Bounded Retrieval Model and Security Against Side-Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2009/160}, year = {2009}, url = {http://eprint.iacr.org/2009/160}, } @misc{cryptoeprint:2009:161, author = {Yuichi Komano and Hideo Shimizu and Shinichi Kawamura}, title = {Build-in Determined Sub-key Correlation Power Analysis}, howpublished = {Cryptology ePrint Archive, Report 2009/161}, year = {2009}, url = {http://eprint.iacr.org/2009/161}, } @misc{cryptoeprint:2009:162, author = {Fagen Li and Masaaki Shirase and Tsuyoshi Takagi}, title = {Certificateless Hybrid Signcryption}, howpublished = {Cryptology ePrint Archive, Report 2009/162}, year = {2009}, url = {http://eprint.iacr.org/2009/162}, } @misc{cryptoeprint:2009:163, author = {Bjoern Grohmann}, title = {A New Key-Agreement-Protocol}, howpublished = {Cryptology ePrint Archive, Report 2009/163}, year = {2009}, url = {http://eprint.iacr.org/2009/163}, } @misc{cryptoeprint:2009:164, author = {Jun Shao and Zhenfu Cao}, title = {CCA-Secure Proxy Re-Encryption without Pairings}, howpublished = {Cryptology ePrint Archive, Report 2009/164}, year = {2009}, url = {http://eprint.iacr.org/2009/164}, } @misc{cryptoeprint:2009:165, author = {Matthieu Rivain}, title = {Securing RSA against Fault Analysis by Double Addition Chain Exponentiation}, howpublished = {Cryptology ePrint Archive, Report 2009/165}, year = {2009}, url = {http://eprint.iacr.org/2009/165}, } @misc{cryptoeprint:2009:166, author = {Valerie Nachef and Jacques Patarin}, title = {I shall love you up to the death}, howpublished = {Cryptology ePrint Archive, Report 2009/166}, year = {2009}, url = {http://eprint.iacr.org/2009/166}, } @misc{cryptoeprint:2009:167, author = {François Arnault and Thierry Berger and Cédric Lauradoux and Marine Minier and Benjamin Pousse}, title = {A new approach for FCSRs}, howpublished = {Cryptology ePrint Archive, Report 2009/167}, year = {2009}, url = {http://eprint.iacr.org/2009/167}, } @misc{cryptoeprint:2009:168, author = {Michael A. Halcrow and Niels Ferguson}, title = {A Second Pre-image Attack Against Elliptic Curve Only Hash (ECOH)}, howpublished = {Cryptology ePrint Archive, Report 2009/168}, year = {2009}, url = {http://eprint.iacr.org/2009/168}, } @misc{cryptoeprint:2009:169, author = {Hu Yupu and Gao Juntao and Liu Qing}, title = {Floating Fault analysis of Trivium under Weaker Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2009/169}, year = {2009}, url = {http://eprint.iacr.org/2009/169}, } @misc{cryptoeprint:2009:170, author = {Mohammad Reza Reyhanitabar and Willy Susilo and Yi Mu}, title = {Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders}, howpublished = {Cryptology ePrint Archive, Report 2009/170}, year = {2009}, url = {http://eprint.iacr.org/2009/170}, } @misc{cryptoeprint:2009:171, author = {Ivan Damgård and Gert Læssøe Mikkelsen }, title = {On the Theory and Practice of Personal Digital Signatures}, howpublished = {Cryptology ePrint Archive, Report 2009/171}, year = {2009}, url = {http://eprint.iacr.org/2009/171}, } @misc{cryptoeprint:2009:172, author = {Bjoern Grohmann}, title = {A new Protocol for 1-2 Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2009/172}, year = {2009}, url = {http://eprint.iacr.org/2009/172}, } @misc{cryptoeprint:2009:173, author = {Patrick Longa and Catherine Gebotys}, title = {Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication}, howpublished = {Cryptology ePrint Archive, Report 2009/173}, year = {2009}, url = {http://eprint.iacr.org/2009/173}, } @misc{cryptoeprint:2009:174, author = {Dario Fiore and Rosario Gennaro}, title = {Making the Diffie-Hellman Protocol Identity-Based}, howpublished = {Cryptology ePrint Archive, Report 2009/174}, year = {2009}, url = {http://eprint.iacr.org/2009/174}, } @misc{cryptoeprint:2009:175, author = {Stefan Lucks and Erik Zenner and Andre Weimerskirch and Dirk Westhoff}, title = {Concrete Security for Entity Recognition: The Jane Doe Protocol (Full Paper)}, howpublished = {Cryptology ePrint Archive, Report 2009/175}, year = {2009}, url = {http://eprint.iacr.org/2009/175}, } @misc{cryptoeprint:2009:176, author = {Yalin Chen, Chun-Hui Huang, *Jue-Sam Chou}, title = {A novel multi-server authentication protocol}, howpublished = {Cryptology ePrint Archive, Report 2009/176}, year = {2009}, url = {http://eprint.iacr.org/2009/176}, } @misc{cryptoeprint:2009:177, author = {Yevgeniy Dodis and Thomas Ristenpart and Thomas Shrimpton}, title = {Salvaging Merkle-Damgard for Practical Applications}, howpublished = {Cryptology ePrint Archive, Report 2009/177}, year = {2009}, url = {http://eprint.iacr.org/2009/177}, } @misc{cryptoeprint:2009:178, author = {Jiali Choy and Guanhan Chew and Khoongming Khoo and Huihui Yap}, title = {Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure}, howpublished = {Cryptology ePrint Archive, Report 2009/178}, year = {2009}, url = {http://eprint.iacr.org/2009/178}, } @misc{cryptoeprint:2009:179, author = {Hongbo Yu and Xiaoyun Wang}, title = {Near-Collision Attack on the Compression Function of Dynamic SHA2}, howpublished = {Cryptology ePrint Archive, Report 2009/179}, year = {2009}, url = {http://eprint.iacr.org/2009/179}, } @misc{cryptoeprint:2009:180, author = {Haakon Ringberg and Benny Applebaum and Michael J. Freedman and Matthew Caesar and Jennifer Rexford}, title = {Collaborative, Privacy-Preserving Data Aggregation at Scale}, howpublished = {Cryptology ePrint Archive, Report 2009/180}, year = {2009}, url = {http://eprint.iacr.org/2009/180}, } @misc{cryptoeprint:2009:181, author = {Erik-Oliver Blass and Anil Kurmus and Refik Molva and Thorsten Strufe}, title = {PSP: Private and Secure Payment with RFID}, howpublished = {Cryptology ePrint Archive, Report 2009/181}, year = {2009}, url = {http://eprint.iacr.org/2009/181}, } @misc{cryptoeprint:2009:182, author = {Mohamed Abo El-Fotouh, Klaus Diepold}, title = {Extended Substitution Cipher Chaining mode (ESCC)}, howpublished = {Cryptology ePrint Archive, Report 2009/182}, year = {2009}, url = {http://eprint.iacr.org/2009/182}, } @misc{cryptoeprint:2009:183, author = {Rune Thorbek}, title = {Proactive Linear Integer Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2009/183}, year = {2009}, url = {http://eprint.iacr.org/2009/183}, } @misc{cryptoeprint:2009:184, author = {Jean-Philippe Aumasson and Orr Dunkelman and Sebastiaan Indesteege and Bart Preneel}, title = {Cryptanalysis of Dynamic SHA(2) }, howpublished = {Cryptology ePrint Archive, Report 2009/184}, year = {2009}, url = {http://eprint.iacr.org/2009/184}, } @misc{cryptoeprint:2009:185, author = {Robert P. McEvoy and Michael Tunstall and Claire Whelan and Colin C. Murphy and William P. Marnane}, title = {All-or-Nothing Transforms as a Countermeasure to Differential Side-Channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2009/185}, year = {2009}, url = {http://eprint.iacr.org/2009/185}, } @misc{cryptoeprint:2009:186, author = {Nicolas T. Courtois and Gregory V. Bard and Shaun V. Ault}, title = {Statistics of Random Permutations and the Cryptanalysis of Periodic Block Ciphers }, howpublished = {Cryptology ePrint Archive, Report 2009/186}, year = {2009}, url = {http://eprint.iacr.org/2009/186}, } @misc{cryptoeprint:2009:187, author = {Rafael Misoczki and Paulo S. L. M. Barreto}, title = {Compact McEliece Keys from Goppa Codes}, howpublished = {Cryptology ePrint Archive, Report 2009/187}, year = {2009}, url = {http://eprint.iacr.org/2009/187}, } @misc{cryptoeprint:2009:188, author = {S.Sree Vivek and S.Sharmila Deva Selvi and C.Pandu Rangan}, title = {Breaking and Building of Group Inside Signature}, howpublished = {Cryptology ePrint Archive, Report 2009/188}, year = {2009}, url = {http://eprint.iacr.org/2009/188}, } @misc{cryptoeprint:2009:189, author = {Jian Weng and Sherman S.M. Chow and Yanjiang Yang and Robert H. Deng}, title = {Efficient Unidirectional Proxy Re-Encryption}, howpublished = {Cryptology ePrint Archive, Report 2009/189}, year = {2009}, url = {http://eprint.iacr.org/2009/189}, } @misc{cryptoeprint:2009:190, author = {Ayan Mahalanobis}, title = {The discrete logarithm problem in the group of non-singular circulant matrices}, howpublished = {Cryptology ePrint Archive, Report 2009/190}, year = {2009}, url = {http://eprint.iacr.org/2009/190}, } @misc{cryptoeprint:2009:191, author = {Joan Boyar and Rene Peralta}, title = {New logic minimization techniques with applications to cryptology.}, howpublished = {Cryptology ePrint Archive, Report 2009/191}, year = {2009}, url = {http://eprint.iacr.org/2009/191}, } @misc{cryptoeprint:2009:192, author = {Manoj Kumar}, title = {Linkability of Blind Signature Schemes over Braid Groups}, howpublished = {Cryptology ePrint Archive, Report 2009/192}, year = {2009}, url = {http://eprint.iacr.org/2009/192}, } @misc{cryptoeprint:2009:193, author = {Sunder Lal and Prashant Kushwah}, title = {Generalization of Barreto et al ID based Signcryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2009/193}, year = {2009}, url = {http://eprint.iacr.org/2009/193}, } @misc{cryptoeprint:2009:194, author = {Mingwu Zhang and Yusheng Zhong and Pengcheng Li and Bo Yang}, title = {Analysis and Enhance of Anonymous Signcryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2009/194}, year = {2009}, url = {http://eprint.iacr.org/2009/194}, } @misc{cryptoeprint:2009:195, author = {Mauro Barni and Pierluigi Failla and Vladimir Kolesnikov and Riccardo Lazzeretti and Ahmad-Reza Sadeghi and Thomas Schneider}, title = {Secure Evaluation of Private Linear Branching Programs with Medical Applications}, howpublished = {Cryptology ePrint Archive, Report 2009/195}, year = {2009}, url = {http://eprint.iacr.org/2009/195}, } @misc{cryptoeprint:2009:196, author = {Zhengjun Cao}, title = {Analysis of one quantum bit string commitment}, howpublished = {Cryptology ePrint Archive, Report 2009/196}, year = {2009}, url = {http://eprint.iacr.org/2009/196}, } @misc{cryptoeprint:2009:197, author = {Jian Guo and Krystian Matusiewicz and Lars R. Knudsen and San Ling and Huaxiong Wang}, title = {Practical pseudo-collisions for hash functions ARIRANG-224/384}, howpublished = {Cryptology ePrint Archive, Report 2009/197}, year = {2009}, url = {http://eprint.iacr.org/2009/197}, } @misc{cryptoeprint:2009:198, author = {L Chen and P. Morrissey and N.P. Smart}, title = {DAA: Fixing the pairing based protocols}, howpublished = {Cryptology ePrint Archive, Report 2009/198}, year = {2009}, url = {http://eprint.iacr.org/2009/198}, } @misc{cryptoeprint:2009:199, author = {Emmanuel Bresson and Anne Canteaut and Benoit Chevallier-Mames and Christophe Clavier and Thomas Fuhr and Aline Gouget and Thomas Icart and Jean-Francois Misarsky and Maria Naya-Plasencia and Pascal Paillier and Thomas Pornin and Jean-Rene Reinhard and Celine Thuillet and Marion Videau}, title = {Indifferentiability with Distinguishers: Why Shabal\Does Not Require Ideal Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2009/199}, year = {2009}, url = {http://eprint.iacr.org/2009/199}, } @misc{cryptoeprint:2009:200, author = {Rishab Nithyanand}, title = {The Evolution of Cryptographic Protocols in Electronic Passports}, howpublished = {Cryptology ePrint Archive, Report 2009/200}, year = {2009}, url = {http://eprint.iacr.org/2009/200}, } @misc{cryptoeprint:2009:201, author = {Mohamed Abo El-Fotouh and Klaus Diepold}, title = {Enhanced Cryptanalysis of Substitution Cipher Chaining mode (SCC-128)}, howpublished = {Cryptology ePrint Archive, Report 2009/201}, year = {2009}, url = {http://eprint.iacr.org/2009/201}, } @misc{cryptoeprint:2009:202, author = {Alawi A. Al-Saggaf and Acharya H. S.}, title = {A GENERALIZED FRAMEWORK FOR CRISP COMMITMENT SCHEMES}, howpublished = {Cryptology ePrint Archive, Report 2009/202}, year = {2009}, url = {http://eprint.iacr.org/2009/202}, } @misc{cryptoeprint:2009:203, author = {Jean-Sebastien Coron and David Naccache and Mehdi Tibouchi and Ralf-Philipp Weinmann}, title = {Practical Cryptanalysis of ISO/IEC 9796-2 and EMV Signatures}, howpublished = {Cryptology ePrint Archive, Report 2009/203}, year = {2009}, url = {http://eprint.iacr.org/2009/203}, } @misc{cryptoeprint:2009:204, author = {TIAN Yuan}, title = {GUC-Secure Join Operator in Distributed Relational Database}, howpublished = {Cryptology ePrint Archive, Report 2009/204}, year = {2009}, url = {http://eprint.iacr.org/2009/204}, } @misc{cryptoeprint:2009:205, author = {Maria Isabel Gonzalez Vasco and Angel L. Perez del Pozo}, title = {Related Message Attacks to Public Key Encryption Schemes: Relations among Security Notions}, howpublished = {Cryptology ePrint Archive, Report 2009/205}, year = {2009}, url = {http://eprint.iacr.org/2009/205}, } @misc{cryptoeprint:2009:206, author = {Bernhard Jungk, Steffen Reith, Juergen Apfelbeck}, title = {On Optimized FPGA Implementations of the SHA-3 Candidate Groestl}, howpublished = {Cryptology ePrint Archive, Report 2009/206}, year = {2009}, url = {http://eprint.iacr.org/2009/206}, } @misc{cryptoeprint:2009:207, author = {Mehrdad Nojoumian and Douglas R. Stinson and Morgan Grainger}, title = {An Unconditionally Secure Social Secret Sharing Scheme}, howpublished = {Cryptology ePrint Archive, Report 2009/207}, year = {2009}, url = {http://eprint.iacr.org/2009/207}, } @misc{cryptoeprint:2009:208, author = {Rajesh P Singh and B.K.Sarma and A.Saikia}, title = {PUBLIC KEY CRYPTOGRAPHY USING PERMUTATION P-POLYNOMIALS OVER FINITE FIELDS}, howpublished = {Cryptology ePrint Archive, Report 2009/208}, year = {2009}, url = {http://eprint.iacr.org/2009/208}, } @misc{cryptoeprint:2009:209, author = {Jia Xu}, title = {On Directed Transitive Signature}, howpublished = {Cryptology ePrint Archive, Report 2009/209}, year = {2009}, url = {http://eprint.iacr.org/2009/209}, } @misc{cryptoeprint:2009:210, author = {Guido Bertoni and Joan Daemen and Michael Peeters and Gilles Van Assche}, title = {Sufficient conditions for sound tree hashing modes}, howpublished = {Cryptology ePrint Archive, Report 2009/210}, year = {2009}, url = {http://eprint.iacr.org/2009/210}, } @misc{cryptoeprint:2009:211, author = {Endre Bangerter and Stefania Barzan and Stephan Krenn and Ahmad-Reza Sadeghi and Thomas Schneider and Joe-Kai Tsay}, title = {Bringing Zero-Knowledge Proofs of Knowledge to Practive}, howpublished = {Cryptology ePrint Archive, Report 2009/211}, year = {2009}, url = {http://eprint.iacr.org/2009/211}, } @misc{cryptoeprint:2009:212, author = {Mike Burmester and Jorge Munilla}, title = {A Flyweight RFID Authentication Protocol}, howpublished = {Cryptology ePrint Archive, Report 2009/212}, year = {2009}, url = {http://eprint.iacr.org/2009/212}, } @misc{cryptoeprint:2009:213, author = {Richard Moloney and Gary McGuire and Michael Markowitz}, title = {Elliptic Curves in Montgomery Form with B=1 and Their Low Order Torsion}, howpublished = {Cryptology ePrint Archive, Report 2009/213}, year = {2009}, url = {http://eprint.iacr.org/2009/213}, } @misc{cryptoeprint:2009:214, author = {Tal Moran and Moni Naor and Gil Segev}, title = {An Optimally Fair Coin Toss}, howpublished = {Cryptology ePrint Archive, Report 2009/214}, year = {2009}, url = {http://eprint.iacr.org/2009/214}, } @misc{cryptoeprint:2009:215, author = {Palash Sarkar}, title = {A Simple and Generic Construction of Authenticated Encryption With Associated Data}, howpublished = {Cryptology ePrint Archive, Report 2009/215}, year = {2009}, url = {http://eprint.iacr.org/2009/215}, } @misc{cryptoeprint:2009:216, author = {Palash Sarkar}, title = {Tweakable Enciphering Schemes Using Only the Encryption Function of a Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2009/216}, year = {2009}, url = {http://eprint.iacr.org/2009/216}, } @misc{cryptoeprint:2009:217, author = {Palash Sarkar}, title = {New Parallelizable Schemes for Message Authentication Using Pseudorandom Functions}, howpublished = {Cryptology ePrint Archive, Report 2009/217}, year = {2009}, url = {http://eprint.iacr.org/2009/217}, } @misc{cryptoeprint:2009:218, author = {Jean-Philippe Aumasson and Itai Dinur and Luca Henzen and Willi Meier and Adi Shamir}, title = {Efficient FPGA Implementations of High-Dimensional Cube Testers on the Stream Cipher Grain-128}, howpublished = {Cryptology ePrint Archive, Report 2009/218}, year = {2009}, url = {http://eprint.iacr.org/2009/218}, } @misc{cryptoeprint:2009:219, author = {Georg Lippold and Colin Boyd and Juan Gonz\'{a}lez Nieto}, title = {Strongly Secure Certificateless Key Agreement}, howpublished = {Cryptology ePrint Archive, Report 2009/219}, year = {2009}, url = {http://eprint.iacr.org/2009/219}, } @misc{cryptoeprint:2009:220, author = {Jonathan Katz}, title = {Signature Schemes with Bounded Leakage Resilience}, howpublished = {Cryptology ePrint Archive, Report 2009/220}, year = {2009}, url = {http://eprint.iacr.org/2009/220}, } @misc{cryptoeprint:2009:221, author = {David Jao and Kayo Yoshida}, title = {Boneh-Boyen signatures and the Strong Diffie-Hellman problem}, howpublished = {Cryptology ePrint Archive, Report 2009/221}, year = {2009}, url = {http://eprint.iacr.org/2009/221}, } @misc{cryptoeprint:2009:222, author = {Willi Geiselmann and Kenneth Matheis and Rainer Steinwandt}, title = {PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware}, howpublished = {Cryptology ePrint Archive, Report 2009/222}, year = {2009}, url = {http://eprint.iacr.org/2009/222}, } @misc{cryptoeprint:2009:223, author = {Tao Xie and Dengguo Feng}, title = {How To Find Weak Input Differences For MD5 Collision Attacks}, howpublished = {Cryptology ePrint Archive, Report 2009/223}, year = {2009}, url = {http://eprint.iacr.org/2009/223}, } @misc{cryptoeprint:2009:224, author = {Keting Jia}, title = {Pseudo-Collision, Pseudo-Preimage and Pseudo-Second-Preimage Attacks on Luffa}, howpublished = {Cryptology ePrint Archive, Report 2009/224}, year = {2009}, url = {http://eprint.iacr.org/2009/224}, } @misc{cryptoeprint:2009:225, author = {Jooyoung Lee and Daesung Kwon}, title = {The Security of Abreast-DM in the Ideal Cipher Model}, howpublished = {Cryptology ePrint Archive, Report 2009/225}, year = {2009}, url = {http://eprint.iacr.org/2009/225}, } @misc{cryptoeprint:2009:226, author = {Thomas Icart}, title = {How to Hash into Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2009/226}, year = {2009}, url = {http://eprint.iacr.org/2009/226}, } @misc{cryptoeprint:2009:227, author = {Daniele Micciancio}, title = {Computational soundness, co-induction, and encryption cycles}, howpublished = {Cryptology ePrint Archive, Report 2009/227}, year = {2009}, url = {http://eprint.iacr.org/2009/227}, } @misc{cryptoeprint:2009:228, author = {Benedikt Gierlichs and Lejla Batina and Bart Preneel and Ingrid Verbauwhede}, title = {Revisiting Higher-Order DPA Attacks: Multivariate Mutual Information Analysis}, howpublished = {Cryptology ePrint Archive, Report 2009/228}, year = {2009}, url = {http://eprint.iacr.org/2009/228}, } @misc{cryptoeprint:2009:229, author = {Giacomo de Meulenaer and Christophe Petit and Jean-Jacques Quisquater}, title = {Hardware Implementations of a Variant of the Zémor-Tillich Hash Function: Can a Provably Secure Hash Function be very efficient ?}, howpublished = {Cryptology ePrint Archive, Report 2009/229}, year = {2009}, url = {http://eprint.iacr.org/2009/229}, } @misc{cryptoeprint:2009:230, author = {Martin Hirt and Vassilis Zikas}, title = {Adaptively Secure Broadcast}, howpublished = {Cryptology ePrint Archive, Report 2009/230}, year = {2009}, url = {http://eprint.iacr.org/2009/230}, } @misc{cryptoeprint:2009:231, author = {Elke De Mulder \and Benedikt Gierlichs \and Bart Preneel \and Ingrid Verbauwhede}, title = {Practical DPA Attacks on MDPL}, howpublished = {Cryptology ePrint Archive, Report 2009/231}, year = {2009}, url = {http://eprint.iacr.org/2009/231}, } @misc{cryptoeprint:2009:232, author = {Björn Fay}, title = {MeshHash2}, howpublished = {Cryptology ePrint Archive, Report 2009/232}, year = {2009}, url = {http://eprint.iacr.org/2009/232}, } @misc{cryptoeprint:2009:233, author = {Paula Bustillo and Domingo Gomez and Jaime Gutierrez and Alvar Ibeas}, title = {A strategy for recovering roots of bivariate polynomials modulo a prime}, howpublished = {Cryptology ePrint Archive, Report 2009/233}, year = {2009}, url = {http://eprint.iacr.org/2009/233}, } @misc{cryptoeprint:2009:234, author = {Rune Steinsmo \Oe deg\aa rd and Danilo Gligoroski}, title = {On the Randomness and Regularity of Reduced EDON-$\mathcal{R}$ Compression Function}, howpublished = {Cryptology ePrint Archive, Report 2009/234}, year = {2009}, url = {http://eprint.iacr.org/2009/234}, } @misc{cryptoeprint:2009:235, author = {S.Sharmila Deva Selvi and S.Sree Vivek and C.Pandu Rangan}, title = {Breaking and Fixing of an Identity Based Multi-Signcryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2009/235}, year = {2009}, url = {http://eprint.iacr.org/2009/235}, } @misc{cryptoeprint:2009:236, author = {Fumiyuki Momose and Jinhui Chao}, title = {Elliptic curves with weak coverings over cubic extensions of finite fields with odd characteristics}, howpublished = {Cryptology ePrint Archive, Report 2009/236}, year = {2009}, url = {http://eprint.iacr.org/2009/236}, } @misc{cryptoeprint:2009:237, author = {Zhengjun Cao}, title = {Remarks on One Arbitrated Quantum-signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2009/237}, year = {2009}, url = {http://eprint.iacr.org/2009/237}, } @misc{cryptoeprint:2009:238, author = {LI Ji and XU Liangyu }, title = {Attacks on Round-Reduced BLAKE}, howpublished = {Cryptology ePrint Archive, Report 2009/238}, year = {2009}, url = {http://eprint.iacr.org/2009/238}, } @misc{cryptoeprint:2009:239, author = {Julien Bringer and Herve Chabanne and Jean-Luc Danger}, title = {White-Box Cryptography to Counteract SCARE}, howpublished = {Cryptology ePrint Archive, Report 2009/239}, year = {2009}, url = {http://eprint.iacr.org/2009/239}, } @misc{cryptoeprint:2009:240, author = {Gregory M. Zaverucha and Douglas R. Stinson}, title = {Group Testing and Batch Verification}, howpublished = {Cryptology ePrint Archive, Report 2009/240}, year = {2009}, url = {http://eprint.iacr.org/2009/240}, } @misc{cryptoeprint:2009:241, author = {Alex Biryukov and Dmitry Khovratovich and Ivica Nikoli\'{c}}, title = {Distinguisher and Related-Key Attack on the Full AES-256 (Extended Version)}, howpublished = {Cryptology ePrint Archive, Report 2009/241}, year = {2009}, url = {http://eprint.iacr.org/2009/241}, } @misc{cryptoeprint:2009:242, author = {Alex Biryukov and Dmitry Khovratovich and Ivica Nikoli\'{c}}, title = {Examples of differential multicollisions for 13 and 14 rounds of AES-256}, howpublished = {Cryptology ePrint Archive, Report 2009/242}, year = {2009}, url = {http://eprint.iacr.org/2009/242}, } @misc{cryptoeprint:2009:243, author = {Craig Costello and Huseyin Hisil and Colin Boyd and Juan Manuel Gonzalez Nieto and Kenneth Koon-Ho Wong}, title = {Faster Pairings on Special Weierstrass Curves}, howpublished = {Cryptology ePrint Archive, Report 2009/243}, year = {2009}, url = {http://eprint.iacr.org/2009/243}, } @misc{cryptoeprint:2009:244, author = {Boris Skoric and Stefan Katzenbeisser and Hans Georg Schaathun and Mehmet U. Celik}, title = {Tardos Fingerprinting Codes in the Combined Digit Model}, howpublished = {Cryptology ePrint Archive, Report 2009/244}, year = {2009}, url = {http://eprint.iacr.org/2009/244}, } @misc{cryptoeprint:2009:245, author = {Naoki Ogura and Shigenori Uchiyama}, title = {Cryptanalysis of the Birational Permutation Signature Scheme over a Non-commutative Ring}, howpublished = {Cryptology ePrint Archive, Report 2009/245}, year = {2009}, url = {http://eprint.iacr.org/2009/245}, } @misc{cryptoeprint:2009:246, author = {Gy\"{o}rgy Csaba \and Xueming Ju \and Qingqing Chen \and Wolfgang Porod \and J{\"u}rgen Schmidhuber \and Ulf Schlichtmann \and Paolo Lugli \and Ulrich R{\"u}hrmair}, title = {On-Chip Electric Waves: An Analog Circuit Approach to Physical Uncloneable Functions}, howpublished = {Cryptology ePrint Archive, Report 2009/246}, year = {2009}, url = {http://eprint.iacr.org/2009/246}, } @misc{cryptoeprint:2009:247, author = {Ivan Damgård and Jesper Buus Nielsen and Claudio Orlandi}, title = {On the Necessary and Sufficient Assumptions for UC Computation}, howpublished = {Cryptology ePrint Archive, Report 2009/247}, year = {2009}, url = {http://eprint.iacr.org/2009/247}, } @misc{cryptoeprint:2009:248, author = {Simon R. Blackburn, Carlos Cid and Ciaran Mullan}, title = {Cryptanalysis of the MST_3 Public Key Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2009/248}, year = {2009}, url = {http://eprint.iacr.org/2009/248}, } @misc{cryptoeprint:2009:249, author = {Daniele Micciancio}, title = {Pseudo-randomness and partial information in symbolic security analysis}, howpublished = {Cryptology ePrint Archive, Report 2009/249}, year = {2009}, url = {http://eprint.iacr.org/2009/249}, } @misc{cryptoeprint:2009:250, author = {Mehreen Afzal and Ashraf Masood}, title = {Modifications in the Design of Trivium to Increase its Security Level}, howpublished = {Cryptology ePrint Archive, Report 2009/250}, year = {2009}, url = {http://eprint.iacr.org/2009/250}, } @misc{cryptoeprint:2009:251, author = {Mihir Bellare and Thomas Ristenpart}, title = {Format-Preserving Encryption}, howpublished = {Cryptology ePrint Archive, Report 2009/251}, year = {2009}, url = {http://eprint.iacr.org/2009/251}, } @misc{cryptoeprint:2009:252, author = {Igor Semaev}, title = {Sparse Boolean equations and circuit lattices}, howpublished = {Cryptology ePrint Archive, Report 2009/252}, year = {2009}, url = {http://eprint.iacr.org/2009/252}, } @misc{cryptoeprint:2009:253, author = {Cas J.F. Cremers}, title = {Formally and Practically Relating the CK, CK-HMQV, and eCK Security Models for Authenticated Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2009/253}, year = {2009}, url = {http://eprint.iacr.org/2009/253}, } @misc{cryptoeprint:2009:254, author = {Zhengjun Cao}, title = {Improvement of One Quantum Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2009/254}, year = {2009}, url = {http://eprint.iacr.org/2009/254}, } @misc{cryptoeprint:2009:255, author = {Ulrich Rührmair}, title = {SIMPL Systems: On a Public Key Variant of Physical Unclonable Functions}, howpublished = {Cryptology ePrint Archive, Report 2009/255}, year = {2009}, url = {http://eprint.iacr.org/2009/255}, } @misc{cryptoeprint:2009:256, author = {Zhiqiang Liu and Dawu Gu and Jing Zhang}, title = {Multiple Linear Cryptanalysis of Reduced-Round SMS4 Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2009/256}, year = {2009}, url = {http://eprint.iacr.org/2009/256}, } @misc{cryptoeprint:2009:257, author = {Ulf T. Mattsson}, title = {FORMAT CONTROLLING ENCRYPTION USING DATATYPE PRESERVING ENCRYPTION}, howpublished = {Cryptology ePrint Archive, Report 2009/257}, year = {2009}, url = {http://eprint.iacr.org/2009/257}, } @misc{cryptoeprint:2009:258, author = {Romain COSSET}, title = {FACTORIZATION WITH GENUS 2 CURVES}, howpublished = {Cryptology ePrint Archive, Report 2009/258}, year = {2009}, url = {http://eprint.iacr.org/2009/258}, } @misc{cryptoeprint:2009:259, author = {Cameron McDonald and Philip Hawkes and Josef Pieprzyk}, title = {Differential Path for SHA-1 with complexity $O(2^{52})$}, howpublished = {Cryptology ePrint Archive, Report 2009/259}, year = {2009}, url = {http://eprint.iacr.org/2009/259}, } @misc{cryptoeprint:2009:260, author = {Kota Ideguchi and Toru Owada and Hirotaka Yoshida}, title = {A Study on RAM Requirements of Various SHA-3 Candidates on Low-cost 8-bit CPUs}, howpublished = {Cryptology ePrint Archive, Report 2009/260}, year = {2009}, url = {http://eprint.iacr.org/2009/260}, } @misc{cryptoeprint:2009:261, author = {Ewan Fleischmann and Michael Gorski and Stefan Lucks}, title = {Security of Cyclic Double Block Length Hash Functions including Abreast-DM}, howpublished = {Cryptology ePrint Archive, Report 2009/261}, year = {2009}, url = {http://eprint.iacr.org/2009/261}, } @misc{cryptoeprint:2009:262, author = {Klaas Ole Kuertz and Henning Schnoor and Thomas Wilke}, title = {Computationally Secure Two-Round Authenticated Message Exchange}, howpublished = {Cryptology ePrint Archive, Report 2009/262}, year = {2009}, url = {http://eprint.iacr.org/2009/262}, } @misc{cryptoeprint:2009:263, author = {Kaoru Kurosawa}, title = {General Error Decodable Secret Sharing Scheme and Its Application}, howpublished = {Cryptology ePrint Archive, Report 2009/263}, year = {2009}, url = {http://eprint.iacr.org/2009/263}, } @misc{cryptoeprint:2009:264, author = {Shigeo Tsujii and Kohtaro Tadaki and Masahito Gotaishi and Ryo Fujita and Masao Kasahara}, title = {Proposal of PPS Multivariate Public Key Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2009/264}, year = {2009}, url = {http://eprint.iacr.org/2009/264}, } @misc{cryptoeprint:2009:265, author = {Yiyuan Luo and Zheng Gong and Ming Duan and Bo Zhu and Xuejia Lai}, title = {Revisiting the Indifferentiability of PGV Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2009/265}, year = {2009}, url = {http://eprint.iacr.org/2009/265}, } @misc{cryptoeprint:2009:266, author = {Yiyuan Luo and Xuejia Lai and Zheng Gong and Zhongming Wu}, title = {Pseudorandomness Analysis of the Lai-Massey Scheme}, howpublished = {Cryptology ePrint Archive, Report 2009/266}, year = {2009}, url = {http://eprint.iacr.org/2009/266}, } @misc{cryptoeprint:2009:267, author = {Stéphanie Delaune and Steve Kremer and Olivier Pereira}, title = {Simulation based security in the applied pi calculus}, howpublished = {Cryptology ePrint Archive, Report 2009/267}, year = {2009}, url = {http://eprint.iacr.org/2009/267}, } @misc{cryptoeprint:2009:268, author = {Mehrdad Nojoumian and Douglas R. Stinson}, title = {Dealer-Free Threshold Changeability in Secret Sharing Schemes}, howpublished = {Cryptology ePrint Archive, Report 2009/268}, year = {2009}, url = {http://eprint.iacr.org/2009/268}, } @misc{cryptoeprint:2009:269, author = {Thomas Roche and Cédric Tavernier}, title = {Multi-Linear cryptanalysis in Power Analysis Attacks: MLPA}, howpublished = {Cryptology ePrint Archive, Report 2009/269}, year = {2009}, url = {http://eprint.iacr.org/2009/269}, } @misc{cryptoeprint:2009:270, author = {Rafael Tonicelli and Rafael Dowsley and Goichiro Hanaoka and Hideki Imai and Jörn Müller-Quade and Akira Otsuka and Anderson C. A. Nascimento}, title = {Sequentially Composable Information Theoretically Secure Oblivious Polynomial Evaluation}, howpublished = {Cryptology ePrint Archive, Report 2009/270}, year = {2009}, url = {http://eprint.iacr.org/2009/270}, } @misc{cryptoeprint:2009:271, author = {Rafael Dowsley and Goichiro Hanaoka and Hideki Imai and Anderson C. A. Nascimento}, title = {Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2009/271}, year = {2009}, url = {http://eprint.iacr.org/2009/271}, } @misc{cryptoeprint:2009:272, author = {Ziran Tu and Yingpu Deng}, title = {A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity}, howpublished = {Cryptology ePrint Archive, Report 2009/272}, year = {2009}, url = {http://eprint.iacr.org/2009/272}, } @misc{cryptoeprint:2009:273, author = {Rafael Dowsley and Jörn Müller-Quade and Akira Otsuka and Goichiro Hanaoka and Hideki Imai and Anderson C. A. Nascimento}, title = {Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data}, howpublished = {Cryptology ePrint Archive, Report 2009/273}, year = {2009}, url = {http://eprint.iacr.org/2009/273}, } @misc{cryptoeprint:2009:274, author = {Xigen.Yao}, title = {A Collision-resistance Hash Function DIHA2}, howpublished = {Cryptology ePrint Archive, Report 2009/274}, year = {2009}, url = {http://eprint.iacr.org/2009/274}, } @misc{cryptoeprint:2009:275, author = {Thomas Dullien}, title = {Algebraic Attacks specialized to \(\mathbb{F}_2\) (Diplomarbeit)}, howpublished = {Cryptology ePrint Archive, Report 2009/275}, year = {2009}, url = {http://eprint.iacr.org/2009/275}, } @misc{cryptoeprint:2009:276, author = {Jean-Luc Beuchat and Emmanuel López-Trejo and Luis Martínez-Ramos and Shigeo Mitsunari and Francisco Rodríguez-Henríquez}, title = {Multicore Implementation of the Tate Pairing over Supersingular Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2009/276}, year = {2009}, url = {http://eprint.iacr.org/2009/276}, } @misc{cryptoeprint:2009:277, author = {Ulrich Rührmair and Jan Sölter and Frank Sehnke}, title = {On the Foundations of Physical Unclonable Functions}, howpublished = {Cryptology ePrint Archive, Report 2009/277}, year = {2009}, url = {http://eprint.iacr.org/2009/277}, } @misc{cryptoeprint:2009:278, author = {Ulrich Rührmair Qingqing Chen Paolo Lugli Ulf Schlichtmann Martin Stutzmann György Csaba}, title = {Towards Electrical, Integrated Implementations of SIMPL Systems}, howpublished = {Cryptology ePrint Archive, Report 2009/278}, year = {2009}, url = {http://eprint.iacr.org/2009/278}, } @misc{cryptoeprint:2009:279, author = {Mathieu Renauld and Francois-Xavier Standaert}, title = {Algebraic Side-Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2009/279}, year = {2009}, url = {http://eprint.iacr.org/2009/279}, } @misc{cryptoeprint:2009:280, author = {Giuseppe Ateniese and Paolo Gasti}, title = {Universally Anonymous IBE based on the Quadratic Residuosity Assumption}, howpublished = {Cryptology ePrint Archive, Report 2009/280}, year = {2009}, url = {http://eprint.iacr.org/2009/280}, } @misc{cryptoeprint:2009:281, author = {Qian Wang and Cong Wang and Jin Li and Kui Ren and Wenjing Lou}, title = {Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing}, howpublished = {Cryptology ePrint Archive, Report 2009/281}, year = {2009}, url = {http://eprint.iacr.org/2009/281}, } @misc{cryptoeprint:2009:282, author = {Sebastian Faust and Eike Kiltz and Krzysztof Pietrzak and Guy Rothblum}, title = {Leakage-Resilient Signatures}, howpublished = {Cryptology ePrint Archive, Report 2009/282}, year = {2009}, url = {http://eprint.iacr.org/2009/282}, } @misc{cryptoeprint:2009:283, author = {Susan Hohenberger and Brent Waters}, title = {Short and Stateless Signatures from the RSA Assumption}, howpublished = {Cryptology ePrint Archive, Report 2009/283}, year = {2009}, url = {http://eprint.iacr.org/2009/283}, } @misc{cryptoeprint:2009:284, author = {Jin Li, Kui Ren, Bo Zhu, and Zhiguo Wan}, title = {Privacy-aware Attribute-based Encryption with User Accountability}, howpublished = {Cryptology ePrint Archive, Report 2009/284}, year = {2009}, url = {http://eprint.iacr.org/2009/284}, } @misc{cryptoeprint:2009:285, author = {Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, Keita Xagawa}, title = {Efficient Public Key Encryption Based on Ideal Lattices}, howpublished = {Cryptology ePrint Archive, Report 2009/285}, year = {2009}, url = {http://eprint.iacr.org/2009/285}, } @misc{cryptoeprint:2009:286, author = {Paulo Mateus and Serge Vaudenay}, title = {On Privacy Losses in the Trusted Agent Model (Abstract)}, howpublished = {Cryptology ePrint Archive, Report 2009/286}, year = {2009}, url = {http://eprint.iacr.org/2009/286}, } @misc{cryptoeprint:2009:287, author = {Valerie Nachef}, title = {Generic Attacks on Alternating Unbalanced Feistel Schemes}, howpublished = {Cryptology ePrint Archive, Report 2009/287}, year = {2009}, url = {http://eprint.iacr.org/2009/287}, } @misc{cryptoeprint:2009:288, author = {Jiang Wu and Berkant Ustaoglu}, title = {Efficient Key Exchange with Tight Security Reduction}, howpublished = {Cryptology ePrint Archive, Report 2009/288}, year = {2009}, url = {http://eprint.iacr.org/2009/288}, } @misc{cryptoeprint:2009:289, author = {Erik Zenner}, title = {Analysis of the End-by-Hop Protocol for Secure Aggregation in Sensor Networks}, howpublished = {Cryptology ePrint Archive, Report 2009/289}, year = {2009}, url = {http://eprint.iacr.org/2009/289}, } @misc{cryptoeprint:2009:290, author = {S.Sharmila Deva Selvi and S.Sree Vivek and J.Shriram and S.Kalaivani and C.Pandu Rangan}, title = {Security Analysis of Aggregate signature and Batch verification signature schemes}, howpublished = {Cryptology ePrint Archive, Report 2009/290}, year = {2009}, url = {http://eprint.iacr.org/2009/290}, } @misc{cryptoeprint:2009:291, author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz\'alez Nieto}, title = {Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols}, howpublished = {Cryptology ePrint Archive, Report 2009/291}, year = {2009}, url = {http://eprint.iacr.org/2009/291}, } @misc{cryptoeprint:2009:292, author = {Daniel J. Bernstein and Tanja Lange and Christiane Peters and Ruben Niederhagen and Peter Schwabe}, title = {Implementing Wagner's generalized birthday attack against the SHA-3 candidate FSB }, howpublished = {Cryptology ePrint Archive, Report 2009/292}, year = {2009}, url = {http://eprint.iacr.org/2009/292}, } @misc{cryptoeprint:2009:293, author = {Jin Li and Qian Wang and Cong Wang and Kui Ren}, title = {Enhancing Attribute-based Encryption with Attribute Hierarchy}, howpublished = {Cryptology ePrint Archive, Report 2009/293}, year = {2009}, url = {http://eprint.iacr.org/2009/293}, } @misc{cryptoeprint:2009:294, author = {Roman Schlegel and Duncan S. Wong}, title = {Low Latency High Bandwidth Anonymous Overlay Network with Anonymous Routing}, howpublished = {Cryptology ePrint Archive, Report 2009/294}, year = {2009}, url = {http://eprint.iacr.org/2009/294}, } @misc{cryptoeprint:2009:295, author = {Shucheng Yu and Kui Ren and Wenjing Lou and Jin Li}, title = {Defending Against Key Abuse Attacks in KP-ABE Enabled Broadcast Systems}, howpublished = {Cryptology ePrint Archive, Report 2009/295}, year = {2009}, url = {http://eprint.iacr.org/2009/295}, } @misc{cryptoeprint:2009:296, author = {O.A. Logachev and A.A. Salnikov and S.V. Smyshlyaev and V.V. Yashchenko}, title = {Perfectly Balanced Functions in Symbolic Dynamics}, howpublished = {Cryptology ePrint Archive, Report 2009/296}, year = {2009}, url = {http://eprint.iacr.org/2009/296}, } @misc{cryptoeprint:2009:297, author = {Subhabrata Sen and Rudradev Sengupta and Subhamoy Maitra and Goutam Paul and Shashwat Raizada}, title = {A New Improved Distinguisher for HC-128}, howpublished = {Cryptology ePrint Archive, Report 2009/297}, year = {2009}, url = {http://eprint.iacr.org/2009/297}, } @misc{cryptoeprint:2009:298, author = {S. Sharmila Deva Selvi, S. Sree Vivek. C. Pandu Ragan}, title = {On the Security of Certificateless Signcryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2009/298}, year = {2009}, url = {http://eprint.iacr.org/2009/298}, } @misc{cryptoeprint:2009:299, author = {Mathieu Baudet and David Lubicz and Julien Micolod and Andr\'e Tassiaux}, title = {On the security of oscillator-based random number generators}, howpublished = {Cryptology ePrint Archive, Report 2009/299}, year = {2009}, url = {http://eprint.iacr.org/2009/299}, } @misc{cryptoeprint:2009:300, author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz\`alez Nieto}, title = {Universally Composable Contributory Group Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2009/300}, year = {2009}, url = {http://eprint.iacr.org/2009/300}, } @misc{cryptoeprint:2009:301, author = {Yuyin Yu and Mingsheng Wang}, title = {A Probabilistic Secret Sharing Scheme for a Compartmented Access Structure}, howpublished = {Cryptology ePrint Archive, Report 2009/301}, year = {2009}, url = {http://eprint.iacr.org/2009/301}, } @misc{cryptoeprint:2009:302, author = {Maria Naya-Plasencia and Andrea Röck and Jean-Philippe Aumasson and Gaëtan Leurent and Willi Meier and Thomas Peyrin}, title = {Cryptanalysis of ESSENCE}, howpublished = {Cryptology ePrint Archive, Report 2009/302}, year = {2009}, url = {http://eprint.iacr.org/2009/302}, } @misc{cryptoeprint:2009:303, author = {E. Verbitskiy and P. Tuyls and C. Obi and B. Schoenmakers and B. Skoric}, title = {Key extraction from general non-discrete signals}, howpublished = {Cryptology ePrint Archive, Report 2009/303}, year = {2009}, url = {http://eprint.iacr.org/2009/303}, } @misc{cryptoeprint:2009:304, author = {Koray Karabina}, title = {Factor-4 and 6 Compression of Cyclotomic Subgroups}, howpublished = {Cryptology ePrint Archive, Report 2009/304}, year = {2009}, url = {http://eprint.iacr.org/2009/304}, } @misc{cryptoeprint:2009:305, author = {Antoine Joux and Stefan Lucks}, title = {Improved generic algorithms for 3-collisions}, howpublished = {Cryptology ePrint Archive, Report 2009/305}, year = {2009}, url = {http://eprint.iacr.org/2009/305}, } @misc{cryptoeprint:2009:306, author = {Alina Oprea and Kevin D. Bowers}, title = {Authentic Time-Stamps for Archival Storage}, howpublished = {Cryptology ePrint Archive, Report 2009/306}, year = {2009}, url = {http://eprint.iacr.org/2009/306}, } @misc{cryptoeprint:2009:307, author = {Vishal Saraswat and Aaram Yun}, title = {Anonymous Signatures Revisited}, howpublished = {Cryptology ePrint Archive, Report 2009/307}, year = {2009}, url = {http://eprint.iacr.org/2009/307}, } @misc{cryptoeprint:2009:308, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, title = {A note on the Certificateless Multi-receiver Signcryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2009/308}, year = {2009}, url = {http://eprint.iacr.org/2009/308}, } @misc{cryptoeprint:2009:309, author = {Jean-Sebastien Coron and Antoine Joux and Ilya Kizhvatov and David Naccache and Pascal Paillier}, title = {Fault Attacks on RSA Signatures with Partially Unknown Messages}, howpublished = {Cryptology ePrint Archive, Report 2009/309}, year = {2009}, url = {http://eprint.iacr.org/2009/309}, } @misc{cryptoeprint:2009:310, author = {Chong Hee Kim and Gildas Avoine}, title = {RFID distance bounding protocol with mixed challenges to prevent relay attacks}, howpublished = {Cryptology ePrint Archive, Report 2009/310}, year = {2009}, url = {http://eprint.iacr.org/2009/310}, } @misc{cryptoeprint:2009:311, author = {Sathya Narayanan G, Aishwarya T, Anugrah Agrawal, Arpita Patra, Ashish Choudhary, Pandu Rangan C}, title = {Multi Party Distributed Private Matching, Set Disjointness and Cardinality Set Intersection with Information Theoretic Security}, howpublished = {Cryptology ePrint Archive, Report 2009/311}, year = {2009}, url = {http://eprint.iacr.org/2009/311}, } @misc{cryptoeprint:2009:312, author = {Huseyin Hisil and Kenneth Koon-Ho Wong and Gary Carter and Ed Dawson}, title = {Jacobi Quartic Curves Revisited}, howpublished = {Cryptology ePrint Archive, Report 2009/312}, year = {2009}, url = {http://eprint.iacr.org/2009/312}, } @misc{cryptoeprint:2009:313, author = {Nigel P. Smart and Bogdan Warinschi}, title = {Identity Based Group Signatures from Hierarchical Identity-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2009/313}, year = {2009}, url = {http://eprint.iacr.org/2009/313}, } @misc{cryptoeprint:2009:314, author = {B. Pinkas and T. Schneider and N.P. Smart and S. Williams}, title = {Secure Two-Party Computation is Practical}, howpublished = {Cryptology ePrint Archive, Report 2009/314}, year = {2009}, url = {http://eprint.iacr.org/2009/314}, } @misc{cryptoeprint:2009:315, author = {N.P. Smart}, title = {Breaking RSA-based PIN Encryption with thirty ciphertext validity queries}, howpublished = {Cryptology ePrint Archive, Report 2009/315}, year = {2009}, url = {http://eprint.iacr.org/2009/315}, } @misc{cryptoeprint:2009:316, author = {Jayaprakash Kar, Dr.Bansidhar Majhi}, title = {An Efficient Password Security of Three-Party Key exchange Protocol based on ECDLP}, howpublished = {Cryptology ePrint Archive, Report 2009/316}, year = {2009}, url = {http://eprint.iacr.org/2009/316}, } @misc{cryptoeprint:2009:317, author = {Alex Biryukov and Dmitry Khovratovich}, title = {Related-key Cryptanalysis of the Full AES-192 and AES-256}, howpublished = {Cryptology ePrint Archive, Report 2009/317}, year = {2009}, url = {http://eprint.iacr.org/2009/317}, } @misc{cryptoeprint:2009:318, author = {ERRA Robert and GRENIER Chirstophe}, title = {The Fermat factorization method revisited}, howpublished = {Cryptology ePrint Archive, Report 2009/318}, year = {2009}, url = {http://eprint.iacr.org/2009/318}, } @misc{cryptoeprint:2009:319, author = {Xiaofeng Chen and Haibo Tian and Fangguo Zhang}, title = {Comments and Improvements on Chameleon Hashing Without Key Exposure Based on Factoring}, howpublished = {Cryptology ePrint Archive, Report 2009/319}, year = {2009}, url = {http://eprint.iacr.org/2009/319}, } @misc{cryptoeprint:2009:320, author = {Georg Fuchsbauer}, title = {Automorphic Signatures in Bilinear Groups}, howpublished = {Cryptology ePrint Archive, Report 2009/320}, year = {2009}, url = {http://eprint.iacr.org/2009/320}, } @misc{cryptoeprint:2009:321, author = {Palash Sarkar}, title = {Tweakable Enciphering Schemes From Stream Ciphers With IV}, howpublished = {Cryptology ePrint Archive, Report 2009/321}, year = {2009}, url = {http://eprint.iacr.org/2009/321}, } @misc{cryptoeprint:2009:322, author = {Reynald Affeldt, David Nowak and Kiyoshi Yamada}, title = {Certifying Assembly with Formal Cryptographic Proofs: the Case of BBS}, howpublished = {Cryptology ePrint Archive, Report 2009/322}, year = {2009}, url = {http://eprint.iacr.org/2009/322}, } @misc{cryptoeprint:2009:323, author = {Eric Brier and David Naccache and Mehdi Tibouchi}, title = {Factoring Unbalanced Moduli with Known Bits}, howpublished = {Cryptology ePrint Archive, Report 2009/323}, year = {2009}, url = {http://eprint.iacr.org/2009/323}, } @misc{cryptoeprint:2009:324, author = {Qiong Huang and Duncan S. Wong and Willy Susilo}, title = {Group-oriented Fair Exchange of Signatures}, howpublished = {Cryptology ePrint Archive, Report 2009/324}, year = {2009}, url = {http://eprint.iacr.org/2009/324}, } @misc{cryptoeprint:2009:325, author = {Mridul Nandi}, title = {Characterizing Padding Rules of MD Hash Functions Preserving Collision Security}, howpublished = {Cryptology ePrint Archive, Report 2009/325}, year = {2009}, url = {http://eprint.iacr.org/2009/325}, } @misc{cryptoeprint:2009:326, author = {Gregory V. Bard}, title = {The Application of Polynomials over the Field of Two Elements to a Problem in Intellectual Property}, howpublished = {Cryptology ePrint Archive, Report 2009/326}, year = {2009}, url = {http://eprint.iacr.org/2009/326}, } @misc{cryptoeprint:2009:327, author = {Kaoru Kurosawa and Ryo Nojima}, title = {Simple Adaptive Oblivious Transfer Without Random Oracle}, howpublished = {Cryptology ePrint Archive, Report 2009/327}, year = {2009}, url = {http://eprint.iacr.org/2009/327}, } @misc{cryptoeprint:2009:328, author = {Boris Skoric and Marc X. Makkes}, title = {Flowchart description of security primitives for Controlled Physical Unclonable Functions}, howpublished = {Cryptology ePrint Archive, Report 2009/328}, year = {2009}, url = {http://eprint.iacr.org/2009/328}, } @misc{cryptoeprint:2009:329, author = {Mehreen Afzal and Ashraf Masood}, title = {Efficient Approximation of Higher Order Boolean function in a Low Order Function}, howpublished = {Cryptology ePrint Archive, Report 2009/329}, year = {2009}, url = {http://eprint.iacr.org/2009/329}, } @misc{cryptoeprint:2009:330, author = {Ehsan Malekian and Ali Zakerolhosseini and Atefeh Mashatan}, title = {QTRU: A Lattice Attack Resistant Version of NTRU PKCS Based on Quaternion Algebra}, howpublished = {Cryptology ePrint Archive, Report 2009/330}, year = {2009}, url = {http://eprint.iacr.org/2009/330}, } @misc{cryptoeprint:2009:331, author = {L. Chen and P. Morrissey and N.P. Smart and B. Warinschi}, title = {Security Notions and Generic Constructions for Client Puzzles}, howpublished = {Cryptology ePrint Archive, Report 2009/331}, year = {2009}, url = {http://eprint.iacr.org/2009/331}, } @misc{cryptoeprint:2009:332, author = {Ton van Deursen and Sa\v{s}a Radomirovi\'c}, title = {Untraceable RFID protocols are not trivially composable: Attacks on the revision of EC-RAC}, howpublished = {Cryptology ePrint Archive, Report 2009/332}, year = {2009}, url = {http://eprint.iacr.org/2009/332}, } @misc{cryptoeprint:2009:333, author = {Yupu Hu and Fengrong Zhang and Yiwei Zhang}, title = {Hard Fault Analysis of Trivium}, howpublished = {Cryptology ePrint Archive, Report 2009/333}, year = {2009}, url = {http://eprint.iacr.org/2009/333}, } @misc{cryptoeprint:2009:334, author = {Ewan Fleischmann and Michael Gorski and Stefan Lucks}, title = {Attacking Reduced Rounds of the ARIA Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2009/334}, year = {2009}, url = {http://eprint.iacr.org/2009/334}, } @misc{cryptoeprint:2009:335, author = {Ewan Fleischmann and Michael Gorski and Stefan Lucks}, title = {Related-Key Rectangle Attack of the Full 80-Round HAS-160 Encryption Mode}, howpublished = {Cryptology ePrint Archive, Report 2009/335}, year = {2009}, url = {http://eprint.iacr.org/2009/335}, } @misc{cryptoeprint:2009:336, author = {Mihir Bellare and Shanshan Duan}, title = {New Definitions and Designs for Anonymous Signatures}, howpublished = {Cryptology ePrint Archive, Report 2009/336}, year = {2009}, url = {http://eprint.iacr.org/2009/336}, } @misc{cryptoeprint:2009:337, author = {Yanbin Pan and Yingpu Deng and Yupeng Jiang and Ziran Tu}, title = {A New Lattice-Based Cryptosystem Mixed with a Knapsack}, howpublished = {Cryptology ePrint Archive, Report 2009/337}, year = {2009}, url = {http://eprint.iacr.org/2009/337}, } @misc{cryptoeprint:2009:338, author = {*Jue-Sam Chou1, Chun-Hui Huang2, Cheng-Chung Ding3}, title = {Security weaknesses in two multi-server password based authentication protocols}, howpublished = {Cryptology ePrint Archive, Report 2009/338}, year = {2009}, url = {http://eprint.iacr.org/2009/338}, } @misc{cryptoeprint:2009:339, author = {Jue-Sam Chou*1, Yalin Chen2 , Ming-Hsun Cho3 , Hung-Min Sun4}, title = {A Novel ID-based Electronic Cash System from Pairings}, howpublished = {Cryptology ePrint Archive, Report 2009/339}, year = {2009}, url = {http://eprint.iacr.org/2009/339}, } @misc{cryptoeprint:2009:340, author = {Jean-Sébastien Coron and Thomas Icart}, title = {A Random Oracle into Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2009/340}, year = {2009}, url = {http://eprint.iacr.org/2009/340}, } @misc{cryptoeprint:2009:341, author = {Francois-Xavier Standaert and Olivier Pereira and Yu Yu and Jean-Jacques Quisquater and Moti Yung and Elisabeth Oswald}, title = {Leakage Resilient Cryptography in Practice}, howpublished = {Cryptology ePrint Archive, Report 2009/341}, year = {2009}, url = {http://eprint.iacr.org/2009/341}, } @misc{cryptoeprint:2009:342, author = {Brian Baldwin and Andrew Byrne and Mark Hamilton and Neil Hanley and Robert P. McEvoy and Weibo Pan and William P. Marnane}, title = {FPGA Implementations of SHA-3 Candidates:CubeHash, Gr{\o}stl, L{\sc ane}, Shabal and Spectral Hash}, howpublished = {Cryptology ePrint Archive, Report 2009/342}, year = {2009}, url = {http://eprint.iacr.org/2009/342}, } @misc{cryptoeprint:2009:343, author = {Kenneth Koon-Ho Wong and Gregory V. Bard and Robert H. Lewis }, title = {Partitioning Multivariate Polynomial Equations via Vertex Separators for Algebraic Cryptanalysis and Mathematical Applications}, howpublished = {Cryptology ePrint Archive, Report 2009/343}, year = {2009}, url = {http://eprint.iacr.org/2009/343}, } @misc{cryptoeprint:2009:344, author = {Xi Zhang and Min-Rong Chen and Xia Li}, title = {Comments on Shao-Cao's Unidirectional Proxy Re-Encryption Scheme from PKC 2009}, howpublished = {Cryptology ePrint Archive, Report 2009/344}, year = {2009}, url = {http://eprint.iacr.org/2009/344}, } @misc{cryptoeprint:2009:345, author = {Sunder Lal and Prashant Kushwah}, title = {Anonymous ID Based Signcryption Scheme for Multiple Receivers}, howpublished = {Cryptology ePrint Archive, Report 2009/345}, year = {2009}, url = {http://eprint.iacr.org/2009/345}, } @misc{cryptoeprint:2009:346, author = {Wenling Wu and Lei Zhang and Liting Zhang and Wentao Zhang}, title = {Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2009/346}, year = {2009}, url = {http://eprint.iacr.org/2009/346}, } @misc{cryptoeprint:2009:347, author = {Douglas Wikstr{\"o}m}, title = {An Efficient Concurrent Repetition Theorem}, howpublished = {Cryptology ePrint Archive, Report 2009/347}, year = {2009}, url = {http://eprint.iacr.org/2009/347}, } @misc{cryptoeprint:2009:348, author = {Huang−Ta Huang1, Jue−Sam Chou∗2}, title = {A provably secure really source hiding designated verifier signature scheme based on random oracle model}, howpublished = {Cryptology ePrint Archive, Report 2009/348}, year = {2009}, url = {http://eprint.iacr.org/2009/348}, } @misc{cryptoeprint:2009:349, author = {Stefan Tillich and Martin Feldhofer and Wolfgang Issovits and Thomas Kern and Hermann Kureck and Michael M{\"u}hlberghuber and Georg Neubauer and Andreas Reiter and Armin K{\"o}fler and Mathias Mayrhofer}, title = {Compact Hardware Implementations of the SHA-3 Candidates ARIRANG, BLAKE, Gr{\o}stl, and Skein}, howpublished = {Cryptology ePrint Archive, Report 2009/349}, year = {2009}, url = {http://eprint.iacr.org/2009/349}, } @misc{cryptoeprint:2009:350, author = {Harikrishna Narasimhan and Venkatanathan Varadarajan and C. Pandu Rangan}, title = {Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles}, howpublished = {Cryptology ePrint Archive, Report 2009/350}, year = {2009}, url = {http://eprint.iacr.org/2009/350}, } @misc{cryptoeprint:2009:351, author = {David Cash and Dennis Hofheinz and Eike Kiltz }, title = {How to Delegate a Lattice Basis}, howpublished = {Cryptology ePrint Archive, Report 2009/351}, year = {2009}, url = {http://eprint.iacr.org/2009/351}, } @misc{cryptoeprint:2009:352, author = {Berndt M. Gammel and Stefan Mangard}, title = {On the Duality of Probing and Fault Attacks}, howpublished = {Cryptology ePrint Archive, Report 2009/352}, year = {2009}, url = {http://eprint.iacr.org/2009/352}, } @misc{cryptoeprint:2009:353, author = {Berkant Ustaoglu}, title = {Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman protocols (extended version)}, howpublished = {Cryptology ePrint Archive, Report 2009/353}, year = {2009}, url = {http://eprint.iacr.org/2009/353}, } @misc{cryptoeprint:2009:354, author = {ZHAO Xin-Jie and WANG Tao}, title = {Cache Timing Attacks on Camellia Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2009/354}, year = {2009}, url = {http://eprint.iacr.org/2009/354}, } @misc{cryptoeprint:2009:355, author = {Aniket Kate and Ian Goldberg}, title = {Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2009/355}, year = {2009}, url = {http://eprint.iacr.org/2009/355}, } @misc{cryptoeprint:2009:356, author = {Jean-Sebastien Coron and Yevgeniy Dodis and Avradip Mandal and Yannick Seurin}, title = {A Domain Extender for the Ideal Cipher}, howpublished = {Cryptology ePrint Archive, Report 2009/356}, year = {2009}, url = {http://eprint.iacr.org/2009/356}, } @misc{cryptoeprint:2009:357, author = {Zhongming Wu and Xuejia Lai and Bo Zhu and Yiyuan Luo}, title = {Impossible Differential Cryptanalysis of FOX}, howpublished = {Cryptology ePrint Archive, Report 2009/357}, year = {2009}, url = {http://eprint.iacr.org/2009/357}, } @misc{cryptoeprint:2009:358, author = {Juan A. Garay and Vladimir Kolesnikov and Rae McLellan}, title = {MAC Precomputation with Applications to Secure Memory}, howpublished = {Cryptology ePrint Archive, Report 2009/358}, year = {2009}, url = {http://eprint.iacr.org/2009/358}, } @misc{cryptoeprint:2009:359, author = {Chris Peikert}, title = {Bonsai Trees (or, Arboriculture in Lattice-Based Cryptography)}, howpublished = {Cryptology ePrint Archive, Report 2009/359}, year = {2009}, url = {http://eprint.iacr.org/2009/359}, } @misc{cryptoeprint:2009:360, author = {Ruilin Li and Bing Sun and Chao Li}, title = {Distinguishing Attacks on a Kind of Generalized Unbalanced Feistel Network}, howpublished = {Cryptology ePrint Archive, Report 2009/360}, year = {2009}, url = {http://eprint.iacr.org/2009/360}, } @misc{cryptoeprint:2009:361, author = {Manoj Kumar}, title = {On the Security of a Proxy Blind Signature Scheme over Braid Groups}, howpublished = {Cryptology ePrint Archive, Report 2009/361}, year = {2009}, url = {http://eprint.iacr.org/2009/361}, } @misc{cryptoeprint:2009:362, author = {Laila El Aimani}, title = {Toward a Generic Construction of Convertible Undeniable Signatures from Pairing-Based Signatures}, howpublished = {Cryptology ePrint Archive, Report 2009/362}, year = {2009}, url = {http://eprint.iacr.org/2009/362}, } @misc{cryptoeprint:2009:363, author = {Dimitrios Poulakis}, title = {Small Solutions of Bivariant Modular Equations and the security of DSA and ECDSA}, howpublished = {Cryptology ePrint Archive, Report 2009/363}, year = {2009}, url = {http://eprint.iacr.org/2009/363}, } @misc{cryptoeprint:2009:364, author = {Nishanth Chandran and Vipul Goyal and Ryan Moriarty and Rafail Ostrovsky}, title = {Position Based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2009/364}, year = {2009}, url = {http://eprint.iacr.org/2009/364}, } @misc{cryptoeprint:2009:365, author = {Abhishek Parakh and Subhash Kak}, title = {Space Efficient Secret Sharing: A Recursive Approach}, howpublished = {Cryptology ePrint Archive, Report 2009/365}, year = {2009}, url = {http://eprint.iacr.org/2009/365}, } @misc{cryptoeprint:2009:366, author = {Yehuda Lindell and Hila Zarosim}, title = {Adaptive Zero-Knowledge Proofs and Adaptively Secure Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2009/366}, year = {2009}, url = {http://eprint.iacr.org/2009/366}, } @misc{cryptoeprint:2009:367, author = {Qiong Huang and Willy Susilo and Duncan S. Wong}, title = {Non-delegatable Identity-based Designated Verifier Signature}, howpublished = {Cryptology ePrint Archive, Report 2009/367}, year = {2009}, url = {http://eprint.iacr.org/2009/367}, } @misc{cryptoeprint:2009:368, author = {Klaas Ole Kuertz and Henning Schnoor and Thomas Wilke}, title = {A Simulation-Based Treatment of Authenticated Message Exchange}, howpublished = {Cryptology ePrint Archive, Report 2009/368}, year = {2009}, url = {http://eprint.iacr.org/2009/368}, } @misc{cryptoeprint:2009:369, author = {Boris Skoric}, title = {Quantum readout of Physical Unclonable Functions: Remote authentication without trusted readers and authenticated Quantum Key Exchange without initial shared secrets}, howpublished = {Cryptology ePrint Archive, Report 2009/369}, year = {2009}, url = {http://eprint.iacr.org/2009/369}, } @misc{cryptoeprint:2009:370, author = {Nadia El Mrabet and Nicolas Guillermin and Sorina Ionica}, title = {A study of pairing computation for elliptic curves with embedding degree 15}, howpublished = {Cryptology ePrint Archive, Report 2009/370}, year = {2009}, url = {http://eprint.iacr.org/2009/370}, } @misc{cryptoeprint:2009:371, author = {Rakesh Bobba and Himanshu Khurana and Manoj Prabhakaran}, title = {Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2009/371}, year = {2009}, url = {http://eprint.iacr.org/2009/371}, } @misc{cryptoeprint:2009:372, author = {Rosario Gennaro and Shai Halevi}, title = {More on Key Wrapping}, howpublished = {Cryptology ePrint Archive, Report 2009/372}, year = {2009}, url = {http://eprint.iacr.org/2009/372}, } @misc{cryptoeprint:2009:373, author = {Gilad Asharov and Yehuda Lindell}, title = {Utility Dependence in Correct and Fair Rational Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2009/373}, year = {2009}, url = {http://eprint.iacr.org/2009/373}, } @misc{cryptoeprint:2009:374, author = {Alex Biryukov and Orr Dunkelman and Nathan Keller and Dmitry Khovratovich and Adi Shamir}, title = {Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds}, howpublished = {Cryptology ePrint Archive, Report 2009/374}, year = {2009}, url = {http://eprint.iacr.org/2009/374}, } @misc{cryptoeprint:2009:375, author = {Masao KASAHARA}, title = {Forgotten Secret Recovering Scheme and Fuzzy Vault Scheme Constructed Based on Systematic Error-Correcting Codes}, howpublished = {Cryptology ePrint Archive, Report 2009/375}, year = {2009}, url = {http://eprint.iacr.org/2009/375}, } @misc{cryptoeprint:2009:376, author = {Markus Grassl and Ivana Ilic and Spyros Magliveras and Rainer Steinwandt}, title = {Cryptanalysis of the Tillich-Z\'emor hash function}, howpublished = {Cryptology ePrint Archive, Report 2009/376}, year = {2009}, url = {http://eprint.iacr.org/2009/376}, } @misc{cryptoeprint:2009:377, author = {Benoit Chevallier-Mames and Marc Joye}, title = {Chosen-Ciphertext Secure RSA-type Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2009/377}, year = {2009}, url = {http://eprint.iacr.org/2009/377}, } @misc{cryptoeprint:2009:378, author = {Peter Novotney and Niels Ferguson}, title = {Detectable correlations in Edon-R}, howpublished = {Cryptology ePrint Archive, Report 2009/378}, year = {2009}, url = {http://eprint.iacr.org/2009/378}, } @misc{cryptoeprint:2009:379, author = {Sebastian Faust and Leonid Reyzin and Eran Tromer}, title = {Protecting Circuits from Computationally-Bounded Leakage}, howpublished = {Cryptology ePrint Archive, Report 2009/379}, year = {2009}, url = {http://eprint.iacr.org/2009/379}, } @misc{cryptoeprint:2009:380, author = {Carlo Blundo and Angelo De Caro and Giuseppe Persiano}, title = {Untraceable Tags based on Mild Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2009/380}, year = {2009}, url = {http://eprint.iacr.org/2009/380}, } @misc{cryptoeprint:2009:381, author = {Habeeb Syed}, title = {A short Note on Discrete Log Problem in $\mathbbF_p$}, howpublished = {Cryptology ePrint Archive, Report 2009/381}, year = {2009}, url = {http://eprint.iacr.org/2009/381}, } @misc{cryptoeprint:2009:382, author = {Eric Brier and Shahram Khazaei and Willi Meier and Thomas Peyrin}, title = {Linearization Framework for Collision Attacks: Application to CubeHash and MD6}, howpublished = {Cryptology ePrint Archive, Report 2009/382}, year = {2009}, url = {http://eprint.iacr.org/2009/382}, } @misc{cryptoeprint:2009:383, author = {Manoj Kumar}, title = {A Registration Scheme to Allocate a Unique Identification Number}, howpublished = {Cryptology ePrint Archive, Report 2009/383}, year = {2009}, url = {http://eprint.iacr.org/2009/383}, } @misc{cryptoeprint:2009:384, author = {Orr Dunkelman and Tor E. Bjørstad}, title = {Practical Attacks on NESHA-256 }, howpublished = {Cryptology ePrint Archive, Report 2009/384}, year = {2009}, url = {http://eprint.iacr.org/2009/384}, } @misc{cryptoeprint:2009:385, author = {Brent Waters}, title = {Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2009/385}, year = {2009}, url = {http://eprint.iacr.org/2009/385}, } @misc{cryptoeprint:2009:386, author = {Ehsan Malekian and Ali Zakerolhosseini and Atefeh Mashatan}, title = {QTRU: A Lattice Attack Resistant Version of NTRU}, howpublished = {Cryptology ePrint Archive, Report 2009/386}, year = {2009}, url = {http://eprint.iacr.org/2009/386}, } @misc{cryptoeprint:2009:387, author = {Rishab Nithyanand}, title = {Securing Plastic Money: Understanding the Requirements of a New Cashless Payment System}, howpublished = {Cryptology ePrint Archive, Report 2009/387}, year = {2009}, url = {http://eprint.iacr.org/2009/387}, } @misc{cryptoeprint:2009:388, author = {Kerem Kaskaloglu and Ferruh Ozbudak}, title = {A Simple Secret Sharing Scheme for Hierarchical Threshold Access Structures}, howpublished = {Cryptology ePrint Archive, Report 2009/388}, year = {2009}, url = {http://eprint.iacr.org/2009/388}, } @misc{cryptoeprint:2009:389, author = {Joppe W. Bos and Marcelo E. Kaihara and Thorsten Kleinjung and Arjen K. Lenstra and Peter L. Montgomery}, title = {On the Security of 1024-bit RSA and 160-bit Elliptic Curve Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2009/389}, year = {2009}, url = {http://eprint.iacr.org/2009/389}, } @misc{cryptoeprint:2009:390, author = {Jens Groth}, title = {Sub-linear Size Pairing-based Non-interactive Zero-Knowledge Arguments}, howpublished = {Cryptology ePrint Archive, Report 2009/390}, year = {2009}, url = {http://eprint.iacr.org/2009/390}, } @misc{cryptoeprint:2009:391, author = {Rikke Bendlin and Ivan Damgård}, title = {Lattice-based Threshold Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2009/391}, year = {2009}, url = {http://eprint.iacr.org/2009/391}, } @misc{cryptoeprint:2009:392, author = {Ralf Kuesters and Max Tuengerthal}, title = {Computational Soundness for Key Exchange Protocols with Symmetric Encryption}, howpublished = {Cryptology ePrint Archive, Report 2009/392}, year = {2009}, url = {http://eprint.iacr.org/2009/392}, } @misc{cryptoeprint:2009:393, author = {Rajesh P Singh and Soumen Maity}, title = {Permutation Polynomials modulo $p^n$}}, howpublished = {Cryptology ePrint Archive, Report 2009/393}, year = {2009}, url = {http://eprint.iacr.org/2009/393}, } @misc{cryptoeprint:2009:394, author = {Le Trieu Phong and Kaoru Kurosawa and Wakaha Ogata}, title = {New DLOG-Based Convertible Undeniable Signature Schemes in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2009/394}, year = {2009}, url = {http://eprint.iacr.org/2009/394}, } @misc{cryptoeprint:2009:395, author = {Helger Lipmaa}, title = {How to Disassemble CPIR: First CPIR with Database-Dependent Computation}, howpublished = {Cryptology ePrint Archive, Report 2009/395}, year = {2009}, url = {http://eprint.iacr.org/2009/395}, } @misc{cryptoeprint:2009:396, author = {Ueli Maurer and Stefano Tessaro}, title = {Computational Indistinguishability Amplification: Tight Product Theorems for System Composition}, howpublished = {Cryptology ePrint Archive, Report 2009/396}, year = {2009}, url = {http://eprint.iacr.org/2009/396}, } @misc{cryptoeprint:2009:397, author = {Joo Yeon Cho}, title = {Linear Cryptanalysis of the Block Cipher PRESENT}, howpublished = {Cryptology ePrint Archive, Report 2009/397}, year = {2009}, url = {http://eprint.iacr.org/2009/397}, } @misc{cryptoeprint:2009:398, author = {Jean-Luc Beuchat and Jérémie Detrey and Nicolas Estibals and Eiji Okamoto and Francisco Rodríguez-Henríquez}, title = {Fast Architectures for the $\eta_T$ Pairing over Small-Characteristic Supersingular Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2009/398}, year = {2009}, url = {http://eprint.iacr.org/2009/398}, } @misc{cryptoeprint:2009:399, author = {Francesco Davì and Stefan Dziembowski}, title = {Leakage-Resilient Storage}, howpublished = {Cryptology ePrint Archive, Report 2009/399}, year = {2009}, url = {http://eprint.iacr.org/2009/399}, } @misc{cryptoeprint:2009:400, author = {Xiaofeng Chen and Fangguo Zhang and Haibo Tian and Kwangjo Kim}, title = {Identity-Based Chameleon Hash Scheme Without Key Exposure}, howpublished = {Cryptology ePrint Archive, Report 2009/400}, year = {2009}, url = {http://eprint.iacr.org/2009/400}, } @misc{cryptoeprint:2009:401, author = {Mark Gondree and Payman Mohassel}, title = {Longest Common Subsequence as Private Search}, howpublished = {Cryptology ePrint Archive, Report 2009/401}, year = {2009}, url = {http://eprint.iacr.org/2009/401}, } @misc{cryptoeprint:2009:402, author = {Michael Vielhaber}, title = {AIDA Breaks BIVIUM (A&B) in 1 Minute Dual Core CPU Time}, howpublished = {Cryptology ePrint Archive, Report 2009/402}, year = {2009}, url = {http://eprint.iacr.org/2009/402}, } @misc{cryptoeprint:2009:403, author = {Laila El Aimani}, title = {On Generic Constructions of Designated Confirmer Signatures (The ``Encryption of a Signature'' Paradigm Revisited)}, howpublished = {Cryptology ePrint Archive, Report 2009/403}, year = {2009}, url = {http://eprint.iacr.org/2009/403}, } @misc{cryptoeprint:2009:404, author = {Woo Sug Kang and Ki Taek Kim}, title = {Pairing-Friendly Elliptic Curves With Various Discriminants}, howpublished = {Cryptology ePrint Archive, Report 2009/404}, year = {2009}, url = {http://eprint.iacr.org/2009/404}, } @misc{cryptoeprint:2009:405, author = {Valerie Nachef and Jacques Patarin and Joana Treger}, title = {Generic Attacks on Misty Schemes -5 rounds is not enough-}, howpublished = {Cryptology ePrint Archive, Report 2009/405}, year = {2009}, url = {http://eprint.iacr.org/2009/405}, } @misc{cryptoeprint:2009:406, author = {Jacob C. N. Schuldt and Kanta Matsuura}, title = {On-line Non-transferable Signatures Revisited}, howpublished = {Cryptology ePrint Archive, Report 2009/406}, year = {2009}, url = {http://eprint.iacr.org/2009/406}, } @misc{cryptoeprint:2009:407, author = {Benjamin Bloom and Alan Kaminsky}, title = {Single Block Attacks and Statistical Tests on CubeHash}, howpublished = {Cryptology ePrint Archive, Report 2009/407}, year = {2009}, url = {http://eprint.iacr.org/2009/407}, } @misc{cryptoeprint:2009:408, author = {Augustin P. Sarr and Philippe Elbaz–Vincent and Jean–Claude Bajard3}, title = {A Secure and Efficient Authenticated Diffie--Hellman Protocol}, howpublished = {Cryptology ePrint Archive, Report 2009/408}, year = {2009}, url = {http://eprint.iacr.org/2009/408}, } @misc{cryptoeprint:2009:409, author = {Abhishek Parakh and Subhash Kak}, title = {A Tree Based Recursive Scheme for Space Efficient Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2009/409}, year = {2009}, url = {http://eprint.iacr.org/2009/409}, } @misc{cryptoeprint:2009:410, author = {S. Dov Gordon and Jonathan Katz and Ranjit Kumaresan and Arkady Yerukhimovich}, title = {Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure}, howpublished = {Cryptology ePrint Archive, Report 2009/410}, year = {2009}, url = {http://eprint.iacr.org/2009/410}, } @misc{cryptoeprint:2009:411, author = {Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider}, title = {Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima}, howpublished = {Cryptology ePrint Archive, Report 2009/411}, year = {2009}, url = {http://eprint.iacr.org/2009/411}, } @misc{cryptoeprint:2009:412, author = {Nathan Keller and Stephen D. Miller}, title = {Distinguishing Attacks on Stream Ciphers Based on Arrays of Pseudo-random Words}, howpublished = {Cryptology ePrint Archive, Report 2009/412}, year = {2009}, url = {http://eprint.iacr.org/2009/412}, } @misc{cryptoeprint:2009:413, author = {Jiang Wu and Douglas R. Stinson}, title = {Three Improved Algorithms for Multi-path Key Establishment in Sensor Networks Using Protocols for Secure Message Transmission}, howpublished = {Cryptology ePrint Archive, Report 2009/413}, year = {2009}, url = {http://eprint.iacr.org/2009/413}, } @misc{cryptoeprint:2009:414, author = {Matthieu Finiasz and Nicolas Sendrier}, title = {Security Bounds for the Design of Code-based Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2009/414}, year = {2009}, url = {http://eprint.iacr.org/2009/414}, } @misc{cryptoeprint:2009:415, author = {Ethan Heilman}, title = {Attacks Against Permute-Transform-Xor Compression Functions and Spectral Hash}, howpublished = {Cryptology ePrint Archive, Report 2009/415}, year = {2009}, url = {http://eprint.iacr.org/2009/415}, } @misc{cryptoeprint:2009:416, author = {Carsten Elsner and Martin Schmidt}, title = {KronCrypt - A New Symmetric Cryptosystem Based on Kronecker's Approximation Theorem}, howpublished = {Cryptology ePrint Archive, Report 2009/416}, year = {2009}, url = {http://eprint.iacr.org/2009/416}, } @misc{cryptoeprint:2009:417, author = {Harry Wiggins and Philip Hawkes and Gregory G. Rose and Cameron McDonald}, title = {More Di fferential Paths of TIB3}, howpublished = {Cryptology ePrint Archive, Report 2009/417}, year = {2009}, url = {http://eprint.iacr.org/2009/417}, } @misc{cryptoeprint:2009:418, author = {Mihir Bellare and Dennis Hofheinz and Eike Kiltz}, title = {Subtleties in the Definition of IND-CCA: When and How Should Challenge-Decryption be Disallowed?}, howpublished = {Cryptology ePrint Archive, Report 2009/418}, year = {2009}, url = {http://eprint.iacr.org/2009/418}, } @misc{cryptoeprint:2009:419, author = {Jean-Sébastien Coron and Ilya Kizhvatov}, title = {An Efficient Method for Random Delay Generation in Embedded Software}, howpublished = {Cryptology ePrint Archive, Report 2009/419}, year = {2009}, url = {http://eprint.iacr.org/2009/419}, } @misc{cryptoeprint:2009:420, author = {Matthieu Rivain and Emmanuel Prouff and Julien Doget}, title = {Higher-order Masking and Shuffling for Software Implementations of Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2009/420}, year = {2009}, url = {http://eprint.iacr.org/2009/420}, } @misc{cryptoeprint:2009:421, author = {Tsz Hon Yuen and Willy Susilo and Yi Mu}, title = {How to Construct Identity-Based Signatures without the Key Escrow Problem}, howpublished = {Cryptology ePrint Archive, Report 2009/421}, year = {2009}, url = {http://eprint.iacr.org/2009/421}, } @misc{cryptoeprint:2009:422, author = {Yossef Oren and Avishai Wool}, title = {Relay Attacks on {RFID}-Based Electronic Voting Systems}, howpublished = {Cryptology ePrint Archive, Report 2009/422}, year = {2009}, url = {http://eprint.iacr.org/2009/422}, } @misc{cryptoeprint:2009:423, author = {Atsushi Fujioka and Koutarou Suzuki and Berkant Ustaoglu}, title = {Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity-based key agreement protocols}, howpublished = {Cryptology ePrint Archive, Report 2009/423}, year = {2009}, url = {http://eprint.iacr.org/2009/423}, } @misc{cryptoeprint:2009:424, author = {Yaser Baseri, Mohsen Pourpouneh, Javad Mohajeri}, title = {Double Voter Perceptible Blind Signature Based Electronic Voting Protocol}, howpublished = {Cryptology ePrint Archive, Report 2009/424}, year = {2009}, url = {http://eprint.iacr.org/2009/424}, } @misc{cryptoeprint:2009:425, author = {Vahid Jahandideh, Amir S. Mortazavi, Yaser Baseri, Javad Mohajeri}, title = {Cryptanalysis and Security Enhancement on the Generation of Mu-Varadharajan Electronic Voting Protocol}, howpublished = {Cryptology ePrint Archive, Report 2009/425}, year = {2009}, url = {http://eprint.iacr.org/2009/425}, } @misc{cryptoeprint:2009:426, author = {Daniel Pasaila and Vlad Alexa and Sorin Iftene}, title = {Cheating Detection and Cheater Identification in CRT-based Secret Sharing Schemes}, howpublished = {Cryptology ePrint Archive, Report 2009/426}, year = {2009}, url = {http://eprint.iacr.org/2009/426}, } @misc{cryptoeprint:2009:427, author = {Stephen R. Tate and Roopa Vishwanathan}, title = {Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols using Trusted Computing Technology}, howpublished = {Cryptology ePrint Archive, Report 2009/427}, year = {2009}, url = {http://eprint.iacr.org/2009/427}, } @misc{cryptoeprint:2009:428, author = {J\"urg Wullschleger}, title = {Efficiently from Semi-honest to Malicious OT via OLFE}, howpublished = {Cryptology ePrint Archive, Report 2009/428}, year = {2009}, url = {http://eprint.iacr.org/2009/428}, } @misc{cryptoeprint:2009:429, author = {Ning Ding and Dawu Gu}, title = {Precise Time and Space Simulatable Zero-Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2009/429}, year = {2009}, url = {http://eprint.iacr.org/2009/429}, } @misc{cryptoeprint:2009:430, author = {Kenneth G. Paterson and Douglas Stebila}, title = {One-time-password-authenticated key exchange}, howpublished = {Cryptology ePrint Archive, Report 2009/430}, year = {2009}, url = {http://eprint.iacr.org/2009/430}, } @misc{cryptoeprint:2009:431, author = {Yun Tian and Gongliang Chen and Jianhua Li}, title = {On the Design of Trivium}, howpublished = {Cryptology ePrint Archive, Report 2009/431}, year = {2009}, url = {http://eprint.iacr.org/2009/431}, } @misc{cryptoeprint:2009:432, author = {Chen Huiyan, Li Zichen}, title = {Practical Distributed Key Generation Scheme and Its Application}, howpublished = {Cryptology ePrint Archive, Report 2009/432}, year = {2009}, url = {http://eprint.iacr.org/2009/432}, } @misc{cryptoeprint:2009:433, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, title = {Communication Optimal Multi-Valued Asynchronous Broadcast and Asynchronous Byzantine Agreement}, howpublished = {Cryptology ePrint Archive, Report 2009/433}, year = {2009}, url = {http://eprint.iacr.org/2009/433}, } @misc{cryptoeprint:2009:434, author = {Matthias Fitzi and Dominik Raub}, title = {Tight Bounds for Protocols with Hybrid Security}, howpublished = {Cryptology ePrint Archive, Report 2009/434}, year = {2009}, url = {http://eprint.iacr.org/2009/434}, } @misc{cryptoeprint:2009:435, author = {Laila El Aimani}, title = {On Generic Constructions of Designated Confirmer Signatures - II (The ``Signature of a Commitment'' Paradigm Revisited)}, howpublished = {Cryptology ePrint Archive, Report 2009/435}, year = {2009}, url = {http://eprint.iacr.org/2009/435}, } @misc{cryptoeprint:2009:436, author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz\'alez Nieto}, title = {On the Connection between Signcryption and One-pass Key Establishment}, howpublished = {Cryptology ePrint Archive, Report 2009/436}, year = {2009}, url = {http://eprint.iacr.org/2009/436}, } @misc{cryptoeprint:2009:437, author = {Shengbao Wang}, title = {On the Relations Between Diffie-Hellman and ID-Based Key Agreement from Pairings}, howpublished = {Cryptology ePrint Archive, Report 2009/437}, year = {2009}, url = {http://eprint.iacr.org/2009/437}, } @misc{cryptoeprint:2009:438, author = {Jean-Philippe Aumasson and Cagdas Calik and Willi Meier and Onur Ozen and Raphael C.-W. Phan and Kerem Varici}, title = {Improved Cryptanalysis of Skein}, howpublished = {Cryptology ePrint Archive, Report 2009/438}, year = {2009}, url = {http://eprint.iacr.org/2009/438}, } @misc{cryptoeprint:2009:439, author = {Tzer-jen Wei and Lih-Chung Wang }, title = {Fast Mental Poker Protocol}, howpublished = {Cryptology ePrint Archive, Report 2009/439}, year = {2009}, url = {http://eprint.iacr.org/2009/439}, } @misc{cryptoeprint:2009:440, author = {Albrecht Petzoldt and Johannes Buchmann}, title = {A Multivariate Signature Scheme with an almost cyclic public key}, howpublished = {Cryptology ePrint Archive, Report 2009/440}, year = {2009}, url = {http://eprint.iacr.org/2009/440}, } @misc{cryptoeprint:2009:441, author = {Jayaprakash Kar and Banshidhar Majhi}, title = {An Efficient Two-Party Identity-Based Key Exchange Protocol based on ECDLP}, howpublished = {Cryptology ePrint Archive, Report 2009/441}, year = {2009}, url = {http://eprint.iacr.org/2009/441}, } @misc{cryptoeprint:2009:442, author = {Rishab Nithyanand and Karthik Raman}, title = {Privacy Preserving Fuzzy Reputation Management in Decentralized P2P Networks}, howpublished = {Cryptology ePrint Archive, Report 2009/442}, year = {2009}, url = {http://eprint.iacr.org/2009/442}, } @misc{cryptoeprint:2009:443, author = {Krystian Matusiewicz and Maria Naya-Plasencia and Ivica Nikolic and Yu Sasaki and Martin Schläffer}, title = {Rebound Attack on the Full LANE Compression Function}, howpublished = {Cryptology ePrint Archive, Report 2009/443}, year = {2009}, url = {http://eprint.iacr.org/2009/443}, } @misc{cryptoeprint:2009:444, author = {Zhijun Li and Guang Gong and Zhiguang Qin}, title = {Secure and Efficient HB-CM Entity Authentication Protocol}, howpublished = {Cryptology ePrint Archive, Report 2009/444}, year = {2009}, url = {http://eprint.iacr.org/2009/444}, } @misc{cryptoeprint:2009:445, author = {Andrew V. Sutherland}, title = {Computing Hilbert class polynomials with the Chinese Remainder Theorem}, howpublished = {Cryptology ePrint Archive, Report 2009/445}, year = {2009}, url = {http://eprint.iacr.org/2009/445}, } @misc{cryptoeprint:2009:446, author = {Ehsan Malekian and Ali Zakerolhosseini}, title = {Ntr¹u-like Public Key Cryptosystems beyond Dedekind Domain Up to Alternative Algebra}, howpublished = {Cryptology ePrint Archive, Report 2009/446}, year = {2009}, url = {http://eprint.iacr.org/2009/446}, } @misc{cryptoeprint:2009:447, author = {Sunil Pandey and Praveen Kaushik and Dr. S.C. Shrivastava}, title = {ROSSLER NONLINEAR DYNAMICAL MACHINE FOR CRYPTOGRAPHY APPLICATIONS}, howpublished = {Cryptology ePrint Archive, Report 2009/447}, year = {2009}, url = {http://eprint.iacr.org/2009/447}, } @misc{cryptoeprint:2009:448, author = {Ning Ding and Dawu Gu and Bart Preneel}, title = {Precise Bounded-Concurrent Zero-Knowledge in Almost Constant Rounds}, howpublished = {Cryptology ePrint Archive, Report 2009/448}, year = {2009}, url = {http://eprint.iacr.org/2009/448}, } @misc{cryptoeprint:2009:449, author = {Stefan Mangard and Elisabeth Oswald and Francois-Xavier Standaert}, title = {One for All - All for One: Unifying Standard DPA Attacks}, howpublished = {Cryptology ePrint Archive, Report 2009/449}, year = {2009}, url = {http://eprint.iacr.org/2009/449}, } @misc{cryptoeprint:2009:450, author = {Ali Aydin Selcuk, Kerem Kaskaloglu, Ferruh Ozbudak}, title = {On Hierarchical Threshold Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2009/450}, year = {2009}, url = {http://eprint.iacr.org/2009/450}, } @misc{cryptoeprint:2009:451, author = {Georg Lippold, Colin Boyd, Juan Gonz\'{a}lez Nieto}, title = {Efficient Certificateless KEM in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2009/451}, year = {2009}, url = {http://eprint.iacr.org/2009/451}, } @misc{cryptoeprint:2009:452, author = {Christian Wieschebrink}, title = {Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes}, howpublished = {Cryptology ePrint Archive, Report 2009/452}, year = {2009}, url = {http://eprint.iacr.org/2009/452}, } @misc{cryptoeprint:2009:453, author = {Vlastimil Klima and Petr Susil}, title = {A Note on Linear Approximations of BLUE MIDNIGHT WISH Cryptographic Hash Function}, howpublished = {Cryptology ePrint Archive, Report 2009/453}, year = {2009}, url = {http://eprint.iacr.org/2009/453}, } @misc{cryptoeprint:2009:454, author = {Jacob C. N. Schuldt and Kanta Matsuura}, title = {A Note on a Convertible Undeniable Signature Scheme with Delegatable Verification}, howpublished = {Cryptology ePrint Archive, Report 2009/454}, year = {2009}, url = {http://eprint.iacr.org/2009/454}, } @misc{cryptoeprint:2009:455, author = {Fagen Li and Masaaki Shirase and Tsuyoshi Takagi}, title = {Identity-Based Hybrid Signcryption}, howpublished = {Cryptology ePrint Archive, Report 2009/455}, year = {2009}, url = {http://eprint.iacr.org/2009/455}, } @misc{cryptoeprint:2009:456, author = {Kimmo Halunen and Juha Kortelainen and Tuomas Kortelainen}, title = {An Automata-Theoretic Interpretation of Iterated Hash Functions - Application to Multicollisions}, howpublished = {Cryptology ePrint Archive, Report 2009/456}, year = {2009}, url = {http://eprint.iacr.org/2009/456}, } @misc{cryptoeprint:2009:457, author = {Nozomu Nishihara and Ryuichi Harasawa and Yutaka Sueyoshi and Aichi Kudo}, title = {A remark on the computation of cube roots in finite fields}, howpublished = {Cryptology ePrint Archive, Report 2009/457}, year = {2009}, url = {http://eprint.iacr.org/2009/457}, } @misc{cryptoeprint:2009:458, author = {Wei Yun and Xiong Guo-hua and Zhang Xing-kai and Bao Wan-su}, title = {Security Analysis and Design of Proxy Signature Schemes over Braid Groups}, howpublished = {Cryptology ePrint Archive, Report 2009/458}, year = {2009}, url = {http://eprint.iacr.org/2009/458}, } @misc{cryptoeprint:2009:459, author = {Carmit Hazay and Yehuda Lindell}, title = {Efficient Oblivious Polynomial Evaluation with Simulation-Based Security}, howpublished = {Cryptology ePrint Archive, Report 2009/459}, year = {2009}, url = {http://eprint.iacr.org/2009/459}, } @misc{cryptoeprint:2009:460, author = {E. Rodney Canfield and Zhicheng Gao and Catherine Greenhill and Brendan D. McKay and Robert W. Robinson}, title = {Asymptotic enumeration of correlation-immune boolean functions}, howpublished = {Cryptology ePrint Archive, Report 2009/460}, year = {2009}, url = {http://eprint.iacr.org/2009/460}, } @misc{cryptoeprint:2009:461, author = {Bruce Kapron and Lior Malka and Venkatesh Srinivasan}, title = {A Framework for Non-Interactive Instance-Dependent Commitment Schemes (NIC)}, howpublished = {Cryptology ePrint Archive, Report 2009/461}, year = {2009}, url = {http://eprint.iacr.org/2009/461}, } @misc{cryptoeprint:2009:462, author = {S.Sharmila Deva Selvi, S.Sree Vivek, C.Pandu Rangan}, title = {Breaking and Re-Building a Certificateless Hybrid Signcryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2009/462}, year = {2009}, url = {http://eprint.iacr.org/2009/462}, } @misc{cryptoeprint:2009:463, author = {Benoit Gérard and Jean-Pierre Tillich}, title = {On Linear Cryptanalysis with Many Linear Approximations}, howpublished = {Cryptology ePrint Archive, Report 2009/463}, year = {2009}, url = {http://eprint.iacr.org/2009/463}, } @misc{cryptoeprint:2009:464, author = {WANG Yong, WANG Huangdeng}, title = {On Key Authentic Degree of Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2009/464}, year = {2009}, url = {http://eprint.iacr.org/2009/464}, } @misc{cryptoeprint:2009:465, author = {Rishab Nithyanand and Gene Tsudik and Ersin Uzun}, title = {Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems}, howpublished = {Cryptology ePrint Archive, Report 2009/465}, year = {2009}, url = {http://eprint.iacr.org/2009/465}, } @misc{cryptoeprint:2009:466, author = {Daniel V. Bailey, Brian Baldwin, Lejla Batina, Daniel J. Bernstein, Peter Birkner, Joppe W. Bos, Gauthier van Damme, Giacomo de Meulenaer, Junfeng Fan, Tim Güneysu, Frank Gurkaynak, Thorsten Kleinjung, Tanja Lange, Nele Mentens, Christof Paar, Francesco Regazzoni, Peter Schwabe, Leif Uhsadel}, title = {The Certicom Challenges ECC2-X}, howpublished = {Cryptology ePrint Archive, Report 2009/466}, year = {2009}, url = {http://eprint.iacr.org/2009/466}, } @misc{cryptoeprint:2009:467, author = {Yu Yu}, title = {The LPN Problem with Auxiliary Input}, howpublished = {Cryptology ePrint Archive, Report 2009/467}, year = {2009}, url = {http://eprint.iacr.org/2009/467}, } @misc{cryptoeprint:2009:468, author = {Julien Bringer and Herve Chabanne and Thomas Icart}, title = {Password Based Key Exchange with Hidden Elliptic Curve Public Parameters}, howpublished = {Cryptology ePrint Archive, Report 2009/468}, year = {2009}, url = {http://eprint.iacr.org/2009/468}, } @misc{cryptoeprint:2009:469, author = {Rafik Chaabouni and Helger Lipmaa and Abhi Shelat}, title = {Additive Combinatorics and Discrete Logarithm Based Range Protocols}, howpublished = {Cryptology ePrint Archive, Report 2009/469}, year = {2009}, url = {http://eprint.iacr.org/2009/469}, } @misc{cryptoeprint:2009:470, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, title = {On The Communication Complexity of Perfectly Secure Message Transmission in Directed Networks}, howpublished = {Cryptology ePrint Archive, Report 2009/470}, year = {2009}, url = {http://eprint.iacr.org/2009/470}, } @misc{cryptoeprint:2009:471, author = {Ryuichi Harasawa and Yutaka Sueyoshi and Aichi Kudo and Liang Cui}, title = {Improving the Berlekamp algorithm for binomials \boldmath$x^{n} - a$}, howpublished = {Cryptology ePrint Archive, Report 2009/471}, year = {2009}, url = {http://eprint.iacr.org/2009/471}, } @misc{cryptoeprint:2009:472, author = {Madeline Gonzalez and Rainer Steinwandt}, title = {Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson}, howpublished = {Cryptology ePrint Archive, Report 2009/472}, year = {2009}, url = {http://eprint.iacr.org/2009/472}, } @misc{cryptoeprint:2009:473, author = {Kevin J. Compton and Brian Timm and Joel VanLaven}, title = {A Simple Power Analysis Attack on the Serpent Key Schedule}, howpublished = {Cryptology ePrint Archive, Report 2009/473}, year = {2009}, url = {http://eprint.iacr.org/2009/473}, } @misc{cryptoeprint:2009:474, author = {Scott Yilek}, title = {Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine}, howpublished = {Cryptology ePrint Archive, Report 2009/474}, year = {2009}, url = {http://eprint.iacr.org/2009/474}, } @misc{cryptoeprint:2009:475, author = {Koray Karabina}, title = {Double-Exponentiation in Factor-4 Groups and its Applications}, howpublished = {Cryptology ePrint Archive, Report 2009/475}, year = {2009}, url = {http://eprint.iacr.org/2009/475}, } @misc{cryptoeprint:2009:476, author = {Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz and Huaxiong Wang}, title = {On the Security of PAS (Predicate-based Authentication Service)}, howpublished = {Cryptology ePrint Archive, Report 2009/476}, year = {2009}, url = {http://eprint.iacr.org/2009/476}, } @misc{cryptoeprint:2009:477, author = {Jian Guo and Krystian Matusiewicz}, title = {Preimages for Step-Reduced SHA-2}, howpublished = {Cryptology ePrint Archive, Report 2009/477}, year = {2009}, url = {http://eprint.iacr.org/2009/477}, } @misc{cryptoeprint:2009:478, author = {S{\o}ren S. Thomsen}, title = {Pseudo-cryptanalysis of the Original Blue Midnight Wish}, howpublished = {Cryptology ePrint Archive, Report 2009/478}, year = {2009}, url = {http://eprint.iacr.org/2009/478}, } @misc{cryptoeprint:2009:479, author = {Yu Sasaki and Lei Wang and Kazumaro Aoki}, title = {Preimage Attacks on 41-Step SHA-256 and 46-Step SHA-512}, howpublished = {Cryptology ePrint Archive, Report 2009/479}, year = {2009}, url = {http://eprint.iacr.org/2009/479}, } @misc{cryptoeprint:2009:480, author = {Sanjit Chatterjee and Alfred Menezes}, title = {On Cryptographic Protocols Employing Asymmetric Pairings -- The Role of $\Psi$ Revisited}, howpublished = {Cryptology ePrint Archive, Report 2009/480}, year = {2009}, url = {http://eprint.iacr.org/2009/480}, } @misc{cryptoeprint:2009:481, author = {Erik-Oliver Blass and Kaoutar Elkhiyaoui and Refik Molva}, title = {AnSta: Anonymous Statistics using RFID tags}, howpublished = {Cryptology ePrint Archive, Report 2009/481}, year = {2009}, url = {http://eprint.iacr.org/2009/481}, } @misc{cryptoeprint:2009:482, author = {Allison B. Lewko and Brent Waters}, title = {Fully Secure HIBE with Short Ciphertexts}, howpublished = {Cryptology ePrint Archive, Report 2009/482}, year = {2009}, url = {http://eprint.iacr.org/2009/482}, } @misc{cryptoeprint:2009:483, author = {Jean-Charles Faugère and Ludovic Perret }, title = {On the Security of UOV}, howpublished = {Cryptology ePrint Archive, Report 2009/483}, year = {2009}, url = {http://eprint.iacr.org/2009/483}, } @misc{cryptoeprint:2009:484, author = {Meiqin Wang, Xiaoyun Wang, Keting Jia, Wei Wang}, title = {New Pseudo-Near-Collision Attack on Reduced-Round of Hamis-256}, howpublished = {Cryptology ePrint Archive, Report 2009/484}, year = {2009}, url = {http://eprint.iacr.org/2009/484}, } @misc{cryptoeprint:2009:485, author = {Zvika Brakerski and Shafi Goldwasser and Yael Kalai}, title = {Circular-Secure Encryption Beyond Affine Functions}, howpublished = {Cryptology ePrint Archive, Report 2009/485}, year = {2009}, url = {http://eprint.iacr.org/2009/485}, } @misc{cryptoeprint:2009:486, author = {Allison Lewko and Brent Waters}, title = {Efficient Pseudorandom Functions From the Decisional Linear Assumption and Weaker Variants}, howpublished = {Cryptology ePrint Archive, Report 2009/486}, year = {2009}, url = {http://eprint.iacr.org/2009/486}, } @misc{cryptoeprint:2009:487, author = {Keith M. Martin and Maura B. Paterson and Douglas R. Stinson}, title = {Error Decodable Secret Sharing and One-Round Perfectly Secure Message Transmission for General Adversary Structures}, howpublished = {Cryptology ePrint Archive, Report 2009/487}, year = {2009}, url = {http://eprint.iacr.org/2009/487}, } @misc{cryptoeprint:2009:488, author = {Rajesh P Singh and A.Saikia and B.K.Sarma }, title = {Little Dragon Two: An efficient Multivariate Public Key Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2009/488}, year = {2009}, url = {http://eprint.iacr.org/2009/488}, } @misc{cryptoeprint:2009:489, author = {Jiali Choy and Huihui Yap}, title = {Impossible Boomerang Attack for Block Cipher Structures}, howpublished = {Cryptology ePrint Archive, Report 2009/489}, year = {2009}, url = {http://eprint.iacr.org/2009/489}, } @misc{cryptoeprint:2009:490, author = {Sang-Gon Lee}, title = {Cryptanalysis of Multiple-Server Password-Authenticated Key}, howpublished = {Cryptology ePrint Archive, Report 2009/490}, year = {2009}, url = {http://eprint.iacr.org/2009/490}, } @misc{cryptoeprint:2009:491, author = {Emiliano De Cristofaro and Gene Tsudik}, title = {Practical Private Set Intersection Protocols}, howpublished = {Cryptology ePrint Archive, Report 2009/491}, year = {2009}, url = {http://eprint.iacr.org/2009/491}, } @misc{cryptoeprint:2009:492, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, title = {Efficient Statistical Asynchronous Verifiable Secret Sharing and Multiparty Computation with Optimal Resilience}, howpublished = {Cryptology ePrint Archive, Report 2009/492}, year = {2009}, url = {http://eprint.iacr.org/2009/492}, } @misc{cryptoeprint:2009:493, author = {Zhengjun Cao}, title = {Remarks on Some Quantum Cryptographic Schemes}, howpublished = {Cryptology ePrint Archive, Report 2009/493}, year = {2009}, url = {http://eprint.iacr.org/2009/493}, } @misc{cryptoeprint:2009:494, author = {Masayuki Abe and Miyako Ohkubo}, title = {A Framework for Universally Composable Non-Committing Blind Signatures}, howpublished = {Cryptology ePrint Archive, Report 2009/494}, year = {2009}, url = {http://eprint.iacr.org/2009/494}, } @misc{cryptoeprint:2009:495, author = {Qingfeng Cheng and Chuangui Ma}, title = {Security Weakness in Two Authenticated Key Exchange Protocols}, howpublished = {Cryptology ePrint Archive, Report 2009/495}, year = {2009}, url = {http://eprint.iacr.org/2009/495}, } @misc{cryptoeprint:2009:496, author = {Ye Zhang and Nikos Mamoulis and D.W.L. Cheung and S.M. Yiu and W.K. Wong}, title = {Anonymous Fuzzy Identity-based Encryption for Similarity Search}, howpublished = {Cryptology ePrint Archive, Report 2009/496}, year = {2009}, url = {http://eprint.iacr.org/2009/496}, } @misc{cryptoeprint:2009:497, author = {Piotr Mroczkowski and Janusz Szmidt}, title = {Cube Attack on Courtois Toy Cipher}, howpublished = {Cryptology ePrint Archive, Report 2009/497}, year = {2009}, url = {http://eprint.iacr.org/2009/497}, } @misc{cryptoeprint:2009:498, author = {Chunbo Ma and Jun Ao}, title = {NTRU based group oriented signature}, howpublished = {Cryptology ePrint Archive, Report 2009/498}, year = {2009}, url = {http://eprint.iacr.org/2009/498}, } @misc{cryptoeprint:2009:499, author = {Chifumi Sato and Takeshi Okamoto and Eiji Okamoto}, title = {Underlying Assumptions and Designated Verifier Signatures}, howpublished = {Cryptology ePrint Archive, Report 2009/499}, year = {2009}, url = {http://eprint.iacr.org/2009/499}, } @misc{cryptoeprint:2009:500, author = {Nils Reimers}, title = {Key Recovery Attack on QuiSci}, howpublished = {Cryptology ePrint Archive, Report 2009/500}, year = {2009}, url = {http://eprint.iacr.org/2009/500}, } @misc{cryptoeprint:2009:501, author = {Joppe W. Bos, Dag Arne Osvik, and Deian Stefan}, title = {Fast Implementations of AES on Various Platforms}, howpublished = {Cryptology ePrint Archive, Report 2009/501}, year = {2009}, url = {http://eprint.iacr.org/2009/501}, } @misc{cryptoeprint:2009:502, author = {Ruchi Gode, Sugata Gangopadhyay}, title = {On second order nonlinearities of cubic monomial Boolean functions}, howpublished = {Cryptology ePrint Archive, Report 2009/502}, year = {2009}, url = {http://eprint.iacr.org/2009/502}, } @misc{cryptoeprint:2009:503, author = {Jean-Sebastien Coron and David Naccache and Mehdi Tibouchi}, title = {Fault Attacks Against EMV Signatures}, howpublished = {Cryptology ePrint Archive, Report 2009/503}, year = {2009}, url = {http://eprint.iacr.org/2009/503}, } @misc{cryptoeprint:2009:504, author = {Yongge Wang}, title = {Insecure ``Provable Secure Network Coding''}, howpublished = {Cryptology ePrint Archive, Report 2009/504}, year = {2009}, url = {http://eprint.iacr.org/2009/504}, } @misc{cryptoeprint:2009:505, author = {Hai Huang, Zhenfu Cao}, title = {Authenticated Key Exchange Protocols with Enhanced Freshness Properties}, howpublished = {Cryptology ePrint Archive, Report 2009/505}, year = {2009}, url = {http://eprint.iacr.org/2009/505}, } @misc{cryptoeprint:2009:506, author = {Mohammad Reza Reyhanitabar and Willy Susilo and Yi Mu}, title = {An Investigation of Enhanced Target Collision Resistance Property for Hash Functions: Implications, Separations, and Domain Extension}, howpublished = {Cryptology ePrint Archive, Report 2009/506}, year = {2009}, url = {http://eprint.iacr.org/2009/506}, } @misc{cryptoeprint:2009:507, author = {Ahmad-Reza Sadeghi and Thomas Schneider and Immo Wehrenberg}, title = {Efficient Privacy-Preserving Face Recognition}, howpublished = {Cryptology ePrint Archive, Report 2009/507}, year = {2009}, url = {http://eprint.iacr.org/2009/507}, } @misc{cryptoeprint:2009:508, author = {Severin Winkler and Juerg Wullschleger}, title = {Statistical Impossibility Results for Oblivious Transfer Reductions}, howpublished = {Cryptology ePrint Archive, Report 2009/508}, year = {2009}, url = {http://eprint.iacr.org/2009/508}, } @misc{cryptoeprint:2009:509, author = {Valerie Gauthier Umana and Gregor Leander}, title = {Practical Key Recovery Attacks On Two McEliece Variants}, howpublished = {Cryptology ePrint Archive, Report 2009/509}, year = {2009}, url = {http://eprint.iacr.org/2009/509}, } @misc{cryptoeprint:2009:510, author = {Stefan Tillich and Martin Feldhofer and Mario Kirschbaum and Thomas Plos and J{\"o}rn-Marc Schmidt and Alexander Szekely}, title = {High-Speed Hardware Implementations of BLAKE, Blue Midnight Wish, CubeHash, ECHO, Fugue, Gr{\o}stl, Hamsi, JH, Keccak, Luffa, Shabal, SHAvite-3, SIMD, and Skein}, howpublished = {Cryptology ePrint Archive, Report 2009/510}, year = {2009}, url = {http://eprint.iacr.org/2009/510}, } @misc{cryptoeprint:2009:511, author = {Boaz Barak and Iftach Haitner and Dennis Hofheinz and Yuval Ishai}, title = {Bounded Key-Dependent Message Security}, howpublished = {Cryptology ePrint Archive, Report 2009/511}, year = {2009}, url = {http://eprint.iacr.org/2009/511}, } @misc{cryptoeprint:2009:512, author = {Joel Alwen and Yevgeniy Dodis and Moni Naor and Gil Segev and Shabsi Walfish and Daniel Wichs}, title = {Public-Key Encryption in the Bounded-Retrieval Model}, howpublished = {Cryptology ePrint Archive, Report 2009/512}, year = {2009}, url = {http://eprint.iacr.org/2009/512}, } @misc{cryptoeprint:2009:513, author = {David Xiao}, title = {(Nearly) optimal black-box constructions of commitments secure against selective opening attacks}, howpublished = {Cryptology ePrint Archive, Report 2009/513}, year = {2009}, url = {http://eprint.iacr.org/2009/513}, } @misc{cryptoeprint:2009:514, author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonzalez Nieto and Mark Manulis}, title = {Generic One Round Group Key Exchange in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2009/514}, year = {2009}, url = {http://eprint.iacr.org/2009/514}, } @misc{cryptoeprint:2009:515, author = {Hai Huang and Zhenfu Cao}, title = {Blake-Wilson, Johnson and Menezes Protocol Revisited}, howpublished = {Cryptology ePrint Archive, Report 2009/515}, year = {2009}, url = {http://eprint.iacr.org/2009/515}, } @misc{cryptoeprint:2009:516, author = {Axel Poschmann}, title = {Lightweight Cryptography - Cryptographic Engineering for a Pervasive World}, howpublished = {Cryptology ePrint Archive, Report 2009/516}, year = {2009}, url = {http://eprint.iacr.org/2009/516}, } @misc{cryptoeprint:2009:517, author = {Qiong Huang and Duncan S. Wong}, title = {New Constructions of Convertible Undeniable Signature Schemes without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2009/517}, year = {2009}, url = {http://eprint.iacr.org/2009/517}, } @misc{cryptoeprint:2009:518, author = {Qiong Huang and Guomin Yang and Duncan S. Wong and Willy Susilo}, title = {Efficient Strong Designated Verifier Signature Schemes without Random Oracles or Delegatability}, howpublished = {Cryptology ePrint Archive, Report 2009/518}, year = {2009}, url = {http://eprint.iacr.org/2009/518}, } @misc{cryptoeprint:2009:519, author = {Juan Garay and Clint Givens and Rafail Ostrovsky}, title = {Secure Message Transmission with Small Public Discussion}, howpublished = {Cryptology ePrint Archive, Report 2009/519}, year = {2009}, url = {http://eprint.iacr.org/2009/519}, } @misc{cryptoeprint:2009:520, author = {Dominique Unruh and Jörn Müller-Quade}, title = {Universally Composable Incoercibility}, howpublished = {Cryptology ePrint Archive, Report 2009/520}, year = {2009}, url = {http://eprint.iacr.org/2009/520}, } @misc{cryptoeprint:2009:521, author = {Hung-Min Sun and Yalin Chen and Jue-Sam Chou}, title = {An Efficient Secure Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2009/521}, year = {2009}, url = {http://eprint.iacr.org/2009/521}, } @misc{cryptoeprint:2009:522, author = {Daniel Shumow}, title = {Isogenies of Elliptic Curves: A Computational Approach}, howpublished = {Cryptology ePrint Archive, Report 2009/522}, year = {2009}, url = {http://eprint.iacr.org/2009/522}, } @misc{cryptoeprint:2009:523, author = {Benjamin Justus and Daniel Loebenberger}, title = {Differential Addition on Edwards Curves}, howpublished = {Cryptology ePrint Archive, Report 2009/523}, year = {2009}, url = {http://eprint.iacr.org/2009/523}, } @misc{cryptoeprint:2009:524, author = {Petros Mol and Scott Yilek}, title = {Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions}, howpublished = {Cryptology ePrint Archive, Report 2009/524}, year = {2009}, url = {http://eprint.iacr.org/2009/524}, } @misc{cryptoeprint:2009:525, author = {Somindu C. Ramanna and Palash Sarkar}, title = {On Quantifying the Resistance of Concrete Hash Functions to Generic Multi-Collision Attacks}, howpublished = {Cryptology ePrint Archive, Report 2009/525}, year = {2009}, url = {http://eprint.iacr.org/2009/525}, } @misc{cryptoeprint:2009:526, author = {Jiazhe Chen and Keting Jia}, title = {Improved Related-key Boomerang Attacks on Round-Reduced Threefish-512}, howpublished = {Cryptology ePrint Archive, Report 2009/526}, year = {2009}, url = {http://eprint.iacr.org/2009/526}, } @misc{cryptoeprint:2009:527, author = {Seiko Arita}, title = {An Efficient Adaptive-Deniable-Concurrent Non-malleable Commitment Scheme}, howpublished = {Cryptology ePrint Archive, Report 2009/527}, year = {2009}, url = {http://eprint.iacr.org/2009/527}, } @misc{cryptoeprint:2009:528, author = {Alexey Chilikov and Oleg Taraskin}, title = {New Fault Attack on Elliptic Curve Scalar Multiplication}, howpublished = {Cryptology ePrint Archive, Report 2009/528}, year = {2009}, url = {http://eprint.iacr.org/2009/528}, } @misc{cryptoeprint:2009:529, author = {Jan Camenisch and Maria Dubovitskaya and Gregory Neven}, title = {Oblivious Transfer with Access Control}, howpublished = {Cryptology ePrint Archive, Report 2009/529}, year = {2009}, url = {http://eprint.iacr.org/2009/529}, } @misc{cryptoeprint:2009:530, author = {Xigen.Yao}, title = {A Proposal And Some Generic Attacks}, howpublished = {Cryptology ePrint Archive, Report 2009/530}, year = {2009}, url = {http://eprint.iacr.org/2009/530}, } @misc{cryptoeprint:2009:531, author = {Henri Gilbert and Thomas Peyrin}, title = {Super-Sbox Cryptanalysis: Improved Attacks for AES-like permutations}, howpublished = {Cryptology ePrint Archive, Report 2009/531}, year = {2009}, url = {http://eprint.iacr.org/2009/531}, } @misc{cryptoeprint:2009:532, author = {Sanjam Garg and Amit Sahai and Brent Waters}, title = {Efficient Fully Collusion-Resilient Traitor Tracing Scheme}, howpublished = {Cryptology ePrint Archive, Report 2009/532}, year = {2009}, url = {http://eprint.iacr.org/2009/532}, } @misc{cryptoeprint:2009:533, author = {D. Boneh and K. Rubin and A. Silverberg}, title = {Finding composite order ordinary elliptic curves using the Cocks-Pinch method}, howpublished = {Cryptology ePrint Archive, Report 2009/533}, year = {2009}, url = {http://eprint.iacr.org/2009/533}, } @misc{cryptoeprint:2009:534, author = {S. Wu }, title = {Weaknesses and improvement of three-party authenticated key exchange protocol using elliptic curve cryptography}, howpublished = {Cryptology ePrint Archive, Report 2009/534}, year = {2009}, url = {http://eprint.iacr.org/2009/534}, } @misc{cryptoeprint:2009:535, author = {S. Wu}, title = {Weakness of a three-party password-based authenticated key exchange protocol}, howpublished = {Cryptology ePrint Archive, Report 2009/535}, year = {2009}, url = {http://eprint.iacr.org/2009/535}, } @misc{cryptoeprint:2009:536, author = {S. Wu}, title = {Practical remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2009/536}, year = {2009}, url = {http://eprint.iacr.org/2009/536}, } @misc{cryptoeprint:2009:537, author = {Jingguo Bi; Xianmeng Meng and Lidong Han}, title = {Cryptanalysis of two knapsack public-key cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2009/537}, year = {2009}, url = {http://eprint.iacr.org/2009/537}, } @misc{cryptoeprint:2009:538, author = {Johann Gro{\ss}sch{\"a}dl and Elisabeth Oswald and Dan Page and Michael Tunstall}, title = {Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications}, howpublished = {Cryptology ePrint Archive, Report 2009/538}, year = {2009}, url = {http://eprint.iacr.org/2009/538}, } @misc{cryptoeprint:2009:539, author = {Yupeng Jiang and Yingpu Deng and Yanbin Pan}, title = {Covering Radius of Two-dimensional Lattices}, howpublished = {Cryptology ePrint Archive, Report 2009/539}, year = {2009}, url = {http://eprint.iacr.org/2009/539}, } @misc{cryptoeprint:2009:540, author = {David Mandell Freeman}, title = {Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups}, howpublished = {Cryptology ePrint Archive, Report 2009/540}, year = {2009}, url = {http://eprint.iacr.org/2009/540}, } @misc{cryptoeprint:2009:541, author = {Daniel V. Bailey and Lejla Batina and Daniel J. Bernstein and Peter Birkner and Joppe W. Bos and Hsieh-Chung Chen and Chen-Mou Cheng and Gauthier Van Damme and Giacomo de Meulenaer and Luis Julian Dominguez Perez and Junfeng Fan and Tim Gueneysu and Frank Gurkaynak and Tanja Lange and Nele Mentens and Ruben Niederhagen and Christof Paar and Francesco Regazzoni and Peter Schwabe and Leif Uhsadel and Anthony Van Herrewege and Bo-Yin Yang}, title = {Breaking ECC2K-130}, howpublished = {Cryptology ePrint Archive, Report 2009/541}, year = {2009}, url = {http://eprint.iacr.org/2009/541}, } @misc{cryptoeprint:2009:542, author = {Olivier Billet and Jacques Patarin and Yannick Seurin}, title = {Analysis of Intermediate Field Systems}, howpublished = {Cryptology ePrint Archive, Report 2009/542}, year = {2009}, url = {http://eprint.iacr.org/2009/542}, } @misc{cryptoeprint:2009:543, author = {Gildas Avoine and Muhammed Ali Bingol and Suleyman Kardas and Cedric Lauradoux and Benjamin Martin}, title = {A Formal Framework for Cryptanalyzing RFID Distance Bounding Protocols}, howpublished = {Cryptology ePrint Archive, Report 2009/543}, year = {2009}, url = {http://eprint.iacr.org/2009/543}, } @misc{cryptoeprint:2009:544, author = {Patrick Sol\'e and Natalia Tokareva}, title = {Connections between Quaternary and Binary Bent Functions}, howpublished = {Cryptology ePrint Archive, Report 2009/544}, year = {2009}, url = {http://eprint.iacr.org/2009/544}, } @misc{cryptoeprint:2009:545, author = {Ileana Buhan and Jeroen Doumen and Pieter Hartel}, title = {Fuzzy extractors for continuous distributions }, howpublished = {Cryptology ePrint Archive, Report 2009/545}, year = {2009}, url = {http://eprint.iacr.org/2009/545}, } @misc{cryptoeprint:2009:546, author = {Masao Kasahara}, title = {Construction of A New Class of Linear Multivariate Public Key Cryptosystem, K(I)SE(1)PKC}, howpublished = {Cryptology ePrint Archive, Report 2009/546}, year = {2009}, url = {http://eprint.iacr.org/2009/546}, } @misc{cryptoeprint:2009:547, author = {Rosario Gennaro and Craig Gentry and Bryan Parno}, title = {Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers}, howpublished = {Cryptology ePrint Archive, Report 2009/547}, year = {2009}, url = {http://eprint.iacr.org/2009/547}, } @misc{cryptoeprint:2009:548, author = {Stéphane BALLET and Robert ROLLAND}, title = {A NOTE ON YAO'S THEOREM ABOUT PSEUDORANDOM GENERATORS}, howpublished = {Cryptology ePrint Archive, Report 2009/548}, year = {2009}, url = {http://eprint.iacr.org/2009/548}, } @misc{cryptoeprint:2009:549, author = {Koji Nuida}, title = {Making Collusion-Secure Codes (More) Robust against Bit Erasure}, howpublished = {Cryptology ePrint Archive, Report 2009/549}, year = {2009}, url = {http://eprint.iacr.org/2009/549}, } @misc{cryptoeprint:2009:550, author = {Yusuke Naito and Lei Wang and Kazuo Ohta}, title = {How to Construct Cryptosystems and Hash Functions in Weakened Random Oracle Models}, howpublished = {Cryptology ePrint Archive, Report 2009/550}, year = {2009}, url = {http://eprint.iacr.org/2009/550}, } @misc{cryptoeprint:2009:551, author = {Hongbo Zou}, title = {A Novel Design Method of Stream Ciphers Based on Table-Element Permutation}, howpublished = {Cryptology ePrint Archive, Report 2009/551}, year = {2009}, url = {http://eprint.iacr.org/2009/551}, } @misc{cryptoeprint:2009:552, author = {Jinmin Zhong and Xuejia Lai}, title = {Preimage Attacks on Reduced DHA-256}, howpublished = {Cryptology ePrint Archive, Report 2009/552}, year = {2009}, url = {http://eprint.iacr.org/2009/552}, } @misc{cryptoeprint:2009:553, author = {Maria Isabel Gonzalez Vasco and Angel L. Perez del Pozo and Pedro Taborda Duarte}, title = {Cryptanalysis of a key exchange scheme based on block matrices}, howpublished = {Cryptology ePrint Archive, Report 2009/553}, year = {2009}, url = {http://eprint.iacr.org/2009/553}, } @misc{cryptoeprint:2009:554, author = {T. W. Cusick, Yuan Li and Pantelimon Stanica}, title = {On a combinatoric conjecture}, howpublished = {Cryptology ePrint Archive, Report 2009/554}, year = {2009}, url = {http://eprint.iacr.org/2009/554}, } @misc{cryptoeprint:2009:555, author = {Zhigang Gao and Dengguo Feng}, title = {An enhanced password authenticated key agreement protocol for wireless mobile network}, howpublished = {Cryptology ePrint Archive, Report 2009/555}, year = {2009}, url = {http://eprint.iacr.org/2009/555}, } @misc{cryptoeprint:2009:556, author = {Naomi Benger and Michael Scott}, title = {Constructing Tower Extensions for the implementation of Pairing-Based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2009/556}, year = {2009}, url = {http://eprint.iacr.org/2009/556}, } @misc{cryptoeprint:2009:557, author = {Yacov Yacobi}, title = {Towards a Theory of Trust Based Collaborative Search}, howpublished = {Cryptology ePrint Archive, Report 2009/557}, year = {2009}, url = {http://eprint.iacr.org/2009/557}, } @misc{cryptoeprint:2009:558, author = {Mariusz Jakubowski AND Ramarathnam Venkatesan AND Yacov Yacobi}, title = {Quantifying Trust}, howpublished = {Cryptology ePrint Archive, Report 2009/558}, year = {2009}, url = {http://eprint.iacr.org/2009/558}, } @misc{cryptoeprint:2009:559, author = {Yuechuan Wei and Bing Sun and Chao Li}, title = {New Integral Distinguisher for Rijndael-256}, howpublished = {Cryptology ePrint Archive, Report 2009/559}, year = {2009}, url = {http://eprint.iacr.org/2009/559}, } @misc{cryptoeprint:2009:560, author = {Manoj Kumar}, title = {On the Security Vulnerabilities of a Hash Based Strong Password Authentication Scheme}, howpublished = {Cryptology ePrint Archive, Report 2009/560}, year = {2009}, url = {http://eprint.iacr.org/2009/560}, } @misc{cryptoeprint:2009:561, author = {Yalin Chen1, Jue-Sam Chou2,* , Chun-Hui Huang3}, title = {Improvements on two password-based authentication protocols}, howpublished = {Cryptology ePrint Archive, Report 2009/561}, year = {2009}, url = {http://eprint.iacr.org/2009/561}, } @misc{cryptoeprint:2009:562, author = {Stefan Dziembowski}, title = {How to pair with a human}, howpublished = {Cryptology ePrint Archive, Report 2009/562}, year = {2009}, url = {http://eprint.iacr.org/2009/562}, } @misc{cryptoeprint:2009:563, author = {Dabin Zheng and Xiangyong Zeng and Lei Hu}, title = {A Family of $p$-ary Binomial Bent Functions}, howpublished = {Cryptology ePrint Archive, Report 2009/563}, year = {2009}, url = {http://eprint.iacr.org/2009/563}, } @misc{cryptoeprint:2009:564, author = {Mingqiang Wang and Puwen Wei and Haifeng Zhang and Yuliang Zheng}, title = {Optimal pairing revisited}, howpublished = {Cryptology ePrint Archive, Report 2009/564}, year = {2009}, url = {http://eprint.iacr.org/2009/564}, } @misc{cryptoeprint:2009:565, author = {Robert Granger and Michael Scott}, title = {Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions}, howpublished = {Cryptology ePrint Archive, Report 2009/565}, year = {2009}, url = {http://eprint.iacr.org/2009/565}, } @misc{cryptoeprint:2009:566, author = {Licheng Wang and Lihua Wang and Zhenfu Cao and Eiji Okamoto}, title = {New Cryptosystems From CSP-Based Self-Distributive Systems}, howpublished = {Cryptology ePrint Archive, Report 2009/566}, year = {2009}, url = {http://eprint.iacr.org/2009/566}, } @misc{cryptoeprint:2009:567, author = {Daniel Smith-Tone}, title = {Properties of the Discrete Differential with Cryptographic Applications}, howpublished = {Cryptology ePrint Archive, Report 2009/567}, year = {2009}, url = {http://eprint.iacr.org/2009/567}, } @misc{cryptoeprint:2009:568, author = {Qingfeng Cheng and Chuangui Ma}, title = {Ephemeral key compromise attack on the IB-KA protocol}, howpublished = {Cryptology ePrint Archive, Report 2009/568}, year = {2009}, url = {http://eprint.iacr.org/2009/568}, } @misc{cryptoeprint:2009:569, author = {Rosario Gennaro and Jonathan Katz and Hugo Krawczyk and Tal Rabin}, title = {Secure Network Coding Over the Integers}, howpublished = {Cryptology ePrint Archive, Report 2009/569}, year = {2009}, url = {http://eprint.iacr.org/2009/569}, } @misc{cryptoeprint:2009:570, author = {Adriana C. B. Pinto and Rafael Dowsley and Kirill Morozov and Anderson C. A. Nascimento}, title = {Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model}, howpublished = {Cryptology ePrint Archive, Report 2009/570}, year = {2009}, url = {http://eprint.iacr.org/2009/570}, } @misc{cryptoeprint:2009:571, author = {N.P. Smart and F. Vercauteren}, title = {Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes}, howpublished = {Cryptology ePrint Archive, Report 2009/571}, year = {2009}, url = {http://eprint.iacr.org/2009/571}, } @misc{cryptoeprint:2009:572, author = {Alexander W. Dent}, title = {On the Equivalence of Two Models for Key-Dependent-Message Encryption}, howpublished = {Cryptology ePrint Archive, Report 2009/572}, year = {2009}, url = {http://eprint.iacr.org/2009/572}, } @misc{cryptoeprint:2009:573, author = {Leibo Li and Mingqiang Wang and Zhanjiang Xia}, title = {New Addition Operation and Its Application for Scalar Multiplication on Hessian Curves over Prime Fields}, howpublished = {Cryptology ePrint Archive, Report 2009/573}, year = {2009}, url = {http://eprint.iacr.org/2009/573}, } @misc{cryptoeprint:2009:574, author = {Jeroen van de Graaf}, title = {Voting with unconditionally privacy: CFSY for booth voting}, howpublished = {Cryptology ePrint Archive, Report 2009/574}, year = {2009}, url = {http://eprint.iacr.org/2009/574}, } @misc{cryptoeprint:2009:575, author = {Michael Tunstall and Debdeep Mukhopadhyay}, title = {Differential Fault Analysis of the Advanced Encryption Standard using a Single Fault}, howpublished = {Cryptology ePrint Archive, Report 2009/575}, year = {2009}, url = {http://eprint.iacr.org/2009/575}, } @misc{cryptoeprint:2009:576, author = {Vadim Lyubashevsky and Adriana Palacio and Gil Segev}, title = {Public-Key Cryptographic Primitives Provably as Secure as Subset Sum}, howpublished = {Cryptology ePrint Archive, Report 2009/576}, year = {2009}, url = {http://eprint.iacr.org/2009/576}, } @misc{cryptoeprint:2009:577, author = {Claude Carlet}, title = {On the nonlinearity profile of the Dillon function}, howpublished = {Cryptology ePrint Archive, Report 2009/577}, year = {2009}, url = {http://eprint.iacr.org/2009/577}, } @misc{cryptoeprint:2009:578, author = {Wenjian Xie and Zhang Zhang}, title = {A New Efficient Certificateless Signcryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2009/578}, year = {2009}, url = {http://eprint.iacr.org/2009/578}, } @misc{cryptoeprint:2009:579, author = {Cong Wang and Qian Wang and Kui Ren and Wenjing Lou}, title = {Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing}, howpublished = {Cryptology ePrint Archive, Report 2009/579}, year = {2009}, url = {http://eprint.iacr.org/2009/579}, } @misc{cryptoeprint:2009:580, author = {Daniel J. Bernstein and Tanja Lange}, title = {A complete set of addition laws\\for incomplete Edwards curves}, howpublished = {Cryptology ePrint Archive, Report 2009/580}, year = {2009}, url = {http://eprint.iacr.org/2009/580}, } @misc{cryptoeprint:2009:581, author = {Dhiman Saha and Debdeep Mukhopadhyay and Dipanwita RoyChowdhury}, title = {A Diagonal Fault Attack on the Advanced Encryption Standard}, howpublished = {Cryptology ePrint Archive, Report 2009/581}, year = {2009}, url = {http://eprint.iacr.org/2009/581}, } @misc{cryptoeprint:2009:582, author = {Ralf Kuesters and Tomasz Truderung and Andreas Vogt}, title = {A Game-Based Definition of Coercion-Resistance and its Applications}, howpublished = {Cryptology ePrint Archive, Report 2009/582}, year = {2009}, url = {http://eprint.iacr.org/2009/582}, } @misc{cryptoeprint:2009:583, author = {Charles Bouillaguet and Jean-Charles Faugère and Pierre-Alain Fouque and Ludovic Perret}, title = {Isomorphism of Polynomials : New Results}, howpublished = {Cryptology ePrint Archive, Report 2009/583}, year = {2009}, url = {http://eprint.iacr.org/2009/583}, } @misc{cryptoeprint:2009:584, author = {Yu Liu, Kaijie Wu, and Ramesh Karri}, title = {Scan-based Attacks on Linear Feedback Shift Register Based Stream Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2009/584}, year = {2009}, url = {http://eprint.iacr.org/2009/584}, } @misc{cryptoeprint:2009:585, author = {ZHAO Xin-jie, WANG Tao}, title = {An Improved Differential Fault Attack on Camellia}, howpublished = {Cryptology ePrint Archive, Report 2009/585}, year = {2009}, url = {http://eprint.iacr.org/2009/585}, } @misc{cryptoeprint:2009:586, author = {Rongquan Feng and Hongfeng Wu}, title = {A mean value formula for elliptic curves}, howpublished = {Cryptology ePrint Archive, Report 2009/586}, year = {2009}, url = {http://eprint.iacr.org/2009/586}, } @misc{cryptoeprint:2009:587, author = {Rajesh P. Singh, A. Saikia and B.K. Sarma}, title = {Poly-Dragon: An efficient Multivariate Public Key Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2009/587}, year = {2009}, url = {http://eprint.iacr.org/2009/587}, } @misc{cryptoeprint:2009:588, author = {Alexander W. Dent, Marc Fischlin, Mark Manulis, Martijn Stam and Dominique Schroder}, title = {Confidential Signatures and Deterministic Signcryption}, howpublished = {Cryptology ePrint Archive, Report 2009/588}, year = {2009}, url = {http://eprint.iacr.org/2009/588}, } @misc{cryptoeprint:2009:589, author = {Christiane Peters}, title = {Information-set decoding for linear codes over Fq}, howpublished = {Cryptology ePrint Archive, Report 2009/589}, year = {2009}, url = {http://eprint.iacr.org/2009/589}, } @misc{cryptoeprint:2009:590, author = {David Mandell Freeman and Oded Goldreich and Eike Kiltz and Alon Rosen and Gil Segev}, title = {More Constructions of Lossy and Correlation-Secure Trapdoor Functions}, howpublished = {Cryptology ePrint Archive, Report 2009/590}, year = {2009}, url = {http://eprint.iacr.org/2009/590}, } @misc{cryptoeprint:2009:591, author = {Kimmo Järvinen and Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider}, title = {Embedded SFE: Offloading Server and Network using Hardware Tokens}, howpublished = {Cryptology ePrint Archive, Report 2009/591}, year = {2009}, url = {http://eprint.iacr.org/2009/591}, } @misc{cryptoeprint:2009:592, author = {Ivan Damgård and Martin Geisler and Jesper Buus Nielsen}, title = {From Passive to Covert Security at Low Cost}, howpublished = {Cryptology ePrint Archive, Report 2009/592}, year = {2009}, url = {http://eprint.iacr.org/2009/592}, } @misc{cryptoeprint:2009:593, author = {Jin Li and Qian Wang and Cong Wang and Ning Cao and Kui Ren and Wenjing Lou}, title = {Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing}, howpublished = {Cryptology ePrint Archive, Report 2009/593}, year = {2009}, url = {http://eprint.iacr.org/2009/593}, } @misc{cryptoeprint:2009:594, author = {Carmit Hazay and Kobbi Nissim}, title = {Efficient Set Operations in the Presence of Malicious Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2009/594}, year = {2009}, url = {http://eprint.iacr.org/2009/594}, } @misc{cryptoeprint:2009:595, author = {Endre Bangerter and Jan Camenisch and Stephan Krenn}, title = {Efficiency Limitations for $\Sigma$-Protocols for Group Homomorphisms}, howpublished = {Cryptology ePrint Archive, Report 2009/595}, year = {2009}, url = {http://eprint.iacr.org/2009/595}, } @misc{cryptoeprint:2009:596, author = {Jintai Ding and Vivien Dubois and Bo-Yin Yang and Owen Chia-Hsin Chen and Chen-Mou Cheng}, title = {Could SFLASH be repaired?}, howpublished = {Cryptology ePrint Archive, Report 2009/596}, year = {2009}, url = {http://eprint.iacr.org/2009/596}, } @misc{cryptoeprint:2009:597, author = {Rongquan Feng, Menglong Nie, Hongfeng Wu}, title = {Twisted Jacobi Intersections Curves}, howpublished = {Cryptology ePrint Archive, Report 2009/597}, year = {2009}, url = {http://eprint.iacr.org/2009/597}, } @misc{cryptoeprint:2009:598, author = {L. Chen, D. Page and N.P. Smart}, title = {On the Design and Implementation of an Efficient DAA Scheme}, howpublished = {Cryptology ePrint Archive, Report 2009/598}, year = {2009}, url = {http://eprint.iacr.org/2009/598}, } @misc{cryptoeprint:2009:599, author = {E. Ghadafi, N.P. Smart and B. Warinschi}, title = {Groth--Sahai proofs revisited}, howpublished = {Cryptology ePrint Archive, Report 2009/599}, year = {2009}, url = {http://eprint.iacr.org/2009/599}, } @misc{cryptoeprint:2009:600, author = {D. Fiore and R. Gennaro and N.P. Smart}, title = {Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement}, howpublished = {Cryptology ePrint Archive, Report 2009/600}, year = {2009}, url = {http://eprint.iacr.org/2009/600}, } @misc{cryptoeprint:2009:601, author = {Jens Hermans and Michael Schneider and Johannes Buchmann and Frederik Vercauteren and Bart Preneel}, title = {Parallel Shortest Lattice Vector Enumeration on Graphics Cards}, howpublished = {Cryptology ePrint Archive, Report 2009/601}, year = {2009}, url = {http://eprint.iacr.org/2009/601}, } @misc{cryptoeprint:2009:602, author = {Nils Ole Tippenhauer and Kasper Bonne Rasmussen and Srdjan \v{C}apkun}, title = {Secure Ranging With Message Temporal Integrity}, howpublished = {Cryptology ePrint Archive, Report 2009/602}, year = {2009}, url = {http://eprint.iacr.org/2009/602}, } @misc{cryptoeprint:2009:603, author = {Brian Baldwin and William P. Marnane}, title = {An FPGA Technologies Area Examination of the SHA-3 Hash Candidate Implementations}, howpublished = {Cryptology ePrint Archive, Report 2009/603}, year = {2009}, url = {http://eprint.iacr.org/2009/603}, } @misc{cryptoeprint:2009:604, author = {Eleanor Birrell and Salil Vadhan}, title = {Composition of Zero-Knowledge Proofs with Efficient Provers}, howpublished = {Cryptology ePrint Archive, Report 2009/604}, year = {2009}, url = {http://eprint.iacr.org/2009/604}, } @misc{cryptoeprint:2009:605, author = {Xavier Pujol and Damien Stehle}, title = {Solving the Shortest Lattice Vector Problem in Time 2^2.465n}, howpublished = {Cryptology ePrint Archive, Report 2009/605}, year = {2009}, url = {http://eprint.iacr.org/2009/605}, } @misc{cryptoeprint:2009:606, author = {Claude Carlet}, title = {On a weakness of the Tu-Deng function and its repair}, howpublished = {Cryptology ePrint Archive, Report 2009/606}, year = {2009}, url = {http://eprint.iacr.org/2009/606}, } @misc{cryptoeprint:2009:607, author = {Ghassan O. Karame and Srdjan Capkun}, title = {Efficient Client Puzzles based on Repeated-Squaring}, howpublished = {Cryptology ePrint Archive, Report 2009/607}, year = {2009}, url = {http://eprint.iacr.org/2009/607}, } @misc{cryptoeprint:2009:608, author = {Stefan Dziembowski and Krzysztof Pietrzak and Daniel Wichs}, title = {Non-Malleable Codes}, howpublished = {Cryptology ePrint Archive, Report 2009/608}, year = {2009}, url = {http://eprint.iacr.org/2009/608}, } @misc{cryptoeprint:2009:609, author = {Dang Nguyen Duc and Kwangjo Kim}, title = {Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction}, howpublished = {Cryptology ePrint Archive, Report 2009/609}, year = {2009}, url = {http://eprint.iacr.org/2009/609}, } @misc{cryptoeprint:2009:610, author = {Dang Nguyen Duc and Kwangjo Kim}, title = {Security Analysis of A Remote User Authentication Protocol by Liao and Wang}, howpublished = {Cryptology ePrint Archive, Report 2009/610}, year = {2009}, url = {http://eprint.iacr.org/2009/610}, } @misc{cryptoeprint:2009:611, author = {Lan Luo and ZhengYao Wei and ZhiGuang Qin}, title = {Golden Fish: An Intelligent Stream Cipher Fuse Memory Modules }, howpublished = {Cryptology ePrint Archive, Report 2009/611}, year = {2009}, url = {http://eprint.iacr.org/2009/611}, } @misc{cryptoeprint:2009:612, author = {Philippe Camacho}, title = {On the Impossibility of Batch Update for Cryptographic Accumulators}, howpublished = {Cryptology ePrint Archive, Report 2009/612}, year = {2009}, url = {http://eprint.iacr.org/2009/612}, } @misc{cryptoeprint:2009:613, author = {Tsutomu Iijima and Fumiyuki Momose and Jinhui Chao}, title = {Classification of Elliptic/hyperelliptic Curves with Weak Coverings against GHS Attack without Isogeny Condition}, howpublished = {Cryptology ePrint Archive, Report 2009/613}, year = {2009}, url = {http://eprint.iacr.org/2009/613}, } @misc{cryptoeprint:2009:614, author = {Ivan Damgård and Marcel Keller}, title = {Secure Multiparty AES (full paper)}, howpublished = {Cryptology ePrint Archive, Report 2009/614}, year = {2009}, url = {http://eprint.iacr.org/2009/614}, } @misc{cryptoeprint:2009:615, author = {Craig Costello and Tanja Lange and Michael Naehrig}, title = {Faster Pairing Computations on Curves with High-Degree Twists}, howpublished = {Cryptology ePrint Archive, Report 2009/615}, year = {2009}, url = {http://eprint.iacr.org/2009/615}, } @misc{cryptoeprint:2009:616, author = {Marten van Dijk and Craig Gentry and Shai Halevi and Vinod Vaikuntanathan}, title = {Fully Homomorphic Encryption over the Integers}, howpublished = {Cryptology ePrint Archive, Report 2009/616}, year = {2009}, url = {http://eprint.iacr.org/2009/616}, } @misc{cryptoeprint:2009:617, author = {B. Umaprasada Rao and P. Vasudeva Reddy and T. Gowri}, title = {An efficient ID- based directed signature scheme from bilinear pairings}, howpublished = {Cryptology ePrint Archive, Report 2009/617}, year = {2009}, url = {http://eprint.iacr.org/2009/617}, } @misc{cryptoeprint:2009:618, author = {ZiJie Xu and Ke Xu}, title = {Data-Depend Hash Algorithm }, howpublished = {Cryptology ePrint Archive, Report 2009/618}, year = {2009}, url = {http://eprint.iacr.org/2009/618}, } @misc{cryptoeprint:2009:619, author = {Charles Bouillaguet and Pierre-Alain Fouque and Antoine Joux and Joana Treger}, title = {A Family of Weak Keys in HFE (and the Corresponding Practical Key-Recovery)}, howpublished = {Cryptology ePrint Archive, Report 2009/619}, year = {2009}, url = {http://eprint.iacr.org/2009/619}, } @misc{cryptoeprint:2009:620, author = {Daniel R. L. Brown and Matthew J. Campagna and Scott A. Vanstone}, title = {Security of ECQV-Certified ECDSA Against Passive Adversaries }, howpublished = {Cryptology ePrint Archive, Report 2009/620}, year = {2009}, url = {http://eprint.iacr.org/2009/620}, } @misc{cryptoeprint:2009:621, author = {Tibor Jager and Jörg Schwenk}, title = {On the Analysis of Cryptographic Assumptions in the Generic Ring Model}, howpublished = {Cryptology ePrint Archive, Report 2009/621}, year = {2009}, url = {http://eprint.iacr.org/2009/621}, } @misc{cryptoeprint:2009:622, author = {WEI Yun, XIONG Guo-Hua, BAO Wan-Su and ZHANG Xing-Kai}, title = {A Strong Blind Signature Scheme over Braid Groups}, howpublished = {Cryptology ePrint Archive, Report 2009/622}, year = {2009}, url = {http://eprint.iacr.org/2009/622}, } @misc{cryptoeprint:2009:623, author = {Masaaki Shirase}, title = {Universally Constructing 12-th Degree Extension Field for Ate Pairing}, howpublished = {Cryptology ePrint Archive, Report 2009/623}, year = {2009}, url = {http://eprint.iacr.org/2009/623}, } @misc{cryptoeprint:2009:624, author = {Jens Bender and Marc Fischlin and Dennis Kuegler}, title = {Security Analysis of the PACE Key-Agreement Protocol}, howpublished = {Cryptology ePrint Archive, Report 2009/624}, year = {2009}, url = {http://eprint.iacr.org/2009/624}, } @misc{cryptoeprint:2009:625, author = {Charalampos Papamanthou and Roberto Tamassia and Nikos Triandopoulos}, title = {Cryptographic Accumulators for Authenticated Hash Tables}, howpublished = {Cryptology ePrint Archive, Report 2009/625}, year = {2009}, url = {http://eprint.iacr.org/2009/625}, } @misc{cryptoeprint:2009:626, author = {Santanu Sarkar and Subhamoy Maitra}, title = {Approximate Integer Common Divisor Problem relates to Implicit Factorization}, howpublished = {Cryptology ePrint Archive, Report 2009/626}, year = {2009}, url = {http://eprint.iacr.org/2009/626}, } @misc{cryptoeprint:2009:627, author = {Yiyuan Luo and Zhongming Wu and Xuejia Lai}, title = {Unified Impossible Differential Cryptanalysis on Block Cipher Structures}, howpublished = {Cryptology ePrint Archive, Report 2009/627}, year = {2009}, url = {http://eprint.iacr.org/2009/627}, } @misc{cryptoeprint:2009:628, author = {Aniket Kate and Ian Goldberg}, title = {Using Sphinx to Improve Onion Routing Circuit Construction}, howpublished = {Cryptology ePrint Archive, Report 2009/628}, year = {2009}, url = {http://eprint.iacr.org/2009/628}, } @misc{cryptoeprint:2009:629, author = {Sergey Morozov and Abhranil Maiti and Patrick Schaumont,}, title = {A Comparative Analysis of Delay Based PUF Implementations on FPGA}, howpublished = {Cryptology ePrint Archive, Report 2009/629}, year = {2009}, url = {http://eprint.iacr.org/2009/629}, } @misc{cryptoeprint:2009:630, author = {Eyal Kushilevitz and Yehuda Lindell and Tal Rabin}, title = {Information-Theoretically Secure Protocols and Security Under Composition}, howpublished = {Cryptology ePrint Archive, Report 2009/630}, year = {2009}, url = {http://eprint.iacr.org/2009/630}, } @misc{cryptoeprint:2009:631, author = {DaeHun Nyang and Mun-Kyu Lee }, title = {Improvement of Das's Two-Factor Authentication Protocol in Wireless Sensor Networks}, howpublished = {Cryptology ePrint Archive, Report 2009/631}, year = {2009}, url = {http://eprint.iacr.org/2009/631}, } @misc{cryptoeprint:2009:632, author = {Qiushi Yang and Yvo Desmedt}, title = {Cryptanalysis of Secure Message Transmission Protocols with Feedback}, howpublished = {Cryptology ePrint Archive, Report 2009/632}, year = {2009}, url = {http://eprint.iacr.org/2009/632}, } @misc{cryptoeprint:2009:633, author = {Michael J. Collins}, title = {Traitor-Tracing on Binary Strings}, howpublished = {Cryptology ePrint Archive, Report 2009/633}, year = {2009}, url = {http://eprint.iacr.org/2009/633}, } @misc{cryptoeprint:2009:634, author = {Charles Bouillaguet and Orr Dunkelman and Ga\"etan Leurent and Pierre-Alain Fouque}, title = {Attacks on Hash Functions based on Generalized Feistel - Application to Reduced-Round Lesamnta and SHAvite-3_{512}}, howpublished = {Cryptology ePrint Archive, Report 2009/634}, year = {2009}, url = {http://eprint.iacr.org/2009/634}, } @misc{cryptoeprint:2009:635, author = {Kazukuni Kobara}, title = {Flexible Quasi-Dyadic Code-Based Public-Key Encryption and Signature}, howpublished = {Cryptology ePrint Archive, Report 2009/635}, year = {2009}, url = {http://eprint.iacr.org/2009/635}, } @misc{cryptoeprint:2009:636, author = {Haining Fan and Ming Gu and Jiaguang Sun and Kwok-Yan Lam}, title = {Obtaining More Karatsuba-Like Formulae over Binary Field}, howpublished = {Cryptology ePrint Archive, Report 2009/636}, year = {2009}, url = {http://eprint.iacr.org/2009/636}, } @misc{cryptoeprint:2009:637, author = {Xiao-shan Gao and Zhenyu Huang}, title = {Efficient Characteristic Set Algorithms for Equation Solving in Finite Fields and Application in Analysis of Stream Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2009/637}, year = {2009}, url = {http://eprint.iacr.org/2009/637}, } @misc{cryptoeprint:2009:638, author = {Wei Yu, Kunpeng Wang, Bao Li}, title = {Reducing Elliptic Curve Logarithm to Logarithm in a Finite Field $\mathbb{F}_q$ for Some Orders}, howpublished = {Cryptology ePrint Archive, Report 2009/638}, year = {2009}, url = {http://eprint.iacr.org/2009/638}, } @misc{cryptoeprint:2010:001, author = {Jacques Patarin}, title = {Transfinite Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2010/001}, year = {2010}, url = {http://eprint.iacr.org/2010/001}, } @misc{cryptoeprint:2010:002, author = {Cheng-Kang Chu and Joseph K. Liu and Jianying Zhou and Feng Bao and Robert H. Deng}, title = {Practical ID-based Encryption for Wireless Sensor Network}, howpublished = {Cryptology ePrint Archive, Report 2010/002}, year = {2010}, url = {http://eprint.iacr.org/2010/002}, } @misc{cryptoeprint:2010:003, author = {Joseph K. Liu, Joonsang Baek, Jianying Zhou, Yanjiang Yang, Jun Wen Wong}, title = {Efficient Online/Offline Identity-Based Signature for Wireless Sensor Network}, howpublished = {Cryptology ePrint Archive, Report 2010/003}, year = {2010}, url = {http://eprint.iacr.org/2010/003}, } @misc{cryptoeprint:2010:004, author = {Qiping Lin and Fangguo Zhang}, title = {Halving on Binary Edwards Curves}, howpublished = {Cryptology ePrint Archive, Report 2010/004}, year = {2010}, url = {http://eprint.iacr.org/2010/004}, } @misc{cryptoeprint:2010:005, author = {Mingqiang Wang, Xiaoyun Wang,Tao Zhan, Yuliang Zheng}, title = {Skew-Frobenius map on twisted Edwards curve}, howpublished = {Cryptology ePrint Archive, Report 2010/005}, year = {2010}, url = {http://eprint.iacr.org/2010/005}, } @misc{cryptoeprint:2010:006, author = {Thorsten Kleinjung and Kazumaro Aoki and Jens Franke and Arjen Lenstra and Emmanuel Thomé and Joppe Bos and Pierrick Gaudry and Alexander Kruppa and Peter Montgomery and Dag Arne Osvik and Herman te Riele and Andrey Timofeev and Paul Zimmermann}, title = {Factorization of a 768-bit RSA modulus}, howpublished = {Cryptology ePrint Archive, Report 2010/006}, year = {2010}, url = {http://eprint.iacr.org/2010/006}, } @misc{cryptoeprint:2010:007, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan}, title = {Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience}, howpublished = {Cryptology ePrint Archive, Report 2010/007}, year = {2010}, url = {http://eprint.iacr.org/2010/007}, } @misc{cryptoeprint:2010:008, author = {Liqun Chen}, title = {A DAA Scheme Requiring Less TPM Resources}, howpublished = {Cryptology ePrint Archive, Report 2010/008}, year = {2010}, url = {http://eprint.iacr.org/2010/008}, } @misc{cryptoeprint:2010:009, author = {Xuelian Li and Yupu Hu and Juntao Gao}, title = {The Lower Bounds on the Second Order Nonlinearity of Cubic Boolean Functions}, howpublished = {Cryptology ePrint Archive, Report 2010/009}, year = {2010}, url = {http://eprint.iacr.org/2010/009}, } @misc{cryptoeprint:2010:010, author = {Kazuyuki Kobayashi and Jun Ikegami and Shin’ichiro Matsuo and Kazuo Sakiyama and Kazuo Ohta}, title = {Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII}, howpublished = {Cryptology ePrint Archive, Report 2010/010}, year = {2010}, url = {http://eprint.iacr.org/2010/010}, } @misc{cryptoeprint:2010:011, author = {Mainack Mondal and Debdeep Mukhopadhyay}, title = {Related Key Cryptanalysis of the LEX Stream Cipher}, howpublished = {Cryptology ePrint Archive, Report 2010/011}, year = {2010}, url = {http://eprint.iacr.org/2010/011}, } @misc{cryptoeprint:2010:012, author = {Chester Rebeiro and Debdeep Mukhopadhyay}, title = {Differential Cache Trace Attack Against CLEFIA}, howpublished = {Cryptology ePrint Archive, Report 2010/012}, year = {2010}, url = {http://eprint.iacr.org/2010/012}, } @misc{cryptoeprint:2010:013, author = {Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony}, howpublished = {Cryptology ePrint Archive, Report 2010/013}, year = {2010}, url = {http://eprint.iacr.org/2010/013}, } @misc{cryptoeprint:2010:014, author = {Mridul Nandi}, title = {A Unified Method for Improving PRF Bounds for a Class of Blockcipher based MACs}, howpublished = {Cryptology ePrint Archive, Report 2010/014}, year = {2010}, url = {http://eprint.iacr.org/2010/014}, } @misc{cryptoeprint:2010:015, author = {Jorge Guajardo and Bart Mennink}, title = {Towards Side-Channel Resistant Block Cipher Usage or Can We Encrypt Without Side-Channel Countermeasures?}, howpublished = {Cryptology ePrint Archive, Report 2010/015}, year = {2010}, url = {http://eprint.iacr.org/2010/015}, } @misc{cryptoeprint:2010:016, author = {Jian Guo and San Ling and Christian Rechberger and Huaxiong Wang}, title = {Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2}, howpublished = {Cryptology ePrint Archive, Report 2010/016}, year = {2010}, url = {http://eprint.iacr.org/2010/016}, } @misc{cryptoeprint:2010:017, author = {Paulo S. L. M. Barreto and Rafael Misoczki}, title = {A new one-time signature scheme from syndrome decoding}, howpublished = {Cryptology ePrint Archive, Report 2010/017}, year = {2010}, url = {http://eprint.iacr.org/2010/017}, } @misc{cryptoeprint:2010:018, author = {Imran Erguler and Emin Anarim}, title = {Scalability and Security Conflict for RFID Authentication Protocols}, howpublished = {Cryptology ePrint Archive, Report 2010/018}, year = {2010}, url = {http://eprint.iacr.org/2010/018}, } @misc{cryptoeprint:2010:019, author = {Jongsung Kim and Seokhie Hong and Bart Preneel and Eli Biham and Orr Dunkelman and Nathan Keller}, title = {Related-Key Boomerang and Rectangle Attacks}, howpublished = {Cryptology ePrint Archive, Report 2010/019}, year = {2010}, url = {http://eprint.iacr.org/2010/019}, } @misc{cryptoeprint:2010:020, author = {Rongquan Feng, Hongfeng Wu}, title = {Number of Jacobi quartic curves over finite fields}, howpublished = {Cryptology ePrint Archive, Report 2010/020}, year = {2010}, url = {http://eprint.iacr.org/2010/020}, } @misc{cryptoeprint:2010:021, author = {Kitae Jeong and Yuseop Lee and Jaechul Sung and Seokhie Hong}, title = {A note on ``Improved Fast Correlation Attacks on Stream Ciphers"}, howpublished = {Cryptology ePrint Archive, Report 2010/021}, year = {2010}, url = {http://eprint.iacr.org/2010/021}, } @misc{cryptoeprint:2010:022, author = {Mohammad Reza Reyhanitabar and Willy Susilo and Yi Mu}, title = {Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships}, howpublished = {Cryptology ePrint Archive, Report 2010/022}, year = {2010}, url = {http://eprint.iacr.org/2010/022}, } @misc{cryptoeprint:2010:023, author = {Junko Takahashi and Toshinori Fukunaga}, title = {Differential Fault Analysis on AES with 192 and 256-Bit Keys}, howpublished = {Cryptology ePrint Archive, Report 2010/023}, year = {2010}, url = {http://eprint.iacr.org/2010/023}, } @misc{cryptoeprint:2010:024, author = {Dima Grigoriev and Vladimir Shpilrain}, title = {Authentication schemes from actions on graphs, groups, or rings}, howpublished = {Cryptology ePrint Archive, Report 2010/024}, year = {2010}, url = {http://eprint.iacr.org/2010/024}, } @misc{cryptoeprint:2010:025, author = {Jiqiang Lu}, title = {New Methodologies for Differential-Linear Cryptanalysis and Its Extensions}, howpublished = {Cryptology ePrint Archive, Report 2010/025}, year = {2010}, url = {http://eprint.iacr.org/2010/025}, } @misc{cryptoeprint:2010:026, author = {Xin-jie ZHAO and Tao WANG}, title = {Further Improved Differential Fault Attacks on Camellia by Exploring Fault Width and Depth}, howpublished = {Cryptology ePrint Archive, Report 2010/026}, year = {2010}, url = {http://eprint.iacr.org/2010/026}, } @misc{cryptoeprint:2010:027, author = {Yalin Chen1, *Jue-Sam Chou2, Xian-Wu Hou3}, title = {A novel k-out-of-n Oblivious Transfer Protocols Based on Bilinear Pairings}, howpublished = {Cryptology ePrint Archive, Report 2010/027}, year = {2010}, url = {http://eprint.iacr.org/2010/027}, } @misc{cryptoeprint:2010:028, author = {*Jue-Sam Chou 1, Yalin Chen 2}, title = {A secure anonymous communication scheme in vehicular ad hoc networks from pairings}, howpublished = {Cryptology ePrint Archive, Report 2010/028}, year = {2010}, url = {http://eprint.iacr.org/2010/028}, } @misc{cryptoeprint:2010:029, author = {Yuval Ishai and Jonathan Katz and Eyal Kushilevitz and Yehuda Lindell and Erez Petrank}, title = {On Achieving the "Best of Both Worlds" in Secure Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2010/029}, year = {2010}, url = {http://eprint.iacr.org/2010/029}, } @misc{cryptoeprint:2010:030, author = {D.R. Stinson and J. Upadhyay}, title = {On the Complexity of the Herding Attack and Some Related Attacks on Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2010/030}, year = {2010}, url = {http://eprint.iacr.org/2010/030}, } @misc{cryptoeprint:2010:031, author = {Andreas Enge and Andrew V. Sutherland}, title = {Class Invariants by the CRT Method}, howpublished = {Cryptology ePrint Archive, Report 2010/031}, year = {2010}, url = {http://eprint.iacr.org/2010/031}, } @misc{cryptoeprint:2010:032, author = {Yang Li, Shigeto Gomisawa, Kazuo Sakiyama, Kazuo Ohta}, title = {An Information Theoretic Perspective on the Differential Fault Analysis against AES}, howpublished = {Cryptology ePrint Archive, Report 2010/032}, year = {2010}, url = {http://eprint.iacr.org/2010/032}, } @misc{cryptoeprint:2010:033, author = {Kristiyan Haralambiev and Tibor Jager and Eike Kiltz and Victor Shoup}, title = {Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2010/033}, year = {2010}, url = {http://eprint.iacr.org/2010/033}, } @misc{cryptoeprint:2010:034, author = {Xiwang Cao}, title = {On the order of the polynomial $x^p-x-a$}, howpublished = {Cryptology ePrint Archive, Report 2010/034}, year = {2010}, url = {http://eprint.iacr.org/2010/034}, } @misc{cryptoeprint:2010:035, author = {Goichiro Hanaoka and Kaoru Kurosawa}, title = {Between Hashed DH and Computational DH: Compact Encryption from Weaker Assumption}, howpublished = {Cryptology ePrint Archive, Report 2010/035}, year = {2010}, url = {http://eprint.iacr.org/2010/035}, } @misc{cryptoeprint:2010:036, author = {Keerti Srivastava and Amit K Awasthi and R.C.Mittal}, title = {An Improved Timestamp-Based Password Remote User Authentication Scheme}, howpublished = {Cryptology ePrint Archive, Report 2010/036}, year = {2010}, url = {http://eprint.iacr.org/2010/036}, } @misc{cryptoeprint:2010:037, author = {Pierre-Alain Fouque and Mehdi Tibouchi}, title = {Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2010/037}, year = {2010}, url = {http://eprint.iacr.org/2010/037}, } @misc{cryptoeprint:2010:038, author = {Arnaud Boscher and Helena Handschuh and Elena Trichina}, title = {Fault Resistant RSA Signatures: Chinese Remaindering in Both Directions}, howpublished = {Cryptology ePrint Archive, Report 2010/038}, year = {2010}, url = {http://eprint.iacr.org/2010/038}, } @misc{cryptoeprint:2010:039, author = {Xiwang Cao and Lei Hu}, title = {On Exponential Sums, Nowton identities and Dickson Polynomials over Finite Fields}, howpublished = {Cryptology ePrint Archive, Report 2010/039}, year = {2010}, url = {http://eprint.iacr.org/2010/039}, } @misc{cryptoeprint:2010:040, author = {Olivier Blazy and Georg Fuchsbauer and Malika Izabachène and Amandine Jambert and Hervé Sibert and Damien Vergnaud}, title = {Batch Groth-Sahai}, howpublished = {Cryptology ePrint Archive, Report 2010/040}, year = {2010}, url = {http://eprint.iacr.org/2010/040}, } @misc{cryptoeprint:2010:041, author = {Orr Dunkelman and Nathan Keller}, title = {The Effects of the Omission of Last Round's MixColumns on AES}, howpublished = {Cryptology ePrint Archive, Report 2010/041}, year = {2010}, url = {http://eprint.iacr.org/2010/041}, } @misc{cryptoeprint:2010:042, author = {Qingfeng Cheng and Chuangui Ma and Fushan Wei}, title = {A modified eCK model with stronger security for tripartite authenticated key exchange}, howpublished = {Cryptology ePrint Archive, Report 2010/042}, year = {2010}, url = {http://eprint.iacr.org/2010/042}, } @misc{cryptoeprint:2010:043, author = {Jean-Philippe Aumasson and Jian Guo and Simon Knellwolf and Krystian Matusiewicz and Willi Meier}, title = {Differential and invertibility properties of BLAKE (full version)}, howpublished = {Cryptology ePrint Archive, Report 2010/043}, year = {2010}, url = {http://eprint.iacr.org/2010/043}, } @misc{cryptoeprint:2010:044, author = {Abir AWAD}, title = {A New Chaotic Image Encryption Algorithm using a New Way of Permutation Methods}, howpublished = {Cryptology ePrint Archive, Report 2010/044}, year = {2010}, url = {http://eprint.iacr.org/2010/044}, } @misc{cryptoeprint:2010:045, author = {Abir AWAD}, title = {Efficient chaotic permutations for image encryption algorithms}, howpublished = {Cryptology ePrint Archive, Report 2010/045}, year = {2010}, url = {http://eprint.iacr.org/2010/045}, } @misc{cryptoeprint:2010:046, author = {Abir AWAD}, title = {A New Chaos-Based Cryptosystem for Secure Transmitted Images}, howpublished = {Cryptology ePrint Archive, Report 2010/046}, year = {2010}, url = {http://eprint.iacr.org/2010/046}, } @misc{cryptoeprint:2010:047, author = {Daniel R. L. Brown}, title = {Lower Bounds for Factoring Integral-Generically, with Room for Improvement}, howpublished = {Cryptology ePrint Archive, Report 2010/047}, year = {2010}, url = {http://eprint.iacr.org/2010/047}, } @misc{cryptoeprint:2010:048, author = {He Debiao; Chen Jianhua; Hu Jin}, title = {An enhanced ID-based remote mutual authentication with key agreement protocol for mobile devices on elliptic curve cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2010/048}, year = {2010}, url = {http://eprint.iacr.org/2010/048}, } @misc{cryptoeprint:2010:049, author = {Ran Canetti and Yael Tauman Kalai and Mayank Varia and Daniel Wichs}, title = {On Symmetric Encryption and Point Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2010/049}, year = {2010}, url = {http://eprint.iacr.org/2010/049}, } @misc{cryptoeprint:2010:050, author = {Jia XU and Ee-Chien CHANG}, title = {Authenticating Aggregate Range Queries over Multidimensional Dataset}, howpublished = {Cryptology ePrint Archive, Report 2010/050}, year = {2010}, url = {http://eprint.iacr.org/2010/050}, } @misc{cryptoeprint:2010:051, author = {Zhengjun Cao}, title = {A Principle for Cryptographic Protocols Beyond Security, Less Parameters}, howpublished = {Cryptology ePrint Archive, Report 2010/051}, year = {2010}, url = {http://eprint.iacr.org/2010/051}, } @misc{cryptoeprint:2010:052, author = {FuShan Wei and QingFeng Cheng and ChuanGui Ma}, title = {Cryptanalysis and Improvement of a New Gateway-Oriented Password-Based Authenticated Key Exchange Protocol}, howpublished = {Cryptology ePrint Archive, Report 2010/052}, year = {2010}, url = {http://eprint.iacr.org/2010/052}, } @misc{cryptoeprint:2010:053, author = {A.D. Plotnikov}, title = {Logical cryptoanalysis on the example of the cryptosystem DES}, howpublished = {Cryptology ePrint Archive, Report 2010/053}, year = {2010}, url = {http://eprint.iacr.org/2010/053}, } @misc{cryptoeprint:2010:054, author = {CHEN Cai-Sen, Wang Tao, Tian Jun-Jian}, title = {An Improved Timing Attack with Error Detection on RSA-CRT}, howpublished = {Cryptology ePrint Archive, Report 2010/054}, year = {2010}, url = {http://eprint.iacr.org/2010/054}, } @misc{cryptoeprint:2010:055, author = {Jan Camenisch and Nathalie Casati and Thomas Gross and Victor Shoup}, title = {Credential Authenticated Identification and Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2010/055}, year = {2010}, url = {http://eprint.iacr.org/2010/055}, } @misc{cryptoeprint:2010:056, author = {Xin-jie ZHAO and Tao WANG}, title = {Improved Cache Trace Attack on AES and CLEFIA by Considering Cache Miss and S-box Misalignment}, howpublished = {Cryptology ePrint Archive, Report 2010/056}, year = {2010}, url = {http://eprint.iacr.org/2010/056}, } @misc{cryptoeprint:2010:057, author = {Cagdas Calik and Meltem Sonmez Turan}, title = {Message Recovery and Pseudo-Preimage Attacks on the Compression Function of Hamsi-256}, howpublished = {Cryptology ePrint Archive, Report 2010/057}, year = {2010}, url = {http://eprint.iacr.org/2010/057}, } @misc{cryptoeprint:2010:058, author = {Jos\'e de Jes\'us Angel Angel and Guillermo Morales-Luna}, title = {Solinas primes of small weight for fixed sizes}, howpublished = {Cryptology ePrint Archive, Report 2010/058}, year = {2010}, url = {http://eprint.iacr.org/2010/058}, } @misc{cryptoeprint:2010:059, author = {Robert H. Deng, Yingjiu Li, Andrew C. Yao and Moti Yung and Yunlei Zhao}, title = {A New Framework for RFID Privacy}, howpublished = {Cryptology ePrint Archive, Report 2010/059}, year = {2010}, url = {http://eprint.iacr.org/2010/059}, } @misc{cryptoeprint:2010:060, author = {Yongge Wang}, title = {Insecure ``Provably Secure Network Coding'' and Homomorphic Authentication Schemes for Network Coding}, howpublished = {Cryptology ePrint Archive, Report 2010/060}, year = {2010}, url = {http://eprint.iacr.org/2010/060}, } @misc{cryptoeprint:2010:061, author = {Pu Duan and Sanmin Liu and Weiqin Ma and Guofei Gu and Jyh-Charn Liu}, title = {Privacy-Preserving Matching Protocols for Attributes and Strings}, howpublished = {Cryptology ePrint Archive, Report 2010/061}, year = {2010}, url = {http://eprint.iacr.org/2010/061}, } @misc{cryptoeprint:2010:062, author = {Bozhan Su and Wenling Wu and Wentao Zhang}, title = {Differential Cryptanalysis of SMS4 Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2010/062}, year = {2010}, url = {http://eprint.iacr.org/2010/062}, } @misc{cryptoeprint:2010:063, author = {Ruilin Li and Bing Sun and Chao Li and JianXiong You}, title = {Differential Fault Analysis on SMS4 Using a Single Fault}, howpublished = {Cryptology ePrint Archive, Report 2010/063}, year = {2010}, url = {http://eprint.iacr.org/2010/063}, } @misc{cryptoeprint:2010:064, author = {Ulrike Meyer and Susanne Wetzel and Sotiris Ioannidis}, title = {New Advances on Privacy-Preserving Policy Reconciliation}, howpublished = {Cryptology ePrint Archive, Report 2010/064}, year = {2010}, url = {http://eprint.iacr.org/2010/064}, } @misc{cryptoeprint:2010:065, author = {Zhengjun Cao}, title = {An Anonymous ID-based Encryption Revisited}, howpublished = {Cryptology ePrint Archive, Report 2010/065}, year = {2010}, url = {http://eprint.iacr.org/2010/065}, } @misc{cryptoeprint:2010:066, author = {Bozhan Su and Wenling Wu and Lei Zhang and Yanjun Li}, title = {Some Observations on TWIS Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2010/066}, year = {2010}, url = {http://eprint.iacr.org/2010/066}, } @misc{cryptoeprint:2010:067, author = {Ernie Brickell and Jiangtao Li}, title = {A Pairing-Based DAA Scheme Further Reducing TPM Resources}, howpublished = {Cryptology ePrint Archive, Report 2010/067}, year = {2010}, url = {http://eprint.iacr.org/2010/067}, } @misc{cryptoeprint:2010:068, author = {Rosario Gennaro and Hugo Krawczyk and Tal Rabin}, title = {Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead}, howpublished = {Cryptology ePrint Archive, Report 2010/068}, year = {2010}, url = {http://eprint.iacr.org/2010/068}, } @misc{cryptoeprint:2010:069, author = {Daniel J. Bernstein and Tanja Lange}, title = {Type-II Optimal Polynomial Bases}, howpublished = {Cryptology ePrint Archive, Report 2010/069}, year = {2010}, url = {http://eprint.iacr.org/2010/069}, } @misc{cryptoeprint:2010:070, author = {Markus Rückert}, title = {Strongly Unforgeable Signatures and Hierarchical Identity-based Signatures from Lattices without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2010/070}, year = {2010}, url = {http://eprint.iacr.org/2010/070}, } @misc{cryptoeprint:2010:071, author = {Didier Alqui\'e}, title = {2-round Substitution-Permutation and 3-round Feistel Networks have bad Algebraic Degree}, howpublished = {Cryptology ePrint Archive, Report 2010/071}, year = {2010}, url = {http://eprint.iacr.org/2010/071}, } @misc{cryptoeprint:2010:072, author = {Didier Alqui\'e}, title = {Approximating Addition by XOR: how to go (a little) further than P. Sarkar}, howpublished = {Cryptology ePrint Archive, Report 2010/072}, year = {2010}, url = {http://eprint.iacr.org/2010/072}, } @misc{cryptoeprint:2010:073, author = {Bonwook Koo, Yongjin Yeom, and Junghwan Song}, title = {Related-Key Boomerang Attack on Block Cipher SQUARE}, howpublished = {Cryptology ePrint Archive, Report 2010/073}, year = {2010}, url = {http://eprint.iacr.org/2010/073}, } @misc{cryptoeprint:2010:074, author = {Andrew C. Yao and Moti Yung and Yunlei Zhao}, title = {Concurrent Knowledge Extraction in the Public-Key Model}, howpublished = {Cryptology ePrint Archive, Report 2010/074}, year = {2010}, url = {http://eprint.iacr.org/2010/074}, } @misc{cryptoeprint:2010:075, author = {Mehdi Vasef}, title = {A New Scheme for Zero Knowledge Proof based on Multivariate Quadratic Problem and Quaternion Algebra}, howpublished = {Cryptology ePrint Archive, Report 2010/075}, year = {2010}, url = {http://eprint.iacr.org/2010/075}, } @misc{cryptoeprint:2010:076, author = {T-H. Hubert Chan and Elaine Shi and Dawn Song}, title = {Private and Continual Release of Statistics}, howpublished = {Cryptology ePrint Archive, Report 2010/076}, year = {2010}, url = {http://eprint.iacr.org/2010/076}, } @misc{cryptoeprint:2010:077, author = {Joppe W. Bos and Thorsten Kleinjung and Ruben Niederhagen and Peter Schwabe}, title = {ECC2K-130 on Cell CPUs}, howpublished = {Cryptology ePrint Archive, Report 2010/077}, year = {2010}, url = {http://eprint.iacr.org/2010/077}, } @misc{cryptoeprint:2010:078, author = {Xin-jie ZHAO and Tao WANG and Jing-zhe GAO}, title = {Multiple Bytes Differential Fault Analysis on CLEFIA}, howpublished = {Cryptology ePrint Archive, Report 2010/078}, year = {2010}, url = {http://eprint.iacr.org/2010/078}, } @misc{cryptoeprint:2010:079, author = {Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider}, title = {Modular Design of Efficient Secure Function Evaluation Protocols}, howpublished = {Cryptology ePrint Archive, Report 2010/079}, year = {2010}, url = {http://eprint.iacr.org/2010/079}, } @misc{cryptoeprint:2010:080, author = {Gergei Bana and Koji Hasebe and Mitsuhiro Okada}, title = {Secrecy-Oriented First-Order Logical Analysis of Cryptographic Protocols}, howpublished = {Cryptology ePrint Archive, Report 2010/080}, year = {2010}, url = {http://eprint.iacr.org/2010/080}, } @misc{cryptoeprint:2010:081, author = {Sandy Harris}, title = {The Eris hybrid cipher}, howpublished = {Cryptology ePrint Archive, Report 2010/081}, year = {2010}, url = {http://eprint.iacr.org/2010/081}, } @misc{cryptoeprint:2010:082, author = {James Birkett and Douglas Stebila}, title = {Predicate-Based Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2010/082}, year = {2010}, url = {http://eprint.iacr.org/2010/082}, } @misc{cryptoeprint:2010:083, author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz\'alez Nieto}, title = {One Round Group Key Exchange with Forward Security in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2010/083}, year = {2010}, url = {http://eprint.iacr.org/2010/083}, } @misc{cryptoeprint:2010:084, author = {M. Choudary Gorantla and Colin Boyd and Juan Manuel Gonz\'alez Nieto}, title = {Attribute-based Authenticated Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2010/084}, year = {2010}, url = {http://eprint.iacr.org/2010/084}, } @misc{cryptoeprint:2010:085, author = {Sk. Md. Mizanur Rahman and Mehedi Masud and Carlisle Adams and Khalil El-Khatib and Hussein Mouftah and Eiji Okamoto}, title = {Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems}, howpublished = {Cryptology ePrint Archive, Report 2010/085}, year = {2010}, url = {http://eprint.iacr.org/2010/085}, } @misc{cryptoeprint:2010:086, author = {Zvika Brakerski and Yael Tauman Kalai}, title = {A Framework for Efficient Signatures, Ring Signatures and Identity Based Encryption in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2010/086}, year = {2010}, url = {http://eprint.iacr.org/2010/086}, } @misc{cryptoeprint:2010:087, author = {Christopher Wolf and Bart Preneel}, title = {MQ^*-IP: An Identity-based Identification Scheme without Number-theoretic Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2010/087}, year = {2010}, url = {http://eprint.iacr.org/2010/087}, } @misc{cryptoeprint:2010:088, author = {Chris Peikert}, title = {An Efficient and Parallel Gaussian Sampler for Lattices}, howpublished = {Cryptology ePrint Archive, Report 2010/088}, year = {2010}, url = {http://eprint.iacr.org/2010/088}, } @misc{cryptoeprint:2010:089, author = {Vipul Goyal and Yuval Ishai and Mohammad Mahmoody and Amit Sahai}, title = {Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2010/089}, year = {2010}, url = {http://eprint.iacr.org/2010/089}, } @misc{cryptoeprint:2010:090, author = {Takuya Hayashi and Naoyuki Shinohara and Lihua Wang and Shin'ichiro Matsuo and Masaaki Shirase and Tsuyoshi Takagi}, title = {Solving a 676-bit Discrete Logarithm Problem in GF(3^{6n})}, howpublished = {Cryptology ePrint Archive, Report 2010/090}, year = {2010}, url = {http://eprint.iacr.org/2010/090}, } @misc{cryptoeprint:2010:091, author = {Jean-Philippe Aumasson and Emilia Käsper and Lars Ramkilde Knudsen and Krystian Matusiewicz and Rune Odegaard and Thomas Peyrin and Martin Schläffer}, title = {Differential Distinguishers for the Compression Function and Output Transformation of Hamsi-256}, howpublished = {Cryptology ePrint Archive, Report 2010/091}, year = {2010}, url = {http://eprint.iacr.org/2010/091}, } @misc{cryptoeprint:2010:092, author = {S.Sharmila Deva Selvi and S.Sree Vivek and C.Pandu Rangan}, title = {Security Weaknesses in Two Certificateless Signcryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2010/092}, year = {2010}, url = {http://eprint.iacr.org/2010/092}, } @misc{cryptoeprint:2010:093, author = {Zheng Yuan}, title = {New Impossible Di®erential Attacks on AES}, howpublished = {Cryptology ePrint Archive, Report 2010/093}, year = {2010}, url = {http://eprint.iacr.org/2010/093}, } @misc{cryptoeprint:2010:094, author = {He Debiao, Chen Jianhua, Hu Jin}, title = {A Random Number Generator Based on Isogenies Operations}, howpublished = {Cryptology ePrint Archive, Report 2010/094}, year = {2010}, url = {http://eprint.iacr.org/2010/094}, } @misc{cryptoeprint:2010:095, author = {Kenneth G. Paterson and Gaven J. Watson}, title = {Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR}, howpublished = {Cryptology ePrint Archive, Report 2010/095}, year = {2010}, url = {http://eprint.iacr.org/2010/095}, } @misc{cryptoeprint:2010:096, author = {Kamer Kaya and Ali Aydın Selçuk}, title = {Secret Sharing Extensions based on the Chinese Remainder Theorem}, howpublished = {Cryptology ePrint Archive, Report 2010/096}, year = {2010}, url = {http://eprint.iacr.org/2010/096}, } @misc{cryptoeprint:2010:097, author = {Özgür Dagdelen and Michael Schneider}, title = {Parallel Enumeration of Shortest Lattice Vectors}, howpublished = {Cryptology ePrint Archive, Report 2010/097}, year = {2010}, url = {http://eprint.iacr.org/2010/097}, } @misc{cryptoeprint:2010:098, author = {Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek}, title = {A Zero-One Law for Deterministic 2-Party Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2010/098}, year = {2010}, url = {http://eprint.iacr.org/2010/098}, } @misc{cryptoeprint:2010:099, author = {Brett Hemenway and Rafail Ostrovsky}, title = {Homomorphic Encryption Over Cyclic Groups Implies Chosen-Ciphertext Security}, howpublished = {Cryptology ePrint Archive, Report 2010/099}, year = {2010}, url = {http://eprint.iacr.org/2010/099}, } @misc{cryptoeprint:2010:100, author = {Brett Hemenway and Steve Lu and Rafail Ostrovsky}, title = {Correlated Product Security From Any One-Way Function and the New Notion of Decisional Correlated Product Security}, howpublished = {Cryptology ePrint Archive, Report 2010/100}, year = {2010}, url = {http://eprint.iacr.org/2010/100}, } @misc{cryptoeprint:2010:101, author = {Georg Fuchsbauer and Damien Vergnaud}, title = {Fair Blind Signatures without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2010/101}, year = {2010}, url = {http://eprint.iacr.org/2010/101}, } @misc{cryptoeprint:2010:102, author = {Susan Hohenberger and Brent Waters}, title = {Constructing Verifiable Random Functions with Large Input Spaces}, howpublished = {Cryptology ePrint Archive, Report 2010/102}, year = {2010}, url = {http://eprint.iacr.org/2010/102}, } @misc{cryptoeprint:2010:103, author = {Rafik Chaabouni and Serge Vaudenay}, title = {The Extended Access Control for Machine Readable Travel Documents}, howpublished = {Cryptology ePrint Archive, Report 2010/103}, year = {2010}, url = {http://eprint.iacr.org/2010/103}, } @misc{cryptoeprint:2010:104, author = {Craig Costello and Colin Boyd and Juan Manuel Gonzalez Nieto and Kenneth Koon-Ho Wong}, title = {Avoiding Full Extension Field Arithmetic in Pairing Computations}, howpublished = {Cryptology ePrint Archive, Report 2010/104}, year = {2010}, url = {http://eprint.iacr.org/2010/104}, } @misc{cryptoeprint:2010:105, author = {Sui-Guan Teo and Leonie Simpson and Ed Dawson}, title = {Bias in the nonlinear filter generator output sequence}, howpublished = {Cryptology ePrint Archive, Report 2010/105}, year = {2010}, url = {http://eprint.iacr.org/2010/105}, } @misc{cryptoeprint:2010:106, author = {Ivan Damgård and Yuval Ishai and Mikkel Krøigaard}, title = {Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2010/106}, year = {2010}, url = {http://eprint.iacr.org/2010/106}, } @misc{cryptoeprint:2010:107, author = {Andrew C. Yao and Moti Yung and Yunlei Zhao}, title = {Adaptive Concurrent Non-Malleability with Bare Public-Keys}, howpublished = {Cryptology ePrint Archive, Report 2010/107}, year = {2010}, url = {http://eprint.iacr.org/2010/107}, } @misc{cryptoeprint:2010:108, author = {Ivan Damg\aa{}rd and Sigurd Meldgaard and Jesper Buus Nielsen}, title = {Unconditionally Secure Oblivious RAM Without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2010/108}, year = {2010}, url = {http://eprint.iacr.org/2010/108}, } @misc{cryptoeprint:2010:109, author = {Matthew Green and Susan Hohenberger}, title = {Practical Adaptive Oblivious Transfer from a Simple Assumption}, howpublished = {Cryptology ePrint Archive, Report 2010/109}, year = {2010}, url = {http://eprint.iacr.org/2010/109}, } @misc{cryptoeprint:2010:110, author = {Allison Lewko and Tatsuaki Okamoto and Amit Sahai and Katsuyuki Takashima and Brent Waters}, title = {Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption}, howpublished = {Cryptology ePrint Archive, Report 2010/110}, year = {2010}, url = {http://eprint.iacr.org/2010/110}, } @misc{cryptoeprint:2010:111, author = {Vladimir Rudskoy}, title = {On zero practical significance of ``Key recovery attack on full GOST block cipher with zero time and memory''}, howpublished = {Cryptology ePrint Archive, Report 2010/111}, year = {2010}, url = {http://eprint.iacr.org/2010/111}, } @misc{cryptoeprint:2010:112, author = {Jun Shao and Zhenfu Cao and Peng Liu}, title = {CCA-Secure PRE Scheme without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2010/112}, year = {2010}, url = {http://eprint.iacr.org/2010/112}, } @misc{cryptoeprint:2010:113, author = {Xu An Wang and Xiaoyuan Yang}, title = {Cryptanalysis of an Efficient HIBE Scheme in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2010/113}, year = {2010}, url = {http://eprint.iacr.org/2010/113}, } @misc{cryptoeprint:2010:114, author = {Simon R. Blackburn}, title = {The Discrete Logarithm Problem Modulo One: Cryptanalysing the Ariffin--Abu cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2010/114}, year = {2010}, url = {http://eprint.iacr.org/2010/114}, } @misc{cryptoeprint:2010:115, author = {Jason Bau, and John C Mitchell}, title = {A Security Evaluation of DNSSEC with NSEC3}, howpublished = {Cryptology ePrint Archive, Report 2010/115}, year = {2010}, url = {http://eprint.iacr.org/2010/115}, } @misc{cryptoeprint:2010:116, author = {M. Abdelaziz Elaabid and Sylvain Guilley}, title = {Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator}, howpublished = {Cryptology ePrint Archive, Report 2010/116}, year = {2010}, url = {http://eprint.iacr.org/2010/116}, } @misc{cryptoeprint:2010:117, author = {Tolga Acar and Mira Belenkiy and Mihir Bellare and David Cash}, title = {Cryptographic Agility and its Relation to Circular Encryption}, howpublished = {Cryptology ePrint Archive, Report 2010/117}, year = {2010}, url = {http://eprint.iacr.org/2010/117}, } @misc{cryptoeprint:2010:118, author = {Shigeo Tsujii and Masahito Gotaishi and Kohtaro Tadaki and Ryou Fujita }, title = {Proposal of a Signature Scheme based on STS Trapdoor}, howpublished = {Cryptology ePrint Archive, Report 2010/118}, year = {2010}, url = {http://eprint.iacr.org/2010/118}, } @misc{cryptoeprint:2010:119, author = {Huang Lin and Zhenfu Cao and Muxin Zhou and Haojin Zhu}, title = {How to Construct Space Efficient Revocable IBE from Non-monotonic ABE}, howpublished = {Cryptology ePrint Archive, Report 2010/119}, year = {2010}, url = {http://eprint.iacr.org/2010/119}, } @misc{cryptoeprint:2010:120, author = {Iftach Haitner and Thomas Holenstein and Omer Reingold and Salil Vadhan and Hoeteck Wee}, title = {Universal One-Way Hash Functions via Inaccessible Entropy}, howpublished = {Cryptology ePrint Archive, Report 2010/120}, year = {2010}, url = {http://eprint.iacr.org/2010/120}, } @misc{cryptoeprint:2010:121, author = {Chen Huiyan and Li Zichen}, title = {Lattice-Based Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack}, howpublished = {Cryptology ePrint Archive, Report 2010/121}, year = {2010}, url = {http://eprint.iacr.org/2010/121}, } @misc{cryptoeprint:2010:122, author = {Akinori Kawachi and Akira Numayama and Keisuke Tanaka and Keita Xagawa}, title = {Security of Encryption Schemes in Weakened Random Oracle Models}, howpublished = {Cryptology ePrint Archive, Report 2010/122}, year = {2010}, url = {http://eprint.iacr.org/2010/122}, } @misc{cryptoeprint:2010:123, author = {Craig Costello and Colin Boyd and Juan Manuel Gonzalez Nieto and Kenneth Koon-Ho Wong}, title = {Delaying Mismatched Field Multiplications in Pairing Computations}, howpublished = {Cryptology ePrint Archive, Report 2010/123}, year = {2010}, url = {http://eprint.iacr.org/2010/123}, } @misc{cryptoeprint:2010:124, author = {Brian Baldwin and Andrew Byrne and Liang Lu and Mark Hamilton and Neil Hanley and Maire O'Neill and William P. Marnane}, title = {A Hardware Wrapper for the SHA-3 Hash Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2010/124}, year = {2010}, url = {http://eprint.iacr.org/2010/124}, } @misc{cryptoeprint:2010:125, author = {M. J. Jacobson, Jr., R. Scheidler, AND A. Stein}, title = {Cryptographic Aspects of Real Hyperelliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2010/125}, year = {2010}, url = {http://eprint.iacr.org/2010/125}, } @misc{cryptoeprint:2010:126, author = {Jian-zhu Lu and Jipeng Zhou}, title = {On the Security of an Efficient Mobile Authentication Scheme for Wireless Networks}, howpublished = {Cryptology ePrint Archive, Report 2010/126}, year = {2010}, url = {http://eprint.iacr.org/2010/126}, } @misc{cryptoeprint:2010:127, author = {Chen Huiyan }, title = {CCA-Secure Cryptosystem from Lattice}, howpublished = {Cryptology ePrint Archive, Report 2010/127}, year = {2010}, url = {http://eprint.iacr.org/2010/127}, } @misc{cryptoeprint:2010:128, author = {Charalampos Papamanthou and Roberto Tamassia}, title = {Update-Optimal Authenticated Structures Based on Lattices}, howpublished = {Cryptology ePrint Archive, Report 2010/128}, year = {2010}, url = {http://eprint.iacr.org/2010/128}, } @misc{cryptoeprint:2010:129, author = {N. Rajesh Pillai, S. S. Bedi, Sanjay Kumar, Roopika Chaudhary}, title = {Relation for Algebraic Attack on E0 combiner}, howpublished = {Cryptology ePrint Archive, Report 2010/129}, year = {2010}, url = {http://eprint.iacr.org/2010/129}, } @misc{cryptoeprint:2010:130, author = {Alessandro Barenghi and Guido Bertoni and Luca Breveglieri and Mauro Pellicioli and Gerardo Pelosi}, title = {Low Voltage Fault Attacks to AES and RSA on General Purpose Processors}, howpublished = {Cryptology ePrint Archive, Report 2010/130}, year = {2010}, url = {http://eprint.iacr.org/2010/130}, } @misc{cryptoeprint:2010:131, author = {Jooyoung Lee and John Steinberger}, title = {Multi-property-preserving Domain Extension Using Polynomial-based Modes of Operation}, howpublished = {Cryptology ePrint Archive, Report 2010/131}, year = {2010}, url = {http://eprint.iacr.org/2010/131}, } @misc{cryptoeprint:2010:132, author = {Junfeng Fan and Jens Hermans and Frederik Vercauteren}, title = {On the claimed privacy of EC-RAC III}, howpublished = {Cryptology ePrint Archive, Report 2010/132}, year = {2010}, url = {http://eprint.iacr.org/2010/132}, } @misc{cryptoeprint:2010:133, author = {Masayuki Abe and Kristiyan Haralambiev and Miyako Ohkubo}, title = {Signing on Elements in Bilinear Groups for Modular Protocol Design}, howpublished = {Cryptology ePrint Archive, Report 2010/133}, year = {2010}, url = {http://eprint.iacr.org/2010/133}, } @misc{cryptoeprint:2010:134, author = {Masaaki Shirase}, title = {Barreto-Naehrig Curve With Fixed Coefficient - Efficiently Constructing Pairing-Friendly Curves -}, howpublished = {Cryptology ePrint Archive, Report 2010/134}, year = {2010}, url = {http://eprint.iacr.org/2010/134}, } @misc{cryptoeprint:2010:135, author = {Aur\'elie Bauer and Jean-S\'ebastien Coron and David Naccache and Mehdi Tibouchi and Damien Vergnaud}, title = {On The Broadcast and Validity-Checking Security of PKCS \#1 v1.5 Encryption}, howpublished = {Cryptology ePrint Archive, Report 2010/135}, year = {2010}, url = {http://eprint.iacr.org/2010/135}, } @misc{cryptoeprint:2010:136, author = {Feng Hao}, title = {On Robust Key Agreement Based on Public Key Authentication}, howpublished = {Cryptology ePrint Archive, Report 2010/136}, year = {2010}, url = {http://eprint.iacr.org/2010/136}, } @misc{cryptoeprint:2010:137, author = {Markus Rückert and Michael Schneider}, title = {Selecting Secure Parameters for Lattice-based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2010/137}, year = {2010}, url = {http://eprint.iacr.org/2010/137}, } @misc{cryptoeprint:2010:138, author = {Manoj Kumar}, title = {Some Attack on the Security of a Novel Remote User Authentication Scheme}, howpublished = {Cryptology ePrint Archive, Report 2010/138}, year = {2010}, url = {http://eprint.iacr.org/2010/138}, } @misc{cryptoeprint:2010:139, author = {Masao Kasahara}, title = {A New Class of Public Key Cryptosystems Constructed Based on Perfect Error-Correcting Codes Realizing Coding Rate of Exactly 1.0}, howpublished = {Cryptology ePrint Archive, Report 2010/139}, year = {2010}, url = {http://eprint.iacr.org/2010/139}, } @misc{cryptoeprint:2010:140, author = {Igor Semaev}, title = {Improved Agreeing-Gluing Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2010/140}, year = {2010}, url = {http://eprint.iacr.org/2010/140}, } @misc{cryptoeprint:2010:141, author = {Yu Chen}, title = {Remarks about the Security Proofs of Boneh-Franklin’s Identity-Based Encryption }, howpublished = {Cryptology ePrint Archive, Report 2010/141}, year = {2010}, url = {http://eprint.iacr.org/2010/141}, } @misc{cryptoeprint:2010:142, author = {Dustin Moody}, title = {Mean value formulas for twisted Edwards curves}, howpublished = {Cryptology ePrint Archive, Report 2010/142}, year = {2010}, url = {http://eprint.iacr.org/2010/142}, } @misc{cryptoeprint:2010:143, author = {Gregor Leander}, title = {Small Scale Variants Of The Block Cipher PRESENT}, howpublished = {Cryptology ePrint Archive, Report 2010/143}, year = {2010}, url = {http://eprint.iacr.org/2010/143}, } @misc{cryptoeprint:2010:144, author = {Matthew Green and Susan Hohenberger}, title = {CPA and CCA-Secure Encryption Systems that are not 2-Circular Secure}, howpublished = {Cryptology ePrint Archive, Report 2010/144}, year = {2010}, url = {http://eprint.iacr.org/2010/144}, } @misc{cryptoeprint:2010:145, author = {Craig Gentry and Shai Halevi and Vinod Vaikuntanathan}, title = {i-Hop Homomorphic Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2010/145}, year = {2010}, url = {http://eprint.iacr.org/2010/145}, } @misc{cryptoeprint:2010:146, author = {Santanu Sarkar and Subhamoy Maitra}, title = {Two Applications of finding Approximate Common Divisor}, howpublished = {Cryptology ePrint Archive, Report 2010/146}, year = {2010}, url = {http://eprint.iacr.org/2010/146}, } @misc{cryptoeprint:2010:147, author = {Adam Groce and Jonathan Katz}, title = {A New Framework for Password-Based Authenticated Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2010/147}, year = {2010}, url = {http://eprint.iacr.org/2010/147}, } @misc{cryptoeprint:2010:148, author = {Yalin Chen1, Jue-Sam Chou2,* , Chun-Hui Huang3}, title = {Comments on five smart card based password authentication protocols}, howpublished = {Cryptology ePrint Archive, Report 2010/148}, year = {2010}, url = {http://eprint.iacr.org/2010/148}, } @misc{cryptoeprint:2010:149, author = {Feng Hao}, title = {On Small Subgroup Non-confinement Attack}, howpublished = {Cryptology ePrint Archive, Report 2010/149}, year = {2010}, url = {http://eprint.iacr.org/2010/149}, } @misc{cryptoeprint:2010:150, author = {Mohammad Sadeq Dousti and Rasool Jalili}, title = {Zero-Knowledge Proofs, Revisited: The Simulation-Extraction Paradigm}, howpublished = {Cryptology ePrint Archive, Report 2010/150}, year = {2010}, url = {http://eprint.iacr.org/2010/150}, } @misc{cryptoeprint:2010:151, author = {Stelian Flonta, Liviu-Cristian Miclea}, title = {Ring signature with divided private key}, howpublished = {Cryptology ePrint Archive, Report 2010/151}, year = {2010}, url = {http://eprint.iacr.org/2010/151}, } @misc{cryptoeprint:2010:152, author = {Billy Bob Brumley}, title = {Secure and Fast Implementations of Two Involution Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2010/152}, year = {2010}, url = {http://eprint.iacr.org/2010/152}, } @misc{cryptoeprint:2010:153, author = {Vipul Goyal and Yuval Ishai and Amit Sahai and Ramarathnam Venkatesan and Akshay Wadia}, title = {Founding Cryptography on Tamper-Proof Hardware Tokens}, howpublished = {Cryptology ePrint Archive, Report 2010/153}, year = {2010}, url = {http://eprint.iacr.org/2010/153}, } @misc{cryptoeprint:2010:154, author = {Yevgeniy Dodis and Kristiyan Haralambiev and Adriana Lopez-Alt and Daniel Wichs}, title = {Efficient Public-Key Cryptography in the Presence of Key Leakage}, howpublished = {Cryptology ePrint Archive, Report 2010/154}, year = {2010}, url = {http://eprint.iacr.org/2010/154}, } @misc{cryptoeprint:2010:155, author = {Zhang MeiLing, Liu JingMei, Wang XinMei}, title = {the upper bounds on differntial characteristics in block cipher SMS4}, howpublished = {Cryptology ePrint Archive, Report 2010/155}, year = {2010}, url = {http://eprint.iacr.org/2010/155}, } @misc{cryptoeprint:2010:156, author = {Eyal Z. Goren and Kristin E. Lauter}, title = {Genus 2 Curves with Complex Multiplication}, howpublished = {Cryptology ePrint Archive, Report 2010/156}, year = {2010}, url = {http://eprint.iacr.org/2010/156}, } @misc{cryptoeprint:2010:157, author = {Antoine Joux and Vanessa Vitse}, title = {Elliptic Curve Discrete Logarithm Problem over Small Degree Extension Fields. Application to the static Diffie-Hellman problem on $E(\F_{q^5})$}, howpublished = {Cryptology ePrint Archive, Report 2010/157}, year = {2010}, url = {http://eprint.iacr.org/2010/157}, } @misc{cryptoeprint:2010:158, author = {Antoine Joux and Vanessa Vitse}, title = {A variant of the F4 algorithm}, howpublished = {Cryptology ePrint Archive, Report 2010/158}, year = {2010}, url = {http://eprint.iacr.org/2010/158}, } @misc{cryptoeprint:2010:159, author = {Mihir Bellare and Brent Waters and Scott Yilek}, title = {Identity-Based Encryption Secure under Selective Opening Attack}, howpublished = {Cryptology ePrint Archive, Report 2010/159}, year = {2010}, url = {http://eprint.iacr.org/2010/159}, } @misc{cryptoeprint:2010:160, author = {Shengbao Wu and Mingsheng Wang and Zheng Yuan}, title = {A Flaw in The Internal State Recovery Attack on ALPHA-MAC}, howpublished = {Cryptology ePrint Archive, Report 2010/160}, year = {2010}, url = {http://eprint.iacr.org/2010/160}, } @misc{cryptoeprint:2010:161, author = {Daniel R. L. Brown}, title = {Stange's Elliptic Nets and Coxeter Group F4}, howpublished = {Cryptology ePrint Archive, Report 2010/161}, year = {2010}, url = {http://eprint.iacr.org/2010/161}, } @misc{cryptoeprint:2010:162, author = {Dieter Schmidt}, title = {1024XKS - A High Security Software Oriented Block Cipher Revisited}, howpublished = {Cryptology ePrint Archive, Report 2010/162}, year = {2010}, url = {http://eprint.iacr.org/2010/162}, } @misc{cryptoeprint:2010:163, author = {Wenping Ma ,Chen Yang and Shaohui Sun}, title = {Golay Complementary Sequences Over the QAM Constellation }, howpublished = {Cryptology ePrint Archive, Report 2010/163}, year = {2010}, url = {http://eprint.iacr.org/2010/163}, } @misc{cryptoeprint:2010:164, author = {Iftach Haitner and Yuval Ishai and Eyal Kushilevitz and Yehuda Lindell and Erez Petrank}, title = {Black-Box Constructions of Protocols for Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2010/164}, year = {2010}, url = {http://eprint.iacr.org/2010/164}, } @misc{cryptoeprint:2010:165, author = {Yalin Chen1, Jue-Sam Chou2,* , Chun-Hui Huang3}, title = {Comment on four two-party authentication protocols}, howpublished = {Cryptology ePrint Archive, Report 2010/165}, year = {2010}, url = {http://eprint.iacr.org/2010/165}, } @misc{cryptoeprint:2010:166, author = {Jianxiong You and Ruilin Li and Bing Sun and Chao Li}, title = {Improved Fault Attack on FOX}, howpublished = {Cryptology ePrint Archive, Report 2010/166}, year = {2010}, url = {http://eprint.iacr.org/2010/166}, } @misc{cryptoeprint:2010:167, author = {Tang ming and Meng Qinshu and Zhang Huanguo and Gao Si and Dou Qin and Shen Fei and Li Du}, title = {Evolutionary Cipher against Differential Power Attack}, howpublished = {Cryptology ePrint Archive, Report 2010/167}, year = {2010}, url = {http://eprint.iacr.org/2010/167}, } @misc{cryptoeprint:2010:168, author = {Xuehai Tang, Bing Sun, Ruilin Li and Chao Li}, title = {A Meet-in-the-Middle Attack on ARIA}, howpublished = {Cryptology ePrint Archive, Report 2010/168}, year = {2010}, url = {http://eprint.iacr.org/2010/168}, } @misc{cryptoeprint:2010:169, author = {Flavio D. Garcia and Peter van Rossum and Roel Verdult and Ronny Wichers Schreur}, title = {Dismantling SecureMemory, CryptoMemory and CryptoRF}, howpublished = {Cryptology ePrint Archive, Report 2010/169}, year = {2010}, url = {http://eprint.iacr.org/2010/169}, } @misc{cryptoeprint:2010:170, author = {Jean-Pierre Flori and Hugues Randriambololona and Gérard Cohen and Sihem Mesnager}, title = {On a conjecture about binary strings distribution}, howpublished = {Cryptology ePrint Archive, Report 2010/170}, year = {2010}, url = {http://eprint.iacr.org/2010/170}, } @misc{cryptoeprint:2010:171, author = {Jiang Wu and Maire O'Neill}, title = {On Foundation and Construction of Physical Unclonable Functions}, howpublished = {Cryptology ePrint Archive, Report 2010/171}, year = {2010}, url = {http://eprint.iacr.org/2010/171}, } @misc{cryptoeprint:2010:172, author = {Qixiang Mei, Bao Li,Xianhui Lu and Dingding Jia}, title = {Chosen Ciphertext Secure Encryption over Semi-smooth Subgroup}, howpublished = {Cryptology ePrint Archive, Report 2010/172}, year = {2010}, url = {http://eprint.iacr.org/2010/172}, } @misc{cryptoeprint:2010:173, author = {Jean-Luc Beuchat and Eiji Okamoto and Teppei Yamazaki}, title = {Compact Implementations of BLAKE-32 and BLAKE-64 on FPGA}, howpublished = {Cryptology ePrint Archive, Report 2010/173}, year = {2010}, url = {http://eprint.iacr.org/2010/173}, } @misc{cryptoeprint:2010:174, author = {Qiang Tang}, title = {A Reflection on the Security of Two-Party Key Establishment Protocols}, howpublished = {Cryptology ePrint Archive, Report 2010/174}, year = {2010}, url = {http://eprint.iacr.org/2010/174}, } @misc{cryptoeprint:2010:175, author = {Shivank Agrawal, Swarun Kumar, Amjed Shareef and C. Pandu Rangan}, title = {Sanitizable signatures with strong transparency in the standard model}, howpublished = {Cryptology ePrint Archive, Report 2010/175}, year = {2010}, url = {http://eprint.iacr.org/2010/175}, } @misc{cryptoeprint:2010:176, author = {Jin Hong and Sunghwan Moon}, title = {A Comparison of Cryptanalytic Tradeoff Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2010/176}, year = {2010}, url = {http://eprint.iacr.org/2010/176}, } @misc{cryptoeprint:2010:177, author = {Robert Granger}, title = {On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields}, howpublished = {Cryptology ePrint Archive, Report 2010/177}, year = {2010}, url = {http://eprint.iacr.org/2010/177}, } @misc{cryptoeprint:2010:178, author = {Sharmila Deva Selvi S, Sree Vivek S, Pandu Rangan C}, title = {A Note on the Security Identity Based Online/Offline Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2010/178}, year = {2010}, url = {http://eprint.iacr.org/2010/178}, } @misc{cryptoeprint:2010:179, author = {Ziran Tu and Yingpu Deng}, title = {A Class of 1-Resilient Function with High Nonlinearity and Algebraic Immunity}, howpublished = {Cryptology ePrint Archive, Report 2010/179}, year = {2010}, url = {http://eprint.iacr.org/2010/179}, } @misc{cryptoeprint:2010:180, author = {Francois-Xavier Standaert and Nicolas Veyrat-Charvillon and Elisabeth Oswald and Benedikt Gierlichs and Marcel Medwed and Markus Kasper and Stefan Mangard}, title = {The World is Not Enough: Another Look on Second-Order DPA}, howpublished = {Cryptology ePrint Archive, Report 2010/180}, year = {2010}, url = {http://eprint.iacr.org/2010/180}, } @misc{cryptoeprint:2010:181, author = {He Debiao, Chen Jianhua, Hu Jin}, title = {Cryptanalysis of a DoS-resistant ID-based password authentication }, howpublished = {Cryptology ePrint Archive, Report 2010/181}, year = {2010}, url = {http://eprint.iacr.org/2010/181}, } @misc{cryptoeprint:2010:182, author = {Craig Gentry and Shai Halevi and Vinod Vaikuntanathan}, title = {A Simple BGN-type Cryptosystem from LWE}, howpublished = {Cryptology ePrint Archive, Report 2010/182}, year = {2010}, url = {http://eprint.iacr.org/2010/182}, } @misc{cryptoeprint:2010:183, author = {Shweta Agrawal and Dan Boneh and Xavier Boyen and David Mandell Freeman}, title = {Preventing Pollution Attacks in Multi-Source Network Coding}, howpublished = {Cryptology ePrint Archive, Report 2010/183}, year = {2010}, url = {http://eprint.iacr.org/2010/183}, } @misc{cryptoeprint:2010:184, author = {Zhifang Zhang}, title = {Rational Secret Sharing AS Extensive Games}, howpublished = {Cryptology ePrint Archive, Report 2010/184}, year = {2010}, url = {http://eprint.iacr.org/2010/184}, } @misc{cryptoeprint:2010:185, author = {Wenping Ma, Chen Yang, and Shaohui Sun}, title = {New Methods to Construct Golay Complementary Sequences Over the $QAM$ Constellation }, howpublished = {Cryptology ePrint Archive, Report 2010/185}, year = {2010}, url = {http://eprint.iacr.org/2010/185}, } @misc{cryptoeprint:2010:186, author = {Michael Naehrig and Ruben Niederhagen and Peter Schwabe}, title = {New software speed records for cryptographic pairings}, howpublished = {Cryptology ePrint Archive, Report 2010/186}, year = {2010}, url = {http://eprint.iacr.org/2010/186}, } @misc{cryptoeprint:2010:187, author = {Wenjian Xie}, title = {Certificateless Signcryption without Pairing}, howpublished = {Cryptology ePrint Archive, Report 2010/187}, year = {2010}, url = {http://eprint.iacr.org/2010/187}, } @misc{cryptoeprint:2010:188, author = {Yan Zhu and Gail-Joon Ahn and Hongxin Hu and Huaixi Wang}, title = {Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy }, howpublished = {Cryptology ePrint Archive, Report 2010/188}, year = {2010}, url = {http://eprint.iacr.org/2010/188}, } @misc{cryptoeprint:2010:189, author = {Nick Howgrave-Graham and Antoine Joux}, title = {New generic algorithms for hard knapsacks}, howpublished = {Cryptology ePrint Archive, Report 2010/189}, year = {2010}, url = {http://eprint.iacr.org/2010/189}, } @misc{cryptoeprint:2010:190, author = {Feng Hao and Peter Ryan}, title = {J-PAKE: Authenticated Key Exchange Without PKI}, howpublished = {Cryptology ePrint Archive, Report 2010/190}, year = {2010}, url = {http://eprint.iacr.org/2010/190}, } @misc{cryptoeprint:2010:191, author = {Michal Rjaško and Martin Stanek}, title = {On Designated Verifier Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2010/191}, year = {2010}, url = {http://eprint.iacr.org/2010/191}, } @misc{cryptoeprint:2010:192, author = {Yi-Jun He, L.C.K. Hui, and S.M. Yiu}, title = {Non-Transferable Proxy Re-Encryption}, howpublished = {Cryptology ePrint Archive, Report 2010/192}, year = {2010}, url = {http://eprint.iacr.org/2010/192}, } @misc{cryptoeprint:2010:193, author = {Mridul Nandi and Souradyuti Paul}, title = {Speeding Up The Widepipe: Secure and Fast Hashing}, howpublished = {Cryptology ePrint Archive, Report 2010/193}, year = {2010}, url = {http://eprint.iacr.org/2010/193}, } @misc{cryptoeprint:2010:194, author = {Sherman S.M. Chow and Joseph K. Liu and Jianying Zhou}, title = {Identity-Based Online/Offline Key Encapsulation and Encryption}, howpublished = {Cryptology ePrint Archive, Report 2010/194}, year = {2010}, url = {http://eprint.iacr.org/2010/194}, } @misc{cryptoeprint:2010:195, author = {Sven Heiberg, Helger Lipmaa, Filip Van Laenen}, title = {On E-Vote Integrity in the Case of Malicious Voter Computers}, howpublished = {Cryptology ePrint Archive, Report 2010/195}, year = {2010}, url = {http://eprint.iacr.org/2010/195}, } @misc{cryptoeprint:2010:196, author = {Yevgeniy Dodis and Kristiyan Haralambiev and Adriana Lopez-Alt and Daniel Wichs}, title = {Cryptography Against Continuous Memory Attacks}, howpublished = {Cryptology ePrint Archive, Report 2010/196}, year = {2010}, url = {http://eprint.iacr.org/2010/196}, } @misc{cryptoeprint:2010:197, author = {Angelo De Caro and Vincenzo Iovino and Giuseppe Persiano}, title = {Fully Secure Anonymous HIBE with Short Ciphertexts}, howpublished = {Cryptology ePrint Archive, Report 2010/197}, year = {2010}, url = {http://eprint.iacr.org/2010/197}, } @misc{cryptoeprint:2010:198, author = {Mario Lamberger and Florian Mendel and Christian Rechberger and Vincent Rijmen and Martin Schläffer}, title = {The Rebound Attack and Subspace Distinguishers: Application to Whirlpool}, howpublished = {Cryptology ePrint Archive, Report 2010/198}, year = {2010}, url = {http://eprint.iacr.org/2010/198}, } @misc{cryptoeprint:2010:199, author = {Zeng Bing}, title = {A Framework For Fully-Simulatable $h$-Out-Of-$n$ Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2010/199}, year = {2010}, url = {http://eprint.iacr.org/2010/199}, } @misc{cryptoeprint:2010:200, author = {Markus Rückert and Michael Schneider and Dominique Schröder}, title = {Generic Constructions for Verifiably Encrypted Signatures Without Random Oracles or NIZKs}, howpublished = {Cryptology ePrint Archive, Report 2010/200}, year = {2010}, url = {http://eprint.iacr.org/2010/200}, } @misc{cryptoeprint:2010:201, author = {Yuechuan Wei and Ruilin Li and Ping Li and Chao Li }, title = {Impossible Differential Cryptanalysis on E2}, howpublished = {Cryptology ePrint Archive, Report 2010/201}, year = {2010}, url = {http://eprint.iacr.org/2010/201}, } @misc{cryptoeprint:2010:202, author = {Amir Herzberg and Haya Shulman}, title = {Robust Combiner for Obfuscators}, howpublished = {Cryptology ePrint Archive, Report 2010/202}, year = {2010}, url = {http://eprint.iacr.org/2010/202}, } @misc{cryptoeprint:2010:203, author = {Bernard Colbert and Anthony H. Dekker and Lynn Margaret Batten}, title = {Heraclitus: A LFSR-based Stream Cipher with Key Dependent Structure}, howpublished = {Cryptology ePrint Archive, Report 2010/203}, year = {2010}, url = {http://eprint.iacr.org/2010/203}, } @misc{cryptoeprint:2010:204, author = {Ji Huifang, Han Wenbao, Zhao Long }, title = {Certificateless generalized signcryption}, howpublished = {Cryptology ePrint Archive, Report 2010/204}, year = {2010}, url = {http://eprint.iacr.org/2010/204}, } @misc{cryptoeprint:2010:205, author = {Ali Juma and Yevgeniy Vahlis}, title = {On Protecting Cryptographic Keys Against Continual Leakage}, howpublished = {Cryptology ePrint Archive, Report 2010/205}, year = {2010}, url = {http://eprint.iacr.org/2010/205}, } @misc{cryptoeprint:2010:206, author = {Long Hoang Nguyen and Andrew William Roscoe}, title = {Authentication protocols based on low-bandwidth unspoofable channels: a comparative survey}, howpublished = {Cryptology ePrint Archive, Report 2010/206}, year = {2010}, url = {http://eprint.iacr.org/2010/206}, } @misc{cryptoeprint:2010:207, author = {Koen Simoens and Roel Peeters and Bart Preneel}, title = {Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares}, howpublished = {Cryptology ePrint Archive, Report 2010/207}, year = {2010}, url = {http://eprint.iacr.org/2010/207}, } @misc{cryptoeprint:2010:208, author = {Richard Moloney and Aidan O'Mahony and Pierre Laurent}, title = {Efficient Implementation of Elliptic Curve Point Operations Using Binary Edwards Curves}, howpublished = {Cryptology ePrint Archive, Report 2010/208}, year = {2010}, url = {http://eprint.iacr.org/2010/208}, } @misc{cryptoeprint:2010:209, author = {Lei Zhang and Qianhong Wu and Bo Qin and Josep Domingo-Ferrer}, title = {Identity-Based Authenticated Asymmetric Group Key Agreement Protocol}, howpublished = {Cryptology ePrint Archive, Report 2010/209}, year = {2010}, url = {http://eprint.iacr.org/2010/209}, } @misc{cryptoeprint:2010:210, author = {Yu Chen}, title = {Fully Secure Identity-Based Encryption Without Random Oracles: A variant of Boneh-Boyen HIBE }, howpublished = {Cryptology ePrint Archive, Report 2010/210}, year = {2010}, url = {http://eprint.iacr.org/2010/210}, } @misc{cryptoeprint:2010:211, author = {Keting Jia and Jiazhe Chen and Meiqin Wang and Xiaoyun Wang}, title = {Practical-time Attack on the Full MMB Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2010/211}, year = {2010}, url = {http://eprint.iacr.org/2010/211}, } @misc{cryptoeprint:2010:212, author = {Dominique Unruh}, title = {Quantum Proofs of Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2010/212}, year = {2010}, url = {http://eprint.iacr.org/2010/212}, } @misc{cryptoeprint:2010:213, author = {Ran Canetti and Suresh Chari and Shai Halevi and Birgit Pfitzmann and Arnab Roy and Michael Steiner and Wietse Venema}, title = {Composable Security Analysis of OS Services}, howpublished = {Cryptology ePrint Archive, Report 2010/213}, year = {2010}, url = {http://eprint.iacr.org/2010/213}, } @misc{cryptoeprint:2010:214, author = {Kevin Bowers AND Marten van Dijk AND Ari Juels AND Alina Oprea AND Ronald L. Rivest}, title = {How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes}, howpublished = {Cryptology ePrint Archive, Report 2010/214}, year = {2010}, url = {http://eprint.iacr.org/2010/214}, } @misc{cryptoeprint:2010:215, author = {Naoki Tanaka and Taiichi Saito}, title = {On the q-Strong Diffie-Hellman Problem}, howpublished = {Cryptology ePrint Archive, Report 2010/215}, year = {2010}, url = {http://eprint.iacr.org/2010/215}, } @misc{cryptoeprint:2010:216, author = {Zheng Yuan;Xiaoqiu Ren, Jintao Liu}, title = {Distinguishing Attacks on MAC/HMAC Based on A New Dedicated Compression Function Framework}, howpublished = {Cryptology ePrint Archive, Report 2010/216}, year = {2010}, url = {http://eprint.iacr.org/2010/216}, } @misc{cryptoeprint:2010:217, author = {Daniele Perito and Gene Tsudik}, title = {Secure Code Update for Embedded Devices via Proofs of Secure Erasure}, howpublished = {Cryptology ePrint Archive, Report 2010/217}, year = {2010}, url = {http://eprint.iacr.org/2010/217}, } @misc{cryptoeprint:2010:218, author = {Zhen Wang and Shuqin Fan}, title = {New Montgomery-based Semi-systolic Multiplier for Even-type GNB of GF(2^m)}, howpublished = {Cryptology ePrint Archive, Report 2010/218}, year = {2010}, url = {http://eprint.iacr.org/2010/218}, } @misc{cryptoeprint:2010:219, author = {Erik-Oliver Blass and Kaoutar Elkhiyaoui and Refik Molva}, title = {Tracker: Security and Privacy for RFID-based Supply Chains}, howpublished = {Cryptology ePrint Archive, Report 2010/219}, year = {2010}, url = {http://eprint.iacr.org/2010/219}, } @misc{cryptoeprint:2010:220, author = {Giuseppe Ateniese and Emiliano De Cristofaro and Gene Tsudik}, title = {(If) Size Matters: Size-Hiding Private Set Intersection }, howpublished = {Cryptology ePrint Archive, Report 2010/220}, year = {2010}, url = {http://eprint.iacr.org/2010/220}, } @misc{cryptoeprint:2010:221, author = {Noboru Kunihiro}, title = {Solving Generalized Small Inverse Problems}, howpublished = {Cryptology ePrint Archive, Report 2010/221}, year = {2010}, url = {http://eprint.iacr.org/2010/221}, } @misc{cryptoeprint:2010:222, author = {Ewan Fleischmann and Michael Gorski and Stefan Lucks}, title = {Some Observations on Indifferentiability}, howpublished = {Cryptology ePrint Archive, Report 2010/222}, year = {2010}, url = {http://eprint.iacr.org/2010/222}, } @misc{cryptoeprint:2010:223, author = {Thomas Peyrin}, title = {Improved Differential Attacks for ECHO and Grostl}, howpublished = {Cryptology ePrint Archive, Report 2010/223}, year = {2010}, url = {http://eprint.iacr.org/2010/223}, } @misc{cryptoeprint:2010:224, author = {Thomas P. Jakobsen and Marc X. Makkes and Janus Dam Nielsen}, title = {Efficient Implementation of the Orlandi Protocol Extended Version}, howpublished = {Cryptology ePrint Archive, Report 2010/224}, year = {2010}, url = {http://eprint.iacr.org/2010/224}, } @misc{cryptoeprint:2010:225, author = {Junghyun Nam}, title = {A Security Weakness in a Generic Construction of a Group Key Exchange Protocol}, howpublished = {Cryptology ePrint Archive, Report 2010/225}, year = {2010}, url = {http://eprint.iacr.org/2010/225}, } @misc{cryptoeprint:2010:226, author = {Zvika Brakerski and Shafi Goldwasser}, title = {Circular and Leakage Resilient Public-Key Encryption Under Subgroup Indistinguishability (or: Quadratic Residuosity Strikes Back)}, howpublished = {Cryptology ePrint Archive, Report 2010/226}, year = {2010}, url = {http://eprint.iacr.org/2010/226}, } @misc{cryptoeprint:2010:227, author = {Neal Koblitz}, title = {A Security Weakness in Composite-Order Pairing-Based Protocols with Imbedding Degree $k>2$}, howpublished = {Cryptology ePrint Archive, Report 2010/227}, year = {2010}, url = {http://eprint.iacr.org/2010/227}, } @misc{cryptoeprint:2010:228, author = {Lishoy Francis and Gerhard Hancke and Keith Mayes and Konstantinos Markantonakis}, title = {Practical NFC Peer-to-Peer Relay Attack using Mobile Phones}, howpublished = {Cryptology ePrint Archive, Report 2010/228}, year = {2010}, url = {http://eprint.iacr.org/2010/228}, } @misc{cryptoeprint:2010:229, author = {Dominique Unruh}, title = {Concurrent composition in the bounded quantum storage model}, howpublished = {Cryptology ePrint Archive, Report 2010/229}, year = {2010}, url = {http://eprint.iacr.org/2010/229}, } @misc{cryptoeprint:2010:230, author = {David Nowak and Yu Zhang}, title = {A calculus for game-based security proofs}, howpublished = {Cryptology ePrint Archive, Report 2010/230}, year = {2010}, url = {http://eprint.iacr.org/2010/230}, } @misc{cryptoeprint:2010:231, author = {Paul Bunn and Rafail Ostrovsky}, title = {Throughput-Optimal Routing in Unreliable Networks}, howpublished = {Cryptology ePrint Archive, Report 2010/231}, year = {2010}, url = {http://eprint.iacr.org/2010/231}, } @misc{cryptoeprint:2010:232, author = {Chingfang Hsu and Siaw-Lynn Ng and Xueming Tang}, title = {On Representable Matroids and Ideal Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2010/232}, year = {2010}, url = {http://eprint.iacr.org/2010/232}, } @misc{cryptoeprint:2010:233, author = {Georg Fuchsbauer}, title = {Commuting Signatures and Verifiable Encryption and an Application to Non-Interactively Delegatable Credentials}, howpublished = {Cryptology ePrint Archive, Report 2010/233}, year = {2010}, url = {http://eprint.iacr.org/2010/233}, } @misc{cryptoeprint:2010:234, author = {Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau}, title = {Cooperative Provable Data Possession}, howpublished = {Cryptology ePrint Archive, Report 2010/234}, year = {2010}, url = {http://eprint.iacr.org/2010/234}, } @misc{cryptoeprint:2010:235, author = {Rainer Steinwandt and Adriana Suárez Corona}, title = {Attribute-based group key establishment}, howpublished = {Cryptology ePrint Archive, Report 2010/235}, year = {2010}, url = {http://eprint.iacr.org/2010/235}, } @misc{cryptoeprint:2010:236, author = {Ralf Kuesters and Tomasz Truderung and Andreas Vogt}, title = {Accountability: Definition and Relationship to Verifiability}, howpublished = {Cryptology ePrint Archive, Report 2010/236}, year = {2010}, url = {http://eprint.iacr.org/2010/236}, } @misc{cryptoeprint:2010:237, author = {Augustin P. Sarr and Philippe Elbaz–Vincent and Jean–Claude Bajard}, title = {Enhanced Security and Efficiency for Authenticated Key Agreement}, howpublished = {Cryptology ePrint Archive, Report 2010/237}, year = {2010}, url = {http://eprint.iacr.org/2010/237}, } @misc{cryptoeprint:2010:238, author = {Amjed Shareef and Akshay Agrawal and C. Pandu Rangan}, title = {Collusion Free Protocol for Correlated Element Selection Problem}, howpublished = {Cryptology ePrint Archive, Report 2010/238}, year = {2010}, url = {http://eprint.iacr.org/2010/238}, } @misc{cryptoeprint:2010:239, author = {Feng LIU}, title = {One-round and authenticated three-party multiple key exchange protocol from parings}, howpublished = {Cryptology ePrint Archive, Report 2010/239}, year = {2010}, url = {http://eprint.iacr.org/2010/239}, } @misc{cryptoeprint:2010:240, author = {He Debiao, Chen Jianhua, Hu Jin}, title = {Weaknesses of a dynamic ID-based remote user authentication scheme}, howpublished = {Cryptology ePrint Archive, Report 2010/240}, year = {2010}, url = {http://eprint.iacr.org/2010/240}, } @misc{cryptoeprint:2010:241, author = {Kai-Min Chung and Yael Kalai and Salil Vadhan}, title = {Improved Delegation of Computation using Fully Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2010/241}, year = {2010}, url = {http://eprint.iacr.org/2010/241}, } @misc{cryptoeprint:2010:242, author = {Yang ZHANG and Jun-Liang CHEN}, title = {Efficient Access Control of Sensitive Data Service in Outsourcing Scenarios}, howpublished = {Cryptology ePrint Archive, Report 2010/242}, year = {2010}, url = {http://eprint.iacr.org/2010/242}, } @misc{cryptoeprint:2010:243, author = {Senshan Pan and Xiaotong Fu and Weiguo Zhang}, title = {Construction of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Nonlinearity}, howpublished = {Cryptology ePrint Archive, Report 2010/243}, year = {2010}, url = {http://eprint.iacr.org/2010/243}, } @misc{cryptoeprint:2010:244, author = {Jia XU}, title = {Authenticating Aggregate Range Queries over Dynamic Multidimensional Dataset}, howpublished = {Cryptology ePrint Archive, Report 2010/244}, year = {2010}, url = {http://eprint.iacr.org/2010/244}, } @misc{cryptoeprint:2010:245, author = {Yacov Yacobi}, title = {Towards a Theory of Trust Based Collaborative Search}, howpublished = {Cryptology ePrint Archive, Report 2010/245}, year = {2010}, url = {http://eprint.iacr.org/2010/245}, } @misc{cryptoeprint:2010:246, author = {Mariusz Jakubowski, Ramarathnam Venkatesan, Yacov Yacobi}, title = {Quantifying Trust}, howpublished = {Cryptology ePrint Archive, Report 2010/246}, year = {2010}, url = {http://eprint.iacr.org/2010/246}, } @misc{cryptoeprint:2010:247, author = {Jia XU}, title = {A New Joint Fingerprinting and Decryption Scheme based on a Lattice Problem}, howpublished = {Cryptology ePrint Archive, Report 2010/247}, year = {2010}, url = {http://eprint.iacr.org/2010/247}, } @misc{cryptoeprint:2010:248, author = {Alex Biryukov and Ivica Nikoli\'c}, title = {Automatic Search for Related-Key Diff erential Characteristics in Byte-Oriented Block Ciphers: Application to AES, Camellia, Khazad and Others}, howpublished = {Cryptology ePrint Archive, Report 2010/248}, year = {2010}, url = {http://eprint.iacr.org/2010/248}, } @misc{cryptoeprint:2010:249, author = {Amjed Shareef}, title = {Rational Secret Sharing without Broadcast}, howpublished = {Cryptology ePrint Archive, Report 2010/249}, year = {2010}, url = {http://eprint.iacr.org/2010/249}, } @misc{cryptoeprint:2010:250, author = {Amjed Shareef}, title = {Collusion Free Protocol for Rational Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2010/250}, year = {2010}, url = {http://eprint.iacr.org/2010/250}, } @misc{cryptoeprint:2010:251, author = {Ulrich Rührmair and Frank Sehnke and Jan Sölter and Gideon Dror and Srinivas Devadas and Jürgen Schmidhuber}, title = {Modeling Attacks on Physical Unclonable Functions}, howpublished = {Cryptology ePrint Archive, Report 2010/251}, year = {2010}, url = {http://eprint.iacr.org/2010/251}, } @misc{cryptoeprint:2010:252, author = {Zhengping Jin and Qiaoyan Wen and Hua Zhang}, title = {A supplement to Liu et al.'s certificateless signcryption scheme in the standard model}, howpublished = {Cryptology ePrint Archive, Report 2010/252}, year = {2010}, url = {http://eprint.iacr.org/2010/252}, } @misc{cryptoeprint:2010:253, author = {Sarang Aravamuthan}, title = {Separable Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2010/253}, year = {2010}, url = {http://eprint.iacr.org/2010/253}, } @misc{cryptoeprint:2010:254, author = {Elias Yarrkov}, title = {Cryptanalysis of XXTEA}, howpublished = {Cryptology ePrint Archive, Report 2010/254}, year = {2010}, url = {http://eprint.iacr.org/2010/254}, } @misc{cryptoeprint:2010:255, author = {Natalia Tokareva}, title = {Automorphism group of the set of all bent functions}, howpublished = {Cryptology ePrint Archive, Report 2010/255}, year = {2010}, url = {http://eprint.iacr.org/2010/255}, } @misc{cryptoeprint:2010:256, author = {Mingwu Zhang, Tsuyoshi Takagi, Bo Yang}, title = {On the Public Key Replacement and Universal Forgery Attacks of Short Certificateless Signature}, howpublished = {Cryptology ePrint Archive, Report 2010/256}, year = {2010}, url = {http://eprint.iacr.org/2010/256}, } @misc{cryptoeprint:2010:257, author = {Alex Biryukov and Dmitry Khovratovich}, title = {Feasible Attack on the 13-round AES-256}, howpublished = {Cryptology ePrint Archive, Report 2010/257}, year = {2010}, url = {http://eprint.iacr.org/2010/257}, } @misc{cryptoeprint:2010:258, author = {Ruchi Gode and Sugata Gangopadhyay}, title = {On lower bounds of second-order nonlinearities of cubic bent functions constructed by concatenating Gold functions}, howpublished = {Cryptology ePrint Archive, Report 2010/258}, year = {2010}, url = {http://eprint.iacr.org/2010/258}, } @misc{cryptoeprint:2010:259, author = {Andrey V. Pavlov}, title = {Bent functions at the minimal distance and algorithms of constructing linear codes for CDMA}, howpublished = {Cryptology ePrint Archive, Report 2010/259}, year = {2010}, url = {http://eprint.iacr.org/2010/259}, } @misc{cryptoeprint:2010:260, author = {Bernhard Jungk and Steffen Reith}, title = {On FPGA-based implementations of Gr\{o}stl}, howpublished = {Cryptology ePrint Archive, Report 2010/260}, year = {2010}, url = {http://eprint.iacr.org/2010/260}, } @misc{cryptoeprint:2010:261, author = {Céline Blondeau and Benoît Gérard}, title = {Links Between Theoretical and Effective Differential Probabilities: Experiments on PRESENT}, howpublished = {Cryptology ePrint Archive, Report 2010/261}, year = {2010}, url = {http://eprint.iacr.org/2010/261}, } @misc{cryptoeprint:2010:262, author = {Alan Kaminsky}, title = {Cube Test Analysis of the Statistical Behavior of CubeHash and Skein}, howpublished = {Cryptology ePrint Archive, Report 2010/262}, year = {2010}, url = {http://eprint.iacr.org/2010/262}, } @misc{cryptoeprint:2010:263, author = {Raphaël Marinier}, title = {Lattice Reduction and Polynomial Solving}, howpublished = {Cryptology ePrint Archive, Report 2010/263}, year = {2010}, url = {http://eprint.iacr.org/2010/263}, } @misc{cryptoeprint:2010:264, author = {Hugo Krawczyk}, title = {Cryptographic Extraction and Key Derivation: The HKDF Scheme}, howpublished = {Cryptology ePrint Archive, Report 2010/264}, year = {2010}, url = {http://eprint.iacr.org/2010/264}, } @misc{cryptoeprint:2010:265, author = {Jian Weng and Minrong Chen and Yanjiang Yang and Robert H. Deng and Kefei Chen and Feng Bao}, title = {CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2010/265}, year = {2010}, url = {http://eprint.iacr.org/2010/265}, } @misc{cryptoeprint:2010:266, author = {Chao Ning and Qiuliang Xu}, title = {Multiparty Computation for Modulo Reduction without Bit-Decomposition and a Generalization to Bit-Decomposition}, howpublished = {Cryptology ePrint Archive, Report 2010/266}, year = {2010}, url = {http://eprint.iacr.org/2010/266}, } @misc{cryptoeprint:2010:267, author = {Feng LIU}, title = {Two improved authenticated multiple key exchange protocols}, howpublished = {Cryptology ePrint Archive, Report 2010/267}, year = {2010}, url = {http://eprint.iacr.org/2010/267}, } @misc{cryptoeprint:2010:268, author = {HU Mengke; GAO Juntao}, title = {Key-Controlled Order-Preserving Encryption}, howpublished = {Cryptology ePrint Archive, Report 2010/268}, year = {2010}, url = {http://eprint.iacr.org/2010/268}, } @misc{cryptoeprint:2010:269, author = {Xigen Yao}, title = {LAB Form for Iterated Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2010/269}, year = {2010}, url = {http://eprint.iacr.org/2010/269}, } @misc{cryptoeprint:2010:270, author = {S.A. Danilov and I.A. Popovyan}, title = {Factorization of RSA-180}, howpublished = {Cryptology ePrint Archive, Report 2010/270}, year = {2010}, url = {http://eprint.iacr.org/2010/270}, } @misc{cryptoeprint:2010:271, author = {Robert Niebuhr, Mohammed Meziani, Stanislav Bulygin, and Johannes Buchmann}, title = {Selecting Parameters for Secure McEliece-based Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2010/271}, year = {2010}, url = {http://eprint.iacr.org/2010/271}, } @misc{cryptoeprint:2010:272, author = {Zhimin Chen and Patrick Schaumont}, title = {Virtual Secure Circuit: Porting Dual-Rail Pre-charge Technique into Software on Multicore}, howpublished = {Cryptology ePrint Archive, Report 2010/272}, year = {2010}, url = {http://eprint.iacr.org/2010/272}, } @misc{cryptoeprint:2010:273, author = {Niels Ferguson and Stefan Lucks and Kerry A. McKay}, title = {Symmetric States and their Structure: Improved Analysis of CubeHash}, howpublished = {Cryptology ePrint Archive, Report 2010/273}, year = {2010}, url = {http://eprint.iacr.org/2010/273}, } @misc{cryptoeprint:2010:274, author = {Joseph K. Liu, Joonsang Baek and Jianying Zhou}, title = {Online/Offline Identity-Based Signcryption Re-visited}, howpublished = {Cryptology ePrint Archive, Report 2010/274}, year = {2010}, url = {http://eprint.iacr.org/2010/274}, } @misc{cryptoeprint:2010:275, author = {Nishanth Chandran and Serge Fehr and Ran Gelles and Vipul Goyal and Rafail Ostrovsky}, title = {Position-Based Quantum Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2010/275}, year = {2010}, url = {http://eprint.iacr.org/2010/275}, } @misc{cryptoeprint:2010:276, author = {Kimmo Järvinen and Vladimir Kolesnikov and Ahmad-Reza Sadeghi and Thomas Schneider}, title = {Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs}, howpublished = {Cryptology ePrint Archive, Report 2010/276}, year = {2010}, url = {http://eprint.iacr.org/2010/276}, } @misc{cryptoeprint:2010:277, author = {Behzad Malek and Ali Miri}, title = {Adaptively Secure Broadcast Encryption with Short Ciphertexts}, howpublished = {Cryptology ePrint Archive, Report 2010/277}, year = {2010}, url = {http://eprint.iacr.org/2010/277}, } @misc{cryptoeprint:2010:278, author = {Zvika Brakerski and Yael Tauman Kalai and Jonathan Katz and Vinod Vaikuntanathan}, title = {Cryptography Resilient to Continual Memory Leakage}, howpublished = {Cryptology ePrint Archive, Report 2010/278}, year = {2010}, url = {http://eprint.iacr.org/2010/278}, } @misc{cryptoeprint:2010:279, author = {Vipul Goyal and Abhishek Jain}, title = {On the Round Complexity of Covert Computation}, howpublished = {Cryptology ePrint Archive, Report 2010/279}, year = {2010}, url = {http://eprint.iacr.org/2010/279}, } @misc{cryptoeprint:2010:280, author = {Arpita Patra}, title = {Studies on Verifiable Secret Sharing, Byzantine Agreement and Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2010/280}, year = {2010}, url = {http://eprint.iacr.org/2010/280}, } @misc{cryptoeprint:2010:281, author = {Ashish Choudhury}, title = {Protocols for Reliable and Secure Message Transmission}, howpublished = {Cryptology ePrint Archive, Report 2010/281}, year = {2010}, url = {http://eprint.iacr.org/2010/281}, } @misc{cryptoeprint:2010:282, author = {Kerry A. McKay and Poorvi L. Vora}, title = {Pseudo-Linear Approximations for ARX Ciphers: With Application to Threefish}, howpublished = {Cryptology ePrint Archive, Report 2010/282}, year = {2010}, url = {http://eprint.iacr.org/2010/282}, } @misc{cryptoeprint:2010:283, author = {Sandeep Katta}, title = {Recursive Information Hiding in Visual Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2010/283}, year = {2010}, url = {http://eprint.iacr.org/2010/283}, } @misc{cryptoeprint:2010:284, author = {Yehuda Lindell and Benny Pinkas}, title = {Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2010/284}, year = {2010}, url = {http://eprint.iacr.org/2010/284}, } @misc{cryptoeprint:2010:285, author = {Pawel Morawiecki and Marian Srebrny}, title = {A SAT-based preimage analysis of reduced KECCAK hash functions }, howpublished = {Cryptology ePrint Archive, Report 2010/285}, year = {2010}, url = {http://eprint.iacr.org/2010/285}, } @misc{cryptoeprint:2010:286, author = {Sugata Gangopadhyay, Brajesh Kumar Singh}, title = {On second-order nonlinearities of some $\mathcal{D}_0$ type bent functions}, howpublished = {Cryptology ePrint Archive, Report 2010/286}, year = {2010}, url = {http://eprint.iacr.org/2010/286}, } @misc{cryptoeprint:2010:287, author = {Jacques Patarin}, title = {Introduction to Mirror Theory: Analysis of Systems of Linear Equalities and Linear Non Equalities for Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2010/287}, year = {2010}, url = {http://eprint.iacr.org/2010/287}, } @misc{cryptoeprint:2010:288, author = {Jin Wang and Jingguo Bi}, title = {Lattice-based Identity-Based Broadcast Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2010/288}, year = {2010}, url = {http://eprint.iacr.org/2010/288}, } @misc{cryptoeprint:2010:289, author = {Rafael Dowsley and Jeroen van de Graaf and Davidson Marques and Anderson C. A. Nascimento}, title = {A Two-Party Protocol with Trusted Initializer for Computing the Inner Product}, howpublished = {Cryptology ePrint Archive, Report 2010/289}, year = {2010}, url = {http://eprint.iacr.org/2010/289}, } @misc{cryptoeprint:2010:290, author = {Neal Koblitz and Alfred Menezes}, title = {Intractable Problems in Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2010/290}, year = {2010}, url = {http://eprint.iacr.org/2010/290}, } @misc{cryptoeprint:2010:291, author = {He Debiao, Chen Jianhua, Hu Jin}, title = {Cryptanalysis of an Exquisite Mutual Authentication Scheme with Key Agreement Using Smart Card}, howpublished = {Cryptology ePrint Archive, Report 2010/291}, year = {2010}, url = {http://eprint.iacr.org/2010/291}, } @misc{cryptoeprint:2010:292, author = {Jérémie Detrey and Pierrick Gaudry and Karim Khalfallah}, title = {A Low-Area yet Performant FPGA Implementation of Shabal}, howpublished = {Cryptology ePrint Archive, Report 2010/292}, year = {2010}, url = {http://eprint.iacr.org/2010/292}, } @misc{cryptoeprint:2010:293, author = {Jacques Patarin}, title = {Security of balanced and unbalanced Feistel Schemes with Linear Non Equalities}, howpublished = {Cryptology ePrint Archive, Report 2010/293}, year = {2010}, url = {http://eprint.iacr.org/2010/293}, } @misc{cryptoeprint:2010:294, author = {Kristin Lauter and Tonghai Yang}, title = {Computing genus 2 curves from invariants on the Hilbert moduli space}, howpublished = {Cryptology ePrint Archive, Report 2010/294}, year = {2010}, url = {http://eprint.iacr.org/2010/294}, } @misc{cryptoeprint:2010:295, author = {Ralf Kuesters and Max Tuengerthal}, title = {Ideal Key Derivation and Encryption in Simulation-based Security}, howpublished = {Cryptology ePrint Archive, Report 2010/295}, year = {2010}, url = {http://eprint.iacr.org/2010/295}, } @misc{cryptoeprint:2010:296, author = {WANG Hou-Zhen and ZHANG Huan-Guo}, title = {Hash-based Multivariate Public Key Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2010/296}, year = {2010}, url = {http://eprint.iacr.org/2010/296}, } @misc{cryptoeprint:2010:297, author = {Amir Moradi and Oliver Mischke and Thomas Eisenbarth}, title = {Correlation-Enhanced Power Analysis Collision Attack}, howpublished = {Cryptology ePrint Archive, Report 2010/297}, year = {2010}, url = {http://eprint.iacr.org/2010/297}, } @misc{cryptoeprint:2010:298, author = {Elena Andreeva, Bart Mennink and Bart Preneel}, title = {On the Indifferentiability of the Gr{\o}stl Hash Function}, howpublished = {Cryptology ePrint Archive, Report 2010/298}, year = {2010}, url = {http://eprint.iacr.org/2010/298}, } @misc{cryptoeprint:2010:299, author = {Damien Stehle and Ron Steinfeld}, title = {Faster Fully Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2010/299}, year = {2010}, url = {http://eprint.iacr.org/2010/299}, } @misc{cryptoeprint:2010:300, author = {Vorapong Suppakitpaisarn and Masato Edahiro and Hiroshi Imai}, title = {Optimal Average Joint Hamming Weight and Minimal Weight Conversion of d Integers}, howpublished = {Cryptology ePrint Archive, Report 2010/300}, year = {2010}, url = {http://eprint.iacr.org/2010/300}, } @misc{cryptoeprint:2010:301, author = {Viet Tung Hoang and Phillip Rogaway}, title = {On generalized Feistel networks}, howpublished = {Cryptology ePrint Archive, Report 2010/301}, year = {2010}, url = {http://eprint.iacr.org/2010/301}, } @misc{cryptoeprint:2010:302, author = {Frederik Armknecht and Carsten Elsner and Martin Schmidt}, title = {Using the Inhomogeneous Simultaneous Approximation Problem for Cryptographic Design}, howpublished = {Cryptology ePrint Archive, Report 2010/302}, year = {2010}, url = {http://eprint.iacr.org/2010/302}, } @misc{cryptoeprint:2010:303, author = {Ran Canetti and Sebastian Gajek}, title = {Universally Composable Symbolic Analysis of Diffie-Hellman based Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2010/303}, year = {2010}, url = {http://eprint.iacr.org/2010/303}, } @misc{cryptoeprint:2010:304, author = {Hongbo Yu and Xiaoyun Wang}, title = {Cryptanalysis of the Compression Function of SIMD}, howpublished = {Cryptology ePrint Archive, Report 2010/304}, year = {2010}, url = {http://eprint.iacr.org/2010/304}, } @misc{cryptoeprint:2010:305, author = {Marten van Dijk and Ari Juels}, title = {On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing}, howpublished = {Cryptology ePrint Archive, Report 2010/305}, year = {2010}, url = {http://eprint.iacr.org/2010/305}, } @misc{cryptoeprint:2010:306, author = {He Debiao, Chen Jianhua, Hu Jin}, title = {On security of a remote user authentication scheme without using smart cards}, howpublished = {Cryptology ePrint Archive, Report 2010/306}, year = {2010}, url = {http://eprint.iacr.org/2010/306}, } @misc{cryptoeprint:2010:307, author = {Ruilin Li and Bing Sun and Chao Li}, title = {Impossible Differential Cryptanalysis of SPN Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2010/307}, year = {2010}, url = {http://eprint.iacr.org/2010/307}, } @misc{cryptoeprint:2010:308, author = {Michal Rjaško and Martin Stanek}, title = {Attacking M&M Collective Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2010/308}, year = {2010}, url = {http://eprint.iacr.org/2010/308}, } @misc{cryptoeprint:2010:309, author = {Raveen R. Goundar and Marc Joye and Atsuko Miyaji}, title = {Co-Z Addition Formulae and Binary Ladders on Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2010/309}, year = {2010}, url = {http://eprint.iacr.org/2010/309}, } @misc{cryptoeprint:2010:310, author = {Sheng-Ping Wu }, title = {The analytical property for $\zeta(s)$}, howpublished = {Cryptology ePrint Archive, Report 2010/310}, year = {2010}, url = {http://eprint.iacr.org/2010/310}, } @misc{cryptoeprint:2010:311, author = {J.C. Bajard and S. Duquesne and M. Ercegovac}, title = {Combining leak--resistant arithmetic for elliptic curves defined over $\F_p$ and RNS representation}, howpublished = {Cryptology ePrint Archive, Report 2010/311}, year = {2010}, url = {http://eprint.iacr.org/2010/311}, } @misc{cryptoeprint:2010:312, author = {Qingfeng Cheng and Chuangui Ma}, title = {Security weakness of two authenticated key exchange protocols from pairings}, howpublished = {Cryptology ePrint Archive, Report 2010/312}, year = {2010}, url = {http://eprint.iacr.org/2010/312}, } @misc{cryptoeprint:2010:313, author = {Charles Bouillaguet and Chen-Mou Cheng and Tony (Tung) Chou and Ruben Niederhagen and Adi Shamir and Bo-Yin Yang}, title = {Fast Exhaustive Search for Polynomial Systems in $F_2$}, howpublished = {Cryptology ePrint Archive, Report 2010/313}, year = {2010}, url = {http://eprint.iacr.org/2010/313}, } @misc{cryptoeprint:2010:314, author = {He Debiao, Chen Jianhua, Hu Jin}, title = {Weaknesses of a dynamic ID-based remote user authentication scheme}, howpublished = {Cryptology ePrint Archive, Report 2010/314}, year = {2010}, url = {http://eprint.iacr.org/2010/314}, } @misc{cryptoeprint:2010:315, author = {Patrick Longa and Catherine Gebotys}, title = {Efficient Techniques for High-Speed Elliptic Curve Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2010/315}, year = {2010}, url = {http://eprint.iacr.org/2010/315}, } @misc{cryptoeprint:2010:316, author = {Hassan Jameel Asghar and Josef Pieprzyk and Huaxiong Wang}, title = {A New Human Identification Protocol and Coppersmith's Baby-Step Giant-Step Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2010/316}, year = {2010}, url = {http://eprint.iacr.org/2010/316}, } @misc{cryptoeprint:2010:317, author = {Zhengjun Cao}, title = {A Note On Gottesman-Chuang Quantum Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2010/317}, year = {2010}, url = {http://eprint.iacr.org/2010/317}, } @misc{cryptoeprint:2010:318, author = {Ivan Damgård and Claudio Orlandi}, title = {Multiparty Computation for Dishonest Majority: from Passive to Active Security at Low Cost}, howpublished = {Cryptology ePrint Archive, Report 2010/318}, year = {2010}, url = {http://eprint.iacr.org/2010/318}, } @misc{cryptoeprint:2010:319, author = {Jian Weng and Yunlei Zhao}, title = {On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010}, howpublished = {Cryptology ePrint Archive, Report 2010/319}, year = {2010}, url = {http://eprint.iacr.org/2010/319}, } @misc{cryptoeprint:2010:320, author = {Lilya Budaghyan and Tor Helleseth}, title = {On isotopisms of commutative presemifields and CCZ-equivalence of functions}, howpublished = {Cryptology ePrint Archive, Report 2010/320}, year = {2010}, url = {http://eprint.iacr.org/2010/320}, } @misc{cryptoeprint:2010:321, author = {Martin Schläffer}, title = {Subspace Distinguisher for 5/8 Rounds of the ECHO-256 Hash Function}, howpublished = {Cryptology ePrint Archive, Report 2010/321}, year = {2010}, url = {http://eprint.iacr.org/2010/321}, } @misc{cryptoeprint:2010:322, author = {Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {Improved Single-Key Attacks on 8-round AES}, howpublished = {Cryptology ePrint Archive, Report 2010/322}, year = {2010}, url = {http://eprint.iacr.org/2010/322}, } @misc{cryptoeprint:2010:323, author = {Charles Bouillaguet and Pierre-Alain Fouque and Gaëtan Leurent}, title = {Security Analysis of SIMD}, howpublished = {Cryptology ePrint Archive, Report 2010/323}, year = {2010}, url = {http://eprint.iacr.org/2010/323}, } @misc{cryptoeprint:2010:324, author = {Abdel Alim Kamal and Amr M. Youssef}, title = {Applications of SAT Solvers to AES key Recovery from Decayed Key Schedule Images}, howpublished = {Cryptology ePrint Archive, Report 2010/324}, year = {2010}, url = {http://eprint.iacr.org/2010/324}, } @misc{cryptoeprint:2010:325, author = {Zhenli Dai, Meiqin Wang, Yue Sun}, title = {Effect of the Dependent Paths in Linear Hull}, howpublished = {Cryptology ePrint Archive, Report 2010/325}, year = {2010}, url = {http://eprint.iacr.org/2010/325}, } @misc{cryptoeprint:2010:326, author = {Daniel Funke and Florian Kerschbaum}, title = {Privacy-Preserving Multi-Objective Evolutionary Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2010/326}, year = {2010}, url = {http://eprint.iacr.org/2010/326}, } @misc{cryptoeprint:2010:327, author = {Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong}, title = {Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption}, howpublished = {Cryptology ePrint Archive, Report 2010/327}, year = {2010}, url = {http://eprint.iacr.org/2010/327}, } @misc{cryptoeprint:2010:328, author = {László Czap and István Vajda}, title = {Signatures for Multi-source Network Coding}, howpublished = {Cryptology ePrint Archive, Report 2010/328}, year = {2010}, url = {http://eprint.iacr.org/2010/328}, } @misc{cryptoeprint:2010:329, author = {Koji Nuida and Goichiro Hanaoka}, title = {On the Security of Pseudorandomized Information-Theoretically Secure Schemes}, howpublished = {Cryptology ePrint Archive, Report 2010/329}, year = {2010}, url = {http://eprint.iacr.org/2010/329}, } @misc{cryptoeprint:2010:330, author = {Amjed Shareef}, title = {Terrorists in Parliament, Distributed Rational Consensus}, howpublished = {Cryptology ePrint Archive, Report 2010/330}, year = {2010}, url = {http://eprint.iacr.org/2010/330}, } @misc{cryptoeprint:2010:331, author = {Jean-Charles Faugère and Ayoub Otmani and Ludovic Perret and and Jean-Pierre Tillich}, title = {A Distinguisher for High Rate McEliece Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2010/331}, year = {2010}, url = {http://eprint.iacr.org/2010/331}, } @misc{cryptoeprint:2010:332, author = {Aurelien Francillon and Boris Danev and Srdjan Capkun}, title = {Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars}, howpublished = {Cryptology ePrint Archive, Report 2010/332}, year = {2010}, url = {http://eprint.iacr.org/2010/332}, } @misc{cryptoeprint:2010:333, author = {Zhengjun Cao}, title = {Cryptanalysis of Libert-Vergnaud Proxy Re-encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2010/333}, year = {2010}, url = {http://eprint.iacr.org/2010/333}, } @misc{cryptoeprint:2010:334, author = {SeongHan Shin and Kazukuni Kobara and Hideki Imai}, title = {Security Proof of AugPAKE}, howpublished = {Cryptology ePrint Archive, Report 2010/334}, year = {2010}, url = {http://eprint.iacr.org/2010/334}, } @misc{cryptoeprint:2010:335, author = {Patrick Longa, and Catherine Gebotys}, title = {Analysis of Efficient Techniques for Fast Elliptic Curve Cryptography on x86-64 based Processors}, howpublished = {Cryptology ePrint Archive, Report 2010/335}, year = {2010}, url = {http://eprint.iacr.org/2010/335}, } @misc{cryptoeprint:2010:336, author = {Shigeto Gomisawa, Yang Li, Junko Takahashi, Toshinori Fukunaga, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta}, title = {Efficient Differential Fault Analysis for AES}, howpublished = {Cryptology ePrint Archive, Report 2010/336}, year = {2010}, url = {http://eprint.iacr.org/2010/336}, } @misc{cryptoeprint:2010:337, author = {Vincent Rijmen}, title = {Practical-Titled Attack on AES-128 Using Chosen-Text Relations}, howpublished = {Cryptology ePrint Archive, Report 2010/337}, year = {2010}, url = {http://eprint.iacr.org/2010/337}, } @misc{cryptoeprint:2010:338, author = {Joppe W. Bos and Thorsten Kleinjung and Arjen K. Lenstra and Peter L. Montgomery}, title = {Pushing the Limits of ECM}, howpublished = {Cryptology ePrint Archive, Report 2010/338}, year = {2010}, url = {http://eprint.iacr.org/2010/338}, } @misc{cryptoeprint:2010:339, author = {Jose Bacelar Almeida and Endre Bangerter and Manuel Barbosa and Stephan Krenn and Ahmad-Reza Sadeghi and Thomas Schneider}, title = {A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on $\Sigma$-Protocols}, howpublished = {Cryptology ePrint Archive, Report 2010/339}, year = {2010}, url = {http://eprint.iacr.org/2010/339}, } @misc{cryptoeprint:2010:340, author = {Jayaprakash Kar and Banshidhar Majhi}, title = {A secure Deniable Authentication Protocol based on Bilinear Diffie-Hellman Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2010/340}, year = {2010}, url = {http://eprint.iacr.org/2010/340}, } @misc{cryptoeprint:2010:341, author = {Masao Kasahara}, title = {A New Class of Public Key Cryptosystems Constructed Based on Error-Correcting Codes, Using K(III) Scheme}, howpublished = {Cryptology ePrint Archive, Report 2010/341}, year = {2010}, url = {http://eprint.iacr.org/2010/341}, } @misc{cryptoeprint:2010:342, author = {Craig Costello and Douglas Stebila}, title = {Fixed Argument Pairings}, howpublished = {Cryptology ePrint Archive, Report 2010/342}, year = {2010}, url = {http://eprint.iacr.org/2010/342}, } @misc{cryptoeprint:2010:343, author = {S.Sharmila Deva Selvi and S.Sree Vivek and C.Pandu Rangan}, title = {Identity Based Public Verifiable Signcryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2010/343}, year = {2010}, url = {http://eprint.iacr.org/2010/343}, } @misc{cryptoeprint:2010:344, author = {Ezekiel J Kachisa}, title = {Generating more Kawazoe-Takahashi Genus 2 Pairing-friendly Hyperelliptic Curves.}, howpublished = {Cryptology ePrint Archive, Report 2010/344}, year = {2010}, url = {http://eprint.iacr.org/2010/344}, } @misc{cryptoeprint:2010:345, author = {Miyako Ohkubo, Shin'ichiro Matsuo, Yoshikazu Hanatani, Kazuo Sakiyama and Kazuo Ohta}, title = {Robust RFID Authentication Protocol with Formal Proof and Its Feasibility}, howpublished = {Cryptology ePrint Archive, Report 2010/345}, year = {2010}, url = {http://eprint.iacr.org/2010/345}, } @misc{cryptoeprint:2010:346, author = {Prashant Kushwah and Sunder Lal}, title = {Efficient Generalized Signcryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2010/346}, year = {2010}, url = {http://eprint.iacr.org/2010/346}, } @misc{cryptoeprint:2010:347, author = {Kenneth G. Paterson and Elizabeth A. Quaglia}, title = {Time-Specific Encryption}, howpublished = {Cryptology ePrint Archive, Report 2010/347}, year = {2010}, url = {http://eprint.iacr.org/2010/347}, } @misc{cryptoeprint:2010:348, author = {A. N. Alekseychuk}, title = {Lattice-theoretic Characterization of Secret Sharing Representable Connected Matroids}, howpublished = {Cryptology ePrint Archive, Report 2010/348}, year = {2010}, url = {http://eprint.iacr.org/2010/348}, } @misc{cryptoeprint:2010:349, author = {Kenneth Koon-Ho Wong and Gregory V. Bard}, title = {Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems}, howpublished = {Cryptology ePrint Archive, Report 2010/349}, year = {2010}, url = {http://eprint.iacr.org/2010/349}, } @misc{cryptoeprint:2010:350, author = {Vladimir Kolesnikov}, title = {A Security Enhancement and Proof for Authentication and Key Agreement (AKA)}, howpublished = {Cryptology ePrint Archive, Report 2010/350}, year = {2010}, url = {http://eprint.iacr.org/2010/350}, } @misc{cryptoeprint:2010:351, author = {Allison Lewko and Brent Waters}, title = {Decentralizing Attribute-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2010/351}, year = {2010}, url = {http://eprint.iacr.org/2010/351}, } @misc{cryptoeprint:2010:352, author = {Masahiro Yagisawa}, title = {A Digital Signature Using Multivariate Functions on Quaternion Ring}, howpublished = {Cryptology ePrint Archive, Report 2010/352}, year = {2010}, url = {http://eprint.iacr.org/2010/352}, } @misc{cryptoeprint:2010:353, author = {Naoki Ogura and Naoki Kanayama and Shigenori Uchiyama and Eiji Okamoto}, title = {Cryptographic Pairings Based on Elliptic Nets}, howpublished = {Cryptology ePrint Archive, Report 2010/353}, year = {2010}, url = {http://eprint.iacr.org/2010/353}, } @misc{cryptoeprint:2010:354, author = {Jean-Luc Beuchat and Jorge Enrique González Díaz and Shigeo Mitsunari and Eiji Okamoto and Francisco Rodríguez-Henríquez and Tadanori Teruya}, title = {High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves }, howpublished = {Cryptology ePrint Archive, Report 2010/354}, year = {2010}, url = {http://eprint.iacr.org/2010/354}, } @misc{cryptoeprint:2010:355, author = {Bozhan Su and Wenling Wu and Shuang Wu and Le Dong}, title = {Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE}, howpublished = {Cryptology ePrint Archive, Report 2010/355}, year = {2010}, url = {http://eprint.iacr.org/2010/355}, } @misc{cryptoeprint:2010:356, author = {Pinaki Sarkar and Amrita Saha and Morshed Udan Chowdhury}, title = {Secure Connectivity Model In Wireless Sensor Network(WSN) Using 1st Order Reed Muller Codes}, howpublished = {Cryptology ePrint Archive, Report 2010/356}, year = {2010}, url = {http://eprint.iacr.org/2010/356}, } @misc{cryptoeprint:2010:357, author = {Jun Shao and Peng liu and Jian Weng}, title = {CCA-Secure PRE Scheme without Public Verifiability}, howpublished = {Cryptology ePrint Archive, Report 2010/357}, year = {2010}, url = {http://eprint.iacr.org/2010/357}, } @misc{cryptoeprint:2010:358, author = {M.-F. Lee, N.P. Smart and B. Warinschi}, title = {The Fiat--Shamir Transform for Group and Ring Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2010/358}, year = {2010}, url = {http://eprint.iacr.org/2010/358}, } @misc{cryptoeprint:2010:359, author = {S.Sharmila Deva Selvi and S.Sree Vivek and S.Gopinath and C.Pandu Rangan}, title = {Identity Based Self Delegated Signature - Self Proxy Signatures}, howpublished = {Cryptology ePrint Archive, Report 2010/359}, year = {2010}, url = {http://eprint.iacr.org/2010/359}, } @misc{cryptoeprint:2010:360, author = {S.Sharmila Deva Selvi and S.Sree Vivek and S.Priti and C.Pandu Rangan}, title = {On the Security of Identity Based Threshold Unsigncryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2010/360}, year = {2010}, url = {http://eprint.iacr.org/2010/360}, } @misc{cryptoeprint:2010:361, author = {Jeremy Clark and Urs Hengartner}, title = {On the Use of Financial Data as a Random Beacon}, howpublished = {Cryptology ePrint Archive, Report 2010/361}, year = {2010}, url = {http://eprint.iacr.org/2010/361}, } @misc{cryptoeprint:2010:362, author = {Deng Tang and Weiguo Zhang and Xiaohu Tang}, title = {Construction of Balanced Boolean Functions with High Nonlinearity and Good Autocorrelation Properties}, howpublished = {Cryptology ePrint Archive, Report 2010/362}, year = {2010}, url = {http://eprint.iacr.org/2010/362}, } @misc{cryptoeprint:2010:363, author = {Kristin Lauter and Peter L. Montgomery and Michael Naehrig}, title = {An Analysis of Affine Coordinates for Pairing Computation}, howpublished = {Cryptology ePrint Archive, Report 2010/363}, year = {2010}, url = {http://eprint.iacr.org/2010/363}, } @misc{cryptoeprint:2010:364, author = {Jean-Luc Beuchat and Eiji Okamoto and Teppei Yamazaki}, title = {A Compact FPGA Implementation of the SHA-3 Candidate ECHO}, howpublished = {Cryptology ePrint Archive, Report 2010/364}, year = {2010}, url = {http://eprint.iacr.org/2010/364}, } @misc{cryptoeprint:2010:365, author = {Wilko Henecka and Stefan Kögl and Ahmad-Reza Sadeghi and Thomas Schneider and Immo Wehrenberg}, title = {TASTY: Tool for Automating Secure Two-partY computations}, howpublished = {Cryptology ePrint Archive, Report 2010/365}, year = {2010}, url = {http://eprint.iacr.org/2010/365}, } @misc{cryptoeprint:2010:366, author = {Benny Pinkas and Tzachy Reinman}, title = {Oblivious RAM Revisited}, howpublished = {Cryptology ePrint Archive, Report 2010/366}, year = {2010}, url = {http://eprint.iacr.org/2010/366}, } @misc{cryptoeprint:2010:367, author = {Daniel J. Bernstein and Peter Birkner and Tanja Lange}, title = {Starfish on Strike}, howpublished = {Cryptology ePrint Archive, Report 2010/367}, year = {2010}, url = {http://eprint.iacr.org/2010/367}, } @misc{cryptoeprint:2010:368, author = {Jonathan Katz and Vinod Vaikuntanathan}, title = {One-Round Password-Based Authenticated Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2010/368}, year = {2010}, url = {http://eprint.iacr.org/2010/368}, } @misc{cryptoeprint:2010:369, author = {Debrup Chakraborty and Cuauhtemoc Mancillas-Lopez}, title = {Double Ciphertext Mode : A Proposal for Secure Backup}, howpublished = {Cryptology ePrint Archive, Report 2010/369}, year = {2010}, url = {http://eprint.iacr.org/2010/369}, } @misc{cryptoeprint:2010:370, author = {Robert P. Gallant}, title = {Finding discrete logarithms with a set orbit distinguisher}, howpublished = {Cryptology ePrint Archive, Report 2010/370}, year = {2010}, url = {http://eprint.iacr.org/2010/370}, } @misc{cryptoeprint:2010:371, author = {Nicolas Estibals}, title = {Compact hardware for computing the Tate pairing over 128-bit-security supersingular curves}, howpublished = {Cryptology ePrint Archive, Report 2010/371}, year = {2010}, url = {http://eprint.iacr.org/2010/371}, } @misc{cryptoeprint:2010:372, author = {Paulo S. L. M. Barreto and Richard Lindner and Rafael Misoczki}, title = {Decoding square-free Goppa codes over $\F_p$}, howpublished = {Cryptology ePrint Archive, Report 2010/372}, year = {2010}, url = {http://eprint.iacr.org/2010/372}, } @misc{cryptoeprint:2010:373, author = {Reza Rezaeian Farashahi}, title = {Hashing into Hessian Curves}, howpublished = {Cryptology ePrint Archive, Report 2010/373}, year = {2010}, url = {http://eprint.iacr.org/2010/373}, } @misc{cryptoeprint:2010:374, author = {Zhen Liu and Zhenfu Cao}, title = {On Efficiently Transferring the Linear Secret-Sharing Scheme Matrix in Ciphertext-Policy Attribute-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2010/374}, year = {2010}, url = {http://eprint.iacr.org/2010/374}, } @misc{cryptoeprint:2010:375, author = {Kota Ideguchi and Elmar Tischhauser and Bart Preneel}, title = {Improved Collision Attacks on the Reduced-Round Gr{\o}stl Hash Function}, howpublished = {Cryptology ePrint Archive, Report 2010/375}, year = {2010}, url = {http://eprint.iacr.org/2010/375}, } @misc{cryptoeprint:2010:376, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, title = {Identity Based Online/Offline Signcryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2010/376}, year = {2010}, url = {http://eprint.iacr.org/2010/376}, } @misc{cryptoeprint:2010:377, author = {Masahiro Yagisawa }, title = {Key Agreement Protocols Based on Multivariate Algebraic Equations on Quaternion Ring }, howpublished = {Cryptology ePrint Archive, Report 2010/377}, year = {2010}, url = {http://eprint.iacr.org/2010/377}, } @misc{cryptoeprint:2010:378, author = {Jin Wang }, title = {Ring Signature and Identity-Based Ring Signature from Lattice Basis Delegation}, howpublished = {Cryptology ePrint Archive, Report 2010/378}, year = {2010}, url = {http://eprint.iacr.org/2010/378}, } @misc{cryptoeprint:2010:379, author = {Sorina Ionica and Antoine Joux}, title = {Pairing computation on curves with efficiently computable endomorphism and small embedding degree}, howpublished = {Cryptology ePrint Archive, Report 2010/379}, year = {2010}, url = {http://eprint.iacr.org/2010/379}, } @misc{cryptoeprint:2010:380, author = {Kristian Gjøsteen}, title = {Analysis of an internet voting protocol}, howpublished = {Cryptology ePrint Archive, Report 2010/380}, year = {2010}, url = {http://eprint.iacr.org/2010/380}, } @misc{cryptoeprint:2010:381, author = {Elena Andreeva and Bart Mennink and Bart Preneel}, title = {Security Reductions of the Second Round SHA-3 Candidates}, howpublished = {Cryptology ePrint Archive, Report 2010/381}, year = {2010}, url = {http://eprint.iacr.org/2010/381}, } @misc{cryptoeprint:2010:382, author = {Pierre-Alain Fouque and Mehdi Tibouchi}, title = {Deterministic Encoding and Hashing to Odd Hyperelliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2010/382}, year = {2010}, url = {http://eprint.iacr.org/2010/382}, } @misc{cryptoeprint:2010:383, author = {Marc Joye and Mehdi Tibouchi and Damien Vergnaud}, title = {Huff's Model for Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2010/383}, year = {2010}, url = {http://eprint.iacr.org/2010/383}, } @misc{cryptoeprint:2010:384, author = {Danilo Gligoroski and Vlastimil Klima}, title = {Practical consequences of the aberration of narrow-pipe hash designs from ideal random functions}, howpublished = {Cryptology ePrint Archive, Report 2010/384}, year = {2010}, url = {http://eprint.iacr.org/2010/384}, } @misc{cryptoeprint:2010:385, author = {Emmanuel Prouff and Robert McEvoy}, title = {First-Order Side-Channel Attacks on the Permutation Tables Countermeasure –Extended Version–}, howpublished = {Cryptology ePrint Archive, Report 2010/385}, year = {2010}, url = {http://eprint.iacr.org/2010/385}, } @misc{cryptoeprint:2010:386, author = {Werner Backes and Susanne Wetzel}, title = {BoostReduce - A Framework For Strong Lattice Basis Reduction}, howpublished = {Cryptology ePrint Archive, Report 2010/386}, year = {2010}, url = {http://eprint.iacr.org/2010/386}, } @misc{cryptoeprint:2010:387, author = {Goutam Paul and Subhamoy Maitra and Shashwat Raizada}, title = {A Combinatorial Analysis of HC-128}, howpublished = {Cryptology ePrint Archive, Report 2010/387}, year = {2010}, url = {http://eprint.iacr.org/2010/387}, } @misc{cryptoeprint:2010:388, author = {Sanjit Chatterjee and Darrel Hankerson and Alfred Menezes}, title = {On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings}, howpublished = {Cryptology ePrint Archive, Report 2010/388}, year = {2010}, url = {http://eprint.iacr.org/2010/388}, } @misc{cryptoeprint:2010:389, author = {Dominique Unruh}, title = {The impossibility of computationally sound XOR}, howpublished = {Cryptology ePrint Archive, Report 2010/389}, year = {2010}, url = {http://eprint.iacr.org/2010/389}, } @misc{cryptoeprint:2010:390, author = {Hongfeng Wu and Rongquan Feng}, title = {Elliptic curves in Huff 's model}, howpublished = {Cryptology ePrint Archive, Report 2010/390}, year = {2010}, url = {http://eprint.iacr.org/2010/390}, } @misc{cryptoeprint:2010:391, author = {Daniel Z. Zanger}, title = {Exponential Bounds for Information Leakage in Unknown-Message Side-Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2010/391}, year = {2010}, url = {http://eprint.iacr.org/2010/391}, } @misc{cryptoeprint:2010:392, author = {Abhinav Mehta, Shashank Agrawal, Kannan Srinathan}, title = {Interplay between (im)perfectness, synchrony and connectivity: The Case of Probabilistic Reliable Communication}, howpublished = {Cryptology ePrint Archive, Report 2010/392}, year = {2010}, url = {http://eprint.iacr.org/2010/392}, } @misc{cryptoeprint:2010:393, author = {Jue-Sam Chou 1*, Yalin Chen 2, Chun-Hui Huang 3}, title = {A Privacy-Flexible Password Authentication Scheme for Multi-Server Environment}, howpublished = {Cryptology ePrint Archive, Report 2010/393}, year = {2010}, url = {http://eprint.iacr.org/2010/393}, } @misc{cryptoeprint:2010:394, author = {Christophe Clavier and Benoit Feix and Georges Gagnerot and Mylene Roussellet and Vincent Verneuil}, title = {Horizontal Correlation Analysis on Exponentiation}, howpublished = {Cryptology ePrint Archive, Report 2010/394}, year = {2010}, url = {http://eprint.iacr.org/2010/394}, } @misc{cryptoeprint:2010:395, author = {Zhibin Zhou and Dijiang Huang}, title = {On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption}, howpublished = {Cryptology ePrint Archive, Report 2010/395}, year = {2010}, url = {http://eprint.iacr.org/2010/395}, } @misc{cryptoeprint:2010:396, author = {Noémie Floissac and Yann L'Hyver}, title = {From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks}, howpublished = {Cryptology ePrint Archive, Report 2010/396}, year = {2010}, url = {http://eprint.iacr.org/2010/396}, } @misc{cryptoeprint:2010:397, author = {Mihir Bellare and David Cash }, title = {Pseudorandom Functions and Permutations Provably Secure Against Related-Key Attacks}, howpublished = {Cryptology ePrint Archive, Report 2010/397}, year = {2010}, url = {http://eprint.iacr.org/2010/397}, } @misc{cryptoeprint:2010:398, author = {Peter Novotney}, title = {Distinguisher for Shabal's Permutation Function}, howpublished = {Cryptology ePrint Archive, Report 2010/398}, year = {2010}, url = {http://eprint.iacr.org/2010/398}, } @misc{cryptoeprint:2010:399, author = {Chang-An Zhao, Fangguo Zhang and Dongqing Xie}, title = {Faster Computation of Self-pairings}, howpublished = {Cryptology ePrint Archive, Report 2010/399}, year = {2010}, url = {http://eprint.iacr.org/2010/399}, } @misc{cryptoeprint:2010:400, author = {Kitae Kim and Dahun Nyang}, title = {Security Analysis of a Threshold Proxy Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2010/400}, year = {2010}, url = {http://eprint.iacr.org/2010/400}, } @misc{cryptoeprint:2010:401, author = {Jan Camenisch and Thomas Groß and Peter Hladky and Christian Hoertnagl}, title = {Privacy-friendly Incentives and their Application to Wikipedia (Extended Version)}, howpublished = {Cryptology ePrint Archive, Report 2010/401}, year = {2010}, url = {http://eprint.iacr.org/2010/401}, } @misc{cryptoeprint:2010:402, author = {Mohammad Reza Sohizadeh Abyaneh}, title = {On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack}, howpublished = {Cryptology ePrint Archive, Report 2010/402}, year = {2010}, url = {http://eprint.iacr.org/2010/402}, } @misc{cryptoeprint:2010:403, author = {Ali Aydın Selçuk and Ramazan Yılmaz}, title = {Linear Secret Sharing for Hierarchical Access Structures}, howpublished = {Cryptology ePrint Archive, Report 2010/403}, year = {2010}, url = {http://eprint.iacr.org/2010/403}, } @misc{cryptoeprint:2010:404, author = {Allison Lewko and Brent Waters}, title = {On the Insecurity of Parallel Repetition for Leakage Resilience}, howpublished = {Cryptology ePrint Archive, Report 2010/404}, year = {2010}, url = {http://eprint.iacr.org/2010/404}, } @misc{cryptoeprint:2010:405, author = {S\'ebastien Canard and Iwen Coisel and Jonathan Etrog and Marc Girault}, title = {Privacy-Preserving RFID Systems: Model and Constructions}, howpublished = {Cryptology ePrint Archive, Report 2010/405}, year = {2010}, url = {http://eprint.iacr.org/2010/405}, } @misc{cryptoeprint:2010:406, author = {Julien Francq and Céline Thuillet}, title = {Unfolding Method for Shabal on Virtex-5 FPGAs: Concrete Results.pdf}, howpublished = {Cryptology ePrint Archive, Report 2010/406}, year = {2010}, url = {http://eprint.iacr.org/2010/406}, } @misc{cryptoeprint:2010:407, author = {Manoj Kumar and Pratibha Yadav and Meena Kumari}, title = {Flaws in Differential Cryptanalysis of Reduced Round PRESENT}, howpublished = {Cryptology ePrint Archive, Report 2010/407}, year = {2010}, url = {http://eprint.iacr.org/2010/407}, } @misc{cryptoeprint:2010:408, author = {Jean-François Gallais and Ilya Kizhvatov and Michael Tunstall}, title = {Improved Trace-Driven Cache-Collision Attacks against Embedded AES Implementations}, howpublished = {Cryptology ePrint Archive, Report 2010/408}, year = {2010}, url = {http://eprint.iacr.org/2010/408}, } @misc{cryptoeprint:2010:409, author = {Jooyoung Lee and Martijn Stam and John Steinberger}, title = {The collision security of Tandem-DM in the ideal cipher model}, howpublished = {Cryptology ePrint Archive, Report 2010/409}, year = {2010}, url = {http://eprint.iacr.org/2010/409}, } @misc{cryptoeprint:2010:410, author = {Daniel J. Bernstein and Tanja Lange and Christiane Peters}, title = {Wild McEliece}, howpublished = {Cryptology ePrint Archive, Report 2010/410}, year = {2010}, url = {http://eprint.iacr.org/2010/410}, } @misc{cryptoeprint:2010:411, author = {Vivien Dubois and Jean-Gabriel Kammerer}, title = {Cryptanalysis of Cryptosystems Based on Noncommutative Skew Polynomials.}, howpublished = {Cryptology ePrint Archive, Report 2010/411}, year = {2010}, url = {http://eprint.iacr.org/2010/411}, } @misc{cryptoeprint:2010:412, author = {Margus Niitsoo}, title = {Optimal Adversary Behavior for the Serial Model of Financial Attack Trees}, howpublished = {Cryptology ePrint Archive, Report 2010/412}, year = {2010}, url = {http://eprint.iacr.org/2010/412}, } @misc{cryptoeprint:2010:413, author = {E.A.Grechnikov}, title = {Collisions for 72-step and 73-step SHA-1: Improvements in the Method of Characteristics}, howpublished = {Cryptology ePrint Archive, Report 2010/413}, year = {2010}, url = {http://eprint.iacr.org/2010/413}, } @misc{cryptoeprint:2010:414, author = {Nir Bitansky and Ran Canetti}, title = {On Strong Simulation and Composable Point Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2010/414}, year = {2010}, url = {http://eprint.iacr.org/2010/414}, } @misc{cryptoeprint:2010:415, author = {Stanislav Smyshlyaev}, title = {Perfectly Balanced Boolean Functions and Goli\'c Conjecture}, howpublished = {Cryptology ePrint Archive, Report 2010/415}, year = {2010}, url = {http://eprint.iacr.org/2010/415}, } @misc{cryptoeprint:2010:416, author = {Michael Backes and Matteo Maffei and Dominique Unruh}, title = {Computationally Sound Verification of Source Code}, howpublished = {Cryptology ePrint Archive, Report 2010/416}, year = {2010}, url = {http://eprint.iacr.org/2010/416}, } @misc{cryptoeprint:2010:417, author = {Ming Duan and Xuejia Lai and Mohan Yang and Xiaorui Sun and Bo Zhu}, title = {Distinguishing Properties of Higher Order Derivatives of Boolean Functions}, howpublished = {Cryptology ePrint Archive, Report 2010/417}, year = {2010}, url = {http://eprint.iacr.org/2010/417}, } @misc{cryptoeprint:2010:418, author = {*Jue-Sam Chou 1, hsien-ching Chen 2, Chun-Yun Chen 3}, title = {Cryptanalysis and Improvement of A New Electronic Traveler’s Check Scheme Based on One-way Hash Function}, howpublished = {Cryptology ePrint Archive, Report 2010/418}, year = {2010}, url = {http://eprint.iacr.org/2010/418}, } @misc{cryptoeprint:2010:419, author = {Dmirty Schelkunov}, title = {White-Box Cryptography and SPN ciphers. LRC method.}, howpublished = {Cryptology ePrint Archive, Report 2010/419}, year = {2010}, url = {http://eprint.iacr.org/2010/419}, } @misc{cryptoeprint:2010:420, author = {Stanislav Bulygin and Albrecht Petzoldt and Johannes Buchmann}, title = {Towards provable security of the Unbalanced Oil and Vinegar signature scheme under direct attacks}, howpublished = {Cryptology ePrint Archive, Report 2010/420}, year = {2010}, url = {http://eprint.iacr.org/2010/420}, } @misc{cryptoeprint:2010:421, author = {Gideon Samid}, title = {Binomial Sieve Series -- a Prospective Cryptographic Tool}, howpublished = {Cryptology ePrint Archive, Report 2010/421}, year = {2010}, url = {http://eprint.iacr.org/2010/421}, } @misc{cryptoeprint:2010:422, author = {Jae Hyun Ahn and Matthew Green and Susan Hohenberger}, title = {Synchronized Aggregate Signatures: New Definitions, Constructions and Applications}, howpublished = {Cryptology ePrint Archive, Report 2010/422}, year = {2010}, url = {http://eprint.iacr.org/2010/422}, } @misc{cryptoeprint:2010:423, author = {LI Yun-qiang and Wang Ai-lan}, title = {Near Collisions for the Compress Function of Hamsi-256 Found by Genetic Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2010/423}, year = {2010}, url = {http://eprint.iacr.org/2010/423}, } @misc{cryptoeprint:2010:424, author = {Albrecht Petzoldt and Stanislav Bulygin and Johannes Buchmann}, title = {CyclicRainbow - A multivariate Signature Scheme with a Partially Cyclic Public Key based on Rainbow}, howpublished = {Cryptology ePrint Archive, Report 2010/424}, year = {2010}, url = {http://eprint.iacr.org/2010/424}, } @misc{cryptoeprint:2010:425, author = {R. Wei and Z. Zeng}, title = {KIST: A new encryption algorithm based on splay}, howpublished = {Cryptology ePrint Archive, Report 2010/425}, year = {2010}, url = {http://eprint.iacr.org/2010/425}, } @misc{cryptoeprint:2010:426, author = {Huihui Yap and Khoongming Khoo and Axel Poschmann}, title = {Parallelizing the Camellia and SMS4 Block Ciphers - Extended version}, howpublished = {Cryptology ePrint Archive, Report 2010/426}, year = {2010}, url = {http://eprint.iacr.org/2010/426}, } @misc{cryptoeprint:2010:427, author = {Junghyun Nam}, title = {Security Improvement on a Password-Authenticated Group Key Exchange Protocol}, howpublished = {Cryptology ePrint Archive, Report 2010/427}, year = {2010}, url = {http://eprint.iacr.org/2010/427}, } @misc{cryptoeprint:2010:428, author = {Özgür Dagdelen and Marc Fischlin and Anja Lehmann and Christian Schaffner}, title = {Random Oracles in a Quantum World}, howpublished = {Cryptology ePrint Archive, Report 2010/428}, year = {2010}, url = {http://eprint.iacr.org/2010/428}, } @misc{cryptoeprint:2010:429, author = {Paulo S. L. M. Barreto and Michael Naehrig and Geovandro C. C. F. Pereira and Marcos A. Simplício Jr}, title = {A Family of Implementation-Friendly BN Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2010/429}, year = {2010}, url = {http://eprint.iacr.org/2010/429}, } @misc{cryptoeprint:2010:430, author = {Vlastimil Klima and Danilo Gligoroski}, title = {Generic Collision Attacks on Narrow-pipe Hash Functions Faster than Birthday Paradox, Applicable to MDx, SHA-1, SHA-2, and SHA-3 Narrow-pipe Candidates}, howpublished = {Cryptology ePrint Archive, Report 2010/430}, year = {2010}, url = {http://eprint.iacr.org/2010/430}, } @misc{cryptoeprint:2010:431, author = {Jing Liu and Bo Yang}, title = {Homomorphic One-Way Function Trees and Application in Collusion-Free Multicast Key Distribution}, howpublished = {Cryptology ePrint Archive, Report 2010/431}, year = {2010}, url = {http://eprint.iacr.org/2010/431}, } @misc{cryptoeprint:2010:432, author = {K. Atighehchi and A. Enache and T. Muntean and G. Risterucci}, title = {AN EFFICIENT PARALLEL ALGORITHM FOR SKEIN HASH FUNCTIONS}, howpublished = {Cryptology ePrint Archive, Report 2010/432}, year = {2010}, url = {http://eprint.iacr.org/2010/432}, } @misc{cryptoeprint:2010:433, author = {Markku-Juhani O. Saarinen }, title = {The PASSERINE Public Key Encryption and Authentication Mechanism }, howpublished = {Cryptology ePrint Archive, Report 2010/433}, year = {2010}, url = {http://eprint.iacr.org/2010/433}, } @misc{cryptoeprint:2010:434, author = {Takanori Isobe and Taizo Shirai}, title = {Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512}, howpublished = {Cryptology ePrint Archive, Report 2010/434}, year = {2010}, url = {http://eprint.iacr.org/2010/434}, } @misc{cryptoeprint:2010:435, author = {Cihangir Tezcan}, title = {The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA}, howpublished = {Cryptology ePrint Archive, Report 2010/435}, year = {2010}, url = {http://eprint.iacr.org/2010/435}, } @misc{cryptoeprint:2010:436, author = {Roberto Avanzi and Clemens Heuberger and Helmut Prodinger}, title = {Arithmetic of Supersingular Koblitz Curves in Characteristic Three}, howpublished = {Cryptology ePrint Archive, Report 2010/436}, year = {2010}, url = {http://eprint.iacr.org/2010/436}, } @misc{cryptoeprint:2010:437, author = {Albrecht Petzoldt and Stanislav Bulygin and Johannes Buchmann}, title = {Selecting Parameters for the Rainbow Signature Scheme - Extended Version -}, howpublished = {Cryptology ePrint Archive, Report 2010/437}, year = {2010}, url = {http://eprint.iacr.org/2010/437}, } @misc{cryptoeprint:2010:438, author = {Allison Lewko and Yannis Rouselakis and Brent Waters}, title = {Achieving Leakage Resilience Through Dual System Encryption}, howpublished = {Cryptology ePrint Archive, Report 2010/438}, year = {2010}, url = {http://eprint.iacr.org/2010/438}, } @misc{cryptoeprint:2010:439, author = {Feng Liu and Chuankun Wu}, title = {Embedded Extended Visual Cryptography Schemes}, howpublished = {Cryptology ePrint Archive, Report 2010/439}, year = {2010}, url = {http://eprint.iacr.org/2010/439}, } @misc{cryptoeprint:2010:440, author = {Christophe Giraud and Adrian Thillard}, title = {Piret and Quisquater's DFA on AES Revisited}, howpublished = {Cryptology ePrint Archive, Report 2010/440}, year = {2010}, url = {http://eprint.iacr.org/2010/440}, } @misc{cryptoeprint:2010:441, author = {Matthieu Rivain and Emmanuel Prouff}, title = {Provably Secure Higher-Order Masking of AES}, howpublished = {Cryptology ePrint Archive, Report 2010/441}, year = {2010}, url = {http://eprint.iacr.org/2010/441}, } @misc{cryptoeprint:2010:442, author = {Dan Boneh and Hart Montgomery and Ananth Raghunathan}, title = {Algebraic Pseudorandom Functions with Improved Efficiency from the Augmented Cascade}, howpublished = {Cryptology ePrint Archive, Report 2010/442}, year = {2010}, url = {http://eprint.iacr.org/2010/442}, } @misc{cryptoeprint:2010:443, author = {Xiaohu Tang and Deng Tang and Xiangyong Zeng and Lei Hu}, title = {Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity}, howpublished = {Cryptology ePrint Archive, Report 2010/443}, year = {2010}, url = {http://eprint.iacr.org/2010/443}, } @misc{cryptoeprint:2010:444, author = {Song Luo and Jianbin Hu and Zhong Chen}, title = {New Construction of Identity-based Proxy Re-encryption}, howpublished = {Cryptology ePrint Archive, Report 2010/444}, year = {2010}, url = {http://eprint.iacr.org/2010/444}, } @misc{cryptoeprint:2010:445, author = {Ekawat Homsirikamol and Marcin Rogawski and Kris Gaj}, title = {Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs}, howpublished = {Cryptology ePrint Archive, Report 2010/445}, year = {2010}, url = {http://eprint.iacr.org/2010/445}, } @misc{cryptoeprint:2010:446, author = {G.M. Zaverucha and D.R. Stinson}, title = {Short One-Time Signatures}, howpublished = {Cryptology ePrint Archive, Report 2010/446}, year = {2010}, url = {http://eprint.iacr.org/2010/446}, } @misc{cryptoeprint:2010:447, author = {Olivier Benoit and Thomas Peyrin}, title = {Side-channel Analysis of Six SHA-3 Candidates}, howpublished = {Cryptology ePrint Archive, Report 2010/447}, year = {2010}, url = {http://eprint.iacr.org/2010/447}, } @misc{cryptoeprint:2010:448, author = {Ronen Gradwohl and Noam Livne and Alon Rosen}, title = {Sequential Rationality in Cryptographic Protocols}, howpublished = {Cryptology ePrint Archive, Report 2010/448}, year = {2010}, url = {http://eprint.iacr.org/2010/448}, } @misc{cryptoeprint:2010:449, author = {Amir Herzberg and Haya Shulman}, title = {Secure Guaranteed Computation}, howpublished = {Cryptology ePrint Archive, Report 2010/449}, year = {2010}, url = {http://eprint.iacr.org/2010/449}, } @misc{cryptoeprint:2010:450, author = {Kaoru Kurosawa}, title = {Round-Efficient Perfectly Secure Message Transmission Scheme Against General Adversary}, howpublished = {Cryptology ePrint Archive, Report 2010/450}, year = {2010}, url = {http://eprint.iacr.org/2010/450}, } @misc{cryptoeprint:2010:451, author = {Subidh Ali and Debdeep Mukhopadhyay}, title = {Acceleration of Differential Fault Analysis of the Advanced Encryption Standard Using Single Fault}, howpublished = {Cryptology ePrint Archive, Report 2010/451}, year = {2010}, url = {http://eprint.iacr.org/2010/451}, } @misc{cryptoeprint:2010:452, author = {Feng Hao and Matthew Nicolas Kreeger}, title = {Every Vote Counts: Ensuring Integrity in Large-Scale DRE-based Electronic Voting}, howpublished = {Cryptology ePrint Archive, Report 2010/452}, year = {2010}, url = {http://eprint.iacr.org/2010/452}, } @misc{cryptoeprint:2010:453, author = {Dan Boneh and David Mandell Freeman}, title = {Homomorphic Signatures over Binary Fields: Secure Network Coding with Small Coefficients}, howpublished = {Cryptology ePrint Archive, Report 2010/453}, year = {2010}, url = {http://eprint.iacr.org/2010/453}, } @misc{cryptoeprint:2010:454, author = {Jesse Walker and Jiangtao Li}, title = {Key Exchange with Anonymous Authentication using DAA-SIGMA Protocol}, howpublished = {Cryptology ePrint Archive, Report 2010/454}, year = {2010}, url = {http://eprint.iacr.org/2010/454}, } @misc{cryptoeprint:2010:455, author = {Charalampos Papamanthou and Roberto Tamassia and Nikos Triandopoulos}, title = {Optimal Authentication of Operations on Dynamic Sets}, howpublished = {Cryptology ePrint Archive, Report 2010/455}, year = {2010}, url = {http://eprint.iacr.org/2010/455}, } @misc{cryptoeprint:2010:456, author = {Yevgeniy Dodis and Jonathan Katz and Leonid Reyzin and Adam Smith }, title = {Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets}, howpublished = {Cryptology ePrint Archive, Report 2010/456}, year = {2010}, url = {http://eprint.iacr.org/2010/456}, } @misc{cryptoeprint:2010:457, author = {Thomaz Oliveira and Julio López}, title = {Improving the performance of Luffa Hash Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2010/457}, year = {2010}, url = {http://eprint.iacr.org/2010/457}, } @misc{cryptoeprint:2010:458, author = {Masahiro Yagisawa }, title = {Key Agreement Protocols Using Multivariate Equations on Non-commutative Ring}, howpublished = {Cryptology ePrint Archive, Report 2010/458}, year = {2010}, url = {http://eprint.iacr.org/2010/458}, } @misc{cryptoeprint:2010:459, author = {S.Sharmila Deva Selvi and S.Sree Vivek and C.Pandu Rangan}, title = {CCA2 Secure Certificateless Encryption Schemes Based on RSA}, howpublished = {Cryptology ePrint Archive, Report 2010/459}, year = {2010}, url = {http://eprint.iacr.org/2010/459}, } @misc{cryptoeprint:2010:460, author = {Gaofei Wu and Yuqing Zhang and Weiguo Zhang}, title = {On extended algebraic immunity}, howpublished = {Cryptology ePrint Archive, Report 2010/460}, year = {2010}, url = {http://eprint.iacr.org/2010/460}, } @misc{cryptoeprint:2010:461, author = {S.Sharmila Deva Selvi and S.Sree Vivek and J.Shriram and C.Pandu Rangan}, title = {Efficient and Provably Secure Identity Based Aggregate Signature Schemes With Partial and Full Aggregation}, howpublished = {Cryptology ePrint Archive, Report 2010/461}, year = {2010}, url = {http://eprint.iacr.org/2010/461}, } @misc{cryptoeprint:2010:462, author = {Zhifang Zhang}, title = {Unconditionally Secure Rational Secret Sharing in Standard Communication Networks}, howpublished = {Cryptology ePrint Archive, Report 2010/462}, year = {2010}, url = {http://eprint.iacr.org/2010/462}, } @misc{cryptoeprint:2010:463, author = {Mohammad Reza Sohizadeh Abyaneh}, title = {Passive Cryptanalysis of Unconditionally Secure Authentication Protocol for RFID Systems}, howpublished = {Cryptology ePrint Archive, Report 2010/463}, year = {2010}, url = {http://eprint.iacr.org/2010/463}, } @misc{cryptoeprint:2010:464, author = {Q. Pu}, title = {Weaknesses of SIP Authentication Scheme for Converged VoIP Networks}, howpublished = {Cryptology ePrint Archive, Report 2010/464}, year = {2010}, url = {http://eprint.iacr.org/2010/464}, } @misc{cryptoeprint:2010:465, author = {Falko Strenzke}, title = {How to implement the public Key Operations in Code-based Cryptography on Memory-constrained Devices}, howpublished = {Cryptology ePrint Archive, Report 2010/465}, year = {2010}, url = {http://eprint.iacr.org/2010/465}, } @misc{cryptoeprint:2010:466, author = {Benwen Zhu and Bo Zhu and Kui Ren}, title = {PEKSrand: Providing Predicate Privacy in Public-key Encryption with Keyword Search}, howpublished = {Cryptology ePrint Archive, Report 2010/466}, year = {2010}, url = {http://eprint.iacr.org/2010/466}, } @misc{cryptoeprint:2010:467, author = {Xinfeng Lei, Rui Xue}, title = {Computational Soundness about Formal Encryption in Presence of Secret Shares and Key Cycles}, howpublished = {Cryptology ePrint Archive, Report 2010/467}, year = {2010}, url = {http://eprint.iacr.org/2010/467}, } @misc{cryptoeprint:2010:468, author = {Goichiro Hanaoka and Jian Weng}, title = {Generic Constructions of Parallel Key-Insulated Encryption: Stronger Security Model and Novel Schemes}, howpublished = {Cryptology ePrint Archive, Report 2010/468}, year = {2010}, url = {http://eprint.iacr.org/2010/468}, } @misc{cryptoeprint:2010:469, author = {Emiliano De Cristofaro and Jihye Kim and Gene Tsudik}, title = {Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model}, howpublished = {Cryptology ePrint Archive, Report 2010/469}, year = {2010}, url = {http://eprint.iacr.org/2010/469}, } @misc{cryptoeprint:2010:470, author = {Feli\'u Sagols and Guillermo Morales-Luna}, title = {Two identification protocols based on Cayley graphs of Coxeter groups}, howpublished = {Cryptology ePrint Archive, Report 2010/470}, year = {2010}, url = {http://eprint.iacr.org/2010/470}, } @misc{cryptoeprint:2010:471, author = {Emiliano De Cristofaro and Yanbin Lu and Gene Tsudik}, title = {Privacy-Preserving Sharing of Sensitive Information is (Really) Practical}, howpublished = {Cryptology ePrint Archive, Report 2010/471}, year = {2010}, url = {http://eprint.iacr.org/2010/471}, } @misc{cryptoeprint:2010:472, author = {A. Simone and B. Skoric}, title = {Accusation probabilities in Tardos codes: the Gaussian approximation is better than we thought}, howpublished = {Cryptology ePrint Archive, Report 2010/472}, year = {2010}, url = {http://eprint.iacr.org/2010/472}, } @misc{cryptoeprint:2010:473, author = {Hui Zhang, Chunxiang Xu and Abdur Rashid Sangi}, title = {Two Attacks on Dutta’s Dynamic Group Key Agreement Protocol}, howpublished = {Cryptology ePrint Archive, Report 2010/473}, year = {2010}, url = {http://eprint.iacr.org/2010/473}, } @misc{cryptoeprint:2010:474, author = {Sarah Meiklejohn and Hovav Shacham}, title = {Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures}, howpublished = {Cryptology ePrint Archive, Report 2010/474}, year = {2010}, url = {http://eprint.iacr.org/2010/474}, } @misc{cryptoeprint:2010:475, author = {Hong Wang and Kunpeng Wang and Lijun Zhang and Bao Li}, title = {Pairing Computation on Elliptic Curves of Jacobi Quartic Form}, howpublished = {Cryptology ePrint Archive, Report 2010/475}, year = {2010}, url = {http://eprint.iacr.org/2010/475}, } @misc{cryptoeprint:2010:476, author = {Carlo Blundo and Vincenzo Iovino and Giuseppe Persiano}, title = {Predicate Encryption with Partial Public Keys}, howpublished = {Cryptology ePrint Archive, Report 2010/476}, year = {2010}, url = {http://eprint.iacr.org/2010/476}, } @misc{cryptoeprint:2010:477, author = {Demijan Klinc and Carmit Hazay and Ashish Jagmohan and Hugo Krawczyk and Tal Rabin}, title = {On Compression of Data Encrypted with Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2010/477}, year = {2010}, url = {http://eprint.iacr.org/2010/477}, } @misc{cryptoeprint:2010:478, author = {Hassan Jameel Asghar and Shujun Li and Josef Pieprzyk and Huaxiong Wang}, title = {Cryptanalysis of the Convex Hull Click Human Identification Protocol}, howpublished = {Cryptology ePrint Archive, Report 2010/478}, year = {2010}, url = {http://eprint.iacr.org/2010/478}, } @misc{cryptoeprint:2010:479, author = {R.M. Avanzi and S. Hoerder and D. Page and M. Tunstall}, title = {Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2010/479}, year = {2010}, url = {http://eprint.iacr.org/2010/479}, } @misc{cryptoeprint:2010:480, author = {Shigeo Tsujii and Masahito Gotaishi}, title = {Enhanced STS using Check Equation --Extended Version of the Signature scheme proposed in the PQCrypt2010--}, howpublished = {Cryptology ePrint Archive, Report 2010/480}, year = {2010}, url = {http://eprint.iacr.org/2010/480}, } @misc{cryptoeprint:2010:481, author = {Nishant Doshi}, title = {A secure email login system using virtual password}, howpublished = {Cryptology ePrint Archive, Report 2010/481}, year = {2010}, url = {http://eprint.iacr.org/2010/481}, } @misc{cryptoeprint:2010:482, author = {He Ge}, title = {On Instantiation of the Random Oracle}, howpublished = {Cryptology ePrint Archive, Report 2010/482}, year = {2010}, url = {http://eprint.iacr.org/2010/482}, } @misc{cryptoeprint:2010:483, author = {Huijia Lin, Rafael Pass }, title = {Constant-round Non-Malleable Commitments from Any One-Way Function}, howpublished = {Cryptology ePrint Archive, Report 2010/483}, year = {2010}, url = {http://eprint.iacr.org/2010/483}, } @misc{cryptoeprint:2010:484, author = {Rosario Gennaro and Carmit Hazay and Jeffrey S. Sorensen}, title = {Automata Evaluation and Text Search Protocols with Simulation Based Security}, howpublished = {Cryptology ePrint Archive, Report 2010/484}, year = {2010}, url = {http://eprint.iacr.org/2010/484}, } @misc{cryptoeprint:2010:485, author = {Hamid Mala and Mohammad Dakhilalian and Mohsen Shakiba}, title = {Cryptanalysis of Block Ciphers Using Almost-Impossible Differentials}, howpublished = {Cryptology ePrint Archive, Report 2010/485}, year = {2010}, url = {http://eprint.iacr.org/2010/485}, } @misc{cryptoeprint:2010:486, author = {Claude Carlet and Sihem Mesnager}, title = {A NOTE ON SEMI-BENT BOOLEAN FUNCTIONS}, howpublished = {Cryptology ePrint Archive, Report 2010/486}, year = {2010}, url = {http://eprint.iacr.org/2010/486}, } @misc{cryptoeprint:2010:487, author = {Vipul Goyal}, title = {Constant Round Non-Malleable Protocols using One Way Functions}, howpublished = {Cryptology ePrint Archive, Report 2010/487}, year = {2010}, url = {http://eprint.iacr.org/2010/487}, } @misc{cryptoeprint:2010:488, author = {Elette Boyle and Gil Segev and Daniel Wichs}, title = {Fully Leakage-Resilient Signatures}, howpublished = {Cryptology ePrint Archive, Report 2010/488}, year = {2010}, url = {http://eprint.iacr.org/2010/488}, } @misc{cryptoeprint:2010:489, author = {Dengguo Feng and Xiutao Feng and Wentao Zhang and Xiubin Fan and Chuankun Wu}, title = {Loiss: A Byte-Oriented Stream Cipher}, howpublished = {Cryptology ePrint Archive, Report 2010/489}, year = {2010}, url = {http://eprint.iacr.org/2010/489}, } @misc{cryptoeprint:2010:490, author = {Zuhua Shao}, title = {Strong designated verifier signature scheme: new definition and construction}, howpublished = {Cryptology ePrint Archive, Report 2010/490}, year = {2010}, url = {http://eprint.iacr.org/2010/490}, } @misc{cryptoeprint:2010:491, author = {Yan Zhu and Zexing Hu and Huaixi Wang and Hongxin Hu and Gail-Joon Ahn}, title = {A Collaborative Framework for Privacy Protection in Online Social Networks}, howpublished = {Cryptology ePrint Archive, Report 2010/491}, year = {2010}, url = {http://eprint.iacr.org/2010/491}, } @misc{cryptoeprint:2010:492, author = {Angelo De caro and Vincenzo Iovino and Giuseppe Persiano}, title = {Efficient Fully Secure (Hierarchical) Predicate Encryption for Conjunctions, Disjunctions and k-CNF/DNF formulae}, howpublished = {Cryptology ePrint Archive, Report 2010/492}, year = {2010}, url = {http://eprint.iacr.org/2010/492}, } @misc{cryptoeprint:2010:493, author = {S.Sharmila Deva Selvi and S.Sree Vivek and C. Pandu Rangan}, title = {A Suite of Identity Based Aggregate Signatures and a Multi-Signature Scheme from RSA}, howpublished = {Cryptology ePrint Archive, Report 2010/493}, year = {2010}, url = {http://eprint.iacr.org/2010/493}, } @misc{cryptoeprint:2010:494, author = {Jianjie Zhao, Dawu Gu and M. Choudary Gorantla}, title = {Stronger Security Model of Group Key Agreement}, howpublished = {Cryptology ePrint Archive, Report 2010/494}, year = {2010}, url = {http://eprint.iacr.org/2010/494}, } @misc{cryptoeprint:2010:495, author = {Mahabir Prasad Jhanwar}, title = {A Practical (Non-interactive) Publicly Verifiable Secret Sharing Scheme}, howpublished = {Cryptology ePrint Archive, Report 2010/495}, year = {2010}, url = {http://eprint.iacr.org/2010/495}, } @misc{cryptoeprint:2010:496, author = {Jan Camenisch and Thomas Gro{\ss}}, title = {Efficient Attributes for Anonymous Credentials (Extended Version)}, howpublished = {Cryptology ePrint Archive, Report 2010/496}, year = {2010}, url = {http://eprint.iacr.org/2010/496}, } @misc{cryptoeprint:2010:497, author = {Tao Shi and Dongdai Lin}, title = {Number formula and degree level of ergodic polynomial functions over $\mathbb{Z}$/$2^{n}\mathbb{Z}$ and generalized result of linear equation on ergodic power-series T-Function}, howpublished = {Cryptology ePrint Archive, Report 2010/497}, year = {2010}, url = {http://eprint.iacr.org/2010/497}, } @misc{cryptoeprint:2010:498, author = {Vladislav Kovtun, Irina Sagir}, title = {Co-Z Divisor Addition Formulae in Jacobian of Genus 2 Hyperelliptic Curves over Prime Fields}, howpublished = {Cryptology ePrint Archive, Report 2010/498}, year = {2010}, url = {http://eprint.iacr.org/2010/498}, } @misc{cryptoeprint:2010:499, author = {M. Franz and B. Deiseroth and K. Hamacher and S. Jha and S. Katzenbeisser and H. Schroeder}, title = {Secure Computations on Non-Integer Values}, howpublished = {Cryptology ePrint Archive, Report 2010/499}, year = {2010}, url = {http://eprint.iacr.org/2010/499}, } @misc{cryptoeprint:2010:500, author = {Konstantinos Chalkias and Foteini Baldimtsi and Dimitrios Hristu-Varsakelis and George Stephanides}, title = {Attacks on the AKACP Protocol}, howpublished = {Cryptology ePrint Archive, Report 2010/500}, year = {2010}, url = {http://eprint.iacr.org/2010/500}, } @misc{cryptoeprint:2010:501, author = {Frederik Armknecht and Andreas Peter and Stefan Katzenbeisser}, title = {A Cleaner View on IND-CCA1 Secure Homomorphic Encryption using SOAP}, howpublished = {Cryptology ePrint Archive, Report 2010/501}, year = {2010}, url = {http://eprint.iacr.org/2010/501}, } @misc{cryptoeprint:2010:502, author = {Ralf Kuesters and Tomasz Truderung and Andreas Vogt}, title = {Proving Coercion-Resistance of Scantegrity II}, howpublished = {Cryptology ePrint Archive, Report 2010/502}, year = {2010}, url = {http://eprint.iacr.org/2010/502}, } @misc{cryptoeprint:2010:503, author = {Seung Geol Choi and Aggelos Kiayias and Tal Malkin}, title = {BiTR: Built-in Tamper Resilience}, howpublished = {Cryptology ePrint Archive, Report 2010/503}, year = {2010}, url = {http://eprint.iacr.org/2010/503}, } @misc{cryptoeprint:2010:504, author = {Charles Bouillaguet and Jean-Charles Faugère and Pierre-Alain Fouque and Ludovic Perret}, title = {Practical Cryptanalysis of the Identification Scheme Based on the Isomorphism of Polynomial with One Secret Problem}, howpublished = {Cryptology ePrint Archive, Report 2010/504}, year = {2010}, url = {http://eprint.iacr.org/2010/504}, } @misc{cryptoeprint:2010:505, author = {Dominique Unruh}, title = {Termination-Insensitive Computational Indistinguishability (and applications to computational soundness)}, howpublished = {Cryptology ePrint Archive, Report 2010/505}, year = {2010}, url = {http://eprint.iacr.org/2010/505}, } @misc{cryptoeprint:2010:506, author = {Gaëtan Leurent}, title = {Quantum Preimage and Collision Attacks on CubeHash }, howpublished = {Cryptology ePrint Archive, Report 2010/506}, year = {2010}, url = {http://eprint.iacr.org/2010/506}, } @misc{cryptoeprint:2010:507, author = {Lilya Budaghyan and Tor Helleseth}, title = {On isotopisms of commutative presemifields and CCZ-equivalence of functions}, howpublished = {Cryptology ePrint Archive, Report 2010/507}, year = {2010}, url = {http://eprint.iacr.org/2010/507}, } @misc{cryptoeprint:2010:508, author = {Jose Carrijo and Rafael Tonicelli and Anderson C. A. Nascimento}, title = {A Fault Analytic Method against HB+}, howpublished = {Cryptology ePrint Archive, Report 2010/508}, year = {2010}, url = {http://eprint.iacr.org/2010/508}, } @misc{cryptoeprint:2010:509, author = {Maria Dubovitskaya and Alessandra Scafuro and Ivan Visconti}, title = {On Efficient Non-Interactive Oblivious Transfer with Tamper-Proof Hardware}, howpublished = {Cryptology ePrint Archive, Report 2010/509}, year = {2010}, url = {http://eprint.iacr.org/2010/509}, } @misc{cryptoeprint:2010:511, author = {Koh-ichi Nagao}, title = {On the complexity of Decomposition Attack}, howpublished = {Cryptology ePrint Archive, Report 2010/511}, year = {2010}, url = {http://eprint.iacr.org/2010/511}, } @misc{cryptoeprint:2010:512, author = {Jung Hee Cheon and Stanislaw Jarecki and Jae Hong Seo}, title = {Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity}, howpublished = {Cryptology ePrint Archive, Report 2010/512}, year = {2010}, url = {http://eprint.iacr.org/2010/512}, } @misc{cryptoeprint:2010:513, author = {Benny Applebaum}, title = {Key-Dependent Message Security: Generic Amplification and Completeness}, howpublished = {Cryptology ePrint Archive, Report 2010/513}, year = {2010}, url = {http://eprint.iacr.org/2010/513}, } @misc{cryptoeprint:2010:514, author = {Rikke Bendlin and Ivan Damgård and Claudio Orlandi and Sarah Zakarias}, title = {Semi-Homomorphic Encryption and Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2010/514}, year = {2010}, url = {http://eprint.iacr.org/2010/514}, } @misc{cryptoeprint:2010:515, author = {}, title = {}, howpublished = {Cryptology ePrint Archive, Report 2010/515}, year = {2010}, url = {http://eprint.iacr.org/2010/515}, } @misc{cryptoeprint:2010:516, author = {Masahiro Yagisawa}, title = {Key Agreement Protocols Based on Multivariate Polynomials over Fq}, howpublished = {Cryptology ePrint Archive, Report 2010/516}, year = {2010}, url = {http://eprint.iacr.org/2010/516}, } @misc{cryptoeprint:2010:517, author = {Elias Yarrkov}, title = {Cryptanalysis of block EnRUPT}, howpublished = {Cryptology ePrint Archive, Report 2010/517}, year = {2010}, url = {http://eprint.iacr.org/2010/517}, } @misc{cryptoeprint:2010:518, author = {Ziran Tu and Yingpu Deng}, title = {Boolean functions with all main cryptographic properties}, howpublished = {Cryptology ePrint Archive, Report 2010/518}, year = {2010}, url = {http://eprint.iacr.org/2010/518}, } @misc{cryptoeprint:2010:519, author = {Matthias Krause and Frederik Armknecht and Ewan Fleischmann}, title = {Preimage Resistance Beyond the Birthday Bound: Double-Length Hashing Revisited}, howpublished = {Cryptology ePrint Archive, Report 2010/519}, year = {2010}, url = {http://eprint.iacr.org/2010/519}, } @misc{cryptoeprint:2010:520, author = {Craig Gentry and Shai Halevi}, title = {Implementing Gentry's Fully-Homomorphic Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2010/520}, year = {2010}, url = {http://eprint.iacr.org/2010/520}, } @misc{cryptoeprint:2010:521, author = {Xiutao Feng and Chunfang Zhou and Chuankun Wu}, title = {Linear Approximations of Addition Modulo $2^n$-1}, howpublished = {Cryptology ePrint Archive, Report 2010/521}, year = {2010}, url = {http://eprint.iacr.org/2010/521}, } @misc{cryptoeprint:2010:522, author = {Tal Malkin and Isamu Teranishiy and Yevgeniy Vahlis and Moti Yung}, title = {Signatures Resilient to Continual Leakage on Memory and Computation}, howpublished = {Cryptology ePrint Archive, Report 2010/522}, year = {2010}, url = {http://eprint.iacr.org/2010/522}, } @misc{cryptoeprint:2010:523, author = {Guillaume Fumaroli and Ange Martinelli and Emmanuel Prouff and Matthieu Rivain}, title = {Affine Masking against Higher-Order Side Channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2010/523}, year = {2010}, url = {http://eprint.iacr.org/2010/523}, } @misc{cryptoeprint:2010:524, author = {Michal Rjaško}, title = {Combining properties of cryptographic hash functions}, howpublished = {Cryptology ePrint Archive, Report 2010/524}, year = {2010}, url = {http://eprint.iacr.org/2010/524}, } @misc{cryptoeprint:2010:525, author = {Koray Karabina}, title = {Torus-based compression by factor 4 and 6}, howpublished = {Cryptology ePrint Archive, Report 2010/525}, year = {2010}, url = {http://eprint.iacr.org/2010/525}, } @misc{cryptoeprint:2010:526, author = {Diego F. Aranha and Koray Karabina and Patrick Longa and Catherine H. Gebotys and Julio López}, title = {Faster Explicit Formulas for Computing Pairings over Ordinary Curves}, howpublished = {Cryptology ePrint Archive, Report 2010/526}, year = {2010}, url = {http://eprint.iacr.org/2010/526}, } @misc{cryptoeprint:2010:527, author = {Danilo Gligoroski and Rune Steinsmo \O deg\aa rd and Rune Erlend Jensen and Ludovic Perret and Jean-Charles Faug\`{e}re and Svein Johan Knapskog and Smile Markovski}, title = {The Digital Signature Scheme MQQ-SIG}, howpublished = {Cryptology ePrint Archive, Report 2010/527}, year = {2010}, url = {http://eprint.iacr.org/2010/527}, } @misc{cryptoeprint:2010:528, author = {Jonathan Katz and Lior Malka}, title = {Private Function Evaluation with Linear Complexity}, howpublished = {Cryptology ePrint Archive, Report 2010/528}, year = {2010}, url = {http://eprint.iacr.org/2010/528}, } @misc{cryptoeprint:2010:529, author = {Kristin Lauter and Ning Shang}, title = {Generating Pairing-friendly Parameters for the CM Construction of Genus 2 Curves over Prime Fields}, howpublished = {Cryptology ePrint Archive, Report 2010/529}, year = {2010}, url = {http://eprint.iacr.org/2010/529}, } @misc{cryptoeprint:2010:530, author = {Vanessa Gratzer and David Naccache}, title = {How to Read a Signature?}, howpublished = {Cryptology ePrint Archive, Report 2010/530}, year = {2010}, url = {http://eprint.iacr.org/2010/530}, } @misc{cryptoeprint:2010:531, author = {Mourad Gouicem}, title = {Comparison of seven SHA-3 candidates software implementations on smart cards.}, howpublished = {Cryptology ePrint Archive, Report 2010/531}, year = {2010}, url = {http://eprint.iacr.org/2010/531}, } @misc{cryptoeprint:2010:532, author = {Andrey Bogdanov and Christian Rechberger}, title = {A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN}, howpublished = {Cryptology ePrint Archive, Report 2010/532}, year = {2010}, url = {http://eprint.iacr.org/2010/532}, } @misc{cryptoeprint:2010:533, author = {Adam O'Neill}, title = {Deterministic Public-Key Encryption Revisited}, howpublished = {Cryptology ePrint Archive, Report 2010/533}, year = {2010}, url = {http://eprint.iacr.org/2010/533}, } @misc{cryptoeprint:2010:534, author = {Xiangyong Zeng and Claude Carlet and Jinyong Shan and Lei Hu}, title = {Balanced Boolean Functions with Optimum Algebraic Immunity and High Nonlinearity}, howpublished = {Cryptology ePrint Archive, Report 2010/534}, year = {2010}, url = {http://eprint.iacr.org/2010/534}, } @misc{cryptoeprint:2010:535, author = {Tomer Ashur and Orr Dunkelman}, title = {Linear Analysis of Reduced-Round CubeHash}, howpublished = {Cryptology ePrint Archive, Report 2010/535}, year = {2010}, url = {http://eprint.iacr.org/2010/535}, } @misc{cryptoeprint:2010:536, author = {Xu Guo, Sinan Huang, Leyla Nazhandali and Patrick Schaumont}, title = {On The Impact of Target Technology in SHA-3 Hardware Benchmark Rankings}, howpublished = {Cryptology ePrint Archive, Report 2010/536}, year = {2010}, url = {http://eprint.iacr.org/2010/536}, } @misc{cryptoeprint:2010:537, author = {Yongzhuang Wei and Jiqiang Lu and Yupu Hu}, title = {Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits}, howpublished = {Cryptology ePrint Archive, Report 2010/537}, year = {2010}, url = {http://eprint.iacr.org/2010/537}, } @misc{cryptoeprint:2010:538, author = {Dmitry Khovratovich and Ivica Nikolic and Christian Rechberger}, title = {Rotational Rebound Attacks on Reduced Skein}, howpublished = {Cryptology ePrint Archive, Report 2010/538}, year = {2010}, url = {http://eprint.iacr.org/2010/538}, } @misc{cryptoeprint:2010:539, author = {Reza R. Farashahi and Pierre-Alain Fouque and Igor E. Shparlinski and Mehdi Tibouchi and J. Felipe Voloch}, title = {Indifferentiable Deterministic Hashing to Elliptic and Hyperelliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2010/539}, year = {2010}, url = {http://eprint.iacr.org/2010/539}, } @misc{cryptoeprint:2010:540, author = {Anna Lysyanskaya and Aaron Segal}, title = {Rational Secret Sharing with Side Information in Point-to-Point Networks via Time-Delayed Encryption}, howpublished = {Cryptology ePrint Archive, Report 2010/540}, year = {2010}, url = {http://eprint.iacr.org/2010/540}, } @misc{cryptoeprint:2010:541, author = {Stefan Dziembowski and Tomasz Kazana and Daniel Wichs}, title = {One-time Computable and Uncomputable Functions}, howpublished = {Cryptology ePrint Archive, Report 2010/541}, year = {2010}, url = {http://eprint.iacr.org/2010/541}, } @misc{cryptoeprint:2010:542, author = {Koray Karabina}, title = {Squaring in cyclotomic subgroups}, howpublished = {Cryptology ePrint Archive, Report 2010/542}, year = {2010}, url = {http://eprint.iacr.org/2010/542}, } @misc{cryptoeprint:2010:543, author = {Dan Boneh and Amit Sahai and Brent Waters}, title = {Functional Encryption: Definitions and Challenges}, howpublished = {Cryptology ePrint Archive, Report 2010/543}, year = {2010}, url = {http://eprint.iacr.org/2010/543}, } @misc{cryptoeprint:2010:544, author = {Benny Applebaum and Danny Harnik and Yuval Ishai}, title = {Semantic Security Under Related-Key Attacks and Applications}, howpublished = {Cryptology ePrint Archive, Report 2010/544}, year = {2010}, url = {http://eprint.iacr.org/2010/544}, } @misc{cryptoeprint:2010:545, author = {Feng Liu and Chuankun Wu}, title = {Optimal XOR based (2,n)-Visual Cryptography Schemes}, howpublished = {Cryptology ePrint Archive, Report 2010/545}, year = {2010}, url = {http://eprint.iacr.org/2010/545}, } @misc{cryptoeprint:2010:546, author = {Shaoquan Jiang}, title = {Timed Encryption and Its Application}, howpublished = {Cryptology ePrint Archive, Report 2010/546}, year = {2010}, url = {http://eprint.iacr.org/2010/546}, } @misc{cryptoeprint:2010:547, author = {Yacov Yacobi}, title = {Symmetric-key Searchable keyword Concealment (SSC)}, howpublished = {Cryptology ePrint Archive, Report 2010/547}, year = {2010}, url = {http://eprint.iacr.org/2010/547}, } @misc{cryptoeprint:2010:548, author = {Shay Gueron, Simon Johnson, Jesse Walker}, title = {SHA-512/256}, howpublished = {Cryptology ePrint Archive, Report 2010/548}, year = {2010}, url = {http://eprint.iacr.org/2010/548}, } @misc{cryptoeprint:2010:549, author = {Yalin Chen1, *Jue-Sam Chou2, Chi-Fong Lin3}, title = {A Novel Non-interactive Deniable Authentication Protocol with Designated Verifier on elliptic curve cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2010/549}, year = {2010}, url = {http://eprint.iacr.org/2010/549}, } @misc{cryptoeprint:2010:550, author = {RAZA ALI KAZMI}, title = {Isogenies and Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2010/550}, year = {2010}, url = {http://eprint.iacr.org/2010/550}, } @misc{cryptoeprint:2010:551, author = {Carmit Hazay and Yehuda Lindell}, title = {A Note on the Relation between the Definitions of Security for Semi-Honest and Malicious Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2010/551}, year = {2010}, url = {http://eprint.iacr.org/2010/551}, } @misc{cryptoeprint:2010:552, author = {Carmit Hazay and Yehuda Lindell}, title = {A Note on Zero-Knowledge Proofs of Knowledge and the ZKPOK Ideal Functionality}, howpublished = {Cryptology ePrint Archive, Report 2010/552}, year = {2010}, url = {http://eprint.iacr.org/2010/552}, } @misc{cryptoeprint:2010:553, author = {Yang Lu}, title = {Strongly Secure Certificate-Based Encryption Scheme with Low Communication Bandwidth}, howpublished = {Cryptology ePrint Archive, Report 2010/553}, year = {2010}, url = {http://eprint.iacr.org/2010/553}, } @misc{cryptoeprint:2010:554, author = {Stéphane Jacob}, title = {Cryptanalysis of a Fast Encryption Scheme for Databases and of its Variant}, howpublished = {Cryptology ePrint Archive, Report 2010/554}, year = {2010}, url = {http://eprint.iacr.org/2010/554}, } @misc{cryptoeprint:2010:555, author = {S. Duquesne}, title = {RNS arithmetic in ${\mathbb F}_{p^k}$ and application to fast pairing computation}, howpublished = {Cryptology ePrint Archive, Report 2010/555}, year = {2010}, url = {http://eprint.iacr.org/2010/555}, } @misc{cryptoeprint:2010:556, author = {Adam O'Neill}, title = {Definitional Issues in Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2010/556}, year = {2010}, url = {http://eprint.iacr.org/2010/556}, } @misc{cryptoeprint:2010:557, author = {Masahiro Yagisawa}, title = {A Digital Signature Based on Multivariate Polynomials over Fq }, howpublished = {Cryptology ePrint Archive, Report 2010/557}, year = {2010}, url = {http://eprint.iacr.org/2010/557}, } @misc{cryptoeprint:2010:558, author = {Jintai Ding}, title = {Solving LWE problem with bounded errors in polynomial time}, howpublished = {Cryptology ePrint Archive, Report 2010/558}, year = {2010}, url = {http://eprint.iacr.org/2010/558}, } @misc{cryptoeprint:2010:559, author = {Diego F. Aranha and Jean-Luc Beuchat and J\'er\'emie Detrey and Nicolas Estibals}, title = {Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2010/559}, year = {2010}, url = {http://eprint.iacr.org/2010/559}, } @misc{cryptoeprint:2010:560, author = {J. Loftus and A. May and N.P. Smart and F. Vercauteren}, title = {On CCA-Secure Fully Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2010/560}, year = {2010}, url = {http://eprint.iacr.org/2010/560}, } @misc{cryptoeprint:2010:561, author = {Stanislaw Jarecki and Ali Bagherzandi and Nitesh Saxena and Yanbin Lu}, title = {Password-Protected Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2010/561}, year = {2010}, url = {http://eprint.iacr.org/2010/561}, } @misc{cryptoeprint:2010:562, author = {Allison Lewko and Mark Lewko and Brent Waters}, title = {How to Leak on Key Updates}, howpublished = {Cryptology ePrint Archive, Report 2010/562}, year = {2010}, url = {http://eprint.iacr.org/2010/562}, } @misc{cryptoeprint:2010:563, author = {Tatsuaki Okamoto and Katsuyuki Takashima }, title = {Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption}, howpublished = {Cryptology ePrint Archive, Report 2010/563}, year = {2010}, url = {http://eprint.iacr.org/2010/563}, } @misc{cryptoeprint:2010:564, author = {Ali Doğanaksoy, Barış Ege, Onur Koçak and Fatih Sulak}, title = {Cryptographic Randomness Testing of Block Ciphers and Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2010/564}, year = {2010}, url = {http://eprint.iacr.org/2010/564}, } @misc{cryptoeprint:2010:565, author = {Joseph A. Akinyele and Christoph U. Lehmann and Matthew D. Green and Matthew W. Pagano and Zachary N. J. Peterson and Aviel D. Rubin}, title = {Self-Protecting Electronic Medical Records Using Attribute-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2010/565}, year = {2010}, url = {http://eprint.iacr.org/2010/565}, } @misc{cryptoeprint:2010:566, author = {Yusuke Naito}, title = {Blockcipher-based Double-length Hash Functions for Pseudorandom Oracles}, howpublished = {Cryptology ePrint Archive, Report 2010/566}, year = {2010}, url = {http://eprint.iacr.org/2010/566}, } @misc{cryptoeprint:2010:567, author = {CLAUDE CARLET AND SIHEM MESNAGER}, title = {ON DILLON'S CLASS H OF BENT FUNCTIONS, NIHO BENT FUNCTIONS AND O-POLYNOMIALS}, howpublished = {Cryptology ePrint Archive, Report 2010/567}, year = {2010}, url = {http://eprint.iacr.org/2010/567}, } @misc{cryptoeprint:2010:568, author = {E. Ghadafi and N.P. Smart}, title = {Efficient Two-Move Blind Signatures in the Common Reference String Model}, howpublished = {Cryptology ePrint Archive, Report 2010/568}, year = {2010}, url = {http://eprint.iacr.org/2010/568}, } @misc{cryptoeprint:2010:569, author = {Jérémy Jean and Pierre-Alain Fouque}, title = {Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function}, howpublished = {Cryptology ePrint Archive, Report 2010/569}, year = {2010}, url = {http://eprint.iacr.org/2010/569}, } @misc{cryptoeprint:2010:570, author = {Itai Dinur and Adi Shamir}, title = {Breaking Grain-128 with Dynamic Cube Attacks}, howpublished = {Cryptology ePrint Archive, Report 2010/570}, year = {2010}, url = {http://eprint.iacr.org/2010/570}, } @misc{cryptoeprint:2010:571, author = {Mohamed El Hadedy, Danilo Gligoroski and Svein J. Knapskog}, title = {Single Core Implementation of Blue Midnight Wish Hash Function on VIRTEX 5 Platform}, howpublished = {Cryptology ePrint Archive, Report 2010/571}, year = {2010}, url = {http://eprint.iacr.org/2010/571}, } @misc{cryptoeprint:2010:572, author = {Jean-Philippe Aumasson}, title = {Cryptanalysis of splay tree based encryption}, howpublished = {Cryptology ePrint Archive, Report 2010/572}, year = {2010}, url = {http://eprint.iacr.org/2010/572}, } @misc{cryptoeprint:2010:573, author = {Yongqiang Li and Mingsheng Wang}, title = {On permutation polynomials EA-equivalent to the inverse function over $GF(2^n)$}, howpublished = {Cryptology ePrint Archive, Report 2010/573}, year = {2010}, url = {http://eprint.iacr.org/2010/573}, } @misc{cryptoeprint:2010:574, author = {Julia Borghoff and Lars R. Knudsen and Gregor Leander and Soeren S. Thomsen}, title = {Cryptanalysis of PRESENT-like ciphers with secret S-boxes}, howpublished = {Cryptology ePrint Archive, Report 2010/574}, year = {2010}, url = {http://eprint.iacr.org/2010/574}, } @misc{cryptoeprint:2010:575, author = {Otto Johnston}, title = {A Discrete Logarithm Attack on Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2010/575}, year = {2010}, url = {http://eprint.iacr.org/2010/575}, } @misc{cryptoeprint:2010:576, author = {Joppe W. Bos and Onur Özen}, title = {Multi-Block Length Hashing using the AES Instruction Set}, howpublished = {Cryptology ePrint Archive, Report 2010/576}, year = {2010}, url = {http://eprint.iacr.org/2010/576}, } @misc{cryptoeprint:2010:577, author = {Neal Koblitz and Alfred Menezes and Igor Shparlinski}, title = {Discrete Logarithms, Diffie-Hellman, and Reductions}, howpublished = {Cryptology ePrint Archive, Report 2010/577}, year = {2010}, url = {http://eprint.iacr.org/2010/577}, } @misc{cryptoeprint:2010:578, author = {Axel Schroepfer and Florian Kerschbaum and Guenter Mueller}, title = {L1 - A Programming Language for Mixed-Protocol Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2010/578}, year = {2010}, url = {http://eprint.iacr.org/2010/578}, } @misc{cryptoeprint:2010:579, author = {WeiGuo Zhang and GuoZhen Xiao}, title = {Construction of Highly Nonlinear Resilient Boolean Functions Satisfying Strict Avalanche Criterion}, howpublished = {Cryptology ePrint Archive, Report 2010/579}, year = {2010}, url = {http://eprint.iacr.org/2010/579}, } @misc{cryptoeprint:2010:580, author = {Piotr Mroczkowski and Janusz Szmidt}, title = {The Cube Attack on Stream Cipher Trivium and Quadraticity Tests}, howpublished = {Cryptology ePrint Archive, Report 2010/580}, year = {2010}, url = {http://eprint.iacr.org/2010/580}, } @misc{cryptoeprint:2010:581, author = {Jintai Ding}, title = {Fast Algorithm to solve a family of SIS problem with $l_\infty$ norm}, howpublished = {Cryptology ePrint Archive, Report 2010/581}, year = {2010}, url = {http://eprint.iacr.org/2010/581}, } @misc{cryptoeprint:2010:582, author = {Alexandre Berzati and C\'ecile Canovas-Dumas and Louis Goubin}, title = {Secret Key Leakage from Public Key Perturbation of DLP-based Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2010/582}, year = {2010}, url = {http://eprint.iacr.org/2010/582}, } @misc{cryptoeprint:2010:583, author = {Jinmin Zhong and Xuejia Lai}, title = {Improved Preimage Attack on One-block MD4}, howpublished = {Cryptology ePrint Archive, Report 2010/583}, year = {2010}, url = {http://eprint.iacr.org/2010/583}, } @misc{cryptoeprint:2010:584, author = {Lior Malka and Jonathan Katz}, title = {VMCrypt - Modular Software Architecture for Scalable Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2010/584}, year = {2010}, url = {http://eprint.iacr.org/2010/584}, } @misc{cryptoeprint:2010:585, author = {Daniel J. Bernstein and Tanja Lange and Christiane Peters}, title = {Smaller decoding exponents: ball-collision decoding}, howpublished = {Cryptology ePrint Archive, Report 2010/585}, year = {2010}, url = {http://eprint.iacr.org/2010/585}, } @misc{cryptoeprint:2010:586, author = {İsmail San and Nuray At}, title = {Enhanced FPGA Implementation of the Hummingbird Cryptographic Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2010/586}, year = {2010}, url = {http://eprint.iacr.org/2010/586}, } @misc{cryptoeprint:2010:587, author = {Bartosz Przydatek and Douglas Wikstr{\"o}m}, title = {Group Message Authentication}, howpublished = {Cryptology ePrint Archive, Report 2010/587}, year = {2010}, url = {http://eprint.iacr.org/2010/587}, } @misc{cryptoeprint:2010:588, author = {Martin Schläffer}, title = {Improved Collisions for Reduced ECHO-256}, howpublished = {Cryptology ePrint Archive, Report 2010/588}, year = {2010}, url = {http://eprint.iacr.org/2010/588}, } @misc{cryptoeprint:2010:589, author = {Christina Boura and Anne Canteaut and Christophe De Canni\`ere}, title = {Higher-order differential properties of Keccak and Luffa}, howpublished = {Cryptology ePrint Archive, Report 2010/589}, year = {2010}, url = {http://eprint.iacr.org/2010/589}, } @misc{cryptoeprint:2010:590, author = {Andrey Bogdanov and Ilya Kizhvatov}, title = {Beyond the Limits of DPA: Combined Side-Channel Collision Attacks}, howpublished = {Cryptology ePrint Archive, Report 2010/590}, year = {2010}, url = {http://eprint.iacr.org/2010/590}, } @misc{cryptoeprint:2010:591, author = {David Cash and Dennis Hofheinz and Eike Kiltz and Chris Peikert}, title = {Bonsai Trees, or How to Delegate a Lattice Basis}, howpublished = {Cryptology ePrint Archive, Report 2010/591}, year = {2010}, url = {http://eprint.iacr.org/2010/591}, } @misc{cryptoeprint:2010:592, author = {Richard Lindner and Chris Peikert}, title = {Better Key Sizes (and Attacks) for LWE-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2010/592}, year = {2010}, url = {http://eprint.iacr.org/2010/592}, } @misc{cryptoeprint:2010:593, author = {Jiqiang Lu}, title = {Differential Attack on Five Rounds of the SC2000 Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2010/593}, year = {2010}, url = {http://eprint.iacr.org/2010/593}, } @misc{cryptoeprint:2010:594, author = {Endre Bangerter and David Gullasch and Stephan Krenn}, title = {Cache Games - Bringing Access Based Cache Attacks on AES to Practice}, howpublished = {Cryptology ePrint Archive, Report 2010/594}, year = {2010}, url = {http://eprint.iacr.org/2010/594}, } @misc{cryptoeprint:2010:595, author = {Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek}, title = {Attribute-Based Signatures}, howpublished = {Cryptology ePrint Archive, Report 2010/595}, year = {2010}, url = {http://eprint.iacr.org/2010/595}, } @misc{cryptoeprint:2010:596, author = {Enrico Thomae and Christopher Wolf}, title = {Unravel XL and its variants}, howpublished = {Cryptology ePrint Archive, Report 2010/596}, year = {2010}, url = {http://eprint.iacr.org/2010/596}, } @misc{cryptoeprint:2010:597, author = {Sugata Gangopadhyay and Ankita Chaturvedi}, title = {A New Class of Bent--Negabent Boolean Functions}, howpublished = {Cryptology ePrint Archive, Report 2010/597}, year = {2010}, url = {http://eprint.iacr.org/2010/597}, } @misc{cryptoeprint:2010:598, author = {Yanbin Pan, Yingpu Deng}, title = {A Broadcast Attack against NTRU Using Ding's Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2010/598}, year = {2010}, url = {http://eprint.iacr.org/2010/598}, } @misc{cryptoeprint:2010:599, author = {Amos Beimel, Eran Omri, and Ilan Orlov}, title = {Secure Multiparty Computation with Partial Fairness}, howpublished = {Cryptology ePrint Archive, Report 2010/599}, year = {2010}, url = {http://eprint.iacr.org/2010/599}, } @misc{cryptoeprint:2010:600, author = {Anne Broadbent and Stacey Jeffery and Alain Tapp}, title = {Exact, Efficient and Information-Theoretically Secure Voting with an Arbitrary Number of Cheaters}, howpublished = {Cryptology ePrint Archive, Report 2010/600}, year = {2010}, url = {http://eprint.iacr.org/2010/600}, } @misc{cryptoeprint:2010:601, author = {Lei Li and Siman Yang}, title = {Fast Endomorphism for any Genus 2 Hyperelliptic Curve over a Finite Field of Even Characteristic}, howpublished = {Cryptology ePrint Archive, Report 2010/601}, year = {2010}, url = {http://eprint.iacr.org/2010/601}, } @misc{cryptoeprint:2010:602, author = {Itai Dinur and Adi Shamir}, title = {An Improved Algebraic Attack on Hamsi-256}, howpublished = {Cryptology ePrint Archive, Report 2010/602}, year = {2010}, url = {http://eprint.iacr.org/2010/602}, } @misc{cryptoeprint:2010:603, author = {Santanu Sarkar and Subhamoy Maitra}, title = {Cryptanalysis of Dual CRT-RSA}, howpublished = {Cryptology ePrint Archive, Report 2010/603}, year = {2010}, url = {http://eprint.iacr.org/2010/603}, } @misc{cryptoeprint:2010:604, author = {Shangwei Zhao,Ruyong Feng and Xiao-Shan Gao}, title = {On Functional Decomposition of Multivariate Polynomials with Differentiation and Homogenization}, howpublished = {Cryptology ePrint Archive, Report 2010/604}, year = {2010}, url = {http://eprint.iacr.org/2010/604}, } @misc{cryptoeprint:2010:605, author = {Tzipora Halevi and Nitesh Saxena}, title = {Keyboard Acoustic Emanations: An Evaluation of Strong Passwords and Typing Styles}, howpublished = {Cryptology ePrint Archive, Report 2010/605}, year = {2010}, url = {http://eprint.iacr.org/2010/605}, } @misc{cryptoeprint:2010:606, author = {He Debiao,Chen Jianhua, Hu Jin}, title = {Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices}, howpublished = {Cryptology ePrint Archive, Report 2010/606}, year = {2010}, url = {http://eprint.iacr.org/2010/606}, } @misc{cryptoeprint:2010:607, author = {María Naya-Plasencia}, title = {Scrutinizing rebound attacks: new algorithms for improving the complexities}, howpublished = {Cryptology ePrint Archive, Report 2010/607}, year = {2010}, url = {http://eprint.iacr.org/2010/607}, } @misc{cryptoeprint:2010:608, author = {Hongfeng Wu, Chunming Tang and Rongquan Feng}, title = {A New Model of Binary Elliptic Curves with Fast Arithmetic}, howpublished = {Cryptology ePrint Archive, Report 2010/608}, year = {2010}, url = {http://eprint.iacr.org/2010/608}, } @misc{cryptoeprint:2010:609, author = {Ashish Choudhury and Kaoru Kurosawa and Arpita Patra}, title = {The Round Complexity of General VSS}, howpublished = {Cryptology ePrint Archive, Report 2010/609}, year = {2010}, url = {http://eprint.iacr.org/2010/609}, } @misc{cryptoeprint:2010:610, author = {Craig Gentry and Daniel Wichs}, title = {Separating Succinct Non-Interactive Arguments From All Falsifiable Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2010/610}, year = {2010}, url = {http://eprint.iacr.org/2010/610}, } @misc{cryptoeprint:2010:611, author = {Ali Doğanaksoy, Barış Ege, Onur Koçak and Fatih Sulak}, title = {Statistical Analysis of Reduced Round Compression Functions of SHA-3 Second Round Candidates}, howpublished = {Cryptology ePrint Archive, Report 2010/611}, year = {2010}, url = {http://eprint.iacr.org/2010/611}, } @misc{cryptoeprint:2010:612, author = {Markku-Juhani O. Saarinen}, title = {Cryptanalysis of Hummingbird-1}, howpublished = {Cryptology ePrint Archive, Report 2010/612}, year = {2010}, url = {http://eprint.iacr.org/2010/612}, } @misc{cryptoeprint:2010:613, author = {Richard Lindner and Chris Peikert}, title = {Better Key Sizes (and Attacks) for LWE-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2010/613}, year = {2010}, url = {http://eprint.iacr.org/2010/613}, } @misc{cryptoeprint:2010:614, author = {Simon Hoerder and Marcin Wojcik and Stefan Tillich and Dan Page}, title = {An Evaluation of Hash Functions on a Power Analysis Resistant Processor Architecture}, howpublished = {Cryptology ePrint Archive, Report 2010/614}, year = {2010}, url = {http://eprint.iacr.org/2010/614}, } @misc{cryptoeprint:2010:615, author = {Steven D. Galbraith and Raminder S. Ruprai}, title = {Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval}, howpublished = {Cryptology ePrint Archive, Report 2010/615}, year = {2010}, url = {http://eprint.iacr.org/2010/615}, } @misc{cryptoeprint:2010:616, author = {Steven D. Galbraith and Mark Holmes}, title = {A non-uniform birthday problem with applications to discrete logarithms}, howpublished = {Cryptology ePrint Archive, Report 2010/616}, year = {2010}, url = {http://eprint.iacr.org/2010/616}, } @misc{cryptoeprint:2010:617, author = {Steven D. Galbraith and John M. Pollard and Raminder S. Ruprai}, title = {Computing Discrete Logarithms in an Interval}, howpublished = {Cryptology ePrint Archive, Report 2010/617}, year = {2010}, url = {http://eprint.iacr.org/2010/617}, } @misc{cryptoeprint:2010:618, author = {Thomas Fuhr and Henri Gilbert and Jean-Ren{\'e} Reinhard and Marion Videau}, title = {A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3}, howpublished = {Cryptology ePrint Archive, Report 2010/618}, year = {2010}, url = {http://eprint.iacr.org/2010/618}, } @misc{cryptoeprint:2010:619, author = {Yang Lu}, title = {Further Observations on Certificate-Base Encryption and its Generic Construction from Certificateless Public Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2010/619}, year = {2010}, url = {http://eprint.iacr.org/2010/619}, } @misc{cryptoeprint:2010:620, author = {He Debiao, Chen Jianhua, Hu Jin}, title = {Identity-based Digital Signature Scheme Without Bilinear Pairings}, howpublished = {Cryptology ePrint Archive, Report 2010/620}, year = {2010}, url = {http://eprint.iacr.org/2010/620}, } @misc{cryptoeprint:2010:621, author = {Tibor Jager and Florian Kohlar and Sven Schäge and Jörg Schwenk}, title = {Generic Compilers for Authenticated Key Exchange (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2010/621}, year = {2010}, url = {http://eprint.iacr.org/2010/621}, } @misc{cryptoeprint:2010:622, author = {Qunxiong Zheng and Wenfeng Qi}, title = {A new result on the distinctness of primitive sequences over Z(pq) modulo 2}, howpublished = {Cryptology ePrint Archive, Report 2010/622}, year = {2010}, url = {http://eprint.iacr.org/2010/622}, } @misc{cryptoeprint:2010:623, author = {Daniel J. Bernstein and Tanja Lange}, title = {Cryptanalysis of Skein}, howpublished = {Cryptology ePrint Archive, Report 2010/623}, year = {2010}, url = {http://eprint.iacr.org/2010/623}, } @misc{cryptoeprint:2010:624, author = {Dima Grigoriev and Vladimir Shpilrain}, title = {No-leak authentication by the Sherlock Holmes method}, howpublished = {Cryptology ePrint Archive, Report 2010/624}, year = {2010}, url = {http://eprint.iacr.org/2010/624}, } @misc{cryptoeprint:2010:625, author = {Ben Smyth and Veronique Cortier}, title = {Does Helios ensure ballot secrecy?}, howpublished = {Cryptology ePrint Archive, Report 2010/625}, year = {2010}, url = {http://eprint.iacr.org/2010/625}, } @misc{cryptoeprint:2010:626, author = {Peng Xu and Hai Jin}, title = {Public-Key Encryption with Fuzzy Keyword Search withstanding Keyword Guessing Attacks}, howpublished = {Cryptology ePrint Archive, Report 2010/626}, year = {2010}, url = {http://eprint.iacr.org/2010/626}, } @misc{cryptoeprint:2010:627, author = {Marina Blanton and Paolo Gasti}, title = {Secure and Efficient Protocols for Iris and Fingerprint Identification}, howpublished = {Cryptology ePrint Archive, Report 2010/627}, year = {2010}, url = {http://eprint.iacr.org/2010/627}, } @misc{cryptoeprint:2010:628, author = {Sui-Guan Teo and Kenneth Koon-Ho Wong and Leonie Simpson and Ed Dawson}, title = {State convergence and keyspace reduction of the Mixer stream cipher}, howpublished = {Cryptology ePrint Archive, Report 2010/628}, year = {2010}, url = {http://eprint.iacr.org/2010/628}, } @misc{cryptoeprint:2010:629, author = {Donghoon Chang and Mridul Nandi and Moti Yung}, title = {On the Security of Hash Functions Employing Blockcipher Postprocessing}, howpublished = {Cryptology ePrint Archive, Report 2010/629}, year = {2010}, url = {http://eprint.iacr.org/2010/629}, } @misc{cryptoeprint:2010:630, author = {Dustin Moody}, title = {Divison Polynomials for Alternate Models of Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2010/630}, year = {2010}, url = {http://eprint.iacr.org/2010/630}, } @misc{cryptoeprint:2010:631, author = {Michal Rjaško}, title = {Black-box property of Cryptographic Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2010/631}, year = {2010}, url = {http://eprint.iacr.org/2010/631}, } @misc{cryptoeprint:2010:632, author = {He Debiao, Chen Jianhua, Zhang Rui}, title = {Efficient and provably-secure certificateless signature scheme without bilinear pairings}, howpublished = {Cryptology ePrint Archive, Report 2010/632}, year = {2010}, url = {http://eprint.iacr.org/2010/632}, } @misc{cryptoeprint:2010:633, author = {Charles Bouillaguet and Patrick Derbez and Orr Dunkelman and Nathan Keller and Vincent Rijmen and Pierre-Alain Fouque}, title = {Low Data Complexity Attacks on AES}, howpublished = {Cryptology ePrint Archive, Report 2010/633}, year = {2010}, url = {http://eprint.iacr.org/2010/633}, } @misc{cryptoeprint:2010:634, author = {Kaoutar Elkhiyaoui and Erik-Oliver Blass and Refik Molva}, title = {ROTIV: RFID Ownership Transfer with Issuer Verification}, howpublished = {Cryptology ePrint Archive, Report 2010/634}, year = {2010}, url = {http://eprint.iacr.org/2010/634}, } @misc{cryptoeprint:2010:635, author = {Zhang Yun and Christophe Tartary}, title = {An Efficient and Information Theoretically Secure Rational Secret Sharing Scheme based on Symmetric Bivariate Polynomials}, howpublished = {Cryptology ePrint Archive, Report 2010/635}, year = {2010}, url = {http://eprint.iacr.org/2010/635}, } @misc{cryptoeprint:2010:636, author = {Subidh Ali and Debdeep Mukhopadhyay and Michael Tunstall}, title = {Differential Fault Analysis of AES using a Single Multiple-Byte Fault}, howpublished = {Cryptology ePrint Archive, Report 2010/636}, year = {2010}, url = {http://eprint.iacr.org/2010/636}, } @misc{cryptoeprint:2010:637, author = {Martin R. Albrecht and Kenneth G. Paterson}, title = {Breaking An Identity-Based Encryption Scheme based on DHIES}, howpublished = {Cryptology ePrint Archive, Report 2010/637}, year = {2010}, url = {http://eprint.iacr.org/2010/637}, } @misc{cryptoeprint:2010:638, author = {Shai Halevi and Hugo Krawczyk}, title = {One-Pass HMQV and Asymmetric Key-Wrapping}, howpublished = {Cryptology ePrint Archive, Report 2010/638}, year = {2010}, url = {http://eprint.iacr.org/2010/638}, } @misc{cryptoeprint:2010:639, author = {Guang-Pu Go, Xi-Yong Zhang, and Wen-Fen Liu}, title = {Enumerating Results of Homogeneous Rotation over $GF(p)$}, howpublished = {Cryptology ePrint Archive, Report 2010/639}, year = {2010}, url = {http://eprint.iacr.org/2010/639}, } @misc{cryptoeprint:2010:640, author = {Koji Nuida}, title = {Short collusion-secure fingerprint codes against three pirates}, howpublished = {Cryptology ePrint Archive, Report 2010/640}, year = {2010}, url = {http://eprint.iacr.org/2010/640}, } @misc{cryptoeprint:2010:641, author = {Shuhong Gao and Frank Volny IV and Mingsheng Wang}, title = {A new algorithm for computing Groebner bases}, howpublished = {Cryptology ePrint Archive, Report 2010/641}, year = {2010}, url = {http://eprint.iacr.org/2010/641}, } @misc{cryptoeprint:2010:642, author = {Yiyuan Luo, Xuejia Lai}, title = {More Insights on Blockcipher-Based Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2010/642}, year = {2010}, url = {http://eprint.iacr.org/2010/642}, } @misc{cryptoeprint:2010:643, author = {Tao Xie and Dengguo Feng}, title = {Construct MD5 Collisions Using Just A Single Block Of Message}, howpublished = {Cryptology ePrint Archive, Report 2010/643}, year = {2010}, url = {http://eprint.iacr.org/2010/643}, } @misc{cryptoeprint:2010:644, author = {Bo Zhu and Wenye Yu and Tao Wang}, title = {A Practical Platform for Cube-Attack-like Cryptanalyses}, howpublished = {Cryptology ePrint Archive, Report 2010/644}, year = {2010}, url = {http://eprint.iacr.org/2010/644}, } @misc{cryptoeprint:2010:645, author = {Xinfeng Lei and Rui Xue and Ting Yu}, title = {A Timed Logic for Modeling and Reasoning about Security Protocols}, howpublished = {Cryptology ePrint Archive, Report 2010/645}, year = {2010}, url = {http://eprint.iacr.org/2010/645}, } @misc{cryptoeprint:2010:646, author = {Emmanuel Prouff and Matthieu Rivain and Régis Bévan}, title = {Statistical Analysis of Second Order Differential Power Analysis}, howpublished = {Cryptology ePrint Archive, Report 2010/646}, year = {2010}, url = {http://eprint.iacr.org/2010/646}, } @misc{cryptoeprint:2010:647, author = {Xiaoyun Wang and Mingjie Liu and Chengliang Tian and Jingguo Bi}, title = {Improved Nguyen-Vidick Heuristic Sieve Algorithm for Shortest Vector Problem}, howpublished = {Cryptology ePrint Archive, Report 2010/647}, year = {2010}, url = {http://eprint.iacr.org/2010/647}, } @misc{cryptoeprint:2010:648, author = {Dario Fiore and Dominique Schröder}, title = {Uniqueness is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations}, howpublished = {Cryptology ePrint Archive, Report 2010/648}, year = {2010}, url = {http://eprint.iacr.org/2010/648}, } @misc{cryptoeprint:2010:649, author = {Douglas Stebila and Lakshmi Kuppusamy and Jothi Rangasamy and Colin Boyd and Juan Gonzalez Nieto}, title = {Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols}, howpublished = {Cryptology ePrint Archive, Report 2010/649}, year = {2010}, url = {http://eprint.iacr.org/2010/649}, } @misc{cryptoeprint:2010:650, author = {Jean-Sebastien Coron and Antoine Joux and Avradip Mandal and David Naccache and Mehdi Tibouchi}, title = {Cryptanalysis of the RSA Subgroup Assumption from TCC 2005}, howpublished = {Cryptology ePrint Archive, Report 2010/650}, year = {2010}, url = {http://eprint.iacr.org/2010/650}, } @misc{cryptoeprint:2010:651, author = {Rishiraj Bhattacharyya and Avradip Mandal}, title = {On the Impossibility of Instantiating PSS in the Standard Model }, howpublished = {Cryptology ePrint Archive, Report 2010/651}, year = {2010}, url = {http://eprint.iacr.org/2010/651}, } @misc{cryptoeprint:2010:652, author = {Xigen Yao}, title = {Active Domain Expansion for Normal Narrow-pipe Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2010/652}, year = {2010}, url = {http://eprint.iacr.org/2010/652}, } @misc{cryptoeprint:2010:653, author = {M.A.Popov}, title = {Cubic groups}, howpublished = {Cryptology ePrint Archive, Report 2010/653}, year = {2010}, url = {http://eprint.iacr.org/2010/653}, } @misc{cryptoeprint:2010:654, author = {Daniel Kraschewski and Jörn Müller-Quade}, title = {Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions (full version)}, howpublished = {Cryptology ePrint Archive, Report 2010/654}, year = {2010}, url = {http://eprint.iacr.org/2010/654}, } @misc{cryptoeprint:2010:655, author = {İsa Sertkaya and Ali Doğanaksoy}, title = {On the Affine Equivalence and Nonlinearity Preserving Bijective Mappings}, howpublished = {Cryptology ePrint Archive, Report 2010/655}, year = {2010}, url = {http://eprint.iacr.org/2010/655}, } @misc{cryptoeprint:2010:656, author = {Yehuda Lindell}, title = {Constant-Round Zero-Knowledge Proofs of Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2010/656}, year = {2010}, url = {http://eprint.iacr.org/2010/656}, } @misc{cryptoeprint:2010:657, author = {Yasufumi Hashimoto}, title = {On small secret key attack against RSA with high bits known prime factor}, howpublished = {Cryptology ePrint Archive, Report 2010/657}, year = {2010}, url = {http://eprint.iacr.org/2010/657}, } @misc{cryptoeprint:2010:658, author = {Uri Avraham and Eli Biham and Orr Dunkelman}, title = {ABC - A New Framework for Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2010/658}, year = {2010}, url = {http://eprint.iacr.org/2010/658}, } @misc{cryptoeprint:2010:659, author = {Mark Manulis and Bertram Poettering}, title = {Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation}, howpublished = {Cryptology ePrint Archive, Report 2010/659}, year = {2010}, url = {http://eprint.iacr.org/2010/659}, } @misc{cryptoeprint:2010:660, author = {Brian J. Matt}, title = {Identification of Multiple Invalid Pairing-based Signatures in Constrained Batches}, howpublished = {Cryptology ePrint Archive, Report 2010/660}, year = {2010}, url = {http://eprint.iacr.org/2010/660}, } @misc{cryptoeprint:2010:661, author = {Ruilin Li and Bing Sun and Chao Li}, title = {From Camellia to p-Camellia: Some Observations on MISTY Structure with SPN Round Function}, howpublished = {Cryptology ePrint Archive, Report 2010/661}, year = {2010}, url = {http://eprint.iacr.org/2010/661}, } @misc{cryptoeprint:2011:001, author = {Zeng Bing and Tang Xueming and Xu Peng and Jing Jiandu}, title = {Practical Frameworks For $h$-Out-Of-$n$ Oblivious Transfer With Security Against Covert and Malicious Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2011/001}, year = {2011}, url = {http://eprint.iacr.org/2011/001}, } @misc{cryptoeprint:2011:002, author = {Gunnar Kreitz}, title = {A Zero-One Law for Secure Multi-Party Computation with Ternary Outputs (full version)}, howpublished = {Cryptology ePrint Archive, Report 2011/002}, year = {2011}, url = {http://eprint.iacr.org/2011/002}, } @misc{cryptoeprint:2011:003, author = {Daniel J. Bernstein and Tanja Lange and Peter Schwabe}, title = {On the correct use of the negation map in the Pollard rho method}, howpublished = {Cryptology ePrint Archive, Report 2011/003}, year = {2011}, url = {http://eprint.iacr.org/2011/003}, } @misc{cryptoeprint:2011:004, author = {Gaetan Bisson and Andrew V. Sutherland}, title = {A low-memory algorithm for finding short product representations in finite groups}, howpublished = {Cryptology ePrint Archive, Report 2011/004}, year = {2011}, url = {http://eprint.iacr.org/2011/004}, } @misc{cryptoeprint:2011:005, author = {David Xiao}, title = {Is privacy compatible with truthfulness?}, howpublished = {Cryptology ePrint Archive, Report 2011/005}, year = {2011}, url = {http://eprint.iacr.org/2011/005}, } @misc{cryptoeprint:2011:006, author = {Hemanta K. Maji and Pichayoot Ouppaphan and Manoj Prabhakaran and Mike Rosulek}, title = {Exploring the Limits of Common Coins Using Frontier Analysis of Protocols}, howpublished = {Cryptology ePrint Archive, Report 2011/006}, year = {2011}, url = {http://eprint.iacr.org/2011/006}, } @misc{cryptoeprint:2011:007, author = {Greg Rose}, title = {KISS: A Bit Too Simple}, howpublished = {Cryptology ePrint Archive, Report 2011/007}, year = {2011}, url = {http://eprint.iacr.org/2011/007}, } @misc{cryptoeprint:2011:008, author = {Ping Wang and Fangguo Zhang}, title = {Computing Elliptic Curve Discrete Logarithms with the Negation Map}, howpublished = {Cryptology ePrint Archive, Report 2011/008}, year = {2011}, url = {http://eprint.iacr.org/2011/008}, } @misc{cryptoeprint:2011:009, author = {Helger Lipmaa}, title = {Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments}, howpublished = {Cryptology ePrint Archive, Report 2011/009}, year = {2011}, url = {http://eprint.iacr.org/2011/009}, } @misc{cryptoeprint:2011:010, author = {Melissa Chase and Seny Kamara}, title = {Structured Encryption and Controlled Disclosure}, howpublished = {Cryptology ePrint Archive, Report 2011/010}, year = {2011}, url = {http://eprint.iacr.org/2011/010}, } @misc{cryptoeprint:2011:011, author = {Shai Halevi and Huijia Lin }, title = {After-the-Fact Leakage in Public-Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2011/011}, year = {2011}, url = {http://eprint.iacr.org/2011/011}, } @misc{cryptoeprint:2011:012, author = {Jens Groth}, title = {Minimizing Non-interactive Zero-Knowledge Proofs Using Fully Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2011/012}, year = {2011}, url = {http://eprint.iacr.org/2011/012}, } @misc{cryptoeprint:2011:013, author = {Shashank Agrawal and Abhinav Mehta and Kannan Srinathan}, title = {Secure Message Transmission In Asynchronous Directed Networks}, howpublished = {Cryptology ePrint Archive, Report 2011/013}, year = {2011}, url = {http://eprint.iacr.org/2011/013}, } @misc{cryptoeprint:2011:014, author = {Shashank Agrawal and Abhinav Mehta and Kannan Srinathan}, title = {Unconditionally Reliable Message Transmission in Directed Neighbour Networks}, howpublished = {Cryptology ePrint Archive, Report 2011/014}, year = {2011}, url = {http://eprint.iacr.org/2011/014}, } @misc{cryptoeprint:2011:015, author = {Jean-Philippe Aumasson}, title = {Exponential attacks on 6-round Luby-Rackoff and on 5-round Lai-Massey}, howpublished = {Cryptology ePrint Archive, Report 2011/015}, year = {2011}, url = {http://eprint.iacr.org/2011/015}, } @misc{cryptoeprint:2011:016, author = {Melissa Chase and Kristin Lauter }, title = {An Anonymous Health Care System }, howpublished = {Cryptology ePrint Archive, Report 2011/016}, year = {2011}, url = {http://eprint.iacr.org/2011/016}, } @misc{cryptoeprint:2011:017, author = {Jiazhe Chen and Keting Jia and Hongbo Yu and Xiaoyun Wang}, title = {New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256}, howpublished = {Cryptology ePrint Archive, Report 2011/017}, year = {2011}, url = {http://eprint.iacr.org/2011/017}, } @misc{cryptoeprint:2011:018, author = {Dan Boneh and David Mandell Freeman}, title = {Homomorphic Signatures for Polynomial Functions}, howpublished = {Cryptology ePrint Archive, Report 2011/018}, year = {2011}, url = {http://eprint.iacr.org/2011/018}, } @misc{cryptoeprint:2011:019, author = {Jooyoung Lee and Deukjo Hong}, title = {Collision Resistance of the JH Hash Function}, howpublished = {Cryptology ePrint Archive, Report 2011/019}, year = {2011}, url = {http://eprint.iacr.org/2011/019}, } @misc{cryptoeprint:2011:020, author = {Antoine Joux and Vanessa Vitse}, title = {Cover and Decomposition Index Calculus on Elliptic Curves made practical. Application to a seemingly secure curve over $\F_{p^6}$}, howpublished = {Cryptology ePrint Archive, Report 2011/020}, year = {2011}, url = {http://eprint.iacr.org/2011/020}, } @misc{cryptoeprint:2011:021, author = {Jae Hong Seo and Jung Hee Cheon}, title = {Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts}, howpublished = {Cryptology ePrint Archive, Report 2011/021}, year = {2011}, url = {http://eprint.iacr.org/2011/021}, } @misc{cryptoeprint:2011:022, author = {Farzaneh Abazari and Babak Sadeghian}, title = {Cryptanalysis with Ternary Difference: Applied to Block Cipher PRESENT}, howpublished = {Cryptology ePrint Archive, Report 2011/022}, year = {2011}, url = {http://eprint.iacr.org/2011/022}, } @misc{cryptoeprint:2011:023, author = {Ming Duan and Xuajia Lai}, title = {Improved zero-sum distinguisher for full round Keccak-f permutation}, howpublished = {Cryptology ePrint Archive, Report 2011/023}, year = {2011}, url = {http://eprint.iacr.org/2011/023}, } @misc{cryptoeprint:2011:024, author = {Alexander Rostovtsev, Alexey Bogdanov and Mikhail Mikhaylov}, title = {Secure evaluation of polynomial using privacy ring homomorphisms}, howpublished = {Cryptology ePrint Archive, Report 2011/024}, year = {2011}, url = {http://eprint.iacr.org/2011/024}, } @misc{cryptoeprint:2011:025, author = {Mihaela Ion and Giovanni Russello and Bruno Crispo}, title = {Supporting Publication and Subscription Confidentiality in Pub/Sub Networks}, howpublished = {Cryptology ePrint Archive, Report 2011/025}, year = {2011}, url = {http://eprint.iacr.org/2011/025}, } @misc{cryptoeprint:2011:026, author = {Emiliano De Cristofaro and Mark Manulis and Bertram Poettering}, title = {Private Discovery of Common Social Contacts}, howpublished = {Cryptology ePrint Archive, Report 2011/026}, year = {2011}, url = {http://eprint.iacr.org/2011/026}, } @misc{cryptoeprint:2011:027, author = {Ashish Choudhury and Kaoru Kurosawa and Arpita Patra}, title = {Simple and Efficient Single Round Almost Perfectly Secure Message Transmission Tolerating Generalized Adversary}, howpublished = {Cryptology ePrint Archive, Report 2011/027}, year = {2011}, url = {http://eprint.iacr.org/2011/027}, } @misc{cryptoeprint:2011:028, author = {Elena Andreeva and Bart Mennink and Bart Preneel}, title = {The Parazoa Family: Generalizing the Sponge Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2011/028}, year = {2011}, url = {http://eprint.iacr.org/2011/028}, } @misc{cryptoeprint:2011:029, author = {Benjamin Gittins}, title = {Outline of a proposal responding to E.U. and U.S. calls for trustworthy global-scale IdM and CKM designs}, howpublished = {Cryptology ePrint Archive, Report 2011/029}, year = {2011}, url = {http://eprint.iacr.org/2011/029}, } @misc{cryptoeprint:2011:030, author = {Vorapong Suppakitpaisarn and Masato Edahiro and Hiroshi Imai}, title = {Fast Elliptic Curve Cryptography Using Optimal Double-Base Chains}, howpublished = {Cryptology ePrint Archive, Report 2011/030}, year = {2011}, url = {http://eprint.iacr.org/2011/030}, } @misc{cryptoeprint:2011:031, author = {Ashish Choudhury and Arpita Patra}, title = {Statistical Asynchronous Weak Commitment Scheme: A New Primitive to Design Statistical Asynchronous Verifiable Secret Sharing Scheme}, howpublished = {Cryptology ePrint Archive, Report 2011/031}, year = {2011}, url = {http://eprint.iacr.org/2011/031}, } @misc{cryptoeprint:2011:032, author = {Piotr Mroczkowski and Janusz Szmidt}, title = {Corrigendum to: The Cube Attack on Stream Cipher Trivium and Quadraticity Tests}, howpublished = {Cryptology ePrint Archive, Report 2011/032}, year = {2011}, url = {http://eprint.iacr.org/2011/032}, } @misc{cryptoeprint:2011:033, author = {Jean-Marc Couveignes and Jean-Gabriel Kammerer}, title = {The Geometry of Flex Tangents to a Cubic Curve and its Parameterizations}, howpublished = {Cryptology ePrint Archive, Report 2011/033}, year = {2011}, url = {http://eprint.iacr.org/2011/033}, } @misc{cryptoeprint:2011:034, author = {Niek J. Bouman and Serge Fehr}, title = {Secure Authentication from a Weak Key, Without Leaking Information}, howpublished = {Cryptology ePrint Archive, Report 2011/034}, year = {2011}, url = {http://eprint.iacr.org/2011/034}, } @misc{cryptoeprint:2011:035, author = {Andrew C. Yao and Yunlei Zhao}, title = {A New Family of Practical Non-Malleable Protocols}, howpublished = {Cryptology ePrint Archive, Report 2011/035}, year = {2011}, url = {http://eprint.iacr.org/2011/035}, } @misc{cryptoeprint:2011:036, author = {Mohamed Saied Emam Mohamed and Jintai Ding and Johannes Buchmann}, title = {The Complexity Analysis of the MutantXL Family}, howpublished = {Cryptology ePrint Archive, Report 2011/036}, year = {2011}, url = {http://eprint.iacr.org/2011/036}, } @misc{cryptoeprint:2011:037, author = {Mario Lamberger and Florian Mendel}, title = {Higher-Order Differential Attack on Reduced SHA-256}, howpublished = {Cryptology ePrint Archive, Report 2011/037}, year = {2011}, url = {http://eprint.iacr.org/2011/037}, } @misc{cryptoeprint:2011:038, author = {Martin Albrecht and Carlos Cid}, title = {Cold Boot Key Recovery by Solving Polynomial Systems with Noise}, howpublished = {Cryptology ePrint Archive, Report 2011/038}, year = {2011}, url = {http://eprint.iacr.org/2011/038}, } @misc{cryptoeprint:2011:039, author = {Duc-Phong Le}, title = {Fast Quadrupling of a Point in Elliptic Curve Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2011/039}, year = {2011}, url = {http://eprint.iacr.org/2011/039}, } @misc{cryptoeprint:2011:040, author = {Hoon Hong, Eunjeong Lee, Hyang-Sook Lee and Cheol-Min Park}, title = {Simple and Exact Formula for Minimum Loop Length in Ate_i Pairing based on Brezing-Weng Curves}, howpublished = {Cryptology ePrint Archive, Report 2011/040}, year = {2011}, url = {http://eprint.iacr.org/2011/040}, } @misc{cryptoeprint:2011:041, author = {Emiliano De Cristofaro and Anthony Durussel and Imad Aad}, title = {Reclaiming Privacy for Smartphone Applications}, howpublished = {Cryptology ePrint Archive, Report 2011/041}, year = {2011}, url = {http://eprint.iacr.org/2011/041}, } @misc{cryptoeprint:2011:042, author = {Gaetan Bisson}, title = {Computing endomorphism rings of elliptic curves under the GRH}, howpublished = {Cryptology ePrint Archive, Report 2011/042}, year = {2011}, url = {http://eprint.iacr.org/2011/042}, } @misc{cryptoeprint:2011:043, author = {Jayaprakash Kar}, title = {Proxy Blind Multi-signature Scheme using ECC for handheld devices}, howpublished = {Cryptology ePrint Archive, Report 2011/043}, year = {2011}, url = {http://eprint.iacr.org/2011/043}, } @misc{cryptoeprint:2011:044, author = {G. N. Purohit , Asmita Singh Rawat}, title = {Fast Scalar Multiplication in ECC using The Multi base Number System.}, howpublished = {Cryptology ePrint Archive, Report 2011/044}, year = {2011}, url = {http://eprint.iacr.org/2011/044}, } @misc{cryptoeprint:2011:045, author = {Farshid Farhat, Somayeh Salimi, Ahmad Salahi}, title = {Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup}, howpublished = {Cryptology ePrint Archive, Report 2011/045}, year = {2011}, url = {http://eprint.iacr.org/2011/045}, } @misc{cryptoeprint:2011:046, author = {Rikke Bendlin and Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi}, title = {Receiver-deniable public-key encryption is impossible}, howpublished = {Cryptology ePrint Archive, Report 2011/046}, year = {2011}, url = {http://eprint.iacr.org/2011/046}, } @misc{cryptoeprint:2011:047, author = {Yuyin Yu and Mingsheng Wang and Yongqiang Li}, title = {A new method for constructing differential 4-uniform permutations from know ones}, howpublished = {Cryptology ePrint Archive, Report 2011/047}, year = {2011}, url = {http://eprint.iacr.org/2011/047}, } @misc{cryptoeprint:2011:048, author = {Srinath Baba, Srinivas Kotyad and Raghu Teja}, title = {A non-Abelian factorization problem and an associated cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2011/048}, year = {2011}, url = {http://eprint.iacr.org/2011/048}, } @misc{cryptoeprint:2011:049, author = {Allison Lewko and Brent Waters}, title = {Unbounded HIBE and Attribute-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2011/049}, year = {2011}, url = {http://eprint.iacr.org/2011/049}, } @misc{cryptoeprint:2011:050, author = {Zheng Yang}, title = {Generic Execution State Synchronization Framework for Authenticated Key Exchange Protocol}, howpublished = {Cryptology ePrint Archive, Report 2011/050}, year = {2011}, url = {http://eprint.iacr.org/2011/050}, } @misc{cryptoeprint:2011:051, author = {Zheng Yang}, title = {Towards Strong Adaptive Corruption Security of Authenticated Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2011/051}, year = {2011}, url = {http://eprint.iacr.org/2011/051}, } @misc{cryptoeprint:2011:052, author = {Alex Escala and Javier Herranz and Paz Morillo}, title = {Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2011/052}, year = {2011}, url = {http://eprint.iacr.org/2011/052}, } @misc{cryptoeprint:2011:053, author = {Dario Catalano and Dario Fiore and Bogdan Warinschi}, title = {Adaptive Pseudo-Free Groups and Applications}, howpublished = {Cryptology ePrint Archive, Report 2011/053}, year = {2011}, url = {http://eprint.iacr.org/2011/053}, } @misc{cryptoeprint:2011:054, author = {Ashish Choudhury and Kaoru Kurosawa and Arpita Patra}, title = {Non-Applicability of Pseudobasis for Designing Perfectly Secure Message Transmission Protocols Against Non-Threshold Adversary}, howpublished = {Cryptology ePrint Archive, Report 2011/054}, year = {2011}, url = {http://eprint.iacr.org/2011/054}, } @misc{cryptoeprint:2011:055, author = {Dongdai Lin and Jean-Charles Faugere and Ludovic Perret and Tianze Wang}, title = {On Enumeration of Polynomial Equivalence Classes and Their Application to MPKC}, howpublished = {Cryptology ePrint Archive, Report 2011/055}, year = {2011}, url = {http://eprint.iacr.org/2011/055}, } @misc{cryptoeprint:2011:056, author = {Amine Dehbaoui and Sébastien Tiran and Philippe Maurine and François-Xavier Standaert and Nicolas Veyrat-Charvillon}, title = {Spectral Coherence Analysis - First Experimental Results - }, howpublished = {Cryptology ePrint Archive, Report 2011/056}, year = {2011}, url = {http://eprint.iacr.org/2011/056}, } @misc{cryptoeprint:2011:057, author = {Jean-S\'ebastien Coron and David Naccache and Mehdi Tibouchi}, title = {Generating Minimum Entropy Affine Multiplicative Relations in $\mathbb{Z}_N$}, howpublished = {Cryptology ePrint Archive, Report 2011/057}, year = {2011}, url = {http://eprint.iacr.org/2011/057}, } @misc{cryptoeprint:2011:058, author = {Jean-S\'ebastien Coron and Aline Gouget and Thomas Icart and Pascal Paillier}, title = {Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping}, howpublished = {Cryptology ePrint Archive, Report 2011/058}, year = {2011}, url = {http://eprint.iacr.org/2011/058}, } @misc{cryptoeprint:2011:059, author = {Martin Stanek}, title = {Extending Baby-step Giant-step algorithm for FACTOR problem}, howpublished = {Cryptology ePrint Archive, Report 2011/059}, year = {2011}, url = {http://eprint.iacr.org/2011/059}, } @misc{cryptoeprint:2011:060, author = {S. Dov Gordon and Jonathan Katz and Vinod Vaikuntanathan}, title = {A Group Signature Scheme from Lattice Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2011/060}, year = {2011}, url = {http://eprint.iacr.org/2011/060}, } @misc{cryptoeprint:2011:061, author = {Masoumeh Safkhani, Majid Naderi, Nasour Bagheri and Somitra Kumar Sanadhya}, title = {Cryptanalysis of Some Protocols for RFID Systems}, howpublished = {Cryptology ePrint Archive, Report 2011/061}, year = {2011}, url = {http://eprint.iacr.org/2011/061}, } @misc{cryptoeprint:2011:062, author = {Swapnoneel Roy and Amlan K Das and Sheng Zhong and Jiqiang Liu}, title = {Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme using Smart Cards, and a Key Agreement Scheme for Two-Party Communication}, howpublished = {Cryptology ePrint Archive, Report 2011/062}, year = {2011}, url = {http://eprint.iacr.org/2011/062}, } @misc{cryptoeprint:2011:063, author = {Hadi Ahmadi and Reihaneh Safavi-Naini}, title = {Secret Keys from Channel Noise}, howpublished = {Cryptology ePrint Archive, Report 2011/063}, year = {2011}, url = {http://eprint.iacr.org/2011/063}, } @misc{cryptoeprint:2011:064, author = {Felix Günther and Mark Manulis and Thorsten Strufe}, title = {Cryptographic Treatment of Private User Profiles}, howpublished = {Cryptology ePrint Archive, Report 2011/064}, year = {2011}, url = {http://eprint.iacr.org/2011/064}, } @misc{cryptoeprint:2011:065, author = {Carolin Lunemann and Jesper Buus Nielsen}, title = {Fully Simulatable Quantum-Secure Coin-Flipping and Applications}, howpublished = {Cryptology ePrint Archive, Report 2011/065}, year = {2011}, url = {http://eprint.iacr.org/2011/065}, } @misc{cryptoeprint:2011:066, author = {Markus Duermuth and David Mandell Freeman}, title = {Deniable Encryption with Negligible Detection Probability: An Interactive Construction}, howpublished = {Cryptology ePrint Archive, Report 2011/066}, year = {2011}, url = {http://eprint.iacr.org/2011/066}, } @misc{cryptoeprint:2011:067, author = {Simon R. Blackburn, Alina Ostafe and Igor E. Shparlinski}, title = {On the Distribution of the Subset Sum Pseudorandom Number Generator on Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2011/067}, year = {2011}, url = {http://eprint.iacr.org/2011/067}, } @misc{cryptoeprint:2011:068, author = {William K. Moses Jr. and C. Pandu Rangan}, title = {Rational Secret Sharing with Honest Players over an Asynchronous Channel}, howpublished = {Cryptology ePrint Archive, Report 2011/068}, year = {2011}, url = {http://eprint.iacr.org/2011/068}, } @misc{cryptoeprint:2011:069, author = {Chao Ning and Qiuliang Xu}, title = {Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction}, howpublished = {Cryptology ePrint Archive, Report 2011/069}, year = {2011}, url = {http://eprint.iacr.org/2011/069}, } @misc{cryptoeprint:2011:070, author = {Long H. Nguyen}, title = {Rational authentication protocols}, howpublished = {Cryptology ePrint Archive, Report 2011/070}, year = {2011}, url = {http://eprint.iacr.org/2011/070}, } @misc{cryptoeprint:2011:071, author = {Gilles Barthe and Boris Köpf}, title = {Information-theoretic Bounds for Differentially Private Mechanisms}, howpublished = {Cryptology ePrint Archive, Report 2011/071}, year = {2011}, url = {http://eprint.iacr.org/2011/071}, } @misc{cryptoeprint:2011:072, author = {Jiali Choy and Aileen Zhang and Khoongming Khoo and Matt Henricksen and Axel Poschmann}, title = {AES Variants Secure Against Related-Key Differential and Boomerang Attacks}, howpublished = {Cryptology ePrint Archive, Report 2011/072}, year = {2011}, url = {http://eprint.iacr.org/2011/072}, } @misc{cryptoeprint:2011:073, author = {Simon R. Blackburn, Carlos Cid and Ciaran Mullan}, title = {Cryptanalysis of three matrix-based key establishment protocols}, howpublished = {Cryptology ePrint Archive, Report 2011/073}, year = {2011}, url = {http://eprint.iacr.org/2011/073}, } @misc{cryptoeprint:2011:074, author = {Daniel J. Bernstein and Tanja Lange and Christiane Peters and Peter Schwabe}, title = {Really fast syndrome-based hashing}, howpublished = {Cryptology ePrint Archive, Report 2011/074}, year = {2011}, url = {http://eprint.iacr.org/2011/074}, } @misc{cryptoeprint:2011:075, author = {Suleyman Kardas and Mehmet Sabir Kiraz and Muhammed Ali Bingol and Huseyin Demirci}, title = {A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions}, howpublished = {Cryptology ePrint Archive, Report 2011/075}, year = {2011}, url = {http://eprint.iacr.org/2011/075}, } @misc{cryptoeprint:2011:076, author = {Maura B. Paterson and Douglas R. Stinson}, title = {A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks}, howpublished = {Cryptology ePrint Archive, Report 2011/076}, year = {2011}, url = {http://eprint.iacr.org/2011/076}, } @misc{cryptoeprint:2011:077, author = {Tang Ming and Wang Xiaorong and Qiu Zhenlong and Gao Si and Zhang Huanguo and Wu Qianhong}, title = {DPA Leakage Evaluation and Countermeasure Plug-in }, howpublished = {Cryptology ePrint Archive, Report 2011/077}, year = {2011}, url = {http://eprint.iacr.org/2011/077}, } @misc{cryptoeprint:2011:078, author = {Jean-Luc Beuchat and Eiji Okamoto and Teppei Yamazaki}, title = {A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function ECHO}, howpublished = {Cryptology ePrint Archive, Report 2011/078}, year = {2011}, url = {http://eprint.iacr.org/2011/078}, } @misc{cryptoeprint:2011:079, author = {He Debiao, Chen Jianhua, Hu Jin}, title = {Identity-based Digital Signature Scheme Without Bilinear Pairings}, howpublished = {Cryptology ePrint Archive, Report 2011/079}, year = {2011}, url = {http://eprint.iacr.org/2011/079}, } @misc{cryptoeprint:2011:080, author = {Xiao Ma}, title = {Turbo Codes Can Be Asymptotically Information-Theoretically Secure}, howpublished = {Cryptology ePrint Archive, Report 2011/080}, year = {2011}, url = {http://eprint.iacr.org/2011/080}, } @misc{cryptoeprint:2011:081, author = {Tomas Toft}, title = {Secure Datastructures based on Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2011/081}, year = {2011}, url = {http://eprint.iacr.org/2011/081}, } @misc{cryptoeprint:2011:082, author = {Ashish Choudhury and Kaoru Kurosawa and Arpita Patra}, title = {Does Pseudo-basis Extend to General Adversary?}, howpublished = {Cryptology ePrint Archive, Report 2011/082}, year = {2011}, url = {http://eprint.iacr.org/2011/082}, } @misc{cryptoeprint:2011:083, author = {Natalia Tokareva}, title = {On the number of bent functions: lower bounds and hypotheses}, howpublished = {Cryptology ePrint Archive, Report 2011/083}, year = {2011}, url = {http://eprint.iacr.org/2011/083}, } @misc{cryptoeprint:2011:084, author = {Xingwen Zhao and Fangguo Zhang}, title = {Traitor Tracing against Public Collaboration (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2011/084}, year = {2011}, url = {http://eprint.iacr.org/2011/084}, } @misc{cryptoeprint:2011:085, author = {Mohammad Hajiabadi, Bruce M. Kapron}, title = {Co-induction and Computational Semantics for Public-key Encryption with Key Cycles}, howpublished = {Cryptology ePrint Archive, Report 2011/085}, year = {2011}, url = {http://eprint.iacr.org/2011/085}, } @misc{cryptoeprint:2011:086, author = {Xin-jie Zhao, Tao Wang, Shi-ze Guo}, title = {Fault Propagate Pattern Based DFA on SPN Structure Block Ciphers using Bitwise Permutation, with Application to PRESENT and PRINTcipher}, howpublished = {Cryptology ePrint Archive, Report 2011/086}, year = {2011}, url = {http://eprint.iacr.org/2011/086}, } @misc{cryptoeprint:2011:087, author = {Yevgeniy Dodis and Iftach Haitner and Aris Tentes}, title = {On the (In)Security of RSA Signatures}, howpublished = {Cryptology ePrint Archive, Report 2011/087}, year = {2011}, url = {http://eprint.iacr.org/2011/087}, } @misc{cryptoeprint:2011:088, author = {Boaz Barak and Yevgeniy Dodis and Hugo Krawczyk and Olivier Pereira and Krzysztof Pietrzak and Francois-Xavier Standaert and Yu Yu}, title = {Leftover Hash Lemma, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2011/088}, year = {2011}, url = {http://eprint.iacr.org/2011/088}, } @misc{cryptoeprint:2011:089, author = {Pantelimon Stanica and Thor Martinsen}, title = {Octal Bent Generalized Boolean Functions}, howpublished = {Cryptology ePrint Archive, Report 2011/089}, year = {2011}, url = {http://eprint.iacr.org/2011/089}, } @misc{cryptoeprint:2011:090, author = {Yu Chen and Liqun Chen and Zhong Chen}, title = {Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes }, howpublished = {Cryptology ePrint Archive, Report 2011/090}, year = {2011}, url = {http://eprint.iacr.org/2011/090}, } @misc{cryptoeprint:2011:091, author = {Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi and Sai Sheshank Burra}, title = {A New Approach to Practical Active-Secure Two-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2011/091}, year = {2011}, url = {http://eprint.iacr.org/2011/091}, } @misc{cryptoeprint:2011:092, author = {Akinori Kawachi and Christopher Portmann and Keisuke Tanaka}, title = {Characterization of the relations between information-theoretic non-malleability, secrecy, and authenticity}, howpublished = {Cryptology ePrint Archive, Report 2011/092}, year = {2011}, url = {http://eprint.iacr.org/2011/092}, } @misc{cryptoeprint:2011:093, author = {Miia Hermelin and Kaisa Nyberg}, title = {Linear Cryptanalysis Using Multiple Linear Approximations}, howpublished = {Cryptology ePrint Archive, Report 2011/093}, year = {2011}, url = {http://eprint.iacr.org/2011/093}, } @misc{cryptoeprint:2011:094, author = {Martin Hirt and Christoph Lucas and Ueli Maurer and Dominik Raub}, title = {Graceful Degradation in Multi-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2011/094}, year = {2011}, url = {http://eprint.iacr.org/2011/094}, } @misc{cryptoeprint:2011:095, author = {Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {ALRED Blues: New Attacks on AES-Based MAC's}, howpublished = {Cryptology ePrint Archive, Report 2011/095}, year = {2011}, url = {http://eprint.iacr.org/2011/095}, } @misc{cryptoeprint:2011:096, author = {Jae Hyun Ahn and Dan Boneh and Jan Camenisch and Susan Hohenberger and abhi shelat and Brent Waters}, title = {Computing on Authenticated Data}, howpublished = {Cryptology ePrint Archive, Report 2011/096}, year = {2011}, url = {http://eprint.iacr.org/2011/096}, } @misc{cryptoeprint:2011:097, author = {Shi Pu, Pu Duan, Jyh-Charn Liu}, title = {Fastplay-A Parallelization Model and Implementation of SMC on CUDA based GPU Cluster Architecture}, howpublished = {Cryptology ePrint Archive, Report 2011/097}, year = {2011}, url = {http://eprint.iacr.org/2011/097}, } @misc{cryptoeprint:2011:098, author = {M. D. Velichka and M. J. Jacobson, Jr. and A. Stein}, title = {Computing Discrete Logarithms in the Jacobian of High-Genus Hyperelliptic Curves over Even Characteristic Finite Fields}, howpublished = {Cryptology ePrint Archive, Report 2011/098}, year = {2011}, url = {http://eprint.iacr.org/2011/098}, } @misc{cryptoeprint:2011:099, author = {Antoine Amarilli and Sascha M\"uller and David Naccache and Daniel Page and Pablo Rauzy and Michael Tunstall }, title = {Can Code Polymorphism Limit Information Leakage?}, howpublished = {Cryptology ePrint Archive, Report 2011/099}, year = {2011}, url = {http://eprint.iacr.org/2011/099}, } @misc{cryptoeprint:2011:100, author = {Guangdong Yang and Shaohua Tang and Li Yang}, title = {A Novel Group Signature Scheme Based on MPKC}, howpublished = {Cryptology ePrint Archive, Report 2011/100}, year = {2011}, url = {http://eprint.iacr.org/2011/100}, } @misc{cryptoeprint:2011:101, author = {Liqun Chen and Kurt Dietrich and Hans Löhr and Ahmad-Reza Sadeghi and Christian Wachsmann and Johannes Winter}, title = {Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices}, howpublished = {Cryptology ePrint Archive, Report 2011/101}, year = {2011}, url = {http://eprint.iacr.org/2011/101}, } @misc{cryptoeprint:2011:102, author = {Charalampos Papamanthou and Roberto Tamassia}, title = {Cryptography for Efficiency: Authenticated Data Structures Based on Lattices and Parallel Online Memory Checking}, howpublished = {Cryptology ePrint Archive, Report 2011/102}, year = {2011}, url = {http://eprint.iacr.org/2011/102}, } @misc{cryptoeprint:2011:103, author = {István Vajda}, title = {Cryptographically Sound Security Proof for On-Demand Source Routing Protocol EndairA}, howpublished = {Cryptology ePrint Archive, Report 2011/103}, year = {2011}, url = {http://eprint.iacr.org/2011/103}, } @misc{cryptoeprint:2011:104, author = {Colleen M. Swanson and Douglas R. Stinson}, title = {Unconditionally Secure Signature Schemes Revisited}, howpublished = {Cryptology ePrint Archive, Report 2011/104}, year = {2011}, url = {http://eprint.iacr.org/2011/104}, } @misc{cryptoeprint:2011:105, author = {S. Erickson and M. J. Jacobson, Jr. and A. Stein}, title = {Explicit Formulas for Real Hyperelliptic Curves of Genus 2 in Affine Representation}, howpublished = {Cryptology ePrint Archive, Report 2011/105}, year = {2011}, url = {http://eprint.iacr.org/2011/105}, } @misc{cryptoeprint:2011:106, author = {Hadi Ahmadi and Reihaneh Safavi-Naini}, title = {Common Randomness and Secret Key Capacities of Two-way Channels}, howpublished = {Cryptology ePrint Archive, Report 2011/106}, year = {2011}, url = {http://eprint.iacr.org/2011/106}, } @misc{cryptoeprint:2011:107, author = {Martin Stanek}, title = {Threshold Encryption into Multiple Ciphertexts}, howpublished = {Cryptology ePrint Archive, Report 2011/107}, year = {2011}, url = {http://eprint.iacr.org/2011/107}, } @misc{cryptoeprint:2011:108, author = {Jannik Dreier and Florian Kerschbaum}, title = {Practical Secure and Efficient Multiparty Linear Programming Based on Problem Transformation}, howpublished = {Cryptology ePrint Archive, Report 2011/108}, year = {2011}, url = {http://eprint.iacr.org/2011/108}, } @misc{cryptoeprint:2011:109, author = {Matthew Green}, title = {Secure Blind Decryption}, howpublished = {Cryptology ePrint Archive, Report 2011/109}, year = {2011}, url = {http://eprint.iacr.org/2011/109}, } @misc{cryptoeprint:2011:110, author = {Gu Chunsheng}, title = {Fully Homomorphic Encryption over the Binary Polynomials}, howpublished = {Cryptology ePrint Archive, Report 2011/110}, year = {2011}, url = {http://eprint.iacr.org/2011/110}, } @misc{cryptoeprint:2011:111, author = {Natalia Tokareva}, title = {Generalizations of Bent Functions. A Survey}, howpublished = {Cryptology ePrint Archive, Report 2011/111}, year = {2011}, url = {http://eprint.iacr.org/2011/111}, } @misc{cryptoeprint:2011:112, author = {He Debiao}, title = {An efficient certificateless two-party authenticated key agreement scheme from pairings}, howpublished = {Cryptology ePrint Archive, Report 2011/112}, year = {2011}, url = {http://eprint.iacr.org/2011/112}, } @misc{cryptoeprint:2011:113, author = {Emiliano De Cristofaro and Yanbin Lu and Gene Tsudik}, title = {Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information}, howpublished = {Cryptology ePrint Archive, Report 2011/113}, year = {2011}, url = {http://eprint.iacr.org/2011/113}, } @misc{cryptoeprint:2011:114, author = {Gu Chunsheng}, title = {Fully Homomorphic Encryption and Ring-LWE over the Integers}, howpublished = {Cryptology ePrint Archive, Report 2011/114}, year = {2011}, url = {http://eprint.iacr.org/2011/114}, } @misc{cryptoeprint:2011:115, author = {Céline Blondeau and Benoît Gérard}, title = {Multiple Differential Cryptanalysis: Theory and Practice}, howpublished = {Cryptology ePrint Archive, Report 2011/115}, year = {2011}, url = {http://eprint.iacr.org/2011/115}, } @misc{cryptoeprint:2011:116, author = {Long Nguyen and Andrew William Roscoe}, title = {On the construction of digest functions for manual authentication protocols}, howpublished = {Cryptology ePrint Archive, Report 2011/116}, year = {2011}, url = {http://eprint.iacr.org/2011/116}, } @misc{cryptoeprint:2011:117, author = {Lei Wei and Scott E. Coull and Michael K. Reiter}, title = {Bounded Vector Signatures and their Applications}, howpublished = {Cryptology ePrint Archive, Report 2011/117}, year = {2011}, url = {http://eprint.iacr.org/2011/117}, } @misc{cryptoeprint:2011:118, author = {Gu Chunsheng}, title = {New Fully Homomorphic Encryption over the Integers}, howpublished = {Cryptology ePrint Archive, Report 2011/118}, year = {2011}, url = {http://eprint.iacr.org/2011/118}, } @misc{cryptoeprint:2011:119, author = {Gu Chunsheng}, title = {Multiplicative Learning with Errors and Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2011/119}, year = {2011}, url = {http://eprint.iacr.org/2011/119}, } @misc{cryptoeprint:2011:120, author = {Daniel J. Bernstein and Tanja Lange and Christiane Peters and Peter Schwabe}, title = {Faster 2-regular information-set decoding}, howpublished = {Cryptology ePrint Archive, Report 2011/120}, year = {2011}, url = {http://eprint.iacr.org/2011/120}, } @misc{cryptoeprint:2011:121, author = {Gu Chunsheng}, title = {Self-loop-based Modification of Smart and Vercauteren’s Fully Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2011/121}, year = {2011}, url = {http://eprint.iacr.org/2011/121}, } @misc{cryptoeprint:2011:122, author = {Kristj{\'a}n Valur J{\'o}nsson and Gunnar Kreitz and Misbah Uddin}, title = {Secure Multi-Party Sorting and Applications}, howpublished = {Cryptology ePrint Archive, Report 2011/122}, year = {2011}, url = {http://eprint.iacr.org/2011/122}, } @misc{cryptoeprint:2011:123, author = {Andrey Bogdanov and Vincent Rijmen}, title = {Zero-Correlation Linear Cryptanalysis of Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2011/123}, year = {2011}, url = {http://eprint.iacr.org/2011/123}, } @misc{cryptoeprint:2011:124, author = {Masao KASAHARA}, title = {A New Class of Biometrics on the Basis of Forgotten Secret Recovering Scheme, KSS(I)}, howpublished = {Cryptology ePrint Archive, Report 2011/124}, year = {2011}, url = {http://eprint.iacr.org/2011/124}, } @misc{cryptoeprint:2011:125, author = {Masao KASAHARA}, title = {A Construction of A New Class of Knapsack-Type Public Key Cryptosystem, K(III)$\Sigma$PKC}, howpublished = {Cryptology ePrint Archive, Report 2011/125}, year = {2011}, url = {http://eprint.iacr.org/2011/125}, } @misc{cryptoeprint:2011:126, author = {Daniel Engels and Markku-Juhani O. Saarinen and Eric M. Smith}, title = {The Hummingbird-2 Lightweight Authenticated Encryption Algorithm }, howpublished = {Cryptology ePrint Archive, Report 2011/126}, year = {2011}, url = {http://eprint.iacr.org/2011/126}, } @misc{cryptoeprint:2011:127, author = {Gideon Samid}, title = {Integer Arithmetic without Arithmetic Addition}, howpublished = {Cryptology ePrint Archive, Report 2011/127}, year = {2011}, url = {http://eprint.iacr.org/2011/127}, } @misc{cryptoeprint:2011:128, author = {Isaiah Makwakwa}, title = {The Ligo Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2011/128}, year = {2011}, url = {http://eprint.iacr.org/2011/128}, } @misc{cryptoeprint:2011:129, author = {Cas Cremers and Kasper Bonne Rasmussen and Srdjan Capkun}, title = {Distance Hijacking Attacks on Distance Bounding Protocols}, howpublished = {Cryptology ePrint Archive, Report 2011/129}, year = {2011}, url = {http://eprint.iacr.org/2011/129}, } @misc{cryptoeprint:2011:130, author = {Dongdai Lin, Tao Shi, and Zifeng Yang}, title = {Ergodic Theory Over ${\F}_2[[T]]$}, howpublished = {Cryptology ePrint Archive, Report 2011/130}, year = {2011}, url = {http://eprint.iacr.org/2011/130}, } @misc{cryptoeprint:2011:131, author = {Virendra Sule}, title = {Trapdoor oneway functions associated with exponentiation}, howpublished = {Cryptology ePrint Archive, Report 2011/131}, year = {2011}, url = {http://eprint.iacr.org/2011/131}, } @misc{cryptoeprint:2011:132, author = {Siavosh Benabbas and Rosario Gennaro and Yevgeniy Vahlis}, title = {Verifiable Delegation of Computation over Large Datasets}, howpublished = {Cryptology ePrint Archive, Report 2011/132}, year = {2011}, url = {http://eprint.iacr.org/2011/132}, } @misc{cryptoeprint:2011:133, author = {N.P. Smart and F. Vercauteren}, title = {Fully Homomorphic SIMD Operations}, howpublished = {Cryptology ePrint Archive, Report 2011/133}, year = {2011}, url = {http://eprint.iacr.org/2011/133}, } @misc{cryptoeprint:2011:134, author = {George Danezis and Markulf Kohlweiss and Alfredo Rial}, title = {Differentially Private Billing with Rebates}, howpublished = {Cryptology ePrint Archive, Report 2011/134}, year = {2011}, url = {http://eprint.iacr.org/2011/134}, } @misc{cryptoeprint:2011:135, author = {Omran Ahmadi and Robert Granger}, title = {On isogeny classes of Edwards curves over finite fields}, howpublished = {Cryptology ePrint Archive, Report 2011/135}, year = {2011}, url = {http://eprint.iacr.org/2011/135}, } @misc{cryptoeprint:2011:136, author = {Gilad Asharov and Yehuda Lindell}, title = {A Full Proof of the BGW Protocol for Perfectly-Secure Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2011/136}, year = {2011}, url = {http://eprint.iacr.org/2011/136}, } @misc{cryptoeprint:2011:137, author = {Gilad Asharov and Ran Canetti and Carmit Hazay}, title = {Towards a Game Theoretic View of Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2011/137}, year = {2011}, url = {http://eprint.iacr.org/2011/137}, } @misc{cryptoeprint:2011:138, author = {Jeongdae Hong and Jung Woo Kim and Jihye Kim and Kunsoo Park and Jung Hee Cheon}, title = {Constant-Round Privacy Preserving Multiset Union}, howpublished = {Cryptology ePrint Archive, Report 2011/138}, year = {2011}, url = {http://eprint.iacr.org/2011/138}, } @misc{cryptoeprint:2011:139, author = {Mingjie Liu and Xiaoyun Wang and Jingguo Bi and Xuexin Zheng}, title = {Finding Shortest Lattice Vector for Lattices with Gaps}, howpublished = {Cryptology ePrint Archive, Report 2011/139}, year = {2011}, url = {http://eprint.iacr.org/2011/139}, } @misc{cryptoeprint:2011:140, author = {Martin Ågren}, title = {Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64}, howpublished = {Cryptology ePrint Archive, Report 2011/140}, year = {2011}, url = {http://eprint.iacr.org/2011/140}, } @misc{cryptoeprint:2011:141, author = {Emiliano De Cristofaro and Gene Tsudik}, title = {Fast and Private Computation of Set Intersection Cardinality}, howpublished = {Cryptology ePrint Archive, Report 2011/141}, year = {2011}, url = {http://eprint.iacr.org/2011/141}, } @misc{cryptoeprint:2011:142, author = {Haibo Yi and Shaohua Tang and Huan Chen and Guomin Chen}, title = {A Parallel Hardware Architecture for the Solution of Linear Equation Systems Implemented over GF(2^n)}, howpublished = {Cryptology ePrint Archive, Report 2011/142}, year = {2011}, url = {http://eprint.iacr.org/2011/142}, } @misc{cryptoeprint:2011:143, author = {Romain Cosset and Damien Robert}, title = {Computing $(\ell,\ell)$-isogenies in polynomial time on Jacobians of genus~$2$ curves}, howpublished = {Cryptology ePrint Archive, Report 2011/143}, year = {2011}, url = {http://eprint.iacr.org/2011/143}, } @misc{cryptoeprint:2011:144, author = {Bernardo M. David and Anderson C. A. Nascimento}, title = {Deniable Encryption from the McEliece Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2011/144}, year = {2011}, url = {http://eprint.iacr.org/2011/144}, } @misc{cryptoeprint:2011:145, author = {M.R.K. Ariffin, N.A. Abu, M.A. Asbullah, Z. Mahad, A. Mandangan and K.A.M. Atan}, title = {Linear Diophantine Equation Discrete Log Problem, Non-Invertible Matrix Problem and the AA{\beta}-cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2011/145}, year = {2011}, url = {http://eprint.iacr.org/2011/145}, } @misc{cryptoeprint:2011:146, author = {Lei Xu and Dongdai Lin and Jing Zou}, title = {ECDLP on GPU}, howpublished = {Cryptology ePrint Archive, Report 2011/146}, year = {2011}, url = {http://eprint.iacr.org/2011/146}, } @misc{cryptoeprint:2011:147, author = {Tang Chunming, Gao Shuhong, Zhang Chengli}, title = {The Optimal Linear Secret Sharing Scheme for Any Given Access Structure}, howpublished = {Cryptology ePrint Archive, Report 2011/147}, year = {2011}, url = {http://eprint.iacr.org/2011/147}, } @misc{cryptoeprint:2011:148, author = {Hongbo Yu and Jiazhe Chen and Ketingjia and Xiaoyun Wang}, title = {Near-Collision Attack on the Step-Reduced Compression Function of Skein-256}, howpublished = {Cryptology ePrint Archive, Report 2011/148}, year = {2011}, url = {http://eprint.iacr.org/2011/148}, } @misc{cryptoeprint:2011:149, author = {Nicolas Veyrat-Charvillon and François-Xavier Standaert}, title = {Generic Side-Channel Distinguishers: Improvements and Limitations}, howpublished = {Cryptology ePrint Archive, Report 2011/149}, year = {2011}, url = {http://eprint.iacr.org/2011/149}, } @misc{cryptoeprint:2011:150, author = {Jue-Sam Chou*1, Cheng-Lun Wu 2, Yalin Chen 3}, title = {A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing}, howpublished = {Cryptology ePrint Archive, Report 2011/150}, year = {2011}, url = {http://eprint.iacr.org/2011/150}, } @misc{cryptoeprint:2011:151, author = {Murtaza, G. and Ikram, N.}, title = {Direct Exponent and Scalar Multiplication Classes of an MDS Matrix}, howpublished = {Cryptology ePrint Archive, Report 2011/151}, year = {2011}, url = {http://eprint.iacr.org/2011/151}, } @misc{cryptoeprint:2011:152, author = {Yehuda Lindell and Eran Omri}, title = {A Practical Application of Differential Privacy to Personalized Online Advertising}, howpublished = {Cryptology ePrint Archive, Report 2011/152}, year = {2011}, url = {http://eprint.iacr.org/2011/152}, } @misc{cryptoeprint:2011:153, author = {Jingguo Bi and Qi Cheng}, title = {Lower bounds of shortest vector lengths in random knapsack lattices and random NTRU lattices}, howpublished = {Cryptology ePrint Archive, Report 2011/153}, year = {2011}, url = {http://eprint.iacr.org/2011/153}, } @misc{cryptoeprint:2011:154, author = {Isaiah Makwakwa}, title = {The Gomego Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2011/154}, year = {2011}, url = {http://eprint.iacr.org/2011/154}, } @misc{cryptoeprint:2011:155, author = {Shaohua Tang and Haibo Yi and Huan Chen and Guomin Chen and Jintai Ding}, title = {High-speed Hardware Implementation of Rainbow Signatures on FPGAs}, howpublished = {Cryptology ePrint Archive, Report 2011/155}, year = {2011}, url = {http://eprint.iacr.org/2011/155}, } @misc{cryptoeprint:2011:156, author = {Madeline González Muñiz and Peeter Laud}, title = {Strong Forward Security in Identity-Based Signcryption}, howpublished = {Cryptology ePrint Archive, Report 2011/156}, year = {2011}, url = {http://eprint.iacr.org/2011/156}, } @misc{cryptoeprint:2011:157, author = {Shai Halevi and Yehuda Lindell and Benny Pinkas}, title = {Secure Computation on the Web: Computing without Simultaneous Interaction}, howpublished = {Cryptology ePrint Archive, Report 2011/157}, year = {2011}, url = {http://eprint.iacr.org/2011/157}, } @misc{cryptoeprint:2011:158, author = {Yanbin Lu and Gene Tsudik}, title = {Enhancing Data Privacy in the Cloud}, howpublished = {Cryptology ePrint Archive, Report 2011/158}, year = {2011}, url = {http://eprint.iacr.org/2011/158}, } @misc{cryptoeprint:2011:159, author = {Isaiah Makwakwa}, title = {The Block Cipher Thuca}, howpublished = {Cryptology ePrint Archive, Report 2011/159}, year = {2011}, url = {http://eprint.iacr.org/2011/159}, } @misc{cryptoeprint:2011:160, author = {Céline Blondeau and María Naya-Plasencia and Marion Videau and Erik Zenner}, title = {Cryptanalysis of ARMADILLO2}, howpublished = {Cryptology ePrint Archive, Report 2011/160}, year = {2011}, url = {http://eprint.iacr.org/2011/160}, } @misc{cryptoeprint:2011:161, author = {Debrup Chakraborty and Cuauhtemoc Mancillas-Lopez and Francisco Rodriguez-Henriquez and Palash Sarkar}, title = {Efficient Hardware Implementations of BRW Polynomials and Tweakable Enciphering Schemes}, howpublished = {Cryptology ePrint Archive, Report 2011/161}, year = {2011}, url = {http://eprint.iacr.org/2011/161}, } @misc{cryptoeprint:2011:162, author = {Amir Moradi and Oliver Mischke and Christof Paar}, title = {Collision Timing Attack when Breaking 42 AES ASIC Cores}, howpublished = {Cryptology ePrint Archive, Report 2011/162}, year = {2011}, url = {http://eprint.iacr.org/2011/162}, } @misc{cryptoeprint:2011:163, author = {Yanjun Li, Wenling Wu, Liting Zhang and Lei Zhang}, title = {Improved Integral Attacks on Reduced Round Camellia}, howpublished = {Cryptology ePrint Archive, Report 2011/163}, year = {2011}, url = {http://eprint.iacr.org/2011/163}, } @misc{cryptoeprint:2011:164, author = {Martin Albrecht and Carlos Cid and Jean-Charles Faugère and Ludovic Perret}, title = {On the Relation Between the Mutant Strategy and the Normal Selection Strategy in Gröbner Basis Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2011/164}, year = {2011}, url = {http://eprint.iacr.org/2011/164}, } @misc{cryptoeprint:2011:165, author = {XinJie Zhao and Tao Wang and ShiZe Guo}, title = {Improved Side Channel Cube Attacks on PRESENT}, howpublished = {Cryptology ePrint Archive, Report 2011/165}, year = {2011}, url = {http://eprint.iacr.org/2011/165}, } @misc{cryptoeprint:2011:166, author = {Jeremy Clark and Urs Hengartner}, title = {Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance}, howpublished = {Cryptology ePrint Archive, Report 2011/166}, year = {2011}, url = {http://eprint.iacr.org/2011/166}, } @misc{cryptoeprint:2011:167, author = {Yalin Chen, Jue-Sam Chou, Cheng-Lun Wu, Chi-Fong Lin}, title = {Identifying Large-Scale RFID Tags Using Non-Cryptographic Approach}, howpublished = {Cryptology ePrint Archive, Report 2011/167}, year = {2011}, url = {http://eprint.iacr.org/2011/167}, } @misc{cryptoeprint:2011:168, author = {Douglas Wikstr{\"o}m}, title = {A Commitment-Consistent Proof of a Shuffle}, howpublished = {Cryptology ePrint Archive, Report 2011/168}, year = {2011}, url = {http://eprint.iacr.org/2011/168}, } @misc{cryptoeprint:2011:169, author = {Hongwei Li, Yuanshun Dai, Bo Yang}, title = {Identity-Based Cryptography for Cloud Security}, howpublished = {Cryptology ePrint Archive, Report 2011/169}, year = {2011}, url = {http://eprint.iacr.org/2011/169}, } @misc{cryptoeprint:2011:170, author = {Jonathan Taverne and Armando Faz-Hern\'andez and Diego F. Aranha and Francisco Rodr\'iguez-Henr\'iquez and Darrel Hankerson and Julio L\'opez}, title = {Software implementation of binary elliptic curves: impact of the carry-less multiplier on scalar multiplication}, howpublished = {Cryptology ePrint Archive, Report 2011/170}, year = {2011}, url = {http://eprint.iacr.org/2011/170}, } @misc{cryptoeprint:2011:171, author = {Manish Garg and Sugata Gangopadhyay }, title = {Good Second-order nonlinearity of a bent function via Niho Power function}, howpublished = {Cryptology ePrint Archive, Report 2011/171}, year = {2011}, url = {http://eprint.iacr.org/2011/171}, } @misc{cryptoeprint:2011:172, author = {T.V. Laptyeva and S. Flach and K. Kladko}, title = {The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs}, howpublished = {Cryptology ePrint Archive, Report 2011/172}, year = {2011}, url = {http://eprint.iacr.org/2011/172}, } @misc{cryptoeprint:2011:173, author = {Debiao He, Jianhua Chen}, title = {An efficient certificateless short signature scheme from pairings}, howpublished = {Cryptology ePrint Archive, Report 2011/173}, year = {2011}, url = {http://eprint.iacr.org/2011/173}, } @misc{cryptoeprint:2011:174, author = {Laszlo Csirmaz and Gabor Tardos}, title = {On-line secret sharing}, howpublished = {Cryptology ePrint Archive, Report 2011/174}, year = {2011}, url = {http://eprint.iacr.org/2011/174}, } @misc{cryptoeprint:2011:175, author = {Marine Minier, Maria Naya-Plasencia, and Thomas Peyrin}, title = {Analysis of reduced-SHAvite-3-256 v2}, howpublished = {Cryptology ePrint Archive, Report 2011/175}, year = {2011}, url = {http://eprint.iacr.org/2011/175}, } @misc{cryptoeprint:2011:176, author = {Sylvain Duquesne and Nicolas Guillermin}, title = {A FPGA pairing implementation using the Residue Number System}, howpublished = {Cryptology ePrint Archive, Report 2011/176}, year = {2011}, url = {http://eprint.iacr.org/2011/176}, } @misc{cryptoeprint:2011:177, author = {Muhammad Yasir Malik and Jong-Seon No}, title = {Dynamic MDS Matrices for Substantial Cryptographic Strength}, howpublished = {Cryptology ePrint Archive, Report 2011/177}, year = {2011}, url = {http://eprint.iacr.org/2011/177}, } @misc{cryptoeprint:2011:178, author = {Chong Hee KIM}, title = {Differential Fault Analysis of AES: Toward Reducing Number of Faults}, howpublished = {Cryptology ePrint Archive, Report 2011/178}, year = {2011}, url = {http://eprint.iacr.org/2011/178}, } @misc{cryptoeprint:2011:179, author = {Edoardo Persichetti}, title = {Compact McEliece keys based on Quasi-Dyadic Srivastava codes}, howpublished = {Cryptology ePrint Archive, Report 2011/179}, year = {2011}, url = {http://eprint.iacr.org/2011/179}, } @misc{cryptoeprint:2011:180, author = {Yehuda Lindell}, title = {Highly-Efficient Universally-Composable Commitments based on the DDH Assumption}, howpublished = {Cryptology ePrint Archive, Report 2011/180}, year = {2011}, url = {http://eprint.iacr.org/2011/180}, } @misc{cryptoeprint:2011:181, author = {Santosh Ghosh, Debdeep Mukhopadhyay, and Dipanwita Roy Chowdhury}, title = {Security of Prime Field Pairing Cryptoprocessor Against Differential Power Attack}, howpublished = {Cryptology ePrint Archive, Report 2011/181}, year = {2011}, url = {http://eprint.iacr.org/2011/181}, } @misc{cryptoeprint:2011:182, author = {Guilin Wang, Fubiao Xia, and Yunlei Zhao}, title = {Designated Confirmer Signatures With Unified Verification}, howpublished = {Cryptology ePrint Archive, Report 2011/182}, year = {2011}, url = {http://eprint.iacr.org/2011/182}, } @misc{cryptoeprint:2011:183, author = {G.N.Purohit, Asmita SIngh Rawat}, title = {Elliptic Curve Point Multiplication Using MBNR and Point Halving}, howpublished = {Cryptology ePrint Archive, Report 2011/183}, year = {2011}, url = {http://eprint.iacr.org/2011/183}, } @misc{cryptoeprint:2011:184, author = {Ghulam Murtaza and Azhar Ali Khan and Syed Wasi Alam and Aqeel Farooqi}, title = {Fortification of AES with Dynamic Mix-Column Transformation}, howpublished = {Cryptology ePrint Archive, Report 2011/184}, year = {2011}, url = {http://eprint.iacr.org/2011/184}, } @misc{cryptoeprint:2011:185, author = {Zhibin Zhou and Dijiang Huang}, title = {Efficient and Secure Data Storage Operations for Mobile Cloud Computing}, howpublished = {Cryptology ePrint Archive, Report 2011/185}, year = {2011}, url = {http://eprint.iacr.org/2011/185}, } @misc{cryptoeprint:2011:186, author = {Umadevi Ganugula and Prabal Paul}, title = {Some aspects of multi-variable secret sharing}, howpublished = {Cryptology ePrint Archive, Report 2011/186}, year = {2011}, url = {http://eprint.iacr.org/2011/186}, } @misc{cryptoeprint:2011:187, author = {Hyung Tae Lee and Jung Hee Cheon and Jin Hong}, title = {Analysis of Discrete Logarithm Algorithm using Pre-computation}, howpublished = {Cryptology ePrint Archive, Report 2011/187}, year = {2011}, url = {http://eprint.iacr.org/2011/187}, } @misc{cryptoeprint:2011:188, author = {Ulrich Rührmair}, title = {Physical Turing Machines and the Formalization of Physical Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2011/188}, year = {2011}, url = {http://eprint.iacr.org/2011/188}, } @misc{cryptoeprint:2011:189, author = {Ulrich Rührmair}, title = {SIMPL Systems as a Keyless Cryptographic and Security Primitive}, howpublished = {Cryptology ePrint Archive, Report 2011/189}, year = {2011}, url = {http://eprint.iacr.org/2011/189}, } @misc{cryptoeprint:2011:190, author = {Peng Xu and Hai Jin}, title = {SHS: Secure Hybrid Search by Combining Dynamic and Static Indexes in PEKS}, howpublished = {Cryptology ePrint Archive, Report 2011/190}, year = {2011}, url = {http://eprint.iacr.org/2011/190}, } @misc{cryptoeprint:2011:191, author = {Johannes Buchmann and Erik Dahmen and Sarah Ereth and Andreas Hülsing and Markus Rückert}, title = {On the Security of the Winternitz One-Time Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2011/191}, year = {2011}, url = {http://eprint.iacr.org/2011/191}, } @misc{cryptoeprint:2011:192, author = {Joseph K. Liu and Feng Bao and Jianying Zhou}, title = {Short and Efficient Certificate-Based Signature}, howpublished = {Cryptology ePrint Archive, Report 2011/192}, year = {2011}, url = {http://eprint.iacr.org/2011/192}, } @misc{cryptoeprint:2011:193, author = {Nasour Bagheri, Masoumeh Safkhani, Majid Naderi, and Somitra Kumar Sanadhya}, title = {Security Analysis of $LMAP^{++}$, an RFID Authentication Protocol}, howpublished = {Cryptology ePrint Archive, Report 2011/193}, year = {2011}, url = {http://eprint.iacr.org/2011/193}, } @misc{cryptoeprint:2011:194, author = {Masoumeh Safkhani, Nasour Bagheri and Majid Naderi}, title = {Cryptanalysis of Chen \textit{et al.}'s RFID Access Control Protocol}, howpublished = {Cryptology ePrint Archive, Report 2011/194}, year = {2011}, url = {http://eprint.iacr.org/2011/194}, } @misc{cryptoeprint:2011:195, author = {Debiao He}, title = {An ID-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments}, howpublished = {Cryptology ePrint Archive, Report 2011/195}, year = {2011}, url = {http://eprint.iacr.org/2011/195}, } @misc{cryptoeprint:2011:196, author = {Ye Zhang and Chun Jason Xue and Duncan S. Wong and Nikos Mamoulis and S.M. Yiu}, title = {Acceleration of Composite Order Bilinear Pairing on Graphics Hardware}, howpublished = {Cryptology ePrint Archive, Report 2011/196}, year = {2011}, url = {http://eprint.iacr.org/2011/196}, } @misc{cryptoeprint:2011:197, author = {Puwen Wei and Yuliang Zheng and Xiaoyun Wang}, title = {Public Key Encryption for the Forgetful}, howpublished = {Cryptology ePrint Archive, Report 2011/197}, year = {2011}, url = {http://eprint.iacr.org/2011/197}, } @misc{cryptoeprint:2011:198, author = {Guillaume Hanrot and Xavier Pujol and Damien Stehlé}, title = {Terminating BKZ}, howpublished = {Cryptology ePrint Archive, Report 2011/198}, year = {2011}, url = {http://eprint.iacr.org/2011/198}, } @misc{cryptoeprint:2011:199, author = {Omran Ahmadi and Robert Granger}, title = {An efficient deterministic test for Kloosterman sum zeros}, howpublished = {Cryptology ePrint Archive, Report 2011/199}, year = {2011}, url = {http://eprint.iacr.org/2011/199}, } @misc{cryptoeprint:2011:200, author = {Georg Neugebauer and Ulrike Meyer and Susanne Wetzel}, title = {Fair and Privacy-Preserving Multi-Party Protocols for Reconciling Ordered Input Sets (Extended version)}, howpublished = {Cryptology ePrint Archive, Report 2011/200}, year = {2011}, url = {http://eprint.iacr.org/2011/200}, } @misc{cryptoeprint:2011:201, author = {Lei Wei and Christian Rechberger and Jian Guo and Hongjun Wu and Huaxiong Wang and San Ling}, title = {Improved Meet-in-the-Middle Cryptanalysis of KTANTAN}, howpublished = {Cryptology ePrint Archive, Report 2011/201}, year = {2011}, url = {http://eprint.iacr.org/2011/201}, } @misc{cryptoeprint:2011:202, author = {Markku-Juhani O. Saarinen}, title = {GCM, GHASH and Weak Keys}, howpublished = {Cryptology ePrint Archive, Report 2011/202}, year = {2011}, url = {http://eprint.iacr.org/2011/202}, } @misc{cryptoeprint:2011:203, author = {Juha Partala}, title = {Key agreement based on homomorphisms of algebraic structures}, howpublished = {Cryptology ePrint Archive, Report 2011/203}, year = {2011}, url = {http://eprint.iacr.org/2011/203}, } @misc{cryptoeprint:2011:204, author = {Nir Bitansky and Ran Canetti and Shai Halevi}, title = {Leakage Tolerant Interactive Protocols}, howpublished = {Cryptology ePrint Archive, Report 2011/204}, year = {2011}, url = {http://eprint.iacr.org/2011/204}, } @misc{cryptoeprint:2011:205, author = {Chunbo Ma and Jun Ao}, title = {Group-oriented ring signature}, howpublished = {Cryptology ePrint Archive, Report 2011/205}, year = {2011}, url = {http://eprint.iacr.org/2011/205}, } @misc{cryptoeprint:2011:206, author = {Dustin Moody and Hongfeng Wu}, title = {Fq-Isomorphism classes of Edwards and twisted Edwards curves}, howpublished = {Cryptology ePrint Archive, Report 2011/206}, year = {2011}, url = {http://eprint.iacr.org/2011/206}, } @misc{cryptoeprint:2011:207, author = {Shai Halevi, Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg}, title = {Proofs of Ownership in Remote Storage Systems}, howpublished = {Cryptology ePrint Archive, Report 2011/207}, year = {2011}, url = {http://eprint.iacr.org/2011/207}, } @misc{cryptoeprint:2011:208, author = {Jian Weng and Yunlei Zhao}, title = {Direct Constructions of Bidirectional Proxy Re-Encryption with Alleviated Trust in Proxy}, howpublished = {Cryptology ePrint Archive, Report 2011/208}, year = {2011}, url = {http://eprint.iacr.org/2011/208}, } @misc{cryptoeprint:2011:209, author = {Zvika Brakerski and Gil Segev}, title = {Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting}, howpublished = {Cryptology ePrint Archive, Report 2011/209}, year = {2011}, url = {http://eprint.iacr.org/2011/209}, } @misc{cryptoeprint:2011:210, author = {Jooyoung Lee and Martijn Stam and John Steinberger}, title = {The preimage security of double-block-length compression functions}, howpublished = {Cryptology ePrint Archive, Report 2011/210}, year = {2011}, url = {http://eprint.iacr.org/2011/210}, } @misc{cryptoeprint:2011:211, author = {Nicolas T. Courtois}, title = {Security Evaluation of GOST 28147-89 In View Of International Standardisation}, howpublished = {Cryptology ePrint Archive, Report 2011/211}, year = {2011}, url = {http://eprint.iacr.org/2011/211}, } @misc{cryptoeprint:2011:212, author = {Nicholas Kolokotronis and Konstantinos Limniotis}, title = {Maiorana-McFarland Functions with High Second-Order Nonlinearity}, howpublished = {Cryptology ePrint Archive, Report 2011/212}, year = {2011}, url = {http://eprint.iacr.org/2011/212}, } @misc{cryptoeprint:2011:213, author = {M.R. Albrecht and P. Farshim and K.G. Paterson and G.J. Watson}, title = {On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model}, howpublished = {Cryptology ePrint Archive, Report 2011/213}, year = {2011}, url = {http://eprint.iacr.org/2011/213}, } @misc{cryptoeprint:2011:214, author = {Charles Rackoff}, title = {On ``identities'', ``names'', ``NAMES'', ``ROLES'' and Security: A Manifesto}, howpublished = {Cryptology ePrint Archive, Report 2011/214}, year = {2011}, url = {http://eprint.iacr.org/2011/214}, } @misc{cryptoeprint:2011:215, author = {M. Barbosa and P. Farshim}, title = {Delegatable Homomorphic Encryption with Applications to Fully Secure Outsourcing of Computation}, howpublished = {Cryptology ePrint Archive, Report 2011/215}, year = {2011}, url = {http://eprint.iacr.org/2011/215}, } @misc{cryptoeprint:2011:216, author = {Shaohua Tang and Jintai Ding and Zhiming Yang}, title = {Secure Group Key Management Approach Based upon N-dimensional Hyper-sphere}, howpublished = {Cryptology ePrint Archive, Report 2011/216}, year = {2011}, url = {http://eprint.iacr.org/2011/216}, } @misc{cryptoeprint:2011:217, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, title = {Identity Based Deterministic Signature Scheme With Tight Reduction}, howpublished = {Cryptology ePrint Archive, Report 2011/217}, year = {2011}, url = {http://eprint.iacr.org/2011/217}, } @misc{cryptoeprint:2011:218, author = {Markku-Juhani O. Saarinen}, title = {Cryptanalysis of All 4 x 4-Bit S-Boxes}, howpublished = {Cryptology ePrint Archive, Report 2011/218}, year = {2011}, url = {http://eprint.iacr.org/2011/218}, } @misc{cryptoeprint:2011:219, author = {Tibor Jager, Florian Kohlar, Sven Schäge, and Jörg Schwenk }, title = {A Standard-Model Security Analysis of TLS}, howpublished = {Cryptology ePrint Archive, Report 2011/219}, year = {2011}, url = {http://eprint.iacr.org/2011/219}, } @misc{cryptoeprint:2011:220, author = {István Vajda}, title = {Framework for Security Proofs for On-demand Routing Protocols in Multi-Hop Wireless Networks}, howpublished = {Cryptology ePrint Archive, Report 2011/220}, year = {2011}, url = {http://eprint.iacr.org/2011/220}, } @misc{cryptoeprint:2011:221, author = {Leo Dorrendorf}, title = {Protecting Drive Encryption Systems Against Memory Attacks}, howpublished = {Cryptology ePrint Archive, Report 2011/221}, year = {2011}, url = {http://eprint.iacr.org/2011/221}, } @misc{cryptoeprint:2011:222, author = {Kyle Brogle and Sharon Goldberg and Leonid Reyzin}, title = {Sequential Aggregate Signatures with Lazy Verification}, howpublished = {Cryptology ePrint Archive, Report 2011/222}, year = {2011}, url = {http://eprint.iacr.org/2011/222}, } @misc{cryptoeprint:2011:223, author = {Zeng Bing and Chen Liang and Tang Xueming}, title = {Lattice-Based Information-Theoretically Binding Commitment Schemes}, howpublished = {Cryptology ePrint Archive, Report 2011/223}, year = {2011}, url = {http://eprint.iacr.org/2011/223}, } @misc{cryptoeprint:2011:224, author = {Xu An Wang and Liqiang Wu and Xiaoyuan Yang and Huaqun Wang}, title = {Cryptanalysis and Improvement of an Efficient CCA Secure PKE Scheme}, howpublished = {Cryptology ePrint Archive, Report 2011/224}, year = {2011}, url = {http://eprint.iacr.org/2011/224}, } @misc{cryptoeprint:2011:225, author = {Shaohua Tang and Jintai Ding and Yujun Liang}, title = {A Simple and Efficient New Group Key Management Approach Based on Linear Geometry}, howpublished = {Cryptology ePrint Archive, Report 2011/225}, year = {2011}, url = {http://eprint.iacr.org/2011/225}, } @misc{cryptoeprint:2011:226, author = {Eric Miles and Emanuele Viola}, title = {The Advanced Encryption Standard, Candidate Pseudorandom Functions, and Natural Proofs}, howpublished = {Cryptology ePrint Archive, Report 2011/226}, year = {2011}, url = {http://eprint.iacr.org/2011/226}, } @misc{cryptoeprint:2011:227, author = {Alexander Barg and Grigory Kabatiansky}, title = {Robust parent-identifying codes and combinatorial arrays}, howpublished = {Cryptology ePrint Archive, Report 2011/227}, year = {2011}, url = {http://eprint.iacr.org/2011/227}, } @misc{cryptoeprint:2011:228, author = {Jan Camenisch and Stephan Krenn and Victor Shoup}, title = {A Framework for Practical Universally Composable Zero-Knowledge Protocols}, howpublished = {Cryptology ePrint Archive, Report 2011/228}, year = {2011}, url = {http://eprint.iacr.org/2011/228}, } @misc{cryptoeprint:2011:229, author = {Md. Golam Kaosar}, title = {Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network }, howpublished = {Cryptology ePrint Archive, Report 2011/229}, year = {2011}, url = {http://eprint.iacr.org/2011/229}, } @misc{cryptoeprint:2011:230, author = {Dennis Hofheinz}, title = {All-But-Many Lossy Trapdoor Functions}, howpublished = {Cryptology ePrint Archive, Report 2011/230}, year = {2011}, url = {http://eprint.iacr.org/2011/230}, } @misc{cryptoeprint:2011:231, author = {Marc Fischlin and Anja Lehmann and Dominique Schröder }, title = {History-Free Sequential Aggregate Signatures}, howpublished = {Cryptology ePrint Archive, Report 2011/231}, year = {2011}, url = {http://eprint.iacr.org/2011/231}, } @misc{cryptoeprint:2011:232, author = {Billy Bob Brumley and Nicola Tuveri}, title = {Remote Timing Attacks are Still Practical}, howpublished = {Cryptology ePrint Archive, Report 2011/232}, year = {2011}, url = {http://eprint.iacr.org/2011/232}, } @misc{cryptoeprint:2011:233, author = {Vipul Goyal and Adam O'Neill and Vanishree Rao}, title = {Correlated-Input Secure Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2011/233}, year = {2011}, url = {http://eprint.iacr.org/2011/233}, } @misc{cryptoeprint:2011:234, author = {Debiao He}, title = {Comments on a secure dynamic ID-based remote user authentication scheme for multi-server environment using smart cards}, howpublished = {Cryptology ePrint Archive, Report 2011/234}, year = {2011}, url = {http://eprint.iacr.org/2011/234}, } @misc{cryptoeprint:2011:235, author = {Simon Kramer and Rajeev Goré and Eiji Okamoto}, title = {Computer-Aided Decision-Making for Formal Relations and Domains of Trust, Distrust, and Mistrust with Cryptographic Applications}, howpublished = {Cryptology ePrint Archive, Report 2011/235}, year = {2011}, url = {http://eprint.iacr.org/2011/235}, } @misc{cryptoeprint:2011:236, author = {Neil Hanley and Michael Tunstall and William P. Marnane}, title = {Using Templates to Distinguish Multiplications from Squaring Operations}, howpublished = {Cryptology ePrint Archive, Report 2011/236}, year = {2011}, url = {http://eprint.iacr.org/2011/236}, } @misc{cryptoeprint:2011:237, author = {Alice Nguyenova-Stepanikova and Tran Ngoc Duong}, title = {The block cipher NSABC (public domain)}, howpublished = {Cryptology ePrint Archive, Report 2011/237}, year = {2011}, url = {http://eprint.iacr.org/2011/237}, } @misc{cryptoeprint:2011:238, author = {Yiyuan Luo, Xuejia Lai}, title = {Attacks On a Double Length Blockcipher-based Hash Proposal}, howpublished = {Cryptology ePrint Archive, Report 2011/238}, year = {2011}, url = {http://eprint.iacr.org/2011/238}, } @misc{cryptoeprint:2011:239, author = {Shay Gueron}, title = {Efficient Software Implementations of Modular Exponentiation}, howpublished = {Cryptology ePrint Archive, Report 2011/239}, year = {2011}, url = {http://eprint.iacr.org/2011/239}, } @misc{cryptoeprint:2011:240, author = {Mike Rosulek}, title = {Universal Composability from Essentially Any Trusted Setup}, howpublished = {Cryptology ePrint Archive, Report 2011/240}, year = {2011}, url = {http://eprint.iacr.org/2011/240}, } @misc{cryptoeprint:2011:241, author = {Xiuqun Wang}, title = {A Novel Adaptive Proactive Secret Sharing without a Trusted Party }, howpublished = {Cryptology ePrint Archive, Report 2011/241}, year = {2011}, url = {http://eprint.iacr.org/2011/241}, } @misc{cryptoeprint:2011:242, author = {Idan Sheetrit and Avishai Wool}, title = {Cryptanalysis of KeeLoq code-hopping using a Single FPGA}, howpublished = {Cryptology ePrint Archive, Report 2011/242}, year = {2011}, url = {http://eprint.iacr.org/2011/242}, } @misc{cryptoeprint:2011:243, author = {Tolga Acar and Kristin Lauter and Michael Naehrig and Daniel Shumow}, title = {Affine Pairings on ARM}, howpublished = {Cryptology ePrint Archive, Report 2011/243}, year = {2011}, url = {http://eprint.iacr.org/2011/243}, } @misc{cryptoeprint:2011:244, author = {Erik-Oliver Blass and Roberto Di Pietro and Refik Molva and Melek Onen}, title = {PRISM -- Privacy-Preserving Searches in MapReduce}, howpublished = {Cryptology ePrint Archive, Report 2011/244}, year = {2011}, url = {http://eprint.iacr.org/2011/244}, } @misc{cryptoeprint:2011:245, author = {Jean-Pierre Flori and Hugues Randriam}, title = {On the Number of Carries Occuring in an Addition $\mod 2^k-1$}, howpublished = {Cryptology ePrint Archive, Report 2011/245}, year = {2011}, url = {http://eprint.iacr.org/2011/245}, } @misc{cryptoeprint:2011:246, author = {Bernardo Machado David, Rafael Tonicelli, Anderson Nascimento, Dino Amaral, Laerte Peotta}, title = {Secure Single Sign-On and Web Authentication}, howpublished = {Cryptology ePrint Archive, Report 2011/246}, year = {2011}, url = {http://eprint.iacr.org/2011/246}, } @misc{cryptoeprint:2011:247, author = {Qi Chai, Xinxin Fan, Guang Gong}, title = {An Ultra-Efficient Key Recovery Attack on the Lightweight Stream Cipher A2U2}, howpublished = {Cryptology ePrint Archive, Report 2011/247}, year = {2011}, url = {http://eprint.iacr.org/2011/247}, } @misc{cryptoeprint:2011:248, author = {Fanbao Liu and Yi Liu and Tao Xie and Yumeng Feng}, title = {Fast Password Recovery Attack: Application to APOP }, howpublished = {Cryptology ePrint Archive, Report 2011/248}, year = {2011}, url = {http://eprint.iacr.org/2011/248}, } @misc{cryptoeprint:2011:249, author = {W. Han}, title = {Breaking a certificateless key agreement protocol withour bilinear pairing}, howpublished = {Cryptology ePrint Archive, Report 2011/249}, year = {2011}, url = {http://eprint.iacr.org/2011/249}, } @misc{cryptoeprint:2011:250, author = {Zvika Brakerski and Yael Tauman Kalai}, title = {A Parallel Repetition Theorem for Leakage Resilience}, howpublished = {Cryptology ePrint Archive, Report 2011/250}, year = {2011}, url = {http://eprint.iacr.org/2011/250}, } @misc{cryptoeprint:2011:251, author = {Sanjam Garg and Vipul Goyal and Abhishek Jain and Amit Sahai}, title = {Concurrently Secure Computation in Constant Rounds}, howpublished = {Cryptology ePrint Archive, Report 2011/251}, year = {2011}, url = {http://eprint.iacr.org/2011/251}, } @misc{cryptoeprint:2011:252, author = {Mihir Bellare and David Cash and Rachel Miller}, title = {A Comparitive Study of Achievability of Security against Related-Key Attack}, howpublished = {Cryptology ePrint Archive, Report 2011/252}, year = {2011}, url = {http://eprint.iacr.org/2011/252}, } @misc{cryptoeprint:2011:253, author = {Mingqiang Wang and Xiaoyun Wang and Tao Zhan}, title = {Attack Cryptosystems Based on HCDLP}, howpublished = {Cryptology ePrint Archive, Report 2011/253}, year = {2011}, url = {http://eprint.iacr.org/2011/253}, } @misc{cryptoeprint:2011:254, author = {T. Kleinjung and A.K. Lenstra and D. Page and N.P. Smart}, title = {Using the Cloud to Determine Key Strengths}, howpublished = {Cryptology ePrint Archive, Report 2011/254}, year = {2011}, url = {http://eprint.iacr.org/2011/254}, } @misc{cryptoeprint:2011:255, author = {Sascha Müller and Stefan Katzenbeisser}, title = {Hiding the Policy in Cryptographic Access Control}, howpublished = {Cryptology ePrint Archive, Report 2011/255}, year = {2011}, url = {http://eprint.iacr.org/2011/255}, } @misc{cryptoeprint:2011:256, author = {Ivan Damgaard and Carmit Hazay and Arpita Patra}, title = {Leakage Resilient Secure Two-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2011/256}, year = {2011}, url = {http://eprint.iacr.org/2011/256}, } @misc{cryptoeprint:2011:257, author = {Seung Geol Choi and Kyung-Wook Hwang and Jonathan Katz and Tal Malkin and Dan Rubenstein}, title = {Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces}, howpublished = {Cryptology ePrint Archive, Report 2011/257}, year = {2011}, url = {http://eprint.iacr.org/2011/257}, } @misc{cryptoeprint:2011:258, author = {Gavin Xiaoxu Yao and Junfeng Fan and Ray C.C. Cheung and Ingrid Verbauwhede}, title = {A High Speed Pairing Coprocessor Using RNS and Lazy Reduction}, howpublished = {Cryptology ePrint Archive, Report 2011/258}, year = {2011}, url = {http://eprint.iacr.org/2011/258}, } @misc{cryptoeprint:2011:259, author = {Douglas R.~Stinson}, title = {Comments on a sensor network key redistribution technique of Cichon, Golebiewski and Kutylowski}, howpublished = {Cryptology ePrint Archive, Report 2011/259}, year = {2011}, url = {http://eprint.iacr.org/2011/259}, } @misc{cryptoeprint:2011:260, author = {Cristina Onete and Daniele Venturi}, title = {Security \& Indistinguishability in the Presence of Traffic Analysis}, howpublished = {Cryptology ePrint Archive, Report 2011/260}, year = {2011}, url = {http://eprint.iacr.org/2011/260}, } @misc{cryptoeprint:2011:261, author = {Danilo Gligoroski and Rune Steinsmo Ødeård and Rune Erlend Jensen}, title = {OBSERVATION: An explicit form for a class of second preimages for any message M for the SHA-3 candidate Keccak}, howpublished = {Cryptology ePrint Archive, Report 2011/261}, year = {2011}, url = {http://eprint.iacr.org/2011/261}, } @misc{cryptoeprint:2011:262, author = {Mohamed Ahmed Abdelraheem and Julia Borghoff and Erik Zenner}, title = {Cryptanalysis of the Light-Weight Cipher A2U2 - Reduced draft version}, howpublished = {Cryptology ePrint Archive, Report 2011/262}, year = {2011}, url = {http://eprint.iacr.org/2011/262}, } @misc{cryptoeprint:2011:263, author = {Fangguo Zhang}, title = {The Computational Square-Root Exponent Problem- Revisited}, howpublished = {Cryptology ePrint Archive, Report 2011/263}, year = {2011}, url = {http://eprint.iacr.org/2011/263}, } @misc{cryptoeprint:2011:264, author = {Dominique Schröder and Dominique Unruh}, title = {Round Optimal Blind Signatures}, howpublished = {Cryptology ePrint Archive, Report 2011/264}, year = {2011}, url = {http://eprint.iacr.org/2011/264}, } @misc{cryptoeprint:2011:265, author = {Qiushi Yang and Yvo Desmedt}, title = {Efficient 2-Round General Perfectly Secure Message Transmission: A Minor Correction to Yang and Desmedt's Protocol}, howpublished = {Cryptology ePrint Archive, Report 2011/265}, year = {2011}, url = {http://eprint.iacr.org/2011/265}, } @misc{cryptoeprint:2011:266, author = {Daniel R. L. Brown}, title = {Identity-Based Decryption}, howpublished = {Cryptology ePrint Archive, Report 2011/266}, year = {2011}, url = {http://eprint.iacr.org/2011/266}, } @misc{cryptoeprint:2011:267, author = {Myungsun Kim and Hyung Tae Lee and Jung Hee Cheon}, title = {Prime Representation and Its Efficient Application to Privacy-Preserving Set Intersection with Minimal Ciphertexts}, howpublished = {Cryptology ePrint Archive, Report 2011/267}, year = {2011}, url = {http://eprint.iacr.org/2011/267}, } @misc{cryptoeprint:2011:268, author = {Raja Zeshan Haider}, title = {Birthday Forgery Attack on 128-EIA3 Version 1.5}, howpublished = {Cryptology ePrint Archive, Report 2011/268}, year = {2011}, url = {http://eprint.iacr.org/2011/268}, } @misc{cryptoeprint:2011:269, author = {Mihir Bellare and Sriram Keelveedhi}, title = {Authenticated and Misuse-Resistant Encryption of Key-Dependent Data}, howpublished = {Cryptology ePrint Archive, Report 2011/269}, year = {2011}, url = {http://eprint.iacr.org/2011/269}, } @misc{cryptoeprint:2011:270, author = {Dennis Hofheinz and Eike Kiltz}, title = {Programmable Hash Functions and Their Applications}, howpublished = {Cryptology ePrint Archive, Report 2011/270}, year = {2011}, url = {http://eprint.iacr.org/2011/270}, } @misc{cryptoeprint:2011:271, author = {Charles Bouillaguet and Pierre-Alain Fouque and Gilles Macario-Rat}, title = {Practical Key-recovery For All Possible Parameters of SFLASH}, howpublished = {Cryptology ePrint Archive, Report 2011/271}, year = {2011}, url = {http://eprint.iacr.org/2011/271}, } @misc{cryptoeprint:2011:272, author = {Seny Kamara and Payman Mohassel and Mariana Raykova}, title = {Outsourcing Multi-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2011/272}, year = {2011}, url = {http://eprint.iacr.org/2011/272}, } @misc{cryptoeprint:2011:273, author = {Kai-Min Chung and Yael Tauman Kalai and Feng-Hao Liu and Ran Raz}, title = {Memory Delegation}, howpublished = {Cryptology ePrint Archive, Report 2011/273}, year = {2011}, url = {http://eprint.iacr.org/2011/273}, } @misc{cryptoeprint:2011:274, author = {Dmitry Khovratovich and Christian Rechberger}, title = {A Splice-and-Cut Cryptanalysis of the AES}, howpublished = {Cryptology ePrint Archive, Report 2011/274}, year = {2011}, url = {http://eprint.iacr.org/2011/274}, } @misc{cryptoeprint:2011:275, author = {Jintai Ding}, title = {Inverting Square systems algebraically is exponential}, howpublished = {Cryptology ePrint Archive, Report 2011/275}, year = {2011}, url = {http://eprint.iacr.org/2011/275}, } @misc{cryptoeprint:2011:276, author = {Stephen C. Williams}, title = {Analysis of the SSH Key Exchange Protocol}, howpublished = {Cryptology ePrint Archive, Report 2011/276}, year = {2011}, url = {http://eprint.iacr.org/2011/276}, } @misc{cryptoeprint:2011:277, author = {Craig Gentry}, title = {Fully Homomorphic Encryption without Bootstrapping}, howpublished = {Cryptology ePrint Archive, Report 2011/277}, year = {2011}, url = {http://eprint.iacr.org/2011/277}, } @misc{cryptoeprint:2011:278, author = {Can Zhang}, title = {Comparing Different Definitions of Secure Session}, howpublished = {Cryptology ePrint Archive, Report 2011/278}, year = {2011}, url = {http://eprint.iacr.org/2011/278}, } @misc{cryptoeprint:2011:279, author = {Craig Gentry and Shai Halevi}, title = {Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits}, howpublished = {Cryptology ePrint Archive, Report 2011/279}, year = {2011}, url = {http://eprint.iacr.org/2011/279}, } @misc{cryptoeprint:2011:280, author = {Ronald Cramer and Ivan Damgaard and Eike Kiltz and Sarah Zakarias and Angela Zottarel}, title = {DDH-like Assumptions Based on Extension Rings}, howpublished = {Cryptology ePrint Archive, Report 2011/280}, year = {2011}, url = {http://eprint.iacr.org/2011/280}, } @misc{cryptoeprint:2011:281, author = {Michael Backes and Aniket Kate and Arpita Patra }, title = {Computational Verifiable Secret Sharing Revisited}, howpublished = {Cryptology ePrint Archive, Report 2011/281}, year = {2011}, url = {http://eprint.iacr.org/2011/281}, } @misc{cryptoeprint:2011:282, author = {Itai Dinur and Tim Güneysu and Christof Paar and Adi Shamir and Ralf Zimmermann}, title = {An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware}, howpublished = {Cryptology ePrint Archive, Report 2011/282}, year = {2011}, url = {http://eprint.iacr.org/2011/282}, } @misc{cryptoeprint:2011:283, author = {Mingqiang Wang and Xiaoyun Wang and Tao Zhan}, title = {The Fault Attack ECDLP Revisited}, howpublished = {Cryptology ePrint Archive, Report 2011/283}, year = {2011}, url = {http://eprint.iacr.org/2011/283}, } @misc{cryptoeprint:2011:284, author = {Fanbao Liu and Yumeng Feng and Yuan Cao}, title = {On the Security of PPPoE Network}, howpublished = {Cryptology ePrint Archive, Report 2011/284}, year = {2011}, url = {http://eprint.iacr.org/2011/284}, } @misc{cryptoeprint:2011:285, author = {Andrea Röck and Kaisa Nyberg}, title = {Exploiting Linear Hull in Matsui’s Algorithm 1 (extended version)}, howpublished = {Cryptology ePrint Archive, Report 2011/285}, year = {2011}, url = {http://eprint.iacr.org/2011/285}, } @misc{cryptoeprint:2011:286, author = {Dmitry Khovratovich and Christian Rechberger and Alexandra Savelieva}, title = {Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family}, howpublished = {Cryptology ePrint Archive, Report 2011/286}, year = {2011}, url = {http://eprint.iacr.org/2011/286}, } @misc{cryptoeprint:2011:287, author = {Stanislav Bulygin}, title = {Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48}, howpublished = {Cryptology ePrint Archive, Report 2011/287}, year = {2011}, url = {http://eprint.iacr.org/2011/287}, } @misc{cryptoeprint:2011:288, author = {Ashish Choudhury and Arpita Patra}, title = {On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks}, howpublished = {Cryptology ePrint Archive, Report 2011/288}, year = {2011}, url = {http://eprint.iacr.org/2011/288}, } @misc{cryptoeprint:2011:289, author = {Martin R. Albrecht and Pooya Farshim and Jean-Charles Faugère and Ludovic Perret}, title = {Polly Cracker, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2011/289}, year = {2011}, url = {http://eprint.iacr.org/2011/289}, } @misc{cryptoeprint:2011:290, author = {Pantelimon Stanica, Sugata Gangopadhyay, Brajesh Kumar Singh}, title = {Some Results Concerning Generalized Bent Functions}, howpublished = {Cryptology ePrint Archive, Report 2011/290}, year = {2011}, url = {http://eprint.iacr.org/2011/290}, } @misc{cryptoeprint:2011:291, author = {Elette Boyle and Shafi Goldwasser and Yael Tauman Kalai}, title = {Leakage-Resilient Coin Tossing}, howpublished = {Cryptology ePrint Archive, Report 2011/291}, year = {2011}, url = {http://eprint.iacr.org/2011/291}, } @misc{cryptoeprint:2011:292, author = {Namhun Koo and Gooc Hwa Jo and Soonhak Kwon}, title = {On Nonlinear Polynomial Selection and Geometric Progression (mod N) for Number Field Sieve}, howpublished = {Cryptology ePrint Archive, Report 2011/292}, year = {2011}, url = {http://eprint.iacr.org/2011/292}, } @misc{cryptoeprint:2011:293, author = {W. Han}, title = {Weakness of a Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2011/293}, year = {2011}, url = {http://eprint.iacr.org/2011/293}, } @misc{cryptoeprint:2011:294, author = {Albrecht Petzoldt and Enrico Thomae and Stanislav Bulygin and Christopher Wolf}, title = {Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems}, howpublished = {Cryptology ePrint Archive, Report 2011/294}, year = {2011}, url = {http://eprint.iacr.org/2011/294}, } @misc{cryptoeprint:2011:295, author = {P. Gaudry and D. Kohel and B. Smith}, title = {Counting Points on Genus 2 Curves with Real Multiplication}, howpublished = {Cryptology ePrint Archive, Report 2011/295}, year = {2011}, url = {http://eprint.iacr.org/2011/295}, } @misc{cryptoeprint:2011:296, author = {Dennis Hofheinz and Tibor Jager and Eike Kiltz}, title = {Short Signatures From Weaker Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2011/296}, year = {2011}, url = {http://eprint.iacr.org/2011/296}, } @misc{cryptoeprint:2011:297, author = {IGOR SEMAEV and MEHDI HASSANZADEH}, title = {NEW STATISTICAL BOX-TEST AND ITS POWER}, howpublished = {Cryptology ePrint Archive, Report 2011/297}, year = {2011}, url = {http://eprint.iacr.org/2011/297}, } @misc{cryptoeprint:2011:298, author = {Igor Semaev}, title = {Local limit theorem for large deviations and statistical box-tests }, howpublished = {Cryptology ePrint Archive, Report 2011/298}, year = {2011}, url = {http://eprint.iacr.org/2011/298}, } @misc{cryptoeprint:2011:299, author = {Palash Sarkar}, title = {On Authenticated Encryption Using Stream Ciphers Supporting an Initialisation Vector}, howpublished = {Cryptology ePrint Archive, Report 2011/299}, year = {2011}, url = {http://eprint.iacr.org/2011/299}, } @misc{cryptoeprint:2011:300, author = {Cas Cremers and Michele Feltz}, title = {One-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability}, howpublished = {Cryptology ePrint Archive, Report 2011/300}, year = {2011}, url = {http://eprint.iacr.org/2011/300}, } @misc{cryptoeprint:2011:301, author = {Ronald Cramer and Ivan Damgard and Valerio Pastro}, title = {On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations}, howpublished = {Cryptology ePrint Archive, Report 2011/301}, year = {2011}, url = {http://eprint.iacr.org/2011/301}, } @misc{cryptoeprint:2011:302, author = {Julien Doget and Emmanuel Prouff and Matthieu Rivain and François-Xavier Standaert}, title = {Univariate Side Channel Attacks and Leakage Modeling}, howpublished = {Cryptology ePrint Archive, Report 2011/302}, year = {2011}, url = {http://eprint.iacr.org/2011/302}, } @misc{cryptoeprint:2011:303, author = {Dennis Hofheinz and Victor Shoup}, title = {GNUC: A New Universal Composability Framework}, howpublished = {Cryptology ePrint Archive, Report 2011/303}, year = {2011}, url = {http://eprint.iacr.org/2011/303}, } @misc{cryptoeprint:2011:304, author = {Jia XU}, title = {Auditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage}, howpublished = {Cryptology ePrint Archive, Report 2011/304}, year = {2011}, url = {http://eprint.iacr.org/2011/304}, } @misc{cryptoeprint:2011:305, author = {Seyyed Amir Mortazavi}, title = {A new attack on Jakobsson Hybrid Mix-Net}, howpublished = {Cryptology ePrint Archive, Report 2011/305}, year = {2011}, url = {http://eprint.iacr.org/2011/305}, } @misc{cryptoeprint:2011:306, author = {Craig Costello and Kristin Lauter}, title = {Geometric Group Law Computations on Jacobians of Hyperelliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2011/306}, year = {2011}, url = {http://eprint.iacr.org/2011/306}, } @misc{cryptoeprint:2011:307, author = {ZiJie Xu and Ke Xu}, title = {Differential Cryptanalysis data-dependent circular shift}, howpublished = {Cryptology ePrint Archive, Report 2011/307}, year = {2011}, url = {http://eprint.iacr.org/2011/307}, } @misc{cryptoeprint:2011:308, author = {Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi}, title = {Provably Secure and Practical Onion Routing}, howpublished = {Cryptology ePrint Archive, Report 2011/308}, year = {2011}, url = {http://eprint.iacr.org/2011/308}, } @misc{cryptoeprint:2011:309, author = {Frederik Armknecht and Daniel Augot and Ludovic Perret and Ahmad-Reza Sadeghi}, title = {On Constructing Homomorphic Encryption Schemes from Coding Theory}, howpublished = {Cryptology ePrint Archive, Report 2011/309}, year = {2011}, url = {http://eprint.iacr.org/2011/309}, } @misc{cryptoeprint:2011:310, author = {Jonathan Katz and Ueli Maurer and Björn Tackmann and Vassilis Zikas}, title = {Universally Composable Synchronous Computation}, howpublished = {Cryptology ePrint Archive, Report 2011/310}, year = {2011}, url = {http://eprint.iacr.org/2011/310}, } @misc{cryptoeprint:2011:311, author = {Dan Boneh and Gil Segev and Brent Waters}, title = {Targeted Malleability: Homomorphic Encryption for Restricted Computations}, howpublished = {Cryptology ePrint Archive, Report 2011/311}, year = {2011}, url = {http://eprint.iacr.org/2011/311}, } @misc{cryptoeprint:2011:312, author = {Nicolas T. Courtois and Michal Misztal}, title = {Differential Cryptanalysis of GOST}, howpublished = {Cryptology ePrint Archive, Report 2011/312}, year = {2011}, url = {http://eprint.iacr.org/2011/312}, } @misc{cryptoeprint:2011:313, author = {Arpita Patra}, title = {Error-free Multi-valued Broadcast and Byzantine Agreement with Optimal Communication Complexity }, howpublished = {Cryptology ePrint Archive, Report 2011/313}, year = {2011}, url = {http://eprint.iacr.org/2011/313}, } @misc{cryptoeprint:2011:314, author = {Sebastian Faust and Krzysztof Pietrzak and Daniele Venturi}, title = {Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience}, howpublished = {Cryptology ePrint Archive, Report 2011/314}, year = {2011}, url = {http://eprint.iacr.org/2011/314}, } @misc{cryptoeprint:2011:315, author = {Zhi Hu and Patrick Longa and Maozhi Xu}, title = {Implementing 4-Dimensional GLV Method on GLS Elliptic Curves with j-Invariant 0}, howpublished = {Cryptology ePrint Archive, Report 2011/315}, year = {2011}, url = {http://eprint.iacr.org/2011/315}, } @misc{cryptoeprint:2011:316, author = {Dominique Schröder and Dominique Unruh}, title = {Security of Blind Signatures Revisited}, howpublished = {Cryptology ePrint Archive, Report 2011/316}, year = {2011}, url = {http://eprint.iacr.org/2011/316}, } @misc{cryptoeprint:2011:317, author = {Helger Lipmaa}, title = {Two Simple Code-Verification Voting Protocols}, howpublished = {Cryptology ePrint Archive, Report 2011/317}, year = {2011}, url = {http://eprint.iacr.org/2011/317}, } @misc{cryptoeprint:2011:318, author = {Sujoy Sinha Roy and Chester Rebeiro and Debdeep Mukhopadhyay and Junko Takahashi and Toshinori Fukunaga}, title = {Scalar Multiplication on Koblitz Curves using $\tau^2-$NAF}, howpublished = {Cryptology ePrint Archive, Report 2011/318}, year = {2011}, url = {http://eprint.iacr.org/2011/318}, } @misc{cryptoeprint:2011:319, author = {Jan Camenisch and Kristiyan Haralambiev and Markulf Kohlweiss and Jorn Lapon and Vincent Naessens}, title = {Structure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties}, howpublished = {Cryptology ePrint Archive, Report 2011/319}, year = {2011}, url = {http://eprint.iacr.org/2011/319}, } @misc{cryptoeprint:2011:320, author = {Manan Nayak and Shashank Agrawal and Kannan Srinathan}, title = {Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks}, howpublished = {Cryptology ePrint Archive, Report 2011/320}, year = {2011}, url = {http://eprint.iacr.org/2011/320}, } @misc{cryptoeprint:2011:321, author = {Ulrich Duerholz and Marc Fischlin and Michael Kasper and Cristina Onete}, title = {A Formal Approach to Distance-Bounding RFID Protocols}, howpublished = {Cryptology ePrint Archive, Report 2011/321}, year = {2011}, url = {http://eprint.iacr.org/2011/321}, } @misc{cryptoeprint:2011:322, author = {Carolyn Whitnall and Elisabeth Oswald}, title = {A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework}, howpublished = {Cryptology ePrint Archive, Report 2011/322}, year = {2011}, url = {http://eprint.iacr.org/2011/322}, } @misc{cryptoeprint:2011:323, author = {Shusheng Liu and Libin Wang and Zheng Gong}, title = {Improved Related-Key Boomerang Distinguishing Attack of Threefish-256}, howpublished = {Cryptology ePrint Archive, Report 2011/323}, year = {2011}, url = {http://eprint.iacr.org/2011/323}, } @misc{cryptoeprint:2011:324, author = {Samuel Ranellucci and Alain Tapp and Severin Winkler and Jürg Wullschleger}, title = {On the Efficiency of Bit Commitment Reductions}, howpublished = {Cryptology ePrint Archive, Report 2011/324}, year = {2011}, url = {http://eprint.iacr.org/2011/324}, } @misc{cryptoeprint:2011:325, author = {Aram Jivanyan and Gurgen Khachatryan}, title = {New Receipt-Free E-Voting Scheme and Self-Proving Mix Net as New Paradigm}, howpublished = {Cryptology ePrint Archive, Report 2011/325}, year = {2011}, url = {http://eprint.iacr.org/2011/325}, } @misc{cryptoeprint:2011:326, author = {Markku-Juhani O. Saarinen}, title = {SGCM: The Sophie Germain Counter Mode}, howpublished = {Cryptology ePrint Archive, Report 2011/326}, year = {2011}, url = {http://eprint.iacr.org/2011/326}, } @misc{cryptoeprint:2011:327, author = {Eyal Kushilevitz and Steve Lu and Rafail Ostrovsky}, title = {On the (In)security of Hash-based Oblivious RAM and a New Balancing Scheme}, howpublished = {Cryptology ePrint Archive, Report 2011/327}, year = {2011}, url = {http://eprint.iacr.org/2011/327}, } @misc{cryptoeprint:2011:328, author = {Gu Chunsheng}, title = {Cryptanalysis of the Smart-Vercauteren and Gentry-Halevi’s Fully Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2011/328}, year = {2011}, url = {http://eprint.iacr.org/2011/328}, } @misc{cryptoeprint:2011:329, author = {Alexandre Duc and Dimitar Jetchev}, title = {Hardness of Computing Individual Bits for Pairing-based One-way Functions}, howpublished = {Cryptology ePrint Archive, Report 2011/329}, year = {2011}, url = {http://eprint.iacr.org/2011/329}, } @misc{cryptoeprint:2011:330, author = {Ashish Choudhury}, title = {Simple and Asymptotically Optimal $t$-Cheater Identifiable Secret Sharing Scheme}, howpublished = {Cryptology ePrint Archive, Report 2011/330}, year = {2011}, url = {http://eprint.iacr.org/2011/330}, } @misc{cryptoeprint:2011:331, author = {Masoumeh Safkhani and Pedro Peris-Lopez and Julio Cesar Hernandez-Castro and Nasour Bagheri and Majid Naderi}, title = {Cryptanalysis of Cho \textit{et al.}'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems}, howpublished = {Cryptology ePrint Archive, Report 2011/331}, year = {2011}, url = {http://eprint.iacr.org/2011/331}, } @misc{cryptoeprint:2011:332, author = {Joan Boyar and Rene Peralta}, title = {A depth-16 circuit for the AES S-box}, howpublished = {Cryptology ePrint Archive, Report 2011/332}, year = {2011}, url = {http://eprint.iacr.org/2011/332}, } @misc{cryptoeprint:2011:333, author = {Debiao He}, title = {Cryptanalysis of a key agreement protocol based on chaotic Hash}, howpublished = {Cryptology ePrint Archive, Report 2011/333}, year = {2011}, url = {http://eprint.iacr.org/2011/333}, } @misc{cryptoeprint:2011:334, author = {Michael Scott}, title = {On the Efficient Implementation of Pairing-Based Protocols}, howpublished = {Cryptology ePrint Archive, Report 2011/334}, year = {2011}, url = {http://eprint.iacr.org/2011/334}, } @misc{cryptoeprint:2011:335, author = {István Vajda}, title = {New look at impossibility result on Dolev-Yao models with hashes }, howpublished = {Cryptology ePrint Archive, Report 2011/335}, year = {2011}, url = {http://eprint.iacr.org/2011/335}, } @misc{cryptoeprint:2011:336, author = {Debiao He}, title = {Weaknesses in an ECC-based AKA Protocol for Wireless Mobile Communications}, howpublished = {Cryptology ePrint Archive, Report 2011/336}, year = {2011}, url = {http://eprint.iacr.org/2011/336}, } @misc{cryptoeprint:2011:337, author = {Nishanth Chandran and Melissa Chase and Vinod Vaikuntanathan}, title = {Collusion Resistant Obfuscation and Functional Re-encryption}, howpublished = {Cryptology ePrint Archive, Report 2011/337}, year = {2011}, url = {http://eprint.iacr.org/2011/337}, } @misc{cryptoeprint:2011:338, author = {Matthieu Rivain}, title = {Fast and Regular Algorithms for Scalar Multiplication over Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2011/338}, year = {2011}, url = {http://eprint.iacr.org/2011/338}, } @misc{cryptoeprint:2011:339, author = {Thomas Ristenpart and Hovav Shacham and Thomas Shrimpton}, title = {Careful with Composition: Limitations of Indifferentiability and Universal Composability}, howpublished = {Cryptology ePrint Archive, Report 2011/339}, year = {2011}, url = {http://eprint.iacr.org/2011/339}, } @misc{cryptoeprint:2011:340, author = {Feng Liu, Peng Li, ChuanKun Wu}, title = {Encrypting More Information in Visual Cryptography Scheme}, howpublished = {Cryptology ePrint Archive, Report 2011/340}, year = {2011}, url = {http://eprint.iacr.org/2011/340}, } @misc{cryptoeprint:2011:341, author = {Mehmet Sabir Kiraz , Süleyman Kardaş, Muhammed Ali Bingöl, and Fatih Birinci}, title = {An Improved Internet Voting Protocol}, howpublished = {Cryptology ePrint Archive, Report 2011/341}, year = {2011}, url = {http://eprint.iacr.org/2011/341}, } @misc{cryptoeprint:2011:342, author = {Melissa Chase and Markulf Kohlweiss}, title = {A Domain Transformation for Structure-Preserving Signatures on Group Elements}, howpublished = {Cryptology ePrint Archive, Report 2011/342}, year = {2011}, url = {http://eprint.iacr.org/2011/342}, } @misc{cryptoeprint:2011:343, author = {Neal Koblitz and Alfred Menezes }, title = {Another Look at Security Definitions}, howpublished = {Cryptology ePrint Archive, Report 2011/343}, year = {2011}, url = {http://eprint.iacr.org/2011/343}, } @misc{cryptoeprint:2011:344, author = {Zvika Brakerski and Vinod Vaikuntanathan}, title = {Efficient Fully Homomorphic Encryption from (Standard) LWE}, howpublished = {Cryptology ePrint Archive, Report 2011/344}, year = {2011}, url = {http://eprint.iacr.org/2011/344}, } @misc{cryptoeprint:2011:345, author = {Wenling Wu and Lei Zhang}, title = {LBlock: A Lightweight Block Cipher *}, howpublished = {Cryptology ePrint Archive, Report 2011/345}, year = {2011}, url = {http://eprint.iacr.org/2011/345}, } @misc{cryptoeprint:2011:346, author = {Hai Huang}, title = {Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security}, howpublished = {Cryptology ePrint Archive, Report 2011/346}, year = {2011}, url = {http://eprint.iacr.org/2011/346}, } @misc{cryptoeprint:2011:347, author = {Debiao He}, title = {An efficient certificateless authenticated key agreement protocol without bilinear pairings}, howpublished = {Cryptology ePrint Archive, Report 2011/347}, year = {2011}, url = {http://eprint.iacr.org/2011/347}, } @misc{cryptoeprint:2011:348, author = {Marcel Medwed and Fran\c{c}ois-Xavier Standaert}, title = {Extractors Against Side-Channel Attacks: Weak or Strong?}, howpublished = {Cryptology ePrint Archive, Report 2011/348}, year = {2011}, url = {http://eprint.iacr.org/2011/348}, } @misc{cryptoeprint:2011:349, author = {Chong Hee Kim}, title = {Efficient Methods for Exploiting Faults Induced at AES Middle Rounds}, howpublished = {Cryptology ePrint Archive, Report 2011/349}, year = {2011}, url = {http://eprint.iacr.org/2011/349}, } @misc{cryptoeprint:2011:350, author = {Carl Bosley and Kristiyan Haralambiev and Antonio Nicolosi}, title = {$HB^N$: An HB-like protocol secure against man-in-the-middle attacks}, howpublished = {Cryptology ePrint Archive, Report 2011/350}, year = {2011}, url = {http://eprint.iacr.org/2011/350}, } @misc{cryptoeprint:2011:351, author = {Yanbin Pan , Yingpu Deng}, title = {Cryptanalysis of the $AA_{\beta}$ Cryptosystem based on Linear Diophantine Equation Discrete Log Problem}, howpublished = {Cryptology ePrint Archive, Report 2011/351}, year = {2011}, url = {http://eprint.iacr.org/2011/351}, } @misc{cryptoeprint:2011:352, author = {Adam O'Neill and Chris Peikert and Brent Waters}, title = {Bi-Deniable Public-Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2011/352}, year = {2011}, url = {http://eprint.iacr.org/2011/352}, } @misc{cryptoeprint:2011:353, author = {Masahito Gotaishi and Shigeo Tsujii}, title = {Hidden Pair of Bijection Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2011/353}, year = {2011}, url = {http://eprint.iacr.org/2011/353}, } @misc{cryptoeprint:2011:354, author = {Nicolas Guillermin}, title = {A coprocessor for secure and high speed modular arithmetic}, howpublished = {Cryptology ePrint Archive, Report 2011/354}, year = {2011}, url = {http://eprint.iacr.org/2011/354}, } @misc{cryptoeprint:2011:355, author = {Oana Ciobotaru}, title = {Comparing UC Security Variants}, howpublished = {Cryptology ePrint Archive, Report 2011/355}, year = {2011}, url = {http://eprint.iacr.org/2011/355}, } @misc{cryptoeprint:2011:356, author = {Ayoub Otmani and Jean-Pierre Tillich}, title = {An Efficient Attack on All Concrete KKS Proposals}, howpublished = {Cryptology ePrint Archive, Report 2011/356}, year = {2011}, url = {http://eprint.iacr.org/2011/356}, } @misc{cryptoeprint:2011:357, author = {Gilbert Baumslag and Nelly Fazio and Antonio R. Nicolosi and Vladimir Shpilrain and William E. Skeith III}, title = {Generalized Learning Problems and Applications to Non-Commutative Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2011/357}, year = {2011}, url = {http://eprint.iacr.org/2011/357}, } @misc{cryptoeprint:2011:358, author = {Zhiqiang Lin and Dingyi Pei}, title = {Constructing a Diversified FCSR with a Given Connection Integer}, howpublished = {Cryptology ePrint Archive, Report 2011/358}, year = {2011}, url = {http://eprint.iacr.org/2011/358}, } @misc{cryptoeprint:2011:359, author = {Nathaniel Wesley Filardo and Giuseppe Ateniese}, title = {High-Entropy Visual Identification for Touch Screen Devices}, howpublished = {Cryptology ePrint Archive, Report 2011/359}, year = {2011}, url = {http://eprint.iacr.org/2011/359}, } @misc{cryptoeprint:2011:360, author = {Ziba Eslami, Nasrollah Pakniat}, title = {Certificateless Aggregate Signcryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2011/360}, year = {2011}, url = {http://eprint.iacr.org/2011/360}, } @misc{cryptoeprint:2011:361, author = {S.Sree Vivek and S.Sharmila Deva Selvi and C.Pandu Rangan}, title = {Compact CCA-Secure Encryption with Ciphertext Verifiability}, howpublished = {Cryptology ePrint Archive, Report 2011/361}, year = {2011}, url = {http://eprint.iacr.org/2011/361}, } @misc{cryptoeprint:2011:362, author = {Jia XU}, title = {Practically Efficient Proof of Retrievability in Cloud Storage}, howpublished = {Cryptology ePrint Archive, Report 2011/362}, year = {2011}, url = {http://eprint.iacr.org/2011/362}, } @misc{cryptoeprint:2011:363, author = {Essam Ghadafi}, title = {Dynamic Group Blind Signatures: Security Definitions and Efficient Constructions without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2011/363}, year = {2011}, url = {http://eprint.iacr.org/2011/363}, } @misc{cryptoeprint:2011:364, author = {Jean-Pierre Flori and Sihem Mesnager and Gérard Cohen}, title = {The Value $4$ of Binary Kloosterman Sums}, howpublished = {Cryptology ePrint Archive, Report 2011/364}, year = {2011}, url = {http://eprint.iacr.org/2011/364}, } @misc{cryptoeprint:2011:365, author = {Debiao He}, title = {Security flaws in a biometrics-based multi-server authentication with key agreement scheme}, howpublished = {Cryptology ePrint Archive, Report 2011/365}, year = {2011}, url = {http://eprint.iacr.org/2011/365}, } @misc{cryptoeprint:2011:366, author = {Deng Tang and Claude Carlet and Xiaohu Tang}, title = {Highly Nonlinear Boolean Functions with Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks}, howpublished = {Cryptology ePrint Archive, Report 2011/366}, year = {2011}, url = {http://eprint.iacr.org/2011/366}, } @misc{cryptoeprint:2011:367, author = {Nicolas Sendrier}, title = {Decoding One Out of Many}, howpublished = {Cryptology ePrint Archive, Report 2011/367}, year = {2011}, url = {http://eprint.iacr.org/2011/367}, } @misc{cryptoeprint:2011:368, author = {Daniel J. Bernstein and Niels Duif and Tanja Lange and Peter Schwabe and Bo-Yin Yang}, title = {High-speed high-security signatures}, howpublished = {Cryptology ePrint Archive, Report 2011/368}, year = {2011}, url = {http://eprint.iacr.org/2011/368}, } @misc{cryptoeprint:2011:369, author = {Yevgeniy Dodis and Allison Lewko and Brent Waters and Daniel Wichs}, title = {Storing Secrets on Continually Leaky Devices}, howpublished = {Cryptology ePrint Archive, Report 2011/369}, year = {2011}, url = {http://eprint.iacr.org/2011/369}, } @misc{cryptoeprint:2011:370, author = {Mehrdad Nojoumian}, title = {Socio-Rational Secret Sharing as a New Direction in Both Rational Cryptography and Game Theory}, howpublished = {Cryptology ePrint Archive, Report 2011/370}, year = {2011}, url = {http://eprint.iacr.org/2011/370}, } @misc{cryptoeprint:2011:371, author = {Paulo S. L. M. Barreto and Richard Lindner and Rafael Misoczki}, title = {Monoidic Codes in Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2011/371}, year = {2011}, url = {http://eprint.iacr.org/2011/371}, } @misc{cryptoeprint:2011:372, author = {Prashant Kushwah and Sunder Lal}, title = {Identity based signcryption schemes without random oracles}, howpublished = {Cryptology ePrint Archive, Report 2011/372}, year = {2011}, url = {http://eprint.iacr.org/2011/372}, } @misc{cryptoeprint:2011:373, author = {Jean-Pierre Flori and Sihem Mesnager}, title = {An efficient characterization of a family of hyperbent functions with multiple trace terms}, howpublished = {Cryptology ePrint Archive, Report 2011/373}, year = {2011}, url = {http://eprint.iacr.org/2011/373}, } @misc{cryptoeprint:2011:374, author = {Ethan Heilman}, title = {Restoring the Differential Resistance of MD6 }, howpublished = {Cryptology ePrint Archive, Report 2011/374}, year = {2011}, url = {http://eprint.iacr.org/2011/374}, } @misc{cryptoeprint:2011:375, author = {Laszlo Csirmaz}, title = {Complexity of universal access structures}, howpublished = {Cryptology ePrint Archive, Report 2011/375}, year = {2011}, url = {http://eprint.iacr.org/2011/375}, } @misc{cryptoeprint:2011:376, author = {Julien Bringer and Alain Patey}, title = {Backward Unlinkability for a VLR Group Signature Scheme with Efficient Revocation Check}, howpublished = {Cryptology ePrint Archive, Report 2011/376}, year = {2011}, url = {http://eprint.iacr.org/2011/376}, } @misc{cryptoeprint:2011:377, author = {Paul Kirchner}, title = {Improved Generalized Birthday Attack}, howpublished = {Cryptology ePrint Archive, Report 2011/377}, year = {2011}, url = {http://eprint.iacr.org/2011/377}, } @misc{cryptoeprint:2011:378, author = {Amadou TALL}, title = {A generalization of the Lucas addition chains}, howpublished = {Cryptology ePrint Archive, Report 2011/378}, year = {2011}, url = {http://eprint.iacr.org/2011/378}, } @misc{cryptoeprint:2011:379, author = {Miaomiao Tian and Wei Yang and Liusheng Huang}, title = {Cryptanalysis and improvement of a certificateless multi-proxy signature scheme}, howpublished = {Cryptology ePrint Archive, Report 2011/379}, year = {2011}, url = {http://eprint.iacr.org/2011/379}, } @misc{cryptoeprint:2011:380, author = {Carolyn Whitnall and Elisabeth Oswald and Luke Mather}, title = {An Exploration of the Kolmogorov-Smirnov Test as Competitor to Mutual Information Analysis}, howpublished = {Cryptology ePrint Archive, Report 2011/380}, year = {2011}, url = {http://eprint.iacr.org/2011/380}, } @misc{cryptoeprint:2011:381, author = {Jue-Sam Chou, Yalin Chen, Chi-Fong Lin}, title = {A Novel RFID Authentication Protocol based on Elliptic Curve Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2011/381}, year = {2011}, url = {http://eprint.iacr.org/2011/381}, } @misc{cryptoeprint:2011:382, author = {Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong}, title = {Generic Fully Simulatable Adaptive Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2011/382}, year = {2011}, url = {http://eprint.iacr.org/2011/382}, } @misc{cryptoeprint:2011:383, author = {Stefan Maubach}, title = {A representation of the $p$-sylow subgroup of $\perm(\F_p^n)$ and a cryptographic application}, howpublished = {Cryptology ePrint Archive, Report 2011/383}, year = {2011}, url = {http://eprint.iacr.org/2011/383}, } @misc{cryptoeprint:2011:384, author = {Steve Lu and Rafail Ostrovsky}, title = {Multi-Server Oblivious RAM}, howpublished = {Cryptology ePrint Archive, Report 2011/384}, year = {2011}, url = {http://eprint.iacr.org/2011/384}, } @misc{cryptoeprint:2011:385, author = {Azhar Ali Khan and Ghulam Murtaza}, title = {Efficient Implementation of Grand Cru with TI C6x+ Processor}, howpublished = {Cryptology ePrint Archive, Report 2011/385}, year = {2011}, url = {http://eprint.iacr.org/2011/385}, } @misc{cryptoeprint:2011:386, author = {Laszlo Csirmaz}, title = {How to share secrets simultaneously}, howpublished = {Cryptology ePrint Archive, Report 2011/386}, year = {2011}, url = {http://eprint.iacr.org/2011/386}, } @misc{cryptoeprint:2011:387, author = {Jin Hong and Ga Won Lee and Daegun Ma}, title = {Analysis of the Parallel Distinguished Point}, howpublished = {Cryptology ePrint Archive, Report 2011/387}, year = {2011}, url = {http://eprint.iacr.org/2011/387}, } @misc{cryptoeprint:2011:388, author = {Eric Brier and David Naccache and Phong Q. Nguyen and Mehdi Tibouchi}, title = {Modulus Fault Attacks Against RSA-CRT Signatures}, howpublished = {Cryptology ePrint Archive, Report 2011/388}, year = {2011}, url = {http://eprint.iacr.org/2011/388}, } @misc{cryptoeprint:2011:389, author = {Mike Hamburg}, title = {Spatial Encryption}, howpublished = {Cryptology ePrint Archive, Report 2011/389}, year = {2011}, url = {http://eprint.iacr.org/2011/389}, } @misc{cryptoeprint:2011:390, author = {Amir Moradi and Alessandro Barenghi and Timo Kasper and Christof Paar}, title = {On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks – Extracting Keys from Xilinx Virtex-II FPGAs}, howpublished = {Cryptology ePrint Archive, Report 2011/390}, year = {2011}, url = {http://eprint.iacr.org/2011/390}, } @misc{cryptoeprint:2011:391, author = {Amir Moradi and Markus Kasper and Christof Paar}, title = {On the Portability of Side-Channel Attacks – An Analysis of the Xilinx Virtex 4 and Virtex 5 Bitstream Encryption Mechanism}, howpublished = {Cryptology ePrint Archive, Report 2011/391}, year = {2011}, url = {http://eprint.iacr.org/2011/391}, } @misc{cryptoeprint:2011:392, author = {Yun Zhang, Christophe Tartary and Huaxiong Wang}, title = {An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem (Revised Version)}, howpublished = {Cryptology ePrint Archive, Report 2011/392}, year = {2011}, url = {http://eprint.iacr.org/2011/392}, } @misc{cryptoeprint:2011:393, author = {Zhenqi Li, Dongdai Lin and Wenhao Wang}, title = {Analysis and Improvement of Thing's Time-Memory Trade-Off Attack}, howpublished = {Cryptology ePrint Archive, Report 2011/393}, year = {2011}, url = {http://eprint.iacr.org/2011/393}, } @misc{cryptoeprint:2011:394, author = {Helger Lipmaa and Bingsheng Zhang}, title = {A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument}, howpublished = {Cryptology ePrint Archive, Report 2011/394}, year = {2011}, url = {http://eprint.iacr.org/2011/394}, } @misc{cryptoeprint:2011:395, author = {Beye, Michael and Veugen, Thijs}, title = {Improved Anonymity for Key-Trees}, howpublished = {Cryptology ePrint Archive, Report 2011/395}, year = {2011}, url = {http://eprint.iacr.org/2011/395}, } @misc{cryptoeprint:2011:396, author = {Adam Groce and Jonathan Katz}, title = {Fair Computation with Rational Players}, howpublished = {Cryptology ePrint Archive, Report 2011/396}, year = {2011}, url = {http://eprint.iacr.org/2011/396}, } @misc{cryptoeprint:2011:397, author = {Liqun Chen and Yu Chen}, title = {The n-Diffie-Hellman Problem and its Applications}, howpublished = {Cryptology ePrint Archive, Report 2011/397}, year = {2011}, url = {http://eprint.iacr.org/2011/397}, } @misc{cryptoeprint:2011:398, author = {Nelly Fazio and Kevin Iga and Antonio Nicolosi and Ludovic Perret and William E. Skeith III}, title = {Random Self-Reducibility Properties of Learning Problems over Burnside Groups of Exponent 3}, howpublished = {Cryptology ePrint Archive, Report 2011/398}, year = {2011}, url = {http://eprint.iacr.org/2011/398}, } @misc{cryptoeprint:2011:399, author = {Luk Bettale and Jean-Charles Faugère and Ludovic Perret}, title = {Cryptanalysis of HFE, Multi-HFE and Variants for Odd and Even Characteristic}, howpublished = {Cryptology ePrint Archive, Report 2011/399}, year = {2011}, url = {http://eprint.iacr.org/2011/399}, } @misc{cryptoeprint:2011:400, author = {Gérard Cohen and Jean-Pierre Flori}, title = {On a generalized combinatorial conjecture involving addition $\mod 2^k - 1$}, howpublished = {Cryptology ePrint Archive, Report 2011/400}, year = {2011}, url = {http://eprint.iacr.org/2011/400}, } @misc{cryptoeprint:2011:401, author = {Abhishek Banerjee and Chris Peikert and Alon Rosen}, title = {Pseudorandom Functions and Lattices}, howpublished = {Cryptology ePrint Archive, Report 2011/401}, year = {2011}, url = {http://eprint.iacr.org/2011/401}, } @misc{cryptoeprint:2011:402, author = {Essam Ghadafi}, title = {Formalizing Group Blind Signatures and Practical Constructions in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2011/402}, year = {2011}, url = {http://eprint.iacr.org/2011/402}, } @misc{cryptoeprint:2011:403, author = {Carolyn Whitnall and Elisabeth Oswald}, title = {A Fair Evaluation Framework for Comparing Side-Channel Distinguishers}, howpublished = {Cryptology ePrint Archive, Report 2011/403}, year = {2011}, url = {http://eprint.iacr.org/2011/403}, } @misc{cryptoeprint:2011:404, author = {Seiko Arita}, title = {A constant-round resettably-sound resettable zero-knowledge argument in the BPK model}, howpublished = {Cryptology ePrint Archive, Report 2011/404}, year = {2011}, url = {http://eprint.iacr.org/2011/404}, } @misc{cryptoeprint:2011:405, author = {Kristin Lauter and Michael Naehrig and Vinod Vaikuntanathan}, title = {Can Homomorphic Encryption be Practical?}, howpublished = {Cryptology ePrint Archive, Report 2011/405}, year = {2011}, url = {http://eprint.iacr.org/2011/405}, } @misc{cryptoeprint:2011:406, author = {Ralf Kuesters and Max Tuengerthal}, title = {Composition Theorems Without Pre-Established Session Identifiers}, howpublished = {Cryptology ePrint Archive, Report 2011/406}, year = {2011}, url = {http://eprint.iacr.org/2011/406}, } @misc{cryptoeprint:2011:407, author = {Elaine Shi, Hubert Chan, Emil Stefanov, Mingfei Li}, title = {Oblivious RAM with O((log N)^3) Worst-Case Cost }, howpublished = {Cryptology ePrint Archive, Report 2011/407}, year = {2011}, url = {http://eprint.iacr.org/2011/407}, } @misc{cryptoeprint:2011:408, author = {Yi Deng,Dengguo Feng,Vipul Goyal,Dongdai Lin,Amit Sahai and Moti Yung}, title = {Resettable Cryptography in Constant Rounds– the Case of Zero Knowledge }, howpublished = {Cryptology ePrint Archive, Report 2011/408}, year = {2011}, url = {http://eprint.iacr.org/2011/408}, } @misc{cryptoeprint:2011:409, author = {Xiaoyuan Yang, Weiyi Cai, Xu An Wang}, title = {Efficient Predicate Encryption Supporting Construction of Fine-Grained Searchable Encryption}, howpublished = {Cryptology ePrint Archive, Report 2011/409}, year = {2011}, url = {http://eprint.iacr.org/2011/409}, } @misc{cryptoeprint:2011:410, author = {Shweta Agrawal and David Mandell Freeman and Vinod Vaikuntanathan}, title = {Predicate Encryption for Inner Products from LWE}, howpublished = {Cryptology ePrint Archive, Report 2011/410}, year = {2011}, url = {http://eprint.iacr.org/2011/410}, } @misc{cryptoeprint:2011:411, author = {Debiao He}, title = {Comments on a password authentication and update scheme based on elliptic curve cryptography}, howpublished = {Cryptology ePrint Archive, Report 2011/411}, year = {2011}, url = {http://eprint.iacr.org/2011/411}, } @misc{cryptoeprint:2011:412, author = {Andrew Moss and Elisabeth Oswald and Dan Page and Michael Tunstall}, title = {Automatic Insertion of DPA Countermeasures}, howpublished = {Cryptology ePrint Archive, Report 2011/412}, year = {2011}, url = {http://eprint.iacr.org/2011/412}, } @misc{cryptoeprint:2011:413, author = {Emmanuel Prouff and Thomas Roche}, title = {Higher-Order Glitches Free Implementation of the AES using Secure Multi-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2011/413}, year = {2011}, url = {http://eprint.iacr.org/2011/413}, } @misc{cryptoeprint:2011:414, author = {Shweta Agrawal and Xavier Boyen and Vinod Vaikuntanathan and Panagiotis Voulgaris and Hoeteck Wee}, title = {Fuzzy Identity Based Encryption from Lattices}, howpublished = {Cryptology ePrint Archive, Report 2011/414}, year = {2011}, url = {http://eprint.iacr.org/2011/414}, } @misc{cryptoeprint:2011:415, author = {Lei Li and Siman Yang}, title = {On the Access Structures of Hyperelliptic Secret Sharing Schemes}, howpublished = {Cryptology ePrint Archive, Report 2011/415}, year = {2011}, url = {http://eprint.iacr.org/2011/415}, } @misc{cryptoeprint:2011:416, author = {Ilya Popovyan}, title = {Efficient Parallelization of Lanczos Type Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2011/416}, year = {2011}, url = {http://eprint.iacr.org/2011/416}, } @misc{cryptoeprint:2011:417, author = {Eli Biham and Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {New Data-Efficient Attacks on 6-Round IDEA}, howpublished = {Cryptology ePrint Archive, Report 2011/417}, year = {2011}, url = {http://eprint.iacr.org/2011/417}, } @misc{cryptoeprint:2011:418, author = {Jue-Sam Chou, Yalin Chen, Cheng-Lun Wu, Chi-Fong Lin}, title = {An efficient RFID mutual authentication scheme based on ECC}, howpublished = {Cryptology ePrint Archive, Report 2011/418}, year = {2011}, url = {http://eprint.iacr.org/2011/418}, } @misc{cryptoeprint:2011:419, author = {Miaomiao Tian and Liusheng Huang and Wei Yang }, title = {On the security of a certificateless short signature scheme}, howpublished = {Cryptology ePrint Archive, Report 2011/419}, year = {2011}, url = {http://eprint.iacr.org/2011/419}, } @misc{cryptoeprint:2011:420, author = {Alexandre Duc, Jian Guo, Thomas Peyrin, Lei Wei}, title = {Unaligned Rebound Attack - Application to Keccak}, howpublished = {Cryptology ePrint Archive, Report 2011/420}, year = {2011}, url = {http://eprint.iacr.org/2011/420}, } @misc{cryptoeprint:2011:421, author = {Ivan Damg{\aa}rd and Jakob Funder and Jesper Buus Nielsen and Louis Salvail}, title = {Superposition Attacks on Cryptographic Protocols}}, howpublished = {Cryptology ePrint Archive, Report 2011/421}, year = {2011}, url = {http://eprint.iacr.org/2011/421}, } @misc{cryptoeprint:2011:422, author = {Jérémy Jean and María Naya-Plasencia and Martin Schläffer}, title = {Improved Analysis of ECHO-256}, howpublished = {Cryptology ePrint Archive, Report 2011/422}, year = {2011}, url = {http://eprint.iacr.org/2011/422}, } @misc{cryptoeprint:2011:423, author = {Martin Ågren and Thomas Johansson}, title = {Linear Cryptanalysis of PRINTcipher --- Trails and Samples Everywhere}, howpublished = {Cryptology ePrint Archive, Report 2011/423}, year = {2011}, url = {http://eprint.iacr.org/2011/423}, } @misc{cryptoeprint:2011:424, author = {Masoumeh Safkhani and Nasour Bagheri and Majid Naderi}, title = {Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol}, howpublished = {Cryptology ePrint Archive, Report 2011/424}, year = {2011}, url = {http://eprint.iacr.org/2011/424}, } @misc{cryptoeprint:2011:425, author = {Laurie Genelle and Emmanuel Prouff and Michaël Quisquater}, title = {Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings.pdf}, howpublished = {Cryptology ePrint Archive, Report 2011/425}, year = {2011}, url = {http://eprint.iacr.org/2011/425}, } @misc{cryptoeprint:2011:426, author = {Masoumeh Safkhani and Nasour Bagheri and Somitra Kumar Sanadhya and Majid Naderi}, title = {Cryptanalysis of improved Yeh \textit{et al. }'s authentication Protocol: An EPC Class-1 Generation-2 standard compliant protocol}, howpublished = {Cryptology ePrint Archive, Report 2011/426}, year = {2011}, url = {http://eprint.iacr.org/2011/426}, } @misc{cryptoeprint:2011:427, author = {Abderrahmane Nitaj}, title = {A new attack on the KMOVcryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2011/427}, year = {2011}, url = {http://eprint.iacr.org/2011/427}, } @misc{cryptoeprint:2011:428, author = {Tatsuya TAKEHISA and Hiroki NOGAWA and Masakatu MORII}, title = {AES Flow Interception: Key Snooping Method on Virtual Machine - Exception Handling Attack for AES-NI -}, howpublished = {Cryptology ePrint Archive, Report 2011/428}, year = {2011}, url = {http://eprint.iacr.org/2011/428}, } @misc{cryptoeprint:2011:429, author = {Sven Laur and Jan Willemson and Bingsheng Zhang}, title = {Round-efficient Oblivious Database Manipulation}, howpublished = {Cryptology ePrint Archive, Report 2011/429}, year = {2011}, url = {http://eprint.iacr.org/2011/429}, } @misc{cryptoeprint:2011:430, author = {Dustin Moody and Daniel Shumow}, title = {Isogenies on Edwards and Huff curves}, howpublished = {Cryptology ePrint Archive, Report 2011/430}, year = {2011}, url = {http://eprint.iacr.org/2011/430}, } @misc{cryptoeprint:2011:431, author = {Enrico Thomae and Christopher Wolf}, title = {Roots of Square: Cryptanalysis of DoubleLayer Square and Square+}, howpublished = {Cryptology ePrint Archive, Report 2011/431}, year = {2011}, url = {http://eprint.iacr.org/2011/431}, } @misc{cryptoeprint:2011:432, author = {Mihir Bellare and David Cash and Sriram Keelveedhi}, title = {Ciphers that Securely Encipher their own Keys}, howpublished = {Cryptology ePrint Archive, Report 2011/432}, year = {2011}, url = {http://eprint.iacr.org/2011/432}, } @misc{cryptoeprint:2011:433, author = {Joël Alwen and Jonathan Katz and Ueli Maurer and Vassilis Zikas}, title = {Collusion-Preserving Computation}, howpublished = {Cryptology ePrint Archive, Report 2011/433}, year = {2011}, url = {http://eprint.iacr.org/2011/433}, } @misc{cryptoeprint:2011:434, author = {Payman Mohassel and Salman Niksefat and Saeed Sadeghian and Babak Sadeghiyan}, title = {A New Protocol for Oblivious DFA Evaluation and Applications}, howpublished = {Cryptology ePrint Archive, Report 2011/434}, year = {2011}, url = {http://eprint.iacr.org/2011/434}, } @misc{cryptoeprint:2011:435, author = {Yehuda Lindell and Benny Pinkas and Eli Oxman}, title = {The IPS Compiler: Optimizations, Variants and Concrete Efficiency}, howpublished = {Cryptology ePrint Archive, Report 2011/435}, year = {2011}, url = {http://eprint.iacr.org/2011/435}, } @misc{cryptoeprint:2011:436, author = {Yuanmi Chen and Phong Q. Nguyen}, title = {Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the Integers}, howpublished = {Cryptology ePrint Archive, Report 2011/436}, year = {2011}, url = {http://eprint.iacr.org/2011/436}, } @misc{cryptoeprint:2011:437, author = {Henry Cohn and Nadia Heninger}, title = {Approximate common divisors via lattices}, howpublished = {Cryptology ePrint Archive, Report 2011/437}, year = {2011}, url = {http://eprint.iacr.org/2011/437}, } @misc{cryptoeprint:2011:438, author = {Philippe Camacho}, title = {Short Transitive Signatures for Directed Trees}, howpublished = {Cryptology ePrint Archive, Report 2011/438}, year = {2011}, url = {http://eprint.iacr.org/2011/438}, } @misc{cryptoeprint:2011:439, author = {Philippe Camacho}, title = {Optimal Data Authentication from Directed Transitive Signatures}, howpublished = {Cryptology ePrint Archive, Report 2011/439}, year = {2011}, url = {http://eprint.iacr.org/2011/439}, } @misc{cryptoeprint:2011:440, author = {Jean-Sebastien Coron and David Naccache and Mehdi Tibouchi}, title = {Optimization of Fully Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2011/440}, year = {2011}, url = {http://eprint.iacr.org/2011/440}, } @misc{cryptoeprint:2011:441, author = {Jean-Sebastien Coron and Avradip Mandal and David Naccache and Mehdi Tibouchi}, title = {Fully Homomorphic Encryption over the Integers with Shorter Public Keys}, howpublished = {Cryptology ePrint Archive, Report 2011/441}, year = {2011}, url = {http://eprint.iacr.org/2011/441}, } @misc{cryptoeprint:2011:442, author = {Sanjit Chatterjee and Alfred Menezes and Palash Sarkar}, title = {Another Look at Tightness}, howpublished = {Cryptology ePrint Archive, Report 2011/442}, year = {2011}, url = {http://eprint.iacr.org/2011/442}, } @misc{cryptoeprint:2011:443, author = {Nir Bitansky and Ran Canetti and Alessandro Chiesa and Eran Tromer}, title = {From Extractable Collision Resistance to Succinct Non-Interactive Arguments of Knowledge, and Back Again}, howpublished = {Cryptology ePrint Archive, Report 2011/443}, year = {2011}, url = {http://eprint.iacr.org/2011/443}, } @misc{cryptoeprint:2011:444, author = {Robert Granger and Andrew Moss}, title = {Generalised Mersenne Numbers Revisited}, howpublished = {Cryptology ePrint Archive, Report 2011/444}, year = {2011}, url = {http://eprint.iacr.org/2011/444}, } @misc{cryptoeprint:2011:445, author = {Huang Lin and Sherman S. M. Chow and Dongsheng Xing and Yuguang Fang and Zhenfu Cao}, title = {Privacy-Preserving Friend Search over Online Social Networks}, howpublished = {Cryptology ePrint Archive, Report 2011/445}, year = {2011}, url = {http://eprint.iacr.org/2011/445}, } @misc{cryptoeprint:2011:446, author = {Huang Lin and Yuguang Fang and Zhenfu Cao}, title = {Private Information Extraction over Online Social Networks}, howpublished = {Cryptology ePrint Archive, Report 2011/446}, year = {2011}, url = {http://eprint.iacr.org/2011/446}, } @misc{cryptoeprint:2011:447, author = {Ayad F. Barsoum and M. Anwar Hasan}, title = {On Verifying Dynamic Multiple Data Copies over Cloud Servers}, howpublished = {Cryptology ePrint Archive, Report 2011/447}, year = {2011}, url = {http://eprint.iacr.org/2011/447}, } @misc{cryptoeprint:2011:448, author = {Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul and Santanu Sarkar}, title = {RC4: (Non-)Random Words from (Non-)Random Permutations}, howpublished = {Cryptology ePrint Archive, Report 2011/448}, year = {2011}, url = {http://eprint.iacr.org/2011/448}, } @misc{cryptoeprint:2011:449, author = {Andrey Bogdanov and Dmitry Khovratovich and Christian Rechberger}, title = {Biclique Cryptanalysis of the Full AES}, howpublished = {Cryptology ePrint Archive, Report 2011/449}, year = {2011}, url = {http://eprint.iacr.org/2011/449}, } @misc{cryptoeprint:2011:450, author = {Dhananjoy Dey and Noopur Shrotriya and Indranath Sengupta}, title = {R-hash : Hash Function Using Random Quadratic Polynomials Over $GF(2)$}, howpublished = {Cryptology ePrint Archive, Report 2011/450}, year = {2011}, url = {http://eprint.iacr.org/2011/450}, } @misc{cryptoeprint:2011:451, author = {Hakhyun Kim, Woongryul Jeon, Yunho Lee and Dongho Won}, title = {Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme}, howpublished = {Cryptology ePrint Archive, Report 2011/451}, year = {2011}, url = {http://eprint.iacr.org/2011/451}, } @misc{cryptoeprint:2011:452, author = {Manish Garg and Sugata Gangopadhyay}, title = {The Good lower bound of Second-order nonlinearity of a class of Boolean function}, howpublished = {Cryptology ePrint Archive, Report 2011/452}, year = {2011}, url = {http://eprint.iacr.org/2011/452}, } @misc{cryptoeprint:2011:453, author = {Michael Tunstall}, title = {Practical Complexity Differential Cryptanalysis and Fault Analysis of AES}, howpublished = {Cryptology ePrint Archive, Report 2011/453}, year = {2011}, url = {http://eprint.iacr.org/2011/453}, } @misc{cryptoeprint:2011:454, author = {Steven Myers and Mona Sergi and Abhi Shelat}, title = {Threshold Fully Homomorphic Encryption and Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2011/454}, year = {2011}, url = {http://eprint.iacr.org/2011/454}, } @misc{cryptoeprint:2011:455, author = {Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang}, title = {The Relation and Transformation between Hierarchical Inner Product Encryption and Spatial Encryption}, howpublished = {Cryptology ePrint Archive, Report 2011/455}, year = {2011}, url = {http://eprint.iacr.org/2011/455}, } @misc{cryptoeprint:2011:456, author = {Shafi Goldwasser, Huijia Lin, Aviad Rubinstein}, title = {Delegation of Computation without Rejection Problem from Designated Verifier CS-Proofs}, howpublished = {Cryptology ePrint Archive, Report 2011/456}, year = {2011}, url = {http://eprint.iacr.org/2011/456}, } @misc{cryptoeprint:2011:457, author = {Sanjam Garg, Rafail Ostrovsky, Ivan Visconti, Akshay Wadia}, title = {Resettable Statistical Zero Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2011/457}, year = {2011}, url = {http://eprint.iacr.org/2011/457}, } @misc{cryptoeprint:2011:458, author = {Michael Schneider}, title = {Sieving for Shortest Vectors in Ideal Lattices}, howpublished = {Cryptology ePrint Archive, Report 2011/458}, year = {2011}, url = {http://eprint.iacr.org/2011/458}, } @misc{cryptoeprint:2011:459, author = {Joan Daemen and Tony Dusenge and Gilles Van Assche}, title = {Sufficient conditions for sound hashing using a truncated permutation}, howpublished = {Cryptology ePrint Archive, Report 2011/459}, year = {2011}, url = {http://eprint.iacr.org/2011/459}, } @misc{cryptoeprint:2011:460, author = {Zijian Zhang and Liehuang Zhu and Lejian Liao}, title = {Computationally sound symbolic security reduction analysis of group key exchange protocol using bilinear pairings}, howpublished = {Cryptology ePrint Archive, Report 2011/460}, year = {2011}, url = {http://eprint.iacr.org/2011/460}, } @misc{cryptoeprint:2011:461, author = {Fangguo Zhang and Ping Wang}, title = {Speeding Up Elliptic Curve Discrete Logarithm Computations with Point Halving}, howpublished = {Cryptology ePrint Archive, Report 2011/461}, year = {2011}, url = {http://eprint.iacr.org/2011/461}, } @misc{cryptoeprint:2011:462, author = {Marina Blanton and Mehrdad Aliasgari}, title = {Secure Outsourced Computation of Iris Matching}, howpublished = {Cryptology ePrint Archive, Report 2011/462}, year = {2011}, url = {http://eprint.iacr.org/2011/462}, } @misc{cryptoeprint:2011:463, author = {Duong Hieu Phan and David Pointcheval and Mario Strefler}, title = {Adaptively Secure Broadcast Encryption with Forward Secrecy}, howpublished = {Cryptology ePrint Archive, Report 2011/463}, year = {2011}, url = {http://eprint.iacr.org/2011/463}, } @misc{cryptoeprint:2011:464, author = {Marina Blanton and Everaldo Aguiar}, title = {Private and Oblivious Set and Multiset Operations}, howpublished = {Cryptology ePrint Archive, Report 2011/464}, year = {2011}, url = {http://eprint.iacr.org/2011/464}, } @misc{cryptoeprint:2011:465, author = {Craig Costello and Kristin Lauter and Michael Naehrig}, title = {Attractive Subfamilies of BLS Curves for Implementing High-Security Pairings}, howpublished = {Cryptology ePrint Archive, Report 2011/465}, year = {2011}, url = {http://eprint.iacr.org/2011/465}, } @misc{cryptoeprint:2011:466, author = {Keting Jia and Honbo Yu and Xiaoyun Wang}, title = {A Meet-in-the-Middle Attack on the Full KASUMI}, howpublished = {Cryptology ePrint Archive, Report 2011/466}, year = {2011}, url = {http://eprint.iacr.org/2011/466}, } @misc{cryptoeprint:2011:467, author = {M.R.K. Ariffin, M.A. Asbullah and N.A. Abu}, title = {The Diophantine Equation Discrete Log Problem, Matrix Decomposition Problem and the AA_{\beta} -Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2011/467}, year = {2011}, url = {http://eprint.iacr.org/2011/467}, } @misc{cryptoeprint:2011:468, author = {Hongfeng Wu and Chang-An Zhao}, title = {Faster Scalar Multiplication on Ordinary Weierstrass Elliptic Curves over Fields of Characteristic Three}, howpublished = {Cryptology ePrint Archive, Report 2011/468}, year = {2011}, url = {http://eprint.iacr.org/2011/468}, } @misc{cryptoeprint:2011:469, author = {ChangKyun Kim, Eun-Gu Jung, Dong Hoon Lee, Chang-Ho Jung, and Daewan Han}, title = {Cryptanalysis of INCrypt32 in HID's iCLASS Systems}, howpublished = {Cryptology ePrint Archive, Report 2011/469}, year = {2011}, url = {http://eprint.iacr.org/2011/469}, } @misc{cryptoeprint:2011:470, author = {István Vajda}, title = {Non-malleable public key encryption in BRSIM/UC}, howpublished = {Cryptology ePrint Archive, Report 2011/470}, year = {2011}, url = {http://eprint.iacr.org/2011/470}, } @misc{cryptoeprint:2011:471, author = {P. Scholl and N.P. Smart}, title = {Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2011/471}, year = {2011}, url = {http://eprint.iacr.org/2011/471}, } @misc{cryptoeprint:2011:472, author = {Joseph K. Liu and Tsz Hon Yuen and Jianying Zhou}, title = {Forward Secure Ring Signature without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2011/472}, year = {2011}, url = {http://eprint.iacr.org/2011/472}, } @misc{cryptoeprint:2011:473, author = {Jia XU}, title = {Practically Efficient Verifiable Delegation of Polynomial and its Applications}, howpublished = {Cryptology ePrint Archive, Report 2011/473}, year = {2011}, url = {http://eprint.iacr.org/2011/473}, } @misc{cryptoeprint:2011:474, author = {Anja Becker and Jean-Sébastien Coron and Antoine Joux}, title = {Improved Generic Algorithms for Hard Knapsacks}, howpublished = {Cryptology ePrint Archive, Report 2011/474}, year = {2011}, url = {http://eprint.iacr.org/2011/474}, } @misc{cryptoeprint:2011:475, author = {Nicolas T. Courtois, Daniel Hulme and Theodosis Mourouzis}, title = {Solving Circuit Optimisation Problems in Cryptography and Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2011/475}, year = {2011}, url = {http://eprint.iacr.org/2011/475}, } @misc{cryptoeprint:2011:476, author = {Beno\^it Libert and Kenneth G. Paterson and Elizabeth A. Quaglia}, title = {Anonymous Broadcast Encryption}, howpublished = {Cryptology ePrint Archive, Report 2011/476}, year = {2011}, url = {http://eprint.iacr.org/2011/476}, } @misc{cryptoeprint:2011:477, author = {Abderrahmane Nitaj}, title = {Cryptanalysis of NTRU with two public keys}, howpublished = {Cryptology ePrint Archive, Report 2011/477}, year = {2011}, url = {http://eprint.iacr.org/2011/477}, } @misc{cryptoeprint:2011:478, author = {Debiao He, Sahadeo Padhye}, title = {A Pairing-free Certificateless Authenticated Key Agreement Protocol in the eCK Model}, howpublished = {Cryptology ePrint Archive, Report 2011/478}, year = {2011}, url = {http://eprint.iacr.org/2011/478}, } @misc{cryptoeprint:2011:479, author = {Mihir Bellare and Eike Kiltz and Chris Peikert and Brent Waters}, title = {Identity-Based (Lossy) Trapdoor Functions and Applications}, howpublished = {Cryptology ePrint Archive, Report 2011/479}, year = {2011}, url = {http://eprint.iacr.org/2011/479}, } @misc{cryptoeprint:2011:480, author = {Sanjay Bhattacherjee and Palash Sarkar}, title = {Complete Tree Subset Difference Broadcast Encryption Scheme and its Analysis}, howpublished = {Cryptology ePrint Archive, Report 2011/480}, year = {2011}, url = {http://eprint.iacr.org/2011/480}, } @misc{cryptoeprint:2011:481, author = {Pierre-Alain Fouque and Mehdi Tibouchi}, title = {Close to Uniform Prime Number Generation With Fewer Random Bits}, howpublished = {Cryptology ePrint Archive, Report 2011/481}, year = {2011}, url = {http://eprint.iacr.org/2011/481}, } @misc{cryptoeprint:2011:482, author = {Dov Gordon and Jonathan Katz and Vladimir Kolesnikov and Tal Malkin and Mariana Raykova and Yevgeniy Vahlis}, title = {Secure Computation with Sublinear Amortized Work}, howpublished = {Cryptology ePrint Archive, Report 2011/482}, year = {2011}, url = {http://eprint.iacr.org/2011/482}, } @misc{cryptoeprint:2011:483, author = {Mario Romsy}, title = {Adaption of Pollard's kangaroo algorithm to the FACTOR problem}, howpublished = {Cryptology ePrint Archive, Report 2011/483}, year = {2011}, url = {http://eprint.iacr.org/2011/483}, } @misc{cryptoeprint:2011:484, author = {Johannes Buchmann, Erik Dahmen, and Andreas Hülsing}, title = {XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2011/484}, year = {2011}, url = {http://eprint.iacr.org/2011/484}, } @misc{cryptoeprint:2011:485, author = {Neal Koblitz}, title = {Another Look at Automated Theorem-Proving. II}, howpublished = {Cryptology ePrint Archive, Report 2011/485}, year = {2011}, url = {http://eprint.iacr.org/2011/485}, } @misc{cryptoeprint:2011:486, author = {Kenneth G. Paterson and Jacob C.N. Schuldt and Martijn Stam and Susan Thomson}, title = {On the Joint Security of Encryption and Signature, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2011/486}, year = {2011}, url = {http://eprint.iacr.org/2011/486}, } @misc{cryptoeprint:2011:487, author = {Raghav Bhaskar and Abhishek Bhowmick and Vipul Goyal and Srivatsan Laxman and Abhradeep Thakurta}, title = {Noiseless Database Privacy}, howpublished = {Cryptology ePrint Archive, Report 2011/487}, year = {2011}, url = {http://eprint.iacr.org/2011/487}, } @misc{cryptoeprint:2011:488, author = {Kai-Yuen Cheong}, title = {A Survey of Cryptography Based on Physically Unclonable Objects}, howpublished = {Cryptology ePrint Archive, Report 2011/488}, year = {2011}, url = {http://eprint.iacr.org/2011/488}, } @misc{cryptoeprint:2011:489, author = {A. N. Alekseychuk and L. V. Kovalchuk}, title = {Towards a Theory of Security Evaluation for GOST-like Ciphers against Differential and Linear Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2011/489}, year = {2011}, url = {http://eprint.iacr.org/2011/489}, } @misc{cryptoeprint:2011:490, author = {Allison Lewko}, title = {Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting}, howpublished = {Cryptology ePrint Archive, Report 2011/490}, year = {2011}, url = {http://eprint.iacr.org/2011/490}, } @misc{cryptoeprint:2011:491, author = {Qi Jiang, Jianfeng Ma, Guangsong Li and Xiang Lu}, title = {Cryptanalysis of a Privacy-Preserving Communication Architecture for V2G Networks in Smart Grid}, howpublished = {Cryptology ePrint Archive, Report 2011/491}, year = {2011}, url = {http://eprint.iacr.org/2011/491}, } @misc{cryptoeprint:2011:492, author = {Long H. Nguyen}, title = {Rational distance-bounding protocols over noisy channels}, howpublished = {Cryptology ePrint Archive, Report 2011/492}, year = {2011}, url = {http://eprint.iacr.org/2011/492}, } @misc{cryptoeprint:2011:493, author = {Nir Bitansky and Omer Paneth}, title = {From Point Obfuscation To 3-round Zero-Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2011/493}, year = {2011}, url = {http://eprint.iacr.org/2011/493}, } @misc{cryptoeprint:2011:494, author = {Carmit Hazay and Gert Læssøe Mikkelsen and Tal Rabin and Tomas Toft}, title = {Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting}, howpublished = {Cryptology ePrint Archive, Report 2011/494}, year = {2011}, url = {http://eprint.iacr.org/2011/494}, } @misc{cryptoeprint:2011:495, author = {Dario Catalano and Dario Fiore}, title = {Concise Vector Commitments and their Applications to Zero-Knowledge Elementary Databases}, howpublished = {Cryptology ePrint Archive, Report 2011/495}, year = {2011}, url = {http://eprint.iacr.org/2011/495}, } @misc{cryptoeprint:2011:496, author = {Avradip Mandal and Jacques Patarin and Yannick Seurin}, title = {On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction}, howpublished = {Cryptology ePrint Archive, Report 2011/496}, year = {2011}, url = {http://eprint.iacr.org/2011/496}, } @misc{cryptoeprint:2011:497, author = {Antoine Amarilli and David Naccache and Pablo Rauzy and Emil Simion}, title = {Can a Program Reverse-Engineer Itself?}, howpublished = {Cryptology ePrint Archive, Report 2011/497}, year = {2011}, url = {http://eprint.iacr.org/2011/497}, } @misc{cryptoeprint:2011:498, author = {*Jue-Sam Chou 1, Shih-Che Hung 2, Yalin Chen}, title = {An Efficient Secure Anonymous Proxy Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2011/498}, year = {2011}, url = {http://eprint.iacr.org/2011/498}, } @misc{cryptoeprint:2011:499, author = {Guido Bertoni and Joan Daemen and Michaël Peeters and Gilles Van Assche}, title = {Duplexing the sponge: single-pass authenticated encryption and other applications}, howpublished = {Cryptology ePrint Archive, Report 2011/499}, year = {2011}, url = {http://eprint.iacr.org/2011/499}, } @misc{cryptoeprint:2011:500, author = {Hamid Mala}, title = {Biclique Cryptanalysis of the Block Cipher SQUARE}, howpublished = {Cryptology ePrint Archive, Report 2011/500}, year = {2011}, url = {http://eprint.iacr.org/2011/500}, } @misc{cryptoeprint:2011:501, author = {Daniele Micciancio and Chris Peikert}, title = {Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller}, howpublished = {Cryptology ePrint Archive, Report 2011/501}, year = {2011}, url = {http://eprint.iacr.org/2011/501}, } @misc{cryptoeprint:2011:502, author = {Daniel J. Bernstein and Tanja Lange and Christiane Peters}, title = {Wild McEliece Incognito}, howpublished = {Cryptology ePrint Archive, Report 2011/502}, year = {2011}, url = {http://eprint.iacr.org/2011/502}, } @misc{cryptoeprint:2011:503, author = {Christina Boura and Anne Canteaut}, title = {On the influence of the algebraic degree of $F^{−1}$ on the algebraic degree of $G \circ F$}, howpublished = {Cryptology ePrint Archive, Report 2011/503}, year = {2011}, url = {http://eprint.iacr.org/2011/503}, } @misc{cryptoeprint:2011:504, author = {Iftach Haitner and Itay Berman}, title = {From Non-Adaptive to Adaptive Pseudorandom Functions}, howpublished = {Cryptology ePrint Archive, Report 2011/504}, year = {2011}, url = {http://eprint.iacr.org/2011/504}, } @misc{cryptoeprint:2011:505, author = {Julien Doget and Guillaume Dabosville and Emmanuel Prouff}, title = {Defeat Masking With a (Very) Few Knowledge About the Leakage}, howpublished = {Cryptology ePrint Archive, Report 2011/505}, year = {2011}, url = {http://eprint.iacr.org/2011/505}, } @misc{cryptoeprint:2011:506, author = {David Jao and Luca De Feo}, title = {Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies}, howpublished = {Cryptology ePrint Archive, Report 2011/506}, year = {2011}, url = {http://eprint.iacr.org/2011/506}, } @misc{cryptoeprint:2011:507, author = {Charanjit Jutla and Arnab Roy}, title = {Relatively-Sound NIZKs and Password-Based Key-Exchange}, howpublished = {Cryptology ePrint Archive, Report 2011/507}, year = {2011}, url = {http://eprint.iacr.org/2011/507}, } @misc{cryptoeprint:2011:508, author = {Ivan Damg{\aa}rd and Sebastian Faust and Carmit Hazay}, title = {Secure Two-Party Computation with Low Communication}, howpublished = {Cryptology ePrint Archive, Report 2011/508}, year = {2011}, url = {http://eprint.iacr.org/2011/508}, } @misc{cryptoeprint:2011:509, author = {Emil Stefanov and Elaine Shi and Dawn Song}, title = {Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies}, howpublished = {Cryptology ePrint Archive, Report 2011/509}, year = {2011}, url = {http://eprint.iacr.org/2011/509}, } @misc{cryptoeprint:2011:510, author = {Seung Geol Choi and Jonathan Katz and Ranjit Kumaresan and Hong-Sheng Zhou}, title = {On the Security of the Free-XOR Technique}, howpublished = {Cryptology ePrint Archive, Report 2011/510}, year = {2011}, url = {http://eprint.iacr.org/2011/510}, } @misc{cryptoeprint:2011:511, author = {Matthias Krause and Matthias Hamann}, title = {The Cryptographic Power of Random Selection}, howpublished = {Cryptology ePrint Archive, Report 2011/511}, year = {2011}, url = {http://eprint.iacr.org/2011/511}, } @misc{cryptoeprint:2011:512, author = {Benny Applebaum and Andrej Bogdanov and Alon Rosen}, title = {A Dichotomy for Local Small-Bias Generators}, howpublished = {Cryptology ePrint Archive, Report 2011/512}, year = {2011}, url = {http://eprint.iacr.org/2011/512}, } @misc{cryptoeprint:2011:513, author = {Abhishek Jain and Omkant Pandey}, title = {Non-Malleable Zero Knowledge: Black-Box Constructions and Definitional Relationships}, howpublished = {Cryptology ePrint Archive, Report 2011/513}, year = {2011}, url = {http://eprint.iacr.org/2011/513}, } @misc{cryptoeprint:2011:514, author = {Mohammad Sadeq Dousti and Rasool Jalili}, title = {Milder Definitions of Computational Approximability: The Case of Zero-Knowledge Protocols}, howpublished = {Cryptology ePrint Archive, Report 2011/514}, year = {2011}, url = {http://eprint.iacr.org/2011/514}, } @misc{cryptoeprint:2011:515, author = {Qingfang Jin and Zhuojun Liu and Baofeng Wu and Xiaoming Zhang}, title = {A general conjecture similar to T-D conjecture and its applications in constructing Boolean functions with optimal algebraic immunity}, howpublished = {Cryptology ePrint Archive, Report 2011/515}, year = {2011}, url = {http://eprint.iacr.org/2011/515}, } @misc{cryptoeprint:2011:516, author = {Louis Goubin and Ange Martinelli}, title = {Protecting AES with Shamir's Secret Sharing Scheme}, howpublished = {Cryptology ePrint Archive, Report 2011/516}, year = {2011}, url = {http://eprint.iacr.org/2011/516}, } @misc{cryptoeprint:2011:517, author = {Ralf Kuesters and Tomasz Truderung and Andreas Vogt}, title = {Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study}, howpublished = {Cryptology ePrint Archive, Report 2011/517}, year = {2011}, url = {http://eprint.iacr.org/2011/517}, } @misc{cryptoeprint:2011:518, author = {Ran Canetti and Ben Riva and Guy N. Rothblum}, title = {Two 1-Round Protocols for Delegation of Computation}, howpublished = {Cryptology ePrint Archive, Report 2011/518}, year = {2011}, url = {http://eprint.iacr.org/2011/518}, } @misc{cryptoeprint:2011:519, author = {Stefan Dziembowski and Sebastian Faust}, title = {Leakage-Resilient Cryptography From the Inner-Product Extractor}, howpublished = {Cryptology ePrint Archive, Report 2011/519}, year = {2011}, url = {http://eprint.iacr.org/2011/519}, } @misc{cryptoeprint:2011:520, author = {Houssem maghebi, Sylvain Guilley, Claude Carlet, Jean-Luc Danger}, title = {Classification of High-Order Boolean Masking Schemes and Improvements of their Efficiency}, howpublished = {Cryptology ePrint Archive, Report 2011/520}, year = {2011}, url = {http://eprint.iacr.org/2011/520}, } @misc{cryptoeprint:2011:521, author = {Daniele Micciancio and Petros Mol}, title = {Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions}, howpublished = {Cryptology ePrint Archive, Report 2011/521}, year = {2011}, url = {http://eprint.iacr.org/2011/521}, } @misc{cryptoeprint:2011:522, author = {Imran Abbasi, Mehreen Afzal}, title = {A Compact S-Box Design for SMS4 Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2011/522}, year = {2011}, url = {http://eprint.iacr.org/2011/522}, } @misc{cryptoeprint:2011:523, author = {Miaomiao Tian and Liusheng Huang and Wei Yang }, title = {Security analysis of a fuzzy identity-based encryption scheme}, howpublished = {Cryptology ePrint Archive, Report 2011/523}, year = {2011}, url = {http://eprint.iacr.org/2011/523}, } @misc{cryptoeprint:2011:524, author = {Leibo Li, Jiazhe Chen and Xiaoyun Wang}, title = {Multiplied Conditional Impossible Differential Attack on Reduced-Round Camellia}, howpublished = {Cryptology ePrint Archive, Report 2011/524}, year = {2011}, url = {http://eprint.iacr.org/2011/524}, } @misc{cryptoeprint:2011:525, author = {Yanbin Pan and Feng Zhang}, title = {A Note on the Density of the Multiple Subset Sum Problems}, howpublished = {Cryptology ePrint Archive, Report 2011/525}, year = {2011}, url = {http://eprint.iacr.org/2011/525}, } @misc{cryptoeprint:2011:526, author = {Suresh Chari and Charanjit Jutla and Arnab Roy}, title = {Universally Composable Security Analysis of OAuth v2.0}, howpublished = {Cryptology ePrint Archive, Report 2011/526}, year = {2011}, url = {http://eprint.iacr.org/2011/526}, } @misc{cryptoeprint:2011:527, author = {Mohsen Toorani and Maryam Saeed}, title = {Security Weaknesses of password-only authenticated key establishment protocol without public key cryptography}, howpublished = {Cryptology ePrint Archive, Report 2011/527}, year = {2011}, url = {http://eprint.iacr.org/2011/527}, } @misc{cryptoeprint:2011:528, author = {Jian-Zhu Lu, Hong-Qing Ren, and Jipeng Zhou}, title = {Efficient Delegation-Based Authentication Protocol with Strong Mobile Privacy}, howpublished = {Cryptology ePrint Archive, Report 2011/528}, year = {2011}, url = {http://eprint.iacr.org/2011/528}, } @misc{cryptoeprint:2011:529, author = {Qingji Zheng and Shouhuai Xu}, title = {Secure and Efficient Proof of Storage with Deduplication}, howpublished = {Cryptology ePrint Archive, Report 2011/529}, year = {2011}, url = {http://eprint.iacr.org/2011/529}, } @misc{cryptoeprint:2011:530, author = {Stefan Dziembowski and Tomasz Kazana and Daniel Wichs}, title = {Key-Evolution Schemes Resilient to Space-Bounded Leakage}, howpublished = {Cryptology ePrint Archive, Report 2011/530}, year = {2011}, url = {http://eprint.iacr.org/2011/530}, } @misc{cryptoeprint:2011:531, author = {Philippe Loubet-Moundi and David Vigilant and Francis Olivier}, title = {Static Fault Attacks on Hardware DES Registers}, howpublished = {Cryptology ePrint Archive, Report 2011/531}, year = {2011}, url = {http://eprint.iacr.org/2011/531}, } @misc{cryptoeprint:2011:532, author = {Bart Mennink and Bart Preneel}, title = {Hash Functions Based on Three Permutations: A Generic Security Analysis}, howpublished = {Cryptology ePrint Archive, Report 2011/532}, year = {2011}, url = {http://eprint.iacr.org/2011/532}, } @misc{cryptoeprint:2011:533, author = {abhi shelat and Chih-hao Shen}, title = {Two-Output Secure Computation with Malicious Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2011/533}, year = {2011}, url = {http://eprint.iacr.org/2011/533}, } @misc{cryptoeprint:2011:534, author = {Maxime Nassar and Sylvain Guilley and Jean-Luc Danger}, title = {Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2011/534}, year = {2011}, url = {http://eprint.iacr.org/2011/534}, } @misc{cryptoeprint:2011:535, author = {I. Damgard and V. Pastro and N.P. Smart and S. Zakarias}, title = {Multiparty Computation from Somewhat Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2011/535}, year = {2011}, url = {http://eprint.iacr.org/2011/535}, } @misc{cryptoeprint:2011:536, author = {Rafail Ostrovsky and Vanishree Rao and Alessandra Scafuro and Ivan Visconti}, title = {Revisiting Lower and Upper Bounds for Selective Decommitments}, howpublished = {Cryptology ePrint Archive, Report 2011/536}, year = {2011}, url = {http://eprint.iacr.org/2011/536}, } @misc{cryptoeprint:2011:537, author = {Vadim Lyubashevsky}, title = {Lattice Signatures Without Trapdoors}, howpublished = {Cryptology ePrint Archive, Report 2011/537}, year = {2011}, url = {http://eprint.iacr.org/2011/537}, } @misc{cryptoeprint:2011:538, author = {Jia XU}, title = {Secure Cloud Storage with Encrypted Data using File-Based Authentication}, howpublished = {Cryptology ePrint Archive, Report 2011/538}, year = {2011}, url = {http://eprint.iacr.org/2011/538}, } @misc{cryptoeprint:2011:539, author = {Ching-Hua Yu}, title = {Sign Modules in Secure Arithmetic Circuits}, howpublished = {Cryptology ePrint Archive, Report 2011/539}, year = {2011}, url = {http://eprint.iacr.org/2011/539}, } @misc{cryptoeprint:2011:540, author = {Yosuke Katoh and Yun-Ju Huang and Chen-Mou Cheng and Tsuyoshi Takagi}, title = {Efficient Implementation of the $\eta_T$ Pairing on GPU}, howpublished = {Cryptology ePrint Archive, Report 2011/540}, year = {2011}, url = {http://eprint.iacr.org/2011/540}, } @misc{cryptoeprint:2011:541, author = {Orr Dunkelman, Nathan Keller, Adi Shamir}, title = {Minimalism in Cryptography: The Even-Mansour Scheme Revisited}, howpublished = {Cryptology ePrint Archive, Report 2011/541}, year = {2011}, url = {http://eprint.iacr.org/2011/541}, } @misc{cryptoeprint:2011:542, author = {Yang Lu and Jiguo Li}, title = {Certificate-Based Signcryption: Security Model and Efficient Construction}, howpublished = {Cryptology ePrint Archive, Report 2011/542}, year = {2011}, url = {http://eprint.iacr.org/2011/542}, } @misc{cryptoeprint:2011:543, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption}, howpublished = {Cryptology ePrint Archive, Report 2011/543}, year = {2011}, url = {http://eprint.iacr.org/2011/543}, } @misc{cryptoeprint:2011:544, author = {Andres Molina-Markham and George Danezis and Kevin Fu and Prashant Shenoy and David Irwin}, title = {Designing Privacy-preserving Smart Meters with Low-cost Microcontrollers}, howpublished = {Cryptology ePrint Archive, Report 2011/544}, year = {2011}, url = {http://eprint.iacr.org/2011/544}, } @misc{cryptoeprint:2011:545, author = {Masao Kasahara}, title = {Public Key Cryptosystems Constructed Based on Random Pseudo Cyclic Codes, K(IX)SE(1)PKC, Realizing Coding Rate of Exactly 1.0}, howpublished = {Cryptology ePrint Archive, Report 2011/545}, year = {2011}, url = {http://eprint.iacr.org/2011/545}, } @misc{cryptoeprint:2011:546, author = {Angelo De Caro and Vincenzo Iovino and Giuseppe Persiano}, title = {Hidden Vector Encryption Fully Secure Against Unrestricted Queries}, howpublished = {Cryptology ePrint Archive, Report 2011/546}, year = {2011}, url = {http://eprint.iacr.org/2011/546}, } @misc{cryptoeprint:2011:547, author = {Zhaopeng Dai and Zhuojun Liu}, title = {The Single Cycle T-functions}, howpublished = {Cryptology ePrint Archive, Report 2011/547}, year = {2011}, url = {http://eprint.iacr.org/2011/547}, } @misc{cryptoeprint:2011:548, author = {V.O. Drelikhov and G.B. Marshalko and A.V. Pokrovskiy}, title = {On the security of MQ_DRBG}, howpublished = {Cryptology ePrint Archive, Report 2011/548}, year = {2011}, url = {http://eprint.iacr.org/2011/548}, } @misc{cryptoeprint:2011:549, author = {Qingfang Jin and Zhuojun Liu and Baofeng Wu}, title = {1-Resilient Boolean Function with Optimal Algebraic Immunity}, howpublished = {Cryptology ePrint Archive, Report 2011/549}, year = {2011}, url = {http://eprint.iacr.org/2011/549}, } @misc{cryptoeprint:2011:550, author = {Javad Alizadeh and Abdolrasoul Mirghadri }, title = {A New Distinguisher for CubeHash-8/b and CubeHash-15/b Compression Functions}, howpublished = {Cryptology ePrint Archive, Report 2011/550}, year = {2011}, url = {http://eprint.iacr.org/2011/550}, } @misc{cryptoeprint:2011:551, author = {Shengbao Wu and Mingsheng Wang}, title = {Security Evaluation against Differential Cryptanalysis for Block Cipher Structures}, howpublished = {Cryptology ePrint Archive, Report 2011/551}, year = {2011}, url = {http://eprint.iacr.org/2011/551}, } @misc{cryptoeprint:2011:552, author = {Stefan Katzenbeisser, Ünal Kocabas, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert-Jan Schrijen, Heike Schröder, Christian Wachsmann}, title = {Recyclable PUFs: Logically Reconfigurable PUFs}, howpublished = {Cryptology ePrint Archive, Report 2011/552}, year = {2011}, url = {http://eprint.iacr.org/2011/552}, } @misc{cryptoeprint:2011:553, author = {Mohammad Mahmoody and Tal Moran and Salil Vadhan}, title = {Non-Interactive Time-Stamping and Proofs of Work in the Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2011/553}, year = {2011}, url = {http://eprint.iacr.org/2011/553}, } @misc{cryptoeprint:2011:554, author = {Yu-Chi Chen and Gwoboa Horng}, title = {On the security models for certificateless signature schemes achieving level 3 security}, howpublished = {Cryptology ePrint Archive, Report 2011/554}, year = {2011}, url = {http://eprint.iacr.org/2011/554}, } @misc{cryptoeprint:2011:555, author = {Michelle Kendall and Keith Martin}, title = {On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks}, howpublished = {Cryptology ePrint Archive, Report 2011/555}, year = {2011}, url = {http://eprint.iacr.org/2011/555}, } @misc{cryptoeprint:2011:556, author = {Yongjia Wang and Haining Fan}, title = {GF(2^n) redundant representation using matrix embedding}, howpublished = {Cryptology ePrint Archive, Report 2011/556}, year = {2011}, url = {http://eprint.iacr.org/2011/556}, } @misc{cryptoeprint:2011:557, author = {Chen Cai-Sen, Wang Tao, Chen Xiao-Cen and Zhou Ping}, title = {An Improved Trace Driven Instruction Cache Timing Attack on RSA}, howpublished = {Cryptology ePrint Archive, Report 2011/557}, year = {2011}, url = {http://eprint.iacr.org/2011/557}, } @misc{cryptoeprint:2011:558, author = {Itai Dinur and Orr Dunkelman and Adi Shamir}, title = {Improved Attacks on Full GOST}, howpublished = {Cryptology ePrint Archive, Report 2011/558}, year = {2011}, url = {http://eprint.iacr.org/2011/558}, } @misc{cryptoeprint:2011:559, author = {Eike Kiltz and Adam O'Neill and Adam Smith}, title = {Instantiability of RSA-OAEP under Chosen-Plaintext Attack}, howpublished = {Cryptology ePrint Archive, Report 2011/559}, year = {2011}, url = {http://eprint.iacr.org/2011/559}, } @misc{cryptoeprint:2011:560, author = {Ching-Hua Yu and Bo-Yin Yang}, title = {Randomized Secure Two-Party Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation}, howpublished = {Cryptology ePrint Archive, Report 2011/560}, year = {2011}, url = {http://eprint.iacr.org/2011/560}, } @misc{cryptoeprint:2011:561, author = {Alex Bain and John Mitchell and Rahul Sharma and Deian Stefan and Joe Zimmerman}, title = {A Domain-Specific Language for Computing on Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2011/561}, year = {2011}, url = {http://eprint.iacr.org/2011/561}, } @misc{cryptoeprint:2011:562, author = {Annalisa De Bonis and Giovanni Di Crescenzo}, title = {A Group Testing Approach to Improved Corruption Localizing Hashing}, howpublished = {Cryptology ePrint Archive, Report 2011/562}, year = {2011}, url = {http://eprint.iacr.org/2011/562}, } @misc{cryptoeprint:2011:563, author = {Masoumeh Safkhani and Nasour Bagheri and Majid Naderi}, title = {On the Security of RFID Anti Cloning Security Protocol(ACSP)}, howpublished = {Cryptology ePrint Archive, Report 2011/563}, year = {2011}, url = {http://eprint.iacr.org/2011/563}, } @misc{cryptoeprint:2011:564, author = {N. Ahmed and C.D. Jensen and E. Zenner}, title = {Private-key Symbolic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2011/564}, year = {2011}, url = {http://eprint.iacr.org/2011/564}, } @misc{cryptoeprint:2011:565, author = {Saif Al-Kuwari and James H. Davenport and Russell J. Bradford}, title = {Cryptographic Hash Functions: Recent Design Trends and Security Notions}, howpublished = {Cryptology ePrint Archive, Report 2011/565}, year = {2011}, url = {http://eprint.iacr.org/2011/565}, } @misc{cryptoeprint:2011:566, author = {Craig Gentry and Shai Halevi and Nigel P. Smart}, title = {Fully Homomorphic Encryption with Polylog Overhead}, howpublished = {Cryptology ePrint Archive, Report 2011/566}, year = {2011}, url = {http://eprint.iacr.org/2011/566}, } @misc{cryptoeprint:2011:567, author = {Moon Sung Lee}, title = {On the sparse subset sum problem from Gentry-Halevi's implementation of fully homomorphic encryption}, howpublished = {Cryptology ePrint Archive, Report 2011/567}, year = {2011}, url = {http://eprint.iacr.org/2011/567}, } @misc{cryptoeprint:2011:568, author = {Aleksander Essex and Christian Henrich and Urs Hengartner}, title = {Single Layer Optical-scan Voting with Fully Distributed Trust}, howpublished = {Cryptology ePrint Archive, Report 2011/568}, year = {2011}, url = {http://eprint.iacr.org/2011/568}, } @misc{cryptoeprint:2011:569, author = {Ming Li, Ali Miri and Daming Zhu}, title = {Analysis of the Hamming Weight of the Extended wmbNAF}, howpublished = {Cryptology ePrint Archive, Report 2011/569}, year = {2011}, url = {http://eprint.iacr.org/2011/569}, } @misc{cryptoeprint:2011:570, author = {Jintai Ding and Thorsten Kleinjung}, title = {Degree of regularity for HFE-}, howpublished = {Cryptology ePrint Archive, Report 2011/570}, year = {2011}, url = {http://eprint.iacr.org/2011/570}, } @misc{cryptoeprint:2011:571, author = {Brajesh Kumar Singh and Sugata Gangopadhyay}, title = {Lower Bound on Covering Radius of Reed-Muller Codes in Set of Balanced Functions}, howpublished = {Cryptology ePrint Archive, Report 2011/571}, year = {2011}, url = {http://eprint.iacr.org/2011/571}, } @misc{cryptoeprint:2011:572, author = {Ayan Mahalanobis}, title = {The ElGamal cryptosystem over circulant matrices}, howpublished = {Cryptology ePrint Archive, Report 2011/572}, year = {2011}, url = {http://eprint.iacr.org/2011/572}, } @misc{cryptoeprint:2011:573, author = {Masao Kasahara}, title = {A New Class of Multivariate Public Key Cryptosystems Constructed Based on Random Pseudo Cyclic Codes, K(XIII)SE(2)PKC, Realizing Coding Rate of Exactly 1.0}, howpublished = {Cryptology ePrint Archive, Report 2011/573}, year = {2011}, url = {http://eprint.iacr.org/2011/573}, } @misc{cryptoeprint:2011:574, author = {Jia XU and Ee-Chien CHANG}, title = {Towards Efficient Provable Data Possession}, howpublished = {Cryptology ePrint Archive, Report 2011/574}, year = {2011}, url = {http://eprint.iacr.org/2011/574}, } @misc{cryptoeprint:2011:575, author = {Jing Liu, Changji Wang}, title = {Exclusive Key-Based Group Rekeying}, howpublished = {Cryptology ePrint Archive, Report 2011/575}, year = {2011}, url = {http://eprint.iacr.org/2011/575}, } @misc{cryptoeprint:2011:576, author = {Jing Liu, Qiong Huang, Bo Yang}, title = {Efficient Multicast Key Distribution Using HOWF-based Access Control Structures}, howpublished = {Cryptology ePrint Archive, Report 2011/576}, year = {2011}, url = {http://eprint.iacr.org/2011/576}, } @misc{cryptoeprint:2011:577, author = {Ou Ruan , Cai Fu and Guohua Cui }, title = {An Efficient Protocol for the Commit-Prove-Fair-Open functionality }, howpublished = {Cryptology ePrint Archive, Report 2011/577}, year = {2011}, url = {http://eprint.iacr.org/2011/577}, } @misc{cryptoeprint:2011:578, author = {Balasingham Balamohan}, title = {ACCELERATING THE SCALAR MULTIPLICATION ON GENUS 2 HYPERELLIPTIC CURVE CRYPTOSYSTEMS}, howpublished = {Cryptology ePrint Archive, Report 2011/578}, year = {2011}, url = {http://eprint.iacr.org/2011/578}, } @misc{cryptoeprint:2011:579, author = {Yang Li and Daisuke Nakatsu and Qi Li and Kazuo Ohta and Kazuo Sakiyama}, title = {Clockwise Collision Analysis -- Overlooked Side-Channel Leakage Inside Your Measurements}, howpublished = {Cryptology ePrint Archive, Report 2011/579}, year = {2011}, url = {http://eprint.iacr.org/2011/579}, } @misc{cryptoeprint:2011:580, author = {Abdoul Aziz Ciss and Djiby Sow}, title = {On a new generalization of Huff curves}, howpublished = {Cryptology ePrint Archive, Report 2011/580}, year = {2011}, url = {http://eprint.iacr.org/2011/580}, } @misc{cryptoeprint:2011:581, author = {Mihir Bellare and Rafael Dowsley and Brent Waters and Scott Yilek}, title = {Standard Security Does Not Imply Security Against Selective-Opening}, howpublished = {Cryptology ePrint Archive, Report 2011/581}, year = {2011}, url = {http://eprint.iacr.org/2011/581}, } @misc{cryptoeprint:2011:582, author = {Abdoul Aziz Ciss and Djiby Sow}, title = {Randomness Extraction in finite fields $\mathbb{F}_{p^{n}}$}, howpublished = {Cryptology ePrint Archive, Report 2011/582}, year = {2011}, url = {http://eprint.iacr.org/2011/582}, } @misc{cryptoeprint:2011:583, author = {Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang and Ta Toan Khoa Nguyen}, title = {Revocable Identity-Based Encryption from Lattices}, howpublished = {Cryptology ePrint Archive, Report 2011/583}, year = {2011}, url = {http://eprint.iacr.org/2011/583}, } @misc{cryptoeprint:2011:584, author = {Teruo Saito}, title = {A Single-Key Attack on 6-Round KASUMI}, howpublished = {Cryptology ePrint Archive, Report 2011/584}, year = {2011}, url = {http://eprint.iacr.org/2011/584}, } @misc{cryptoeprint:2011:585, author = {Emil Stefanov and Marten van Dijk and Alina Oprea and Ari Juels}, title = {Iris: A Scalable Cloud File System with Efficient Integrity Checks}, howpublished = {Cryptology ePrint Archive, Report 2011/585}, year = {2011}, url = {http://eprint.iacr.org/2011/585}, } @misc{cryptoeprint:2011:586, author = {Mainack Mondal and Avik Chakraborti and Nilanjan Datta and Debdeep Mukhopadhyay }, title = {TweLEX: A Tweaked Version of the LEX Stream Cipher}, howpublished = {Cryptology ePrint Archive, Report 2011/586}, year = {2011}, url = {http://eprint.iacr.org/2011/586}, } @misc{cryptoeprint:2011:587, author = {Charalampos Papamanthou, Elaine Shi, and Roberto Tamassia}, title = {Publicly Verifiable Delegation of Computation}, howpublished = {Cryptology ePrint Archive, Report 2011/587}, year = {2011}, url = {http://eprint.iacr.org/2011/587}, } @misc{cryptoeprint:2011:588, author = {Arpita Maitra and Goutam Paul}, title = {Four-State BB84 is as Secure as the Six-State Protocol}, howpublished = {Cryptology ePrint Archive, Report 2011/588}, year = {2011}, url = {http://eprint.iacr.org/2011/588}, } @misc{cryptoeprint:2011:589, author = {Chen Su and Haining Fan}, title = {Impact of Intel's New Instruction Sets on Software Implementation of $GF(2)[x]$ Multiplication}, howpublished = {Cryptology ePrint Archive, Report 2011/589}, year = {2011}, url = {http://eprint.iacr.org/2011/589}, } @misc{cryptoeprint:2011:590, author = {Jianwei Li and Mingjie Liu and Guizhen Zhu}, title = {An Efficient Broadcast Attack against NTRU}, howpublished = {Cryptology ePrint Archive, Report 2011/590}, year = {2011}, url = {http://eprint.iacr.org/2011/590}, } @misc{cryptoeprint:2011:591, author = {Noboru Kunihiro and Naoyuki Shinohara and Tetsuya Izu}, title = {A Unified Framework for Small Secret Exponent Attack on RSA}, howpublished = {Cryptology ePrint Archive, Report 2011/591}, year = {2011}, url = {http://eprint.iacr.org/2011/591}, } @misc{cryptoeprint:2011:592, author = {Laila El Aimani}, title = {Generic Constructions for Verifiable Signcryption}, howpublished = {Cryptology ePrint Archive, Report 2011/592}, year = {2011}, url = {http://eprint.iacr.org/2011/592}, } @misc{cryptoeprint:2011:593, author = {Yu Chen and Liqun Chen and Zongyang Zhang}, title = {CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model }, howpublished = {Cryptology ePrint Archive, Report 2011/593}, year = {2011}, url = {http://eprint.iacr.org/2011/593}, } @misc{cryptoeprint:2011:594, author = {Dalia Khader and Peter Y.A. Ryan}, title = {Receipt Freeness of Prêt à Voter Provably Secure}, howpublished = {Cryptology ePrint Archive, Report 2011/594}, year = {2011}, url = {http://eprint.iacr.org/2011/594}, } @misc{cryptoeprint:2011:595, author = {Helger Lipmaa}, title = {Efficient Multi-Query CPIR from Ring-LWE}, howpublished = {Cryptology ePrint Archive, Report 2011/595}, year = {2011}, url = {http://eprint.iacr.org/2011/595}, } @misc{cryptoeprint:2011:596, author = {Seny Kamara and Mariana Raykova}, title = {Parallel Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2011/596}, year = {2011}, url = {http://eprint.iacr.org/2011/596}, } @misc{cryptoeprint:2011:597, author = {Bryan Parno and Mariana Raykova and Vinod Vaikuntanathan}, title = {How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2011/597}, year = {2011}, url = {http://eprint.iacr.org/2011/597}, } @misc{cryptoeprint:2011:598, author = {Jean-Charles Faugère and Ludovic Perret and Christophe Petit and Guénaël Renault}, title = {New Subexponential Algorithms for Factoring in $SL(2,\fq)$}, howpublished = {Cryptology ePrint Archive, Report 2011/598}, year = {2011}, url = {http://eprint.iacr.org/2011/598}, } @misc{cryptoeprint:2011:599, author = {Yi Ding and Lei Fan}, title = {Efficient Password-Based Authenticated Key Exchange from Lattices}, howpublished = {Cryptology ePrint Archive, Report 2011/599}, year = {2011}, url = {http://eprint.iacr.org/2011/599}, } @misc{cryptoeprint:2011:600, author = {Baocheng Wang, Chunming Tang,Yanfeng Qi, Yixian Yang, Maozhi Xu}, title = {A New Class of Hyper-bent Boolean Functions with Multiple Trace Terms}, howpublished = {Cryptology ePrint Archive, Report 2011/600}, year = {2011}, url = {http://eprint.iacr.org/2011/600}, } @misc{cryptoeprint:2011:601, author = {Caixue Zhou}, title = {A Multi-Receiver ID-Based Generalized Signcryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2011/601}, year = {2011}, url = {http://eprint.iacr.org/2011/601}, } @misc{cryptoeprint:2011:602, author = {Vipul Goyal}, title = {Positive Results for Concurrently Secure Computation in the Plain Model}, howpublished = {Cryptology ePrint Archive, Report 2011/602}, year = {2011}, url = {http://eprint.iacr.org/2011/602}, } @misc{cryptoeprint:2011:603, author = {Le Dong and Wenling Wu and Shuang Wu and Jian Zou}, title = {Advanced Zero-Sum Distinguishers for the Permutations of the PHOTON Family}, howpublished = {Cryptology ePrint Archive, Report 2011/603}, year = {2011}, url = {http://eprint.iacr.org/2011/603}, } @misc{cryptoeprint:2011:604, author = {Aurore Guillevic and Damien Vergnaud}, title = {Genus 2 Hyperelliptic Curve Families with Explicit Jacobian Order Evaluation and Pairing-Friendly Constructions}, howpublished = {Cryptology ePrint Archive, Report 2011/604}, year = {2011}, url = {http://eprint.iacr.org/2011/604}, } @misc{cryptoeprint:2011:605, author = {Payman Mohassel}, title = {Efficient and Secure Delegation of Linear Algebra}, howpublished = {Cryptology ePrint Archive, Report 2011/605}, year = {2011}, url = {http://eprint.iacr.org/2011/605}, } @misc{cryptoeprint:2011:606, author = {Xi Xiong and Haining Fan}, title = {$GF(2^{n})$ Subquadratic Polynomial Basis Multipliers for Some Irreducible Trinomials}, howpublished = {Cryptology ePrint Archive, Report 2011/606}, year = {2011}, url = {http://eprint.iacr.org/2011/606}, } @misc{cryptoeprint:2011:607, author = {Carlos {Aguilar Melchor} and Slim Bettaieb and Philippe Gaborit and Javier Herranz}, title = {Improving Additive and Multiplicative Homomorphic Encryption Schemes Based on Worst-Case Hardness Assumptions}}, howpublished = {Cryptology ePrint Archive, Report 2011/607}, year = {2011}, url = {http://eprint.iacr.org/2011/607}, } @misc{cryptoeprint:2011:608, author = {Peter Birkner and Patrick Longa and Francesco Sica}, title = {Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication}, howpublished = {Cryptology ePrint Archive, Report 2011/608}, year = {2011}, url = {http://eprint.iacr.org/2011/608}, } @misc{cryptoeprint:2011:609, author = {Jian Guo and Thomas Peyrin and Axel Poschmann}, title = {The PHOTON Family of Lightweight Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2011/609}, year = {2011}, url = {http://eprint.iacr.org/2011/609}, } @misc{cryptoeprint:2011:610, author = {Nicolas Veyrat-Charvillon and Benoît Gérard and Mathieu Renauld and François-Xavier Standaert}, title = {An optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2011/610}, year = {2011}, url = {http://eprint.iacr.org/2011/610}, } @misc{cryptoeprint:2011:611, author = {Dana Dachman-Soled and Tal Malkin and Mariana Raykova and Muthuramakrishnan Venkitasubramaniam}, title = {Adaptive and Concurrent Secure Computation from New Notions of Non-Malleability}, howpublished = {Cryptology ePrint Archive, Report 2011/611}, year = {2011}, url = {http://eprint.iacr.org/2011/611}, } @misc{cryptoeprint:2011:612, author = {Vladimir Kolesnikov and Ganapathy S. Sundaram}, title = {IBAKE: Identity-Based Authenticated Key Exchange Protocol}, howpublished = {Cryptology ePrint Archive, Report 2011/612}, year = {2011}, url = {http://eprint.iacr.org/2011/612}, } @misc{cryptoeprint:2011:613, author = {Gilad Asharov and Abhishek Jain and Daniel Wichs}, title = {Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE}, howpublished = {Cryptology ePrint Archive, Report 2011/613}, year = {2011}, url = {http://eprint.iacr.org/2011/613}, } @misc{cryptoeprint:2011:614, author = {Keke Chen}, title = {On Security of the Utility Preserving RASP Encryption}, howpublished = {Cryptology ePrint Archive, Report 2011/614}, year = {2011}, url = {http://eprint.iacr.org/2011/614}, } @misc{cryptoeprint:2011:615, author = {Jean Paul Degabriele and Anja Lehmann and Kenneth G. Paterso and Nigel P. Smart and Mario Strefler}, title = {On the Joint Security of Encryption and Signature in EMV}, howpublished = {Cryptology ePrint Archive, Report 2011/615}, year = {2011}, url = {http://eprint.iacr.org/2011/615}, } @misc{cryptoeprint:2011:616, author = {Jiazhe Chen and Meiqin Wang and Bart Preneel}, title = {Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT}, howpublished = {Cryptology ePrint Archive, Report 2011/616}, year = {2011}, url = {http://eprint.iacr.org/2011/616}, } @misc{cryptoeprint:2011:617, author = {Joseph A. Akinyele and Matthew D. Green and Avi D. Rubin}, title = {Charm: A framework for Rapidly Prototyping Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2011/617}, year = {2011}, url = {http://eprint.iacr.org/2011/617}, } @misc{cryptoeprint:2011:618, author = {Lishoy Francis and Gerhard Hancke and Keith Mayes and Konstantinos Markantonakis}, title = {Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones}, howpublished = {Cryptology ePrint Archive, Report 2011/618}, year = {2011}, url = {http://eprint.iacr.org/2011/618}, } @misc{cryptoeprint:2011:619, author = {Bo Zhu and Guang Gong}, title = {Guess-then-Meet-in-the-Middle Attacks on the KTANTAN Family of Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2011/619}, year = {2011}, url = {http://eprint.iacr.org/2011/619}, } @misc{cryptoeprint:2011:620, author = {Elena Andreeva and Atul Luykx and Bart Mennink}, title = {Provable Security of BLAKE with Non-Ideal Compression Function}, howpublished = {Cryptology ePrint Archive, Report 2011/620}, year = {2011}, url = {http://eprint.iacr.org/2011/620}, } @misc{cryptoeprint:2011:621, author = {Zhenfu Cao, Zongyang Zhang , Yunlei Zhao}, title = {Adaptive Security of Concurrent Non-Malleable Zero-Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2011/621}, year = {2011}, url = {http://eprint.iacr.org/2011/621}, } @misc{cryptoeprint:2011:622, author = {Andrej Bogdanov and Chin Ho Lee}, title = {Homomorphic encryption from codes}, howpublished = {Cryptology ePrint Archive, Report 2011/622}, year = {2011}, url = {http://eprint.iacr.org/2011/622}, } @misc{cryptoeprint:2011:623, author = {Donghoon Chang and Mridul Nandi and Moti Yung}, title = {Indifferentiability of the Hash Algorithm BLAKE}, howpublished = {Cryptology ePrint Archive, Report 2011/623}, year = {2011}, url = {http://eprint.iacr.org/2011/623}, } @misc{cryptoeprint:2011:624, author = {Itai Dinur and Orr Dunkelman and Adi Shamir}, title = {New attacks on Keccak-224 and Keccak-256}, howpublished = {Cryptology ePrint Archive, Report 2011/624}, year = {2011}, url = {http://eprint.iacr.org/2011/624}, } @misc{cryptoeprint:2011:625, author = {Mohammad Hassan Habibi, Mohammad Reza Aref}, title = {Two RFID Privacy Models in Front of a Court}, howpublished = {Cryptology ePrint Archive, Report 2011/625}, year = {2011}, url = {http://eprint.iacr.org/2011/625}, } @misc{cryptoeprint:2011:626, author = {Nicolas T. Courtois}, title = {Algebraic Complexity Reduction and Cryptanalysis of GOST}, howpublished = {Cryptology ePrint Archive, Report 2011/626}, year = {2011}, url = {http://eprint.iacr.org/2011/626}, } @misc{cryptoeprint:2011:627, author = {Sihem Mesnager}, title = {A note on semi-bent functions with multiple trace terms and hyperelliptic curves}, howpublished = {Cryptology ePrint Archive, Report 2011/627}, year = {2011}, url = {http://eprint.iacr.org/2011/627}, } @misc{cryptoeprint:2011:628, author = {Kaoru Kurosawa and Le Trieu Phong}, title = {Maximum Leakage Resilient IBE and IPE}, howpublished = {Cryptology ePrint Archive, Report 2011/628}, year = {2011}, url = {http://eprint.iacr.org/2011/628}, } @misc{cryptoeprint:2011:629, author = {Eli Ben-Sasson and Serge Fehr and Rafail Ostrovsky}, title = {Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority}, howpublished = {Cryptology ePrint Archive, Report 2011/629}, year = {2011}, url = {http://eprint.iacr.org/2011/629}, } @misc{cryptoeprint:2011:630, author = {Dustin Moody and Souradyuti Paul and Daniel Smith-Tone}, title = {Indifferentiability Security of the Fast Widepipe Hash: Breaking the Birthday Barrier}, howpublished = {Cryptology ePrint Archive, Report 2011/630}, year = {2011}, url = {http://eprint.iacr.org/2011/630}, } @misc{cryptoeprint:2011:631, author = {Yu-Chi Chen and Du-Shiau Tsai and Gwoboa Horng}, title = {On the Security of a Cheating Immune Visual Secret Sharing Scheme}, howpublished = {Cryptology ePrint Archive, Report 2011/631}, year = {2011}, url = {http://eprint.iacr.org/2011/631}, } @misc{cryptoeprint:2011:632, author = {Elena Dubrova}, title = {A Scalable Method for Constructing Galois NLFSRs with Period $2^n-1$ using Cross-Join Pairs}, howpublished = {Cryptology ePrint Archive, Report 2011/632}, year = {2011}, url = {http://eprint.iacr.org/2011/632}, } @misc{cryptoeprint:2011:633, author = {B.B. Brumley and M. Barbosa and D. Page and F. Vercauteren}, title = {Practical realisation and elimination of an ECC-related software bug attack}, howpublished = {Cryptology ePrint Archive, Report 2011/633}, year = {2011}, url = {http://eprint.iacr.org/2011/633}, } @misc{cryptoeprint:2011:634, author = {Mohammad Sabzinejad Farash and Mahmoud Ahmadian Attari and Majid Bayat1}, title = {Security of Multiple-Key Agreement Protocols and Propose an Enhanced Protocol}, howpublished = {Cryptology ePrint Archive, Report 2011/634}, year = {2011}, url = {http://eprint.iacr.org/2011/634}, } @misc{cryptoeprint:2011:635, author = {Marcin Rogawski and Kris Gaj}, title = {Groestl Tweaks and their Effect on FPGA Results}, howpublished = {Cryptology ePrint Archive, Report 2011/635}, year = {2011}, url = {http://eprint.iacr.org/2011/635}, } @misc{cryptoeprint:2011:636, author = {Iwen Coisel and Tania Martin}, title = {Untangling RFID Privacy Models}, howpublished = {Cryptology ePrint Archive, Report 2011/636}, year = {2011}, url = {http://eprint.iacr.org/2011/636}, } @misc{cryptoeprint:2011:637, author = {Laszlo Hars}, title = {Random Number Generation Based on Oscillatory Metastability in Ring Circuits}, howpublished = {Cryptology ePrint Archive, Report 2011/637}, year = {2011}, url = {http://eprint.iacr.org/2011/637}, } @misc{cryptoeprint:2011:638, author = {Christophe Petit and Jean-Jacques Quisquater}, title = {Rubik's for cryptographers}, howpublished = {Cryptology ePrint Archive, Report 2011/638}, year = {2011}, url = {http://eprint.iacr.org/2011/638}, } @misc{cryptoeprint:2011:639, author = {Jiejun Kong, Dapeng Wu, Xiaoyan Hong, Mario Gerla}, title = {Towards a Probabilistic Complexity-theoretic Modeling of Biological Cyanide Poisoning as Service Attack in Self-organizing Networks}, howpublished = {Cryptology ePrint Archive, Report 2011/639}, year = {2011}, url = {http://eprint.iacr.org/2011/639}, } @misc{cryptoeprint:2011:640, author = {Emiliano De Cristofaro, Claudio Soriente, Gene Tsudik, Andrew Williams}, title = {Hummingbird: Privacy at the time of Twitter}, howpublished = {Cryptology ePrint Archive, Report 2011/640}, year = {2011}, url = {http://eprint.iacr.org/2011/640}, } @misc{cryptoeprint:2011:641, author = {E.A. Grechnikov and A.V. Adinetz}, title = {Collision for 75-step SHA-1: Intensive Parallelization with GPU}, howpublished = {Cryptology ePrint Archive, Report 2011/641}, year = {2011}, url = {http://eprint.iacr.org/2011/641}, } @misc{cryptoeprint:2011:642, author = {Yongqiang Li and Mingsheng Wang}, title = {Constructing differentially 4-uniform permutations over $\mbf_{2^{2m}}$ from quadratic APN permutations over $\mbf_{2^{2m+1}}$}, howpublished = {Cryptology ePrint Archive, Report 2011/642}, year = {2011}, url = {http://eprint.iacr.org/2011/642}, } @misc{cryptoeprint:2011:643, author = {Alexey Chilikov and Evgeny Alekseev}, title = {Some Words About Cryptographic Key Recognition In Data Streams}, howpublished = {Cryptology ePrint Archive, Report 2011/643}, year = {2011}, url = {http://eprint.iacr.org/2011/643}, } @misc{cryptoeprint:2011:644, author = {Ewan Fleischmann and Christian Forler and Stefan Lucks}, title = {McOE: A Foolproof On-Line Authenticated Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2011/644}, year = {2011}, url = {http://eprint.iacr.org/2011/644}, } @misc{cryptoeprint:2011:645, author = {Gu Chunsheng}, title = {New Fully Homomorphic Encryption without Bootstrapping}, howpublished = {Cryptology ePrint Archive, Report 2011/645}, year = {2011}, url = {http://eprint.iacr.org/2011/645}, } @misc{cryptoeprint:2011:646, author = {Daniel J. Bernstein and Tanja Lange and Peter Schwabe}, title = {The security impact of a new cryptographic library}, howpublished = {Cryptology ePrint Archive, Report 2011/646}, year = {2011}, url = {http://eprint.iacr.org/2011/646}, } @misc{cryptoeprint:2011:647, author = {Fanbao Liu and Tao Xie and Changxiang Shen}, title = {Breaking $H^2$-MAC Using Birthday Paradox}, howpublished = {Cryptology ePrint Archive, Report 2011/647}, year = {2011}, url = {http://eprint.iacr.org/2011/647}, } @misc{cryptoeprint:2011:648, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption}, howpublished = {Cryptology ePrint Archive, Report 2011/648}, year = {2011}, url = {http://eprint.iacr.org/2011/648}, } @misc{cryptoeprint:2011:649, author = {Fanbao Liu and Changxiang Shen and Tao Xie and Dengguo Feng}, title = {On the Security of NMAC and Its Variants}, howpublished = {Cryptology ePrint Archive, Report 2011/649}, year = {2011}, url = {http://eprint.iacr.org/2011/649}, } @misc{cryptoeprint:2011:650, author = {Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang}, title = {Fully Secure Spatial Encryption under Simple Assumptions with Constant-Size Ciphertexts}, howpublished = {Cryptology ePrint Archive, Report 2011/650}, year = {2011}, url = {http://eprint.iacr.org/2011/650}, } @misc{cryptoeprint:2011:651, author = {Kaoutar Elkhiyaoui and Erik-Oliver Blass and Refik Molva}, title = {CHECKER: On-site checking in RFID-based supply chains}, howpublished = {Cryptology ePrint Archive, Report 2011/651}, year = {2011}, url = {http://eprint.iacr.org/2011/651}, } @misc{cryptoeprint:2011:652, author = {Shay Gueron and Michael Kounavis}, title = {Security Enhancement of the Vortex Family of Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2011/652}, year = {2011}, url = {http://eprint.iacr.org/2011/652}, } @misc{cryptoeprint:2011:653, author = {Haomin Yang and Yaoxue Zhang and Yuezhi Zhou}, title = {An Improved Certificateless Authenticated Key Agreement Protocol}, howpublished = {Cryptology ePrint Archive, Report 2011/653}, year = {2011}, url = {http://eprint.iacr.org/2011/653}, } @misc{cryptoeprint:2011:654, author = {Laurie Haustenne and Quentin De Neyer and Olivier Pereira}, title = {Elliptic Curve Cryptography in JavaScript}, howpublished = {Cryptology ePrint Archive, Report 2011/654}, year = {2011}, url = {http://eprint.iacr.org/2011/654}, } @misc{cryptoeprint:2011:655, author = {T-H. Hubert Chan, Elaine Shi and Dawn Song}, title = {Privacy-Preserving Stream Aggregation with Fault Tolerance}, howpublished = {Cryptology ePrint Archive, Report 2011/655}, year = {2011}, url = {http://eprint.iacr.org/2011/655}, } @misc{cryptoeprint:2011:656, author = {ZiJie Xu and Ke Xu}, title = {Use Data-depend Function Build Message Expansion Function }, howpublished = {Cryptology ePrint Archive, Report 2011/656}, year = {2011}, url = {http://eprint.iacr.org/2011/656}, } @misc{cryptoeprint:2011:657, author = {Abhranil Maiti and Vikash Gunreddy and Patrick Schaumont}, title = {A Systematic Method to Evaluate and Compare the Performance of Physical Unclonable Functions}, howpublished = {Cryptology ePrint Archive, Report 2011/657}, year = {2011}, url = {http://eprint.iacr.org/2011/657}, } @misc{cryptoeprint:2011:658, author = {D. Bernhard and G. Fuchsbauer and E. Ghadafi and N.P. Smart and B. Warinschi}, title = {Anonymous attestation with user-controlled linkability}, howpublished = {Cryptology ePrint Archive, Report 2011/658}, year = {2011}, url = {http://eprint.iacr.org/2011/658}, } @misc{cryptoeprint:2011:659, author = {Daniel R. L. Brown}, title = {Formally Assessing Cryptographic Entropy}, howpublished = {Cryptology ePrint Archive, Report 2011/659}, year = {2011}, url = {http://eprint.iacr.org/2011/659}, } @misc{cryptoeprint:2011:660, author = {Nir Bitansky and Ran Canett and Shafi Goldwasser and Shai Halevi and Yael Tauman Kalai and Guy N. Rothblum}, title = {Obfuscation with Leaky Hardware}, howpublished = {Cryptology ePrint Archive, Report 2011/660}, year = {2011}, url = {http://eprint.iacr.org/2011/660}, } @misc{cryptoeprint:2011:661, author = {Dongxia Bai and Leibo Li}, title = {New Impossible Differential Attacks on Camellia}, howpublished = {Cryptology ePrint Archive, Report 2011/661}, year = {2011}, url = {http://eprint.iacr.org/2011/661}, } @misc{cryptoeprint:2011:662, author = {Dan Bogdanov and Riivo Talviste and Jan Willemson}, title = {Deploying secure multi-party computation for financial data analysis}, howpublished = {Cryptology ePrint Archive, Report 2011/662}, year = {2011}, url = {http://eprint.iacr.org/2011/662}, } @misc{cryptoeprint:2011:663, author = {Adriana Lopez-Alt and Eran Tromer and Vinod Vaikuntanathan}, title = {Cloud-Assisted Multiparty Computation from Fully Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2011/663}, year = {2011}, url = {http://eprint.iacr.org/2011/663}, } @misc{cryptoeprint:2011:664, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Dhinakaran Vinayagamurthy and C. Pandu Rangan}, title = {On the Security of ID Based Signcryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2011/664}, year = {2011}, url = {http://eprint.iacr.org/2011/664}, } @misc{cryptoeprint:2011:665, author = {Jothi Rangasamy \and Douglas Stebila \and Lakshmi Kuppusamy \and Colin Boyd \and Juan Gonzalez Nieto}, title = {Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection}, howpublished = {Cryptology ePrint Archive, Report 2011/665}, year = {2011}, url = {http://eprint.iacr.org/2011/665}, } @misc{cryptoeprint:2011:666, author = {Eyal Z. Goren and Kristin E. Lauter}, title = {A Gross-Zagier formula for quaternion algebras over totally real fields}, howpublished = {Cryptology ePrint Archive, Report 2011/666}, year = {2011}, url = {http://eprint.iacr.org/2011/666}, } @misc{cryptoeprint:2011:667, author = {Suleyman Kardas and Atakan Arslan and Serkan Celik and Albert Levi}, title = {An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer}, howpublished = {Cryptology ePrint Archive, Report 2011/667}, year = {2011}, url = {http://eprint.iacr.org/2011/667}, } @misc{cryptoeprint:2011:668, author = {Piotr K. Tysowski and M. Anwarul Hasan}, title = {Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds}, howpublished = {Cryptology ePrint Archive, Report 2011/668}, year = {2011}, url = {http://eprint.iacr.org/2011/668}, } @misc{cryptoeprint:2011:669, author = {Christopher Wolf and Enrico Thomae}, title = {Small Linearization: Memory Friendly Solving of Non-Linear Equations over Finite Fields}, howpublished = {Cryptology ePrint Archive, Report 2011/669}, year = {2011}, url = {http://eprint.iacr.org/2011/669}, } @misc{cryptoeprint:2011:670, author = {Peter Schwabe and Bo-Yin Yang and Shang-Yi Yang}, title = {SHA-3 on ARM11 processors}, howpublished = {Cryptology ePrint Archive, Report 2011/670}, year = {2011}, url = {http://eprint.iacr.org/2011/670}, } @misc{cryptoeprint:2011:671, author = {Ya Liu and Dawu Gu and Zhiqiang Liu and Wei Li and Ying Man }, title = {Improved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256}, howpublished = {Cryptology ePrint Archive, Report 2011/671}, year = {2011}, url = {http://eprint.iacr.org/2011/671}, } @misc{cryptoeprint:2011:672, author = {Falko Strenzke}, title = {Fast and Secure Root-Finding for Code-based Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2011/672}, year = {2011}, url = {http://eprint.iacr.org/2011/672}, } @misc{cryptoeprint:2011:673, author = {Nils Fleischhacker and Felix G{\"u}nther and Franziskus Kiefer and Mark Manulis and Bertram Poettering}, title = {Pseudorandom Signatures}, howpublished = {Cryptology ePrint Archive, Report 2011/673}, year = {2011}, url = {http://eprint.iacr.org/2011/673}, } @misc{cryptoeprint:2011:674, author = {Colleen M. Swanson and Douglas R. Stinson}, title = {Extended Combinatorial Constructions for Peer-to-peer User-Private Information Retrieval}, howpublished = {Cryptology ePrint Archive, Report 2011/674}, year = {2011}, url = {http://eprint.iacr.org/2011/674}, } @misc{cryptoeprint:2011:675, author = {Nico Döttling and Thilo Mie and Jörn Müller-Quade and Tobias Nilges}, title = {Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2011/675}, year = {2011}, url = {http://eprint.iacr.org/2011/675}, } @misc{cryptoeprint:2011:676, author = {Jian-Zhu Lu, Shaoyuan Zhang, Shijie Qie}, title = {Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards}, howpublished = {Cryptology ePrint Archive, Report 2011/676}, year = {2011}, url = {http://eprint.iacr.org/2011/676}, } @misc{cryptoeprint:2011:677, author = {Jeremy Clark and Aleksander Essex}, title = {CommitCoin: Carbon Dating Commitments with Bitcoin}, howpublished = {Cryptology ePrint Archive, Report 2011/677}, year = {2011}, url = {http://eprint.iacr.org/2011/677}, } @misc{cryptoeprint:2011:678, author = {Florian Böhl and Dennis Hofheinz and Daniel Kraschewski}, title = {On definitions of selective opening security}, howpublished = {Cryptology ePrint Archive, Report 2011/678}, year = {2011}, url = {http://eprint.iacr.org/2011/678}, } @misc{cryptoeprint:2011:679, author = {Junaid Jameel Ahmad and Shujun Li and Ahmad-Reza Sadeghi and Thomas Schneider}, title = {CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm}, howpublished = {Cryptology ePrint Archive, Report 2011/679}, year = {2011}, url = {http://eprint.iacr.org/2011/679}, } @misc{cryptoeprint:2011:680, author = {Craig Gentry and Shai Halevi and Nigel P. Smart}, title = {Better Bootstrapping in Fully Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2011/680}, year = {2011}, url = {http://eprint.iacr.org/2011/680}, } @misc{cryptoeprint:2011:681, author = {Christina Brzuska and Marc Fischlin and Heike Schr{\"o}der and Stefan Katzenbeisser}, title = {Physically Uncloneable Functions in the Universal Composition Framework}, howpublished = {Cryptology ePrint Archive, Report 2011/681}, year = {2011}, url = {http://eprint.iacr.org/2011/681}, } @misc{cryptoeprint:2011:682, author = {István Vajda}, title = {UC framework for anonymous communication}, howpublished = {Cryptology ePrint Archive, Report 2011/682}, year = {2011}, url = {http://eprint.iacr.org/2011/682}, } @misc{cryptoeprint:2011:683, author = {Falko Strenzke}, title = {Timing Attacks against the Syndrome Inversionin Code-based Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2011/683}, year = {2011}, url = {http://eprint.iacr.org/2011/683}, } @misc{cryptoeprint:2011:684, author = {Rkia Aouinatou, Mostafa Belkasmi}, title = {Identification Based Encryption with RSA-OAEP. Using SEM and Without}, howpublished = {Cryptology ePrint Archive, Report 2011/684}, year = {2011}, url = {http://eprint.iacr.org/2011/684}, } @misc{cryptoeprint:2011:685, author = {Roman Oliynykov}, title = {Cryptanalysis of Symmetric Block Ciphers Based on the Feistel Network with Non-bijective S-boxes in the Round Function}, howpublished = {Cryptology ePrint Archive, Report 2011/685}, year = {2011}, url = {http://eprint.iacr.org/2011/685}, } @misc{cryptoeprint:2011:686, author = {Rodolphe LAMPE and Jacques PATARIN}, title = {Analysis of some natural variants of the PKP Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2011/686}, year = {2011}, url = {http://eprint.iacr.org/2011/686}, } @misc{cryptoeprint:2011:687, author = {Mohammad Ali Orumiehchiha and Josef Pieprzyk and Ron Steinfeld}, title = {Cryptanalysis of WG-7 (A Lightweight Stream Cipher for RFID Encryption)}, howpublished = {Cryptology ePrint Archive, Report 2011/687}, year = {2011}, url = {http://eprint.iacr.org/2011/687}, } @misc{cryptoeprint:2011:688, author = {Guomin Yang and Shanshan Duan and Duncan S. Wong and Chik How Tan and Huaxiong Wang}, title = {Authenticated Key Exchange under Bad Randomness}, howpublished = {Cryptology ePrint Archive, Report 2011/688}, year = {2011}, url = {http://eprint.iacr.org/2011/688}, } @misc{cryptoeprint:2011:689, author = {Seung Geol Choi and Jonathan Katz and Dominique Schröder and Arkady Yerukhimovich and Hong-Sheng Zhou}, title = {(Efficient) Universally Composable Two-Party Computation Using a Minimal Number of Stateless Tokens}, howpublished = {Cryptology ePrint Archive, Report 2011/689}, year = {2011}, url = {http://eprint.iacr.org/2011/689}, } @misc{cryptoeprint:2011:690, author = {Masao KASAHARA}, title = {A New Class of Multivariate Public Key Cryptosystem Constructed on the Basis of Message-Dependent Transformation}, howpublished = {Cryptology ePrint Archive, Report 2011/690}, year = {2011}, url = {http://eprint.iacr.org/2011/690}, } @misc{cryptoeprint:2011:691, author = {Gildas Avoine and Xavier Carpent}, title = {Yet Another Ultralightweight Authentication Protocol that is Broken}, howpublished = {Cryptology ePrint Archive, Report 2011/691}, year = {2011}, url = {http://eprint.iacr.org/2011/691}, } @misc{cryptoeprint:2011:692, author = {Cheng Chen and Zhenfeng Zhang and Dengguo Feng}, title = {Fully Secure (Doubly-)Spatial Encryption under Simpler Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2011/692}, year = {2011}, url = {http://eprint.iacr.org/2011/692}, } @misc{cryptoeprint:2011:693, author = {Bin Wang ,Qing Zhao and Ke Dai}, title = {A non-interactive deniable authentication scheme in the standard model}, howpublished = {Cryptology ePrint Archive, Report 2011/693}, year = {2011}, url = {http://eprint.iacr.org/2011/693}, } @misc{cryptoeprint:2011:694, author = {Jiye Liu, Yongbin Zhou, Shuguo Yang, Dengguo Feng}, title = {Generic Side-channel Distinguisher Based on Kolmogorov-Smirnov Test: Explicit Construction and Practical Evaluation}, howpublished = {Cryptology ePrint Archive, Report 2011/694}, year = {2011}, url = {http://eprint.iacr.org/2011/694}, } @misc{cryptoeprint:2011:695, author = {S. Sharmila Deva Selvi and S. Sree Vivek and C. Pandu Rangan}, title = {Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures}, howpublished = {Cryptology ePrint Archive, Report 2011/695}, year = {2011}, url = {http://eprint.iacr.org/2011/695}, } @misc{cryptoeprint:2011:696, author = {Dario Catalano and Dario Fiore and Bogdan Warinschi}, title = {Efficient Network Coding Signatures in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2011/696}, year = {2011}, url = {http://eprint.iacr.org/2011/696}, } @misc{cryptoeprint:2011:697, author = {Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede}, title = {SPONGENT: The Design Space of Lightweight Cryptographic Hashing}, howpublished = {Cryptology ePrint Archive, Report 2011/697}, year = {2011}, url = {http://eprint.iacr.org/2011/697}, } @misc{cryptoeprint:2011:698, author = {Baocheng Wang and Chunming Tang and Yanfeng Qi and Yixian Yang}, title = {A generalization of the class of hyper-bent Boolean functions in binomial forms}, howpublished = {Cryptology ePrint Archive, Report 2011/698}, year = {2011}, url = {http://eprint.iacr.org/2011/698}, } @misc{cryptoeprint:2011:699, author = {Peng Xu and Hai Jin and Wei Wang and Deqing Zou}, title = {Public-Key Encryption with Cluster-Chain-based Keyword Search}, howpublished = {Cryptology ePrint Archive, Report 2011/699}, year = {2011}, url = {http://eprint.iacr.org/2011/699}, } @misc{cryptoeprint:2011:700, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2011/700}, year = {2011}, url = {http://eprint.iacr.org/2011/700}, } @misc{cryptoeprint:2011:701, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Decentralized Attribute-Based Signatures}, howpublished = {Cryptology ePrint Archive, Report 2011/701}, year = {2011}, url = {http://eprint.iacr.org/2011/701}, } @misc{cryptoeprint:2011:702, author = {Yitao Chen}, title = {Comments of an efficient and secure multi-server authentication scheme with key agreement}, howpublished = {Cryptology ePrint Archive, Report 2011/702}, year = {2011}, url = {http://eprint.iacr.org/2011/702}, } @misc{cryptoeprint:2011:703, author = {Dennis Hofheinz and Tibor Jager}, title = {Waters Signatures with Optimal Security Reduction}, howpublished = {Cryptology ePrint Archive, Report 2011/703}, year = {2011}, url = {http://eprint.iacr.org/2011/703}, } @misc{cryptoeprint:2011:704, author = {Masoumeh Safkhani and Nasour Bagheri and Majid Naderi}, title = {Security Analysis of a PUF based RFID Authentication Protocol}, howpublished = {Cryptology ePrint Archive, Report 2011/704}, year = {2011}, url = {http://eprint.iacr.org/2011/704}, } @misc{cryptoeprint:2011:705, author = {Valerie Nachef and Emmanuel Volte and Jacques Patarin}, title = {Differential Attacks on Generalized Feistel Schemes}, howpublished = {Cryptology ePrint Archive, Report 2011/705}, year = {2011}, url = {http://eprint.iacr.org/2011/705}, } @misc{cryptoeprint:2011:706, author = {Johannes Blömer and Peter Günther and Gennadij Liske}, title = {Improved Side Channel Attacks on Pairing Based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2011/706}, year = {2011}, url = {http://eprint.iacr.org/2011/706}, } @misc{cryptoeprint:2011:707, author = {Alex Biryukov and Ilya Kizhvatov and Bin Zhang}, title = {Cryptanalysis of The Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF}, howpublished = {Cryptology ePrint Archive, Report 2011/707}, year = {2011}, url = {http://eprint.iacr.org/2011/707}, } @misc{cryptoeprint:2011:708, author = {Dana Dachman-Soled and Rosario Gennaro and Hugo Krawczyk and Tal Malkin}, title = {Computational Extractors and Pseudorandomness}, howpublished = {Cryptology ePrint Archive, Report 2011/708}, year = {2011}, url = {http://eprint.iacr.org/2011/708}, } @misc{cryptoeprint:2011:709, author = {Nadia El Mrabet}, title = {Fault Attack against Miller's algorithm}, howpublished = {Cryptology ePrint Archive, Report 2011/709}, year = {2011}, url = {http://eprint.iacr.org/2011/709}, } @misc{cryptoeprint:2011:710, author = {Alex Biryukov and Johann Gro{\ss}sch{\"a}dl}, title = {Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware}, howpublished = {Cryptology ePrint Archive, Report 2011/710}, year = {2011}, url = {http://eprint.iacr.org/2011/710}, } @misc{cryptoeprint:2011:711, author = {Meltem Sonmez Turan}, title = {Evolutionary Construction of de Bruijn Sequences}, howpublished = {Cryptology ePrint Archive, Report 2011/711}, year = {2011}, url = {http://eprint.iacr.org/2011/711}, } @misc{cryptoeprint:2011:712, author = {Johann Gro{\ss}sch{\"a}dl and Dan Page}, title = {Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices}, howpublished = {Cryptology ePrint Archive, Report 2011/712}, year = {2011}, url = {http://eprint.iacr.org/2011/712}, } @misc{cryptoeprint:2011:713, author = {Bin Wang and Qing Zhao}, title = {A server-aided verification signature scheme without random oracles}, howpublished = {Cryptology ePrint Archive, Report 2011/713}, year = {2011}, url = {http://eprint.iacr.org/2011/713}, } @misc{cryptoeprint:2011:714, author = {Huajun Zhang and Zongyang Zhang and Zhenfu Cao}, title = {Position-Verification in Multi-Channel Models}, howpublished = {Cryptology ePrint Archive, Report 2011/714}, year = {2011}, url = {http://eprint.iacr.org/2011/714}, } @misc{cryptoeprint:2012:001, author = {Andrew C. Yao and Yunlei Zhao}, title = {Digital Signatures from Challenge-Divided Sigma-Protocols}, howpublished = {Cryptology ePrint Archive, Report 2012/001}, year = {2012}, url = {http://eprint.iacr.org/2012/001}, } @misc{cryptoeprint:2012:002, author = {Daniel J. Bernstein and Hsieh-Chung Chen and Chen-Mou Cheng and Tanja Lange and Ruben Niederhagen and Peter Schwabe and Bo-Yin Yang}, title = {ECC2K-130 on NVIDIA GPUs}, howpublished = {Cryptology ePrint Archive, Report 2012/002}, year = {2012}, url = {http://eprint.iacr.org/2012/002}, } @misc{cryptoeprint:2012:003, author = {Qun-Xiong Zheng, Wen-Feng Qi and Tian Tian}, title = {On the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers}, howpublished = {Cryptology ePrint Archive, Report 2012/003}, year = {2012}, url = {http://eprint.iacr.org/2012/003}, } @misc{cryptoeprint:2012:004, author = {Daniel J. Bernstein and Tanja Lange}, title = {The new SHA-3 software shootout}, howpublished = {Cryptology ePrint Archive, Report 2012/004}, year = {2012}, url = {http://eprint.iacr.org/2012/004}, } @misc{cryptoeprint:2012:005, author = {Benjamin Fuller and Adam O'Neill and Leonid Reyzin}, title = {A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy}, howpublished = {Cryptology ePrint Archive, Report 2012/005}, year = {2012}, url = {http://eprint.iacr.org/2012/005}, } @misc{cryptoeprint:2012:006, author = {Susan Hohenberger and Allison Lewko and Brent Waters}, title = {Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security}, howpublished = {Cryptology ePrint Archive, Report 2012/006}, year = {2012}, url = {http://eprint.iacr.org/2012/006}, } @misc{cryptoeprint:2012:007, author = {Qiang Li, Xiangxue Li, Dong Zheng, Kefei Chen}, title = {Optimal Multiple Assignments with (m,m)-Scheme for General Access Structures}, howpublished = {Cryptology ePrint Archive, Report 2012/007}, year = {2012}, url = {http://eprint.iacr.org/2012/007}, } @misc{cryptoeprint:2012:008, author = {Hubert Comon-Lundh and Véronique Cortier and Guillaume Scerri}, title = {Security proof with dishonest keys}, howpublished = {Cryptology ePrint Archive, Report 2012/008}, year = {2012}, url = {http://eprint.iacr.org/2012/008}, } @misc{cryptoeprint:2012:009, author = {Saif Al-Kuwari}, title = {On the Indifferentiability of the Integrated-Key Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2012/009}, year = {2012}, url = {http://eprint.iacr.org/2012/009}, } @misc{cryptoeprint:2012:010, author = {Charanjit Jutla and Moti Yung}, title = {PayTree: "Amortized Signature" for Flexible Micro-Payments}, howpublished = {Cryptology ePrint Archive, Report 2012/010}, year = {2012}, url = {http://eprint.iacr.org/2012/010}, } @misc{cryptoeprint:2012:011, author = {Shao-zhen Chen Tian-min Xu}, title = {Biclique Attack of the Full ARIA-256}, howpublished = {Cryptology ePrint Archive, Report 2012/011}, year = {2012}, url = {http://eprint.iacr.org/2012/011}, } @misc{cryptoeprint:2012:012, author = {Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn}, title = {Malleable Proof Systems and Applications}, howpublished = {Cryptology ePrint Archive, Report 2012/012}, year = {2012}, url = {http://eprint.iacr.org/2012/012}, } @misc{cryptoeprint:2012:013, author = {Qichun Wang and Thomas Johansson}, title = {Higher Order Algebraic Attacks on Stream Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2012/013}, year = {2012}, url = {http://eprint.iacr.org/2012/013}, } @misc{cryptoeprint:2012:014, author = {Yusuke Naito}, title = {On the Indifferentiable Hash Functions in the Multi-Stage Security Games}, howpublished = {Cryptology ePrint Archive, Report 2012/014}, year = {2012}, url = {http://eprint.iacr.org/2012/014}, } @misc{cryptoeprint:2012:015, author = {Mihir Bellare and Stefano Tessaro and Alexander Vardy}, title = {A Cryptographic Treatment of the Wiretap Channel}, howpublished = {Cryptology ePrint Archive, Report 2012/015}, year = {2012}, url = {http://eprint.iacr.org/2012/015}, } @misc{cryptoeprint:2012:016, author = {Denise Demirel and Melanie Volkamer and Hugo Jonker}, title = {Efficient Mix-Net Veri cation by Proofs of Random Blocks}, howpublished = {Cryptology ePrint Archive, Report 2012/016}, year = {2012}, url = {http://eprint.iacr.org/2012/016}, } @misc{cryptoeprint:2012:017, author = {Brajesh Kumar Singh}, title = {Secondary Constructions on Generalized Bent Boolean Functions}, howpublished = {Cryptology ePrint Archive, Report 2012/017}, year = {2012}, url = {http://eprint.iacr.org/2012/017}, } @misc{cryptoeprint:2012:018, author = {Kazuhiko Minematsu and Hiraku Morita and Tetsu Iwata}, title = {Cryptanalysis of EAXprime}, howpublished = {Cryptology ePrint Archive, Report 2012/018}, year = {2012}, url = {http://eprint.iacr.org/2012/018}, } @misc{cryptoeprint:2012:019, author = {Gergei Bana and Hubert Comon-Lundh}, title = {Towards Unconditional Soundness: Computationally Complete Symbolic Attacker}, howpublished = {Cryptology ePrint Archive, Report 2012/019}, year = {2012}, url = {http://eprint.iacr.org/2012/019}, } @misc{cryptoeprint:2012:020, author = {Jean-Pierre Flori and Sihem Mesnager}, title = {Dickson polynomials, hyperelliptic curves and hyper-bent functions}, howpublished = {Cryptology ePrint Archive, Report 2012/020}, year = {2012}, url = {http://eprint.iacr.org/2012/020}, } @misc{cryptoeprint:2012:021, author = {Mohsen Toorani}, title = {Security Analysis of J-PAKE}, howpublished = {Cryptology ePrint Archive, Report 2012/021}, year = {2012}, url = {http://eprint.iacr.org/2012/021}, } @misc{cryptoeprint:2012:022, author = {Mihir Bellare and Stefano Tessaro}, title = {Polynomial-Time, Semantically-Secure Encryption Achieving the Secrecy Capacity}, howpublished = {Cryptology ePrint Archive, Report 2012/022}, year = {2012}, url = {http://eprint.iacr.org/2012/022}, } @misc{cryptoeprint:2012:023, author = {Masoumeh Safkhani and Nasour Bagheri and Majid Naderi}, title = {How a Cryptographer Can Get Rich?}, howpublished = {Cryptology ePrint Archive, Report 2012/023}, year = {2012}, url = {http://eprint.iacr.org/2012/023}, } @misc{cryptoeprint:2012:024, author = {Somindu C. Ramanna and Sanjit Chatterjee and Palash Sarkar}, title = {Variants of Waters' Dual-System Primitives Using Asymmetric Pairings}, howpublished = {Cryptology ePrint Archive, Report 2012/024}, year = {2012}, url = {http://eprint.iacr.org/2012/024}, } @misc{cryptoeprint:2012:025, author = {Xiangtao Yan and Yifa Li}, title = {A new remote data integrity checking scheme for cloud storage}, howpublished = {Cryptology ePrint Archive, Report 2012/025}, year = {2012}, url = {http://eprint.iacr.org/2012/025}, } @misc{cryptoeprint:2012:026, author = {Anja Becker and Antoine Joux and Alexander May and Alexander Meurer}, title = {Decoding Random Binary Linear Codes in $2^{n/20}$: How $1+1=0$ Improves Information Set Decoding}, howpublished = {Cryptology ePrint Archive, Report 2012/026}, year = {2012}, url = {http://eprint.iacr.org/2012/026}, } @misc{cryptoeprint:2012:027, author = {Ali Mackvandi and Maryam Saeed and Mansour Naddafiun}, title = {Breaking the provably secure SAKE-C authenticated key exchange protocol with Extended Key Compromise Impersonation (E-KCI) Attack }, howpublished = {Cryptology ePrint Archive, Report 2012/027}, year = {2012}, url = {http://eprint.iacr.org/2012/027}, } @misc{cryptoeprint:2012:028, author = {Houssem MAGHREBI and Emmanuel PROUFF and Sylvain GUILLEY and Jean-Luc DANGER}, title = {A First-Order Leak-Free Masking Countermeasure}, howpublished = {Cryptology ePrint Archive, Report 2012/028}, year = {2012}, url = {http://eprint.iacr.org/2012/028}, } @misc{cryptoeprint:2012:029, author = {Yannick Seurin}, title = {On the Exact Security of Schnorr-Type Signatures in the Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2012/029}, year = {2012}, url = {http://eprint.iacr.org/2012/029}, } @misc{cryptoeprint:2012:030, author = {Shekh Faisal Abdul-Latip and Mohammad Reza Reyhanitabar and Willy Susilo and Jennifer Seberry}, title = {Fault Analysis of the KATAN Family of Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2012/030}, year = {2012}, url = {http://eprint.iacr.org/2012/030}, } @misc{cryptoeprint:2012:031, author = {Da-Zhi Sun}, title = {An error in "On a new formal proof model for RFID location privacy"}, howpublished = {Cryptology ePrint Archive, Report 2012/031}, year = {2012}, url = {http://eprint.iacr.org/2012/031}, } @misc{cryptoeprint:2012:032, author = {Counterexamples to Hardness Amplification Beyond Negligible}, title = {Counterexamples to Hardness Amplification Beyond Negligible}, howpublished = {Cryptology ePrint Archive, Report 2012/032}, year = {2012}, url = {http://eprint.iacr.org/2012/032}, } @misc{cryptoeprint:2012:033, author = {Sihem Mesnager and Jean-Pierre Flori}, title = {A note on hyper-bent functions via Dillon-like exponents}, howpublished = {Cryptology ePrint Archive, Report 2012/033}, year = {2012}, url = {http://eprint.iacr.org/2012/033}, } @misc{cryptoeprint:2012:034, author = {Boris Köpf and Laurent Mauborgne and Martin Ochoa}, title = {Automatic Quantification of Cache Side-Channels}, howpublished = {Cryptology ePrint Archive, Report 2012/034}, year = {2012}, url = {http://eprint.iacr.org/2012/034}, } @misc{cryptoeprint:2012:035, author = {Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Francois-Xavier Standaert, John Steinberger, Elmar Tischhauser}, title = {Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations}, howpublished = {Cryptology ePrint Archive, Report 2012/035}, year = {2012}, url = {http://eprint.iacr.org/2012/035}, } @misc{cryptoeprint:2012:036, author = {Ashish Kundu, Mikhail Atallah, Elisa Bertino}, title = {Efficient Leakage-free Authentication of Trees, Graphs and Forests}, howpublished = {Cryptology ePrint Archive, Report 2012/036}, year = {2012}, url = {http://eprint.iacr.org/2012/036}, } @misc{cryptoeprint:2012:037, author = {Deep Singh, Maheshanand Bhaintwal and Brajesh Kumar Singh}, title = {Recent Results on Generalized q-ary Bent Functions}, howpublished = {Cryptology ePrint Archive, Report 2012/037}, year = {2012}, url = {http://eprint.iacr.org/2012/037}, } @misc{cryptoeprint:2012:038, author = {François Durvaux and Mathieu Renauld and François-Xavier Standaert and Loic van Oldeneel tot Oldenzeel and Nicolas Veyrat-Charvillon}, title = {Cryptanalysis of the CHES 2009/2010 Random Delay Countermeasure}, howpublished = {Cryptology ePrint Archive, Report 2012/038}, year = {2012}, url = {http://eprint.iacr.org/2012/038}, } @misc{cryptoeprint:2012:039, author = {Feng Hao and Dylan Clarke}, title = {Security Analysis of a Multi-Factor Authenticated Key Exchange Protocol}, howpublished = {Cryptology ePrint Archive, Report 2012/039}, year = {2012}, url = {http://eprint.iacr.org/2012/039}, } @misc{cryptoeprint:2012:040, author = {Marc Stevens}, title = {Single-block collision attack on MD5}, howpublished = {Cryptology ePrint Archive, Report 2012/040}, year = {2012}, url = {http://eprint.iacr.org/2012/040}, } @misc{cryptoeprint:2012:041, author = {Norziana Jamil and Ramlan Mahmood and Muhammad Reza Z'aba and Nur Izura Udzir and Zuriati Ahmad Zukarnaen}, title = {STITCH-256: A NEW DEDICATED CRYPTOGRAPHIC HASH FUNCTION}, howpublished = {Cryptology ePrint Archive, Report 2012/041}, year = {2012}, url = {http://eprint.iacr.org/2012/041}, } @misc{cryptoeprint:2012:042, author = {Naoyuki Shinohara and Takeshi Shimoyama and Takuya Hayashi and Tsuyoshi Takagi }, title = {Key Length Estimation of Pairing-based Cryptosystems using $\eta_T$ Pairing}, howpublished = {Cryptology ePrint Archive, Report 2012/042}, year = {2012}, url = {http://eprint.iacr.org/2012/042}, } @misc{cryptoeprint:2012:043, author = {Chingfang Hsu and Bing Zeng and Qi Cheng and Guohua Cui}, title = {A novel Group Key Transfer Protocol}, howpublished = {Cryptology ePrint Archive, Report 2012/043}, year = {2012}, url = {http://eprint.iacr.org/2012/043}, } @misc{cryptoeprint:2012:044, author = {Jun Zhou, Zhenfu Cao}, title = {PSCPA: Patient Self-controllable Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Systems}, howpublished = {Cryptology ePrint Archive, Report 2012/044}, year = {2012}, url = {http://eprint.iacr.org/2012/044}, } @misc{cryptoeprint:2012:045, author = {Sebastian Faust and Carmit Hazay and Jesper Buus Nielsen and Peter Sebastian Nordholt and Angela Zottarel}, title = {Signature Schemes Secure against Hard-to-Invert Leakage}, howpublished = {Cryptology ePrint Archive, Report 2012/045}, year = {2012}, url = {http://eprint.iacr.org/2012/045}, } @misc{cryptoeprint:2012:046, author = {Konstantinos Limniotis and Nicholas Kolokotronis and Nicholas Kalouptsidis}, title = {Modifying Boolean Functions to Ensure Maximum Algebraic Immunity}, howpublished = {Cryptology ePrint Archive, Report 2012/046}, year = {2012}, url = {http://eprint.iacr.org/2012/046}, } @misc{cryptoeprint:2012:047, author = {Ilya Mironov and Omkant Pandey and Omer Reingold and Gil Segev}, title = {Incremental Deterministic Public-Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2012/047}, year = {2012}, url = {http://eprint.iacr.org/2012/047}, } @misc{cryptoeprint:2012:048, author = {Sourav Sen Gupta and Anupam Chattopadhyay and Ayesha Khalid}, title = {Designing Integrated Accelerator for Stream Ciphers with Structural Similarities}, howpublished = {Cryptology ePrint Archive, Report 2012/048}, year = {2012}, url = {http://eprint.iacr.org/2012/048}, } @misc{cryptoeprint:2012:049, author = {Yu Sasaki and Lei Wang}, title = {2-Dimension Sums: Distinguishers Beyond Three Rounds of RIPEMD-128 and RIPEMD-160}, howpublished = {Cryptology ePrint Archive, Report 2012/049}, year = {2012}, url = {http://eprint.iacr.org/2012/049}, } @misc{cryptoeprint:2012:050, author = {Jeremy Constantin and Andreas Burg and Frank K. Gurkaynak}, title = {Investigating the Potential of Custom Instruction Set Extensions for SHA-3 Candidates on a 16-bit Microcontroller Architecture}, howpublished = {Cryptology ePrint Archive, Report 2012/050}, year = {2012}, url = {http://eprint.iacr.org/2012/050}, } @misc{cryptoeprint:2012:051, author = {Benedikt Driessen}, title = {Eavesdropping on Satellite Telecommunication Systems}, howpublished = {Cryptology ePrint Archive, Report 2012/051}, year = {2012}, url = {http://eprint.iacr.org/2012/051}, } @misc{cryptoeprint:2012:052, author = {Alexandra Boldyreva and Vipul Goyal and Virendra Kumar}, title = {Identity-based Encryption with Efficient Revocation}, howpublished = {Cryptology ePrint Archive, Report 2012/052}, year = {2012}, url = {http://eprint.iacr.org/2012/052}, } @misc{cryptoeprint:2012:053, author = {Yevgeniy Dodis}, title = {Beating Shannon requires BOTH efficient adversaries AND non-zero advantage}, howpublished = {Cryptology ePrint Archive, Report 2012/053}, year = {2012}, url = {http://eprint.iacr.org/2012/053}, } @misc{cryptoeprint:2012:054, author = {Emiliano De Cristofaro and Gene Tsudik}, title = {On the performance of certain Private Set Intersection protocols. (And some remarks on the recent paper by Huang et al. in NDSS'12)}, howpublished = {Cryptology ePrint Archive, Report 2012/054}, year = {2012}, url = {http://eprint.iacr.org/2012/054}, } @misc{cryptoeprint:2012:055, author = {Hongbin Tang, Xinsong Liu}, title = {Cryptanalysis of Mun et al.'s anonymous authentication scheme for roaming service in global mobility networks}, howpublished = {Cryptology ePrint Archive, Report 2012/055}, year = {2012}, url = {http://eprint.iacr.org/2012/055}, } @misc{cryptoeprint:2012:056, author = {Alexandra Boldyreva and Virendra Kumar}, title = {A New Pseudorandom Generator from Collision-Resistant Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2012/056}, year = {2012}, url = {http://eprint.iacr.org/2012/056}, } @misc{cryptoeprint:2012:057, author = {Somindu C. Ramanna and Palash Sarkar}, title = {Constant-Size Ciphertext HIBE From Asymmetric Pairings Using the Dual-System Technique}, howpublished = {Cryptology ePrint Archive, Report 2012/057}, year = {2012}, url = {http://eprint.iacr.org/2012/057}, } @misc{cryptoeprint:2012:058, author = {Christopher Portmann}, title = {Key recycling in authentication}, howpublished = {Cryptology ePrint Archive, Report 2012/058}, year = {2012}, url = {http://eprint.iacr.org/2012/058}, } @misc{cryptoeprint:2012:059, author = {Yevgeniy Dodis and Eike Kiltz and Krzysztof Pietrzak and Daniel Wichs}, title = {Message Authentication, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2012/059}, year = {2012}, url = {http://eprint.iacr.org/2012/059}, } @misc{cryptoeprint:2012:060, author = {David Mandell Freeman}, title = {Improved Security for Linearly Homomorphic Signatures: A Generic Framework}, howpublished = {Cryptology ePrint Archive, Report 2012/060}, year = {2012}, url = {http://eprint.iacr.org/2012/060}, } @misc{cryptoeprint:2012:061, author = {Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh}, title = {A Pairing Based Strong Designated Verifier Signature Scheme without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2012/061}, year = {2012}, url = {http://eprint.iacr.org/2012/061}, } @misc{cryptoeprint:2012:062, author = {S Sharmila Deva Selvi and Subhashini Venugopalan and C. Pandu Rangan}, title = {On the Security of Attribute Based Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2012/062}, year = {2012}, url = {http://eprint.iacr.org/2012/062}, } @misc{cryptoeprint:2012:063, author = {Shahram Khazaei and Douglas Wikstr{\"o}m}, title = {Randomized Partial Checking Revisited}, howpublished = {Cryptology ePrint Archive, Report 2012/063}, year = {2012}, url = {http://eprint.iacr.org/2012/063}, } @misc{cryptoeprint:2012:064, author = {Arjen K. Lenstra and James P. Hughes and Maxime Augier and Joppe W. Bos and Thorsten Kleinjung and Christophe Wachter}, title = {Ron was wrong, Whit is right}, howpublished = {Cryptology ePrint Archive, Report 2012/064}, year = {2012}, url = {http://eprint.iacr.org/2012/064}, } @misc{cryptoeprint:2012:065, author = {Tsukasa Ishiguro}, title = {Modified version of “Latin Dances Revisited: New Analytic Results of Salsa20 and ChaCha”}, howpublished = {Cryptology ePrint Archive, Report 2012/065}, year = {2012}, url = {http://eprint.iacr.org/2012/065}, } @misc{cryptoeprint:2012:066, author = {Jiqiang Lu and Wen-She Yap and Yongzhuang Wei}, title = {Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2012/066}, year = {2012}, url = {http://eprint.iacr.org/2012/066}, } @misc{cryptoeprint:2012:067, author = {Shay Gueron, Vlad Krasnov}, title = {Parallelizing message schedules to accelerate the computations of hash functions}, howpublished = {Cryptology ePrint Archive, Report 2012/067}, year = {2012}, url = {http://eprint.iacr.org/2012/067}, } @misc{cryptoeprint:2012:068, author = {Sidi Mohamed El Yousfi Alaoui, Özgür Dagdelen, Pascal Véron, David Galindo, and Pierre-Louis Cayrel}, title = {Extended Security Arguments for (Ring) Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2012/068}, year = {2012}, url = {http://eprint.iacr.org/2012/068}, } @misc{cryptoeprint:2012:069, author = {Charles Bouillaguet and Patrick Derbez and Pierre-Alain Fouque}, title = {Automatic Search of Attacks on round-reduced AES and Applications}, howpublished = {Cryptology ePrint Archive, Report 2012/069}, year = {2012}, url = {http://eprint.iacr.org/2012/069}, } @misc{cryptoeprint:2012:070, author = {Razvan Barbulescu and Joppe W. Bos and Cyril Bouvier and Thorsten Kleinjung and Peter L. Montgomery}, title = {Finding ECM-Friendly Curves through a Study of Galois Properties}, howpublished = {Cryptology ePrint Archive, Report 2012/070}, year = {2012}, url = {http://eprint.iacr.org/2012/070}, } @misc{cryptoeprint:2012:071, author = {Eli Ben-Sasson and Alessandro Chiesa and Daniel Genkin and Eran Tromer}, title = {Fast Reductions from RAMs to Delegatable Succinct Constraint Satisfaction Problems}, howpublished = {Cryptology ePrint Archive, Report 2012/071}, year = {2012}, url = {http://eprint.iacr.org/2012/071}, } @misc{cryptoeprint:2012:072, author = {Craig Costello}, title = {Particularly Friendly Members of Family Trees}, howpublished = {Cryptology ePrint Archive, Report 2012/072}, year = {2012}, url = {http://eprint.iacr.org/2012/072}, } @misc{cryptoeprint:2012:073, author = {Wei Gao, Guilin Wang, Xueli Wang, Kefei Chen}, title = {Efficient identity-based threshold signature scheme from bilinear pairings in the standard model}, howpublished = {Cryptology ePrint Archive, Report 2012/073}, year = {2012}, url = {http://eprint.iacr.org/2012/073}, } @misc{cryptoeprint:2012:074, author = {Neal Koblitz and Alfred Menezes}, title = {Another look at HMAC}, howpublished = {Cryptology ePrint Archive, Report 2012/074}, year = {2012}, url = {http://eprint.iacr.org/2012/074}, } @misc{cryptoeprint:2012:075, author = {Wei Gaoa,, Guilin Wang, Kefei Chen, Xueli Wang, Guoyan Zhang}, title = {Efficient identity-based threshold decryption scheme from bilinear pairings}, howpublished = {Cryptology ePrint Archive, Report 2012/075}, year = {2012}, url = {http://eprint.iacr.org/2012/075}, } @misc{cryptoeprint:2012:076, author = {Mark Zhandry}, title = {Identity-based Encryption is Secure in the Quantum Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2012/076}, year = {2012}, url = {http://eprint.iacr.org/2012/076}, } @misc{cryptoeprint:2012:077, author = {Sebastien Tiran and Philippe Maurine}, title = {MAGNITUDE SQUARED COHERENCE BASED SCA}, howpublished = {Cryptology ePrint Archive, Report 2012/077}, year = {2012}, url = {http://eprint.iacr.org/2012/077}, } @misc{cryptoeprint:2012:078, author = {Zvika Brakerski}, title = {Fully Homomorphic Encryption without Modulus Switching from Classical GapSVP}, howpublished = {Cryptology ePrint Archive, Report 2012/078}, year = {2012}, url = {http://eprint.iacr.org/2012/078}, } @misc{cryptoeprint:2012:079, author = {Masao KASAHARA}, title = {Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XV)SE(2)PKC, Realizing Coding Rate of Exactly 1.0}, howpublished = {Cryptology ePrint Archive, Report 2012/079}, year = {2012}, url = {http://eprint.iacr.org/2012/079}, } @misc{cryptoeprint:2012:080, author = {S. Sree Vivek and S. Sharmila Deva Selvi and Guhan Balasubramanian and C. Pandu Rangan}, title = {Strongly Unforgeable Proxy Re-Signature Schemes in the Standard model}, howpublished = {Cryptology ePrint Archive, Report 2012/080}, year = {2012}, url = {http://eprint.iacr.org/2012/080}, } @misc{cryptoeprint:2012:081, author = {Michael Backes and Fabian Bendun and Dominique Unruh}, title = {Computational Soundness of Symbolic Zero-knowledge Proofs: Weaker Assumptions and Mechanized Verification}, howpublished = {Cryptology ePrint Archive, Report 2012/081}, year = {2012}, url = {http://eprint.iacr.org/2012/081}, } @misc{cryptoeprint:2012:082, author = {Liran Lerman and Stephane Fernandes Medeiros and Nikita Veshchikov and Cedric Meuter and Gianluca Bontempi and Olivier Markowitch}, title = {Semi-Supervised Template Attack}, howpublished = {Cryptology ePrint Archive, Report 2012/082}, year = {2012}, url = {http://eprint.iacr.org/2012/082}, } @misc{cryptoeprint:2012:083, author = {Casey Devet and Ian Goldberg and Nadia Heninger}, title = {Optimally Robust Private Information Retrieval}, howpublished = {Cryptology ePrint Archive, Report 2012/083}, year = {2012}, url = {http://eprint.iacr.org/2012/083}, } @misc{cryptoeprint:2012:084, author = {Mohamed Saied Emam Mohamed and Stanislav Bulygin and Michael Zohner and Annelie Heuser and Michael Walter}, title = {Improved Algebraic Side-Channel Attack on AES}, howpublished = {Cryptology ePrint Archive, Report 2012/084}, year = {2012}, url = {http://eprint.iacr.org/2012/084}, } @misc{cryptoeprint:2012:085, author = {Stanislav Bulygin and Michael Walter}, title = {Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery}, howpublished = {Cryptology ePrint Archive, Report 2012/085}, year = {2012}, url = {http://eprint.iacr.org/2012/085}, } @misc{cryptoeprint:2012:086, author = {Zhi-hui Li Jing Li}, title = {Remarks on-An ideal multi-secret sharing scheme based on MSP}, howpublished = {Cryptology ePrint Archive, Report 2012/086}, year = {2012}, url = {http://eprint.iacr.org/2012/086}, } @misc{cryptoeprint:2012:087, author = {Joppe W. Bos and Alina Dudeanu and Dimitar Jetchev}, title = {Collision Bounds for the Additive Pollard Rho Algorithm for Solving Discrete Logarithms}, howpublished = {Cryptology ePrint Archive, Report 2012/087}, year = {2012}, url = {http://eprint.iacr.org/2012/087}, } @misc{cryptoeprint:2012:088, author = {San Ling and Damien Stehle}, title = {A Lattice-Based Traitor Tracing Scheme}, howpublished = {Cryptology ePrint Archive, Report 2012/088}, year = {2012}, url = {http://eprint.iacr.org/2012/088}, } @misc{cryptoeprint:2012:089, author = {Joppe W. Bos and Thorsten Kleinjung}, title = {ECM at Work}, howpublished = {Cryptology ePrint Archive, Report 2012/089}, year = {2012}, url = {http://eprint.iacr.org/2012/089}, } @misc{cryptoeprint:2012:090, author = {Adeline Langlois and Damien Stehle}, title = {Worst-Case to Average-Case Reductions for Module Lattices}, howpublished = {Cryptology ePrint Archive, Report 2012/090}, year = {2012}, url = {http://eprint.iacr.org/2012/090}, } @misc{cryptoeprint:2012:091, author = {Adeline Langlois and Damien Stehle}, title = {Hardness of decision (R)LWE for any modulus}, howpublished = {Cryptology ePrint Archive, Report 2012/091}, year = {2012}, url = {http://eprint.iacr.org/2012/091}, } @misc{cryptoeprint:2012:092, author = {Yossef Oren and Avishai Wool}, title = {Tolerant Algebraic Side-Channel Analysis of {AES}}, howpublished = {Cryptology ePrint Archive, Report 2012/092}, year = {2012}, url = {http://eprint.iacr.org/2012/092}, } @misc{cryptoeprint:2012:093, author = {Ying-ming Guo and Ya-qun Zhao and Guang-pu Gao}, title = {Recent Results on Balanced Symmetric Boolean Functions}, howpublished = {Cryptology ePrint Archive, Report 2012/093}, year = {2012}, url = {http://eprint.iacr.org/2012/093}, } @misc{cryptoeprint:2012:094, author = {Jintai Ding and Dieter Schmidt}, title = {Algebraic attack on lattice based cryptosystems via solving equations over real numbers.}, howpublished = {Cryptology ePrint Archive, Report 2012/094}, year = {2012}, url = {http://eprint.iacr.org/2012/094}, } @misc{cryptoeprint:2012:095, author = {Nir Bitansky and Ran Canetti and Alessandro Chiesa and Eran Tromer}, title = {Recursive Composition and Bootstrapping for SNARKs and Proof-Carrying Data}, howpublished = {Cryptology ePrint Archive, Report 2012/095}, year = {2012}, url = {http://eprint.iacr.org/2012/095}, } @misc{cryptoeprint:2012:096, author = {Ewan Fleischmann and Christian Forler and Jakob Wenzel and Stefan Lucks}, title = {The Collision Security of MDC-4}, howpublished = {Cryptology ePrint Archive, Report 2012/096}, year = {2012}, url = {http://eprint.iacr.org/2012/096}, } @misc{cryptoeprint:2012:097, author = {Yingpu Deng and Yanbin Pan}, title = {An algorithm for factoring integers}, howpublished = {Cryptology ePrint Archive, Report 2012/097}, year = {2012}, url = {http://eprint.iacr.org/2012/097}, } @misc{cryptoeprint:2012:098, author = {François Dassance and Alexandre Venelli}, title = {Combined Attacks on the AES Key Schedule}, howpublished = {Cryptology ePrint Archive, Report 2012/098}, year = {2012}, url = {http://eprint.iacr.org/2012/098}, } @misc{cryptoeprint:2012:099, author = {Craig Gentry and Shai Halevi and Nigel P. Smart}, title = {Homomorphic Evaluation of the AES Circuit}, howpublished = {Cryptology ePrint Archive, Report 2012/099}, year = {2012}, url = {http://eprint.iacr.org/2012/099}, } @misc{cryptoeprint:2012:100, author = {Shahram Khazaei and Bj{\"o}rn Terelius and Douglas Wikstr{\"o}m}, title = {Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet}, howpublished = {Cryptology ePrint Archive, Report 2012/100}, year = {2012}, url = {http://eprint.iacr.org/2012/100}, } @misc{cryptoeprint:2012:101, author = {Zhi-hui Ou and Ya-qun Zhao}, title = {Unbalanced Elementary Symmetric Boolean Functions with the Degree "d" and "wt(d)>= 3"}, howpublished = {Cryptology ePrint Archive, Report 2012/101}, year = {2012}, url = {http://eprint.iacr.org/2012/101}, } @misc{cryptoeprint:2012:102, author = {Ron Rothblum}, title = {On the Circular Security of Bit-Encryption}, howpublished = {Cryptology ePrint Archive, Report 2012/102}, year = {2012}, url = {http://eprint.iacr.org/2012/102}, } @misc{cryptoeprint:2012:103, author = {Marten van Dijk and Ari Juels and Alina Oprea and Ronald L. Rivest}, title = {FlipIt: The Game of "Stealthy Takeover"}, howpublished = {Cryptology ePrint Archive, Report 2012/103}, year = {2012}, url = {http://eprint.iacr.org/2012/103}, } @misc{cryptoeprint:2012:104, author = {Wei Gao and Guilin Wang and Kefei Chen and Xueli Wang}, title = {Provably Secure Generic Construction of Certificate Based Signature from Certificateless Signature in Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2012/104}, year = {2012}, url = {http://eprint.iacr.org/2012/104}, } @misc{cryptoeprint:2012:105, author = {Wei Gao and Guilin Wang and Kefei Chen and Xueli Wang}, title = {Generic Construction of Certificate Based Encryption from Certificateless Encryption Revisited}, howpublished = {Cryptology ePrint Archive, Report 2012/105}, year = {2012}, url = {http://eprint.iacr.org/2012/105}, } @misc{cryptoeprint:2012:106, author = {Santanu Sarkar and Subhamoy Maitra}, title = {More on Correcting Errors in RSA Private Keys: Breaking CRT-RSA with Low Weight Decryption Exponents}, howpublished = {Cryptology ePrint Archive, Report 2012/106}, year = {2012}, url = {http://eprint.iacr.org/2012/106}, } @misc{cryptoeprint:2012:107, author = {Guilin Wang and Jiangshan Yu and Qi Xie}, title = {Security Analysis of A Single Sign-On Mechanism for Distributed Computer Networks}, howpublished = {Cryptology ePrint Archive, Report 2012/107}, year = {2012}, url = {http://eprint.iacr.org/2012/107}, } @misc{cryptoeprint:2012:108, author = {Yoshinori Aono and Manindra Agrawal and Takakazu Sato and Osamu Watanabe}, title = {On the Optimality of Lattices for the Coppersmith Technique}, howpublished = {Cryptology ePrint Archive, Report 2012/108}, year = {2012}, url = {http://eprint.iacr.org/2012/108}, } @misc{cryptoeprint:2012:109, author = {Yang Cui and Kirill Morozov}, title = {Chosen-Ciphertext Secure Efficiently Searchable Encryption in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2012/109}, year = {2012}, url = {http://eprint.iacr.org/2012/109}, } @misc{cryptoeprint:2012:110, author = {Razvan Barbulescu and Jérémie Detrey and Nicolas Estibals and Paul Zimmermann}, title = {Finding Optimal Formulae for Bilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2012/110}, year = {2012}, url = {http://eprint.iacr.org/2012/110}, } @misc{cryptoeprint:2012:111, author = {Yin Zhang and Meicheng Liu and Dongdai Lin}, title = {On the Immunity of Rotation Symmetric Boolean Functions Against Fast Algebraic Attacks}, howpublished = {Cryptology ePrint Archive, Report 2012/111}, year = {2012}, url = {http://eprint.iacr.org/2012/111}, } @misc{cryptoeprint:2012:112, author = {Meltem Sonmez Turan}, title = {On The Nonlinearity of Maximum-length NFSR Feedbacks}, howpublished = {Cryptology ePrint Archive, Report 2012/112}, year = {2012}, url = {http://eprint.iacr.org/2012/112}, } @misc{cryptoeprint:2012:113, author = {Bart Mennink}, title = {On the Collision and Preimage Security of MDC-4 in the Ideal Cipher Model}, howpublished = {Cryptology ePrint Archive, Report 2012/113}, year = {2012}, url = {http://eprint.iacr.org/2012/113}, } @misc{cryptoeprint:2012:114, author = {Danyang Chen, Yongbin Zhou, Yang Han, Rui Xue, Qing He}, title = {On Hardening Leakage Resilience of Random Extractors for Instantiations of Leakage Resilient Cryptographic Primitives}, howpublished = {Cryptology ePrint Archive, Report 2012/114}, year = {2012}, url = {http://eprint.iacr.org/2012/114}, } @misc{cryptoeprint:2012:115, author = {XU Chun-xiang and HE Xiao-hu and Daniel Abraha}, title = {Cryptanalysis of auditing protocol proposed by Wang et al. for data storage security in Cloud Computing}, howpublished = {Cryptology ePrint Archive, Report 2012/115}, year = {2012}, url = {http://eprint.iacr.org/2012/115}, } @misc{cryptoeprint:2012:116, author = {Ralf Kuesters and Tomasz Truderung and Andreas Vogt}, title = {Clash Attacks on the Verifiability of E-Voting Systems}, howpublished = {Cryptology ePrint Archive, Report 2012/116}, year = {2012}, url = {http://eprint.iacr.org/2012/116}, } @misc{cryptoeprint:2012:117, author = {Ran Canetti and Margarita Vald}, title = {Universally Composable Security With Local Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2012/117}, year = {2012}, url = {http://eprint.iacr.org/2012/117}, } @misc{cryptoeprint:2012:118, author = {S. Sree Vivek and S. Sharmila Deva Selvi and C. Pandu Rangan}, title = {Stronger Public Key Encryption Schemes Withstanding RAM Scraper Like Attacks}, howpublished = {Cryptology ePrint Archive, Report 2012/118}, year = {2012}, url = {http://eprint.iacr.org/2012/118}, } @misc{cryptoeprint:2012:119, author = {Taechan Kim, Sungwook Kim, Jung Hee Cheon}, title = {Accelerating the Final Exponentiation in the Computation of the Tate Pairings}, howpublished = {Cryptology ePrint Archive, Report 2012/119}, year = {2012}, url = {http://eprint.iacr.org/2012/119}, } @misc{cryptoeprint:2012:120, author = {Yongge Wang}, title = {Password Protected Smart Card and Memory Stick Authentication Against Off-line Dictionary Attacks}, howpublished = {Cryptology ePrint Archive, Report 2012/120}, year = {2012}, url = {http://eprint.iacr.org/2012/120}, } @misc{cryptoeprint:2012:121, author = {Mitra Fatemi and Taraneh Eghlidos and Mohammadreza Aref}, title = {An Efficient Multistage Secret Sharing Scheme Using Linear One-way Functions and Bilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2012/121}, year = {2012}, url = {http://eprint.iacr.org/2012/121}, } @misc{cryptoeprint:2012:122, author = {Reza R. Farashahi and Hongfeng Wu and Chang-An Zhao}, title = {Efficient Arithmetic on Hessian Curves over Fields of Characteristic Three}, howpublished = {Cryptology ePrint Archive, Report 2012/122}, year = {2012}, url = {http://eprint.iacr.org/2012/122}, } @misc{cryptoeprint:2012:123, author = {A. Dehbaoui and J.M. Dutertre and B. Robisson and P. Orsatelli and P. Maurine and A. Tria}, title = {Injection of transient faults using electromagnetic pulses -Practical results on a cryptographic system- }, howpublished = {Cryptology ePrint Archive, Report 2012/123}, year = {2012}, url = {http://eprint.iacr.org/2012/123}, } @misc{cryptoeprint:2012:124, author = {Sandra Diaz-Santiago and Debrup Chakraborty}, title = {On Securing Communication From Profilers}, howpublished = {Cryptology ePrint Archive, Report 2012/124}, year = {2012}, url = {http://eprint.iacr.org/2012/124}, } @misc{cryptoeprint:2012:125, author = {Aijun Ge and Cheng Chen and Chuangui Ma and Zhenfeng Zhang}, title = {Short and Efficient Expressive Attribute-Based Signature in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2012/125}, year = {2012}, url = {http://eprint.iacr.org/2012/125}, } @misc{cryptoeprint:2012:126, author = {Nuray At and Jean-Luc Beuchat and Ismail San}, title = {Compact Implementation of Threefish and Skein on FPGA}, howpublished = {Cryptology ePrint Archive, Report 2012/126}, year = {2012}, url = {http://eprint.iacr.org/2012/126}, } @misc{cryptoeprint:2012:127, author = {Deep Singh and Maheshanand Bhaintwal }, title = {Additive autocorrelation of some classes of cubic semi-bent Boolean functions}, howpublished = {Cryptology ePrint Archive, Report 2012/127}, year = {2012}, url = {http://eprint.iacr.org/2012/127}, } @misc{cryptoeprint:2012:128, author = {Marc Fischlin and Cristina Onete}, title = {Provably Secure Distance-Bounding: an Analysis of Prominent Protocols}, howpublished = {Cryptology ePrint Archive, Report 2012/128}, year = {2012}, url = {http://eprint.iacr.org/2012/128}, } @misc{cryptoeprint:2012:129, author = {Nelly Fazio and Irippuge Milinda Perera}, title = {Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts}, howpublished = {Cryptology ePrint Archive, Report 2012/129}, year = {2012}, url = {http://eprint.iacr.org/2012/129}, } @misc{cryptoeprint:2012:130, author = {Juan Garay and Clint Givens and Rafail Ostrovsky}, title = {Broadcast-Efficient Secure Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2012/130}, year = {2012}, url = {http://eprint.iacr.org/2012/130}, } @misc{cryptoeprint:2012:131, author = {Rodolphe LAMPE and Jacques PATARIN}, title = {Security of Feistel Schemes with New and Various Tools}, howpublished = {Cryptology ePrint Archive, Report 2012/131}, year = {2012}, url = {http://eprint.iacr.org/2012/131}, } @misc{cryptoeprint:2012:132, author = {Gregory Landais and Nicolas Sendrier}, title = {CFS Software Implementation}, howpublished = {Cryptology ePrint Archive, Report 2012/132}, year = {2012}, url = {http://eprint.iacr.org/2012/132}, } @misc{cryptoeprint:2012:133, author = {Jacob R. Lorch and James Mickens and Bryan Parno and Mariana Raykova and Joshua Schiffman}, title = {Toward Practical Private Access to Data Centers via Parallel ORAM}, howpublished = {Cryptology ePrint Archive, Report 2012/133}, year = {2012}, url = {http://eprint.iacr.org/2012/133}, } @misc{cryptoeprint:2012:134, author = {Dimitrios Poulakis and Robert Rolland}, title = {A Digital Signature Scheme for Long-Term Security}, howpublished = {Cryptology ePrint Archive, Report 2012/134}, year = {2012}, url = {http://eprint.iacr.org/2012/134}, } @misc{cryptoeprint:2012:135, author = {Nico Döttling and Daniel Kraschewski and Jörn Müller-Quade}, title = {David & Goliath Oblivious Affine Function Evaluation - Asymptotically Optimal Building Blocks for Universally Composable Two-Party Computation from a Single Untrusted Stateful Tamper-Proof Hardware Token}, howpublished = {Cryptology ePrint Archive, Report 2012/135}, year = {2012}, url = {http://eprint.iacr.org/2012/135}, } @misc{cryptoeprint:2012:136, author = {Zilong Wang and Danfeng (Daphne) Yao and Rongquan Feng}, title = {Adaptive Key Protection in Complex Cryptosystems with Attributes}, howpublished = {Cryptology ePrint Archive, Report 2012/136}, year = {2012}, url = {http://eprint.iacr.org/2012/136}, } @misc{cryptoeprint:2012:137, author = {Daniel J. Bernstein and Hsieh-Chung Chen and Chen-Mou Cheng and Tanja Lange and Ruben Niederhagen and Peter Schwabe and Bo-Yin Yang}, title = {Usable assembly language for GPUs: a success story}, howpublished = {Cryptology ePrint Archive, Report 2012/137}, year = {2012}, url = {http://eprint.iacr.org/2012/137}, } @misc{cryptoeprint:2012:138, author = {Nicolas T. Courtois}, title = {An Improved Differential Attack on Full GOST}, howpublished = {Cryptology ePrint Archive, Report 2012/138}, year = {2012}, url = {http://eprint.iacr.org/2012/138}, } @misc{cryptoeprint:2012:139, author = {Ta Vinh Thong }, title = {Formal verification of secure ad-hoc network routing protocols using deductive model-checking}, howpublished = {Cryptology ePrint Archive, Report 2012/139}, year = {2012}, url = {http://eprint.iacr.org/2012/139}, } @misc{cryptoeprint:2012:140, author = {Selcuk Baktir and Erkay Savas}, title = {Highly-Parallel Montgomery Multiplication for Multi-core General-Purpose Microprocessors}, howpublished = {Cryptology ePrint Archive, Report 2012/140}, year = {2012}, url = {http://eprint.iacr.org/2012/140}, } @misc{cryptoeprint:2012:141, author = {Dmitry Khovratovich}, title = {Bicliques for permutations: collision and preimage attacks in stronger settings}, howpublished = {Cryptology ePrint Archive, Report 2012/141}, year = {2012}, url = {http://eprint.iacr.org/2012/141}, } @misc{cryptoeprint:2012:142, author = {David Galindo and Javier Herranz and Jorge Villar}, title = {Identity-Based Encryption with Master Key-Dependent Message Security and Applications}, howpublished = {Cryptology ePrint Archive, Report 2012/142}, year = {2012}, url = {http://eprint.iacr.org/2012/142}, } @misc{cryptoeprint:2012:143, author = {Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti, Akshay Wadia}, title = {Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions}, howpublished = {Cryptology ePrint Archive, Report 2012/143}, year = {2012}, url = {http://eprint.iacr.org/2012/143}, } @misc{cryptoeprint:2012:144, author = {Junfeng Fan and Frederik Vercauteren}, title = {Somewhat Practical Fully Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2012/144}, year = {2012}, url = {http://eprint.iacr.org/2012/144}, } @misc{cryptoeprint:2012:145, author = {Shigeo Tsujii and Kohtaro Tadaki and Masahito Gotaishi and Ryou Fujita}, title = {Construction of the Tsujii-Shamir-Kasahara (TSK) Type Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization}, howpublished = {Cryptology ePrint Archive, Report 2012/145}, year = {2012}, url = {http://eprint.iacr.org/2012/145}, } @misc{cryptoeprint:2012:146, author = {Christophe Petit and Jean-Jacques Quisquater}, title = {On Polynomial Systems Arising from a Weil Descent}, howpublished = {Cryptology ePrint Archive, Report 2012/146}, year = {2012}, url = {http://eprint.iacr.org/2012/146}, } @misc{cryptoeprint:2012:147, author = {Elena Andreeva and Andrey Bogdanov and Bart Mennink and Bart Preneel and Christian Rechberger}, title = {On Security Arguments of the Second Round SHA-3 Candidates}, howpublished = {Cryptology ePrint Archive, Report 2012/147}, year = {2012}, url = {http://eprint.iacr.org/2012/147}, } @misc{cryptoeprint:2012:148, author = {Michael Scott}, title = {Client-Server Authentication Using Pairings}, howpublished = {Cryptology ePrint Archive, Report 2012/148}, year = {2012}, url = {http://eprint.iacr.org/2012/148}, } @misc{cryptoeprint:2012:149, author = {Martin Stanek}, title = {Attacking Scrambled Burrows-Wheeler Transform}, howpublished = {Cryptology ePrint Archive, Report 2012/149}, year = {2012}, url = {http://eprint.iacr.org/2012/149}, } @misc{cryptoeprint:2012:150, author = {Dennis Hofheinz}, title = {Circular chosen-ciphertext security with compact ciphertexts}, howpublished = {Cryptology ePrint Archive, Report 2012/150}, year = {2012}, url = {http://eprint.iacr.org/2012/150}, } @misc{cryptoeprint:2012:151, author = {Alexander Rostovtsev and Alexey Mizyukin}, title = {On Boolean Ideals and Varieties with Application to Algebraic Attacks}, howpublished = {Cryptology ePrint Archive, Report 2012/151}, year = {2012}, url = {http://eprint.iacr.org/2012/151}, } @misc{cryptoeprint:2012:152, author = {Limin Shen, yinxia sun}, title = {On security of a Certificateless Aggregate Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2012/152}, year = {2012}, url = {http://eprint.iacr.org/2012/152}, } @misc{cryptoeprint:2012:153, author = {Ralf Kuesters and Tomasz Truderung and Juergen Graf }, title = {A Framework for the Cryptographic Verification of Java-like Programs}, howpublished = {Cryptology ePrint Archive, Report 2012/153}, year = {2012}, url = {http://eprint.iacr.org/2012/153}, } @misc{cryptoeprint:2012:154, author = {Laila El Aimani}, title = {The Joint Signature and Encryption Revisited}, howpublished = {Cryptology ePrint Archive, Report 2012/154}, year = {2012}, url = {http://eprint.iacr.org/2012/154}, } @misc{cryptoeprint:2012:155, author = {Laila El Aimani and Marc Joye }, title = {Toward Practical Group Encryption }, howpublished = {Cryptology ePrint Archive, Report 2012/155}, year = {2012}, url = {http://eprint.iacr.org/2012/155}, } @misc{cryptoeprint:2012:156, author = {Dag Arne Osvik}, title = {Fast Embedded Software Hashing}, howpublished = {Cryptology ePrint Archive, Report 2012/156}, year = {2012}, url = {http://eprint.iacr.org/2012/156}, } @misc{cryptoeprint:2012:157, author = {Gu Chunsheng}, title = {Attack on Fully Homomorphic Encryption over the Integers}, howpublished = {Cryptology ePrint Archive, Report 2012/157}, year = {2012}, url = {http://eprint.iacr.org/2012/157}, } @misc{cryptoeprint:2012:158, author = {Peter Gazi and Stefano Tessaro}, title = {Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading}, howpublished = {Cryptology ePrint Archive, Report 2012/158}, year = {2012}, url = {http://eprint.iacr.org/2012/158}, } @misc{cryptoeprint:2012:159, author = {G.M. Zaverucha}, title = {Hybrid Encryption in the Multi-User Setting}, howpublished = {Cryptology ePrint Archive, Report 2012/159}, year = {2012}, url = {http://eprint.iacr.org/2012/159}, } @misc{cryptoeprint:2012:160, author = {Hai Xiong, Longjiang Qu, Chao Li}, title = {New Construction of Perfect Sequence Set and Low Correlation Zone Sequence Set}, howpublished = {Cryptology ePrint Archive, Report 2012/160}, year = {2012}, url = {http://eprint.iacr.org/2012/160}, } @misc{cryptoeprint:2012:161, author = {Hai Xiong, Chao Li, Qingping Dai, Shaojing Fu}, title = {New Constructions of Low Correlation Sequences with High Linear Complexity}, howpublished = {Cryptology ePrint Archive, Report 2012/161}, year = {2012}, url = {http://eprint.iacr.org/2012/161}, } @misc{cryptoeprint:2012:162, author = {Jayaprakash Kar}, title = {Provably Secure Online/Off-line Identity-Based Signature Scheme for Wireless Sensor Network}, howpublished = {Cryptology ePrint Archive, Report 2012/162}, year = {2012}, url = {http://eprint.iacr.org/2012/162}, } @misc{cryptoeprint:2012:163, author = {Joan Daemen and Gilles Van Assche}, title = {Differential propagation analysis of Keccak}, howpublished = {Cryptology ePrint Archive, Report 2012/163}, year = {2012}, url = {http://eprint.iacr.org/2012/163}, } @misc{cryptoeprint:2012:164, author = {Morten Dahl, Chao Ning, Tomas Toft}, title = {On Secure Two-party Integer Division}, howpublished = {Cryptology ePrint Archive, Report 2012/164}, year = {2012}, url = {http://eprint.iacr.org/2012/164}, } @misc{cryptoeprint:2012:165, author = {Cristina Onete}, title = {Key Updates for RFID Distance-Bounding Protocols: Achieving Narrow-Destructive Privacy}, howpublished = {Cryptology ePrint Archive, Report 2012/165}, year = {2012}, url = {http://eprint.iacr.org/2012/165}, } @misc{cryptoeprint:2012:166, author = {Elena Dubrova}, title = {A List of Maximum Period NLFSRs}, howpublished = {Cryptology ePrint Archive, Report 2012/166}, year = {2012}, url = {http://eprint.iacr.org/2012/166}, } @misc{cryptoeprint:2012:167, author = {Sorina Ionica}, title = {Pairing based methods for jacobians of genus 2 curves with maximal endomorphism ring}, howpublished = {Cryptology ePrint Archive, Report 2012/167}, year = {2012}, url = {http://eprint.iacr.org/2012/167}, } @misc{cryptoeprint:2012:168, author = {Val\'erie Gauthier and Ayoub Otmani and Jean-Pierre Tillich}, title = {A Distinguisher-Based Attack of a Homomorphic Encryption Scheme Relying on Reed-Solomon Codes}, howpublished = {Cryptology ePrint Archive, Report 2012/168}, year = {2012}, url = {http://eprint.iacr.org/2012/168}, } @misc{cryptoeprint:2012:169, author = {Xiaopei Guo, Kejian Xu, Tongsen Sun and Xiubin Fan}, title = {Analysis of Minimum Numbers of Linearly Active S-Boxes of a Class of Generalized Feistel Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2012/169}, year = {2012}, url = {http://eprint.iacr.org/2012/169}, } @misc{cryptoeprint:2012:170, author = {Vladislav Kovtun and Andrew Okhrimenko}, title = {Approaches for the performance increasing of software implementation of integer multiplication in prime fields}, howpublished = {Cryptology ePrint Archive, Report 2012/170}, year = {2012}, url = {http://eprint.iacr.org/2012/170}, } @misc{cryptoeprint:2012:171, author = {Scott Aaronson and Paul Christiano}, title = {Quantum Money from Hidden Subspaces}, howpublished = {Cryptology ePrint Archive, Report 2012/171}, year = {2012}, url = {http://eprint.iacr.org/2012/171}, } @misc{cryptoeprint:2012:172, author = {Pierre-Alain Fouque and Nicolas Guillermin and Delphine Leresteux and Mehdi Tibouchi and Jean-Christophe Zapalowicz}, title = {Attacking RSA-CRT Signatures with Faults on Montgomery Multiplication}, howpublished = {Cryptology ePrint Archive, Report 2012/172}, year = {2012}, url = {http://eprint.iacr.org/2012/172}, } @misc{cryptoeprint:2012:173, author = {Bruno Blanchet}, title = {Automatically Verified Mechanized Proof of One-Encryption Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2012/173}, year = {2012}, url = {http://eprint.iacr.org/2012/173}, } @misc{cryptoeprint:2012:174, author = {Emmanuel VOLTE and Jacques PATARIN and Valérie NACHEF}, title = {Zero Knowledge with Rubik's Cubes}, howpublished = {Cryptology ePrint Archive, Report 2012/174}, year = {2012}, url = {http://eprint.iacr.org/2012/174}, } @misc{cryptoeprint:2012:175, author = {Houssem MAGHREBI, Claude CARLET, Sylvain GUILLEY and Jean-Luc DANGER}, title = {Optimal First-Order Masking with Linear and Non-Linear Bijections}, howpublished = {Cryptology ePrint Archive, Report 2012/175}, year = {2012}, url = {http://eprint.iacr.org/2012/175}, } @misc{cryptoeprint:2012:176, author = {Satrajit Ghosh and Abhijit Das}, title = {Improvements of Algebraic Attacks Based on Structured Gaussian Elimination}, howpublished = {Cryptology ePrint Archive, Report 2012/176}, year = {2012}, url = {http://eprint.iacr.org/2012/176}, } @misc{cryptoeprint:2012:177, author = {Unruh, Dominique}, title = {Everlasting Quantum Security}, howpublished = {Cryptology ePrint Archive, Report 2012/177}, year = {2012}, url = {http://eprint.iacr.org/2012/177}, } @misc{cryptoeprint:2012:178, author = {Aleksander Essex and Jeremy Clark and Urs Hengartner and Carlisle Adams}, title = {Eperio: Mitigating Technical Complexity in Cryptographic Election Verification}, howpublished = {Cryptology ePrint Archive, Report 2012/178}, year = {2012}, url = {http://eprint.iacr.org/2012/178}, } @misc{cryptoeprint:2012:179, author = {Benjamin Kreuter and abhi shelat and Chih-hao Shen}, title = {Towards Billion-Gate Secure Computation with Malicious Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2012/179}, year = {2012}, url = {http://eprint.iacr.org/2012/179}, } @misc{cryptoeprint:2012:180, author = {Brian Baldwin and William P. Marnane}, title = {Yet Another SHA-3 Round 3 FPGA Results Paper}, howpublished = {Cryptology ePrint Archive, Report 2012/180}, year = {2012}, url = {http://eprint.iacr.org/2012/180}, } @misc{cryptoeprint:2012:181, author = {Nils Fleischhacker and Mark Manulis and Amir Sadr-Azodi}, title = {Modular Design and Analysis Framework for Multi-Factor Authentication and Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2012/181}, year = {2012}, url = {http://eprint.iacr.org/2012/181}, } @misc{cryptoeprint:2012:182, author = {Mark Zhandry}, title = {How to Construct Quantum Random Functions}, howpublished = {Cryptology ePrint Archive, Report 2012/182}, year = {2012}, url = {http://eprint.iacr.org/2012/182}, } @misc{cryptoeprint:2012:183, author = {Michael Backes and Sebastian Meiser}, title = {Differentially Private Smart Metering with Battery Recharging}, howpublished = {Cryptology ePrint Archive, Report 2012/183}, year = {2012}, url = {http://eprint.iacr.org/2012/183}, } @misc{cryptoeprint:2012:184, author = {Dion Boesten and Boris Skoric}, title = {Asymptotic fingerprinting capacity in the Combined Digit Model}, howpublished = {Cryptology ePrint Archive, Report 2012/184}, year = {2012}, url = {http://eprint.iacr.org/2012/184}, } @misc{cryptoeprint:2012:185, author = {Ben Smyth}, title = {Replay attacks that violate ballot secrecy in Helios}, howpublished = {Cryptology ePrint Archive, Report 2012/185}, year = {2012}, url = {http://eprint.iacr.org/2012/185}, } @misc{cryptoeprint:2012:186, author = {Brajesh Kumar Singh}, title = {Third-order nonlinearities of some biquadratic monomial Boolean functions}, howpublished = {Cryptology ePrint Archive, Report 2012/186}, year = {2012}, url = {http://eprint.iacr.org/2012/186}, } @misc{cryptoeprint:2012:187, author = {Christian Wachsmann and Alexandra Dmitrienko and Ahmad-Reza Sadeghi and Sandeep Tamrakar}, title = {SmartTokens: Delegable Access Control with NFC-enabled Smartphones (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2012/187}, year = {2012}, url = {http://eprint.iacr.org/2012/187}, } @misc{cryptoeprint:2012:188, author = {Xin Li}, title = {Non-Malleable Extractors, Two-Source Extractors and Privacy Amplification}, howpublished = {Cryptology ePrint Archive, Report 2012/188}, year = {2012}, url = {http://eprint.iacr.org/2012/188}, } @misc{cryptoeprint:2012:189, author = {Steve Kremer and Robert Künnemann and Graham Steel}, title = {Universally Composable Key-Management}, howpublished = {Cryptology ePrint Archive, Report 2012/189}, year = {2012}, url = {http://eprint.iacr.org/2012/189}, } @misc{cryptoeprint:2012:190, author = {Ding Wang and Chun-guang Ma}, title = {On the Security of an Improved Password Authentication Scheme Based on ECC}, howpublished = {Cryptology ePrint Archive, Report 2012/190}, year = {2012}, url = {http://eprint.iacr.org/2012/190}, } @misc{cryptoeprint:2012:191, author = {Liangliang Xiao and I-Ling Yen}, title = {Security Analysis and Enhancement for Prefix-Preserving Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2012/191}, year = {2012}, url = {http://eprint.iacr.org/2012/191}, } @misc{cryptoeprint:2012:192, author = {Liangliang Xiao and I-Ling Yen and Dung T. Huynh}, title = {Extending Order Preserving Encryption for Multi-User Systems}, howpublished = {Cryptology ePrint Archive, Report 2012/192}, year = {2012}, url = {http://eprint.iacr.org/2012/192}, } @misc{cryptoeprint:2012:193, author = {Liangliang Xiao and Osbert Bastani and I-Ling Yen}, title = {An Efficient Homomorphic Encryption Protocol for Multi-User Systems}, howpublished = {Cryptology ePrint Archive, Report 2012/193}, year = {2012}, url = {http://eprint.iacr.org/2012/193}, } @misc{cryptoeprint:2012:194, author = {Albrecht Petzoldt and Stanislav Bulygin and Johannes Buchmann}, title = {A Multivariate based Threshold Ring Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2012/194}, year = {2012}, url = {http://eprint.iacr.org/2012/194}, } @misc{cryptoeprint:2012:195, author = {Markku-Juhani O. Saarinen }, title = {The BlueJay Ultra-Lightweight Hybrid Cryptosystem }, howpublished = {Cryptology ePrint Archive, Report 2012/195}, year = {2012}, url = {http://eprint.iacr.org/2012/195}, } @misc{cryptoeprint:2012:196, author = {Mihir Bellare and Stefano Tessaro and Thomas Ristenpart}, title = {Multi-Instance Security and its Application to Password-Based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2012/196}, year = {2012}, url = {http://eprint.iacr.org/2012/196}, } @misc{cryptoeprint:2012:197, author = {Foteini Baldimtsi and Anna Lysyanskaya}, title = {On The Security of One-Witness Blind Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2012/197}, year = {2012}, url = {http://eprint.iacr.org/2012/197}, } @misc{cryptoeprint:2012:198, author = {Jae Hong Seo and Jung Hee Cheon}, title = {Beyond the Limitation of Prime-Order Bilinear Groups, and Round Optimal Blind Signatures}, howpublished = {Cryptology ePrint Archive, Report 2012/198}, year = {2012}, url = {http://eprint.iacr.org/2012/198}, } @misc{cryptoeprint:2012:199, author = {Jean-Charles Faugère and Pierrick Gaudry and Louise Huot and Guénaël Renault}, title = {Using Symmetries in the Index Calculus for Elliptic Curves Discrete Logarithm}, howpublished = {Cryptology ePrint Archive, Report 2012/199}, year = {2012}, url = {http://eprint.iacr.org/2012/199}, } @misc{cryptoeprint:2012:200, author = {Alexander W. Dent}, title = {Aggregate Signcryption}, howpublished = {Cryptology ePrint Archive, Report 2012/200}, year = {2012}, url = {http://eprint.iacr.org/2012/200}, } @misc{cryptoeprint:2012:201, author = {J.H.Zhang, Y.B.cui}, title = {Comment an Anonymous Multi-receiver Identity-based Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2012/201}, year = {2012}, url = {http://eprint.iacr.org/2012/201}, } @misc{cryptoeprint:2012:202, author = {Bo Zhang and Fangguo Zhang}, title = {Secure Similarity Coefficients Computation with Malicious Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2012/202}, year = {2012}, url = {http://eprint.iacr.org/2012/202}, } @misc{cryptoeprint:2012:203, author = {Debiao He}, title = {Robust biometric-based user authentication scheme for wireless sensor networks}, howpublished = {Cryptology ePrint Archive, Report 2012/203}, year = {2012}, url = {http://eprint.iacr.org/2012/203}, } @misc{cryptoeprint:2012:204, author = {Matthew Franklin and Haibin Zhang}, title = {Unique Group Signatures}, howpublished = {Cryptology ePrint Archive, Report 2012/204}, year = {2012}, url = {http://eprint.iacr.org/2012/204}, } @misc{cryptoeprint:2012:205, author = {J.C. Mitchell, R. Sharma, D. Stefan and J. Zimmerman}, title = {Information-flow control for programming on encrypted data}, howpublished = {Cryptology ePrint Archive, Report 2012/205}, year = {2012}, url = {http://eprint.iacr.org/2012/205}, } @misc{cryptoeprint:2012:206, author = {Shuang Wu and Dengguo Feng and Wenling Wu and Jian Guo and Le Dong and Jian Zou}, title = {(Pseudo) Preimage Attack on Round-Reduced Gr{\o}stl Hash Function and Others (Extended Version)}, howpublished = {Cryptology ePrint Archive, Report 2012/206}, year = {2012}, url = {http://eprint.iacr.org/2012/206}, } @misc{cryptoeprint:2012:207, author = {Kai Zhang, Lin Ding and Jie Guan}, title = {Cryptanalysis of Hummingbird-2}, howpublished = {Cryptology ePrint Archive, Report 2012/207}, year = {2012}, url = {http://eprint.iacr.org/2012/207}, } @misc{cryptoeprint:2012:208, author = {Jay Shah and Ayan Mahalanobis}, title = {A New Guess-and-Determine Attack on the A5/1}, howpublished = {Cryptology ePrint Archive, Report 2012/208}, year = {2012}, url = {http://eprint.iacr.org/2012/208}, } @misc{cryptoeprint:2012:209, author = {Donghoon Chang and Moti Yung}, title = {Adaptive Preimage Resistance Analysis Revisited:\\ Requirements, Subtleties and Implications}, howpublished = {Cryptology ePrint Archive, Report 2012/209}, year = {2012}, url = {http://eprint.iacr.org/2012/209}, } @misc{cryptoeprint:2012:210, author = {Yusong Du, and Fangguo Zhang}, title = {On the Existence of Boolean Functions with Optimal Resistance against Fast Algebraic Attacks}, howpublished = {Cryptology ePrint Archive, Report 2012/210}, year = {2012}, url = {http://eprint.iacr.org/2012/210}, } @misc{cryptoeprint:2012:211, author = {Atsushi Fujioka and Koutarou Suzuki and Keita Xagawa and Kazuki Yoneyama}, title = {Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices}, howpublished = {Cryptology ePrint Archive, Report 2012/211}, year = {2012}, url = {http://eprint.iacr.org/2012/211}, } @misc{cryptoeprint:2012:212, author = {Meicheng Liu and Yin Zhang and Dongdai Lin}, title = {Perfect Algebraic Immune Functions}, howpublished = {Cryptology ePrint Archive, Report 2012/212}, year = {2012}, url = {http://eprint.iacr.org/2012/212}, } @misc{cryptoeprint:2012:213, author = {Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong}, title = {Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions}, howpublished = {Cryptology ePrint Archive, Report 2012/213}, year = {2012}, url = {http://eprint.iacr.org/2012/213}, } @misc{cryptoeprint:2012:214, author = {Shengbao Wu, Mingsheng Wang}, title = {Automatic Search of Truncated Impossible Differentials and Applications}, howpublished = {Cryptology ePrint Archive, Report 2012/214}, year = {2012}, url = {http://eprint.iacr.org/2012/214}, } @misc{cryptoeprint:2012:215, author = {Rosario Gennaro and Craig Gentry and Bryan Parno and Mariana Raykova}, title = {Quadratic Span Programs and Succinct NIZKs without PCPs}, howpublished = {Cryptology ePrint Archive, Report 2012/215}, year = {2012}, url = {http://eprint.iacr.org/2012/215}, } @misc{cryptoeprint:2012:216, author = {Duong-Hieu Phan and David Pointcheval and Siamak F. Shahandashti and Mario Strefler}, title = {Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts}, howpublished = {Cryptology ePrint Archive, Report 2012/216}, year = {2012}, url = {http://eprint.iacr.org/2012/216}, } @misc{cryptoeprint:2012:217, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks, and Combinatorial Search Problems}, howpublished = {Cryptology ePrint Archive, Report 2012/217}, year = {2012}, url = {http://eprint.iacr.org/2012/217}, } @misc{cryptoeprint:2012:218, author = {T-H. Hubert Chan and Mingfei Li and Elaine Shi and Wenchang Xu}, title = {Differentially Private Continual Monitoring of Heavy Hitters from Distributed Streams}, howpublished = {Cryptology ePrint Archive, Report 2012/218}, year = {2012}, url = {http://eprint.iacr.org/2012/218}, } @misc{cryptoeprint:2012:219, author = {Siamak F. Shahandashti and Reihaneh Safavi-Naini and Philip Ogunbona}, title = {Private Fingerprint Matching}, howpublished = {Cryptology ePrint Archive, Report 2012/219}, year = {2012}, url = {http://eprint.iacr.org/2012/219}, } @misc{cryptoeprint:2012:220, author = {Mihir Bellare and Zvika Brakerski and Moni Naor and Thomas Ristenpart and Gil Segev and Hovav Shacham and Scott Yilek}, title = {Hedged Public-key Encryption: How to Protect against Bad Randomness}, howpublished = {Cryptology ePrint Archive, Report 2012/220}, year = {2012}, url = {http://eprint.iacr.org/2012/220}, } @misc{cryptoeprint:2012:221, author = {Nishanth Chandran and Juan Garay and Rafail Ostrovsky}, title = {Almost-Everywhere Secure Computation with Edge Corruptions}, howpublished = {Cryptology ePrint Archive, Report 2012/221}, year = {2012}, url = {http://eprint.iacr.org/2012/221}, } @misc{cryptoeprint:2012:222, author = {Kai-Yuen Cheong}, title = {A secret sharing scheme of prime numbers based on hardness of factorization}, howpublished = {Cryptology ePrint Archive, Report 2012/222}, year = {2012}, url = {http://eprint.iacr.org/2012/222}, } @misc{cryptoeprint:2012:223, author = {Enrico Thomae}, title = {A Generalization of the Rainbow Band Separation Attack and its Applications to Multivariate Schemes}, howpublished = {Cryptology ePrint Archive, Report 2012/223}, year = {2012}, url = {http://eprint.iacr.org/2012/223}, } @misc{cryptoeprint:2012:224, author = {Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang and Hoeteck Wee}, title = {Shorter IBE and Signatures via Asymmetric Pairings}, howpublished = {Cryptology ePrint Archive, Report 2012/224}, year = {2012}, url = {http://eprint.iacr.org/2012/224}, } @misc{cryptoeprint:2012:225, author = {Zvika Brakerski}, title = {When Homomorphism Becomes a Liability}, howpublished = {Cryptology ePrint Archive, Report 2012/225}, year = {2012}, url = {http://eprint.iacr.org/2012/225}, } @misc{cryptoeprint:2012:226, author = {Sarah Meiklejohn and C. Chris Erway and Alptekin Küpçü and Theodora Hinkle and Anna Lysyanskaya}, title = {ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash}, howpublished = {Cryptology ePrint Archive, Report 2012/226}, year = {2012}, url = {http://eprint.iacr.org/2012/226}, } @misc{cryptoeprint:2012:227, author = {Ding Wang and Chun-guang Ma and Peng Wu}, title = {Secure password-based remote user authentication scheme with non-tamper resistant smart cards}, howpublished = {Cryptology ePrint Archive, Report 2012/227}, year = {2012}, url = {http://eprint.iacr.org/2012/227}, } @misc{cryptoeprint:2012:228, author = {Marten van Dijk and Ulrich Rührmair}, title = {Physical Unclonable Functions in Cryptographic Protocols: Security Proofs and Impossibility Results}, howpublished = {Cryptology ePrint Archive, Report 2012/228}, year = {2012}, url = {http://eprint.iacr.org/2012/228}, } @misc{cryptoeprint:2012:229, author = {Mohammad Mahmoody and David Xiao}, title = {Languages with Efficient Zero-Knowledge PCP's are in SZK}, howpublished = {Cryptology ePrint Archive, Report 2012/229}, year = {2012}, url = {http://eprint.iacr.org/2012/229}, } @misc{cryptoeprint:2012:230, author = {Vadim Lyubashevsky and Chris Peikert and Oded Regev}, title = {On Ideal Lattices and Learning with Errors Over Rings}, howpublished = {Cryptology ePrint Archive, Report 2012/230}, year = {2012}, url = {http://eprint.iacr.org/2012/230}, } @misc{cryptoeprint:2012:231, author = {Reihaneh Safavi-Naini and Mohammed Ashraful Alam Tuhin and Pengwei Wang}, title = {A General Construction for 1-round $\delta$-RMT and (0, $\delta$)-SMT}, howpublished = {Cryptology ePrint Archive, Report 2012/231}, year = {2012}, url = {http://eprint.iacr.org/2012/231}, } @misc{cryptoeprint:2012:232, author = {Diego F. Aranha and Laura Fuentes-Castañeda and Edward Knapp and Alfred Menezes and Francisco Rodríguez-Henríquez}, title = {Implementing Pairings at the 192-bit Security Level}, howpublished = {Cryptology ePrint Archive, Report 2012/232}, year = {2012}, url = {http://eprint.iacr.org/2012/232}, } @misc{cryptoeprint:2012:233, author = {Qi Chai and Guang Gong}, title = {A Cryptanalysis of HummingBird-2: The Differential Sequence Analysis}, howpublished = {Cryptology ePrint Archive, Report 2012/233}, year = {2012}, url = {http://eprint.iacr.org/2012/233}, } @misc{cryptoeprint:2012:234, author = {Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo, Thomas Peyrin, Axel Poschmann, Chik How Tan}, title = {SPN-Hash: Improving the Provable Resistance Against Differential Collision Attacks}, howpublished = {Cryptology ePrint Archive, Report 2012/234}, year = {2012}, url = {http://eprint.iacr.org/2012/234}, } @misc{cryptoeprint:2012:235, author = {Leo Ducas and Alain Durmus}, title = {Ring-LWE in Polynomial Rings}, howpublished = {Cryptology ePrint Archive, Report 2012/235}, year = {2012}, url = {http://eprint.iacr.org/2012/235}, } @misc{cryptoeprint:2012:236, author = {D. Bernhard and O. Pereira and B. Warinschi}, title = {On Necessary and Sufficient Conditions for Private Ballot Submission}, howpublished = {Cryptology ePrint Archive, Report 2012/236}, year = {2012}, url = {http://eprint.iacr.org/2012/236}, } @misc{cryptoeprint:2012:237, author = {Rkia Aouinatou1, Mostafa Belkasmi2}, title = {In the point of view security, An efficient scheme in IBE with random oracle}, howpublished = {Cryptology ePrint Archive, Report 2012/237}, year = {2012}, url = {http://eprint.iacr.org/2012/237}, } @misc{cryptoeprint:2012:238, author = {Hongbo Yu and Jiazhe Chen and XIaoyun Wang}, title = {The Boomerang Attacks on the Round-Reduced Skein-512}, howpublished = {Cryptology ePrint Archive, Report 2012/238}, year = {2012}, url = {http://eprint.iacr.org/2012/238}, } @misc{cryptoeprint:2012:239, author = {Valerie Nachef and Jacques Patarin and Emmanuel Volte}, title = {Zero-Knowledge for Multivariate Polynomials}, howpublished = {Cryptology ePrint Archive, Report 2012/239}, year = {2012}, url = {http://eprint.iacr.org/2012/239}, } @misc{cryptoeprint:2012:240, author = {Craig Gentry and Shai Halevi and Nigel P. Smart}, title = {Ring Switching in BGV-Style Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2012/240}, year = {2012}, url = {http://eprint.iacr.org/2012/240}, } @misc{cryptoeprint:2012:241, author = {Masahiro Yagisawa}, title = {Key distribution system and attribute-based encryption }, howpublished = {Cryptology ePrint Archive, Report 2012/241}, year = {2012}, url = {http://eprint.iacr.org/2012/241}, } @misc{cryptoeprint:2012:242, author = {C. Brzuska and M. Fischlin and N.P. Smart and B. Warinschi and S. Williams}, title = {Less is More: Relaxed yet Composable Security Notions for Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2012/242}, year = {2012}, url = {http://eprint.iacr.org/2012/242}, } @misc{cryptoeprint:2012:243, author = {Myungsun Kim and Jihye Kim and Jung Hee Cheon}, title = {Compress Multiple Ciphertexts Using ElGamal Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2012/243}, year = {2012}, url = {http://eprint.iacr.org/2012/243}, } @misc{cryptoeprint:2012:244, author = {Leonard J. Schulman}, title = {Cryptography from tensor problems}, howpublished = {Cryptology ePrint Archive, Report 2012/244}, year = {2012}, url = {http://eprint.iacr.org/2012/244}, } @misc{cryptoeprint:2012:245, author = {Qiang Li and Xiangxue Li and Dong Zheng and Zheng Huang and Kefei Chen}, title = {On the Equivalence between the Set Covering Problem and the Problem of Finding Optimal Cumulative Assignment Schemes}, howpublished = {Cryptology ePrint Archive, Report 2012/245}, year = {2012}, url = {http://eprint.iacr.org/2012/245}, } @misc{cryptoeprint:2012:246, author = {Maggie Habeeb and Delaram Kahrobaei and Vladimir Shpilrain}, title = {A Secret Sharing Scheme Based on Group Presentations and the Word Problem}, howpublished = {Cryptology ePrint Archive, Report 2012/246}, year = {2012}, url = {http://eprint.iacr.org/2012/246}, } @misc{cryptoeprint:2012:247, author = {Xusheng Zhang and Kunpeng Wang and Dongdai Lin}, title = {On Efficient Pairings on Elliptic Curves over Extension Fields}, howpublished = {Cryptology ePrint Archive, Report 2012/247}, year = {2012}, url = {http://eprint.iacr.org/2012/247}, } @misc{cryptoeprint:2012:248, author = {Ghassan O. Karame and Elli Androulaki and Srdjan Capkun}, title = {Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin}, howpublished = {Cryptology ePrint Archive, Report 2012/248}, year = {2012}, url = {http://eprint.iacr.org/2012/248}, } @misc{cryptoeprint:2012:249, author = {Boris Skoric and Jan-Jaap Oosterwijk}, title = {Binary and q-ary Tardos codes, revisited}, howpublished = {Cryptology ePrint Archive, Report 2012/249}, year = {2012}, url = {http://eprint.iacr.org/2012/249}, } @misc{cryptoeprint:2012:250, author = {Xu An Wang and Xiaoyuan Yang}, title = {New Identity Based Encryption And Its Proxy Re-encryption}, howpublished = {Cryptology ePrint Archive, Report 2012/250}, year = {2012}, url = {http://eprint.iacr.org/2012/250}, } @misc{cryptoeprint:2012:251, author = {Patrick Lacharme and Andrea Röck and Vincent Strubel and Marion Videau}, title = {The Linux Psedorandom Number Generator Revisited}, howpublished = {Cryptology ePrint Archive, Report 2012/251}, year = {2012}, url = {http://eprint.iacr.org/2012/251}, } @misc{cryptoeprint:2012:252, author = {Changyu Dong and Liqun Chen and Jan Camenisch and Giovanni Russello}, title = {Fair Private Set Intersection with a Semi-trusted Arbiter}, howpublished = {Cryptology ePrint Archive, Report 2012/252}, year = {2012}, url = {http://eprint.iacr.org/2012/252}, } @misc{cryptoeprint:2012:253, author = {Zhian Zhu}, title = {Cryptanalysis of pairing-free certificateless authenticated key agreement protocol}, howpublished = {Cryptology ePrint Archive, Report 2012/253}, year = {2012}, url = {http://eprint.iacr.org/2012/253}, } @misc{cryptoeprint:2012:254, author = {Emil Stefanov and Elaine Shi}, title = {FastPRP: Fast Pseudo-Random Permutations for Small Domains}, howpublished = {Cryptology ePrint Archive, Report 2012/254}, year = {2012}, url = {http://eprint.iacr.org/2012/254}, } @misc{cryptoeprint:2012:255, author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz}, title = {How to Garble Arithmetic Circuits}, howpublished = {Cryptology ePrint Archive, Report 2012/255}, year = {2012}, url = {http://eprint.iacr.org/2012/255}, } @misc{cryptoeprint:2012:256, author = {Carolyn Whitnall and Elisabeth Oswald and Fran\c{c}ois-Xavier Standaert}, title = {The myth of generic DPA...and the magic of learning}, howpublished = {Cryptology ePrint Archive, Report 2012/256}, year = {2012}, url = {http://eprint.iacr.org/2012/256}, } @misc{cryptoeprint:2012:257, author = {Lin Zhiqiang}, title = {The Transformation from the Galois NLFSR to the Fibonacci Configuration}, howpublished = {Cryptology ePrint Archive, Report 2012/257}, year = {2012}, url = {http://eprint.iacr.org/2012/257}, } @misc{cryptoeprint:2012:258, author = {José Bacelar Almeida and Manuel Barbosa and Endre Bangerter and Gilles Barte and Stephan Krenn and Santiago Zanella Béguelin}, title = {Full Proof Cryptography: Verifiable Compilation of Efficient Zero-Knowledge Protocols}, howpublished = {Cryptology ePrint Archive, Report 2012/258}, year = {2012}, url = {http://eprint.iacr.org/2012/258}, } @misc{cryptoeprint:2012:259, author = {Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh }, title = {A Novel Strong Designated Verifier Signature Scheme without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2012/259}, year = {2012}, url = {http://eprint.iacr.org/2012/259}, } @misc{cryptoeprint:2012:260, author = {Jialin Huang, Xuejia Lai}, title = {Transposition of AES Key Schedule}, howpublished = {Cryptology ePrint Archive, Report 2012/260}, year = {2012}, url = {http://eprint.iacr.org/2012/260}, } @misc{cryptoeprint:2012:261, author = {Michael Gerbush and Allison Lewko and Adam O'Neill and Brent Waters}, title = {Dual Form Signatures: An Approach for Proving Security from Static Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2012/261}, year = {2012}, url = {http://eprint.iacr.org/2012/261}, } @misc{cryptoeprint:2012:262, author = {I. Damgard and M. Keller and E. Larraia and C. Miles and N.P. Smart}, title = {Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol}, howpublished = {Cryptology ePrint Archive, Report 2012/262}, year = {2012}, url = {http://eprint.iacr.org/2012/262}, } @misc{cryptoeprint:2012:263, author = {Kai-Yuen Cheong}, title = {One-way Functions from Chebyshev Polynomials}, howpublished = {Cryptology ePrint Archive, Report 2012/263}, year = {2012}, url = {http://eprint.iacr.org/2012/263}, } @misc{cryptoeprint:2012:264, author = {Lei Wei and Thomas Peyrin and Przemyslaw Sokolowski and San Ling and Josef Pieprzyk and Huaxiong Wang}, title = {On the (In)Security of IDEA in Various Hashing Modes}, howpublished = {Cryptology ePrint Archive, Report 2012/264}, year = {2012}, url = {http://eprint.iacr.org/2012/264}, } @misc{cryptoeprint:2012:265, author = {Mihir Bellare and Viet Tung Hoang and Phillip Rogaway}, title = {Garbling Schemes}, howpublished = {Cryptology ePrint Archive, Report 2012/265}, year = {2012}, url = {http://eprint.iacr.org/2012/265}, } @misc{cryptoeprint:2012:266, author = {Christopher Fletcher and Marten van Dijk and Srinivas Devadas}, title = {Compilation Techniques for Efficient Encrypted Computation}, howpublished = {Cryptology ePrint Archive, Report 2012/266}, year = {2012}, url = {http://eprint.iacr.org/2012/266}, } @misc{cryptoeprint:2012:267, author = {Steven D. Galbraith and Chang-An Zhao}, title = {Self-pairings on Hyperelliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2012/267}, year = {2012}, url = {http://eprint.iacr.org/2012/267}, } @misc{cryptoeprint:2012:268, author = {Edoardo Persichetti}, title = {On a CCA2-secure variant of McEliece in the standard model}, howpublished = {Cryptology ePrint Archive, Report 2012/268}, year = {2012}, url = {http://eprint.iacr.org/2012/268}, } @misc{cryptoeprint:2012:269, author = {Luke Mather and Elisabeth Oswald}, title = {Quantifying Side-Channel Information Leakage from Web Applications}, howpublished = {Cryptology ePrint Archive, Report 2012/269}, year = {2012}, url = {http://eprint.iacr.org/2012/269}, } @misc{cryptoeprint:2012:270, author = {Enrico Thomae}, title = {Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-Commutative Rings}, howpublished = {Cryptology ePrint Archive, Report 2012/270}, year = {2012}, url = {http://eprint.iacr.org/2012/270}, } @misc{cryptoeprint:2012:271, author = {Zhiwei Wang, Guozi Sun and Danwei Chen }, title = {Homomorphic Signature for Identity Authentication in Cloud Computing}, howpublished = {Cryptology ePrint Archive, Report 2012/271}, year = {2012}, url = {http://eprint.iacr.org/2012/271}, } @misc{cryptoeprint:2012:272, author = {Martin Hirt and Christoph Lucas and Ueli Maurer and Dominik Raub}, title = {Passive Corruption in Statistical Multi-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2012/272}, year = {2012}, url = {http://eprint.iacr.org/2012/272}, } @misc{cryptoeprint:2012:273, author = {Yun-Ju Huang and Feng-Hao Liu and Bo-Yin Yang}, title = {Public-Key Cryptography from New Multivariate Quadratic Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2012/273}, year = {2012}, url = {http://eprint.iacr.org/2012/273}, } @misc{cryptoeprint:2012:274, author = {Aleksandar Kircanski and Amr M. Youssef}, title = {Boomerang and Slide-Rotational Analysis of the SM3 Hash Function}, howpublished = {Cryptology ePrint Archive, Report 2012/274}, year = {2012}, url = {http://eprint.iacr.org/2012/274}, } @misc{cryptoeprint:2012:275, author = {Samuel Neves and Jean-Philippe Aumasson}, title = {Implementing BLAKE with AVX, AVX2, and XOP}, howpublished = {Cryptology ePrint Archive, Report 2012/275}, year = {2012}, url = {http://eprint.iacr.org/2012/275}, } @misc{cryptoeprint:2012:276, author = {Alptekin Küpçü}, title = {Official Arbitration and its Application to Secure Cloud Storage}, howpublished = {Cryptology ePrint Archive, Report 2012/276}, year = {2012}, url = {http://eprint.iacr.org/2012/276}, } @misc{cryptoeprint:2012:277, author = {Rkia Aouinatou (1) Mostafa Belkasmi (2)}, title = {Cyptanalysis CDHP , BDHP and Tate pairing under certain conditions The Tate pairing is less secure than Weil}, howpublished = {Cryptology ePrint Archive, Report 2012/277}, year = {2012}, url = {http://eprint.iacr.org/2012/277}, } @misc{cryptoeprint:2012:278, author = {Dustin Moody and Souradyuti Paul and Daniel Smith-Tone}, title = {Improved Indifferentiability Security Bound for the JH Mode}, howpublished = {Cryptology ePrint Archive, Report 2012/278}, year = {2012}, url = {http://eprint.iacr.org/2012/278}, } @misc{cryptoeprint:2012:279, author = {Abhishek Jain, Rafail Ostrovsky, Silas Richelson, Ivan Visconti}, title = {Concurrent Zero Knowledge in the Bounded Player Model}, howpublished = {Cryptology ePrint Archive, Report 2012/279}, year = {2012}, url = {http://eprint.iacr.org/2012/279}, } @misc{cryptoeprint:2012:280, author = {Michael Tunstall}, title = {Improved ``Partial Sums"-based Square Attack on AES}, howpublished = {Cryptology ePrint Archive, Report 2012/280}, year = {2012}, url = {http://eprint.iacr.org/2012/280}, } @misc{cryptoeprint:2012:281, author = {Dario Fiore and Rosario Gennaro}, title = {Publicly Verifiable Delegation of Large Polynomials and Matrix Computations, with Applications}, howpublished = {Cryptology ePrint Archive, Report 2012/281}, year = {2012}, url = {http://eprint.iacr.org/2012/281}, } @misc{cryptoeprint:2012:282, author = {Md. Iftekhar Salam and Hoon-Jae Lee}, title = {ALGEBRAIC COUNTERMEASURE TO ENHANCE THE IMPROVED SUMMATION GENERATOR WITH 2-BIT MEMORY}, howpublished = {Cryptology ePrint Archive, Report 2012/282}, year = {2012}, url = {http://eprint.iacr.org/2012/282}, } @misc{cryptoeprint:2012:283, author = {Deep Singh and Maheshanand Bhaintwal}, title = {Some properties of q-ary functions based on spectral analysis}, howpublished = {Cryptology ePrint Archive, Report 2012/283}, year = {2012}, url = {http://eprint.iacr.org/2012/283}, } @misc{cryptoeprint:2012:284, author = {Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud}, title = {Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages}, howpublished = {Cryptology ePrint Archive, Report 2012/284}, year = {2012}, url = {http://eprint.iacr.org/2012/284}, } @misc{cryptoeprint:2012:285, author = {Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo}, title = {Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2012/285}, year = {2012}, url = {http://eprint.iacr.org/2012/285}, } @misc{cryptoeprint:2012:286, author = {Sk Subidh Ali and Debdeep Mukhopadhyay}, title = {Protecting Last Four Rounds of CLEFIA is Not Enough Against Differential Fault Analysis}, howpublished = {Cryptology ePrint Archive, Report 2012/286}, year = {2012}, url = {http://eprint.iacr.org/2012/286}, } @misc{cryptoeprint:2012:287, author = {Andrew C. Yao and Yunlei Zhao}, title = {Computationally-Fair Group and Identity-Based Key-Exchange}, howpublished = {Cryptology ePrint Archive, Report 2012/287}, year = {2012}, url = {http://eprint.iacr.org/2012/287}, } @misc{cryptoeprint:2012:288, author = {Philippe Camacho}, title = {Fair Exchange of Short Signatures without Trusted Third Party}, howpublished = {Cryptology ePrint Archive, Report 2012/288}, year = {2012}, url = {http://eprint.iacr.org/2012/288}, } @misc{cryptoeprint:2012:289, author = {Liqun Chen}, title = {Ring Group Signatures}, howpublished = {Cryptology ePrint Archive, Report 2012/289}, year = {2012}, url = {http://eprint.iacr.org/2012/289}, } @misc{cryptoeprint:2012:290, author = {Rosario Gennaro and Daniel Wichs}, title = {Fully Homomorphic Message Authenticators}, howpublished = {Cryptology ePrint Archive, Report 2012/290}, year = {2012}, url = {http://eprint.iacr.org/2012/290}, } @misc{cryptoeprint:2012:291, author = {Yihua Zhang and Marina Blanton}, title = {Efficient Dynamic Provable Possession of Remote Data via Update Trees}, howpublished = {Cryptology ePrint Archive, Report 2012/291}, year = {2012}, url = {http://eprint.iacr.org/2012/291}, } @misc{cryptoeprint:2012:292, author = {Jon Passki and Tom Ritter}, title = {An Adaptive-Ciphertext Attack against "I $\oplus$ C'' Block Cipher Modes With an Oracle}, howpublished = {Cryptology ePrint Archive, Report 2012/292}, year = {2012}, url = {http://eprint.iacr.org/2012/292}, } @misc{cryptoeprint:2012:293, author = {Wei Wei and Chengliang Tian and Xiaoyun Wang}, title = {New Transference Theorems on Lattices Possessing n^\epsilon-unique Shortest Vectors}, howpublished = {Cryptology ePrint Archive, Report 2012/293}, year = {2012}, url = {http://eprint.iacr.org/2012/293}, } @misc{cryptoeprint:2012:294, author = {Daniel J. Bernstein and Tanja Lange}, title = {Two grumpy giants and a baby}, howpublished = {Cryptology ePrint Archive, Report 2012/294}, year = {2012}, url = {http://eprint.iacr.org/2012/294}, } @misc{cryptoeprint:2012:295, author = {Michelle Kendall and Keith M. Martin and Siaw-Lynn Ng and Maura B. Paterson and Douglas R. Stinson}, title = {Broadcast-enhanced Key Predistribution Schemes}, howpublished = {Cryptology ePrint Archive, Report 2012/295}, year = {2012}, url = {http://eprint.iacr.org/2012/295}, } @misc{cryptoeprint:2012:296, author = {Sergei Skorobogatov and Christopher Woods}, title = {In the blink of an eye: There goes your AES key}, howpublished = {Cryptology ePrint Archive, Report 2012/296}, year = {2012}, url = {http://eprint.iacr.org/2012/296}, } @misc{cryptoeprint:2012:297, author = {Feng-Hao Liu and Anna Lysyanskaya}, title = {Tamper and Leakage Resilience in the Split-State Model}, howpublished = {Cryptology ePrint Archive, Report 2012/297}, year = {2012}, url = {http://eprint.iacr.org/2012/297}, } @misc{cryptoeprint:2012:298, author = {Foteini Baldimtsi and Anna Lysyanskaya}, title = {Anonymous Credentials Light }, howpublished = {Cryptology ePrint Archive, Report 2012/298}, year = {2012}, url = {http://eprint.iacr.org/2012/298}, } @misc{cryptoeprint:2012:299, author = {TANG Ming, CHENG PingPan ,QIU ZhenLong}, title = {Differential Power Analysis on ZUC Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2012/299}, year = {2012}, url = {http://eprint.iacr.org/2012/299}, } @misc{cryptoeprint:2012:300, author = {B. Bilgin and S.Nikova and V.Nikov and V.Rijmen and G.Stütz}, title = {Threshold Implementations of all 3x3 and 4x4 S-boxes}, howpublished = {Cryptology ePrint Archive, Report 2012/300}, year = {2012}, url = {http://eprint.iacr.org/2012/300}, } @misc{cryptoeprint:2012:301, author = {Myungsun Kim and Jinsu Kim and Jung Hee Cheon}, title = {A Public Shuffle without Private Permutations}, howpublished = {Cryptology ePrint Archive, Report 2012/301}, year = {2012}, url = {http://eprint.iacr.org/2012/301}, } @misc{cryptoeprint:2012:302, author = {István Vajda}, title = {On instance separation in the UC-framework}, howpublished = {Cryptology ePrint Archive, Report 2012/302}, year = {2012}, url = {http://eprint.iacr.org/2012/302}, } @misc{cryptoeprint:2012:303, author = {Mohamed Ahmed Abdelraheem and Martin Aagren and Peter Beelen and Gregor Leander}, title = {On The Distribution of Linear Biases: Three Instructive Examples}, howpublished = {Cryptology ePrint Archive, Report 2012/303}, year = {2012}, url = {http://eprint.iacr.org/2012/303}, } @misc{cryptoeprint:2012:304, author = {Frédéric Dupuis and Jesper Buus Nielsen and Louis Salvail}, title = {Actively Secure Two-Party Evaluation of any Quantum Operation}, howpublished = {Cryptology ePrint Archive, Report 2012/304}, year = {2012}, url = {http://eprint.iacr.org/2012/304}, } @misc{cryptoeprint:2012:305, author = {Duong Hieu Phan and Viet Cuong Trinh}, title = {Resistance to Pirates 2.0: A Method from Leakage Resilient Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2012/305}, year = {2012}, url = {http://eprint.iacr.org/2012/305}, } @misc{cryptoeprint:2012:306, author = {Marcel Keller and Gert Læssøe Mikkelsen and Andy Rupp}, title = {Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols}, howpublished = {Cryptology ePrint Archive, Report 2012/306}, year = {2012}, url = {http://eprint.iacr.org/2012/306}, } @misc{cryptoeprint:2012:307, author = {Duong Hieu Phan and David Pointcheval and Viet Cuong Trinh}, title = {Multi-Channel Broadcast Encryption}, howpublished = {Cryptology ePrint Archive, Report 2012/307}, year = {2012}, url = {http://eprint.iacr.org/2012/307}, } @misc{cryptoeprint:2012:308, author = {Gilles Barthe and David Pointcheval and Santiago Zanella-Béguelin}, title = {Verified Security of Redundancy-Free Encryption from Rabin and RSA}, howpublished = {Cryptology ePrint Archive, Report 2012/308}, year = {2012}, url = {http://eprint.iacr.org/2012/308}, } @misc{cryptoeprint:2012:309, author = {Mike Hamburg}, title = {Fast and compact elliptic-curve cryptography}, howpublished = {Cryptology ePrint Archive, Report 2012/309}, year = {2012}, url = {http://eprint.iacr.org/2012/309}, } @misc{cryptoeprint:2012:310, author = {Koji Nuida and Takuro Abe and Shizuo Kaji and Toshiaki Maeno and Yasuhide Numata}, title = {A mathematical problem for security analysis of hash functions and pseudorandom generators}, howpublished = {Cryptology ePrint Archive, Report 2012/310}, year = {2012}, url = {http://eprint.iacr.org/2012/310}, } @misc{cryptoeprint:2012:311, author = {Dennis Hofheinz and Tibor Jager}, title = {Tightly Secure Signatures and Public-Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2012/311}, year = {2012}, url = {http://eprint.iacr.org/2012/311}, } @misc{cryptoeprint:2012:312, author = {Debiao He}, title = {Cryptanalysis of a Provably Secure Gateway-Oriented Password-Based Authenticated Key Exchange Protocol}, howpublished = {Cryptology ePrint Archive, Report 2012/312}, year = {2012}, url = {http://eprint.iacr.org/2012/312}, } @misc{cryptoeprint:2012:313, author = {Rahim Toluee and Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh}, title = {An anonymous proxy signature scheme without random oracles}, howpublished = {Cryptology ePrint Archive, Report 2012/313}, year = {2012}, url = {http://eprint.iacr.org/2012/313}, } @misc{cryptoeprint:2012:314, author = {Tomasz Rachwalik and Janusz Szmidt and Robert Wicik, and Janusz Zablocki}, title = {Generation of Nonlinear Feedback Shift Registers with special-purpose hardware}, howpublished = {Cryptology ePrint Archive, Report 2012/314}, year = {2012}, url = {http://eprint.iacr.org/2012/314}, } @misc{cryptoeprint:2012:315, author = {Teng Guo and Feng Liu and ChuanKun Wu and YoungChang Hou}, title = {Using Variance to Analyze Visual Cryptography Schemes}, howpublished = {Cryptology ePrint Archive, Report 2012/315}, year = {2012}, url = {http://eprint.iacr.org/2012/315}, } @misc{cryptoeprint:2012:316, author = {Gergei Bana and Pedro Adão and Hideki Sakurada}, title = {Computationally Sound Verification of the NSL Protocol via Computationally Complete Symbolic Attacker}, howpublished = {Cryptology ePrint Archive, Report 2012/316}, year = {2012}, url = {http://eprint.iacr.org/2012/316}, } @misc{cryptoeprint:2012:317, author = {Markku-Juhani O. Saarinen and Daniel Engels }, title = {A Do-It-All-Cipher for RFID: Design Requirements (Extended Abstract) }, howpublished = {Cryptology ePrint Archive, Report 2012/317}, year = {2012}, url = {http://eprint.iacr.org/2012/317}, } @misc{cryptoeprint:2012:318, author = {Daniel J. Bernstein and Tanja Lange}, title = {Non-uniform cracks in the concrete: the power of free precomputation}, howpublished = {Cryptology ePrint Archive, Report 2012/318}, year = {2012}, url = {http://eprint.iacr.org/2012/318}, } @misc{cryptoeprint:2012:319, author = {Ignacio Cascudo and Ronald Cramer and Chaoping Xing}, title = {Bounds on the Threshold Gap in Secret Sharing over Small Fields}, howpublished = {Cryptology ePrint Archive, Report 2012/319}, year = {2012}, url = {http://eprint.iacr.org/2012/319}, } @misc{cryptoeprint:2012:320, author = {Matan Banin and Boaz Tsaban}, title = {The Discrete Logarithm Problem in non-representable rings}, howpublished = {Cryptology ePrint Archive, Report 2012/320}, year = {2012}, url = {http://eprint.iacr.org/2012/320}, } @misc{cryptoeprint:2012:321, author = {Erik Tews}, title = {DECT Security Analysis}, howpublished = {Cryptology ePrint Archive, Report 2012/321}, year = {2012}, url = {http://eprint.iacr.org/2012/321}, } @misc{cryptoeprint:2012:322, author = {Anupam Pattanayak}, title = {Revisiting Dedicated and Block Cipher based Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2012/322}, year = {2012}, url = {http://eprint.iacr.org/2012/322}, } @misc{cryptoeprint:2012:323, author = {Thore Graepel and Kristin Lauter and Michael Naehrig}, title = {ML Confidential: Machine Learning on Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2012/323}, year = {2012}, url = {http://eprint.iacr.org/2012/323}, } @misc{cryptoeprint:2012:324, author = {Sébastien Briais and Stéphane Caron and Jean-Michel Cioranesco and Jean-Luc Danger and Sylvain Guilley and Jacques-Henri Jourdan and Arthur Milchior and David Naccache and Thibault Porteboeuf}, title = {3D Hardware Canaries}, howpublished = {Cryptology ePrint Archive, Report 2012/324}, year = {2012}, url = {http://eprint.iacr.org/2012/324}, } @misc{cryptoeprint:2012:325, author = {Sugata Gangopadhyay, Enes Pasalic and Pantelimon Stanica}, title = {A note on generalized bent criteria for Boolean functions}, howpublished = {Cryptology ePrint Archive, Report 2012/325}, year = {2012}, url = {http://eprint.iacr.org/2012/325}, } @misc{cryptoeprint:2012:326, author = {Allison Lewko and Brent Waters}, title = {New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques}, howpublished = {Cryptology ePrint Archive, Report 2012/326}, year = {2012}, url = {http://eprint.iacr.org/2012/326}, } @misc{cryptoeprint:2012:327, author = {Wang Shao-hui, Han Zhijie, Liu Sujuan, Chen Dan-wei}, title = {Security Analysis of RAPP An RFID Authentication Protocol based on Permutation}, howpublished = {Cryptology ePrint Archive, Report 2012/327}, year = {2012}, url = {http://eprint.iacr.org/2012/327}, } @misc{cryptoeprint:2012:328, author = {Danilo Gligoroski and Simona Samardjiska}, title = {The Multivariate Probabilistic Encryption Scheme MQQ-ENC}, howpublished = {Cryptology ePrint Archive, Report 2012/328}, year = {2012}, url = {http://eprint.iacr.org/2012/328}, } @misc{cryptoeprint:2012:329, author = {Claude Crépeau and Raza Ali Kazmi}, title = {An Analysis of ZVP-Attack on ECC Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2012/329}, year = {2012}, url = {http://eprint.iacr.org/2012/329}, } @misc{cryptoeprint:2012:330, author = {Xu ZiJie and Xu Ke}, title = {A Way Reduce Signed Bitwise Differences that Transformed Into Same Modular Differences}, howpublished = {Cryptology ePrint Archive, Report 2012/330}, year = {2012}, url = {http://eprint.iacr.org/2012/330}, } @misc{cryptoeprint:2012:331, author = {Zhaohui Tang}, title = {Homomorphic A-codes for Network Coding}, howpublished = {Cryptology ePrint Archive, Report 2012/331}, year = {2012}, url = {http://eprint.iacr.org/2012/331}, } @misc{cryptoeprint:2012:332, author = {Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh}, title = {A Non-delegatable Identity-based Designated Verifier Signature Scheme without Bilinear Pairings}, howpublished = {Cryptology ePrint Archive, Report 2012/332}, year = {2012}, url = {http://eprint.iacr.org/2012/332}, } @misc{cryptoeprint:2012:333, author = {Yehuda Lindell and Hila Zarosim}, title = {On the Feasibility of Extending Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2012/333}, year = {2012}, url = {http://eprint.iacr.org/2012/333}, } @misc{cryptoeprint:2012:334, author = {Masoumeh Safkhani, Nasour Bagheri, Majid Naderi}, title = {On the Traceability of Tags in SUAP RFID Authentication Protocols}, howpublished = {Cryptology ePrint Archive, Report 2012/334}, year = {2012}, url = {http://eprint.iacr.org/2012/334}, } @misc{cryptoeprint:2012:335, author = {Yu Lou and Huiting Han and Chunming Tang and Maozhi Xu}, title = {Constructing Vectorial Boolean Functions with High Algebraic Immunity Based on Group Decomposition}, howpublished = {Cryptology ePrint Archive, Report 2012/335}, year = {2012}, url = {http://eprint.iacr.org/2012/335}, } @misc{cryptoeprint:2012:336, author = {Gerald Gavin}, title = {RSA modulus generation in the two-party case}, howpublished = {Cryptology ePrint Archive, Report 2012/336}, year = {2012}, url = {http://eprint.iacr.org/2012/336}, } @misc{cryptoeprint:2012:337, author = {Sanjay Bhattacherjee and Palash Sarkar}, title = {Analysis and Trade-Offs for the (Complete Tree) Layered Subset Difference Broadcast Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2012/337}, year = {2012}, url = {http://eprint.iacr.org/2012/337}, } @misc{cryptoeprint:2012:338, author = {Xiao Zhong and Mingsheng Wang}, title = {Algebraic Attack on LFSR-Based Multi-Output Stream Ciphers and Research on Algebraic Immunity for Multi-Output Boolean Functions}, howpublished = {Cryptology ePrint Archive, Report 2012/338}, year = {2012}, url = {http://eprint.iacr.org/2012/338}, } @misc{cryptoeprint:2012:339, author = {Adi Shamir and Eldad Zinger}, title = {A Practical Polynomial-Time Known-Plaintext Attack on a Cryptosystem Proposed by John Nash}, howpublished = {Cryptology ePrint Archive, Report 2012/339}, year = {2012}, url = {http://eprint.iacr.org/2012/339}, } @misc{cryptoeprint:2012:340, author = {Henning Schnoor}, title = {Deciding Epistemic and Strategic Properties of Cryptographic Protocols}, howpublished = {Cryptology ePrint Archive, Report 2012/340}, year = {2012}, url = {http://eprint.iacr.org/2012/340}, } @misc{cryptoeprint:2012:341, author = {Michel Abdalla and Dario Fiore and Vadim Lyubashevsky}, title = {From Selective to Full Security: Semi-Generic Transformations in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2012/341}, year = {2012}, url = {http://eprint.iacr.org/2012/341}, } @misc{cryptoeprint:2012:342, author = {Joseph Liu and Man Ho Au and Willy Susilo and Jianying Zhou}, title = {Enhancing Location Privacy for Electric Vehicles (at the right time)}, howpublished = {Cryptology ePrint Archive, Report 2012/342}, year = {2012}, url = {http://eprint.iacr.org/2012/342}, } @misc{cryptoeprint:2012:343, author = {Tamás Győrfi and Octavian Creţ and Guillaume Hanrot and Nicolas Brisebarre}, title = {High-Throughput Hardware Architecture for the SWIFFT / SWIFFTX Hash Funct ions}, howpublished = {Cryptology ePrint Archive, Report 2012/343}, year = {2012}, url = {http://eprint.iacr.org/2012/343}, } @misc{cryptoeprint:2012:344, author = {Masao KASAHARA}, title = {Construction of New Classes of Knapsack Type Public Key Cryptosystem Using Uniform Secret Sequence, K(II)$\Sigma\Pi$PKC, Constructed Based on Maximum Length Code}, howpublished = {Cryptology ePrint Archive, Report 2012/344}, year = {2012}, url = {http://eprint.iacr.org/2012/344}, } @misc{cryptoeprint:2012:345, author = {Takuya Hayashi and Takeshi Shimoyama and Naoyuki Shinohara and Tsuyoshi Takagi}, title = {Breaking pairing-based cryptosystems using $\eta_T$ pairing over $GF(3^{97})$}, howpublished = {Cryptology ePrint Archive, Report 2012/345}, year = {2012}, url = {http://eprint.iacr.org/2012/345}, } @misc{cryptoeprint:2012:346, author = {Oumar DIAO and Emmanuel FOUOTSA}, title = {Edwards model of elliptic curves defined over any fields}, howpublished = {Cryptology ePrint Archive, Report 2012/346}, year = {2012}, url = {http://eprint.iacr.org/2012/346}, } @misc{cryptoeprint:2012:347, author = {Xinjie Zhao and Shize Guo and Fan Zhang and Tao Wang and Zhijie Shi and Keke Ji}, title = {Algebraic Differential Fault Attacks on LED using a Single Fault Injection}, howpublished = {Cryptology ePrint Archive, Report 2012/347}, year = {2012}, url = {http://eprint.iacr.org/2012/347}, } @misc{cryptoeprint:2012:348, author = {Jan Camenisch and Maria Dubovitskaya and Robert R. Enderlein and Gregory Neven}, title = {Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2012/348}, year = {2012}, url = {http://eprint.iacr.org/2012/348}, } @misc{cryptoeprint:2012:349, author = {Subhadeep Banik and Subhamoy Maitra and Santanu Sarkar}, title = {A Differential Fault Attack on Grain-128a using MACs}, howpublished = {Cryptology ePrint Archive, Report 2012/349}, year = {2012}, url = {http://eprint.iacr.org/2012/349}, } @misc{cryptoeprint:2012:350, author = {Liangliang Xiao and I-Ling Yen}, title = {A Note for the Ideal Order-Preserving Encryption Object and Generalized Order-Preserving Encryption}, howpublished = {Cryptology ePrint Archive, Report 2012/350}, year = {2012}, url = {http://eprint.iacr.org/2012/350}, } @misc{cryptoeprint:2012:351, author = {Jean-Philippe Aumasson and Daniel J. Bernstein}, title = {SipHash: a fast short-input PRF}, howpublished = {Cryptology ePrint Archive, Report 2012/351}, year = {2012}, url = {http://eprint.iacr.org/2012/351}, } @misc{cryptoeprint:2012:352, author = {Ashish Kundu, Elisa Bertino}, title = {On Hashing Graphs}, howpublished = {Cryptology ePrint Archive, Report 2012/352}, year = {2012}, url = {http://eprint.iacr.org/2012/352}, } @misc{cryptoeprint:2012:353, author = {Robert Beat and Philipp Grabher and Dan Page and Stefan Tillich and Marcin Wójcik}, title = {On Reconfigurable Fabrics and Generic Side-Channel Countermeasures}, howpublished = {Cryptology ePrint Archive, Report 2012/353}, year = {2012}, url = {http://eprint.iacr.org/2012/353}, } @misc{cryptoeprint:2012:354, author = {Arno Mittelbach}, title = {Hash Combiners for Second Pre-Image Resistance, Target Collision Resistance and Pre-Image Resistance have Long Output}, howpublished = {Cryptology ePrint Archive, Report 2012/354}, year = {2012}, url = {http://eprint.iacr.org/2012/354}, } @misc{cryptoeprint:2012:355, author = {Daniel J. Bernstein and Tanja Lange}, title = {Never trust a bunny}, howpublished = {Cryptology ePrint Archive, Report 2012/355}, year = {2012}, url = {http://eprint.iacr.org/2012/355}, } @misc{cryptoeprint:2012:356, author = {Jan Camenisch and Gregory Neven and Markus Rückert}, title = {Fully Anonymous Attribute Tokens from Lattices}, howpublished = {Cryptology ePrint Archive, Report 2012/356}, year = {2012}, url = {http://eprint.iacr.org/2012/356}, } @misc{cryptoeprint:2012:357, author = {Juan Manuel Gonz{\'a}lez Nieto and Mark Manulis and Bertram Poettering and Jothi Rangasamy and Douglas Stebila}, title = {Publicly Verifiable Ciphertexts}, howpublished = {Cryptology ePrint Archive, Report 2012/357}, year = {2012}, url = {http://eprint.iacr.org/2012/357}, } @misc{cryptoeprint:2012:358, author = {Gilles Piret and Thomas Roche and Claude Carlet}, title = {PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance -- Extended Version --}, howpublished = {Cryptology ePrint Archive, Report 2012/358}, year = {2012}, url = {http://eprint.iacr.org/2012/358}, } @misc{cryptoeprint:2012:359, author = {Neal Koblitz and Alfred Menezes}, title = {Another look at non-uniformity}, howpublished = {Cryptology ePrint Archive, Report 2012/359}, year = {2012}, url = {http://eprint.iacr.org/2012/359}, } @misc{cryptoeprint:2012:360, author = {Céline Blondeau and Benoît Gérard and Kaisa Nyberg}, title = {Multiple Differential Cryptanalysis using \LLR and $\chi^2$ Statistics}, howpublished = {Cryptology ePrint Archive, Report 2012/360}, year = {2012}, url = {http://eprint.iacr.org/2012/360}, } @misc{cryptoeprint:2012:361, author = {Michele Mosca and Douglas Stebila and Berkant Ustaoglu}, title = {Quantum Key Distribution in the Classical Authenticated Key Exchange Framework}, howpublished = {Cryptology ePrint Archive, Report 2012/361}, year = {2012}, url = {http://eprint.iacr.org/2012/361}, } @misc{cryptoeprint:2012:362, author = {Omkant Pandey}, title = {Achieving Constant Round Leakage-Resilient Zero-Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2012/362}, year = {2012}, url = {http://eprint.iacr.org/2012/362}, } @misc{cryptoeprint:2012:363, author = {Anne Canteaut and Thomas Fuhr and Mar\'{i}a Naya-Plasencia and Pascal Paillier and Jean-Ren\'{e} Reinhard and Marion Videau }, title = {A Unified Indifferentiability Proof for Permutation- or Block Cipher-Based Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2012/363}, year = {2012}, url = {http://eprint.iacr.org/2012/363}, } @misc{cryptoeprint:2012:364, author = {Ivan Damgard and Adriana Lopez-Alt}, title = {Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2012/364}, year = {2012}, url = {http://eprint.iacr.org/2012/364}, } @misc{cryptoeprint:2012:365, author = {Wang Shao-hui, Chen Dan-wei, Wang Zhi-wei, Chang Su-qin}, title = {Public Auditing for Ensuring Cloud Data Storage Security With Zero Knowledge Privacy}, howpublished = {Cryptology ePrint Archive, Report 2012/365}, year = {2012}, url = {http://eprint.iacr.org/2012/365}, } @misc{cryptoeprint:2012:366, author = {Dana Dachman-Soled and Yael Tauman Kalai}, title = {Securing Circuits Against Constant-Rate Tampering}, howpublished = {Cryptology ePrint Archive, Report 2012/366}, year = {2012}, url = {http://eprint.iacr.org/2012/366}, } @misc{cryptoeprint:2012:367, author = {Shweta Agrawal and Yevgeniy Dodis and Vinod Vaikuntanathan and Daniel Wichs}, title = {On Continual Leakage of Discrete Log Representations}, howpublished = {Cryptology ePrint Archive, Report 2012/367}, year = {2012}, url = {http://eprint.iacr.org/2012/367}, } @misc{cryptoeprint:2012:368, author = {Kris Gaj and Ekawat Homsirikamol and Marcin Rogawski and Rabia Shahid and Malik Umar Sharif}, title = {Comprehensive Evaluation of High-Speed and Medium-Speed Implementations of Five SHA-3 Finalists Using Xilinx and Altera FPGAs}, howpublished = {Cryptology ePrint Archive, Report 2012/368}, year = {2012}, url = {http://eprint.iacr.org/2012/368}, } @misc{cryptoeprint:2012:369, author = {Shi Bai and Emmanuel Thom\'e and Paul Zimmermann}, title = {Factorisation of RSA-704 with CADO-NFS}, howpublished = {Cryptology ePrint Archive, Report 2012/369}, year = {2012}, url = {http://eprint.iacr.org/2012/369}, } @misc{cryptoeprint:2012:370, author = {Renaud Dubois and Aurore Guillevic and Marine Sengelin Le Breton}, title = {Improved Broadcast Encryption Scheme with Constant-Size Ciphertext}, howpublished = {Cryptology ePrint Archive, Report 2012/370}, year = {2012}, url = {http://eprint.iacr.org/2012/370}, } @misc{cryptoeprint:2012:371, author = {Shay Gueron and Vlad Krasnov}, title = {Simultaneous hashing of multiple messages }, howpublished = {Cryptology ePrint Archive, Report 2012/371}, year = {2012}, url = {http://eprint.iacr.org/2012/371}, } @misc{cryptoeprint:2012:372, author = {Deukjo Hong and Dong-Chan Kim and Daesung Kwon}, title = {New Preimage Attacks on Hash Modes of AES-256}, howpublished = {Cryptology ePrint Archive, Report 2012/372}, year = {2012}, url = {http://eprint.iacr.org/2012/372}, } @misc{cryptoeprint:2012:373, author = {T-H. Hubert Chan and Elaine Shi and Dawn Song}, title = {Optimal Lower Bound for Differentially Private Multi-Party Aggregation}, howpublished = {Cryptology ePrint Archive, Report 2012/373}, year = {2012}, url = {http://eprint.iacr.org/2012/373}, } @misc{cryptoeprint:2012:374, author = {Omar Choudary and Felix Grobert and Joachim Metz}, title = {Infiltrate the Vault: Security Analysis and Decryption of Lion Full Disk Encryption}, howpublished = {Cryptology ePrint Archive, Report 2012/374}, year = {2012}, url = {http://eprint.iacr.org/2012/374}, } @misc{cryptoeprint:2012:375, author = {Reto E. Koenig and Rolf Haenni}, title = {How to Store some Secrets}, howpublished = {Cryptology ePrint Archive, Report 2012/375}, year = {2012}, url = {http://eprint.iacr.org/2012/375}, } @misc{cryptoeprint:2012:376, author = {Colleen M. Swanson and Douglas R. Stinson}, title = {Combinatorial Solutions Providing Improved Security for the Generalized Russian Cards Problem}, howpublished = {Cryptology ePrint Archive, Report 2012/376}, year = {2012}, url = {http://eprint.iacr.org/2012/376}, } @misc{cryptoeprint:2012:377, author = {Aniket Kate and Yizhou Huang and Ian Goldberg}, title = {Distributed Key Generation in the Wild}, howpublished = {Cryptology ePrint Archive, Report 2012/377}, year = {2012}, url = {http://eprint.iacr.org/2012/377}, } @misc{cryptoeprint:2012:378, author = {Ran Gelles and Rafail Ostrovsky and Kina Winoto}, title = {Multiparty Proximity Testing with Dishonest Majority from Equality Testing}, howpublished = {Cryptology ePrint Archive, Report 2012/378}, year = {2012}, url = {http://eprint.iacr.org/2012/378}, } @misc{cryptoeprint:2012:379, author = {Eiichiro Fujisaki}, title = {A Framework for Efficient Fully-Equipped UC Commitments}, howpublished = {Cryptology ePrint Archive, Report 2012/379}, year = {2012}, url = {http://eprint.iacr.org/2012/379}, } @misc{cryptoeprint:2012:380, author = {Ioana Boureanu and Serge Vaudenay}, title = {Several Weak Bit-Commitments Using Seal-Once Tamper-Evident Devices}, howpublished = {Cryptology ePrint Archive, Report 2012/380}, year = {2012}, url = {http://eprint.iacr.org/2012/380}, } @misc{cryptoeprint:2012:381, author = {Zheng Yang and J\"org Schwenk}, title = {Strongly Authenticated Key Exchange Protocol from Bilinear Groups without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2012/381}, year = {2012}, url = {http://eprint.iacr.org/2012/381}, } @misc{cryptoeprint:2012:382, author = {Afonso Arriaga and Manuel Barbosa and Pooya Farshim}, title = {On the Joint Security of Signature and Encryption Schemes under Randomness Reuse: Efficiency and Security Amplification}, howpublished = {Cryptology ePrint Archive, Report 2012/382}, year = {2012}, url = {http://eprint.iacr.org/2012/382}, } @misc{cryptoeprint:2012:383, author = {Junji Shikata}, title = {Formalization of Information-Theoretic Security for Encryption and Key Agreement, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2012/383}, year = {2012}, url = {http://eprint.iacr.org/2012/383}, } @misc{cryptoeprint:2012:384, author = {Brent Waters}, title = {Functional Encryption for Regular Languages}, howpublished = {Cryptology ePrint Archive, Report 2012/384}, year = {2012}, url = {http://eprint.iacr.org/2012/384}, } @misc{cryptoeprint:2012:385, author = {Chang Liu and Xuyun Zhang and Chi Yang and Jinjun Chen}, title = {CCBKE – Session Key Negotiation for Fast and Secure Scheduling of Scientific Applications in Cloud Computing}, howpublished = {Cryptology ePrint Archive, Report 2012/385}, year = {2012}, url = {http://eprint.iacr.org/2012/385}, } @misc{cryptoeprint:2012:386, author = {Rafael Martínez-Peláez and Francisco Rico-Novella }, title = {Cryptanalysis of Sood et al.’s Authentication Scheme using Smart Cards}, howpublished = {Cryptology ePrint Archive, Report 2012/386}, year = {2012}, url = {http://eprint.iacr.org/2012/386}, } @misc{cryptoeprint:2012:387, author = {Jintai ding}, title = {New cryptographic constructions using generalized learning with errors problem}, howpublished = {Cryptology ePrint Archive, Report 2012/387}, year = {2012}, url = {http://eprint.iacr.org/2012/387}, } @misc{cryptoeprint:2012:388, author = {Ignacio Cascudo and Ronald Cramer and Chaoping Xing}, title = {The Arithmetic Codex}, howpublished = {Cryptology ePrint Archive, Report 2012/388}, year = {2012}, url = {http://eprint.iacr.org/2012/388}, } @misc{cryptoeprint:2012:389, author = {Roel Peeters and Jens Hermans}, title = {Wide Strong Private RFID Identification based on Zero-Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2012/389}, year = {2012}, url = {http://eprint.iacr.org/2012/389}, } @misc{cryptoeprint:2012:390, author = {Chol-Sun Sin}, title = {Regular Ternary Algorithm for Scalar Multiplication on Elliptic Curves over Finite Fields of Characteristic Three}, howpublished = {Cryptology ePrint Archive, Report 2012/390}, year = {2012}, url = {http://eprint.iacr.org/2012/390}, } @misc{cryptoeprint:2012:391, author = {Shaohui Wang,Sujuan Liu,Danwei Chen}, title = {Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy}, howpublished = {Cryptology ePrint Archive, Report 2012/391}, year = {2012}, url = {http://eprint.iacr.org/2012/391}, } @misc{cryptoeprint:2012:392, author = {S. Sharmila Deva Selvi and S. Sree Vivek and Dhinakaran Vinayagamurthy and C. Pandu Rangan}, title = {ID Based Signcryption Scheme in Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2012/392}, year = {2012}, url = {http://eprint.iacr.org/2012/392}, } @misc{cryptoeprint:2012:393, author = {Mohammad Sabzinejad Farash and Mahmoud Ahmadian Attari and Majid Bayat }, title = {A Certificateless Multiple-key Agreement Protocol Based on Bilinear Pairings}, howpublished = {Cryptology ePrint Archive, Report 2012/393}, year = {2012}, url = {http://eprint.iacr.org/2012/393}, } @misc{cryptoeprint:2012:394, author = {Mohammad Sabzinejad Farash and Mahmoud Ahmadian Attari}, title = {An ID-Based Key Agreement Protocol Based on ECC Among Users of Separate Networks}, howpublished = {Cryptology ePrint Archive, Report 2012/394}, year = {2012}, url = {http://eprint.iacr.org/2012/394}, } @misc{cryptoeprint:2012:395, author = {Morteza Arifi and Mahmoud Gardeshi and Mohammad Sabzinejad Farash}, title = {A New Efficient Authenticated ID-Based Group Key Agreement Protocol}, howpublished = {Cryptology ePrint Archive, Report 2012/395}, year = {2012}, url = {http://eprint.iacr.org/2012/395}, } @misc{cryptoeprint:2012:396, author = {Brajesh Kumar Singh }, title = {On second-order nonlinearity and maximum algebraic immunity of some bent functions in $\cP S^+$}, howpublished = {Cryptology ePrint Archive, Report 2012/396}, year = {2012}, url = {http://eprint.iacr.org/2012/396}, } @misc{cryptoeprint:2012:397, author = {Liqun Chen and Hoon Wei Lim and Guomin Yang }, title = {Cross-Domain Password-Based Authenticated Key Exchange Revisited}, howpublished = {Cryptology ePrint Archive, Report 2012/397}, year = {2012}, url = {http://eprint.iacr.org/2012/397}, } @misc{cryptoeprint:2012:398, author = {Travis Mayberry and Erik-Oliver Blass and Agnes Hui Chan}, title = {PIRMAP: Efficient Private Information Retrieval for MapReduce}, howpublished = {Cryptology ePrint Archive, Report 2012/398}, year = {2012}, url = {http://eprint.iacr.org/2012/398}, } @misc{cryptoeprint:2012:399, author = {Kitae Jeong}, title = {Differential Fault Analysis on Block Cipher Piccolo}, howpublished = {Cryptology ePrint Archive, Report 2012/399}, year = {2012}, url = {http://eprint.iacr.org/2012/399}, } @misc{cryptoeprint:2012:400, author = {Philipp Jovanovic and Martin Kreuzer and Ilia Polian}, title = {An Algebraic Fault Attack on the LED Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2012/400}, year = {2012}, url = {http://eprint.iacr.org/2012/400}, } @misc{cryptoeprint:2012:401, author = {Martin Albrecht and Gregor Leander}, title = {An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2012/401}, year = {2012}, url = {http://eprint.iacr.org/2012/401}, } @misc{cryptoeprint:2012:402, author = {Juan Manuel Gonz{\'a}lez Nieto and Mark Manulis and Dongdong Sun}, title = {Forward-Secure Hierarchical Predicate Encryption}, howpublished = {Cryptology ePrint Archive, Report 2012/402}, year = {2012}, url = {http://eprint.iacr.org/2012/402}, } @misc{cryptoeprint:2012:403, author = {Juan Manuel Gonz{\'a}lez Nieto and Mark Manulis and Dongdong Sun}, title = {Fully Private Revocable Predicate Encryption}, howpublished = {Cryptology ePrint Archive, Report 2012/403}, year = {2012}, url = {http://eprint.iacr.org/2012/403}, } @misc{cryptoeprint:2012:404, author = {Amos Beimel and Oriol Farràs and Yuval Mintz}, title = {Secret Sharing Schemes for Very Dense Graphs}, howpublished = {Cryptology ePrint Archive, Report 2012/404}, year = {2012}, url = {http://eprint.iacr.org/2012/404}, } @misc{cryptoeprint:2012:405, author = {Mehrdad Aliasgari and Marina Blanton and Yihua Zhang and Aaron Steele}, title = {Secure Computation on Floating Point Numbers}, howpublished = {Cryptology ePrint Archive, Report 2012/405}, year = {2012}, url = {http://eprint.iacr.org/2012/405}, } @misc{cryptoeprint:2012:406, author = {*Jue-Sam Chou 1, Yalin Chen2, Chun-Hui Huang 3, Yu-Siang Huang4}, title = {Comments on four multi-server authentication protocols using smart card}, howpublished = {Cryptology ePrint Archive, Report 2012/406}, year = {2012}, url = {http://eprint.iacr.org/2012/406}, } @misc{cryptoeprint:2012:407, author = {Julien Bringer and Herve Chabanne and Alain Patey}, title = {Cross-Unlinkable Hierarchical Group Signatures}, howpublished = {Cryptology ePrint Archive, Report 2012/407}, year = {2012}, url = {http://eprint.iacr.org/2012/407}, } @misc{cryptoeprint:2012:408, author = {Gurleen Grewal, Reza Azarderakhsh, Patrick Longa, Shi Hu, and David Jao}, title = {Efficient Implementation of Bilinear Pairings on ARM Processors}, howpublished = {Cryptology ePrint Archive, Report 2012/408}, year = {2012}, url = {http://eprint.iacr.org/2012/408}, } @misc{cryptoeprint:2012:409, author = {Rafael Misoczki and Jean-Pierre Tillich and Nicolas Sendrier and Paulo S. L. M. Barreto}, title = {MDPC-McEliece: New McEliece Variants from Moderate Density Parity-Check Codes}, howpublished = {Cryptology ePrint Archive, Report 2012/409}, year = {2012}, url = {http://eprint.iacr.org/2012/409}, } @misc{cryptoeprint:2012:410, author = {Qingfeng Cheng}, title = {Cryptanalysis of an Identity-Based Multiple Key Agreement Scheme}, howpublished = {Cryptology ePrint Archive, Report 2012/410}, year = {2012}, url = {http://eprint.iacr.org/2012/410}, } @misc{cryptoeprint:2012:411, author = {Alexander Dibert and Laszlo Csirmaz}, title = {Infinite Secret Sharing -- Examples}, howpublished = {Cryptology ePrint Archive, Report 2012/411}, year = {2012}, url = {http://eprint.iacr.org/2012/411}, } @misc{cryptoeprint:2012:412, author = {Laszlo Csirmaz}, title = {Probabilistic Infinite Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2012/412}, year = {2012}, url = {http://eprint.iacr.org/2012/412}, } @misc{cryptoeprint:2012:413, author = {Mukund Kalyanaraman and Michael Orshansky}, title = {Highly Secure Strong PUF based on Nonlinearity of MOSFET Subthreshold Operation}, howpublished = {Cryptology ePrint Archive, Report 2012/413}, year = {2012}, url = {http://eprint.iacr.org/2012/413}, } @misc{cryptoeprint:2012:414, author = {Yin Li and Gong-liang Chen and Xiao-ning Xie}, title = {Low complexity bit-parallel $GF(2^m)$ multiplier for all-one polynomials}, howpublished = {Cryptology ePrint Archive, Report 2012/414}, year = {2012}, url = {http://eprint.iacr.org/2012/414}, } @misc{cryptoeprint:2012:415, author = {Jialin Huang and Xuejia Lai}, title = {Revisiting Key Schedule's Diffusion In Relation With Round Function's Diffusion}, howpublished = {Cryptology ePrint Archive, Report 2012/415}, year = {2012}, url = {http://eprint.iacr.org/2012/415}, } @misc{cryptoeprint:2012:416, author = {Cas Cremers and Michèle Feltz}, title = {Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal}, howpublished = {Cryptology ePrint Archive, Report 2012/416}, year = {2012}, url = {http://eprint.iacr.org/2012/416}, } @misc{cryptoeprint:2012:417, author = {Romain Bardou and Riccardo Focardi and Yusuke Kawamoto and Lorenzo Simionato and Graham Steel and Joe-Kai Tsay}, title = {Efficient Padding Oracle Attacks on Cryptographic Hardware}, howpublished = {Cryptology ePrint Archive, Report 2012/417}, year = {2012}, url = {http://eprint.iacr.org/2012/417}, } @misc{cryptoeprint:2012:418, author = {Rafael Martínez-Peláez and Francisco Rico-Novella}, title = {Weaknesses of an Improvement Authentication Scheme using }, howpublished = {Cryptology ePrint Archive, Report 2012/418}, year = {2012}, url = {http://eprint.iacr.org/2012/418}, } @misc{cryptoeprint:2012:419, author = {Kan Yang and Xiaohua Jia and Kui Ren}, title = {DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems}, howpublished = {Cryptology ePrint Archive, Report 2012/419}, year = {2012}, url = {http://eprint.iacr.org/2012/419}, } @misc{cryptoeprint:2012:420, author = {Denise Demirel and Jeroen van de Graaf}, title = {A Publicly-Veri able Mix-net with Everlasting Privacy Towards Observers}, howpublished = {Cryptology ePrint Archive, Report 2012/420}, year = {2012}, url = {http://eprint.iacr.org/2012/420}, } @misc{cryptoeprint:2012:421, author = {Ekawat Homsirikamol and Pawel Morawiecki and Marcin Rogawski and Marian Srebrny}, title = {Security margin evaluation of SHA-3 contest finalists through SAT-based attacks}, howpublished = {Cryptology ePrint Archive, Report 2012/421}, year = {2012}, url = {http://eprint.iacr.org/2012/421}, } @misc{cryptoeprint:2012:422, author = {Mustafa \c{C}oban and Ferhat Karako\c{c} and \"{O}zkan Bozta\c{s}}, title = {Biclique Cryptanalysis of TWINE}, howpublished = {Cryptology ePrint Archive, Report 2012/422}, year = {2012}, url = {http://eprint.iacr.org/2012/422}, } @misc{cryptoeprint:2012:423, author = {Dominique Unruh}, title = {Programmable encryption and key-dependent messages}, howpublished = {Cryptology ePrint Archive, Report 2012/423}, year = {2012}, url = {http://eprint.iacr.org/2012/423}, } @misc{cryptoeprint:2012:424, author = {Benoit Libert and Thomas Peters and Moti Yung}, title = {Scalable Group Signatures with Revocation}, howpublished = {Cryptology ePrint Archive, Report 2012/424}, year = {2012}, url = {http://eprint.iacr.org/2012/424}, } @misc{cryptoeprint:2012:425, author = {Gautham Sekar}, title = {The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures}, howpublished = {Cryptology ePrint Archive, Report 2012/425}, year = {2012}, url = {http://eprint.iacr.org/2012/425}, } @misc{cryptoeprint:2012:426, author = {Ed Kendall and Michelle Kendall and Wilfrid S. Kendall}, title = {A Generalised Formula for Calculating the Resilience of Random Key Predistribution Schemes}, howpublished = {Cryptology ePrint Archive, Report 2012/426}, year = {2012}, url = {http://eprint.iacr.org/2012/426}, } @misc{cryptoeprint:2012:427, author = {Robert Drylo}, title = {Constructing Pairing-Friendly Genus 2 Curves with Split Jacobian}, howpublished = {Cryptology ePrint Archive, Report 2012/427}, year = {2012}, url = {http://eprint.iacr.org/2012/427}, } @misc{cryptoeprint:2012:428, author = {Long Hoang Nguyen}, title = {Rational authentication protocols and their use in financial transactions}, howpublished = {Cryptology ePrint Archive, Report 2012/428}, year = {2012}, url = {http://eprint.iacr.org/2012/428}, } @misc{cryptoeprint:2012:429, author = {Long Hoang Nguyen and Andrew William Roscoe}, title = {Simple construction of epsilon-biased distribution}, howpublished = {Cryptology ePrint Archive, Report 2012/429}, year = {2012}, url = {http://eprint.iacr.org/2012/429}, } @misc{cryptoeprint:2012:430, author = {Sébastien Briais and Sylvain Guilley and Jean-Luc Danger}, title = {A formal study of two physical countermeasures against side channel attacks}, howpublished = {Cryptology ePrint Archive, Report 2012/430}, year = {2012}, url = {http://eprint.iacr.org/2012/430}, } @misc{cryptoeprint:2012:431, author = {Yusuke Sakai and Jacob C.N. Schuldt and Keita Emura and Goichiro Hanaoka and Kazuo Ohta}, title = {On the Security of Dynamic Group Signatures: Preventing Signature Hijacking}, howpublished = {Cryptology ePrint Archive, Report 2012/431}, year = {2012}, url = {http://eprint.iacr.org/2012/431}, } @misc{cryptoeprint:2012:432, author = {Alex Biryukov, Ivan Pustogarov, Ralf-Philipp Weinmann}, title = {TorScan: Tracing Long-lived Connections and Differential Scanning Attacks}, howpublished = {Cryptology ePrint Archive, Report 2012/432}, year = {2012}, url = {http://eprint.iacr.org/2012/432}, } @misc{cryptoeprint:2012:433, author = {Sanjam Garg and Abishek Kumarasubramanian and Rafail Ostrovsky and Ivan Visconti}, title = {Impossibility Results for Static Input Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2012/433}, year = {2012}, url = {http://eprint.iacr.org/2012/433}, } @misc{cryptoeprint:2012:434, author = {Dario Fiore and Rosario Gennaro}, title = {Improved Publicly Verifiable Delegation of Large Polynomials and Matrix Computations}, howpublished = {Cryptology ePrint Archive, Report 2012/434}, year = {2012}, url = {http://eprint.iacr.org/2012/434}, } @misc{cryptoeprint:2012:435, author = {Yevgeniy Dodis and Adriana Lopez-Alt and Ilya Mironov and Salil Vadhan}, title = {Differential Privacy with Imperfect Randomness}, howpublished = {Cryptology ePrint Archive, Report 2012/435}, year = {2012}, url = {http://eprint.iacr.org/2012/435}, } @misc{cryptoeprint:2012:436, author = {Melissa Chase and Ivan Visconti}, title = {Secure Database Commitments and Universal Arguments of Quasi Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2012/436}, year = {2012}, url = {http://eprint.iacr.org/2012/436}, } @misc{cryptoeprint:2012:437, author = {Amit Sahai and Hakan Seyalioglu and Brent Waters}, title = {Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2012/437}, year = {2012}, url = {http://eprint.iacr.org/2012/437}, } @misc{cryptoeprint:2012:438, author = {Tetsu Iwata and Keisuke Ohashi and Kazuhiko Minematsu}, title = {Breaking and Repairing GCM Security Proofs}, howpublished = {Cryptology ePrint Archive, Report 2012/438}, year = {2012}, url = {http://eprint.iacr.org/2012/438}, } @misc{cryptoeprint:2012:439, author = {Ding Wang and Chun-guang Ma}, title = {Robust Smart Card based Password Authentication Scheme against Smart Card Loss Problem}, howpublished = {Cryptology ePrint Archive, Report 2012/439}, year = {2012}, url = {http://eprint.iacr.org/2012/439}, } @misc{cryptoeprint:2012:440, author = {Simon Knellwolf and Dmitry Khovratovich}, title = {New Preimage Attacks Against Reduced SHA-1}, howpublished = {Cryptology ePrint Archive, Report 2012/440}, year = {2012}, url = {http://eprint.iacr.org/2012/440}, } @misc{cryptoeprint:2012:441, author = {Sanjam Garg and Amit Sahai}, title = {Adaptively Secure Multi-Party Computation with Dishonest Majority}, howpublished = {Cryptology ePrint Archive, Report 2012/441}, year = {2012}, url = {http://eprint.iacr.org/2012/441}, } @misc{cryptoeprint:2012:442, author = {Benoit Libert and Thomas Peters and Moti Yung}, title = {Group Signatures with Almost-for-free Revocation}, howpublished = {Cryptology ePrint Archive, Report 2012/442}, year = {2012}, url = {http://eprint.iacr.org/2012/442}, } @misc{cryptoeprint:2012:443, author = {Kristin Lauter and Damien Robert}, title = {Improved CRT Algorithm for Class Polynomials in Genus 2}, howpublished = {Cryptology ePrint Archive, Report 2012/443}, year = {2012}, url = {http://eprint.iacr.org/2012/443}, } @misc{cryptoeprint:2012:444, author = {Greg Childers}, title = {Factorization of a 1061-bit number by the Special Number Field Sieve}, howpublished = {Cryptology ePrint Archive, Report 2012/444}, year = {2012}, url = {http://eprint.iacr.org/2012/444}, } @misc{cryptoeprint:2012:445, author = {Debiao He, Miaomiao Tian}, title = {A note on ‘An efficient certificateless aggregate signature with constant pairing computations’}, howpublished = {Cryptology ePrint Archive, Report 2012/445}, year = {2012}, url = {http://eprint.iacr.org/2012/445}, } @misc{cryptoeprint:2012:446, author = {Sk Subidh Ali , Debdeep Mukhopadhyay, and Michael Tunstall}, title = {Differential Fault Analysis of AES: Towards Reaching its Limits}, howpublished = {Cryptology ePrint Archive, Report 2012/446}, year = {2012}, url = {http://eprint.iacr.org/2012/446}, } @misc{cryptoeprint:2012:447, author = {Zhaohui Tang, and Hoon Wei Lim}, title = {Multi-receiver Homomorphic Authentication Codes for Network Coding}, howpublished = {Cryptology ePrint Archive, Report 2012/447}, year = {2012}, url = {http://eprint.iacr.org/2012/447}, } @misc{cryptoeprint:2012:448, author = {Goichiro Hanaoka and Takahiro Matsuda and Jacob C.N. Schuldt}, title = {On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups}, howpublished = {Cryptology ePrint Archive, Report 2012/448}, year = {2012}, url = {http://eprint.iacr.org/2012/448}, } @misc{cryptoeprint:2012:449, author = {Johannes Braun, Johannes Buchmann, Ciaran Mullan, and Alex Wiesmaier}, title = {Long Term Confidentiality: a Survey}, howpublished = {Cryptology ePrint Archive, Report 2012/449}, year = {2012}, url = {http://eprint.iacr.org/2012/449}, } @misc{cryptoeprint:2012:450, author = {Will Landecker and Thomas Shrimpton and R. Seth Terashima}, title = {Tweakable Blockciphers with Beyond Birthday-Bound Security}, howpublished = {Cryptology ePrint Archive, Report 2012/450}, year = {2012}, url = {http://eprint.iacr.org/2012/450}, } @misc{cryptoeprint:2012:451, author = {John Steinberger, Xiaoming Sun, Zhe Yang}, title = {Stam's Conjecture and Threshold Phenomena in Collision Resistance}, howpublished = {Cryptology ePrint Archive, Report 2012/451}, year = {2012}, url = {http://eprint.iacr.org/2012/451}, } @misc{cryptoeprint:2012:452, author = {Erik-Oliver Blass and Guevara Noubir and Triet Vo Huu}, title = {EPiC: Efficient Privacy-Preserving Counting for MapReduce}, howpublished = {Cryptology ePrint Archive, Report 2012/452}, year = {2012}, url = {http://eprint.iacr.org/2012/452}, } @misc{cryptoeprint:2012:453, author = {Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong}, title = {New Leakage Resilient CCA-Secure Public Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2012/453}, year = {2012}, url = {http://eprint.iacr.org/2012/453}, } @misc{cryptoeprint:2012:454, author = {Abhishek Parakh}, title = {A Probabilistic Quantum Key Transfer Protocol}, howpublished = {Cryptology ePrint Archive, Report 2012/454}, year = {2012}, url = {http://eprint.iacr.org/2012/454}, } @misc{cryptoeprint:2012:455, author = {Mike Rosulek}, title = {Must you know the code of f to securely compute f?}, howpublished = {Cryptology ePrint Archive, Report 2012/455}, year = {2012}, url = {http://eprint.iacr.org/2012/455}, } @misc{cryptoeprint:2012:456, author = {Johannes Gehrke and Michael Hay and Edward Lui and Rafael Pass}, title = {Crowd-Blending Privacy}, howpublished = {Cryptology ePrint Archive, Report 2012/456}, year = {2012}, url = {http://eprint.iacr.org/2012/456}, } @misc{cryptoeprint:2012:457, author = {Gideon Samid}, title = {Hush Functions Extended to Any Size Input versus Any Size Output}, howpublished = {Cryptology ePrint Archive, Report 2012/457}, year = {2012}, url = {http://eprint.iacr.org/2012/457}, } @misc{cryptoeprint:2012:458, author = {Daniel J. Bernstein and Tanja Lange}, title = {Computing small discrete logarithms faster}, howpublished = {Cryptology ePrint Archive, Report 2012/458}, year = {2012}, url = {http://eprint.iacr.org/2012/458}, } @misc{cryptoeprint:2012:459, author = {Daniel Wichs}, title = {Barriers in Cryptography with Weak, Correlated and Leaky Sources}, howpublished = {Cryptology ePrint Archive, Report 2012/459}, year = {2012}, url = {http://eprint.iacr.org/2012/459}, } @misc{cryptoeprint:2012:460, author = {Yohei Watanabe and Takenobu Seito and Junji Shikata}, title = {Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes}, howpublished = {Cryptology ePrint Archive, Report 2012/460}, year = {2012}, url = {http://eprint.iacr.org/2012/460}, } @misc{cryptoeprint:2012:461, author = {Nir Bitansky and Alessandro Chiesa}, title = {Succinct Arguments from Multi-Prover Interactive Proofs and their Efficiency Benefits}, howpublished = {Cryptology ePrint Archive, Report 2012/461}, year = {2012}, url = {http://eprint.iacr.org/2012/461}, } @misc{cryptoeprint:2012:462, author = {Yang Wang and Man Ho Au and Willy Susilo}, title = {Perfect Ambiguous Optimistic Fair Exchange}, howpublished = {Cryptology ePrint Archive, Report 2012/462}, year = {2012}, url = {http://eprint.iacr.org/2012/462}, } @misc{cryptoeprint:2012:463, author = {Xiang Xie and Rui Xue and Rui Zhang}, title = {Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting}, howpublished = {Cryptology ePrint Archive, Report 2012/463}, year = {2012}, url = {http://eprint.iacr.org/2012/463}, } @misc{cryptoeprint:2012:464, author = {Carles Padro and Leonor Vazquez and An Yang}, title = {Finding Lower Bounds on the Complexity of Secret Sharing Schemes by Linear Programming}, howpublished = {Cryptology ePrint Archive, Report 2012/464}, year = {2012}, url = {http://eprint.iacr.org/2012/464}, } @misc{cryptoeprint:2012:465, author = {Kaoutar Elkhiyaoui and Erik-Oliver Blass and Refik Molva}, title = {T-MATCH: Privacy-Preserving Item Matching for Storage-Only RFID Tags}, howpublished = {Cryptology ePrint Archive, Report 2012/465}, year = {2012}, url = {http://eprint.iacr.org/2012/465}, } @misc{cryptoeprint:2012:466, author = {Benjamin Fuller and Leonid Reyzin}, title = {Computational Entropy and Information Leakage}, howpublished = {Cryptology ePrint Archive, Report 2012/466}, year = {2012}, url = {http://eprint.iacr.org/2012/466}, } @misc{cryptoeprint:2012:467, author = {Yupeng Jiang and Yingpu Deng}, title = {New results on nonexistence of generalized bent functions}, howpublished = {Cryptology ePrint Archive, Report 2012/467}, year = {2012}, url = {http://eprint.iacr.org/2012/467}, } @misc{cryptoeprint:2012:468, author = {Shweta Agrawal and Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee}, title = {Functional Encryption: New Perspectives and Lower Bounds}, howpublished = {Cryptology ePrint Archive, Report 2012/468}, year = {2012}, url = {http://eprint.iacr.org/2012/468}, } @misc{cryptoeprint:2012:469, author = {Mototsugu Nishioka}, title = {Perfect Keyword Privacy in PEKS Systems}, howpublished = {Cryptology ePrint Archive, Report 2012/469}, year = {2012}, url = {http://eprint.iacr.org/2012/469}, } @misc{cryptoeprint:2012:470, author = {Sorin Iftene}, title = {Some Connections Between Primitive Roots and Quadratic Non-Residues Modulo a Prime}, howpublished = {Cryptology ePrint Archive, Report 2012/470}, year = {2012}, url = {http://eprint.iacr.org/2012/470}, } @misc{cryptoeprint:2012:471, author = {Matthew Battey and Abhishek Parakh}, title = {A Quasigroup Based Random Number Generator for Resource Constrained Environments}, howpublished = {Cryptology ePrint Archive, Report 2012/471}, year = {2012}, url = {http://eprint.iacr.org/2012/471}, } @misc{cryptoeprint:2012:472, author = {Amir Moradi and Oliver Mischke}, title = {Glitches and Static Power Hand in Hand}, howpublished = {Cryptology ePrint Archive, Report 2012/472}, year = {2012}, url = {http://eprint.iacr.org/2012/472}, } @misc{cryptoeprint:2012:473, author = {Zhengan Huang and Shengli Liu and Baodong Qin}, title = {Sender Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited}, howpublished = {Cryptology ePrint Archive, Report 2012/473}, year = {2012}, url = {http://eprint.iacr.org/2012/473}, } @misc{cryptoeprint:2012:474, author = {Manuel Barbosa and Pooya Farshim}, title = {Semantically Secure Functional Encryption, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2012/474}, year = {2012}, url = {http://eprint.iacr.org/2012/474}, } @misc{cryptoeprint:2012:475, author = {David Bernhard and Georg Fuchsbauer and Essam Ghadafi}, title = {Efficient Signatures of Knowledge and DAA in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2012/475}, year = {2012}, url = {http://eprint.iacr.org/2012/475}, } @misc{cryptoeprint:2012:476, author = {Shay Gueron}, title = {A j-lanes tree hashing mode and j-lanes SHA-256}, howpublished = {Cryptology ePrint Archive, Report 2012/476}, year = {2012}, url = {http://eprint.iacr.org/2012/476}, } @misc{cryptoeprint:2012:477, author = {Patrick Derbez and Pierre-Alain Fouque and Jérémy Jean}, title = {Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting}, howpublished = {Cryptology ePrint Archive, Report 2012/477}, year = {2012}, url = {http://eprint.iacr.org/2012/477}, } @misc{cryptoeprint:2012:478, author = {Wang Qinglong, Xu Li}, title = {Cryptanalysis on a novel unconditionally secure oblivious polynomial evaluation protocol}, howpublished = {Cryptology ePrint Archive, Report 2012/478}, year = {2012}, url = {http://eprint.iacr.org/2012/478}, } @misc{cryptoeprint:2012:479, author = {Mohammad Reza Reyhanitabar and Willy Susilo}, title = {Mix-Compress-Mix Revisited: Dispensing with Non-invertible Random Injection Oracles}, howpublished = {Cryptology ePrint Archive, Report 2012/479}, year = {2012}, url = {http://eprint.iacr.org/2012/479}, } @misc{cryptoeprint:2012:480, author = {Jae Hong Seo}, title = {Short Signatures From Diffie-Hellman: Realizing Short Public Key}, howpublished = {Cryptology ePrint Archive, Report 2012/480}, year = {2012}, url = {http://eprint.iacr.org/2012/480}, } @misc{cryptoeprint:2012:481, author = {John Steinberger}, title = {Improved Security Bounds for Key-Alternating Ciphers via Hellinger Distance}, howpublished = {Cryptology ePrint Archive, Report 2012/481}, year = {2012}, url = {http://eprint.iacr.org/2012/481}, } @misc{cryptoeprint:2012:482, author = {Vladislav Kovtun and Andrew Okhrimenko}, title = {Approaches for the Parallelization of Software Implementation of Integer Multiplication}, howpublished = {Cryptology ePrint Archive, Report 2012/482}, year = {2012}, url = {http://eprint.iacr.org/2012/482}, } @misc{cryptoeprint:2012:483, author = {Jayaprakash Kar}, title = {An Efficient Signcryption Scheme from q-Diffie-Hellman Problems}, howpublished = {Cryptology ePrint Archive, Report 2012/483}, year = {2012}, url = {http://eprint.iacr.org/2012/483}, } @misc{cryptoeprint:2012:484, author = {Ding Wang, Chun-guang Ma, De-li Gu and Zhen-shan Cui}, title = {Cryptanalysis of Two Dynamic ID-based Remote User Authentication Schemes for Multi-Server Architecture}, howpublished = {Cryptology ePrint Archive, Report 2012/484}, year = {2012}, url = {http://eprint.iacr.org/2012/484}, } @misc{cryptoeprint:2012:485, author = {Neil Hanley and HeeSeok Kim and Michael Tunstall}, title = {Exploiting Collisions in Addition Chain-based Exponentiation Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2012/485}, year = {2012}, url = {http://eprint.iacr.org/2012/485}, } @misc{cryptoeprint:2012:486, author = {Michael Backes and Ankit Malik and Dominique Unruh}, title = {Computational Soundness without Protocol Restrictions}, howpublished = {Cryptology ePrint Archive, Report 2012/486}, year = {2012}, url = {http://eprint.iacr.org/2012/486}, } @misc{cryptoeprint:2012:487, author = {Benjamin Pousse}, title = {Short communication: An interpretation of the Linux entropy estimator}, howpublished = {Cryptology ePrint Archive, Report 2012/487}, year = {2012}, url = {http://eprint.iacr.org/2012/487}, } @misc{cryptoeprint:2012:488, author = {Mohammad Beheshti-Atashgah \and Majid Bayat \and Mahmoud Gardeshi \and Mohammad Reza Aref}, title = {Designated Verifier Threshold Proxy Signature Scheme without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2012/488}, year = {2012}, url = {http://eprint.iacr.org/2012/488}, } @misc{cryptoeprint:2012:489, author = {Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref}, title = {Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols}, howpublished = {Cryptology ePrint Archive, Report 2012/489}, year = {2012}, url = {http://eprint.iacr.org/2012/489}, } @misc{cryptoeprint:2012:490, author = {Zahra Ahmadian, Mahmoud Salmasizadeh, and Mohammad Reza Aref}, title = {Desynchronization Attack on RAPP Ultralightweight Authentication Protocol}, howpublished = {Cryptology ePrint Archive, Report 2012/490}, year = {2012}, url = {http://eprint.iacr.org/2012/490}, } @misc{cryptoeprint:2012:491, author = {Lidong Han and Wei Wei and Mingjie Liu}, title = {On the Multiple Fault Attack on RSA Signatures with LSBs of Messages Unknown}, howpublished = {Cryptology ePrint Archive, Report 2012/491}, year = {2012}, url = {http://eprint.iacr.org/2012/491}, } @misc{cryptoeprint:2012:492, author = {Elena Dubrova}, title = {A Method for Generating Full Cycles by a Composition of NLFSRs}, howpublished = {Cryptology ePrint Archive, Report 2012/492}, year = {2012}, url = {http://eprint.iacr.org/2012/492}, } @misc{cryptoeprint:2012:493, author = {Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese}, title = {Efficient Query Integrity for Outsourced Dynamic Databases}, howpublished = {Cryptology ePrint Archive, Report 2012/493}, year = {2012}, url = {http://eprint.iacr.org/2012/493}, } @misc{cryptoeprint:2012:494, author = {Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart and Thomas Shrimpton}, title = {Format-Transforming Encryption: More than Meets the DPI}, howpublished = {Cryptology ePrint Archive, Report 2012/494}, year = {2012}, url = {http://eprint.iacr.org/2012/494}, } @misc{cryptoeprint:2012:495, author = {Alfredo De Santis and Moti Yung}, title = {"Metaproofs" (and their Cryptographic Applications)}, howpublished = {Cryptology ePrint Archive, Report 2012/495}, year = {2012}, url = {http://eprint.iacr.org/2012/495}, } @misc{cryptoeprint:2012:496, author = {Nishant Doshi and Devesh Jinwala}, title = {Updating attribute in CP-ABE: A New Approach}, howpublished = {Cryptology ePrint Archive, Report 2012/496}, year = {2012}, url = {http://eprint.iacr.org/2012/496}, } @misc{cryptoeprint:2012:497, author = {Mike Bond and George French and Nigel P. Smart and Gaven J. Watson}, title = {The low-call diet: Authenticated Encryption for call counting HSM users}, howpublished = {Cryptology ePrint Archive, Report 2012/497}, year = {2012}, url = {http://eprint.iacr.org/2012/497}, } @misc{cryptoeprint:2012:498, author = {Meicheng Liu and Yin Zhang and Dongdai Lin}, title = {On the immunity of Boolean functions against fast algebraic attacks using bivariate polynomial representation}, howpublished = {Cryptology ePrint Archive, Report 2012/498}, year = {2012}, url = {http://eprint.iacr.org/2012/498}, } @misc{cryptoeprint:2012:499, author = {Martín A. G. Vigil and Daniel Cabarcas and Alexander Wiesmaier and Johannes Buchmann}, title = {Authenticity, Integrity and Proof-of-Existence for Long-Term Archiving: a Survey}, howpublished = {Cryptology ePrint Archive, Report 2012/499}, year = {2012}, url = {http://eprint.iacr.org/2012/499}, } @misc{cryptoeprint:2012:500, author = {Nishant Doshi and Devesh Jinwala}, title = {Constant Ciphertext Length in CP-ABE}, howpublished = {Cryptology ePrint Archive, Report 2012/500}, year = {2012}, url = {http://eprint.iacr.org/2012/500}, } @misc{cryptoeprint:2012:501, author = {Nishanth Chandran and Bhavana Kanukurthi and Rafail Ostrovsky and Leonid Reyzin}, title = {Privacy Amplification with Asymptotically Optimal Entropy Loss}, howpublished = {Cryptology ePrint Archive, Report 2012/501}, year = {2012}, url = {http://eprint.iacr.org/2012/501}, } @misc{cryptoeprint:2012:502, author = {Viet Pham and Carlos Cid}, title = {Are We Compromised? Modelling Security Assessment Games}, howpublished = {Cryptology ePrint Archive, Report 2012/502}, year = {2012}, url = {http://eprint.iacr.org/2012/502}, } @misc{cryptoeprint:2012:503, author = {Alex Escala and Javier Herranz and Benoit Libert and Carla Rafols}, title = {Hierarchical Identity-Based (Lossy) Trapdoor Functions}, howpublished = {Cryptology ePrint Archive, Report 2012/503}, year = {2012}, url = {http://eprint.iacr.org/2012/503}, } @misc{cryptoeprint:2012:504, author = {Kashi Neupane and Rainer Steinwandt and Adriana Suarez Corona}, title = {Scalable Deniable Group Key Establishment}, howpublished = {Cryptology ePrint Archive, Report 2012/504}, year = {2012}, url = {http://eprint.iacr.org/2012/504}, } @misc{cryptoeprint:2012:505, author = {Koji Nuida}, title = {On pseudorandomization of information-theoretically secure schemes without hardness assumptions}, howpublished = {Cryptology ePrint Archive, Report 2012/505}, year = {2012}, url = {http://eprint.iacr.org/2012/505}, } @misc{cryptoeprint:2012:506, author = {Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn}, title = {Succinct Malleable NIZKs and an Application to Compact Shuffles}, howpublished = {Cryptology ePrint Archive, Report 2012/506}, year = {2012}, url = {http://eprint.iacr.org/2012/506}, } @misc{cryptoeprint:2012:507, author = {Josep Balasch and Baris Ege and Thomas Eisenbarth and Benoit Gérard and Zheng Gong and Tim Güneysu and Stefan Heyse and Stéphanie Kerckhof and François Koeune and Thomas Plos and Thomas Pöppelmann and Francesco Regazzoni and François-Xavier Standaert and Gilles Van Assche and Ronny Van Keer and Loïc van Oldeneel tot Oldenzeel and Ingo von Maurich }, title = {Compact Implementation and Performance Evaluation of Hash Functions in ATtiny Devices}, howpublished = {Cryptology ePrint Archive, Report 2012/507}, year = {2012}, url = {http://eprint.iacr.org/2012/507}, } @misc{cryptoeprint:2012:508, author = {Yi Deng and Juan Garay and San Ling and Huaxiong Wang and Moti Yung}, title = {On the (Im)Plausibility of Constant-Round Public-Coin Straight-Line-Simulatable Zero-Knowledge Proofs}, howpublished = {Cryptology ePrint Archive, Report 2012/508}, year = {2012}, url = {http://eprint.iacr.org/2012/508}, } @misc{cryptoeprint:2012:509, author = {Sebastian Kutzner and Phuong Ha Nguyen and Axel Poschmann and Huaxiong Wang}, title = {On 3-share Threshold Implementations for 4-bit S-boxes}, howpublished = {Cryptology ePrint Archive, Report 2012/509}, year = {2012}, url = {http://eprint.iacr.org/2012/509}, } @misc{cryptoeprint:2012:510, author = {Sebastian Kutzner and Phuong Ha Nguyen and Axel Poschmann}, title = {Enabling 3-share Threshold Implementations for any 4-bit S-box}, howpublished = {Cryptology ePrint Archive, Report 2012/510}, year = {2012}, url = {http://eprint.iacr.org/2012/510}, } @misc{cryptoeprint:2012:511, author = {Giuseppe Ateniese and Özgür Dagdelen and Ivan Damgard and Daniele Venturi}, title = {Entangled Cloud Storage}, howpublished = {Cryptology ePrint Archive, Report 2012/511}, year = {2012}, url = {http://eprint.iacr.org/2012/511}, } @misc{cryptoeprint:2012:512, author = {Ivan Damgard and Sarah Zakarias}, title = {Constant-Overhead Secure Computation for Boolean Circuits in the Preprocessing Model}, howpublished = {Cryptology ePrint Archive, Report 2012/512}, year = {2012}, url = {http://eprint.iacr.org/2012/512}, } @misc{cryptoeprint:2012:513, author = {Abhishek Jain and Stephan Krenn and Krzysztof Pietrzak and Aris Tentes}, title = {Commitments and Efficient Zero-Knowledge Proofs from Hard Learning Problems}, howpublished = {Cryptology ePrint Archive, Report 2012/513}, year = {2012}, url = {http://eprint.iacr.org/2012/513}, } @misc{cryptoeprint:2012:514, author = {Mihir Bellare and Kenneth G. Paterson and Susan Thomson}, title = {RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures}, howpublished = {Cryptology ePrint Archive, Report 2012/514}, year = {2012}, url = {http://eprint.iacr.org/2012/514}, } @misc{cryptoeprint:2012:515, author = {Mihir Bellare and Adam O'Neill}, title = {Semantically-Secure Functional Encryption: Possibility Results, Impossibility Results and the Quest for a General Definition}, howpublished = {Cryptology ePrint Archive, Report 2012/515}, year = {2012}, url = {http://eprint.iacr.org/2012/515}, } @misc{cryptoeprint:2012:516, author = {Benny Applebaum}, title = {Garbling XOR Gates ``For Free'' in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2012/516}, year = {2012}, url = {http://eprint.iacr.org/2012/516}, } @misc{cryptoeprint:2012:517, author = {Ashish Choudhury and Martin Hirt and Arpita Patra}, title = {Unconditionally Secure Asynchronous Multiparty Computation with Linear Communication Complexity}, howpublished = {Cryptology ePrint Archive, Report 2012/517}, year = {2012}, url = {http://eprint.iacr.org/2012/517}, } @misc{cryptoeprint:2012:518, author = {Kwangsu Lee and Dong Hoon Lee and Moti Yung}, title = {Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies}, howpublished = {Cryptology ePrint Archive, Report 2012/518}, year = {2012}, url = {http://eprint.iacr.org/2012/518}, } @misc{cryptoeprint:2012:519, author = {Diego F. Aranha and Armando Faz-Hernández and Julio López and Francisco Rodríguez-Henríquez}, title = {Faster implementation of scalar multiplication on Koblitz curves}, howpublished = {Cryptology ePrint Archive, Report 2012/519}, year = {2012}, url = {http://eprint.iacr.org/2012/519}, } @misc{cryptoeprint:2012:520, author = {Miroslaw Kutylowski and Maciej Gebala}, title = {Optimizing Segment Based Document Protection (Corrected Version)}, howpublished = {Cryptology ePrint Archive, Report 2012/520}, year = {2012}, url = {http://eprint.iacr.org/2012/520}, } @misc{cryptoeprint:2012:521, author = {Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee}, title = {Functional Encryption with Bounded Collusions via Multi-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2012/521}, year = {2012}, url = {http://eprint.iacr.org/2012/521}, } @misc{cryptoeprint:2012:522, author = {A. Simone and B. Skoric}, title = {False Positive probabilities in q-ary Tardos codes: comparison of attacks}, howpublished = {Cryptology ePrint Archive, Report 2012/522}, year = {2012}, url = {http://eprint.iacr.org/2012/522}, } @misc{cryptoeprint:2012:523, author = {Mohammad Mahmoody and Rafael Pass}, title = {The Curious Case of Non-Interactive Commitments}, howpublished = {Cryptology ePrint Archive, Report 2012/523}, year = {2012}, url = {http://eprint.iacr.org/2012/523}, } @misc{cryptoeprint:2012:524, author = {Zooko Wilcox-O'Hearn and Brian Warner}, title = {Tahoe – The Least-Authority Filesystem}, howpublished = {Cryptology ePrint Archive, Report 2012/524}, year = {2012}, url = {http://eprint.iacr.org/2012/524}, } @misc{cryptoeprint:2012:525, author = {Gaetan Bisson}, title = {Computing endomorphism rings of abelian varieties of dimension two }, howpublished = {Cryptology ePrint Archive, Report 2012/525}, year = {2012}, url = {http://eprint.iacr.org/2012/525}, } @misc{cryptoeprint:2012:526, author = {Hyung Tae Lee and Hyunsook Hong and Jung Hee Cheon}, title = {Invertible Polynomial Representation for Private Set Operations}, howpublished = {Cryptology ePrint Archive, Report 2012/526}, year = {2012}, url = {http://eprint.iacr.org/2012/526}, } @misc{cryptoeprint:2012:527, author = {Michael Scott}, title = {Cryptanalysis of a recent two factor authentication scheme }, howpublished = {Cryptology ePrint Archive, Report 2012/527}, year = {2012}, url = {http://eprint.iacr.org/2012/527}, } @misc{cryptoeprint:2012:528, author = {Graham Enos and Yuliang Zheng}, title = {An ID-Based Signcryption Scheme with Compartmented Secret Sharing for Unsigncryption}, howpublished = {Cryptology ePrint Archive, Report 2012/528}, year = {2012}, url = {http://eprint.iacr.org/2012/528}, } @misc{cryptoeprint:2012:529, author = {Julia Borghoff and Anne Canteaut and Tim G\"{u}neysu and Elif Bilge Kavun and Miroslav Knezevic and Lars R. Knudsen and Gregor Leander and Ventzislav Nikov and Christof Paar and Christian Rechberger and Peter Rombouts and S{\o}ren S. Thomsen and Tolga Yal\c{c}{\i}n}, title = {PRINCE- A Low-latency Block Cipher for Pervasive Computing Applications (Full version)}, howpublished = {Cryptology ePrint Archive, Report 2012/529}, year = {2012}, url = {http://eprint.iacr.org/2012/529}, } @misc{cryptoeprint:2012:530, author = {Seny Kamara and Charalampos Papamanthou and Tom Roeder}, title = {Dynamic Searchable Symmetric Encryption}, howpublished = {Cryptology ePrint Archive, Report 2012/530}, year = {2012}, url = {http://eprint.iacr.org/2012/530}, } @misc{cryptoeprint:2012:531, author = {Murat Ak, Aggelos Kiayias, Serdar Pehlivanoglu, Ali Aydın Selcuk}, title = {Generic Construction of Trace and Revoke Schemes}, howpublished = {Cryptology ePrint Archive, Report 2012/531}, year = {2012}, url = {http://eprint.iacr.org/2012/531}, } @misc{cryptoeprint:2012:532, author = {Liangze Li and Hongfeng Wu and Fan Zhang}, title = {Pairing computation on Edwards curves with high-degree twists}, howpublished = {Cryptology ePrint Archive, Report 2012/532}, year = {2012}, url = {http://eprint.iacr.org/2012/532}, } @misc{cryptoeprint:2012:533, author = {Thijs Laarhoven and Joop van de Pol and Benne de Weger}, title = {Solving Hard Lattice Problems and the Security of Lattice-Based Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2012/533}, year = {2012}, url = {http://eprint.iacr.org/2012/533}, } @misc{cryptoeprint:2012:534, author = {Maura B. Paterson and Douglas R. Stinson}, title = {A Simplified Combinatorial Treatment of Constructions and Threshold Gaps of Ramp Schemes}, howpublished = {Cryptology ePrint Archive, Report 2012/534}, year = {2012}, url = {http://eprint.iacr.org/2012/534}, } @misc{cryptoeprint:2012:535, author = {Nuray At and Jean-Luc Beuchat and Eiji Okamoto and Ismail San and Teppei Yamazaki}, title = {A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function Gr{\o}stl}, howpublished = {Cryptology ePrint Archive, Report 2012/535}, year = {2012}, url = {http://eprint.iacr.org/2012/535}, } @misc{cryptoeprint:2012:536, author = {Ivan Bjerre Damgård and Jonas Kölker and Peter Bro Miltersen}, title = {Secret Sharing and Secure Computing from Monotone Formulae}, howpublished = {Cryptology ePrint Archive, Report 2012/536}, year = {2012}, url = {http://eprint.iacr.org/2012/536}, } @misc{cryptoeprint:2012:537, author = {Özgür Dagdelen and Marc Fischlin}, title = {Unconditionally-Secure Universally Composable Password-Based Key-Exchange based on One-Time Memory Tokens}, howpublished = {Cryptology ePrint Archive, Report 2012/537}, year = {2012}, url = {http://eprint.iacr.org/2012/537}, } @misc{cryptoeprint:2012:538, author = {Myungsun Kim and Abedelaziz Mohaisen and Jung Hee Cheon and Yongdae Kim}, title = {Private Top-k Aggregation Protocols}, howpublished = {Cryptology ePrint Archive, Report 2012/538}, year = {2012}, url = {http://eprint.iacr.org/2012/538}, } @misc{cryptoeprint:2012:539, author = {Sami A. Nagar and Dr. Saad Alshamma}, title = {Efficient Implementation of RSA Algorithm with MKE}, howpublished = {Cryptology ePrint Archive, Report 2012/539}, year = {2012}, url = {http://eprint.iacr.org/2012/539}, } @misc{cryptoeprint:2012:540, author = {Ga Won Lee and Jin Hong}, title = {A Comparison of Perfect Table Cryptanalytic Tradeoff Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2012/540}, year = {2012}, url = {http://eprint.iacr.org/2012/540}, } @misc{cryptoeprint:2012:541, author = {Dieter Schmidt}, title = {2048XKS - A Software Oriented High Security Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2012/541}, year = {2012}, url = {http://eprint.iacr.org/2012/541}, } @misc{cryptoeprint:2012:542, author = {Seny Kamara and Payman Mohassel and Ben Riva}, title = {Salus: A System for Server-Aided Secure Function Evaluation}, howpublished = {Cryptology ePrint Archive, Report 2012/542}, year = {2012}, url = {http://eprint.iacr.org/2012/542}, } @misc{cryptoeprint:2012:543, author = {Dana Dachman-Soled and Georg Fuchsbauer and Payman Mohassel and Adam O'Neill}, title = {Enhanced Chosen-Ciphertext Security and Applications}, howpublished = {Cryptology ePrint Archive, Report 2012/543}, year = {2012}, url = {http://eprint.iacr.org/2012/543}, } @misc{cryptoeprint:2012:544, author = {Florian Mendel and Vincent Rijmen and Deniz Toz and Kerem Varici}, title = {Differential Analysis of the LED Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2012/544}, year = {2012}, url = {http://eprint.iacr.org/2012/544}, } @misc{cryptoeprint:2012:545, author = {Haibo Yi, Shaohua Tang}, title = {A Versatile Multi-Input Multiplier over Finite Fields}, howpublished = {Cryptology ePrint Archive, Report 2012/545}, year = {2012}, url = {http://eprint.iacr.org/2012/545}, } @misc{cryptoeprint:2012:546, author = {Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny}, title = {Rotational cryptanalysis of round-reduced Keccak}, howpublished = {Cryptology ePrint Archive, Report 2012/546}, year = {2012}, url = {http://eprint.iacr.org/2012/546}, } @misc{cryptoeprint:2012:547, author = {Bodhisatwa Mazumdar and Debdeep Mukhopadhyay and Indranil Sengupta}, title = {Constrained Search for a Class of Good S-Boxes with Improved DPA Resistivity}, howpublished = {Cryptology ePrint Archive, Report 2012/547}, year = {2012}, url = {http://eprint.iacr.org/2012/547}, } @misc{cryptoeprint:2012:548, author = {Helger Lipmaa and Bingsheng Zhang}, title = {New Non-Interactive Zero-Knowledge Subset Sum, Decision Knapsack And Range Arguments}, howpublished = {Cryptology ePrint Archive, Report 2012/548}, year = {2012}, url = {http://eprint.iacr.org/2012/548}, } @misc{cryptoeprint:2012:549, author = {Daniel J. Bernstein and Jeroen Doumen and Tanja Lange and Jan-Jaap Oosterwijk}, title = {Faster batch forgery identification}, howpublished = {Cryptology ePrint Archive, Report 2012/549}, year = {2012}, url = {http://eprint.iacr.org/2012/549}, } @misc{cryptoeprint:2012:550, author = {David Cash and Alptekin Kupcu and Daniel Wichs}, title = {Dynamic Proofs of Retrievability via Oblivious RAM}, howpublished = {Cryptology ePrint Archive, Report 2012/550}, year = {2012}, url = {http://eprint.iacr.org/2012/550}, } @misc{cryptoeprint:2012:551, author = {Liangze Li and Hongfeng Wu and Fan Zhang}, title = {Faster Pairing Computation on Jacobi quartic Curves with High-Degree Twists}, howpublished = {Cryptology ePrint Archive, Report 2012/551}, year = {2012}, url = {http://eprint.iacr.org/2012/551}, } @misc{cryptoeprint:2012:552, author = {Xiaofei Guo, Debdeep Mukhopadhyay and Ramesh Karri}, title = {Provably Secure Concurrent Error Detection Against Differential Fault Analysis}, howpublished = {Cryptology ePrint Archive, Report 2012/552}, year = {2012}, url = {http://eprint.iacr.org/2012/552}, } @misc{cryptoeprint:2012:553, author = {Andrey Sidorenko and Joachim van den Berg and Remko Foekema and Michiel Grashuis and Jaap de Vos}, title = {Bellcore attack in practice}, howpublished = {Cryptology ePrint Archive, Report 2012/553}, year = {2012}, url = {http://eprint.iacr.org/2012/553}, } @misc{cryptoeprint:2012:554, author = {Youngjoo Shin, Junbeom Hur, Kwangjo Kim}, title = {Security weakness in the Proof of Storage with Deduplication}, howpublished = {Cryptology ePrint Archive, Report 2012/554}, year = {2012}, url = {http://eprint.iacr.org/2012/554}, } @misc{cryptoeprint:2012:555, author = {Shweta Agrawal and Vipul Goyal and Abhishek Jain and Manoj Prabhakaran and Amit Sahai }, title = {New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2012/555}, year = {2012}, url = {http://eprint.iacr.org/2012/555}, } @misc{cryptoeprint:2012:556, author = {Juan Garay and David Johnson and Aggelos Kiayias and Moti Yung }, title = {Resource-based Corruptions and the Combinatorics of Hidden Diversity}, howpublished = {Cryptology ePrint Archive, Report 2012/556}, year = {2012}, url = {http://eprint.iacr.org/2012/556}, } @misc{cryptoeprint:2012:557, author = {Stefan Katzenbeisser, Ünal Kocabas, Vladimir Rožic, Ahmad-Reza Sadeghi, Ingrid Verbauwhede and Christian Wachsmann}, title = {PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon (Extended Version)}, howpublished = {Cryptology ePrint Archive, Report 2012/557}, year = {2012}, url = {http://eprint.iacr.org/2012/557}, } @misc{cryptoeprint:2012:558, author = {Jens Bender and Özgür Dagdelen and Marc Fischlin and Dennis Kügler}, title = {Domain-Specifi c Pseudonymous Signatures for the German Identity Card}, howpublished = {Cryptology ePrint Archive, Report 2012/558}, year = {2012}, url = {http://eprint.iacr.org/2012/558}, } @misc{cryptoeprint:2012:559, author = {Mark Manulis and Bertram Poettering and Douglas Stebila}, title = {Plaintext Awareness in Identity-Based Key Encapsulation}, howpublished = {Cryptology ePrint Archive, Report 2012/559}, year = {2012}, url = {http://eprint.iacr.org/2012/559}, } @misc{cryptoeprint:2012:560, author = {Mohammad Hajiabadi, Bruce M. Kapron}, title = {Computational Soundness of Coinductive Symbolic Security under Active Attacks}, howpublished = {Cryptology ePrint Archive, Report 2012/560}, year = {2012}, url = {http://eprint.iacr.org/2012/560}, } @misc{cryptoeprint:2012:561, author = {Hu Yupu, Wang Fenghe}, title = {An Attack on a Fully Homomorphic Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2012/561}, year = {2012}, url = {http://eprint.iacr.org/2012/561}, } @misc{cryptoeprint:2012:562, author = {Kwangsu Lee and Dong Hoon Lee and Moti Yung}, title = {Aggregating CL-Signatures Revisited: Extended Functionality and Better Efficiency}, howpublished = {Cryptology ePrint Archive, Report 2012/562}, year = {2012}, url = {http://eprint.iacr.org/2012/562}, } @misc{cryptoeprint:2012:563, author = {Kai-Min Chung and Huijia Lin and Rafael Pass}, title = {Constant-Round Concurrent Zero Knowledge From Falsifiable Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2012/563}, year = {2012}, url = {http://eprint.iacr.org/2012/563}, } @misc{cryptoeprint:2012:564, author = {Mihir Bellare and Viet Tung Hoang and Phillip Rogaway}, title = {Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing}, howpublished = {Cryptology ePrint Archive, Report 2012/564}, year = {2012}, url = {http://eprint.iacr.org/2012/564}, } @misc{cryptoeprint:2012:565, author = {Zvika Brakerski and Craig Gentry and Shai Halevi}, title = {Packed Ciphertexts in LWE-based Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2012/565}, year = {2012}, url = {http://eprint.iacr.org/2012/565}, } @misc{cryptoeprint:2012:566, author = {Joep de Groot and Boris Skoric and Niels de Vreede and Jean-Paul Linnartz}, title = {Information Leakage of Continuous-Source Zero Secrecy Leakage Helper Data Schemes}, howpublished = {Cryptology ePrint Archive, Report 2012/566}, year = {2012}, url = {http://eprint.iacr.org/2012/566}, } @misc{cryptoeprint:2012:567, author = {Claude Carlet and Jean-Luc Danger and Sylvain Guilley and Houssem Maghrebi}, title = {Leakage Squeezing of Order Two}, howpublished = {Cryptology ePrint Archive, Report 2012/567}, year = {2012}, url = {http://eprint.iacr.org/2012/567}, } @misc{cryptoeprint:2012:568, author = {Stefan G. Weber}, title = {On Transaction Pseudonyms with Implicit Attributes}, howpublished = {Cryptology ePrint Archive, Report 2012/568}, year = {2012}, url = {http://eprint.iacr.org/2012/568}, } @misc{cryptoeprint:2012:569, author = {San Ling and Khoa Nguyen and Damien Stehle and Huaxiong Wang}, title = {Improved Zero-knowledge Proofs of Knowledge for the ISIS Problem, and Applications}, howpublished = {Cryptology ePrint Archive, Report 2012/569}, year = {2012}, url = {http://eprint.iacr.org/2012/569}, } @misc{cryptoeprint:2012:570, author = {Hadi Soleimany}, title = {Zero-Correlation Linear Cryptanalysis of Reduced-Round LBlock }, howpublished = {Cryptology ePrint Archive, Report 2012/570}, year = {2012}, url = {http://eprint.iacr.org/2012/570}, } @misc{cryptoeprint:2012:571, author = {Changyong Peng and Chuangying zhu and Yuefei Zhu and Fei Kang}, title = {Improved side channel attack on the block cipher NOEKEON}, howpublished = {Cryptology ePrint Archive, Report 2012/571}, year = {2012}, url = {http://eprint.iacr.org/2012/571}, } @misc{cryptoeprint:2012:572, author = {Divya Gupta and Amit Sahai}, title = {On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption}, howpublished = {Cryptology ePrint Archive, Report 2012/572}, year = {2012}, url = {http://eprint.iacr.org/2012/572}, } @misc{cryptoeprint:2012:573, author = {Iftach Haitner and Eran Omri and Hila Zarosim}, title = {On the Power of Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2012/573}, year = {2012}, url = {http://eprint.iacr.org/2012/573}, } @misc{cryptoeprint:2012:574, author = {A. D. Myasnikov and A. Ushakov}, title = {Quantum algorithm for the discrete logarithm problem for matrices over finite group rings}, howpublished = {Cryptology ePrint Archive, Report 2012/574}, year = {2012}, url = {http://eprint.iacr.org/2012/574}, } @misc{cryptoeprint:2012:575, author = {Jeyavijayan Rajendran, Ramesh Karri, James B. Wendt, Miodrag Potkonjak, Nathan McDonald, Garrett S. Rose, and Bryant Wysocki}, title = {Nanoelectronic Solutions for Hardware Security}, howpublished = {Cryptology ePrint Archive, Report 2012/575}, year = {2012}, url = {http://eprint.iacr.org/2012/575}, } @misc{cryptoeprint:2012:576, author = {Xiao Tan and Qiong Huang and Duncan S. Wong}, title = {Concurrent Signatures without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2012/576}, year = {2012}, url = {http://eprint.iacr.org/2012/576}, } @misc{cryptoeprint:2012:577, author = {Matthew Franklin and Haibin Zhang}, title = {A Framework for Unique Ring Signatures}, howpublished = {Cryptology ePrint Archive, Report 2012/577}, year = {2012}, url = {http://eprint.iacr.org/2012/577}, } @misc{cryptoeprint:2012:578, author = {Nicolas Veyrat-Charvillon and Benoît Gérard and François-Xavier Standaert }, title = {Security Evaluations Beyond Computing Power: How to Analyze Side-Channel Attacks you Cannot Mount? }, howpublished = {Cryptology ePrint Archive, Report 2012/578}, year = {2012}, url = {http://eprint.iacr.org/2012/578}, } @misc{cryptoeprint:2012:579, author = {Kevin D. Bowers and Marten van Dijk and Robert Griffin and Ari Juels and Alina Oprea and Ronald L. Rivest and Nikos Triandopoulos}, title = {Defending Against the Unknown Enemy: Applying FlipIt to System Security}, howpublished = {Cryptology ePrint Archive, Report 2012/579}, year = {2012}, url = {http://eprint.iacr.org/2012/579}, } @misc{cryptoeprint:2012:580, author = {Peng Wang and Wenling Wu and Liting Zhang}, title = {Cryptanalysis of the OKH Authenticated Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2012/580}, year = {2012}, url = {http://eprint.iacr.org/2012/580}, } @misc{cryptoeprint:2012:581, author = {Ding Wang and Chun-guang Ma}, title = {On the security of two smart-card-based remote user authentication schemes for WSN}, howpublished = {Cryptology ePrint Archive, Report 2012/581}, year = {2012}, url = {http://eprint.iacr.org/2012/581}, } @misc{cryptoeprint:2012:582, author = {Sabyasachi Karati and Abhijit Das and Dipanwita Roychowdhury}, title = {Using Randomizers for Batch Verification of ECDSA Signatures}, howpublished = {Cryptology ePrint Archive, Report 2012/582}, year = {2012}, url = {http://eprint.iacr.org/2012/582}, } @misc{cryptoeprint:2012:583, author = {Yannis Rouselakis and Brent Waters}, title = {New Constructions and Proof Methods for Large Universe Attribute-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2012/583}, year = {2012}, url = {http://eprint.iacr.org/2012/583}, } @misc{cryptoeprint:2012:584, author = {Dorit Ron and Adi Shamir}, title = {Quantitative Analysis of the Full Bitcoin Transaction Graph}, howpublished = {Cryptology ePrint Archive, Report 2012/584}, year = {2012}, url = {http://eprint.iacr.org/2012/584}, } @misc{cryptoeprint:2012:585, author = {Preetha Mathew K and Sachin Vasant and C Pandu Rangan}, title = {ON PROVABLY SECURE CODE-BASED SIGNATURE AND SIGNCRYPTION SCHEME}, howpublished = {Cryptology ePrint Archive, Report 2012/585}, year = {2012}, url = {http://eprint.iacr.org/2012/585}, } @misc{cryptoeprint:2012:586, author = {Julien Bringer and Herve Chabanne and Alain Patey}, title = {SHADE: Secure HAmming DistancE computation from oblivious transfer}, howpublished = {Cryptology ePrint Archive, Report 2012/586}, year = {2012}, url = {http://eprint.iacr.org/2012/586}, } @misc{cryptoeprint:2012:587, author = {Changyong Peng and Chuangying zhu and Yuefei Zhu and Fei Kang}, title = {Symbolic computation in block cipher with application to PRESENT}, howpublished = {Cryptology ePrint Archive, Report 2012/587}, year = {2012}, url = {http://eprint.iacr.org/2012/587}, } @misc{cryptoeprint:2012:588, author = {Hans-Joachim Knobloch}, title = {Breaking Public Keys - How to Determine an Unknown RSA Public Modulus}, howpublished = {Cryptology ePrint Archive, Report 2012/588}, year = {2012}, url = {http://eprint.iacr.org/2012/588}, } @misc{cryptoeprint:2012:589, author = {Nishant Doshi}, title = {A Novel Approach for RSA-based Certificateless Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2012/589}, year = {2012}, url = {http://eprint.iacr.org/2012/589}, } @misc{cryptoeprint:2012:590, author = {Nishant Doshi}, title = {An Efficient Three-Party Authenticated Key Exchange Protocol for Mobile-Commerce Environments Using Elliptic Curve Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2012/590}, year = {2012}, url = {http://eprint.iacr.org/2012/590}, } @misc{cryptoeprint:2012:591, author = {Farzaneh Abed and Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel}, title = {Biclique Cryptanalysis of the PRESENT and LED Lightweight Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2012/591}, year = {2012}, url = {http://eprint.iacr.org/2012/591}, } @misc{cryptoeprint:2012:592, author = {Amit sahai and Brent Waters}, title = {Attribute-Based Encryption for Circuits from Multilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2012/592}, year = {2012}, url = {http://eprint.iacr.org/2012/592}, } @misc{cryptoeprint:2012:593, author = {Tomoko Yonemura and Taichi Isogai and Hirofumi Muratani and Yoshikazu Hanatani}, title = {Factor-4 and 6 (De)compression for Values of Pairings using Trace Maps}, howpublished = {Cryptology ePrint Archive, Report 2012/593}, year = {2012}, url = {http://eprint.iacr.org/2012/593}, } @misc{cryptoeprint:2012:594, author = {Ya Liu and Dawu Gu and Zhiqiang Liu and Wei Li}, title = {Improved Impossible Differential Attack on Reduced Version of Camellia-192/256}, howpublished = {Cryptology ePrint Archive, Report 2012/594}, year = {2012}, url = {http://eprint.iacr.org/2012/594}, } @misc{cryptoeprint:2012:595, author = {Oriol Farras and Carles Padro}, title = {Extending Brickell-Davenport Theorem to Non-Perfect Secret Sharing Schemes}, howpublished = {Cryptology ePrint Archive, Report 2012/595}, year = {2012}, url = {http://eprint.iacr.org/2012/595}, } @misc{cryptoeprint:2012:596, author = {Elli Androulaki and Ghassan Karame and Marc Roeschlin and Tobias Scherer and Srdjan Capkun}, title = {Evaluating User Privacy in Bitcoin}, howpublished = {Cryptology ePrint Archive, Report 2012/596}, year = {2012}, url = {http://eprint.iacr.org/2012/596}, } @misc{cryptoeprint:2012:597, author = {Souradyuti Paul and Ekawat Homsirikamol and Kris Gaj}, title = {A Novel Permutation-based Hash Mode of Operation FP and the Hash Function SAMOSA}, howpublished = {Cryptology ePrint Archive, Report 2012/597}, year = {2012}, url = {http://eprint.iacr.org/2012/597}, } @misc{cryptoeprint:2012:598, author = {Srinath Setty and Victor Vu and Nikhil Panpalia and Benjamin Braun and Andrew J. Blumberg and Michael Walfish }, title = {Taking proof-based verified computation a few steps closer to practicality (extended version)}, howpublished = {Cryptology ePrint Archive, Report 2012/598}, year = {2012}, url = {http://eprint.iacr.org/2012/598}, } @misc{cryptoeprint:2012:599, author = {Min Yang, Qingshu Meng, Zhangyi Wang, Huanguo Zhang}, title = {Some observations to speed the polynomial selection in the number field sieve}, howpublished = {Cryptology ePrint Archive, Report 2012/599}, year = {2012}, url = {http://eprint.iacr.org/2012/599}, } @misc{cryptoeprint:2012:600, author = {Jian Guo, Thomas Peyrin, Axel Poschmann and Matt Robshaw}, title = {The LED Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2012/600}, year = {2012}, url = {http://eprint.iacr.org/2012/600}, } @misc{cryptoeprint:2012:601, author = {Steve Lu and Rafail Ostrovsky}, title = {How to Garble RAM Programs}, howpublished = {Cryptology ePrint Archive, Report 2012/601}, year = {2012}, url = {http://eprint.iacr.org/2012/601}, } @misc{cryptoeprint:2012:602, author = {Andreas Wiemers}, title = {A note on invariant linear transformations in multivariate public key cryptography}, howpublished = {Cryptology ePrint Archive, Report 2012/602}, year = {2012}, url = {http://eprint.iacr.org/2012/602}, } @misc{cryptoeprint:2012:603, author = {Alexis Bonnecaze and Robert Rolland}, title = {Collecting Data while Preserving Individuals' Privacy: A Case Study}, howpublished = {Cryptology ePrint Archive, Report 2012/603}, year = {2012}, url = {http://eprint.iacr.org/2012/603}, } @misc{cryptoeprint:2012:604, author = {Carmit Hazay and Adriana Lopez-Alt and Hoeteck Wee and Daniel Wichs}, title = {Leakage-Resilient Cryptography from Minimal Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2012/604}, year = {2012}, url = {http://eprint.iacr.org/2012/604}, } @misc{cryptoeprint:2012:605, author = {Jin Li, Xiaofeng Chen, Jingwei Li, Chunfu Jia, Duncan S. Wong, Willy Susilo}, title = {Secure Outsourced Attribute-Based Signatures}, howpublished = {Cryptology ePrint Archive, Report 2012/605}, year = {2012}, url = {http://eprint.iacr.org/2012/605}, } @misc{cryptoeprint:2012:606, author = {Dan Boneh and Mark Zhandry}, title = {Quantum-Secure Message Authentication Codes}, howpublished = {Cryptology ePrint Archive, Report 2012/606}, year = {2012}, url = {http://eprint.iacr.org/2012/606}, } @misc{cryptoeprint:2012:607, author = {Charles Bouillaguet and Pierre-Alain Fouque and Amandine Véber}, title = {Graph-Theoretic Algorithms for the ``Isomorphism of Polynomials'' Problem}, howpublished = {Cryptology ePrint Archive, Report 2012/607}, year = {2012}, url = {http://eprint.iacr.org/2012/607}, } @misc{cryptoeprint:2012:608, author = {Marina Blanton and Mehrdad Aliasgari}, title = {On the (Non-)Reusability of Fuzzy Sketches and Extractors and Security Improvements in the Computational Setting}, howpublished = {Cryptology ePrint Archive, Report 2012/608}, year = {2012}, url = {http://eprint.iacr.org/2012/608}, } @misc{cryptoeprint:2012:609, author = {Taechan Kim and Jung Hee Cheon}, title = {A New Approach to Discrete Logarithm Problem with Auxiliary Inputs}, howpublished = {Cryptology ePrint Archive, Report 2012/609}, year = {2012}, url = {http://eprint.iacr.org/2012/609}, } @misc{cryptoeprint:2012:610, author = {Sanjam Garg and Craig Gentry and Shai Halevi}, title = {Candidate Multilinear Maps from Ideal Lattices and Applications}, howpublished = {Cryptology ePrint Archive, Report 2012/610}, year = {2012}, url = {http://eprint.iacr.org/2012/610}, } @misc{cryptoeprint:2012:611, author = {Maura B. Paterson and Douglas R. Stinson and Jalaj Upadhyay}, title = {A coding theory foundation for the analysis of general unconditionally secure proof-of-retrievability schemes for cloud storage}, howpublished = {Cryptology ePrint Archive, Report 2012/611}, year = {2012}, url = {http://eprint.iacr.org/2012/611}, } @misc{cryptoeprint:2012:612, author = {Byoung-il Kim and Jin Hong}, title = {Analysis of the Non-Perfect Table Fuzzy Rainbow Tradeoff}, howpublished = {Cryptology ePrint Archive, Report 2012/612}, year = {2012}, url = {http://eprint.iacr.org/2012/612}, } @misc{cryptoeprint:2012:613, author = {Grégory Demay and Peter Gaži and Martin Hirt and Ueli Maurer}, title = {Resource-Restricted Indifferentiability}, howpublished = {Cryptology ePrint Archive, Report 2012/613}, year = {2012}, url = {http://eprint.iacr.org/2012/613}, } @misc{cryptoeprint:2012:614, author = {Kristin Lauter and Bianca Viray}, title = {An arithmetic intersection formula for denominators of Igusa class polynomials}, howpublished = {Cryptology ePrint Archive, Report 2012/614}, year = {2012}, url = {http://eprint.iacr.org/2012/614}, } @misc{cryptoeprint:2012:615, author = {Boaz Tsaban}, title = {Polynomial time cryptanalysis of noncommutative-algebraic key exchange protocols}, howpublished = {Cryptology ePrint Archive, Report 2012/615}, year = {2012}, url = {http://eprint.iacr.org/2012/615}, } @misc{cryptoeprint:2012:616, author = {Nishanth Chandran and Sanjam Garg}, title = {Hardness Preserving Constructions of Pseudorandom Functions, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2012/616}, year = {2012}, url = {http://eprint.iacr.org/2012/616}, } @misc{cryptoeprint:2012:617, author = {Stefan Tillich and Marcin W\'{o}jcik}, title = {Security Analysis of an Open Car Immobilizer Protocol Stack}, howpublished = {Cryptology ePrint Archive, Report 2012/617}, year = {2012}, url = {http://eprint.iacr.org/2012/617}, } @misc{cryptoeprint:2012:618, author = {Oscar Garcia Morchon and Ludo Tolhuizen and Domingo Gomez and Jaime Gutierrez}, title = {Towards fully collusion-resistant ID-based establishment of pairwise keys}, howpublished = {Cryptology ePrint Archive, Report 2012/618}, year = {2012}, url = {http://eprint.iacr.org/2012/618}, } @misc{cryptoeprint:2012:619, author = {Michael Backes and Amit Datta and Aniket Kate}, title = {Asynchronous Computational VSS with Reduced Communication Complexity}, howpublished = {Cryptology ePrint Archive, Report 2012/619}, year = {2012}, url = {http://eprint.iacr.org/2012/619}, } @misc{cryptoeprint:2012:620, author = {Claus P. Schnorr and Taras Shevchenko}, title = {Solving Subset Sum Problems of Densioty close to 1 by "randomized" BKZ-reduction}, howpublished = {Cryptology ePrint Archive, Report 2012/620}, year = {2012}, url = {http://eprint.iacr.org/2012/620}, } @misc{cryptoeprint:2012:621, author = {Kitae Jeong and HyungChul Kang and Changhoon Lee and Jaechul Sung and Seokhie Hong}, title = {Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED}, howpublished = {Cryptology ePrint Archive, Report 2012/621}, year = {2012}, url = {http://eprint.iacr.org/2012/621}, } @misc{cryptoeprint:2012:622, author = {Srinath Setty and Benjamin Braun and Victor Vu and Andrew J. Blumberg and Bryan Parno and Michael Walfish}, title = {Resolving the conflict between generality and plausibility in verified computation}, howpublished = {Cryptology ePrint Archive, Report 2012/622}, year = {2012}, url = {http://eprint.iacr.org/2012/622}, } @misc{cryptoeprint:2012:623, author = {David McGrew}, title = {{Impossible plaintext cryptanalysis and probable-plaintext collision attacks of 64-bit block cipher modes}, howpublished = {Cryptology ePrint Archive, Report 2012/623}, year = {2012}, url = {http://eprint.iacr.org/2012/623}, } @misc{cryptoeprint:2012:624, author = {Alexandra Boldyreva and Nathan Chenette and Younho Lee and Adam O’Neill}, title = {Order-Preserving Symmetric Encryption}, howpublished = {Cryptology ePrint Archive, Report 2012/624}, year = {2012}, url = {http://eprint.iacr.org/2012/624}, } @misc{cryptoeprint:2012:625, author = {Alexandra Boldyreva and Nathan Chenette and Adam O’Neill}, title = {Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions}, howpublished = {Cryptology ePrint Archive, Report 2012/625}, year = {2012}, url = {http://eprint.iacr.org/2012/625}, } @misc{cryptoeprint:2012:626, author = {Xi Xiong and Haining Fan}, title = {Bit-Parallel $GF(2^{n})$ Squarer Using Shifted Polynomial Basis}, howpublished = {Cryptology ePrint Archive, Report 2012/626}, year = {2012}, url = {http://eprint.iacr.org/2012/626}, } @misc{cryptoeprint:2012:627, author = {Laila el Aimani and Olivier Sanders}, title = {Efficient Group Signatures in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2012/627}, year = {2012}, url = {http://eprint.iacr.org/2012/627}, } @misc{cryptoeprint:2012:628, author = {Muhammad Yasir Malik}, title = {Efficient Group Key Management Schemes for Multicast Dynamic Communication Systems}, howpublished = {Cryptology ePrint Archive, Report 2012/628}, year = {2012}, url = {http://eprint.iacr.org/2012/628}, } @misc{cryptoeprint:2012:629, author = {Yael Ejgenberg and Moriya Farbstein and Meital Levy and Yehuda Lindell}, title = {SCAPI: The Secure Computation Application Programming Interface}, howpublished = {Cryptology ePrint Archive, Report 2012/629}, year = {2012}, url = {http://eprint.iacr.org/2012/629}, } @misc{cryptoeprint:2012:630, author = {Florian Giesen and Florian Kohlar and Douglas Stebila}, title = {On the Security of TLS Renegotiation}, howpublished = {Cryptology ePrint Archive, Report 2012/630}, year = {2012}, url = {http://eprint.iacr.org/2012/630}, } @misc{cryptoeprint:2012:631, author = {Mihir Bellare and Sriram Keelveedhi and Thomas Ristenpart}, title = {Message-Locked Encryption and Secure Deduplication}, howpublished = {Cryptology ePrint Archive, Report 2012/631}, year = {2012}, url = {http://eprint.iacr.org/2012/631}, } @misc{cryptoeprint:2012:632, author = {Abdoul Aziz Ciss and Djiby Sow}, title = {Pairings on Generalized Huff Curves}, howpublished = {Cryptology ePrint Archive, Report 2012/632}, year = {2012}, url = {http://eprint.iacr.org/2012/632}, } @misc{cryptoeprint:2012:633, author = {Deukjo Hong and Daesung Kwon}, title = {New Preimage Attack on MDC-4}, howpublished = {Cryptology ePrint Archive, Report 2012/633}, year = {2012}, url = {http://eprint.iacr.org/2012/633}, } @misc{cryptoeprint:2012:634, author = {Deukjo Hong and Daesung Kwon}, title = {Cryptanalysis of Double-Block-Length Hash Mode MJH}, howpublished = {Cryptology ePrint Archive, Report 2012/634}, year = {2012}, url = {http://eprint.iacr.org/2012/634}, } @misc{cryptoeprint:2012:635, author = {Jin Li and Jingwei Li and Xiaofeng Chen and Chunfu Jia and Duncan S. Wong}, title = {Secure Outsourced Attribute-based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2012/635}, year = {2012}, url = {http://eprint.iacr.org/2012/635}, } @misc{cryptoeprint:2012:636, author = {Martin R. Albrecht and Carlos Cid and Jean-Charles Faugère and Robert Fitzpatrick and Ludovic Perret}, title = {On the Complexity of the BKW Algorithm on LWE}, howpublished = {Cryptology ePrint Archive, Report 2012/636}, year = {2012}, url = {http://eprint.iacr.org/2012/636}, } @misc{cryptoeprint:2012:637, author = {Aviad Kipnis and Eliphaz Hibshoosh}, title = {Efficient Methods for Practical Fully Homomorphic Symmetric-key Encrypton, Randomization and Verification}, howpublished = {Cryptology ePrint Archive, Report 2012/637}, year = {2012}, url = {http://eprint.iacr.org/2012/637}, } @misc{cryptoeprint:2012:638, author = {Cai-xue Zhou}, title = {Cryptanalysis and Improvement of a Multi-Receiver Generalized Signcryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2012/638}, year = {2012}, url = {http://eprint.iacr.org/2012/638}, } @misc{cryptoeprint:2012:639, author = {Daniel Loebenberger and Michael Nüsken}, title = {Coarse-grained integer - Smooth? Rough? Both!}, howpublished = {Cryptology ePrint Archive, Report 2012/639}, year = {2012}, url = {http://eprint.iacr.org/2012/639}, } @misc{cryptoeprint:2012:640, author = {Gaoli Wang and Yanzhao Shen}, title = {Preimage and Pseudo-Collision Attacks on Step-Reduced SM3 Hash Function}, howpublished = {Cryptology ePrint Archive, Report 2012/640}, year = {2012}, url = {http://eprint.iacr.org/2012/640}, } @misc{cryptoeprint:2012:641, author = {Bin Wang}, title = {A unidirectional conditional proxy re-encryption scheme based on non-monotonic access structure}, howpublished = {Cryptology ePrint Archive, Report 2012/641}, year = {2012}, url = {http://eprint.iacr.org/2012/641}, } @misc{cryptoeprint:2012:642, author = {Ivan Damgard and Marcel Keller and Enrique Larraia and Valerio Pastro and Peter Scholl and Nigel P. Smart}, title = {Practical Covertly Secure MPC for Dishonest Majority – or: Breaking the SPDZ Limits}, howpublished = {Cryptology ePrint Archive, Report 2012/642}, year = {2012}, url = {http://eprint.iacr.org/2012/642}, } @misc{cryptoeprint:2012:643, author = {Amos Beimel and Eran Omri and Ilan Orlov}, title = {Protocols for Multiparty Coin Toss With Dishonest Majority}, howpublished = {Cryptology ePrint Archive, Report 2012/643}, year = {2012}, url = {http://eprint.iacr.org/2012/643}, } @misc{cryptoeprint:2012:644, author = {Atul Luykx and Elena Andreeva and Bart Mennink and Bart Preneel}, title = {Impossibility Results for Indifferentiability with Resets}, howpublished = {Cryptology ePrint Archive, Report 2012/644}, year = {2012}, url = {http://eprint.iacr.org/2012/644}, } @misc{cryptoeprint:2012:645, author = {Eduarda S. V. Freire, Kenneth G. Paterson, Bertram Poettering}, title = {Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes}, howpublished = {Cryptology ePrint Archive, Report 2012/645}, year = {2012}, url = {http://eprint.iacr.org/2012/645}, } @misc{cryptoeprint:2012:646, author = {Sanjit Chatterjee and Chethan Kamath and Vikas Kumar}, title = {Galindo-Garcia Identity-Based Signature Revisited}, howpublished = {Cryptology ePrint Archive, Report 2012/646}, year = {2012}, url = {http://eprint.iacr.org/2012/646}, } @misc{cryptoeprint:2012:647, author = {Daniel Smith-Tone and Cristina Tone}, title = {A Measure of Dependence for Cryptographic Primitives Relative to Ideal Functions}, howpublished = {Cryptology ePrint Archive, Report 2012/647}, year = {2012}, url = {http://eprint.iacr.org/2012/647}, } @misc{cryptoeprint:2012:648, author = {Qiang Tang}, title = {Search in Encrypted Data: Theoretical Models and Practical Applications}, howpublished = {Cryptology ePrint Archive, Report 2012/648}, year = {2012}, url = {http://eprint.iacr.org/2012/648}, } @misc{cryptoeprint:2012:649, author = {Yannick Seurin and Joana Treger}, title = {A Robust and Plaintext-Aware Variant of Signed ElGamal Encryption }, howpublished = {Cryptology ePrint Archive, Report 2012/649}, year = {2012}, url = {http://eprint.iacr.org/2012/649}, } @misc{cryptoeprint:2012:650, author = {Ben Smyth and Mark D. Ryan and Liqun Chen}, title = {Formal analysis of privacy in Direct Anonymous Attestation schemes}, howpublished = {Cryptology ePrint Archive, Report 2012/650}, year = {2012}, url = {http://eprint.iacr.org/2012/650}, } @misc{cryptoeprint:2012:651, author = {Kan Yang and Zhen Liu and Zhenfu Cao and Xiaohua Jia and Duncan S. Wong and Kui Ren}, title = {TAAC: Temporal Attribute-based Access Control for Multi-Authority Cloud Storage Systems}, howpublished = {Cryptology ePrint Archive, Report 2012/651}, year = {2012}, url = {http://eprint.iacr.org/2012/651}, } @misc{cryptoeprint:2012:652, author = {Vipul Goyal and Omkant Pandey and Amit Sahai}, title = {Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma}, howpublished = {Cryptology ePrint Archive, Report 2012/652}, year = {2012}, url = {http://eprint.iacr.org/2012/652}, } @misc{cryptoeprint:2012:653, author = {Periklis A. Papakonstantinou and Charles W. Rackoff and Yevgeniy Vahlis}, title = {How powerful are the DDH hard groups?}, howpublished = {Cryptology ePrint Archive, Report 2012/653}, year = {2012}, url = {http://eprint.iacr.org/2012/653}, } @misc{cryptoeprint:2012:654, author = {Qiang Tang and Yuanjie Zhao and Xiaofeng Chen and Hua Ma}, title = {Refine the Concept of Public Key Encryption with Delegated Search}, howpublished = {Cryptology ePrint Archive, Report 2012/654}, year = {2012}, url = {http://eprint.iacr.org/2012/654}, } @misc{cryptoeprint:2012:655, author = {Kwangsu Lee and Intae Kim and Seong Oun Hwang}, title = {Privacy Preserving Revocable Predicate Encryption Revisited}, howpublished = {Cryptology ePrint Archive, Report 2012/655}, year = {2012}, url = {http://eprint.iacr.org/2012/655}, } @misc{cryptoeprint:2012:656, author = {Mohammad Ali Orumiehchiha and Josef Pieprzyk and Elham Shakour and Ron Steinfeld}, title = {Security Evaluation of Rakaposhi Stream Cipher}, howpublished = {Cryptology ePrint Archive, Report 2012/656}, year = {2012}, url = {http://eprint.iacr.org/2012/656}, } @misc{cryptoeprint:2012:657, author = {Sungwook Kim and Jung Hee Cheon}, title = {Fixed Argument Pairing Inversion on Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2012/657}, year = {2012}, url = {http://eprint.iacr.org/2012/657}, } @misc{cryptoeprint:2012:658, author = {Eike Kiltz and Krzysztof Pietrzak and Mario Szegedy}, title = {Digital Signatures with Minimal Overhead}, howpublished = {Cryptology ePrint Archive, Report 2012/658}, year = {2012}, url = {http://eprint.iacr.org/2012/658}, } @misc{cryptoeprint:2012:659, author = {Hassan Jameel Asghar and Shujun Li and Ron Steinfeld and Josef Pierpzyk}, title = {Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks}, howpublished = {Cryptology ePrint Archive, Report 2012/659}, year = {2012}, url = {http://eprint.iacr.org/2012/659}, } @misc{cryptoeprint:2012:660, author = {Munivel E and Rajeswari Mukesh}, title = {Design of Secure Image Transmission in MANET using Number Theory Based Image Compression and Quasigroup Encryption (NTICQE) Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2012/660}, year = {2012}, url = {http://eprint.iacr.org/2012/660}, } @misc{cryptoeprint:2012:661, author = {Markus Dichtl and Pascale B\"offgen}, title = {Breaking Another Quasigroup-Based Cryptographic Scheme}, howpublished = {Cryptology ePrint Archive, Report 2012/661}, year = {2012}, url = {http://eprint.iacr.org/2012/661}, } @misc{cryptoeprint:2012:662, author = {Julian Murphy}, title = {Asynchronous Physical Unclonable Functions – AsyncPUF}, howpublished = {Cryptology ePrint Archive, Report 2012/662}, year = {2012}, url = {http://eprint.iacr.org/2012/662}, } @misc{cryptoeprint:2012:663, author = {Alexander Rostovtsev}, title = {Virtual isomorphisms of ciphers: is AES secure against differential / linear attack?}, howpublished = {Cryptology ePrint Archive, Report 2012/663}, year = {2012}, url = {http://eprint.iacr.org/2012/663}, } @misc{cryptoeprint:2012:664, author = {Jiang Zhang \and Zhenfeng Zhang \and Yu Chen}, title = {PRE- Stronger Security Notion and Efficient Construction with New Property}, howpublished = {Cryptology ePrint Archive, Report 2012/664}, year = {2012}, url = {http://eprint.iacr.org/2012/664}, } @misc{cryptoeprint:2012:665, author = {Daniel R. L. Brown}, title = {Uniform Compression Functions Can Fail to Preserve “Full” Entropy}, howpublished = {Cryptology ePrint Archive, Report 2012/665}, year = {2012}, url = {http://eprint.iacr.org/2012/665}, } @misc{cryptoeprint:2012:666, author = {Rock C. Liu and Zhiwi Yeh}, title = {Estimating the $\phi(n)$ of Upper/Lower Bound in its RSA Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2012/666}, year = {2012}, url = {http://eprint.iacr.org/2012/666}, } @misc{cryptoeprint:2012:667, author = {Antonino Simone and Boris Skoric}, title = {False Negative probabilities in Tardos codes}, howpublished = {Cryptology ePrint Archive, Report 2012/667}, year = {2012}, url = {http://eprint.iacr.org/2012/667}, } @misc{cryptoeprint:2012:668, author = {Gaetan Leurent}, title = {Construction of Differential Characteristics in ARX Designs -- Application to Skein}, howpublished = {Cryptology ePrint Archive, Report 2012/668}, year = {2012}, url = {http://eprint.iacr.org/2012/668}, } @misc{cryptoeprint:2012:669, author = {Zhen Liu and Zhenfu Cao and Duncan S. Wong}, title = {Expressive Black-box Traceable Ciphertext-Policy Attribute-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2012/669}, year = {2012}, url = {http://eprint.iacr.org/2012/669}, } @misc{cryptoeprint:2012:670, author = {Joppe W. Bos and Craig Costello and Huseyin Hisil and Kristin Lauter}, title = {Two is Greater than One}, howpublished = {Cryptology ePrint Archive, Report 2012/670}, year = {2012}, url = {http://eprint.iacr.org/2012/670}, } @misc{cryptoeprint:2012:671, author = {Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Fully Secure Unbounded Inner-Product and Attribute-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2012/671}, year = {2012}, url = {http://eprint.iacr.org/2012/671}, } @misc{cryptoeprint:2012:672, author = {Itai Dinur and Orr Dunkelman and Adi Shamir}, title = {Self-Differential Cryptanalysis of Up to 5 Rounds of SHA-3}, howpublished = {Cryptology ePrint Archive, Report 2012/672}, year = {2012}, url = {http://eprint.iacr.org/2012/672}, } @misc{cryptoeprint:2012:673, author = {Pooya Farshim and Benoît Libert and Kenneth G. Paterson and Elizabeth A. Quaglia}, title = {Robust Encryption, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2012/673}, year = {2012}, url = {http://eprint.iacr.org/2012/673}, } @misc{cryptoeprint:2012:674, author = {Carles Padro}, title = {Lecture Notes in Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2012/674}, year = {2012}, url = {http://eprint.iacr.org/2012/674}, } @misc{cryptoeprint:2012:675, author = {Yoshinori Aono}, title = {Minkowski sum based lattice construction for solving simultaneous modular equations and applications to RSA}, howpublished = {Cryptology ePrint Archive, Report 2012/675}, year = {2012}, url = {http://eprint.iacr.org/2012/675}, } @misc{cryptoeprint:2012:676, author = {Julia Borghoff}, title = {Mixed-integer Linear Programming in the Analysis of Trivium and Ktantan}, howpublished = {Cryptology ePrint Archive, Report 2012/676}, year = {2012}, url = {http://eprint.iacr.org/2012/676}, } @misc{cryptoeprint:2012:677, author = {Jialin Huang and Xuejia Lai}, title = {What is the Effective Key Length for a Block Cipher: an Attack on Every Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2012/677}, year = {2012}, url = {http://eprint.iacr.org/2012/677}, } @misc{cryptoeprint:2012:678, author = {Benedikt Gierlichs and Jorn-Marc Schmidt and Michael Tunstall}, title = {Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output}, howpublished = {Cryptology ePrint Archive, Report 2012/678}, year = {2012}, url = {http://eprint.iacr.org/2012/678}, } @misc{cryptoeprint:2012:679, author = {Yehuda Lindell and Kobbi Nissim and Claudio Orlandi}, title = {Hiding the Input-Size in Secure Two-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2012/679}, year = {2012}, url = {http://eprint.iacr.org/2012/679}, } @misc{cryptoeprint:2012:680, author = {Oriol Farras,Carles Padro,Chaoping Xing, and An Yang}, title = {Natural Generalizations of Threshold Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2012/680}, year = {2012}, url = {http://eprint.iacr.org/2012/680}, } @misc{cryptoeprint:2012:681, author = {Guang Gong and Mark Aagaard and Xinxin Fan}, title = {Resilience to Distinguishing Attacks on WG-7 Cipher and Their Generalizations}, howpublished = {Cryptology ePrint Archive, Report 2012/681}, year = {2012}, url = {http://eprint.iacr.org/2012/681}, } @misc{cryptoeprint:2012:682, author = {Jiawei Yuan and Shucheng Yu}, title = {Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud}, howpublished = {Cryptology ePrint Archive, Report 2012/682}, year = {2012}, url = {http://eprint.iacr.org/2012/682}, } @misc{cryptoeprint:2012:683, author = {Gildas Avoine and Adrien Bourgeois and Xavier Carpent}, title = {Discarding the Endpoints makes the Cryptanalytic Time-Memory Trade-Offs even Faster}, howpublished = {Cryptology ePrint Archive, Report 2012/683}, year = {2012}, url = {http://eprint.iacr.org/2012/683}, } @misc{cryptoeprint:2012:684, author = {Thomas Peyrin and Yu Sasaki and Lei Wang}, title = {Generic Related-key Attacks for HMAC}, howpublished = {Cryptology ePrint Archive, Report 2012/684}, year = {2012}, url = {http://eprint.iacr.org/2012/684}, } @misc{cryptoeprint:2012:685, author = {Gora Adj and Francisco Rodr\'iguez-Henr\'iquez}, title = {Square root computation over even extension fields }, howpublished = {Cryptology ePrint Archive, Report 2012/685}, year = {2012}, url = {http://eprint.iacr.org/2012/685}, } @misc{cryptoeprint:2012:686, author = {Jian Zou and Wenling Wu and Shuang Wu and Le Dong}, title = {Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Gr{\o}stl}, howpublished = {Cryptology ePrint Archive, Report 2012/686}, year = {2012}, url = {http://eprint.iacr.org/2012/686}, } @misc{cryptoeprint:2012:687, author = {Karyn Benson and Hovav Shacham and Brent Waters}, title = {The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2012/687}, year = {2012}, url = {http://eprint.iacr.org/2012/687}, } @misc{cryptoeprint:2012:688, author = {Jintai Ding}, title = {A Simple Provably Secure Key Exchange Scheme Based on the Learning with Errors Problem}, howpublished = {Cryptology ePrint Archive, Report 2012/688}, year = {2012}, url = {http://eprint.iacr.org/2012/688}, } @misc{cryptoeprint:2012:689, author = {Abishek Kumarasubramanian and Rafail Ostrovsky and Omkant Pandey and Akshay Wadia}, title = {Cryptography Using CAPTCHA Puzzles}, howpublished = {Cryptology ePrint Archive, Report 2012/689}, year = {2012}, url = {http://eprint.iacr.org/2012/689}, } @misc{cryptoeprint:2012:690, author = {Teng Wu and Guang Gong}, title = {The Weakness of Integrity Protection for LTE}, howpublished = {Cryptology ePrint Archive, Report 2012/690}, year = {2012}, url = {http://eprint.iacr.org/2012/690}, } @misc{cryptoeprint:2012:691, author = {Shi Bai and Richard P. Brent and Emmanuel Thom\'e}, title = {Root Optimization of Polynomials in the Number Field Sieve}, howpublished = {Cryptology ePrint Archive, Report 2012/691}, year = {2012}, url = {http://eprint.iacr.org/2012/691}, } @misc{cryptoeprint:2012:692, author = {Yu Chen and Jiang Zhang and Zhenfeng Zhang and Dongdai Lin}, title = {Integrated PKE and PEKS - Stronger Security Notions and New Constructions }, howpublished = {Cryptology ePrint Archive, Report 2012/692}, year = {2012}, url = {http://eprint.iacr.org/2012/692}, } @misc{cryptoeprint:2012:693, author = {Benny Applebaum and Yuval Ishai and Eyal Kushilevitz and Brent Waters}, title = {Encoding Functions with Constant Online Rate or How to Compress Keys in Garbled Circuits}, howpublished = {Cryptology ePrint Archive, Report 2012/693}, year = {2012}, url = {http://eprint.iacr.org/2012/693}, } @misc{cryptoeprint:2012:694, author = {A. D. Myasnikov and A. Ushakov}, title = {Cryptanalysis of matrix conjugation schemes}, howpublished = {Cryptology ePrint Archive, Report 2012/694}, year = {2012}, url = {http://eprint.iacr.org/2012/694}, } @misc{cryptoeprint:2012:695, author = {Gilles Barthe and Juan Manuel Crespo and Benjamin Grégoire and César Kunz and Yassine Lakhnech and Santiago Zanella-Béguelin}, title = {Automated Analysis and Synthesis of Padding-Based Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2012/695}, year = {2012}, url = {http://eprint.iacr.org/2012/695}, } @misc{cryptoeprint:2012:696, author = {Lin Ding and Jie Guan}, title = {Cryptanalysis of RAKAPOSHI Stream Cipher}, howpublished = {Cryptology ePrint Archive, Report 2012/696}, year = {2012}, url = {http://eprint.iacr.org/2012/696}, } @misc{cryptoeprint:2012:697, author = {Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn}, title = {Verifiable Elections That Scale for Free}, howpublished = {Cryptology ePrint Archive, Report 2012/697}, year = {2012}, url = {http://eprint.iacr.org/2012/697}, } @misc{cryptoeprint:2012:698, author = {Joshua Baron and Karim El Defrawy and Kirill Minkovich and Rafail Ostrovsky and Eric Tressler}, title = {5PM: Secure Pattern Matching}, howpublished = {Cryptology ePrint Archive, Report 2012/698}, year = {2012}, url = {http://eprint.iacr.org/2012/698}, } @misc{cryptoeprint:2012:699, author = {Ivan Damg{\aa}rd and Sunoo Park}, title = {Is Public-Key Encryption Based on LPN Practical?}, howpublished = {Cryptology ePrint Archive, Report 2012/699}, year = {2012}, url = {http://eprint.iacr.org/2012/699}, } @misc{cryptoeprint:2012:700, author = {Seung Geol Choi and Jonathan Katz and Hoeteck Wee and Hong-Sheng Zhou}, title = {Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS}, howpublished = {Cryptology ePrint Archive, Report 2012/700}, year = {2012}, url = {http://eprint.iacr.org/2012/700}, } @misc{cryptoeprint:2012:701, author = {Noboru Kunihiro and Naoyuki Shinohara and Tetsuya Izu}, title = {Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors}, howpublished = {Cryptology ePrint Archive, Report 2012/701}, year = {2012}, url = {http://eprint.iacr.org/2012/701}, } @misc{cryptoeprint:2012:702, author = {Nasour Bagheri, Masoumeh Safkhani, Pedro Peris-Lopez, Juan E. Tapiador}, title = {Cryptanalysis of RAPP, an RFID Authentication Protocol}, howpublished = {Cryptology ePrint Archive, Report 2012/702}, year = {2012}, url = {http://eprint.iacr.org/2012/702}, } @misc{cryptoeprint:2012:703, author = {Nicolas Debande and Maël Berthier and Yves Bocktaels and Thanh-Ha Le}, title = {Profiled Model Based Power Simulator for Side Channel Evaluation}, howpublished = {Cryptology ePrint Archive, Report 2012/703}, year = {2012}, url = {http://eprint.iacr.org/2012/703}, } @misc{cryptoeprint:2012:704, author = {Sebastian Faust and Markulf Kohlweiss and Giorgia Azzurra Marson and Daniele Venturi}, title = {On the Non-malleability of the Fiat-Shamir Transform}, howpublished = {Cryptology ePrint Archive, Report 2012/704}, year = {2012}, url = {http://eprint.iacr.org/2012/704}, } @misc{cryptoeprint:2012:705, author = {Nir Bitansky and Sanjam Garg and Daniel Wichs}, title = {Why "Fiat-Shamir for Proofs" Lacks a Proof}, howpublished = {Cryptology ePrint Archive, Report 2012/705}, year = {2012}, url = {http://eprint.iacr.org/2012/705}, } @misc{cryptoeprint:2012:706, author = {Dana Dachman-Soled and Abhishek Jain and Yael Tauman Kalai and Adriana Lopez-Alt }, title = {On the (In)security of the Fiat-Shamir Paradigm, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2012/706}, year = {2012}, url = {http://eprint.iacr.org/2012/706}, } @misc{cryptoeprint:2012:707, author = {Gaëtan Leurent}, title = {Cryptanalysis of WIDEA}, howpublished = {Cryptology ePrint Archive, Report 2012/707}, year = {2012}, url = {http://eprint.iacr.org/2012/707}, } @misc{cryptoeprint:2012:708, author = {Gilad Asharov and Claudio Orlandi}, title = {Calling out Cheaters: Covert Security With Public Verifiability}, howpublished = {Cryptology ePrint Archive, Report 2012/708}, year = {2012}, url = {http://eprint.iacr.org/2012/708}, } @misc{cryptoeprint:2012:709, author = {Qun-Xiong Zheng and Wen-Feng Qi}, title = {Further results on the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers}, howpublished = {Cryptology ePrint Archive, Report 2012/709}, year = {2012}, url = {http://eprint.iacr.org/2012/709}, } @misc{cryptoeprint:2012:710, author = {Prabhanjan Ananth and Raghav Bhaskar}, title = {Non Observability in the Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2012/710}, year = {2012}, url = {http://eprint.iacr.org/2012/710}, } @misc{cryptoeprint:2012:711, author = {Kai-Min Chung and Edward Lui and Mohammad Mahmoody and Rafael Pass}, title = {Unprovable Security of Two-Message Zero Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2012/711}, year = {2012}, url = {http://eprint.iacr.org/2012/711}, } @misc{cryptoeprint:2012:712, author = {Farzaneh Abed and Eik List and Stefan Lucks}, title = {On the Security of the Core of PRINCE Against Biclique and Differential Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2012/712}, year = {2012}, url = {http://eprint.iacr.org/2012/712}, } @misc{cryptoeprint:2012:713, author = {Aurelien Francillon and Quan Nguyen and Kasper B. Rasmussen and Gene Tsudik}, title = {Systematic Treatment of Remote Attestation}, howpublished = {Cryptology ePrint Archive, Report 2012/713}, year = {2012}, url = {http://eprint.iacr.org/2012/713}, } @misc{cryptoeprint:2012:714, author = {Shweta Agrawal and Craig Gentry and Shai Halevi and Amit Sahai}, title = {Sampling Discrete Gaussians Efficiently and Obliviously}, howpublished = {Cryptology ePrint Archive, Report 2012/714}, year = {2012}, url = {http://eprint.iacr.org/2012/714}, } @misc{cryptoeprint:2012:715, author = {Jingyuan Zhao and Meiqin Wang and Jiazhe Chen and Yuliang Zheng}, title = {New Impossible Differential Attack on $\text{SAFER}_{+}$ and $\text{SAFER}_{++}$}, howpublished = {Cryptology ePrint Archive, Report 2012/715}, year = {2012}, url = {http://eprint.iacr.org/2012/715}, } @misc{cryptoeprint:2012:716, author = {Xavier Boyen}, title = {Attribute-Based Functional Encryption on Lattices}, howpublished = {Cryptology ePrint Archive, Report 2012/716}, year = {2012}, url = {http://eprint.iacr.org/2012/716}, } @misc{cryptoeprint:2012:717, author = {Jan Camenisch and Anna Lysyanskaya and Gregory Neven}, title = {Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2012/717}, year = {2012}, url = {http://eprint.iacr.org/2012/717}, } @misc{cryptoeprint:2012:718, author = {Nir Bitansky and Alessandro Chiesa and Yuval Ishai and Rafail Ostrovsky and Omer Paneth}, title = {Succinct Non-Interactive Arguments via Linear Interactive Proofs}, howpublished = {Cryptology ePrint Archive, Report 2012/718}, year = {2012}, url = {http://eprint.iacr.org/2012/718}, } @misc{cryptoeprint:2012:719, author = {Yun Song , Zhihui Li}, title = {An ideal multi-secret sharing scheme based on minimal privileged coalitions }, howpublished = {Cryptology ePrint Archive, Report 2012/719}, year = {2012}, url = {http://eprint.iacr.org/2012/719}, } @misc{cryptoeprint:2012:720, author = {Antoine Joux}, title = {Faster index calculus for the medium prime case. Application to a 1175-bit finite field}, howpublished = {Cryptology ePrint Archive, Report 2012/720}, year = {2012}, url = {http://eprint.iacr.org/2012/720}, } @misc{cryptoeprint:2012:721, author = {Prabhanjan Ananth and Raghav Bhaskar and Vipul Goyal and Vanishree Rao}, title = {On the (In)security of Fischlin's Paradigm}, howpublished = {Cryptology ePrint Archive, Report 2012/721}, year = {2012}, url = {http://eprint.iacr.org/2012/721}, } @misc{cryptoeprint:2012:722, author = {Itay Berman and Iftach Haitner and Ilan Komargodski and Moni Naor}, title = {Hardness Preserving Reductions via Cuckoo Hashing}, howpublished = {Cryptology ePrint Archive, Report 2012/722}, year = {2012}, url = {http://eprint.iacr.org/2012/722}, } @misc{cryptoeprint:2012:723, author = {Yaacov Belenky, Zeev Geyzel, Michael Kara-Ivanov and Avraham Entelis}, title = {Two Exponentiation Algorithms Resistant to Cross-correlation Power Analysis and to Other Known Attacks}, howpublished = {Cryptology ePrint Archive, Report 2012/723}, year = {2012}, url = {http://eprint.iacr.org/2012/723}, } @misc{cryptoeprint:2012:724, author = {Kenneth G. Paterson and Antigoni Polychroniadou and Dale L. Sibborn}, title = {A Coding-Theoretic Approach to Recovering Noisy RSA Keys}, howpublished = {Cryptology ePrint Archive, Report 2012/724}, year = {2012}, url = {http://eprint.iacr.org/2012/724}, } @misc{cryptoeprint:2012:725, author = {Qingfeng Cheng}, title = {Cryptanalysis of an efficient certificateless two-party authenticated key agreement protocol}, howpublished = {Cryptology ePrint Archive, Report 2012/725}, year = {2012}, url = {http://eprint.iacr.org/2012/725}, } @misc{cryptoeprint:2012:726, author = {Marc Obrador and Paz Morillo and Sandra Guasch}, title = {Applications of Polynomial Properties to Verifiable Delegation of Computation and Electronic Voting}, howpublished = {Cryptology ePrint Archive, Report 2012/726}, year = {2012}, url = {http://eprint.iacr.org/2012/726}, } @misc{cryptoeprint:2012:727, author = {Dana Dachman-Soled}, title = {On the Impossibility of Sender-Deniable Public Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2012/727}, year = {2012}, url = {http://eprint.iacr.org/2012/727}, } @misc{cryptoeprint:2012:728, author = {E. Brier and Q. Fortier and R. Korkikian and K. W. Magld and D. Naccache and G. Ozari de Almeida and A. Pommellet and A. H. Ragab and J. Vuillemin}, title = {Defensive Leakage Camouflage}, howpublished = {Cryptology ePrint Archive, Report 2012/728}, year = {2012}, url = {http://eprint.iacr.org/2012/728}, } @misc{cryptoeprint:2012:729, author = {Nir Bitansky and Omer Paneth}, title = {On the Impossibility of Approximate Obfuscation and Applications to Resettable Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2012/729}, year = {2012}, url = {http://eprint.iacr.org/2012/729}, } @misc{cryptoeprint:2012:730, author = {Dalin Chu and Johann Gro{\ss}sch{\"a}dl and Zhe Liu}, title = {Twisted Edwards-Form Elliptic Curve Cryptography for 8-bit AVR-based Sensor Nodes}, howpublished = {Cryptology ePrint Archive, Report 2012/730}, year = {2012}, url = {http://eprint.iacr.org/2012/730}, } @misc{cryptoeprint:2012:731, author = {Gaëtan Leurent}, title = {Time-memory Trade-offs for Near-collisions}, howpublished = {Cryptology ePrint Archive, Report 2012/731}, year = {2012}, url = {http://eprint.iacr.org/2012/731}, } @misc{cryptoeprint:2012:732, author = {Eduarda S.V. Freire and Dennis Hofheinz and Eike Kiltz and Kenneth G. Paterson}, title = {Non-Interactive Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2012/732}, year = {2012}, url = {http://eprint.iacr.org/2012/732}, } @misc{cryptoeprint:2012:733, author = {Shafi Goldwasser and Yael Kalai and Raluca Ada Popa and Vinod Vaikuntanathan and Nickolai Zeldovich}, title = {Succinct Functional Encryption and Applications: Reusable Garbled Circuits and Beyond}, howpublished = {Cryptology ePrint Archive, Report 2012/733}, year = {2012}, url = {http://eprint.iacr.org/2012/733}, } @misc{cryptoeprint:2013:001, author = {Eric Miles and Emanuele Viola}, title = {Shielding circuits with groups}, howpublished = {Cryptology ePrint Archive, Report 2013/001}, year = {2013}, url = {http://eprint.iacr.org/2013/001}, } @misc{cryptoeprint:2013:002, author = {Yu Chen and Zongyang Zhang and Dongdai Lin and Zhenfu Cao}, title = {Generalized (Identity-Based) Hash Proof System and Its Applications }, howpublished = {Cryptology ePrint Archive, Report 2013/002}, year = {2013}, url = {http://eprint.iacr.org/2013/002}, } @misc{cryptoeprint:2013:003, author = {Guillermo Morales-Luna}, title = {On Formal Expressions of BRW-polynomials}, howpublished = {Cryptology ePrint Archive, Report 2013/003}, year = {2013}, url = {http://eprint.iacr.org/2013/003}, } @misc{cryptoeprint:2013:004, author = {Damien Stehlé and Ron Steinfeld}, title = {Making NTRUEncrypt and NTRUSign as Secure as Standard Worst-Case Problems over Ideal Lattices}, howpublished = {Cryptology ePrint Archive, Report 2013/004}, year = {2013}, url = {http://eprint.iacr.org/2013/004}, } @misc{cryptoeprint:2013:005, author = {Riadh Brinci, Walid Khmiriy, Mefteh Mbarekz, Abdellatif Ben Rabaˆa, Ammar Bouallegue and Faouzi Chekir}, title = {Efficient Multiplier for pairings over Barreto-Naehrig Curves on Virtex-6 FPGA}, howpublished = {Cryptology ePrint Archive, Report 2013/005}, year = {2013}, url = {http://eprint.iacr.org/2013/005}, } @misc{cryptoeprint:2013:006, author = {Qingfeng Cheng}, title = {Cryptanalysis of a pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks}, howpublished = {Cryptology ePrint Archive, Report 2013/006}, year = {2013}, url = {http://eprint.iacr.org/2013/006}, } @misc{cryptoeprint:2013:007, author = {Yuyin Yu and Mingsheng Wang and Yongqiang Li}, title = {A Matrix Approach for Constructing Quadratic APN Functions}, howpublished = {Cryptology ePrint Archive, Report 2013/007}, year = {2013}, url = {http://eprint.iacr.org/2013/007}, } @misc{cryptoeprint:2013:008, author = {Kai-Min Chung and Rafael Pass and Karn Seth}, title = {Non-Black-Box Simulation from One-Way Functions And Applications to Resettable Security}, howpublished = {Cryptology ePrint Archive, Report 2013/008}, year = {2013}, url = {http://eprint.iacr.org/2013/008}, } @misc{cryptoeprint:2013:009, author = {Benedikt Driessen and Markus Dürmuth}, title = {Achieving Anonymity Against Major Face Recognition Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2013/009}, year = {2013}, url = {http://eprint.iacr.org/2013/009}, } @misc{cryptoeprint:2013:010, author = {Kai-Min Chung and Rafael Pass}, title = {Simultaneous Resettable WI from One-way Functions}, howpublished = {Cryptology ePrint Archive, Report 2013/010}, year = {2013}, url = {http://eprint.iacr.org/2013/010}, } @misc{cryptoeprint:2013:011, author = {James McLaughlin and John A. Clark}, title = {Evolving balanced Boolean functions with optimal resistance to algebraic and fast algebraic attacks, maximal algebraic degree, and very high nonlinearity.}, howpublished = {Cryptology ePrint Archive, Report 2013/011}, year = {2013}, url = {http://eprint.iacr.org/2013/011}, } @misc{cryptoeprint:2013:012, author = {Dima Grigoriev and Vladimir Shpilrain }, title = {Tropical cryptography}, howpublished = {Cryptology ePrint Archive, Report 2013/012}, year = {2013}, url = {http://eprint.iacr.org/2013/012}, } @misc{cryptoeprint:2013:013, author = {Andreas Peter and Erik Tews and Stefan Katzenbeisser}, title = {Efficiently Outsourcing Multiparty Computation under Multiple Keys}, howpublished = {Cryptology ePrint Archive, Report 2013/013}, year = {2013}, url = {http://eprint.iacr.org/2013/013}, } @misc{cryptoeprint:2013:014, author = {Ta Vinh Thong and Amit Dvir}, title = {On formal and automatic security verification of WSN transport protocols}, howpublished = {Cryptology ePrint Archive, Report 2013/014}, year = {2013}, url = {http://eprint.iacr.org/2013/014}, } @misc{cryptoeprint:2013:015, author = {Graham Enos}, title = {Complete and Unified Group Laws are not Enough for Elliptic Curve Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2013/015}, year = {2013}, url = {http://eprint.iacr.org/2013/015}, } @misc{cryptoeprint:2013:016, author = {Jae Hong Seo and Keita Emura}, title = {Revocable Identity-Based Encryption Revisited: Security Model and Construction}, howpublished = {Cryptology ePrint Archive, Report 2013/016}, year = {2013}, url = {http://eprint.iacr.org/2013/016}, } @misc{cryptoeprint:2013:017, author = {Alexandra Boldyreva and Robert Lychev}, title = {Provable Security of S-BGP and other Path Vector Protocols: Model, Analysis and Extensions}, howpublished = {Cryptology ePrint Archive, Report 2013/017}, year = {2013}, url = {http://eprint.iacr.org/2013/017}, } @misc{cryptoeprint:2013:018, author = {Jae Hong Seo and Keita Emura}, title = {Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2013/018}, year = {2013}, url = {http://eprint.iacr.org/2013/018}, } @misc{cryptoeprint:2013:019, author = {Peter Gaži}, title = {On the Security of Plain and Randomized Cascades}, howpublished = {Cryptology ePrint Archive, Report 2013/019}, year = {2013}, url = {http://eprint.iacr.org/2013/019}, } @misc{cryptoeprint:2013:020, author = {Markus Rückert and Dominique Schroeder}, title = {Aggregate and Verifiably Encrypted Signatures from Multilinear Maps Without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2013/020}, year = {2013}, url = {http://eprint.iacr.org/2013/020}, } @misc{cryptoeprint:2013:021, author = {Özgür Dagdelen and Payman Mohassel and Daniele Venturi}, title = {Rate-Limited Secure Function Evaluation: Definitions and Constructions}, howpublished = {Cryptology ePrint Archive, Report 2013/021}, year = {2013}, url = {http://eprint.iacr.org/2013/021}, } @misc{cryptoeprint:2013:022, author = {James McLaughlin and John A. Clark}, title = {Nonlinear cryptanalysis of reduced-round Serpent and metaheuristic search for S-box approximations.}, howpublished = {Cryptology ePrint Archive, Report 2013/022}, year = {2013}, url = {http://eprint.iacr.org/2013/022}, } @misc{cryptoeprint:2013:023, author = {Jong Hwan Park and Dong Hoon Lee}, title = {A New Practical Identity-Based Encryption System}, howpublished = {Cryptology ePrint Archive, Report 2013/023}, year = {2013}, url = {http://eprint.iacr.org/2013/023}, } @misc{cryptoeprint:2013:024, author = {Gook Hwa Cho and Namhun Koo and Eunhye Ha and Soonhak Kwon}, title = {New Cube Root Algorithm Based on Third Order Linear Recurrence Relation in Finite Field}, howpublished = {Cryptology ePrint Archive, Report 2013/024}, year = {2013}, url = {http://eprint.iacr.org/2013/024}, } @misc{cryptoeprint:2013:025, author = {Ralf Kuesters and Max Tuengerthal}, title = {The IITM Model: a Simple and Expressive Model for Universal Composability}, howpublished = {Cryptology ePrint Archive, Report 2013/025}, year = {2013}, url = {http://eprint.iacr.org/2013/025}, } @misc{cryptoeprint:2013:026, author = {Constantinos Patsakis}, title = {RSA private key reconstruction from random bits using SAT solvers}, howpublished = {Cryptology ePrint Archive, Report 2013/026}, year = {2013}, url = {http://eprint.iacr.org/2013/026}, } @misc{cryptoeprint:2013:027, author = {Ming-Feng Lee and Nigel P. Smart and Bogdan Warinschi and Gaven Watson}, title = {Anonymity Guarantees of the UMTS/LTE Authentication and Connection Protocol}, howpublished = {Cryptology ePrint Archive, Report 2013/027}, year = {2013}, url = {http://eprint.iacr.org/2013/027}, } @misc{cryptoeprint:2013:028, author = {Stanislav Bulygin}, title = {More on linear hulls of PRESENT-like ciphers and a cryptanalysis of full-round EPCBC-96}, howpublished = {Cryptology ePrint Archive, Report 2013/028}, year = {2013}, url = {http://eprint.iacr.org/2013/028}, } @misc{cryptoeprint:2013:029, author = {Subhadeep Banik and Subhamoy Maitra}, title = {A Differential Fault Attack on MICKEY 2.0}, howpublished = {Cryptology ePrint Archive, Report 2013/029}, year = {2013}, url = {http://eprint.iacr.org/2013/029}, } @misc{cryptoeprint:2013:030, author = {Haiyan Sun}, title = {On the security of an identity-based authenticated group key agreement protocol for imbalanced mobile networks}, howpublished = {Cryptology ePrint Archive, Report 2013/030}, year = {2013}, url = {http://eprint.iacr.org/2013/030}, } @misc{cryptoeprint:2013:031, author = {Christina Brzuska and Nigel P. Smart and Bogdan Warinschi and Gaven J. Watson}, title = {EMV Key Agreement}, howpublished = {Cryptology ePrint Archive, Report 2013/031}, year = {2013}, url = {http://eprint.iacr.org/2013/031}, } @misc{cryptoeprint:2013:032, author = {Maki Yoshida and Satoshi Obana}, title = {Detection of Cheaters in Non-interactive Polynomial Evaluation}, howpublished = {Cryptology ePrint Archive, Report 2013/032}, year = {2013}, url = {http://eprint.iacr.org/2013/032}, } @misc{cryptoeprint:2013:033, author = {Yu Chen and Zongyang Zhang and Dongdai Lin and Zhenfu Cao}, title = {CCA-Secure IB-KEM from Identity-Based Extractable Hash Proof Systems}, howpublished = {Cryptology ePrint Archive, Report 2013/033}, year = {2013}, url = {http://eprint.iacr.org/2013/033}, } @misc{cryptoeprint:2013:034, author = {Fabrice Ben Hamouda and Olivier Blazy and C{\'e}line Chevalier and David Pointcheval and Damien Vergnaud}, title = {New Smooth Projective Hash Functions and One-Round Authenticated Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2013/034}, year = {2013}, url = {http://eprint.iacr.org/2013/034}, } @misc{cryptoeprint:2013:035, author = {Muhammad Qasim Saeed}, title = {Improvements to NFC Mobile Transaction and Authentication Protocol}, howpublished = {Cryptology ePrint Archive, Report 2013/035}, year = {2013}, url = {http://eprint.iacr.org/2013/035}, } @misc{cryptoeprint:2013:036, author = {Jean-Sébastien Coron and Tancrède Lepoint and Mehdi Tibouchi}, title = {Batch Fully Homomorphic Encryption over the Integers}, howpublished = {Cryptology ePrint Archive, Report 2013/036}, year = {2013}, url = {http://eprint.iacr.org/2013/036}, } @misc{cryptoeprint:2013:037, author = {Jayaprakash Kar}, title = {Provably Secure Identity-Based Aggregate Signcryption Scheme in Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2013/037}, year = {2013}, url = {http://eprint.iacr.org/2013/037}, } @misc{cryptoeprint:2013:038, author = {Dominique Schröder and Heike Schröder}, title = {Verifiable Data Streaming}, howpublished = {Cryptology ePrint Archive, Report 2013/038}, year = {2013}, url = {http://eprint.iacr.org/2013/038}, } @misc{cryptoeprint:2013:039, author = {Thomas Plantard and Michael Schneider}, title = {Creating a Challenge for Ideal Lattices}, howpublished = {Cryptology ePrint Archive, Report 2013/039}, year = {2013}, url = {http://eprint.iacr.org/2013/039}, } @misc{cryptoeprint:2013:040, author = {Roohallah Rastaghi}, title = {An Efficient CCA2-Secure Variant of the McEliece Cryptosystem in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2013/040}, year = {2013}, url = {http://eprint.iacr.org/2013/040}, } @misc{cryptoeprint:2013:041, author = {Gook Hwa Cho and Namhun Koo and Eunhye Ha and Soonhak Kwon}, title = {Trace Expression of r-th Root over Finite Field}, howpublished = {Cryptology ePrint Archive, Report 2013/041}, year = {2013}, url = {http://eprint.iacr.org/2013/041}, } @misc{cryptoeprint:2013:042, author = {Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek}, title = {Complexity of Multi-Party Computation Functionalities}, howpublished = {Cryptology ePrint Archive, Report 2013/042}, year = {2013}, url = {http://eprint.iacr.org/2013/042}, } @misc{cryptoeprint:2013:043, author = {Ling Song and Lei Hu}, title = {Differential Fault Attack on the PRINCE Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2013/043}, year = {2013}, url = {http://eprint.iacr.org/2013/043}, } @misc{cryptoeprint:2013:044, author = {Fangguo Zhang and Xu Ma and Shengli Liu}, title = {Efficient Computation Outsourcing for Inverting a Class of Homomorphic Functions}, howpublished = {Cryptology ePrint Archive, Report 2013/044}, year = {2013}, url = {http://eprint.iacr.org/2013/044}, } @misc{cryptoeprint:2013:045, author = {Jiawei Yuan and Shucheng Yu}, title = {Towards Efficient Verifiable SQL Query for Outsourced Dynamic Databases in Cloud}, howpublished = {Cryptology ePrint Archive, Report 2013/045}, year = {2013}, url = {http://eprint.iacr.org/2013/045}, } @misc{cryptoeprint:2013:046, author = {Tore Kasper Frederiksen and Jesper Buus Nielsen}, title = {Fast and Maliciously Secure Two-Party Computation Using the GPU}, howpublished = {Cryptology ePrint Archive, Report 2013/046}, year = {2013}, url = {http://eprint.iacr.org/2013/046}, } @misc{cryptoeprint:2013:047, author = {Carles Padro}, title = {Lower Bounds on the Information Ratio of Linear Secret Sharing Schemes}, howpublished = {Cryptology ePrint Archive, Report 2013/047}, year = {2013}, url = {http://eprint.iacr.org/2013/047}, } @misc{cryptoeprint:2013:048, author = {Basel Halak, Julian Murphy, Alex Yakovlev}, title = {Power Balanced Circuits for Leakage-Power-Attacks Resilient Design}, howpublished = {Cryptology ePrint Archive, Report 2013/048}, year = {2013}, url = {http://eprint.iacr.org/2013/048}, } @misc{cryptoeprint:2013:049, author = {Christopher Meyer and Jörg Schwenk}, title = {Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks And Weaknesses}, howpublished = {Cryptology ePrint Archive, Report 2013/049}, year = {2013}, url = {http://eprint.iacr.org/2013/049}, } @misc{cryptoeprint:2013:050, author = {Roohallah Rastaghi}, title = {Cryptanalysis and Improvement of Akleylek et al.'s cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2013/050}, year = {2013}, url = {http://eprint.iacr.org/2013/050}, } @misc{cryptoeprint:2013:051, author = {Payman Mohassel and Ben Riva}, title = {Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation }, howpublished = {Cryptology ePrint Archive, Report 2013/051}, year = {2013}, url = {http://eprint.iacr.org/2013/051}, } @misc{cryptoeprint:2013:052, author = {Kuan Cheng}, title = {Some Improved Results for uSVP and GapSVP}, howpublished = {Cryptology ePrint Archive, Report 2013/052}, year = {2013}, url = {http://eprint.iacr.org/2013/052}, } @misc{cryptoeprint:2013:053, author = {Yinxia Sun and Futai Zhang and Limin Shen and Robert H. Deng}, title = {A revocable certificateless signature scheme}, howpublished = {Cryptology ePrint Archive, Report 2013/053}, year = {2013}, url = {http://eprint.iacr.org/2013/053}, } @misc{cryptoeprint:2013:054, author = {Ali Aydın Selçuk and Ramazan Yılmaz}, title = {Joint Compartmented Threshold Access Structures}, howpublished = {Cryptology ePrint Archive, Report 2013/054}, year = {2013}, url = {http://eprint.iacr.org/2013/054}, } @misc{cryptoeprint:2013:055, author = {Dima Grigoriev and Vladimir Shpilrain}, title = {Secrecy without one-way functions}, howpublished = {Cryptology ePrint Archive, Report 2013/055}, year = {2013}, url = {http://eprint.iacr.org/2013/055}, } @misc{cryptoeprint:2013:056, author = {Kishan Chand Gupta and Indranil Ghosh Ray}, title = {On Constructions of MDS Matrices from Companion Matrices for Lightweight Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2013/056}, year = {2013}, url = {http://eprint.iacr.org/2013/056}, } @misc{cryptoeprint:2013:057, author = {Jinsu Kim and Moon Sung Lee and Aaram Yun and Jung Hee Cheon}, title = {CRT-based Fully Homomorphic Encryption over the Integers}, howpublished = {Cryptology ePrint Archive, Report 2013/057}, year = {2013}, url = {http://eprint.iacr.org/2013/057}, } @misc{cryptoeprint:2013:058, author = {Dylan Clarke and Feng Hao}, title = {Cryptanalysis of the Dragonfly Key Exchange Protocol}, howpublished = {Cryptology ePrint Archive, Report 2013/058}, year = {2013}, url = {http://eprint.iacr.org/2013/058}, } @misc{cryptoeprint:2013:059, author = {Ayesha Khalid and Deblin Bagchi and Goutam Paul and Anupam Chattopadhyay}, title = {Optimized GPU Implementation and Performance Analysis of HC Series of Stream Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2013/059}, year = {2013}, url = {http://eprint.iacr.org/2013/059}, } @misc{cryptoeprint:2013:060, author = {Aayush Jain}, title = {On FHE without bootstrapping}, howpublished = {Cryptology ePrint Archive, Report 2013/060}, year = {2013}, url = {http://eprint.iacr.org/2013/060}, } @misc{cryptoeprint:2013:061, author = {Elena Andreeva and Andrey Bogdanov and Yevgeniy Dodis and Bart Mennink and John P. Steinberger}, title = {On the Indifferentiability of Key-Alternating Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2013/061}, year = {2013}, url = {http://eprint.iacr.org/2013/061}, } @misc{cryptoeprint:2013:062, author = {Florian Böhl and Dominique Unruh}, title = {Symbolic Universal Composability}, howpublished = {Cryptology ePrint Archive, Report 2013/062}, year = {2013}, url = {http://eprint.iacr.org/2013/062}, } @misc{cryptoeprint:2013:063, author = {Christian L. F. Corniaux and Hossein Ghodosi}, title = {A Verifiable 1-out-of-n Distributed Oblivious Transfer Protocol}, howpublished = {Cryptology ePrint Archive, Report 2013/063}, year = {2013}, url = {http://eprint.iacr.org/2013/063}, } @misc{cryptoeprint:2013:064, author = {Sven Laur and Bingsheng Zhang}, title = {Lightweight Zero-Knowledge Proofs for Crypto-Computing Protocols}, howpublished = {Cryptology ePrint Archive, Report 2013/064}, year = {2013}, url = {http://eprint.iacr.org/2013/064}, } @misc{cryptoeprint:2013:065, author = {Patrick Weiden and Andreas Hülsing and Daniel Cabarcas and Johannes Buchmann}, title = {Instantiating Treeless Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2013/065}, year = {2013}, url = {http://eprint.iacr.org/2013/065}, } @misc{cryptoeprint:2013:066, author = {Amin Mohammadali; Zahra Ahmadian; Mohammad Reza Aref}, title = {Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard}, howpublished = {Cryptology ePrint Archive, Report 2013/066}, year = {2013}, url = {http://eprint.iacr.org/2013/066}, } @misc{cryptoeprint:2013:067, author = {Guido Bertoni and Joan Daemen and Nicolas Debande and Thanh-Ha Le and Michael Peeters and Gilles Van Assche}, title = {Power Analysis of Hardware Implementations Protected with Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2013/067}, year = {2013}, url = {http://eprint.iacr.org/2013/067}, } @misc{cryptoeprint:2013:068, author = {Allison Lewko and Brent Waters}, title = {Why Proving HIBE Systems Secure is Difficult}, howpublished = {Cryptology ePrint Archive, Report 2013/068}, year = {2013}, url = {http://eprint.iacr.org/2013/068}, } @misc{cryptoeprint:2013:069, author = {Daniele Micciancio and Chris Peikert}, title = {Hardness of SIS and LWE with Small Parameters}, howpublished = {Cryptology ePrint Archive, Report 2013/069}, year = {2013}, url = {http://eprint.iacr.org/2013/069}, } @misc{cryptoeprint:2013:070, author = {Markku-Juhani O. Saarinen}, title = {Related-key Attacks Against Full Hummingbird-2}, howpublished = {Cryptology ePrint Archive, Report 2013/070}, year = {2013}, url = {http://eprint.iacr.org/2013/070}, } @misc{cryptoeprint:2013:071, author = {Jérémie Detrey and Pierrick Gaudry and Marion Videau}, title = {Relation collection for the Function Field Sieve}, howpublished = {Cryptology ePrint Archive, Report 2013/071}, year = {2013}, url = {http://eprint.iacr.org/2013/071}, } @misc{cryptoeprint:2013:072, author = {István Vajda}, title = {The UC approach: an application view}, howpublished = {Cryptology ePrint Archive, Report 2013/072}, year = {2013}, url = {http://eprint.iacr.org/2013/072}, } @misc{cryptoeprint:2013:073, author = {Marek Jawurek and Florian Kerschbaum and Claudio Orlandi}, title = {Zero-Knowledge Using Garbled Circuits: How To Prove Non-Algebraic Statements Efficiently}, howpublished = {Cryptology ePrint Archive, Report 2013/073}, year = {2013}, url = {http://eprint.iacr.org/2013/073}, } @misc{cryptoeprint:2013:074, author = {Faruk Gologlu and Robert Granger and Gary McGuire and Jens Zumbragel}, title = {On the Function Field Sieve and the Impact of Higher Splitting Probabilities: Application to Discrete Logarithms in $\F_{2^{1971}}$}, howpublished = {Cryptology ePrint Archive, Report 2013/074}, year = {2013}, url = {http://eprint.iacr.org/2013/074}, } @misc{cryptoeprint:2013:075, author = {Joppe W. Bos and Kristin Lauter and Jake Loftus and Michael Naehrig}, title = {Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2013/075}, year = {2013}, url = {http://eprint.iacr.org/2013/075}, } @misc{cryptoeprint:2013:076, author = {Ling Ren and Xiangyao Yu and Christopher Fletcher and Marten van Dijk and Srinivas Devadas}, title = {Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors}, howpublished = {Cryptology ePrint Archive, Report 2013/076}, year = {2013}, url = {http://eprint.iacr.org/2013/076}, } @misc{cryptoeprint:2013:077, author = {Kaoru Kurosawa and Ro Nojima and Le Trieu Phong}, title = {UC-Secure Multi-Session OT Using Tamper-Proof Hardware }, howpublished = {Cryptology ePrint Archive, Report 2013/077}, year = {2013}, url = {http://eprint.iacr.org/2013/077}, } @misc{cryptoeprint:2013:078, author = {Nelly Fazio and Antonio R. Nicolosi and Irippuge Milinda Perera}, title = {Broadcast Steganography}, howpublished = {Cryptology ePrint Archive, Report 2013/078}, year = {2013}, url = {http://eprint.iacr.org/2013/078}, } @misc{cryptoeprint:2013:079, author = {Yehuda Lindell}, title = {Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2013/079}, year = {2013}, url = {http://eprint.iacr.org/2013/079}, } @misc{cryptoeprint:2013:080, author = {Grégory Landais and Jean-Pierre Tillich}, title = {An efficient attack of a McEliece cryptosystem variant based on convolutional codes}, howpublished = {Cryptology ePrint Archive, Report 2013/080}, year = {2013}, url = {http://eprint.iacr.org/2013/080}, } @misc{cryptoeprint:2013:081, author = {Yan Huang and Jonathan Katz and Dave Evans}, title = {Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose}, howpublished = {Cryptology ePrint Archive, Report 2013/081}, year = {2013}, url = {http://eprint.iacr.org/2013/081}, } @misc{cryptoeprint:2013:082, author = {Sebastia Martin and Carles Padro and An Yang}, title = {Secret Sharing, Rank Inequalities and Information Inequalities}, howpublished = {Cryptology ePrint Archive, Report 2013/082}, year = {2013}, url = {http://eprint.iacr.org/2013/082}, } @misc{cryptoeprint:2013:083, author = {Frederik Armknecht and Ahmad-Reza Sadeghi and Steffen Schulz and Christian Wachsmann}, title = {Towards Provably Secure Software Attestation}, howpublished = {Cryptology ePrint Archive, Report 2013/083}, year = {2013}, url = {http://eprint.iacr.org/2013/083}, } @misc{cryptoeprint:2013:084, author = {Boris Skoric and Allard P. Mosk and Pepijn W.H. Pinkse}, title = {Security of Quantum-Readout PUFs against quadrature based challenge estimation attacks}, howpublished = {Cryptology ePrint Archive, Report 2013/084}, year = {2013}, url = {http://eprint.iacr.org/2013/084}, } @misc{cryptoeprint:2013:085, author = {Ashish Choudhury and Jake Loftus and Emmanuela Orsini and Arpita Patra and Nigel P. Smart}, title = {Between a Rock and a Hard Place: Interpolating Between MPC and FHE}, howpublished = {Cryptology ePrint Archive, Report 2013/085}, year = {2013}, url = {http://eprint.iacr.org/2013/085}, } @misc{cryptoeprint:2013:086, author = {Travis Mayberry and Erik-Oliver Blass and Agnes Chan}, title = {Path-PIR: Lower Worst-Case Bounds by Combining ORAM and PIR}, howpublished = {Cryptology ePrint Archive, Report 2013/086}, year = {2013}, url = {http://eprint.iacr.org/2013/086}, } @misc{cryptoeprint:2013:087, author = {Namhun Koo and Gook Hwa Cho and Soonhak Kwon}, title = {Square Root Algorithm in F_q for q=2^s+1 (mod 2^(s+1))}, howpublished = {Cryptology ePrint Archive, Report 2013/087}, year = {2013}, url = {http://eprint.iacr.org/2013/087}, } @misc{cryptoeprint:2013:088, author = {Dan Boneh and Mark Zhandry}, title = {Secure Signatures and Chosen Ciphertext Security in a Post-Quantum World}, howpublished = {Cryptology ePrint Archive, Report 2013/088}, year = {2013}, url = {http://eprint.iacr.org/2013/088}, } @misc{cryptoeprint:2013:089, author = {James McLaughlin and John A. Clark}, title = {Filtered nonlinear cryptanalysis of reduced-round Serpent, and the Wrong-Key Randomization Hypothesis.}, howpublished = {Cryptology ePrint Archive, Report 2013/089}, year = {2013}, url = {http://eprint.iacr.org/2013/089}, } @misc{cryptoeprint:2013:090, author = {Somindu C. Ramanna and Palash Sarkar}, title = {Functional Encryption Supporting Recursive Languages}, howpublished = {Cryptology ePrint Archive, Report 2013/090}, year = {2013}, url = {http://eprint.iacr.org/2013/090}, } @misc{cryptoeprint:2013:091, author = {Hui Zhao, Yongbin Zhou, Francois-Xavier Standaert, Hailong Zhang}, title = {Systematic Construction and Comprehensive Evaluation of the Kolmogorov-Smirnov Test based Side-Channel Distinguishers}, howpublished = {Cryptology ePrint Archive, Report 2013/091}, year = {2013}, url = {http://eprint.iacr.org/2013/091}, } @misc{cryptoeprint:2013:092, author = {Vadim Lyubashevsky and Daniel Masny}, title = {Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs}, howpublished = {Cryptology ePrint Archive, Report 2013/092}, year = {2013}, url = {http://eprint.iacr.org/2013/092}, } @misc{cryptoeprint:2013:093, author = {Lin Cheng and Qiaoyan Wen and Zhengping Jin and Hua Zhang and Liming Zhou}, title = {On the security of a certificateless aggregate signature scheme}, howpublished = {Cryptology ePrint Archive, Report 2013/093}, year = {2013}, url = {http://eprint.iacr.org/2013/093}, } @misc{cryptoeprint:2013:094, author = {Adriana Lopez-Alt and Eran Tromer and Vinod Vaikuntanathan}, title = {On-the-Fly Multiparty Computation on the Cloud via Multikey Fully Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2013/094}, year = {2013}, url = {http://eprint.iacr.org/2013/094}, } @misc{cryptoeprint:2013:095, author = {Antoine Joux}, title = {A new index calculus algorithm with complexity $L(1/4+o(1))$ in very small characteristic}, howpublished = {Cryptology ePrint Archive, Report 2013/095}, year = {2013}, url = {http://eprint.iacr.org/2013/095}, } @misc{cryptoeprint:2013:096, author = {Sui-Guan Teo and Harry Bartlett and Ali Alhamdan and Leonie Simpson and Kenneth Koon-Ho Wong and Ed Dawson}, title = {State convergence in bit-based stream ciphers}, howpublished = {Cryptology ePrint Archive, Report 2013/096}, year = {2013}, url = {http://eprint.iacr.org/2013/096}, } @misc{cryptoeprint:2013:097, author = {Zahra Ahmadian and Mahmoud Salmasizadeh and Mohammad Reza Aref}, title = {Biclique Cryptanalysis of the Full-Round KLEIN Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2013/097}, year = {2013}, url = {http://eprint.iacr.org/2013/097}, } @misc{cryptoeprint:2013:098, author = {Joel Alwen and Stephan Krenn and Krzysztof Pietrzak and Daniel Wichs}, title = {Learning with Rounding, Revisited: New Reduction, Properties and Applications}, howpublished = {Cryptology ePrint Archive, Report 2013/098}, year = {2013}, url = {http://eprint.iacr.org/2013/098}, } @misc{cryptoeprint:2013:099, author = {Samuel Ranellucci and Alain Tapp}, title = {Secure Two-Party Computation via Leaky Generalized Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2013/099}, year = {2013}, url = {http://eprint.iacr.org/2013/099}, } @misc{cryptoeprint:2013:100, author = {Niu Liu and Shaohua Tang and Lingling Xu}, title = {Attacks and Comments on Several Recently Proposed Key Management Schemes}, howpublished = {Cryptology ePrint Archive, Report 2013/100}, year = {2013}, url = {http://eprint.iacr.org/2013/100}, } @misc{cryptoeprint:2013:101, author = {Paul Baecher and Christina Brzuska and Marc Fischlin}, title = {Notions of Black-Box Reductions, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2013/101}, year = {2013}, url = {http://eprint.iacr.org/2013/101}, } @misc{cryptoeprint:2013:102, author = {Yuchen Cao, Yongbin Zhou and Zhenmei Yu}, title = {On the Negative Effects of Trend Noise and \\}, howpublished = {Cryptology ePrint Archive, Report 2013/102}, year = {2013}, url = {http://eprint.iacr.org/2013/102}, } @misc{cryptoeprint:2013:103, author = {Martin Hirt and Pavel Raykov}, title = {On the Complexity of Broadcast Setup}, howpublished = {Cryptology ePrint Archive, Report 2013/103}, year = {2013}, url = {http://eprint.iacr.org/2013/103}, } @misc{cryptoeprint:2013:104, author = {James A. Muir}, title = {A Tutorial on White-box AES}, howpublished = {Cryptology ePrint Archive, Report 2013/104}, year = {2013}, url = {http://eprint.iacr.org/2013/104}, } @misc{cryptoeprint:2013:105, author = {Yuval Ishai and Eyal Kushilevitz and Omer Strulovich}, title = {Lossy Chains and Fractional Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2013/105}, year = {2013}, url = {http://eprint.iacr.org/2013/105}, } @misc{cryptoeprint:2013:106, author = {Roohallah Rastaghi}, title = {URDP: General Framework for Direct CCA2 Security from any Lattice-Based PKE Scheme}, howpublished = {Cryptology ePrint Archive, Report 2013/106}, year = {2013}, url = {http://eprint.iacr.org/2013/106}, } @misc{cryptoeprint:2013:107, author = {Murat Cenk and M. Anwar Hasan}, title = {On the Arithmetic Complexity of Strassen-Like Matrix Multiplications}, howpublished = {Cryptology ePrint Archive, Report 2013/107}, year = {2013}, url = {http://eprint.iacr.org/2013/107}, } @misc{cryptoeprint:2013:108, author = {Ivan Damgard and Alessandra Scafuro}, title = {Unconditionally Secure and Universally Composable Commitments from Physical Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2013/108}, year = {2013}, url = {http://eprint.iacr.org/2013/108}, } @misc{cryptoeprint:2013:109, author = {Charanjit S. Jutla and Arnab Roy}, title = {Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces}, howpublished = {Cryptology ePrint Archive, Report 2013/109}, year = {2013}, url = {http://eprint.iacr.org/2013/109}, } @misc{cryptoeprint:2013:110, author = {Gilad Asharov and Yehuda Lindell and Tal Rabin}, title = {Full Characterization of Functions that Imply Fair Coin Tossing and Ramifications to Fairness}, howpublished = {Cryptology ePrint Archive, Report 2013/110}, year = {2013}, url = {http://eprint.iacr.org/2013/110}, } @misc{cryptoeprint:2013:111, author = {Keita Xagawa}, title = {Message Authentication Codes Secure against Additively Related-Key Attacks}, howpublished = {Cryptology ePrint Archive, Report 2013/111}, year = {2013}, url = {http://eprint.iacr.org/2013/111}, } @misc{cryptoeprint:2013:112, author = {Ulrich Rührmair and Jan Sölter and Frank Sehnke and Xiaolin Xu and Ahmed Mahmoud and Vera Stoyanova and Gideon Dror and Jürgen Schmidhuber and Wayne Burleson and Srinivas Devadas}, title = {PUF Modeling Attacks on Simulated and Silicon Data}, howpublished = {Cryptology ePrint Archive, Report 2013/112}, year = {2013}, url = {http://eprint.iacr.org/2013/112}, } @misc{cryptoeprint:2013:113, author = {Nuray At and Jean-Luc Beuchat and Eiji Okamoto and Ismail San and Teppei Yamazaki}, title = {Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA}, howpublished = {Cryptology ePrint Archive, Report 2013/113}, year = {2013}, url = {http://eprint.iacr.org/2013/113}, } @misc{cryptoeprint:2013:114, author = {Delaram Kahrobaei and Charalambos Koupparis and Vladimir Shpilrain}, title = {Public Key Exchange Using Matrices Over Group Rings}, howpublished = {Cryptology ePrint Archive, Report 2013/114}, year = {2013}, url = {http://eprint.iacr.org/2013/114}, } @misc{cryptoeprint:2013:115, author = {Kaitai Liang and Qiong Huang and Roman Schlegel and Duncan S. Wong and Chunming Tang}, title = {A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release}, howpublished = {Cryptology ePrint Archive, Report 2013/115}, year = {2013}, url = {http://eprint.iacr.org/2013/115}, } @misc{cryptoeprint:2013:116, author = {Shiyong Zhang and Gongliang Chen and Lei Fan}, title = {The Algorithm of AAES}, howpublished = {Cryptology ePrint Archive, Report 2013/116}, year = {2013}, url = {http://eprint.iacr.org/2013/116}, } @misc{cryptoeprint:2013:117, author = {Namhun Koo and Gook Hwa Cho and Soonhak Kwon}, title = {On r-th Root Extraction Algorithm in F_q For q=lr^s+1 (mod r^(s+1)) with 0 < l < r and Small s}, howpublished = {Cryptology ePrint Archive, Report 2013/117}, year = {2013}, url = {http://eprint.iacr.org/2013/117}, } @misc{cryptoeprint:2013:118, author = {Jason Hamlet and Robert Brocato}, title = {Speed Optimized Implementations of the QUAD Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2013/118}, year = {2013}, url = {http://eprint.iacr.org/2013/118}, } @misc{cryptoeprint:2013:119, author = {Duc-Phong Le and Chik How Tan}, title = {Speeding up Ate Pairing Computation in Affine Coordinates}, howpublished = {Cryptology ePrint Archive, Report 2013/119}, year = {2013}, url = {http://eprint.iacr.org/2013/119}, } @misc{cryptoeprint:2013:120, author = {Gergely Alpár and Jaap-Henk Hoepman and Wouter Lueks}, title = {An Attack Against Fixed Value Discrete Logarithm Representations}, howpublished = {Cryptology ePrint Archive, Report 2013/120}, year = {2013}, url = {http://eprint.iacr.org/2013/120}, } @misc{cryptoeprint:2013:121, author = {Helger Lipmaa}, title = {Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes}, howpublished = {Cryptology ePrint Archive, Report 2013/121}, year = {2013}, url = {http://eprint.iacr.org/2013/121}, } @misc{cryptoeprint:2013:122, author = {Gaoli Wang}, title = {Practical collision attack on 40-step RIPEMD-128}, howpublished = {Cryptology ePrint Archive, Report 2013/122}, year = {2013}, url = {http://eprint.iacr.org/2013/122}, } @misc{cryptoeprint:2013:123, author = {Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud}, title = {Analysis and Improvement of Lindell's UC-Secure Commitment Schemes}, howpublished = {Cryptology ePrint Archive, Report 2013/123}, year = {2013}, url = {http://eprint.iacr.org/2013/123}, } @misc{cryptoeprint:2013:124, author = {Ivan Damgaard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi}, title = {Tamper Resilient Cryptography Without Self-Destruct}, howpublished = {Cryptology ePrint Archive, Report 2013/124}, year = {2013}, url = {http://eprint.iacr.org/2013/124}, } @misc{cryptoeprint:2013:125, author = {Ananth Raghunathan and Gil Segev and Salil Vadhan}, title = {Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions}, howpublished = {Cryptology ePrint Archive, Report 2013/125}, year = {2013}, url = {http://eprint.iacr.org/2013/125}, } @misc{cryptoeprint:2013:126, author = {Aysajan Abidin and Jan-Åke Larsson}, title = {Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key}, howpublished = {Cryptology ePrint Archive, Report 2013/126}, year = {2013}, url = {http://eprint.iacr.org/2013/126}, } @misc{cryptoeprint:2013:127, author = {Franziskus Kiefer and Mark Manulis}, title = {Oblivious PAKE and Efficient Handling of Password Trials}, howpublished = {Cryptology ePrint Archive, Report 2013/127}, year = {2013}, url = {http://eprint.iacr.org/2013/127}, } @misc{cryptoeprint:2013:128, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Amit Sahai and Brent Waters}, title = {Attribute-Based Encryption for Circuits from Multilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2013/128}, year = {2013}, url = {http://eprint.iacr.org/2013/128}, } @misc{cryptoeprint:2013:129, author = {Raluca Ada Popa and Frank H. Li and Nickolai Zeldovich}, title = {An Ideal-Security Protocol for Order-Preserving Encoding}, howpublished = {Cryptology ePrint Archive, Report 2013/129}, year = {2013}, url = {http://eprint.iacr.org/2013/129}, } @misc{cryptoeprint:2013:130, author = {Christian Hanser and Daniel Slamanig}, title = {Blank Digital Signatures}, howpublished = {Cryptology ePrint Archive, Report 2013/130}, year = {2013}, url = {http://eprint.iacr.org/2013/130}, } @misc{cryptoeprint:2013:131, author = {Thomaz Oliveira and Juilo López and Diego F. Aranha and Francisco Rodríguez-Henríquez}, title = {Two is the fastest prime}, howpublished = {Cryptology ePrint Archive, Report 2013/131}, year = {2013}, url = {http://eprint.iacr.org/2013/131}, } @misc{cryptoeprint:2013:132, author = {Niu Liu and Shaohua Tang and Lingling Xu}, title = {Yet Another Attack On the Chinese Remainder Theorem Based Hierarchical Access Control Scheme}, howpublished = {Cryptology ePrint Archive, Report 2013/132}, year = {2013}, url = {http://eprint.iacr.org/2013/132}, } @misc{cryptoeprint:2013:133, author = {Hemlata Nagesh and Birendra Kumar Sharma}, title = {New Lattice Based Signature Using The Jordan Normal Form}, howpublished = {Cryptology ePrint Archive, Report 2013/133}, year = {2013}, url = {http://eprint.iacr.org/2013/133}, } @misc{cryptoeprint:2013:134, author = {Nelly Fazio and Rosario Gennaro and Irippuge Milinda Perera and William E. Wkeith III}, title = {Hardcore Predicates for a Diffie-Hellman Problem over Finite Fields}, howpublished = {Cryptology ePrint Archive, Report 2013/134}, year = {2013}, url = {http://eprint.iacr.org/2013/134}, } @misc{cryptoeprint:2013:135, author = {Leonard J. Schulman}, title = {An MQ/Code Cryptosystem Proposal}, howpublished = {Cryptology ePrint Archive, Report 2013/135}, year = {2013}, url = {http://eprint.iacr.org/2013/135}, } @misc{cryptoeprint:2013:136, author = {Dieter Schmidt}, title = {2048XKS-F & 4096XKS-F - Two Software Oriented High Security Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2013/136}, year = {2013}, url = {http://eprint.iacr.org/2013/136}, } @misc{cryptoeprint:2013:137, author = {Payman Mohassel and Saeed Sadeghian}, title = {How to Hide Circuits in MPC: An Efficient Framework for Private Function Evaluation}, howpublished = {Cryptology ePrint Archive, Report 2013/137}, year = {2013}, url = {http://eprint.iacr.org/2013/137}, } @misc{cryptoeprint:2013:138, author = {Zhang Wei, Liu Shuguang, Yang Xiaoyuan}, title = {Multi-bit homomorphic encryption based on learning with errors over rings}, howpublished = {Cryptology ePrint Archive, Report 2013/138}, year = {2013}, url = {http://eprint.iacr.org/2013/138}, } @misc{cryptoeprint:2013:139, author = {Wesley George and Charles Rackoff}, title = {Rethinking Definitions of Security for Session Key Agreement}, howpublished = {Cryptology ePrint Archive, Report 2013/139}, year = {2013}, url = {http://eprint.iacr.org/2013/139}, } @misc{cryptoeprint:2013:140, author = {Marc Fischlin and Nils Fleischhacker}, title = {Limitations of the Meta-Reduction Technique: The Case of Schnorr Signatures}, howpublished = {Cryptology ePrint Archive, Report 2013/140}, year = {2013}, url = {http://eprint.iacr.org/2013/140}, } @misc{cryptoeprint:2013:141, author = {M. Shakiba and M. Dakhilalian and H. Mala}, title = {Non-isomorphic Biclique Cryptanalysis and Its Application to Full-Round mCrypton}, howpublished = {Cryptology ePrint Archive, Report 2013/141}, year = {2013}, url = {http://eprint.iacr.org/2013/141}, } @misc{cryptoeprint:2013:142, author = {Kisoon YOON}, title = {A NEW METHOD OF CHOOSING PRIMITIVE ELEMENTS FOR BREZING-WENG FAMILIES OF PAIRING FRIENDLY ELLIPTIC CURVES}, howpublished = {Cryptology ePrint Archive, Report 2013/142}, year = {2013}, url = {http://eprint.iacr.org/2013/142}, } @misc{cryptoeprint:2013:143, author = {Marcel Keller and Peter Scholl and Nigel P. Smart}, title = {An architecture for practical actively secure MPC with dishonest majority}, howpublished = {Cryptology ePrint Archive, Report 2013/143}, year = {2013}, url = {http://eprint.iacr.org/2013/143}, } @misc{cryptoeprint:2013:144, author = {Gordon Procter and Carlos Cid}, title = {On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes}, howpublished = {Cryptology ePrint Archive, Report 2013/144}, year = {2013}, url = {http://eprint.iacr.org/2013/144}, } @misc{cryptoeprint:2013:145, author = {Dmitry Khovratovich}, title = {Key Wrapping with a Fixed Permutation}, howpublished = {Cryptology ePrint Archive, Report 2013/145}, year = {2013}, url = {http://eprint.iacr.org/2013/145}, } @misc{cryptoeprint:2013:146, author = {Joppe W. Bos and Craig Costello and Huseyin Hisil and Kristin Lauter}, title = {High-Performance Scalar Multiplication using 8-Dimensional GLV/GLS Decomposition}, howpublished = {Cryptology ePrint Archive, Report 2013/146}, year = {2013}, url = {http://eprint.iacr.org/2013/146}, } @misc{cryptoeprint:2013:147, author = {Naomi Benger and Manuel Charlemagne}, title = {A note on the practical complexity of the NFS in the medium prime case: Smoothness of Norms }, howpublished = {Cryptology ePrint Archive, Report 2013/147}, year = {2013}, url = {http://eprint.iacr.org/2013/147}, } @misc{cryptoeprint:2013:148, author = {Alexander Rostovtsev}, title = {AES-like ciphers: are special S-boxes better then random ones? (Virtual isomorphisms again)}, howpublished = {Cryptology ePrint Archive, Report 2013/148}, year = {2013}, url = {http://eprint.iacr.org/2013/148}, } @misc{cryptoeprint:2013:149, author = {Jiawei Yuan and Shucheng Yu}, title = {Secure and Constant Cost Public Cloud Storage Auditing with Deduplication}, howpublished = {Cryptology ePrint Archive, Report 2013/149}, year = {2013}, url = {http://eprint.iacr.org/2013/149}, } @misc{cryptoeprint:2013:150, author = {Gautham Sekar and Soumyadeep Bhattacharya}, title = {Practical (Second) Preimage Attacks on TCS_SHA-3}, howpublished = {Cryptology ePrint Archive, Report 2013/150}, year = {2013}, url = {http://eprint.iacr.org/2013/150}, } @misc{cryptoeprint:2013:151, author = {xu zijie}, title = {Some Fixes To SSH}, howpublished = {Cryptology ePrint Archive, Report 2013/151}, year = {2013}, url = {http://eprint.iacr.org/2013/151}, } @misc{cryptoeprint:2013:152, author = {Christian Cachin and Kristiyan Haralambiev and Hsu-Chun Hsiao and Alessandro Sorniotti}, title = {Policy-based Secure Deletion}, howpublished = {Cryptology ePrint Archive, Report 2013/152}, year = {2013}, url = {http://eprint.iacr.org/2013/152}, } @misc{cryptoeprint:2013:153, author = {Lin Cheng and Qiaoyan Wen and Zhengping Jin and Hua Zhang}, title = {On the security of a certi cateless signature scheme in the standard model}, howpublished = {Cryptology ePrint Archive, Report 2013/153}, year = {2013}, url = {http://eprint.iacr.org/2013/153}, } @misc{cryptoeprint:2013:154, author = {Jan-Jaap Oosterwijk and Boris Skoric and Jeroen Doumen}, title = {Optimal Suspicion Functions for Tardos Traitor Tracing Schemes}, howpublished = {Cryptology ePrint Archive, Report 2013/154}, year = {2013}, url = {http://eprint.iacr.org/2013/154}, } @misc{cryptoeprint:2013:155, author = {Tore Kasper Frederiksen and Thomas Pelle Jakobsen and Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi}, title = {MiniLEGO: Efficient Secure Two-Party Computation From General Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2013/155}, year = {2013}, url = {http://eprint.iacr.org/2013/155}, } @misc{cryptoeprint:2013:156, author = {Mira Belenkiy and Melissa Chase and C. Chris Erway and John Jannotti and Alptekin Küpçü and Anna Lysyanskaya}, title = {Incentivizing Outsourced Computation}, howpublished = {Cryptology ePrint Archive, Report 2013/156}, year = {2013}, url = {http://eprint.iacr.org/2013/156}, } @misc{cryptoeprint:2013:157, author = {Shay Gueron and Vlad Krasnov}, title = {The fragility of AES-GCM authentication algorithm }, howpublished = {Cryptology ePrint Archive, Report 2013/157}, year = {2013}, url = {http://eprint.iacr.org/2013/157}, } @misc{cryptoeprint:2013:158, author = {Armando Faz-Hernandez and Patrick Longa and Ana H. Sanchez}, title = {Keep Calm and Stay with One (and p>3)}, howpublished = {Cryptology ePrint Archive, Report 2013/158}, year = {2013}, url = {http://eprint.iacr.org/2013/158}, } @misc{cryptoeprint:2013:159, author = {Dingding Jia and Bao Liand Yamin Liu and Qixiang Mei}, title = {Improving the Message-ciphertext Rate of Lewko's Fully Secure IBE Scheme}, howpublished = {Cryptology ePrint Archive, Report 2013/159}, year = {2013}, url = {http://eprint.iacr.org/2013/159}, } @misc{cryptoeprint:2013:160, author = {Kai-Min Chung and Rafael Pass and Sidharth Telang}, title = {Interactive Coding, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2013/160}, year = {2013}, url = {http://eprint.iacr.org/2013/160}, } @misc{cryptoeprint:2013:161, author = {Daniel Kraschewski}, title = {Completeness Theorems for All Finite Stateless 2-Party Primitives}, howpublished = {Cryptology ePrint Archive, Report 2013/161}, year = {2013}, url = {http://eprint.iacr.org/2013/161}, } @misc{cryptoeprint:2013:162, author = {Yann Hamdaoui and Nicolas Sendrier}, title = {A Non Asymptotic Analysis of Information Set Decoding}, howpublished = {Cryptology ePrint Archive, Report 2013/162}, year = {2013}, url = {http://eprint.iacr.org/2013/162}, } @misc{cryptoeprint:2013:163, author = {Chang Liu and Liehuang Zhu and Mingzhong Wang and Yu-an Tan}, title = {Search Pattern Leakage in Searchable Encryption: Attacks and New Constructions}, howpublished = {Cryptology ePrint Archive, Report 2013/163}, year = {2013}, url = {http://eprint.iacr.org/2013/163}, } @misc{cryptoeprint:2013:164, author = {Daniel Cabarcas and Florian Göpfert and Patrick Weiden}, title = {Provably Secure LWE-Encryption with Uniform Secret}, howpublished = {Cryptology ePrint Archive, Report 2013/164}, year = {2013}, url = {http://eprint.iacr.org/2013/164}, } @misc{cryptoeprint:2013:165, author = {Süleyman Kardas, Serkan Çelik, Muhammed Ali Bingöl, Albert Levi}, title = {A New Security and Privacy Framework for RFID In Cloud Computing}, howpublished = {Cryptology ePrint Archive, Report 2013/165}, year = {2013}, url = {http://eprint.iacr.org/2013/165}, } @misc{cryptoeprint:2013:166, author = {Brajesh Kumar Singh}, title = {On generalized semi-bent (and partially bent) Boolean functions}, howpublished = {Cryptology ePrint Archive, Report 2013/166}, year = {2013}, url = {http://eprint.iacr.org/2013/166}, } @misc{cryptoeprint:2013:167, author = {Tolga Acar and Mira Belenkiy and Alptekin Küpçü}, title = {Single Password Authentication}, howpublished = {Cryptology ePrint Archive, Report 2013/167}, year = {2013}, url = {http://eprint.iacr.org/2013/167}, } @misc{cryptoeprint:2013:168, author = {Simon Hoerder and Kimmo Järvinen and Dan Page}, title = {On secure embedded token design (Long Version) -- Quasi-looped Yao circuits and bounded leakage}, howpublished = {Cryptology ePrint Archive, Report 2013/168}, year = {2013}, url = {http://eprint.iacr.org/2013/168}, } @misc{cryptoeprint:2013:169, author = {David Cash and Stanislaw Jarecki and Charanjit Jutla and Hugo Krawczyk and Marcel Rosu and Michael Steiner}, title = {Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries}, howpublished = {Cryptology ePrint Archive, Report 2013/169}, year = {2013}, url = {http://eprint.iacr.org/2013/169}, } @misc{cryptoeprint:2013:170, author = {Tao Xie and Fanbao Liu and Dengguo Feng}, title = {Fast Collision Attack on MD5}, howpublished = {Cryptology ePrint Archive, Report 2013/170}, year = {2013}, url = {http://eprint.iacr.org/2013/170}, } @misc{cryptoeprint:2013:171, author = {Florian Böhl and Dennis Hofheinz and Tibor Jager and Jessica Koch and Christoph Striecks}, title = {Confined Guessing: New Signatures From Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2013/171}, year = {2013}, url = {http://eprint.iacr.org/2013/171}, } @misc{cryptoeprint:2013:172, author = {Raphael Spreitzer and Thomas Plos}, title = {On the Applicability of Time-Driven Cache Attacks on Mobile Devices (Extended Version)}, howpublished = {Cryptology ePrint Archive, Report 2013/172}, year = {2013}, url = {http://eprint.iacr.org/2013/172}, } @misc{cryptoeprint:2013:173, author = {Ray Perlner and Daniel Smith-Tone}, title = {On the Classification of Differential Invariants for Multivariate Post-Quantum Cryptosystems"}, howpublished = {Cryptology ePrint Archive, Report 2013/173}, year = {2013}, url = {http://eprint.iacr.org/2013/173}, } @misc{cryptoeprint:2013:174, author = {Deukjo Hong and Daesung Kwon}, title = {Cryptanalysis of Some Double-Block-Length Hash Modes of Block Ciphers with $n$-Bit Block and $n$-Bit Key}, howpublished = {Cryptology ePrint Archive, Report 2013/174}, year = {2013}, url = {http://eprint.iacr.org/2013/174}, } @misc{cryptoeprint:2013:175, author = {Joseph A. Akinyele and Matthew Green and Susan Hohenberger and Matthew W. Pagano}, title = {Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2013/175}, year = {2013}, url = {http://eprint.iacr.org/2013/175}, } @misc{cryptoeprint:2013:176, author = {Jing Lv and Bin Zhang and Dongdai Lin}, title = {Distinguishing Attacks on RC4 and A New Improvement of the Cipher}, howpublished = {Cryptology ePrint Archive, Report 2013/176}, year = {2013}, url = {http://eprint.iacr.org/2013/176}, } @misc{cryptoeprint:2013:177, author = {Veronique Cortier and David Galindo and Stephane Glondu and Malika Izabachene}, title = {A generic construction for voting correctness at minimum cost - Application to Helios}, howpublished = {Cryptology ePrint Archive, Report 2013/177}, year = {2013}, url = {http://eprint.iacr.org/2013/177}, } @misc{cryptoeprint:2013:178, author = {Mohammad Ali Orumiehchiha and Josef Pieprzyk and Elham Shakour and Ron Steinfeld}, title = {Cryptanalysis of RC4(n,m) Stream Cipher}, howpublished = {Cryptology ePrint Archive, Report 2013/178}, year = {2013}, url = {http://eprint.iacr.org/2013/178}, } @misc{cryptoeprint:2013:179, author = {Melissa Chase and Markulf Kohlweiss and Anna Lysyanskaya and Sarah Meiklejohn}, title = {Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials}, howpublished = {Cryptology ePrint Archive, Report 2013/179}, year = {2013}, url = {http://eprint.iacr.org/2013/179}, } @misc{cryptoeprint:2013:180, author = {Masao KASAHARA}, title = {A New Class of Product-sum Type Public Key Cryptosystem,K(V)$\Sigma\Pi$PKC,Constructed Based on Maximum Length Code}, howpublished = {Cryptology ePrint Archive, Report 2013/180}, year = {2013}, url = {http://eprint.iacr.org/2013/180}, } @misc{cryptoeprint:2013:181, author = {Andrew V. Sutherland}, title = {On the evaluation of modular polynomials}, howpublished = {Cryptology ePrint Archive, Report 2013/181}, year = {2013}, url = {http://eprint.iacr.org/2013/181}, } @misc{cryptoeprint:2013:182, author = {Julien Bringer and Herve Chabanne and Alain Patey}, title = {Collusion-Resistant Domain-Specific Pseudonymous Signatures}, howpublished = {Cryptology ePrint Archive, Report 2013/182}, year = {2013}, url = {http://eprint.iacr.org/2013/182}, } @misc{cryptoeprint:2013:183, author = {Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi}, title = {Practical Multilinear Maps over the Integers}, howpublished = {Cryptology ePrint Archive, Report 2013/183}, year = {2013}, url = {http://eprint.iacr.org/2013/183}, } @misc{cryptoeprint:2013:184, author = {Boris Ryabko}, title = {The Vernam cipher is robust to small deviations from randomnes}, howpublished = {Cryptology ePrint Archive, Report 2013/184}, year = {2013}, url = {http://eprint.iacr.org/2013/184}, } @misc{cryptoeprint:2013:185, author = {Mohammad Ali Orumiehchiha and Josef Pieprzyk and Ron Steinfeld and Harry Bartlett }, title = {Security Analysis of Linearly Filtered NLFSRs}, howpublished = {Cryptology ePrint Archive, Report 2013/185}, year = {2013}, url = {http://eprint.iacr.org/2013/185}, } @misc{cryptoeprint:2013:186, author = {Jae Hong Seo}, title = {On the (Im)possibility of Projecting Property\\}, howpublished = {Cryptology ePrint Archive, Report 2013/186}, year = {2013}, url = {http://eprint.iacr.org/2013/186}, } @misc{cryptoeprint:2013:187, author = {Jorge Munilla, Alberto Peinado, Guoming Yang and Willy Susilo}, title = {Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model}, howpublished = {Cryptology ePrint Archive, Report 2013/187}, year = {2013}, url = {http://eprint.iacr.org/2013/187}, } @misc{cryptoeprint:2013:188, author = {Daniel Loebenberger and Michael Nüsken}, title = {A family of 6-to-4-bit S-boxes with large linear branch number}, howpublished = {Cryptology ePrint Archive, Report 2013/188}, year = {2013}, url = {http://eprint.iacr.org/2013/188}, } @misc{cryptoeprint:2013:189, author = {Appala Naidu Tentu and Prabal Paul and V Ch Venkaiah}, title = {Ideal and Perfect Hierarchical Secret Sharing Schemes based on MDS codes}, howpublished = {Cryptology ePrint Archive, Report 2013/189}, year = {2013}, url = {http://eprint.iacr.org/2013/189}, } @misc{cryptoeprint:2013:190, author = {Shaohua Tang and Jianhao Wu and Weijian Li and Zheng Gong}, title = {Power Analysis Attacks against FPGA Implementations of KLEIN}, howpublished = {Cryptology ePrint Archive, Report 2013/190}, year = {2013}, url = {http://eprint.iacr.org/2013/190}, } @misc{cryptoeprint:2013:191, author = {Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong}, title = {Improved Differential Fault Analysis on ARIA using Small Number of Faults}, howpublished = {Cryptology ePrint Archive, Report 2013/191}, year = {2013}, url = {http://eprint.iacr.org/2013/191}, } @misc{cryptoeprint:2013:192, author = {David Lubicz and Damien Robert}, title = {A generalisation of Miller's algorithm and applications to pairing computations on abelian varieties}, howpublished = {Cryptology ePrint Archive, Report 2013/192}, year = {2013}, url = {http://eprint.iacr.org/2013/192}, } @misc{cryptoeprint:2013:193, author = {Yu-Chi Chen and Raylin Tso and Willy Susilo and Xinyi Huang and Gwoboa Horng}, title = {Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes}, howpublished = {Cryptology ePrint Archive, Report 2013/193}, year = {2013}, url = {http://eprint.iacr.org/2013/193}, } @misc{cryptoeprint:2013:194, author = {Per Austrin and Kai-Min Chung and Mohammad Mahmoody and Rafael Pass and Karn Seth}, title = {On the (Im)Possibility of Tamper-Resilient Cryptography: Using Fourier Analysis in Computer Viruses}, howpublished = {Cryptology ePrint Archive, Report 2013/194}, year = {2013}, url = {http://eprint.iacr.org/2013/194}, } @misc{cryptoeprint:2013:195, author = {Philipp Grabher and Dan Page and Marcin Wójcik}, title = {On the (re)design of an FPGA-based PUF}, howpublished = {Cryptology ePrint Archive, Report 2013/195}, year = {2013}, url = {http://eprint.iacr.org/2013/195}, } @misc{cryptoeprint:2013:196, author = {abhi shelat and Chih-hao Shen}, title = {Fast Two-Party Secure Computation with Minimal Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2013/196}, year = {2013}, url = {http://eprint.iacr.org/2013/196}, } @misc{cryptoeprint:2013:197, author = {Razvan Barbulescu and Cyril Bouvier and Jérémie Detrey and Pierrick Gaudry and Hamza Jeljeli and Emmanuel Thomé and Marion Videau and Paul Zimmermann}, title = {Discrete logarithm in GF(2^809) with FFS}, howpublished = {Cryptology ePrint Archive, Report 2013/197}, year = {2013}, url = {http://eprint.iacr.org/2013/197}, } @misc{cryptoeprint:2013:198, author = {Zhizhou Li and Ten H. Lai}, title = {On Evaluating Circuits with Inputs Encrypted by Different Fully Homomorphic Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2013/198}, year = {2013}, url = {http://eprint.iacr.org/2013/198}, } @misc{cryptoeprint:2013:199, author = {Daniel J. Bernstein and Stacey Jeffery and Tanja Lange and Alexander Meurer}, title = {Quantum algorithms for the subset-sum problem}, howpublished = {Cryptology ePrint Archive, Report 2013/199}, year = {2013}, url = {http://eprint.iacr.org/2013/199}, } @misc{cryptoeprint:2013:200, author = {Razvan Barbulescu}, title = {Selecting polynomials for the Function Field Sieve}, howpublished = {Cryptology ePrint Archive, Report 2013/200}, year = {2013}, url = {http://eprint.iacr.org/2013/200}, } @misc{cryptoeprint:2013:201, author = {Divesh Aggarwal and Yevgeniy Dodis and Shachar Lovett}, title = {Non-malleable Codes from Additive Combinatorics}, howpublished = {Cryptology ePrint Archive, Report 2013/201}, year = {2013}, url = {http://eprint.iacr.org/2013/201}, } @misc{cryptoeprint:2013:202, author = {Mohammad Ali Orumiehchiha and Josef Pieprzyk and Ron Steinfeld}, title = {Breaking NLM-MAC Generator}, howpublished = {Cryptology ePrint Archive, Report 2013/202}, year = {2013}, url = {http://eprint.iacr.org/2013/202}, } @misc{cryptoeprint:2013:203, author = {Sven Laur and Riivo Talviste and Jan Willemson}, title = {From oblivious AES to efficient and secure database join in the multiparty setting}, howpublished = {Cryptology ePrint Archive, Report 2013/203}, year = {2013}, url = {http://eprint.iacr.org/2013/203}, } @misc{cryptoeprint:2013:204, author = {Shi Pu, Jyh-Charn Liu}, title = {Computing Privacy-Preserving Edit Distance and Smith-Waterman Problems on the GPU Architecture}, howpublished = {Cryptology ePrint Archive, Report 2013/204}, year = {2013}, url = {http://eprint.iacr.org/2013/204}, } @misc{cryptoeprint:2013:205, author = {Jan Camenisch and Robert R. Enderlein and Victor Shoup}, title = {Practical and Employable Protocols for UC-Secure Circuit Evaluation over $Z_n$}, howpublished = {Cryptology ePrint Archive, Report 2013/205}, year = {2013}, url = {http://eprint.iacr.org/2013/205}, } @misc{cryptoeprint:2013:206, author = {Florian Kerschbaum and Hoon Wei Lim and Ivan Gudymenko}, title = {Privacy-Preserving Billing for e-Ticketing Systems in Public Transportation}, howpublished = {Cryptology ePrint Archive, Report 2013/206}, year = {2013}, url = {http://eprint.iacr.org/2013/206}, } @misc{cryptoeprint:2013:207, author = {Yanjiang Yang and Xuhua Ding and Haibing Lu and Jian Weng}, title = {Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication}, howpublished = {Cryptology ePrint Archive, Report 2013/207}, year = {2013}, url = {http://eprint.iacr.org/2013/207}, } @misc{cryptoeprint:2013:208, author = {Yi-Ruei Chen and Cheng-Kang Chu and Wen-Guey Tzeng and Jianying Zhou}, title = {CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing}, howpublished = {Cryptology ePrint Archive, Report 2013/208}, year = {2013}, url = {http://eprint.iacr.org/2013/208}, } @misc{cryptoeprint:2013:209, author = {Mourad Gouicem}, title = {New modular multiplication and division algorithms based on continued fraction expansion}, howpublished = {Cryptology ePrint Archive, Report 2013/209}, year = {2013}, url = {http://eprint.iacr.org/2013/209}, } @misc{cryptoeprint:2013:210, author = {Arno Mittelbach}, title = {Cryptophia's Short Combiner for Collision-Resistant Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2013/210}, year = {2013}, url = {http://eprint.iacr.org/2013/210}, } @misc{cryptoeprint:2013:211, author = {Christina Boura and Anne Canteaut}, title = {A new criterion for avoiding the propagation of linear relations through an Sbox (Full version)}, howpublished = {Cryptology ePrint Archive, Report 2013/211}, year = {2013}, url = {http://eprint.iacr.org/2013/211}, } @misc{cryptoeprint:2013:212, author = {Krzysztof Pietrzak}, title = {A Closer Look at HMAC}, howpublished = {Cryptology ePrint Archive, Report 2013/212}, year = {2013}, url = {http://eprint.iacr.org/2013/212}, } @misc{cryptoeprint:2013:213, author = {Guangjun Fan and Yongbin Zhou and Fran\c{c}ois-Xavier Standaert and Dengguo Feng}, title = {On (Destructive) Impacts of Mathematical Realizations over the Security of Leakage Resilient ElGamal Encryption}, howpublished = {Cryptology ePrint Archive, Report 2013/213}, year = {2013}, url = {http://eprint.iacr.org/2013/213}, } @misc{cryptoeprint:2013:214, author = {Filip Zagorski and Richard T. Carback and David Chaum and Jeremy Clark and Aleksander Essex and Poorvi L. Vora}, title = {Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System}, howpublished = {Cryptology ePrint Archive, Report 2013/214}, year = {2013}, url = {http://eprint.iacr.org/2013/214}, } @misc{cryptoeprint:2013:215, author = {Ulrich Rührmair and Christian Hilgers and Sebastian Urban and Agnes Weiershäuser and Elias Dinter and Brigitte Forster and Christian Jirauschek}, title = {Revisiting Optical Physical Unclonable Functions}, howpublished = {Cryptology ePrint Archive, Report 2013/215}, year = {2013}, url = {http://eprint.iacr.org/2013/215}, } @misc{cryptoeprint:2013:216, author = {Edouard Cuvelier and Olivier Pereira and Thomas Peters}, title = {Election Verifiability or Ballot Privacy: Do We Need to Choose?}, howpublished = {Cryptology ePrint Archive, Report 2013/216}, year = {2013}, url = {http://eprint.iacr.org/2013/216}, } @misc{cryptoeprint:2013:217, author = {Björn Deiseroth and Victoria Fehr and Marc Fischlin and Manuel Maasz and Nils Fabian Reimers and Richard Stein}, title = {Computing on Authenticated Data for Adjustable Predicates}, howpublished = {Cryptology ePrint Archive, Report 2013/217}, year = {2013}, url = {http://eprint.iacr.org/2013/217}, } @misc{cryptoeprint:2013:218, author = {Aurore Guillevic}, title = {Comparing the Pairing Efficiency over Composite-Order and Prime-Order Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2013/218}, year = {2013}, url = {http://eprint.iacr.org/2013/218}, } @misc{cryptoeprint:2013:219, author = {Stefan G. Weber}, title = {Designing a Hybrid Attribute-Based Encryption Scheme Supporting Dynamic Attributes}, howpublished = {Cryptology ePrint Archive, Report 2013/219}, year = {2013}, url = {http://eprint.iacr.org/2013/219}, } @misc{cryptoeprint:2013:220, author = {Shlomi Dolev and Juan Garay and Niv Gilboa and Vladimir Kolesnikov and Yelena Yuditsky}, title = {Towards Efficient Private Distributed Computation on Unbounded Input Streams}, howpublished = {Cryptology ePrint Archive, Report 2013/220}, year = {2013}, url = {http://eprint.iacr.org/2013/220}, } @misc{cryptoeprint:2013:221, author = {Yang Zhang, Jun-liang Chen}, title = {Identity-based Aggregate Signatures with Verifiable Single Ones}, howpublished = {Cryptology ePrint Archive, Report 2013/221}, year = {2013}, url = {http://eprint.iacr.org/2013/221}, } @misc{cryptoeprint:2013:222, author = {Shan Chen, John Steinberger}, title = {Tight security bounds for key-alternating ciphers}, howpublished = {Cryptology ePrint Archive, Report 2013/222}, year = {2013}, url = {http://eprint.iacr.org/2013/222}, } @misc{cryptoeprint:2013:223, author = {Özgür Dagdelen and Marc Fischlin}, title = {The PACE|AA Protocol for Machine Readable Travel Documents, and its Security}, howpublished = {Cryptology ePrint Archive, Report 2013/223}, year = {2013}, url = {http://eprint.iacr.org/2013/223}, } @misc{cryptoeprint:2013:224, author = {Yuanyuan Zhou and Yu Yu and François-Xavier Standaert and Jean-Jacques Quisquater}, title = {On the Need of Physical Security for Small Embedded Devices: a Case Study with COMP128-1 Implementations in SIM Cards }, howpublished = {Cryptology ePrint Archive, Report 2013/224}, year = {2013}, url = {http://eprint.iacr.org/2013/224}, } @misc{cryptoeprint:2013:225, author = {Mohammad Etemad and Alptekin Küpçü}, title = {Transparent, Distributed, and Replicated Dynamic Provable Data Possession}, howpublished = {Cryptology ePrint Archive, Report 2013/225}, year = {2013}, url = {http://eprint.iacr.org/2013/225}, } @misc{cryptoeprint:2013:226, author = {Maggie Habeeb and Delaram Kahrobaei and Charalambos Koupparis and Vladimir Shpilrain}, title = {Public key exchange using semidirect product of (semi)groups}, howpublished = {Cryptology ePrint Archive, Report 2013/226}, year = {2013}, url = {http://eprint.iacr.org/2013/226}, } @misc{cryptoeprint:2013:227, author = {Chunyu Tang and David A. Naumann and Susanne Wetzel}, title = {Analysis of authentication and key establishment in inter-generational mobile telephony}, howpublished = {Cryptology ePrint Archive, Report 2013/227}, year = {2013}, url = {http://eprint.iacr.org/2013/227}, } @misc{cryptoeprint:2013:228, author = {Kwangsu Lee and Woo Kwon Koo and Dong Hoon Lee and Jong Hwan Park}, title = {Public-Key Revocation and Tracing Schemes with Subset Difference Methods}, howpublished = {Cryptology ePrint Archive, Report 2013/228}, year = {2013}, url = {http://eprint.iacr.org/2013/228}, } @misc{cryptoeprint:2013:229, author = {Shafi Goldwasser and Yael Kalai and Raluca Ada Popa and Vinod Vaikuntanathan and Nickolai Zeldovich}, title = {Overcoming the Worst-Case Curse for Cryptographic Constructions}, howpublished = {Cryptology ePrint Archive, Report 2013/229}, year = {2013}, url = {http://eprint.iacr.org/2013/229}, } @misc{cryptoeprint:2013:230, author = {Yang Wang and Mark Manulis and Man Ho Au and Willy Susilo}, title = {Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt''}, howpublished = {Cryptology ePrint Archive, Report 2013/230}, year = {2013}, url = {http://eprint.iacr.org/2013/230}, } @misc{cryptoeprint:2013:231, author = {Guido Bertoni and Joan Daemen and Michael Peeters and Gilles Van Assche}, title = {Sakura: a flexible coding for tree hashing}, howpublished = {Cryptology ePrint Archive, Report 2013/231}, year = {2013}, url = {http://eprint.iacr.org/2013/231}, } @misc{cryptoeprint:2013:232, author = {Kaushik Chakraborty and Subhamoy Maitra}, title = {Quantum algorithm to check Resiliency of a Boolean function}, howpublished = {Cryptology ePrint Archive, Report 2013/232}, year = {2013}, url = {http://eprint.iacr.org/2013/232}, } @misc{cryptoeprint:2013:233, author = {Yiyuan Luo and Xuejia Lai}, title = {Attacks on JH, Grøstl and SMASH Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2013/233}, year = {2013}, url = {http://eprint.iacr.org/2013/233}, } @misc{cryptoeprint:2013:234, author = {Özgür Dagdelen and Marc Fischlin and Tommaso Gagliardoni and Giorgia Azzurra Marson and Arno Mittelbach and Cristina Onete}, title = {A Cryptographic Analysis of OPACITY}, howpublished = {Cryptology ePrint Archive, Report 2013/234}, year = {2013}, url = {http://eprint.iacr.org/2013/234}, } @misc{cryptoeprint:2013:235, author = {Ben Smyth and David Bernhard}, title = {Ballot secrecy and ballot independence coincide}, howpublished = {Cryptology ePrint Archive, Report 2013/235}, year = {2013}, url = {http://eprint.iacr.org/2013/235}, } @misc{cryptoeprint:2013:236, author = {Kaitai Liang and Liming Fang and Duncan S. Wong and Willy Susilo}, title = {A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security}, howpublished = {Cryptology ePrint Archive, Report 2013/236}, year = {2013}, url = {http://eprint.iacr.org/2013/236}, } @misc{cryptoeprint:2013:237, author = {Pedro Adão and Riccardo Focardi and Flaminia L. Luccio}, title = {Type-Based Analysis of Generic Key Management APIs (Long Version)}, howpublished = {Cryptology ePrint Archive, Report 2013/237}, year = {2013}, url = {http://eprint.iacr.org/2013/237}, } @misc{cryptoeprint:2013:238, author = {Markulf Kohlweiss and Ueli Maurer and Cristina Onete and Björn Tackmann and Daniele Venturi}, title = {Anonymity-preserving Public-Key Encryption: A Constructive Approach}, howpublished = {Cryptology ePrint Archive, Report 2013/238}, year = {2013}, url = {http://eprint.iacr.org/2013/238}, } @misc{cryptoeprint:2013:239, author = {Craig Gentry and Kenny Goldman and Shai Halevi and Charanjit Julta and Mariana Raykova and Daniel Wichs}, title = {Optimizing ORAM and Using it Efficiently for Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2013/239}, year = {2013}, url = {http://eprint.iacr.org/2013/239}, } @misc{cryptoeprint:2013:240, author = {Sui-Guan Teo and Kenneth Koon-Ho Wong and Harry Bartlett and Leonie Simpson and Ed Dawson}, title = {Algebraic analysis of Trivium-like ciphers}, howpublished = {Cryptology ePrint Archive, Report 2013/240}, year = {2013}, url = {http://eprint.iacr.org/2013/240}, } @misc{cryptoeprint:2013:241, author = {Joachim Strömbergson and Simon Josefsson}, title = {The Perils of Repeating Patterns: Observation of Some Weak Keys in RC4}, howpublished = {Cryptology ePrint Archive, Report 2013/241}, year = {2013}, url = {http://eprint.iacr.org/2013/241}, } @misc{cryptoeprint:2013:242, author = {Chanathip Namprempre and Phillip Rogaway and Tom Shrimpton}, title = {AE5 Security Notions: Definitions Implicit in the CAESAR Call}, howpublished = {Cryptology ePrint Archive, Report 2013/242}, year = {2013}, url = {http://eprint.iacr.org/2013/242}, } @misc{cryptoeprint:2013:243, author = {Kai-Min Chung and Rafael Pass}, title = {A Simple ORAM}, howpublished = {Cryptology ePrint Archive, Report 2013/243}, year = {2013}, url = {http://eprint.iacr.org/2013/243}, } @misc{cryptoeprint:2013:244, author = {Ted Hurley}, title = {Cryptographic schemes, key exchange, public key.}, howpublished = {Cryptology ePrint Archive, Report 2013/244}, year = {2013}, url = {http://eprint.iacr.org/2013/244}, } @misc{cryptoeprint:2013:245, author = {Özgür Dagdelen and Marc Fischlin and Tommaso Gagliardoni}, title = {The Fiat-Shamir Transformation in a Quantum World}, howpublished = {Cryptology ePrint Archive, Report 2013/245}, year = {2013}, url = {http://eprint.iacr.org/2013/245}, } @misc{cryptoeprint:2013:246, author = {Shenghui Su and Maozhi Xu and Shuwang Lu}, title = {A Lever Function to a New Codomain with Adequate Indeterminacy}, howpublished = {Cryptology ePrint Archive, Report 2013/246}, year = {2013}, url = {http://eprint.iacr.org/2013/246}, } @misc{cryptoeprint:2013:247, author = {Mingwu Zhang and Wei Shi and Chunzhi Wang and Zhenhua Chen and Yi Mu}, title = {Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction}, howpublished = {Cryptology ePrint Archive, Report 2013/247}, year = {2013}, url = {http://eprint.iacr.org/2013/247}, } @misc{cryptoeprint:2013:248, author = {Neal Koblitz and Alfred Menezes}, title = {Another Look at Security Theorems for 1-Key Nested MACs}, howpublished = {Cryptology ePrint Archive, Report 2013/248}, year = {2013}, url = {http://eprint.iacr.org/2013/248}, } @misc{cryptoeprint:2013:249, author = {Kaoru Kurosawa and Takuma Ueda}, title = {How to Factor N_1 and N_2 When p_1=p_2 mod 2^t}, howpublished = {Cryptology ePrint Archive, Report 2013/249}, year = {2013}, url = {http://eprint.iacr.org/2013/249}, } @misc{cryptoeprint:2013:250, author = {Alice Silverberg}, title = {Fully Homomorphic Encryption for Mathematicians}, howpublished = {Cryptology ePrint Archive, Report 2013/250}, year = {2013}, url = {http://eprint.iacr.org/2013/250}, } @misc{cryptoeprint:2013:251, author = {Yuyin Yu and Mingsheng Wang}, title = {Permutation Polynomials and Their Differential Properties over Residue Class Rings}, howpublished = {Cryptology ePrint Archive, Report 2013/251}, year = {2013}, url = {http://eprint.iacr.org/2013/251}, } @misc{cryptoeprint:2013:252, author = {LI Yujuan, WANG Huaifu, ZHAO Jinhua}, title = {On the Primitivity of some Trinomials over Finite Fields}, howpublished = {Cryptology ePrint Archive, Report 2013/252}, year = {2013}, url = {http://eprint.iacr.org/2013/252}, } @misc{cryptoeprint:2013:253, author = {Goran Doychev and Dominik Feld and Boris Köpf and Laurent Mauborgne and Jan Reineke}, title = {CacheAudit: A Tool for the Static Analysis of Cache Side Channels}, howpublished = {Cryptology ePrint Archive, Report 2013/253}, year = {2013}, url = {http://eprint.iacr.org/2013/253}, } @misc{cryptoeprint:2013:254, author = {Amir Herzberg and Haya Shulman}, title = {Towards Adoption of DNSSEC: Availability and Security Challenges}, howpublished = {Cryptology ePrint Archive, Report 2013/254}, year = {2013}, url = {http://eprint.iacr.org/2013/254}, } @misc{cryptoeprint:2013:255, author = {Rodolphe Lampe and Yannick Seurin}, title = {How to Construct an Ideal Cipher from a Small Set of Public Permutations}, howpublished = {Cryptology ePrint Archive, Report 2013/255}, year = {2013}, url = {http://eprint.iacr.org/2013/255}, } @misc{cryptoeprint:2013:256, author = {Yannick Seurin}, title = {On the Lossiness of the Rabin Trapdoor Function}, howpublished = {Cryptology ePrint Archive, Report 2013/256}, year = {2013}, url = {http://eprint.iacr.org/2013/256}, } @misc{cryptoeprint:2013:257, author = {Paolo D'Arco and Roberto De Prisco}, title = {Secure two-party computation: a visual way}, howpublished = {Cryptology ePrint Archive, Report 2013/257}, year = {2013}, url = {http://eprint.iacr.org/2013/257}, } @misc{cryptoeprint:2013:258, author = {Sanjam Garg and Craig Gentry and Amit Sahai and Brent Waters}, title = {Witness Encryption and its Applications}, howpublished = {Cryptology ePrint Archive, Report 2013/258}, year = {2013}, url = {http://eprint.iacr.org/2013/258}, } @misc{cryptoeprint:2013:259, author = {Ran Gelles and Amit Sahai and Akshay Wadia}, title = {Private Interactive Communication Across an Adversarial Channel}, howpublished = {Cryptology ePrint Archive, Report 2013/259}, year = {2013}, url = {http://eprint.iacr.org/2013/259}, } @misc{cryptoeprint:2013:260, author = {Kai-Min Chung and Edward Lui and Rafael Pass}, title = {From Weak to Strong Zero-Knowledge and Applications}, howpublished = {Cryptology ePrint Archive, Report 2013/260}, year = {2013}, url = {http://eprint.iacr.org/2013/260}, } @misc{cryptoeprint:2013:261, author = {Dima Grigoriev and Vladimir Shpilrain}, title = {Secure information transmission based on physical principles}, howpublished = {Cryptology ePrint Archive, Report 2013/261}, year = {2013}, url = {http://eprint.iacr.org/2013/261}, } @misc{cryptoeprint:2013:262, author = {Gerald Gavin}, title = {An efficient FHE based on the hardness of solving systems of non-linear multivariate equations}, howpublished = {Cryptology ePrint Archive, Report 2013/262}, year = {2013}, url = {http://eprint.iacr.org/2013/262}, } @misc{cryptoeprint:2013:263, author = {Albrecht Petzoldt}, title = {Speeding up QUAD}, howpublished = {Cryptology ePrint Archive, Report 2013/263}, year = {2013}, url = {http://eprint.iacr.org/2013/263}, } @misc{cryptoeprint:2013:264, author = {Stephen R. Tate and Roopa Vishwanathan and Scott Weeks}, title = {Encrypted Secret Sharing and Analysis by Plaintext Randomization}, howpublished = {Cryptology ePrint Archive, Report 2013/264}, year = {2013}, url = {http://eprint.iacr.org/2013/264}, } @misc{cryptoeprint:2013:265, author = {Susan Hohenberger and Brent Waters}, title = {Attribute-Based Encryption with Fast Decryption}, howpublished = {Cryptology ePrint Archive, Report 2013/265}, year = {2013}, url = {http://eprint.iacr.org/2013/265}, } @misc{cryptoeprint:2013:266, author = {Jing Lv and Dongdai Lin}, title = {L-P states of RC4 Stream Cipher }, howpublished = {Cryptology ePrint Archive, Report 2013/266}, year = {2013}, url = {http://eprint.iacr.org/2013/266}, } @misc{cryptoeprint:2013:267, author = {S. Dov Gordon and Tal Malkin and Mike Rosulek and Hoeteck Wee}, title = {Multi-Party Computation of Polynomials and Branching Programs without Simultaneous Interaction}, howpublished = {Cryptology ePrint Archive, Report 2013/267}, year = {2013}, url = {http://eprint.iacr.org/2013/267}, } @misc{cryptoeprint:2013:268, author = {Majid Rahimi, Mostafa Barmshori}, title = {Dynamic Cube Attack on Grain-v1}, howpublished = {Cryptology ePrint Archive, Report 2013/268}, year = {2013}, url = {http://eprint.iacr.org/2013/268}, } @misc{cryptoeprint:2013:269, author = {Jonathan Trostle}, title = {Chosen Ciphertext Secure (CCS): Stateful Symmetric Key CCA Encryption with Minimal Ciphertext Expansion}, howpublished = {Cryptology ePrint Archive, Report 2013/269}, year = {2013}, url = {http://eprint.iacr.org/2013/269}, } @misc{cryptoeprint:2013:270, author = {Yu Yu}, title = {Pseudorandom Generators from Regular One-way Functions: New Constructions with Improved Parameters}, howpublished = {Cryptology ePrint Archive, Report 2013/270}, year = {2013}, url = {http://eprint.iacr.org/2013/270}, } @misc{cryptoeprint:2013:271, author = {Christoph Sorge}, title = {The Legal Classification of Identity-Based Signatures}, howpublished = {Cryptology ePrint Archive, Report 2013/271}, year = {2013}, url = {http://eprint.iacr.org/2013/271}, } @misc{cryptoeprint:2013:272, author = {Sashank Dara}, title = {Cryptography Challenges for Computational Privacy in Public Clouds}, howpublished = {Cryptology ePrint Archive, Report 2013/272}, year = {2013}, url = {http://eprint.iacr.org/2013/272}, } @misc{cryptoeprint:2013:273, author = {Deepak Kumar Dalai}, title = {Computing the Rank of Incidence Matrix and Algebraic Immunity of Boolean Functions}, howpublished = {Cryptology ePrint Archive, Report 2013/273}, year = {2013}, url = {http://eprint.iacr.org/2013/273}, } @misc{cryptoeprint:2013:274, author = {Liran Lerman and Gianluca Bontempi and Souhaib Ben Taieb and Olivier Markowitch}, title = {A time series approach for profiling attack}, howpublished = {Cryptology ePrint Archive, Report 2013/274}, year = {2013}, url = {http://eprint.iacr.org/2013/274}, } @misc{cryptoeprint:2013:275, author = {Johannes Braun and Gregor Rynkowski}, title = {The Potential of Individualized Trusted Root Stores: Minimizing the Attack Surface in the Light of CA Failures}, howpublished = {Cryptology ePrint Archive, Report 2013/275}, year = {2013}, url = {http://eprint.iacr.org/2013/275}, } @misc{cryptoeprint:2013:276, author = {David Bernhard and Stephan Neumann and Melanie Volkamer}, title = {Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs}, howpublished = {Cryptology ePrint Archive, Report 2013/276}, year = {2013}, url = {http://eprint.iacr.org/2013/276}, } @misc{cryptoeprint:2013:277, author = {Muhammad Rizwan Asghar and Mihaela Ion and Giovanni Russello and Bruno Crispo}, title = {ESPOON: Enforcing Encrypted Security Policies in Outsourced Environments}, howpublished = {Cryptology ePrint Archive, Report 2013/277}, year = {2013}, url = {http://eprint.iacr.org/2013/277}, } @misc{cryptoeprint:2013:278, author = {S. Tiran and S. Ordas and Y. Teglia and M. Agoyan and P. Maurine}, title = {A Frequency Leakage Model and its application to CPA and DPA}, howpublished = {Cryptology ePrint Archive, Report 2013/278}, year = {2013}, url = {http://eprint.iacr.org/2013/278}, } @misc{cryptoeprint:2013:279, author = {Bryan Parno and Craig Gentry and Jon Howell and Mariana Raykova}, title = {Pinocchio: Nearly Practical Verifiable Computation}, howpublished = {Cryptology ePrint Archive, Report 2013/279}, year = {2013}, url = {http://eprint.iacr.org/2013/279}, } @misc{cryptoeprint:2013:280, author = {Emil Stefanov and Marten van Dijk and Elaine Shi and Christopher Fletcher and Ling Ren and Xiangyao Yu and Srinivas Devadas}, title = {Path ORAM: An Extremely Simple Oblivious RAM Protocol}, howpublished = {Cryptology ePrint Archive, Report 2013/280}, year = {2013}, url = {http://eprint.iacr.org/2013/280}, } @misc{cryptoeprint:2013:281, author = {Carlos Aguilar-Melchor and Slim Bettaieb and Xavier Boyen and Laurent Fousse and Philippe Gaborit}, title = {Adapting Lyubashevsky’s Signature Schemes to the Ring Signature Setting}, howpublished = {Cryptology ePrint Archive, Report 2013/281}, year = {2013}, url = {http://eprint.iacr.org/2013/281}, } @misc{cryptoeprint:2013:282, author = {Goutam Paul and Anupam Chattopadhyay}, title = {Three Snakes in One Hole: A 67 Gbps Flexible Hardware for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes}, howpublished = {Cryptology ePrint Archive, Report 2013/282}, year = {2013}, url = {http://eprint.iacr.org/2013/282}, } @misc{cryptoeprint:2013:283, author = {Dan Boneh and Ananth Raghunathan and Gil Segev}, title = {Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2013/283}, year = {2013}, url = {https://eprint.iacr.org/2013/283}, } @misc{cryptoeprint:2013:284, author = {Asghar Tavakkoli, Reza Ebrahimi Atani}, title = {A Secure Paper-Based Electronic Voting With No Encryption}, howpublished = {Cryptology ePrint Archive, Report 2013/284}, year = {2013}, url = {https://eprint.iacr.org/2013/284}, } @misc{cryptoeprint:2013:285, author = {Sutirtha Sanyal}, title = {A Novel Proof on Weil Pairing}, howpublished = {Cryptology ePrint Archive, Report 2013/285}, year = {2013}, url = {https://eprint.iacr.org/2013/285}, } @misc{cryptoeprint:2013:286, author = {Arno Mittelbach}, title = {Salvaging Indifferentiability in a Multi-stage Setting}, howpublished = {Cryptology ePrint Archive, Report 2013/286}, year = {2013}, url = {https://eprint.iacr.org/2013/286}, } @misc{cryptoeprint:2013:287, author = {I. V. Chizhov and M. A. Borodin}, title = {The failure of McEliece PKC based on Reed-Muller codes.}, howpublished = {Cryptology ePrint Archive, Report 2013/287}, year = {2013}, url = {https://eprint.iacr.org/2013/287}, } @misc{cryptoeprint:2013:288, author = {Maghsoud Parviz and Seyed Hassan Mousavi and Saeed Mirahmadi}, title = {Key Classification Attack on Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2013/288}, year = {2013}, url = {https://eprint.iacr.org/2013/288}, } @misc{cryptoeprint:2013:289, author = {Boaz Catane and Amir Herzberg}, title = {Secure Second Price Auctions with a Rational Auctioneer}, howpublished = {Cryptology ePrint Archive, Report 2013/289}, year = {2013}, url = {https://eprint.iacr.org/2013/289}, } @misc{cryptoeprint:2013:290, author = {Boaz Catane and Amir Herzberg}, title = {Massive Group Message Authentication with Revocable Anonymity}, howpublished = {Cryptology ePrint Archive, Report 2013/290}, year = {2013}, url = {https://eprint.iacr.org/2013/290}, } @misc{cryptoeprint:2013:291, author = {Antoine Joux and Antoine Rojat}, title = {Security ranking among assumptions within the Uber assumption framework}, howpublished = {Cryptology ePrint Archive, Report 2013/291}, year = {2013}, url = {https://eprint.iacr.org/2013/291}, } @misc{cryptoeprint:2013:292, author = {Daniel P. Martin and Elisabeth Oswald and Martijn Stam and Marcin Wojcik}, title = {A Leakage Resilient MAC}, howpublished = {Cryptology ePrint Archive, Report 2013/292}, year = {2013}, url = {https://eprint.iacr.org/2013/292}, } @misc{cryptoeprint:2013:293, author = {Vadim Lyubashevsky and Chris Peikert and Oded Regev}, title = {A Toolkit for Ring-LWE Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2013/293}, year = {2013}, url = {https://eprint.iacr.org/2013/293}, } @misc{cryptoeprint:2013:294, author = {Colin O'Flynn and Zhizhang (David) Chen}, title = {Synchronous Sampling and Clock Recovery of Internal Oscillators for Side Channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2013/294}, year = {2013}, url = {https://eprint.iacr.org/2013/294}, } @misc{cryptoeprint:2013:295, author = {Micka\"el Cazorla and Kevin Marquet and Marine Minier}, title = {Survey and Benchmark of Lightweight Block Ciphers for Wireless Sensor Networks}, howpublished = {Cryptology ePrint Archive, Report 2013/295}, year = {2013}, url = {https://eprint.iacr.org/2013/295}, } @misc{cryptoeprint:2013:296, author = {Morten Dahl and Ivan Damgård}, title = {Universally Composable Symbolic Analysis for Two-Party Protocols based on Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2013/296}, year = {2013}, url = {https://eprint.iacr.org/2013/296}, } @misc{cryptoeprint:2013:297, author = {Rachid El~Bansarkhani and Johannes Buchmann}, title = {Improvement and Efficient Implementation of a Lattice-based Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2013/297}, year = {2013}, url = {https://eprint.iacr.org/2013/297}, } @misc{cryptoeprint:2013:298, author = {Luke Mather and Elisabeth Oswald and Joe Bandenburg and Marcin Wojcik}, title = {Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests}, howpublished = {Cryptology ePrint Archive, Report 2013/298}, year = {2013}, url = {https://eprint.iacr.org/2013/298}, } @misc{cryptoeprint:2013:299, author = {Andres Enge and Emmanuel Thomé}, title = {Computing class polynomials for abelian surfaces}, howpublished = {Cryptology ePrint Archive, Report 2013/299}, year = {2013}, url = {https://eprint.iacr.org/2013/299}, } @misc{cryptoeprint:2013:300, author = {Allison Lewko and Sarah Meiklejohn}, title = {A Profitable Sub-Prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups}, howpublished = {Cryptology ePrint Archive, Report 2013/300}, year = {2013}, url = {https://eprint.iacr.org/2013/300}, } @misc{cryptoeprint:2013:301, author = {Zheng Yuan and Xian Li and Haixia Liu}, title = {Impossible Differential-Linear Cryptanalysis of Reduced-Round CLEFIA-128}, howpublished = {Cryptology ePrint Archive, Report 2013/301}, year = {2013}, url = {https://eprint.iacr.org/2013/301}, } @misc{cryptoeprint:2013:302, author = {Nicolas T. Courtois}, title = {Cryptanalysis of Grigoriev-Shpilrain Physical Asymmetric Scheme With Capacitors}, howpublished = {Cryptology ePrint Archive, Report 2013/302}, year = {2013}, url = {https://eprint.iacr.org/2013/302}, } @misc{cryptoeprint:2013:303, author = {Shivam Bhasin and Claude Carlet and Sylvain Guilley}, title = {Theory of masking with codewords in hardware: low-weight $d$th-order correlation-immune Boolean functions}, howpublished = {Cryptology ePrint Archive, Report 2013/303}, year = {2013}, url = {https://eprint.iacr.org/2013/303}, } @misc{cryptoeprint:2013:304, author = {Anthony Van Herrewege and Vincent van der Leest and Andr\'e Schaller and Stefan Katzenbeisser and Ingrid Verbauwhede}, title = {Secure PRNG Seeding on Commercial Off-the-Shelf Microcontrollers}, howpublished = {Cryptology ePrint Archive, Report 2013/304}, year = {2013}, url = {https://eprint.iacr.org/2013/304}, } @misc{cryptoeprint:2013:305, author = {Sonia Belaid and Fabrizio De Santis and Johann Heyszl and Stefan Mangard and Marcel Medwed and Jorn-Marc Schmidt and Francois-Xavier Standaert and Stefan Tillich}, title = {Towards Fresh Re-Keying with Leakage-Resilient PRFs: Cipher Design Principles and Analysis}, howpublished = {Cryptology ePrint Archive, Report 2013/305}, year = {2013}, url = {https://eprint.iacr.org/2013/305}, } @misc{cryptoeprint:2013:306, author = {Faruk G\"olo\u{g}lu and Robert Granger and Gary McGuire and Jens Zumbr\"agel}, title = {Solving a $6120$-bit DLP on a Desktop Computer}, howpublished = {Cryptology ePrint Archive, Report 2013/306}, year = {2013}, url = {https://eprint.iacr.org/2013/306}, } @misc{cryptoeprint:2013:307, author = {Rafail Ostrovsky and Anat Paskin-Cherniavsky and Beni Paskin-Cherniavsky}, title = {Maliciously Circuit-Private FHE}, howpublished = {Cryptology ePrint Archive, Report 2013/307}, year = {2013}, url = {https://eprint.iacr.org/2013/307}, } @misc{cryptoeprint:2013:308, author = {Fabien Laguillaumie and Adeline Langlois and Benoit Libert and Damien Stehle}, title = {Lattice-Based Group Signatures with Logarithmic Signature Size}, howpublished = {Cryptology ePrint Archive, Report 2013/308}, year = {2013}, url = {https://eprint.iacr.org/2013/308}, } @misc{cryptoeprint:2013:309, author = {Tomas Rosa}, title = {Bypassing Passkey Authentication in Bluetooth Low Energy}, howpublished = {Cryptology ePrint Archive, Report 2013/309}, year = {2013}, url = {https://eprint.iacr.org/2013/309}, } @misc{cryptoeprint:2013:310, author = {W. Michael Petullo and Xu Zhang and Jon A. Solworth and Daniel J. Bernstein and Tanja Lange}, title = {MinimaLT: Minimal-latency Networking Through Better Security}, howpublished = {Cryptology ePrint Archive, Report 2013/310}, year = {2013}, url = {https://eprint.iacr.org/2013/310}, } @misc{cryptoeprint:2013:311, author = {Aurore Guillevic and Sorina Ionica}, title = {Four-dimensional GLV via the Weil restriction}, howpublished = {Cryptology ePrint Archive, Report 2013/311}, year = {2013}, url = {https://eprint.iacr.org/2013/311}, } @misc{cryptoeprint:2013:312, author = {Benjamin Smith}, title = {Families of fast elliptic curves from Q-curves}, howpublished = {Cryptology ePrint Archive, Report 2013/312}, year = {2013}, url = {https://eprint.iacr.org/2013/312}, } @misc{cryptoeprint:2013:313, author = {Seunghwan Chang and Hoon Hong and Eunjeong Lee and Hyang-Sook Lee}, title = {Pairing Inversion via Non-degenerate Auxiliary Pairings}, howpublished = {Cryptology ePrint Archive, Report 2013/313}, year = {2013}, url = {https://eprint.iacr.org/2013/313}, } @misc{cryptoeprint:2013:314, author = {Timo Bartkewitz}, title = {Keyed Side-Channel Based Hashing for IP Protection using Wavelets}, howpublished = {Cryptology ePrint Archive, Report 2013/314}, year = {2013}, url = {https://eprint.iacr.org/2013/314}, } @misc{cryptoeprint:2013:315, author = {Albrecht Petzoldt}, title = {Hybrid Approach for the Fast Verification for Improved Versions of the UOV and Rainbow Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2013/315}, year = {2013}, url = {https://eprint.iacr.org/2013/315}, } @misc{cryptoeprint:2013:316, author = {José Bacelar Almeida and Manuel Barbosa and Gilles Barthe and François Dupressoir}, title = {Certified computer-aided cryptography: efficient provably secure machine code from high-level implementations}, howpublished = {Cryptology ePrint Archive, Report 2013/316}, year = {2013}, url = {https://eprint.iacr.org/2013/316}, } @misc{cryptoeprint:2013:317, author = {Michael Z. Lee and Alan M. Dunn and Jonathan Katz and Brent Waters and Emmett Witchel}, title = {Anon-Pass: Practical Anonymous Subscriptions}, howpublished = {Cryptology ePrint Archive, Report 2013/317}, year = {2013}, url = {https://eprint.iacr.org/2013/317}, } @misc{cryptoeprint:2013:318, author = {Yutaka Kawai and Katsuyuki Takashima}, title = {Fully-Anonymous Functional Proxy-Re-Encryption}, howpublished = {Cryptology ePrint Archive, Report 2013/318}, year = {2013}, url = {https://eprint.iacr.org/2013/318}, } @misc{cryptoeprint:2013:319, author = {Amadou Moctar Kane}, title = {On the use of continued fractions for stream ciphers}, howpublished = {Cryptology ePrint Archive, Report 2013/319}, year = {2013}, url = {https://eprint.iacr.org/2013/319}, } @misc{cryptoeprint:2013:320, author = {Roman Korkikian and David Naccache and Guilherme Ozari de Almeida}, title = {Instantaneous Frequency Analysis}, howpublished = {Cryptology ePrint Archive, Report 2013/320}, year = {2013}, url = {https://eprint.iacr.org/2013/320}, } @misc{cryptoeprint:2013:321, author = {Keita Emura and Atsuko Miyaji and Mohammad Shahriar Rahman and Kazumasa Omote}, title = {Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security}, howpublished = {Cryptology ePrint Archive, Report 2013/321}, year = {2013}, url = {https://eprint.iacr.org/2013/321}, } @misc{cryptoeprint:2013:322, author = {Jean-Philippe Aumasson and Samuel Neves and Zooko Wilcox-O'Hearn and Christian Winnerlein}, title = {BLAKE2: simpler, smaller, fast as MD5}, howpublished = {Cryptology ePrint Archive, Report 2013/322}, year = {2013}, url = {https://eprint.iacr.org/2013/322}, } @misc{cryptoeprint:2013:323, author = {Tsz Hon Yuen and Ye Zhang and Siu-Ming Yiu}, title = {Encryption Schemes with Post-Challenge Auxiliary Inputs}, howpublished = {Cryptology ePrint Archive, Report 2013/323}, year = {2013}, url = {https://eprint.iacr.org/2013/323}, } @misc{cryptoeprint:2013:324, author = {Anne Canteaut and María Naya-Plasencia and Bastien Vayssiere}, title = {Sieve-in-the-Middle: Improved MITM Attacks (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2013/324}, year = {2013}, url = {https://eprint.iacr.org/2013/324}, } @misc{cryptoeprint:2013:325, author = {Daniel J. Bernstein and Mike Hamburg and Anna Krasnova and Tanja Lange}, title = {Elligator: Elliptic-curve points indistinguishable from uniform random strings}, howpublished = {Cryptology ePrint Archive, Report 2013/325}, year = {2013}, url = {https://eprint.iacr.org/2013/325}, } @misc{cryptoeprint:2013:326, author = {Mihir Bellare and Sarah Meiklejohn and Susan Thomson}, title = {Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig}, howpublished = {Cryptology ePrint Archive, Report 2013/326}, year = {2013}, url = {https://eprint.iacr.org/2013/326}, } @misc{cryptoeprint:2013:327, author = {Shenghui Su and Tao Xie and Shuwang Lü}, title = {A Lightweight Hash Function Resisting Birthday Attack and Meet-in-the-middle Attack}, howpublished = {Cryptology ePrint Archive, Report 2013/327}, year = {2013}, url = {https://eprint.iacr.org/2013/327}, } @misc{cryptoeprint:2013:328, author = {Nicky Mouha and Bart Preneel}, title = {Towards Finding Optimal Differential Characteristics for ARX: Application to Salsa20}, howpublished = {Cryptology ePrint Archive, Report 2013/328}, year = {2013}, url = {https://eprint.iacr.org/2013/328}, } @misc{cryptoeprint:2013:329, author = {Kristian Gjøsteen}, title = {Protocol Variants and Electronic Identification}, howpublished = {Cryptology ePrint Archive, Report 2013/329}, year = {2013}, url = {https://eprint.iacr.org/2013/329}, } @misc{cryptoeprint:2013:330, author = {Afonso Arriaga and Qiang Tang and Peter Ryan}, title = {Trapdoor Privacy in Asymmetric Searchable Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2013/330}, year = {2013}, url = {https://eprint.iacr.org/2013/330}, } @misc{cryptoeprint:2013:331, author = {Yannick Seurin}, title = {New Constructions and Applications of Trapdoor DDH Groups}, howpublished = {Cryptology ePrint Archive, Report 2013/331}, year = {2013}, url = {https://eprint.iacr.org/2013/331}, } @misc{cryptoeprint:2013:332, author = {Mikhail S. Lobanov}, title = {A method for obtaining lower bounds on the higher order nonlinearity of Boolean function}, howpublished = {Cryptology ePrint Archive, Report 2013/332}, year = {2013}, url = {https://eprint.iacr.org/2013/332}, } @misc{cryptoeprint:2013:333, author = {Bertram Poettering and Douglas Stebila}, title = {Double-authentication-preventing signatures}, howpublished = {Cryptology ePrint Archive, Report 2013/333}, year = {2013}, url = {https://eprint.iacr.org/2013/333}, } @misc{cryptoeprint:2013:334, author = {Dominik Merli and Frederic Stumpf and Georg Sigl}, title = {Protecting PUF Error Correction by Codeword Masking}, howpublished = {Cryptology ePrint Archive, Report 2013/334}, year = {2013}, url = {https://eprint.iacr.org/2013/334}, } @misc{cryptoeprint:2013:335, author = {Seny Kamara and Charalampos Papamanthou}, title = {Parallel and Dynamic Searchable Symmetric Encryption}, howpublished = {Cryptology ePrint Archive, Report 2013/335}, year = {2013}, url = {https://eprint.iacr.org/2013/335}, } @misc{cryptoeprint:2013:336, author = {Wen-Long Sun Jie Guan Lin Ding}, title = {A Novel Technique in Linear Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2013/336}, year = {2013}, url = {https://eprint.iacr.org/2013/336}, } @misc{cryptoeprint:2013:337, author = {Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee}, title = {Attribute-Based Encryption for Circuits}, howpublished = {Cryptology ePrint Archive, Report 2013/337}, year = {2013}, url = {https://eprint.iacr.org/2013/337}, } @misc{cryptoeprint:2013:338, author = {Yevgeniy Dodis and David Pointcheval and Sylvain Ruhault and Damien Vergnaud and Daniel Wichs }, title = {Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust}, howpublished = {Cryptology ePrint Archive, Report 2013/338}, year = {2013}, url = {https://eprint.iacr.org/2013/338}, } @misc{cryptoeprint:2013:339, author = {Hugo Krawczyk and Kenneth G. Paterson and Hoeteck Wee}, title = {On the Security of the TLS Protocol: A Systematic Analysis}, howpublished = {Cryptology ePrint Archive, Report 2013/339}, year = {2013}, url = {https://eprint.iacr.org/2013/339}, } @misc{cryptoeprint:2013:340, author = {Craig Gentry and Amit Sahai and Brent Waters}, title = {Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based}, howpublished = {Cryptology ePrint Archive, Report 2013/340}, year = {2013}, url = {https://eprint.iacr.org/2013/340}, } @misc{cryptoeprint:2013:341, author = {Fabrice Benhamouda and David Pointcheval}, title = {Trapdoor Smooth Projective Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2013/341}, year = {2013}, url = {https://eprint.iacr.org/2013/341}, } @misc{cryptoeprint:2013:342, author = {Xiang Xie and Rui Xue}, title = {Attribute-Based Encryption for a Subclass of Circuits with Bounded Depth from Lattices}, howpublished = {Cryptology ePrint Archive, Report 2013/342}, year = {2013}, url = {https://eprint.iacr.org/2013/342}, } @misc{cryptoeprint:2013:343, author = {Anne Broadbent and Gus Gutoski and Douglas Stebila}, title = {Quantum one-time programs}, howpublished = {Cryptology ePrint Archive, Report 2013/343}, year = {2013}, url = {https://eprint.iacr.org/2013/343}, } @misc{cryptoeprint:2013:344, author = {Andrej Bogdanov and Chin Ho Lee}, title = {Limits of provable security for homomorphic encryption}, howpublished = {Cryptology ePrint Archive, Report 2013/344}, year = {2013}, url = {https://eprint.iacr.org/2013/344}, } @misc{cryptoeprint:2013:345, author = {Arnab Roy and Srinivas Vivek}, title = {Analysis and Improvement of the Generic Higher-Order Masking Scheme of FSE 2012}, howpublished = {Cryptology ePrint Archive, Report 2013/345}, year = {2013}, url = {https://eprint.iacr.org/2013/345}, } @misc{cryptoeprint:2013:346, author = {Elke De Mulder and Michael Hutter and Mark E. Marson and Peter Pearson}, title = {Using Bleichenbacher's Solution to the Hidden Number Problem to Attack Nonce Leaks in 384-Bit ECDSA}, howpublished = {Cryptology ePrint Archive, Report 2013/346}, year = {2013}, url = {https://eprint.iacr.org/2013/346}, } @misc{cryptoeprint:2013:347, author = {Debrup Chakraborty and Cuauhtemoc Mancillas-Lopez and Palash Sarkar}, title = {STES: A Stream Cipher Based Low Cost Scheme for Securing Stored Data}, howpublished = {Cryptology ePrint Archive, Report 2013/347}, year = {2013}, url = {https://eprint.iacr.org/2013/347}, } @misc{cryptoeprint:2013:348, author = {Bin Wang and Xiaojing Hong}, title = {Multi-file proofs of retrievability for cloud storage auditing}, howpublished = {Cryptology ePrint Archive, Report 2013/348}, year = {2013}, url = {https://eprint.iacr.org/2013/348}, } @misc{cryptoeprint:2013:349, author = {Martin Hirt and Christoph Lucas and Ueli Maurer}, title = {A Dynamic Tradeoff Between Active and Passive Corruptions in Secure Multi-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2013/349}, year = {2013}, url = {https://eprint.iacr.org/2013/349}, } @misc{cryptoeprint:2013:350, author = {Paul Baecher and Pooya Farshim and Marc Fischlin and Martijn Stam}, title = {Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2013/350}, year = {2013}, url = {https://eprint.iacr.org/2013/350}, } @misc{cryptoeprint:2013:351, author = {Justin Thaler}, title = {Time-Optimal Interactive Proofs for Circuit Evaluation}, howpublished = {Cryptology ePrint Archive, Report 2013/351}, year = {2013}, url = {https://eprint.iacr.org/2013/351}, } @misc{cryptoeprint:2013:352, author = {Dan Boneh and Brent Waters}, title = {Constrained Pseudorandom Functions and Their Applications}, howpublished = {Cryptology ePrint Archive, Report 2013/352}, year = {2013}, url = {https://eprint.iacr.org/2013/352}, } @misc{cryptoeprint:2013:353, author = {Carolyn Whitnall and Elisabeth Oswald}, title = {Profiling DPA: Efficacy and efficiency trade-offs}, howpublished = {Cryptology ePrint Archive, Report 2013/353}, year = {2013}, url = {https://eprint.iacr.org/2013/353}, } @misc{cryptoeprint:2013:354, author = {Eduarda S.V. Freire and Dennis Hofheinz and Kenneth G. Paterson and Christoph Striecks}, title = {Programmable Hash Functions in the Multilinear Setting}, howpublished = {Cryptology ePrint Archive, Report 2013/354}, year = {2013}, url = {https://eprint.iacr.org/2013/354}, } @misc{cryptoeprint:2013:355, author = {Peeter Laud and Alisa Pankova}, title = {New Attacks against Transformation-Based Privacy-Preserving Linear Programming}, howpublished = {Cryptology ePrint Archive, Report 2013/355}, year = {2013}, url = {https://eprint.iacr.org/2013/355}, } @misc{cryptoeprint:2013:356, author = {Benjamin Braun and Ariel J. Feldman and Zuocheng Ren and Srinath Setty and Andrew J. Blumberg and Michael Walfish}, title = {Verifying Computations with State (Extended Version)}, howpublished = {Cryptology ePrint Archive, Report 2013/356}, year = {2013}, url = {https://eprint.iacr.org/2013/356}, } @misc{cryptoeprint:2013:357, author = {Dmitry Khovratovich and Christian Rechberger}, title = {The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE}, howpublished = {Cryptology ePrint Archive, Report 2013/357}, year = {2013}, url = {https://eprint.iacr.org/2013/357}, } @misc{cryptoeprint:2013:358, author = {Marc Stevens}, title = {Counter-cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2013/358}, year = {2013}, url = {https://eprint.iacr.org/2013/358}, } @misc{cryptoeprint:2013:359, author = {Aleksandar Kircanski and Riham AlTawy and Amr M. Youssef}, title = {A heuristic for finding compatible differential paths with application to HAS-160}, howpublished = {Cryptology ePrint Archive, Report 2013/359}, year = {2013}, url = {https://eprint.iacr.org/2013/359}, } @misc{cryptoeprint:2013:360, author = {Frédéric Dupuis and Omar Fawzi and Stephanie Wehner}, title = {Achieving the limits of the noisy-storage model using entanglement sampling}, howpublished = {Cryptology ePrint Archive, Report 2013/360}, year = {2013}, url = {https://eprint.iacr.org/2013/360}, } @misc{cryptoeprint:2013:361, author = {Benoit Libert and Thomas Peters and Marc Joye and Moti Yung}, title = {Linearly Homomorphic Structure-Preserving Signatures and Their Applications}, howpublished = {Cryptology ePrint Archive, Report 2013/361}, year = {2013}, url = {https://eprint.iacr.org/2013/361}, } @misc{cryptoeprint:2013:362, author = {Shigeo MITSUNARI}, title = {A Fast Implementation of the Optimal Ate Pairing over BN curve on Intel Haswell Processor}, howpublished = {Cryptology ePrint Archive, Report 2013/362}, year = {2013}, url = {https://eprint.iacr.org/2013/362}, } @misc{cryptoeprint:2013:363, author = {Masao KASAHARA}, title = {A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SE(1)PKC.-- Along with a presentation of K(XII)SE(1)PKC over the extension field extensively used for present day various storage and transmission systems --}, howpublished = {Cryptology ePrint Archive, Report 2013/363}, year = {2013}, url = {https://eprint.iacr.org/2013/363}, } @misc{cryptoeprint:2013:364, author = {Angelo De Caro and Vincenzo Iovino Abhishek Jain and Adam O'Neill and Omer Paneth and Giuseppe Persiano}, title = {On the Achievability of Simulation-Based Security for Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2013/364}, year = {2013}, url = {https://eprint.iacr.org/2013/364}, } @misc{cryptoeprint:2013:365, author = {Zheng Yang}, title = {Efficient eCK-secure Authenticated Key Exchange Protocols in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2013/365}, year = {2013}, url = {https://eprint.iacr.org/2013/365}, } @misc{cryptoeprint:2013:366, author = {Pierre-Alain Fouque and Jérémy Jean and Thomas Peyrin}, title = {Structural Evaluation of AES and Chosen-Key Distinguisher of 9-round AES-128}, howpublished = {Cryptology ePrint Archive, Report 2013/366}, year = {2013}, url = {https://eprint.iacr.org/2013/366}, } @misc{cryptoeprint:2013:367, author = {Florian Kohlar and Sven Schäge and Jörg Schwenk}, title = {On the Security of TLS-DH and TLS-RSA in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2013/367}, year = {2013}, url = {https://eprint.iacr.org/2013/367}, } @misc{cryptoeprint:2013:368, author = {Jacques Patarin}, title = {Security in $O(2^n)$ for the Xor of Two Random Permutations\\ -- Proof with the standard $H$ technique--}, howpublished = {Cryptology ePrint Archive, Report 2013/368}, year = {2013}, url = {https://eprint.iacr.org/2013/368}, } @misc{cryptoeprint:2013:369, author = {Benoît Gérard and Vincent Grosso and María Naya-Plasencia and François-Xavier Standaert}, title = {Block Ciphers that are Easier to Mask: How Far Can we Go?}, howpublished = {Cryptology ePrint Archive, Report 2013/369}, year = {2013}, url = {https://eprint.iacr.org/2013/369}, } @misc{cryptoeprint:2013:370, author = {François-Xavier Standaert and Olivier Pereira and Yu Yu}, title = {Leakage-Resilient Symmetric Cryptography Under Empirically Verifiable Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2013/370}, year = {2013}, url = {https://eprint.iacr.org/2013/370}, } @misc{cryptoeprint:2013:371, author = {Dan Bogdanov and Peeter Laud and Jaak Randmets}, title = {Domain-Polymorphic Programming of Privacy-Preserving Applications}, howpublished = {Cryptology ePrint Archive, Report 2013/371}, year = {2013}, url = {https://eprint.iacr.org/2013/371}, } @misc{cryptoeprint:2013:372, author = {Jacob Alperin-Sheriff and Chris Peikert}, title = {Practical Bootstrapping in Quasilinear Time}, howpublished = {Cryptology ePrint Archive, Report 2013/372}, year = {2013}, url = {https://eprint.iacr.org/2013/372}, } @misc{cryptoeprint:2013:373, author = {Pierre-Alain Fouque and Antoine Joux and Mehdi Tibouchi}, title = {Injective Encoding to Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2013/373}, year = {2013}, url = {https://eprint.iacr.org/2013/373}, } @misc{cryptoeprint:2013:374, author = {Majid Bayat, Mohammad Reza Aref}, title = {A Secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN}, howpublished = {Cryptology ePrint Archive, Report 2013/374}, year = {2013}, url = {https://eprint.iacr.org/2013/374}, } @misc{cryptoeprint:2013:375, author = {Michael Hutter and Peter Schwabe}, title = {NaCl on 8-Bit AVR Microcontrollers}, howpublished = {Cryptology ePrint Archive, Report 2013/375}, year = {2013}, url = {https://eprint.iacr.org/2013/375}, } @misc{cryptoeprint:2013:376, author = {Roel Maes}, title = {An Accurate Probabilistic Reliability Model for Silicon PUFs}, howpublished = {Cryptology ePrint Archive, Report 2013/376}, year = {2013}, url = {https://eprint.iacr.org/2013/376}, } @misc{cryptoeprint:2013:377, author = {Alex Escala and Gottfried Herold and Eike Kiltz and Carla Ràfols and Jorge Villar }, title = {An Algebraic Framework for Diffie-Hellman Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2013/377}, year = {2013}, url = {https://eprint.iacr.org/2013/377}, } @misc{cryptoeprint:2013:378, author = {Martin Roetteler and Rainer Steinwandt}, title = {A note on quantum related-key attacks}, howpublished = {Cryptology ePrint Archive, Report 2013/378}, year = {2013}, url = {https://eprint.iacr.org/2013/378}, } @misc{cryptoeprint:2013:379, author = {Aggelos Kiayias and Stavros Papadopoulos and Nikos Triandopoulos and Thomas Zacharias}, title = {Delegatable Pseudorandom Functions and Applications}, howpublished = {Cryptology ePrint Archive, Report 2013/379}, year = {2013}, url = {https://eprint.iacr.org/2013/379}, } @misc{cryptoeprint:2013:380, author = {Yalin Chen 1, *Jue-Sam Chou2, Wen-Yi Tsai 3}, title = {Comments on Three Multi-Server Authentication Protocols}, howpublished = {Cryptology ePrint Archive, Report 2013/380}, year = {2013}, url = {https://eprint.iacr.org/2013/380}, } @misc{cryptoeprint:2013:381, author = {Bingke Ma and Bao Li and Ronglin Hao}, title = {Breaking the Even-Mansour Hash Function: Collision and Preimage Attacks on JH and Gr{\o}stl}, howpublished = {Cryptology ePrint Archive, Report 2013/381}, year = {2013}, url = {https://eprint.iacr.org/2013/381}, } @misc{cryptoeprint:2013:382, author = {Yevgeniy Dodis and Thomas Ristenpart and John Steinberger and Stefano Tessaro}, title = {To Hash or Not to Hash Again? (In)differentiability Results for H^2 and HMAC}, howpublished = {Cryptology ePrint Archive, Report 2013/382}, year = {2013}, url = {https://eprint.iacr.org/2013/382}, } @misc{cryptoeprint:2013:383, author = {Léo Ducas and Alain Durmus and Tancrède Lepoint and Vadim Lyubashevsky}, title = {Lattice Signatures and Bimodal Gaussians}, howpublished = {Cryptology ePrint Archive, Report 2013/383}, year = {2013}, url = {https://eprint.iacr.org/2013/383}, } @misc{cryptoeprint:2013:384, author = {Kwangsu Lee and Dong Hoon Lee and Moti Yung}, title = {Sequential Aggregate Signatures Made Shorter}, howpublished = {Cryptology ePrint Archive, Report 2013/384}, year = {2013}, url = {https://eprint.iacr.org/2013/384}, } @misc{cryptoeprint:2013:385, author = {Umar Mujahid, M.Najam-ul-islam, Jameel Ahmed, Usman Mujahid}, title = {Cryptanalysis of ultralightweight RFID authentication protocol}, howpublished = {Cryptology ePrint Archive, Report 2013/385}, year = {2013}, url = {https://eprint.iacr.org/2013/385}, } @misc{cryptoeprint:2013:386, author = {Nadia El Mrabet}, title = {Side Channel Attacks against Pairing over Theta Functions}, howpublished = {Cryptology ePrint Archive, Report 2013/386}, year = {2013}, url = {https://eprint.iacr.org/2013/386}, } @misc{cryptoeprint:2013:387, author = {Jonathan Trostle and Hosei Matsuoka and James Kempf and Toshiro Kawahara and Ravi Jain}, title = {Cryptographically Protected Prefixes for Location Privacy in IPv6}, howpublished = {Cryptology ePrint Archive, Report 2013/387}, year = {2013}, url = {https://eprint.iacr.org/2013/387}, } @misc{cryptoeprint:2013:388, author = {Tsukasa Ishiguro and Shinsaku Kiyomoto and Yutaka Miyake and Tsuyoshi Takagi}, title = {Parallel Gauss Sieve Algorithm : Solving the SVP in the Ideal Lattice of 128-dimensions}, howpublished = {Cryptology ePrint Archive, Report 2013/388}, year = {2013}, url = {https://eprint.iacr.org/2013/388}, } @misc{cryptoeprint:2013:389, author = {Jan-Jaap Oosterwijk and Boris Skoric and Jeroen Doumen}, title = {A Capacity-Achieving Simple Decoder for Bias-Based Traitor Tracing Schemes}, howpublished = {Cryptology ePrint Archive, Report 2013/389}, year = {2013}, url = {https://eprint.iacr.org/2013/389}, } @misc{cryptoeprint:2013:390, author = {Keita Emura and Goichiro Hanaoka and Koji Nuida and Go Ohtake and Takahiro Matsuda and Shota Yamada}, title = {Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2013/390}, year = {2013}, url = {https://eprint.iacr.org/2013/390}, } @misc{cryptoeprint:2013:391, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {Key Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full $\mbox{AES}^{2}$}, howpublished = {Cryptology ePrint Archive, Report 2013/391}, year = {2013}, url = {https://eprint.iacr.org/2013/391}, } @misc{cryptoeprint:2013:392, author = {Christian Hanser and Daniel Slamanig}, title = {Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2013/392}, year = {2013}, url = {https://eprint.iacr.org/2013/392}, } @misc{cryptoeprint:2013:393, author = {Yong Li and Zheng Yang}, title = {Strongly Secure One-round Group Authenticated Key Exchange in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2013/393}, year = {2013}, url = {https://eprint.iacr.org/2013/393}, } @misc{cryptoeprint:2013:394, author = {Shenghui Su and Shuwang Lü and Maozhi Xu and Tao Xie}, title = {A Public Key Cryptoscheme Using Bit-pair Shadows}, howpublished = {Cryptology ePrint Archive, Report 2013/394}, year = {2013}, url = {https://eprint.iacr.org/2013/394}, } @misc{cryptoeprint:2013:396, author = {Emmanuel Prouff and Matthieu Rivain and Thomas Roche}, title = {On the Practical Security of a Leakage Resilient Masking Scheme}, howpublished = {Cryptology ePrint Archive, Report 2013/396}, year = {2013}, url = {https://eprint.iacr.org/2013/396}, } @misc{cryptoeprint:2013:397, author = {Giorgia Azzurra Marson and Bertram Poettering}, title = {Practical Secure Logging: Seekable Sequential Key Generators}, howpublished = {Cryptology ePrint Archive, Report 2013/397}, year = {2013}, url = {https://eprint.iacr.org/2013/397}, } @misc{cryptoeprint:2013:398, author = {Colin Boyd and Cas Cremers and Michèle Feltz and Kenneth G. Paterson and Bertram Poettering and Douglas Stebila}, title = {ASICS: Authenticated Key Exchange Security Incorporating Certification Systems}, howpublished = {Cryptology ePrint Archive, Report 2013/398}, year = {2013}, url = {https://eprint.iacr.org/2013/398}, } @misc{cryptoeprint:2013:399, author = {Roel Peeters and Jens Hermans}, title = {Attack on Liao and Hsiao's Secure ECC-based RFID Authentication Scheme integrated with ID-Verifier Transfer Protocol}, howpublished = {Cryptology ePrint Archive, Report 2013/399}, year = {2013}, url = {https://eprint.iacr.org/2013/399}, } @misc{cryptoeprint:2013:400, author = {Razvan Barbulescu and Pierrick Gaudry and Antoine Joux and Emmanuel Thomé}, title = {A quasi-polynomial algorithm for discrete logarithm in finite fields of small characteristic}, howpublished = {Cryptology ePrint Archive, Report 2013/400}, year = {2013}, url = {https://eprint.iacr.org/2013/400}, } @misc{cryptoeprint:2013:401, author = {Elette Boyle and Shafi Goldwasser and Ioana Ivan}, title = {Functional Signatures and Pseudorandom Functions}, howpublished = {Cryptology ePrint Archive, Report 2013/401}, year = {2013}, url = {https://eprint.iacr.org/2013/401}, } @misc{cryptoeprint:2013:402, author = {Jue-Sam Chou1*, Chun-Hui Huang2, Yu-Siang Huang3, Yalin Chen4}, title = {Efficient Two-Pass Anonymous Identity Authentication Using Smart Card}, howpublished = {Cryptology ePrint Archive, Report 2013/402}, year = {2013}, url = {https://eprint.iacr.org/2013/402}, } @misc{cryptoeprint:2013:403, author = {Dan Boneh and Ananth Raghunathan and Gil Segev}, title = {Function-Private Subspace-Membership Encryption and Its Applications}, howpublished = {Cryptology ePrint Archive, Report 2013/403}, year = {2013}, url = {https://eprint.iacr.org/2013/403}, } @misc{cryptoeprint:2013:404, author = {Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers}, title = {The SIMON and SPECK Families of Lightweight Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2013/404}, year = {2013}, url = {https://eprint.iacr.org/2013/404}, } @misc{cryptoeprint:2013:405, author = {Chunming Tang, Yanfeng Qi, Maozhi Xu}, title = {New Quadratic Bent Functions in Polynomial Forms with Coefficients in Extension Fields}, howpublished = {Cryptology ePrint Archive, Report 2013/405}, year = {2013}, url = {https://eprint.iacr.org/2013/405}, } @misc{cryptoeprint:2013:406, author = {Zhiwei Wang and Ruirui Xie and Wei Zhang and Liwen He and Guozi Sun and Wei Chen}, title = {Attribute-Based Server-Aided Verification Signature}, howpublished = {Cryptology ePrint Archive, Report 2013/406}, year = {2013}, url = {https://eprint.iacr.org/2013/406}, } @misc{cryptoeprint:2013:407, author = {Martin Gagné and Pascal Lafourcade and Yassine Lakhnech}, title = {Automated Security Proofs for Almost-Universal Hash for MAC verification}, howpublished = {Cryptology ePrint Archive, Report 2013/407}, year = {2013}, url = {https://eprint.iacr.org/2013/407}, } @misc{cryptoeprint:2013:408, author = {Michael Backes and Sebastian Meiser and Dominique Schröder}, title = {Delegatable Functional Signatures}, howpublished = {Cryptology ePrint Archive, Report 2013/408}, year = {2013}, url = {https://eprint.iacr.org/2013/408}, } @misc{cryptoeprint:2013:409, author = {Tal Malkin and Isamu Teranishi and Moti Yung}, title = {Order-Preserving Encryption Secure Beyond One-Wayness}, howpublished = {Cryptology ePrint Archive, Report 2013/409}, year = {2013}, url = {https://eprint.iacr.org/2013/409}, } @misc{cryptoeprint:2013:410, author = {Yossi Gilad and Amir Herzberg}, title = {Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI}, howpublished = {Cryptology ePrint Archive, Report 2013/410}, year = {2013}, url = {https://eprint.iacr.org/2013/410}, } @misc{cryptoeprint:2013:411, author = {Wang Shao-Hui, Xiao Fu, Chen Dan-wei, Wang Ru-chuan}, title = {Security Analysis of Lightweight Authentication Protocol from WISTP 2013}, howpublished = {Cryptology ePrint Archive, Report 2013/411}, year = {2013}, url = {https://eprint.iacr.org/2013/411}, } @misc{cryptoeprint:2013:412, author = {Yuan Tian, Xueyong Zhu, Rongxin Sun}, title = {Moduar Form Aprroach to Solving Lattice Problems}, howpublished = {Cryptology ePrint Archive, Report 2013/412}, year = {2013}, url = {https://eprint.iacr.org/2013/412}, } @misc{cryptoeprint:2013:413, author = {Mihir Bellare and Georg Fuchsbauer}, title = {Policy-Based Signatures}, howpublished = {Cryptology ePrint Archive, Report 2013/413}, year = {2013}, url = {https://eprint.iacr.org/2013/413}, } @misc{cryptoeprint:2013:414, author = {Chunhua Jin, Chunxiang Xu, Xiaojun Zhang, Qianna Xie, Fagen Li}, title = {A novel certificateless deniable authentication protocol}, howpublished = {Cryptology ePrint Archive, Report 2013/414}, year = {2013}, url = {https://eprint.iacr.org/2013/414}, } @misc{cryptoeprint:2013:415, author = {Ciaran Mullan and Boaz Tsaban}, title = {SL2 homomorphic hash functions: Worst case to average case reduction and short collision search}, howpublished = {Cryptology ePrint Archive, Report 2013/415}, year = {2013}, url = {https://eprint.iacr.org/2013/415}, } @misc{cryptoeprint:2013:416, author = {Benjamin Fuller and Xianrui Meng and Leonid Reyzin}, title = {Computational Fuzzy Extractors}, howpublished = {Cryptology ePrint Archive, Report 2013/416}, year = {2013}, url = {https://eprint.iacr.org/2013/416}, } @misc{cryptoeprint:2013:417, author = {Yongjuan Wang and Liren Ding and Wenbao Han and Xiangyu Wang}, title = {The Improved Cube Attack on Grain-v1}, howpublished = {Cryptology ePrint Archive, Report 2013/417}, year = {2013}, url = {https://eprint.iacr.org/2013/417}, } @misc{cryptoeprint:2013:418, author = {Nils Fleischhacker and Tibor Jager and Dominique Schröder}, title = {On Tight Security Proofs for Schnorr Signatures}, howpublished = {Cryptology ePrint Archive, Report 2013/418}, year = {2013}, url = {https://eprint.iacr.org/2013/418}, } @misc{cryptoeprint:2013:419, author = {Rikke Bendlin and Sara Krehbiel and Chris Peikert}, title = {How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE}, howpublished = {Cryptology ePrint Archive, Report 2013/419}, year = {2013}, url = {https://eprint.iacr.org/2013/419}, } @misc{cryptoeprint:2013:420, author = {B. Skoric and J.-J. Oosterwijk and J. Doumen}, title = {The Holey Grail: A special score function for non-binary traitor tracing}, howpublished = {Cryptology ePrint Archive, Report 2013/420}, year = {2013}, url = {https://eprint.iacr.org/2013/420}, } @misc{cryptoeprint:2013:421, author = {Valentina Banciu and Simon Hoerder and Dan Page}, title = {Light-weight primitive, feather-weight security? A cryptanalytic knock-out. (Preliminary results)}, howpublished = {Cryptology ePrint Archive, Report 2013/421}, year = {2013}, url = {https://eprint.iacr.org/2013/421}, } @misc{cryptoeprint:2013:422, author = {Dan Boneh and Craig Gentry and Shai Halevi and Frank Wang and David J. Wu}, title = {Private Database Queries Using Somewhat Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2013/422}, year = {2013}, url = {https://eprint.iacr.org/2013/422}, } @misc{cryptoeprint:2013:423, author = {Benny Applebaum and Yoni Moses}, title = {Locally Computable UOWHF with Linear Shrinkage}, howpublished = {Cryptology ePrint Archive, Report 2013/423}, year = {2013}, url = {https://eprint.iacr.org/2013/423}, } @misc{cryptoeprint:2013:424, author = {Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi}, title = {Instantiating Random Oracles via UCEs}, howpublished = {Cryptology ePrint Archive, Report 2013/424}, year = {2013}, url = {https://eprint.iacr.org/2013/424}, } @misc{cryptoeprint:2013:425, author = {Rafik Chaabouni}, title = {Break WEP Faster with Statistical Analysis}, howpublished = {Cryptology ePrint Archive, Report 2013/425}, year = {2013}, url = {https://eprint.iacr.org/2013/425}, } @misc{cryptoeprint:2013:426, author = {Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi and Phillip Rogaway}, title = {Efficient Garbling from a Fixed-Key Blockcipher}, howpublished = {Cryptology ePrint Archive, Report 2013/426}, year = {2013}, url = {https://eprint.iacr.org/2013/426}, } @misc{cryptoeprint:2013:427, author = {Jiangtao Han and Haining Fan}, title = {Toeplitz matrix-vector product based GF(2^n) shifted polynomial basis multipliers for all irreducible pentanomials}, howpublished = {Cryptology ePrint Archive, Report 2013/427}, year = {2013}, url = {https://eprint.iacr.org/2013/427}, } @misc{cryptoeprint:2013:428, author = {Roberto Avanzi and Billy Bob Brumley}, title = {Faster 128-EEA3 and 128-EIA3 Software}, howpublished = {Cryptology ePrint Archive, Report 2013/428}, year = {2013}, url = {https://eprint.iacr.org/2013/428}, } @misc{cryptoeprint:2013:429, author = {Mihir Bellare and Sriram Keelveedhi and Thomas Ristenpart}, title = {DupLESS: Server-Aided Encryption for Deduplicated Storage}, howpublished = {Cryptology ePrint Archive, Report 2013/429}, year = {2013}, url = {https://eprint.iacr.org/2013/429}, } @misc{cryptoeprint:2013:430, author = {Jooyoung Lee}, title = {Security of the Misty Structure Beyond the Birthday Bound}, howpublished = {Cryptology ePrint Archive, Report 2013/430}, year = {2013}, url = {https://eprint.iacr.org/2013/430}, } @misc{cryptoeprint:2013:431, author = {Orr Dunkelman and Nathan Keller}, title = {Practical-Time Attacks Against Reduced Variants of MISTY1}, howpublished = {Cryptology ePrint Archive, Report 2013/431}, year = {2013}, url = {https://eprint.iacr.org/2013/431}, } @misc{cryptoeprint:2013:432, author = {Eric Brier and David Naccache and Li-yao Xia }, title = {How to Sign Paper Contracts? Conjectures & Evidence Related to Equitable & Efficient Collaborative Task Scheduling}, howpublished = {Cryptology ePrint Archive, Report 2013/432}, year = {2013}, url = {https://eprint.iacr.org/2013/432}, } @misc{cryptoeprint:2013:433, author = {Alexandra Boldyreva and Jean Paul Degabriele and Kenneth G. Paterson and Martijn Stam}, title = {On Symmetric Encryption with Distinguishable Decryption Failures}, howpublished = {Cryptology ePrint Archive, Report 2013/433}, year = {2013}, url = {https://eprint.iacr.org/2013/433}, } @misc{cryptoeprint:2013:434, author = {Susan Hohenberger and Amit Sahai and Brent Waters}, title = {Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures}, howpublished = {Cryptology ePrint Archive, Report 2013/434}, year = {2013}, url = {https://eprint.iacr.org/2013/434}, } @misc{cryptoeprint:2013:435, author = {Fabrice Benhamouda and Javier Herranz and Marc Joye and and Benoît Libert}, title = {Efficient Cryptosystems From $2^k$-th Power Residue Symbols}, howpublished = {Cryptology ePrint Archive, Report 2013/435}, year = {2013}, url = {https://eprint.iacr.org/2013/435}, } @misc{cryptoeprint:2013:436, author = {Charles Bouillaguet and Chen-Mou Cheng and Tung Chou and Ruben Niederhagen and Bo-Yin Yang}, title = {Fast Exhaustive Search for Quadratic Systems in $\mathbb{F}_2$ on FPGAs --- Extended Version}, howpublished = {Cryptology ePrint Archive, Report 2013/436}, year = {2013}, url = {https://eprint.iacr.org/2013/436}, } @misc{cryptoeprint:2013:437, author = {Salil Vadhan and Colin Jia Zheng}, title = {A Uniform Min-Max Theorem with Applications in Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2013/437}, year = {2013}, url = {https://eprint.iacr.org/2013/437}, } @misc{cryptoeprint:2013:438, author = {Johann Heyszl and Andreas Ibing and Stefan Mangard and Fabrizio De Santis and Georg Sigl}, title = {Clustering Algorithms for Non-Profiled Single-Execution Attacks on Exponentiations}, howpublished = {Cryptology ePrint Archive, Report 2013/438}, year = {2013}, url = {https://eprint.iacr.org/2013/438}, } @misc{cryptoeprint:2013:439, author = {Peter Pessl and Michael Hutter}, title = {Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID}, howpublished = {Cryptology ePrint Archive, Report 2013/439}, year = {2013}, url = {https://eprint.iacr.org/2013/439}, } @misc{cryptoeprint:2013:440, author = {Mitsugu Iwamoto and Junji Shikata}, title = {Revisiting Conditional R\'enyi Entropies and Generalizing Shannon's Bounds in Information Theoretically Secure Encryption}, howpublished = {Cryptology ePrint Archive, Report 2013/440}, year = {2013}, url = {https://eprint.iacr.org/2013/440}, } @misc{cryptoeprint:2013:441, author = {Yongge Wang}, title = {On Stochastic Security of Java Crypto and NIST DRBG Pseudorandom Sequences}, howpublished = {Cryptology ePrint Archive, Report 2013/441}, year = {2013}, url = {https://eprint.iacr.org/2013/441}, } @misc{cryptoeprint:2013:442, author = {Shashank Agrawal and Manoj Prabhakaran}, title = {On Fair Exchange, Fair Coins and Fair Sampling}, howpublished = {Cryptology ePrint Archive, Report 2013/442}, year = {2013}, url = {https://eprint.iacr.org/2013/442}, } @misc{cryptoeprint:2013:443, author = {Jiangxiao Zhang. Hua Guo. Zhoujun Li. Chang Xu}, title = {Optimally Anonymous and Transferable Conditional E-cash}, howpublished = {Cryptology ePrint Archive, Report 2013/443}, year = {2013}, url = {https://eprint.iacr.org/2013/443}, } @misc{cryptoeprint:2013:444, author = {Bin Wang and Xiaojing Hong}, title = {Sequential message authentication code without random oracles}, howpublished = {Cryptology ePrint Archive, Report 2013/444}, year = {2013}, url = {https://eprint.iacr.org/2013/444}, } @misc{cryptoeprint:2013:445, author = {Ryad Benadjila and Jian Guo and Victor Lomné and Thomas Peyrin}, title = {Implementing Lightweight Block Ciphers on x86 Architectures}, howpublished = {Cryptology ePrint Archive, Report 2013/445}, year = {2013}, url = {https://eprint.iacr.org/2013/445}, } @misc{cryptoeprint:2013:446, author = {Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodr\'iguez-Henr\'iquez}, title = {Weakness of F_{3^{6*509}} for Discrete Logarithm Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2013/446}, year = {2013}, url = {https://eprint.iacr.org/2013/446}, } @misc{cryptoeprint:2013:447, author = {Karine Gandolfi-Villegas and Nabil Hamzi}, title = {Dynamic Runtime Methods to Enhance Private Key Blinding}, howpublished = {Cryptology ePrint Archive, Report 2013/447}, year = {2013}, url = {https://eprint.iacr.org/2013/447}, } @misc{cryptoeprint:2013:448, author = {Yuval Yarom and Katrina Falkner}, title = {Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack}, howpublished = {Cryptology ePrint Archive, Report 2013/448}, year = {2013}, url = {https://eprint.iacr.org/2013/448}, } @misc{cryptoeprint:2013:449, author = {Zhengjun Cao}, title = {A Note On the Storage Requirement for AKS Primality Testing Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2013/449}, year = {2013}, url = {https://eprint.iacr.org/2013/449}, } @misc{cryptoeprint:2013:450, author = {Yoni De Mulder and Peter Roelse and Bart Preneel}, title = {Revisiting the BGE Attack on a White-Box AES Implementation}, howpublished = {Cryptology ePrint Archive, Report 2013/450}, year = {2013}, url = {https://eprint.iacr.org/2013/450}, } @misc{cryptoeprint:2013:451, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova and Amit Sahai and Brent Waters}, title = {Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits}, howpublished = {Cryptology ePrint Archive, Report 2013/451}, year = {2013}, url = {https://eprint.iacr.org/2013/451}, } @misc{cryptoeprint:2013:452, author = {Behnam Mafakheri, Taraneh Eghlidos, Hossein Pilaram}, title = {Secure Channel Coding Schemes based on Polar Codes}, howpublished = {Cryptology ePrint Archive, Report 2013/452}, year = {2013}, url = {https://eprint.iacr.org/2013/452}, } @misc{cryptoeprint:2013:453, author = {Nasour Bagheri, Masoumeh Safkhani}, title = {Secret Disclosure attack on Kazahaya, a Yoking-Proof For Low-Cost RFID Tags}, howpublished = {Cryptology ePrint Archive, Report 2013/453}, year = {2013}, url = {https://eprint.iacr.org/2013/453}, } @misc{cryptoeprint:2013:454, author = {Amit Sahai and Brent Waters}, title = {How to Use Indistinguishability Obfuscation: Deniable Encryption, and More}, howpublished = {Cryptology ePrint Archive, Report 2013/454}, year = {2013}, url = {https://eprint.iacr.org/2013/454}, } @misc{cryptoeprint:2013:455, author = {Tancrède Lepoint and Matthieu Rivain}, title = {Another Nail in the Coffin of White-Box AES Implementations}, howpublished = {Cryptology ePrint Archive, Report 2013/455}, year = {2013}, url = {https://eprint.iacr.org/2013/455}, } @misc{cryptoeprint:2013:456, author = {Purushothama B R and B B Amberker}, title = {On the Security of Group-based Proxy Re-encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2013/456}, year = {2013}, url = {https://eprint.iacr.org/2013/456}, } @misc{cryptoeprint:2013:457, author = {Florian Böhl and Véronique Cortier and Bogdan Warinschi}, title = {Deduction Soundness: Prove One, Get Five for Free}, howpublished = {Cryptology ePrint Archive, Report 2013/457}, year = {2013}, url = {https://eprint.iacr.org/2013/457}, } @misc{cryptoeprint:2013:458, author = {Joppe W. Bos and Craig Costello and Michael Naehrig}, title = {Exponentiating in Pairing Groups}, howpublished = {Cryptology ePrint Archive, Report 2013/458}, year = {2013}, url = {https://eprint.iacr.org/2013/458}, } @misc{cryptoeprint:2013:459, author = {Paul Baecher and Christina Brzuska and Arno Mittelbach}, title = {Reset Indifferentiability and its Consequences}, howpublished = {Cryptology ePrint Archive, Report 2013/459}, year = {2013}, url = {https://eprint.iacr.org/2013/459}, } @misc{cryptoeprint:2013:460, author = {Rafik Chaabouni}, title = {Solving Terminal Revocation in EAC by Augmenting Terminal Authentication}, howpublished = {Cryptology ePrint Archive, Report 2013/460}, year = {2013}, url = {https://eprint.iacr.org/2013/460}, } @misc{cryptoeprint:2013:461, author = {Zongbin Liu and Neng Gao and Jiwu Jing and Peng Liu}, title = {HPAZ: a High-throughput Pipeline Architecture of ZUC in Hardware}, howpublished = {Cryptology ePrint Archive, Report 2013/461}, year = {2013}, url = {https://eprint.iacr.org/2013/461}, } @misc{cryptoeprint:2013:462, author = {Qingji Zheng and Shouhuai Xu and Giuseppe Ateniese}, title = {VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2013/462}, year = {2013}, url = {https://eprint.iacr.org/2013/462}, } @misc{cryptoeprint:2013:463, author = {Reza Hooshmand, Masoumeh Koochak Shooshtari, Mohammad Reza Aref }, title = {Secret Key Cryptosystem based on Polar Codes over Binary Erasure Channel}, howpublished = {Cryptology ePrint Archive, Report 2013/463}, year = {2013}, url = {https://eprint.iacr.org/2013/463}, } @misc{cryptoeprint:2013:464, author = {Stephan Neumann and Christian Feier and Melanie Volkamer and Reto Koenig}, title = {Towards A Practical JCJ / Civitas Implementation}, howpublished = {Cryptology ePrint Archive, Report 2013/464}, year = {2013}, url = {https://eprint.iacr.org/2013/464}, } @misc{cryptoeprint:2013:465, author = {Ioana Boureanu and Aikaterini Mitrokotsa and Serge Vaudenay}, title = {Practical & Provably Secure Distance-Bounding}, howpublished = {Cryptology ePrint Archive, Report 2013/465}, year = {2013}, url = {https://eprint.iacr.org/2013/465}, } @misc{cryptoeprint:2013:466, author = {Amadou Tall and Ali Yassin Sanghare}, title = {Efficient computation of addition-subtraction chains using generalized continued Fractions}, howpublished = {Cryptology ePrint Archive, Report 2013/466}, year = {2013}, url = {https://eprint.iacr.org/2013/466}, } @misc{cryptoeprint:2013:467, author = {Jian Guo and Pierre Karpman and Ivica Nikolic and Lei Wang and Shuang Wu}, title = {Analysis of BLAKE2}, howpublished = {Cryptology ePrint Archive, Report 2013/467}, year = {2013}, url = {https://eprint.iacr.org/2013/467}, } @misc{cryptoeprint:2013:468, author = {Nir Bitansky and Ran Canetti and Omer Paneth}, title = {How To Construct Extractable One-Way Functions Against Uniform Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2013/468}, year = {2013}, url = {https://eprint.iacr.org/2013/468}, } @misc{cryptoeprint:2013:469, author = {Michael Backes and Dario Fiore and Raphael M. Reischuk}, title = {Verifiable Delegation of Computation on Outsourced Data}, howpublished = {Cryptology ePrint Archive, Report 2013/469}, year = {2013}, url = {https://eprint.iacr.org/2013/469}, } @misc{cryptoeprint:2013:470, author = {Martin R. Albrecht and Jean-Charles Faugère and Robert Fitzpatrick and Ludovic Perret}, title = {Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2013/470}, year = {2013}, url = {https://eprint.iacr.org/2013/470}, } @misc{cryptoeprint:2013:471, author = {Zvika Brakerski and Guy N. Rothblum}, title = {Obfuscating Conjunctions}, howpublished = {Cryptology ePrint Archive, Report 2013/471}, year = {2013}, url = {https://eprint.iacr.org/2013/471}, } @misc{cryptoeprint:2013:472, author = {Kristian Gjøsteen}, title = {Partially blind password-based signatures using elliptic curves}, howpublished = {Cryptology ePrint Archive, Report 2013/472}, year = {2013}, url = {https://eprint.iacr.org/2013/472}, } @misc{cryptoeprint:2013:473, author = {Kristian Gjøsteen}, title = {The Norwegian Internet Voting Protocol}, howpublished = {Cryptology ePrint Archive, Report 2013/473}, year = {2013}, url = {https://eprint.iacr.org/2013/473}, } @misc{cryptoeprint:2013:474, author = {Zhengjun Cao}, title = {Eavesdropping or Disrupting a Communication --- On the Weakness of Quantum Communications}, howpublished = {Cryptology ePrint Archive, Report 2013/474}, year = {2013}, url = {https://eprint.iacr.org/2013/474}, } @misc{cryptoeprint:2013:475, author = {Pascale Charpin and Gohar M. Kyureghyan}, title = {A note on verifying the APN property}, howpublished = {Cryptology ePrint Archive, Report 2013/475}, year = {2013}, url = {https://eprint.iacr.org/2013/475}, } @misc{cryptoeprint:2013:476, author = {Sourav Sen Gupta and Subhamoy Maitra and Willi Meier and Goutam Paul and Santanu Sarkar}, title = {Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA}, howpublished = {Cryptology ePrint Archive, Report 2013/476}, year = {2013}, url = {https://eprint.iacr.org/2013/476}, } @misc{cryptoeprint:2013:477, author = {Renaud Dubois and Margaux Dugardin and Aurore Guillevic}, title = {Golden Sequence for the PPSS Broadcast Encryption Scheme with an Asymmetric Pairing}, howpublished = {Cryptology ePrint Archive, Report 2013/477}, year = {2013}, url = {https://eprint.iacr.org/2013/477}, } @misc{cryptoeprint:2013:478, author = {Stefan G. Weber}, title = {Enabling End-to-End Secure Communication with Anonymous and Mobile Receivers - an Attribute-Based Messaging Approach}, howpublished = {Cryptology ePrint Archive, Report 2013/478}, year = {2013}, url = {https://eprint.iacr.org/2013/478}, } @misc{cryptoeprint:2013:479, author = {B. Skoric}, title = {Security analysis of Quantum-Readout PUFs in the case of challenge-estimation attacks}, howpublished = {Cryptology ePrint Archive, Report 2013/479}, year = {2013}, url = {https://eprint.iacr.org/2013/479}, } @misc{cryptoeprint:2013:480, author = {Gil Cohen, Ivan Bjerre Damg{\aa}rd, Yuval Ishai, Jonas K\"{o}lker, Peter Bro Miltersen, Ran Raz and Ron D. Rothblum}, title = {Efficient Multiparty Protocols via Log-Depth Threshold Formulae}, howpublished = {Cryptology ePrint Archive, Report 2013/480}, year = {2013}, url = {https://eprint.iacr.org/2013/480}, } @misc{cryptoeprint:2013:481, author = {Yosuke Todo and Keita Xagawa}, title = {Cryptanalysis of the Huang-Liu-Yang Cryptosystem from PKC 2012}, howpublished = {Cryptology ePrint Archive, Report 2013/481}, year = {2013}, url = {https://eprint.iacr.org/2013/481}, } @misc{cryptoeprint:2013:482, author = {Céline Blondeau and Andrey Bogdanov and Gregor Leander}, title = {Bounds in Shallows and in Miseries}, howpublished = {Cryptology ePrint Archive, Report 2013/482}, year = {2013}, url = {https://eprint.iacr.org/2013/482}, } @misc{cryptoeprint:2013:483, author = {Jean-Sébastien Coron and Jean-Charles Faugère and Guénaël Renault and Rina Zeitoun}, title = {A Variant of Coppersmith's Algorithm with Improved Complexity and Efficient Exhaustive Search}, howpublished = {Cryptology ePrint Archive, Report 2013/483}, year = {2013}, url = {https://eprint.iacr.org/2013/483}, } @misc{cryptoeprint:2013:484, author = {Jiawei Yuan and Shucheng Yu}, title = {Efficient Public Integrity Checking for Cloud Data Sharing with Multi-User Modification}, howpublished = {Cryptology ePrint Archive, Report 2013/484}, year = {2013}, url = {https://eprint.iacr.org/2013/484}, } @misc{cryptoeprint:2013:485, author = {Subhasish Dhal and Indranil Sengupta}, title = {A New Object Searching Protocol for Multi-tag RFID}, howpublished = {Cryptology ePrint Archive, Report 2013/485}, year = {2013}, url = {https://eprint.iacr.org/2013/485}, } @misc{cryptoeprint:2013:486, author = {Subhasish Dhal and Indranil Sengupta}, title = {Handling Authentication and Detection Probability in Multi-tag RFID Environment}, howpublished = {Cryptology ePrint Archive, Report 2013/486}, year = {2013}, url = {https://eprint.iacr.org/2013/486}, } @misc{cryptoeprint:2013:487, author = {Tsutomu Iijima and Fumiyuki Momose and Jinhui Chao}, title = {Classification of Elliptic/hyperelliptic Curves with Weak Coverings against the GHS attack under an Isogeny Condition}, howpublished = {Cryptology ePrint Archive, Report 2013/487}, year = {2013}, url = {https://eprint.iacr.org/2013/487}, } @misc{cryptoeprint:2013:488, author = {Kwangsu Lee and Dong Hoon Lee}, title = {Adaptively Secure Broadcast Encryption under Standard Assumptions with Better Efficiency}, howpublished = {Cryptology ePrint Archive, Report 2013/488}, year = {2013}, url = {https://eprint.iacr.org/2013/488}, } @misc{cryptoeprint:2013:489, author = {Constantinos Patsakis and Agusti Solanas}, title = {An Efficient Scheme for Centralized Group Key Management in Collaborative Environments}, howpublished = {Cryptology ePrint Archive, Report 2013/489}, year = {2013}, url = {https://eprint.iacr.org/2013/489}, } @misc{cryptoeprint:2013:490, author = {Masoumeh Safkhani, Nasour Bagheri}, title = {For an EPC-C1 G2 RFID compliant Protocol, CRC with Concatenation : No; PRNG with Concatenation : Yes}, howpublished = {Cryptology ePrint Archive, Report 2013/490}, year = {2013}, url = {https://eprint.iacr.org/2013/490}, } @misc{cryptoeprint:2013:491, author = {Vladimir Kolesnikov and Ranjit Kumaresan}, title = {Improved OT Extension for Transferring Short Secrets}, howpublished = {Cryptology ePrint Archive, Report 2013/491}, year = {2013}, url = {https://eprint.iacr.org/2013/491}, } @misc{cryptoeprint:2013:492, author = {Anna Lisa Ferrara and George Fuchsbauer and Bogdan Warinschi}, title = {Cryptographically Enforced RBAC}, howpublished = {Cryptology ePrint Archive, Report 2013/492}, year = {2013}, url = {https://eprint.iacr.org/2013/492}, } @misc{cryptoeprint:2013:493, author = {Chunming Tang and Yanfeng Qi}, title = {A new class of semi-bent quadratic Boolean functions}, howpublished = {Cryptology ePrint Archive, Report 2013/493}, year = {2013}, url = {https://eprint.iacr.org/2013/493}, } @misc{cryptoeprint:2013:494, author = {Santanu Sarkar and Subhadeep Banik and Subhamoy Maitra}, title = {Differential Fault Attack against Grain family with very few faults and minimal assumptions}, howpublished = {Cryptology ePrint Archive, Report 2013/494}, year = {2013}, url = {https://eprint.iacr.org/2013/494}, } @misc{cryptoeprint:2013:495, author = {Le Su and Hoon Wei Lim and San Ling and Huaxiong Wang}, title = {Revocable IBE Systems with Almost Constant-size Key Update}, howpublished = {Cryptology ePrint Archive, Report 2013/495}, year = {2013}, url = {https://eprint.iacr.org/2013/495}, } @misc{cryptoeprint:2013:496, author = {Juan Garay and Jonathan Katz and Ueli Maurer and Bjoern Tackmann and Vassilis Zikas}, title = {Rational Protocol Design: Cryptography Against Incentive-driven Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2013/496}, year = {2013}, url = {https://eprint.iacr.org/2013/496}, } @misc{cryptoeprint:2013:497, author = {Zhengjun Cao and Hanyue Cao}, title = {Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme}, howpublished = {Cryptology ePrint Archive, Report 2013/497}, year = {2013}, url = {https://eprint.iacr.org/2013/497}, } @misc{cryptoeprint:2013:498, author = {Stefan Dziembowski and Tomasz Kazana and Maciej Obremski}, title = {Non-Malleable Codes from Two-Source Extractors}, howpublished = {Cryptology ePrint Archive, Report 2013/498}, year = {2013}, url = {https://eprint.iacr.org/2013/498}, } @misc{cryptoeprint:2013:499, author = {Pavel Hubacek and Jesper Buus Nielsen and Alon Rosen}, title = {Limits on the Power of Cryptographic Cheap Talk}, howpublished = {Cryptology ePrint Archive, Report 2013/499}, year = {2013}, url = {https://eprint.iacr.org/2013/499}, } @misc{cryptoeprint:2013:500, author = {Ran Canetti and Vinod Vaikuntanathan}, title = {Obfuscating Branching Programs Using Black-Box Pseudo-Free Groups}, howpublished = {Cryptology ePrint Archive, Report 2013/500}, year = {2013}, url = {https://eprint.iacr.org/2013/500}, } @misc{cryptoeprint:2013:501, author = {Jianxiong Shao and Dengguo Feng and Yu Qin}, title = {Type-Based Analysis of Protected Storage in the TPM (full version)}, howpublished = {Cryptology ePrint Archive, Report 2013/501}, year = {2013}, url = {https://eprint.iacr.org/2013/501}, } @misc{cryptoeprint:2013:502, author = {Santanu Sarkar and Sourav Sen Gupta and Goutam Paul and Subhamoy Maitra}, title = {Proving TLS-attack related open biases of RC4}, howpublished = {Cryptology ePrint Archive, Report 2013/502}, year = {2013}, url = {https://eprint.iacr.org/2013/502}, } @misc{cryptoeprint:2013:503, author = {Ignacio Cascudo and Ronald Cramer and Diego Mirandola and Carles Padro and Chaoping Xing}, title = {On secret sharing with nonlinear product reconstruction}, howpublished = {Cryptology ePrint Archive, Report 2013/503}, year = {2013}, url = {https://eprint.iacr.org/2013/503}, } @misc{cryptoeprint:2013:504, author = {Reza Azarderakhsh and Koray Karabina}, title = {A Comparison of Double Point Multiplication Algorithms and their Implementation over Binary Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2013/504}, year = {2013}, url = {https://eprint.iacr.org/2013/504}, } @misc{cryptoeprint:2013:505, author = {Zhengjun Cao and Lihua Liu}, title = {Improvement of One Anonymous Identity-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2013/505}, year = {2013}, url = {https://eprint.iacr.org/2013/505}, } @misc{cryptoeprint:2013:506, author = {Pablo Rauzy and Sylvain Guilley}, title = {A Formal Proof of Countermeasures Against Fault Injection Attacks on CRT-RSA}, howpublished = {Cryptology ePrint Archive, Report 2013/506}, year = {2013}, url = {https://eprint.iacr.org/2013/506}, } @misc{cryptoeprint:2013:507, author = {Eli Ben-Sasson and Alessandro Chiesa and Daniel Genkin and Eran Tromer and Madars Virza}, title = {SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2013/507}, year = {2013}, url = {https://eprint.iacr.org/2013/507}, } @misc{cryptoeprint:2013:508, author = {Raluca Ada Popa and Nickolai Zeldovich}, title = {Multi-Key Searchable Encryption}, howpublished = {Cryptology ePrint Archive, Report 2013/508}, year = {2013}, url = {https://eprint.iacr.org/2013/508}, } @misc{cryptoeprint:2013:509, author = {Susan Hohenberger and Amit Sahai and Brent Waters}, title = {Replacing a Random Oracle: Full Domain Hash From Indistinguishability Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2013/509}, year = {2013}, url = {https://eprint.iacr.org/2013/509}, } @misc{cryptoeprint:2013:510, author = {Johannes Buchmann and Daniel Cabarcas and Florian Göpfert and Andreas Hülsing and Patrick Weiden}, title = {Discrete Ziggurat: A Time-Memory Trade-off for Sampling from a Gaussian Distribution over the Integers}, howpublished = {Cryptology ePrint Archive, Report 2013/510}, year = {2013}, url = {https://eprint.iacr.org/2013/510}, } @misc{cryptoeprint:2013:511, author = {Siavash Ahmadi, Zahra Ahmadian, Javad Mohajeri, and Mohammad Reza Aref}, title = {Low Data Complexity Biclique Cryptanalysis of Block Ciphers with Application to Piccolo and HIGHT}, howpublished = {Cryptology ePrint Archive, Report 2013/511}, year = {2013}, url = {https://eprint.iacr.org/2013/511}, } @misc{cryptoeprint:2013:512, author = {Jingguo Bi and Phong Q. Nguyen}, title = {Rounding LLL: Finding Faster Small Roots of Univariate Polynomial Congruences }, howpublished = {Cryptology ePrint Archive, Report 2013/512}, year = {2013}, url = {https://eprint.iacr.org/2013/512}, } @misc{cryptoeprint:2013:513, author = {Stephen Chong and Eran Tromer and Jeffrey A. Vaughan}, title = {Enforcing Language Semantics Using Proof-Carrying Data}, howpublished = {Cryptology ePrint Archive, Report 2013/513}, year = {2013}, url = {https://eprint.iacr.org/2013/513}, } @misc{cryptoeprint:2013:514, author = {Jia Xu and Jianying Zhou}, title = {Leakage Resilient Proofs of Ownership in Cloud Storage, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2013/514}, year = {2013}, url = {https://eprint.iacr.org/2013/514}, } @misc{cryptoeprint:2013:515, author = {Changyu Dong and Liqun Chen and Zikai Wen}, title = {When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol}, howpublished = {Cryptology ePrint Archive, Report 2013/515}, year = {2013}, url = {https://eprint.iacr.org/2013/515}, } @misc{cryptoeprint:2013:516, author = {Melissa Chase and Sarah Meiklejohn and Gregory M. Zaverucha}, title = {Algebraic MACs and Keyed-Verification Anonymous Credentials}, howpublished = {Cryptology ePrint Archive, Report 2013/516}, year = {2013}, url = {https://eprint.iacr.org/2013/516}, } @misc{cryptoeprint:2013:517, author = {Zhengjun Cao and Lihua Liu}, title = {Improvement of One Adaptive Oblivious Transfer Scheme }, howpublished = {Cryptology ePrint Archive, Report 2013/517}, year = {2013}, url = {https://eprint.iacr.org/2013/517}, } @misc{cryptoeprint:2013:518, author = {Guangjun Fan and Yongbin Zhou and Dengguo Feng}, title = {Universal Leaky Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2013/518}, year = {2013}, url = {https://eprint.iacr.org/2013/518}, } @misc{cryptoeprint:2013:519, author = {Joppe W. Bos and Peter L. Montgomery and Daniel Shumow and Gregory M. Zaverucha}, title = {Montgomery Multiplication Using Vector Instructions}, howpublished = {Cryptology ePrint Archive, Report 2013/519}, year = {2013}, url = {https://eprint.iacr.org/2013/519}, } @misc{cryptoeprint:2013:520, author = {Nishanth Chandran and Bhavana Kanukurthi and Rafail Ostrovsky}, title = {Locally Updatable and Locally Decodable Codes}, howpublished = {Cryptology ePrint Archive, Report 2013/520}, year = {2013}, url = {https://eprint.iacr.org/2013/520}, } @misc{cryptoeprint:2013:521, author = {Jérémy Jean and María Naya-Plasencia and Thomas Peyrin}, title = {Multiple Limited-Birthday Distinguishers and Applications}, howpublished = {Cryptology ePrint Archive, Report 2013/521}, year = {2013}, url = {https://eprint.iacr.org/2013/521}, } @misc{cryptoeprint:2013:522, author = {Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk and Huaxiong Wang}, title = {The Resistance of PRESENT-80 Against Related-Key Differential Attacks}, howpublished = {Cryptology ePrint Archive, Report 2013/522}, year = {2013}, url = {https://eprint.iacr.org/2013/522}, } @misc{cryptoeprint:2013:523, author = {Cécile Delerablée and Tancrède Lepoint and Pascal Paillier and Matthieu Rivain}, title = {White-Box Security Notions for Symmetric Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2013/523}, year = {2013}, url = {https://eprint.iacr.org/2013/523}, } @misc{cryptoeprint:2013:524, author = {Teng Guo, Feng Liu, ChuanKun Wu, ChingNung Yang, Wen Wang and YaWei Ren}, title = {Threshold Secret Image Sharing}, howpublished = {Cryptology ePrint Archive, Report 2013/524}, year = {2013}, url = {https://eprint.iacr.org/2013/524}, } @misc{cryptoeprint:2013:525, author = {Christian Forler and Stefan Lucks and Jakob Wenzel}, title = {Catena: A Memory-Consuming Password-Scrambling Framework}, howpublished = {Cryptology ePrint Archive, Report 2013/525}, year = {2013}, url = {https://eprint.iacr.org/2013/525}, } @misc{cryptoeprint:2013:526, author = {Farzaneh Abed and Eik List and Stefan Lucks and Jakob Wenzel}, title = {Differential and Linear Cryptanalysis of Reduced-Round Simon}, howpublished = {Cryptology ePrint Archive, Report 2013/526}, year = {2013}, url = {https://eprint.iacr.org/2013/526}, } @misc{cryptoeprint:2013:527, author = {Boris Skoric and Niels de Vreede}, title = {The Spammed Code Offset Method}, howpublished = {Cryptology ePrint Archive, Report 2013/527}, year = {2013}, url = {https://eprint.iacr.org/2013/527}, } @misc{cryptoeprint:2013:528, author = {Somindu C. Ramanna and Palash Sarkar}, title = {Anonymous HIBE from Standard Assumptions over Type-3 Pairings using Dual System Encryption}, howpublished = {Cryptology ePrint Archive, Report 2013/528}, year = {2013}, url = {https://eprint.iacr.org/2013/528}, } @misc{cryptoeprint:2013:529, author = {Joshua Baron and Karim El Defrawy and Joshua Lampkins and Rafail Ostrovsky}, title = {How to Withstand Mobile Virus Attacks, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2013/529}, year = {2013}, url = {https://eprint.iacr.org/2013/529}, } @misc{cryptoeprint:2013:530, author = {Ivica Nikolic and Lei Wang and Shuang Wu}, title = {The Parallel-Cut Meet-In-The-Middle Attack}, howpublished = {Cryptology ePrint Archive, Report 2013/530}, year = {2013}, url = {https://eprint.iacr.org/2013/530}, } @misc{cryptoeprint:2013:531, author = {Nethanel Gelernter and Amir Herzberg}, title = {On the Limits of Provable Anonymity}, howpublished = {Cryptology ePrint Archive, Report 2013/531}, year = {2013}, url = {https://eprint.iacr.org/2013/531}, } @misc{cryptoeprint:2013:532, author = {Takakazu Satoh}, title = {On a Relation between the Ate Pairing and the Weil Pairing for Supersingular Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2013/532}, year = {2013}, url = {https://eprint.iacr.org/2013/532}, } @misc{cryptoeprint:2013:533, author = {Nethanel Gelernter and Amir Herzberg}, title = {Gossip Latin Square and The Meet-All Gossipers Problem}, howpublished = {Cryptology ePrint Archive, Report 2013/533}, year = {2013}, url = {https://eprint.iacr.org/2013/533}, } @misc{cryptoeprint:2013:534, author = {Nethanel Gelernter and Amir Herzberg}, title = {Efficient Unobservable Anonymous Reporting against Strong Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2013/534}, year = {2013}, url = {https://eprint.iacr.org/2013/534}, } @misc{cryptoeprint:2013:535, author = {Sujoy Sinha Roy and Junfeng Fan and Ingrid Verbauwhede}, title = {Accelerating Scalar Conversion for Koblitz Curve Cryptoprocessors on Hardware Platforms}, howpublished = {Cryptology ePrint Archive, Report 2013/535}, year = {2013}, url = {https://eprint.iacr.org/2013/535}, } @misc{cryptoeprint:2013:536, author = {Feng Zhang and Yanbin Pan and Gengran Hu}, title = {A Three-Level Sieve Algorithm for the Shortest Vector Problem}, howpublished = {Cryptology ePrint Archive, Report 2013/536}, year = {2013}, url = {https://eprint.iacr.org/2013/536}, } @misc{cryptoeprint:2013:537, author = {Amir Herzberg and Shay Nachmani}, title = {Inter-FSP Funds Transfer Protocol}, howpublished = {Cryptology ePrint Archive, Report 2013/537}, year = {2013}, url = {https://eprint.iacr.org/2013/537}, } @misc{cryptoeprint:2013:538, author = {Arnis Parsovs}, title = {Practical Issues with TLS Client Certificate Authentication}, howpublished = {Cryptology ePrint Archive, Report 2013/538}, year = {2013}, url = {https://eprint.iacr.org/2013/538}, } @misc{cryptoeprint:2013:539, author = {Riham AlTawy and Aleksandar Kircanski and Amr M. Youssef}, title = {Rebound attacks on Stribog}, howpublished = {Cryptology ePrint Archive, Report 2013/539}, year = {2013}, url = {https://eprint.iacr.org/2013/539}, } @misc{cryptoeprint:2013:540, author = {Junghyun Nam and Kim-Kwang Raymond Choo and Juryon Paik and Dongho Won}, title = {On the security of a password-only authenticated three-party key exchange protocol}, howpublished = {Cryptology ePrint Archive, Report 2013/540}, year = {2013}, url = {https://eprint.iacr.org/2013/540}, } @misc{cryptoeprint:2013:541, author = {Zvika Brakerski and Vinod Vaikuntanathan}, title = {Lattice-Based FHE as Secure as PKE}, howpublished = {Cryptology ePrint Archive, Report 2013/541}, year = {2013}, url = {https://eprint.iacr.org/2013/541}, } @misc{cryptoeprint:2013:542, author = {Przemysław Dąbrowski and Grzegorz Łabuzek and Tomasz Rachwalik and Janusz Szmidt}, title = {Searching for Nonlinear Feedback Shift Registers with Parallel Computing}, howpublished = {Cryptology ePrint Archive, Report 2013/542}, year = {2013}, url = {https://eprint.iacr.org/2013/542}, } @misc{cryptoeprint:2013:543, author = {Hoda A. Alkhzaimi and Martin M. Lauridsen}, title = {Cryptanalysis of the SIMON Family of Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2013/543}, year = {2013}, url = {https://eprint.iacr.org/2013/543}, } @misc{cryptoeprint:2013:544, author = {Christian Hanser and Daniel Slamanig}, title = {Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2013/544}, year = {2013}, url = {https://eprint.iacr.org/2013/544}, } @misc{cryptoeprint:2013:545, author = {Myungsun Kim and Abedelaziz Mohaisen and Jung Hee Cheon and Yongdae Kim}, title = {Private Over-threshold Aggregation Protocols over Distributed Databases}, howpublished = {Cryptology ePrint Archive, Report 2013/545}, year = {2013}, url = {https://eprint.iacr.org/2013/545}, } @misc{cryptoeprint:2013:546, author = {Jean-Marie Chauvet}, title = {TRS-80 with a grain of salt}, howpublished = {Cryptology ePrint Archive, Report 2013/546}, year = {2013}, url = {https://eprint.iacr.org/2013/546}, } @misc{cryptoeprint:2013:547, author = {Siwei Sun and Lei Hu and Ling Song and Yonghong Xie and Peng Wang}, title = {Automatic Security Evaluation of Block Ciphers with S-bP Structures against Related-key Differential Attacks}, howpublished = {Cryptology ePrint Archive, Report 2013/547}, year = {2013}, url = {https://eprint.iacr.org/2013/547}, } @misc{cryptoeprint:2013:548, author = {Koh-ichi Nagao}, title = {Decomposition formula of the Jacobian group of plane curve}, howpublished = {Cryptology ePrint Archive, Report 2013/548}, year = {2013}, url = {https://eprint.iacr.org/2013/548}, } @misc{cryptoeprint:2013:549, author = {Koh-ichi Nagao}, title = {Equations System coming from Weil descent and subexponential attack for algebraic curve cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2013/549}, year = {2013}, url = {https://eprint.iacr.org/2013/549}, } @misc{cryptoeprint:2013:550, author = {Zhenfu Cao and Xiaolei Dong and Licheng Wang and Jun Shao}, title = {More Efficient Cryptosystems From k-th Power Residues}, howpublished = {Cryptology ePrint Archive, Report 2013/550}, year = {2013}, url = {https://eprint.iacr.org/2013/550}, } @misc{cryptoeprint:2013:551, author = {Gregory Alvarez and Charles Berenguer}, title = {Puzzle Encryption Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2013/551}, year = {2013}, url = {https://eprint.iacr.org/2013/551}, } @misc{cryptoeprint:2013:552, author = {Gilad Asharov and Yehuda Lindell and Thomas Schneider and Michael Zohner}, title = {More Efficient Oblivious Transfer and Extensions for Faster Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2013/552}, year = {2013}, url = {https://eprint.iacr.org/2013/552}, } @misc{cryptoeprint:2013:553, author = {Martin Hirt and Pavel Raykov}, title = {Multi-Valued Byzantine Broadcast: the $t < n$ Case}, howpublished = {Cryptology ePrint Archive, Report 2013/553}, year = {2013}, url = {https://eprint.iacr.org/2013/553}, } @misc{cryptoeprint:2013:554, author = {Pablo Rauzy and Sylvain Guilley and Zakaria Najm}, title = {Formally Proved Security of Assembly Code Against Power Analysis: A Case Study on Balanced Logic}, howpublished = {Cryptology ePrint Archive, Report 2013/554}, year = {2013}, url = {https://eprint.iacr.org/2013/554}, } @misc{cryptoeprint:2013:555, author = {Ueli Maurer and Björn Tackmann and Sandro Coretti}, title = {Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design}, howpublished = {Cryptology ePrint Archive, Report 2013/555}, year = {2013}, url = {https://eprint.iacr.org/2013/555}, } @misc{cryptoeprint:2013:556, author = {Oleksandr Kazymyrov and Valentyna Kazymyrova}, title = {Algebraic Aspects of the Russian Hash Standard GOST R 34.11-2012}, howpublished = {Cryptology ePrint Archive, Report 2013/556}, year = {2013}, url = {https://eprint.iacr.org/2013/556}, } @misc{cryptoeprint:2013:557, author = {Zvika Brakerski and Guy N. Rothblum}, title = {Black-Box Obfuscation for d-CNFs}, howpublished = {Cryptology ePrint Archive, Report 2013/557}, year = {2013}, url = {https://eprint.iacr.org/2013/557}, } @misc{cryptoeprint:2013:558, author = {Kevin Henry and Maura B. Paterson and Douglas R. Stinson}, title = {Practical approaches to varying network size in combinatorial key predistribution schemes}, howpublished = {Cryptology ePrint Archive, Report 2013/558}, year = {2013}, url = {https://eprint.iacr.org/2013/558}, } @misc{cryptoeprint:2013:559, author = {Christian Matt and Ueli Maurer}, title = {A Definitional Framework for Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2013/559}, year = {2013}, url = {https://eprint.iacr.org/2013/559}, } @misc{cryptoeprint:2013:560, author = {Ben Morris and Phillip Rogaway}, title = {Sometimes-Recurse Shuffle: Almost-Random Permutations in Logarithmic Expected Time}, howpublished = {Cryptology ePrint Archive, Report 2013/560}, year = {2013}, url = {https://eprint.iacr.org/2013/560}, } @misc{cryptoeprint:2013:561, author = {Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny and Michal Straus}, title = {Preimage attacks on the round-reduced Keccak with the aid of differential cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2013/561}, year = {2013}, url = {https://eprint.iacr.org/2013/561}, } @misc{cryptoeprint:2013:562, author = {Binglong Chen and Chang-An~Zhao}, title = {Self-pairings on supersingular elliptic curves with embedding degree $three$}, howpublished = {Cryptology ePrint Archive, Report 2013/562}, year = {2013}, url = {https://eprint.iacr.org/2013/562}, } @misc{cryptoeprint:2013:563, author = {Zvika Brakerski and Guy N. Rothblum}, title = {Virtual Black-Box Obfuscation for All Circuits via Generic Graded Encoding}, howpublished = {Cryptology ePrint Archive, Report 2013/563}, year = {2013}, url = {https://eprint.iacr.org/2013/563}, } @misc{cryptoeprint:2013:564, author = {Mahdi Cheraghchi and Venkatesan Guruswami}, title = {Capacity of Non-Malleable Codes}, howpublished = {Cryptology ePrint Archive, Report 2013/564}, year = {2013}, url = {https://eprint.iacr.org/2013/564}, } @misc{cryptoeprint:2013:565, author = {Mahdi Cheraghchi and Venkatesan Guruswami}, title = {Non-Malleable Coding Against Bit-wise and Split-State Tampering}, howpublished = {Cryptology ePrint Archive, Report 2013/565}, year = {2013}, url = {https://eprint.iacr.org/2013/565}, } @misc{cryptoeprint:2013:566, author = {Jeroen Delvaux and Ingrid Verbauwhede}, title = {Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation}, howpublished = {Cryptology ePrint Archive, Report 2013/566}, year = {2013}, url = {https://eprint.iacr.org/2013/566}, } @misc{cryptoeprint:2013:567, author = {Gareth T. Davies and Martijn Stam}, title = {KDM Security in the Hybrid Framework}, howpublished = {Cryptology ePrint Archive, Report 2013/567}, year = {2013}, url = {https://eprint.iacr.org/2013/567}, } @misc{cryptoeprint:2013:568, author = {Farzaneh Abed and Eik List and Stefan Lucks and Jakob Wenzel}, title = {Cryptanalysis of the Speck Family of Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2013/568}, year = {2013}, url = {https://eprint.iacr.org/2013/568}, } @misc{cryptoeprint:2013:569, author = {Zhenfu Cao and Xiaolei Dong and Licheng Wang and Jun Shao}, title = {More Efficient Cryptosystems From $k^{th}$-Power Residues}, howpublished = {Cryptology ePrint Archive, Report 2013/569}, year = {2013}, url = {https://eprint.iacr.org/2013/569}, } @misc{cryptoeprint:2013:570, author = {Jun Shao and Licheng Wang and Xiaolei Dong and Zhenfu Cao }, title = {New Efficient Identity-Based Encryption From Factorization}, howpublished = {Cryptology ePrint Archive, Report 2013/570}, year = {2013}, url = {https://eprint.iacr.org/2013/570}, } @misc{cryptoeprint:2013:571, author = {Martin Hirt and Daniel Tschudi}, title = {Efficient General-Adversary Multi-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2013/571}, year = {2013}, url = {https://eprint.iacr.org/2013/571}, } @misc{cryptoeprint:2013:572, author = {Goutam Paul and Subhamoy Maitra and Anupam Chattopadhyay}, title = {Quad-RC4: Merging Four RC4 States towards a 32-bit Stream Cipher}, howpublished = {Cryptology ePrint Archive, Report 2013/572}, year = {2013}, url = {https://eprint.iacr.org/2013/572}, } @misc{cryptoeprint:2013:573, author = {Leibo Li and Keting Jia and Xiaoyun Wang}, title = {Improved Meet-in-the-Middle Attacks on AES-192 and PRINCE}, howpublished = {Cryptology ePrint Archive, Report 2013/573}, year = {2013}, url = {https://eprint.iacr.org/2013/573}, } @misc{cryptoeprint:2013:574, author = {Mridul Nandi}, title = {On the Minimum Number of Multiplications Necessary for Universal Hash Constructions}, howpublished = {Cryptology ePrint Archive, Report 2013/574}, year = {2013}, url = {https://eprint.iacr.org/2013/574}, } @misc{cryptoeprint:2013:575, author = {Nilanjan Datta and Mridul Nandi}, title = {Equivalence between MAC and PRF for Blockcipher based Constructions}, howpublished = {Cryptology ePrint Archive, Report 2013/575}, year = {2013}, url = {https://eprint.iacr.org/2013/575}, } @misc{cryptoeprint:2013:576, author = {Oleksandr Kazymyrov and Valentyna Kazymyrova}, title = {Extended Criterion for Absence of Fixed Points}, howpublished = {Cryptology ePrint Archive, Report 2013/576}, year = {2013}, url = {https://eprint.iacr.org/2013/576}, } @misc{cryptoeprint:2013:577, author = {Luís T. A. N. Brandão}, title = {Secure Two-Party Computation with Reusable Bit-Commitments, via a Cut-and-Choose with Forge-and-Lose Technique}, howpublished = {Cryptology ePrint Archive, Report 2013/577}, year = {2013}, url = {https://eprint.iacr.org/2013/577}, } @misc{cryptoeprint:2013:578, author = {Oleksandr Kazymyrov and Valentyna Kazymyrova and Roman Oliynykov}, title = {A Method For Generation Of High-Nonlinear S-Boxes Based On Gradient Descent}, howpublished = {Cryptology ePrint Archive, Report 2013/578}, year = {2013}, url = {https://eprint.iacr.org/2013/578}, } @misc{cryptoeprint:2013:579, author = {Takeshi Sugawara and Daisuke Suzuki and Minoru Saeki and Mitsuru Shiozaki and Takeshi Fujino}, title = {On Measurable Side-Channel Leaks inside ASIC Design Primitives}, howpublished = {Cryptology ePrint Archive, Report 2013/579}, year = {2013}, url = {https://eprint.iacr.org/2013/579}, } @misc{cryptoeprint:2013:580, author = {Jalaj Upadhyay}, title = {Random Projections, Graph Sparsification, and Differential Privacy}, howpublished = {Cryptology ePrint Archive, Report 2013/580}, year = {2013}, url = {https://eprint.iacr.org/2013/580}, } @misc{cryptoeprint:2013:581, author = {Bingsheng Zhang, Qin Zhan, Junfei Wang, Kui Ren, Cong Wang, Di Ma}, title = {PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones}, howpublished = {Cryptology ePrint Archive, Report 2013/581}, year = {2013}, url = {https://eprint.iacr.org/2013/581}, } @misc{cryptoeprint:2013:582, author = {Antoine Joux and Cécile Pierrot}, title = {The Special Number Field Sieve in $\F _{p^{n}}$, Application to Pairing-Friendly Constructions}, howpublished = {Cryptology ePrint Archive, Report 2013/582}, year = {2013}, url = {https://eprint.iacr.org/2013/582}, } @misc{cryptoeprint:2013:583, author = {Min yang, Qingshu Meng, Zhangyi Wang, Lina Wang, Huanguo Zhang}, title = {polynomial selection for the number field sieve in geometric view}, howpublished = {Cryptology ePrint Archive, Report 2013/583}, year = {2013}, url = {https://eprint.iacr.org/2013/583}, } @misc{cryptoeprint:2013:584, author = {Zongyue Wang, Hongbo Yu, Xiaoyun Wang}, title = {Cryptanalysis of GOST R Hash Function}, howpublished = {Cryptology ePrint Archive, Report 2013/584}, year = {2013}, url = {https://eprint.iacr.org/2013/584}, } @misc{cryptoeprint:2013:585, author = {Xiutao Feng and Guang Gong}, title = {On Algebraic Immunity of Trace Inverse Functions over Finite Fields with Characteristic Two}, howpublished = {Cryptology ePrint Archive, Report 2013/585}, year = {2013}, url = {https://eprint.iacr.org/2013/585}, } @misc{cryptoeprint:2013:586, author = {Enes Pasalic and Yongzhuang Wei}, title = {Generic related-key and induced chosen IV attacks using the method of key differentiation}, howpublished = {Cryptology ePrint Archive, Report 2013/586}, year = {2013}, url = {https://eprint.iacr.org/2013/586}, } @misc{cryptoeprint:2013:587, author = {Muhammad Rizwan Asghar and Mihaela Ion and Giovanni Russello and Bruno Crispo}, title = {ESPOON ERBAC: Enforcing Security Policies in Outsourced Environments}, howpublished = {Cryptology ePrint Archive, Report 2013/587}, year = {2013}, url = {https://eprint.iacr.org/2013/587}, } @misc{cryptoeprint:2013:588, author = {Michel Abdalla and Fabrice Benhamouda and Olivier Blazy and Céline Chevalier and David Pointcheval}, title = {SPHF-Friendly Non-Interactive Commitments}, howpublished = {Cryptology ePrint Archive, Report 2013/588}, year = {2013}, url = {https://eprint.iacr.org/2013/588}, } @misc{cryptoeprint:2013:589, author = {Vladimir Antipkin}, title = {Smashing MASH-1}, howpublished = {Cryptology ePrint Archive, Report 2013/589}, year = {2013}, url = {https://eprint.iacr.org/2013/589}, } @misc{cryptoeprint:2013:590, author = {Andrea Forte and Juan Garay and Trevor Jim and Yevgeniy Vahlis}, title = {EyeDecrypt -- Private Interactions in Plain Sight}, howpublished = {Cryptology ePrint Archive, Report 2013/590}, year = {2013}, url = {https://eprint.iacr.org/2013/590}, } @misc{cryptoeprint:2013:591, author = {Jung Woo Kim and Jin Hong and Kunsoo Park}, title = {Analysis of the Rainbow Tradeoff Algorithm Used in Practice}, howpublished = {Cryptology ePrint Archive, Report 2013/591}, year = {2013}, url = {https://eprint.iacr.org/2013/591}, } @misc{cryptoeprint:2013:592, author = {Liam Keliher and Anthony Z. Delaney}, title = {Cryptanalysis of the Toorani-Falahati Hill Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2013/592}, year = {2013}, url = {https://eprint.iacr.org/2013/592}, } @misc{cryptoeprint:2013:593, author = {Carmit Hazay and Arpita Patra}, title = {Efficient One-Sided Adaptively Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2013/593}, year = {2013}, url = {https://eprint.iacr.org/2013/593}, } @misc{cryptoeprint:2013:594, author = {Yuan Tian and Rongxin Sun and Xueyong Zhu}, title = {A Local-Global Approach to Solving Ideal Lattice Problems}, howpublished = {Cryptology ePrint Archive, Report 2013/594}, year = {2013}, url = {https://eprint.iacr.org/2013/594}, } @misc{cryptoeprint:2013:595, author = {Mark D. Ryan}, title = {Enhanced certificate transparency and end-to-end encrypted mail}, howpublished = {Cryptology ePrint Archive, Report 2013/595}, year = {2013}, url = {https://eprint.iacr.org/2013/595}, } @misc{cryptoeprint:2013:596, author = {Michael Shantz and Edlyn Teske}, title = {Solving the Elliptic Curve Discrete Logarithm Problem Using Semaev Polynomials, Weil Descent and Gröbner Basis Methods -- an Experimental Study}, howpublished = {Cryptology ePrint Archive, Report 2013/596}, year = {2013}, url = {https://eprint.iacr.org/2013/596}, } @misc{cryptoeprint:2013:597, author = {Sylvain Duquesne, Nadia El Mrabet and Emmanuel Fouotsa}, title = {Efficient Pairings Computation on Jacobi Quartic Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2013/597}, year = {2013}, url = {https://eprint.iacr.org/2013/597}, } @misc{cryptoeprint:2013:598, author = {Daehyun Strobel and Benedikt Driessen and Timo Kasper and Gregor Leander and David Oswald and Falk Schellenberg and Christof Paar}, title = {Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System - Full Version}, howpublished = {Cryptology ePrint Archive, Report 2013/598}, year = {2013}, url = {https://eprint.iacr.org/2013/598}, } @misc{cryptoeprint:2013:599, author = {Daniel J. Bernstein and Yun-An Chang and Chen-Mou Cheng and Li-Ping Chou and Nadia Heninger and Tanja Lange and Nicko van Someren}, title = {Factoring RSA keys from certified smart cards: Coppersmith in the wild}, howpublished = {Cryptology ePrint Archive, Report 2013/599}, year = {2013}, url = {https://eprint.iacr.org/2013/599}, } @misc{cryptoeprint:2013:600, author = {Florian Mendel and Thomas Peyrin and Martin Schläffer and Lei Wang and Shuang Wu}, title = {Improved Cryptanalysis of Reduced RIPEMD-160}, howpublished = {Cryptology ePrint Archive, Report 2013/600}, year = {2013}, url = {https://eprint.iacr.org/2013/600}, } @misc{cryptoeprint:2013:601, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Mariana Raykova}, title = {Two-round secure MPC from Indistinguishability Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2013/601}, year = {2013}, url = {https://eprint.iacr.org/2013/601}, } @misc{cryptoeprint:2013:602, author = {Martin R. Albrecht and Robert Fitzpatrick and Florian G ̈opfert}, title = {On the Efficacy of Solving LWE by Reduction to Unique-SVP}, howpublished = {Cryptology ePrint Archive, Report 2013/602}, year = {2013}, url = {https://eprint.iacr.org/2013/602}, } @misc{cryptoeprint:2013:603, author = {Xiaofei Guo and Ramesh Karri}, title = {Invariance-Based Concurrent Error Detection for Advanced Encryption Standard}, howpublished = {Cryptology ePrint Archive, Report 2013/603}, year = {2013}, url = {https://eprint.iacr.org/2013/603}, } @misc{cryptoeprint:2013:604, author = {Jörg Schwenk}, title = {Modelling Time, or A Step Towards Reduction-based Security Proofs for OTP and Kerberos}, howpublished = {Cryptology ePrint Archive, Report 2013/604}, year = {2013}, url = {https://eprint.iacr.org/2013/604}, } @misc{cryptoeprint:2013:605, author = {Masao KASAHARA}, title = {Presentation of a new class of public key cryptosystems K(XIII)SE(1)PKC along with Kp(XIII)SE(1)PKC that realizes the coding rate of exactly 1.0, constructed by modifying K(XII)SE(1)PKC.}, howpublished = {Cryptology ePrint Archive, Report 2013/605}, year = {2013}, url = {https://eprint.iacr.org/2013/605}, } @misc{cryptoeprint:2013:606, author = {Dominique Unruh}, title = {Revocable quantum timed-release encryption}, howpublished = {Cryptology ePrint Archive, Report 2013/606}, year = {2013}, url = {https://eprint.iacr.org/2013/606}, } @misc{cryptoeprint:2013:607, author = {Franck Landelle and Thomas Peyrin}, title = {Cryptanalysis of Full RIPEMD-128}, howpublished = {Cryptology ePrint Archive, Report 2013/607}, year = {2013}, url = {https://eprint.iacr.org/2013/607}, } @misc{cryptoeprint:2013:608, author = {Guangjun Fan and Yongbin Zhou and Hailong Zhang and Dengguo Feng}, title = {Towards Optimal Leakage Exploitation Rate in Template Attacks}, howpublished = {Cryptology ePrint Archive, Report 2013/608}, year = {2013}, url = {https://eprint.iacr.org/2013/608}, } @misc{cryptoeprint:2013:609, author = {Ruan de Clercq and Leif Uhsadel and Anthony Van Herrewege and Ingrid Verbauwhede}, title = {Ultra Low-Power implementation of ECC on the ARM Cortex-M0+}, howpublished = {Cryptology ePrint Archive, Report 2013/609}, year = {2013}, url = {https://eprint.iacr.org/2013/609}, } @misc{cryptoeprint:2013:610, author = {Jeroen Delvaux and Ingrid Verbauwhede}, title = {Key-recovery Attacks on Various RO PUF Constructions via Helper Data Manipulation}, howpublished = {Cryptology ePrint Archive, Report 2013/610}, year = {2013}, url = {https://eprint.iacr.org/2013/610}, } @misc{cryptoeprint:2013:611, author = {Mitsugu Iwamoto and Thomas Peyrin and Yu Sasaki}, title = {Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful}, howpublished = {Cryptology ePrint Archive, Report 2013/611}, year = {2013}, url = {https://eprint.iacr.org/2013/611}, } @misc{cryptoeprint:2013:612, author = {Essam Ghadafi}, title = {Sub-linear Blind Ring Signatures without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2013/612}, year = {2013}, url = {https://eprint.iacr.org/2013/612}, } @misc{cryptoeprint:2013:613, author = {Xiaofei Guo and Ramesh Karri}, title = {Recomputing with Permuted Operands: A Concurrent Error Detection Approach}, howpublished = {Cryptology ePrint Archive, Report 2013/613}, year = {2013}, url = {https://eprint.iacr.org/2013/613}, } @misc{cryptoeprint:2013:614, author = {Douglas R. Stinson and Jalaj Upadhyay}, title = {Is extracting data the same as possessing data?}, howpublished = {Cryptology ePrint Archive, Report 2013/614}, year = {2013}, url = {https://eprint.iacr.org/2013/614}, } @misc{cryptoeprint:2013:615, author = {Hugo Jonker and Sjouke Mauw and Jun Pang}, title = {Privacy and Verifiability in Voting Systems: Methods, Developments and Trends}, howpublished = {Cryptology ePrint Archive, Report 2013/615}, year = {2013}, url = {https://eprint.iacr.org/2013/615}, } @misc{cryptoeprint:2013:616, author = {Xiaolin Cao, Ciara Moore, Maire O’Neill, Elizabeth O’Sullivan and Neil Hanley}, title = {Accelerating Fully Homomorphic Encryption over the Integers with Super-size Hardware Multiplier and Modular Reduction}, howpublished = {Cryptology ePrint Archive, Report 2013/616}, year = {2013}, url = {https://eprint.iacr.org/2013/616}, } @misc{cryptoeprint:2013:617, author = {Brajesh Kumar Singh}, title = {Some results concerning global avalanche characteristics of two $q$-ary functions}, howpublished = {Cryptology ePrint Archive, Report 2013/617}, year = {2013}, url = {https://eprint.iacr.org/2013/617}, } @misc{cryptoeprint:2013:618, author = {Pierre-Alain Fouque and Pierre Karpman}, title = {Security Amplification against Meet-in-the-Middle Attacks Using Whitening}, howpublished = {Cryptology ePrint Archive, Report 2013/618}, year = {2013}, url = {https://eprint.iacr.org/2013/618}, } @misc{cryptoeprint:2013:619, author = {Jeroen Delvaux and Ingrid Verbauwhede}, title = {Fault Injection Modeling Attacks on 65nm Arbiter and RO Sum PUFs via Environmental Changes}, howpublished = {Cryptology ePrint Archive, Report 2013/619}, year = {2013}, url = {https://eprint.iacr.org/2013/619}, } @misc{cryptoeprint:2013:620, author = {Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan, Ahmad-Reza Sadeghi}, title = {Do I know you? -- Efficient and Privacy-Preserving Common Friend-Finder Protocols and Applications}, howpublished = {Cryptology ePrint Archive, Report 2013/620}, year = {2013}, url = {https://eprint.iacr.org/2013/620}, } @misc{cryptoeprint:2013:621, author = {Marika Mitrengová}, title = {Multi-LHL protocol}, howpublished = {Cryptology ePrint Archive, Report 2013/621}, year = {2013}, url = {https://eprint.iacr.org/2013/621}, } @misc{cryptoeprint:2013:622, author = {Christina Garman and Matthew Green and Ian Miers}, title = {Decentralized Anonymous Credentials}, howpublished = {Cryptology ePrint Archive, Report 2013/622}, year = {2013}, url = {https://eprint.iacr.org/2013/622}, } @misc{cryptoeprint:2013:623, author = {Yossi Gilad and Amir Herzberg and Haya Shulman}, title = {Off-Path Hacking: The Illusion of Challenge-Response Authentication}, howpublished = {Cryptology ePrint Archive, Report 2013/623}, year = {2013}, url = {https://eprint.iacr.org/2013/623}, } @misc{cryptoeprint:2013:624, author = {Xiaolin Cao and Ciara Moore}, title = {New Integer-FFT Multiplication Architectures and Implementations for Accelerating Fully Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2013/624}, year = {2013}, url = {https://eprint.iacr.org/2013/624}, } @misc{cryptoeprint:2013:625, author = {Kevin D. Bowers and Catherine Hart and Ari Juels and Nikos Triandopoulos}, title = {PillarBox: Combating next-generation malware with fast forward-secure logging}, howpublished = {Cryptology ePrint Archive, Report 2013/625}, year = {2013}, url = {https://eprint.iacr.org/2013/625}, } @misc{cryptoeprint:2013:626, author = {Mingjie Liu and Jiazhe Chen}, title = {Improved Linear Attacks on the Chinese Block Cipher Standard}, howpublished = {Cryptology ePrint Archive, Report 2013/626}, year = {2013}, url = {https://eprint.iacr.org/2013/626}, } @misc{cryptoeprint:2013:627, author = {Jiawei Yuan and Shucheng Yu}, title = {Flexible and Publicly Verifiable Aggregation Query for Outsourced Databases in Cloud}, howpublished = {Cryptology ePrint Archive, Report 2013/627}, year = {2013}, url = {https://eprint.iacr.org/2013/627}, } @misc{cryptoeprint:2013:628, author = {Kazuhiko Minematsu}, title = {Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions}, howpublished = {Cryptology ePrint Archive, Report 2013/628}, year = {2013}, url = {https://eprint.iacr.org/2013/628}, } @misc{cryptoeprint:2013:629, author = {Ivan Damgård and Thomas P. Jakobsen and Jesper Buus Nielsen and Jakob I. Pagter}, title = {Secure Key Management in the Cloud}, howpublished = {Cryptology ePrint Archive, Report 2013/629}, year = {2013}, url = {https://eprint.iacr.org/2013/629}, } @misc{cryptoeprint:2013:630, author = {Joop van de Pol and Nigel P. Smart}, title = {Estimating Key Sizes For High Dimensional Lattice-Based Systems}, howpublished = {Cryptology ePrint Archive, Report 2013/630}, year = {2013}, url = {https://eprint.iacr.org/2013/630}, } @misc{cryptoeprint:2013:631, author = {Boaz Barak and Sanjam Garg and Yael Tauman Kalai and Omer Paneth and Amit Sahai}, title = {Protecting Obfuscation Against Algebraic Attacks}, howpublished = {Cryptology ePrint Archive, Report 2013/631}, year = {2013}, url = {https://eprint.iacr.org/2013/631}, } @misc{cryptoeprint:2013:632, author = {Ahmed Mahmoud and Ulrich Rührmair and Mehrdad Majzoobi and Farinaz Koushanfar}, title = {Combined Modeling and Side Channel Attacks on Strong PUFs}, howpublished = {Cryptology ePrint Archive, Report 2013/632}, year = {2013}, url = {https://eprint.iacr.org/2013/632}, } @misc{cryptoeprint:2013:633, author = {J. Boyar and M.G. Find and R. Peralta}, title = {Four Measures of Nonlinearity}, howpublished = {Cryptology ePrint Archive, Report 2013/633}, year = {2013}, url = {https://eprint.iacr.org/2013/633}, } @misc{cryptoeprint:2013:634, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64}, howpublished = {Cryptology ePrint Archive, Report 2013/634}, year = {2013}, url = {https://eprint.iacr.org/2013/634}, } @misc{cryptoeprint:2013:635, author = {Arjen K. Lenstra, Thorsten Kleinjung, Emmanuel Thomé}, title = {Universal security; from bits and mips to pools, lakes -- and beyond}, howpublished = {Cryptology ePrint Archive, Report 2013/635}, year = {2013}, url = {https://eprint.iacr.org/2013/635}, } @misc{cryptoeprint:2013:636, author = {Matthieu Rivain and Thomas Roche}, title = {SCARE of Secret Ciphers with SPN Structures}, howpublished = {Cryptology ePrint Archive, Report 2013/636}, year = {2013}, url = {https://eprint.iacr.org/2013/636}, } @misc{cryptoeprint:2013:637, author = {Hadi Ahmadi and Reihaneh Safavi-Naini}, title = {Detection of Algebraic Manipulation in the Presence of Leakage}, howpublished = {Cryptology ePrint Archive, Report 2013/637}, year = {2013}, url = {https://eprint.iacr.org/2013/637}, } @misc{cryptoeprint:2013:638, author = {Somindu C. Ramanna}, title = {DFA-Based Functional Encryption: Adaptive Security from Dual System Encryption}, howpublished = {Cryptology ePrint Archive, Report 2013/638}, year = {2013}, url = {https://eprint.iacr.org/2013/638}, } @misc{cryptoeprint:2013:639, author = {Deng Tang and Claude Carlet and Xiaohu Tang}, title = {Differentially 4-Uniform Bijections by Permuting the Inverse Function}, howpublished = {Cryptology ePrint Archive, Report 2013/639}, year = {2013}, url = {https://eprint.iacr.org/2013/639}, } @misc{cryptoeprint:2013:640, author = {Joshua Lampkins and Rafail Ostrovsky}, title = {Communication-Efficient MPC for General Adversary Structures}, howpublished = {Cryptology ePrint Archive, Report 2013/640}, year = {2013}, url = {https://eprint.iacr.org/2013/640}, } @misc{cryptoeprint:2013:641, author = {Nir Bitansky and Ran Canetti and Omer Paneth and Alon Rosen }, title = {Indistinguishability Obfuscation vs. Auxiliary-Input Extractable Functions: One Must Fall}, howpublished = {Cryptology ePrint Archive, Report 2013/641}, year = {2013}, url = {https://eprint.iacr.org/2013/641}, } @misc{cryptoeprint:2013:642, author = {Dan Boneh and Mark Zhandry}, title = {Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2013/642}, year = {2013}, url = {https://eprint.iacr.org/2013/642}, } @misc{cryptoeprint:2013:643, author = {Tal Moran and Alon Rosen}, title = {There is no Indistinguishability Obfuscation in Pessiland}, howpublished = {Cryptology ePrint Archive, Report 2013/643}, year = {2013}, url = {https://eprint.iacr.org/2013/643}, } @misc{cryptoeprint:2013:644, author = {Joppe W. Bos and Craig Costello and Andrea Miele}, title = {Elliptic and Hyperelliptic Curves: a Practical Security Analysis}, howpublished = {Cryptology ePrint Archive, Report 2013/644}, year = {2013}, url = {https://eprint.iacr.org/2013/644}, } @misc{cryptoeprint:2013:645, author = {Ertem Esiner and Adilet Kachkeev and Samuel Braunfeld and Alptekin K\"up\c{c}\"u and \"Oznur \"Ozkasap}, title = {FlexDPDP: FlexList-based Optimized Dynamic Provable Data Possession}, howpublished = {Cryptology ePrint Archive, Report 2013/645}, year = {2013}, url = {https://eprint.iacr.org/2013/645}, } @misc{cryptoeprint:2013:646, author = {Johannes Blömer and Gennadij Liske}, title = {Direct Chosen-Ciphertext Secure Attribute-Based Key Encapsulations without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2013/646}, year = {2013}, url = {https://eprint.iacr.org/2013/646}, } @misc{cryptoeprint:2013:647, author = {Diego F. Aranha and Paulo S. L. M. Barreto and Geovandro C. C. F. Pereira and Jefferson E. Ricardini}, title = {A note on high-security general-purpose elliptic curves}, howpublished = {Cryptology ePrint Archive, Report 2013/647}, year = {2013}, url = {https://eprint.iacr.org/2013/647}, } @misc{cryptoeprint:2013:648, author = {Riham AlTawy and Amr M. Youssef}, title = {Integral Distinguishers for Reduced-round Stribog}, howpublished = {Cryptology ePrint Archive, Report 2013/648}, year = {2013}, url = {https://eprint.iacr.org/2013/648}, } @misc{cryptoeprint:2013:649, author = {SeongHan Shin and Kazukuni Kobara}, title = {Security Analysis of Password-Authenticated Key Retrieval}, howpublished = {Cryptology ePrint Archive, Report 2013/649}, year = {2013}, url = {https://eprint.iacr.org/2013/649}, } @misc{cryptoeprint:2013:650, author = {Elette Boyle and Kai-Min Chung and Rafael Pass}, title = {On Extractability (a.k.a. Differing-Inputs) Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2013/650}, year = {2013}, url = {https://eprint.iacr.org/2013/650}, } @misc{cryptoeprint:2013:651, author = {Sanjit Chatterjee and Chethan Kamath}, title = {A Closer Look at Multiple Forking: Leveraging (In)dependence for a Tighter Bound}, howpublished = {Cryptology ePrint Archive, Report 2013/651}, year = {2013}, url = {https://eprint.iacr.org/2013/651}, } @misc{cryptoeprint:2013:652, author = {Wilke Trei}, title = {Efficient Modular Arithmetic for SIMD Devices}, howpublished = {Cryptology ePrint Archive, Report 2013/652}, year = {2013}, url = {https://eprint.iacr.org/2013/652}, } @misc{cryptoeprint:2013:653, author = {Florian Böhl and Gareth T. Davies and Dennis Hofheinz}, title = {RKA-KDM secure encryption from public-key encryption}, howpublished = {Cryptology ePrint Archive, Report 2013/653}, year = {2013}, url = {https://eprint.iacr.org/2013/653}, } @misc{cryptoeprint:2013:654, author = {Baodong Qin and Shengli Liu}, title = {Leakage-Resilient Chosen-Ciphertext Secure Public-Key Encryption from Hash Proof System and One-Time Lossy Filter}, howpublished = {Cryptology ePrint Archive, Report 2013/654}, year = {2013}, url = {https://eprint.iacr.org/2013/654}, } @misc{cryptoeprint:2013:655, author = {Georg Neugebauer and Lucas Brutschy and Ulrike Meyer and Susanne Wetzel}, title = {Privacy-Preserving Multi-Party Reconciliation Secure in the Malicious Model (Extended version)}, howpublished = {Cryptology ePrint Archive, Report 2013/655}, year = {2013}, url = {https://eprint.iacr.org/2013/655}, } @misc{cryptoeprint:2013:656, author = {Robbert van den Berg and Boris Skoric and Vincent van der Leest}, title = {Bias-based modeling and entropy analysis of PUFs}, howpublished = {Cryptology ePrint Archive, Report 2013/656}, year = {2013}, url = {https://eprint.iacr.org/2013/656}, } @misc{cryptoeprint:2013:657, author = {Sarah Meiklejohn and Hovav Shacham}, title = {New Trapdoor Projection Maps for Composite-Order Bilinear Groups}, howpublished = {Cryptology ePrint Archive, Report 2013/657}, year = {2013}, url = {https://eprint.iacr.org/2013/657}, } @misc{cryptoeprint:2013:658, author = {Pawel Morawiecki and Josef Pieprzyk}, title = {Parallel authenticated encryption with the duplex construction}, howpublished = {Cryptology ePrint Archive, Report 2013/658}, year = {2013}, url = {https://eprint.iacr.org/2013/658}, } @misc{cryptoeprint:2013:659, author = {Rahim Toluee, Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh}, title = {A provable secure anonymous proxy signature scheme without random oracles}, howpublished = {Cryptology ePrint Archive, Report 2013/659}, year = {2013}, url = {https://eprint.iacr.org/2013/659}, } @misc{cryptoeprint:2013:660, author = {Mohammad Sadek}, title = {Discrete Logarithms and Mordell-Weil Groups }, howpublished = {Cryptology ePrint Archive, Report 2013/660}, year = {2013}, url = {https://eprint.iacr.org/2013/660}, } @misc{cryptoeprint:2013:661, author = {Constantinos Patsakis, Michael Clear, Paul Laird}, title = {Private aggregation on untrusted servers with customizable thresholds}, howpublished = {Cryptology ePrint Archive, Report 2013/661}, year = {2013}, url = {https://eprint.iacr.org/2013/661}, } @misc{cryptoeprint:2013:662, author = {Alex Escala and Jens Groth}, title = {Fine-Tuning Groth-Sahai Proofs}, howpublished = {Cryptology ePrint Archive, Report 2013/662}, year = {2013}, url = {https://eprint.iacr.org/2013/662}, } @misc{cryptoeprint:2013:663, author = {Javad Alizadeh, Nasour Bagheri, Praveen Gauravaram, Abhishek Kumar, and Somitra Kumar Sanadhya}, title = {Linear Cryptanalysis of Round Reduced SIMON}, howpublished = {Cryptology ePrint Archive, Report 2013/663}, year = {2013}, url = {https://eprint.iacr.org/2013/663}, } @misc{cryptoeprint:2013:664, author = {Michael Backes and Praveen Manoharan and Esfandiar Mohammadi}, title = {TUC: Time-sensitive and Modular Analysis of Anonymous Communication}, howpublished = {Cryptology ePrint Archive, Report 2013/664}, year = {2013}, url = {https://eprint.iacr.org/2013/664}, } @misc{cryptoeprint:2013:665, author = {Henry Cohn and Shafi Goldwasser and Yael Tauman Kalai}, title = {The Impossibility of Obfuscation with a Universal Simulator}, howpublished = {Cryptology ePrint Archive, Report 2013/665}, year = {2013}, url = {https://eprint.iacr.org/2013/665}, } @misc{cryptoeprint:2013:666, author = {Junghyun Nam and Kim-Kwang Raymond Choo and Juryon Paik and Dongho Won}, title = {An Offline Dictionary Attack against a Three-Party Key Exchange Protocol}, howpublished = {Cryptology ePrint Archive, Report 2013/666}, year = {2013}, url = {https://eprint.iacr.org/2013/666}, } @misc{cryptoeprint:2013:667, author = {Tolga Acar and Lan Nguyen and Greg Zaverucha}, title = {A TPM Diffie-Hellman Oracle}, howpublished = {Cryptology ePrint Archive, Report 2013/667}, year = {2013}, url = {https://eprint.iacr.org/2013/667}, } @misc{cryptoeprint:2013:668, author = {Boaz Barak and Nir Bitansky and Ran Canetti and Yael Tauman Kalai and Omer Paneth and Amit Sahai}, title = {Obfuscation for Evasive Functions}, howpublished = {Cryptology ePrint Archive, Report 2013/668}, year = {2013}, url = {https://eprint.iacr.org/2013/668}, } @misc{cryptoeprint:2013:669, author = {Dan Boneh and Valeria Nikolaenko and Gil Segev}, title = {Attribute-Based Encryption for Arithmetic Circuits}, howpublished = {Cryptology ePrint Archive, Report 2013/669}, year = {2013}, url = {https://eprint.iacr.org/2013/669}, } @misc{cryptoeprint:2013:670, author = {Charanjit Jutla and Arnab Roy}, title = {Switching Lemma for Bilinear Tests and Constant-size NIZK Proofs for Linear Subspaces}, howpublished = {Cryptology ePrint Archive, Report 2013/670}, year = {2013}, url = {https://eprint.iacr.org/2013/670}, } @misc{cryptoeprint:2013:671, author = {Yuval Ishai and Eyal Kushilevitz and Xin Li and Rafail Ostrovsky and Manoj Prabhakaran and Amit Sahai and David Zuckerman}, title = {Robust Pseudorandom Generators}, howpublished = {Cryptology ePrint Archive, Report 2013/671}, year = {2013}, url = {https://eprint.iacr.org/2013/671}, } @misc{cryptoeprint:2013:672, author = {Benjamin Smith}, title = {Easy scalar decompositions for efficient scalar multiplication on elliptic curves and genus 2 Jacobians}, howpublished = {Cryptology ePrint Archive, Report 2013/672}, year = {2013}, url = {https://eprint.iacr.org/2013/672}, } @misc{cryptoeprint:2013:673, author = {Qi Cheng and Daqing Wan and Jincheng Zhuang}, title = {Traps to the BGJT-Algorithm for Discrete Logarithms}, howpublished = {Cryptology ePrint Archive, Report 2013/673}, year = {2013}, url = {https://eprint.iacr.org/2013/673}, } @misc{cryptoeprint:2013:674, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys}, howpublished = {Cryptology ePrint Archive, Report 2013/674}, year = {2013}, url = {https://eprint.iacr.org/2013/674}, } @misc{cryptoeprint:2013:675, author = {Tomer Ashur and Orr Dunkelman}, title = {A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2013/675}, year = {2013}, url = {https://eprint.iacr.org/2013/675}, } @misc{cryptoeprint:2013:676, author = {Siwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Ling Song}, title = {Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-oriented Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2013/676}, year = {2013}, url = {https://eprint.iacr.org/2013/676}, } @misc{cryptoeprint:2013:677, author = {Ivan Damgaard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi}, title = {Bounded Tamper Resilience: How to go beyond the Algebraic Barrier}, howpublished = {Cryptology ePrint Archive, Report 2013/677}, year = {2013}, url = {https://eprint.iacr.org/2013/677}, } @misc{cryptoeprint:2013:678, author = {Peeter Laud and Jan Willemson}, title = {Universally composable privacy preserving finite automata execution with low online and offline complexity}, howpublished = {Cryptology ePrint Archive, Report 2013/678}, year = {2013}, url = {https://eprint.iacr.org/2013/678}, } @misc{cryptoeprint:2013:679, author = {Nicolas Moro and Karine Heydemann and Emmanuelle Encrenaz and Bruno Robisson}, title = {Formal verification of a software countermeasure against instruction skip attacks}, howpublished = {Cryptology ePrint Archive, Report 2013/679}, year = {2013}, url = {https://eprint.iacr.org/2013/679}, } @misc{cryptoeprint:2013:680, author = {Dana Dachman-Soled}, title = {A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2013/680}, year = {2013}, url = {https://eprint.iacr.org/2013/680}, } @misc{cryptoeprint:2013:681, author = {Damien Vergnaud and David Xiao}, title = {Public-Key Encryption with Weak Randomness: Security against Strong Chosen Distribution Attacks}, howpublished = {Cryptology ePrint Archive, Report 2013/681}, year = {2013}, url = {https://eprint.iacr.org/2013/681}, } @misc{cryptoeprint:2013:682, author = {Reza Hooshmand, Mohammad Reza Aref, and Taraneh Eghlidos}, title = {Secret Key Cryptosystem based on Non-Systematic Polar Codes}, howpublished = {Cryptology ePrint Archive, Report 2013/682}, year = {2013}, url = {https://eprint.iacr.org/2013/682}, } @misc{cryptoeprint:2013:683, author = {Venkata Koppula and Kim Ramchen and Brent Waters}, title = {Separations in Circular Security for Arbitrary Length Key Cycles}, howpublished = {Cryptology ePrint Archive, Report 2013/683}, year = {2013}, url = {https://eprint.iacr.org/2013/683}, } @misc{cryptoeprint:2013:684, author = {Marcel Šebek}, title = {Fully Bideniable Public-Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2013/684}, year = {2013}, url = {https://eprint.iacr.org/2013/684}, } @misc{cryptoeprint:2013:685, author = {Anja Becker, Nicolas Gama and Antoine Joux}, title = {Solving shortest and closest vector problems: The decomposition approach}, howpublished = {Cryptology ePrint Archive, Report 2013/685}, year = {2013}, url = {https://eprint.iacr.org/2013/685}, } @misc{cryptoeprint:2013:686, author = {Shiwei Xu and Sergiu Bursuc and Julian P. Murphy}, title = {New abstractions in applied pi-calculus and automated verification of protected executions}, howpublished = {Cryptology ePrint Archive, Report 2013/686}, year = {2013}, url = {https://eprint.iacr.org/2013/686}, } @misc{cryptoeprint:2013:687, author = {Craig Gentry and Sergey Gorbunov and Shai Halevi and Vinod Vaikuntanathan and Dhinakaran Vinayagamurthy}, title = {How to Compress (Reusable) Garbled Circuits}, howpublished = {Cryptology ePrint Archive, Report 2013/687}, year = {2013}, url = {https://eprint.iacr.org/2013/687}, } @misc{cryptoeprint:2013:688, author = {Michael Scott}, title = {Unbalancing Pairing-Based Key Exchange Protocols}, howpublished = {Cryptology ePrint Archive, Report 2013/688}, year = {2013}, url = {https://eprint.iacr.org/2013/688}, } @misc{cryptoeprint:2013:689, author = {Prabhanjan Ananth and Dan Boneh and Sanjam Garg and Amit Sahai and Mark Zhandry}, title = {Differing-Inputs Obfuscation and Applications}, howpublished = {Cryptology ePrint Archive, Report 2013/689}, year = {2013}, url = {https://eprint.iacr.org/2013/689}, } @misc{cryptoeprint:2013:690, author = {Antonio Marcedone and Claudio Orlandi}, title = {Obfuscation ==> (IND-CPA Security =/=> Circular Security)}, howpublished = {Cryptology ePrint Archive, Report 2013/690}, year = {2013}, url = {https://eprint.iacr.org/2013/690}, } @misc{cryptoeprint:2013:691, author = {Benoit Libert and Thomas Peters and Marc Joye and Moti Yung}, title = {Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures}, howpublished = {Cryptology ePrint Archive, Report 2013/691}, year = {2013}, url = {https://eprint.iacr.org/2013/691}, } @misc{cryptoeprint:2013:692, author = {Craig Costello and Huseyin Hisil and Benjamin Smith}, title = {Faster Compact Diffie-Hellman: Endomorphisms on the x-line}, howpublished = {Cryptology ePrint Archive, Report 2013/692}, year = {2013}, url = {https://eprint.iacr.org/2013/692}, } @misc{cryptoeprint:2013:693, author = {Ran Canetti and Vladimir Kolesnikov and Charles Rackoff and and Yevgeniy Vahlis}, title = {Secure Key Exchange and Sessions Without Credentials}, howpublished = {Cryptology ePrint Archive, Report 2013/693}, year = {2013}, url = {https://eprint.iacr.org/2013/693}, } @misc{cryptoeprint:2013:694, author = {Lichun Li and Anwitaman Datta}, title = {Write-Only Oblivious RAM based Privacy-Preserved Access of Outsourced Data}, howpublished = {Cryptology ePrint Archive, Report 2013/694}, year = {2013}, url = {https://eprint.iacr.org/2013/694}, } @misc{cryptoeprint:2013:695, author = {Hongjun Wu and Bart Preneel }, title = {AEGIS: A Fast Authenticated Encryption Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2013/695}, year = {2013}, url = {https://eprint.iacr.org/2013/695}, } @misc{cryptoeprint:2013:696, author = {Ziya Alper Genc, Suleyman Kardas, Mehmet Sabir Kiraz}, title = {Examination of a New Defense Mechanism: Honeywords}, howpublished = {Cryptology ePrint Archive, Report 2013/696}, year = {2013}, url = {https://eprint.iacr.org/2013/696}, } @misc{cryptoeprint:2013:697, author = {Begul Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {A More Efficient AES Threshold Implementation}, howpublished = {Cryptology ePrint Archive, Report 2013/697}, year = {2013}, url = {https://eprint.iacr.org/2013/697}, } @misc{cryptoeprint:2013:698, author = {Xi-Jun Lin and Lin Sun}, title = {Cryptanalysis and improvement of a dynamic and secure key management model for hierarchical heterogeneous sensor networks}, howpublished = {Cryptology ePrint Archive, Report 2013/698}, year = {2013}, url = {https://eprint.iacr.org/2013/698}, } @misc{cryptoeprint:2013:699, author = {Benny Applebaum}, title = {Bootstrapping Obfuscators via Fast Pseudorandom Functions}, howpublished = {Cryptology ePrint Archive, Report 2013/699}, year = {2013}, url = {https://eprint.iacr.org/2013/699}, } @misc{cryptoeprint:2013:700, author = {Jean-Sebastien Coron}, title = {Higher Order Masking of Look-up Tables}, howpublished = {Cryptology ePrint Archive, Report 2013/700}, year = {2013}, url = {https://eprint.iacr.org/2013/700}, } @misc{cryptoeprint:2013:701, author = {Nir Bitansky and Ran Canetti and Omer Paneth and Alon Rosen}, title = {More on the Impossibility of Virtual-Black-Box Obfuscation with Auxiliary Input}, howpublished = {Cryptology ePrint Archive, Report 2013/701}, year = {2013}, url = {https://eprint.iacr.org/2013/701}, } @misc{cryptoeprint:2013:702, author = {Sebastian Faust and Pratyay Mukherjee and Daniele Venturi and Daniel Wichs}, title = {Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits}, howpublished = {Cryptology ePrint Archive, Report 2013/702}, year = {2013}, url = {https://eprint.iacr.org/2013/702}, } @misc{cryptoeprint:2013:703, author = {Elette Boyle and Rafael Pass}, title = {Limits of Extractability Assumptions with Distributional Auxiliary Input}, howpublished = {Cryptology ePrint Archive, Report 2013/703}, year = {2013}, url = {https://eprint.iacr.org/2013/703}, } @misc{cryptoeprint:2013:704, author = {Mihir Bellare and Viet Tung Hoang}, title = {Adaptive Witness Encryption and Asymmetric Password-based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2013/704}, year = {2013}, url = {https://eprint.iacr.org/2013/704}, } @misc{cryptoeprint:2013:705, author = {Clemens Heuberger and Michela Mazzoli}, title = {Symmetric Digit Sets for Elliptic Curve Scalar Multiplication without Precomputation}, howpublished = {Cryptology ePrint Archive, Report 2013/705}, year = {2013}, url = {https://eprint.iacr.org/2013/705}, } @misc{cryptoeprint:2013:706, author = {François Durvaux and François-Xavier Standaert and Nicolas Veyrat-Charvillon}, title = {How to Certify the Leakage of a Chip?}, howpublished = {Cryptology ePrint Archive, Report 2013/706}, year = {2013}, url = {https://eprint.iacr.org/2013/706}, } @misc{cryptoeprint:2013:707, author = {Matan Banin and Boaz Tsaban}, title = {A reduction of Semigroup DLP to classic DLP}, howpublished = {Cryptology ePrint Archive, Report 2013/707}, year = {2013}, url = {https://eprint.iacr.org/2013/707}, } @misc{cryptoeprint:2013:708, author = {Yevgeniy Dodis and Krzysztof Pietrzak and Daniel Wichs}, title = {Key Derivation Without Entropy Waste}, howpublished = {Cryptology ePrint Archive, Report 2013/708}, year = {2013}, url = {https://eprint.iacr.org/2013/708}, } @misc{cryptoeprint:2013:709, author = {Mohammad Sadeq Dousti and Rasool Jalili}, title = {Efficient Statistical Zero-Knowledge Authentication Protocols for Smart Cards Secure Against Active & Concurrent Attacks}, howpublished = {Cryptology ePrint Archive, Report 2013/709}, year = {2013}, url = {https://eprint.iacr.org/2013/709}, } @misc{cryptoeprint:2013:710, author = {Jung Hee Cheon and Jinsu Kim}, title = {An Approach to Reduce Storage for Homomorphic Computations}, howpublished = {Cryptology ePrint Archive, Report 2013/710}, year = {2013}, url = {https://eprint.iacr.org/2013/710}, } @misc{cryptoeprint:2013:711, author = {Dennis Y. W. Liu and Duncan S. Wong and Qiong Huang}, title = {Ambiguous One-Move Nominative Signature Without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2013/711}, year = {2013}, url = {https://eprint.iacr.org/2013/711}, } @misc{cryptoeprint:2013:712, author = {Daisuke Moriyama and Shin'ichiro Matsuo and Moti Yung}, title = {PUF-Based RFID Authentication Secure and Private under Memory Leakage}, howpublished = {Cryptology ePrint Archive, Report 2013/712}, year = {2013}, url = {https://eprint.iacr.org/2013/712}, } @misc{cryptoeprint:2013:713, author = {Jian Guo and Ivica Nikolic and Thomas Peyrin and Lei Wang}, title = {Cryptanalysis of Zorro}, howpublished = {Cryptology ePrint Archive, Report 2013/713}, year = {2013}, url = {https://eprint.iacr.org/2013/713}, } @misc{cryptoeprint:2013:714, author = {Sanchita Barman, Bimal Roy}, title = {Method to secure data in the cloud while preserving summary statistics}, howpublished = {Cryptology ePrint Archive, Report 2013/714}, year = {2013}, url = {https://eprint.iacr.org/2013/714}, } @misc{cryptoeprint:2013:715, author = {Erik-Oliver Blass and Travis Mayberry and Guevara Noubir}, title = {Practical Forward-Secure Range and Sort Queries with Update-Oblivious Linked Lists}, howpublished = {Cryptology ePrint Archive, Report 2013/715}, year = {2013}, url = {https://eprint.iacr.org/2013/715}, } @misc{cryptoeprint:2013:716, author = {Xiao Feng and Zheng Yuan}, title = {A Secure Obfuscator for Encrypted Blind Signature Functionality}, howpublished = {Cryptology ePrint Archive, Report 2013/716}, year = {2013}, url = {https://eprint.iacr.org/2013/716}, } @misc{cryptoeprint:2013:717, author = {Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Zakaria Najm}, title = {NICV: Normalized Inter-Class Variance for Detection of Side-Channel Leakage}, howpublished = {Cryptology ePrint Archive, Report 2013/717}, year = {2013}, url = {https://eprint.iacr.org/2013/717}, } @misc{cryptoeprint:2013:718, author = {Xinyu Lei and Xiaofeng Liao}, title = {NTRU-KE: A Lattice-based Public Key Exchange Protocol}, howpublished = {Cryptology ePrint Archive, Report 2013/718}, year = {2013}, url = {https://eprint.iacr.org/2013/718}, } @misc{cryptoeprint:2013:719, author = {Sandro Coretti and Ueli Maurer and Björn Tackmann}, title = {Constructing Confidential Channels from Authenticated Channels---Public-Key Encryption Revisited}, howpublished = {Cryptology ePrint Archive, Report 2013/719}, year = {2013}, url = {https://eprint.iacr.org/2013/719}, } @misc{cryptoeprint:2013:720, author = {Stanislaw Jarecki and Charanjit Jutla and Hugo Krawczyk and Marcel Rosu and Michael Steiner}, title = {Outsourced Symmetric Private Information Retrieval}, howpublished = {Cryptology ePrint Archive, Report 2013/720}, year = {2013}, url = {https://eprint.iacr.org/2013/720}, } @misc{cryptoeprint:2013:721, author = {Bo Yang and Zhao Yang and Zibi Xiao and Shougui Li}, title = {Deep Attacks of a Certificateless Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2013/721}, year = {2013}, url = {https://eprint.iacr.org/2013/721}, } @misc{cryptoeprint:2013:722, author = {Diego F. Aranha and Paulo S. L. M. Barreto and Patrick Longa and Jefferson E. Ricardini}, title = {The Realm of the Pairings}, howpublished = {Cryptology ePrint Archive, Report 2013/722}, year = {2013}, url = {https://eprint.iacr.org/2013/722}, } @misc{cryptoeprint:2013:723, author = {Divesh Aggarwal and Yevgeniy Dodis and Zahra Jafargholi and Eric Miles and Leonid Reyzin}, title = {Amplifying Privacy in Privacy Amplification}, howpublished = {Cryptology ePrint Archive, Report 2013/723}, year = {2013}, url = {https://eprint.iacr.org/2013/723}, } @misc{cryptoeprint:2013:724, author = {Ran Canetti and Omer Paneth and Dimitrios Papadopoulos and Nikos Triandopoulos}, title = {Verifiable Set Operations over Outsourced Databases}, howpublished = {Cryptology ePrint Archive, Report 2013/724}, year = {2013}, url = {https://eprint.iacr.org/2013/724}, } @misc{cryptoeprint:2013:725, author = {Muhammad Qasim Saeed and Pardis Pourghomi}, title = {Mobile Transaction over NFC and GSM}, howpublished = {Cryptology ePrint Archive, Report 2013/725}, year = {2013}, url = {https://eprint.iacr.org/2013/725}, } @misc{cryptoeprint:2013:726, author = {Chihong Joo and Aaram Yun}, title = {Homomorphic Authenticated Encryption Secure Against Chosen-Ciphertext Attack}, howpublished = {Cryptology ePrint Archive, Report 2013/726}, year = {2013}, url = {https://eprint.iacr.org/2013/726}, } @misc{cryptoeprint:2013:727, author = {Shafi Goldwasser and Vipul Goyal and Abhishek Jain and Amit Sahai}, title = {Multi-Input Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2013/727}, year = {2013}, url = {https://eprint.iacr.org/2013/727}, } @misc{cryptoeprint:2013:728, author = {Robert Wicik and Tomasz Rachwalik}, title = {Modified Alternating Step Generators}, howpublished = {Cryptology ePrint Archive, Report 2013/728}, year = {2013}, url = {https://eprint.iacr.org/2013/728}, } @misc{cryptoeprint:2013:729, author = {Vipul Goyal and Abhishek Jain and Venkata Koppula and Amit Sahai}, title = {Functional Encryption for Randomized Functionalities}, howpublished = {Cryptology ePrint Archive, Report 2013/729}, year = {2013}, url = {https://eprint.iacr.org/2013/729}, } @misc{cryptoeprint:2013:730, author = {{\L}ukasz Krzywiecki and Przemys{\l}aw Kubiak and Miros{\l}aw Kuty{\l}owski}, title = {Stamp \& Extend -- Instant but Undeniable Timestamping based on Lazy Trees}, howpublished = {Cryptology ePrint Archive, Report 2013/730}, year = {2013}, url = {https://eprint.iacr.org/2013/730}, } @misc{cryptoeprint:2013:731, author = {Yongqiang Li and Mingsheng Wang and Yuyin Yu}, title = {Constructing Differentially 4-uniform Permutations over GF(2^{2k}) from the Inverse Function Revisited}, howpublished = {Cryptology ePrint Archive, Report 2013/731}, year = {2013}, url = {https://eprint.iacr.org/2013/731}, } @misc{cryptoeprint:2013:732, author = {Hyun-A Park}, title = {SSS-V2: Secure Similarity Search}, howpublished = {Cryptology ePrint Archive, Report 2013/732}, year = {2013}, url = {https://eprint.iacr.org/2013/732}, } @misc{cryptoeprint:2013:733, author = {Maurizio Adriano Strangio}, title = {A Key Compromise Impersonation attack against Wang's Provably Secure Identity-based Key Agreement Protocol}, howpublished = {Cryptology ePrint Archive, Report 2013/733}, year = {2013}, url = {https://eprint.iacr.org/2013/733}, } @misc{cryptoeprint:2013:734, author = {Joppe W. Bos and J. Alex Halderman and Nadia Heninger and Jonathan Moore and Michael Naehrig and Eric Wustrow}, title = {Elliptic Curve Cryptography in Practice}, howpublished = {Cryptology ePrint Archive, Report 2013/734}, year = {2013}, url = {https://eprint.iacr.org/2013/734}, } @misc{cryptoeprint:2013:735, author = {Michael Tunstall and Carolyn Whitnall and Elisabeth Oswald}, title = {Masking Tables---An Underestimated Security Risk}, howpublished = {Cryptology ePrint Archive, Report 2013/735}, year = {2013}, url = {https://eprint.iacr.org/2013/735}, } @misc{cryptoeprint:2013:736, author = {Jean-Marie Chauvet}, title = {TRS-80 With A Keccak Sponge Cake}, howpublished = {Cryptology ePrint Archive, Report 2013/736}, year = {2013}, url = {https://eprint.iacr.org/2013/736}, } @misc{cryptoeprint:2013:737, author = {Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodriguez-Henriquez}, title = {Weakness of F_{3^{6*1429}} and F_{2^{4*3041}} for Discrete Logarithm Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2013/737}, year = {2013}, url = {https://eprint.iacr.org/2013/737}, } @misc{cryptoeprint:2013:738, author = {Chris Litsas and Aris Pagourtzis and Giorgos Panagiotakos and Dimitris Sakavalas}, title = {On the Resilience and Uniqueness of CPA for Secure Broadcast}, howpublished = {Cryptology ePrint Archive, Report 2013/738}, year = {2013}, url = {https://eprint.iacr.org/2013/738}, } @misc{cryptoeprint:2013:739, author = {Dr. G.S.G.N.Anjaneyulu and A.Vijayabarathi }, title = {NEW DIGITAL SIGNATURE SCHEME USING MULTIPLE PRIVATE KEYS OVER NON-COMMUTATIVE DIVISION SEMIRINGS}, howpublished = {Cryptology ePrint Archive, Report 2013/739}, year = {2013}, url = {https://eprint.iacr.org/2013/739}, } @misc{cryptoeprint:2013:740, author = {Gérald Gavin}, title = {An efficient FHE proposal based on the hardness of solving systems of nonlinear multivariate equations (II)}, howpublished = {Cryptology ePrint Archive, Report 2013/740}, year = {2013}, url = {https://eprint.iacr.org/2013/740}, } @misc{cryptoeprint:2013:741, author = {Manuel Bluhm and Shay Gueron}, title = {Fast Software Implementation of Binary Elliptic Curve Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2013/741}, year = {2013}, url = {https://eprint.iacr.org/2013/741}, } @misc{cryptoeprint:2013:742, author = {Jürgen Müller}, title = {CODING - Stream Cipher Methods by Varying Components during Ciphering Data}, howpublished = {Cryptology ePrint Archive, Report 2013/742}, year = {2013}, url = {https://eprint.iacr.org/2013/742}, } @misc{cryptoeprint:2013:743, author = {Iraklis Leontiadis, Melek Önen, Refik Molva}, title = {Privacy Preserving Unique Statistics in a Smart Grid}, howpublished = {Cryptology ePrint Archive, Report 2013/743}, year = {2013}, url = {https://eprint.iacr.org/2013/743}, } @misc{cryptoeprint:2013:744, author = {Shashank Agrawal and Shweta Agrawal and Saikrishna Badrinarayanan and Abishek Kumarasubramanian and Manoj Prabhakaran and Amit Sahai}, title = {Functional Encryption and Property Preserving Encryption: New Definitions and Positive Results}, howpublished = {Cryptology ePrint Archive, Report 2013/744}, year = {2013}, url = {https://eprint.iacr.org/2013/744}, } @misc{cryptoeprint:2013:745, author = {Michael Backes and Fabian Bendun and Ashish Choudhury and Aniket Kate}, title = {Asynchronous MPC with a Strict Honest Majority Using Non-equivocation}, howpublished = {Cryptology ePrint Archive, Report 2013/745}, year = {2013}, url = {https://eprint.iacr.org/2013/745}, } @misc{cryptoeprint:2013:746, author = {Vadim Lyubashevsky and Daniele Micciancio}, title = {Asymptotically Efficient Lattice-Based Digital Signatures}, howpublished = {Cryptology ePrint Archive, Report 2013/746}, year = {2013}, url = {https://eprint.iacr.org/2013/746}, } @misc{cryptoeprint:2013:747, author = {Jayaprakash Kar}, title = {Authenticated Multiple Key Establishment Protocol for Wireless Sensor Networks}, howpublished = {Cryptology ePrint Archive, Report 2013/747}, year = {2013}, url = {https://eprint.iacr.org/2013/747}, } @misc{cryptoeprint:2013:748, author = {Kenneth G. Paterson and Bertram Poettering and Jacob C.N. Schuldt}, title = {Plaintext Recovery Attacks Against WPA/TKIP}, howpublished = {Cryptology ePrint Archive, Report 2013/748}, year = {2013}, url = {https://eprint.iacr.org/2013/748}, } @misc{cryptoeprint:2013:749, author = {Xi-Jun Lin and Lin Sun}, title = {Efficient CCA-secure Threshold Public-Key Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2013/749}, year = {2013}, url = {https://eprint.iacr.org/2013/749}, } @misc{cryptoeprint:2013:750, author = {Xi-Jun Lin and Lin Sun}, title = {Fully Deniable Mutual Authentication Protocol Based on RSA Signature}, howpublished = {Cryptology ePrint Archive, Report 2013/750}, year = {2013}, url = {https://eprint.iacr.org/2013/750}, } @misc{cryptoeprint:2013:751, author = {Herv\'e Chabanne and Jean-Michel Cioranesco and Vincent Despiegel and Jean-Christophe Fondeur and David Naccache}, title = {Using Hamiltonian Totems as Passwords}, howpublished = {Cryptology ePrint Archive, Report 2013/751}, year = {2013}, url = {https://eprint.iacr.org/2013/751}, } @misc{cryptoeprint:2013:752, author = {Angelo De Caro and Vincenzo Iovino}, title = {On the Power of Rewinding Simulators in Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2013/752}, year = {2013}, url = {https://eprint.iacr.org/2013/752}, } @misc{cryptoeprint:2013:753, author = {Lejla Batina and Amitabh Das and Baris Ege and Elif Bilge Kavun and Nele Mentens and Christof Paar and Ingrid Verbauwhede and Tolga Yalcin}, title = {Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures}, howpublished = {Cryptology ePrint Archive, Report 2013/753}, year = {2013}, url = {https://eprint.iacr.org/2013/753}, } @misc{cryptoeprint:2013:754, author = {Omkant Pandey and Manoj Prabhakaran and Amit Sahai}, title = {Obfuscation-based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for NP}, howpublished = {Cryptology ePrint Archive, Report 2013/754}, year = {2013}, url = {https://eprint.iacr.org/2013/754}, } @misc{cryptoeprint:2013:755, author = {Qi Li and Jianfeng Ma and Rui Li and Ximeng Liu and Jinbo Xiong}, title = {Improving security and efficiency for multi-authority access control system in cloud storage}, howpublished = {Cryptology ePrint Archive, Report 2013/755}, year = {2013}, url = {https://eprint.iacr.org/2013/755}, } @misc{cryptoeprint:2013:756, author = {Yonglin Hao and Dongxia Bai and Leibo Li}, title = {A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique}, howpublished = {Cryptology ePrint Archive, Report 2013/756}, year = {2013}, url = {https://eprint.iacr.org/2013/756}, } @misc{cryptoeprint:2013:757, author = {Jeff Hoffstein and Jill Pipher and John Schanck and Joseph H. Silverman and William Whyte}, title = {Practical Signatures from the Partial Fourier Recovery Problem}, howpublished = {Cryptology ePrint Archive, Report 2013/757}, year = {2013}, url = {https://eprint.iacr.org/2013/757}, } @misc{cryptoeprint:2013:758, author = {Karthik Abinav and Saikrishna Badrinarayanan and C. Pandu Rangan and S. Sharmila Deva Selvi and S. Sree Vivek and Vivek Krishna Pradhan}, title = {A Revocable Online-Offline Certificateless Signature Scheme without Pairing}, howpublished = {Cryptology ePrint Archive, Report 2013/758}, year = {2013}, url = {https://eprint.iacr.org/2013/758}, } @misc{cryptoeprint:2013:759, author = {Martin Goll and Shay Gueron}, title = {Vectorization of ChaCha Stream Cipher}, howpublished = {Cryptology ePrint Archive, Report 2013/759}, year = {2013}, url = {https://eprint.iacr.org/2013/759}, } @misc{cryptoeprint:2013:760, author = {Johannes Mykkeltveit and Janusz Szmidt}, title = {On cross joining de Bruijn sequences}, howpublished = {Cryptology ePrint Archive, Report 2013/760}, year = {2013}, url = {https://eprint.iacr.org/2013/760}, } @misc{cryptoeprint:2013:761, author = {Pierre-Alain Fouque and Antoine Joux and Chrysanthi Mavromati}, title = {Multi-user collisions: Applications to Discrete Logarithm, Even-Mansour and PRINCE}, howpublished = {Cryptology ePrint Archive, Report 2013/761}, year = {2013}, url = {https://eprint.iacr.org/2013/761}, } @misc{cryptoeprint:2013:762, author = {Kwangsu Lee and Seung Geol Choi and Dong Hoon Lee and Jong Hwan Park and Moti Yung}, title = {Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency}, howpublished = {Cryptology ePrint Archive, Report 2013/762}, year = {2013}, url = {https://eprint.iacr.org/2013/762}, } @misc{cryptoeprint:2013:763, author = {Yutaka Kawai and Katsuyuki Takashima}, title = {Predicate- and Attribute-Hiding Inner Product Encryption in a Public Key Setting}, howpublished = {Cryptology ePrint Archive, Report 2013/763}, year = {2013}, url = {https://eprint.iacr.org/2013/763}, } @misc{cryptoeprint:2013:764, author = {Jean-Luc Danger and Sylvain Guilley and Philippe Hoogvorst and Cédric Murdica and David Naccache}, title = {Dynamic Countermeasure Against the Zero Power Analysis}, howpublished = {Cryptology ePrint Archive, Report 2013/764}, year = {2013}, url = {https://eprint.iacr.org/2013/764}, } @misc{cryptoeprint:2013:765, author = {Kaoru Kurosawa and Le Trieu Phong}, title = {Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited and More}, howpublished = {Cryptology ePrint Archive, Report 2013/765}, year = {2013}, url = {https://eprint.iacr.org/2013/765}, } @misc{cryptoeprint:2013:766, author = {P. Gaborit and O. Ruatta and J. Schrek and G. Zémor}, title = {RankSign : an efficient signature algorithm based on the rank metric}, howpublished = {Cryptology ePrint Archive, Report 2013/766}, year = {2013}, url = {https://eprint.iacr.org/2013/766}, } @misc{cryptoeprint:2013:767, author = {Nilanjan Datta and Mridul Nandi}, title = {Misuse Resistant Parallel Authenticated Encryptions}, howpublished = {Cryptology ePrint Archive, Report 2013/767}, year = {2013}, url = {https://eprint.iacr.org/2013/767}, } @misc{cryptoeprint:2013:768, author = {Bartosz Zoltak}, title = {VMPC-R Cryptographically Secure Pseudo-Random Number Generator Alternative to RC4}, howpublished = {Cryptology ePrint Archive, Report 2013/768}, year = {2013}, url = {https://eprint.iacr.org/2013/768}, } @misc{cryptoeprint:2013:769, author = {Martin Hirt and Ueli Maurer and Pavel Raykov}, title = {Broadcast Amplification}, howpublished = {Cryptology ePrint Archive, Report 2013/769}, year = {2013}, url = {https://eprint.iacr.org/2013/769}, } @misc{cryptoeprint:2013:770, author = {Omar Choudary and Markus G. Kuhn}, title = {Efficient Template Attacks}, howpublished = {Cryptology ePrint Archive, Report 2013/770}, year = {2013}, url = {https://eprint.iacr.org/2013/770}, } @misc{cryptoeprint:2013:771, author = {Wuqiang Shen and Shaohua Tang}, title = {TOT, a Fast Multivariate Public Key Cryptosystem with Basic Secure Trapdoor}, howpublished = {Cryptology ePrint Archive, Report 2013/771}, year = {2013}, url = {https://eprint.iacr.org/2013/771}, } @misc{cryptoeprint:2013:772, author = {Markku-Juhani O. Saarinen}, title = {Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation}, howpublished = {Cryptology ePrint Archive, Report 2013/772}, year = {2013}, url = {https://eprint.iacr.org/2013/772}, } @misc{cryptoeprint:2013:773, author = {Markku-Juhani O. Saarinen}, title = {CBEAM: Efficient Authenticated Encryption from Feebly One-Way $\phi$ Functions}, howpublished = {Cryptology ePrint Archive, Report 2013/773}, year = {2013}, url = {https://eprint.iacr.org/2013/773}, } @misc{cryptoeprint:2013:774, author = {S. Dov Gordon and Jonathan Katz and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou}, title = {Multi-Input Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2013/774}, year = {2013}, url = {https://eprint.iacr.org/2013/774}, } @misc{cryptoeprint:2013:775, author = {Yanfeng Wang, Wenling Wu, Zhiyuan Guo and Xiaoli Yu}, title = {Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro}, howpublished = {Cryptology ePrint Archive, Report 2013/775}, year = {2013}, url = {https://eprint.iacr.org/2013/775}, } @misc{cryptoeprint:2013:776, author = {Aikaterini Mitrokotsa and Cristina Onete and Serge Vaudenay}, title = {Location Leakage in Distance Bounding: Why Location Privacy does not Work}, howpublished = {Cryptology ePrint Archive, Report 2013/776}, year = {2013}, url = {https://eprint.iacr.org/2013/776}, } @misc{cryptoeprint:2013:777, author = {Yuenai Chen and Chunming Tang}, title = {Construction of Multiplicative Monotone Span Program}, howpublished = {Cryptology ePrint Archive, Report 2013/777}, year = {2013}, url = {https://eprint.iacr.org/2013/777}, } @misc{cryptoeprint:2013:778, author = {Philipp Jovanovic and Martin Kreuzer and Ilia Polian}, title = {Multi-Stage Fault Attacks on Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2013/778}, year = {2013}, url = {https://eprint.iacr.org/2013/778}, } @misc{cryptoeprint:2013:779, author = {Mike Burmester and Jorge Munilla}, title = {Distributed Group Authentication for RFID Supply Management}, howpublished = {Cryptology ePrint Archive, Report 2013/779}, year = {2013}, url = {https://eprint.iacr.org/2013/779}, } @misc{cryptoeprint:2013:780, author = {Nasser Ramazani Darmian}, title = {A Distinguish attack on Rabbit Stream Cipher Based on Multiple Cube Tester}, howpublished = {Cryptology ePrint Archive, Report 2013/780}, year = {2013}, url = {https://eprint.iacr.org/2013/780}, } @misc{cryptoeprint:2013:781, author = {Rafael Pass and Karn Seth and Sidharth Telang}, title = {Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings}, howpublished = {Cryptology ePrint Archive, Report 2013/781}, year = {2013}, url = {https://eprint.iacr.org/2013/781}, } @misc{cryptoeprint:2013:782, author = {Dorit Ron and Adi Shamir}, title = {How Did Dread Pirate Roberts Acquire and Protect His Bitcoin Wealth?}, howpublished = {Cryptology ePrint Archive, Report 2013/782}, year = {2013}, url = {https://eprint.iacr.org/2013/782}, } @misc{cryptoeprint:2013:783, author = {Yalin Chen and Jue-Sam Chou2}, title = {ECC-Based Non-Interactive Deniable Authentication with Designated Verifier}, howpublished = {Cryptology ePrint Archive, Report 2013/783}, year = {2013}, url = {https://eprint.iacr.org/2013/783}, } @misc{cryptoeprint:2013:784, author = {Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Łukasz Mazurek}, title = {Secure Multiparty Computations on Bitcoin}, howpublished = {Cryptology ePrint Archive, Report 2013/784}, year = {2013}, url = {https://eprint.iacr.org/2013/784}, } @misc{cryptoeprint:2013:785, author = {Fei Tang, Hongda Li, Qihua Niu, and Bei Liang}, title = {Efficient Leakage-Resilient Signature Schemes in the Generic Bilinear Group Model}, howpublished = {Cryptology ePrint Archive, Report 2013/785}, year = {2013}, url = {https://eprint.iacr.org/2013/785}, } @misc{cryptoeprint:2013:786, author = {Sanjay Bhattacherjee and Palash Sarkar}, title = {Tree Based Symmetric Key Broadcast Encryption}, howpublished = {Cryptology ePrint Archive, Report 2013/786}, year = {2013}, url = {https://eprint.iacr.org/2013/786}, } @misc{cryptoeprint:2013:787, author = {Raghuvir Songhela and Manik Lal Das}, title = {Wide-weak Privacy Preserving RFID Mutual Authentication Protocol}, howpublished = {Cryptology ePrint Archive, Report 2013/787}, year = {2013}, url = {https://eprint.iacr.org/2013/787}, } @misc{cryptoeprint:2013:788, author = {Zhengjun Cao and Lihua Liu}, title = {Improvement of Lin-Tzeng Solution to Yao's Millionaires Problem and Its Cheating Advantage Analysis}, howpublished = {Cryptology ePrint Archive, Report 2013/788}, year = {2013}, url = {https://eprint.iacr.org/2013/788}, } @misc{cryptoeprint:2013:789, author = {Shuai Han and Shengli Liu and Kefei Chen and Dawu Gu}, title = {Proofs of Data Possession and Retrievability Based on MRD Codes}, howpublished = {Cryptology ePrint Archive, Report 2013/789}, year = {2013}, url = {https://eprint.iacr.org/2013/789}, } @misc{cryptoeprint:2013:790, author = {Elena Andreeva and Andrey Bogdanov and Atul Luykx and Bart Mennink and Elmar Tischhauser and Kan Yasuda}, title = {Parallelizable and Authenticated Online Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2013/790}, year = {2013}, url = {https://eprint.iacr.org/2013/790}, } @misc{cryptoeprint:2013:791, author = {Elena Andreeva and Beg\"ul Bilgin and Andrey Bogdanov and Atul Luykx and Bart Mennink and Nicky Mouha and Kan Yasuda}, title = {APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2013/791}, year = {2013}, url = {https://eprint.iacr.org/2013/791}, } @misc{cryptoeprint:2013:792, author = {Kazuhiko Minematsu and Stefan Lucks and Tetsu Iwata}, title = {Improved Authenticity Bound of EAX, and Refinements}, howpublished = {Cryptology ePrint Archive, Report 2013/792}, year = {2013}, url = {https://eprint.iacr.org/2013/792}, } @misc{cryptoeprint:2013:793, author = {Long Zhang and Qiuling Yue}, title = {A fast integer-based batch full-homomorphic encryption scheme over finite field}, howpublished = {Cryptology ePrint Archive, Report 2013/793}, year = {2013}, url = {https://eprint.iacr.org/2013/793}, } @misc{cryptoeprint:2013:794, author = {Victor Lomn\'{e}, Emmanuel Prouff, and Thomas Roche}, title = {Behind the Scene of Side Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2013/794}, year = {2013}, url = {https://eprint.iacr.org/2013/794}, } @misc{cryptoeprint:2013:795, author = {Xi-Jun Lin and Lin Sun}, title = {Insecurity of An Anonymous Authentication For Privacy-preserving IoT Target-driven Applications}, howpublished = {Cryptology ePrint Archive, Report 2013/795}, year = {2013}, url = {https://eprint.iacr.org/2013/795}, } @misc{cryptoeprint:2013:796, author = {Stefan Dziembowski and Sebastian Faust and Vladimir Kolmogorov and Krzysztof Pietrzak}, title = {Proofs of Space}, howpublished = {Cryptology ePrint Archive, Report 2013/796}, year = {2013}, url = {https://eprint.iacr.org/2013/796}, } @misc{cryptoeprint:2013:797, author = {Aggelos Kiayias and Yiannis Tselekounis}, title = {Tamper Resilient Circuits: The Adversary at the Gates}, howpublished = {Cryptology ePrint Archive, Report 2013/797}, year = {2013}, url = {https://eprint.iacr.org/2013/797}, } @misc{cryptoeprint:2013:798, author = {Rupeng Yang, Qiuliang Xu, Yongbin Zhou, Chengyu Hu, and Zuoxia Yu}, title = {A Generic Chosen-Ciphertext Key-Leakage Secure Public Key Encryption Scheme from Hash Proof System}, howpublished = {Cryptology ePrint Archive, Report 2013/798}, year = {2013}, url = {https://eprint.iacr.org/2013/798}, } @misc{cryptoeprint:2013:799, author = {Gilles Macario-Rat and Jérôme Plût and Henri Gilbert}, title = {New Insight into the Isomorphism of Polynomials problem IP1S and its Use in Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2013/799}, year = {2013}, url = {https://eprint.iacr.org/2013/799}, } @misc{cryptoeprint:2013:800, author = {Frank-M. Quedenfeld and Christopher Wolf}, title = {Algebraic Properties of the Cube Attack}, howpublished = {Cryptology ePrint Archive, Report 2013/800}, year = {2013}, url = {https://eprint.iacr.org/2013/800}, } @misc{cryptoeprint:2013:801, author = {Dario Catalano and Antonio Marcedone and Orazio Puglisi}, title = {Authenticating Computation on Groups: New Homomorphic Primitives and Applications}, howpublished = {Cryptology ePrint Archive, Report 2013/801}, year = {2013}, url = {https://eprint.iacr.org/2013/801}, } @misc{cryptoeprint:2013:802, author = {Guangjun Fan and Yongbin Zhou and Chengyu Hu and Dengguo Feng}, title = {Cryptosystems Resilient to Both Continual Key Leakages and Leakages from Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2013/802}, year = {2013}, url = {https://eprint.iacr.org/2013/802}, } @misc{cryptoeprint:2013:803, author = {Jie Chen and Hoeteck Wee}, title = {Fully, (Almost) Tightly Secure IBE from Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2013/803}, year = {2013}, url = {https://eprint.iacr.org/2013/803}, } @misc{cryptoeprint:2013:804, author = {Mohammad Saiful Islam Mamun and Atsuko Miyaji}, title = {Group Signature with relaxed-privacy and revocability for VANET}, howpublished = {Cryptology ePrint Archive, Report 2013/804}, year = {2013}, url = {https://eprint.iacr.org/2013/804}, } @misc{cryptoeprint:2013:805, author = {Giuseppe Ateniese and Ilario Bonacina and Antonio Faonio and Nicola Galesi}, title = {Proofs of Space: When Space is of the Essence}, howpublished = {Cryptology ePrint Archive, Report 2013/805}, year = {2013}, url = {https://eprint.iacr.org/2013/805}, } @misc{cryptoeprint:2013:806, author = {Somindu C. Ramanna and Palash Sarkar}, title = {Efficient (Anonymous) Compact HIBE From Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2013/806}, year = {2013}, url = {https://eprint.iacr.org/2013/806}, } @misc{cryptoeprint:2013:807, author = {Yitao Duan}, title = {Distributed Key Generation for Secure Encrypted Deduplication}, howpublished = {Cryptology ePrint Archive, Report 2013/807}, year = {2013}, url = {https://eprint.iacr.org/2013/807}, } @misc{cryptoeprint:2013:808, author = {Michael Backes and Aniket Kate and Sebastian Meiser and Tim Ruffing}, title = {Secrecy without Perfect Randomness: Cryptography with (Bounded) Weak Sources}, howpublished = {Cryptology ePrint Archive, Report 2013/808}, year = {2013}, url = {https://eprint.iacr.org/2013/808}, } @misc{cryptoeprint:2013:809, author = {Sarah Ibrahimi and Boris Skoric and Jan-Jaap Oosterwijk}, title = {Riding the Saddle Point: asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing}, howpublished = {Cryptology ePrint Archive, Report 2013/809}, year = {2013}, url = {https://eprint.iacr.org/2013/809}, } @misc{cryptoeprint:2013:810, author = {Pablo Rauzy and Sylvain Guilley}, title = {Formal Analysis of CRT-RSA Vigilant's Countermeasure Against the BellCoRe Attack}, howpublished = {Cryptology ePrint Archive, Report 2013/810}, year = {2013}, url = {https://eprint.iacr.org/2013/810}, } @misc{cryptoeprint:2013:811, author = {Susumu Kiyoshima and Yoshifumi Manabe and Tatsuaki Okamoto}, title = {Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol}, howpublished = {Cryptology ePrint Archive, Report 2013/811}, year = {2013}, url = {https://eprint.iacr.org/2013/811}, } @misc{cryptoeprint:2013:812, author = {Zhengjun Cao and Lihua Liu}, title = {A Note on Bilinear Groups of a Large Composite Order}, howpublished = {Cryptology ePrint Archive, Report 2013/812}, year = {2013}, url = {https://eprint.iacr.org/2013/812}, } @misc{cryptoeprint:2013:813, author = {Florian Bergsma and Benjamin Dowling and Florian Kohlar and Jörg Schwenk and Douglas Stebila}, title = {Multi-ciphersuite security of the Secure Shell (SSH) protocol}, howpublished = {Cryptology ePrint Archive, Report 2013/813}, year = {2013}, url = {https://eprint.iacr.org/2013/813}, } @misc{cryptoeprint:2013:814, author = {Lil Maria Rodriguez-Henriquez and Debrup Chakraborty}, title = {RDAS: A Symmetric Key Scheme for Authenticated Query Processing in Outsourced Databases}, howpublished = {Cryptology ePrint Archive, Report 2013/814}, year = {2013}, url = {https://eprint.iacr.org/2013/814}, } @misc{cryptoeprint:2013:815, author = {Eric Miles}, title = {Iterated group products and leakage resilience against NC^1}, howpublished = {Cryptology ePrint Archive, Report 2013/815}, year = {2013}, url = {https://eprint.iacr.org/2013/815}, } @misc{cryptoeprint:2013:816, author = {Shay Gueron and Vlad Krasnov}, title = {Fast Prime Field Elliptic Curve Cryptography with 256 Bit Primes}, howpublished = {Cryptology ePrint Archive, Report 2013/816}, year = {2013}, url = {https://eprint.iacr.org/2013/816}, } @misc{cryptoeprint:2013:817, author = {Yevgeniy Dodis and Dario Fiore}, title = {Interactive Encryption and Message Authentication}, howpublished = {Cryptology ePrint Archive, Report 2013/817}, year = {2013}, url = {https://eprint.iacr.org/2013/817}, } @misc{cryptoeprint:2013:818, author = {Roberto De Prisco and Alfredo De Santis}, title = {On the Relation of Random Grid, Probabilistic and Deterministic Visual Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2013/818}, year = {2013}, url = {https://eprint.iacr.org/2013/818}, } @misc{cryptoeprint:2013:819, author = {Sergiu Bursuc and Julian P. Murphy}, title = {Safe enclosures: towards cryptographic techniques for server protection}, howpublished = {Cryptology ePrint Archive, Report 2013/819}, year = {2013}, url = {https://eprint.iacr.org/2013/819}, } @misc{cryptoeprint:2013:820, author = {Mete Akg\"{u}n, M. Ufuk \c{C}a\v{g}layan}, title = {On the Security of Recently Proposed RFID Protocols}, howpublished = {Cryptology ePrint Archive, Report 2013/820}, year = {2013}, url = {https://eprint.iacr.org/2013/820}, } @misc{cryptoeprint:2013:821, author = {Olivier Blazy and Céline Chevalier and Léo Ducas and Jiaxin Pan}, title = {Exact Smooth Projective Hash Function based on LWE}, howpublished = {Cryptology ePrint Archive, Report 2013/821}, year = {2013}, url = {https://eprint.iacr.org/2013/821}, } @misc{cryptoeprint:2013:822, author = {Alexandra Berkoff and Feng-Hao Liu}, title = {Leakage Resilient Fully Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2013/822}, year = {2013}, url = {https://eprint.iacr.org/2013/822}, } @misc{cryptoeprint:2013:823, author = {Debrup Chakraborty and Vicente Hernandez-Jimenez and Palash Sarkar}, title = {Another Look at XCB}, howpublished = {Cryptology ePrint Archive, Report 2013/823}, year = {2013}, url = {https://eprint.iacr.org/2013/823}, } @misc{cryptoeprint:2013:824, author = {Gilad Asharov and Yehuda Lindell and Hila Zarosim}, title = {Fair and Efficient Secure Multiparty Computation with Reputation Systems}, howpublished = {Cryptology ePrint Archive, Report 2013/824}, year = {2013}, url = {https://eprint.iacr.org/2013/824}, } @misc{cryptoeprint:2013:825, author = {Alberto Peinado and Jorge Munilla and Amparo Fúster}, title = {EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen}, howpublished = {Cryptology ePrint Archive, Report 2013/825}, year = {2013}, url = {https://eprint.iacr.org/2013/825}, } @misc{cryptoeprint:2013:826, author = {Dan Bogdanov and Liina Kamm and Sven Laur and Pille Pruulmann-Vengerfeldt}, title = {Secure multi-party data analysis: end user validation and practical experiments}, howpublished = {Cryptology ePrint Archive, Report 2013/826}, year = {2013}, url = {https://eprint.iacr.org/2013/826}, } @misc{cryptoeprint:2013:827, author = {Shashank Agrawal and Prabhanjan Ananth and Vipul Goyal and Manoj Prabhakaran and Alon Rosen}, title = {Lower Bounds in the Hardware Token Model}, howpublished = {Cryptology ePrint Archive, Report 2013/827}, year = {2013}, url = {https://eprint.iacr.org/2013/827}, } @misc{cryptoeprint:2013:828, author = {Ali El Kaafarani and Essam Ghadafi and Dalia Khader}, title = {Decentralized Traceable Attribute-Based Signatures}, howpublished = {Cryptology ePrint Archive, Report 2013/828}, year = {2013}, url = {https://eprint.iacr.org/2013/828}, } @misc{cryptoeprint:2013:829, author = {Arthur Gervais and Ghassan Karame and Srdjan Capkun and Vedran Capkun}, title = {Is Bitcoin a Decentralized Currency?}, howpublished = {Cryptology ePrint Archive, Report 2013/829}, year = {2013}, url = {https://eprint.iacr.org/2013/829}, } @misc{cryptoeprint:2013:830, author = {Sanjit Chatterjee and M. Prem Laxman Das}, title = {Property Preserving Symmetric Encryption Revisited}, howpublished = {Cryptology ePrint Archive, Report 2013/830}, year = {2013}, url = {https://eprint.iacr.org/2013/830}, } @misc{cryptoeprint:2013:831, author = {Vikram Singh}, title = {Provable Security Proofs and their Interpretation in the Real World}, howpublished = {Cryptology ePrint Archive, Report 2013/831}, year = {2013}, url = {https://eprint.iacr.org/2013/831}, } @misc{cryptoeprint:2013:832, author = {Emil Stefanov and Charalampos Papamanthou and Elaine Shi}, title = {Practical Dynamic Searchable Encryption with Small Leakage}, howpublished = {Cryptology ePrint Archive, Report 2013/832}, year = {2013}, url = {https://eprint.iacr.org/2013/832}, } @misc{cryptoeprint:2013:833, author = {Fabrice Benhamouda and David Pointcheval}, title = {Verifier-Based Password-Authenticated Key Exchange: New Models and Constructions}, howpublished = {Cryptology ePrint Archive, Report 2013/833}, year = {2013}, url = {https://eprint.iacr.org/2013/833}, } @misc{cryptoeprint:2013:834, author = {Ahto Buldas and Andres Kroonmaa and Risto Laanoja}, title = {Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees}, howpublished = {Cryptology ePrint Archive, Report 2013/834}, year = {2013}, url = {https://eprint.iacr.org/2013/834}, } @misc{cryptoeprint:2013:835, author = {Thomas Shrimpton and R. Seth Terashima}, title = {A Modular Framework for Building Variable-Input Length Tweakable Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2013/835}, year = {2013}, url = {https://eprint.iacr.org/2013/835}, } @misc{cryptoeprint:2013:836, author = {Hao Wang and Lei Wu and Zhihua Zheng and Yilei Wang}, title = {Identity-Based Key-Encapsulation Mechanism from Multilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2013/836}, year = {2013}, url = {https://eprint.iacr.org/2013/836}, } @misc{cryptoeprint:2013:837, author = {Marcin Andrychowicz and Stefan Dziembowski and Daniel Malinowski and Łukasz Mazurek}, title = {Fair Two-Party Computations via Bitcoin Deposits}, howpublished = {Cryptology ePrint Archive, Report 2013/837}, year = {2013}, url = {https://eprint.iacr.org/2013/837}, } @misc{cryptoeprint:2013:838, author = {Shi Bai and Steven D. Galbraith}, title = {An improved compression technique for signatures based on learning with errors}, howpublished = {Cryptology ePrint Archive, Report 2013/838}, year = {2013}, url = {https://eprint.iacr.org/2013/838}, } @misc{cryptoeprint:2013:839, author = {Shi Bai and Steven D. Galbraith}, title = {Lattice Decoding Attacks on Binary LWE}, howpublished = {Cryptology ePrint Archive, Report 2013/839}, year = {2013}, url = {https://eprint.iacr.org/2013/839}, } @misc{cryptoeprint:2013:840, author = {Seung Geol Choi and Jonathan Katz and Dominique Schröder and Arkady Yerukhimovich and Hong Sheng Zhou}, title = {(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens}, howpublished = {Cryptology ePrint Archive, Report 2013/840}, year = {2013}, url = {https://eprint.iacr.org/2013/840}, } @misc{cryptoeprint:2013:841, author = {Johannes Braun, Florian Volk, Johannes Buchmann and Max Mühlhäuser}, title = {Trust Views for the Web PKI}, howpublished = {Cryptology ePrint Archive, Report 2013/841}, year = {2013}, url = {https://eprint.iacr.org/2013/841}, } @misc{cryptoeprint:2013:842, author = {Amir Moradi and Sylvain Guilley and Annelie Heuser}, title = {Detecting Hidden Leakages}, howpublished = {Cryptology ePrint Archive, Report 2013/842}, year = {2013}, url = {https://eprint.iacr.org/2013/842}, } @misc{cryptoeprint:2013:843, author = {Jian Ye and Chenglian Liu}, title = {A Study of Goldbach's conjecture and Polignac's conjecture equivalence issues}, howpublished = {Cryptology ePrint Archive, Report 2013/843}, year = {2013}, url = {https://eprint.iacr.org/2013/843}, } @misc{cryptoeprint:2013:844, author = {Dennis Hofheinz and Christoph Striecks}, title = {A generic view on trace-and-revoke broadcast encryption schemes}, howpublished = {Cryptology ePrint Archive, Report 2013/844}, year = {2013}, url = {https://eprint.iacr.org/2013/844}, } @misc{cryptoeprint:2013:845, author = {Aggelos Kiayias and Qiang Tang}, title = {How to Keep a Secret: Leakage Deterring Public-key Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2013/845}, year = {2013}, url = {https://eprint.iacr.org/2013/845}, } @misc{cryptoeprint:2013:846, author = {Abderrahmane Nitaj and Mohamed Ould Douh}, title = {A new attack on RSA with a composed decryption exponent}, howpublished = {Cryptology ePrint Archive, Report 2013/846}, year = {2013}, url = {https://eprint.iacr.org/2013/846}, } @misc{cryptoeprint:2013:847, author = {Umar Mujahid, M.Najam-ul-islam, Jameel Ahmed}, title = {Ultralightweight cryptography for passive RFID system}, howpublished = {Cryptology ePrint Archive, Report 2013/847}, year = {2013}, url = {https://eprint.iacr.org/2013/847}, } @misc{cryptoeprint:2013:848, author = {Xi-Jun Lin and Lin Sun}, title = {Weakness of Several Identity-based Tripartite Authenticated Key Agreement Protocols}, howpublished = {Cryptology ePrint Archive, Report 2013/848}, year = {2013}, url = {https://eprint.iacr.org/2013/848}, } @misc{cryptoeprint:2013:849, author = {Suvadeep Hajra and Debdeep Mukhopadhyay}, title = {Pushing the Limit of Non-Profiling DPA using Multivariate Leakage Model}, howpublished = {Cryptology ePrint Archive, Report 2013/849}, year = {2013}, url = {https://eprint.iacr.org/2013/849}, } @misc{cryptoeprint:2013:850, author = {Liina Kamm and Jan Willemson}, title = {Secure Floating-Point Arithmetic and Private Satellite Collision Analysis}, howpublished = {Cryptology ePrint Archive, Report 2013/850}, year = {2013}, url = {https://eprint.iacr.org/2013/850}, } @misc{cryptoeprint:2013:851, author = {Ulrich Rührmair and Xiaolin Xu and Jan Sölter and Ahmed Mahmoud and Farinaz Koushanfar and Wayne Burleson}, title = {Power and Timing Side Channels for PUFs and their Efficient Exploitation}, howpublished = {Cryptology ePrint Archive, Report 2013/851}, year = {2013}, url = {https://eprint.iacr.org/2013/851}, } @misc{cryptoeprint:2013:852, author = {Dongxia Bai and Hongbo Yu and Gaoli Wang and Xiaoyun Wang}, title = {Improved Boomerang Attacks on Round-Reduced SM3 and BLAKE-256}, howpublished = {Cryptology ePrint Archive, Report 2013/852}, year = {2013}, url = {https://eprint.iacr.org/2013/852}, } @misc{cryptoeprint:2013:853, author = {Alex Biryukov and Vesselin Velichkov}, title = {Automatic Search for Differential Trails in ARX Ciphers (Extended Version)}, howpublished = {Cryptology ePrint Archive, Report 2013/853}, year = {2013}, url = {https://eprint.iacr.org/2013/853}, } @misc{cryptoeprint:2013:854, author = {Pratik Sarkar}, title = {Multiple-Use Transferable E-Cash}, howpublished = {Cryptology ePrint Archive, Report 2013/854}, year = {2013}, url = {https://eprint.iacr.org/2013/854}, } @misc{cryptoeprint:2013:855, author = {Mete Akg\"{u}n, M. Ufuk \c{C}a\v{g}layan}, title = {Weaknesses in a Recently Proposed RFID Authentication Protocol}, howpublished = {Cryptology ePrint Archive, Report 2013/855}, year = {2013}, url = {https://eprint.iacr.org/2013/855}, } @misc{cryptoeprint:2013:856, author = {Michel Abdalla and Pierre-Alain Fouque and Vadim Lyubashevsky and Mehdi Tibouchi}, title = {Tightly-Secure Signatures From Lossy Identification Schemes}, howpublished = {Cryptology ePrint Archive, Report 2013/856}, year = {2013}, url = {https://eprint.iacr.org/2013/856}, } @misc{cryptoeprint:2013:857, author = {Daniel Genkin and Adi Shamir and Eran Tromer}, title = {RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2013/857}, year = {2013}, url = {https://eprint.iacr.org/2013/857}, } @misc{cryptoeprint:2013:858, author = {Sherman S.M. Chow and Matthew Franklin and Haibin Zhang}, title = {Practical Dual-Receiver Encryption---Soundness, Complete Non-Malleability, and Applications}, howpublished = {Cryptology ePrint Archive, Report 2013/858}, year = {2013}, url = {https://eprint.iacr.org/2013/858}, } @misc{cryptoeprint:2013:859, author = {Yanis Linge and Cecile Dumas and Sophie Lambert-Lacroix}, title = {Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2013/859}, year = {2013}, url = {https://eprint.iacr.org/2013/859}, } @misc{cryptoeprint:2013:860, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Daniel Wichs}, title = {On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input }, howpublished = {Cryptology ePrint Archive, Report 2013/860}, year = {2013}, url = {https://eprint.iacr.org/2013/860}, } @misc{cryptoeprint:2013:861, author = {Muhammad Rizwan Asghar}, title = {Privacy Preserving Enforcement of Sensitive Policies in Outsourced and Distributed Environments}, howpublished = {Cryptology ePrint Archive, Report 2013/861}, year = {2013}, url = {https://eprint.iacr.org/2013/861}, } @misc{cryptoeprint:2013:862, author = {Yael Tauman Kalai and Ran Raz and Ron D. Rothblum}, title = {How to Delegate Computations: The Power of No-Signaling Proofs}, howpublished = {Cryptology ePrint Archive, Report 2013/862}, year = {2013}, url = {https://eprint.iacr.org/2013/862}, } @misc{cryptoeprint:2013:863, author = {Stephan Neumann and Melanie Volkamer}, title = {Formal Treatment of Distributed Trust in Electronic Voting}, howpublished = {Cryptology ePrint Archive, Report 2013/863}, year = {2013}, url = {https://eprint.iacr.org/2013/863}, } @misc{cryptoeprint:2013:864, author = {Adam Smith and Ye Zhang}, title = {Near-linear time, Leakage-resilient Key Evolution Schemes from Expander Graphs}, howpublished = {Cryptology ePrint Archive, Report 2013/864}, year = {2013}, url = {https://eprint.iacr.org/2013/864}, } @misc{cryptoeprint:2013:865, author = {Suvadeep Hajra and Debdeep Mukhopadhyay}, title = {SNR to Success Rate: Reaching the Limit of Non-Profiling DPA}, howpublished = {Cryptology ePrint Archive, Report 2013/865}, year = {2013}, url = {https://eprint.iacr.org/2013/865}, } @misc{cryptoeprint:2013:866, author = {Sujoy Sinha Roy and Frederik Vercauteren and Nele Mentens and Donald Donglong Chen and Ingrid Verbauwhede}, title = {Compact Ring-LWE based Cryptoprocessor}, howpublished = {Cryptology ePrint Archive, Report 2013/866}, year = {2013}, url = {https://eprint.iacr.org/2013/866}, } @misc{cryptoeprint:2013:867, author = {Wenling Wu and Shuang Wu and Lei Zhang and Jian Zou and Le Dong}, title = {LHash: A Lightweight Hash Function (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2013/867}, year = {2013}, url = {https://eprint.iacr.org/2013/867}, } @misc{cryptoeprint:2013:868, author = {Lear Bahack}, title = {Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft)}, howpublished = {Cryptology ePrint Archive, Report 2013/868}, year = {2013}, url = {https://eprint.iacr.org/2013/868}, } @misc{cryptoeprint:2013:869, author = {Dimitar Jetchev and Krzysztof Pietrzak}, title = {How to Fake Auxiliary Input}, howpublished = {Cryptology ePrint Archive, Report 2013/869}, year = {2013}, url = {https://eprint.iacr.org/2013/869}, } @misc{cryptoeprint:2013:870, author = {Chunming Tang, Yanfeng Qi}, title = {A new class of hyper-bent functions and Kloosterman sums}, howpublished = {Cryptology ePrint Archive, Report 2013/870}, year = {2013}, url = {https://eprint.iacr.org/2013/870}, } @misc{cryptoeprint:2013:871, author = {Weiqiang Wen and Libin Wang and Jiaxin Pan}, title = {A Unified Security Model of Authenticated Key Exchange with Specific Adversarial Capabilities}, howpublished = {Cryptology ePrint Archive, Report 2013/871}, year = {2013}, url = {https://eprint.iacr.org/2013/871}, } @misc{cryptoeprint:2013:872, author = {}, title = {}, howpublished = {Cryptology ePrint Archive, Report 2013/872}, year = {2013}, url = {https://eprint.iacr.org/2013/872}, } @misc{cryptoeprint:2013:873, author = {Mihir Bellare and Igors Stepanovs and Stefano Tessaro}, title = {Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2013/873}, year = {2013}, url = {https://eprint.iacr.org/2013/873}, } @misc{cryptoeprint:2013:874, author = {Akinori Kawachi and Yoshio Okamoto and Keisuke Tanaka and Kenji Yasunaga}, title = {General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction}, howpublished = {Cryptology ePrint Archive, Report 2013/874}, year = {2013}, url = {https://eprint.iacr.org/2013/874}, } @misc{cryptoeprint:2013:875, author = {Michael Clear and Ciaran McGoldrick}, title = {Policy-Based Non-interactive Outsourcing of Computation using multikey FHE and CP-ABE}, howpublished = {Cryptology ePrint Archive, Report 2013/875}, year = {2013}, url = {https://eprint.iacr.org/2013/875}, } @misc{cryptoeprint:2013:876, author = {Kenji Yasunaga}, title = {Public-Key Encryption with Lazy Parties}, howpublished = {Cryptology ePrint Archive, Report 2013/876}, year = {2013}, url = {https://eprint.iacr.org/2013/876}, } @misc{cryptoeprint:2013:877, author = {Shaohua Tang, Jiahui Chen, Lingling Xu, Xiaoyu Li}, title = {MQ Signature and Proxy Signature Schemes with Exact Security Based on UOV Signature}, howpublished = {Cryptology ePrint Archive, Report 2013/877}, year = {2013}, url = {https://eprint.iacr.org/2013/877}, } @misc{cryptoeprint:2013:878, author = {Shaohua Tang and Bo Lv and Guomin Chen and Zhiniang Peng}, title = {Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs}, howpublished = {Cryptology ePrint Archive, Report 2013/878}, year = {2013}, url = {https://eprint.iacr.org/2013/878}, } @misc{cryptoeprint:2013:879, author = {Eli Ben-Sasson and Alessandro Chiesa and Eran Tromer and Madars Virza}, title = {Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture}, howpublished = {Cryptology ePrint Archive, Report 2013/879}, year = {2013}, url = {https://eprint.iacr.org/2013/879}, } @misc{cryptoeprint:2013:880, author = {Seunghwan Park and Kwangsu Lee and Dong Hoon Lee}, title = {New Constructions of Revocable Identity-Based Encryption from Multilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2013/880}, year = {2013}, url = {https://eprint.iacr.org/2013/880}, } @misc{cryptoeprint:2013:881, author = {Yonatan Sompolinsky and Aviv Zohar}, title = {Accelerating Bitcoin's Transaction Processing. Fast Money Grows on Trees, Not Chains}, howpublished = {Cryptology ePrint Archive, Report 2013/881}, year = {2013}, url = {https://eprint.iacr.org/2013/881}, } @misc{cryptoeprint:2013:882, author = {Zhe Liu and Johann Gro{\ss}sch{\"a}dl}, title = {New Speed Records for Montgomery Modular Multiplication on 8-bit AVR Microcontrollers}, howpublished = {Cryptology ePrint Archive, Report 2013/882}, year = {2013}, url = {https://eprint.iacr.org/2013/882}, } @misc{cryptoeprint:2014:001, author = {Yalin Chen and Jue-Sam Chou}, title = {Comments on: EIBAS - an efficient identity broadcast authentication scheme in wireless sensor networks}, howpublished = {Cryptology ePrint Archive, Report 2014/001}, year = {2014}, url = {https://eprint.iacr.org/2014/001}, } @misc{cryptoeprint:2014:002, author = {Kuan Cheng}, title = {Pseudorandom Generator Based on Hard Lattice Problem}, howpublished = {Cryptology ePrint Archive, Report 2014/002}, year = {2014}, url = {https://eprint.iacr.org/2014/002}, } @misc{cryptoeprint:2014:003, author = {Xi Xiong and Haining Fan}, title = {$GF(2^n)$ Bit-Parallel Squarer Using Generalized Polynomial Basis For a New Class of Irreducible Pentanomials}, howpublished = {Cryptology ePrint Archive, Report 2014/003}, year = {2014}, url = {https://eprint.iacr.org/2014/003}, } @misc{cryptoeprint:2014:004, author = {Igor Semaev}, title = {MaxMinMax problem and sparse equations over finite fields}, howpublished = {Cryptology ePrint Archive, Report 2014/004}, year = {2014}, url = {https://eprint.iacr.org/2014/004}, } @misc{cryptoeprint:2014:005, author = {Ghanei yakhdan.mostafa}, title = {The analysis of the Keccak with the new method called parity}, howpublished = {Cryptology ePrint Archive, Report 2014/005}, year = {2014}, url = {https://eprint.iacr.org/2014/005}, } @misc{cryptoeprint:2014:006, author = {Prastudy Fauzi and Helger Lipmaa and Bingsheng Zhang}, title = {Efficient Non-Interactive Zero Knowledge Arguments for Set Operations}, howpublished = {Cryptology ePrint Archive, Report 2014/006}, year = {2014}, url = {https://eprint.iacr.org/2014/006}, } @misc{cryptoeprint:2014:007, author = {Ethan Heilman }, title = {One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner.}, howpublished = {Cryptology ePrint Archive, Report 2014/007}, year = {2014}, url = {https://eprint.iacr.org/2014/007}, } @misc{cryptoeprint:2014:008, author = {Annelie Heuser and Olivier Rioul and Sylvain Guilley}, title = {A Theoretical Study of Kolmogorov-Smirnov Distinguishers, Side-Channel Analysis vs. Differential Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2014/008}, year = {2014}, url = {https://eprint.iacr.org/2014/008}, } @misc{cryptoeprint:2014:009, author = {Nilanjan Datta and Mridul Nandi}, title = {Characterization of EME with Linear Mixing}, howpublished = {Cryptology ePrint Archive, Report 2014/009}, year = {2014}, url = {https://eprint.iacr.org/2014/009}, } @misc{cryptoeprint:2014:010, author = {Ali Mahmoodi, Javad Mohajeri, Mahmoud Salmasizadeh}, title = {A Certificate-Based Proxy Signature with Message Recovery without Bilinear Pairing}, howpublished = {Cryptology ePrint Archive, Report 2014/010}, year = {2014}, url = {https://eprint.iacr.org/2014/010}, } @misc{cryptoeprint:2014:011, author = {S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Hamidreza Maimani and Einollah Pasha }, title = {Construction of New Families of ‎MDS‎ Diffusion Layers}, howpublished = {Cryptology ePrint Archive, Report 2014/011}, year = {2014}, url = {https://eprint.iacr.org/2014/011}, } @misc{cryptoeprint:2014:012, author = {Yanis Linge and Cecile Dumas and Sophie Lambert-Lacroix}, title = {Maximal Information Coefficient Analysis}, howpublished = {Cryptology ePrint Archive, Report 2014/012}, year = {2014}, url = {https://eprint.iacr.org/2014/012}, } @misc{cryptoeprint:2014:013, author = {Marcin Rogawski, Kris Gaj and Ekawat Homsirikamol}, title = {A Novel Modular Adder for One Thousand Bits and More Using Fast Carry Chains of Modern FPGAs}, howpublished = {Cryptology ePrint Archive, Report 2014/013}, year = {2014}, url = {https://eprint.iacr.org/2014/013}, } @misc{cryptoeprint:2014:014, author = {Felix Günther and Bertram Poettering}, title = {Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2014/014}, year = {2014}, url = {https://eprint.iacr.org/2014/014}, } @misc{cryptoeprint:2014:015, author = {Jooyoung Lee}, title = {Tight Security Bounds for Triple Encryption}, howpublished = {Cryptology ePrint Archive, Report 2014/015}, year = {2014}, url = {https://eprint.iacr.org/2014/015}, } @misc{cryptoeprint:2014:016, author = {Bart Mennink and Bart Preneel}, title = {Triple and Quadruple Encryption: Bridging the Gaps}, howpublished = {Cryptology ePrint Archive, Report 2014/016}, year = {2014}, url = {https://eprint.iacr.org/2014/016}, } @misc{cryptoeprint:2014:017, author = {Junghyun Nam and Kim-Kwang Raymond Choo and Juryon Paik and Dongho Won}, title = {Two-round password-only authenticated key exchange in the three-party setting}, howpublished = {Cryptology ePrint Archive, Report 2014/017}, year = {2014}, url = {https://eprint.iacr.org/2014/017}, } @misc{cryptoeprint:2014:018, author = {Yehuda Lindell and Eran Omri and Hila Zarosim}, title = {Completeness for Symmetric Two-Party Functionalities - Revisited}, howpublished = {Cryptology ePrint Archive, Report 2014/018}, year = {2014}, url = {https://eprint.iacr.org/2014/018}, } @misc{cryptoeprint:2014:019, author = {Martin R. Albrecht and Jean-Charles Faugère and Robert Fitzpatrick and Ludovic Perret}, title = {Lazy Modulus Switching for the BKW Algorithm on LWE}, howpublished = {Cryptology ePrint Archive, Report 2014/019}, year = {2014}, url = {https://eprint.iacr.org/2014/019}, } @misc{cryptoeprint:2014:020, author = {Markulf Kohlweiss and Ueli Maurer and Cristina Onete and Bjoern Tackmann and Daniele Venturi}, title = {(De-)Constructing TLS}, howpublished = {Cryptology ePrint Archive, Report 2014/020}, year = {2014}, url = {https://eprint.iacr.org/2014/020}, } @misc{cryptoeprint:2014:021, author = {Susan Hohenberger and Brent Waters}, title = {Online/Offline Attribute-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2014/021}, year = {2014}, url = {https://eprint.iacr.org/2014/021}, } @misc{cryptoeprint:2014:022, author = {Sourav Das}, title = {Ultra-lightweight 8-bit Multiplicative Inverse Based S-box Using LFSR}, howpublished = {Cryptology ePrint Archive, Report 2014/022}, year = {2014}, url = {https://eprint.iacr.org/2014/022}, } @misc{cryptoeprint:2014:023, author = {Gengran Hu and Yanbin Pan and Feng Zhang}, title = {Solving Random Subset Sum Problem by $l_{p}$-norm SVP Oracle}, howpublished = {Cryptology ePrint Archive, Report 2014/023}, year = {2014}, url = {https://eprint.iacr.org/2014/023}, } @misc{cryptoeprint:2014:024, author = {Ivan Damgård and Jesper Buus Nielsen}, title = {An Efficient Pseudo-Random Generator with Applications to Public-Key Encryption and Constant-Round Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2014/024}, year = {2014}, url = {https://eprint.iacr.org/2014/024}, } @misc{cryptoeprint:2014:025, author = {Amir Moradi}, title = {Side-Channel Leakage through Static Power – Should We Care about in Practice? –}, howpublished = {Cryptology ePrint Archive, Report 2014/025}, year = {2014}, url = {https://eprint.iacr.org/2014/025}, } @misc{cryptoeprint:2014:026, author = {Maël Berthier and Yves Bocktaels and Julien Bringer and Hervé Chabanne and Taoufik Chouta and Jean-Luc Danger and Mélanie Favre and Tarik Graba}, title = {Studying Potential Side Channel Leakages on an Embedded Biometric Comparison System}, howpublished = {Cryptology ePrint Archive, Report 2014/026}, year = {2014}, url = {https://eprint.iacr.org/2014/026}, } @misc{cryptoeprint:2014:027, author = {Mike Hamburg}, title = {Twisting Edwards curves with isogenies}, howpublished = {Cryptology ePrint Archive, Report 2014/027}, year = {2014}, url = {https://eprint.iacr.org/2014/027}, } @misc{cryptoeprint:2014:028, author = {Colin O'Flynn and Zhizhang (David) Chen}, title = {Channel Equalization for Side Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2014/028}, year = {2014}, url = {https://eprint.iacr.org/2014/028}, } @misc{cryptoeprint:2014:029, author = {Frederik Armknecht and Tommaso Gagliardoni and Stefan Katzenbeisser and Andreas Peter}, title = {General Impossibility of Group Homomorphic Encryption in the Quantum World}, howpublished = {Cryptology ePrint Archive, Report 2014/029}, year = {2014}, url = {https://eprint.iacr.org/2014/029}, } @misc{cryptoeprint:2014:030, author = {Leonardo C. Almeida and Ewerton R. Andrade and Paulo S. L. M. Barreto and Marcos A. Simplicio Jr.}, title = {Lyra: Password-Based Key Derivation with Tunable Memory and Processing Costs}, howpublished = {Cryptology ePrint Archive, Report 2014/030}, year = {2014}, url = {https://eprint.iacr.org/2014/030}, } @misc{cryptoeprint:2014:031, author = {Yongge Wang}, title = {On the Design of LIL Tests for (Pseudo) Random Generators and Some Experimental Results}, howpublished = {Cryptology ePrint Archive, Report 2014/031}, year = {2014}, url = {https://eprint.iacr.org/2014/031}, } @misc{cryptoeprint:2014:032, author = {Jean-Sébastien Coron and Tancrède Lepoint and Mehdi Tibouchi}, title = {Scale-Invariant Fully Homomorphic Encryption over the Integers}, howpublished = {Cryptology ePrint Archive, Report 2014/032}, year = {2014}, url = {https://eprint.iacr.org/2014/032}, } @misc{cryptoeprint:2014:033, author = {Adeline Langlois and San Ling and Khoa Nguyen and Huaxiong Wang}, title = {Lattice-based Group Signature Scheme with Veri er-local Revocation}, howpublished = {Cryptology ePrint Archive, Report 2014/033}, year = {2014}, url = {https://eprint.iacr.org/2014/033}, } @misc{cryptoeprint:2014:034, author = {Chase Manny}, title = {Authenticated Encryption with SPECK}, howpublished = {Cryptology ePrint Archive, Report 2014/034}, year = {2014}, url = {https://eprint.iacr.org/2014/034}, } @misc{cryptoeprint:2014:035, author = {Abderrahmane Nitaj and Mohamed Ould Douh}, title = {A new attack on RSA with a composed decryption exponent}, howpublished = {Cryptology ePrint Archive, Report 2014/035}, year = {2014}, url = {https://eprint.iacr.org/2014/035}, } @misc{cryptoeprint:2014:036, author = {Gary Belvin}, title = {A Secure Text Messaging Protocol}, howpublished = {Cryptology ePrint Archive, Report 2014/036}, year = {2014}, url = {https://eprint.iacr.org/2014/036}, } @misc{cryptoeprint:2014:037, author = {Yong Li and Sven Schäge and Zheng Yang and Florian Kohlar and Jörg Schwenk}, title = {On the Security of the Pre-Shared Key Ciphersuites of TLS}, howpublished = {Cryptology ePrint Archive, Report 2014/037}, year = {2014}, url = {https://eprint.iacr.org/2014/037}, } @misc{cryptoeprint:2014:038, author = {Ralf Kuesters and Enrico Scapin and Tomasz Truderung and Juergen Graf}, title = {Extending and Applying a Framework for the Cryptographic Verification of Java Programs.}, howpublished = {Cryptology ePrint Archive, Report 2014/038}, year = {2014}, url = {https://eprint.iacr.org/2014/038}, } @misc{cryptoeprint:2014:039, author = {Yarkin Doroz and Yin Hu and Berk Sunar}, title = {Homomorphic AES Evaluation using NTRU}, howpublished = {Cryptology ePrint Archive, Report 2014/039}, year = {2014}, url = {https://eprint.iacr.org/2014/039}, } @misc{cryptoeprint:2014:040, author = {Zhengjun Cao and Ruizhong Wei and Xiaodong Lin}, title = {A Fast Modular Reduction Method}, howpublished = {Cryptology ePrint Archive, Report 2014/040}, year = {2014}, url = {https://eprint.iacr.org/2014/040}, } @misc{cryptoeprint:2014:041, author = {Adi Ben-Zvi and Arkadius Kalka and Boaz Tsaban}, title = {Cryptanalysis via algebraic spans}, howpublished = {Cryptology ePrint Archive, Report 2014/041}, year = {2014}, url = {https://eprint.iacr.org/2014/041}, } @misc{cryptoeprint:2014:042, author = {Jintai Ding, Chengdong Tao }, title = {A New Algorithm for Solving the General Approximate Common Divisors Problem and Cryptanalysis of the FHE Based on the GACD problem}, howpublished = {Cryptology ePrint Archive, Report 2014/042}, year = {2014}, url = {https://eprint.iacr.org/2014/042}, } @misc{cryptoeprint:2014:043, author = {Mehdi Tibouchi}, title = {Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings}, howpublished = {Cryptology ePrint Archive, Report 2014/043}, year = {2014}, url = {https://eprint.iacr.org/2014/043}, } @misc{cryptoeprint:2014:044, author = {Lichun Li and Michael Militzer and Anwitaman Datta}, title = {rPIR: Ramp Secret Sharing based Communication Efficient Private Information Retrieval}, howpublished = {Cryptology ePrint Archive, Report 2014/044}, year = {2014}, url = {https://eprint.iacr.org/2014/044}, } @misc{cryptoeprint:2014:045, author = {Mohsen Alimomeni and Reihaneh Safavi-Naini}, title = {Human Assisted Randomness Generation Using Video Games}, howpublished = {Cryptology ePrint Archive, Report 2014/045}, year = {2014}, url = {https://eprint.iacr.org/2014/045}, } @misc{cryptoeprint:2014:046, author = {Yalin Chen1 and Jue-Sam Chou*2}, title = {Crypto-analyses on “user efficient recoverable off-line e-cashs scheme with fast anonymity revoking”}, howpublished = {Cryptology ePrint Archive, Report 2014/046}, year = {2014}, url = {https://eprint.iacr.org/2014/046}, } @misc{cryptoeprint:2014:047, author = {Vivien Dubois}, title = {Down the Rabbit Hole: Revisiting the Shrinking Method}, howpublished = {Cryptology ePrint Archive, Report 2014/047}, year = {2014}, url = {https://eprint.iacr.org/2014/047}, } @misc{cryptoeprint:2014:048, author = {Longjiang Qu and Shaojing Fu and Qingping Dai and Chao Li}, title = {When a Boolean Function can be Expressed as the Sum of two Bent Functions}, howpublished = {Cryptology ePrint Archive, Report 2014/048}, year = {2014}, url = {https://eprint.iacr.org/2014/048}, } @misc{cryptoeprint:2014:049, author = {Neha tirthani and Ganesan}, title = {Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2014/049}, year = {2014}, url = {https://eprint.iacr.org/2014/049}, } @misc{cryptoeprint:2014:050, author = {Daniel R. L. Brown}, title = {Some Theoretical Conditions for Menezes--Qu--Vanstone Key Agreement to Provide Implicit Key Authentication}, howpublished = {Cryptology ePrint Archive, Report 2014/050}, year = {2014}, url = {https://eprint.iacr.org/2014/050}, } @misc{cryptoeprint:2014:051, author = {Elena Dubrova}, title = {An Equivalence-Preserving Transformation of Shift Registers}, howpublished = {Cryptology ePrint Archive, Report 2014/051}, year = {2014}, url = {https://eprint.iacr.org/2014/051}, } @misc{cryptoeprint:2014:052, author = {Li Xi}, title = {DAA-related APIs in TPM2.0 Revisited}, howpublished = {Cryptology ePrint Archive, Report 2014/052}, year = {2014}, url = {https://eprint.iacr.org/2014/052}, } @misc{cryptoeprint:2014:053, author = {Sonia Belaïd, and Vincent Grosso and François-Xavier Standaert}, title = {Masking and Leakage-Resilient Primitives: One, the Other(s) or Both?}, howpublished = {Cryptology ePrint Archive, Report 2014/053}, year = {2014}, url = {https://eprint.iacr.org/2014/053}, } @misc{cryptoeprint:2014:054, author = {Sugata Gangopadhyay and Pantelimon Stanica}, title = {The Fourier Entropy-Influence conjecture holds for a log-density 1 class of cryptographic Boolean functions}, howpublished = {Cryptology ePrint Archive, Report 2014/054}, year = {2014}, url = {https://eprint.iacr.org/2014/054}, } @misc{cryptoeprint:2014:055, author = {Younsung Choi}, title = {Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics}, howpublished = {Cryptology ePrint Archive, Report 2014/055}, year = {2014}, url = {https://eprint.iacr.org/2014/055}, } @misc{cryptoeprint:2014:056, author = {Sareh Emami and San Ling and Ivica Nikolic and Josef Pieprzyk and Huaxiong Wang}, title = {Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128}, howpublished = {Cryptology ePrint Archive, Report 2014/056}, year = {2014}, url = {https://eprint.iacr.org/2014/056}, } @misc{cryptoeprint:2014:057, author = {Gora Adj and Alfred Menezes and Thomaz Oliveira and Francisco Rodríguez-Henríquez}, title = {Computing Discrete Logarithms in F_{3^{6*137}} and F_{3^{6*163}} using Magma}, howpublished = {Cryptology ePrint Archive, Report 2014/057}, year = {2014}, url = {https://eprint.iacr.org/2014/057}, } @misc{cryptoeprint:2014:058, author = {Itai Dinur and Jérémy Jean}, title = {Cryptanalysis of FIDES}, howpublished = {Cryptology ePrint Archive, Report 2014/058}, year = {2014}, url = {https://eprint.iacr.org/2014/058}, } @misc{cryptoeprint:2014:059, author = {John Tromp}, title = {Cuckoo Cycle: a memory bound graph-theoretic proof-of-work}, howpublished = {Cryptology ePrint Archive, Report 2014/059}, year = {2014}, url = {https://eprint.iacr.org/2014/059}, } @misc{cryptoeprint:2014:060, author = {Peeter Laud and Alisa Pankova}, title = {Verifiable Computation in Multiparty Protocols with Honest Majority}, howpublished = {Cryptology ePrint Archive, Report 2014/060}, year = {2014}, url = {https://eprint.iacr.org/2014/060}, } @misc{cryptoeprint:2014:061, author = {Stefano Tessaro and David A. Wilson}, title = {Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts}, howpublished = {Cryptology ePrint Archive, Report 2014/061}, year = {2014}, url = {https://eprint.iacr.org/2014/061}, } @misc{cryptoeprint:2014:062, author = {Tancrède Lepoint and Michael Naehrig}, title = {A Comparison of the Homomorphic Encryption Schemes FV and YASHE}, howpublished = {Cryptology ePrint Archive, Report 2014/062}, year = {2014}, url = {https://eprint.iacr.org/2014/062}, } @misc{cryptoeprint:2014:063, author = {Yalin Chen and Jue-Sam Chou*}, title = {Cryptanalysis on “Secure untraceable off-line electronic cash system”}, howpublished = {Cryptology ePrint Archive, Report 2014/063}, year = {2014}, url = {https://eprint.iacr.org/2014/063}, } @misc{cryptoeprint:2014:064, author = {Alain Couvreur and Irene Márquez-Corbella and Ruud Pellikaan}, title = {A Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2014/064}, year = {2014}, url = {https://eprint.iacr.org/2014/064}, } @misc{cryptoeprint:2014:065, author = {Palash Sarkar and Shashank Singh}, title = {Fine Tuning the Function Field Sieve Algorithm for the Medium Prime Case}, howpublished = {Cryptology ePrint Archive, Report 2014/065}, year = {2014}, url = {https://eprint.iacr.org/2014/065}, } @misc{cryptoeprint:2014:066, author = {Hassan Jameel Asghar, Yvo Desmedt, Josef Pieprzyk, and Ron Steinfeld}, title = {A Subexponential Construction of Graph Coloring for Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2014/066}, year = {2014}, url = {https://eprint.iacr.org/2014/066}, } @misc{cryptoeprint:2014:067, author = {Julien Bringer and Hervé Chabanne and Roch Lescuyer and Alain Patey}, title = {Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents}, howpublished = {Cryptology ePrint Archive, Report 2014/067}, year = {2014}, url = {https://eprint.iacr.org/2014/067}, } @misc{cryptoeprint:2014:068, author = {Franca Marinelli and Riccardo Aragona and Chiara Marcolla and Massimiliano Sala}, title = {Some security bounds for the DGHV scheme}, howpublished = {Cryptology ePrint Archive, Report 2014/068}, year = {2014}, url = {https://eprint.iacr.org/2014/068}, } @misc{cryptoeprint:2014:069, author = {Manoj Ranjan Mishra, Jayaprakash Kar and Banshidhar Majhi}, title = {One-Pass Authenticated Key Establishment Protocol on Bilinear Pairings for Wireless Sensor Networks}, howpublished = {Cryptology ePrint Archive, Report 2014/069}, year = {2014}, url = {https://eprint.iacr.org/2014/069}, } @misc{cryptoeprint:2014:070, author = {Chris Peikert}, title = {Lattice Cryptography for the Internet}, howpublished = {Cryptology ePrint Archive, Report 2014/070}, year = {2014}, url = {https://eprint.iacr.org/2014/070}, } @misc{cryptoeprint:2014:071, author = {Zhaohui Cheng}, title = {Implementing Pairing-Based Cryptosystems in USB Tokens}, howpublished = {Cryptology ePrint Archive, Report 2014/071}, year = {2014}, url = {https://eprint.iacr.org/2014/071}, } @misc{cryptoeprint:2014:072, author = {Nikolaos P. Karvelas and Andreas Peter and Stefan Katzenbeisser and Sebastian Biedermann}, title = {Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM}, howpublished = {Cryptology ePrint Archive, Report 2014/072}, year = {2014}, url = {https://eprint.iacr.org/2014/072}, } @misc{cryptoeprint:2014:073, author = {Joel Alwen and Martin Hirt and Ueli Maurer and Arpita Patra and Pavel Raykov}, title = {Anonymous Authentication with Shared Secrets}, howpublished = {Cryptology ePrint Archive, Report 2014/073}, year = {2014}, url = {https://eprint.iacr.org/2014/073}, } @misc{cryptoeprint:2014:074, author = {Abhishek Banerjee and Chris Peikert}, title = {New and Improved Key-Homomorphic Pseudorandom Functions}, howpublished = {Cryptology ePrint Archive, Report 2014/074}, year = {2014}, url = {https://eprint.iacr.org/2014/074}, } @misc{cryptoeprint:2014:075, author = {Carsten Baum and Ivan Damgård and Claudio Orlandi}, title = {Publicly Auditable Secure Multi-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2014/075}, year = {2014}, url = {https://eprint.iacr.org/2014/075}, } @misc{cryptoeprint:2014:076, author = {Giuseppe Ateniese and Antonio Faonio and Bernardo Magri and Breno de Medeiros}, title = {Certified Bitcoins}, howpublished = {Cryptology ePrint Archive, Report 2014/076}, year = {2014}, url = {https://eprint.iacr.org/2014/076}, } @misc{cryptoeprint:2014:077, author = {Joseph Bonneau and Arvind Narayanan and Andrew Miller and Jeremy Clark and Joshua A. Kroll and Edward W. Felten}, title = {Mixcoin: Anonymity for Bitcoin with accountable mixes}, howpublished = {Cryptology ePrint Archive, Report 2014/077}, year = {2014}, url = {https://eprint.iacr.org/2014/077}, } @misc{cryptoeprint:2014:078, author = {Ahmad Boorghany and Rasool Jalili}, title = {Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers}, howpublished = {Cryptology ePrint Archive, Report 2014/078}, year = {2014}, url = {https://eprint.iacr.org/2014/078}, } @misc{cryptoeprint:2014:079, author = {Alexandre Duc and Stefan Dziembowski and Sebastian Faust}, title = {Unifying Leakage Models: from Probing Attacks to Noisy Leakage}, howpublished = {Cryptology ePrint Archive, Report 2014/079}, year = {2014}, url = {https://eprint.iacr.org/2014/079}, } @misc{cryptoeprint:2014:080, author = {Daniel Kraschewski and Hemanta K. Maji and Manoj Prabhakaran and Amit Sahai}, title = {A Full Characterization of Completeness for Two-party Randomized Function Evaluation}, howpublished = {Cryptology ePrint Archive, Report 2014/080}, year = {2014}, url = {https://eprint.iacr.org/2014/080}, } @misc{cryptoeprint:2014:081, author = {Sanjam Garg and Divya Gupta}, title = {Efficient Round Optimal Blind Signatures}, howpublished = {Cryptology ePrint Archive, Report 2014/081}, year = {2014}, url = {https://eprint.iacr.org/2014/081}, } @misc{cryptoeprint:2014:082, author = {Craig Gentry and Shai Halevi and Mariana Raykova and Daniel Wichs}, title = {Garbled RAM Revisited, Part I}, howpublished = {Cryptology ePrint Archive, Report 2014/082}, year = {2014}, url = {https://eprint.iacr.org/2014/082}, } @misc{cryptoeprint:2014:083, author = {Steve Lu and Rafail Ostrovsky}, title = {Garbled RAM Revisited, Part II}, howpublished = {Cryptology ePrint Archive, Report 2014/083}, year = {2014}, url = {https://eprint.iacr.org/2014/083}, } @misc{cryptoeprint:2014:084, author = {Wentao Zhang and Zhenzhen Bao and Dongdai Lin and Vincent Rijmen and Bohan Yang and Ingrid Verbauwhede }, title = {RECTANGLE: A Bit-slice Lightweight Block Cipher Suitable for Multiple Platforms}, howpublished = {Cryptology ePrint Archive, Report 2014/084}, year = {2014}, url = {https://eprint.iacr.org/2014/084}, } @misc{cryptoeprint:2014:085, author = {Aleksandra Mileva}, title = {Multipermutations in Crypto World: Different Faces of the Perfect Diffusion Layer}, howpublished = {Cryptology ePrint Archive, Report 2014/085}, year = {2014}, url = {https://eprint.iacr.org/2014/085}, } @misc{cryptoeprint:2014:086, author = {Wei Jiang, Dan Lin, Feng Li, Elisa Bertino}, title = {Randomized and Efficient Authentication in Mobile Environments}, howpublished = {Cryptology ePrint Archive, Report 2014/086}, year = {2014}, url = {https://eprint.iacr.org/2014/086}, } @misc{cryptoeprint:2014:087, author = {Michael Backes and Aniket Kate and Praveen Manoharan and Sebastian Meiser and Esfandiar Mohammadi}, title = {AnoA: A Framework For Analyzing Anonymous Communication Protocols}, howpublished = {Cryptology ePrint Archive, Report 2014/087}, year = {2014}, url = {https://eprint.iacr.org/2014/087}, } @misc{cryptoeprint:2014:088, author = {Himanshu Tyagi and Shun Watanabe}, title = {A Bound For Multiparty Secret Key Agreement And Implications For A Problem Of Secure Computing}, howpublished = {Cryptology ePrint Archive, Report 2014/088}, year = {2014}, url = {https://eprint.iacr.org/2014/088}, } @misc{cryptoeprint:2014:089, author = {Anne Canteaut and Thomas Fuhr and Henri Gilbert and María Naya-Plasencia and Jean-René Reinhard}, title = {Multiple Di fferential Cryptanalysis of Round-Reduced PRINCE (Full version)}, howpublished = {Cryptology ePrint Archive, Report 2014/089}, year = {2014}, url = {https://eprint.iacr.org/2014/089}, } @misc{cryptoeprint:2014:090, author = {Virginie Lallemand and María Naya-Plasencia}, title = {Cryptanalysis of KLEIN (Full version)}, howpublished = {Cryptology ePrint Archive, Report 2014/090}, year = {2014}, url = {https://eprint.iacr.org/2014/090}, } @misc{cryptoeprint:2014:091, author = {S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad}, title = {On Cryptographic Applications of Matrices Acting on Finite Commutative Groups and Rings}, howpublished = {Cryptology ePrint Archive, Report 2014/091}, year = {2014}, url = {https://eprint.iacr.org/2014/091}, } @misc{cryptoeprint:2014:092, author = {Masao KASAHARA}, title = {A new class of system oriented PKC, K(I)SOPKC.}, howpublished = {Cryptology ePrint Archive, Report 2014/092}, year = {2014}, url = {https://eprint.iacr.org/2014/092}, } @misc{cryptoeprint:2014:093, author = {Manuel Barbosa and Pooya Farshim}, title = {The Related-Key Analysis of Feistel Constructions}, howpublished = {Cryptology ePrint Archive, Report 2014/093}, year = {2014}, url = {https://eprint.iacr.org/2014/093}, } @misc{cryptoeprint:2014:094, author = {Jacob Alperin-Sheriff and Chris Peikert}, title = {Faster Bootstrapping with Polynomial Error}, howpublished = {Cryptology ePrint Archive, Report 2014/094}, year = {2014}, url = {https://eprint.iacr.org/2014/094}, } @misc{cryptoeprint:2014:095, author = {Masayuki Abe and Jens Groth and Miyako Ohkubo and Mehdi Tibouchi}, title = {Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures}, howpublished = {Cryptology ePrint Archive, Report 2014/095}, year = {2014}, url = {https://eprint.iacr.org/2014/095}, } @misc{cryptoeprint:2014:096, author = {Yuanxi Dai, John Steinberger}, title = {Tight security bounds for multiple encryption}, howpublished = {Cryptology ePrint Archive, Report 2014/096}, year = {2014}, url = {https://eprint.iacr.org/2014/096}, } @misc{cryptoeprint:2014:097, author = {Koji Nuida}, title = {Candidate Constructions of Fully Homomorphic Encryption on Finite Simple Groups without Ciphertext Noise}, howpublished = {Cryptology ePrint Archive, Report 2014/097}, year = {2014}, url = {https://eprint.iacr.org/2014/097}, } @misc{cryptoeprint:2014:098, author = {Gilad Asharov}, title = {Towards Characterizing Complete Fairness in Secure Two-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2014/098}, year = {2014}, url = {https://eprint.iacr.org/2014/098}, } @misc{cryptoeprint:2014:099, author = {Christina Brzuska and Pooya Farshim and Arno Mittelbach}, title = {Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources}, howpublished = {Cryptology ePrint Archive, Report 2014/099}, year = {2014}, url = {https://eprint.iacr.org/2014/099}, } @misc{cryptoeprint:2014:1000, author = {Gilad Asharov and Amos Beimel and Nikolaos Makriyannis and Eran Omri}, title = {Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions}, howpublished = {Cryptology ePrint Archive, Report 2014/1000}, year = {2014}, url = {https://eprint.iacr.org/2014/1000}, } @misc{cryptoeprint:2014:1001, author = {Xiaopeng Yang, Wenping Ma, and Chengli Zhang}, title = {Robustly Secure Two-Party Authenticated Key Exchange from Ring-LWE}, howpublished = {Cryptology ePrint Archive, Report 2014/1001}, year = {2014}, url = {https://eprint.iacr.org/2014/1001}, } @misc{cryptoeprint:2014:1002, author = {Bhanu Prakash Gopularam and Sashank Dara and Nalini N}, title = {Experiments in Encrypted and Searchable Network Audit Logs }, howpublished = {Cryptology ePrint Archive, Report 2014/1002}, year = {2014}, url = {https://eprint.iacr.org/2014/1002}, } @misc{cryptoeprint:2014:1003, author = {Christian Forler and David McGrew and Stefan Lucks and Jakob Wenzel}, title = {COFFE: Ciphertext Output Feedback Faithful Encryption}, howpublished = {Cryptology ePrint Archive, Report 2014/1003}, year = {2014}, url = {https://eprint.iacr.org/2014/1003}, } @misc{cryptoeprint:2014:1004, author = {Marcela S. Melara and Aaron Blankstein and Joseph Bonneau and Edward W. Felten and Michael J. Freedman}, title = {CONIKS: Bringing Key Transparency to End Users}, howpublished = {Cryptology ePrint Archive, Report 2014/1004}, year = {2014}, url = {https://eprint.iacr.org/2014/1004}, } @misc{cryptoeprint:2014:1005, author = {Harsh Patel}, title = {A pure block chain based decentralized exchange.}, howpublished = {Cryptology ePrint Archive, Report 2014/1005}, year = {2014}, url = {https://eprint.iacr.org/2014/1005}, } @misc{cryptoeprint:2014:1006, author = {Jaime Gaspar and Eerke Boiten}, title = {Simple composition theorems of one-way functions -- proofs and presentations}, howpublished = {Cryptology ePrint Archive, Report 2014/1006}, year = {2014}, url = {https://eprint.iacr.org/2014/1006}, } @misc{cryptoeprint:2014:1007, author = {Jiangxiao Zhang and Yanwu Gao and Chunhui Feng and Hua Guo and Zhoujun Li}, title = {Fair Multiple-bank E-cash in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2014/1007}, year = {2014}, url = {https://eprint.iacr.org/2014/1007}, } @misc{cryptoeprint:2014:1008, author = {Oscar Garcia-Morchon and Ronald Rietman and Sahil Sharma and Ludo Tolhuizen and Jose Luis Torre-Arce}, title = {DTLS-HIMMO: Efficiently Securing a Post-Quantum World with a Fully-Collusion Resistant KPS}, howpublished = {Cryptology ePrint Archive, Report 2014/1008}, year = {2014}, url = {https://eprint.iacr.org/2014/1008}, } @misc{cryptoeprint:2014:1009, author = {Christopher D. Nguyen and Dhananjay S. Phatak and Steven D. Houston and Alan T. Sherman}, title = {A Preliminary FPGA Implementation and Analysis of Phatak’s Quotient-First Scaling Algorithm in the Reduced-Precision Residue Number System}, howpublished = {Cryptology ePrint Archive, Report 2014/1009}, year = {2014}, url = {https://eprint.iacr.org/2014/1009}, } @misc{cryptoeprint:2014:100, author = {Guo-Qiang Liu and Chen-Hui Jin and Chuan-Da Qi}, title = {Improved Slender-set Linear Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2014/100}, year = {2014}, url = {https://eprint.iacr.org/2014/100}, } @misc{cryptoeprint:2014:1010, author = {Mohsen Toorani}, title = {On Continuous After-the-Fact Leakage-Resilient Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2014/1010}, year = {2014}, url = {https://eprint.iacr.org/2014/1010}, } @misc{cryptoeprint:2014:1011, author = {Alex Biryukov and Ivan Pustogarov}, title = {Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay}, howpublished = {Cryptology ePrint Archive, Report 2014/1011}, year = {2014}, url = {https://eprint.iacr.org/2014/1011}, } @misc{cryptoeprint:2014:1012, author = {Yonglin Hao}, title = {The Boomerang Attacks on BLAKE and BLAKE2}, howpublished = {Cryptology ePrint Archive, Report 2014/1012}, year = {2014}, url = {https://eprint.iacr.org/2014/1012}, } @misc{cryptoeprint:2014:1013, author = {Björn Fay}, title = {Computational Independence}, howpublished = {Cryptology ePrint Archive, Report 2014/1013}, year = {2014}, url = {https://eprint.iacr.org/2014/1013}, } @misc{cryptoeprint:2014:1014, author = {Björn Fay}, title = {Double-and-Add with Relative Jacobian Coordinates}, howpublished = {Cryptology ePrint Archive, Report 2014/1014}, year = {2014}, url = {https://eprint.iacr.org/2014/1014}, } @misc{cryptoeprint:2014:1015, author = {Mahabir Prasad Jhanwar and Reihaneh Safavi-Naini}, title = {Compact Accumulator using Lattices}, howpublished = {Cryptology ePrint Archive, Report 2014/1015}, year = {2014}, url = {https://eprint.iacr.org/2014/1015}, } @misc{cryptoeprint:2014:1016, author = {GAURAV BANSOD, NISHCHAL RAVAL, NARAYAN PISHAROTY, ABHIJIT PATIL}, title = {Modified SIMON and SPECK: Lightweight Hybrid Design for Embedded Security}, howpublished = {Cryptology ePrint Archive, Report 2014/1016}, year = {2014}, url = {https://eprint.iacr.org/2014/1016}, } @misc{cryptoeprint:2014:1017, author = {Foteini Baldimtsi and Olga Ohrimenko}, title = {Sorting and Searching Behind the Curtain: Private Outsourced Sort and Frequency-Based Ranking of Search Results Over Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2014/1017}, year = {2014}, url = {https://eprint.iacr.org/2014/1017}, } @misc{cryptoeprint:2014:1018, author = {Martin R. Albrecht and Carlos Cid and Jean-Charles Faugère and Ludovic Perret}, title = {Algebraic Algorithms for LWE}, howpublished = {Cryptology ePrint Archive, Report 2014/1018}, year = {2014}, url = {https://eprint.iacr.org/2014/1018}, } @misc{cryptoeprint:2014:1019, author = {Xiaoming Tang and Weidong Qiu and Zheng Gong and Zheng Huang and Jie Guo}, title = {Related-Key Differential Cryptanalysis of Reduced-Round ITUBee}, howpublished = {Cryptology ePrint Archive, Report 2014/1019}, year = {2014}, url = {https://eprint.iacr.org/2014/1019}, } @misc{cryptoeprint:2014:101, author = {Enrique Larraia and Emmanuela Orsini and Nigel P. Smart}, title = {Dishonest Majority Multi-Party Computation for Binary Circuits}, howpublished = {Cryptology ePrint Archive, Report 2014/101}, year = {2014}, url = {https://eprint.iacr.org/2014/101}, } @misc{cryptoeprint:2014:1020, author = {Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Zakaria Najm}, title = {Side-Channel Leakage and Trace Compression using Normalized Inter-Class Variance}, howpublished = {Cryptology ePrint Archive, Report 2014/1020}, year = {2014}, url = {https://eprint.iacr.org/2014/1020}, } @misc{cryptoeprint:2014:1021, author = {Olivier Blazy and Saqib A. Kakvi and Eike Kiltz and Jiaxin Pan}, title = {Tightly-Secure Signatures from Chameleon Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2014/1021}, year = {2014}, url = {https://eprint.iacr.org/2014/1021}, } @misc{cryptoeprint:2014:1022, author = {Tal Moran and Ilan Orlov and Silas Richelson}, title = {Topology-Hiding Computation}, howpublished = {Cryptology ePrint Archive, Report 2014/1022}, year = {2014}, url = {https://eprint.iacr.org/2014/1022}, } @misc{cryptoeprint:2014:1023, author = {Nathan E. Price and Alan T. Sherman}, title = {How to Generate Repeatable Keys Using Physical Unclonable Functions Correcting PUF Errors with Iteratively Broadening and Prioritized Search}, howpublished = {Cryptology ePrint Archive, Report 2014/1023}, year = {2014}, url = {https://eprint.iacr.org/2014/1023}, } @misc{cryptoeprint:2014:1024, author = {Pierre-Alain Fouque and Moon Sung Lee and Tancrède Lepoint and Mehdi Tibouchi}, title = {Cryptanalysis of the Co-ACD Assumption}, howpublished = {Cryptology ePrint Archive, Report 2014/1024}, year = {2014}, url = {https://eprint.iacr.org/2014/1024}, } @misc{cryptoeprint:2014:1025, author = {Carlos Aguilar-Melchor and Joris Barrier and Laurent Fousse and Marc-Olivier Killijian}, title = {XPIR: Private Information Retrieval for Everyone}, howpublished = {Cryptology ePrint Archive, Report 2014/1025}, year = {2014}, url = {https://eprint.iacr.org/2014/1025}, } @misc{cryptoeprint:2014:1026, author = {H. W. Lenstra, Jr. and A. Silverberg}, title = {Lattices with Symmetry}, howpublished = {Cryptology ePrint Archive, Report 2014/1026}, year = {2014}, url = {https://eprint.iacr.org/2014/1026}, } @misc{cryptoeprint:2014:1027, author = {Vadim Lyubashevsky and Daniel Wichs}, title = {Simple Lattice Trapdoor Sampling from a Broad Class of Distributions}, howpublished = {Cryptology ePrint Archive, Report 2014/1027}, year = {2014}, url = {https://eprint.iacr.org/2014/1027}, } @misc{cryptoeprint:2014:1028, author = {Payal Chaudhari and Manik Lal Das and Anish Mathuria}, title = {Security Weaknesses of an "Anonymous Attribute Based Encryption" appeared in ASIACCS'13}, howpublished = {Cryptology ePrint Archive, Report 2014/1028}, year = {2014}, url = {https://eprint.iacr.org/2014/1028}, } @misc{cryptoeprint:2014:1029, author = {Nir Bitansky and Omer Paneth and Alon Rosen}, title = {On the Cryptographic Hardness of Finding a Nash Equilibrium}, howpublished = {Cryptology ePrint Archive, Report 2014/1029}, year = {2014}, url = {https://eprint.iacr.org/2014/1029}, } @misc{cryptoeprint:2014:102, author = {Payman Mohassel and Saeed Sadeghian and Nigel P. Smart}, title = {Actively Secure Private Function Evaluation}, howpublished = {Cryptology ePrint Archive, Report 2014/102}, year = {2014}, url = {https://eprint.iacr.org/2014/102}, } @misc{cryptoeprint:2014:103, author = {Xiali Hei and Binheng Song}, title = {SHipher: Families of Block Ciphers based on SubSet-Sum Problem}, howpublished = {Cryptology ePrint Archive, Report 2014/103}, year = {2014}, url = {https://eprint.iacr.org/2014/103}, } @misc{cryptoeprint:2014:104, author = {Kévin Atighehchi}, title = {Space-efficient, byte-wise incremental and perfectly private encryption schemes}, howpublished = {Cryptology ePrint Archive, Report 2014/104}, year = {2014}, url = {https://eprint.iacr.org/2014/104}, } @misc{cryptoeprint:2014:105, author = {Ashish Choudhury and Arpita Patra and Nigel P. Smart}, title = {Reducing the Overhead of MPC over a Large Population}, howpublished = {Cryptology ePrint Archive, Report 2014/105}, year = {2014}, url = {https://eprint.iacr.org/2014/105}, } @misc{cryptoeprint:2014:106, author = {Shai Halevi and Victor Shoup}, title = {Algorithms in HElib}, howpublished = {Cryptology ePrint Archive, Report 2014/106}, year = {2014}, url = {https://eprint.iacr.org/2014/106}, } @misc{cryptoeprint:2014:107, author = {Joel Alwen and Martin Hirt and Ueli Maurer and Arpita Patra and Pavel Raykov}, title = {Key-Indistinguishable Message Authentication Codes}, howpublished = {Cryptology ePrint Archive, Report 2014/107}, year = {2014}, url = {https://eprint.iacr.org/2014/107}, } @misc{cryptoeprint:2014:108, author = {Jooyoung Lee and Martijn Stam}, title = {MJH: A Faster Alternative to MDC-2}, howpublished = {Cryptology ePrint Archive, Report 2014/108}, year = {2014}, url = {https://eprint.iacr.org/2014/108}, } @misc{cryptoeprint:2014:109, author = {Mitsuru Shiozaki, Ryohei Hori and Takeshi Fujino}, title = {Diffusion Programmable Device : The device to prevent reverse engineering}, howpublished = {Cryptology ePrint Archive, Report 2014/109}, year = {2014}, url = {https://eprint.iacr.org/2014/109}, } @misc{cryptoeprint:2014:110, author = {Sourav Das}, title = {Halka: A Lightweight, Software Friendly Block Cipher Using Ultra-lightweight 8-bit S-box}, howpublished = {Cryptology ePrint Archive, Report 2014/110}, year = {2014}, url = {https://eprint.iacr.org/2014/110}, } @misc{cryptoeprint:2014:111, author = {Gordon Procter}, title = {A Note on the CLRW2 Tweakable Block Cipher Construction}, howpublished = {Cryptology ePrint Archive, Report 2014/111}, year = {2014}, url = {https://eprint.iacr.org/2014/111}, } @misc{cryptoeprint:2014:112, author = {Alain Couvreur and Ayoub Otmani and Jean-Pierre Tillich}, title = {Polynomial Time Attack on Wild McEliece Over Quadratic Extensions}, howpublished = {Cryptology ePrint Archive, Report 2014/112}, year = {2014}, url = {https://eprint.iacr.org/2014/112}, } @misc{cryptoeprint:2014:113, author = {James Kelley and Roberto Tamassia}, title = {Secure Compression: Theory \& Practice}, howpublished = {Cryptology ePrint Archive, Report 2014/113}, year = {2014}, url = {https://eprint.iacr.org/2014/113}, } @misc{cryptoeprint:2014:114, author = {Sebastien Gambs and Cristina Onete and Jean-Marc Robert}, title = {Prover Anonymous and Deniable Distance-Bounding Authentication}, howpublished = {Cryptology ePrint Archive, Report 2014/114}, year = {2014}, url = {https://eprint.iacr.org/2014/114}, } @misc{cryptoeprint:2014:115, author = {Jia-Lun Tsai}, title = {Comments on a novel user authentication and key agreement scheme}, howpublished = {Cryptology ePrint Archive, Report 2014/115}, year = {2014}, url = {https://eprint.iacr.org/2014/115}, } @misc{cryptoeprint:2014:116, author = {Ronald Cramer and Carles Padr{\'o} and Chaoping Xing}, title = {Optimal Algebraic Manipulation Detection Codes in the Constant-Error Model}, howpublished = {Cryptology ePrint Archive, Report 2014/116}, year = {2014}, url = {https://eprint.iacr.org/2014/116}, } @misc{cryptoeprint:2014:117, author = {Bjoern Grohmann}, title = {An Applicable Public-Key-Cryptosystem Based on NP-Complete Problems}, howpublished = {Cryptology ePrint Archive, Report 2014/117}, year = {2014}, url = {https://eprint.iacr.org/2014/117}, } @misc{cryptoeprint:2014:118, author = {Dominique Unruh}, title = {Quantum position verification in the random oracle model}, howpublished = {Cryptology ePrint Archive, Report 2014/118}, year = {2014}, url = {https://eprint.iacr.org/2014/118}, } @misc{cryptoeprint:2014:119, author = {Robert Granger and Thorsten Kleinjung and Jens Zumbr\"agel}, title = {Breaking `128-bit Secure' Supersingular Binary Curves (or how to solve discrete logarithms in ${\mathbb F}_{2^{4 \cdot 1223}}$ and ${\mathbb F}_{2^{12 \cdot 367}}$)}, howpublished = {Cryptology ePrint Archive, Report 2014/119}, year = {2014}, url = {https://eprint.iacr.org/2014/119}, } @misc{cryptoeprint:2014:120, author = {Weijin Wang, Yu Qin, Dengguo Feng, Xiaobo Chu}, title = {Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model (full version)}, howpublished = {Cryptology ePrint Archive, Report 2014/120}, year = {2014}, url = {https://eprint.iacr.org/2014/120}, } @misc{cryptoeprint:2014:121, author = {Koki Hamada and Dai Ikarashi and Koji Chida and Katsumi Takahashi}, title = {Oblivious Radix Sort: An Efficient Sorting Algorithm for Practical Secure Multi-party Computation}, howpublished = {Cryptology ePrint Archive, Report 2014/121}, year = {2014}, url = {https://eprint.iacr.org/2014/121}, } @misc{cryptoeprint:2014:122, author = {WANGYong}, title = {New Way to Construct Cryptographic Hash Function}, howpublished = {Cryptology ePrint Archive, Report 2014/122}, year = {2014}, url = {https://eprint.iacr.org/2014/122}, } @misc{cryptoeprint:2014:123, author = {Mohammad Sadeq Dousti and Rasool Jalili}, title = {FORSAKES: A Forward-Secure Authenticated Key Exchange Protocol Based on Symmetric Key-Evolving Schemes}, howpublished = {Cryptology ePrint Archive, Report 2014/123}, year = {2014}, url = {https://eprint.iacr.org/2014/123}, } @misc{cryptoeprint:2014:124, author = {Oriol Farràs and Torben Brandt Hansen and Tarik Kaced and Carles Padró}, title = {On the Information Ratio of Non-Perfect Secret Sharing Schemes}, howpublished = {Cryptology ePrint Archive, Report 2014/124}, year = {2014}, url = {https://eprint.iacr.org/2014/124}, } @misc{cryptoeprint:2014:125, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, title = {Removing Erasures with Explainable Hash Proof Systems}, howpublished = {Cryptology ePrint Archive, Report 2014/125}, year = {2014}, url = {https://eprint.iacr.org/2014/125}, } @misc{cryptoeprint:2014:126, author = {Hui Cui \and Yi Mu \and Man Ho Au}, title = {Public-Key Encryption Resilient Against Linear Related-Key Attacks Revisited}, howpublished = {Cryptology ePrint Archive, Report 2014/126}, year = {2014}, url = {https://eprint.iacr.org/2014/126}, } @misc{cryptoeprint:2014:127, author = {S. M. Dehnavi and Alireza Rahimipour}, title = {Algebraic Properties of Modular Addition Modulo a Power of Two}, howpublished = {Cryptology ePrint Archive, Report 2014/127}, year = {2014}, url = {https://eprint.iacr.org/2014/127}, } @misc{cryptoeprint:2014:128, author = {Seung Geol Choi and Jonathan Katz and Alex J. Malozemoff and Vassilis Zikas}, title = {Efficient Three-Party Computation from Cut-and-Choose}, howpublished = {Cryptology ePrint Archive, Report 2014/128}, year = {2014}, url = {https://eprint.iacr.org/2014/128}, } @misc{cryptoeprint:2014:129, author = {Iddo Bentov and Ranjit Kumaresan}, title = {How to Use Bitcoin to Design Fair Protocols}, howpublished = {Cryptology ePrint Archive, Report 2014/129}, year = {2014}, url = {https://eprint.iacr.org/2014/129}, } @misc{cryptoeprint:2014:130, author = {Joppe W. Bos and Craig Costello and Patrick Longa and Michael Naehrig}, title = {Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis}, howpublished = {Cryptology ePrint Archive, Report 2014/130}, year = {2014}, url = {https://eprint.iacr.org/2014/130}, } @misc{cryptoeprint:2014:131, author = {Janaka Alawatugoda and Douglas Stebila and Colin Boyd}, title = {Modelling After-the-fact Leakage for Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2014/131}, year = {2014}, url = {https://eprint.iacr.org/2014/131}, } @misc{cryptoeprint:2014:132, author = {Kwangsu Lee and Dong Hoon Lee and Jong Hwan Park}, title = {Efficient Revocable Identity-Based Encryption via Subset Difference Methods}, howpublished = {Cryptology ePrint Archive, Report 2014/132}, year = {2014}, url = {https://eprint.iacr.org/2014/132}, } @misc{cryptoeprint:2014:133, author = {Yihua Zhang and Marina Blanton}, title = {Efficient Secure and Verifiable Outsourcing of Matrix Multiplications}, howpublished = {Cryptology ePrint Archive, Report 2014/133}, year = {2014}, url = {https://eprint.iacr.org/2014/133}, } @misc{cryptoeprint:2014:134, author = {Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange and Peter Schwabe}, title = {Kummer strikes back: new DH speed records}, howpublished = {Cryptology ePrint Archive, Report 2014/134}, year = {2014}, url = {https://eprint.iacr.org/2014/134}, } @misc{cryptoeprint:2014:135, author = {Ding Wang, Debiao He, Ping Wang, Chao-Hsien Chu}, title = {Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment}, howpublished = {Cryptology ePrint Archive, Report 2014/135}, year = {2014}, url = {https://eprint.iacr.org/2014/135}, } @misc{cryptoeprint:2014:136, author = {Ramya Jayaram Masti and Devendra Rai and Claudio Marforio and Srdjan Capkun}, title = {Isolated Execution on Many-core Architectures}, howpublished = {Cryptology ePrint Archive, Report 2014/136}, year = {2014}, url = {https://eprint.iacr.org/2014/136}, } @misc{cryptoeprint:2014:137, author = {Marcel Keller and Peter Scholl}, title = {Efficient, Oblivious Data Structures for MPC}, howpublished = {Cryptology ePrint Archive, Report 2014/137}, year = {2014}, url = {https://eprint.iacr.org/2014/137}, } @misc{cryptoeprint:2014:138, author = {Jae Hong Seo}, title = {Short Signatures from Diffie-Hellman, Revisited: Sublinear Public Key, CMA Security, and Tighter Reduction}, howpublished = {Cryptology ePrint Archive, Report 2014/138}, year = {2014}, url = {https://eprint.iacr.org/2014/138}, } @misc{cryptoeprint:2014:139, author = {Assaf Shomer}, title = {On the Phase Space of Block-Hiding Strategies}, howpublished = {Cryptology ePrint Archive, Report 2014/139}, year = {2014}, url = {https://eprint.iacr.org/2014/139}, } @misc{cryptoeprint:2014:140, author = {Yuval Yarom and Naomi Benger}, title = {Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack}, howpublished = {Cryptology ePrint Archive, Report 2014/140}, year = {2014}, url = {https://eprint.iacr.org/2014/140}, } @misc{cryptoeprint:2014:141, author = {Hao Wang}, title = {Unrestricted Identity-Based Aggregate Signcryption in the Standard Model from Multilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2014/141}, year = {2014}, url = {https://eprint.iacr.org/2014/141}, } @misc{cryptoeprint:2014:142, author = {Karim M. Abdellatif, R. Chotin-Avot, and H. Mehrez}, title = {FPGA-Based High Performance AES-GCM Using Efficient Karatsuba Ofman Algorithm }, howpublished = {Cryptology ePrint Archive, Report 2014/142}, year = {2014}, url = {https://eprint.iacr.org/2014/142}, } @misc{cryptoeprint:2014:143, author = {Claudio Orlandi and Rafail Ostrovsky and Vanishree Rao and Amit Sahai and Ivan Visconti}, title = {Statistical Concurrent Non-Malleable Zero Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2014/143}, year = {2014}, url = {https://eprint.iacr.org/2014/143}, } @misc{cryptoeprint:2014:144, author = {Elena Andreeva and Andrey Bogdanov and Atul Luykx and Bart Mennink and Nicky Mouha and Kan Yasuda}, title = {How to Securely Release Unverified Plaintext in Authenticated Encryption}, howpublished = {Cryptology ePrint Archive, Report 2014/144}, year = {2014}, url = {https://eprint.iacr.org/2014/144}, } @misc{cryptoeprint:2014:145, author = {Prasanna Raghaw Mishra}, title = {Calculating Cryptographic Degree of an S-Box}, howpublished = {Cryptology ePrint Archive, Report 2014/145}, year = {2014}, url = {https://eprint.iacr.org/2014/145}, } @misc{cryptoeprint:2014:146, author = {Geraldo A. Barbosa and Jeroen van de Graaf}, title = {Untappable communication channels over optical fibers from quantum-optical noise}, howpublished = {Cryptology ePrint Archive, Report 2014/146}, year = {2014}, url = {https://eprint.iacr.org/2014/146}, } @misc{cryptoeprint:2014:147, author = {Razvan Barbulescu and Cécile Pierrot}, title = {The Multiple Number Field Sieve for Medium and High Characteristic > Finite Fields}, howpublished = {Cryptology ePrint Archive, Report 2014/147}, year = {2014}, url = {https://eprint.iacr.org/2014/147}, } @misc{cryptoeprint:2014:148, author = {Craig Gentry and Shai Halevi and Mariana Raykova and Daniel Wichs}, title = {Outsourcing Private RAM Computation}, howpublished = {Cryptology ePrint Archive, Report 2014/148}, year = {2014}, url = {https://eprint.iacr.org/2014/148}, } @misc{cryptoeprint:2014:149, author = {Mahdi Zamani and Mahnush Movahedi and Jared Saia}, title = {Millions of Millionaires: Multiparty Computation in Large Networks}, howpublished = {Cryptology ePrint Archive, Report 2014/149}, year = {2014}, url = {https://eprint.iacr.org/2014/149}, } @misc{cryptoeprint:2014:150, author = {Nikolaos Karapanos and Srdjan Capkun}, title = {On the Effective Prevention of TLS Man-In-The-Middle Attacks in Web Applications}, howpublished = {Cryptology ePrint Archive, Report 2014/150}, year = {2014}, url = {https://eprint.iacr.org/2014/150}, } @misc{cryptoeprint:2014:151, author = {Rodolphe Lampe and Yannick Seurin}, title = {Security Analysis of Key-Alternating Feistel Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2014/151}, year = {2014}, url = {https://eprint.iacr.org/2014/151}, } @misc{cryptoeprint:2014:152, author = {Yunsi Fei and A. Adam Ding and Jian Lao and Liwei Zhang}, title = {A Statistics-based Fundamental Model for Side-channel Attack Analysis}, howpublished = {Cryptology ePrint Archive, Report 2014/152}, year = {2014}, url = {https://eprint.iacr.org/2014/152}, } @misc{cryptoeprint:2014:153, author = {Daniel Apon and Jonathan Katz and Elaine Shi and Aishwarya Thiruvengadam}, title = {Verifiable Oblivious Storage}, howpublished = {Cryptology ePrint Archive, Report 2014/153}, year = {2014}, url = {https://eprint.iacr.org/2014/153}, } @misc{cryptoeprint:2014:154, author = {Daniel Apon and Xiong Fan and Jonathan Katz and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou}, title = {Non-Interactive Cryptography in the RAM Model of Computation}, howpublished = {Cryptology ePrint Archive, Report 2014/154}, year = {2014}, url = {https://eprint.iacr.org/2014/154}, } @misc{cryptoeprint:2014:155, author = {Ari Juels and Thomas Ristenpart}, title = {Honey Encryption: Security Beyond the Brute-Force Bound}, howpublished = {Cryptology ePrint Archive, Report 2014/155}, year = {2014}, url = {https://eprint.iacr.org/2014/155}, } @misc{cryptoeprint:2014:156, author = {Yanqing Yao and Zhoujun Li}, title = {Non-Malleable Extractors with Shorter Seeds and Their Applications}, howpublished = {Cryptology ePrint Archive, Report 2014/156}, year = {2014}, url = {https://eprint.iacr.org/2014/156}, } @misc{cryptoeprint:2014:157, author = {Tetsu Iwata and Kazuhiko Minematsu and Jian Guo and Sumio Morioka}, title = {CLOC: Authenticated Encryption for Short Input}, howpublished = {Cryptology ePrint Archive, Report 2014/157}, year = {2014}, url = {https://eprint.iacr.org/2014/157}, } @misc{cryptoeprint:2014:158, author = {Elisa Gorla and Maike Massierer}, title = {Point compression for the trace zero subgroup over a small degree extension field}, howpublished = {Cryptology ePrint Archive, Report 2014/158}, year = {2014}, url = {https://eprint.iacr.org/2014/158}, } @misc{cryptoeprint:2014:159, author = {Zuoxia Yu and Qiuliang Xu and Yongbin Zhou and Chengyu Hu and Rupeng Yang and Guangjun Fan}, title = {Weak-Key Leakage Resilient Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2014/159}, year = {2014}, url = {https://eprint.iacr.org/2014/159}, } @misc{cryptoeprint:2014:160, author = {Ahmed E. Kosba and Dimitrios Papadopoulos and Charalampos Papamanthou and Mahmoud F. Sayed and Elaine Shi and Nikos Triandopoulos}, title = {TrueSet: Faster Veri fiable Set Computations}, howpublished = {Cryptology ePrint Archive, Report 2014/160}, year = {2014}, url = {https://eprint.iacr.org/2014/160}, } @misc{cryptoeprint:2014:161, author = {Naomi Benger and Joop van de Pol and Nigel P. Smart and Yuval Yarom}, title = {``Ooh Aah... Just a Little Bit'' : A small amount of side channel can go a long way}, howpublished = {Cryptology ePrint Archive, Report 2014/161}, year = {2014}, url = {https://eprint.iacr.org/2014/161}, } @misc{cryptoeprint:2014:162, author = {Hu Xiong}, title = {TOWARD CERTIFICATELESS SIGNCRYPTION SCHEME WITHOUT RANDOM ORACLES}, howpublished = {Cryptology ePrint Archive, Report 2014/162}, year = {2014}, url = {https://eprint.iacr.org/2014/162}, } @misc{cryptoeprint:2014:163, author = {Arnaud Dambra and Philippe Gaborit and Mylène Roussellet and Julien Schrek and Nicolas Tafforeau}, title = {Improved Secure Implementation of Code-Based Signature Schemes on Embedded Devices}, howpublished = {Cryptology ePrint Archive, Report 2014/163}, year = {2014}, url = {https://eprint.iacr.org/2014/163}, } @misc{cryptoeprint:2014:164, author = {Yuriy Tarannikov }, title = {Generalized proper matrices and constructing of $m$-resilient Boolean functions with maximal nonlinearity for expanded range of parameters}, howpublished = {Cryptology ePrint Archive, Report 2014/164}, year = {2014}, url = {https://eprint.iacr.org/2014/164}, } @misc{cryptoeprint:2014:165, author = {Kirti Chawla and Om Pal Yadav}, title = {A NEW SCALAR POINT MULTIPLICATION SCHEME IN ECC BASED ON ZECKENDORF REPRESENTATION AND MULTIBASE CONCEPT}, howpublished = {Cryptology ePrint Archive, Report 2014/165}, year = {2014}, url = {https://eprint.iacr.org/2014/165}, } @misc{cryptoeprint:2014:166, author = {Jan-Jaap Oosterwijk, Jeroen Doumen, Thijs Laarhoven}, title = {Tuple decoders for traitor tracing schemes}, howpublished = {Cryptology ePrint Archive, Report 2014/166}, year = {2014}, url = {https://eprint.iacr.org/2014/166}, } @misc{cryptoeprint:2014:167, author = {Yevgeniy Dodis and Adi Shamir and Noah Stephens-Davidowitz and Daniel Wichs}, title = {How to Eat Your Entropy and Have it Too -- Optimal Recovery Strategies for Compromised RNGs}, howpublished = {Cryptology ePrint Archive, Report 2014/167}, year = {2014}, url = {https://eprint.iacr.org/2014/167}, } @misc{cryptoeprint:2014:168, author = {Scott Coull and Kevin Dyer}, title = {Privacy Failures in Encrypted Messaging Services: Apple iMessage and Beyond}, howpublished = {Cryptology ePrint Archive, Report 2014/168}, year = {2014}, url = {https://eprint.iacr.org/2014/168}, } @misc{cryptoeprint:2014:169, author = {Abdul Hamid M. Ragab, Osama S. Farag Alla, Amin Y. Noaman}, title = {Encryption Quality Analysis of the RCBC Block Cipher Compared with RC6 and RC5 Algorithms }, howpublished = {Cryptology ePrint Archive, Report 2014/169}, year = {2014}, url = {https://eprint.iacr.org/2014/169}, } @misc{cryptoeprint:2014:170, author = {Shay Gueron}, title = {Parallelized hashing via j-lanes and j-pointers tree modes, with applications to SHA-256}, howpublished = {Cryptology ePrint Archive, Report 2014/170}, year = {2014}, url = {https://eprint.iacr.org/2014/170}, } @misc{cryptoeprint:2014:171, author = {T.D.B Weerasinghe}, title = {An Effective RC4 Stream Cipher}, howpublished = {Cryptology ePrint Archive, Report 2014/171}, year = {2014}, url = {https://eprint.iacr.org/2014/171}, } @misc{cryptoeprint:2014:172, author = {Jeroen Delvaux}, title = {A novel PUF Scheme}, howpublished = {Cryptology ePrint Archive, Report 2014/172}, year = {2014}, url = {https://eprint.iacr.org/2014/172}, } @misc{cryptoeprint:2014:173, author = {Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi}, title = {Continuous Non-malleable Codes}, howpublished = {Cryptology ePrint Archive, Report 2014/173}, year = {2014}, url = {https://eprint.iacr.org/2014/173}, } @misc{cryptoeprint:2014:174, author = {T.D.B Weerasinghe}, title = {Analysis of a Modified RC4 Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2014/174}, year = {2014}, url = {https://eprint.iacr.org/2014/174}, } @misc{cryptoeprint:2014:175, author = {T.D.B Weerasinghe}, title = {Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2014/175}, year = {2014}, url = {https://eprint.iacr.org/2014/175}, } @misc{cryptoeprint:2014:176, author = {Qihua Niu, Hongda Li, Bei Liang, Fei Tang}, title = {One-Round Witness Indistinguishability from Indistinguishability Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2014/176}, year = {2014}, url = {https://eprint.iacr.org/2014/176}, } @misc{cryptoeprint:2014:177, author = {Valentina Banciu and Elisabeth Oswald}, title = {Pragmatism vs. Elegance: comparing two approaches to Simple Power Attacks on AES}, howpublished = {Cryptology ePrint Archive, Report 2014/177}, year = {2014}, url = {https://eprint.iacr.org/2014/177}, } @misc{cryptoeprint:2014:178, author = {Qingji Zheng and Shouhuai Xu}, title = {Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2014/178}, year = {2014}, url = {https://eprint.iacr.org/2014/178}, } @misc{cryptoeprint:2014:179, author = {Maura B. Paterson and Douglas R. Stinson}, title = {Optimal constructions for ID-based one-way-function key predistribution schemes realizing specified communication graphs}, howpublished = {Cryptology ePrint Archive, Report 2014/179}, year = {2014}, url = {https://eprint.iacr.org/2014/179}, } @misc{cryptoeprint:2014:180, author = {T.D.B Weerasinghe}, title = {Improving throughput of RC4 algorithm using multithreading techniques in multicore processors}, howpublished = {Cryptology ePrint Archive, Report 2014/180}, year = {2014}, url = {https://eprint.iacr.org/2014/180}, } @misc{cryptoeprint:2014:181, author = {Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, and Noboru Kunihiro}, title = {A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2014/181}, year = {2014}, url = {https://eprint.iacr.org/2014/181}, } @misc{cryptoeprint:2014:182, author = {Karthikeyan Bhargavan and Cédric Fournet and Markulf Kohlweiss and Alfredo Pironti and Pierre-Yves Strub and Santiago Zanella-Béguelin}, title = {Proving the TLS Handshake Secure (as it is)}, howpublished = {Cryptology ePrint Archive, Report 2014/182}, year = {2014}, url = {https://eprint.iacr.org/2014/182}, } @misc{cryptoeprint:2014:183, author = {Tetsu Iwata and Lei Wang}, title = {Impact of ANSI X9.24-1:2009 Key Check Value on ISO/IEC 9797-1:2011 MACs}, howpublished = {Cryptology ePrint Archive, Report 2014/183}, year = {2014}, url = {https://eprint.iacr.org/2014/183}, } @misc{cryptoeprint:2014:184, author = {Ruxandra F. Olimid}, title = {SETUP in Secret Sharing Schemes using Random Values}, howpublished = {Cryptology ePrint Archive, Report 2014/184}, year = {2014}, url = {https://eprint.iacr.org/2014/184}, } @misc{cryptoeprint:2014:185, author = {Xiao Shaun Wang and Kartik Nayak and Chang Liu and T-H. Hubert Chan and Elaine Shi and Emil Stefanov and Yan Huang}, title = {Oblivious Data Structures}, howpublished = {Cryptology ePrint Archive, Report 2014/185}, year = {2014}, url = {https://eprint.iacr.org/2014/185}, } @misc{cryptoeprint:2014:186, author = {Andrey Bogdanov and Martin M. Lauridsen and Elmar Tischhauser}, title = {AES-Based Authenticated Encryption Modes in Parallel High-Performance Software}, howpublished = {Cryptology ePrint Archive, Report 2014/186}, year = {2014}, url = {https://eprint.iacr.org/2014/186}, } @misc{cryptoeprint:2014:187, author = {Yosuke Todo}, title = {FFT-Based Key Recovery for the Integral Attack}, howpublished = {Cryptology ePrint Archive, Report 2014/187}, year = {2014}, url = {https://eprint.iacr.org/2014/187}, } @misc{cryptoeprint:2014:188, author = {Özgür Dagdelen and Daniele Venturi}, title = {A Second Look at Fischlin's Transformation}, howpublished = {Cryptology ePrint Archive, Report 2014/188}, year = {2014}, url = {https://eprint.iacr.org/2014/188}, } @misc{cryptoeprint:2014:189, author = {Jaydeep Howlader, Sanjit Kumar Roy, Ashis Kumar Mal}, title = {Practical Receipt-Free Sealed-Bid Auction in the Coercive Environment}, howpublished = {Cryptology ePrint Archive, Report 2014/189}, year = {2014}, url = {https://eprint.iacr.org/2014/189}, } @misc{cryptoeprint:2014:190, author = {Michael Hutter and Jörn-Marc Schmidt}, title = {The Temperature Side Channel and Heating Fault Attacks}, howpublished = {Cryptology ePrint Archive, Report 2014/190}, year = {2014}, url = {https://eprint.iacr.org/2014/190}, } @misc{cryptoeprint:2014:191, author = {Benoit Feix and Mylène Roussellet and Alexandre Venelli}, title = {Side-Channel Analysis on Blinded Regular Scalar Multiplications}, howpublished = {Cryptology ePrint Archive, Report 2014/191}, year = {2014}, url = {https://eprint.iacr.org/2014/191}, } @misc{cryptoeprint:2014:192, author = {Abdoul Aziz Ciss}, title = {Two-sources Randomness Extractors for Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2014/192}, year = {2014}, url = {https://eprint.iacr.org/2014/192}, } @misc{cryptoeprint:2014:193, author = {Javad Alizadeh, Mohammad Reza Aref and Nasour Bagheri}, title = {JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH}, howpublished = {Cryptology ePrint Archive, Report 2014/193}, year = {2014}, url = {https://eprint.iacr.org/2014/193}, } @misc{cryptoeprint:2014:194, author = {Sai Raghu Talluri and Swapnoneel Roy}, title = {Cryptanalysis and Security Enhancement of Two Advanced Authentication Protocols}, howpublished = {Cryptology ePrint Archive, Report 2014/194}, year = {2014}, url = {https://eprint.iacr.org/2014/194}, } @misc{cryptoeprint:2014:195, author = {Dan Boneh and Brent Waters and Mark Zhandry}, title = {Low Overhead Broadcast Encryption from Multilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2014/195}, year = {2014}, url = {https://eprint.iacr.org/2014/195}, } @misc{cryptoeprint:2014:196, author = {Benlcouiri Younes and Azizi Abdelmalek and Moulay Chrif Ismaili}, title = {Crypto-Multimedia}, howpublished = {Cryptology ePrint Archive, Report 2014/196}, year = {2014}, url = {https://eprint.iacr.org/2014/196}, } @misc{cryptoeprint:2014:197, author = {Jian Guo and Jérémy Jean and Thomas Peyrin and Wang Lei}, title = {Breaking POET Authentication with a Single Query}, howpublished = {Cryptology ePrint Archive, Report 2014/197}, year = {2014}, url = {https://eprint.iacr.org/2014/197}, } @misc{cryptoeprint:2014:198, author = {Eric M. Mahé and Jean-Marie Chauvet}, title = {Fast GPGPU-Based Elliptic Curve Scalar Multiplication}, howpublished = {Cryptology ePrint Archive, Report 2014/198}, year = {2014}, url = {https://eprint.iacr.org/2014/198}, } @misc{cryptoeprint:2014:199, author = {Jie Chen and Hoeteck Wee}, title = {Doubly Spatial Encryption from DBDH}, howpublished = {Cryptology ePrint Archive, Report 2014/199}, year = {2014}, url = {https://eprint.iacr.org/2014/199}, } @misc{cryptoeprint:2014:200, author = {Florian Kerschbaum and Thomas Schneider and Axel Schröpfer}, title = {Automatic Protocol Selection in Secure Two-Party Computations}, howpublished = {Cryptology ePrint Archive, Report 2014/200}, year = {2014}, url = {https://eprint.iacr.org/2014/200}, } @misc{cryptoeprint:2014:201, author = {Dan Bogdanov and Peeter Laud and Sven Laur and Pille Pullonen}, title = {From Input Private to Universally Composable Secure Multiparty Computation Primitives}, howpublished = {Cryptology ePrint Archive, Report 2014/201}, year = {2014}, url = {https://eprint.iacr.org/2014/201}, } @misc{cryptoeprint:2014:202, author = {Dario Fiore and Rosario Gennaro and Valerio Pastro}, title = {Efficiently Verifiable Computation on Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2014/202}, year = {2014}, url = {https://eprint.iacr.org/2014/202}, } @misc{cryptoeprint:2014:203, author = {Nashad Ahmed Safa and Reihaneh Safavi-Naini and Siamak F. Shahandashti}, title = {Privacy-Preserving Implicit Authentication}, howpublished = {Cryptology ePrint Archive, Report 2014/203}, year = {2014}, url = {https://eprint.iacr.org/2014/203}, } @misc{cryptoeprint:2014:204, author = {Colin O'Flynn and Zhizhang (David) Chen}, title = {ChipWhisperer: An Open-Source Platform for Hardware Embedded Security Research}, howpublished = {Cryptology ePrint Archive, Report 2014/204}, year = {2014}, url = {https://eprint.iacr.org/2014/204}, } @misc{cryptoeprint:2014:205, author = {Ling Ren and Christopher Fletcher and Xiangyao Yu and Albert Kwon and Marten van Dijk and Srinivas Devadas}, title = {Unified Oblivious-RAM: Improving Recursive ORAM with Locality and Pseudorandomness}, howpublished = {Cryptology ePrint Archive, Report 2014/205}, year = {2014}, url = {https://eprint.iacr.org/2014/205}, } @misc{cryptoeprint:2014:206, author = {Chanathip Namprempre and Phillip Rogaway and Thomas Shrimpton}, title = {Reconsidering Generic Composition}, howpublished = {Cryptology ePrint Archive, Report 2014/206}, year = {2014}, url = {https://eprint.iacr.org/2014/206}, } @misc{cryptoeprint:2014:207, author = {Katsuyuki Takashima}, title = {Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption}, howpublished = {Cryptology ePrint Archive, Report 2014/207}, year = {2014}, url = {https://eprint.iacr.org/2014/207}, } @misc{cryptoeprint:2014:208, author = {Ding Wang and Ping Wang}, title = {Offline Dictionary Attack on Password Authentication Schemes using Smart Cards}, howpublished = {Cryptology ePrint Archive, Report 2014/208}, year = {2014}, url = {https://eprint.iacr.org/2014/208}, } @misc{cryptoeprint:2014:209, author = {Juan A. Garay and Ran Gelles and David S. Johnson and Aggelos Kiayias and Moti Yung}, title = {A Little Honesty Goes a Long Way: The Two-Tier Model for Secure Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2014/209}, year = {2014}, url = {https://eprint.iacr.org/2014/209}, } @misc{cryptoeprint:2014:210, author = {Jean-Charles Faugère and Ayoub Otmani and Ludovic Perret and Frédéric de Portzamparc and Jean-Pierre Tillich}, title = {Structural Cryptanalysis of McEliece Schemes with Compact Keys }, howpublished = {Cryptology ePrint Archive, Report 2014/210}, year = {2014}, url = {https://eprint.iacr.org/2014/210}, } @misc{cryptoeprint:2014:211, author = {Subhabrata Samajder and Palash Sarkar}, title = {Some Randomness Experiments on TRIVIUM}, howpublished = {Cryptology ePrint Archive, Report 2014/211}, year = {2014}, url = {https://eprint.iacr.org/2014/211}, } @misc{cryptoeprint:2014:212, author = {Geon Heo and Seokhwan Choi and Kwang Ho Lee and Namhun Koo and Soonhak Kwon}, title = {Remarks on the Pocklington and Padr\'o-S\'aez Cube Root Algorithm in $\mathbb F_q$}, howpublished = {Cryptology ePrint Archive, Report 2014/212}, year = {2014}, url = {https://eprint.iacr.org/2014/212}, } @misc{cryptoeprint:2014:213, author = {Ilan Komargodski and Moni Naor and Eylon Yogev}, title = {Secret-Sharing for NP}, howpublished = {Cryptology ePrint Archive, Report 2014/213}, year = {2014}, url = {https://eprint.iacr.org/2014/213}, } @misc{cryptoeprint:2014:214, author = {Vladislav Kovtun and Andrew Okhrimenko}, title = {Squaring Algorithms with Delayed Carry Method and Efficient Parallelization}, howpublished = {Cryptology ePrint Archive, Report 2014/214}, year = {2014}, url = {https://eprint.iacr.org/2014/214}, } @misc{cryptoeprint:2014:215, author = {James L. Adams}, title = {Attack On the Markov Problem}, howpublished = {Cryptology ePrint Archive, Report 2014/215}, year = {2014}, url = {https://eprint.iacr.org/2014/215}, } @misc{cryptoeprint:2014:216, author = {Francesco Aldà and Riccardo Aragona and Lorenzo Nicolodi and Massimiliano Sala}, title = {Implementation and Improvement of the Partial Sum Attack on 6-round AES}, howpublished = {Cryptology ePrint Archive, Report 2014/216}, year = {2014}, url = {https://eprint.iacr.org/2014/216}, } @misc{cryptoeprint:2014:217, author = {Yu Sasaki and Lei Wang}, title = {A Forgery Attack against PANDA-s}, howpublished = {Cryptology ePrint Archive, Report 2014/217}, year = {2014}, url = {https://eprint.iacr.org/2014/217}, } @misc{cryptoeprint:2014:218, author = {Yu Sasaki and Lei Wang}, title = {A Practical Universal Forgery Attack against PAES-8}, howpublished = {Cryptology ePrint Archive, Report 2014/218}, year = {2014}, url = {https://eprint.iacr.org/2014/218}, } @misc{cryptoeprint:2014:219, author = {Muhammad Naveed and Manoj Prabhakaran and Carl A. Gunter}, title = {Dynamic Searchable Encryption via Blind Storage}, howpublished = {Cryptology ePrint Archive, Report 2014/219}, year = {2014}, url = {https://eprint.iacr.org/2014/219}, } @misc{cryptoeprint:2014:220, author = {Shahram Rasoolzadeh and Zahra Ahmadian and Mahmoud Salmasizadeh and Mohammad Reza Aref}, title = {Total Break of Zorro using Linear and Differential Attacks}, howpublished = {Cryptology ePrint Archive, Report 2014/220}, year = {2014}, url = {https://eprint.iacr.org/2014/220}, } @misc{cryptoeprint:2014:221, author = {Toomas Krips and Jan Willemson}, title = {Hybrid Model of Fixed and Floating Point Numbers in Secure Multiparty Computations}, howpublished = {Cryptology ePrint Archive, Report 2014/221}, year = {2014}, url = {https://eprint.iacr.org/2014/221}, } @misc{cryptoeprint:2014:222, author = {Prabhanjan Ananth and Divya Gupta and Yuval Ishai and Amit Sahai}, title = {Optimizing Obfuscation: Avoiding Barrington's Theorem}, howpublished = {Cryptology ePrint Archive, Report 2014/222}, year = {2014}, url = {https://eprint.iacr.org/2014/222}, } @misc{cryptoeprint:2014:223, author = {Léo Perrin and Dmitry Khovratovich}, title = {Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64}, howpublished = {Cryptology ePrint Archive, Report 2014/223}, year = {2014}, url = {https://eprint.iacr.org/2014/223}, } @misc{cryptoeprint:2014:224, author = {Henry Carter and Charles Lever and Patrick Traynor}, title = {Whitewash: Outsourcing Garbled Circuit Generation for Mobile Devices}, howpublished = {Cryptology ePrint Archive, Report 2014/224}, year = {2014}, url = {https://eprint.iacr.org/2014/224}, } @misc{cryptoeprint:2014:225, author = {Tapas Pandit and Rana Barua}, title = {Adaptively Secure Functional Encryption for Finite Languages from DLIN Assumption}, howpublished = {Cryptology ePrint Archive, Report 2014/225}, year = {2014}, url = {https://eprint.iacr.org/2014/225}, } @misc{cryptoeprint:2014:226, author = {Mohamed Ahmed Abdelraheem and Andrey Bogdanov and Elmar Tischhauser}, title = {Weak-Key Analysis of POET}, howpublished = {Cryptology ePrint Archive, Report 2014/226}, year = {2014}, url = {https://eprint.iacr.org/2014/226}, } @misc{cryptoeprint:2014:227, author = {Mohammad Rezaeirad, Sahar Mazloom, Mahdi Orooji, Miao Jin, Magdy Bayoumi}, title = {CKEF: A Cluster-based Key Establishment Framework for homogenous mobile and static wireless sensor networks}, howpublished = {Cryptology ePrint Archive, Report 2014/227}, year = {2014}, url = {https://eprint.iacr.org/2014/227}, } @misc{cryptoeprint:2014:228, author = {Achiya Bar-On and Itai Dinur and Orr Dunkelman and Virginie Lallemand and Nathan Keller and Boaz Tsaban}, title = {Cryptanalysis of SP Networks with Partial Non-Linear Layers}, howpublished = {Cryptology ePrint Archive, Report 2014/228}, year = {2014}, url = {https://eprint.iacr.org/2014/228}, } @misc{cryptoeprint:2014:229, author = {Mohammad Rezaeirad, Muhammad Aamir Iqbal, Dmitri Perkins, Magdy Bayoumi}, title = {Investigating the Feasibility of LEAP+ in ZigBee Specification}, howpublished = {Cryptology ePrint Archive, Report 2014/229}, year = {2014}, url = {https://eprint.iacr.org/2014/229}, } @misc{cryptoeprint:2014:230, author = {Sorina Ionica and Emmanuel Thomé}, title = {Isogeny graphs with maximal real multiplication}, howpublished = {Cryptology ePrint Archive, Report 2014/230}, year = {2014}, url = {https://eprint.iacr.org/2014/230}, } @misc{cryptoeprint:2014:231, author = {Kwangsu Lee}, title = {Self-Updatable Encryption with Short Public Parameters and Its Extensions}, howpublished = {Cryptology ePrint Archive, Report 2014/231}, year = {2014}, url = {https://eprint.iacr.org/2014/231}, } @misc{cryptoeprint:2014:232, author = {Yark{\i}n Dor\"{o}z, Berk Sunar and Ghaith Hammouri}, title = {Bandwidth Efficient PIR from NTRU}, howpublished = {Cryptology ePrint Archive, Report 2014/232}, year = {2014}, url = {https://eprint.iacr.org/2014/232}, } @misc{cryptoeprint:2014:233, author = {Yark{\i}n Dor\"{o}z, Aria Shahverdi, Thomas Eisenbarth, and Berk Sunar}, title = {Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince}, howpublished = {Cryptology ePrint Archive, Report 2014/233}, year = {2014}, url = {https://eprint.iacr.org/2014/233}, } @misc{cryptoeprint:2014:234, author = {Xiangyao Yu and Ling Ren and Christopher Fletcher and Albert Kwon and Marten van Dijk and Srinivas Devadas}, title = {Enhancing Oblivious RAM Performance Using Dynamic Prefetching}, howpublished = {Cryptology ePrint Archive, Report 2014/234}, year = {2014}, url = {https://eprint.iacr.org/2014/234}, } @misc{cryptoeprint:2014:235, author = {Alexandra Boldyreva and Nathan Chenette}, title = {Efficient Fuzzy Search on Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2014/235}, year = {2014}, url = {https://eprint.iacr.org/2014/235}, } @misc{cryptoeprint:2014:236, author = {Shazia Afreen}, title = {Linear Sequential Circuit Approximation of Acterbahn Stream Cipher}, howpublished = {Cryptology ePrint Archive, Report 2014/236}, year = {2014}, url = {https://eprint.iacr.org/2014/236}, } @misc{cryptoeprint:2014:237, author = {Aydin Aysu and Ege Gulcan and Patrick Schaumont}, title = {SIMON Says, Break the Area Records for Symmetric Key Block Ciphers on FPGAs}, howpublished = {Cryptology ePrint Archive, Report 2014/237}, year = {2014}, url = {https://eprint.iacr.org/2014/237}, } @misc{cryptoeprint:2014:238, author = {Jo\"el Alwen and Vladimir Serbinenko}, title = {High Parallel Complexity Graphs and Memory-Hard Functions}, howpublished = {Cryptology ePrint Archive, Report 2014/238}, year = {2014}, url = {https://eprint.iacr.org/2014/238}, } @misc{cryptoeprint:2014:239, author = {Florian Legendre and Gilles Dequen and Michaël Krajecki}, title = {Logical Reasoning to Detect Weaknesses About SHA-1 and MD4/5}, howpublished = {Cryptology ePrint Archive, Report 2014/239}, year = {2014}, url = {https://eprint.iacr.org/2014/239}, } @misc{cryptoeprint:2014:240, author = {Martin Pettai and Peeter Laud}, title = {Automatic Proofs of Privacy of Secure Multi-Party Computation Protocols Against Active Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2014/240}, year = {2014}, url = {https://eprint.iacr.org/2014/240}, } @misc{cryptoeprint:2014:241, author = {Qianying Zhang and Shijun Zhao and Dengguo Feng}, title = {A New Way to Prevent UKS Attacks Using Trusted Computing}, howpublished = {Cryptology ePrint Archive, Report 2014/241}, year = {2014}, url = {https://eprint.iacr.org/2014/241}, } @misc{cryptoeprint:2014:242, author = {Franziskus Kiefer and Mark Manulis}, title = {Zero-Knowledge Password Policy Checks and Verifier-Based PAKE}, howpublished = {Cryptology ePrint Archive, Report 2014/242}, year = {2014}, url = {https://eprint.iacr.org/2014/242}, } @misc{cryptoeprint:2014:243, author = {Ran Canetti and Benjamin Fuller and Omer Paneth and Leonid Reyzin and Adam Smith}, title = {Reusable Fuzzy Extractors for Low-Entropy Distributions}, howpublished = {Cryptology ePrint Archive, Report 2014/243}, year = {2014}, url = {https://eprint.iacr.org/2014/243}, } @misc{cryptoeprint:2014:244, author = {Gideon Samid}, title = {bitcoin.BitMint: Reconciling Bitcoin with Central Banks}, howpublished = {Cryptology ePrint Archive, Report 2014/244}, year = {2014}, url = {https://eprint.iacr.org/2014/244}, } @misc{cryptoeprint:2014:245, author = {Xiutao FENG and Fan ZHANG}, title = {A practical state recovery attack on the stream cipher Sablier v1}, howpublished = {Cryptology ePrint Archive, Report 2014/245}, year = {2014}, url = {https://eprint.iacr.org/2014/245}, } @misc{cryptoeprint:2014:246, author = {Kwangsu Lee and Dong Hoon Lee}, title = {Security Analysis of an Identity-Based Strongly Unforgeable Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2014/246}, year = {2014}, url = {https://eprint.iacr.org/2014/246}, } @misc{cryptoeprint:2014:247, author = {Ivan Pryvalov and Aniket Kate}, title = {Introducing Fault Tolerance into Threshold Password-Authenticated Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2014/247}, year = {2014}, url = {https://eprint.iacr.org/2014/247}, } @misc{cryptoeprint:2014:248, author = {Gorka Irazoqui Apecechea and Mehmet Sinan Inci and Thomas Eisenbarth and Berk Sunar}, title = {Fine grain Cross-VM Attacks on Xen and VMware are possible!}, howpublished = {Cryptology ePrint Archive, Report 2014/248}, year = {2014}, url = {https://eprint.iacr.org/2014/248}, } @misc{cryptoeprint:2014:249, author = {Liren Ding, Yongjuan Wang, Zhufeng Li}, title = {Linear Extension Cube Attack on Stream Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2014/249}, year = {2014}, url = {https://eprint.iacr.org/2014/249}, } @misc{cryptoeprint:2014:250, author = {Boaz Tsaban and Noam Lifshitz}, title = {Cryptanalysis of the MORE symmetric key fully homomorphic encryption scheme}, howpublished = {Cryptology ePrint Archive, Report 2014/250}, year = {2014}, url = {https://eprint.iacr.org/2014/250}, } @misc{cryptoeprint:2014:251, author = {Guy Barwell}, title = {Forgery on Stateless CMCC}, howpublished = {Cryptology ePrint Archive, Report 2014/251}, year = {2014}, url = {https://eprint.iacr.org/2014/251}, } @misc{cryptoeprint:2014:252, author = {Gilles Barthe and François Dupressoir and Pierre-Alain Fouque and Benjamin Grégoire and Mehdi Tibouchi and Jean-Christophe Zapalowicz}, title = {Making RSA-PSS Provably Secure Against Non-Random Faults}, howpublished = {Cryptology ePrint Archive, Report 2014/252}, year = {2014}, url = {https://eprint.iacr.org/2014/252}, } @misc{cryptoeprint:2014:253, author = {Fangquan Cheng and Qian Wang and Kui Ren and Zhiyong Peng}, title = {Practical and Secure Query Processing for Large-scale Encrypted Cloud Storage Systems}, howpublished = {Cryptology ePrint Archive, Report 2014/253}, year = {2014}, url = {https://eprint.iacr.org/2014/253}, } @misc{cryptoeprint:2014:254, author = {Thomas P\"oppelmann and L{\'e}o Ducas and Tim G\"uneysu}, title = {Enhanced Lattice-Based Signatures on Reconfigurable Hardware}, howpublished = {Cryptology ePrint Archive, Report 2014/254}, year = {2014}, url = {https://eprint.iacr.org/2014/254}, } @misc{cryptoeprint:2014:255, author = {Thomas Gross}, title = {Certification and Efficient Proofs of Committed Topology Graphs}, howpublished = {Cryptology ePrint Archive, Report 2014/255}, year = {2014}, url = {https://eprint.iacr.org/2014/255}, } @misc{cryptoeprint:2014:256, author = {Iraklis Leontiadis, Kaoutar Elkhiyaoui, Refik Molva}, title = {Private and Dynamic Time-Series Data Aggregation with Trust Relaxation}, howpublished = {Cryptology ePrint Archive, Report 2014/256}, year = {2014}, url = {https://eprint.iacr.org/2014/256}, } @misc{cryptoeprint:2014:257, author = {Bruce Kallick}, title = {Handycipher: a Low-tech, Randomized, Symmetric-key Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2014/257}, year = {2014}, url = {https://eprint.iacr.org/2014/257}, } @misc{cryptoeprint:2014:258, author = {Xiutao FENG and Fan ZHANG}, title = {A realtime key recovery attack on the authenticated cipher FASER128}, howpublished = {Cryptology ePrint Archive, Report 2014/258}, year = {2014}, url = {https://eprint.iacr.org/2014/258}, } @misc{cryptoeprint:2014:259, author = {Itai Dinur and Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny and Michal Straus}, title = {Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function}, howpublished = {Cryptology ePrint Archive, Report 2014/259}, year = {2014}, url = {https://eprint.iacr.org/2014/259}, } @misc{cryptoeprint:2014:260, author = {Rafail Ostrovsky and Anat Paskin-Cherniavsky}, title = {Locally Decodable Codes for edit distance}, howpublished = {Cryptology ePrint Archive, Report 2014/260}, year = {2014}, url = {https://eprint.iacr.org/2014/260}, } @misc{cryptoeprint:2014:261, author = {Sandip Karmakar and Dipanwita Roy Chowdhury}, title = {Fault Analysis of Grain Family of Stream Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2014/261}, year = {2014}, url = {https://eprint.iacr.org/2014/261}, } @misc{cryptoeprint:2014:262, author = {Sandip Karmakar and Dipanwita Roy Chowdhury}, title = {Differential Fault Analysis of MICKEY Family of Stream Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2014/262}, year = {2014}, url = {https://eprint.iacr.org/2014/262}, } @misc{cryptoeprint:2014:263, author = {Sandip Karmakar and Dipanwita Roy Chowdhury}, title = {A Generic Scan Attack on Hardware based eStream Winners}, howpublished = {Cryptology ePrint Archive, Report 2014/263}, year = {2014}, url = {https://eprint.iacr.org/2014/263}, } @misc{cryptoeprint:2014:264, author = {Janaka Alawatugoda and Colin Boyd and Douglas Stebila}, title = {Continuous After-the-fact Leakage-Resilient Key Exchange (full version)}, howpublished = {Cryptology ePrint Archive, Report 2014/264}, year = {2014}, url = {https://eprint.iacr.org/2014/264}, } @misc{cryptoeprint:2014:265, author = {Jie Chen and Hoeteck Wee}, title = {Dual System Groups and its Applications --- Compact HIBE and More}, howpublished = {Cryptology ePrint Archive, Report 2014/265}, year = {2014}, url = {https://eprint.iacr.org/2014/265}, } @misc{cryptoeprint:2014:266, author = {Pawel Morawiecki and Kris Gaj and Ekawat Homsirikamol and Krystian Matusiewicz and Josef Pieprzyk and Marcin Rogawski and Marian Srebrny and Marcin Wojcik}, title = {ICEPOLE: High-speed, Hardware-oriented Authenticated Encryption}, howpublished = {Cryptology ePrint Archive, Report 2014/266}, year = {2014}, url = {https://eprint.iacr.org/2014/266}, } @misc{cryptoeprint:2014:267, author = {Harshal Tupsamudre and Shikha Bisht and Debdeep Mukhopadhyay}, title = {Differential Fault Analysis on the families of SIMON and SPECK ciphers}, howpublished = {Cryptology ePrint Archive, Report 2014/267}, year = {2014}, url = {https://eprint.iacr.org/2014/267}, } @misc{cryptoeprint:2014:268, author = {Yin Li and Yiyang Chen}, title = {New bit-parallel Montgomery multiplier for trinomials using squaring operation}, howpublished = {Cryptology ePrint Archive, Report 2014/268}, year = {2014}, url = {https://eprint.iacr.org/2014/268}, } @misc{cryptoeprint:2014:269, author = {Takahiro Matsuda and Goichiro Hanaoka}, title = {Chosen Ciphertext Security via Point Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2014/269}, year = {2014}, url = {https://eprint.iacr.org/2014/269}, } @misc{cryptoeprint:2014:270, author = {Tore Kasper Frederiksen and Thomas Pelle Jakobsen and Jesper Buus Nielsen}, title = {Faster Maliciously Secure Two-Party Computation Using the GPU}, howpublished = {Cryptology ePrint Archive, Report 2014/270}, year = {2014}, url = {https://eprint.iacr.org/2014/270}, } @misc{cryptoeprint:2014:271, author = {Markku-Juhani O. Saarinen}, title = {STRIBOB: Authenticated Encryption from GOST R 34.11-2012 LPS Permutation}, howpublished = {Cryptology ePrint Archive, Report 2014/271}, year = {2014}, url = {https://eprint.iacr.org/2014/271}, } @misc{cryptoeprint:2014:272, author = {Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su}, title = {Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm}, howpublished = {Cryptology ePrint Archive, Report 2014/272}, year = {2014}, url = {https://eprint.iacr.org/2014/272}, } @misc{cryptoeprint:2014:273, author = {Craig Gentry and Allison Bishop Lewko and Brent Waters}, title = {Witness Encryption from Instance Independent Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2014/273}, year = {2014}, url = {https://eprint.iacr.org/2014/273}, } @misc{cryptoeprint:2014:274, author = {Sorina Ionica and Malika Izabach{\`e}ne}, title = {Weak instances of composite order protocols}, howpublished = {Cryptology ePrint Archive, Report 2014/274}, year = {2014}, url = {https://eprint.iacr.org/2014/274}, } @misc{cryptoeprint:2014:275, author = {SK Hafizul Islam}, title = {Identity-based encryption and digital signature schemes using extended chaotic maps}, howpublished = {Cryptology ePrint Archive, Report 2014/275}, year = {2014}, url = {https://eprint.iacr.org/2014/275}, } @misc{cryptoeprint:2014:276, author = {SK Hafizul Islam}, title = {Design of identity-based digital signature schemes using extended chaotic maps}, howpublished = {Cryptology ePrint Archive, Report 2014/276}, year = {2014}, url = {https://eprint.iacr.org/2014/276}, } @misc{cryptoeprint:2014:277, author = {Lin Ding and Chenhui Jin and Jie Guan and Chuanda Qi}, title = {New Treatment of the BSW Sampling and Its Applications to Stream Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2014/277}, year = {2014}, url = {https://eprint.iacr.org/2014/277}, } @misc{cryptoeprint:2014:278, author = {Essam Ghadafi}, title = {Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions}, howpublished = {Cryptology ePrint Archive, Report 2014/278}, year = {2014}, url = {https://eprint.iacr.org/2014/278}, } @misc{cryptoeprint:2014:279, author = {Christina Boura and Marine Minier and María Naya-Plasencia and Valentin Suder}, title = {Improved Impossible Differential Attacks against Round-Reduced LBlock}, howpublished = {Cryptology ePrint Archive, Report 2014/279}, year = {2014}, url = {https://eprint.iacr.org/2014/279}, } @misc{cryptoeprint:2014:280, author = {Rajul Kumar and K. K. Mishra and Ashish Tripathi and Abhinav Tomar and Surendra Singh}, title = {MSEA: Modified Symmetric Encryption Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2014/280}, year = {2014}, url = {https://eprint.iacr.org/2014/280}, } @misc{cryptoeprint:2014:281, author = {Andrey Jivsov}, title = {WCFB: a tweakable wide block cipher}, howpublished = {Cryptology ePrint Archive, Report 2014/281}, year = {2014}, url = {https://eprint.iacr.org/2014/281}, } @misc{cryptoeprint:2014:282, author = {Ivan Damgård and Frédéric Dupuis and Jesper Buus Nielsen}, title = {On The Orthogonal Vector Problem and The Feasibility of Unconditionally Secure Leakage Resilient Computation}, howpublished = {Cryptology ePrint Archive, Report 2014/282}, year = {2014}, url = {https://eprint.iacr.org/2014/282}, } @misc{cryptoeprint:2014:283, author = {Nicolas Gama and Malika Izabachene and Phong Q. Nguyen and Xiang Xie}, title = {Structural Lattice Reduction: Generalized Worst-Case to Average-Case Reductions and Homomorphic Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2014/283}, year = {2014}, url = {https://eprint.iacr.org/2014/283}, } @misc{cryptoeprint:2014:284, author = {Rafail Ostrovsky and Alessandra Scafuro and Muthuramakrishnan Venkitasubramaniam}, title = {Resettably Sound Zero-Knoweldge Arguments from OWFs - the (semi) Black-Box way}, howpublished = {Cryptology ePrint Archive, Report 2014/284}, year = {2014}, url = {https://eprint.iacr.org/2014/284}, } @misc{cryptoeprint:2014:285, author = {David Derler and Christian Hanser and Daniel Slamanig}, title = {Privacy-Enhancing Proxy Signatures from Non-Interactive Anonymous Credentials}, howpublished = {Cryptology ePrint Archive, Report 2014/285}, year = {2014}, url = {https://eprint.iacr.org/2014/285}, } @misc{cryptoeprint:2014:286, author = {Martin Stanek}, title = {Weaknesses of Password Authentication Scheme Based on Geometric Hashing}, howpublished = {Cryptology ePrint Archive, Report 2014/286}, year = {2014}, url = {https://eprint.iacr.org/2014/286}, } @misc{cryptoeprint:2014:287, author = {Georg T, Becker and Raghavan Kumar}, title = {Active and Passive Side-Channel Attacks on Delay Based PUF Designs}, howpublished = {Cryptology ePrint Archive, Report 2014/287}, year = {2014}, url = {https://eprint.iacr.org/2014/287}, } @misc{cryptoeprint:2014:288, author = {Kevin J. Henry and Douglas R. Stinson}, title = {Resilient Aggregation in Simple Linear Sensor Networks}, howpublished = {Cryptology ePrint Archive, Report 2014/288}, year = {2014}, url = {https://eprint.iacr.org/2014/288}, } @misc{cryptoeprint:2014:289, author = {Ivan Damgaard and Rasmus Lauritsen, and Tomas Toft}, title = {An Empirical Study and some Improvements of the MiniMac Protocol for Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2014/289}, year = {2014}, url = {https://eprint.iacr.org/2014/289}, } @misc{cryptoeprint:2014:290, author = {Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas}, title = {Reliable Broadcast with Respect to Topology Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2014/290}, year = {2014}, url = {https://eprint.iacr.org/2014/290}, } @misc{cryptoeprint:2014:291, author = {Antonio Sanso}, title = {Trial multiplication is not optimal but... On the symmetry of finite cyclic groups (Z/pZ)∗}, howpublished = {Cryptology ePrint Archive, Report 2014/291}, year = {2014}, url = {https://eprint.iacr.org/2014/291}, } @misc{cryptoeprint:2014:292, author = {Leibo Li and Keting Jia}, title = {Improved Meet-in-the-Middle Attacks on Reduced-Round Camellia-192/256}, howpublished = {Cryptology ePrint Archive, Report 2014/292}, year = {2014}, url = {https://eprint.iacr.org/2014/292}, } @misc{cryptoeprint:2014:293, author = {Xi-Jun Lin and Lin Sun}, title = {An Efficient Abuse-Free Fair Contract-Signing Protocol Based on RSA Signature and Σ-protocol}, howpublished = {Cryptology ePrint Archive, Report 2014/293}, year = {2014}, url = {https://eprint.iacr.org/2014/293}, } @misc{cryptoeprint:2014:294, author = {Isaiah Makwakwa}, title = {The M3lcrypt Password Based Key Derivation Function}, howpublished = {Cryptology ePrint Archive, Report 2014/294}, year = {2014}, url = {https://eprint.iacr.org/2014/294}, } @misc{cryptoeprint:2014:295, author = {Nir Bitansky and Omer Paneth}, title = {ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2014/295}, year = {2014}, url = {https://eprint.iacr.org/2014/295}, } @misc{cryptoeprint:2014:296, author = {Andris Ambainis and Ansis Rosmanis and Dominique Unruh}, title = {Quantum Attacks on Classical Proof Systems - The Hardness of Quantum Rewinding}, howpublished = {Cryptology ePrint Archive, Report 2014/296}, year = {2014}, url = {https://eprint.iacr.org/2014/296}, } @misc{cryptoeprint:2014:297, author = {Farzaneh Abed and Scott Fluhrer and Christian Forler and Eik List and Stefan Lucks and David McGrew and Jakob Wenzel}, title = {Pipelineable On-Line Encryption}, howpublished = {Cryptology ePrint Archive, Report 2014/297}, year = {2014}, url = {https://eprint.iacr.org/2014/297}, } @misc{cryptoeprint:2014:298, author = {Ignacio Cascudo and Ronald Cramer and Chaoping Xing}, title = {Torsion Limits and Riemann-Roch Systems for Function Fields and Applications}, howpublished = {Cryptology ePrint Archive, Report 2014/298}, year = {2014}, url = {https://eprint.iacr.org/2014/298}, } @misc{cryptoeprint:2014:299, author = {Grégory Demay and Peter Gaži and Ueli Maurer and Björn Tackmann}, title = {Optimality of Non-Adaptive Strategies: The Case of Parallel Games}, howpublished = {Cryptology ePrint Archive, Report 2014/299}, year = {2014}, url = {https://eprint.iacr.org/2014/299}, } @misc{cryptoeprint:2014:300, author = {Robert Granger and Thorsten Kleinjung and Jens Zumbr\"agel}, title = {On the Powers of 2}, howpublished = {Cryptology ePrint Archive, Report 2014/300}, year = {2014}, url = {https://eprint.iacr.org/2014/300}, } @misc{cryptoeprint:2014:301, author = {Mark Zhandry}, title = {How to Avoid Obfuscation Using Witness PRFs}, howpublished = {Cryptology ePrint Archive, Report 2014/301}, year = {2014}, url = {https://eprint.iacr.org/2014/301}, } @misc{cryptoeprint:2014:302, author = {Maria Eichlseder and Florian Mendel and Martin Schläffer}, title = {Branching Heuristics in Differential Collision Search with Applications to SHA-512}, howpublished = {Cryptology ePrint Archive, Report 2014/302}, year = {2014}, url = {https://eprint.iacr.org/2014/302}, } @misc{cryptoeprint:2014:303, author = {SK Hafizul Islam}, title = {On the security of Xu et al.'s authentication and key agreement scheme for telecare medicine information systems}, howpublished = {Cryptology ePrint Archive, Report 2014/303}, year = {2014}, url = {https://eprint.iacr.org/2014/303}, } @misc{cryptoeprint:2014:304, author = {Dai Ikarashi and Ryo Kikuchi and Koki Hamada and Koji Chida}, title = {Actively Private and Correct MPC Scheme in $t < n/2$ from Passively Secure Schemes with Small Overhead}, howpublished = {Cryptology ePrint Archive, Report 2014/304}, year = {2014}, url = {https://eprint.iacr.org/2014/304}, } @misc{cryptoeprint:2014:305, author = {Florian Mendel and Vincent Rijmen and Martin Schläffer}, title = {Collision Attack on 5 Rounds of Grøstl}, howpublished = {Cryptology ePrint Archive, Report 2014/305}, year = {2014}, url = {https://eprint.iacr.org/2014/305}, } @misc{cryptoeprint:2014:306, author = {Yu Chen and Zongyang Zhang}, title = {Publicly Evaluable Pseudorandom Functions and Their Applications}, howpublished = {Cryptology ePrint Archive, Report 2014/306}, year = {2014}, url = {https://eprint.iacr.org/2014/306}, } @misc{cryptoeprint:2014:307, author = {Alessandro Barenghi and Gerardo Pelosi and Francesco Regazzoni}, title = {Simulation-Time Security Margin Assessment against Power-Based Side Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2014/307}, year = {2014}, url = {https://eprint.iacr.org/2014/307}, } @misc{cryptoeprint:2014:308, author = {David Cash and Stefano Tessaro}, title = {The Locality of Searchable Symmetric Encryption}, howpublished = {Cryptology ePrint Archive, Report 2014/308}, year = {2014}, url = {https://eprint.iacr.org/2014/308}, } @misc{cryptoeprint:2014:309, author = {Craig Gentry and Allison Lewko and Amit Sahai and Brent Waters}, title = {Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption}, howpublished = {Cryptology ePrint Archive, Report 2014/309}, year = {2014}, url = {https://eprint.iacr.org/2014/309}, } @misc{cryptoeprint:2014:310, author = {Yu Chen and Qiong Huang and Zongyang Zhang}, title = {Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Revisited and More}, howpublished = {Cryptology ePrint Archive, Report 2014/310}, year = {2014}, url = {https://eprint.iacr.org/2014/310}, } @misc{cryptoeprint:2014:311, author = {Tsz Hon Yuen and Sherman S.M. Chow and Cong Zhang and Siu Ming Yiu}, title = {Exponent-inversion Signatures and IBE under Static Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2014/311}, year = {2014}, url = {https://eprint.iacr.org/2014/311}, } @misc{cryptoeprint:2014:312, author = {Masayuki Abe and Jens Groth and Miyako Ohkubo and Mehdi Tibouchi}, title = {Structure-Preserving Signatures from Type II Pairings}, howpublished = {Cryptology ePrint Archive, Report 2014/312}, year = {2014}, url = {https://eprint.iacr.org/2014/312}, } @misc{cryptoeprint:2014:313, author = {Bjoern Grohmann}, title = {On the Complexity of Finding Low-Level Solutions}, howpublished = {Cryptology ePrint Archive, Report 2014/313}, year = {2014}, url = {https://eprint.iacr.org/2014/313}, } @misc{cryptoeprint:2014:314, author = {Zhenbin Zhang and Liji Wu and An Wang and Zhaoli Mu}, title = {Improved Leakage Model Based on Genetic Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2014/314}, year = {2014}, url = {https://eprint.iacr.org/2014/314}, } @misc{cryptoeprint:2014:315, author = {Bartosz Zoltak}, title = {Statistical weaknesses in 20 RC4-like algorithms and (probably) the simplest algorithm free from these weaknesses - VMPC-R}, howpublished = {Cryptology ePrint Archive, Report 2014/315}, year = {2014}, url = {https://eprint.iacr.org/2014/315}, } @misc{cryptoeprint:2014:316, author = {Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran}, title = {Explicit Non-Malleable Codes Resistant to Permutations}, howpublished = {Cryptology ePrint Archive, Report 2014/316}, year = {2014}, url = {https://eprint.iacr.org/2014/316}, } @misc{cryptoeprint:2014:317, author = {Jean-Philippe Aumasson and Philipp Jovanovic and Samuel Neves}, title = {Analysis of NORX: Investigating Differential and Rotational Properties}, howpublished = {Cryptology ePrint Archive, Report 2014/317}, year = {2014}, url = {https://eprint.iacr.org/2014/317}, } @misc{cryptoeprint:2014:318, author = {Elisa Gorla and Maike Massierer}, title = {Index calculus in the trace zero variety}, howpublished = {Cryptology ePrint Archive, Report 2014/318}, year = {2014}, url = {https://eprint.iacr.org/2014/318}, } @misc{cryptoeprint:2014:319, author = {Riham AlTawy and Amr M. Youssef}, title = {Preimage attacks on Reduced-round Stribog}, howpublished = {Cryptology ePrint Archive, Report 2014/319}, year = {2014}, url = {https://eprint.iacr.org/2014/319}, } @misc{cryptoeprint:2014:320, author = {Itai Dinur}, title = {Improved Differential Cryptanalysis of Round-Reduced Speck}, howpublished = {Cryptology ePrint Archive, Report 2014/320}, year = {2014}, url = {https://eprint.iacr.org/2014/320}, } @misc{cryptoeprint:2014:321, author = {Ahto Buldas and Risto Laanoja and Ahto Truu}, title = {Efficient Quantum-Immune Keyless Signatures with Identity}, howpublished = {Cryptology ePrint Archive, Report 2014/321}, year = {2014}, url = {https://eprint.iacr.org/2014/321}, } @misc{cryptoeprint:2014:322, author = {Ryutaroh Matsumoto}, title = {Coding Theoretic Construction of Quantum Ramp Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2014/322}, year = {2014}, url = {https://eprint.iacr.org/2014/322}, } @misc{cryptoeprint:2014:323, author = {Imran Erguler}, title = {Some Remarks on Honeyword Based Password-Cracking Detection}, howpublished = {Cryptology ePrint Archive, Report 2014/323}, year = {2014}, url = {https://eprint.iacr.org/2014/323}, } @misc{cryptoeprint:2014:324, author = {Sandro Coretti and Ueli Maurer and Björn Tackmann and Daniele Venturi}, title = {From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes}, howpublished = {Cryptology ePrint Archive, Report 2014/324}, year = {2014}, url = {https://eprint.iacr.org/2014/324}, } @misc{cryptoeprint:2014:325, author = {Xiutao FENG, Fan ZHANG and Hui WANG}, title = {A practical forgery and state recovery attack on the authenticated cipher PANDA-s}, howpublished = {Cryptology ePrint Archive, Report 2014/325}, year = {2014}, url = {https://eprint.iacr.org/2014/325}, } @misc{cryptoeprint:2014:326, author = {Manoj Kumar and Saibal K Pal and Anupama Panigrahi}, title = {FeW: A Lightweight Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2014/326}, year = {2014}, url = {https://eprint.iacr.org/2014/326}, } @misc{cryptoeprint:2014:327, author = {Vikram D}, title = {An Optimal Strong Password Authentication Protocol with USB Sticks}, howpublished = {Cryptology ePrint Archive, Report 2014/327}, year = {2014}, url = {https://eprint.iacr.org/2014/327}, } @misc{cryptoeprint:2014:328, author = {Divesh Aggarwal}, title = {Affine-evasive Sets Modulo a Prime}, howpublished = {Cryptology ePrint Archive, Report 2014/328}, year = {2014}, url = {https://eprint.iacr.org/2014/328}, } @misc{cryptoeprint:2014:329, author = {Berry Schoenmakers}, title = {Explicit Optimal Binary Pebbling for One-Way Hash Chain Reversal}, howpublished = {Cryptology ePrint Archive, Report 2014/329}, year = {2014}, url = {https://eprint.iacr.org/2014/329}, } @misc{cryptoeprint:2014:330, author = {qianxiaochao}, title = {Noncentralized Cryptocurrency wtih No Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2014/330}, year = {2014}, url = {https://eprint.iacr.org/2014/330}, } @misc{cryptoeprint:2014:331, author = {Raphael Bost and Raluca Ada Popa and Stephen Tu and Shafi Goldwasser}, title = {Machine Learning Classification over Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2014/331}, year = {2014}, url = {https://eprint.iacr.org/2014/331}, } @misc{cryptoeprint:2014:332, author = {Guangjun Fan, Yongbin Zhou, Hailong Zhang, and Dengguo Feng}, title = {How to Choose Interesting Points for Template Attacks?}, howpublished = {Cryptology ePrint Archive, Report 2014/332}, year = {2014}, url = {https://eprint.iacr.org/2014/332}, } @misc{cryptoeprint:2014:333, author = {Elisa Gorla and Maike Massierer}, title = {An optimal representation for the trace zero subgroup}, howpublished = {Cryptology ePrint Archive, Report 2014/333}, year = {2014}, url = {https://eprint.iacr.org/2014/333}, } @misc{cryptoeprint:2014:334, author = {Rachid El~Bansarkhani and Johannes Buchmann}, title = {LCPR: High Performance Compression Algorithm for Lattice-Based Signatures}, howpublished = {Cryptology ePrint Archive, Report 2014/334}, year = {2014}, url = {https://eprint.iacr.org/2014/334}, } @misc{cryptoeprint:2014:335, author = {John Almeida}, title = {SHADOW NUMBERS PUBLIC KEY ENCRYPTION}, howpublished = {Cryptology ePrint Archive, Report 2014/335}, year = {2014}, url = {https://eprint.iacr.org/2014/335}, } @misc{cryptoeprint:2014:336, author = {Joppe W. Bos and Kristin Lauter and Michael Naehrig}, title = {Private Predictive Analysis on Encrypted Medical Data}, howpublished = {Cryptology ePrint Archive, Report 2014/336}, year = {2014}, url = {https://eprint.iacr.org/2014/336}, } @misc{cryptoeprint:2014:337, author = {Kenneth G. Paterson and Jacob C.N. Schuldt and Dale L. Sibborn}, title = {Related Randomness Attacks for Public Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2014/337}, year = {2014}, url = {https://eprint.iacr.org/2014/337}, } @misc{cryptoeprint:2014:338, author = {Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi}, title = {A Tamper and Leakage Resilient von Neumann Architecture}, howpublished = {Cryptology ePrint Archive, Report 2014/338}, year = {2014}, url = {https://eprint.iacr.org/2014/338}, } @misc{cryptoeprint:2014:339, author = {Yi Deng}, title = {Public-Coin Concurrent Zero-Knowledge in Logarithmic Rounds}, howpublished = {Cryptology ePrint Archive, Report 2014/339}, year = {2014}, url = {https://eprint.iacr.org/2014/339}, } @misc{cryptoeprint:2014:340, author = {Mohammed Alfateh Hassouna and Mohsin Hashim}, title = {A Strong and Efficient Certificateless Digital Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2014/340}, year = {2014}, url = {https://eprint.iacr.org/2014/340}, } @misc{cryptoeprint:2014:341, author = {Ralf Kuesters and Tomasz Truderung and Andreas Vogt}, title = {Formal Analysis of Chaumian Mix Nets with Randomized Partial Checking}, howpublished = {Cryptology ePrint Archive, Report 2014/341}, year = {2014}, url = {https://eprint.iacr.org/2014/341}, } @misc{cryptoeprint:2014:342, author = {Zoya Dyka, Thomas Basmer, Christian Wittke and Peter Langendoerfer}, title = {Proposing Individualization of the design of cryptographic hardware accelerators as countermeasure against structure and side channel analysis}, howpublished = {Cryptology ePrint Archive, Report 2014/342}, year = {2014}, url = {https://eprint.iacr.org/2014/342}, } @misc{cryptoeprint:2014:343, author = {Yao Lu and Rui Zhang and Liqiang Peng and Dongdai Lin}, title = {Solving Linear Equations Modulo Unknown Divisors: Revisited}, howpublished = {Cryptology ePrint Archive, Report 2014/343}, year = {2014}, url = {https://eprint.iacr.org/2014/343}, } @misc{cryptoeprint:2014:344, author = {Erik-Oliver Blass and Travis Mayberry and Guevara Noubir and Kaan Onarlioglu}, title = {Toward Robust Hidden Volumes using Write-Only Oblivious RAM}, howpublished = {Cryptology ePrint Archive, Report 2014/344}, year = {2014}, url = {https://eprint.iacr.org/2014/344}, } @misc{cryptoeprint:2014:345, author = {Craig Gentry and Shai Halevi and Charanjit Jutla and Mariana Raykova}, title = {Private Database Access With HE-over-ORAM Architecture}, howpublished = {Cryptology ePrint Archive, Report 2014/345}, year = {2014}, url = {https://eprint.iacr.org/2014/345}, } @misc{cryptoeprint:2014:346, author = {Kim Laine and Kristin Lauter}, title = {Time-Memory Trade-offs for Index Calculus in Genus 3}, howpublished = {Cryptology ePrint Archive, Report 2014/346}, year = {2014}, url = {https://eprint.iacr.org/2014/346}, } @misc{cryptoeprint:2014:347, author = {Ilan Komargodski and Tal Moran and Moni Naor and Rafael Pass and Alon Rosen and Eylon Yogev}, title = {One-Way Functions and (Im)perfect Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2014/347}, year = {2014}, url = {https://eprint.iacr.org/2014/347}, } @misc{cryptoeprint:2014:348, author = {Helger Lipmaa}, title = {A Simple Cast-as-Intended E-Voting Protocol by Using Secure Smart Cards}, howpublished = {Cryptology ePrint Archive, Report 2014/348}, year = {2014}, url = {https://eprint.iacr.org/2014/348}, } @misc{cryptoeprint:2014:349, author = {Eli Ben-Sasson and Alessandro Chiesa and Christina Garman and Matthew Green and Ian Miers and Eran Tromer and Madars Virza}, title = {Zerocash: Decentralized Anonymous Payments from Bitcoin}, howpublished = {Cryptology ePrint Archive, Report 2014/349}, year = {2014}, url = {https://eprint.iacr.org/2014/349}, } @misc{cryptoeprint:2014:350, author = {Franziskus Kiefer and Mark Manulis}, title = {Distributed Smooth Projective Hashing and its Application to Two-Server PAKE}, howpublished = {Cryptology ePrint Archive, Report 2014/350}, year = {2014}, url = {https://eprint.iacr.org/2014/350}, } @misc{cryptoeprint:2014:351, author = {Yefim Leifman}, title = {Secret and Verifiable Delegated Voting for Wide Representation}, howpublished = {Cryptology ePrint Archive, Report 2014/351}, year = {2014}, url = {https://eprint.iacr.org/2014/351}, } @misc{cryptoeprint:2014:352, author = {Andrea Huszti}, title = {Multi-Vendor PayWord with Payment Approval}, howpublished = {Cryptology ePrint Archive, Report 2014/352}, year = {2014}, url = {https://eprint.iacr.org/2014/352}, } @misc{cryptoeprint:2014:353, author = {Jean-Charles Faugère and Ayoub Otmani and Ludovic Perret and Frédéric de Portzamparc and Jean-Pierre Tillich}, title = {Folding Alternant and Goppa Codes with Non-Trivial Automorphism Groups}, howpublished = {Cryptology ePrint Archive, Report 2014/353}, year = {2014}, url = {https://eprint.iacr.org/2014/353}, } @misc{cryptoeprint:2014:354, author = {Ray Perlner}, title = {Optimizing Information Set Decoding Algorithms to Attack Cyclosymmetric MDPC Codes}, howpublished = {Cryptology ePrint Archive, Report 2014/354}, year = {2014}, url = {https://eprint.iacr.org/2014/354}, } @misc{cryptoeprint:2014:355, author = {Michelle Kendall and Keith M. Martin}, title = {Graph-theoretic design and analysis of key predistribution schemes}, howpublished = {Cryptology ePrint Archive, Report 2014/355}, year = {2014}, url = {https://eprint.iacr.org/2014/355}, } @misc{cryptoeprint:2014:356, author = {Dan Boneh and Craig Gentry and Sergey Gorbunov and Shai Halevi and Valeria Nikolaenko and Gil Segev and Vinod Vaikuntanathan and Dhinakaran Vinayagamurthy}, title = {Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits}, howpublished = {Cryptology ePrint Archive, Report 2014/356}, year = {2014}, url = {https://eprint.iacr.org/2014/356}, } @misc{cryptoeprint:2014:357, author = {J. Longo Galea and D. Martin and E. Oswald and D. Page and M. Stam and and M. Tunstall}, title = {Simulatable Leakage: Analysis, Pitfalls, and new Constructions}, howpublished = {Cryptology ePrint Archive, Report 2014/357}, year = {2014}, url = {https://eprint.iacr.org/2014/357}, } @misc{cryptoeprint:2014:358, author = {Kim-Kwang Raymond Choo and Junghyun Nam and Dongho Won}, title = {A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols}, howpublished = {Cryptology ePrint Archive, Report 2014/358}, year = {2014}, url = {https://eprint.iacr.org/2014/358}, } @misc{cryptoeprint:2014:359, author = {Eduardo Ruiz Duarte and Octavio P\'{a}ez Osuna}, title = {Explicit endomorphism of the Jacobian of a hyperelliptic function field of genus 2 using base field operations}, howpublished = {Cryptology ePrint Archive, Report 2014/359}, year = {2014}, url = {https://eprint.iacr.org/2014/359}, } @misc{cryptoeprint:2014:360, author = {Danilo Gligoroski and Simona Samardjiska and H{\aa}kon Jacobsen and Sergey Bezzateev}, title = {McEliece in the world of Escher}, howpublished = {Cryptology ePrint Archive, Report 2014/360}, year = {2014}, url = {https://eprint.iacr.org/2014/360}, } @misc{cryptoeprint:2014:361, author = {Igor Semaev}, title = {New Results in the Linear Cryptanalysis of DES}, howpublished = {Cryptology ePrint Archive, Report 2014/361}, year = {2014}, url = {https://eprint.iacr.org/2014/361}, } @misc{cryptoeprint:2014:362, author = {Qiang Tang}, title = {Nothing is for Free: Security in Searching Shared & Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2014/362}, year = {2014}, url = {https://eprint.iacr.org/2014/362}, } @misc{cryptoeprint:2014:363, author = {Mridul Nandi}, title = {Forging Attacks on two Authenticated Encryptions COBRA and POET}, howpublished = {Cryptology ePrint Archive, Report 2014/363}, year = {2014}, url = {https://eprint.iacr.org/2014/363}, } @misc{cryptoeprint:2014:364, author = {Feng Hao and Dylan Clarke and Avelino Francisco Zorzo}, title = {Deleting Secret Data with Public Verifiability}, howpublished = {Cryptology ePrint Archive, Report 2014/364}, year = {2014}, url = {https://eprint.iacr.org/2014/364}, } @misc{cryptoeprint:2014:365, author = {Luke Mather and Elisabeth Oswald and Carolyn Whitnall}, title = {Multi-target DPA attacks: Pushing DPA beyond the limits of a desktop computer}, howpublished = {Cryptology ePrint Archive, Report 2014/365}, year = {2014}, url = {https://eprint.iacr.org/2014/365}, } @misc{cryptoeprint:2014:366, author = {Younsung Choi and Dongho Won}, title = {Cryptanalysis and Improvement on Robust Three-Factor Remote User Authentication Scheme with Key Agreement for Multimedia System}, howpublished = {Cryptology ePrint Archive, Report 2014/366}, year = {2014}, url = {https://eprint.iacr.org/2014/366}, } @misc{cryptoeprint:2014:367, author = {Kaushik Chakraborty and Sumanta Sarkar and Subhamoy Maitra and Bodhisatwa Mazumdar and Debdeep Mukhopadhyay and Emmanuel Prouff}, title = {Redefining the Transparency Order}, howpublished = {Cryptology ePrint Archive, Report 2014/367}, year = {2014}, url = {https://eprint.iacr.org/2014/367}, } @misc{cryptoeprint:2014:368, author = {Erich Wenger and Paul Wolfger}, title = {Solving the Discrete Logarithm of a 113-bit Koblitz Curve with an FPGA Cluster}, howpublished = {Cryptology ePrint Archive, Report 2014/368}, year = {2014}, url = {https://eprint.iacr.org/2014/368}, } @misc{cryptoeprint:2014:369, author = {Michèle Feltz and Cas Cremers}, title = {On the Limits of Authenticated Key Exchange Security with an Application to Bad Randomness}, howpublished = {Cryptology ePrint Archive, Report 2014/369}, year = {2014}, url = {https://eprint.iacr.org/2014/369}, } @misc{cryptoeprint:2014:370, author = {Ivan Damgård and Bernardo David and Irene Giacomelli and Jesper Buus Nielsen}, title = {Compact VSS and Efficient Homomorphic UC Commitments}, howpublished = {Cryptology ePrint Archive, Report 2014/370}, year = {2014}, url = {https://eprint.iacr.org/2014/370}, } @misc{cryptoeprint:2014:371, author = {Christophe Doche}, title = {On the Enumeration of Double-Base Chains with Applications to Elliptic Curve Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2014/371}, year = {2014}, url = {https://eprint.iacr.org/2014/371}, } @misc{cryptoeprint:2014:372, author = {Dennis Hofheinz}, title = {Fully secure constrained pseudorandom functions using random oracles}, howpublished = {Cryptology ePrint Archive, Report 2014/372}, year = {2014}, url = {https://eprint.iacr.org/2014/372}, } @misc{cryptoeprint:2014:373, author = {Philipp Jovanovic and Atul Luykx and Bart Mennink}, title = {Beyond 2^{c/2} Security in Sponge-Based Authenticated Encryption Modes}, howpublished = {Cryptology ePrint Archive, Report 2014/373}, year = {2014}, url = {https://eprint.iacr.org/2014/373}, } @misc{cryptoeprint:2014:374, author = {Viet Pham and MHR. Khouzani and Carlos Cid}, title = {Optimal Contracts for Outsourced Computation}, howpublished = {Cryptology ePrint Archive, Report 2014/374}, year = {2014}, url = {https://eprint.iacr.org/2014/374}, } @misc{cryptoeprint:2014:375, author = {Bingke Ma and Bao Li and Ronglin Hao and Xiaoqian Li}, title = {Improved Cryptanalysis on Reduced-Round GOST and Whirlpool Hash Function (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2014/375}, year = {2014}, url = {https://eprint.iacr.org/2014/375}, } @misc{cryptoeprint:2014:376, author = {Mihir Bellare and Rafael Dowsley and Sriram Keelveedhi}, title = {How Secure is Deterministic Encryption?}, howpublished = {Cryptology ePrint Archive, Report 2014/376}, year = {2014}, url = {https://eprint.iacr.org/2014/376}, } @misc{cryptoeprint:2014:377, author = {Boaz Shahar}, title = {Logic Synthesis based Public Key Scheme}, howpublished = {Cryptology ePrint Archive, Report 2014/377}, year = {2014}, url = {https://eprint.iacr.org/2014/377}, } @misc{cryptoeprint:2014:378, author = {SK Hafizul Islam}, title = {Attacks on Lin's Mobile Dynamic Identity-based Authenticated Key Agreement Scheme using Chebyshev Chaotic Maps}, howpublished = {Cryptology ePrint Archive, Report 2014/378}, year = {2014}, url = {https://eprint.iacr.org/2014/378}, } @misc{cryptoeprint:2014:379, author = {Daniel J. Bernstein and Tanja Lange}, title = {Hyper-and-elliptic-curve cryptography}, howpublished = {Cryptology ePrint Archive, Report 2014/379}, year = {2014}, url = {https://eprint.iacr.org/2014/379}, } @misc{cryptoeprint:2014:380, author = {Somindu C. Ramanna and Palash Sarkar}, title = {Efficient Adaptively Secure IBBE from Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2014/380}, year = {2014}, url = {https://eprint.iacr.org/2014/380}, } @misc{cryptoeprint:2014:381, author = {Christina Brzuska and Arno Mittelbach}, title = {Using Indistinguishability Obfuscation via UCEs}, howpublished = {Cryptology ePrint Archive, Report 2014/381}, year = {2014}, url = {https://eprint.iacr.org/2014/381}, } @misc{cryptoeprint:2014:382, author = {Felix Günther and Mark Manulis and Andreas Peter}, title = {Privacy-Enhanced Participatory Sensing with Collusion Resistance and Data Aggregation}, howpublished = {Cryptology ePrint Archive, Report 2014/382}, year = {2014}, url = {https://eprint.iacr.org/2014/382}, } @misc{cryptoeprint:2014:383, author = {Younsung Choi, Dongho Won}, title = {Cryptanalysis of and Improvement on Biometric-based User Authentication Scheme for C/S System}, howpublished = {Cryptology ePrint Archive, Report 2014/383}, year = {2014}, url = {https://eprint.iacr.org/2014/383}, } @misc{cryptoeprint:2014:384, author = {Dima Grigoriev and Vladimir Shpilrain}, title = {Yao's millionaires' problem and decoy-based public key encryption by classical physics}, howpublished = {Cryptology ePrint Archive, Report 2014/384}, year = {2014}, url = {https://eprint.iacr.org/2014/384}, } @misc{cryptoeprint:2014:385, author = {Huseyin Hisil and Craig Costello}, title = {Jacobian Coordinates on Genus 2 Curves}, howpublished = {Cryptology ePrint Archive, Report 2014/385}, year = {2014}, url = {https://eprint.iacr.org/2014/385}, } @misc{cryptoeprint:2014:386, author = {Nicky Mouha and Bart Mennink and Anthony Van Herrewege and Dai Watanabe and Bart Preneel and Ingrid Verbauwhede}, title = {Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers}, howpublished = {Cryptology ePrint Archive, Report 2014/386}, year = {2014}, url = {https://eprint.iacr.org/2014/386}, } @misc{cryptoeprint:2014:387, author = {Jaiberth Porras, John B. Baena, Jintai Ding}, title = {New candidates for multivariate trapdoor functions}, howpublished = {Cryptology ePrint Archive, Report 2014/387}, year = {2014}, url = {https://eprint.iacr.org/2014/387}, } @misc{cryptoeprint:2014:388, author = {Marko Carić}, title = {Finding collisions for MD4 hash algorithm using hybrid algorithm}, howpublished = {Cryptology ePrint Archive, Report 2014/388}, year = {2014}, url = {https://eprint.iacr.org/2014/388}, } @misc{cryptoeprint:2014:389, author = {Wei Dai and Yark{\i}n Dor\"{o}z and Berk Sunar}, title = {Accelerating NTRU based Homomorphic Encryption using GPUs}, howpublished = {Cryptology ePrint Archive, Report 2014/389}, year = {2014}, url = {https://eprint.iacr.org/2014/389}, } @misc{cryptoeprint:2014:390, author = {Vipul Goyal and Rafail Ostrovsky and Alessandra Scafuro and Ivan Visconti}, title = {Black-Box Non-Black-Box Zero Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2014/390}, year = {2014}, url = {https://eprint.iacr.org/2014/390}, } @misc{cryptoeprint:2014:391, author = {Chang Liu, Rajiv Ranjan, Chi Yang, Xuyun Zhang, Lizhe Wang, Jinjun Chen}, title = {MuR-DPA: Top-down Levelled Multi-replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud}, howpublished = {Cryptology ePrint Archive, Report 2014/391}, year = {2014}, url = {https://eprint.iacr.org/2014/391}, } @misc{cryptoeprint:2014:392, author = {Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng}, title = {The Randomized Iterate Revisited - Almost Linear Seed Length PRGs from A Broader Class of One-way Functions}, howpublished = {Cryptology ePrint Archive, Report 2014/392}, year = {2014}, url = {https://eprint.iacr.org/2014/392}, } @misc{cryptoeprint:2014:393, author = {Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng}, title = {(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-way Functions and Beyond}, howpublished = {Cryptology ePrint Archive, Report 2014/393}, year = {2014}, url = {https://eprint.iacr.org/2014/393}, } @misc{cryptoeprint:2014:394, author = {Avradip Mandal and Arnab Roy}, title = {Relational Hash}, howpublished = {Cryptology ePrint Archive, Report 2014/394}, year = {2014}, url = {https://eprint.iacr.org/2014/394}, } @misc{cryptoeprint:2014:395, author = {Jia Xu and Anjia Yang and Jianying Zhou and Duncan S. Wong}, title = {Lightweight and Privacy-Preserving Delegatable Proofs of Storage}, howpublished = {Cryptology ePrint Archive, Report 2014/395}, year = {2014}, url = {https://eprint.iacr.org/2014/395}, } @misc{cryptoeprint:2014:396, author = {Helger Lipmaa}, title = {Prover-Efficient Commit-And-Prove Zero-Knowledge SNARKs}, howpublished = {Cryptology ePrint Archive, Report 2014/396}, year = {2014}, url = {https://eprint.iacr.org/2014/396}, } @misc{cryptoeprint:2014:397, author = {Andrea Miele and Joppe W. Bos and Thorsten Kleinjung and Arjen K. Lenstra}, title = {Cofactorization on Graphics Processing Units}, howpublished = {Cryptology ePrint Archive, Report 2014/397}, year = {2014}, url = {https://eprint.iacr.org/2014/397}, } @misc{cryptoeprint:2014:398, author = {Taylor Daniels and Daniel Smith-Tone}, title = {Differential Properties of the HFE Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2014/398}, year = {2014}, url = {https://eprint.iacr.org/2014/398}, } @misc{cryptoeprint:2014:399, author = {Dustin Moody and Ray Perlner and Daniel Smith-Tone}, title = {An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2014/399}, year = {2014}, url = {https://eprint.iacr.org/2014/399}, } @misc{cryptoeprint:2014:400, author = {Peeter Laud and Jan Willemson}, title = {Composable Oblivious Extended Permutations}, howpublished = {Cryptology ePrint Archive, Report 2014/400}, year = {2014}, url = {https://eprint.iacr.org/2014/400}, } @misc{cryptoeprint:2014:401, author = {Eric Zavattoni and Luis J. Dominguez Perez and Shigeo Mitsunari and Ana H. Sánchez-Ramírez and Tadanori Teruya and Francisco Rodríguez-Henríquez}, title = {Software implementation of an Attribute-Based Encryption scheme}, howpublished = {Cryptology ePrint Archive, Report 2014/401}, year = {2014}, url = {https://eprint.iacr.org/2014/401}, } @misc{cryptoeprint:2014:402, author = {Nir Bitansky and Ran Canetti and Omer Paneth and Alon Rosen}, title = {On the Existence of Extractable One-Way Functions}, howpublished = {Cryptology ePrint Archive, Report 2014/402}, year = {2014}, url = {https://eprint.iacr.org/2014/402}, } @misc{cryptoeprint:2014:403, author = {Thomas Peyrin and Lei Wang}, title = {Generic Universal Forgery Attack on Iterative Hash-based MACs}, howpublished = {Cryptology ePrint Archive, Report 2014/403}, year = {2014}, url = {https://eprint.iacr.org/2014/403}, } @misc{cryptoeprint:2014:404, author = {Elette Boyle and Kai-Min Chung and Rafael Pass}, title = {Large-Scale Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2014/404}, year = {2014}, url = {https://eprint.iacr.org/2014/404}, } @misc{cryptoeprint:2014:405, author = {Christina Brzuska and Arno Mittelbach}, title = {Indistinguishability Obfuscation versus Multi-Bit Point Obfuscation with Auxiliary Input}, howpublished = {Cryptology ePrint Archive, Report 2014/405}, year = {2014}, url = {https://eprint.iacr.org/2014/405}, } @misc{cryptoeprint:2014:406, author = {Gaëtan Leurent and Thomas Peyrin and Lei Wang}, title = {New Generic Attacks Against Hash-based MACs}, howpublished = {Cryptology ePrint Archive, Report 2014/406}, year = {2014}, url = {https://eprint.iacr.org/2014/406}, } @misc{cryptoeprint:2014:407, author = {Fu-Kuo Tseng and Rong-Jaye Chen and Bao-Shuh Paul Lin}, title = {Towards Symmetric Functional Encryption for Regular Languages with Predicate Privacy}, howpublished = {Cryptology ePrint Archive, Report 2014/407}, year = {2014}, url = {https://eprint.iacr.org/2014/407}, } @misc{cryptoeprint:2014:408, author = {Emmanuela Orsini and Joop van de Pol and Nigel P. Smart}, title = {Bootstrapping BGV Ciphertexts with a Wider Choice of p and q}, howpublished = {Cryptology ePrint Archive, Report 2014/408}, year = {2014}, url = {https://eprint.iacr.org/2014/408}, } @misc{cryptoeprint:2014:409, author = {Amir Moradi and François-Xavier Standaert}, title = {Moments-Correlating DPA}, howpublished = {Cryptology ePrint Archive, Report 2014/409}, year = {2014}, url = {https://eprint.iacr.org/2014/409}, } @misc{cryptoeprint:2014:410, author = {Nicolas Veyrat-Charvillon and Benoît Gérard and François-Xavier Standaert}, title = {Soft Analytical Side-Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2014/410}, year = {2014}, url = {https://eprint.iacr.org/2014/410}, } @misc{cryptoeprint:2014:411, author = {Vincent Grosso and Romain Poussier and François-Xavier Standaert and Lubos Gaspar}, title = {Combining Leakage-Resilient PRFs and Shuffling (Towards Bounded Security for Small Embedded Devices)}, howpublished = {Cryptology ePrint Archive, Report 2014/411}, year = {2014}, url = {https://eprint.iacr.org/2014/411}, } @misc{cryptoeprint:2014:412, author = {François Durvaux and François-Xavier Standaert and Nicolas Veyrat-Charvillon and Jean-Baptiste Mairy and Yves Deville}, title = {Efficient Selection of Time Samples for Higher-Order DPA with Projection Pursuits}, howpublished = {Cryptology ePrint Archive, Report 2014/412}, year = {2014}, url = {https://eprint.iacr.org/2014/412}, } @misc{cryptoeprint:2014:413, author = {Josep Balasch and Benedikt Gierlichs and Vincent Grosso and Oscar Reparaz and François-Xavier Standaert}, title = {On the Cost of Lazy Engineering for Masked Software Implementations}, howpublished = {Cryptology ePrint Archive, Report 2014/413}, year = {2014}, url = {https://eprint.iacr.org/2014/413}, } @misc{cryptoeprint:2014:414, author = {Vikram Singh}, title = {A Security Proof of KCDSA using an extended Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2014/414}, year = {2014}, url = {https://eprint.iacr.org/2014/414}, } @misc{cryptoeprint:2014:415, author = {Ulrich Rührmair}, title = {Virtual Proofs of Reality}, howpublished = {Cryptology ePrint Archive, Report 2014/415}, year = {2014}, url = {https://eprint.iacr.org/2014/415}, } @misc{cryptoeprint:2014:416, author = {Georg Fuchsbauer and Momchil Konstantinov and Krzysztof Pietrzak and Vanishree Rao}, title = {Adaptive Security of Constrained PRFs}, howpublished = {Cryptology ePrint Archive, Report 2014/416}, year = {2014}, url = {https://eprint.iacr.org/2014/416}, } @misc{cryptoeprint:2014:417, author = {Inna Polak, Adi Shamir}, title = {Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions}, howpublished = {Cryptology ePrint Archive, Report 2014/417}, year = {2014}, url = {https://eprint.iacr.org/2014/417}, } @misc{cryptoeprint:2014:418, author = {Benny Pinkas and Tzachy Reinman}, title = {A Simple Recursive Tree Oblivious RAM}, howpublished = {Cryptology ePrint Archive, Report 2014/418}, year = {2014}, url = {https://eprint.iacr.org/2014/418}, } @misc{cryptoeprint:2014:419, author = {J\'er\'emie Detrey}, title = {FFS Factory: Adapting Coppersmith's "Factorization Factory" to the Function Field Sieve}, howpublished = {Cryptology ePrint Archive, Report 2014/419}, year = {2014}, url = {https://eprint.iacr.org/2014/419}, } @misc{cryptoeprint:2014:420, author = {Xiang Xie and Rui Xue}, title = {Bounded Fully Homomorphic Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2014/420}, year = {2014}, url = {https://eprint.iacr.org/2014/420}, } @misc{cryptoeprint:2014:421, author = {Sashank Dara, Scott Fluhrer}, title = {FNR : Arbitrary length small domain block cipher proposal}, howpublished = {Cryptology ePrint Archive, Report 2014/421}, year = {2014}, url = {https://eprint.iacr.org/2014/421}, } @misc{cryptoeprint:2014:422, author = {Gilles Barthe and Gustavo Betarte and Juan Diego Campo and Carlos Luna and David Pichardie}, title = {System-level non-interference for constant-time cryptography}, howpublished = {Cryptology ePrint Archive, Report 2014/422}, year = {2014}, url = {https://eprint.iacr.org/2014/422}, } @misc{cryptoeprint:2014:423, author = {Shai Halevi and William E. Hall and Charanjit S. Jutla}, title = {The Hash Function "Fugue"}, howpublished = {Cryptology ePrint Archive, Report 2014/423}, year = {2014}, url = {https://eprint.iacr.org/2014/423}, } @misc{cryptoeprint:2014:424, author = {Craig Costello and Alyson Deines-Schartz and Kristin Lauter and Tonghai Yang}, title = {Constructing Abelian Surfaces for Cryptography via Rosenhain Invariants}, howpublished = {Cryptology ePrint Archive, Report 2014/424}, year = {2014}, url = {https://eprint.iacr.org/2014/424}, } @misc{cryptoeprint:2014:425, author = {Long Wen and Meiqin Wang and Andrey Bogdanov and Huaifeng Chen}, title = {Note of Multidimensional MITM Attack on 25-Round TWINE-128}, howpublished = {Cryptology ePrint Archive, Report 2014/425}, year = {2014}, url = {https://eprint.iacr.org/2014/425}, } @misc{cryptoeprint:2014:426, author = {Ivan Damg{\aa}rd and Sunoo Park}, title = {Towards Optimally Efficient Secret-Key Authentication from PRG}, howpublished = {Cryptology ePrint Archive, Report 2014/426}, year = {2014}, url = {https://eprint.iacr.org/2014/426}, } @misc{cryptoeprint:2014:427, author = {Thomaz Oliveira and Diego F. Aranha and Julio López and Francisco Rodríguez-Henríquez}, title = {Fast point multiplication algorithms for binary elliptic curves with and without precomputation}, howpublished = {Cryptology ePrint Archive, Report 2014/427}, year = {2014}, url = {https://eprint.iacr.org/2014/427}, } @misc{cryptoeprint:2014:428, author = {Nuttapong Attrapadung}, title = {Dual System Encryption via Doubly Selective Security: Framework, Fully-secure Functional Encryption for Regular Languages, and More}, howpublished = {Cryptology ePrint Archive, Report 2014/428}, year = {2014}, url = {https://eprint.iacr.org/2014/428}, } @misc{cryptoeprint:2014:429, author = {Jan Camenisch and Anja Lehmann and Anna Lysyanskaya and Gregory Neven}, title = {Memento: How to Reconstruct your Secrets from a Single Password in a Hostile Environment}, howpublished = {Cryptology ePrint Archive, Report 2014/429}, year = {2014}, url = {https://eprint.iacr.org/2014/429}, } @misc{cryptoeprint:2014:430, author = {H. W. Lenstra and A. Silverberg}, title = {Revisiting the Gentry-Szydlo Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2014/430}, year = {2014}, url = {https://eprint.iacr.org/2014/430}, } @misc{cryptoeprint:2014:431, author = {Christopher W. Fletcher and Ling Ren and Albert Kwon and Marten van Dijk and Emil Stefanov and Dimitrios Serpanos  and Srinivas Devadas}, title = {A Low-Latency, Low-Area Hardware Oblivious RAM Controller}, howpublished = {Cryptology ePrint Archive, Report 2014/431}, year = {2014}, url = {https://eprint.iacr.org/2014/431}, } @misc{cryptoeprint:2014:432, author = {Ran Canetti and Daniel Shahaf and Margarita Vald}, title = {Universally Composable Authentication and Key-exchange with Global PKI}, howpublished = {Cryptology ePrint Archive, Report 2014/432}, year = {2014}, url = {https://eprint.iacr.org/2014/432}, } @misc{cryptoeprint:2014:433, author = {A. Adam Ding and Liwei Zhang and Yunsi Fei and Pei Luo}, title = {A Statistical Model for Higher Order DPA on Masked Devices}, howpublished = {Cryptology ePrint Archive, Report 2014/433}, year = {2014}, url = {https://eprint.iacr.org/2014/433}, } @misc{cryptoeprint:2014:434, author = {Joop van de Pol and Nigel P. Smart and Yuval Yarom}, title = {Just a Little Bit More}, howpublished = {Cryptology ePrint Archive, Report 2014/434}, year = {2014}, url = {https://eprint.iacr.org/2014/434}, } @misc{cryptoeprint:2014:435, author = {Gorka Irazoqui and Mehmet Sinan Inci and Thomas Eisenbarth and Berk Sunar}, title = {Wait a minute! A fast, Cross-VM attack on AES}, howpublished = {Cryptology ePrint Archive, Report 2014/435}, year = {2014}, url = {https://eprint.iacr.org/2014/435}, } @misc{cryptoeprint:2014:436, author = {Gilles Barthe and Francois Dupressoir and Pierre-Alain Fouque and Benjamin Gregoire and Jean-Christophe Zapalowicz}, title = {Synthesis of Fault Attacks on Cryptographic Implementations}, howpublished = {Cryptology ePrint Archive, Report 2014/436}, year = {2014}, url = {https://eprint.iacr.org/2014/436}, } @misc{cryptoeprint:2014:437, author = {Jingguo Bi and Jean-S\'ebastien Coron and Jean-Charles Faug\`ere and Phong Q. Nguyen and Gu\'ena\"el Renault and Rina Zeitoun}, title = {Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences}, howpublished = {Cryptology ePrint Archive, Report 2014/437}, year = {2014}, url = {https://eprint.iacr.org/2014/437}, } @misc{cryptoeprint:2014:438, author = {Mihir Bellare and Kenneth Paterson and Phillip Rogaway}, title = {Security of Symmetric Encryption against Mass Surveillance}, howpublished = {Cryptology ePrint Archive, Report 2014/438}, year = {2014}, url = {https://eprint.iacr.org/2014/438}, } @misc{cryptoeprint:2014:439, author = {Chunming Tang, Yuenai Chen}, title = {Efficient Non-Interactive Verifiable Outsourced Computation for Arbitrary Functions}, howpublished = {Cryptology ePrint Archive, Report 2014/439}, year = {2014}, url = {https://eprint.iacr.org/2014/439}, } @misc{cryptoeprint:2014:440, author = {Jean-Claude Bajard and Nabil Merkiche}, title = {Double Level Montgomery Cox-Rower Architecture, New Bounds}, howpublished = {Cryptology ePrint Archive, Report 2014/440}, year = {2014}, url = {https://eprint.iacr.org/2014/440}, } @misc{cryptoeprint:2014:441, author = {Itai Dinur and Gaëtan Leurent}, title = {Improved Generic Attacks Against Hash-based MACs and HAIFA}, howpublished = {Cryptology ePrint Archive, Report 2014/441}, year = {2014}, url = {https://eprint.iacr.org/2014/441}, } @misc{cryptoeprint:2014:442, author = {Xing Hu and Chunming Tang}, title = {Secure Outsourced Computation of the Characteristic Polynomial and Eigenvalues of Matrix}, howpublished = {Cryptology ePrint Archive, Report 2014/442}, year = {2014}, url = {https://eprint.iacr.org/2014/442}, } @misc{cryptoeprint:2014:443, author = {Shan Chen and Rodolphe Lampe and Jooyoung Lee and Yannick Seurin and John P. Steinberger}, title = {Minimizing the Two-Round Even-Mansour Cipher}, howpublished = {Cryptology ePrint Archive, Report 2014/443}, year = {2014}, url = {https://eprint.iacr.org/2014/443}, } @misc{cryptoeprint:2014:444, author = {Aanchal Malhotra and Sharon Goldberg }, title = {RPKI vs ROVER: Comparing the Risks of BGP Security Solutions}, howpublished = {Cryptology ePrint Archive, Report 2014/444}, year = {2014}, url = {https://eprint.iacr.org/2014/444}, } @misc{cryptoeprint:2014:445, author = {Gottfried Herold and Julia Hesse and Dennis Hofheinz and Carla Ràfols and Andy Rupp}, title = {Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations}, howpublished = {Cryptology ePrint Archive, Report 2014/445}, year = {2014}, url = {https://eprint.iacr.org/2014/445}, } @misc{cryptoeprint:2014:446, author = {Valerie Nachef and Jacques Patarin and Emmanuel Volte}, title = {4-point Attacks with Standard Deviation Analysis on A-Feistel Schemes}, howpublished = {Cryptology ePrint Archive, Report 2014/446}, year = {2014}, url = {https://eprint.iacr.org/2014/446}, } @misc{cryptoeprint:2014:447, author = {Benny Pinkas and Thomas Schneider and Michael Zohner}, title = {Faster Private Set Intersection based on OT Extension}, howpublished = {Cryptology ePrint Archive, Report 2014/447}, year = {2014}, url = {https://eprint.iacr.org/2014/447}, } @misc{cryptoeprint:2014:448, author = {Ning Wang and Xiaoyun Wang and Keting Jia and Jingyuan Zhao}, title = {Differential Attacks on Reduced SIMON Versions with Dynamic Key-guessing Techniques}, howpublished = {Cryptology ePrint Archive, Report 2014/448}, year = {2014}, url = {https://eprint.iacr.org/2014/448}, } @misc{cryptoeprint:2014:449, author = {Dingding Jia, Bao Li, Xianhui Lu, Qixiang Mei}, title = {Related Key Secure PKE from Hash Proof Systems}, howpublished = {Cryptology ePrint Archive, Report 2014/449}, year = {2014}, url = {https://eprint.iacr.org/2014/449}, } @misc{cryptoeprint:2014:450, author = {Lein Harn and Ching-Fang Hsu*}, title = {Optimized Implementation of General Secret Sharing Scheme}, howpublished = {Cryptology ePrint Archive, Report 2014/450}, year = {2014}, url = {https://eprint.iacr.org/2014/450}, } @misc{cryptoeprint:2014:451, author = {Daniel Wichs}, title = {Leveled Fully Homomorphic Signatures from Standard Lattices}, howpublished = {Cryptology ePrint Archive, Report 2014/451}, year = {2014}, url = {https://eprint.iacr.org/2014/451}, } @misc{cryptoeprint:2014:452, author = {Iddo Bentov and Charles Lee and Alex Mizrahi and Meni Rosenfeld}, title = {Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake}, howpublished = {Cryptology ePrint Archive, Report 2014/452}, year = {2014}, url = {https://eprint.iacr.org/2014/452}, } @misc{cryptoeprint:2014:453, author = {Martin R. Albrecht and Benedikt Driessen and Elif Bilge Kavun and Gregor Leander and Christof Paar and Tolga Yalçın}, title = {Block Ciphers - Focus On The Linear Layer (feat. PRIDE): Full Version}, howpublished = {Cryptology ePrint Archive, Report 2014/453}, year = {2014}, url = {https://eprint.iacr.org/2014/453}, } @misc{cryptoeprint:2014:454, author = {Amir Moradi and Vincent Immler}, title = {Early Propagation and Imbalanced Routing, How to Diminish in FPGAs}, howpublished = {Cryptology ePrint Archive, Report 2014/454}, year = {2014}, url = {https://eprint.iacr.org/2014/454}, } @misc{cryptoeprint:2014:455, author = {Yi-Kai Liu}, title = {Single-shot security for one-time memories in the isolated qubits model}, howpublished = {Cryptology ePrint Archive, Report 2014/455}, year = {2014}, url = {https://eprint.iacr.org/2014/455}, } @misc{cryptoeprint:2014:456, author = {José Bacelar Almeida and Manuel Barbosa and Gilles Barthe and Guillaume Davy and François Dupressoir and Benjamin Grégoire and Pierre-Yves Strub}, title = {Verified Implementations for Secure and Verifiable Computation}, howpublished = {Cryptology ePrint Archive, Report 2014/456}, year = {2014}, url = {https://eprint.iacr.org/2014/456}, } @misc{cryptoeprint:2014:457, author = {Jeff Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte}, title = {Transcript secure signatures based on modular lattices}, howpublished = {Cryptology ePrint Archive, Report 2014/457}, year = {2014}, url = {https://eprint.iacr.org/2014/457}, } @misc{cryptoeprint:2014:458, author = {Gilles Barthe and Edvard Fagerholm and Dario Fiore and John Mitchell and Andre Scedrov and Benedikt Schmidt}, title = {Automated Analysis of Cryptographic Assumptions in Generic Group Models}, howpublished = {Cryptology ePrint Archive, Report 2014/458}, year = {2014}, url = {https://eprint.iacr.org/2014/458}, } @misc{cryptoeprint:2014:459, author = {Omar Choudary and Markus G. Kuhn}, title = {Template Attacks on Different Devices}, howpublished = {Cryptology ePrint Archive, Report 2014/459}, year = {2014}, url = {https://eprint.iacr.org/2014/459}, } @misc{cryptoeprint:2014:460, author = {Vladimir Kolesnikov and Payman Mohassel and Mike Rosulek}, title = {FleXOR: Flexible garbling for XOR gates that beats free-XOR}, howpublished = {Cryptology ePrint Archive, Report 2014/460}, year = {2014}, url = {https://eprint.iacr.org/2014/460}, } @misc{cryptoeprint:2014:461, author = {Lin Cheng and Qiaoyan Wen and Zhengping Jin and Hua Zhang}, title = {Provably secure and efficient certificateless signature in the standard model}, howpublished = {Cryptology ePrint Archive, Report 2014/461}, year = {2014}, url = {https://eprint.iacr.org/2014/461}, } @misc{cryptoeprint:2014:462, author = {Constantin Catalin Dragan and Ferucio Laurentiu Tiplea}, title = {Efficient Key-policy Attribute-based Encryption for General Boolean Circuits from Multilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2014/462}, year = {2014}, url = {https://eprint.iacr.org/2014/462}, } @misc{cryptoeprint:2014:463, author = {Sergey Gorbunov and Vinod Vaikuntanathan}, title = {(Leveled) Fully Homomorphic Signatures from Lattices}, howpublished = {Cryptology ePrint Archive, Report 2014/463}, year = {2014}, url = {https://eprint.iacr.org/2014/463}, } @misc{cryptoeprint:2014:464, author = {Shijun Zhao and Qianying Zhang and Guangyao Hu and Yu Qin and Dengguo Feng}, title = {Providing Root of Trust for ARM TrustZone using On-Chip SRAM}, howpublished = {Cryptology ePrint Archive, Report 2014/464}, year = {2014}, url = {https://eprint.iacr.org/2014/464}, } @misc{cryptoeprint:2014:465, author = {Jie Chen and Hoeteck Wee}, title = {Semi-Adaptive Attribute-Based Encryption and Improved Delegation for Boolean Formula}, howpublished = {Cryptology ePrint Archive, Report 2014/465}, year = {2014}, url = {https://eprint.iacr.org/2014/465}, } @misc{cryptoeprint:2014:466, author = {Samir Bouftass and Abdelhak Azhari}, title = {On a new properties of number sequences ,a randomness test and a new RC4's key scheduling algorithm.}, howpublished = {Cryptology ePrint Archive, Report 2014/466}, year = {2014}, url = {https://eprint.iacr.org/2014/466}, } @misc{cryptoeprint:2014:467, author = {Daniel Demmler and Thomas Schneider and Michael Zohner}, title = {Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens}, howpublished = {Cryptology ePrint Archive, Report 2014/467}, year = {2014}, url = {https://eprint.iacr.org/2014/467}, } @misc{cryptoeprint:2014:468, author = {Jan Camenisch, Anja Lehmann, Gregory Neven, Alfredo Rial}, title = {Privacy-Preserving Auditing for Attribute-Based Credentials}, howpublished = {Cryptology ePrint Archive, Report 2014/468}, year = {2014}, url = {https://eprint.iacr.org/2014/468}, } @misc{cryptoeprint:2014:469, author = {Dario Catalano, Dario Fiore, and Bogdan Warinschi}, title = {Homomorphic Signatures with Efficient Verification for Polynomial Functions}, howpublished = {Cryptology ePrint Archive, Report 2014/469}, year = {2014}, url = {https://eprint.iacr.org/2014/469}, } @misc{cryptoeprint:2014:470, author = {Jinguang Han and Willy Susilo and Yi Mu and Jianying Zhou and Man Ho Au}, title = {PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2014/470}, year = {2014}, url = {https://eprint.iacr.org/2014/470}, } @misc{cryptoeprint:2014:471, author = {Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei, and Xiaodong Lin}, title = {Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability}, howpublished = {Cryptology ePrint Archive, Report 2014/471}, year = {2014}, url = {https://eprint.iacr.org/2014/471}, } @misc{cryptoeprint:2014:472, author = {Ryo Nishimaki}, title = {How to Watermark Cryptographic Functions}, howpublished = {Cryptology ePrint Archive, Report 2014/472}, year = {2014}, url = {https://eprint.iacr.org/2014/472}, } @misc{cryptoeprint:2014:473, author = {Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo}, title = {An Efficient Cloud-based Revocable Identity-based Proxy Re-encryption Scheme for Public Clouds Data Sharing}, howpublished = {Cryptology ePrint Archive, Report 2014/473}, year = {2014}, url = {https://eprint.iacr.org/2014/473}, } @misc{cryptoeprint:2014:474, author = {Alex Biryukov and Charles Bouillaguet and Dmitry Khovratovich}, title = {Cryptographic Schemes Based on the ASASA Structure: Black-box, White-box, and Public-key}, howpublished = {Cryptology ePrint Archive, Report 2014/474}, year = {2014}, url = {https://eprint.iacr.org/2014/474}, } @misc{cryptoeprint:2014:475, author = {Imran Erguler}, title = {A Key Recovery Attack on Error Correcting Code Based a Lightweight Security Protocol}, howpublished = {Cryptology ePrint Archive, Report 2014/475}, year = {2014}, url = {https://eprint.iacr.org/2014/475}, } @misc{cryptoeprint:2014:476, author = {Paul Baecher}, title = {Simon's Circuit}, howpublished = {Cryptology ePrint Archive, Report 2014/476}, year = {2014}, url = {https://eprint.iacr.org/2014/476}, } @misc{cryptoeprint:2014:477, author = {Omkant Pandey and Kim Ramchen and Brent Waters}, title = {Relaxed Two-to-one Recoding Schemes}, howpublished = {Cryptology ePrint Archive, Report 2014/477}, year = {2014}, url = {https://eprint.iacr.org/2014/477}, } @misc{cryptoeprint:2014:478, author = {Benny Applebaum and Eyal Widder}, title = {Related-Key Secure Pseudorandom Functions: The Case of Additive Attacks}, howpublished = {Cryptology ePrint Archive, Report 2014/478}, year = {2014}, url = {https://eprint.iacr.org/2014/478}, } @misc{cryptoeprint:2014:479, author = {Giorgia Azzurra Marson and Bertram Poettering}, title = {Even more practical secure logging: Tree-based Seekable Sequential Key Generators}, howpublished = {Cryptology ePrint Archive, Report 2014/479}, year = {2014}, url = {https://eprint.iacr.org/2014/479}, } @misc{cryptoeprint:2014:480, author = {Shashank Agrawal and Shweta Agrawal and Manoj Prabhakaran}, title = {Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2014/480}, year = {2014}, url = {https://eprint.iacr.org/2014/480}, } @misc{cryptoeprint:2014:481, author = {Eduarda S.V. Freire and Julia Hesse and Dennis Hofheinz}, title = {Universally Composable Non-Interactive Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2014/481}, year = {2014}, url = {https://eprint.iacr.org/2014/481}, } @misc{cryptoeprint:2014:482, author = {Fabienne Eigner and Aniket Kate and Matteo Maffei and Francesca Pampaloni and Ivan Pryvalov}, title = {Differentially Private Data Aggregation with Optimal Utility}, howpublished = {Cryptology ePrint Archive, Report 2014/482}, year = {2014}, url = {https://eprint.iacr.org/2014/482}, } @misc{cryptoeprint:2014:483, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, title = {Disjunctions for Hash Proof Systems: New Constructions and Applications}, howpublished = {Cryptology ePrint Archive, Report 2014/483}, year = {2014}, url = {https://eprint.iacr.org/2014/483}, } @misc{cryptoeprint:2014:484, author = {Carlos Aguilar Melchor and Xavier Boyen and Jean-Christophe Deneuville and Philippe Gaborit}, title = {Sealing the Leak on Classical NTRU Signatures}, howpublished = {Cryptology ePrint Archive, Report 2014/484}, year = {2014}, url = {https://eprint.iacr.org/2014/484}, } @misc{cryptoeprint:2014:485, author = {Shahram Rasoolzadeh, Zahra Ahmadian, Mahmood Salmasizadeh, and Mohammad Reza Aref}, title = {An Improved Truncated Di fferential Cryptanalysis of KLEIN}, howpublished = {Cryptology ePrint Archive, Report 2014/485}, year = {2014}, url = {https://eprint.iacr.org/2014/485}, } @misc{cryptoeprint:2014:486, author = {Diego F. Aranha and Pierre-Alain Fouque and Chen Qian and Mehdi Tibouchi and Jean-Christophe Zapalowicz}, title = {Binary Elligator Squared}, howpublished = {Cryptology ePrint Archive, Report 2014/486}, year = {2014}, url = {https://eprint.iacr.org/2014/486}, } @misc{cryptoeprint:2014:487, author = {Adeline Langlois and Damien Stehle and Ron Steinfeld}, title = {GGHLite: More Efficient Multilinear Maps from Ideal Lattices}, howpublished = {Cryptology ePrint Archive, Report 2014/487}, year = {2014}, url = {https://eprint.iacr.org/2014/487}, } @misc{cryptoeprint:2014:488, author = {Michel Abdalla and Fabrice Benhamouda and Alain Passelègue and Kenneth G. Paterson}, title = {Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier}, howpublished = {Cryptology ePrint Archive, Report 2014/488}, year = {2014}, url = {https://eprint.iacr.org/2014/488}, } @misc{cryptoeprint:2014:489, author = {Dan Ding and Guizhen Zhu and Xiaoyun Wang}, title = {A Genetic Algorithm for Searching Shortest Lattice Vector of SVP Challenge}, howpublished = {Cryptology ePrint Archive, Report 2014/489}, year = {2014}, url = {https://eprint.iacr.org/2014/489}, } @misc{cryptoeprint:2014:490, author = {Shijun Zhao and Qianying Zhang and Yu Qin and Dengguo Feng}, title = {Universally Composable secure TNC protocol based on IF-T binding to TLS}, howpublished = {Cryptology ePrint Archive, Report 2014/490}, year = {2014}, url = {https://eprint.iacr.org/2014/490}, } @misc{cryptoeprint:2014:491, author = {Michael Clear and Ciar\'{a}n McGoldrick}, title = {Bootstrappable Identity-Based Fully Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2014/491}, year = {2014}, url = {https://eprint.iacr.org/2014/491}, } @misc{cryptoeprint:2014:492, author = {Sanjit Chatterjee and Koray Karabina and Alfred Menezes}, title = {Fault attacks on pairing-based protocols revisited}, howpublished = {Cryptology ePrint Archive, Report 2014/492}, year = {2014}, url = {https://eprint.iacr.org/2014/492}, } @misc{cryptoeprint:2014:493, author = {David Lubicz and Damien Robert}, title = {Arithmetic on Abelian and Kummer Varieties}, howpublished = {Cryptology ePrint Archive, Report 2014/493}, year = {2014}, url = {https://eprint.iacr.org/2014/493}, } @misc{cryptoeprint:2014:494, author = {San Ling and Duong Hieu Phan and Damien Stehle and Ron Steinfeld}, title = {Hardness of k-LWE and Applications in Traitor Tracing}, howpublished = {Cryptology ePrint Archive, Report 2014/494}, year = {2014}, url = {https://eprint.iacr.org/2014/494}, } @misc{cryptoeprint:2014:495, author = {Léo Ducas and Daniele Micciancio}, title = {Improved Short Lattice Signatures in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2014/495}, year = {2014}, url = {https://eprint.iacr.org/2014/495}, } @misc{cryptoeprint:2014:496, author = {Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh and Willy Susilo}, title = {Security Pitfalls of a Provably Secure Identity-based Multi-Proxy Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2014/496}, year = {2014}, url = {https://eprint.iacr.org/2014/496}, } @misc{cryptoeprint:2014:497, author = {Xiaofei Guo , Debdeep Mukhopadhyay , Chenglu Jin and Ramesh Karri}, title = {NREPO:Normal Basis Recomputing with Permuted Operands}, howpublished = {Cryptology ePrint Archive, Report 2014/497}, year = {2014}, url = {https://eprint.iacr.org/2014/497}, } @misc{cryptoeprint:2014:498, author = {Souvik Kolay and Debdeep Mukhopadhyay}, title = {Lightweight Diffusion Layer from the $k^{th}$ root of the MDS Matrix}, howpublished = {Cryptology ePrint Archive, Report 2014/498}, year = {2014}, url = {https://eprint.iacr.org/2014/498}, } @misc{cryptoeprint:2014:499, author = {Mehmet Sabır Kiraz and Ziya Alper Genç and Süleyman Kardaş}, title = {Security and Efficiency Analysis of The Hamming Distance Computation Protocol Based On Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2014/499}, year = {2014}, url = {https://eprint.iacr.org/2014/499}, } @misc{cryptoeprint:2014:500, author = {Can Xiang and Chunming Tang}, title = {Verifiable and Secure Outsourcing Schemes of Modular Exponentiations Using One Untrusted Cloud Server and Their Application}, howpublished = {Cryptology ePrint Archive, Report 2014/500}, year = {2014}, url = {https://eprint.iacr.org/2014/500}, } @misc{cryptoeprint:2014:501, author = {Markku--Juhani O. Saarinen and Billy Bob Brumley}, title = {WHIRLBOB, the Whirlpool based Variant of STRIBOB: Lighter, Faster, and Constant Time}, howpublished = {Cryptology ePrint Archive, Report 2014/501}, year = {2014}, url = {https://eprint.iacr.org/2014/501}, } @misc{cryptoeprint:2014:502, author = {Igor Bilogrevic and Julien Freudiger and Emiliano De Cristofaro and Ersin Uzun}, title = {What's the Gist? Privacy-Preserving Aggregation of User Profiles}, howpublished = {Cryptology ePrint Archive, Report 2014/502}, year = {2014}, url = {https://eprint.iacr.org/2014/502}, } @misc{cryptoeprint:2014:503, author = {Tran Viet Xuan Phuong and Guomin Yang and Willy Susilo}, title = {Efficient Hidden Vector Encryption with Constant-Size Ciphertext}, howpublished = {Cryptology ePrint Archive, Report 2014/503}, year = {2014}, url = {https://eprint.iacr.org/2014/503}, } @misc{cryptoeprint:2014:504, author = {Thomas Shrimpton and R. Seth Terashima}, title = {A Provable Security Analysis of Intel's Secure Key RNG}, howpublished = {Cryptology ePrint Archive, Report 2014/504}, year = {2014}, url = {https://eprint.iacr.org/2014/504}, } @misc{cryptoeprint:2014:505, author = {David Kohel, Kristin Lauter, Christophe Petit, Jean-Pierre Tignol}, title = {On the quaternion $\ell$-isogeny path problem}, howpublished = {Cryptology ePrint Archive, Report 2014/505}, year = {2014}, url = {https://eprint.iacr.org/2014/505}, } @misc{cryptoeprint:2014:506, author = {Christophe Petit}, title = {Finding Roots in GF(p^n) with the Successive Resultant Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2014/506}, year = {2014}, url = {https://eprint.iacr.org/2014/506}, } @misc{cryptoeprint:2014:507, author = {Dennis Hofheinz and Tibor Jager and Dakshita Khurana and Amit Sahai and Brent Waters and Mark Zhandry}, title = {How to Generate and use Universal Samplers}, howpublished = {Cryptology ePrint Archive, Report 2014/507}, year = {2014}, url = {https://eprint.iacr.org/2014/507}, } @misc{cryptoeprint:2014:508, author = {Takeshi Sugawara and Daisuke Suzuki and Ryoichi Fujii and Shigeaki Tawa and Ryohei Hori and Mitsuru Shiozaki and Takeshi Fujino}, title = {Reversing Stealthy Dopant-Level Circuits}, howpublished = {Cryptology ePrint Archive, Report 2014/508}, year = {2014}, url = {https://eprint.iacr.org/2014/508}, } @misc{cryptoeprint:2014:509, author = {Kaoutar Elkhiyaoui and Melek Onen and Refik Molva}, title = {Privacy preserving delegated word search in the cloud}, howpublished = {Cryptology ePrint Archive, Report 2014/509}, year = {2014}, url = {https://eprint.iacr.org/2014/509}, } @misc{cryptoeprint:2014:510, author = {Pratish Datta and Dibyendu Roy and Sourav Mukhopadhyay}, title = {A Probabilistic Algebraic Attack on the Grain Family of Stream Cipher}, howpublished = {Cryptology ePrint Archive, Report 2014/510}, year = {2014}, url = {https://eprint.iacr.org/2014/510}, } @misc{cryptoeprint:2014:511, author = {Johannes Blömer and Gennadij Liske}, title = {Constructing CCA-secure predicate encapsulation schemes from CPA-secure schemes and universal one-way hash functions}, howpublished = {Cryptology ePrint Archive, Report 2014/511}, year = {2014}, url = {https://eprint.iacr.org/2014/511}, } @misc{cryptoeprint:2014:512, author = {Dan Bogdanov and Liina Kamm and Sven Laur and Ville Sokk}, title = {Rmind: a tool for cryptographically secure statistical analysis}, howpublished = {Cryptology ePrint Archive, Report 2014/512}, year = {2014}, url = {https://eprint.iacr.org/2014/512}, } @misc{cryptoeprint:2014:513, author = {Noboru Kunihiro and Junya Honda}, title = {RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog Data}, howpublished = {Cryptology ePrint Archive, Report 2014/513}, year = {2014}, url = {https://eprint.iacr.org/2014/513}, } @misc{cryptoeprint:2014:514, author = {Ahmad Boorghany and Siavash Bayat Sarmadi and Rasool Jalili}, title = {On Constrained Implementation of Lattice-based Cryptographic Primitives and Schemes on Smart Cards}, howpublished = {Cryptology ePrint Archive, Report 2014/514}, year = {2014}, url = {https://eprint.iacr.org/2014/514}, } @misc{cryptoeprint:2014:515, author = {Nasrollah Pakniat and Ziba Eslami and Mehrdad Nojoumian}, title = {Ideal Social Secret Sharing Using Birkhoff Interpolation Method}, howpublished = {Cryptology ePrint Archive, Report 2014/515}, year = {2014}, url = {https://eprint.iacr.org/2014/515}, } @misc{cryptoeprint:2014:516, author = {Nikolaos Makriyannis}, title = {On the Classification of Finite Boolean Functions up to Fairness}, howpublished = {Cryptology ePrint Archive, Report 2014/516}, year = {2014}, url = {https://eprint.iacr.org/2014/516}, } @misc{cryptoeprint:2014:517, author = {Jesper Buus Nielsen and Daniele Venturi and Angela Zottarel}, title = {On the Connection between Leakage Tolerance and Adaptive Security}, howpublished = {Cryptology ePrint Archive, Report 2014/517}, year = {2014}, url = {https://eprint.iacr.org/2014/517}, } @misc{cryptoeprint:2014:518, author = {Mihir Bellare and Viet Tung Hoang and Sriram Keelveedhi}, title = {Cryptography from Compression Functions: The UCE Bridge to the ROM}, howpublished = {Cryptology ePrint Archive, Report 2014/518}, year = {2014}, url = {https://eprint.iacr.org/2014/518}, } @misc{cryptoeprint:2014:519, author = {Jens Hermans and Roel Peeters}, title = {Realizing Pico: Finally No More Passwords!}, howpublished = {Cryptology ePrint Archive, Report 2014/519}, year = {2014}, url = {https://eprint.iacr.org/2014/519}, } @misc{cryptoeprint:2014:520, author = {Ignacio Cascudo and Ronald Cramer and Diego Mirandola and Gilles Z\'emor}, title = {Squares of Random Linear Codes}, howpublished = {Cryptology ePrint Archive, Report 2014/520}, year = {2014}, url = {https://eprint.iacr.org/2014/520}, } @misc{cryptoeprint:2014:521, author = {Susan Hohenberger and Venkata Koppula and Brent Waters}, title = {Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2014/521}, year = {2014}, url = {https://eprint.iacr.org/2014/521}, } @misc{cryptoeprint:2014:522, author = {Nishanth Chandran and Srinivasan Raghuraman and Dhinakaran Vinayagamurthy}, title = {Constrained Pseudorandom Functions: Verifiable and Delegatable}, howpublished = {Cryptology ePrint Archive, Report 2014/522}, year = {2014}, url = {https://eprint.iacr.org/2014/522}, } @misc{cryptoeprint:2014:523, author = {Kim Ramchen and Brent Waters}, title = {Fully Secure and Fast Signing from Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2014/523}, year = {2014}, url = {https://eprint.iacr.org/2014/523}, } @misc{cryptoeprint:2014:524, author = {Chunming Tang and Yanfeng Qi}, title = {Constructing hyper-bent functions from Boolean functions with the Walsh spectrum taking the same value twice}, howpublished = {Cryptology ePrint Archive, Report 2014/524}, year = {2014}, url = {https://eprint.iacr.org/2014/524}, } @misc{cryptoeprint:2014:525, author = {Jingyuan Zhao and Xiaoyun Wang and Meiqin Wang and Xiaoyang Dong}, title = {Differential Analysis on Block Cipher PRIDE}, howpublished = {Cryptology ePrint Archive, Report 2014/525}, year = {2014}, url = {https://eprint.iacr.org/2014/525}, } @misc{cryptoeprint:2014:526, author = {Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange}, title = {Curve41417: Karatsuba revisited}, howpublished = {Cryptology ePrint Archive, Report 2014/526}, year = {2014}, url = {https://eprint.iacr.org/2014/526}, } @misc{cryptoeprint:2014:527, author = {Annelie Heuser and Olivier Rioul and Sylvain Guilley}, title = {Good is Not Good Enough: Deriving Optimal Distinguishers from Communication Theory}, howpublished = {Cryptology ePrint Archive, Report 2014/527}, year = {2014}, url = {https://eprint.iacr.org/2014/527}, } @misc{cryptoeprint:2014:528, author = {Xiaofeng Wang and Chen Xu and Guo Li and Hanling Lin}, title = {Groups With Two Generators Having Unsolvable Word Problem And Presentations of Mihailova Subgroups}, howpublished = {Cryptology ePrint Archive, Report 2014/528}, year = {2014}, url = {https://eprint.iacr.org/2014/528}, } @misc{cryptoeprint:2014:529, author = {Jesper Buus Nielsen and Daniele Venturi and Angela Zottarel}, title = {Leakage-Resilient Signatures with Graceful Degradation}, howpublished = {Cryptology ePrint Archive, Report 2014/529}, year = {2014}, url = {https://eprint.iacr.org/2014/529}, } @misc{cryptoeprint:2014:530, author = {Khoongming Khoo and Thomas Peyrin and Axel Y. Poschmann and Huihui Yap}, title = {FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison}, howpublished = {Cryptology ePrint Archive, Report 2014/530}, year = {2014}, url = {https://eprint.iacr.org/2014/530}, } @misc{cryptoeprint:2014:531, author = {Paolo Palmieri and Luca Calderoni and Dario Maio}, title = {Spatial Bloom Filters: Enabling Privacy in Location-aware Applications}, howpublished = {Cryptology ePrint Archive, Report 2014/531}, year = {2014}, url = {https://eprint.iacr.org/2014/531}, } @misc{cryptoeprint:2014:532, author = {Georg T. Becker}, title = {On the Pitfalls of using Arbiter-PUFs as Building Blocks}, howpublished = {Cryptology ePrint Archive, Report 2014/532}, year = {2014}, url = {https://eprint.iacr.org/2014/532}, } @misc{cryptoeprint:2014:533, author = {Jaiganesh Balasundaram}, title = {Indifferentiability Results and Proofs for Some Popular Cryptographic Constructions}, howpublished = {Cryptology ePrint Archive, Report 2014/533}, year = {2014}, url = {https://eprint.iacr.org/2014/533}, } @misc{cryptoeprint:2014:534, author = {Cong Chen and Thomas Eisenbarth and Ingo von Maurich and Rainer Steinwandt}, title = {Differential Power Analysis of a McEliece Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2014/534}, year = {2014}, url = {https://eprint.iacr.org/2014/534}, } @misc{cryptoeprint:2014:535, author = {Massimo Chenal and Qiang Tang}, title = {On Key Recovery Attacks against Existing Somewhat Homomorphic Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2014/535}, year = {2014}, url = {https://eprint.iacr.org/2014/535}, } @misc{cryptoeprint:2014:536, author = {Tian Tian and Wen-Feng Qi}, title = {On Decomposition of an NFSR into a Cascade Connection of Two Smaller}, howpublished = {Cryptology ePrint Archive, Report 2014/536}, year = {2014}, url = {https://eprint.iacr.org/2014/536}, } @misc{cryptoeprint:2014:537, author = {Georg Fuchsbauer}, title = {Constrained Verifiable Random Functions}, howpublished = {Cryptology ePrint Archive, Report 2014/537}, year = {2014}, url = {https://eprint.iacr.org/2014/537}, } @misc{cryptoeprint:2014:538, author = {pardis pourghomi and muhammad qasim saeed and george ghinea}, title = {A Secure Cloud-based NFC Mobile Payment Protocol}, howpublished = {Cryptology ePrint Archive, Report 2014/538}, year = {2014}, url = {https://eprint.iacr.org/2014/538}, } @misc{cryptoeprint:2014:539, author = {Hoon Wei Lim and Shruti Tople and Prateek Saxena and Ee-Chien Chang}, title = {Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2014/539}, year = {2014}, url = {https://eprint.iacr.org/2014/539}, } @misc{cryptoeprint:2014:540, author = {Abhijith P. S and Dr. Manish Goswami and S. Tadi and Kamal Pandey}, title = {Optimized Architecture for AES}, howpublished = {Cryptology ePrint Archive, Report 2014/540}, year = {2014}, url = {https://eprint.iacr.org/2014/540}, } @misc{cryptoeprint:2014:541, author = {Naofumi Homma and Yu-ichi Hayashi and Noriyuki Miura and Daisuke Fujimoto and Daichi Tanaka and Makoto Nagata and Takafumi Aoki}, title = {EM Attack Is Non-Invasive? - Design Methodology and Validity Verification of EM Attack Sensor}, howpublished = {Cryptology ePrint Archive, Report 2014/541}, year = {2014}, url = {https://eprint.iacr.org/2014/541}, } @misc{cryptoeprint:2014:542, author = {Guang Gong and Kalikinkar Mandal and Yin Tan and Teng Wu}, title = {On the Multi-output Filtering Model and Its Applications}, howpublished = {Cryptology ePrint Archive, Report 2014/542}, year = {2014}, url = {https://eprint.iacr.org/2014/542}, } @misc{cryptoeprint:2014:543, author = {Johannes Blömer and Ricardo Gomes da Silva and Peter Günther and Juliane Krämer and Jean-Pierre Seifert}, title = {A Practical Second-Order Fault Attack against a Real-World Pairing Implementation}, howpublished = {Cryptology ePrint Archive, Report 2014/543}, year = {2014}, url = {https://eprint.iacr.org/2014/543}, } @misc{cryptoeprint:2014:544, author = {Amitabh Das, Dusko Karaklajic and Ingrid Verbauwhede}, title = {Secure Mutual Testing Strategy for Cryptographic SoCs}, howpublished = {Cryptology ePrint Archive, Report 2014/544}, year = {2014}, url = {https://eprint.iacr.org/2014/544}, } @misc{cryptoeprint:2014:545, author = {Chengliang Tian and Wei Wei and Dongdai Lin}, title = {Solving closest vector instances using an approximate shortest independent vectors oracle}, howpublished = {Cryptology ePrint Archive, Report 2014/545}, year = {2014}, url = {https://eprint.iacr.org/2014/545}, } @misc{cryptoeprint:2014:546, author = {Johannes Blömer and Jakob Juhnke and Christina Kolb}, title = {Anonymous and Publicly Linkable Reputation Systems}, howpublished = {Cryptology ePrint Archive, Report 2014/546}, year = {2014}, url = {https://eprint.iacr.org/2014/546}, } @misc{cryptoeprint:2014:547, author = {Juan Carlos Ku-Cauich and Guillermo Morales-Luna}, title = {Authentication Codes Based on Resilient Boolean Maps}, howpublished = {Cryptology ePrint Archive, Report 2014/547}, year = {2014}, url = {https://eprint.iacr.org/2014/547}, } @misc{cryptoeprint:2014:548, author = {Abderrahmane Nitaj and Muhammad Rezal Kamel Ariffin}, title = {Implicit factorization of unbalanced RSA moduli}, howpublished = {Cryptology ePrint Archive, Report 2014/548}, year = {2014}, url = {https://eprint.iacr.org/2014/548}, } @misc{cryptoeprint:2014:549, author = {Abderrahmane Nitaj, Muhammad Rezal Kamel Ariffin, Dieaa I. Nassr, and Hatem M. Bahig}, title = {New Attacks on the RSA Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2014/549}, year = {2014}, url = {https://eprint.iacr.org/2014/549}, } @misc{cryptoeprint:2014:550, author = {Zvika Brakerski and Gil Segev}, title = {Function-Private Functional Encryption in the Private-Key Setting}, howpublished = {Cryptology ePrint Archive, Report 2014/550}, year = {2014}, url = {https://eprint.iacr.org/2014/550}, } @misc{cryptoeprint:2014:551, author = {Daniel Augot and Pierre-Alain Fouque and Pierre Karpman}, title = {Diffusion Matrices from Algebraic-Geometry Codes with Efficient SIMD Implementation}, howpublished = {Cryptology ePrint Archive, Report 2014/551}, year = {2014}, url = {https://eprint.iacr.org/2014/551}, } @misc{cryptoeprint:2014:552, author = {Ahto Buldas and Ahto Truu and Risto Laanoja and Rainer Gerhards}, title = {Efficient Record-Level Keyless Signatures for Audit Logs}, howpublished = {Cryptology ePrint Archive, Report 2014/552}, year = {2014}, url = {https://eprint.iacr.org/2014/552}, } @misc{cryptoeprint:2014:553, author = {Ran Canetti and Asaf Cohen and Yehuda Lindell}, title = {A Simpler Variant of Universally Composable Security for Standard Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2014/553}, year = {2014}, url = {https://eprint.iacr.org/2014/553}, } @misc{cryptoeprint:2014:554, author = {Nir Bitansky and Ran Canetti and Yael Tauman-Kalai and Omer Paneth}, title = {On Virtual Grey Box Obfuscation for General Circuits}, howpublished = {Cryptology ePrint Archive, Report 2014/554}, year = {2014}, url = {https://eprint.iacr.org/2014/554}, } @misc{cryptoeprint:2014:555, author = {Nico Döttling and Daniel Kraschewski and Jörn Müller-Quade and Tobias Nilges}, title = {General Statistically Secure Computation with Bounded-Resettable Hardware Tokens}, howpublished = {Cryptology ePrint Archive, Report 2014/555}, year = {2014}, url = {https://eprint.iacr.org/2014/555}, } @misc{cryptoeprint:2014:556, author = {Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun}, title = {Securing Cloud Data in the New Attacker Model}, howpublished = {Cryptology ePrint Archive, Report 2014/556}, year = {2014}, url = {https://eprint.iacr.org/2014/556}, } @misc{cryptoeprint:2014:557, author = {Susumu Kiyoshima}, title = {Round-Efficient Black-Box Construction of Composable Multi-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2014/557}, year = {2014}, url = {https://eprint.iacr.org/2014/557}, } @misc{cryptoeprint:2014:558, author = {Xiaofeng Wang, Chen Xu, Guo Li, Hanling Lin and Weijian Wang}, title = {Double shielded Public Key Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2014/558}, year = {2014}, url = {https://eprint.iacr.org/2014/558}, } @misc{cryptoeprint:2014:559, author = {Pablo Rauzy and Sylvain Guilley}, title = {Countermeasures Against High-Order Fault-Injection Attacks on CRT-RSA}, howpublished = {Cryptology ePrint Archive, Report 2014/559}, year = {2014}, url = {https://eprint.iacr.org/2014/559}, } @misc{cryptoeprint:2014:560, author = {Qiang Tang}, title = {Towards Forward Security Properties for PEKS and IBE}, howpublished = {Cryptology ePrint Archive, Report 2014/560}, year = {2014}, url = {https://eprint.iacr.org/2014/560}, } @misc{cryptoeprint:2014:561, author = {Vladislav Kovtun and Maria Bulakh}, title = {Performance Increasing Approaches For Binary Field Inversion}, howpublished = {Cryptology ePrint Archive, Report 2014/561}, year = {2014}, url = {https://eprint.iacr.org/2014/561}, } @misc{cryptoeprint:2014:562, author = {Ka Ahmad Khoureich}, title = {hHB: a Harder HB+ Protocol}, howpublished = {Cryptology ePrint Archive, Report 2014/562}, year = {2014}, url = {https://eprint.iacr.org/2014/562}, } @misc{cryptoeprint:2014:563, author = {Aleksandar Kircanski}, title = {Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA}, howpublished = {Cryptology ePrint Archive, Report 2014/563}, year = {2014}, url = {https://eprint.iacr.org/2014/563}, } @misc{cryptoeprint:2014:564, author = {Massoud Hadian Dehkordi and Reza Ghasemi}, title = {A Security Definition for Multi Secret Sharing and a Scheme Based on LWE}, howpublished = {Cryptology ePrint Archive, Report 2014/564}, year = {2014}, url = {https://eprint.iacr.org/2014/564}, } @misc{cryptoeprint:2014:565, author = {Tanja Lange and Christine van Vredendaal and Marnix Wakker}, title = {Kangaroos in Side-Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2014/565}, year = {2014}, url = {https://eprint.iacr.org/2014/565}, } @misc{cryptoeprint:2014:566, author = {Daniel Augot and Matthieu Finiasz}, title = {Direct Construction of Recursive MDS Diffusion Layers using Shortened BCH Codes}, howpublished = {Cryptology ePrint Archive, Report 2014/566}, year = {2014}, url = {https://eprint.iacr.org/2014/566}, } @misc{cryptoeprint:2014:567, author = {Hiroaki Anada and Seiko Arita and Kouichi Sakurai}, title = {Attribute-Based Signatures without Pairings by the Fiat-Shamir Transformation}, howpublished = {Cryptology ePrint Archive, Report 2014/567}, year = {2014}, url = {https://eprint.iacr.org/2014/567}, } @misc{cryptoeprint:2014:568, author = {Masao KASAHARA}, title = {New Classes of Public Key Cryptosystems over $F_2^8$ Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)$\Sigma \Pi$PKC}, howpublished = {Cryptology ePrint Archive, Report 2014/568}, year = {2014}, url = {https://eprint.iacr.org/2014/568}, } @misc{cryptoeprint:2014:569, author = {Daniele Micciancio and Michael Walter}, title = {Fast Lattice Point Enumeration with Minimal Overhead}, howpublished = {Cryptology ePrint Archive, Report 2014/569}, year = {2014}, url = {https://eprint.iacr.org/2014/569}, } @misc{cryptoeprint:2014:570, author = {Melissa Chase and Sarah Meiklejohn}, title = {Deja Q: Using Dual Systems to Revisit q-Type Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2014/570}, year = {2014}, url = {https://eprint.iacr.org/2014/570}, } @misc{cryptoeprint:2014:571, author = {Daniel J. Bernstein and Tung Chou and Chitchanok Chuengsatiansup and Andreas H\"ulsing and Tanja Lange and Ruben Niederhagen and Christine van Vredendaal}, title = {How to manipulate curve standards: a white paper for the black hat}, howpublished = {Cryptology ePrint Archive, Report 2014/571}, year = {2014}, url = {https://eprint.iacr.org/2014/571}, } @misc{cryptoeprint:2014:572, author = {Juliane Krämer and Anke Stüber and Ágnes Kiss}, title = {On the Optimality of Differential Fault Analyses on CLEFIA}, howpublished = {Cryptology ePrint Archive, Report 2014/572}, year = {2014}, url = {https://eprint.iacr.org/2014/572}, } @misc{cryptoeprint:2014:573, author = {Gurgen Khachatrian}, title = {A new public key system based on Polynomials over finite fields GF(2)}, howpublished = {Cryptology ePrint Archive, Report 2014/573}, year = {2014}, url = {https://eprint.iacr.org/2014/573}, } @misc{cryptoeprint:2014:574, author = {Hyung Tae Lee and Jae Hong Seo}, title = {Security Analysis of Multilinear Maps over the Integers}, howpublished = {Cryptology ePrint Archive, Report 2014/574}, year = {2014}, url = {https://eprint.iacr.org/2014/574}, } @misc{cryptoeprint:2014:575, author = {Markku-Juhani O. Saarinen}, title = {Simple AEAD Hardware Interface (S{\AE}HI) in a SoC: Implementing an On-Chip Keyak/WhirlBob Coprocessor}, howpublished = {Cryptology ePrint Archive, Report 2014/575}, year = {2014}, url = {https://eprint.iacr.org/2014/575}, } @misc{cryptoeprint:2014:576, author = {Dan P. Milleville}, title = {Vernam Two}, howpublished = {Cryptology ePrint Archive, Report 2014/576}, year = {2014}, url = {https://eprint.iacr.org/2014/576}, } @misc{cryptoeprint:2014:577, author = {Sanjay Bhattacherjee and Palash Sarkar}, title = {Reducing Communication Overhead of the Subset Difference Scheme}, howpublished = {Cryptology ePrint Archive, Report 2014/577}, year = {2014}, url = {https://eprint.iacr.org/2014/577}, } @misc{cryptoeprint:2014:578, author = {Peter Gaži and Krzysztof Pietrzak and Michal Rybár}, title = {The Exact PRF-Security of NMAC and HMAC}, howpublished = {Cryptology ePrint Archive, Report 2014/578}, year = {2014}, url = {https://eprint.iacr.org/2014/578}, } @misc{cryptoeprint:2014:579, author = {Sonu Kumar Jha}, title = {Scan Based Side Channel Attack on Grain v1}, howpublished = {Cryptology ePrint Archive, Report 2014/579}, year = {2014}, url = {https://eprint.iacr.org/2014/579}, } @misc{cryptoeprint:2014:580, author = {Nir Bitansky and Ran Canetti and Alessandro Chiesa and Shafi Goldwasser and Huijia Lin and Aviad Rubinstein and Eran Tromer}, title = {The Hunting of the SNARK}, howpublished = {Cryptology ePrint Archive, Report 2014/580}, year = {2014}, url = {https://eprint.iacr.org/2014/580}, } @misc{cryptoeprint:2014:581, author = {Olivier Blazy and Eike Kiltz and Jiaxin Pan}, title = {(Hierarchical) Identity-Based Encryption from Affine Message Authentication}, howpublished = {Cryptology ePrint Archive, Report 2014/581}, year = {2014}, url = {https://eprint.iacr.org/2014/581}, } @misc{cryptoeprint:2014:582, author = {Sharon Goldberg and Moni Naor and Dimitrios Papadopoulos and Leonid Reyzin and Sachin Vasant and Asaf Ziv}, title = {NSEC5: Provably Preventing DNSSEC Zone Enumeration}, howpublished = {Cryptology ePrint Archive, Report 2014/582}, year = {2014}, url = {https://eprint.iacr.org/2014/582}, } @misc{cryptoeprint:2014:583, author = {Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng}, title = {Template Attacks Based On Priori Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2014/583}, year = {2014}, url = {https://eprint.iacr.org/2014/583}, } @misc{cryptoeprint:2014:584, author = {Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay}, title = {Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption}, howpublished = {Cryptology ePrint Archive, Report 2014/584}, year = {2014}, url = {https://eprint.iacr.org/2014/584}, } @misc{cryptoeprint:2014:585, author = {Feng Hao and Siamak F. Shahandashti}, title = {The SPEKE Protocol Revisited}, howpublished = {Cryptology ePrint Archive, Report 2014/585}, year = {2014}, url = {https://eprint.iacr.org/2014/585}, } @misc{cryptoeprint:2014:586, author = {Vipul Goyal and Silas Richelson and Alon Rosen and Margarita Vald}, title = {An Algebraic Approach to Non-Malleability}, howpublished = {Cryptology ePrint Archive, Report 2014/586}, year = {2014}, url = {https://eprint.iacr.org/2014/586}, } @misc{cryptoeprint:2014:587, author = {Dominique Unruh}, title = {Non-interactive zero-knowledge proofs in the quantum random oracle model}, howpublished = {Cryptology ePrint Archive, Report 2014/587}, year = {2014}, url = {https://eprint.iacr.org/2014/587}, } @misc{cryptoeprint:2014:588, author = {Brent Waters}, title = {A Punctured Programming Approach to Adaptively Secure Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2014/588}, year = {2014}, url = {https://eprint.iacr.org/2014/588}, } @misc{cryptoeprint:2014:589, author = {Jiang Zhang and Zhenfeng Zhang and Jintai Ding and Michael Snook and Özgür Dagdelen }, title = {Authenticated Key Exchange from Ideal Lattices}, howpublished = {Cryptology ePrint Archive, Report 2014/589}, year = {2014}, url = {https://eprint.iacr.org/2014/589}, } @misc{cryptoeprint:2014:590, author = {Joeri de Ruiter}, title = {Automated algebraic analysis of structure-preserving signature schemes}, howpublished = {Cryptology ePrint Archive, Report 2014/590}, year = {2014}, url = {https://eprint.iacr.org/2014/590}, } @misc{cryptoeprint:2014:591, author = {Sujoy Sinha Roy and Oscar Reparaz and Frederik Vercauteren and Ingrid Verbauwhede}, title = {Compact and Side Channel Secure Discrete Gaussian Sampling}, howpublished = {Cryptology ePrint Archive, Report 2014/591}, year = {2014}, url = {https://eprint.iacr.org/2014/591}, } @misc{cryptoeprint:2014:592, author = {Michael Hutter and Peter Schwabe}, title = {Multiprecision multiplication on AVR revisited}, howpublished = {Cryptology ePrint Archive, Report 2014/592}, year = {2014}, url = {https://eprint.iacr.org/2014/592}, } @misc{cryptoeprint:2014:593, author = {Shi Bai and Steven D. Galbraith and Liangze Li and Daniel Sheffield}, title = {Improved Exponential-time Algorithms for Inhomogeneous-SIS}, howpublished = {Cryptology ePrint Archive, Report 2014/593}, year = {2014}, url = {https://eprint.iacr.org/2014/593}, } @misc{cryptoeprint:2014:594, author = {Elette Boyle and Kai-Min Chung and Rafael Pass}, title = {Oblivious Parallel RAM and Applications}, howpublished = {Cryptology ePrint Archive, Report 2014/594}, year = {2014}, url = {https://eprint.iacr.org/2014/594}, } @misc{cryptoeprint:2014:595, author = {Eli Ben-Sasson and Alessandro Chiesa and Eran Tromer and Madars Virza}, title = {Scalable Zero Knowledge via Cycles of Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2014/595}, year = {2014}, url = {https://eprint.iacr.org/2014/595}, } @misc{cryptoeprint:2014:596, author = {Marina Blanton and Siddharth Saraph}, title = {Secure and Oblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint Identification}, howpublished = {Cryptology ePrint Archive, Report 2014/596}, year = {2014}, url = {https://eprint.iacr.org/2014/596}, } @misc{cryptoeprint:2014:597, author = {Jesper Buus Nielsen and Mario Strefler}, title = {Invisible Adaptive Attacks}, howpublished = {Cryptology ePrint Archive, Report 2014/597}, year = {2014}, url = {https://eprint.iacr.org/2014/597}, } @misc{cryptoeprint:2014:598, author = {Tore Kasper Frederiksen and Jesper Buus Nielsen and Claudio Orlandi}, title = {Privacy-Free Garbled Circuits with Applications To Efficient Zero-Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2014/598}, year = {2014}, url = {https://eprint.iacr.org/2014/598}, } @misc{cryptoeprint:2014:599, author = {Joppe W. Bos and Craig Costello and Michael Naehrig and Douglas Stebila}, title = {Post-quantum key exchange for the TLS protocol from the ring learning with errors problem}, howpublished = {Cryptology ePrint Archive, Report 2014/599}, year = {2014}, url = {https://eprint.iacr.org/2014/599}, } @misc{cryptoeprint:2014:600, author = {Jiangshan Yu and Vincent Cheval and Mark Ryan}, title = {DTKI: a new formalized PKI with no trusted parties}, howpublished = {Cryptology ePrint Archive, Report 2014/600}, year = {2014}, url = {https://eprint.iacr.org/2014/600}, } @misc{cryptoeprint:2014:601, author = {Ivan Damgård and Jesper Buus Nielsen}, title = {Adaptive versus Static Security in the UC Model}, howpublished = {Cryptology ePrint Archive, Report 2014/601}, year = {2014}, url = {https://eprint.iacr.org/2014/601}, } @misc{cryptoeprint:2014:602, author = {Sandra Diaz-Santiago and Lil Maria Rodriguez-Henriquez and Debrup Chakraborty}, title = {A Cryptographic Study of Tokenization Systems}, howpublished = {Cryptology ePrint Archive, Report 2014/602}, year = {2014}, url = {https://eprint.iacr.org/2014/602}, } @misc{cryptoeprint:2014:603, author = {Tarik Moataz and Erik-Oliver Blass and Guevara Noubir}, title = {Recursive Trees for Practical ORAM}, howpublished = {Cryptology ePrint Archive, Report 2014/603}, year = {2014}, url = {https://eprint.iacr.org/2014/603}, } @misc{cryptoeprint:2014:604, author = {Bolam Kang and Sung Cheol Goh and Myungsun Kim}, title = {Private Web Search with Constant Round Efficiency}, howpublished = {Cryptology ePrint Archive, Report 2014/604}, year = {2014}, url = {https://eprint.iacr.org/2014/604}, } @misc{cryptoeprint:2014:605, author = {Kenji Yasunaga and Kosuke Yuzawa}, title = {On the Possibilities and Limitations of Computational Fuzzy Extractors}, howpublished = {Cryptology ePrint Archive, Report 2014/605}, year = {2014}, url = {https://eprint.iacr.org/2014/605}, } @misc{cryptoeprint:2014:606, author = {Xiaojun Yu and Qiaoyan Wen}, title = {A Multi-Function Provable Data Possession Scheme in Cloud Computing}, howpublished = {Cryptology ePrint Archive, Report 2014/606}, year = {2014}, url = {https://eprint.iacr.org/2014/606}, } @misc{cryptoeprint:2014:607, author = {Daniel Slamanig and Raphael Spreitzer and Thomas Unterluggauer}, title = {Adding Controllable Linkability to Pairing-Based Group Signatures For Free}, howpublished = {Cryptology ePrint Archive, Report 2014/607}, year = {2014}, url = {https://eprint.iacr.org/2014/607}, } @misc{cryptoeprint:2014:608, author = {Ferucio Laurentiu Tiplea and Constantin Catalin Dragan}, title = {Key-policy Attribute-based Encryption for Boolean Circuits from Bilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2014/608}, year = {2014}, url = {https://eprint.iacr.org/2014/608}, } @misc{cryptoeprint:2014:609, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, title = {Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks}, howpublished = {Cryptology ePrint Archive, Report 2014/609}, year = {2014}, url = {https://eprint.iacr.org/2014/609}, } @misc{cryptoeprint:2014:610, author = {Craig Gentry}, title = {Computing on the Edge of Chaos: Structure and Randomness in Encrypted Computation}, howpublished = {Cryptology ePrint Archive, Report 2014/610}, year = {2014}, url = {https://eprint.iacr.org/2014/610}, } @misc{cryptoeprint:2014:611, author = {Shlomi Dolev and Niv Gilboa and Ximing Li}, title = {Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2014/611}, year = {2014}, url = {https://eprint.iacr.org/2014/611}, } @misc{cryptoeprint:2014:612, author = {Máté Horváth}, title = {Attribute-Based Encryption Optimized for Cloud Computing}, howpublished = {Cryptology ePrint Archive, Report 2014/612}, year = {2014}, url = {https://eprint.iacr.org/2014/612}, } @misc{cryptoeprint:2014:613, author = {Gordon Procter}, title = {A Security Analysis of the Composition of ChaCha20 and Poly1305}, howpublished = {Cryptology ePrint Archive, Report 2014/613}, year = {2014}, url = {https://eprint.iacr.org/2014/613}, } @misc{cryptoeprint:2014:614, author = {Zhiquan Lv and Cheng Hong and Min Zhang and Dengguo Feng}, title = {Expressive and Secure Searchable Encryption in the Public Key Setting (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2014/614}, year = {2014}, url = {https://eprint.iacr.org/2014/614}, } @misc{cryptoeprint:2014:615, author = {Nishanth Chandran and Wutichai Chongchitmate and Juan A. Garay and Shafi Goldwasser and Rafail Ostrovsky and Vassilis Zikas}, title = {Optimally Resilient and Adaptively Secure Multi-Party Computation with Low Communication Locality}, howpublished = {Cryptology ePrint Archive, Report 2014/615}, year = {2014}, url = {https://eprint.iacr.org/2014/615}, } @misc{cryptoeprint:2014:616, author = {Zhen Liu and Duncan S. Wong}, title = {Practical Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe}, howpublished = {Cryptology ePrint Archive, Report 2014/616}, year = {2014}, url = {https://eprint.iacr.org/2014/616}, } @misc{cryptoeprint:2014:617, author = {Michael Backes and Manuel Barbosa and Dario Fiore and Raphael M. Reischuk}, title = {ADSNARK: Nearly Practical and Privacy-Preserving Proofs on Authenticated Data}, howpublished = {Cryptology ePrint Archive, Report 2014/617}, year = {2014}, url = {https://eprint.iacr.org/2014/617}, } @misc{cryptoeprint:2014:618, author = {Florian Böhl and Simon Greiner and Patrik Scheidecker}, title = {Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-Honest Sender}, howpublished = {Cryptology ePrint Archive, Report 2014/618}, year = {2014}, url = {https://eprint.iacr.org/2014/618}, } @misc{cryptoeprint:2014:619, author = {Mohammad Sadegh Nemati Nia, Ali Payandeh}, title = {THE NEW HEURISTIC GUESS AND DETERMINE ATTACK ON SNOW 2.0 STREAM CIPHER}, howpublished = {Cryptology ePrint Archive, Report 2014/619}, year = {2014}, url = {https://eprint.iacr.org/2014/619}, } @misc{cryptoeprint:2014:620, author = {Isaiah Makwakwa}, title = {The M3dcrypt Password Hashing Function}, howpublished = {Cryptology ePrint Archive, Report 2014/620}, year = {2014}, url = {https://eprint.iacr.org/2014/620}, } @misc{cryptoeprint:2014:621, author = {Michael Backes and Aniket Kate and Sebastian Meiser and Esfandiar Mohammadi}, title = {(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection}, howpublished = {Cryptology ePrint Archive, Report 2014/621}, year = {2014}, url = {https://eprint.iacr.org/2014/621}, } @misc{cryptoeprint:2014:622, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Mark Zhandry}, title = {Fully Secure Attribute Based Encryption from Multilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2014/622}, year = {2014}, url = {https://eprint.iacr.org/2014/622}, } @misc{cryptoeprint:2014:623, author = {Yevgeniy Dodis and Yanqing Yao}, title = {Privacy with Imperfect Randomness}, howpublished = {Cryptology ePrint Archive, Report 2014/623}, year = {2014}, url = {https://eprint.iacr.org/2014/623}, } @misc{cryptoeprint:2014:624, author = {Jinsheng Zhang and Qiumao Ma and Wensheng Zhang and Daji Qiao}, title = {KT-ORAM: A Bandwidth-efficient ORAM Built on K-ary Tree of PIR Nodes}, howpublished = {Cryptology ePrint Archive, Report 2014/624}, year = {2014}, url = {https://eprint.iacr.org/2014/624}, } @misc{cryptoeprint:2014:625, author = {Stephan Neumann and Christian Feier and Perihan Sahin and Sebastian Fach}, title = {Pretty Understandable Democracy 2.0}, howpublished = {Cryptology ePrint Archive, Report 2014/625}, year = {2014}, url = {https://eprint.iacr.org/2014/625}, } @misc{cryptoeprint:2014:626, author = {Daniel Genkin and Itamar Pipman and Eran Tromer}, title = {Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs}, howpublished = {Cryptology ePrint Archive, Report 2014/626}, year = {2014}, url = {https://eprint.iacr.org/2014/626}, } @misc{cryptoeprint:2014:627, author = {Debrup Chakraborty and Palash Sarkar}, title = {On Modes of Operations of a Block Cipher for Authentication and Authenticated Encryption}, howpublished = {Cryptology ePrint Archive, Report 2014/627}, year = {2014}, url = {https://eprint.iacr.org/2014/627}, } @misc{cryptoeprint:2014:628, author = {Partha Sarathi Roy and Avishek Adhikari and Rui Xu and Kirill Morozov and Kouichi Sakurai}, title = {An Efficient $t$-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency}, howpublished = {Cryptology ePrint Archive, Report 2014/628}, year = {2014}, url = {https://eprint.iacr.org/2014/628}, } @misc{cryptoeprint:2014:629, author = {Christopher Mann and Daniel Loebenberger}, title = {Two-factor authentication for the Bitcoin protocol}, howpublished = {Cryptology ePrint Archive, Report 2014/629}, year = {2014}, url = {https://eprint.iacr.org/2014/629}, } @misc{cryptoeprint:2014:630, author = {Peeter Laud}, title = {Privacy-Preserving Minimum Spanning Trees through Oblivious Parallel RAM for Secure Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2014/630}, year = {2014}, url = {https://eprint.iacr.org/2014/630}, } @misc{cryptoeprint:2014:631, author = {Ding Wang, Gaopeng Jian, Xinyi Huang, Ping Wang}, title = {Zipf’s Law in Passwords}, howpublished = {Cryptology ePrint Archive, Report 2014/631}, year = {2014}, url = {https://eprint.iacr.org/2014/631}, } @misc{cryptoeprint:2014:632, author = {Esha Ghosh and Olga Ohrimenko and Roberto Tamassia}, title = {Verifiable Order Queries and Order Statistics on a List in Zero-Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2014/632}, year = {2014}, url = {https://eprint.iacr.org/2014/632}, } @misc{cryptoeprint:2014:633, author = {Ran Canetti and Abhishek Jain and Omer Paneth}, title = {Client-Server Concurrent Zero Knowledge with Constant Rounds and Guaranteed Complexity}, howpublished = {Cryptology ePrint Archive, Report 2014/633}, year = {2014}, url = {https://eprint.iacr.org/2014/633}, } @misc{cryptoeprint:2014:634, author = {Hongda Li, Qihua Niu, Guifang Huang}, title = {Constant-Round Leakage-Resilient Zero-Knowledge Arguments of Knowledge for NP}, howpublished = {Cryptology ePrint Archive, Report 2014/634}, year = {2014}, url = {https://eprint.iacr.org/2014/634}, } @misc{cryptoeprint:2014:635, author = {Sanjit Chatterjee and Alfred Menezes}, title = {Type 2 Structure-Preserving Signature Schemes Revisited}, howpublished = {Cryptology ePrint Archive, Report 2014/635}, year = {2014}, url = {https://eprint.iacr.org/2014/635}, } @misc{cryptoeprint:2014:636, author = {Vikram Singh}, title = {Improved Timing Attacks on ECDSA}, howpublished = {Cryptology ePrint Archive, Report 2014/636}, year = {2014}, url = {https://eprint.iacr.org/2014/636}, } @misc{cryptoeprint:2014:637, author = {Aaram Yun}, title = {Generic Hardness of the Multiple Discrete Logarithm Problem}, howpublished = {Cryptology ePrint Archive, Report 2014/637}, year = {2014}, url = {https://eprint.iacr.org/2014/637}, } @misc{cryptoeprint:2014:638, author = {Melissa Chase and Emily Shen}, title = {Substring-Searchable Symmetric Encryption}, howpublished = {Cryptology ePrint Archive, Report 2014/638}, year = {2014}, url = {https://eprint.iacr.org/2014/638}, } @misc{cryptoeprint:2014:639, author = {Mehrdad Majzoobi, Akshat Kharaya, Farinaz Koushanfar, Srinivas Devadas}, title = {Automated Design, Implementation, and Evaluation of Arbiter-based PUF on FPGA using Programmable Delay Lines}, howpublished = {Cryptology ePrint Archive, Report 2014/639}, year = {2014}, url = {https://eprint.iacr.org/2014/639}, } @misc{cryptoeprint:2014:640, author = {James Alderman and Christian Janson and Carlos Cid and Jason Crampton}, title = {Revocation in Publicly Verifiable Outsourced Computation}, howpublished = {Cryptology ePrint Archive, Report 2014/640}, year = {2014}, url = {https://eprint.iacr.org/2014/640}, } @misc{cryptoeprint:2014:641, author = {Cécile Pierrot}, title = {The Multiple Number Field Sieve with Conjugation Method}, howpublished = {Cryptology ePrint Archive, Report 2014/641}, year = {2014}, url = {https://eprint.iacr.org/2014/641}, } @misc{cryptoeprint:2014:642, author = {Shoni Gilboa and Shay Gueron }, title = {Balanced permutations Even-Mansour ciphers}, howpublished = {Cryptology ePrint Archive, Report 2014/642}, year = {2014}, url = {https://eprint.iacr.org/2014/642}, } @misc{cryptoeprint:2014:643, author = {Ashok Kumar Das}, title = {On the Security of `An Efficient Biometric Authentication Protocol for Wireless Sensor Networks'}, howpublished = {Cryptology ePrint Archive, Report 2014/643}, year = {2014}, url = {https://eprint.iacr.org/2014/643}, } @misc{cryptoeprint:2014:644, author = {Ravikumar Selvam and Dillibabu Shanmugam and Suganya Annadurai}, title = {Side Channel Attacks: Vulnerability Analysis of PRINCE and RECTANGLE using DPA}, howpublished = {Cryptology ePrint Archive, Report 2014/644}, year = {2014}, url = {https://eprint.iacr.org/2014/644}, } @misc{cryptoeprint:2014:645, author = {Craig Gentry and Sergey Gorbunov and Shai Halevi}, title = {Graph-Induced Multilinear Maps from Lattices}, howpublished = {Cryptology ePrint Archive, Report 2014/645}, year = {2014}, url = {https://eprint.iacr.org/2014/645}, } @misc{cryptoeprint:2014:646, author = {Donald Donglong Chen and Nele Mentens and Frederik Vercauteren and Sujoy Sinha Roy and Ray C.C. Cheung and Derek Pao and Ingrid Verbauwhede}, title = {High-speed Polynomial Multiplication Architecture for Ring-LWE and SHE Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2014/646}, year = {2014}, url = {https://eprint.iacr.org/2014/646}, } @misc{cryptoeprint:2014:647, author = {Youliang Tian and Changgen Peng}, title = {Universally Composable Secure Group Communication}, howpublished = {Cryptology ePrint Archive, Report 2014/647}, year = {2014}, url = {https://eprint.iacr.org/2014/647}, } @misc{cryptoeprint:2014:648, author = {Xi~Chen, Yazhi~Deng, Min Zhu and Longjiang~Qu}, title = {An Equivalent Condition on the Switching Construction of Differentially $4$-uniform Permutations on $\gf_{2^{2k}}$ from the Inverse Function}, howpublished = {Cryptology ePrint Archive, Report 2014/648}, year = {2014}, url = {https://eprint.iacr.org/2014/648}, } @misc{cryptoeprint:2014:649, author = {Pawel Swierczynski and Marc Fyrbiak and Philipp Koppe and Christof Paar}, title = {FPGA Trojans through Detecting and Weakening of Cryptographic Primitives}, howpublished = {Cryptology ePrint Archive, Report 2014/649}, year = {2014}, url = {https://eprint.iacr.org/2014/649}, } @misc{cryptoeprint:2014:650, author = {Stanislaw Jarecki and Aggelos Kiayias and Hugo Krawczyk}, title = {Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model}, howpublished = {Cryptology ePrint Archive, Report 2014/650}, year = {2014}, url = {https://eprint.iacr.org/2014/650}, } @misc{cryptoeprint:2014:651, author = {Pavol Zajac}, title = {A note on CCA2-protected McEliece Cryptosystem with a systematic public key}, howpublished = {Cryptology ePrint Archive, Report 2014/651}, year = {2014}, url = {https://eprint.iacr.org/2014/651}, } @misc{cryptoeprint:2014:652, author = {Subhadeep Banik}, title = {A Dynamic Cube Attack on $105$ round Grain v1}, howpublished = {Cryptology ePrint Archive, Report 2014/652}, year = {2014}, url = {https://eprint.iacr.org/2014/652}, } @misc{cryptoeprint:2014:653, author = {Thorsten Kleinjung and Joppe W. Bos and Arjen K. Lenstra}, title = {Mersenne factorization factory}, howpublished = {Cryptology ePrint Archive, Report 2014/653}, year = {2014}, url = {https://eprint.iacr.org/2014/653}, } @misc{cryptoeprint:2014:654, author = {Prakash Dey and Abhishek Chakraborty and Avishek Adhikari and Debdeep Mukhopadhyay}, title = {Multi-Bit Differential Fault Analysis of Grain-128 with Very Weak Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2014/654}, year = {2014}, url = {https://eprint.iacr.org/2014/654}, } @misc{cryptoeprint:2014:655, author = {Bo Zhu and Xinxin Fan and Guang Gong}, title = {Pleco and Plectron -- Two Provably Secure Password Hashing Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2014/655}, year = {2014}, url = {https://eprint.iacr.org/2014/655}, } @misc{cryptoeprint:2014:656, author = {Itai Dinur}, title = {Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE}, howpublished = {Cryptology ePrint Archive, Report 2014/656}, year = {2014}, url = {https://eprint.iacr.org/2014/656}, } @misc{cryptoeprint:2014:657, author = {YUjuan Li and Wnehua Shen and Huaifu Wang and Peipei Zhou}, title = {On the cycle decomposition of the WG-NLFSR}, howpublished = {Cryptology ePrint Archive, Report 2014/657}, year = {2014}, url = {https://eprint.iacr.org/2014/657}, } @misc{cryptoeprint:2014:658, author = {Ming Li and Yupeng Jiang and Dongdai Lin}, title = {The Adjacency Graphs of Some Feedback Shift Registers}, howpublished = {Cryptology ePrint Archive, Report 2014/658}, year = {2014}, url = {https://eprint.iacr.org/2014/658}, } @misc{cryptoeprint:2014:659, author = {YUjuan Li and Jinhua Zhao and Huaifu Wang}, title = {On the Primitivity of Trinomials over Small Finite Fields}, howpublished = {Cryptology ePrint Archive, Report 2014/659}, year = {2014}, url = {https://eprint.iacr.org/2014/659}, } @misc{cryptoeprint:2014:660, author = {Prabhanjan Ananth and Vipul Goyal and Omkant Pandey}, title = {Interactive Proofs under Continual Memory Leakage}, howpublished = {Cryptology ePrint Archive, Report 2014/660}, year = {2014}, url = {https://eprint.iacr.org/2014/660}, } @misc{cryptoeprint:2014:661, author = {Weiqiang Wen and Libin Wang and Min Xie}, title = {One-Round Deniable Key Exchange with Perfect Forward Security}, howpublished = {Cryptology ePrint Archive, Report 2014/661}, year = {2014}, url = {https://eprint.iacr.org/2014/661}, } @misc{cryptoeprint:2014:662, author = {Sebastian Faust and Carmit Hazay and Daniele Venturi}, title = {Outsourced Pattern Matching}, howpublished = {Cryptology ePrint Archive, Report 2014/662}, year = {2014}, url = {https://eprint.iacr.org/2014/662}, } @misc{cryptoeprint:2014:663, author = {Dana Dachman-Soled and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou}, title = {Locally Decodable and Updatable Non-Malleable Codes and Their Applications}, howpublished = {Cryptology ePrint Archive, Report 2014/663}, year = {2014}, url = {https://eprint.iacr.org/2014/663}, } @misc{cryptoeprint:2014:664, author = {William R. Trost and Guangwu Xu}, title = {On the Optimal Pre-Computation of Window $\tau$NAF for Koblitz Curves}, howpublished = {Cryptology ePrint Archive, Report 2014/664}, year = {2014}, url = {https://eprint.iacr.org/2014/664}, } @misc{cryptoeprint:2014:665, author = {Julien Bringer and Claude Carlet and Hervé Chabanne and Sylvain Guilley and Houssem Maghrebi}, title = {Orthogonal Direct Sum Masking: A Smartcard Friendly Computation Paradigm in a Code, with Builtin Protection against Side-Channel and Fault Attacks}, howpublished = {Cryptology ePrint Archive, Report 2014/665}, year = {2014}, url = {https://eprint.iacr.org/2014/665}, } @misc{cryptoeprint:2014:666, author = {Sanjam Garg and Craig Gentry and Shai Halevi and Mark Zhandry}, title = {Functional Encryption Without Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2014/666}, year = {2014}, url = {https://eprint.iacr.org/2014/666}, } @misc{cryptoeprint:2014:667, author = {Yehuda Lindell and Ben Riva}, title = {Cut-and-Choose Based Two-Party Computation in the Online/Offline and Batch Settings}, howpublished = {Cryptology ePrint Archive, Report 2014/667}, year = {2014}, url = {https://eprint.iacr.org/2014/667}, } @misc{cryptoeprint:2014:668, author = {Ran Cohen and Yehuda Lindell}, title = {Fairness versus Guaranteed Output Delivery in Secure Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2014/668}, year = {2014}, url = {https://eprint.iacr.org/2014/668}, } @misc{cryptoeprint:2014:669, author = {Pavel Hubacek and Daniel Wichs}, title = {On the Communication Complexity of Secure Function Evaluation with Long Output}, howpublished = {Cryptology ePrint Archive, Report 2014/669}, year = {2014}, url = {https://eprint.iacr.org/2014/669}, } @misc{cryptoeprint:2014:670, author = {Dhananjay S. Phatak, Qiang Tang, Alan T. Sherman, Warren D. Smith, Peter Ryan, Kostas Kalpakis}, title = {DoubleMod and SingleMod: Simple Randomized Secret-Key Encryption with Bounded Homomorphicity}, howpublished = {Cryptology ePrint Archive, Report 2014/670}, year = {2014}, url = {https://eprint.iacr.org/2014/670}, } @misc{cryptoeprint:2014:671, author = {Xiao Shaun Wang and Yan Huang and T-H. Hubert Chan and abhi shelat and Elaine Shi}, title = {SCORAM: Oblivious RAM for Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2014/671}, year = {2014}, url = {https://eprint.iacr.org/2014/671}, } @misc{cryptoeprint:2014:672, author = {Xiao Wang and Hubert Chan and Elaine Shi}, title = {Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound}, howpublished = {Cryptology ePrint Archive, Report 2014/672}, year = {2014}, url = {https://eprint.iacr.org/2014/672}, } @misc{cryptoeprint:2014:673, author = {Victor Lomné, Emmanuel Prouff, Matthieu Rivain, Thomas Roche, Adrian Thillard}, title = {How to Estimate the Success Rate of Higher-Order Side-Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2014/673}, year = {2014}, url = {https://eprint.iacr.org/2014/673}, } @misc{cryptoeprint:2014:674, author = {Riad S. Wahby and Srinath Setty and Max Howald and Zuocheng Ren and Andrew J. Blumberg and Michael Walfish}, title = {Efficient RAM and control flow in verifiable outsourced computation}, howpublished = {Cryptology ePrint Archive, Report 2014/674}, year = {2014}, url = {https://eprint.iacr.org/2014/674}, } @misc{cryptoeprint:2014:675, author = {Jian Guo and Jérémy Jean and Gaëtan Leurent and Thomas Peyrin and Lei Wang}, title = {The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function}, howpublished = {Cryptology ePrint Archive, Report 2014/675}, year = {2014}, url = {https://eprint.iacr.org/2014/675}, } @misc{cryptoeprint:2014:676, author = {Zhen Liu and Zhenfu Cao and Duncan S. Wong}, title = {Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts}, howpublished = {Cryptology ePrint Archive, Report 2014/676}, year = {2014}, url = {https://eprint.iacr.org/2014/676}, } @misc{cryptoeprint:2014:677, author = {Gustavo Banegas}, title = {Attacks in Stream Ciphers: A Survey}, howpublished = {Cryptology ePrint Archive, Report 2014/677}, year = {2014}, url = {https://eprint.iacr.org/2014/677}, } @misc{cryptoeprint:2014:678, author = {Stephan Krenn and Krzysztof Pietrzak and Akshay Wadia and Daniel Wichs}, title = {A Counterexample to the Chain Rule for Conditional HILL Entropy}, howpublished = {Cryptology ePrint Archive, Report 2014/678}, year = {2014}, url = {https://eprint.iacr.org/2014/678}, } @misc{cryptoeprint:2014:679, author = {Zhengjun Cao and Lihua Liu}, title = {A Note on the Bellare-Rivest Protocol for Translucent Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2014/679}, year = {2014}, url = {https://eprint.iacr.org/2014/679}, } @misc{cryptoeprint:2014:680, author = {Zhengjun Cao and Lihua Liu}, title = {Remarks on the Cryptographic Primitive of Attribute-based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2014/680}, year = {2014}, url = {https://eprint.iacr.org/2014/680}, } @misc{cryptoeprint:2014:681, author = {Mohamed Ahmed Abdelraheem, Javad Alizadeh, Hoda A. Alkhzaimi, Mohammad Reza Aref, Nasour Bagheri, Praveen Gauravaram, and Martin M. Lauridsen}, title = {Improved Linear Cryptanalysis of Reduced-round SIMON}, howpublished = {Cryptology ePrint Archive, Report 2014/681}, year = {2014}, url = {https://eprint.iacr.org/2014/681}, } @misc{cryptoeprint:2014:682, author = {Hélène Le Bouder, Ronan Lashermes , Yanis Linge , Bruno Robisson and Assia Tria}, title = {A Unified Formalism for Physical Attacks}, howpublished = {Cryptology ePrint Archive, Report 2014/682}, year = {2014}, url = {https://eprint.iacr.org/2014/682}, } @misc{cryptoeprint:2014:683, author = {Ling Song and Lei Hu and Siwei Sun and Zhang Zhang and Danping Shi and Ronglin Hao}, title = {Error-Tolerant Algebraic Side-Channel Attacks Using BEE}, howpublished = {Cryptology ePrint Archive, Report 2014/683}, year = {2014}, url = {https://eprint.iacr.org/2014/683}, } @misc{cryptoeprint:2014:684, author = {Antonio de la Piedra and Jaap-Henk Hoepman and Pim Vullers}, title = {Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards}, howpublished = {Cryptology ePrint Archive, Report 2014/684}, year = {2014}, url = {https://eprint.iacr.org/2014/684}, } @misc{cryptoeprint:2014:685, author = {Mingqiang Wang and Tao Zhan and Haibin Zhang}, title = {Bit Security of the CDH Problems over Finite Field}, howpublished = {Cryptology ePrint Archive, Report 2014/685}, year = {2014}, url = {https://eprint.iacr.org/2014/685}, } @misc{cryptoeprint:2014:686, author = {Ming Li and Dongdai Lin}, title = {A Recursive Relation Between The Adjacency Graph of Some LFSRs and Its Applications}, howpublished = {Cryptology ePrint Archive, Report 2014/686}, year = {2014}, url = {https://eprint.iacr.org/2014/686}, } @misc{cryptoeprint:2014:687, author = {Omer Egecioglu and Cetin Kaya Koc}, title = {Reducing the Complexity of Normal Basis Multiplication}, howpublished = {Cryptology ePrint Archive, Report 2014/687}, year = {2014}, url = {https://eprint.iacr.org/2014/687}, } @misc{cryptoeprint:2014:688, author = {Chung Hun Baek and Jung Hee Cheon, and Hyunsook Hong}, title = {White-Box AES Implementation Revisited}, howpublished = {Cryptology ePrint Archive, Report 2014/688}, year = {2014}, url = {https://eprint.iacr.org/2014/688}, } @misc{cryptoeprint:2014:689, author = {Ahto Buldas and Risto Laanoja and Ahto Truu}, title = {Efficient Implementation of Keyless Signatures with Hash Sequence Authentication}, howpublished = {Cryptology ePrint Archive, Report 2014/689}, year = {2014}, url = {https://eprint.iacr.org/2014/689}, } @misc{cryptoeprint:2014:690, author = {Genqiang Wu and Yeping He and Yi Lu and Liping Ding}, title = {Efficient Interval Check in the Presence of Malicious Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2014/690}, year = {2014}, url = {https://eprint.iacr.org/2014/690}, } @misc{cryptoeprint:2014:691, author = {Antonio de la Piedra}, title = {Integration of hardware tokens in the Idemix library}, howpublished = {Cryptology ePrint Archive, Report 2014/691}, year = {2014}, url = {https://eprint.iacr.org/2014/691}, } @misc{cryptoeprint:2014:692, author = {Enrique Larraia}, title = {Extending Oblivious Transfer Efficiently, or - How to get active security with constant cryptographic overhead}, howpublished = {Cryptology ePrint Archive, Report 2014/692}, year = {2014}, url = {https://eprint.iacr.org/2014/692}, } @misc{cryptoeprint:2014:693, author = {Ioana Boureanu and Serge Vaudenay}, title = {Optimal Proximity Proofs}, howpublished = {Cryptology ePrint Archive, Report 2014/693}, year = {2014}, url = {https://eprint.iacr.org/2014/693}, } @misc{cryptoeprint:2014:694, author = {Ange Albertini and Jean-Philippe Aumasson and Maria Eichlseder and Florian Mendel and Martin Schläffer}, title = {Malicious Hashing: Eve's Variant of SHA-1}, howpublished = {Cryptology ePrint Archive, Report 2014/694}, year = {2014}, url = {https://eprint.iacr.org/2014/694}, } @misc{cryptoeprint:2014:695, author = {Serge Vaudenay}, title = {Proof of Proximity of Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2014/695}, year = {2014}, url = {https://eprint.iacr.org/2014/695}, } @misc{cryptoeprint:2014:696, author = {Ahto Buldas and Risto Laanoja and Ahto Truu}, title = {Security Proofs for the BLT Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2014/696}, year = {2014}, url = {https://eprint.iacr.org/2014/696}, } @misc{cryptoeprint:2014:697, author = {Zhigang Chen, Jian Wang, ZengNian Zhang , Xinxia Song}, title = {A Fully Homomorphic Encryption Scheme with Better Key Size}, howpublished = {Cryptology ePrint Archive, Report 2014/697}, year = {2014}, url = {https://eprint.iacr.org/2014/697}, } @misc{cryptoeprint:2014:698, author = {Oscar Garcia-Morchon and Domingo Gomez-Perez and Jaime Gutierrez and Ronald Rietman and Berry Schoenmakers and Ludo Tolhuizen}, title = {HIMMO - A lightweight collusion-resistant key predistribution scheme}, howpublished = {Cryptology ePrint Archive, Report 2014/698}, year = {2014}, url = {https://eprint.iacr.org/2014/698}, } @misc{cryptoeprint:2014:699, author = {Christina Boura and María Naya-Plasencia and Valentin Suder}, title = {Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2014/699}, year = {2014}, url = {https://eprint.iacr.org/2014/699}, } @misc{cryptoeprint:2014:700, author = {Ahto Buldas and Risto Laanoja and Peeter Laud and Ahto Truu}, title = {Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures}, howpublished = {Cryptology ePrint Archive, Report 2014/700}, year = {2014}, url = {https://eprint.iacr.org/2014/700}, } @misc{cryptoeprint:2014:701, author = {Erfan Aghaee and Majid Rahimi and Hamed Yusefi}, title = {A Practical Iterative Side Channel Cube Attack on AES-128/256}, howpublished = {Cryptology ePrint Archive, Report 2014/701}, year = {2014}, url = {https://eprint.iacr.org/2014/701}, } @misc{cryptoeprint:2014:702, author = {Benoit Feix and Hugues Thiebeauld}, title = {Defeating ISO9797-1 MAC Algo 3 by Combining Side-Channel and Brute Force Techniques}, howpublished = {Cryptology ePrint Archive, Report 2014/702}, year = {2014}, url = {https://eprint.iacr.org/2014/702}, } @misc{cryptoeprint:2014:703, author = {Simona Samardjiska and Danilo Gligoroski}, title = {Linearity Measures for MQ Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2014/703}, year = {2014}, url = {https://eprint.iacr.org/2014/703}, } @misc{cryptoeprint:2014:704, author = {Shenghui Su and Shuwang Lü and Daqiang Dong}, title = {A 128-bit Block Cipher Based on Three Group Arithmetics}, howpublished = {Cryptology ePrint Archive, Report 2014/704}, year = {2014}, url = {https://eprint.iacr.org/2014/704}, } @misc{cryptoeprint:2014:705, author = {Christian Hanser and Daniel Slamanig}, title = {Structure-Preserving Signatures on Equivalence Classes and their Application to Anonymous Credentials}, howpublished = {Cryptology ePrint Archive, Report 2014/705}, year = {2014}, url = {https://eprint.iacr.org/2014/705}, } @misc{cryptoeprint:2014:706, author = {Carmit Hazay and Hila Zarosim}, title = {The Feasibility of Outsourced Database Search in the Plain Model}, howpublished = {Cryptology ePrint Archive, Report 2014/706}, year = {2014}, url = {https://eprint.iacr.org/2014/706}, } @misc{cryptoeprint:2014:707, author = {Sebastien Tiran and Guillaume Reymond and Jean-Baptiste Rigaud and Driss Aboulkassimi and Benedikt Gierlichs and Mathieu Carbone and Gilles Ducharme and Philippe Maurine}, title = {Analysis Of Variance and CPA in SCA}, howpublished = {Cryptology ePrint Archive, Report 2014/707}, year = {2014}, url = {https://eprint.iacr.org/2014/707}, } @misc{cryptoeprint:2014:708, author = {Jan Camenisch and Stephan Krenn and Anja Lehmann and Gert Læssøe Mikkelsen and Gregory Neven and Michael Østergaard Pedersen}, title = {Formal Treatment of Privacy-Enhancing Credential Systems}, howpublished = {Cryptology ePrint Archive, Report 2014/708}, year = {2014}, url = {https://eprint.iacr.org/2014/708}, } @misc{cryptoeprint:2014:709, author = {Fang Song}, title = {A Note on Quantum Security for Post-Quantum Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2014/709}, year = {2014}, url = {https://eprint.iacr.org/2014/709}, } @misc{cryptoeprint:2014:710, author = {Yehuda Lindell}, title = {An Efficient Transform from Sigma Protocols to NIZK with a CRS and Non-Programmable Random Oracle}, howpublished = {Cryptology ePrint Archive, Report 2014/710}, year = {2014}, url = {https://eprint.iacr.org/2014/710}, } @misc{cryptoeprint:2014:711, author = {Masao KASAHARA}, title = {New Class of Multivariate Public Key Cryptosystem, K(XI)RSE(2)PKC, Constructed based on Reed-Solomon Code Along with K(X)RSE(2)PKC over $\mathbb{F}_2$}, howpublished = {Cryptology ePrint Archive, Report 2014/711}, year = {2014}, url = {https://eprint.iacr.org/2014/711}, } @misc{cryptoeprint:2014:712, author = {Mohammad Wazid}, title = {Hybrid Anomaly Detection using K-Means Clustering in Wireless Sensor Networks}, howpublished = {Cryptology ePrint Archive, Report 2014/712}, year = {2014}, url = {https://eprint.iacr.org/2014/712}, } @misc{cryptoeprint:2014:713, author = {Yossi Azar and Seny Kamara and Ishai Menache and Mariana Raykova and Bruce Shepherd}, title = {Co-Location-Resistant Clouds}, howpublished = {Cryptology ePrint Archive, Report 2014/713}, year = {2014}, url = {https://eprint.iacr.org/2014/713}, } @misc{cryptoeprint:2014:714, author = {Artur Mariano and Ozgur Dagdelen and Christian Bischof}, title = {A comprehensive empirical comparison of parallel ListSieve and GaussSieve}, howpublished = {Cryptology ePrint Archive, Report 2014/714}, year = {2014}, url = {https://eprint.iacr.org/2014/714}, } @misc{cryptoeprint:2014:715, author = {Vanga Odelu and Ashok Kumar Das and Adrijit Goswami}, title = {Cryptanalysis on `Robust Biometrics-Based Authentication Scheme for Multi-server Environment'}, howpublished = {Cryptology ePrint Archive, Report 2014/715}, year = {2014}, url = {https://eprint.iacr.org/2014/715}, } @misc{cryptoeprint:2014:716, author = {Amir Moradi}, title = {Wire-Tap Codes as Side-Channel Countermeasure - an FPGA-based experiment}, howpublished = {Cryptology ePrint Archive, Report 2014/716}, year = {2014}, url = {https://eprint.iacr.org/2014/716}, } @misc{cryptoeprint:2014:717, author = {Ruxandra F. Olimid}, title = {How to Split a Secret into Unknown Shares}, howpublished = {Cryptology ePrint Archive, Report 2014/717}, year = {2014}, url = {https://eprint.iacr.org/2014/717}, } @misc{cryptoeprint:2014:718, author = {George Danezis and Cedric Fournet and Jens Groth and Markulf Kohlweiss}, title = {Square Span Programs with Applications to Succinct NIZK Arguments}, howpublished = {Cryptology ePrint Archive, Report 2014/718}, year = {2014}, url = {https://eprint.iacr.org/2014/718}, } @misc{cryptoeprint:2014:719, author = {Dan Boneh and Henry Corrigan-Gibbs}, title = {Bivariate Polynomials Modulo Composites and their Applications}, howpublished = {Cryptology ePrint Archive, Report 2014/719}, year = {2014}, url = {https://eprint.iacr.org/2014/719}, } @misc{cryptoeprint:2014:720, author = {Dennis Hofheinz and Akshay Kamath and Venkata Koppula and Brent Waters}, title = {Adaptively Secure Constrained Pseudorandom Functions}, howpublished = {Cryptology ePrint Archive, Report 2014/720}, year = {2014}, url = {https://eprint.iacr.org/2014/720}, } @misc{cryptoeprint:2014:721, author = {Zhengjun Cao and Zhenfu Cao}, title = {On Shor's Factoring Algorithm with More Registers and the Problem to Certify Quantum Computers}, howpublished = {Cryptology ePrint Archive, Report 2014/721}, year = {2014}, url = {https://eprint.iacr.org/2014/721}, } @misc{cryptoeprint:2014:722, author = {Christoph Dobraunig and Florian Mendel and Martin Schläffer}, title = {Differential Cryptanalysis of SipHash}, howpublished = {Cryptology ePrint Archive, Report 2014/722}, year = {2014}, url = {https://eprint.iacr.org/2014/722}, } @misc{cryptoeprint:2014:723, author = {Yalin Chen and Jue-Sam Chou*}, title = {Crypto-analyses on “secure and efficient privacy-preserving public auditing scheme for cloud storage”}, howpublished = {Cryptology ePrint Archive, Report 2014/723}, year = {2014}, url = {https://eprint.iacr.org/2014/723}, } @misc{cryptoeprint:2014:724, author = {Janaka Alawatugoda and Douglas Stebila and Colin Boyd}, title = {Protecting Encrypted Cookies from Compression Side-Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2014/724}, year = {2014}, url = {https://eprint.iacr.org/2014/724}, } @misc{cryptoeprint:2014:725, author = {Ruan de Clercq, Sujoy Sinha Roy, Frederik Vercauteren, Ingrid Verbauwhede}, title = {Efficient Software Implementation of Ring-LWE Encryption}, howpublished = {Cryptology ePrint Archive, Report 2014/725}, year = {2014}, url = {https://eprint.iacr.org/2014/725}, } @misc{cryptoeprint:2014:726, author = {Nima Karimpour Darav and Reza Ebrahimi Atani and Erfan Aghaei and Ahmad Tahmasivand and Mahsa Rahmani and Mina Moazzam Jazi}, title = {CIARP: A RISC Processor For Cryptography Applications}, howpublished = {Cryptology ePrint Archive, Report 2014/726}, year = {2014}, url = {https://eprint.iacr.org/2014/726}, } @misc{cryptoeprint:2014:727, author = {Benjamin Smith}, title = {The Q-curve Construction for Endomorphism-Accelerated Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2014/727}, year = {2014}, url = {https://eprint.iacr.org/2014/727}, } @misc{cryptoeprint:2014:728, author = {Jean Paul Degabriele and Victoria Fehr and Marc Fischlin and Tommaso Gagliardoni and Felix Günther and Giorgia Azzurra Marson and Arno Mittelbach and Kenneth G. Paterson}, title = {Unpicking PLAID - A Cryptographic Analysis of an ISO-standards-track Authentication Protocol}, howpublished = {Cryptology ePrint Archive, Report 2014/728}, year = {2014}, url = {https://eprint.iacr.org/2014/728}, } @misc{cryptoeprint:2014:729, author = {Daniel J. Bernstein and Tung Chou}, title = {Faster Binary-Field Multiplication and Faster Binary-Field MACs}, howpublished = {Cryptology ePrint Archive, Report 2014/729}, year = {2014}, url = {https://eprint.iacr.org/2014/729}, } @misc{cryptoeprint:2014:730, author = {Jalaj Upadhyay}, title = {Differentially Private Linear Algebra in the Streaming Model}, howpublished = {Cryptology ePrint Archive, Report 2014/730}, year = {2014}, url = {https://eprint.iacr.org/2014/730}, } @misc{cryptoeprint:2014:731, author = {Mark Manulis and Douglas Stebila and Franziskus Kiefer and Nick Denham}, title = {Secure modular password authentication for the web using channel bindings}, howpublished = {Cryptology ePrint Archive, Report 2014/731}, year = {2014}, url = {https://eprint.iacr.org/2014/731}, } @misc{cryptoeprint:2014:732, author = {Tarik Moataz and Travis Mayberry and Erik-Oliver Blass and Agnes Hui Chan}, title = {Resizable Tree-Based Oblivious RAM}, howpublished = {Cryptology ePrint Archive, Report 2014/732}, year = {2014}, url = {https://eprint.iacr.org/2014/732}, } @misc{cryptoeprint:2014:733, author = {Rachid El~Bansarkhani and Özgür Dagdelen and Johannes Buchmann}, title = {Augmented Learning with Errors: The Untapped Potential of the Error Term}, howpublished = {Cryptology ePrint Archive, Report 2014/733}, year = {2014}, url = {https://eprint.iacr.org/2014/733}, } @misc{cryptoeprint:2014:734, author = {Lejla Batina and Domagoj Jakobovic and Nele Mentens and Stjepan Picek and Antonio de la Piedra and Dominik Sisejkovic}, title = {S-box pipelining using genetic algorithms for high-throughput AES implementations: How fast can we go?}, howpublished = {Cryptology ePrint Archive, Report 2014/734}, year = {2014}, url = {https://eprint.iacr.org/2014/734}, } @misc{cryptoeprint:2014:735, author = {Ruxandra F. Olimid}, title = {Dealer-Leakage Resilient Verifiable Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2014/735}, year = {2014}, url = {https://eprint.iacr.org/2014/735}, } @misc{cryptoeprint:2014:736, author = {Itai Dinur and Pawel Morawiecki and Josef Pieprzyk and Marian Srebrny and Michal Straus}, title = {Cube Attacks and Cube-attack-like Cryptanalysis on the Round-reduced Keccak Sponge Function}, howpublished = {Cryptology ePrint Archive, Report 2014/736}, year = {2014}, url = {https://eprint.iacr.org/2014/736}, } @misc{cryptoeprint:2014:737, author = {SK Hafizul Islam and Abhishek Singh}, title = {Design and analysis of one-round certificateless authenticated group key agreement protocol with bilinear pairings}, howpublished = {Cryptology ePrint Archive, Report 2014/737}, year = {2014}, url = {https://eprint.iacr.org/2014/737}, } @misc{cryptoeprint:2014:738, author = {N. Nalla Anandakumar and Thomas Peyrin and Axel Poschmann}, title = {A Very Compact FPGA Implementation of LED and PHOTON}, howpublished = {Cryptology ePrint Archive, Report 2014/738}, year = {2014}, url = {https://eprint.iacr.org/2014/738}, } @misc{cryptoeprint:2014:739, author = {Smile Markovski and Aleksandra Mileva and Vesna Dimitrova}, title = {SBIM(Q) - a Multivariate Polynomial Trapdoor Function over the Field of Rational Numbers}, howpublished = {Cryptology ePrint Archive, Report 2014/739}, year = {2014}, url = {https://eprint.iacr.org/2014/739}, } @misc{cryptoeprint:2014:740, author = {Shashi Kant Pandey and P.R Mishra and B.K Dass}, title = {Non-existence of [n; 5] type Generalized Bent function.}, howpublished = {Cryptology ePrint Archive, Report 2014/740}, year = {2014}, url = {https://eprint.iacr.org/2014/740}, } @misc{cryptoeprint:2014:741, author = {André Schaller, Taras Stanko, Boris Škorić, Stefan Katzenbeisser}, title = {Eliminating Leakage in Reverse Fuzzy Extractors}, howpublished = {Cryptology ePrint Archive, Report 2014/741}, year = {2014}, url = {https://eprint.iacr.org/2014/741}, } @misc{cryptoeprint:2014:742, author = {Nadia El Mrabet and Jacques J.A. Fournier and Louis Goubin and Ronan Lashermes }, title = {A survey of Fault Attacks in Pairing Based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2014/742}, year = {2014}, url = {https://eprint.iacr.org/2014/742}, } @misc{cryptoeprint:2014:743, author = {Benoit Libert and Marc Joye and Moti Yung and Thomas Peters}, title = {Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security}, howpublished = {Cryptology ePrint Archive, Report 2014/743}, year = {2014}, url = {https://eprint.iacr.org/2014/743}, } @misc{cryptoeprint:2014:744, author = {Thijs Laarhoven}, title = {Sieving for shortest vectors in lattices using angular locality-sensitive hashing}, howpublished = {Cryptology ePrint Archive, Report 2014/744}, year = {2014}, url = {https://eprint.iacr.org/2014/744}, } @misc{cryptoeprint:2014:745, author = {Susan Hohenberger and Venkata Koppula and Brent Waters}, title = {Universal Signature Aggregators}, howpublished = {Cryptology ePrint Archive, Report 2014/745}, year = {2014}, url = {https://eprint.iacr.org/2014/745}, } @misc{cryptoeprint:2014:746, author = {Vladimir Shpilrain}, title = {Decoy-based information security}, howpublished = {Cryptology ePrint Archive, Report 2014/746}, year = {2014}, url = {https://eprint.iacr.org/2014/746}, } @misc{cryptoeprint:2014:747, author = {Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu}, title = {Towards Finding the Best Characteristics of Some Bit-oriented Block Ciphers and Automatic Enumeration of (Related-key) Differential and Linear Characteristics with Predefined Properties}, howpublished = {Cryptology ePrint Archive, Report 2014/747}, year = {2014}, url = {https://eprint.iacr.org/2014/747}, } @misc{cryptoeprint:2014:748, author = {Mehmet Sabır Kiraz and Osmanbey Uzunkol}, title = {Efficient and Verifiable Algorithms for Secure Outsourcing of Cryptographic Computations}, howpublished = {Cryptology ePrint Archive, Report 2014/748}, year = {2014}, url = {https://eprint.iacr.org/2014/748}, } @misc{cryptoeprint:2014:749, author = {Daniel E. Holcomb and Kevin Fu}, title = {Bitline PUF: Building Native Challenge-Response PUF Capability into Any SRAM}, howpublished = {Cryptology ePrint Archive, Report 2014/749}, year = {2014}, url = {https://eprint.iacr.org/2014/749}, } @misc{cryptoeprint:2014:750, author = {Shivam Bhasin and Jean-Luc Danger and Sylvain Guilley and Xuan Thuy Ngo and Laurent Sauvage}, title = {Hardware Trojan Horses in Cryptographic IP Cores}, howpublished = {Cryptology ePrint Archive, Report 2014/750}, year = {2014}, url = {https://eprint.iacr.org/2014/750}, } @misc{cryptoeprint:2014:751, author = {Begül Bilgin and Benedikt Gierlichs and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {Higher-Order Threshold Implementations}, howpublished = {Cryptology ePrint Archive, Report 2014/751}, year = {2014}, url = {https://eprint.iacr.org/2014/751}, } @misc{cryptoeprint:2014:752, author = {Arcangelo Castiglione and Alfredo De Santis and Barbara Masucci}, title = {Key Indistinguishability vs. Strong Key Indistinguishability for Hierarchical Key Assignment Schemes}, howpublished = {Cryptology ePrint Archive, Report 2014/752}, year = {2014}, url = {https://eprint.iacr.org/2014/752}, } @misc{cryptoeprint:2014:753, author = {Alonso Gonzalez-Ulloa and Alejandro Hevia}, title = {Online Deniability for Multiparty Protocols with Applications to Externally Anonymous Authentication}, howpublished = {Cryptology ePrint Archive, Report 2014/753}, year = {2014}, url = {https://eprint.iacr.org/2014/753}, } @misc{cryptoeprint:2014:754, author = {Lucas Kowalczyk and Allison Bishop Lewko}, title = {Bilinear Entropy Expansion from the Decisional Linear Assumption}, howpublished = {Cryptology ePrint Archive, Report 2014/754}, year = {2014}, url = {https://eprint.iacr.org/2014/754}, } @misc{cryptoeprint:2014:755, author = {Mark A. Will and Ryan K. L. Ko}, title = {Computing Mod Without Mod}, howpublished = {Cryptology ePrint Archive, Report 2014/755}, year = {2014}, url = {https://eprint.iacr.org/2014/755}, } @misc{cryptoeprint:2014:756, author = {Samee Zahur and Mike Rosulek and David Evans}, title = {Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates}, howpublished = {Cryptology ePrint Archive, Report 2014/756}, year = {2014}, url = {https://eprint.iacr.org/2014/756}, } @misc{cryptoeprint:2014:757, author = {Mark Zhandry}, title = {Adaptively Secure Broadcast Encryption with Small System Parameters}, howpublished = {Cryptology ePrint Archive, Report 2014/757}, year = {2014}, url = {https://eprint.iacr.org/2014/757}, } @misc{cryptoeprint:2014:758, author = {Ilya Mironov and Noah Stephens-Davidowitz}, title = {Cryptographic Reverse Firewalls}, howpublished = {Cryptology ePrint Archive, Report 2014/758}, year = {2014}, url = {https://eprint.iacr.org/2014/758}, } @misc{cryptoeprint:2014:759, author = {Arash Afshar and Zhangxiang Hu and Payman Mohassel and Mike Rosulek}, title = {How to Efficiently Evaluate RAM Programs with Malicious Security}, howpublished = {Cryptology ePrint Archive, Report 2014/759}, year = {2014}, url = {https://eprint.iacr.org/2014/759}, } @misc{cryptoeprint:2014:760, author = {Hwajeong Seo, Zhe Liu, Johann Gro{\ss}sch{\"a}dl, Jongseok Choi, and Howon Kim}, title = {Montgomery Modular Multiplication on ARM-NEON Revisited}, howpublished = {Cryptology ePrint Archive, Report 2014/760}, year = {2014}, url = {https://eprint.iacr.org/2014/760}, } @misc{cryptoeprint:2014:761, author = {Qingju Wang and Zhiqiang Liu and Kerem Varici and Yu Sasaki and Vincent Rijmen and Yosuke Todo}, title = {Cryptanalysis of Reduced-round SIMON32 and SIMON48}, howpublished = {Cryptology ePrint Archive, Report 2014/761}, year = {2014}, url = {https://eprint.iacr.org/2014/761}, } @misc{cryptoeprint:2014:762, author = {James Alderman and Christian Janson and Carlos Cid and Jason Crampton}, title = {Access Control in Publicly Verifiable Outsourced Computation}, howpublished = {Cryptology ePrint Archive, Report 2014/762}, year = {2014}, url = {https://eprint.iacr.org/2014/762}, } @misc{cryptoeprint:2014:763, author = {Arthur Gervais and Ghassan O. Karame and Damian Gruber and Srdjan Capkun}, title = {On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients}, howpublished = {Cryptology ePrint Archive, Report 2014/763}, year = {2014}, url = {https://eprint.iacr.org/2014/763}, } @misc{cryptoeprint:2014:764, author = {Jens Groth and Markulf Kohlweiss}, title = {One-out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin}, howpublished = {Cryptology ePrint Archive, Report 2014/764}, year = {2014}, url = {https://eprint.iacr.org/2014/764}, } @misc{cryptoeprint:2014:765, author = {Juan Garay and Aggelos Kiayias and Nikos Leonardos}, title = {The Bitcoin Backbone Protocol: Analysis and Applications}, howpublished = {Cryptology ePrint Archive, Report 2014/765}, year = {2014}, url = {https://eprint.iacr.org/2014/765}, } @misc{cryptoeprint:2014:766, author = {Huijia Lin and Rafael Pass}, title = {Succinct Garbling Schemes and Applications}, howpublished = {Cryptology ePrint Archive, Report 2014/766}, year = {2014}, url = {https://eprint.iacr.org/2014/766}, } @misc{cryptoeprint:2014:767, author = {Hassan Jameel Asghar and Ron Steinfeld and Shujun Li and Mohamed Ali Kaafar and Josef Pieprzyk}, title = {Algebraic Attacks on Human Identification Protocols}, howpublished = {Cryptology ePrint Archive, Report 2014/767}, year = {2014}, url = {https://eprint.iacr.org/2014/767}, } @misc{cryptoeprint:2014:768, author = {Han Jiang and Xiaochao Wei and Chuan Zhao and Qiuliang Xu}, title = {Cut-and-Choose Bilateral Oblivious Transfer and Its Application in Secure Two-party Computation}, howpublished = {Cryptology ePrint Archive, Report 2014/768}, year = {2014}, url = {https://eprint.iacr.org/2014/768}, } @misc{cryptoeprint:2014:769, author = {Ran Canetti and Justin Holmgren and Abhishek Jain and Vinod Vaikuntanathan}, title = {Indistinguishability Obfuscation of Iterated Circuits and RAM Programs}, howpublished = {Cryptology ePrint Archive, Report 2014/769}, year = {2014}, url = {https://eprint.iacr.org/2014/769}, } @misc{cryptoeprint:2014:770, author = {Takaaki Mizuki and Yu-ichi Hayashi}, title = {AES Cipher Keys Suitable for Efficient Side-Channel Vulnerability Evaluation}, howpublished = {Cryptology ePrint Archive, Report 2014/770}, year = {2014}, url = {https://eprint.iacr.org/2014/770}, } @misc{cryptoeprint:2014:771, author = {Nir Bitansky and Sanjam Garg and Sidharth Telang}, title = {Succinct Randomized Encodings and their Applications}, howpublished = {Cryptology ePrint Archive, Report 2014/771}, year = {2014}, url = {https://eprint.iacr.org/2014/771}, } @misc{cryptoeprint:2014:772, author = {Nuttapong Attrapadung}, title = {Fully Secure and Succinct Attribute Based Encryption for Circuits from Multi-linear Maps}, howpublished = {Cryptology ePrint Archive, Report 2014/772}, year = {2014}, url = {https://eprint.iacr.org/2014/772}, } @misc{cryptoeprint:2014:773, author = {Amit Sahai and Mark Zhandry}, title = {Obfuscating Low-Rank Matrix Branching Programs}, howpublished = {Cryptology ePrint Archive, Report 2014/773}, year = {2014}, url = {https://eprint.iacr.org/2014/773}, } @misc{cryptoeprint:2014:774, author = {Alex J. Malozemoff and Jonathan Katz and Matthew D. Green}, title = {Automated Analysis and Synthesis of Block-Cipher Modes of Operation}, howpublished = {Cryptology ePrint Archive, Report 2014/774}, year = {2014}, url = {https://eprint.iacr.org/2014/774}, } @misc{cryptoeprint:2014:775, author = {Artur Mariano, Shahar Timnat and Christian Bischof}, title = {Lock-free GaussSieve for Linear Speedups in Parallel High Performance SVP Calculation}, howpublished = {Cryptology ePrint Archive, Report 2014/775}, year = {2014}, url = {https://eprint.iacr.org/2014/775}, } @misc{cryptoeprint:2014:776, author = {Joe Zimmerman}, title = {How to Obfuscate Programs Directly}, howpublished = {Cryptology ePrint Archive, Report 2014/776}, year = {2014}, url = {https://eprint.iacr.org/2014/776}, } @misc{cryptoeprint:2014:777, author = {Koji Nuida and Kaoru Kurosawa}, title = {(Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces}, howpublished = {Cryptology ePrint Archive, Report 2014/777}, year = {2014}, url = {https://eprint.iacr.org/2014/777}, } @misc{cryptoeprint:2014:778, author = {Michael Clear and Hitesh Tewari and Ciar\'{a}n McGoldrick}, title = {Anonymous IBE from Quadratic Residuosity with Improved Performance}, howpublished = {Cryptology ePrint Archive, Report 2014/778}, year = {2014}, url = {https://eprint.iacr.org/2014/778}, } @misc{cryptoeprint:2014:779, author = {Daniel Apon, Yan Huang, Jonathan Katz, Alex J. Malozemoff}, title = {Implementing Cryptographic Program Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2014/779}, year = {2014}, url = {https://eprint.iacr.org/2014/779}, } @misc{cryptoeprint:2014:780, author = {Venkata Koppula and Omkant Pandey and Yannis Rouselakis and Brent Waters}, title = {Deterministic Public-Key Encryption under Continual Leakage}, howpublished = {Cryptology ePrint Archive, Report 2014/780}, year = {2014}, url = {https://eprint.iacr.org/2014/780}, } @misc{cryptoeprint:2014:781, author = {Boris Skoric}, title = {Tally-based simple decoders for traitor tracing and group testing}, howpublished = {Cryptology ePrint Archive, Report 2014/781}, year = {2014}, url = {https://eprint.iacr.org/2014/781}, } @misc{cryptoeprint:2014:782, author = {Raghavan Kumar and Philipp Jovanovic and Ilia Polian}, title = {Precise Fault-Injections using Voltage and Temperature Manipulation for Differential Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2014/782}, year = {2014}, url = {https://eprint.iacr.org/2014/782}, } @misc{cryptoeprint:2014:783, author = {Raghavan Kumar and Philipp Jovanovic and Wayne Burleson and Ilia Polian}, title = {Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware}, howpublished = {Cryptology ePrint Archive, Report 2014/783}, year = {2014}, url = {https://eprint.iacr.org/2014/783}, } @misc{cryptoeprint:2014:784, author = {Kirsten Eisentraeger and Sean Hallgren and Kristin Lauter}, title = {Weak Instances of PLWE}, howpublished = {Cryptology ePrint Archive, Report 2014/784}, year = {2014}, url = {https://eprint.iacr.org/2014/784}, } @misc{cryptoeprint:2014:785, author = {Sébastien Canard, David Pointcheval, Olivier Sanders and Jacques Traoré}, title = {Divisible E-Cash Made Practical}, howpublished = {Cryptology ePrint Archive, Report 2014/785}, year = {2014}, url = {https://eprint.iacr.org/2014/785}, } @misc{cryptoeprint:2014:786, author = {Chun Guo and Dongdai Lin}, title = {On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation}, howpublished = {Cryptology ePrint Archive, Report 2014/786}, year = {2014}, url = {https://eprint.iacr.org/2014/786}, } @misc{cryptoeprint:2014:787, author = {Amadou Moctar Kane}, title = {Another Tor is possible}, howpublished = {Cryptology ePrint Archive, Report 2014/787}, year = {2014}, url = {https://eprint.iacr.org/2014/787}, } @misc{cryptoeprint:2014:788, author = {Robert Fitzpatrick and Christian Bischof and Johannes Buchmann and Ozgur Dagdelen and Florian Gopfert and Artur Mariano and Bo-Yin Yang}, title = {Tuning GaussSieve for Speed}, howpublished = {Cryptology ePrint Archive, Report 2014/788}, year = {2014}, url = {https://eprint.iacr.org/2014/788}, } @misc{cryptoeprint:2014:789, author = {S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Einollah Pasha}, title = {Statistical Properties of the Square Map Modulo a Power of Two}, howpublished = {Cryptology ePrint Archive, Report 2014/789}, year = {2014}, url = {https://eprint.iacr.org/2014/789}, } @misc{cryptoeprint:2014:790, author = {Sarani Bhattacharya and Debdeep Mukhopadhyay}, title = {Fault Attack revealing Secret Keys of Exponentiation Algorithms from Branch Prediction Misses}, howpublished = {Cryptology ePrint Archive, Report 2014/790}, year = {2014}, url = {https://eprint.iacr.org/2014/790}, } @misc{cryptoeprint:2014:791, author = {Dongdai Lin and Yujuan Quan and Jian Weng and Jun Yan}, title = {Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof}, howpublished = {Cryptology ePrint Archive, Report 2014/791}, year = {2014}, url = {https://eprint.iacr.org/2014/791}, } @misc{cryptoeprint:2014:792, author = {Farzaneh abed and Christian Forler and Stefan Lucks}, title = {General Classification of the Authenticated Encryption Schemes for the CAESAR Competition}, howpublished = {Cryptology ePrint Archive, Report 2014/792}, year = {2014}, url = {https://eprint.iacr.org/2014/792}, } @misc{cryptoeprint:2014:793, author = {Viet Tung Hoang and Ted Krovetz and Phillip Rogaway}, title = {Robust Authenticated-Encryption: AEZ and the Problem that it Solves}, howpublished = {Cryptology ePrint Archive, Report 2014/793}, year = {2014}, url = {https://eprint.iacr.org/2014/793}, } @misc{cryptoeprint:2014:794, author = {Léo Ducas and Vadim Lyubashevsky and Thomas Prest}, title = {Efficient Identity-Based Encryption over NTRU Lattices}, howpublished = {Cryptology ePrint Archive, Report 2014/794}, year = {2014}, url = {https://eprint.iacr.org/2014/794}, } @misc{cryptoeprint:2014:795, author = {Daniel J. Bernstein and Daira Hopwood and Andreas Hülsing and Tanja Lange and Ruben Niederhagen and Louiza Papachristodoulou and Michael Schneider and Peter Schwabe and Zooko Wilcox-O'Hearn}, title = {SPHINCS: practical stateless hash-based signatures}, howpublished = {Cryptology ePrint Archive, Report 2014/795}, year = {2014}, url = {https://eprint.iacr.org/2014/795}, } @misc{cryptoeprint:2014:796, author = {Marcin Andrychowicz and Stefan Dziembowski}, title = {Distributed Cryptography Based on the Proofs of Work}, howpublished = {Cryptology ePrint Archive, Report 2014/796}, year = {2014}, url = {https://eprint.iacr.org/2014/796}, } @misc{cryptoeprint:2014:797, author = {Christoph Bader and Dennis Hofheinz and Tibor Jager and Eike Kiltz and Yong Li}, title = {Tightly-Secure Authenticated Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2014/797}, year = {2014}, url = {https://eprint.iacr.org/2014/797}, } @misc{cryptoeprint:2014:798, author = {Michael Clear and Ciar\'{a}n McGoldrick}, title = {Multi-Identity and Multi-Key Leveled FHE from Learning with Errors}, howpublished = {Cryptology ePrint Archive, Report 2014/798}, year = {2014}, url = {https://eprint.iacr.org/2014/798}, } @misc{cryptoeprint:2014:799, author = {Tibor Jager}, title = {Verifiable Random Functions from Weaker Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2014/799}, year = {2014}, url = {https://eprint.iacr.org/2014/799}, } @misc{cryptoeprint:2014:800, author = {Thomas Unterluggauer and Erich Wenger}, title = {Efficient Pairings and ECC for Embedded Systems}, howpublished = {Cryptology ePrint Archive, Report 2014/800}, year = {2014}, url = {https://eprint.iacr.org/2014/800}, } @misc{cryptoeprint:2014:801, author = {Georgi Ivanov and Nikolay Nikolov and Svetla Nikova}, title = {Reversed Genetic Algorithms for Generation of Bijective S-boxes with Good Cryptographic Properties}, howpublished = {Cryptology ePrint Archive, Report 2014/801}, year = {2014}, url = {https://eprint.iacr.org/2014/801}, } @misc{cryptoeprint:2014:802, author = {Shahin Tajik, Enrico Dietz, Sven Frohmann, Jean-Pierre Seifert, Dmitry Nedospasov, Clemens Helfmeier, Christian Boit, Helmar Dittrich}, title = {Physical Characterization of Arbiter PUFs}, howpublished = {Cryptology ePrint Archive, Report 2014/802}, year = {2014}, url = {https://eprint.iacr.org/2014/802}, } @misc{cryptoeprint:2014:803, author = {Conner Fromknecht, Dragos Velicanu, Sophia Yakoubov}, title = {A Decentralized Public Key Infrastructure with Identity Retention}, howpublished = {Cryptology ePrint Archive, Report 2014/803}, year = {2014}, url = {https://eprint.iacr.org/2014/803}, } @misc{cryptoeprint:2014:804, author = {Jacob Alperin-Sheriff}, title = {Short Signatures With Short Public Keys From Homomorphic Trapdoor Functions}, howpublished = {Cryptology ePrint Archive, Report 2014/804}, year = {2014}, url = {https://eprint.iacr.org/2014/804}, } @misc{cryptoeprint:2014:805, author = {Charanjit S. Jutla and Arnab Roy}, title = {Dual-System Simulation-Soundness with Applications to UC-PAKE and More}, howpublished = {Cryptology ePrint Archive, Report 2014/805}, year = {2014}, url = {https://eprint.iacr.org/2014/805}, } @misc{cryptoeprint:2014:806, author = {Steven D. Galbraith and Shishay W. Gebregiyorgis}, title = {Summation polynomial algorithms for elliptic curves in characteristic two}, howpublished = {Cryptology ePrint Archive, Report 2014/806}, year = {2014}, url = {https://eprint.iacr.org/2014/806}, } @misc{cryptoeprint:2014:807, author = {Divesh Aggarwal and Stefan Dziembowski and Tomasz Kazana and Maciej Obremski}, title = {Leakage-resilient non-malleable codes}, howpublished = {Cryptology ePrint Archive, Report 2014/807}, year = {2014}, url = {https://eprint.iacr.org/2014/807}, } @misc{cryptoeprint:2014:808, author = {Jayaprakash Kar}, title = {Online/Off-line Ring Signature Scheme with Provable Security}, howpublished = {Cryptology ePrint Archive, Report 2014/808}, year = {2014}, url = {https://eprint.iacr.org/2014/808}, } @misc{cryptoeprint:2014:809, author = {Ignacio Cascudo and Ivan Damgård and Oriol Farr\`as and Samuel Ranellucci}, title = {Server-Aided Two-Party Computation with Minimal Connectivity in the Simultaneous Corruption Model}, howpublished = {Cryptology ePrint Archive, Report 2014/809}, year = {2014}, url = {https://eprint.iacr.org/2014/809}, } @misc{cryptoeprint:2014:810, author = {Vincenzo Iovino and Karol Zebrowski}, title = {Simulation-Based Secure Functional Encryption in the Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2014/810}, year = {2014}, url = {https://eprint.iacr.org/2014/810}, } @misc{cryptoeprint:2014:811, author = {Jean-Charles Faugere and Danilo Gligoroski and Ludovic Perret and Simona Samardjiska and Enrico Thomae}, title = {A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2014/811}, year = {2014}, url = {https://eprint.iacr.org/2014/811}, } @misc{cryptoeprint:2014:812, author = {Jung Hee Cheon and Miran Kim and Myungsun Kim}, title = {Search-and-compute on Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2014/812}, year = {2014}, url = {https://eprint.iacr.org/2014/812}, } @misc{cryptoeprint:2014:813, author = {Dario Catalano and Dario Fiore}, title = {Boosting Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2014/813}, year = {2014}, url = {https://eprint.iacr.org/2014/813}, } @misc{cryptoeprint:2014:814, author = {Lisa Bromberg and Vladimir Shpilrain and Alina Vdovina}, title = {Navigating in the Cayley graph of $SL_2(F_p)$ and applications to hashing}, howpublished = {Cryptology ePrint Archive, Report 2014/814}, year = {2014}, url = {https://eprint.iacr.org/2014/814}, } @misc{cryptoeprint:2014:815, author = {Palash Sarkar and Shashank Singh}, title = {A New Method for Decomposition in the Jacobian of Small Genus Hyperelliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2014/815}, year = {2014}, url = {https://eprint.iacr.org/2014/815}, } @misc{cryptoeprint:2014:816, author = {Léo Ducas and Daniele Micciancio}, title = {FHEW: Bootstrapping Homomorphic Encryption in less than a second}, howpublished = {Cryptology ePrint Archive, Report 2014/816}, year = {2014}, url = {https://eprint.iacr.org/2014/816}, } @misc{cryptoeprint:2014:817, author = {Hwajeong Seo, Zhe Liu, Jongseok Choi, Howon Kim}, title = {Optimized Karatsuba Squaring on 8-bit AVR Processors}, howpublished = {Cryptology ePrint Archive, Report 2014/817}, year = {2014}, url = {https://eprint.iacr.org/2014/817}, } @misc{cryptoeprint:2014:818, author = {Jalaj Upadhyay}, title = {Circulant Matrices and Differential Privacy}, howpublished = {Cryptology ePrint Archive, Report 2014/818}, year = {2014}, url = {https://eprint.iacr.org/2014/818}, } @misc{cryptoeprint:2014:819, author = {Sergey Gorbunov and Dhinakaran Vinayagamurthy}, title = {Riding on Asymmetry: Efficient ABE for Branching Programs}, howpublished = {Cryptology ePrint Archive, Report 2014/819}, year = {2014}, url = {https://eprint.iacr.org/2014/819}, } @misc{cryptoeprint:2014:820, author = {Michael Backes and Ozgur Dagdelen and Marc Fischlin and Sebastian Gajek and Sebastian Meiser and Dominique Schröder}, title = {Operational Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2014/820}, year = {2014}, url = {https://eprint.iacr.org/2014/820}, } @misc{cryptoeprint:2014:821, author = {Divesh Aggarwal and Yevgeniy Dodis and Tomasz Kazana and Maciej Obremski}, title = {Non-malleable Reductions and Applications}, howpublished = {Cryptology ePrint Archive, Report 2014/821}, year = {2014}, url = {https://eprint.iacr.org/2014/821}, } @misc{cryptoeprint:2014:822, author = {David Bernhard and Ben Smyth}, title = {Ballot secrecy with malicious bulletin boards}, howpublished = {Cryptology ePrint Archive, Report 2014/822}, year = {2014}, url = {https://eprint.iacr.org/2014/822}, } @misc{cryptoeprint:2014:823, author = {Rafael Dowsley and Anderson C. A. Nascimento}, title = {On the Oblivious Transfer Capacity of Generalized Erasure Channels against Malicious Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2014/823}, year = {2014}, url = {https://eprint.iacr.org/2014/823}, } @misc{cryptoeprint:2014:824, author = {Markulf Kohlweiss and Ian Miers}, title = {Accountable Tracing Signatures}, howpublished = {Cryptology ePrint Archive, Report 2014/824}, year = {2014}, url = {https://eprint.iacr.org/2014/824}, } @misc{cryptoeprint:2014:825, author = {Yao Lu and Liqiang Peng and Rui Zhang and Dongdai Lin}, title = {Towards Optimal Bounds for Implicit Factorization Problem}, howpublished = {Cryptology ePrint Archive, Report 2014/825}, year = {2014}, url = {https://eprint.iacr.org/2014/825}, } @misc{cryptoeprint:2014:826, author = {Ozgur Dagdelen and Sebastian Gajek and Florian Gopfert}, title = {Learning with Errors in the Exponent}, howpublished = {Cryptology ePrint Archive, Report 2014/826}, year = {2014}, url = {https://eprint.iacr.org/2014/826}, } @misc{cryptoeprint:2014:827, author = {Yevgeniy Dodis and Allison Bishop Lewko}, title = {Interactive Coding for Interactive Proofs}, howpublished = {Cryptology ePrint Archive, Report 2014/827}, year = {2014}, url = {https://eprint.iacr.org/2014/827}, } @misc{cryptoeprint:2014:828, author = {Zhengjun Cao and Zhenfu Cao and Lihua Liu}, title = {Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor's Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2014/828}, year = {2014}, url = {https://eprint.iacr.org/2014/828}, } @misc{cryptoeprint:2014:829, author = {Ignacio Cascudo and Ivan Damgård and Bernardo David and Irene Giacomelli and Jesper Buus Nielsen and Roberto Trifiletti}, title = {Additively Homomorphic UC commitments with Optimal Amortized Overhead}, howpublished = {Cryptology ePrint Archive, Report 2014/829}, year = {2014}, url = {https://eprint.iacr.org/2014/829}, } @misc{cryptoeprint:2014:830, author = {Ivan Damgård and Antigoni Polychroniadou and Vanishree Rao}, title = {Adaptively Secure Multi-Party Computation from LWE (via Equivocal FHE)}, howpublished = {Cryptology ePrint Archive, Report 2014/830}, year = {2014}, url = {https://eprint.iacr.org/2014/830}, } @misc{cryptoeprint:2014:831, author = {Jérémy Jean and Ivica Nikolić and Thomas Peyrin}, title = {Tweaks and Keys for Block Ciphers: the TWEAKEY Framework}, howpublished = {Cryptology ePrint Archive, Report 2014/831}, year = {2014}, url = {https://eprint.iacr.org/2014/831}, } @misc{cryptoeprint:2014:832, author = {Manfred Lochter, Johannes Merkle, Jörn-Marc Schmidt, Torsten Schütze}, title = {Requirements for Standard Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2014/832}, year = {2014}, url = {https://eprint.iacr.org/2014/832}, } @misc{cryptoeprint:2014:833, author = {Essam Ghadafi}, title = {Efficient Distributed Tag-Based Encryption and its Application to Group Signatures with Efficient Distributed Traceability}, howpublished = {Cryptology ePrint Archive, Report 2014/833}, year = {2014}, url = {https://eprint.iacr.org/2014/833}, } @misc{cryptoeprint:2014:834, author = {Dan Boneh and Kevin Lewi and Mariana Raykova and Amit Sahai and Mark Zhandry and Joe Zimmerman}, title = {Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2014/834}, year = {2014}, url = {https://eprint.iacr.org/2014/834}, } @misc{cryptoeprint:2014:835, author = {David Galindo and Johann Großschädl and Zhe Liu and Praveen Kumar Vadnala and Srinivas Vivek}, title = {Implementation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism}, howpublished = {Cryptology ePrint Archive, Report 2014/835}, year = {2014}, url = {https://eprint.iacr.org/2014/835}, } @misc{cryptoeprint:2014:836, author = {Maciej Skorski}, title = {A Tight Transformation between HILL and Metric Conditional Pseudoentropy}, howpublished = {Cryptology ePrint Archive, Report 2014/836}, year = {2014}, url = {https://eprint.iacr.org/2014/836}, } @misc{cryptoeprint:2014:837, author = {Maciej Skorski}, title = {True Random Number Generators Secure in a Changing Environment: Improved Security Bounds}, howpublished = {Cryptology ePrint Archive, Report 2014/837}, year = {2014}, url = {https://eprint.iacr.org/2014/837}, } @misc{cryptoeprint:2014:838, author = {Alhassan Khedr and Glenn Gulak and Vinod Vaikuntanathan}, title = {SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers}, howpublished = {Cryptology ePrint Archive, Report 2014/838}, year = {2014}, url = {https://eprint.iacr.org/2014/838}, } @misc{cryptoeprint:2014:839, author = {Koji Nuida and Naoto Itakura and Kaoru Kurosawa}, title = {A Simple and Improved Algorithm for Integer Factorization with Implicit Hints}, howpublished = {Cryptology ePrint Archive, Report 2014/839}, year = {2014}, url = {https://eprint.iacr.org/2014/839}, } @misc{cryptoeprint:2014:840, author = {Hamza Abusalah and Georg Fuchsbauer and Krzysztof Pietrzak}, title = {Constrained PRFs for Unbounded Inputs}, howpublished = {Cryptology ePrint Archive, Report 2014/840}, year = {2014}, url = {https://eprint.iacr.org/2014/840}, } @misc{cryptoeprint:2014:841, author = {Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran}, title = {Explicit Non-malleable Codes Resistant to Permutations and Perturbations}, howpublished = {Cryptology ePrint Archive, Report 2014/841}, year = {2014}, url = {https://eprint.iacr.org/2014/841}, } @misc{cryptoeprint:2014:842, author = {Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran}, title = {A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-wise Tampering and Permutations}, howpublished = {Cryptology ePrint Archive, Report 2014/842}, year = {2014}, url = {https://eprint.iacr.org/2014/842}, } @misc{cryptoeprint:2014:843, author = {Jun Xu, Lei Hu, Zhangjie Huang, Liqiang Peng}, title = {Finding Small Solutions of a Class of Simultaneous Modular Equations and Applications to Modular Inversion Hidden Number Problem and Inversive Congruential Generator}, howpublished = {Cryptology ePrint Archive, Report 2014/843}, year = {2014}, url = {https://eprint.iacr.org/2014/843}, } @misc{cryptoeprint:2014:844, author = {Sanjam Garg and Antigoni Polychroniadou}, title = {Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2014/844}, year = {2014}, url = {https://eprint.iacr.org/2014/844}, } @misc{cryptoeprint:2014:845, author = {Ran Canetti and Shafi Goldwasser and Oxana Poburinnaya}, title = {Adaptively secure two-party computation from indistinguishability obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2014/845}, year = {2014}, url = {https://eprint.iacr.org/2014/845}, } @misc{cryptoeprint:2014:846, author = {Andrew J. Blumberg and Justin Thaler and Victor Vu and Michael Walfish}, title = {Verifiable computation using multiple provers}, howpublished = {Cryptology ePrint Archive, Report 2014/846}, year = {2014}, url = {https://eprint.iacr.org/2014/846}, } @misc{cryptoeprint:2014:847, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {Reflections on Slide with a Twist Attacks}, howpublished = {Cryptology ePrint Archive, Report 2014/847}, year = {2014}, url = {https://eprint.iacr.org/2014/847}, } @misc{cryptoeprint:2014:848, author = {Nicolas T. Courtois and Pinar Emirdag and Filippo Valsorda}, title = {Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events}, howpublished = {Cryptology ePrint Archive, Report 2014/848}, year = {2014}, url = {https://eprint.iacr.org/2014/848}, } @misc{cryptoeprint:2014:849, author = {Ryotaro Hayashi and Tatsuyuki Matsushita}, title = {A Proxy Re-Encryption Scheme with the Unforgeability of Re-Encryption Keys against Collusion Attacks}, howpublished = {Cryptology ePrint Archive, Report 2014/849}, year = {2014}, url = {https://eprint.iacr.org/2014/849}, } @misc{cryptoeprint:2014:850, author = {Markku-Juhani O. Saarinen}, title = {The BRUTUS automatic cryptanalytic framework: Testing CAESAR authenticated encryption candidates for weaknesses}, howpublished = {Cryptology ePrint Archive, Report 2014/850}, year = {2014}, url = {https://eprint.iacr.org/2014/850}, } @misc{cryptoeprint:2014:851, author = {Aggelos Kiayias and Nikos Leonardos and Helger Lipmaa and Kateryna Pavlyk and Qiang Tang}, title = {Near Optimal Rate Homomorphic Encryption for Branching Programs}, howpublished = {Cryptology ePrint Archive, Report 2014/851}, year = {2014}, url = {https://eprint.iacr.org/2014/851}, } @misc{cryptoeprint:2014:852, author = {Robert Granger and Michael Scott}, title = {Faster ECC over $\mathbb{F}_{2^{521}-1}$}, howpublished = {Cryptology ePrint Archive, Report 2014/852}, year = {2014}, url = {https://eprint.iacr.org/2014/852}, } @misc{cryptoeprint:2014:853, author = {David Cash and Joseph Jaeger and Stanislaw Jarecki and Charanjit Jutla and Hugo Krawczyk and Marcel-Cătălin Roşu and Michael Steiner}, title = {Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation}, howpublished = {Cryptology ePrint Archive, Report 2014/853}, year = {2014}, url = {https://eprint.iacr.org/2014/853}, } @misc{cryptoeprint:2014:854, author = {Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, Miriam Leeser, and David R. Kaeli}, title = {Power Analysis Attack on Hardware Implementation of MAC-Keccak on FPGAs}, howpublished = {Cryptology ePrint Archive, Report 2014/854}, year = {2014}, url = {https://eprint.iacr.org/2014/854}, } @misc{cryptoeprint:2014:855, author = {Rusydi H. Makarim and Cihangir Tezcan}, title = {Relating Undisturbed Bits to Other Properties of Substitution Boxes}, howpublished = {Cryptology ePrint Archive, Report 2014/855}, year = {2014}, url = {https://eprint.iacr.org/2014/855}, } @misc{cryptoeprint:2014:856, author = {Dana Dachman-Soled and Feng-Hao Liu and Hong-Sheng Zhou}, title = {Leakage-Resilient Circuits Revisited -- Optimal Number of Computing Components without Leak-free Hardware}, howpublished = {Cryptology ePrint Archive, Report 2014/856}, year = {2014}, url = {https://eprint.iacr.org/2014/856}, } @misc{cryptoeprint:2014:857, author = {Jonathan Katz and Andrew Miller and Elaine Shi}, title = {Pseudonymous Broadcast and Secure Computation from Cryptographic Puzzles}, howpublished = {Cryptology ePrint Archive, Report 2014/857}, year = {2014}, url = {https://eprint.iacr.org/2014/857}, } @misc{cryptoeprint:2014:858, author = {Dana Dachman-Soled and Jonathan Katz and Vanishree Rao}, title = {Adaptively Secure, Universally Composable, Multi-Party Computation in Constant Rounds}, howpublished = {Cryptology ePrint Archive, Report 2014/858}, year = {2014}, url = {https://eprint.iacr.org/2014/858}, } @misc{cryptoeprint:2014:859, author = {SK Hafizul Islam; G. P. Biswas}, title = {Provably secure pairing-free identity-based partially blind signature scheme and its application in online e-cash system}, howpublished = {Cryptology ePrint Archive, Report 2014/859}, year = {2014}, url = {https://eprint.iacr.org/2014/859}, } @misc{cryptoeprint:2014:860, author = {Cihangir Tezcan and Ferruh Özbudak}, title = {Differential Factors: Improved Attacks on SERPENT}, howpublished = {Cryptology ePrint Archive, Report 2014/860}, year = {2014}, url = {https://eprint.iacr.org/2014/860}, } @misc{cryptoeprint:2014:861, author = {İhsan Haluk Akın}, title = {Cats and Dogs An Integrity for Voting Systems Based on Paper Ballots}, howpublished = {Cryptology ePrint Archive, Report 2014/861}, year = {2014}, url = {https://eprint.iacr.org/2014/861}, } @misc{cryptoeprint:2014:862, author = {Miroslav Knezevic, Ventzislav Nikov, and Peter Rombouts}, title = {Low-Latency ECDSA Signature Verification - A Road Towards Safer Traffic -}, howpublished = {Cryptology ePrint Archive, Report 2014/862}, year = {2014}, url = {https://eprint.iacr.org/2014/862}, } @misc{cryptoeprint:2014:863, author = {Matthew D. Green and Jonathan Katz and Alex J. Malozemoff and Hong-Sheng Zhou}, title = {A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2014/863}, year = {2014}, url = {https://eprint.iacr.org/2014/863}, } @misc{cryptoeprint:2014:864, author = {Guangjun Fan, Yongbin Zhou, Hailong Zhang, Dengguo Feng}, title = {How to Choose Interesting Points for Template Attacks More Effectively}, howpublished = {Cryptology ePrint Archive, Report 2014/864}, year = {2014}, url = {https://eprint.iacr.org/2014/864}, } @misc{cryptoeprint:2014:865, author = {Rafail Ostrovsky and Giuseppe Persiano and Ivan Visconti}, title = {Impossibility of Black-Box Simulation Against Leakage Attacks}, howpublished = {Cryptology ePrint Archive, Report 2014/865}, year = {2014}, url = {https://eprint.iacr.org/2014/865}, } @misc{cryptoeprint:2014:866, author = {Sandro Coretti and Yevgeniy Dodis and Björn Tackmann and Daniele Venturi}, title = {Self-Destruct Non-Malleability}, howpublished = {Cryptology ePrint Archive, Report 2014/866}, year = {2014}, url = {https://eprint.iacr.org/2014/866}, } @misc{cryptoeprint:2014:867, author = {Christina Brzuska and Pooya Farshim and Arno Mittelbach}, title = {Random-Oracle Uninstantiability from Indistinguishability Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2014/867}, year = {2014}, url = {https://eprint.iacr.org/2014/867}, } @misc{cryptoeprint:2014:868, author = {Ilan Komargodski and Gil Segev and Eylon Yogev}, title = {Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2014/868}, year = {2014}, url = {https://eprint.iacr.org/2014/868}, } @misc{cryptoeprint:2014:869, author = {Werner Schindler}, title = {Exclusive Exponent Blinding May Not Suffice to Prevent Timing Attacks on RSA}, howpublished = {Cryptology ePrint Archive, Report 2014/869}, year = {2014}, url = {https://eprint.iacr.org/2014/869}, } @misc{cryptoeprint:2014:870, author = {Naoya Torii and Dai Yamamoto and Masahiko Takenaka and Tsutomu Matsumoto}, title = {Dynamic Behavior of RS latches using FIB processing and probe connection}, howpublished = {Cryptology ePrint Archive, Report 2014/870}, year = {2014}, url = {https://eprint.iacr.org/2014/870}, } @misc{cryptoeprint:2014:871, author = {Anton A. Kuznetsov}, title = {An algorithm for MD5 single-block collision attack using high-performance computing cluster}, howpublished = {Cryptology ePrint Archive, Report 2014/871}, year = {2014}, url = {https://eprint.iacr.org/2014/871}, } @misc{cryptoeprint:2014:872, author = {Jared Saia and Mahdi Zamani}, title = {Recent Results in Scalable Multi-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2014/872}, year = {2014}, url = {https://eprint.iacr.org/2014/872}, } @misc{cryptoeprint:2014:873, author = {Shai Halevi and Victor Shoup}, title = {Bootstrapping for HElib}, howpublished = {Cryptology ePrint Archive, Report 2014/873}, year = {2014}, url = {https://eprint.iacr.org/2014/873}, } @misc{cryptoeprint:2014:874, author = {Léo Ducas}, title = {Accelerating Bliss: the geometry of ternary polynomials}, howpublished = {Cryptology ePrint Archive, Report 2014/874}, year = {2014}, url = {https://eprint.iacr.org/2014/874}, } @misc{cryptoeprint:2014:875, author = {Pei Luo, Yunsi Fei, Liwei Zhang, and A. Adam Ding}, title = {Side-channel Power Analysis of Different Protection Schemes Against Fault Attacks on AES}, howpublished = {Cryptology ePrint Archive, Report 2014/875}, year = {2014}, url = {https://eprint.iacr.org/2014/875}, } @misc{cryptoeprint:2014:876, author = {Mihir Bellare and Viet Tung Hoang}, title = {Resisting Randomness Subversion: Fast Deterministic and Hedged Public-key Encryption in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2014/876}, year = {2014}, url = {https://eprint.iacr.org/2014/876}, } @misc{cryptoeprint:2014:877, author = {Daniel R. L. Brown}, title = {CM55: special prime-field elliptic curves almost optimizing den Boer's reduction between Diffie-Hellman and discrete logs}, howpublished = {Cryptology ePrint Archive, Report 2014/877}, year = {2014}, url = {https://eprint.iacr.org/2014/877}, } @misc{cryptoeprint:2014:878, author = {Eric Miles and Amit Sahai and Mor Weiss}, title = {Protecting obfuscation against arithmetic attacks}, howpublished = {Cryptology ePrint Archive, Report 2014/878}, year = {2014}, url = {https://eprint.iacr.org/2014/878}, } @misc{cryptoeprint:2014:879, author = {Riham AlTawy and Amr M. Youssef}, title = {Watch your Constants: Malicious Streebog}, howpublished = {Cryptology ePrint Archive, Report 2014/879}, year = {2014}, url = {https://eprint.iacr.org/2014/879}, } @misc{cryptoeprint:2014:880, author = {Joppe W. Bos and Michael Naehrig and Joop van de Pol}, title = {Sieving for Shortest Vectors in Ideal Lattices: a Practical Perspective}, howpublished = {Cryptology ePrint Archive, Report 2014/880}, year = {2014}, url = {https://eprint.iacr.org/2014/880}, } @misc{cryptoeprint:2014:881, author = {Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel}, title = {Overview of the Candidates for the Password Hashing Competition - And Their Resistance Against Garbage-Collector Attacks}, howpublished = {Cryptology ePrint Archive, Report 2014/881}, year = {2014}, url = {https://eprint.iacr.org/2014/881}, } @misc{cryptoeprint:2014:882, author = {Ran Canetti and Huijia Lin and Stefano Tessaro and Vinod Vaikuntanathan}, title = {Obfuscation of Probabilistic Circuits and Applications}, howpublished = {Cryptology ePrint Archive, Report 2014/882}, year = {2014}, url = {https://eprint.iacr.org/2014/882}, } @misc{cryptoeprint:2014:883, author = {Pei Luo and Yunsi Fei}, title = {Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack}, howpublished = {Cryptology ePrint Archive, Report 2014/883}, year = {2014}, url = {https://eprint.iacr.org/2014/883}, } @misc{cryptoeprint:2014:884, author = {Pei Luo and Yunsi Fei}, title = {Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack }, howpublished = {Cryptology ePrint Archive, Report 2014/884}, year = {2014}, url = {https://eprint.iacr.org/2014/884}, } @misc{cryptoeprint:2014:885, author = {Marios O. Choudary and Markus G. Kuhn}, title = {Efficient Stochastic Methods: Profiled Attacks Beyond 8 Bits}, howpublished = {Cryptology ePrint Archive, Report 2014/885}, year = {2014}, url = {https://eprint.iacr.org/2014/885}, } @misc{cryptoeprint:2014:886, author = {Giuseppe Ateniese and Michael T. Goodrich and Vassilios Lekakis and Charalampos Papamanthou and Evripidis Paraskevas and Roberto Tamassia}, title = {Accountable Storage}, howpublished = {Cryptology ePrint Archive, Report 2014/886}, year = {2014}, url = {https://eprint.iacr.org/2014/886}, } @misc{cryptoeprint:2014:887, author = {Pei Luo and Yu-Lun Lin and Zhen Wang and Mark Karpovsky}, title = {Hardware Implementation of Secure Shamir's Secret Sharing Scheme }, howpublished = {Cryptology ePrint Archive, Report 2014/887}, year = {2014}, url = {https://eprint.iacr.org/2014/887}, } @misc{cryptoeprint:2014:888, author = {Xifan Zheng and Reihaneh Safavi-Naini and Hadi Ahmadi}, title = {Distance Lower Bounding}, howpublished = {Cryptology ePrint Archive, Report 2014/888}, year = {2014}, url = {https://eprint.iacr.org/2014/888}, } @misc{cryptoeprint:2014:889, author = {Fabrice Benhamouda and Stephan Krenn and Vadim Lyubashevsky and Krzysztof Pietrzak}, title = {Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings}, howpublished = {Cryptology ePrint Archive, Report 2014/889}, year = {2014}, url = {https://eprint.iacr.org/2014/889}, } @misc{cryptoeprint:2014:890, author = {Jean-Sebastien Coron and Arnab Roy and Srinivas Vivek}, title = {Fast Evaluation of Polynomials over Binary Finite Fields and Application to Side-channel Countermeasures}, howpublished = {Cryptology ePrint Archive, Report 2014/890}, year = {2014}, url = {https://eprint.iacr.org/2014/890}, } @misc{cryptoeprint:2014:891, author = {Jean-Sebastien Coron and Johann Groszschaedl and Praveen Kumar Vadnala and Mehdi Tibouchi}, title = {Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity}, howpublished = {Cryptology ePrint Archive, Report 2014/891}, year = {2014}, url = {https://eprint.iacr.org/2014/891}, } @misc{cryptoeprint:2014:892, author = {Georg Fuchsbauer}, title = {Breaking Existential Unforgeability of a Signature Scheme from Asiacrypt 2014}, howpublished = {Cryptology ePrint Archive, Report 2014/892}, year = {2014}, url = {https://eprint.iacr.org/2014/892}, } @misc{cryptoeprint:2014:893, author = {Frank Quedenfeld and Christopher Wolf}, title = {Advanced Algebraic Attack on Trivium}, howpublished = {Cryptology ePrint Archive, Report 2014/893}, year = {2014}, url = {https://eprint.iacr.org/2014/893}, } @misc{cryptoeprint:2014:894, author = {Joe Chiarella and Greg Mosher and Dr. J. Robert Buchanan}, title = {THE UBERCRYPT FRAMEWORK: A NEW APPROACH IN CRYPTOSYSTEMS}, howpublished = {Cryptology ePrint Archive, Report 2014/894}, year = {2014}, url = {https://eprint.iacr.org/2014/894}, } @misc{cryptoeprint:2014:895, author = {Kerry A. McKay and Poorvi L. Vora}, title = {Analysis of ARX Functions: Pseudo-linear Methods for Approximation, Differentials, and Evaluating Diffusion}, howpublished = {Cryptology ePrint Archive, Report 2014/895}, year = {2014}, url = {https://eprint.iacr.org/2014/895}, } @misc{cryptoeprint:2014:896, author = {Handan Kılınç, Alptekin Küpçü}, title = {Efficiently Making Secure Two-Party Computation Fair}, howpublished = {Cryptology ePrint Archive, Report 2014/896}, year = {2014}, url = {https://eprint.iacr.org/2014/896}, } @misc{cryptoeprint:2014:897, author = {Sergey Gorbunov and Vinod Vaikuntanathan and Daniel Wichs}, title = {Leveled Fully Homomorphic Signatures from Standard Lattices}, howpublished = {Cryptology ePrint Archive, Report 2014/897}, year = {2014}, url = {https://eprint.iacr.org/2014/897}, } @misc{cryptoeprint:2014:898, author = {Eduardo Morais and Ricardo Dahab}, title = {A key recovery attack to the scale-invariant NTRU-based somewhat homomorphic encryption scheme}, howpublished = {Cryptology ePrint Archive, Report 2014/898}, year = {2014}, url = {https://eprint.iacr.org/2014/898}, } @misc{cryptoeprint:2014:899, author = {Colin O'Flynn and Zhizhang Chen}, title = {Side Channel Power Analysis of an AES-256 Bootloader}, howpublished = {Cryptology ePrint Archive, Report 2014/899}, year = {2014}, url = {https://eprint.iacr.org/2014/899}, } @misc{cryptoeprint:2014:900, author = {Subhadeep Banik and Sonu Jha}, title = {Some Security Results of the RC4+ Stream Cipher}, howpublished = {Cryptology ePrint Archive, Report 2014/900}, year = {2014}, url = {https://eprint.iacr.org/2014/900}, } @misc{cryptoeprint:2014:901, author = {Kenneth G. Paterson and Mario Strefler}, title = {A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System}, howpublished = {Cryptology ePrint Archive, Report 2014/901}, year = {2014}, url = {https://eprint.iacr.org/2014/901}, } @misc{cryptoeprint:2014:902, author = {Siyao Guo and Tal Malkin and Igor C. Oliveira and Alon Rosen}, title = {The Power of Negations in Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2014/902}, year = {2014}, url = {https://eprint.iacr.org/2014/902}, } @misc{cryptoeprint:2014:903, author = {Ari Juels and James Kelley and Roberto Tamassia and Nikos Triandopoulos}, title = {Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable)}, howpublished = {Cryptology ePrint Archive, Report 2014/903}, year = {2014}, url = {https://eprint.iacr.org/2014/903}, } @misc{cryptoeprint:2014:904, author = {Tilman Frosch and Christian Mainka and Christoph Bader and Florian Bergsma and Joerg Schwenk and Thorsten Holz}, title = {How Secure is TextSecure?}, howpublished = {Cryptology ePrint Archive, Report 2014/904}, year = {2014}, url = {https://eprint.iacr.org/2014/904}, } @misc{cryptoeprint:2014:905, author = {Moni Naor and Asaf Ziv}, title = {Primary-Secondary-Resolver Membership Proof Systems}, howpublished = {Cryptology ePrint Archive, Report 2014/905}, year = {2014}, url = {https://eprint.iacr.org/2014/905}, } @misc{cryptoeprint:2014:906, author = {Jung Hee Cheon and Kyoohyung Han and Changmin Lee and Hansol Ryu and Damien Stehle}, title = {Cryptanalysis on the Multilinear Map over the Integers and its Related Problems}, howpublished = {Cryptology ePrint Archive, Report 2014/906}, year = {2014}, url = {https://eprint.iacr.org/2014/906}, } @misc{cryptoeprint:2014:907, author = {Thijs Laarhoven and Michele Mosca and Joop van de Pol}, title = {Finding shortest lattice vectors faster using quantum search}, howpublished = {Cryptology ePrint Archive, Report 2014/907}, year = {2014}, url = {https://eprint.iacr.org/2014/907}, } @misc{cryptoeprint:2014:908, author = {Ran Canetti and Abhishek Jain and Alessandra Scafuro}, title = {Practical UC security with a Global Random Oracle}, howpublished = {Cryptology ePrint Archive, Report 2014/908}, year = {2014}, url = {https://eprint.iacr.org/2014/908}, } @misc{cryptoeprint:2014:909, author = {Allison Bishop Lewko and Valerio Pastro}, title = {Robust Secret Sharing Schemes Against Local Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2014/909}, year = {2014}, url = {https://eprint.iacr.org/2014/909}, } @misc{cryptoeprint:2014:910, author = {Vanishree Rao}, title = {Adaptive Multiparty Non-interactive Key Exchange Without Setup In The Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2014/910}, year = {2014}, url = {https://eprint.iacr.org/2014/910}, } @misc{cryptoeprint:2014:911, author = {Jethro Beekman}, title = {A Denial of Service Attack against Fair Computations using Bitcoin Deposits}, howpublished = {Cryptology ePrint Archive, Report 2014/911}, year = {2014}, url = {https://eprint.iacr.org/2014/911}, } @misc{cryptoeprint:2014:912, author = {Xiaofei Guo and Ramesh Karri}, title = {Low-Cost Concurrent Error Detection for GCM and CCM}, howpublished = {Cryptology ePrint Archive, Report 2014/912}, year = {2014}, url = {https://eprint.iacr.org/2014/912}, } @misc{cryptoeprint:2014:913, author = {Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi}, title = {Fully Leakage-Resilient Signatures Revisited: Graceful Degradation, Noisy Leakage, and Construction in the Bounded-Retrieval Model}, howpublished = {Cryptology ePrint Archive, Report 2014/913}, year = {2014}, url = {https://eprint.iacr.org/2014/913}, } @misc{cryptoeprint:2014:914, author = {Sanjam Garg and Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai}, title = {Cryptography with One-Way Communication}, howpublished = {Cryptology ePrint Archive, Report 2014/914}, year = {2014}, url = {https://eprint.iacr.org/2014/914}, } @misc{cryptoeprint:2014:915, author = {Yanbin Pan}, title = {Cryptanalysis of the Structure-Preserving Signature Scheme on Equivalence Classes from Asiacrypt 2014}, howpublished = {Cryptology ePrint Archive, Report 2014/915}, year = {2014}, url = {https://eprint.iacr.org/2014/915}, } @misc{cryptoeprint:2014:916, author = {Xavier Boyen and Xiong Fan and Elaine Shi}, title = {Adaptively Secure Fully Homomorphic Signatures Based on Lattices}, howpublished = {Cryptology ePrint Archive, Report 2014/916}, year = {2014}, url = {https://eprint.iacr.org/2014/916}, } @misc{cryptoeprint:2014:917, author = {Prabhanjan Ananth and Zvika Brakerski and Gil Segev and Vinod Vaikuntanathan}, title = {From Selective to Adaptive Security in Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2014/917}, year = {2014}, url = {https://eprint.iacr.org/2014/917}, } @misc{cryptoeprint:2014:918, author = {Henry Ng}, title = {Web Tap Payment Authentication and Encryption With Zero Customer Effort}, howpublished = {Cryptology ePrint Archive, Report 2014/918}, year = {2014}, url = {https://eprint.iacr.org/2014/918}, } @misc{cryptoeprint:2014:919, author = {Martin Stanek}, title = {Experimenting with Shuffle Block Cipher and SMT Solvers}, howpublished = {Cryptology ePrint Archive, Report 2014/919}, year = {2014}, url = {https://eprint.iacr.org/2014/919}, } @misc{cryptoeprint:2014:920, author = {Cezary Glowacz and Vincent Grosso and Romain Poussier and Joachim Schueth and François-Xavier Standaert}, title = {Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment}, howpublished = {Cryptology ePrint Archive, Report 2014/920}, year = {2014}, url = {https://eprint.iacr.org/2014/920}, } @misc{cryptoeprint:2014:921, author = {Daniel J. Bernstein and Tanja Lange}, title = {Batch NFS}, howpublished = {Cryptology ePrint Archive, Report 2014/921}, year = {2014}, url = {https://eprint.iacr.org/2014/921}, } @misc{cryptoeprint:2014:922, author = {Alex Biryukov and Arnab Roy and Vesselin Velichkov}, title = {Differential Analysis of Block Ciphers SIMON and SPECK}, howpublished = {Cryptology ePrint Archive, Report 2014/922}, year = {2014}, url = {https://eprint.iacr.org/2014/922}, } @misc{cryptoeprint:2014:923, author = {Hemlata Nagesh and Birendra Kumar Sharma}, title = {New Cryptosystem Using The CRT And The Jordan Normal Form}, howpublished = {Cryptology ePrint Archive, Report 2014/923}, year = {2014}, url = {https://eprint.iacr.org/2014/923}, } @misc{cryptoeprint:2014:924, author = {Antoine Joux and Cécile Pierrot}, title = {Improving the Polynomial time Precomputation of Frobenius Representation Discrete Logarithm Algorithms - Simplified Setting for Small Characteristic Finite Fields}, howpublished = {Cryptology ePrint Archive, Report 2014/924}, year = {2014}, url = {https://eprint.iacr.org/2014/924}, } @misc{cryptoeprint:2014:925, author = {Venkata Koppula and Allison Bishop Lewko and Brent Waters}, title = {Indistinguishability Obfuscation for Turing Machines with Unbounded Memory}, howpublished = {Cryptology ePrint Archive, Report 2014/925}, year = {2014}, url = {https://eprint.iacr.org/2014/925}, } @misc{cryptoeprint:2014:926, author = {Keita Emura and Takuya Hayashi}, title = {Road-to-Vehicle Communications with Time-Dependent Anonymity: A Light Weight Construction and its Experimental Results}, howpublished = {Cryptology ePrint Archive, Report 2014/926}, year = {2014}, url = {https://eprint.iacr.org/2014/926}, } @misc{cryptoeprint:2014:927, author = {Bruno Robisson and Hélène Le Bouder}, title = {Physical functions : the common factor of side-channel and fault attacks ?}, howpublished = {Cryptology ePrint Archive, Report 2014/927}, year = {2014}, url = {https://eprint.iacr.org/2014/927}, } @misc{cryptoeprint:2014:928, author = {Martin R. Albrecht and Catalin Cocis and Fabien Laguillaumie and Adeline Langlois}, title = {Implementing Candidate Graded Encoding Schemes from Ideal Lattices}, howpublished = {Cryptology ePrint Archive, Report 2014/928}, year = {2014}, url = {https://eprint.iacr.org/2014/928}, } @misc{cryptoeprint:2014:929, author = {Craig Gentry and Shai Halevi and Hemanta K. Maji and Amit Sahai}, title = {Zeroizing without zeroes: Cryptanalyzing multilinear maps without encodings of zero}, howpublished = {Cryptology ePrint Archive, Report 2014/929}, year = {2014}, url = {https://eprint.iacr.org/2014/929}, } @misc{cryptoeprint:2014:930, author = {Dan Boneh and David J. Wu and Joe Zimmerman}, title = {Immunizing Multilinear Maps Against Zeroizing Attacks}, howpublished = {Cryptology ePrint Archive, Report 2014/930}, year = {2014}, url = {https://eprint.iacr.org/2014/930}, } @misc{cryptoeprint:2014:931, author = {Thomas Peyrin and Siang Meng Sim and Lei Wang and Guoyan Zhang}, title = {Cryptanalysis of JAMBU}, howpublished = {Cryptology ePrint Archive, Report 2014/931}, year = {2014}, url = {https://eprint.iacr.org/2014/931}, } @misc{cryptoeprint:2014:932, author = {Andrey Bogdanov and Donghoon Chang and Mohona Ghosh and Somitra Kumar Sanadhya}, title = {Bicliques with Minimal Data and Time Complexity for AES (Extended Version)}, howpublished = {Cryptology ePrint Archive, Report 2014/932}, year = {2014}, url = {https://eprint.iacr.org/2014/932}, } @misc{cryptoeprint:2014:933, author = {Akshayaram Srinivasan and C. Pandu Rangan}, title = {Certificateless Proxy Re-Encryption Without Pairing: Revisited}, howpublished = {Cryptology ePrint Archive, Report 2014/933}, year = {2014}, url = {https://eprint.iacr.org/2014/933}, } @misc{cryptoeprint:2014:934, author = {Samuel Ranellucci and Alain Tapp and Rasmus Winther Zakarias}, title = {Efficient Generic Zero-Knowledge Proofs from Commitments}, howpublished = {Cryptology ePrint Archive, Report 2014/934}, year = {2014}, url = {https://eprint.iacr.org/2014/934}, } @misc{cryptoeprint:2014:935, author = {Nicolas Bruneau and Jean-Luc Danger and Sylvain Guilley and Annelie Heuser and Yannick Teglia}, title = {Boosting Higher-Order Correlation Attacks by Dimensionality Reduction}, howpublished = {Cryptology ePrint Archive, Report 2014/935}, year = {2014}, url = {https://eprint.iacr.org/2014/935}, } @misc{cryptoeprint:2014:936, author = {Henry Carter and Benjamin Mood and Patrick Traynor and Kevin Butler}, title = {Outsourcing Secure Two-Party Computation as a Black Box}, howpublished = {Cryptology ePrint Archive, Report 2014/936}, year = {2014}, url = {https://eprint.iacr.org/2014/936}, } @misc{cryptoeprint:2014:937, author = {Zhengjun Cao and Lihua Liu}, title = {Analysis of Lewko-Sahai-Waters Revocation System }, howpublished = {Cryptology ePrint Archive, Report 2014/937}, year = {2014}, url = {https://eprint.iacr.org/2014/937}, } @misc{cryptoeprint:2014:938, author = {Charles Herder and Ling Ren and Marten van Dijk and Meng-Day (Mandel) Yu and Srinivas Devadas}, title = {Trapdoor Computational Fuzzy Extractors and Stateless Cryptographically-Secure Physical Unclonable Functions}, howpublished = {Cryptology ePrint Archive, Report 2014/938}, year = {2014}, url = {https://eprint.iacr.org/2014/938}, } @misc{cryptoeprint:2014:939, author = {Gaurav Tiwari and Amit K. Awasthi and Neha Shukla}, title = {Security Analysis of an Authentication Scheme Using Smart Cards}, howpublished = {Cryptology ePrint Archive, Report 2014/939}, year = {2014}, url = {https://eprint.iacr.org/2014/939}, } @misc{cryptoeprint:2014:940, author = {Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay}, title = {Fully Secure Self-Updatable Encryption in Prime Order Bilinear Groups}, howpublished = {Cryptology ePrint Archive, Report 2014/940}, year = {2014}, url = {https://eprint.iacr.org/2014/940}, } @misc{cryptoeprint:2014:941, author = {Sanjam Garg and Steve Lu and Rafail Ostrovsky and Alessandra Scafuro}, title = {Garbled RAM From One-Way Functions}, howpublished = {Cryptology ePrint Archive, Report 2014/941}, year = {2014}, url = {https://eprint.iacr.org/2014/941}, } @misc{cryptoeprint:2014:942, author = {Yuval Ishai, Omkant Pandey, Amit Sahai}, title = {Public-Coin Differing-Inputs Obfuscation and Its Applications}, howpublished = {Cryptology ePrint Archive, Report 2014/942}, year = {2014}, url = {https://eprint.iacr.org/2014/942}, } @misc{cryptoeprint:2014:943, author = {Syed Kamran Haider and Chenglu Jin and Masab Ahmad and Devu Manikantan Shila and Omer Khan and Marten van Dijk}, title = {Advancing the State-of-the-Art in Hardware Trojans Detection}, howpublished = {Cryptology ePrint Archive, Report 2014/943}, year = {2014}, url = {https://eprint.iacr.org/2014/943}, } @misc{cryptoeprint:2014:944, author = {Georg Fuchsbauer and Christian Hanser and Daniel Slamanig}, title = {Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials}, howpublished = {Cryptology ePrint Archive, Report 2014/944}, year = {2014}, url = {https://eprint.iacr.org/2014/944}, } @misc{cryptoeprint:2014:945, author = {Hongbo Yu, Dongxia Bai}, title = {Boomerang Attack on Step-Reduced SHA-512}, howpublished = {Cryptology ePrint Archive, Report 2014/945}, year = {2014}, url = {https://eprint.iacr.org/2014/945}, } @misc{cryptoeprint:2014:946, author = {Samir Bouftass and Abdelhak Azhari}, title = {On a new fast public key cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2014/946}, year = {2014}, url = {https://eprint.iacr.org/2014/946}, } @misc{cryptoeprint:2014:947, author = {Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers}, title = {The SIMON and SPECK Block Ciphers on AVR 8-bit Microcontrollers}, howpublished = {Cryptology ePrint Archive, Report 2014/947}, year = {2014}, url = {https://eprint.iacr.org/2014/947}, } @misc{cryptoeprint:2014:948, author = {Michael Walter}, title = {Lattice Point Enumeration on Block Reduced Bases}, howpublished = {Cryptology ePrint Archive, Report 2014/948}, year = {2014}, url = {https://eprint.iacr.org/2014/948}, } @misc{cryptoeprint:2014:949, author = {Alexander Rostovtsev and Anna Shustrova}, title = {Simplification/complication of the basis of prime Boolean ideal}, howpublished = {Cryptology ePrint Archive, Report 2014/949}, year = {2014}, url = {https://eprint.iacr.org/2014/949}, } @misc{cryptoeprint:2014:950, author = {Koji Nuida and Goichiro Hanaoka and Takahiro Matsuda}, title = {Tree-Structured Composition of Homomorphic Encryption: How to Weaken Underlying Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2014/950}, year = {2014}, url = {https://eprint.iacr.org/2014/950}, } @misc{cryptoeprint:2014:951, author = {Robert Wicik and Tomasz Rachwalik and Rafał Gliwa}, title = {Modified Alternating Step Generators with Non-Linear Scrambler}, howpublished = {Cryptology ePrint Archive, Report 2014/951}, year = {2014}, url = {https://eprint.iacr.org/2014/951}, } @misc{cryptoeprint:2014:952, author = {Cong Chen and Thomas Eisenbarth and Aria Shahverdi and Xin Ye}, title = {Balanced Encoding to Mitigate Power Analysis: A Case Study}, howpublished = {Cryptology ePrint Archive, Report 2014/952}, year = {2014}, url = {https://eprint.iacr.org/2014/952}, } @misc{cryptoeprint:2014:953, author = {Pooya Farshim and Gordon Procter}, title = {The Related-Key Security of Iterated Even-Mansour Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2014/953}, year = {2014}, url = {https://eprint.iacr.org/2014/953}, } @misc{cryptoeprint:2014:954, author = {Frank Quedenfeld}, title = {Algebraic Fault Analysis of Katan}, howpublished = {Cryptology ePrint Archive, Report 2014/954}, year = {2014}, url = {https://eprint.iacr.org/2014/954}, } @misc{cryptoeprint:2014:955, author = {Constantin Catalin Dragan and Ferucio Laurentiu Tiplea}, title = {On the Asymptotic Idealness of the Asmuth-Bloom Threshold Secret Sharing Scheme}, howpublished = {Cryptology ePrint Archive, Report 2014/955}, year = {2014}, url = {https://eprint.iacr.org/2014/955}, } @misc{cryptoeprint:2014:956, author = {Zahra Jafargholi and Daniel Wichs}, title = {Tamper Detection and Continuous Non-Malleable Codes}, howpublished = {Cryptology ePrint Archive, Report 2014/956}, year = {2014}, url = {https://eprint.iacr.org/2014/956}, } @misc{cryptoeprint:2014:957, author = {Dakshita Khurana and Hemanta K. Maji and Amit Sahai}, title = {Black Box Separations for Differentially Private Protocols}, howpublished = {Cryptology ePrint Archive, Report 2014/957}, year = {2014}, url = {https://eprint.iacr.org/2014/957}, } @misc{cryptoeprint:2014:958, author = {Basel Alomair}, title = {Authenticated Encryption: How Reordering can Impact Performance}, howpublished = {Cryptology ePrint Archive, Report 2014/958}, year = {2014}, url = {https://eprint.iacr.org/2014/958}, } @misc{cryptoeprint:2014:959, author = {Alexander Schaub and Emmanuel Schneider and Alexandros Hollender and Vinicius Calasans and Laurent Jolie and Robin Touillon and Annelie Heuser and Sylvain Guilley and Olivier Rioul}, title = {Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2014/959}, year = {2014}, url = {https://eprint.iacr.org/2014/959}, } @misc{cryptoeprint:2014:960, author = {Amos Beimel and Ariel Gabizon and Yuval Ishai and Eyal Kushilevitz and Sigurd Meldgaard and Anat Paskin-Cherniavsky}, title = {Non-Interactive Secure Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2014/960}, year = {2014}, url = {https://eprint.iacr.org/2014/960}, } @misc{cryptoeprint:2014:961, author = {Benjamin Fuller and Leonid Reyzin and Adam Smith}, title = {When are Fuzzy Extractors Possible?}, howpublished = {Cryptology ePrint Archive, Report 2014/961}, year = {2014}, url = {https://eprint.iacr.org/2014/961}, } @misc{cryptoeprint:2014:962, author = {Zhenyu Huang and Dongdai Lin}, title = {Solving Polynomial Systems with Noise over F_2: Revisited}, howpublished = {Cryptology ePrint Archive, Report 2014/962}, year = {2014}, url = {https://eprint.iacr.org/2014/962}, } @misc{cryptoeprint:2014:963, author = {Ben Fisch, Binh Vo, Fernando Krell, Abishek Kumarasubramanian, Vladimir Kolesnikov, Tal Malkin, Steven M. Bellovin}, title = {Malicious-Client Security in Blind Seer: A Scalable Private DBMS}, howpublished = {Cryptology ePrint Archive, Report 2014/963}, year = {2014}, url = {https://eprint.iacr.org/2014/963}, } @misc{cryptoeprint:2014:964, author = {Urszula Romańczuk-Polubiec, Vasyl Ustimenko}, title = {On two windows multivariate cryptosystem depending on random parameters}, howpublished = {Cryptology ePrint Archive, Report 2014/964}, year = {2014}, url = {https://eprint.iacr.org/2014/964}, } @misc{cryptoeprint:2014:965, author = {Romain Gay and Pierrick Méaux and Hoeteck Wee}, title = {Predicate Encryption for Multi-Dimensional Range Queries from Lattices}, howpublished = {Cryptology ePrint Archive, Report 2014/965}, year = {2014}, url = {https://eprint.iacr.org/2014/965}, } @misc{cryptoeprint:2014:966, author = {Kan Yang and Xiaohua Jia and Kuan Zhang and Xuemin (Sherman) Shen}, title = {Privacy-Preserving Data Publish-Subscribe Service on Cloud-based Platforms}, howpublished = {Cryptology ePrint Archive, Report 2014/966}, year = {2014}, url = {https://eprint.iacr.org/2014/966}, } @misc{cryptoeprint:2014:967, author = {Maciej Skorski}, title = {A Comprehensive Comparison of Shannon Entropy and Smooth Renyi Entropy}, howpublished = {Cryptology ePrint Archive, Report 2014/967}, year = {2014}, url = {https://eprint.iacr.org/2014/967}, } @misc{cryptoeprint:2014:968, author = {Jorge Munilla and Mike Burmester and Albert Peinado}, title = {Attacks on Secure Ownership Transfer for Multi-Tag Multi-Owner Passive RFID Environments}, howpublished = {Cryptology ePrint Archive, Report 2014/968}, year = {2014}, url = {https://eprint.iacr.org/2014/968}, } @misc{cryptoeprint:2014:969, author = {Can Xiang and Chunming Tang}, title = {Privacy-Preserving Face Recognition with Outsourced Computation}, howpublished = {Cryptology ePrint Archive, Report 2014/969}, year = {2014}, url = {https://eprint.iacr.org/2014/969}, } @misc{cryptoeprint:2014:970, author = {Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar}, title = {Jackpot Stealing Information From Large Caches via Huge Pages}, howpublished = {Cryptology ePrint Archive, Report 2014/970}, year = {2014}, url = {https://eprint.iacr.org/2014/970}, } @misc{cryptoeprint:2014:971, author = {Y. Wei and E. Pasalic and F. Zhang and W. Wu }, title = {Key recovery attacks on Grain family using BSW sampling and certain weaknesses of the filtering function}, howpublished = {Cryptology ePrint Archive, Report 2014/971}, year = {2014}, url = {https://eprint.iacr.org/2014/971}, } @misc{cryptoeprint:2014:972, author = {Haining Fan}, title = {A Chinese Remainder Theorem Approach to Bit-Parallel GF(2^n) Polynomial Basis Multipliers for Irreducible Trinomials}, howpublished = {Cryptology ePrint Archive, Report 2014/972}, year = {2014}, url = {https://eprint.iacr.org/2014/972}, } @misc{cryptoeprint:2014:973, author = {Danping Shi and Lei Hu and Siwei Sun and Ling Song and Kexin Qiao and Xiaoshuang Ma}, title = {Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON}, howpublished = {Cryptology ePrint Archive, Report 2014/973}, year = {2014}, url = {https://eprint.iacr.org/2014/973}, } @misc{cryptoeprint:2014:974, author = {P R Mishra, Indivar Gupta and N Rajesh Pillai}, title = {Non-Linearity and Affine Equivalence of Permutations}, howpublished = {Cryptology ePrint Archive, Report 2014/974}, year = {2014}, url = {https://eprint.iacr.org/2014/974}, } @misc{cryptoeprint:2014:975, author = {Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi}, title = {Cryptanalysis of Two Candidate Fixes of Multilinear Maps over the Integers}, howpublished = {Cryptology ePrint Archive, Report 2014/975}, year = {2014}, url = {https://eprint.iacr.org/2014/975}, } @misc{cryptoeprint:2014:976, author = {Craig Costello and Cédric Fournet and Jon Howell and Markulf Kohlweiss and Benjamin Kreuter and Michael Naehrig and Bryan Parno and Samee Zahur}, title = {Geppetto: Versatile Verifiable Computation}, howpublished = {Cryptology ePrint Archive, Report 2014/976}, year = {2014}, url = {https://eprint.iacr.org/2014/976}, } @misc{cryptoeprint:2014:977, author = {Jeroen Delvaux and Roel Peeters and Dawu Gu and Ingrid Verbauwhede}, title = {A Survey on Lightweight Entity Authentication with Strong PUFs}, howpublished = {Cryptology ePrint Archive, Report 2014/977}, year = {2014}, url = {https://eprint.iacr.org/2014/977}, } @misc{cryptoeprint:2014:978, author = {Qianqian Yang and Lei Hu and Siwei Sun and Kexin Qiao and Ling Song and Jinyong Shan and Xiaoshuang Ma}, title = {Improved Differential Analysis of Block Cipher PRIDE}, howpublished = {Cryptology ePrint Archive, Report 2014/978}, year = {2014}, url = {https://eprint.iacr.org/2014/978}, } @misc{cryptoeprint:2014:979, author = {Ivan Damgaard and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi}, title = {The Chaining Lemma and its application}, howpublished = {Cryptology ePrint Archive, Report 2014/979}, year = {2014}, url = {https://eprint.iacr.org/2014/979}, } @misc{cryptoeprint:2014:980, author = {Dan Ding, Guizhen Zhu, Yang Yu, Zhongxiang Zheng}, title = {A Fast Phase-Based Enumeration Algorithm for SVP Challenge through y-Sparse Representations of Short Lattice Vectors}, howpublished = {Cryptology ePrint Archive, Report 2014/980}, year = {2014}, url = {https://eprint.iacr.org/2014/980}, } @misc{cryptoeprint:2014:981, author = {Omer Paneth and Guy N. Rothblum}, title = {Publicly Verifiable Non-Interactive Arguments for Delegating Computation}, howpublished = {Cryptology ePrint Archive, Report 2014/981}, year = {2014}, url = {https://eprint.iacr.org/2014/981}, } @misc{cryptoeprint:2014:982, author = {Edward Lui and Rafael Pass}, title = {Outlier Privacy}, howpublished = {Cryptology ePrint Archive, Report 2014/982}, year = {2014}, url = {https://eprint.iacr.org/2014/982}, } @misc{cryptoeprint:2014:983, author = {Giulia Alberini and Tal Moran and Alon Rosen}, title = {Public Verification of Private Effort}, howpublished = {Cryptology ePrint Archive, Report 2014/983}, year = {2014}, url = {https://eprint.iacr.org/2014/983}, } @misc{cryptoeprint:2014:984, author = {Michael Peter and Jan Nordholz and Matthias Petschick and Janis Danisevskis and Julian Vetter and Jean-Pierre Seifert}, title = {Undermining Isolation through Covert Channels in the Fiasco.OC Microkernel}, howpublished = {Cryptology ePrint Archive, Report 2014/984}, year = {2014}, url = {https://eprint.iacr.org/2014/984}, } @misc{cryptoeprint:2014:985, author = {Bartosz Zoltak}, title = {Statistical weakness in Spritz against VMPC-R: in search for the RC4 replacement}, howpublished = {Cryptology ePrint Archive, Report 2014/985}, year = {2014}, url = {https://eprint.iacr.org/2014/985}, } @misc{cryptoeprint:2014:986, author = {Jinyong Shan and Lei Hu and Ling Song and Siwei Sun and Xiaoshuang Ma}, title = {Related-Key Differential Attack on Round Reduced RECTANGLE-80}, howpublished = {Cryptology ePrint Archive, Report 2014/986}, year = {2014}, url = {https://eprint.iacr.org/2014/986}, } @misc{cryptoeprint:2014:987, author = {Yibin Dai and Shaozhen Chen}, title = {Cryptanalysis of Full PRIDE Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2014/987}, year = {2014}, url = {https://eprint.iacr.org/2014/987}, } @misc{cryptoeprint:2014:988, author = {Sergiu Carpov and Paul Dubrulle and Renaud Sirdey}, title = {Armadillo: a compilation chain for privacy preserving applications}, howpublished = {Cryptology ePrint Archive, Report 2014/988}, year = {2014}, url = {https://eprint.iacr.org/2014/988}, } @misc{cryptoeprint:2014:989, author = {Yvo Desmedt and Vincenzo Iovino and Giuseppe Persiano and Ivan Visconti}, title = {Controlled Homomorphic Encryption: Definition and Construction}, howpublished = {Cryptology ePrint Archive, Report 2014/989}, year = {2014}, url = {https://eprint.iacr.org/2014/989}, } @misc{cryptoeprint:2014:990, author = {Pille Pullonen and Sander Siim}, title = {Combining Secret Sharing and Garbled Circuits for Efficient Private IEEE 754 Floating-Point Computations}, howpublished = {Cryptology ePrint Archive, Report 2014/990}, year = {2014}, url = {https://eprint.iacr.org/2014/990}, } @misc{cryptoeprint:2014:991, author = {Kai-Min Chung and Huijia Lin and Rafael Pass}, title = {Constant-Round Concurrent Zero-knowledge from Indistinguishability Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2014/991}, year = {2014}, url = {https://eprint.iacr.org/2014/991}, } @misc{cryptoeprint:2014:992, author = {Alptekin Kupcu}, title = {Incentivized Outsourced Computation Resistant to Malicious Contractors}, howpublished = {Cryptology ePrint Archive, Report 2014/992}, year = {2014}, url = {https://eprint.iacr.org/2014/992}, } @misc{cryptoeprint:2014:993, author = {Thomas Basmer and Christian Wittke and Zoya Dyka and Peter Langendoerfer}, title = {How Different Electrical Circuits of ECC Designs Influence the Shape of Power Traces measured on FPGA}, howpublished = {Cryptology ePrint Archive, Report 2014/993}, year = {2014}, url = {https://eprint.iacr.org/2014/993}, } @misc{cryptoeprint:2014:994, author = {Riccardo Longo and Chiara Marcolla and Massimiliano Sala}, title = {Key-Policy Multi-authority Attribute-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2014/994}, year = {2014}, url = {https://eprint.iacr.org/2014/994}, } @misc{cryptoeprint:2014:995, author = {Yuval Ishai and Hoeteck Wee}, title = {Partial Garbling Schemes and Their Applications}, howpublished = {Cryptology ePrint Archive, Report 2014/995}, year = {2014}, url = {https://eprint.iacr.org/2014/995}, } @misc{cryptoeprint:2014:996, author = {Maike Massierer}, title = {Some experiments investigating a possible L(1/4) algorithm for the discrete logarithm problem in algebraic curves}, howpublished = {Cryptology ePrint Archive, Report 2014/996}, year = {2014}, url = {https://eprint.iacr.org/2014/996}, } @misc{cryptoeprint:2014:997, author = {Ling Ren and Christopher W. Fletcher and Albert Kwon and Emil Stefanov and Elaine Shi and Marten van Dijk and Srinivas Devadas}, title = {Constants Count: Practical Improvements to Oblivious RAM}, howpublished = {Cryptology ePrint Archive, Report 2014/997}, year = {2014}, url = {https://eprint.iacr.org/2014/997}, } @misc{cryptoeprint:2014:998, author = {Gus Gutoski and Douglas Stebila}, title = {Hierarchical deterministic Bitcoin wallets that tolerate key leakage}, howpublished = {Cryptology ePrint Archive, Report 2014/998}, year = {2014}, url = {https://eprint.iacr.org/2014/998}, } @misc{cryptoeprint:2014:999, author = {Yongdae Kim and Hyunsoo Yoon}, title = {First Experimental Result of Power Analysis Attacks on a FPGA Implementation of LEA}, howpublished = {Cryptology ePrint Archive, Report 2014/999}, year = {2014}, url = {https://eprint.iacr.org/2014/999}, } @misc{cryptoeprint:2015:001, author = {Oscar Reparaz}, title = {A note on the security of Higher-Order Threshold Implementations}, howpublished = {Cryptology ePrint Archive, Report 2015/001}, year = {2015}, url = {https://eprint.iacr.org/2015/001}, } @misc{cryptoeprint:2015:002, author = {S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad}, title = {Characterization of MDS mappings}, howpublished = {Cryptology ePrint Archive, Report 2015/002}, year = {2015}, url = {https://eprint.iacr.org/2015/002}, } @misc{cryptoeprint:2015:003, author = {Baodong Qin and Shengli Liu and Tsz Hon Yuen and Robert H. Deng and Kefei Chen}, title = {Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security}, howpublished = {Cryptology ePrint Archive, Report 2015/003}, year = {2015}, url = {https://eprint.iacr.org/2015/003}, } @misc{cryptoeprint:2015:004, author = {Carmit Hazay}, title = {Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs}, howpublished = {Cryptology ePrint Archive, Report 2015/004}, year = {2015}, url = {https://eprint.iacr.org/2015/004}, } @misc{cryptoeprint:2015:005, author = {Srinivas Devadas and Marten van Dijk and Christopher W. Fletcher and Ling Ren and Elaine Shi and Daniel Wichs}, title = {Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM}, howpublished = {Cryptology ePrint Archive, Report 2015/005}, year = {2015}, url = {https://eprint.iacr.org/2015/005}, } @misc{cryptoeprint:2015:006, author = {Jan Camenisch and Robert R. Enderlein and Gregory Neven}, title = {Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions}, howpublished = {Cryptology ePrint Archive, Report 2015/006}, year = {2015}, url = {https://eprint.iacr.org/2015/006}, } @misc{cryptoeprint:2015:007, author = {Tobias Pulls and Roel Peeters}, title = {Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure}, howpublished = {Cryptology ePrint Archive, Report 2015/007}, year = {2015}, url = {https://eprint.iacr.org/2015/007}, } @misc{cryptoeprint:2015:008, author = {Satrajit Ghosh and Aniket Kate}, title = {Post-Quantum Forward-Secure Onion Routing (Future Anonymity in Today’s Budget)}, howpublished = {Cryptology ePrint Archive, Report 2015/008}, year = {2015}, url = {https://eprint.iacr.org/2015/008}, } @misc{cryptoeprint:2015:009, author = {Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya}, title = {Rig: A simple, secure and flexible design for Password Hashing}, howpublished = {Cryptology ePrint Archive, Report 2015/009}, year = {2015}, url = {https://eprint.iacr.org/2015/009}, } @misc{cryptoeprint:2015:010, author = {Shengli Liu and Kenneth G. Paterson}, title = {Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms}, howpublished = {Cryptology ePrint Archive, Report 2015/010}, year = {2015}, url = {https://eprint.iacr.org/2015/010}, } @misc{cryptoeprint:2015:011, author = {Benjamin Buhrow and Paul Riemer and Mike Shea and Barry Gilbert and Erik Daniel}, title = {Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-bit Embedded Applications}, howpublished = {Cryptology ePrint Archive, Report 2015/011}, year = {2015}, url = {https://eprint.iacr.org/2015/011}, } @misc{cryptoeprint:2015:012, author = {Tancrède Lepoint and Mehdi Tibouchi}, title = {Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR}, howpublished = {Cryptology ePrint Archive, Report 2015/012}, year = {2015}, url = {https://eprint.iacr.org/2015/012}, } @misc{cryptoeprint:2015:013, author = {Nico Döttling}, title = {Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification}, howpublished = {Cryptology ePrint Archive, Report 2015/013}, year = {2015}, url = {https://eprint.iacr.org/2015/013}, } @misc{cryptoeprint:2015:014, author = {San Ling and Khoa Nguyen and Huaxiong Wang}, title = {Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based}, howpublished = {Cryptology ePrint Archive, Report 2015/014}, year = {2015}, url = {https://eprint.iacr.org/2015/014}, } @misc{cryptoeprint:2015:015, author = {Florian Bergsma, Tibor Jager, Jörg Schwenk}, title = {One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2015/015}, year = {2015}, url = {https://eprint.iacr.org/2015/015}, } @misc{cryptoeprint:2015:016, author = {Yannis Rouselakis and Brent Waters}, title = {Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/016}, year = {2015}, url = {https://eprint.iacr.org/2015/016}, } @misc{cryptoeprint:2015:017, author = {Michel Abdalla and Florian Bourse and Angelo De Caro and David Pointcheval}, title = {Simple Functional Encryption Schemes for Inner Products}, howpublished = {Cryptology ePrint Archive, Report 2015/017}, year = {2015}, url = {https://eprint.iacr.org/2015/017}, } @misc{cryptoeprint:2015:018, author = {JINTAI DING, ALEXEI MIASNIKOV, AND ALEXANDER USHAKOV}, title = {A LINEAR ATTACK ON A KEY EXCHANGE PROTOCOL USING EXTENSIONS OF MATRIX SEMIGROUPS}, howpublished = {Cryptology ePrint Archive, Report 2015/018}, year = {2015}, url = {https://eprint.iacr.org/2015/018}, } @misc{cryptoeprint:2015:019, author = {Gilles Barthe and Edvard Fagerholm and Dario Fiore and Andre Scedrov and Benedikt Schmidt and Mehdi Tibouchi}, title = {Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds}, howpublished = {Cryptology ePrint Archive, Report 2015/019}, year = {2015}, url = {https://eprint.iacr.org/2015/019}, } @misc{cryptoeprint:2015:020, author = {Phong Q. Nguyen and Jiang Zhang and Zhenfeng Zhang}, title = {Simpler Efficient Group Signatures from Lattices}, howpublished = {Cryptology ePrint Archive, Report 2015/020}, year = {2015}, url = {https://eprint.iacr.org/2015/020}, } @misc{cryptoeprint:2015:021, author = {Xin Li}, title = {Non-Malleable Condensers for Arbitrary Min-Entropy, and Almost Optimal Protocols for Privacy Amplification}, howpublished = {Cryptology ePrint Archive, Report 2015/021}, year = {2015}, url = {https://eprint.iacr.org/2015/021}, } @misc{cryptoeprint:2015:022, author = {Bo Yang and Dengguo Feng and Yu Qin and Yingjun Zhang and Weijin Wang}, title = {TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems}, howpublished = {Cryptology ePrint Archive, Report 2015/022}, year = {2015}, url = {https://eprint.iacr.org/2015/022}, } @misc{cryptoeprint:2015:023, author = {Gu Chunsheng}, title = {Multilinear Maps Using Ideal Lattices without Encodings of Zero}, howpublished = {Cryptology ePrint Archive, Report 2015/023}, year = {2015}, url = {https://eprint.iacr.org/2015/023}, } @misc{cryptoeprint:2015:024, author = {Evgeni Begelfor and Stephen D. Miller and Ramarathnam Venkatesan}, title = {Non-Abelian Analogs of Lattice Rounding}, howpublished = {Cryptology ePrint Archive, Report 2015/024}, year = {2015}, url = {https://eprint.iacr.org/2015/024}, } @misc{cryptoeprint:2015:025, author = {Benny Applebaum and Zvika Brakerski}, title = {Obfuscating Circuits via Composite-Order Graded Encoding}, howpublished = {Cryptology ePrint Archive, Report 2015/025}, year = {2015}, url = {https://eprint.iacr.org/2015/025}, } @misc{cryptoeprint:2015:026, author = {S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad}, title = {A More Explicit Formula for Linear Probabilities of Modular Addition Modulo a Power of Two}, howpublished = {Cryptology ePrint Archive, Report 2015/026}, year = {2015}, url = {https://eprint.iacr.org/2015/026}, } @misc{cryptoeprint:2015:027, author = {Adam Smith and Ye Zhang}, title = {On the Regularity of Lossy RSA: Improved Bounds and Applications to Padding-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/027}, year = {2015}, url = {https://eprint.iacr.org/2015/027}, } @misc{cryptoeprint:2015:028, author = {Jeremy Maitin-Shepard}, title = {Optimal software-implemented Itoh--Tsujii inversion for GF($2^m$)}, howpublished = {Cryptology ePrint Archive, Report 2015/028}, year = {2015}, url = {https://eprint.iacr.org/2015/028}, } @misc{cryptoeprint:2015:029, author = {Sergey Gorbunov and Vinod Vaikuntanathan and Hoeteck Wee}, title = {Predicate Encryption for Circuits from LWE}, howpublished = {Cryptology ePrint Archive, Report 2015/029}, year = {2015}, url = {https://eprint.iacr.org/2015/029}, } @misc{cryptoeprint:2015:030, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Martin Schläffer}, title = {Cryptanalysis of Ascon}, howpublished = {Cryptology ePrint Archive, Report 2015/030}, year = {2015}, url = {https://eprint.iacr.org/2015/030}, } @misc{cryptoeprint:2015:031, author = {Kai-Min Chung and Rafael Pass}, title = {Tight Parallel Repetition Theorems for Public-Coin Arguments using KL-divergence}, howpublished = {Cryptology ePrint Archive, Report 2015/031}, year = {2015}, url = {https://eprint.iacr.org/2015/031}, } @misc{cryptoeprint:2015:032, author = {Zvika Brakerski and Vinod Vaikuntanathan}, title = {Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions Or: How to Secretly Embed a Circuit in Your PRF}, howpublished = {Cryptology ePrint Archive, Report 2015/032}, year = {2015}, url = {https://eprint.iacr.org/2015/032}, } @misc{cryptoeprint:2015:033, author = {Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel}, title = {On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/033}, year = {2015}, url = {https://eprint.iacr.org/2015/033}, } @misc{cryptoeprint:2015:034, author = {Hannes Gro{\ss} and Erich Wenger and Christoph Dobraunig and Christoph Ehrenh{\"o}fer}, title = {Suit up! Made-to-Measure Hardware Implementations of Ascon}, howpublished = {Cryptology ePrint Archive, Report 2015/034}, year = {2015}, url = {https://eprint.iacr.org/2015/034}, } @misc{cryptoeprint:2015:035, author = {Elena Dubrova and Mats Näslund and Göran Selander and Fredrik Lindqvist}, title = {Cryptographically Secure CRC for Lightweight Message Authentication}, howpublished = {Cryptology ePrint Archive, Report 2015/035}, year = {2015}, url = {https://eprint.iacr.org/2015/035}, } @misc{cryptoeprint:2015:036, author = {Billy Bob Brumley}, title = {Faster software for fast endomorphisms}, howpublished = {Cryptology ePrint Archive, Report 2015/036}, year = {2015}, url = {https://eprint.iacr.org/2015/036}, } @misc{cryptoeprint:2015:037, author = {Da-Zhi Sun and Zahra Ahmadian and Yue-Jiao Wang and Mahmoud Salmasizadeh and Mohammad Reza Aref}, title = {Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol}, howpublished = {Cryptology ePrint Archive, Report 2015/037}, year = {2015}, url = {https://eprint.iacr.org/2015/037}, } @misc{cryptoeprint:2015:038, author = {Aloni Cohen and Shafi Goldwasser and Vinod Vaikuntanathan}, title = {Aggregate Pseudorandom Functions and Connections to Learning}, howpublished = {Cryptology ePrint Archive, Report 2015/038}, year = {2015}, url = {https://eprint.iacr.org/2015/038}, } @misc{cryptoeprint:2015:039, author = {Véronique Cortier and Fabienne Eigner and Steve Kremer and Matteo Maffei and Cyrille Wiedling}, title = {Type-Based Verification of Electronic Voting Protocols}, howpublished = {Cryptology ePrint Archive, Report 2015/039}, year = {2015}, url = {https://eprint.iacr.org/2015/039}, } @misc{cryptoeprint:2015:040, author = {Zahra Ahmadian and Shahram Rasoolzadeh and Mahmoud Salmasizadeh and Mohammad Reza Aref}, title = {Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN}, howpublished = {Cryptology ePrint Archive, Report 2015/040}, year = {2015}, url = {https://eprint.iacr.org/2015/040}, } @misc{cryptoeprint:2015:041, author = {Artur Mariano and Thijs Laarhoven and Christian Bischof}, title = {Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP}, howpublished = {Cryptology ePrint Archive, Report 2015/041}, year = {2015}, url = {https://eprint.iacr.org/2015/041}, } @misc{cryptoeprint:2015:042, author = {Rachid El~Bansarkhani and Johannes Buchmann}, title = {High Performance Lattice-based CCA-secure Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/042}, year = {2015}, url = {https://eprint.iacr.org/2015/042}, } @misc{cryptoeprint:2015:043, author = {Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, and Keisuke Tanaka}, title = {Group Signature with Deniability: How to Disavow a Signature}, howpublished = {Cryptology ePrint Archive, Report 2015/043}, year = {2015}, url = {https://eprint.iacr.org/2015/043}, } @misc{cryptoeprint:2015:044, author = {Binanda Sengupta and Abhijit Das}, title = {Use of SIMD-Based Data Parallelism to Speed up Sieving in Integer-Factoring Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2015/044}, year = {2015}, url = {https://eprint.iacr.org/2015/044}, } @misc{cryptoeprint:2015:045, author = {Valentina Banciu and Elisabeth Oswald and Carolyn Whitnall}, title = {Reliable Information Extraction for Single Trace Attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/045}, year = {2015}, url = {https://eprint.iacr.org/2015/045}, } @misc{cryptoeprint:2015:046, author = {Martin R. Albrecht and Rachel Player and Sam Scott}, title = {On the concrete hardness of Learning with Errors}, howpublished = {Cryptology ePrint Archive, Report 2015/046}, year = {2015}, url = {https://eprint.iacr.org/2015/046}, } @misc{cryptoeprint:2015:047, author = {Guilhem Castagnos and Fabien Laguillaumie}, title = {Linearly Homomorphic Encryption from DDH}, howpublished = {Cryptology ePrint Archive, Report 2015/047}, year = {2015}, url = {https://eprint.iacr.org/2015/047}, } @misc{cryptoeprint:2015:048, author = {Ran Canetti and Yael Tauman Kalai and Omer Paneth}, title = {On Obfuscation with Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2015/048}, year = {2015}, url = {https://eprint.iacr.org/2015/048}, } @misc{cryptoeprint:2015:049, author = {Sonia Bogos and Florian Tramer and Serge Vaudenay}, title = {On Solving Lpn using BKW and Variants}, howpublished = {Cryptology ePrint Archive, Report 2015/049}, year = {2015}, url = {https://eprint.iacr.org/2015/049}, } @misc{cryptoeprint:2015:050, author = {Carla Ràfols}, title = {Stretching Groth-Sahai: NIZK Proofs of Partial Satisfiability}, howpublished = {Cryptology ePrint Archive, Report 2015/050}, year = {2015}, url = {https://eprint.iacr.org/2015/050}, } @misc{cryptoeprint:2015:051, author = {Li Lin, Wenling Wu}, title = {Improved Meet-in-the-Middle Distinguisher on Feistel Schemes}, howpublished = {Cryptology ePrint Archive, Report 2015/051}, year = {2015}, url = {https://eprint.iacr.org/2015/051}, } @misc{cryptoeprint:2015:052, author = {Mihir Bellare and Sriram Keelveedhi}, title = {Interactive Message-Locked Encryption and Secure Deduplication}, howpublished = {Cryptology ePrint Archive, Report 2015/052}, year = {2015}, url = {https://eprint.iacr.org/2015/052}, } @misc{cryptoeprint:2015:053, author = {Peter Gaži and Krzysztof Pietrzak and Stefano Tessaro}, title = {Tight Bounds for Keyed Sponges and Truncated CBC}, howpublished = {Cryptology ePrint Archive, Report 2015/053}, year = {2015}, url = {https://eprint.iacr.org/2015/053}, } @misc{cryptoeprint:2015:054, author = {Brett Hemenway and Rafail Ostrovsky and Alon Rosen}, title = {Non-committing encryption from $\Phi$-hiding}, howpublished = {Cryptology ePrint Archive, Report 2015/054}, year = {2015}, url = {https://eprint.iacr.org/2015/054}, } @misc{cryptoeprint:2015:055, author = {Vladimir Kolesnikov and Payman Mohassel and Ben Riva and Mike Rosulek}, title = {Richer Efficiency/Security Trade-offs in 2PC}, howpublished = {Cryptology ePrint Archive, Report 2015/055}, year = {2015}, url = {https://eprint.iacr.org/2015/055}, } @misc{cryptoeprint:2015:056, author = {Alexandre Duc and Florian Tramèr and Serge Vaudenay}, title = {Better Algorithms for LWE and LWR}, howpublished = {Cryptology ePrint Archive, Report 2015/056}, year = {2015}, url = {https://eprint.iacr.org/2015/056}, } @misc{cryptoeprint:2015:057, author = {Bertram Poettering and Dale L. Sibborn}, title = {Cold Boot Attacks in the Discrete Logarithm Setting}, howpublished = {Cryptology ePrint Archive, Report 2015/057}, year = {2015}, url = {https://eprint.iacr.org/2015/057}, } @misc{cryptoeprint:2015:058, author = {Berry Schoenmakers and Meilof Veeningen}, title = {Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2015/058}, year = {2015}, url = {https://eprint.iacr.org/2015/058}, } @misc{cryptoeprint:2015:059, author = {Alexandra Boldyreva and Jean Paul Degabriele and Kenneth G. Paterson and Martijn Stam}, title = {Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation}, howpublished = {Cryptology ePrint Archive, Report 2015/059}, year = {2015}, url = {https://eprint.iacr.org/2015/059}, } @misc{cryptoeprint:2015:060, author = {Gilles Barthe and Sonia Belaïd and François Dupressoir and Pierre-Alain Fouque and Benjamin Grégoire and Pierre-Yves Strub}, title = {Verified Proofs of Higher-Order Masking}, howpublished = {Cryptology ePrint Archive, Report 2015/060}, year = {2015}, url = {https://eprint.iacr.org/2015/060}, } @misc{cryptoeprint:2015:061, author = {Gilad Asharov and Yehuda Lindell and Thomas Schneider and Michael Zohner}, title = {More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2015/061}, year = {2015}, url = {https://eprint.iacr.org/2015/061}, } @misc{cryptoeprint:2015:062, author = {Yuval Yarom and Gefei Li and Damith C. Ranasinghe}, title = {Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher}, howpublished = {Cryptology ePrint Archive, Report 2015/062}, year = {2015}, url = {https://eprint.iacr.org/2015/062}, } @misc{cryptoeprint:2015:063, author = {R. Benadjila and T. Calderon and M. Daubignard}, title = {CamlCrush: A PKCS\#11 Filtering Proxy}, howpublished = {Cryptology ePrint Archive, Report 2015/063}, year = {2015}, url = {https://eprint.iacr.org/2015/063}, } @misc{cryptoeprint:2015:064, author = {Handan Kılınç and Alptekin Küpçü}, title = {Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2015/064}, year = {2015}, url = {https://eprint.iacr.org/2015/064}, } @misc{cryptoeprint:2015:065, author = {Andrey Dmukh and Denis Dygin and Grigory Marshalko}, title = {A lightweight-friendly modifcation of GOST block cipher}, howpublished = {Cryptology ePrint Archive, Report 2015/065}, year = {2015}, url = {https://eprint.iacr.org/2015/065}, } @misc{cryptoeprint:2015:066, author = {Tobias Schneider and Amir Moradi and Tim Güneysu}, title = {Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware}, howpublished = {Cryptology ePrint Archive, Report 2015/066}, year = {2015}, url = {https://eprint.iacr.org/2015/066}, } @misc{cryptoeprint:2015:067, author = {Susumu Kiyoshima}, title = {An Alternative Approach to Non-black-box Simulation in Fully Concurrent Setting}, howpublished = {Cryptology ePrint Archive, Report 2015/067}, year = {2015}, url = {https://eprint.iacr.org/2015/067}, } @misc{cryptoeprint:2015:068, author = {Gregor Leander and Brice Minaud and Sondre Rønjom}, title = {A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro}, howpublished = {Cryptology ePrint Archive, Report 2015/068}, year = {2015}, url = {https://eprint.iacr.org/2015/068}, } @misc{cryptoeprint:2015:069, author = {Benoît Cogliati and Yannick Seurin}, title = {On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/069}, year = {2015}, url = {https://eprint.iacr.org/2015/069}, } @misc{cryptoeprint:2015:070, author = {Gaëtan Leurent and Lei Wang}, title = {The Sum Can Be Weaker Than Each Part}, howpublished = {Cryptology ePrint Archive, Report 2015/070}, year = {2015}, url = {https://eprint.iacr.org/2015/070}, } @misc{cryptoeprint:2015:071, author = {Jean-Sebastien Coron and Jean-Charles Faugere and Guenael Renault and Rina Zeitoun}, title = {Factoring N=p^r q^s for Large r and s}, howpublished = {Cryptology ePrint Archive, Report 2015/071}, year = {2015}, url = {https://eprint.iacr.org/2015/071}, } @misc{cryptoeprint:2015:072, author = {Olivier Blazy and Céline Chevalier and Damien Vergnaud}, title = {Non-Interactive Zero-Knowledge Proofs of Non-Membership}, howpublished = {Cryptology ePrint Archive, Report 2015/072}, year = {2015}, url = {https://eprint.iacr.org/2015/072}, } @misc{cryptoeprint:2015:073, author = {Dana Dachman-Soled and Chang Liu and Charalampos Papamanthou and Elaine Shi and Uzi Vishkin}, title = {Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness}, howpublished = {Cryptology ePrint Archive, Report 2015/073}, year = {2015}, url = {https://eprint.iacr.org/2015/073}, } @misc{cryptoeprint:2015:074, author = {Gilles Barthe and Juan Manuel Crespo and Yassine Lakhnech and Benedikt Schmidt }, title = {Mind the Gap: Modular Machine-checked Proofs of One-Round Key Exchange Protocols}, howpublished = {Cryptology ePrint Archive, Report 2015/074}, year = {2015}, url = {https://eprint.iacr.org/2015/074}, } @misc{cryptoeprint:2015:075, author = {Jian Guo and Yu Sasaki and Lei Wang and Meiqin Wang and Long Wen}, title = {Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds}, howpublished = {Cryptology ePrint Archive, Report 2015/075}, year = {2015}, url = {https://eprint.iacr.org/2015/075}, } @misc{cryptoeprint:2015:076, author = {Masayuki Abe and Markulf Kohlweiss and Miyako Ohkubo and Mehdi Tibouchi}, title = {Fully Structure-Preserving Signatures and Shrinking Commitments}, howpublished = {Cryptology ePrint Archive, Report 2015/076}, year = {2015}, url = {https://eprint.iacr.org/2015/076}, } @misc{cryptoeprint:2015:077, author = {Yuwei Xu and Chuankun Wu}, title = {On the Primary Constructions of Vectorial Boolean Bent Functions}, howpublished = {Cryptology ePrint Archive, Report 2015/077}, year = {2015}, url = {https://eprint.iacr.org/2015/077}, } @misc{cryptoeprint:2015:078, author = {GU Chun-xiang and. Xin Dan and. ZHENG Yong-hui and. KANG Yuan-ji}, title = {Fully Homomorphic Encryption from Ring-LWE:Identity-Based,Arbitrary Cyclotomic,Tighter Parameters}, howpublished = {Cryptology ePrint Archive, Report 2015/078}, year = {2015}, url = {https://eprint.iacr.org/2015/078}, } @misc{cryptoeprint:2015:079, author = {Jiqiang Lu}, title = {On the Security of the COPA and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack}, howpublished = {Cryptology ePrint Archive, Report 2015/079}, year = {2015}, url = {https://eprint.iacr.org/2015/079}, } @misc{cryptoeprint:2015:080, author = {Feng Hao and Xun Yi and Liqun Chen and Siamak F. Shahandashti}, title = {The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group}, howpublished = {Cryptology ePrint Archive, Report 2015/080}, year = {2015}, url = {https://eprint.iacr.org/2015/080}, } @misc{cryptoeprint:2015:081, author = {Yan Huang and Jonathan Katz and Vladimir Kolesnikov and Ranjit Kumaresan and Alex J. Malozemoff}, title = {Amortizing Garbled Circuits}, howpublished = {Cryptology ePrint Archive, Report 2015/081}, year = {2015}, url = {https://eprint.iacr.org/2015/081}, } @misc{cryptoeprint:2015:082, author = {İhsan Haluk AKIN and Berk Sunar}, title = {On the Difficulty of Securing Web Applications using CryptDB}, howpublished = {Cryptology ePrint Archive, Report 2015/082}, year = {2015}, url = {https://eprint.iacr.org/2015/082}, } @misc{cryptoeprint:2015:083, author = {Massimo Chenal and Qiang Tang}, title = {Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2015/083}, year = {2015}, url = {https://eprint.iacr.org/2015/083}, } @misc{cryptoeprint:2015:084, author = {Zhengjun Cao and Lihua Liu}, title = {On the Disadvantages of Pairing-based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2015/084}, year = {2015}, url = {https://eprint.iacr.org/2015/084}, } @misc{cryptoeprint:2015:085, author = {Anne Canteaut and Joëlle Roué}, title = {On the behaviors of affine equivalent Sboxes regarding differential and linear attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/085}, year = {2015}, url = {https://eprint.iacr.org/2015/085}, } @misc{cryptoeprint:2015:086, author = {Patrick Märtens}, title = {Practical Compact E-Cash with Arbitrary Wallet Size}, howpublished = {Cryptology ePrint Archive, Report 2015/086}, year = {2015}, url = {https://eprint.iacr.org/2015/086}, } @misc{cryptoeprint:2015:087, author = {David Derler and Christian Hanser and Daniel Slamanig}, title = {Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives}, howpublished = {Cryptology ePrint Archive, Report 2015/087}, year = {2015}, url = {https://eprint.iacr.org/2015/087}, } @misc{cryptoeprint:2015:088, author = {Klaus Kursawe and Christiane Peters}, title = {Structural Weaknesses in the Open Smart Grid Protocol}, howpublished = {Cryptology ePrint Archive, Report 2015/088}, year = {2015}, url = {https://eprint.iacr.org/2015/088}, } @misc{cryptoeprint:2015:089, author = {Thomas Eisenbarth and Aaron Meyerowitz and Rainer Steinwandt}, title = {On the security margin of MAC striping}, howpublished = {Cryptology ePrint Archive, Report 2015/089}, year = {2015}, url = {https://eprint.iacr.org/2015/089}, } @misc{cryptoeprint:2015:090, author = {Yosuke Todo}, title = {Structural Evaluation by Generalized Integral Property}, howpublished = {Cryptology ePrint Archive, Report 2015/090}, year = {2015}, url = {https://eprint.iacr.org/2015/090}, } @misc{cryptoeprint:2015:091, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Related-Key Forgeries for Prøst-OTR}, howpublished = {Cryptology ePrint Archive, Report 2015/091}, year = {2015}, url = {https://eprint.iacr.org/2015/091}, } @misc{cryptoeprint:2015:092, author = {Grasha Jacob, Dr. A. Murugan, Irine Viola}, title = {TOWARDS THE GENERATION OF A DYNAMIC KEY-DEPENDENT S-BOX TO ENHANCE SECURITY}, howpublished = {Cryptology ePrint Archive, Report 2015/092}, year = {2015}, url = {https://eprint.iacr.org/2015/092}, } @misc{cryptoeprint:2015:093, author = {S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Einollah Pasha}, title = {Generalization of Statistical Criteria for Sboxes}, howpublished = {Cryptology ePrint Archive, Report 2015/093}, year = {2015}, url = {https://eprint.iacr.org/2015/093}, } @misc{cryptoeprint:2015:094, author = {Murat Cenk and M. Anwar Hasan}, title = {Some New Results on Binary Polynomial Multiplication}, howpublished = {Cryptology ePrint Archive, Report 2015/094}, year = {2015}, url = {https://eprint.iacr.org/2015/094}, } @misc{cryptoeprint:2015:095, author = {Dmitry Khovratovich and Ivica Nikolic and Josef Pieprzyk and Przemyslaw Sokolowski and Ron Steinfeld}, title = {Rotational Cryptanalysis of ARX Revisited}, howpublished = {Cryptology ePrint Archive, Report 2015/095}, year = {2015}, url = {https://eprint.iacr.org/2015/095}, } @misc{cryptoeprint:2015:096, author = {Riham AlTawy and Amr M. Youssef}, title = {A Meet in the Middle Attack on Reduced Round Kuznyechik}, howpublished = {Cryptology ePrint Archive, Report 2015/096}, year = {2015}, url = {https://eprint.iacr.org/2015/096}, } @misc{cryptoeprint:2015:097, author = {Bruce Schneier and Matthew Fredrikson and Tadayoshi Kohno and Thomas Ristenpart}, title = {Surreptitiously Weakening Cryptographic Systems}, howpublished = {Cryptology ePrint Archive, Report 2015/097}, year = {2015}, url = {https://eprint.iacr.org/2015/097}, } @misc{cryptoeprint:2015:098, author = {Shantian Cheng and Juanyang Zhang}, title = {Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset Difference Method}, howpublished = {Cryptology ePrint Archive, Report 2015/098}, year = {2015}, url = {https://eprint.iacr.org/2015/098}, } @misc{cryptoeprint:2015:099, author = {Dirk Achenbach and Jörn Müller-Quade and Jochen Rill}, title = {Universally Composable Firewall Architectures using Trusted Hardware}, howpublished = {Cryptology ePrint Archive, Report 2015/099}, year = {2015}, url = {https://eprint.iacr.org/2015/099}, } @misc{cryptoeprint:2015:1000, author = {Luke Valenta and Shaanan Cohney and Alex Liao and Joshua Fried and Satya Bodduluri and Nadia Heninger}, title = {Factoring as a Service}, howpublished = {Cryptology ePrint Archive, Report 2015/1000}, year = {2015}, url = {https://eprint.iacr.org/2015/1000}, } @misc{cryptoeprint:2015:1001, author = {Margaux Dugardin and Louiza Papachristodoulou and Zakaria Najm and Lejla Batina and Jean-Luc Danger and Sylvain Guilley and Jean-Christophe Courrege and Carine Therond}, title = {Dismantling real-world ECC with Horizontal and Vertical Template Attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/1001}, year = {2015}, url = {https://eprint.iacr.org/2015/1001}, } @misc{cryptoeprint:2015:1002, author = {Gunnar Alendal and Christian Kison and modg}, title = {got HW crypto? On the (in)security of a Self-Encrypting Drive series}, howpublished = {Cryptology ePrint Archive, Report 2015/1002}, year = {2015}, url = {https://eprint.iacr.org/2015/1002}, } @misc{cryptoeprint:2015:1003, author = {Oscar Garcia-Morchon and Ronald Rietman and Igor Shparlinski and Ludo Tolhuizen}, title = {Results on polynomial interpolation with mixed modular operations and unknown moduli}, howpublished = {Cryptology ePrint Archive, Report 2015/1003}, year = {2015}, url = {https://eprint.iacr.org/2015/1003}, } @misc{cryptoeprint:2015:1004, author = {Shinya Okumura and Shingo Sugiyama and Masaya Yasuda and Tsuyoshi Takagi}, title = {Security Analysis of Cryptosystems Using Short Generators over Ideal Lattices}, howpublished = {Cryptology ePrint Archive, Report 2015/1004}, year = {2015}, url = {https://eprint.iacr.org/2015/1004}, } @misc{cryptoeprint:2015:1005, author = {Wenbin Zhang and Chik How Tan}, title = {Cryptanalysis of Yasuda, Takagi and Sakurai's Signature Scheme Using Invariant Subspaces}, howpublished = {Cryptology ePrint Archive, Report 2015/1005}, year = {2015}, url = {https://eprint.iacr.org/2015/1005}, } @misc{cryptoeprint:2015:1006, author = {Ivan Damgård and Kasper Damgård and Kurt Nielsen and Peter Sebastian Nordholt and Tomas Toft}, title = {Confidential Benchmarking based on Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2015/1006}, year = {2015}, url = {https://eprint.iacr.org/2015/1006}, } @misc{cryptoeprint:2015:1007, author = {Zhichao Zhao and T-H. Hubert Chan}, title = {How to Vote Privately Using Bitcoin}, howpublished = {Cryptology ePrint Archive, Report 2015/1007}, year = {2015}, url = {https://eprint.iacr.org/2015/1007}, } @misc{cryptoeprint:2015:1008, author = {Gaby G. Dagher and Benedikt Buenz and Joseph Bonneau and Jeremy Clark and Dan Boneh}, title = {Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges}, howpublished = {Cryptology ePrint Archive, Report 2015/1008}, year = {2015}, url = {https://eprint.iacr.org/2015/1008}, } @misc{cryptoeprint:2015:1009, author = {Pawel Morawiecki and Josef Pieprzyk and Michal Straus and Marian Srebrny}, title = {Applications of Key Recovery Cube-attack-like}, howpublished = {Cryptology ePrint Archive, Report 2015/1009}, year = {2015}, url = {https://eprint.iacr.org/2015/1009}, } @misc{cryptoeprint:2015:100, author = {Christian Wittke and Zoya Dyka and Peter Langendoerfer}, title = {Influence of Electrical Circuits of ECC Designs on Shape of Electromagnetic Traces measured on FPGA}, howpublished = {Cryptology ePrint Archive, Report 2015/100}, year = {2015}, url = {https://eprint.iacr.org/2015/100}, } @misc{cryptoeprint:2015:1010, author = {Sanjam Garg and Payman Mohassel and Charalampos Papamanthou}, title = {TWORAM: Round-Optimal Oblivious RAM with Applications to Searchable Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/1010}, year = {2015}, url = {https://eprint.iacr.org/2015/1010}, } @misc{cryptoeprint:2015:1011, author = {Zvika Brakerski and Gil Segev}, title = {Hierarchical Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/1011}, year = {2015}, url = {https://eprint.iacr.org/2015/1011}, } @misc{cryptoeprint:2015:1012, author = {Harish Karthikeyan and Suvradip Chakraborty and Kunwar Singh and C. Pandu Rangan}, title = {An Efficient Multiple PKG Compatible Identity Based Authenticated Key Agreement protocol}, howpublished = {Cryptology ePrint Archive, Report 2015/1012}, year = {2015}, url = {https://eprint.iacr.org/2015/1012}, } @misc{cryptoeprint:2015:1013, author = {Divesh Aggarwal and Tomasz Kazana and Maciej Obremski}, title = {Inception Makes Non-malleable Codes Stronger}, howpublished = {Cryptology ePrint Archive, Report 2015/1013}, year = {2015}, url = {https://eprint.iacr.org/2015/1013}, } @misc{cryptoeprint:2015:1014, author = {Léo Ducas and Thomas Prest}, title = {Fast Fourier Orthogonalization}, howpublished = {Cryptology ePrint Archive, Report 2015/1014}, year = {2015}, url = {https://eprint.iacr.org/2015/1014}, } @misc{cryptoeprint:2015:1015, author = {Joseph Bonneau and Jeremy Clark and Steven Goldfeder}, title = {On Bitcoin as a public randomness source}, howpublished = {Cryptology ePrint Archive, Report 2015/1015}, year = {2015}, url = {https://eprint.iacr.org/2015/1015}, } @misc{cryptoeprint:2015:1016, author = {Avijit Dutta and Mridul Nandi and Goutam Paul}, title = {One-Key Compression Function Based MAC with Security beyond Birthday Bound}, howpublished = {Cryptology ePrint Archive, Report 2015/1016}, year = {2015}, url = {https://eprint.iacr.org/2015/1016}, } @misc{cryptoeprint:2015:1017, author = {Nishanth Chandran and Vipul Goyal and Aayush Jain and Amit Sahai}, title = {Functional Encryption: Decentralised and Delegatable}, howpublished = {Cryptology ePrint Archive, Report 2015/1017}, year = {2015}, url = {https://eprint.iacr.org/2015/1017}, } @misc{cryptoeprint:2015:1018, author = {Neal Koblitz and Alfred Menezes}, title = {A Riddle Wrapped in an Enigma}, howpublished = {Cryptology ePrint Archive, Report 2015/1018}, year = {2015}, url = {https://eprint.iacr.org/2015/1018}, } @misc{cryptoeprint:2015:1019, author = {Aggelos Kiayias and Giorgos Panagiotakos}, title = {Speed-Security Tradeoffs in Blockchain Protocols}, howpublished = {Cryptology ePrint Archive, Report 2015/1019}, year = {2015}, url = {https://eprint.iacr.org/2015/1019}, } @misc{cryptoeprint:2015:101, author = {Nicky Mouha and Atul Luykx}, title = {Multi-Key Security: The Even-Mansour Construction Revisited}, howpublished = {Cryptology ePrint Archive, Report 2015/101}, year = {2015}, url = {https://eprint.iacr.org/2015/101}, } @misc{cryptoeprint:2015:1020, author = {Aanchal Malhotra and Isaac E. Cohen and Erik Brakke and Sharon Goldberg}, title = {Attacking the Network Time Protocol}, howpublished = {Cryptology ePrint Archive, Report 2015/1020}, year = {2015}, url = {https://eprint.iacr.org/2015/1020}, } @misc{cryptoeprint:2015:1021, author = {Katsuyuki Takashima}, title = {New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/1021}, year = {2015}, url = {https://eprint.iacr.org/2015/1021}, } @misc{cryptoeprint:2015:1022, author = {Steven D. Galbraith and Pierrick Gaudry}, title = {Recent progress on the elliptic curve discrete logarithm problem}, howpublished = {Cryptology ePrint Archive, Report 2015/1022}, year = {2015}, url = {https://eprint.iacr.org/2015/1022}, } @misc{cryptoeprint:2015:1023, author = {Prabhanjan Ananth and Abhishek Jain and Amit Sahai}, title = {Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization}, howpublished = {Cryptology ePrint Archive, Report 2015/1023}, year = {2015}, url = {https://eprint.iacr.org/2015/1023}, } @misc{cryptoeprint:2015:1024, author = {Hwajeong Seo and Zhe Liu and Yasuyuki Nogami and Jongseok Choi and Taehwan Park and Howon Kim}, title = {Parallel Implementation of Number Theoretic Transform}, howpublished = {Cryptology ePrint Archive, Report 2015/1024}, year = {2015}, url = {https://eprint.iacr.org/2015/1024}, } @misc{cryptoeprint:2015:1025, author = {Dieter Schmidt}, title = {PAGES+,PAGES-, and PAGES-- - Three Families of Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2015/1025}, year = {2015}, url = {https://eprint.iacr.org/2015/1025}, } @misc{cryptoeprint:2015:1026, author = {Yoshinori Aono and Le Trieu Phong and Lihua Wang}, title = {Hardness Estimation of LWE via Band Pruning}, howpublished = {Cryptology ePrint Archive, Report 2015/1026}, year = {2015}, url = {https://eprint.iacr.org/2015/1026}, } @misc{cryptoeprint:2015:1027, author = {Taechan Kim and Razvan Barbulescu}, title = {Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case}, howpublished = {Cryptology ePrint Archive, Report 2015/1027}, year = {2015}, url = {https://eprint.iacr.org/2015/1027}, } @misc{cryptoeprint:2015:1028, author = {Hristina Mihajloska and Danilo Gligoroski and Simona Samardjiska}, title = {Reviving the Idea of Incremental Cryptography for the Zettabyte era Use case: Incremental Hash Functions Based on SHA-3}, howpublished = {Cryptology ePrint Archive, Report 2015/1028}, year = {2015}, url = {https://eprint.iacr.org/2015/1028}, } @misc{cryptoeprint:2015:1029, author = {Dave Singel\'ee and Stefaan Seys and Lejla Batina and Ingrid Verbauwhede}, title = {The Energy Budget for Wireless Security: Extended Version}, howpublished = {Cryptology ePrint Archive, Report 2015/1029}, year = {2015}, url = {https://eprint.iacr.org/2015/1029}, } @misc{cryptoeprint:2015:102, author = {Shay Gueron and Yehuda Lindell}, title = {GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte}, howpublished = {Cryptology ePrint Archive, Report 2015/102}, year = {2015}, url = {https://eprint.iacr.org/2015/102}, } @misc{cryptoeprint:2015:1030, author = {Vadim N.Tsypyschev }, title = {SECOND COORDINATE SEQUENCE OF MP-LRS OVER NONTRIVIAL GALOIS RING OF ODD CHARACTERISTIC}, howpublished = {Cryptology ePrint Archive, Report 2015/1030}, year = {2015}, url = {https://eprint.iacr.org/2015/1030}, } @misc{cryptoeprint:2015:1031, author = {Antonio Marcedone and Zikai Wen and Elaine Shi}, title = {Secure Dating with Four or Fewer Cards}, howpublished = {Cryptology ePrint Archive, Report 2015/1031}, year = {2015}, url = {https://eprint.iacr.org/2015/1031}, } @misc{cryptoeprint:2015:1032, author = {Allison Bishop and Valerio Pastro and Rajmohan Rajaraman and Daniel Wichs}, title = {Essentially Optimal Robust Secret Sharing with Maximal Corruptions}, howpublished = {Cryptology ePrint Archive, Report 2015/1032}, year = {2015}, url = {https://eprint.iacr.org/2015/1032}, } @misc{cryptoeprint:2015:1033, author = {Gideon Samid}, title = {The Ultimate Transposition Cipher (UTC)}, howpublished = {Cryptology ePrint Archive, Report 2015/1033}, year = {2015}, url = {https://eprint.iacr.org/2015/1033}, } @misc{cryptoeprint:2015:1034, author = {Marco Chiappetta and Erkay Savas and Cemal Yilmaz}, title = {Real time detection of cache-based side-channel attacks using Hardware Performance Counters}, howpublished = {Cryptology ePrint Archive, Report 2015/1034}, year = {2015}, url = {https://eprint.iacr.org/2015/1034}, } @misc{cryptoeprint:2015:1035, author = {Britta Hale and Christopher Carr and Danilo Gligoroski}, title = {CARIBE: Cascaded IBE for Maximum Flexibility and User-side Control}, howpublished = {Cryptology ePrint Archive, Report 2015/1035}, year = {2015}, url = {https://eprint.iacr.org/2015/1035}, } @misc{cryptoeprint:2015:1036, author = {Selcuk Kavut and Subhamoy Maitra }, title = {Patterson-Wiedemann type functions on 21 variables with Nonlinearity greater than Bent Concatenation bound}, howpublished = {Cryptology ePrint Archive, Report 2015/1036}, year = {2015}, url = {https://eprint.iacr.org/2015/1036}, } @misc{cryptoeprint:2015:1037, author = {Jean-Sebastien Coron and Moon Sung Lee and Tancrede Lepoint and Mehdi Tibouchi}, title = {Cryptanalysis of GGH15 Multilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2015/1037}, year = {2015}, url = {https://eprint.iacr.org/2015/1037}, } @misc{cryptoeprint:2015:1038, author = {Yan Huang and Ruiyu Zhu}, title = {Revisiting LEGOs: Optimizations, Analysis, and their Limit}, howpublished = {Cryptology ePrint Archive, Report 2015/1038}, year = {2015}, url = {https://eprint.iacr.org/2015/1038}, } @misc{cryptoeprint:2015:1039, author = {David W. Archer and Dan Bogdanov and Benny Pinkas and Pille Pullonen}, title = {Maturity and Performance of Programmable Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2015/1039}, year = {2015}, url = {https://eprint.iacr.org/2015/1039}, } @misc{cryptoeprint:2015:103, author = {Vincenzo Iovino and Karol Zebrowski}, title = {Mergeable Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/103}, year = {2015}, url = {https://eprint.iacr.org/2015/103}, } @misc{cryptoeprint:2015:1040, author = {Masahiro Yagisawa}, title = {Fully Homomorphic Encryption with Composite Number Modulus}, howpublished = {Cryptology ePrint Archive, Report 2015/1040}, year = {2015}, url = {https://eprint.iacr.org/2015/1040}, } @misc{cryptoeprint:2015:1041, author = {Magnus Gausdal Find and Daniel Smith-Tone and Meltem Sonmez Turan}, title = {The Number of Boolean Functions with Multiplicative Complexity 2}, howpublished = {Cryptology ePrint Archive, Report 2015/1041}, year = {2015}, url = {https://eprint.iacr.org/2015/1041}, } @misc{cryptoeprint:2015:1042, author = {Andreas Hülsing and Joost Rijneveld and Peter Schwabe}, title = {ARMed SPHINCS -- Computing a 41KB signature in 16KB of RAM}, howpublished = {Cryptology ePrint Archive, Report 2015/1042}, year = {2015}, url = {https://eprint.iacr.org/2015/1042}, } @misc{cryptoeprint:2015:1043, author = {Subhamoy Maitra}, title = {The Index j in RC4 is not Pseudo-random due to Non-existence of Finney Cycle}, howpublished = {Cryptology ePrint Archive, Report 2015/1043}, year = {2015}, url = {https://eprint.iacr.org/2015/1043}, } @misc{cryptoeprint:2015:1044, author = {Andrej Bogdanov and Chin Ho Lee}, title = {Homomorphic evaluation requires depth}, howpublished = {Cryptology ePrint Archive, Report 2015/1044}, year = {2015}, url = {https://eprint.iacr.org/2015/1044}, } @misc{cryptoeprint:2015:1045, author = {Gefei Li and Yuval Yarom and Damith C. Ranasinghe}, title = {Exploiting Transformations of the Galois Configuration to Improve Guess-and-Determine Attacks on NFSRs}, howpublished = {Cryptology ePrint Archive, Report 2015/1045}, year = {2015}, url = {https://eprint.iacr.org/2015/1045}, } @misc{cryptoeprint:2015:1046, author = {Benny Applebaum and Pavel Raykov}, title = {From Private Simultaneous Messages to Zero-Information Arthur-Merlin Protocols and Back}, howpublished = {Cryptology ePrint Archive, Report 2015/1046}, year = {2015}, url = {https://eprint.iacr.org/2015/1046}, } @misc{cryptoeprint:2015:1047, author = {Julia Hesse and Dennis Hofheinz and Andy Rupp}, title = {Reconfigurable Cryptography: A flexible approach to long-term security}, howpublished = {Cryptology ePrint Archive, Report 2015/1047}, year = {2015}, url = {https://eprint.iacr.org/2015/1047}, } @misc{cryptoeprint:2015:1048, author = {Dennis Hofheinz; Tibor Jager}, title = {Verifiable Random Functions from Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2015/1048}, year = {2015}, url = {https://eprint.iacr.org/2015/1048}, } @misc{cryptoeprint:2015:1049, author = {Thomas Peyrin and Yannick Seurin}, title = {Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2015/1049}, year = {2015}, url = {https://eprint.iacr.org/2015/1049}, } @misc{cryptoeprint:2015:104, author = {Rafael Dowsley and Jörn Müller-Quade and Tobias Nilges}, title = {Weakening the Isolation Assumption of Tamper-proof Hardware Tokens}, howpublished = {Cryptology ePrint Archive, Report 2015/104}, year = {2015}, url = {https://eprint.iacr.org/2015/104}, } @misc{cryptoeprint:2015:1050, author = {Thuraya M. Qaradaghi and Newroz N. Abdulrazaq}, title = {Comparison Between Irreducible and Separable Goppa Code in McEliece Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2015/1050}, year = {2015}, url = {https://eprint.iacr.org/2015/1050}, } @misc{cryptoeprint:2015:1051, author = {Jayaprakash Kar}, title = {Cryptanalysis and Improvement of Identity-based Proxy Multi-signature scheme}, howpublished = {Cryptology ePrint Archive, Report 2015/1051}, year = {2015}, url = {https://eprint.iacr.org/2015/1051}, } @misc{cryptoeprint:2015:1052, author = {Chenglu Jin and Xiaolin Xu and Wayne Burleson and Ulrich Rührmair and Marten van Dijk}, title = {PLayPUF: Programmable Logically Erasable PUFs for Forward and Backward Secure Key Management}, howpublished = {Cryptology ePrint Archive, Report 2015/1052}, year = {2015}, url = {https://eprint.iacr.org/2015/1052}, } @misc{cryptoeprint:2015:1053, author = {Binyi Chen; Huijia Lin; Stefano Tessaro}, title = {Oblivious Parallel RAM: Improved Efficiency and Generic Constructions}, howpublished = {Cryptology ePrint Archive, Report 2015/1053}, year = {2015}, url = {https://eprint.iacr.org/2015/1053}, } @misc{cryptoeprint:2015:1054, author = {HUI ZHAO and Kouichi Sakurai}, title = {Computational Soundness of Uniformity Properties for Multi-party Computation based on LSSS}, howpublished = {Cryptology ePrint Archive, Report 2015/1054}, year = {2015}, url = {https://eprint.iacr.org/2015/1054}, } @misc{cryptoeprint:2015:1055, author = {Yuval Ishai; Mor Weiss; Guang Yang}, title = {Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient Circuits}, howpublished = {Cryptology ePrint Archive, Report 2015/1055}, year = {2015}, url = {https://eprint.iacr.org/2015/1055}, } @misc{cryptoeprint:2015:1056, author = {Nishanth Chandran; Bhavana Kanukurthi; Srinivasan Raghuraman}, title = {Information-theoretic Local Non-malleable Codes and their Applications}, howpublished = {Cryptology ePrint Archive, Report 2015/1056}, year = {2015}, url = {https://eprint.iacr.org/2015/1056}, } @misc{cryptoeprint:2015:1057, author = {Jack Murtagh, Salil Vadhan}, title = {The Complexity of Computing the Optimal Composition of Differential Privacy}, howpublished = {Cryptology ePrint Archive, Report 2015/1057}, year = {2015}, url = {https://eprint.iacr.org/2015/1057}, } @misc{cryptoeprint:2015:1058, author = {Siyao Guo; Pavel Hubacek; Alon Rosen; Margarita Vald}, title = {Rational Sumchecks}, howpublished = {Cryptology ePrint Archive, Report 2015/1058}, year = {2015}, url = {https://eprint.iacr.org/2015/1058}, } @misc{cryptoeprint:2015:1059, author = {David Derler and Henrich C. Pöhls and Kai Samelin and Daniel Slamanig}, title = {A General Framework for Redactable Signatures and New Constructions}, howpublished = {Cryptology ePrint Archive, Report 2015/1059}, year = {2015}, url = {https://eprint.iacr.org/2015/1059}, } @misc{cryptoeprint:2015:105, author = {Josep Balasch and Sebastian Faust and Benedikt Gierlichs}, title = {Inner Product Masking Revisited}, howpublished = {Cryptology ePrint Archive, Report 2015/105}, year = {2015}, url = {https://eprint.iacr.org/2015/105}, } @misc{cryptoeprint:2015:1060, author = {Joost Renes and Craig Costello and Lejla Batina}, title = {Complete addition formulas for prime order elliptic curves}, howpublished = {Cryptology ePrint Archive, Report 2015/1060}, year = {2015}, url = {https://eprint.iacr.org/2015/1060}, } @misc{cryptoeprint:2015:1061, author = {Tianren Liu and Vinod Vaikuntanathan}, title = {On Basing Private Information Retrieval on NP-Hardness}, howpublished = {Cryptology ePrint Archive, Report 2015/1061}, year = {2015}, url = {https://eprint.iacr.org/2015/1061}, } @misc{cryptoeprint:2015:1062, author = {Mohammad Mahmoody; Ameer Mohammed; Soheil Nematihaji; Rafael Pass; abhi shelat}, title = {Lower Bounds on Assumptions behind Indistinguishability Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2015/1062}, year = {2015}, url = {https://eprint.iacr.org/2015/1062}, } @misc{cryptoeprint:2015:1063, author = {Divesh Aggarwal; Shashank Agrawal; Divya Gupta; Hemanta K. Maji; Omkant Pandey; Manoj Prabhakaran}, title = {Optimal Computational Split-state Non-malleable Codes}, howpublished = {Cryptology ePrint Archive, Report 2015/1063}, year = {2015}, url = {https://eprint.iacr.org/2015/1063}, } @misc{cryptoeprint:2015:1064, author = {Hoeteck Wee}, title = {Déjà Q: Encore! Un Petit IBE}, howpublished = {Cryptology ePrint Archive, Report 2015/1064}, year = {2015}, url = {https://eprint.iacr.org/2015/1064}, } @misc{cryptoeprint:2015:1065, author = {Christopher Fletcher and Muhammad Naveed and Ling Ren and Elaine Shi and Emil Stefanov}, title = {Bucket ORAM: Single Online Roundtrip, Constant Bandwidth Oblivious RAM}, howpublished = {Cryptology ePrint Archive, Report 2015/1065}, year = {2015}, url = {https://eprint.iacr.org/2015/1065}, } @misc{cryptoeprint:2015:1066, author = {Haipeng Qu, Peng Shang, Xi-Jun Lin, and Lin Sun}, title = {Cryptanalysis of A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential}, howpublished = {Cryptology ePrint Archive, Report 2015/1066}, year = {2015}, url = {https://eprint.iacr.org/2015/1066}, } @misc{cryptoeprint:2015:1067, author = {Vladimir Kolesnikov and Alex J. Malozemoff}, title = {Public Verifiability in the Covert Model (Almost) for Free}, howpublished = {Cryptology ePrint Archive, Report 2015/1067}, year = {2015}, url = {https://eprint.iacr.org/2015/1067}, } @misc{cryptoeprint:2015:1068, author = {Steve Lu and Rafail Ostrovsky}, title = {Black-Box Parallel Garbled RAM}, howpublished = {Cryptology ePrint Archive, Report 2015/1068}, year = {2015}, url = {https://eprint.iacr.org/2015/1068}, } @misc{cryptoeprint:2015:1069, author = {Yuanxi Dai and John Steinberger}, title = {Indifferentiability of 8-Round Feistel Networks}, howpublished = {Cryptology ePrint Archive, Report 2015/1069}, year = {2015}, url = {https://eprint.iacr.org/2015/1069}, } @misc{cryptoeprint:2015:106, author = {Yara Elias and Kristin E. Lauter and Ekin Ozman and Katherine E. Stange}, title = {Provably weak instances of Ring-LWE}, howpublished = {Cryptology ePrint Archive, Report 2015/106}, year = {2015}, url = {https://eprint.iacr.org/2015/106}, } @misc{cryptoeprint:2015:1070, author = {Bo Tang and Jiapeng Zhang}, title = {Barriers to Black-Box Constructions of Traitor Tracing Systems}, howpublished = {Cryptology ePrint Archive, Report 2015/1070}, year = {2015}, url = {https://eprint.iacr.org/2015/1070}, } @misc{cryptoeprint:2015:1071, author = {Arpita Maitra, Goutam Paul and Asim K. Pal}, title = {Revisiting Secure Two-Party Computation with Rational Players}, howpublished = {Cryptology ePrint Archive, Report 2015/1071}, year = {2015}, url = {https://eprint.iacr.org/2015/1071}, } @misc{cryptoeprint:2015:1072, author = {Anne Broadbent and Sevag Gharibian and Hong-Sheng Zhou}, title = {Quantum One-Time Memories from Stateless Hardware}, howpublished = {Cryptology ePrint Archive, Report 2015/1072}, year = {2015}, url = {https://eprint.iacr.org/2015/1072}, } @misc{cryptoeprint:2015:1073, author = {David Derler and Daniel Slamanig}, title = {Practical Witness Encryption for Algebraic Languages Or How to Encrypt Under Groth-Sahai Proofs}, howpublished = {Cryptology ePrint Archive, Report 2015/1073}, year = {2015}, url = {https://eprint.iacr.org/2015/1073}, } @misc{cryptoeprint:2015:1074, author = {Ran Canetti and Yilei Chen and Justin Holmgren and Mariana Raykova}, title = {Succinct Adaptive Garbled RAM}, howpublished = {Cryptology ePrint Archive, Report 2015/1074}, year = {2015}, url = {https://eprint.iacr.org/2015/1074}, } @misc{cryptoeprint:2015:1075, author = {Michele Mosca}, title = {Cybersecurity in an era with quantum computers: will we be ready?}, howpublished = {Cryptology ePrint Archive, Report 2015/1075}, year = {2015}, url = {https://eprint.iacr.org/2015/1075}, } @misc{cryptoeprint:2015:1076, author = {Razvan Barbulescu}, title = {An appendix for a recent paper of Kim}, howpublished = {Cryptology ePrint Archive, Report 2015/1076}, year = {2015}, url = {https://eprint.iacr.org/2015/1076}, } @misc{cryptoeprint:2015:1077, author = {Dibyendu Roy and Sourav Mukhopadhyay}, title = {Fault Analysis on the Stream Ciphers LILI-128 and Achterbahn}, howpublished = {Cryptology ePrint Archive, Report 2015/1077}, year = {2015}, url = {https://eprint.iacr.org/2015/1077}, } @misc{cryptoeprint:2015:1078, author = {Sanjam Garg, Omkant Pandey, Akshayaram Srinivasan}, title = {Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium}, howpublished = {Cryptology ePrint Archive, Report 2015/1078}, year = {2015}, url = {https://eprint.iacr.org/2015/1078}, } @misc{cryptoeprint:2015:1079, author = {Ming Li and Mingxing Wang and Dongdai Lin}, title = {De Bruijn Sequences from Symmetric Shift Registers}, howpublished = {Cryptology ePrint Archive, Report 2015/1079}, year = {2015}, url = {https://eprint.iacr.org/2015/1079}, } @misc{cryptoeprint:2015:107, author = {Attila A. Yavuz and Jorge Guajardo}, title = {Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware}, howpublished = {Cryptology ePrint Archive, Report 2015/107}, year = {2015}, url = {https://eprint.iacr.org/2015/107}, } @misc{cryptoeprint:2015:1080, author = {P. Freyre, N. Díaz and O. Cuellar}, title = {Variations to the cryptographics algorithms AES and TWOFISH}, howpublished = {Cryptology ePrint Archive, Report 2015/1080}, year = {2015}, url = {https://eprint.iacr.org/2015/1080}, } @misc{cryptoeprint:2015:1081, author = {Reza Azarderakhsh, Zhe Liu, Hwajeong Seo, and Howon Kim}, title = {NEON PQCryto: Fast and Parallel Ring-LWE Encryption on ARM NEON Architecture}, howpublished = {Cryptology ePrint Archive, Report 2015/1081}, year = {2015}, url = {https://eprint.iacr.org/2015/1081}, } @misc{cryptoeprint:2015:1082, author = {Prabhanjan Ananth and Yu-Chi Chen and Kai-Min Chung and Huijia Lin and Wei-Kai Lin}, title = {Delegating RAM Computations with Adaptive Soundness and Privacy}, howpublished = {Cryptology ePrint Archive, Report 2015/1082}, year = {2015}, url = {https://eprint.iacr.org/2015/1082}, } @misc{cryptoeprint:2015:1083, author = {Mostafa Taha and Thomas Eisenbarth}, title = {Implementation Attacks on Post-Quantum Cryptographic Schemes}, howpublished = {Cryptology ePrint Archive, Report 2015/1083}, year = {2015}, url = {https://eprint.iacr.org/2015/1083}, } @misc{cryptoeprint:2015:1084, author = {Prabhanjan Ananth and Abhishek Jain and Amit Sahai}, title = {Patchable Indistinguishability Obfuscation: iO for Evolving Software}, howpublished = {Cryptology ePrint Archive, Report 2015/1084}, year = {2015}, url = {https://eprint.iacr.org/2015/1084}, } @misc{cryptoeprint:2015:1085, author = {Pawel Morawiecki}, title = {Malicious Keccak}, howpublished = {Cryptology ePrint Archive, Report 2015/1085}, year = {2015}, url = {https://eprint.iacr.org/2015/1085}, } @misc{cryptoeprint:2015:1086, author = {Julien Allibert and Benoit Feix and Georges Gagnerot and Ismael Kane and Hugues Thiebeauld and Tiana Razafindralambo}, title = {Chicken or the Egg - Computational Data Attacks or Physical Attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/1086}, year = {2015}, url = {https://eprint.iacr.org/2015/1086}, } @misc{cryptoeprint:2015:1087, author = {Ting Wang and Jianping Yu and Guoqiang Han and Peng Zhang}, title = {Efficient Signature Schemes from R-LWE}, howpublished = {Cryptology ePrint Archive, Report 2015/1087}, year = {2015}, url = {https://eprint.iacr.org/2015/1087}, } @misc{cryptoeprint:2015:1088, author = {Eiichiro Fujisaki and Keita Xagawa}, title = {Note on the RKA security of Continuously Non-Malleable Key-Derivation Function from PKC 2015}, howpublished = {Cryptology ePrint Archive, Report 2015/1088}, year = {2015}, url = {https://eprint.iacr.org/2015/1088}, } @misc{cryptoeprint:2015:1089, author = {Ronald Cramer and Ivan Bjerre Damgård and Nico Döttling and Serge Fehr and Gabriele Spini}, title = {Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2015/1089}, year = {2015}, url = {https://eprint.iacr.org/2015/1089}, } @misc{cryptoeprint:2015:108, author = {Lucjan Hanzlik and Przemys{\l}aw Kubiak and Miros{\l}aw Kuty{\l}owski}, title = {TRACING ATTACKS ON U-PROVE WITH REVOCATION MECHANISM}, howpublished = {Cryptology ePrint Archive, Report 2015/108}, year = {2015}, url = {https://eprint.iacr.org/2015/108}, } @misc{cryptoeprint:2015:1090, author = {Vipul Goyal and Dakshita Khurana and Ilya Mironov and Omkant Pandey and Amit Sahai}, title = {Do Distributed Differentially-Private Protocols Require Oblivious Transfer?}, howpublished = {Cryptology ePrint Archive, Report 2015/1090}, year = {2015}, url = {https://eprint.iacr.org/2015/1090}, } @misc{cryptoeprint:2015:1091, author = {Junwu Dong and Dingyi Pei}, title = {Construction for de Bruijn Sequences with Large Orders}, howpublished = {Cryptology ePrint Archive, Report 2015/1091}, year = {2015}, url = {https://eprint.iacr.org/2015/1091}, } @misc{cryptoeprint:2015:1092, author = {Erdem Alkim and Léo Ducas and Thomas Pöppelmann and Peter Schwabe}, title = {Post-quantum key exchange - a new hope}, howpublished = {Cryptology ePrint Archive, Report 2015/1092}, year = {2015}, url = {https://eprint.iacr.org/2015/1092}, } @misc{cryptoeprint:2015:1093, author = {Ahmed Kosba and Zhichao Zhao and Andrew Miller and Yi Qian and Hubert Chan and Charalampos Papamanthou and Rafael Pass and abhi shelat and Elaine Shi}, title = {C$\emptyset$C$\emptyset$: A Framework for Building Composable Zero-Knowledge Proofs}, howpublished = {Cryptology ePrint Archive, Report 2015/1093}, year = {2015}, url = {https://eprint.iacr.org/2015/1093}, } @misc{cryptoeprint:2015:1094, author = {Divesh Aggarwal and Kaave Hosseini and Shachar Lovett}, title = {Affine-malleable Extractors, Spectrum Doubling, and Application to Privacy Amplification}, howpublished = {Cryptology ePrint Archive, Report 2015/1094}, year = {2015}, url = {https://eprint.iacr.org/2015/1094}, } @misc{cryptoeprint:2015:1095, author = {Vipul Goyal and Aayush Jain and Dakshita Khurana}, title = {Non-Malleable Multi-Prover Interactive Proofs and Witness Signatures}, howpublished = {Cryptology ePrint Archive, Report 2015/1095}, year = {2015}, url = {https://eprint.iacr.org/2015/1095}, } @misc{cryptoeprint:2015:1096, author = {Aloni Cohen and Justin Holmgren and Ryo Nishimaki and Vinod Vaikuntanathan and Daniel Wichs}, title = {Watermarking Cryptographic Capabilities}, howpublished = {Cryptology ePrint Archive, Report 2015/1096}, year = {2015}, url = {https://eprint.iacr.org/2015/1096}, } @misc{cryptoeprint:2015:1097, author = {Ivan Damgård, Jesper Buus Nielsen, Antigoni Polychroniadou and Michael Raskin}, title = {On the Communication required for Unconditionally Secure Multiplication}, howpublished = {Cryptology ePrint Archive, Report 2015/1097}, year = {2015}, url = {https://eprint.iacr.org/2015/1097}, } @misc{cryptoeprint:2015:1098, author = {Shen Noether}, title = {Ring Signature Confidential Transactions for Monero}, howpublished = {Cryptology ePrint Archive, Report 2015/1098}, year = {2015}, url = {https://eprint.iacr.org/2015/1098}, } @misc{cryptoeprint:2015:1099, author = {Stanislaw Jarecki and Hugo Krawczyk and Maliheh Shirvanian and Nitesh Saxena}, title = {Device-Enhanced Password Protocols with Optimal Online-Offline Protection}, howpublished = {Cryptology ePrint Archive, Report 2015/1099}, year = {2015}, url = {https://eprint.iacr.org/2015/1099}, } @misc{cryptoeprint:2015:1100, author = {Anissa Sghaier and Loubna Ghammam and Medyen Zeghid and Sylvain Duquesne and Mohsen Machhout}, title = {Area-Efficient Hardware Implementation of the Optimal Ate Pairing over BN curves.}, howpublished = {Cryptology ePrint Archive, Report 2015/1100}, year = {2015}, url = {https://eprint.iacr.org/2015/1100}, } @misc{cryptoeprint:2015:1101, author = {Jan Camenisch and Anja Lehmann and Gregory Neven and Kai Samelin}, title = {Virtual Smart Cards: How to Sign with a Password and a Server}, howpublished = {Cryptology ePrint Archive, Report 2015/1101}, year = {2015}, url = {https://eprint.iacr.org/2015/1101}, } @misc{cryptoeprint:2015:1102, author = {Adi Ben-Zvi and Simon R. Blackburn and Boaz Tsaban}, title = {A Practical Cryptanalysis of the Algebraic Eraser}, howpublished = {Cryptology ePrint Archive, Report 2015/1102}, year = {2015}, url = {https://eprint.iacr.org/2015/1102}, } @misc{cryptoeprint:2015:1103, author = {Sihem Mesnager}, title = {Linear codes with few weights from weakly regular bent functions based on a generic construction}, howpublished = {Cryptology ePrint Archive, Report 2015/1103}, year = {2015}, url = {https://eprint.iacr.org/2015/1103}, } @misc{cryptoeprint:2015:1104, author = {Hugo Labrande}, title = {Computing Jacobi's \theta in quasi-linear time}, howpublished = {Cryptology ePrint Archive, Report 2015/1104}, year = {2015}, url = {https://eprint.iacr.org/2015/1104}, } @misc{cryptoeprint:2015:1105, author = {Peter Y A Ryan andPeter B Roenne and Vincenzo Iovino}, title = {Selene: Voting with Transparent Verifiability and Coercion-Mitigation}, howpublished = {Cryptology ePrint Archive, Report 2015/1105}, year = {2015}, url = {https://eprint.iacr.org/2015/1105}, } @misc{cryptoeprint:2015:1106, author = {Daniel S. Roche and Daniel Apon and Seung Geol Choi and Arkady Yerukhimovich}, title = {POPE: Partial Order Preserving Encoding}, howpublished = {Cryptology ePrint Archive, Report 2015/1106}, year = {2015}, url = {https://eprint.iacr.org/2015/1106}, } @misc{cryptoeprint:2015:1107, author = {Vipul Goyal and Divya Gupta and Amit Sahai}, title = {Concurrent Secure Computation via Non-Black Box Simulation}, howpublished = {Cryptology ePrint Archive, Report 2015/1107}, year = {2015}, url = {https://eprint.iacr.org/2015/1107}, } @misc{cryptoeprint:2015:1108, author = {Jun Wang and Qiang Tang}, title = {Recommender Systems and their Security Concerns}, howpublished = {Cryptology ePrint Archive, Report 2015/1108}, year = {2015}, url = {https://eprint.iacr.org/2015/1108}, } @misc{cryptoeprint:2015:1109, author = {Bahram Rashidi, Sayed Masoud Sayedi, Reza Rezaeian Farashahi}, title = {Efficient and Low-complexity Hardware Architecture of Gaussian Normal Basis Multiplication over GF(2m) for Elliptic Curve Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2015/1109}, year = {2015}, url = {https://eprint.iacr.org/2015/1109}, } @misc{cryptoeprint:2015:110, author = {Shijun Zhao and Qianying Zhang}, title = {sHMQV: An Efficient Key Exchange Protocol for Power-limited Devices}, howpublished = {Cryptology ePrint Archive, Report 2015/110}, year = {2015}, url = {https://eprint.iacr.org/2015/110}, } @misc{cryptoeprint:2015:1110, author = {Hannes Gross and Marko Hölbl and Daniel Slamanig and Raphael Spreitzer}, title = {Privacy-Aware Authentication in the Internet of Things}, howpublished = {Cryptology ePrint Archive, Report 2015/1110}, year = {2015}, url = {https://eprint.iacr.org/2015/1110}, } @misc{cryptoeprint:2015:1111, author = {Cedric Marchand and Lilian Bossuet and AbdelKarim Cherkaoui}, title = {Comparison of TERO-cell implementations and characterisation on SRAM FPGAs}, howpublished = {Cryptology ePrint Archive, Report 2015/1111}, year = {2015}, url = {https://eprint.iacr.org/2015/1111}, } @misc{cryptoeprint:2015:1112, author = {Prastudy Fauzi and Helger Lipmaa}, title = {Efficient Culpably Sound NIZK Shuffle Argument without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2015/1112}, year = {2015}, url = {https://eprint.iacr.org/2015/1112}, } @misc{cryptoeprint:2015:1113, author = {Vipul Goyal and Aayush Jain and Adam O' Neill}, title = {Multi-Input Functional Encryption with Unbounded-Message Security}, howpublished = {Cryptology ePrint Archive, Report 2015/1113}, year = {2015}, url = {https://eprint.iacr.org/2015/1113}, } @misc{cryptoeprint:2015:1114, author = {Michał Wroński}, title = {Faster arithmetic on elliptic curves using Fp2. Application to GLV-GLS and NIST elliptic curves over Fp isomorphic to twisted Hessian curves over fields extension}, howpublished = {Cryptology ePrint Archive, Report 2015/1114}, year = {2015}, url = {https://eprint.iacr.org/2015/1114}, } @misc{cryptoeprint:2015:1115, author = {Avishek Adhikari and Kirill Morozov and Satoshi Obana and Partha Sarathi Roy and Kouichi Sakurai and Rui Xu}, title = {Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters}, howpublished = {Cryptology ePrint Archive, Report 2015/1115}, year = {2015}, url = {https://eprint.iacr.org/2015/1115}, } @misc{cryptoeprint:2015:1116, author = {Tarik Moataz and Erik-Oliver Blass and Travis Mayberry}, title = {CHf-ORAM: A Constant Communication ORAM without Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/1116}, year = {2015}, url = {https://eprint.iacr.org/2015/1116}, } @misc{cryptoeprint:2015:1117, author = {Antonio de la Piedra}, title = {Efficient implementation of AND, OR and NOT operators for ABCs}, howpublished = {Cryptology ePrint Archive, Report 2015/1117}, year = {2015}, url = {https://eprint.iacr.org/2015/1117}, } @misc{cryptoeprint:2015:1118, author = {Zhenzhen Bao and Peng Luo and Dongdai Lin}, title = {Bitsliced Implementations of the PRINCE, LED and RECTANGLE Block Ciphers on AVR 8-bit Microcontrollers}, howpublished = {Cryptology ePrint Archive, Report 2015/1118}, year = {2015}, url = {https://eprint.iacr.org/2015/1118}, } @misc{cryptoeprint:2015:1119, author = {Rosario Giustolisi and Vincenzo Iovino and Peter B. Rønne}, title = {On the Possibility of Non-Interactive E-Voting in the Public-key Setting}, howpublished = {Cryptology ePrint Archive, Report 2015/1119}, year = {2015}, url = {https://eprint.iacr.org/2015/1119}, } @misc{cryptoeprint:2015:111, author = {Steven D. Galbraith and Barak Shani}, title = {The Multivariate Hidden Number Problem}, howpublished = {Cryptology ePrint Archive, Report 2015/111}, year = {2015}, url = {https://eprint.iacr.org/2015/111}, } @misc{cryptoeprint:2015:1120, author = {Vikram Singh and Arjun Chopra}, title = {Even More Practical Key Exchanges for the Internet using Lattice Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2015/1120}, year = {2015}, url = {https://eprint.iacr.org/2015/1120}, } @misc{cryptoeprint:2015:1121, author = {Stavros Kousidis and Andreas Wiemers}, title = {On the First Fall Degree of Summation Polynomials}, howpublished = {Cryptology ePrint Archive, Report 2015/1121}, year = {2015}, url = {https://eprint.iacr.org/2015/1121}, } @misc{cryptoeprint:2015:1122, author = {Eike Kiltz and Daniel Masny and Jiaxin Pan}, title = {Schnorr Signatures in the Multi-User Setting}, howpublished = {Cryptology ePrint Archive, Report 2015/1122}, year = {2015}, url = {https://eprint.iacr.org/2015/1122}, } @misc{cryptoeprint:2015:1123, author = {Daniele Micciancio and Michael Walter}, title = {Practical, Predictable Lattice Basis Reduction}, howpublished = {Cryptology ePrint Archive, Report 2015/1123}, year = {2015}, url = {https://eprint.iacr.org/2015/1123}, } @misc{cryptoeprint:2015:1124, author = {Juan Carlos Ku-Cauich and Guillermo Morales-Luna}, title = {A Linear Code and its Application into Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2015/1124}, year = {2015}, url = {https://eprint.iacr.org/2015/1124}, } @misc{cryptoeprint:2015:1125, author = {Nathan Chenette and Kevin Lewi and Stephen A. Weis and David J. Wu}, title = {Practical Order-Revealing Encryption with Limited Leakage}, howpublished = {Cryptology ePrint Archive, Report 2015/1125}, year = {2015}, url = {https://eprint.iacr.org/2015/1125}, } @misc{cryptoeprint:2015:1126, author = {Daniel S. Roche and Adam J. Aviv and Seung Geol Choi}, title = {A Practical Oblivious Map Data Structure with Secure Deletion and History Independence}, howpublished = {Cryptology ePrint Archive, Report 2015/1126}, year = {2015}, url = {https://eprint.iacr.org/2015/1126}, } @misc{cryptoeprint:2015:1127, author = {Mikhail Anokhin}, title = {Pseudo-Free Families of Finite Computational Elementary Abelian $p$-Groups}, howpublished = {Cryptology ePrint Archive, Report 2015/1127}, year = {2015}, url = {https://eprint.iacr.org/2015/1127}, } @misc{cryptoeprint:2015:1128, author = {Anja Becker and Léo Ducas and Nicolas Gama and Thijs Laarhoven}, title = {New directions in nearest neighbor searching with applications to lattice sieving}, howpublished = {Cryptology ePrint Archive, Report 2015/1128}, year = {2015}, url = {https://eprint.iacr.org/2015/1128}, } @misc{cryptoeprint:2015:1129, author = {Martin R. Albrecht and Kenneth G. Paterson}, title = {Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS}, howpublished = {Cryptology ePrint Archive, Report 2015/1129}, year = {2015}, url = {https://eprint.iacr.org/2015/1129}, } @misc{cryptoeprint:2015:112, author = {Satsuya Ohata and Yutaka Kawai and Takahiro Matsuda and Goichiro Hanaoka and Kanta Matsuura}, title = {Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/112}, year = {2015}, url = {https://eprint.iacr.org/2015/112}, } @misc{cryptoeprint:2015:1130, author = {Nir Bitansky and Vinod Vaikuntanathan}, title = {A Note on Perfect Correctness by Derandomization}, howpublished = {Cryptology ePrint Archive, Report 2015/1130}, year = {2015}, url = {https://eprint.iacr.org/2015/1130}, } @misc{cryptoeprint:2015:1131, author = {Ding Wang and Ping Wang}, title = {On the Usability of Two-Factor Authentication}, howpublished = {Cryptology ePrint Archive, Report 2015/1131}, year = {2015}, url = {https://eprint.iacr.org/2015/1131}, } @misc{cryptoeprint:2015:1132, author = {Katsuyuki Takashima and Atsushi Takayasu}, title = {Tighter Security for Efficient Lattice Cryptography via the R\'{e}nyi Divergence of Optimized Orders}, howpublished = {Cryptology ePrint Archive, Report 2015/1132}, year = {2015}, url = {https://eprint.iacr.org/2015/1132}, } @misc{cryptoeprint:2015:1133, author = {Zhengjun Cao and Lihua Liu}, title = {Comment on ``Realization of a scalable Shor algorithm"}, howpublished = {Cryptology ePrint Archive, Report 2015/1133}, year = {2015}, url = {https://eprint.iacr.org/2015/1133}, } @misc{cryptoeprint:2015:1134, author = {Eric Crockett and Chris Peikert}, title = {$\Lambda \circ \lambda$: Functional Lattice Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2015/1134}, year = {2015}, url = {https://eprint.iacr.org/2015/1134}, } @misc{cryptoeprint:2015:1135, author = {Hiraku Morita and Jacob C.N. Schuldt and Takahiro Matsuda and Goichiro Hanaoka and Tetsu Iwata}, title = {On the Security of the Schnorr Signature Scheme and DSA against Related-Key Attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/1135}, year = {2015}, url = {https://eprint.iacr.org/2015/1135}, } @misc{cryptoeprint:2015:1136, author = {Saikrishna Badrinarayanan and Divya Gupta and Abhishek Jain and Amit Sahai}, title = {Multi-Input Functional Encryption for Unbounded Arity Functions}, howpublished = {Cryptology ePrint Archive, Report 2015/1136}, year = {2015}, url = {https://eprint.iacr.org/2015/1136}, } @misc{cryptoeprint:2015:1137, author = {Mengce Zheng and Honggang Hu}, title = {A New Factoring Attack on Multi-Prime RSA with Small Prime Difference}, howpublished = {Cryptology ePrint Archive, Report 2015/1137}, year = {2015}, url = {https://eprint.iacr.org/2015/1137}, } @misc{cryptoeprint:2015:1138, author = {Elena Dubrova and Mats Näslund and Göran Selander and Fredrik Lindqvist}, title = {Lightweight CRC-based Authentication}, howpublished = {Cryptology ePrint Archive, Report 2015/1138}, year = {2015}, url = {https://eprint.iacr.org/2015/1138}, } @misc{cryptoeprint:2015:1139, author = {Jian Liu, Sihem Mesnager, and Lusheng Chen}, title = {Secret Sharing Schemes with General Access Structures (Full version)}, howpublished = {Cryptology ePrint Archive, Report 2015/1139}, year = {2015}, url = {https://eprint.iacr.org/2015/1139}, } @misc{cryptoeprint:2015:113, author = {Anne Canteaut and Sergiu Carpov and Caroline Fontaine and Tancrède Lepoint and María Naya-Plasencia and Pascal Paillier and Renaud Sirdey}, title = {Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression}, howpublished = {Cryptology ePrint Archive, Report 2015/113}, year = {2015}, url = {https://eprint.iacr.org/2015/113}, } @misc{cryptoeprint:2015:1140, author = {Pranjal Dutta}, title = {Modular Inversion Hidden Number Problem- A Lattice Approach}, howpublished = {Cryptology ePrint Archive, Report 2015/1140}, year = {2015}, url = {https://eprint.iacr.org/2015/1140}, } @misc{cryptoeprint:2015:1141, author = {Thomas Allan and Billy Bob Brumley and Katrina Falkner and Joop van de Pol and Yuval Yarom}, title = {Amplifying Side Channels Through Performance Degradation}, howpublished = {Cryptology ePrint Archive, Report 2015/1141}, year = {2015}, url = {https://eprint.iacr.org/2015/1141}, } @misc{cryptoeprint:2015:1142, author = {Subhadeep Banik and Andrey Bogdanov and Takanori Isobe and Kyoji Shibutani and Harunaga Hiwatari and Toru Akishita and Francesco Regazzoni}, title = {Midori: A Block Cipher for Low Energy (Extended Version)}, howpublished = {Cryptology ePrint Archive, Report 2015/1142}, year = {2015}, url = {https://eprint.iacr.org/2015/1142}, } @misc{cryptoeprint:2015:1143, author = {Zhigang Chen and Xinxia Song}, title = {A Multi-Bit Fully Homomorphic Encryption with Shorter Public Key from LWE}, howpublished = {Cryptology ePrint Archive, Report 2015/1143}, year = {2015}, url = {https://eprint.iacr.org/2015/1143}, } @misc{cryptoeprint:2015:1144, author = {Olivier Blazy and Céline Chevalier and Damien Vergnaud}, title = {Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions}, howpublished = {Cryptology ePrint Archive, Report 2015/1144}, year = {2015}, url = {https://eprint.iacr.org/2015/1144}, } @misc{cryptoeprint:2015:1145, author = {Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Lattice Attacks on the DGHV Homomorphic Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2015/1145}, year = {2015}, url = {https://eprint.iacr.org/2015/1145}, } @misc{cryptoeprint:2015:1146, author = {Jesus Diaz and David Arroyo and Francisco B. Rodriguez}, title = {libgroupsig: An extensible C library for group signatures}, howpublished = {Cryptology ePrint Archive, Report 2015/1146}, year = {2015}, url = {https://eprint.iacr.org/2015/1146}, } @misc{cryptoeprint:2015:1147, author = {Iraklis Leontiadis and Ming Li}, title = {Collusion Resistant Aggregation from Convertible Tags}, howpublished = {Cryptology ePrint Archive, Report 2015/1147}, year = {2015}, url = {https://eprint.iacr.org/2015/1147}, } @misc{cryptoeprint:2015:1148, author = {Ritam Bhaumik and Mridul Nandi}, title = {An Inverse-free Single-Keyed Tweakable Enciphering Scheme}, howpublished = {Cryptology ePrint Archive, Report 2015/1148}, year = {2015}, url = {https://eprint.iacr.org/2015/1148}, } @misc{cryptoeprint:2015:1149, author = {Takahiro Matsuda and Goichiro Hanaoka}, title = {An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/1149}, year = {2015}, url = {https://eprint.iacr.org/2015/1149}, } @misc{cryptoeprint:2015:114, author = {Shai Halevi, William E. Hall, Charanjit S. Jutla, Arnab Roy}, title = {Weak Ideal Functionalities for Designing Random Oracles with Applications to Fugue}, howpublished = {Cryptology ePrint Archive, Report 2015/114}, year = {2015}, url = {https://eprint.iacr.org/2015/114}, } @misc{cryptoeprint:2015:1150, author = {Colin Boyd and Britta Hale and Stig Frode Mjølsnes and Douglas Stebila}, title = {From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS}, howpublished = {Cryptology ePrint Archive, Report 2015/1150}, year = {2015}, url = {https://eprint.iacr.org/2015/1150}, } @misc{cryptoeprint:2015:1151, author = {Antonio Faonio and Jesper Buus Nielsen}, title = {Fully Leakage-Resilient Codes}, howpublished = {Cryptology ePrint Archive, Report 2015/1151}, year = {2015}, url = {https://eprint.iacr.org/2015/1151}, } @misc{cryptoeprint:2015:1152, author = {Qiang Tang and Jun Wang}, title = {Privacy-preserving Friendship-based Recommender Systems}, howpublished = {Cryptology ePrint Archive, Report 2015/1152}, year = {2015}, url = {https://eprint.iacr.org/2015/1152}, } @misc{cryptoeprint:2015:1153, author = {Samee Zahur and David Evans}, title = {Obliv-C: A Language for Extensible Data-Oblivious Computation}, howpublished = {Cryptology ePrint Archive, Report 2015/1153}, year = {2015}, url = {https://eprint.iacr.org/2015/1153}, } @misc{cryptoeprint:2015:1154, author = {Jean-Philippe Aumasson and Philipp Jovanovic and Samuel Neves}, title = {NORX8 and NORX16: Authenticated Encryption for Low-End Systems}, howpublished = {Cryptology ePrint Archive, Report 2015/1154}, year = {2015}, url = {https://eprint.iacr.org/2015/1154}, } @misc{cryptoeprint:2015:1155, author = {Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar}, title = {Cross Processor Cache Attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/1155}, year = {2015}, url = {https://eprint.iacr.org/2015/1155}, } @misc{cryptoeprint:2015:1156, author = {Dipanjan Das and Priyanka Bose and S. Sree Vivek and S. Sharmila Deva Selvi and C. Pandu Rangan}, title = {An Identity Based Encryption Scheme Resilient to RAM Scraper Like Malware Attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/1156}, year = {2015}, url = {https://eprint.iacr.org/2015/1156}, } @misc{cryptoeprint:2015:1157, author = {Mihir Bellare and Bertram Poettering and Douglas Stebila}, title = {From Identification to Signatures, Tightly: A Framework and Generic Transforms}, howpublished = {Cryptology ePrint Archive, Report 2015/1157}, year = {2015}, url = {https://eprint.iacr.org/2015/1157}, } @misc{cryptoeprint:2015:1158, author = {Marie-Sarah Lacharit\'{e} and Kenneth G. Paterson}, title = {A note on the optimality of frequency analysis vs. $\ell_p$-optimization}, howpublished = {Cryptology ePrint Archive, Report 2015/1158}, year = {2015}, url = {https://eprint.iacr.org/2015/1158}, } @misc{cryptoeprint:2015:1159, author = {Dan Bogdanov, Liina Kamm, Baldur Kubo, Reimo Rebane, Ville Sokk, Riivo Talviste}, title = {Students and Taxes: a Privacy-Preserving Social Study Using Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2015/1159}, year = {2015}, url = {https://eprint.iacr.org/2015/1159}, } @misc{cryptoeprint:2015:115, author = {Muhammad Yasir Malik}, title = {Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors}, howpublished = {Cryptology ePrint Archive, Report 2015/115}, year = {2015}, url = {https://eprint.iacr.org/2015/115}, } @misc{cryptoeprint:2015:1160, author = {Yasufumi Hashimoto}, title = {Cryptanalysis of multi-HFE}, howpublished = {Cryptology ePrint Archive, Report 2015/1160}, year = {2015}, url = {https://eprint.iacr.org/2015/1160}, } @misc{cryptoeprint:2015:1161, author = {Jia Xu and Jianying Zhou and Liming Lu}, title = {Cyber and Physical Access Control in Legacy System Using Passwords}, howpublished = {Cryptology ePrint Archive, Report 2015/1161}, year = {2015}, url = {https://eprint.iacr.org/2015/1161}, } @misc{cryptoeprint:2015:1162, author = {Phillip Rogaway}, title = {The Moral Character of Cryptographic Work}, howpublished = {Cryptology ePrint Archive, Report 2015/1162}, year = {2015}, url = {https://eprint.iacr.org/2015/1162}, } @misc{cryptoeprint:2015:1163, author = {Mehmet Özen and Mustafa Çoban and Ferhat Karakoç}, title = {A Guess-and-Determine Attack on Reduced-Round Khudra and Weak Keys of Full Cipher}, howpublished = {Cryptology ePrint Archive, Report 2015/1163}, year = {2015}, url = {https://eprint.iacr.org/2015/1163}, } @misc{cryptoeprint:2015:1164, author = {Pasquale Forte and Diego Romano and Giovanni Schmid}, title = {Beyond Bitcoin - Part I: A critical look at blockchain-based systems}, howpublished = {Cryptology ePrint Archive, Report 2015/1164}, year = {2015}, url = {https://eprint.iacr.org/2015/1164}, } @misc{cryptoeprint:2015:1165, author = {Li Lin and Wenling Wu}, title = {Meet-in-the-Middle Attacks on Reduced-Round Midori-64}, howpublished = {Cryptology ePrint Archive, Report 2015/1165}, year = {2015}, url = {https://eprint.iacr.org/2015/1165}, } @misc{cryptoeprint:2015:1166, author = {Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang}, title = {Ceremonies for End-to-End Verifiable Elections}, howpublished = {Cryptology ePrint Archive, Report 2015/1166}, year = {2015}, url = {https://eprint.iacr.org/2015/1166}, } @misc{cryptoeprint:2015:1167, author = {Dan Boneh and Kevin Lewi and David J. Wu}, title = {Constraining Pseudorandom Functions Privately}, howpublished = {Cryptology ePrint Archive, Report 2015/1167}, year = {2015}, url = {https://eprint.iacr.org/2015/1167}, } @misc{cryptoeprint:2015:1168, author = {Loi Luu and Viswesh Narayanan and Kunal Baweja and Chaodong Zheng and Seth Gilbert and Prateek Saxena}, title = {SCP: A Computationally-Scalable Byzantine Consensus Protocol For Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2015/1168}, year = {2015}, url = {https://eprint.iacr.org/2015/1168}, } @misc{cryptoeprint:2015:1169, author = {Marc Green and Thomas Eisenbarth}, title = {Strength in Numbers: Threshold ECDSA to Protect Keys in the Cloud}, howpublished = {Cryptology ePrint Archive, Report 2015/1169}, year = {2015}, url = {https://eprint.iacr.org/2015/1169}, } @misc{cryptoeprint:2015:116, author = {Riadh Brinci and Walid Khmiri and Mefteh Mbarek and Abdellatif Ben Rabâa and Ammar Bouallègue}, title = {Efficient Hardware Design for Computing Pairings Using Few FPGA In-built DSPs}, howpublished = {Cryptology ePrint Archive, Report 2015/116}, year = {2015}, url = {https://eprint.iacr.org/2015/116}, } @misc{cryptoeprint:2015:1170, author = {Takanori Yasuda and Xavier Dahan and Kouichi Sakurai}, title = {Characterizing NTRU-Variants Using Group Ring and Evaluating their Lattice Security}, howpublished = {Cryptology ePrint Archive, Report 2015/1170}, year = {2015}, url = {https://eprint.iacr.org/2015/1170}, } @misc{cryptoeprint:2015:1171, author = {Yandong Zheng, Hua Guo}, title = {On the Security of a access polynomial based self-healing key management schemes in wireless sensor networks}, howpublished = {Cryptology ePrint Archive, Report 2015/1171}, year = {2015}, url = {https://eprint.iacr.org/2015/1171}, } @misc{cryptoeprint:2015:1172, author = {Jingwei Hu and Ray C.C. Cheung}, title = {An Application Specific Instruction Set Processor (ASIP) for the Niederreiter Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2015/1172}, year = {2015}, url = {https://eprint.iacr.org/2015/1172}, } @misc{cryptoeprint:2015:1173, author = {Shai Halevi and Yuval Ishai and Abhishek Jain and Eyal Kushilevitz and Tal Rabin}, title = {Secure Multiparty Computation with General Interaction Patterns}, howpublished = {Cryptology ePrint Archive, Report 2015/1173}, year = {2015}, url = {https://eprint.iacr.org/2015/1173}, } @misc{cryptoeprint:2015:1174, author = {Goutam Paul and Souvik Ray}, title = {On Data Complexity of Distinguishing Attacks vs. Message Recovery Attacks on Stream Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2015/1174}, year = {2015}, url = {https://eprint.iacr.org/2015/1174}, } @misc{cryptoeprint:2015:1175, author = {Bhanu Prakash Gopularam and Nalini. N}, title = {Improved Data Confidentiality of Audit Trail Data in Multi-Tenant Cloud}, howpublished = {Cryptology ePrint Archive, Report 2015/1175}, year = {2015}, url = {https://eprint.iacr.org/2015/1175}, } @misc{cryptoeprint:2015:1176, author = {Myungsun Kim and Hyung Tae Lee and San Ling and Huaxiong Wang}, title = {On the Efficiency of FHE-based Private Queries}, howpublished = {Cryptology ePrint Archive, Report 2015/1176}, year = {2015}, url = {https://eprint.iacr.org/2015/1176}, } @misc{cryptoeprint:2015:1177, author = {Jakob Jakobsen and Claudio Orlandi}, title = {On the CCA (in)security of MTProto}, howpublished = {Cryptology ePrint Archive, Report 2015/1177}, year = {2015}, url = {https://eprint.iacr.org/2015/1177}, } @misc{cryptoeprint:2015:1178, author = {Vipul Goyal and Omkant Pandey and Silas Richelson}, title = {Textbook Non-Malleable Commitments}, howpublished = {Cryptology ePrint Archive, Report 2015/1178}, year = {2015}, url = {https://eprint.iacr.org/2015/1178}, } @misc{cryptoeprint:2015:1179, author = {Kenichiro Hayasaka and Kazumaro Aoki and Tetsutaro Kobayashi and Tsuyoshi Takagi}, title = {A construction of 3-dimensional lattice sieve for number field sieve over F_{p^n}}, howpublished = {Cryptology ePrint Archive, Report 2015/1179}, year = {2015}, url = {https://eprint.iacr.org/2015/1179}, } @misc{cryptoeprint:2015:117, author = {Maciej Skorski}, title = {Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy}, howpublished = {Cryptology ePrint Archive, Report 2015/117}, year = {2015}, url = {https://eprint.iacr.org/2015/117}, } @misc{cryptoeprint:2015:1180, author = {Ignat Korchagin and Eugene Pilyankevich}, title = {Secure Comparator: a ZKP-Based Authentication System}, howpublished = {Cryptology ePrint Archive, Report 2015/1180}, year = {2015}, url = {https://eprint.iacr.org/2015/1180}, } @misc{cryptoeprint:2015:1181, author = {Zhiqiang Lin, Dingyi Pei and Dongdai Lin}, title = {Construction of Transition Matrices for Binary FCSRs}, howpublished = {Cryptology ePrint Archive, Report 2015/1181}, year = {2015}, url = {https://eprint.iacr.org/2015/1181}, } @misc{cryptoeprint:2015:1182, author = {Nicky Mouha}, title = {Chaskey: a MAC Algorithm for Microcontrollers -- Status Update and Proposal of Chaskey-12 --}, howpublished = {Cryptology ePrint Archive, Report 2015/1182}, year = {2015}, url = {https://eprint.iacr.org/2015/1182}, } @misc{cryptoeprint:2015:1183, author = {Esha Ghosh and Olga Ohrimenko and Roberto Tamassia}, title = {Authenticated Range \& Closest Point Queries in Zero-Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2015/1183}, year = {2015}, url = {https://eprint.iacr.org/2015/1183}, } @misc{cryptoeprint:2015:1184, author = {Alan Szepieniec and Jintai Ding and Bart Preneel}, title = {Extension Field Cancellation: a New Central Trapdoor for Multivariate Quadratic Systems}, howpublished = {Cryptology ePrint Archive, Report 2015/1184}, year = {2015}, url = {https://eprint.iacr.org/2015/1184}, } @misc{cryptoeprint:2015:1185, author = {Nico Doettling and Dominique Schröder}, title = {Efficient Pseudorandom Functions via On-the-Fly Adaptation}, howpublished = {Cryptology ePrint Archive, Report 2015/1185}, year = {2015}, url = {https://eprint.iacr.org/2015/1185}, } @misc{cryptoeprint:2015:1186, author = {Khodakhast Bibak and Bruce M. Kapron and Venkatesh Srinivasan and Roberto Tauraso and L\'aszl\'o T\'oth}, title = {Restricted linear congruences}, howpublished = {Cryptology ePrint Archive, Report 2015/1186}, year = {2015}, url = {https://eprint.iacr.org/2015/1186}, } @misc{cryptoeprint:2015:1187, author = {Khodakhast Bibak and Bruce M. Kapron and Venkatesh Srinivasan and L\'aszl\'o T\'oth}, title = {On an almost-universal hash function family with applications to authentication and secrecy codes}, howpublished = {Cryptology ePrint Archive, Report 2015/1187}, year = {2015}, url = {https://eprint.iacr.org/2015/1187}, } @misc{cryptoeprint:2015:1188, author = {Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay}, title = {Compact Attribute-Based Encryption and Signcryption for General Circuits from Multilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2015/1188}, year = {2015}, url = {https://eprint.iacr.org/2015/1188}, } @misc{cryptoeprint:2015:1189, author = {Jian Guo and J\'er\'emy Jean and Ivica Nikoli\'c and Kexin Qiao and Yu Sasaki and Siang Meng Sim}, title = {Invariant Subspace Attack Against Full Midori64}, howpublished = {Cryptology ePrint Archive, Report 2015/1189}, year = {2015}, url = {https://eprint.iacr.org/2015/1189}, } @misc{cryptoeprint:2015:118, author = {Takahiro Matsuda and Goichiro Hanaoka}, title = {Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms}, howpublished = {Cryptology ePrint Archive, Report 2015/118}, year = {2015}, url = {https://eprint.iacr.org/2015/118}, } @misc{cryptoeprint:2015:1190, author = {Yuval Ishal and Eyal Kushilevitz and Steve Lu and Rafail Ostrovsky}, title = {Private Large-Scale Databases with Distributed Searchable Symmetric Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/1190}, year = {2015}, url = {https://eprint.iacr.org/2015/1190}, } @misc{cryptoeprint:2015:1191, author = {Chester Rebeiro and Debdeep Mukhopadhyay}, title = {A Formal Analysis of Prefetching in Profiled Cache-Timing Attacks on Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2015/1191}, year = {2015}, url = {https://eprint.iacr.org/2015/1191}, } @misc{cryptoeprint:2015:1192, author = {Frederik Armknecht and Colin Boyd and Christopher Carr and Kristian Gj{\o}steen and Angela J{\"a}schke and Christian A. Reuter and Martin Strand}, title = {A Guide to Fully Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/1192}, year = {2015}, url = {https://eprint.iacr.org/2015/1192}, } @misc{cryptoeprint:2015:1193, author = {Thomas Fuhr and Gaëtan Leurent and Valentin Suder}, title = {Collision Attacks against CAESAR Candidates -- Forgery and Key-Recovery against AEZ and Marble}, howpublished = {Cryptology ePrint Archive, Report 2015/1193}, year = {2015}, url = {https://eprint.iacr.org/2015/1193}, } @misc{cryptoeprint:2015:1194, author = {Gizem S. \c{C}etin and Wei Dai and Yark{\i}n Dor\"{o}z and Berk Sunar}, title = {HOMOMORPHIC AUTOCOMPLETE}, howpublished = {Cryptology ePrint Archive, Report 2015/1194}, year = {2015}, url = {https://eprint.iacr.org/2015/1194}, } @misc{cryptoeprint:2015:1195, author = {Gizem S. Cetin and Yarkin Doroz and Berk Sunar and William J. Martin}, title = {ARITHMETIC USING WORD-WISE HOMOMORPHIC ENCRYPTION}, howpublished = {Cryptology ePrint Archive, Report 2015/1195}, year = {2015}, url = {https://eprint.iacr.org/2015/1195}, } @misc{cryptoeprint:2015:1196, author = {Geoffroy Couteau and Thomas Peters and David Pointcheval}, title = {Secure Distributed Computation on Private Inputs}, howpublished = {Cryptology ePrint Archive, Report 2015/1196}, year = {2015}, url = {https://eprint.iacr.org/2015/1196}, } @misc{cryptoeprint:2015:1197, author = {Yark{\i}n Dor\"{o}z and Berk Sunar and Gizem S. \c{C}etin}, title = {On-the-fly Homomorphic Batching/Unbatching}, howpublished = {Cryptology ePrint Archive, Report 2015/1197}, year = {2015}, url = {https://eprint.iacr.org/2015/1197}, } @misc{cryptoeprint:2015:1198, author = {Mihir Bellare and Anna Lysyanskaya}, title = {Symmetric and Dual PRFs from Standard Assumptions: A Generic Validation of an HMAC Assumption}, howpublished = {Cryptology ePrint Archive, Report 2015/1198}, year = {2015}, url = {https://eprint.iacr.org/2015/1198}, } @misc{cryptoeprint:2015:1199, author = {S. Carpov and R. Sirdey}, title = {A compression method for homomorphic ciphertexts}, howpublished = {Cryptology ePrint Archive, Report 2015/1199}, year = {2015}, url = {https://eprint.iacr.org/2015/1199}, } @misc{cryptoeprint:2015:119, author = {Alexandre Duc and Sebastian Faust and François-Xavier Standaert}, title = {Making Masking Security Proofs Concrete or How to Evaluate the Security of any Leaking Device (Extended Version)}, howpublished = {Cryptology ePrint Archive, Report 2015/119}, year = {2015}, url = {https://eprint.iacr.org/2015/119}, } @misc{cryptoeprint:2015:1200, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates}, howpublished = {Cryptology ePrint Archive, Report 2015/1200}, year = {2015}, url = {https://eprint.iacr.org/2015/1200}, } @misc{cryptoeprint:2015:1201, author = {Zheng Yuan, and Zhen Peng, and Ming Mao}, title = {A Star-based Independent Biclique Attack on Full Rounds SQUARE }, howpublished = {Cryptology ePrint Archive, Report 2015/1201}, year = {2015}, url = {https://eprint.iacr.org/2015/1201}, } @misc{cryptoeprint:2015:1202, author = {Kwangsu Lee and Dong Hoon Lee and Jong Hwan Park and Moti Yung}, title = {CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts}, howpublished = {Cryptology ePrint Archive, Report 2015/1202}, year = {2015}, url = {https://eprint.iacr.org/2015/1202}, } @misc{cryptoeprint:2015:1203, author = {Nikolay Kolomeec}, title = {The graph of minimal distances of bent functions and its properties}, howpublished = {Cryptology ePrint Archive, Report 2015/1203}, year = {2015}, url = {https://eprint.iacr.org/2015/1203}, } @misc{cryptoeprint:2015:1204, author = {Elizabeth A. Quaglia and Ben Smyth}, title = {Constructing secret, verifiable auction schemes from election schemes}, howpublished = {Cryptology ePrint Archive, Report 2015/1204}, year = {2015}, url = {https://eprint.iacr.org/2015/1204}, } @misc{cryptoeprint:2015:1205, author = {Angelo De Caro and Vincenzo Iovino and Adam O'Neill}, title = {Deniable Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/1205}, year = {2015}, url = {https://eprint.iacr.org/2015/1205}, } @misc{cryptoeprint:2015:1206, author = {Elad Carmon and Jean-Pierre Seifert and Avishai Wool}, title = {Simple Photonic Emission Attack with Reduced Data Complexity}, howpublished = {Cryptology ePrint Archive, Report 2015/1206}, year = {2015}, url = {https://eprint.iacr.org/2015/1206}, } @misc{cryptoeprint:2015:1207, author = {Zhengjun Cao and Zhenfu Cao and Lihua Liu}, title = {Comment on Demonstrations of Shor's Algorithm in the Past Decades}, howpublished = {Cryptology ePrint Archive, Report 2015/1207}, year = {2015}, url = {https://eprint.iacr.org/2015/1207}, } @misc{cryptoeprint:2015:1208, author = {Zheng Yuan,Zhen Peng,Haiwen Ou}, title = {Two Kinds of Biclique Attacks on Lightweight Block Cipher PRINCE}, howpublished = {Cryptology ePrint Archive, Report 2015/1208}, year = {2015}, url = {https://eprint.iacr.org/2015/1208}, } @misc{cryptoeprint:2015:1209, author = {Alptekin Kupcu and Payman Mohassel}, title = {Fast Optimistically Fair Cut-and-Choose 2PC}, howpublished = {Cryptology ePrint Archive, Report 2015/1209}, year = {2015}, url = {https://eprint.iacr.org/2015/1209}, } @misc{cryptoeprint:2015:120, author = {Debapriya Basu Roy and Shivam Bhasin and Sylvain Guilley and Jean-Luc Danger and Debdeep Mukhopadhyay and Xuan Thuy Ngo and Zakaria Najm}, title = {Reconfigurable LUT: A Double Edged Sword for Security-Critical Applications}, howpublished = {Cryptology ePrint Archive, Report 2015/120}, year = {2015}, url = {https://eprint.iacr.org/2015/120}, } @misc{cryptoeprint:2015:1210, author = {Ehsan Ebrahimi Targhi and Dominique Unruh}, title = {Quantum Security of the Fujisaki-Okamoto and OAEP Transforms}, howpublished = {Cryptology ePrint Archive, Report 2015/1210}, year = {2015}, url = {https://eprint.iacr.org/2015/1210}, } @misc{cryptoeprint:2015:1211, author = {Sven Heiberg and Arnis Parsovs and Jan Willemson}, title = {Log Analysis of Estonian Internet Voting 2013--2015}, howpublished = {Cryptology ePrint Archive, Report 2015/1211}, year = {2015}, url = {https://eprint.iacr.org/2015/1211}, } @misc{cryptoeprint:2015:1212, author = {Sylvain Duquesne and Nadia El Mrabet and Safia Haloui and Franck Rondepierre}, title = {Choosing and generating parameters for low level pairing implementation on BN curves}, howpublished = {Cryptology ePrint Archive, Report 2015/1212}, year = {2015}, url = {https://eprint.iacr.org/2015/1212}, } @misc{cryptoeprint:2015:1213, author = {Anna Krasnova, Moritz Neikes, and Peter Schwabe}, title = {Footprint scheduling for Dining-Cryptographer networks}, howpublished = {Cryptology ePrint Archive, Report 2015/1213}, year = {2015}, url = {https://eprint.iacr.org/2015/1213}, } @misc{cryptoeprint:2015:1214, author = {Britta Hale and Tibor Jager and Sebastian Lauer and Jörg Schwenk}, title = {Simple Security Definitions for and Constructions of 0-RTT Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2015/1214}, year = {2015}, url = {https://eprint.iacr.org/2015/1214}, } @misc{cryptoeprint:2015:1215, author = {A. Adam Ding and Cong Chen and Thomas Eisenbarth}, title = {Simpler, Faster, and More Robust T-test Based Leakage Detection}, howpublished = {Cryptology ePrint Archive, Report 2015/1215}, year = {2015}, url = {https://eprint.iacr.org/2015/1215}, } @misc{cryptoeprint:2015:1216, author = {Hui Guo and Zhenfeng Zhang and Jing Xu}, title = {Non-Transferable Proxy Re-Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/1216}, year = {2015}, url = {https://eprint.iacr.org/2015/1216}, } @misc{cryptoeprint:2015:1217, author = {Boris Ryabko}, title = {Two-faced processes and existence of RNG with proven properties}, howpublished = {Cryptology ePrint Archive, Report 2015/1217}, year = {2015}, url = {https://eprint.iacr.org/2015/1217}, } @misc{cryptoeprint:2015:1218, author = {Anissa Sghaier and Medien Zeghid and Belgacem Bouallegue and Adel Baganne and Mohsen Machhout}, title = {$Area-Time$ Efficient Hardware Implementation of Elliptic Curve Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2015/1218}, year = {2015}, url = {https://eprint.iacr.org/2015/1218}, } @misc{cryptoeprint:2015:1219, author = {Michel Abdalla and Sonia Belaïd and David Pointcheval and Sylvain Ruhault and Damien Vergnaud}, title = {Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/1219}, year = {2015}, url = {https://eprint.iacr.org/2015/1219}, } @misc{cryptoeprint:2015:121, author = {Travis Mayberry and Erik-Oliver Blass and Guevara Noubir}, title = {Multi-Client Oblivious RAM secure against Malicious Servers}, howpublished = {Cryptology ePrint Archive, Report 2015/121}, year = {2015}, url = {https://eprint.iacr.org/2015/121}, } @misc{cryptoeprint:2015:1220, author = {David Cash and Eike Kiltz and Stefano Tessaro}, title = {Two-Round Man-in-the-Middle Security from LPN}, howpublished = {Cryptology ePrint Archive, Report 2015/1220}, year = {2015}, url = {https://eprint.iacr.org/2015/1220}, } @misc{cryptoeprint:2015:1221, author = {Boris Skoric}, title = {Unclonable encryption revisited ($4 \times 2 = 8$)}, howpublished = {Cryptology ePrint Archive, Report 2015/1221}, year = {2015}, url = {https://eprint.iacr.org/2015/1221}, } @misc{cryptoeprint:2015:1222, author = {Gottfried Herold and Elena Kirshanova and Alexander May}, title = {On the Asymptotic Complexity of Solving LWE}, howpublished = {Cryptology ePrint Archive, Report 2015/1222}, year = {2015}, url = {https://eprint.iacr.org/2015/1222}, } @misc{cryptoeprint:2015:1223, author = {Sebastian Faust; Daniel Masny; Daniele Venturi}, title = {Chosen-Ciphertext Security from Subset Sum}, howpublished = {Cryptology ePrint Archive, Report 2015/1223}, year = {2015}, url = {https://eprint.iacr.org/2015/1223}, } @misc{cryptoeprint:2015:1224, author = {Mohamed Ahmed Abdelraheem, Peter Beelen, Andrey Bogdanov, and Elmar Tischhauser}, title = {Twisted Polynomials and Forgery Attacks on GCM}, howpublished = {Cryptology ePrint Archive, Report 2015/1224}, year = {2015}, url = {https://eprint.iacr.org/2015/1224}, } @misc{cryptoeprint:2015:1225, author = {Debapriya Basu Roy and Poulami Das and Debdeep Mukhopadhyay}, title = {ECC on Your Fingertips: A Single Instruction Approach for Lightweight ECC Design in GF (p)}, howpublished = {Cryptology ePrint Archive, Report 2015/1225}, year = {2015}, url = {https://eprint.iacr.org/2015/1225}, } @misc{cryptoeprint:2015:1226, author = {Oleg Mazonka and Nektarios Georgios Tsoutsos and Michail Maniatakos}, title = {Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation}, howpublished = {Cryptology ePrint Archive, Report 2015/1226}, year = {2015}, url = {https://eprint.iacr.org/2015/1226}, } @misc{cryptoeprint:2015:1227, author = {Akshima and Donghoon Chang and Mohona Ghosh and Aarushi Goel and Somitra Kumar Sanadhya}, title = {Single Key Recovery Attacks on 9-round Kalyna-128/256 and Kalyna-256/512}, howpublished = {Cryptology ePrint Archive, Report 2015/1227}, year = {2015}, url = {https://eprint.iacr.org/2015/1227}, } @misc{cryptoeprint:2015:1228, author = {Eric R. Verheul}, title = {Privacy protection in electronic education based on polymorphic pseudonymization}, howpublished = {Cryptology ePrint Archive, Report 2015/1228}, year = {2015}, url = {https://eprint.iacr.org/2015/1228}, } @misc{cryptoeprint:2015:1229, author = {Jintai Ding and Momonari Kudo and Shinya Okumura and Tsuyoshi Takagi and Chengdong Tao}, title = {Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction}, howpublished = {Cryptology ePrint Archive, Report 2015/1229}, year = {2015}, url = {https://eprint.iacr.org/2015/1229}, } @misc{cryptoeprint:2015:122, author = {Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu}, title = {Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON}, howpublished = {Cryptology ePrint Archive, Report 2015/122}, year = {2015}, url = {https://eprint.iacr.org/2015/122}, } @misc{cryptoeprint:2015:1230, author = {Foteini Baldimtsi and Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang}, title = {Indistinguishable Proofs of Work or Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2015/1230}, year = {2015}, url = {https://eprint.iacr.org/2015/1230}, } @misc{cryptoeprint:2015:1231, author = {Hassan Jameel Asghar and Mohamed Ali Kaafar}, title = {When are Identification Protocols with Sparse Challenges Safe? The Case of the Coskun and Herley Attack}, howpublished = {Cryptology ePrint Archive, Report 2015/1231}, year = {2015}, url = {https://eprint.iacr.org/2015/1231}, } @misc{cryptoeprint:2015:1232, author = {Zhou Tanping*, Liu Longfei, Yang Xiaoyuan, Han Yiliang}, title = {Extend FHEW to General Case}, howpublished = {Cryptology ePrint Archive, Report 2015/1232}, year = {2015}, url = {https://eprint.iacr.org/2015/1232}, } @misc{cryptoeprint:2015:1233, author = {Samuel Neves and Mehdi Tibouchi}, title = {Degenerate Curve Attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/1233}, year = {2015}, url = {https://eprint.iacr.org/2015/1233}, } @misc{cryptoeprint:2015:1234, author = {Ruxandra Olimid and Anat Paskin-Cherniavsky}, title = {On Cryptographic Anonimity and Unpredicatbility in Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2015/1234}, year = {2015}, url = {https://eprint.iacr.org/2015/1234}, } @misc{cryptoeprint:2015:1235, author = {Susumu Kiyoshima}, title = {Constant-round Leakage-resilient Zero-knowledge from Collision Resistance}, howpublished = {Cryptology ePrint Archive, Report 2015/1235}, year = {2015}, url = {https://eprint.iacr.org/2015/1235}, } @misc{cryptoeprint:2015:1236, author = {Liron David and Avishai Wool}, title = {A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-Dimensional Side-Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/1236}, year = {2015}, url = {https://eprint.iacr.org/2015/1236}, } @misc{cryptoeprint:2015:1237, author = {Stanislav V. Smyshlyaev and Igor B. Oshkin and Evgeniy K. Alekseev and Liliya R. Ahmetzyanova}, title = {On the Security of One Password Authenticated Key Exchange Protocol}, howpublished = {Cryptology ePrint Archive, Report 2015/1237}, year = {2015}, url = {https://eprint.iacr.org/2015/1237}, } @misc{cryptoeprint:2015:1238, author = {Ran Cohen}, title = {Asynchronous Secure Multiparty Computation in Constant Time}, howpublished = {Cryptology ePrint Archive, Report 2015/1238}, year = {2015}, url = {https://eprint.iacr.org/2015/1238}, } @misc{cryptoeprint:2015:1239, author = {Yansong Gao, Damith C. Ranasinghe, Said F. Al-Sarawi, Derek Abbott}, title = {Secure Goods Supply Chain and Key Exchange with Virtual Proof of Reality}, howpublished = {Cryptology ePrint Archive, Report 2015/1239}, year = {2015}, url = {https://eprint.iacr.org/2015/1239}, } @misc{cryptoeprint:2015:123, author = {Dennis Hofheinz and Jessica Koch and Christoph Striecks}, title = {Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting}, howpublished = {Cryptology ePrint Archive, Report 2015/123}, year = {2015}, url = {https://eprint.iacr.org/2015/123}, } @misc{cryptoeprint:2015:1240, author = {Yansong Gao, Hua Ma, Damith C. Ranasinghe, Said F. Al-Sarawi, Derek Abbott}, title = {Exploiting PUF Unreliability to Secure Wireless Sensing}, howpublished = {Cryptology ePrint Archive, Report 2015/1240}, year = {2015}, url = {https://eprint.iacr.org/2015/1240}, } @misc{cryptoeprint:2015:1241, author = {José Bacelar Almeida and Manuel Barbosa and Gilles Barthe and François Dupressoir}, title = {Verifiable side-channel security of cryptographic implementations: constant-time MEE-CBC}, howpublished = {Cryptology ePrint Archive, Report 2015/1241}, year = {2015}, url = {https://eprint.iacr.org/2015/1241}, } @misc{cryptoeprint:2015:1242, author = {Anne Broadbent and Christian Schaffner}, title = {Quantum Cryptography Beyond Quantum Key Distribution}, howpublished = {Cryptology ePrint Archive, Report 2015/1242}, year = {2015}, url = {https://eprint.iacr.org/2015/1242}, } @misc{cryptoeprint:2015:1243, author = {Riad S. Wahby and Max Howald and Siddharth Garg and abhi shelat and Michael Walfish}, title = {Verifiable ASICs}, howpublished = {Cryptology ePrint Archive, Report 2015/1243}, year = {2015}, url = {https://eprint.iacr.org/2015/1243}, } @misc{cryptoeprint:2015:1244, author = {George Shushuev}, title = {On values of vectorial Boolean functions and related problems in APN functions}, howpublished = {Cryptology ePrint Archive, Report 2015/1244}, year = {2015}, url = {https://eprint.iacr.org/2015/1244}, } @misc{cryptoeprint:2015:1245, author = {Gu Chunsheng}, title = {Variation of GGH15 Multilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2015/1245}, year = {2015}, url = {https://eprint.iacr.org/2015/1245}, } @misc{cryptoeprint:2015:1246, author = {Jan Camenisch and Manu Drijvers and Anja Lehmann}, title = {Universally Composable Direct Anonymous Attestation}, howpublished = {Cryptology ePrint Archive, Report 2015/1246}, year = {2015}, url = {https://eprint.iacr.org/2015/1246}, } @misc{cryptoeprint:2015:1247, author = {Mike Scott}, title = {Missing a trick: Karatsuba variations}, howpublished = {Cryptology ePrint Archive, Report 2015/1247}, year = {2015}, url = {https://eprint.iacr.org/2015/1247}, } @misc{cryptoeprint:2015:1248, author = {Janaka Alawatugoda}, title = {Generic Transformation of a CCA2-Secure Public-Key Encryption Scheme to an eCK-Secure Key Exchange Protocol in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2015/1248}, year = {2015}, url = {https://eprint.iacr.org/2015/1248}, } @misc{cryptoeprint:2015:1249, author = {Thomas Baignères and Cécile Delerablée and Matthieu Finiasz and Louis Goubin and Tancrède Lepoint and Matthieu Rivain}, title = {Trap Me If You Can -- Million Dollar Curve}, howpublished = {Cryptology ePrint Archive, Report 2015/1249}, year = {2015}, url = {https://eprint.iacr.org/2015/1249}, } @misc{cryptoeprint:2015:124, author = {Alexander Wild and Amir Moradi and Tim Güneysu}, title = {GliFreD: Glitch-Free Duplication - Towards Power-Equalized Circuits on FPGAs}, howpublished = {Cryptology ePrint Archive, Report 2015/124}, year = {2015}, url = {https://eprint.iacr.org/2015/124}, } @misc{cryptoeprint:2015:1250, author = {Brett Hemenway and Zahra Jafargholi and Rafail Ostrovsky and Alessandra Scafuro and Daniel Wichs}, title = {Adaptively Secure Garbled Circuits from One-Way Functions}, howpublished = {Cryptology ePrint Archive, Report 2015/1250}, year = {2015}, url = {https://eprint.iacr.org/2015/1250}, } @misc{cryptoeprint:2015:1251, author = {Zhengjun Cao and Zhenfu Cao}, title = {Comment on Quantum Cryptography---Which is More Important, Signal Security, Information Security or Communication Reliability}, howpublished = {Cryptology ePrint Archive, Report 2015/1251}, year = {2015}, url = {https://eprint.iacr.org/2015/1251}, } @misc{cryptoeprint:2015:1252, author = {Sayandeep Saha and Rajat Subhra Chakraborty and Srinivasa Shashank Nuthakki and Anshul and Debdeep Mukhopadhyay}, title = {Improved Test Pattern Generation for Hardware Trojan Detection using Genetic Algorithm and Boolean Satisfiability}, howpublished = {Cryptology ePrint Archive, Report 2015/1252}, year = {2015}, url = {https://eprint.iacr.org/2015/1252}, } @misc{cryptoeprint:2015:1253, author = {Yu Chen and Baodong Qin and Jiang Zhang and Yi Deng and Sherman S. M. Chow}, title = {Non-Malleable Functions and Their Applications}, howpublished = {Cryptology ePrint Archive, Report 2015/1253}, year = {2015}, url = {https://eprint.iacr.org/2015/1253}, } @misc{cryptoeprint:2015:1254, author = {Yohei Watanabe and Junji Shikata}, title = {Identity-based Hierarchical Key-insulated Encryption without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2015/1254}, year = {2015}, url = {https://eprint.iacr.org/2015/1254}, } @misc{cryptoeprint:2015:1255, author = {Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay}, title = {Functional Encryption for Inner Product with Full Function Privacy}, howpublished = {Cryptology ePrint Archive, Report 2015/1255}, year = {2015}, url = {https://eprint.iacr.org/2015/1255}, } @misc{cryptoeprint:2015:1256, author = {Andreas Hülsing and Joost Rijneveld and Fang Song}, title = {Mitigating Multi-Target Attacks in Hash-based Signatures}, howpublished = {Cryptology ePrint Archive, Report 2015/1256}, year = {2015}, url = {https://eprint.iacr.org/2015/1256}, } @misc{cryptoeprint:2015:1257, author = {Jiawei Yuan}, title = {Security Attack on CloudBI: Practical privacy-preserving outsourcing of biometric identification in the cloud}, howpublished = {Cryptology ePrint Archive, Report 2015/1257}, year = {2015}, url = {https://eprint.iacr.org/2015/1257}, } @misc{cryptoeprint:2015:125, author = {Aloni Cohen and Justin Holmgren}, title = {Multilinear Pseudorandom Functions}, howpublished = {Cryptology ePrint Archive, Report 2015/125}, year = {2015}, url = {https://eprint.iacr.org/2015/125}, } @misc{cryptoeprint:2015:126, author = {Nir Bitansky and Omer Paneth and Daniel Wichs}, title = {Perfect Structure on the Edge of Chaos}, howpublished = {Cryptology ePrint Archive, Report 2015/126}, year = {2015}, url = {https://eprint.iacr.org/2015/126}, } @misc{cryptoeprint:2015:127, author = {Ricardo Dahab and Steven Galbraith and Eduardo Morais}, title = {Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes}, howpublished = {Cryptology ePrint Archive, Report 2015/127}, year = {2015}, url = {https://eprint.iacr.org/2015/127}, } @misc{cryptoeprint:2015:128, author = {Takashi Yamakawa and Shota Yamada and Goichiro Hanaoka and Noboru Kunihiro }, title = {Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications}, howpublished = {Cryptology ePrint Archive, Report 2015/128}, year = {2015}, url = {https://eprint.iacr.org/2015/128}, } @misc{cryptoeprint:2015:129, author = {Nishanth Chandran and Vipul Goyal and Pratyay Mukherjee and Omkant Pandey and Jalaj Upadhyay}, title = {Block-wise Non-Malleable Codes}, howpublished = {Cryptology ePrint Archive, Report 2015/129}, year = {2015}, url = {https://eprint.iacr.org/2015/129}, } @misc{cryptoeprint:2015:130, author = {Sune K. Jakobsen and Claudio Orlandi}, title = {How to Bootstrap Anonymous Communication}, howpublished = {Cryptology ePrint Archive, Report 2015/130}, year = {2015}, url = {https://eprint.iacr.org/2015/130}, } @misc{cryptoeprint:2015:131, author = {Frederik Armknecht, Vasily Mikhalev}, title = {On Lightweight Stream Ciphers with Shorter Internal States}, howpublished = {Cryptology ePrint Archive, Report 2015/131}, year = {2015}, url = {https://eprint.iacr.org/2015/131}, } @misc{cryptoeprint:2015:132, author = {Jung Hee Cheon and Miran Kim and Kristin Lauter2}, title = {Homomorphic Computation of Edit Distance}, howpublished = {Cryptology ePrint Archive, Report 2015/132}, year = {2015}, url = {https://eprint.iacr.org/2015/132}, } @misc{cryptoeprint:2015:133, author = {Kristin Lauter and Adriana Lopez-Alt and Michael Naehrig}, title = {Private Computation on Encrypted Genomic Data}, howpublished = {Cryptology ePrint Archive, Report 2015/133}, year = {2015}, url = {https://eprint.iacr.org/2015/133}, } @misc{cryptoeprint:2015:134, author = {Pierre Karpman}, title = {From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions}, howpublished = {Cryptology ePrint Archive, Report 2015/134}, year = {2015}, url = {https://eprint.iacr.org/2015/134}, } @misc{cryptoeprint:2015:135, author = {Bernardo David and Ryo Nishimaki and Samuel Ranellucci and Alain Tapp}, title = {Generalizing Efficient Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2015/135}, year = {2015}, url = {https://eprint.iacr.org/2015/135}, } @misc{cryptoeprint:2015:136, author = {Marcos A. Simplicio Jr. and Leonardo C. Almeida and Ewerton R. Andrade and Paulo C. F. dos Santos and Paulo S. L. M. Barreto}, title = {Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs}, howpublished = {Cryptology ePrint Archive, Report 2015/136}, year = {2015}, url = {https://eprint.iacr.org/2015/136}, } @misc{cryptoeprint:2015:137, author = {Mikhail Strizhov and Indrajit Ray}, title = {Multi-keyword Similarity Search Over Encrypted Cloud Data}, howpublished = {Cryptology ePrint Archive, Report 2015/137}, year = {2015}, url = {https://eprint.iacr.org/2015/137}, } @misc{cryptoeprint:2015:138, author = {Vikram Singh}, title = {A Practical Key Exchange for the Internet using Lattice Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2015/138}, year = {2015}, url = {https://eprint.iacr.org/2015/138}, } @misc{cryptoeprint:2015:139, author = {Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya}, title = {Performance Analysis of Some Password Hashing Schemes}, howpublished = {Cryptology ePrint Archive, Report 2015/139}, year = {2015}, url = {https://eprint.iacr.org/2015/139}, } @misc{cryptoeprint:2015:140, author = {Neal Koblitz and Alfred Menezes}, title = {The Random Oracle Model: A Twenty-Year Retrospective}, howpublished = {Cryptology ePrint Archive, Report 2015/140}, year = {2015}, url = {https://eprint.iacr.org/2015/140}, } @misc{cryptoeprint:2015:141, author = {Céline Blondeau and Marine Minier}, title = {Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method}, howpublished = {Cryptology ePrint Archive, Report 2015/141}, year = {2015}, url = {https://eprint.iacr.org/2015/141}, } @misc{cryptoeprint:2015:142, author = {S. Dov Gordon and Jonathan Katz and Feng-Hao Liu and Elaine Shi and Hong-Sheng Zhou}, title = {Multi-Client Verifiable Computation with Stronger Security Guarantees}, howpublished = {Cryptology ePrint Archive, Report 2015/142}, year = {2015}, url = {https://eprint.iacr.org/2015/142}, } @misc{cryptoeprint:2015:143, author = {Erich Wenger and Paul Wolfger}, title = {Harder, Better, Faster, Stronger - Elliptic Curve Discrete Logarithm Computations on FPGAs}, howpublished = {Cryptology ePrint Archive, Report 2015/143}, year = {2015}, url = {https://eprint.iacr.org/2015/143}, } @misc{cryptoeprint:2015:144, author = {Tyge Tiessen and Lars R. Knudsen and Stefan Kölbl and Martin M. Lauridsen}, title = {Security of the AES with a Secret S-box}, howpublished = {Cryptology ePrint Archive, Report 2015/144}, year = {2015}, url = {https://eprint.iacr.org/2015/144}, } @misc{cryptoeprint:2015:145, author = {Stefan Kölbl and Gregor Leander and Tyge Tiessen}, title = {Observations on the SIMON block cipher family}, howpublished = {Cryptology ePrint Archive, Report 2015/145}, year = {2015}, url = {https://eprint.iacr.org/2015/145}, } @misc{cryptoeprint:2015:146, author = {Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir}, title = {New Attacks on Feistel Structures with Improved Memory Complexities}, howpublished = {Cryptology ePrint Archive, Report 2015/146}, year = {2015}, url = {https://eprint.iacr.org/2015/146}, } @misc{cryptoeprint:2015:147, author = {Lionel Rivière and Zakaria Najm and Pablo Rauzy and Jean-Luc Danger and Julien Bringer and Laurent Sauvage}, title = {High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures}, howpublished = {Cryptology ePrint Archive, Report 2015/147}, year = {2015}, url = {https://eprint.iacr.org/2015/147}, } @misc{cryptoeprint:2015:148, author = {Yossef Oren and Ahmad-Reza Sadeghi and Christian Wachsmann}, title = {On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs}, howpublished = {Cryptology ePrint Archive, Report 2015/148}, year = {2015}, url = {https://eprint.iacr.org/2015/148}, } @misc{cryptoeprint:2015:149, author = {Jian Guo and Yu Sasaki and Lei Wang and Shuang Wu}, title = {Cryptanalysis of HMAC/NMAC-Whirlpool}, howpublished = {Cryptology ePrint Archive, Report 2015/149}, year = {2015}, url = {https://eprint.iacr.org/2015/149}, } @misc{cryptoeprint:2015:150, author = {Roel Peeters and Tobias Pulls}, title = {Insynd: Improved Privacy-Preserving Transparency Logging}, howpublished = {Cryptology ePrint Archive, Report 2015/150}, year = {2015}, url = {https://eprint.iacr.org/2015/150}, } @misc{cryptoeprint:2015:151, author = {Daniel J. Bernstein and Andreas Hülsing and Tanja Lange and Ruben Niederhagen}, title = {Bad directions in cryptographic hash functions}, howpublished = {Cryptology ePrint Archive, Report 2015/151}, year = {2015}, url = {https://eprint.iacr.org/2015/151}, } @misc{cryptoeprint:2015:152, author = {Ronan Lashermes and Jacques Fournier and Louis Goubin}, title = {Inverting the Final exponentiation of Tate pairings on ordinary elliptic curves using faults}, howpublished = {Cryptology ePrint Archive, Report 2015/152}, year = {2015}, url = {https://eprint.iacr.org/2015/152}, } @misc{cryptoeprint:2015:153, author = {Kai-Min Chung and Jonathan Katz and Hong-Sheng Zhou}, title = {Functional Encryption from (Small) Hardware Tokens}, howpublished = {Cryptology ePrint Archive, Report 2015/153}, year = {2015}, url = {https://eprint.iacr.org/2015/153}, } @misc{cryptoeprint:2015:154, author = {Daniel Genkin and Yuval Ishai and Manoj M. Prabhakaran and Amit Sahai and Eran Tromer}, title = {Circuits Resilient to Additive Attacks with Applications to Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2015/154}, year = {2015}, url = {https://eprint.iacr.org/2015/154}, } @misc{cryptoeprint:2015:155, author = {Loi Luu and Ratul Saha and Inian Parameshwaran and Prateek Saxena and Aquinas Hobor}, title = {On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining}, howpublished = {Cryptology ePrint Archive, Report 2015/155}, year = {2015}, url = {https://eprint.iacr.org/2015/155}, } @misc{cryptoeprint:2015:156, author = {Brett Hemenway and Rafail Ostrovsky}, title = {Building Lossy Trapdoor Functions from Lossy Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/156}, year = {2015}, url = {https://eprint.iacr.org/2015/156}, } @misc{cryptoeprint:2015:157, author = {Nuttapong Attrapadung and Shota Yamada}, title = {Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings}, howpublished = {Cryptology ePrint Archive, Report 2015/157}, year = {2015}, url = {https://eprint.iacr.org/2015/157}, } @misc{cryptoeprint:2015:158, author = {Zvika Brakerski and Ilan Komargodski and Gil Segev}, title = {Multi-Input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2015/158}, year = {2015}, url = {https://eprint.iacr.org/2015/158}, } @misc{cryptoeprint:2015:159, author = {Shengbao Wu; Hongjun Wu; Tao Huang; Mingsheng Wang; Wenling Wu}, title = {Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE}, howpublished = {Cryptology ePrint Archive, Report 2015/159}, year = {2015}, url = {https://eprint.iacr.org/2015/159}, } @misc{cryptoeprint:2015:160, author = {Tao Huang; Ivan Tjuawinata; Hongjun Wu}, title = {Differential-Linear Cryptanalysis of ICEPOLE}, howpublished = {Cryptology ePrint Archive, Report 2015/160}, year = {2015}, url = {https://eprint.iacr.org/2015/160}, } @misc{cryptoeprint:2015:161, author = {Valentina Banciu and Elisabeth Oswald and Carolyn Whitnall}, title = {Exploring the Resilience of Some Lightweight Ciphers Against Pro filed Single Trace Attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/161}, year = {2015}, url = {https://eprint.iacr.org/2015/161}, } @misc{cryptoeprint:2015:162, author = {Jean-Sebastien Coron and Tancrede Lepoint and Mehdi Tibouchi}, title = {New Multilinear Maps over the Integers}, howpublished = {Cryptology ePrint Archive, Report 2015/162}, year = {2015}, url = {https://eprint.iacr.org/2015/162}, } @misc{cryptoeprint:2015:163, author = {Nir Bitansky and Vinod Vaikuntanathan}, title = {Indistinguishability Obfuscation from Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/163}, year = {2015}, url = {https://eprint.iacr.org/2015/163}, } @misc{cryptoeprint:2015:164, author = {Priyanka Bose and Dipanjan Das and C. Pandu Rangan}, title = {Constant Size Ring Signature Without Random Oracle}, howpublished = {Cryptology ePrint Archive, Report 2015/164}, year = {2015}, url = {https://eprint.iacr.org/2015/164}, } @misc{cryptoeprint:2015:165, author = {Benny Applebaum}, title = {The Cryptographic Hardness of Random Local Functions -- Survey}, howpublished = {Cryptology ePrint Archive, Report 2015/165}, year = {2015}, url = {https://eprint.iacr.org/2015/165}, } @misc{cryptoeprint:2015:166, author = {Jeremiah Blocki and Manuel Blum and Anupam Datta}, title = {Naturally Rehearsing Passwords}, howpublished = {Cryptology ePrint Archive, Report 2015/166}, year = {2015}, url = {https://eprint.iacr.org/2015/166}, } @misc{cryptoeprint:2015:167, author = {Saikrishna Badrinarayanan and Eric Miles and Amit Sahai and Mark Zhandry}, title = {Post-Zeroizing Obfuscation: The case of Evasive Circuits}, howpublished = {Cryptology ePrint Archive, Report 2015/167}, year = {2015}, url = {https://eprint.iacr.org/2015/167}, } @misc{cryptoeprint:2015:168, author = {C. Carlet}, title = {More PS and H-like bent functions}, howpublished = {Cryptology ePrint Archive, Report 2015/168}, year = {2015}, url = {https://eprint.iacr.org/2015/168}, } @misc{cryptoeprint:2015:169, author = {Daniel R. L. Brown}, title = {Short Schnorr signatures require a hash function with more than just random-prefix resistance}, howpublished = {Cryptology ePrint Archive, Report 2015/169}, year = {2015}, url = {https://eprint.iacr.org/2015/169}, } @misc{cryptoeprint:2015:170, author = {Daniel Genkin and Lev Pachmanov and Itamar Pipman and Eran Tromer}, title = {Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation}, howpublished = {Cryptology ePrint Archive, Report 2015/170}, year = {2015}, url = {https://eprint.iacr.org/2015/170}, } @misc{cryptoeprint:2015:171, author = {Benjamin Dowling and Douglas Stebila and Greg Zaverucha}, title = {Authenticated Network Time Synchronization}, howpublished = {Cryptology ePrint Archive, Report 2015/171}, year = {2015}, url = {https://eprint.iacr.org/2015/171}, } @misc{cryptoeprint:2015:172, author = {Aria Shahverdi and Mostafa Taha and Thomas Eisenbarth}, title = {Silent Simon: A Threshold Implementation under 100 Slices}, howpublished = {Cryptology ePrint Archive, Report 2015/172}, year = {2015}, url = {https://eprint.iacr.org/2015/172}, } @misc{cryptoeprint:2015:173, author = {Prabhanjan Ananth and Abhishek Jain}, title = {Indistinguishability Obfuscation from Compact Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/173}, year = {2015}, url = {https://eprint.iacr.org/2015/173}, } @misc{cryptoeprint:2015:174, author = {Chenyang Tu and Lingchen Zhang and Zeyi Liu and Neng Gao and Yuan Ma}, title = {A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers}, howpublished = {Cryptology ePrint Archive, Report 2015/174}, year = {2015}, url = {https://eprint.iacr.org/2015/174}, } @misc{cryptoeprint:2015:175, author = {Tomer Ashur and Bart Mennink}, title = {Trivial Nonce-Misusing Attack on Pure OMD}, howpublished = {Cryptology ePrint Archive, Report 2015/175}, year = {2015}, url = {https://eprint.iacr.org/2015/175}, } @misc{cryptoeprint:2015:176, author = {Kim Laine and Kristin Lauter}, title = {Key Recovery for LWE in Polynomial Time}, howpublished = {Cryptology ePrint Archive, Report 2015/176}, year = {2015}, url = {https://eprint.iacr.org/2015/176}, } @misc{cryptoeprint:2015:177, author = {Purushothama B R and Nishat Koti}, title = {On the Security of an Efficient Group Key Agreement Scheme for MANETs}, howpublished = {Cryptology ePrint Archive, Report 2015/177}, year = {2015}, url = {https://eprint.iacr.org/2015/177}, } @misc{cryptoeprint:2015:178, author = {Pablo Daniel Azar and Shafi Goldwasser and Sunoo Park}, title = {How to Incentivize Data-Driven Collaboration Among Competing Parties}, howpublished = {Cryptology ePrint Archive, Report 2015/178}, year = {2015}, url = {https://eprint.iacr.org/2015/178}, } @misc{cryptoeprint:2015:179, author = {Palash Sarkar and Shashank Singh}, title = {A Simple Method for Obtaining Relations Among Factor Basis Elements for Special Hyperelliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2015/179}, year = {2015}, url = {https://eprint.iacr.org/2015/179}, } @misc{cryptoeprint:2015:180, author = {Abhishek Banerjee and Georg Fuchsbauer and Chris Peikert and Krzysztof Pietrzak and Sophie Stevens}, title = {Key-Homomorphic Constrained Pseudorandom Functions}, howpublished = {Cryptology ePrint Archive, Report 2015/180}, year = {2015}, url = {https://eprint.iacr.org/2015/180}, } @misc{cryptoeprint:2015:181, author = {Bing Sun and Zhiqiang Liu and Vincent Rijmen and Ruilin Li and Lei Cheng and Qingju Wang and Hoda Alkhzaimi and Chao Li}, title = {Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2015/181}, year = {2015}, url = {https://eprint.iacr.org/2015/181}, } @misc{cryptoeprint:2015:182, author = {Rodolphe Lampe and Yannick Seurin}, title = {Tweakable Blockciphers with Asymptotically Optimal Security}, howpublished = {Cryptology ePrint Archive, Report 2015/182}, year = {2015}, url = {https://eprint.iacr.org/2015/182}, } @misc{cryptoeprint:2015:183, author = {Céline Blondeau and Kaisa Nyberg}, title = {New Links Between Differential and Linear Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2015/183}, year = {2015}, url = {https://eprint.iacr.org/2015/183}, } @misc{cryptoeprint:2015:184, author = {Céline Blondeau and Kaisa Nyberg}, title = {Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities}, howpublished = {Cryptology ePrint Archive, Report 2015/184}, year = {2015}, url = {https://eprint.iacr.org/2015/184}, } @misc{cryptoeprint:2015:185, author = {Elena Dubrova and Mats Näslund and Gunnar Carlsson and John Fornehed and Ben Smeets}, title = {Remotely Managed Logic Built-In Self-Test for Secure M2M Communications}, howpublished = {Cryptology ePrint Archive, Report 2015/185}, year = {2015}, url = {https://eprint.iacr.org/2015/185}, } @misc{cryptoeprint:2015:186, author = {Sourav Das and Subhamoy Maitra and and Willi Meier}, title = {Higher Order Differential Analysis of NORX}, howpublished = {Cryptology ePrint Archive, Report 2015/186}, year = {2015}, url = {https://eprint.iacr.org/2015/186}, } @misc{cryptoeprint:2015:187, author = {Juan Garay and Jonathan Katz and Bjoern Tackmann and Vassilis Zikas}, title = {How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality}, howpublished = {Cryptology ePrint Archive, Report 2015/187}, year = {2015}, url = {https://eprint.iacr.org/2015/187}, } @misc{cryptoeprint:2015:188, author = {Fabrice Benhamouda and Olivier Blazy and Céline Chevalier and David Pointcheval and Damien Vergnaud}, title = {New Techniques for SPHFs and Efficient One-Round PAKE Protocols}, howpublished = {Cryptology ePrint Archive, Report 2015/188}, year = {2015}, url = {https://eprint.iacr.org/2015/188}, } @misc{cryptoeprint:2015:189, author = {Viet Tung Hoang and Reza Reyhanitabar and Phillip Rogaway and Damian Vizár}, title = {Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance}, howpublished = {Cryptology ePrint Archive, Report 2015/189}, year = {2015}, url = {https://eprint.iacr.org/2015/189}, } @misc{cryptoeprint:2015:190, author = {Seung Geol Choi and Jonathan Katz and Ranjit Kumaresan and Carlos Cid}, title = {Multi-Client Non-Interactive Verifiable Computation}, howpublished = {Cryptology ePrint Archive, Report 2015/190}, year = {2015}, url = {https://eprint.iacr.org/2015/190}, } @misc{cryptoeprint:2015:191, author = {Xiao Shaun Wang, Chang Liu, Kartik Nayak, Yan Huang and Elaine Shi}, title = {iDASH Secure Genome Analysis Competition Using ObliVM}, howpublished = {Cryptology ePrint Archive, Report 2015/191}, year = {2015}, url = {https://eprint.iacr.org/2015/191}, } @misc{cryptoeprint:2015:192, author = {Sylvain DUQUESNE and Loubna GHAMMAM}, title = {Memory-saving computation of the pairing fi nal exponentiation on BN curves}, howpublished = {Cryptology ePrint Archive, Report 2015/192}, year = {2015}, url = {https://eprint.iacr.org/2015/192}, } @misc{cryptoeprint:2015:193, author = {Karim Bigou and Arnaud Tisserand}, title = {Improving Modular Inversion in RNS using the Plus-Minus Method}, howpublished = {Cryptology ePrint Archive, Report 2015/193}, year = {2015}, url = {https://eprint.iacr.org/2015/193}, } @misc{cryptoeprint:2015:194, author = {Dario Catalano and Dario Fiore}, title = {Practical Homomorphic MACs for Arithmetic Circuits}, howpublished = {Cryptology ePrint Archive, Report 2015/194}, year = {2015}, url = {https://eprint.iacr.org/2015/194}, } @misc{cryptoeprint:2015:195, author = {Stephanie Bayer and Jens Groth}, title = {Zero-knowledge Argument for Polynomial Evaluation with Application to Blacklists}, howpublished = {Cryptology ePrint Archive, Report 2015/195}, year = {2015}, url = {https://eprint.iacr.org/2015/195}, } @misc{cryptoeprint:2015:196, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, title = {Tighter Reductions for Forward-Secure Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2015/196}, year = {2015}, url = {https://eprint.iacr.org/2015/196}, } @misc{cryptoeprint:2015:197, author = {N. Nalla Anandakumar}, title = {SCA Resistance Analysis on FPGA Implementations of Sponge based MAC-PHOTON}, howpublished = {Cryptology ePrint Archive, Report 2015/197}, year = {2015}, url = {https://eprint.iacr.org/2015/197}, } @misc{cryptoeprint:2015:198, author = {Pascal Sasdrich and Oliver Mischke and Amir Moradi and Tim Güneysu}, title = {Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives}, howpublished = {Cryptology ePrint Archive, Report 2015/198}, year = {2015}, url = {https://eprint.iacr.org/2015/198}, } @misc{cryptoeprint:2015:199, author = {Amir Moradi and Gesine Hinterwälder}, title = {Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs}, howpublished = {Cryptology ePrint Archive, Report 2015/199}, year = {2015}, url = {https://eprint.iacr.org/2015/199}, } @misc{cryptoeprint:2015:200, author = {Alexander Wild and Amir Moradi and Tim Güneysu}, title = {Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs}, howpublished = {Cryptology ePrint Archive, Report 2015/200}, year = {2015}, url = {https://eprint.iacr.org/2015/200}, } @misc{cryptoeprint:2015:201, author = {A. Mahmoodi Rishakani and S. M. Dehnavi and M. R. Mirzaee Shamsabad and Hamidreza Maimani and Einollah Pasha}, title = {Statistical Properties of Multiplication mod $2^n$}, howpublished = {Cryptology ePrint Archive, Report 2015/201}, year = {2015}, url = {https://eprint.iacr.org/2015/201}, } @misc{cryptoeprint:2015:202, author = {Shafi Goldwasser and Yael Tauman Kalai and Sunoo Park}, title = {Adaptively Secure Coin-Flipping, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2015/202}, year = {2015}, url = {https://eprint.iacr.org/2015/202}, } @misc{cryptoeprint:2015:203, author = {Pascal Sasdrich and Amir Moradi and Oliver Mischke and Tim Güneysu}, title = {Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs}, howpublished = {Cryptology ePrint Archive, Report 2015/203}, year = {2015}, url = {https://eprint.iacr.org/2015/203}, } @misc{cryptoeprint:2015:204, author = {Michel Abdalla and Sonia Belaïd and Pierre-Alain Fouque}, title = {Leakage-Resilient Symmetric Encryption via Re-keying}, howpublished = {Cryptology ePrint Archive, Report 2015/204}, year = {2015}, url = {https://eprint.iacr.org/2015/204}, } @misc{cryptoeprint:2015:205, author = {Jooyoung Lee}, title = {Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/205}, year = {2015}, url = {https://eprint.iacr.org/2015/205}, } @misc{cryptoeprint:2015:206, author = {Bren Cavallo and Giovanni Di Crescenzo and Delaram Kahrobaei and Vladimir Shpilrain}, title = {Efficient and Secure Delegation of Group Exponentiation to a Single Server}, howpublished = {Cryptology ePrint Archive, Report 2015/206}, year = {2015}, url = {https://eprint.iacr.org/2015/206}, } @misc{cryptoeprint:2015:207, author = {Tobias Schneider and Amir Moradi}, title = {Leakage Assessment Methodology - a clear roadmap for side-channel evaluations}, howpublished = {Cryptology ePrint Archive, Report 2015/207}, year = {2015}, url = {https://eprint.iacr.org/2015/207}, } @misc{cryptoeprint:2015:208, author = {Ioana Boureanu, Aikaterini Mitrokotsa and Serge Vaudenay}, title = {Towards Secure Distance Bounding}, howpublished = {Cryptology ePrint Archive, Report 2015/208}, year = {2015}, url = {https://eprint.iacr.org/2015/208}, } @misc{cryptoeprint:2015:209, author = {Daniel Dinu and Yann Le Corre and Dmitry Khovratovich and Léo Perrin and Johann Großschädl and Alex Biryukov}, title = {Triathlon of Lightweight Block Ciphers for the Internet of Things}, howpublished = {Cryptology ePrint Archive, Report 2015/209}, year = {2015}, url = {https://eprint.iacr.org/2015/209}, } @misc{cryptoeprint:2015:210, author = {Chenglu Jin and Marten van Dijk}, title = {Secure and Efficient Initialization and Authentication Protocols for SHIELD}, howpublished = {Cryptology ePrint Archive, Report 2015/210}, year = {2015}, url = {https://eprint.iacr.org/2015/210}, } @misc{cryptoeprint:2015:211, author = {Thijs Laarhoven and Benne de Weger}, title = {Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing}, howpublished = {Cryptology ePrint Archive, Report 2015/211}, year = {2015}, url = {https://eprint.iacr.org/2015/211}, } @misc{cryptoeprint:2015:212, author = {Christof Beierle and Philipp Jovanovic and Martin M. Lauridsen and Gregor Leander and Christian Rechberger}, title = {Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows}, howpublished = {Cryptology ePrint Archive, Report 2015/212}, year = {2015}, url = {https://eprint.iacr.org/2015/212}, } @misc{cryptoeprint:2015:213, author = {Javier Herranz}, title = {Attribute-Based Versions of Schnorr and ElGamal}, howpublished = {Cryptology ePrint Archive, Report 2015/213}, year = {2015}, url = {https://eprint.iacr.org/2015/213}, } @misc{cryptoeprint:2015:214, author = {Yuichi Niwa and Keisuke Ohashi and Kazuhiko Minematsu and Tetsu Iwata}, title = {GCM Security Bounds Reconsidered}, howpublished = {Cryptology ePrint Archive, Report 2015/214}, year = {2015}, url = {https://eprint.iacr.org/2015/214}, } @misc{cryptoeprint:2015:215, author = {Amadou Moctar Kane}, title = {A revocable anonymity in Tor}, howpublished = {Cryptology ePrint Archive, Report 2015/215}, year = {2015}, url = {https://eprint.iacr.org/2015/215}, } @misc{cryptoeprint:2015:216, author = {Eike Kiltz and Hoeteck Wee}, title = {Quasi-Adaptive NIZK for Linear Subspaces Revisited}, howpublished = {Cryptology ePrint Archive, Report 2015/216}, year = {2015}, url = {https://eprint.iacr.org/2015/216}, } @misc{cryptoeprint:2015:217, author = {Subhamoy Maitra and Goutam Paul and Willi Meier}, title = {Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles}, howpublished = {Cryptology ePrint Archive, Report 2015/217}, year = {2015}, url = {https://eprint.iacr.org/2015/217}, } @misc{cryptoeprint:2015:218, author = {wang qinglong}, title = {Efficient k-out-of-n oblivious transfer protocol}, howpublished = {Cryptology ePrint Archive, Report 2015/218}, year = {2015}, url = {https://eprint.iacr.org/2015/218}, } @misc{cryptoeprint:2015:219, author = {Prakruti C, Sashank Dara and V.N. Muralidhara}, title = {Efficient Format Preserving Encrypted Databases}, howpublished = {Cryptology ePrint Archive, Report 2015/219}, year = {2015}, url = {https://eprint.iacr.org/2015/219}, } @misc{cryptoeprint:2015:220, author = {Dan Boneh and Kevin Lewi and Hart Montgomery and Ananth Raghunathan}, title = {Key Homomorphic PRFs and Their Applications}, howpublished = {Cryptology ePrint Archive, Report 2015/220}, year = {2015}, url = {https://eprint.iacr.org/2015/220}, } @misc{cryptoeprint:2015:221, author = {Daniel J. Bernstein and Tanja Lange and Christine van Vredendaal}, title = {Tighter, faster, simpler side-channel security evaluations beyond computing power}, howpublished = {Cryptology ePrint Archive, Report 2015/221}, year = {2015}, url = {https://eprint.iacr.org/2015/221}, } @misc{cryptoeprint:2015:222, author = {Elena Andreeva, Andrey Bogdanov, and Bart Mennink}, title = {Towards Understanding the Known-Key Security of Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2015/222}, year = {2015}, url = {https://eprint.iacr.org/2015/222}, } @misc{cryptoeprint:2015:223, author = {Anubhab Baksi and Subhamoy Maitra and Santanu Sarkar}, title = {New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers}, howpublished = {Cryptology ePrint Archive, Report 2015/223}, year = {2015}, url = {https://eprint.iacr.org/2015/223}, } @misc{cryptoeprint:2015:224, author = {Matteo Maffei and Giulio Malavolta and Manuel Reinert and Dominique Schröder}, title = {GORAM -- Group ORAM for Privacy and Access Control in Outsourced Personal Records}, howpublished = {Cryptology ePrint Archive, Report 2015/224}, year = {2015}, url = {https://eprint.iacr.org/2015/224}, } @misc{cryptoeprint:2015:225, author = {S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad}, title = {Bitwise Linear Mappings with Good Cryptographic Properties and Efficient Implementation}, howpublished = {Cryptology ePrint Archive, Report 2015/225}, year = {2015}, url = {https://eprint.iacr.org/2015/225}, } @misc{cryptoeprint:2015:226, author = {Ben Fisch and Daniel Freund and Moni Naor}, title = {Secure Physical Computation using Disposable Circuits}, howpublished = {Cryptology ePrint Archive, Report 2015/226}, year = {2015}, url = {https://eprint.iacr.org/2015/226}, } @misc{cryptoeprint:2015:227, author = {Alex Biryukov and Dmitry Khovratovich}, title = {Tradeoff Cryptanalysis of Memory-Hard Functions}, howpublished = {Cryptology ePrint Archive, Report 2015/227}, year = {2015}, url = {https://eprint.iacr.org/2015/227}, } @misc{cryptoeprint:2015:228, author = {Konrad Durnoga and Tomasz Kazana and Michał Zając and Maciej Zdanowicz}, title = {Leakage-Resilient Cryptography with Key Derived from Sensitive Data}, howpublished = {Cryptology ePrint Archive, Report 2015/228}, year = {2015}, url = {https://eprint.iacr.org/2015/228}, } @misc{cryptoeprint:2015:229, author = {Reza Hooshmand}, title = {Improving GGH Public Key Scheme Using Low Density Lattice Codes}, howpublished = {Cryptology ePrint Archive, Report 2015/229}, year = {2015}, url = {https://eprint.iacr.org/2015/229}, } @misc{cryptoeprint:2015:230, author = {Der-Yeuan Yu and Aanjhan Ranganathan and Ramya Jayaram Masti and Claudio Soriente and Srdjan Capkun}, title = {W-SPS: Designing a Wide-Area Secure Positioning System}, howpublished = {Cryptology ePrint Archive, Report 2015/230}, year = {2015}, url = {https://eprint.iacr.org/2015/230}, } @misc{cryptoeprint:2015:231, author = {Yonglin Hao}, title = {A Related-Key Chosen-IV Distinguishing Attack on Full Sprout Stream Cipher}, howpublished = {Cryptology ePrint Archive, Report 2015/231}, year = {2015}, url = {https://eprint.iacr.org/2015/231}, } @misc{cryptoeprint:2015:232, author = {Virginie Lallemand and Mar\'ia Naya-Plasencia}, title = {Cryptanalysis of Full Sprout}, howpublished = {Cryptology ePrint Archive, Report 2015/232}, year = {2015}, url = {https://eprint.iacr.org/2015/232}, } @misc{cryptoeprint:2015:233, author = {Ben Smyth and Steven Frink and Michael R. Clarkson}, title = {Election Verifiability: Cryptographic Definitions and an Analysis of Helios, Helios-C, and JCJ}, howpublished = {Cryptology ePrint Archive, Report 2015/233}, year = {2015}, url = {https://eprint.iacr.org/2015/233}, } @misc{cryptoeprint:2015:234, author = {Megha Agrawal and Donghoon Chang and Mohona Ghosh and Somitra Kumar Sanadhya}, title = {Collision Attack on 4-branch, Type-2 GFN based Hash Functions using Sliced Biclique Cryptanalysis Technique}, howpublished = {Cryptology ePrint Archive, Report 2015/234}, year = {2015}, url = {https://eprint.iacr.org/2015/234}, } @misc{cryptoeprint:2015:235, author = {Mashael AlSabah and Ian Goldberg}, title = {Performance and Security Improvements for Tor: A Survey}, howpublished = {Cryptology ePrint Archive, Report 2015/235}, year = {2015}, url = {https://eprint.iacr.org/2015/235}, } @misc{cryptoeprint:2015:236, author = {Subhamoy Maitra and Santanu Sarkar and Anubhab Baksi and Pramit Dey}, title = {Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack}, howpublished = {Cryptology ePrint Archive, Report 2015/236}, year = {2015}, url = {https://eprint.iacr.org/2015/236}, } @misc{cryptoeprint:2015:237, author = {Wouter Lueks and Gergely Alpár and Jaap-Henk Hoepman and Pim Vullers}, title = {Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers}, howpublished = {Cryptology ePrint Archive, Report 2015/237}, year = {2015}, url = {https://eprint.iacr.org/2015/237}, } @misc{cryptoeprint:2015:238, author = {Konrad Durnoga and Stefan Dziembowski and Tomasz Kazana and Michał Zając}, title = {One Time Programs with Limited Memory}, howpublished = {Cryptology ePrint Archive, Report 2015/238}, year = {2015}, url = {https://eprint.iacr.org/2015/238}, } @misc{cryptoeprint:2015:239, author = {Patrick Derbez and Léo Perrin}, title = {Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE}, howpublished = {Cryptology ePrint Archive, Report 2015/239}, year = {2015}, url = {https://eprint.iacr.org/2015/239}, } @misc{cryptoeprint:2015:240, author = {Alex Biryukov, Patrick Derbez and Léo Perrin}, title = {Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE}, howpublished = {Cryptology ePrint Archive, Report 2015/240}, year = {2015}, url = {https://eprint.iacr.org/2015/240}, } @misc{cryptoeprint:2015:241, author = {Elena Dubrova and Martin Hell}, title = {Espresso: A Stream Cipher for 5G Wireless Communication Systems}, howpublished = {Cryptology ePrint Archive, Report 2015/241}, year = {2015}, url = {https://eprint.iacr.org/2015/241}, } @misc{cryptoeprint:2015:242, author = {Benoit Libert and Thomas Peters and Marc Joye and Moti Yung}, title = {Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications}, howpublished = {Cryptology ePrint Archive, Report 2015/242}, year = {2015}, url = {https://eprint.iacr.org/2015/242}, } @misc{cryptoeprint:2015:243, author = {Aris Pagourtzis and Giorgos Panagiotakos and Dimitris Sakavalas}, title = {Reliable communication via semilattice properties of partial knowledge}, howpublished = {Cryptology ePrint Archive, Report 2015/243}, year = {2015}, url = {https://eprint.iacr.org/2015/243}, } @misc{cryptoeprint:2015:244, author = {Jeremy Jean and Ivica Nikolic}, title = {Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation}, howpublished = {Cryptology ePrint Archive, Report 2015/244}, year = {2015}, url = {https://eprint.iacr.org/2015/244}, } @misc{cryptoeprint:2015:245, author = {Pawel Morawiecki}, title = {Practical Attacks on the Round-reduced PRINCE}, howpublished = {Cryptology ePrint Archive, Report 2015/245}, year = {2015}, url = {https://eprint.iacr.org/2015/245}, } @misc{cryptoeprint:2015:246, author = {Fabrice Benhamouda and Geoffroy Couteau and David Pointcheval and Hoeteck Wee}, title = {Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting}, howpublished = {Cryptology ePrint Archive, Report 2015/246}, year = {2015}, url = {https://eprint.iacr.org/2015/246}, } @misc{cryptoeprint:2015:247, author = {Paulo S. L. M. Barreto and Craig Costello and Rafael Misoczki and Michael Naehrig and Geovandro C. C. F. Pereira and Gustavo Zanon}, title = {Subgroup security in pairing-based cryptography}, howpublished = {Cryptology ePrint Archive, Report 2015/247}, year = {2015}, url = {https://eprint.iacr.org/2015/247}, } @misc{cryptoeprint:2015:248, author = {Ryo Nishimaki and Keita Xagawa}, title = {Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES}, howpublished = {Cryptology ePrint Archive, Report 2015/248}, year = {2015}, url = {https://eprint.iacr.org/2015/248}, } @misc{cryptoeprint:2015:249, author = {Keita Xagawa}, title = {Improved (Hierarchical) Inner-Product Encryption from Lattices}, howpublished = {Cryptology ePrint Archive, Report 2015/249}, year = {2015}, url = {https://eprint.iacr.org/2015/249}, } @misc{cryptoeprint:2015:250, author = {Junji Shikata}, title = {Design and Analysis of Information-Theoretically Secure Authentication Codes with Non-Uniformly Random Keys}, howpublished = {Cryptology ePrint Archive, Report 2015/250}, year = {2015}, url = {https://eprint.iacr.org/2015/250}, } @misc{cryptoeprint:2015:251, author = {Kaoru Kurosawa and Yasuhiro Ohtaki}, title = {How to Construct UC-Secure Searchable Symmetric Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2015/251}, year = {2015}, url = {https://eprint.iacr.org/2015/251}, } @misc{cryptoeprint:2015:252, author = {Haiyan Wang, Jianghua Zhong, Dongdai Lin}, title = {Linearization of Multi-valued Nonlinear Feedback Shift Registers}, howpublished = {Cryptology ePrint Archive, Report 2015/252}, year = {2015}, url = {https://eprint.iacr.org/2015/252}, } @misc{cryptoeprint:2015:253, author = {Haiyan Wang , Dongdai Lin}, title = {Stability and Linearization of Multi-valued Nonlinear Feedback Shift Registers}, howpublished = {Cryptology ePrint Archive, Report 2015/253}, year = {2015}, url = {https://eprint.iacr.org/2015/253}, } @misc{cryptoeprint:2015:254, author = {Pouyan Sepehrdad and Petr Susil and Serge Vaudenay and Martin Vuagnoux}, title = {Tornado Attack on RC4 with Applications to WEP and WPA }, howpublished = {Cryptology ePrint Archive, Report 2015/254}, year = {2015}, url = {https://eprint.iacr.org/2015/254}, } @misc{cryptoeprint:2015:255, author = {David Bernhard and Veronique Cortier and David Galindo and Olivier Pereira and Bogdan Warinschi}, title = {A comprehensive analysis of game-based ballot privacy definitions}, howpublished = {Cryptology ePrint Archive, Report 2015/255}, year = {2015}, url = {https://eprint.iacr.org/2015/255}, } @misc{cryptoeprint:2015:256, author = {Yang Lu, Quanling Zhang, Jiguo Li}, title = {Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction}, howpublished = {Cryptology ePrint Archive, Report 2015/256}, year = {2015}, url = {https://eprint.iacr.org/2015/256}, } @misc{cryptoeprint:2015:257, author = {Vadim Lyubashevsky and Thomas Prest}, title = {Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices}, howpublished = {Cryptology ePrint Archive, Report 2015/257}, year = {2015}, url = {https://eprint.iacr.org/2015/257}, } @misc{cryptoeprint:2015:258, author = {Siang Meng Sim and Khoongming Khoo and Fr\'ed\'erique Oggier and Thomas Peyrin}, title = {Lightweight MDS Involution Matrices}, howpublished = {Cryptology ePrint Archive, Report 2015/258}, year = {2015}, url = {https://eprint.iacr.org/2015/258}, } @misc{cryptoeprint:2015:259, author = {Patrick Derbez and Pierre-Alain Fouque}, title = {Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks against Reduced-Round AES}, howpublished = {Cryptology ePrint Archive, Report 2015/259}, year = {2015}, url = {https://eprint.iacr.org/2015/259}, } @misc{cryptoeprint:2015:260, author = {Paul Bottinelli and Joppe W. Bos}, title = {Computational Aspects of Correlation Power Analysis}, howpublished = {Cryptology ePrint Archive, Report 2015/260}, year = {2015}, url = {https://eprint.iacr.org/2015/260}, } @misc{cryptoeprint:2015:261, author = {Joseph Bonneau, Andrew Miler, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten}, title = {Research Perspectives and Challenges for Bitcoin and Cryptocurrencies}, howpublished = {Cryptology ePrint Archive, Report 2015/261}, year = {2015}, url = {https://eprint.iacr.org/2015/261}, } @misc{cryptoeprint:2015:262, author = {Hanno Böck}, title = {A look at the PGP ecosystem through the key server data}, howpublished = {Cryptology ePrint Archive, Report 2015/262}, year = {2015}, url = {https://eprint.iacr.org/2015/262}, } @misc{cryptoeprint:2015:263, author = {Ethan Heilman. Alison Kendler, Aviv Zohar, Sharon Goldberg}, title = {Eclipse Attacks on Bitcoin’s Peer-to-Peer Network}, howpublished = {Cryptology ePrint Archive, Report 2015/263}, year = {2015}, url = {https://eprint.iacr.org/2015/263}, } @misc{cryptoeprint:2015:264, author = {Justine Sherry and Chang Lan and Raluca Ada Popa and Sylvia Ratnasamy}, title = {BlindBox: Deep Packet Inspection over Encrypted Traffic}, howpublished = {Cryptology ePrint Archive, Report 2015/264}, year = {2015}, url = {https://eprint.iacr.org/2015/264}, } @misc{cryptoeprint:2015:265, author = {George Hatzivasilis and Ioannis Papaefstathiou and Charalampos Manifavas}, title = {Password Hashing Competition - Survey and Benchmark}, howpublished = {Cryptology ePrint Archive, Report 2015/265}, year = {2015}, url = {https://eprint.iacr.org/2015/265}, } @misc{cryptoeprint:2015:266, author = {Xianrui Meng and Seny Kamara and Kobbi Nissim and George Kollios}, title = {GRECS: Graph Encryption for Approximate Shortest Distance Queries}, howpublished = {Cryptology ePrint Archive, Report 2015/266}, year = {2015}, url = {https://eprint.iacr.org/2015/266}, } @misc{cryptoeprint:2015:267, author = {Tung Chou and Claudio Orlandi}, title = {The Simplest Protocol for Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2015/267}, year = {2015}, url = {https://eprint.iacr.org/2015/267}, } @misc{cryptoeprint:2015:268, author = {Itai Dinur and Orr Dunkelman and Masha Gutman and Adi Shamir}, title = {Improved Top-Down Techniques in Differential Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2015/268}, year = {2015}, url = {https://eprint.iacr.org/2015/268}, } @misc{cryptoeprint:2015:269, author = {Gu Chunsheng}, title = {Ideal Multilinear Maps Based on Ideal Lattices}, howpublished = {Cryptology ePrint Archive, Report 2015/269}, year = {2015}, url = {https://eprint.iacr.org/2015/269}, } @misc{cryptoeprint:2015:270, author = {Markus Dichtl}, title = {Fibonacci Ring Oscillators as True Random Number Generators - A Security Risk}, howpublished = {Cryptology ePrint Archive, Report 2015/270}, year = {2015}, url = {https://eprint.iacr.org/2015/270}, } @misc{cryptoeprint:2015:271, author = {Mariya Georgieva and Frédéric de Portzamparc}, title = {Toward Secure Implementation of McEliece Decryption}, howpublished = {Cryptology ePrint Archive, Report 2015/271}, year = {2015}, url = {https://eprint.iacr.org/2015/271}, } @misc{cryptoeprint:2015:272, author = {Baodong Qin and Shengli Liu}, title = {Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing}, howpublished = {Cryptology ePrint Archive, Report 2015/272}, year = {2015}, url = {https://eprint.iacr.org/2015/272}, } @misc{cryptoeprint:2015:273, author = {Hoeteck Wee}, title = {Dual System Encryption via Predicate Encodings}, howpublished = {Cryptology ePrint Archive, Report 2015/273}, year = {2015}, url = {https://eprint.iacr.org/2015/273}, } @misc{cryptoeprint:2015:274, author = {Gizem S. \c{C}etin and Yark{\i}n Dor\"{o}z and Berk Sunar and Erkay Sava\c{s}}, title = {Low Depth Circuits for Efficient Homomorphic Sorting}, howpublished = {Cryptology ePrint Archive, Report 2015/274}, year = {2015}, url = {https://eprint.iacr.org/2015/274}, } @misc{cryptoeprint:2015:275, author = {Takanori Yasuda and Xavier Dahan and Yun-Ju Huang and Tsuyoshi Takagi and Kouichi Sakurai}, title = {MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems}, howpublished = {Cryptology ePrint Archive, Report 2015/275}, year = {2015}, url = {https://eprint.iacr.org/2015/275}, } @misc{cryptoeprint:2015:276, author = {Binglong Chen and Chang-An Zhao}, title = {An Improvment of the Elliptic Net Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2015/276}, year = {2015}, url = {https://eprint.iacr.org/2015/276}, } @misc{cryptoeprint:2015:277, author = {Marco Tomamichel and Serge Fehr and J\k{e}drzej Kaniewski and Stephanie Wehner}, title = {One-Sided Device-Independent QKD and Position-based Cryptography from Monogamy Games}, howpublished = {Cryptology ePrint Archive, Report 2015/277}, year = {2015}, url = {https://eprint.iacr.org/2015/277}, } @misc{cryptoeprint:2015:278, author = {Sébastien Canard and David Pointcheval and Olivier Sanders}, title = {Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting}, howpublished = {Cryptology ePrint Archive, Report 2015/278}, year = {2015}, url = {https://eprint.iacr.org/2015/278}, } @misc{cryptoeprint:2015:279, author = {Jérémy Jean and Maria Naya-Plasencia and Thomas Peyrin}, title = {Improved Cryptanalysis of AES-like Permutations}, howpublished = {Cryptology ePrint Archive, Report 2015/279}, year = {2015}, url = {https://eprint.iacr.org/2015/279}, } @misc{cryptoeprint:2015:280, author = {Jonathan Katz and Aishwarya Thiruvengadam and Hong-Sheng Zhou}, title = {Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/280}, year = {2015}, url = {https://eprint.iacr.org/2015/280}, } @misc{cryptoeprint:2015:281, author = {Vinod Vaikuntanathan and Prashant Nalini Vasudevan}, title = {Secret Sharing and Statistical Zero Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2015/281}, year = {2015}, url = {https://eprint.iacr.org/2015/281}, } @misc{cryptoeprint:2015:282, author = {Arash Afshar and Payman Mohassel and Benny Pinkas and Ben Riva}, title = {Non-Interactive Secure Computation Based on Cut-and-Choose}, howpublished = {Cryptology ePrint Archive, Report 2015/282}, year = {2015}, url = {https://eprint.iacr.org/2015/282}, } @misc{cryptoeprint:2015:283, author = {Esha Ghosh and Michael T. Goodrich and Olga Ohrimenko and Roberto Tamassia}, title = {Fully-Dynamic Verifiable Zero-Knowledge Order Queries for Network Data}, howpublished = {Cryptology ePrint Archive, Report 2015/283}, year = {2015}, url = {https://eprint.iacr.org/2015/283}, } @misc{cryptoeprint:2015:284, author = {Binglong~Chen, Chuangqiang~Hu and~Chang-An~Zhao}, title = {A Note on Scalar Multiplication Using Division Polynomials}, howpublished = {Cryptology ePrint Archive, Report 2015/284}, year = {2015}, url = {https://eprint.iacr.org/2015/284}, } @misc{cryptoeprint:2015:285, author = {Tomer Ashur}, title = {Improved Linear Trails for the Block Cipher Simon}, howpublished = {Cryptology ePrint Archive, Report 2015/285}, year = {2015}, url = {https://eprint.iacr.org/2015/285}, } @misc{cryptoeprint:2015:286, author = {Zhan Chen and Ning Wang and Xiaoyun Wang}, title = {Impossible Differential Cryptanalysis of Reduced Round SIMON}, howpublished = {Cryptology ePrint Archive, Report 2015/286}, year = {2015}, url = {https://eprint.iacr.org/2015/286}, } @misc{cryptoeprint:2015:287, author = {John M. Schanck and William Whyte and Zhenfei Zhang}, title = {Circuit-extension handshakes for Tor achieving forward secrecy in a quantum world}, howpublished = {Cryptology ePrint Archive, Report 2015/287}, year = {2015}, url = {https://eprint.iacr.org/2015/287}, } @misc{cryptoeprint:2015:288, author = {Aydin Aysu and Patrick Schaumont}, title = {Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms}, howpublished = {Cryptology ePrint Archive, Report 2015/288}, year = {2015}, url = {https://eprint.iacr.org/2015/288}, } @misc{cryptoeprint:2015:289, author = {Muhammed F. Esgin and Orhun Kara}, title = {Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/289}, year = {2015}, url = {https://eprint.iacr.org/2015/289}, } @misc{cryptoeprint:2015:290, author = {Joseph A. Akinyele and Christina Garman and Susan Hohenberger}, title = {Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes}, howpublished = {Cryptology ePrint Archive, Report 2015/290}, year = {2015}, url = {https://eprint.iacr.org/2015/290}, } @misc{cryptoeprint:2015:291, author = {Takeshi Sugawara, Daisuke Suzuki, and Minoru Saeki}, title = {Two Operands of Multipliers in Side-Channel Attack}, howpublished = {Cryptology ePrint Archive, Report 2015/291}, year = {2015}, url = {https://eprint.iacr.org/2015/291}, } @misc{cryptoeprint:2015:292, author = {Shlomi Dolev and Yin Li}, title = {Secret Shared Random Access Machine}, howpublished = {Cryptology ePrint Archive, Report 2015/292}, year = {2015}, url = {https://eprint.iacr.org/2015/292}, } @misc{cryptoeprint:2015:293, author = {Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay}, title = {Adaptively Secure Unrestricted Attribute-Based Encryption with Subset Difference Revocation in Bilinear Groups of Prime Order}, howpublished = {Cryptology ePrint Archive, Report 2015/293}, year = {2015}, url = {https://eprint.iacr.org/2015/293}, } @misc{cryptoeprint:2015:294, author = {Erd\.{i}n\c{c} \"{O}zt\"{u}rk and Yark{\i}n Dor\"{o}z and Berk Sunar and Erkay Sava\c{s} }, title = {Accelerating Somewhat Homomorphic Evaluation using FPGAs}, howpublished = {Cryptology ePrint Archive, Report 2015/294}, year = {2015}, url = {https://eprint.iacr.org/2015/294}, } @misc{cryptoeprint:2015:295, author = {Ralf Kuesters and Tomasz Truderung}, title = {Security Analysis of Re-Encryption RPC Mix Nets}, howpublished = {Cryptology ePrint Archive, Report 2015/295}, year = {2015}, url = {https://eprint.iacr.org/2015/295}, } @misc{cryptoeprint:2015:296, author = {Emil Lerner}, title = {The Uniform Distribution of Sequences Generated by Iteration of Polynomials}, howpublished = {Cryptology ePrint Archive, Report 2015/296}, year = {2015}, url = {https://eprint.iacr.org/2015/296}, } @misc{cryptoeprint:2015:297, author = {Junzuo Lai and Robert H. Deng and Shengli Liu and Jian Weng and Yunlei Zhao}, title = {Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack}, howpublished = {Cryptology ePrint Archive, Report 2015/297}, year = {2015}, url = {https://eprint.iacr.org/2015/297}, } @misc{cryptoeprint:2015:298, author = {Yongge Wang}, title = {Quantum Resistant Random Linear Code Based Public Key Encryption Scheme RLCE}, howpublished = {Cryptology ePrint Archive, Report 2015/298}, year = {2015}, url = {https://eprint.iacr.org/2015/298}, } @misc{cryptoeprint:2015:299, author = {Zhengjun Cao and Lihua Liu}, title = {A Note on the Lindell-Waisbard Private Web Search Scheme}, howpublished = {Cryptology ePrint Archive, Report 2015/299}, year = {2015}, url = {https://eprint.iacr.org/2015/299}, } @misc{cryptoeprint:2015:300, author = {Sébastien Canard, David Pointcheval, Olivier Sanders and Jacques Traoré}, title = {Scalable Divisible E-cash}, howpublished = {Cryptology ePrint Archive, Report 2015/300}, year = {2015}, url = {https://eprint.iacr.org/2015/300}, } @misc{cryptoeprint:2015:301, author = {Yupu Hu and Huiwen Jia}, title = {Cryptanalysis of GGH Map}, howpublished = {Cryptology ePrint Archive, Report 2015/301}, year = {2015}, url = {https://eprint.iacr.org/2015/301}, } @misc{cryptoeprint:2015:302, author = {Reza Reyhanitabar and Serge Vaudenay and Damian Vizár}, title = {Boosting OMD for Almost Free Authentication of Associated Data}, howpublished = {Cryptology ePrint Archive, Report 2015/302}, year = {2015}, url = {https://eprint.iacr.org/2015/302}, } @misc{cryptoeprint:2015:303, author = {Nicky Mouha}, title = {The Design Space of Lightweight Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2015/303}, year = {2015}, url = {https://eprint.iacr.org/2015/303}, } @misc{cryptoeprint:2015:304, author = {Joshua Baron and Karim El Defrawy and Joshua Lampkins and Rafail Ostrovsky}, title = {Communication-Optimal Proactive Secret Sharing for Dynamic Groups}, howpublished = {Cryptology ePrint Archive, Report 2015/304}, year = {2015}, url = {https://eprint.iacr.org/2015/304}, } @misc{cryptoeprint:2015:305, author = {Jonas Schneider and Dominique Schröder}, title = {Foundations of Reconfigurable PUFs (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2015/305}, year = {2015}, url = {https://eprint.iacr.org/2015/305}, } @misc{cryptoeprint:2015:306, author = {Morris Dworkin and Ray Perlner}, title = {Analysis of VAES3 (FF2)}, howpublished = {Cryptology ePrint Archive, Report 2015/306}, year = {2015}, url = {https://eprint.iacr.org/2015/306}, } @misc{cryptoeprint:2015:307, author = {Sanjam Garg and Steve Lu and Rafail Ostrovsky}, title = {Black-Box Garbled RAM}, howpublished = {Cryptology ePrint Archive, Report 2015/307}, year = {2015}, url = {https://eprint.iacr.org/2015/307}, } @misc{cryptoeprint:2015:308, author = {Patrick McCorry and Siamak F. Shahandashti and Dylan Clarke and Feng Hao}, title = {Authenticated Key Exchange over Bitcoin}, howpublished = {Cryptology ePrint Archive, Report 2015/308}, year = {2015}, url = {https://eprint.iacr.org/2015/308}, } @misc{cryptoeprint:2015:309, author = {Tore Kasper Frederiksen and Thomas P. Jakobsen and Jesper Buus Nielsen and Roberto Trifiletti}, title = {TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2015/309}, year = {2015}, url = {https://eprint.iacr.org/2015/309}, } @misc{cryptoeprint:2015:310, author = {Igor Semaev}, title = {New algorithm for the discrete logarithm problem on elliptic curves}, howpublished = {Cryptology ePrint Archive, Report 2015/310}, year = {2015}, url = {https://eprint.iacr.org/2015/310}, } @misc{cryptoeprint:2015:311, author = {Masayuki Abe and Bernardo David and Markulf Kohlweiss and Ryo Nishimaki and Miyako Ohkubo}, title = {Tagged One-Time Signatures: Tight Security and Optimal Tag Size}, howpublished = {Cryptology ePrint Archive, Report 2015/311}, year = {2015}, url = {https://eprint.iacr.org/2015/311}, } @misc{cryptoeprint:2015:312, author = {Pierre-Alain Fouque and Thomas Vannet}, title = {Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/312}, year = {2015}, url = {https://eprint.iacr.org/2015/312}, } @misc{cryptoeprint:2015:313, author = {Ronald Cramer and Léo Ducas and Chris Peikert and Oded Regev}, title = {Recovering Short Generators of Principal Ideals in Cyclotomic Rings}, howpublished = {Cryptology ePrint Archive, Report 2015/313}, year = {2015}, url = {https://eprint.iacr.org/2015/313}, } @misc{cryptoeprint:2015:314, author = {Qihong Yu and Jiguo Li and Yichen Zhang and Wei Wu and Xinyi Huang and Yang Xiang}, title = {Certificate-Based Encryption Resilient to Key Leakage}, howpublished = {Cryptology ePrint Archive, Report 2015/314}, year = {2015}, url = {https://eprint.iacr.org/2015/314}, } @misc{cryptoeprint:2015:315, author = {Grégory Demay and Peter Gaži and Ueli Maurer and Björn Tackmann}, title = {Query-Complexity Amplification for Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2015/315}, year = {2015}, url = {https://eprint.iacr.org/2015/315}, } @misc{cryptoeprint:2015:316, author = {Zhengan Huang and Shengli Liu and Xianping Mao and Kefei Chen}, title = {Non-malleability under Selective Opening Attacks: Implication and Separation}, howpublished = {Cryptology ePrint Archive, Report 2015/316}, year = {2015}, url = {https://eprint.iacr.org/2015/316}, } @misc{cryptoeprint:2015:317, author = {Marcin Andrychowicz and Daniel Masny and Edoardo Persichetti}, title = {Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice}, howpublished = {Cryptology ePrint Archive, Report 2015/317}, year = {2015}, url = {https://eprint.iacr.org/2015/317}, } @misc{cryptoeprint:2015:318, author = {Patrick Märtens}, title = {Practical Divisible E-Cash}, howpublished = {Cryptology ePrint Archive, Report 2015/318}, year = {2015}, url = {https://eprint.iacr.org/2015/318}, } @misc{cryptoeprint:2015:319, author = {Koray Karabina}, title = {Point Decomposition Problem in Binary Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2015/319}, year = {2015}, url = {https://eprint.iacr.org/2015/319}, } @misc{cryptoeprint:2015:320, author = {James Alderman and Christian Janson and Carlos Cid and Jason Crampton}, title = {Hybrid Publicly Verifiable Computation}, howpublished = {Cryptology ePrint Archive, Report 2015/320}, year = {2015}, url = {https://eprint.iacr.org/2015/320}, } @misc{cryptoeprint:2015:321, author = {Paolo D'Arco and Maria Isabel Gonzalez Vasco and Angel L. Perez del Pozo and Clauido Soriente}, title = {Size-Hiding in Private Set Intersection: what can be done and how to do it without random oracles}, howpublished = {Cryptology ePrint Archive, Report 2015/321}, year = {2015}, url = {https://eprint.iacr.org/2015/321}, } @misc{cryptoeprint:2015:322, author = {Peeter Laud and Alisa Pankova}, title = {Transformation-Based Outsourcing of Linear Equation Systems over Real Numbers}, howpublished = {Cryptology ePrint Archive, Report 2015/322}, year = {2015}, url = {https://eprint.iacr.org/2015/322}, } @misc{cryptoeprint:2015:323, author = {Suvradip Chakraborty and Srinivasan Raghuraman and C. Pandu Rangan}, title = {Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2015/323}, year = {2015}, url = {https://eprint.iacr.org/2015/323}, } @misc{cryptoeprint:2015:324, author = {Divesh Aggarwal and Alexander Golovnev}, title = {A Note on Lower Bounds for Non-interactive Message Authentication Using Weak Keys}, howpublished = {Cryptology ePrint Archive, Report 2015/324}, year = {2015}, url = {https://eprint.iacr.org/2015/324}, } @misc{cryptoeprint:2015:325, author = {Yuval Ishai and Rafail Ostrovsky and Vassilis Zikas}, title = {Secure Multi-Party Computation with Identifiable Abort}, howpublished = {Cryptology ePrint Archive, Report 2015/325}, year = {2015}, url = {https://eprint.iacr.org/2015/325}, } @misc{cryptoeprint:2015:326, author = {Saeideh Kabirirad and Hamideh Hajiabadi}, title = {Cryptanalysis Of An Authenticated Image Encryption Scheme Based On Chaotic Maps And Memory Cellular Automata}, howpublished = {Cryptology ePrint Archive, Report 2015/326}, year = {2015}, url = {https://eprint.iacr.org/2015/326}, } @misc{cryptoeprint:2015:327, author = {Subhadeep Banik}, title = {Some results on Sprout}, howpublished = {Cryptology ePrint Archive, Report 2015/327}, year = {2015}, url = {https://eprint.iacr.org/2015/327}, } @misc{cryptoeprint:2015:328, author = {Xiaopeng Yang and Wenping Ma}, title = {Strongly Secure Authenticated Key Exchange from Ideal Lattices}, howpublished = {Cryptology ePrint Archive, Report 2015/328}, year = {2015}, url = {https://eprint.iacr.org/2015/328}, } @misc{cryptoeprint:2015:329, author = {Dieter Schmidt}, title = {PAGES - A Family of Block Ciiphers}, howpublished = {Cryptology ePrint Archive, Report 2015/329}, year = {2015}, url = {https://eprint.iacr.org/2015/329}, } @misc{cryptoeprint:2015:330, author = {Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya}, title = {Sponge based CCA2 secure asymmetric encryption for arbitrary length message}, howpublished = {Cryptology ePrint Archive, Report 2015/330}, year = {2015}, url = {https://eprint.iacr.org/2015/330}, } @misc{cryptoeprint:2015:331, author = {Megha Agrawal and Donghoon Chang and Somitra Sanadhya}, title = {A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices}, howpublished = {Cryptology ePrint Archive, Report 2015/331}, year = {2015}, url = {https://eprint.iacr.org/2015/331}, } @misc{cryptoeprint:2015:332, author = {Sumit Chakraborty}, title = {Security Intelligence for Broadcast : Threat Analytics}, howpublished = {Cryptology ePrint Archive, Report 2015/332}, year = {2015}, url = {https://eprint.iacr.org/2015/332}, } @misc{cryptoeprint:2015:333, author = {Johannes Krupp and Dominique Schröder and Mark Simkin and Dario Fiore and Giuseppe Ateniese and Stefan Nuernberger}, title = {Nearly Optimal Verifiable Data Streaming (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2015/333}, year = {2015}, url = {https://eprint.iacr.org/2015/333}, } @misc{cryptoeprint:2015:334, author = {Ran Canetti and Yilei Chen and Leonid Reyzin}, title = {On the Correlation Intractability of Obfuscated Pseudorandom Functions}, howpublished = {Cryptology ePrint Archive, Report 2015/334}, year = {2015}, url = {https://eprint.iacr.org/2015/334}, } @misc{cryptoeprint:2015:335, author = {Janaka Alawatugoda and Douglas Stebila and Colin Boyd}, title = {Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2015/335}, year = {2015}, url = {https://eprint.iacr.org/2015/335}, } @misc{cryptoeprint:2015:336, author = {Benny Applebaum and Jonathan Avron and Christina Brzuska}, title = {Arithmetic Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2015/336}, year = {2015}, url = {https://eprint.iacr.org/2015/336}, } @misc{cryptoeprint:2015:337, author = {Sujoy Sinha Roy and Kimmo J\"arvinen and Frederik Vercauteren and Vassil Dimitrov and Ingrid Verbauwhede}, title = {Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation}, howpublished = {Cryptology ePrint Archive, Report 2015/337}, year = {2015}, url = {https://eprint.iacr.org/2015/337}, } @misc{cryptoeprint:2015:338, author = {Amadou Moctar Kane}, title = {Cryptanalysis of a fair anonymity for the tor network}, howpublished = {Cryptology ePrint Archive, Report 2015/338}, year = {2015}, url = {https://eprint.iacr.org/2015/338}, } @misc{cryptoeprint:2015:339, author = {Sebastiaan de Hoogh and Berry Schoenmakers and Meilof Veeningen}, title = {Certificate Validation in Secure Computation and Its Use in Verifiable Linear Programming}, howpublished = {Cryptology ePrint Archive, Report 2015/339}, year = {2015}, url = {https://eprint.iacr.org/2015/339}, } @misc{cryptoeprint:2015:340, author = {Santanu Sarkar}, title = {A New Distinguisher on Grain v1 for 106 rounds}, howpublished = {Cryptology ePrint Archive, Report 2015/340}, year = {2015}, url = {https://eprint.iacr.org/2015/340}, } @misc{cryptoeprint:2015:341, author = {Gilad Asharov and Gil Segev}, title = {Limits on the Power of Indistinguishability Obfuscation and Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/341}, year = {2015}, url = {https://eprint.iacr.org/2015/341}, } @misc{cryptoeprint:2015:342, author = {Yan Zhu and Xin Wang and Di Ma and Ruiqi Guo}, title = {Identity-Set-based Broadcast Encryption supporting “Cut-or-Select” with Short Ciphertext}, howpublished = {Cryptology ePrint Archive, Report 2015/342}, year = {2015}, url = {https://eprint.iacr.org/2015/342}, } @misc{cryptoeprint:2015:343, author = {Michael Düll and Björn Haase and Gesine Hinterwälder and Michael Hutter and Christof Paar and Ana Helena Sánchez and Peter Schwabe}, title = {High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers}, howpublished = {Cryptology ePrint Archive, Report 2015/343}, year = {2015}, url = {https://eprint.iacr.org/2015/343}, } @misc{cryptoeprint:2015:344, author = {Ryo Nishimaki and Daniel Wichs}, title = {Watermarking Cryptographic Programs Against Arbitrary Removal Strategies}, howpublished = {Cryptology ePrint Archive, Report 2015/344}, year = {2015}, url = {https://eprint.iacr.org/2015/344}, } @misc{cryptoeprint:2015:345, author = {Pratyay Mukherjee and Daniel Wichs}, title = {Two Round Multiparty Computation via Multi-Key FHE}, howpublished = {Cryptology ePrint Archive, Report 2015/345}, year = {2015}, url = {https://eprint.iacr.org/2015/345}, } @misc{cryptoeprint:2015:346, author = {Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang}, title = {End-to-End Verifiable Elections in the Standard Model∗ }, howpublished = {Cryptology ePrint Archive, Report 2015/346}, year = {2015}, url = {https://eprint.iacr.org/2015/346}, } @misc{cryptoeprint:2015:347, author = {Riham AlTawy and Onur Duman and Amr M. Youssef}, title = {Fault Analysis of Kuznyechik}, howpublished = {Cryptology ePrint Archive, Report 2015/347}, year = {2015}, url = {https://eprint.iacr.org/2015/347}, } @misc{cryptoeprint:2015:348, author = {An­dre­as Gor­nik and Amir Mo­ra­di and Jür­gen Oehm and Chris­tof Paar}, title = {A Hardware-based Countermeasure to Reduce Side-Channel Leakage - Design, Implementation, and Evaluation}, howpublished = {Cryptology ePrint Archive, Report 2015/348}, year = {2015}, url = {https://eprint.iacr.org/2015/348}, } @misc{cryptoeprint:2015:349, author = {Chang Liu and Liehuang Zhu and Jinjun Chen}, title = {Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud}, howpublished = {Cryptology ePrint Archive, Report 2015/349}, year = {2015}, url = {https://eprint.iacr.org/2015/349}, } @misc{cryptoeprint:2015:350, author = {Florian Mendel and Tomislav Nad and Martin Schläffer}, title = {Improving Local Collisions: New Attacks on Reduced SHA-256}, howpublished = {Cryptology ePrint Archive, Report 2015/350}, year = {2015}, url = {https://eprint.iacr.org/2015/350}, } @misc{cryptoeprint:2015:351, author = {Mohammad Etemad and Alptekin Küpçü}, title = {Database Outsourcing with Hierarchical Authenticated Data Structures}, howpublished = {Cryptology ePrint Archive, Report 2015/351}, year = {2015}, url = {https://eprint.iacr.org/2015/351}, } @misc{cryptoeprint:2015:352, author = {Pavel Raykov}, title = {Broadcast from Minicast Secure Against General Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2015/352}, year = {2015}, url = {https://eprint.iacr.org/2015/352}, } @misc{cryptoeprint:2015:353, author = {Paz Morillo and Carla R\`afols and Jorge L. Villar}, title = {Matrix Computational Assumptions in Multilinear Groups}, howpublished = {Cryptology ePrint Archive, Report 2015/353}, year = {2015}, url = {https://eprint.iacr.org/2015/353}, } @misc{cryptoeprint:2015:354, author = {Jacek Samotyja and Kerstin Lemke-Rust and Markus Ullmann}, title = {SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node}, howpublished = {Cryptology ePrint Archive, Report 2015/354}, year = {2015}, url = {https://eprint.iacr.org/2015/354}, } @misc{cryptoeprint:2015:355, author = {Tommaso Gagliardoni and Andreas H\"ulsing and Christian Schaffner}, title = {Semantic Security and Indistinguishability in the Quantum World}, howpublished = {Cryptology ePrint Archive, Report 2015/355}, year = {2015}, url = {https://eprint.iacr.org/2015/355}, } @misc{cryptoeprint:2015:356, author = {Nir Bitansky and Sanjam Garg and Huijia Lin and Rafael Pass and Sidharth Telang}, title = {Succinct Randomized Encodings and their Applications}, howpublished = {Cryptology ePrint Archive, Report 2015/356}, year = {2015}, url = {https://eprint.iacr.org/2015/356}, } @misc{cryptoeprint:2015:357, author = {Ming Li, Yupeng Jiang and Dongdai Lin}, title = {A Group-theory Method to The Cycle Structures of Feedback Shift Registers}, howpublished = {Cryptology ePrint Archive, Report 2015/357}, year = {2015}, url = {https://eprint.iacr.org/2015/357}, } @misc{cryptoeprint:2015:358, author = {Yun-Ju Huang and Christophe Petit and Naoyuki Shinohara and Tsuyoshi Takagi}, title = {On Generalized First Fall Degree Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2015/358}, year = {2015}, url = {https://eprint.iacr.org/2015/358}, } @misc{cryptoeprint:2015:359, author = {Jean-Sebastien Coron and Emmanuel Prouff and Matthieu Rivain and Thomas Roche}, title = {Higher-Order Side Channel Security and Mask Refreshing}, howpublished = {Cryptology ePrint Archive, Report 2015/359}, year = {2015}, url = {https://eprint.iacr.org/2015/359}, } @misc{cryptoeprint:2015:360, author = {Yanqing Yao, Zhoujun Li}, title = {Achieving Differential Privacy with Bias-Control Limited Source}, howpublished = {Cryptology ePrint Archive, Report 2015/360}, year = {2015}, url = {https://eprint.iacr.org/2015/360}, } @misc{cryptoeprint:2015:361, author = {Dominique Unruh}, title = {Computationally binding quantum commitments}, howpublished = {Cryptology ePrint Archive, Report 2015/361}, year = {2015}, url = {https://eprint.iacr.org/2015/361}, } @misc{cryptoeprint:2015:362, author = {Claude Crepeau and Raza Ali Kazmi}, title = {Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2015/362}, year = {2015}, url = {https://eprint.iacr.org/2015/362}, } @misc{cryptoeprint:2015:363, author = {Bart Mennink}, title = {Optimally Secure Tweakable Blockciphers}, howpublished = {Cryptology ePrint Archive, Report 2015/363}, year = {2015}, url = {https://eprint.iacr.org/2015/363}, } @misc{cryptoeprint:2015:364, author = {Qiang Tang and Jun Wang}, title = {Privacy-preserving Context-aware Recommender Systems: Analysis and New Solutions}, howpublished = {Cryptology ePrint Archive, Report 2015/364}, year = {2015}, url = {https://eprint.iacr.org/2015/364}, } @misc{cryptoeprint:2015:365, author = {Masoumeh Safkhani, Mehdi Hosseinzadeh, Mojtaba Eslamnezhad Namin, Samad Rostampour, Nasour Bagheri}, title = {On the (im)possibility of receiving security beyond 2^l using an l-bit PRNG: the case of Wang et. al. protocol}, howpublished = {Cryptology ePrint Archive, Report 2015/365}, year = {2015}, url = {https://eprint.iacr.org/2015/365}, } @misc{cryptoeprint:2015:366, author = {Arjen K. Lenstra and Benjamin Wesolowski}, title = {A random zoo: sloth, unicorn, and trx}, howpublished = {Cryptology ePrint Archive, Report 2015/366}, year = {2015}, url = {https://eprint.iacr.org/2015/366}, } @misc{cryptoeprint:2015:367, author = {Achiya Bar-On}, title = {Improved Higher-Order Differential Attacks on MISTY1}, howpublished = {Cryptology ePrint Archive, Report 2015/367}, year = {2015}, url = {https://eprint.iacr.org/2015/367}, } @misc{cryptoeprint:2015:368, author = {Evgeny Sidorov}, title = {Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library}, howpublished = {Cryptology ePrint Archive, Report 2015/368}, year = {2015}, url = {https://eprint.iacr.org/2015/368}, } @misc{cryptoeprint:2015:369, author = {Nir Bitansky and Omer Paneth}, title = {On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2015/369}, year = {2015}, url = {https://eprint.iacr.org/2015/369}, } @misc{cryptoeprint:2015:370, author = {Sumit Chakraborty}, title = {Financial Cryptography: Discriminatory Pricing Mechanism }, howpublished = {Cryptology ePrint Archive, Report 2015/370}, year = {2015}, url = {https://eprint.iacr.org/2015/370}, } @misc{cryptoeprint:2015:371, author = {S. Dov Gordon and Feng-Hao Liu and Elaine Shi}, title = {Constant-Round MPC with Fairness and Guarantee of Output Delivery}, howpublished = {Cryptology ePrint Archive, Report 2015/371}, year = {2015}, url = {https://eprint.iacr.org/2015/371}, } @misc{cryptoeprint:2015:372, author = {Jeremy Jean and Ivica Nikolic and Thomas Peyrin and Lei Wang and Shuang Wu}, title = {Security Analysis of PRINCE}, howpublished = {Cryptology ePrint Archive, Report 2015/372}, year = {2015}, url = {https://eprint.iacr.org/2015/372}, } @misc{cryptoeprint:2015:373, author = {Aloni Cohen and Justin Holmgren and Vinod Vaikuntanathan}, title = {Publicly Verifiable Software Watermarking}, howpublished = {Cryptology ePrint Archive, Report 2015/373}, year = {2015}, url = {https://eprint.iacr.org/2015/373}, } @misc{cryptoeprint:2015:374, author = {Christoph Bader and Tibor Jager and Yong Li and Sven Schäge}, title = {On the Impossibility of Tight Cryptographic Reductions}, howpublished = {Cryptology ePrint Archive, Report 2015/374}, year = {2015}, url = {https://eprint.iacr.org/2015/374}, } @misc{cryptoeprint:2015:375, author = {Daniel R. L. Brown}, title = {Bounds on surmising remixed keys}, howpublished = {Cryptology ePrint Archive, Report 2015/375}, year = {2015}, url = {https://eprint.iacr.org/2015/375}, } @misc{cryptoeprint:2015:376, author = {Raza Ali Kazmi}, title = {Cryptography from Post-Quantum Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2015/376}, year = {2015}, url = {https://eprint.iacr.org/2015/376}, } @misc{cryptoeprint:2015:377, author = {Alessandro Chiesa and Eran Tromer and Madars Virza}, title = {Cluster Computing in Zero Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2015/377}, year = {2015}, url = {https://eprint.iacr.org/2015/377}, } @misc{cryptoeprint:2015:378, author = {Fatemeh Ganji and Shahin Tajik and Jean-Pierre Seifert}, title = {PAC Learning of Arbiter PUFs}, howpublished = {Cryptology ePrint Archive, Report 2015/378}, year = {2015}, url = {https://eprint.iacr.org/2015/378}, } @misc{cryptoeprint:2015:379, author = {Jingwei Li, Anna Squicciarini, Dan Lin, Smitha Sundareswaran, Chunfu Jia}, title = {MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection}, howpublished = {Cryptology ePrint Archive, Report 2015/379}, year = {2015}, url = {https://eprint.iacr.org/2015/379}, } @misc{cryptoeprint:2015:380, author = {Céline Blondeau and Aslí Bay and Serge Vaudenay}, title = {Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation}, howpublished = {Cryptology ePrint Archive, Report 2015/380}, year = {2015}, url = {https://eprint.iacr.org/2015/380}, } @misc{cryptoeprint:2015:381, author = {Sumit Chakraborty}, title = {Financial Cryptography: Algorithmic Mechanisms for a Hedonic Game}, howpublished = {Cryptology ePrint Archive, Report 2015/381}, year = {2015}, url = {https://eprint.iacr.org/2015/381}, } @misc{cryptoeprint:2015:382, author = {Thomas Pöppelmann and Tobias Oder and Tim Güneysu}, title = {High-Performance Ideal Lattice-Based Cryptography on 8-bit ATxmega Microcontrollers}, howpublished = {Cryptology ePrint Archive, Report 2015/382}, year = {2015}, url = {https://eprint.iacr.org/2015/382}, } @misc{cryptoeprint:2015:383, author = {Rafael Pass and abhi shelat}, title = {Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings}, howpublished = {Cryptology ePrint Archive, Report 2015/383}, year = {2015}, url = {https://eprint.iacr.org/2015/383}, } @misc{cryptoeprint:2015:384, author = {Maciej Skorski and Alexander Golovnev and Krzysztof Pietrzak}, title = {Condensed Unpredictability}, howpublished = {Cryptology ePrint Archive, Report 2015/384}, year = {2015}, url = {https://eprint.iacr.org/2015/384}, } @misc{cryptoeprint:2015:385, author = {Serge Fehr and Jonathan Katz and Fang Song and Hong-Sheng Zhou and Vassilis Zikas}, title = {Feasibility and Completeness of Cryptographic Tasks in the Quantum World}, howpublished = {Cryptology ePrint Archive, Report 2015/385}, year = {2015}, url = {https://eprint.iacr.org/2015/385}, } @misc{cryptoeprint:2015:386, author = {David J. Wu and Tony Feng and Michael Naehrig and Kristin Lauter}, title = {Privately Evaluating Decision Trees and Random Forests}, howpublished = {Cryptology ePrint Archive, Report 2015/386}, year = {2015}, url = {https://eprint.iacr.org/2015/386}, } @misc{cryptoeprint:2015:387, author = {Scott Contini}, title = {Method to Protect Passwords in Databases for Web Applications}, howpublished = {Cryptology ePrint Archive, Report 2015/387}, year = {2015}, url = {https://eprint.iacr.org/2015/387}, } @misc{cryptoeprint:2015:388, author = {Ran Canetti and Justin Holmgren}, title = {Succinct Garbled RAM}, howpublished = {Cryptology ePrint Archive, Report 2015/388}, year = {2015}, url = {https://eprint.iacr.org/2015/388}, } @misc{cryptoeprint:2015:389, author = {Guido Bertoni and Joan Daemen and Michael Peeters and Gilles Van Assche}, title = {Keccak}, howpublished = {Cryptology ePrint Archive, Report 2015/389}, year = {2015}, url = {https://eprint.iacr.org/2015/389}, } @misc{cryptoeprint:2015:390, author = {Nuttapong Attrapadung}, title = {Dual System Encryption Framework in Prime-Order Groups}, howpublished = {Cryptology ePrint Archive, Report 2015/390}, year = {2015}, url = {https://eprint.iacr.org/2015/390}, } @misc{cryptoeprint:2015:391, author = {Deepesh Data and Manoj M. Prabhakaran and Vinod M. Prabhakaran}, title = {On the Communication Complexity of Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2015/391}, year = {2015}, url = {https://eprint.iacr.org/2015/391}, } @misc{cryptoeprint:2015:392, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Forgery Attacks on round-reduced ICEPOLE-128}, howpublished = {Cryptology ePrint Archive, Report 2015/392}, year = {2015}, url = {https://eprint.iacr.org/2015/392}, } @misc{cryptoeprint:2015:393, author = {Mohammad Hossein Faghihi Sereshgi, Mohammad Dakhilalian, and Mohsen Shakiba}, title = {Biclique cryptanalysis of MIBS-80 and PRESENT-80}, howpublished = {Cryptology ePrint Archive, Report 2015/393}, year = {2015}, url = {https://eprint.iacr.org/2015/393}, } @misc{cryptoeprint:2015:394, author = {Christian Badertscher and Christian Matt and Ueli Maurer and Phillip Rogaway and Björn Tackmann}, title = {Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer}, howpublished = {Cryptology ePrint Archive, Report 2015/394}, year = {2015}, url = {https://eprint.iacr.org/2015/394}, } @misc{cryptoeprint:2015:395, author = {Nils Fleischhacker and Johannes Krupp and Giulio Malavolta and Jonas Schneider and Dominique Schröder and Mark Simkin}, title = {Efficient Unlinkable Sanitizable Signatures from Signatures with Re-Randomizable Keys}, howpublished = {Cryptology ePrint Archive, Report 2015/395}, year = {2015}, url = {https://eprint.iacr.org/2015/395}, } @misc{cryptoeprint:2015:396, author = {Dario Catalano and Dario Fiore and Rosario Gennaro and Luca Nizzardo}, title = {Generalizing Homomorphic MACs for Arithmetic Circuits}, howpublished = {Cryptology ePrint Archive, Report 2015/396}, year = {2015}, url = {https://eprint.iacr.org/2015/396}, } @misc{cryptoeprint:2015:397, author = {Peter Gazi and Jooyoung Lee and Yannick Seurin and John Steinberger and Stefano Tessaro}, title = {Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes}, howpublished = {Cryptology ePrint Archive, Report 2015/397}, year = {2015}, url = {https://eprint.iacr.org/2015/397}, } @misc{cryptoeprint:2015:398, author = {Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Factoring RSA moduli with weak prime factors}, howpublished = {Cryptology ePrint Archive, Report 2015/398}, year = {2015}, url = {https://eprint.iacr.org/2015/398}, } @misc{cryptoeprint:2015:399, author = {Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {New attacks on RSA with Moduli $N=p^rq$}, howpublished = {Cryptology ePrint Archive, Report 2015/399}, year = {2015}, url = {https://eprint.iacr.org/2015/399}, } @misc{cryptoeprint:2015:400, author = {Stephen R. Tate and Roopa Vishwanathan}, title = {Expiration and Revocation of Keys for Attribute-based Signatures (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2015/400}, year = {2015}, url = {https://eprint.iacr.org/2015/400}, } @misc{cryptoeprint:2015:401, author = {Eike Kiltz and Daniel Masny and Krzysztof Pietrzak}, title = {Simple Chosen-Ciphertext Security from Low-Noise LPN}, howpublished = {Cryptology ePrint Archive, Report 2015/401}, year = {2015}, url = {https://eprint.iacr.org/2015/401}, } @misc{cryptoeprint:2015:402, author = {Adrian Thillard and Emmanuel Prouff and Thomas Roche}, title = {Success through confidence: Evaluating the effectiveness of a side-channel attack}, howpublished = {Cryptology ePrint Archive, Report 2015/402}, year = {2015}, url = {https://eprint.iacr.org/2015/402}, } @misc{cryptoeprint:2015:403, author = {Mehrdad Nojoumian and Douglas R. Stinson}, title = {Sequential Secret Sharing as a New Hierarchical Access Structure}, howpublished = {Cryptology ePrint Archive, Report 2015/403}, year = {2015}, url = {https://eprint.iacr.org/2015/403}, } @misc{cryptoeprint:2015:404, author = {Esha Ghosh and Olga Ohrimenko and Dimitrios Papadopoulos and Roberto Tamassia and Nikos Triandopoulos}, title = {Zero-Knowledge Accumulators and Set Operations}, howpublished = {Cryptology ePrint Archive, Report 2015/404}, year = {2015}, url = {https://eprint.iacr.org/2015/404}, } @misc{cryptoeprint:2015:405, author = {Dana Dachman-Soled and Nils Fleischhacker and Jonathan Katz and Anna Lysyanskaya and Dominique Schröder}, title = {Feasibility and Infeasibility of Secure Computation with Malicious PUFs}, howpublished = {Cryptology ePrint Archive, Report 2015/405}, year = {2015}, url = {https://eprint.iacr.org/2015/405}, } @misc{cryptoeprint:2015:406, author = {Yu-Chi Chen and Sherman S. M. Chow and Kai-Min Chung and Russell W. F. Lai and Wei-Kai Lin and Hong-Sheng Zhou}, title = {Cryptography for Parallel RAM from Indistinguishability Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2015/406}, year = {2015}, url = {https://eprint.iacr.org/2015/406}, } @misc{cryptoeprint:2015:407, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Higher-Order Cryptanalysis of LowMC}, howpublished = {Cryptology ePrint Archive, Report 2015/407}, year = {2015}, url = {https://eprint.iacr.org/2015/407}, } @misc{cryptoeprint:2015:408, author = {Franck Rondepierre}, title = {Revisiting Atomic Patterns for Scalar Multiplications on Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2015/408}, year = {2015}, url = {https://eprint.iacr.org/2015/408}, } @misc{cryptoeprint:2015:409, author = {Jie Chen and Romain Gay and Hoeteck Wee}, title = {Improved Dual System ABE in Prime-Order Groups via Predicate Encodings}, howpublished = {Cryptology ePrint Archive, Report 2015/409}, year = {2015}, url = {https://eprint.iacr.org/2015/409}, } @misc{cryptoeprint:2015:410, author = {Zhe Liu and Hwajeong Seo and Sujoy Sinha Roy and Johann Gro{\ss}sch{\"a}dl and Howon Kim and Ingrid Verbauwhede}, title = {Efficient Ring-LWE Encryption on 8-bit AVR Processors}, howpublished = {Cryptology ePrint Archive, Report 2015/410}, year = {2015}, url = {https://eprint.iacr.org/2015/410}, } @misc{cryptoeprint:2015:411, author = {Pei Luo and Yunsi Fei and Xin Fang and A. Adam Ding and David R. Kaeli and Miriam Leeser}, title = {Side-Channel Analysis of MAC-Keccak Hardware Implementations}, howpublished = {Cryptology ePrint Archive, Report 2015/411}, year = {2015}, url = {https://eprint.iacr.org/2015/411}, } @misc{cryptoeprint:2015:412, author = {Máté Horváth}, title = {Survey on Cryptographic Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2015/412}, year = {2015}, url = {https://eprint.iacr.org/2015/412}, } @misc{cryptoeprint:2015:413, author = {Shashank Agrawal and Melissa Chase}, title = {A Study of Pair Encodings: Predicate Encryption in Prime Order Groups}, howpublished = {Cryptology ePrint Archive, Report 2015/413}, year = {2015}, url = {https://eprint.iacr.org/2015/413}, } @misc{cryptoeprint:2015:414, author = {Mridul Nandi}, title = {On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2015/414}, year = {2015}, url = {https://eprint.iacr.org/2015/414}, } @misc{cryptoeprint:2015:415, author = {Markku-Juhani O. Saarinen}, title = {STRIBOB / WHIRLBOB Security Analysis Addendum}, howpublished = {Cryptology ePrint Archive, Report 2015/415}, year = {2015}, url = {https://eprint.iacr.org/2015/415}, } @misc{cryptoeprint:2015:416, author = {Mayank Varia and Sophia Yakoubov and Yang Yang}, title = {HETest: A Homomorphic Encryption Testing Framework}, howpublished = {Cryptology ePrint Archive, Report 2015/416}, year = {2015}, url = {https://eprint.iacr.org/2015/416}, } @misc{cryptoeprint:2015:417, author = {Mark Bun and Mark Zhandry}, title = {Order-Revealing Encryption and the Hardness of Private Learning}, howpublished = {Cryptology ePrint Archive, Report 2015/417}, year = {2015}, url = {https://eprint.iacr.org/2015/417}, } @misc{cryptoeprint:2015:418, author = {Itai Dinur and Yunwen Liu and Willi Meier and Qingju Wang}, title = {Optimized Interpolation Attacks on LowMC}, howpublished = {Cryptology ePrint Archive, Report 2015/418}, year = {2015}, url = {https://eprint.iacr.org/2015/418}, } @misc{cryptoeprint:2015:419, author = {Yasser Shoukry and Paul Martin and Paulo Tabuada and Mani B. Srivastava}, title = {Non-invasive Spoofing Attacks for Anti-lock Braking Systems}, howpublished = {Cryptology ePrint Archive, Report 2015/419}, year = {2015}, url = {https://eprint.iacr.org/2015/419}, } @misc{cryptoeprint:2015:420, author = {Vipul Goyal and Divya Gupta and Abhishek Jain}, title = {What Information is Leaked under Concurrent Composition?}, howpublished = {Cryptology ePrint Archive, Report 2015/420}, year = {2015}, url = {https://eprint.iacr.org/2015/420}, } @misc{cryptoeprint:2015:421, author = {Zhe Liu and Husen Wang and Johann Gro{\ss}sch{\"a}dl and Zhi Hu and Ingrid Verbauwhede}, title = {VLSI Implementation of Double-Base Scalar Multiplication on a Twisted Edwards Curve with an Efficiently Computable Endomorphism}, howpublished = {Cryptology ePrint Archive, Report 2015/421}, year = {2015}, url = {https://eprint.iacr.org/2015/421}, } @misc{cryptoeprint:2015:422, author = {Marina Blanton and Fattaneh Bayatbabolghani}, title = {Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation}, howpublished = {Cryptology ePrint Archive, Report 2015/422}, year = {2015}, url = {https://eprint.iacr.org/2015/422}, } @misc{cryptoeprint:2015:423, author = {Santosh Ghosh, Amit Kumar, Amitabh Das and Ingrid Verbauwhede}, title = {On the Implementation of Unified Arithmetic on Binary Huff Curves}, howpublished = {Cryptology ePrint Archive, Report 2015/423}, year = {2015}, url = {https://eprint.iacr.org/2015/423}, } @misc{cryptoeprint:2015:424, author = {Begül Bilgin and Andrey Bogdanov and Miroslav Knežević and Florian Mendel and Qingju Wang}, title = {FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware}, howpublished = {Cryptology ePrint Archive, Report 2015/424}, year = {2015}, url = {https://eprint.iacr.org/2015/424}, } @misc{cryptoeprint:2015:425, author = {Stefan Heyse and Ingo von Maurich and Tim Güneysu}, title = {Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices}, howpublished = {Cryptology ePrint Archive, Report 2015/425}, year = {2015}, url = {https://eprint.iacr.org/2015/425}, } @misc{cryptoeprint:2015:426, author = {Alex Biryukov and Ivica Nikolic}, title = {Complementing Feistel Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2015/426}, year = {2015}, url = {https://eprint.iacr.org/2015/426}, } @misc{cryptoeprint:2015:427, author = {Mudit Bhargava and Ken Mai}, title = {A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement}, howpublished = {Cryptology ePrint Archive, Report 2015/427}, year = {2015}, url = {https://eprint.iacr.org/2015/427}, } @misc{cryptoeprint:2015:428, author = {Philipp Jovanovic and Samuel Neves}, title = {Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol}, howpublished = {Cryptology ePrint Archive, Report 2015/428}, year = {2015}, url = {https://eprint.iacr.org/2015/428}, } @misc{cryptoeprint:2015:429, author = {Ivica Nikoli\'c and Lei Wang and Shuang Wu}, title = {Cryptanalysis of Round-Reduced LED}, howpublished = {Cryptology ePrint Archive, Report 2015/429}, year = {2015}, url = {https://eprint.iacr.org/2015/429}, } @misc{cryptoeprint:2015:430, author = {Alex Biryukov and Daniel Dinu and Dmitry Khovratovich}, title = {Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing}, howpublished = {Cryptology ePrint Archive, Report 2015/430}, year = {2015}, url = {https://eprint.iacr.org/2015/430}, } @misc{cryptoeprint:2015:431, author = {Nuttapong Attrapadung and Goichiro Hanaoka and Shota Yamada}, title = {Conversions among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs}, howpublished = {Cryptology ePrint Archive, Report 2015/431}, year = {2015}, url = {https://eprint.iacr.org/2015/431}, } @misc{cryptoeprint:2015:432, author = {Hongyuan Wang and Liehuang Zhu and Yijia Lilong and Chang Xu}, title = {Non-Repudiable Proofs of Storage in Cloud}, howpublished = {Cryptology ePrint Archive, Report 2015/432}, year = {2015}, url = {https://eprint.iacr.org/2015/432}, } @misc{cryptoeprint:2015:433, author = {Wentao Zhang and. Zhenzhen Bao and. Vincent Rijmen and. Meicheng Liu}, title = {A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT}, howpublished = {Cryptology ePrint Archive, Report 2015/433}, year = {2015}, url = {https://eprint.iacr.org/2015/433}, } @misc{cryptoeprint:2015:434, author = {Pascale Charpin and Sihem Mesnager and Sumanta Sarkar}, title = {Dickson Polynomials that are Involutions}, howpublished = {Cryptology ePrint Archive, Report 2015/434}, year = {2015}, url = {https://eprint.iacr.org/2015/434}, } @misc{cryptoeprint:2015:435, author = {Yusong Du and Baodian Wei and Fangguo Zhang and Huang Zhang}, title = {On the (Fast) Algebraic Immunity of Boolean Power Functions}, howpublished = {Cryptology ePrint Archive, Report 2015/435}, year = {2015}, url = {https://eprint.iacr.org/2015/435}, } @misc{cryptoeprint:2015:436, author = {Yusong Du and Baodian Wei and Fangguo Zhang and Huang Zhang}, title = {On the Resistance of Prime-variable Rotation Symmetric Boolean Functions against Fast Algebraic Attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/436}, year = {2015}, url = {https://eprint.iacr.org/2015/436}, } @misc{cryptoeprint:2015:437, author = {Bryan Parno}, title = {A Note on the Unsoundness of vnTinyRAM's SNARK}, howpublished = {Cryptology ePrint Archive, Report 2015/437}, year = {2015}, url = {https://eprint.iacr.org/2015/437}, } @misc{cryptoeprint:2015:438, author = {Ralf Kuesters and Tomasz Truderung and Bernhard Beckert and Daniel Bruns and Michael Kirsten and Martin Mohr}, title = {A Hybrid Approach for Proving Noninterference of Java Programs}, howpublished = {Cryptology ePrint Archive, Report 2015/438}, year = {2015}, url = {https://eprint.iacr.org/2015/438}, } @misc{cryptoeprint:2015:439, author = {Vipul Goyal and Abhishek Jain}, title = {On Concurrently Secure Computation in the Multiple Ideal Query Model}, howpublished = {Cryptology ePrint Archive, Report 2015/439}, year = {2015}, url = {https://eprint.iacr.org/2015/439}, } @misc{cryptoeprint:2015:440, author = {Martín Abadi and Dan Boneh and Ilya Mironov and Ananth Raghunathan and Gil Segev}, title = {Message-Locked Encryption for Lock-Dependent Messages}, howpublished = {Cryptology ePrint Archive, Report 2015/440}, year = {2015}, url = {https://eprint.iacr.org/2015/440}, } @misc{cryptoeprint:2015:441, author = {Devu Manikantan Shila and Vivek Venugopalan and Cameron D Patterson}, title = {FIDES: Enhancing Trust in Reconfigurable Based Hardware Systems}, howpublished = {Cryptology ePrint Archive, Report 2015/441}, year = {2015}, url = {https://eprint.iacr.org/2015/441}, } @misc{cryptoeprint:2015:442, author = {Zoya Dyka, Thomas Basmer, Christian Wittke and Peter Langendoerfer}, title = {Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/442}, year = {2015}, url = {https://eprint.iacr.org/2015/442}, } @misc{cryptoeprint:2015:443, author = {Xiaolin Xu, Ulrich Rührmair, Daniel E. Holcomb, and Wayne Burleson}, title = {Security Evaluation and Enhancement of Bistable Ring PUFs}, howpublished = {Cryptology ePrint Archive, Report 2015/443}, year = {2015}, url = {https://eprint.iacr.org/2015/443}, } @misc{cryptoeprint:2015:444, author = {Mridul Nandi}, title = {Revisiting Security Claims of XLS and COPA}, howpublished = {Cryptology ePrint Archive, Report 2015/444}, year = {2015}, url = {https://eprint.iacr.org/2015/444}, } @misc{cryptoeprint:2015:445, author = {Mridul Nandi}, title = {XLS is not a Strong Pseudorandom Permutation}, howpublished = {Cryptology ePrint Archive, Report 2015/445}, year = {2015}, url = {https://eprint.iacr.org/2015/445}, } @misc{cryptoeprint:2015:446, author = {Ronald Cramer and Ivan Damgård and Marcel Keller}, title = {On the Amortized Complexity of Zero-knowledge Protocols}, howpublished = {Cryptology ePrint Archive, Report 2015/446}, year = {2015}, url = {https://eprint.iacr.org/2015/446}, } @misc{cryptoeprint:2015:447, author = {Zhenqi Li and Bin Zhang and Junfeng Fan and Ingrid Verbauwhede}, title = {A New Model for Error-Tolerant Side-Channel Cube Attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/447}, year = {2015}, url = {https://eprint.iacr.org/2015/447}, } @misc{cryptoeprint:2015:448, author = {Yupu Hu and Huiwen Jia}, title = {A Comment on Gu Map-1}, howpublished = {Cryptology ePrint Archive, Report 2015/448}, year = {2015}, url = {https://eprint.iacr.org/2015/448}, } @misc{cryptoeprint:2015:449, author = {Ruoxin Zhao and Rui Zhang and Yongqiang Li and Baofeng Wu}, title = {On Constructions of a Sort of MDS Block Diffusion Matrices for Block Ciphers and Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2015/449}, year = {2015}, url = {https://eprint.iacr.org/2015/449}, } @misc{cryptoeprint:2015:450, author = {Carmit Hazay and Yehuda Lindell and Arpita Patra}, title = {Adaptively Secure Computation with Partial Erasures}, howpublished = {Cryptology ePrint Archive, Report 2015/450}, year = {2015}, url = {https://eprint.iacr.org/2015/450}, } @misc{cryptoeprint:2015:451, author = {Sihong Su and Xiaohu Tang}, title = {On the Systematic Constructions of Rotation Symmetric Bent Functions with Any Possible Algebraic Degrees}, howpublished = {Cryptology ePrint Archive, Report 2015/451}, year = {2015}, url = {https://eprint.iacr.org/2015/451}, } @misc{cryptoeprint:2015:452, author = {Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Olivier Rioul}, title = {Masks will Fall Off -- Higher-Order Optimal Distinguishers}, howpublished = {Cryptology ePrint Archive, Report 2015/452}, year = {2015}, url = {https://eprint.iacr.org/2015/452}, } @misc{cryptoeprint:2015:453, author = {Yupu Hu and Huiwen Jia}, title = {An Optimization of Gu Map-1}, howpublished = {Cryptology ePrint Archive, Report 2015/453}, year = {2015}, url = {https://eprint.iacr.org/2015/453}, } @misc{cryptoeprint:2015:454, author = {Oscar Garcia-Morchon and Ronald Rietman and Sahil Sharma and Ludo Tolhuizen and Jose Luis Torre-Arce}, title = {A comprehensive and lightweight security architecture to secure the IoT throughout the lifecycle of a device based on HIMMO}, howpublished = {Cryptology ePrint Archive, Report 2015/454}, year = {2015}, url = {https://eprint.iacr.org/2015/454}, } @misc{cryptoeprint:2015:455, author = {Jian Liu and N.Asokan and Benny Pinkas}, title = {Secure Deduplication of Encrypted Data without Additional Independent Servers}, howpublished = {Cryptology ePrint Archive, Report 2015/455}, year = {2015}, url = {https://eprint.iacr.org/2015/455}, } @misc{cryptoeprint:2015:456, author = {Iraklis Symeonids, Pagona Tsormpatzoudi and Bart Preneel}, title = {Collateral damage of Facebook Apps: an enhanced privacy scoring model}, howpublished = {Cryptology ePrint Archive, Report 2015/456}, year = {2015}, url = {https://eprint.iacr.org/2015/456}, } @misc{cryptoeprint:2015:457, author = {Mridul Nandi and Tapas Pandit}, title = {Generic Conversions from CPA to CCA secure Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/457}, year = {2015}, url = {https://eprint.iacr.org/2015/457}, } @misc{cryptoeprint:2015:458, author = {Sheena Sathyan and Shaji R S Professor}, title = {A HYBRID APPROACH FOR THE SECURE TRANSMISSION OF H.264/AVC VIDEO STREAMS}, howpublished = {Cryptology ePrint Archive, Report 2015/458}, year = {2015}, url = {https://eprint.iacr.org/2015/458}, } @misc{cryptoeprint:2015:459, author = {Bing Sun and Xin Hai and Wenyu Zhang and Lei Cheng and Zhichao Yang}, title = {New Observation on Division Property}, howpublished = {Cryptology ePrint Archive, Report 2015/459}, year = {2015}, url = {https://eprint.iacr.org/2015/459}, } @misc{cryptoeprint:2015:460, author = {Kevin Delmolino, Mitchell Arnett, Ahmed Kosba, Andrew Miller, and Elaine Shi}, title = {Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab}, howpublished = {Cryptology ePrint Archive, Report 2015/460}, year = {2015}, url = {https://eprint.iacr.org/2015/460}, } @misc{cryptoeprint:2015:461, author = {Jung Hee Cheon and Changmin Lee}, title = {Approximate Algorithms on Lattices with Small Determinant}, howpublished = {Cryptology ePrint Archive, Report 2015/461}, year = {2015}, url = {https://eprint.iacr.org/2015/461}, } @misc{cryptoeprint:2015:462, author = {Wei Dai, Yarkın Dor\"{o}z and Berk Sunar}, title = {Accelerating SWHE based PIRs using GPUs}, howpublished = {Cryptology ePrint Archive, Report 2015/462}, year = {2015}, url = {https://eprint.iacr.org/2015/462}, } @misc{cryptoeprint:2015:463, author = {Gu Chunsheng}, title = {Multilinear Maps Using Random Matrix}, howpublished = {Cryptology ePrint Archive, Report 2015/463}, year = {2015}, url = {https://eprint.iacr.org/2015/463}, } @misc{cryptoeprint:2015:464, author = {Florian Tschorsch and Björn Scheuermann}, title = {Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies}, howpublished = {Cryptology ePrint Archive, Report 2015/464}, year = {2015}, url = {https://eprint.iacr.org/2015/464}, } @misc{cryptoeprint:2015:465, author = {Hwajeong Seo and Zhe Liu and Johann Groschadl and Howon Kim}, title = {Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation}, howpublished = {Cryptology ePrint Archive, Report 2015/465}, year = {2015}, url = {https://eprint.iacr.org/2015/465}, } @misc{cryptoeprint:2015:466, author = {Zhou Tanping*, Yang Xiaoyuan, Zhang Wei and Wu Liqiang}, title = {Efficient Fully Homomorphic Encryption with Circularly Secure Key Switching Process}, howpublished = {Cryptology ePrint Archive, Report 2015/466}, year = {2015}, url = {https://eprint.iacr.org/2015/466}, } @misc{cryptoeprint:2015:467, author = {Marcel Keller}, title = {The Oblivious Machine - or: How to Put the C into MPC}, howpublished = {Cryptology ePrint Archive, Report 2015/467}, year = {2015}, url = {https://eprint.iacr.org/2015/467}, } @misc{cryptoeprint:2015:468, author = {Dongxi Liu}, title = {Practical Fully Homomorphic Encryption without Noise Reduction}, howpublished = {Cryptology ePrint Archive, Report 2015/468}, year = {2015}, url = {https://eprint.iacr.org/2015/468}, } @misc{cryptoeprint:2015:469, author = {Andrew Miller and Rob Jansen}, title = {Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications}, howpublished = {Cryptology ePrint Archive, Report 2015/469}, year = {2015}, url = {https://eprint.iacr.org/2015/469}, } @misc{cryptoeprint:2015:470, author = {Vincenzo Iovino and Qiang Tang and Karol Żebrowski}, title = {On the power of Public-key Functional Encryption with Function Privacy}, howpublished = {Cryptology ePrint Archive, Report 2015/470}, year = {2015}, url = {https://eprint.iacr.org/2015/470}, } @misc{cryptoeprint:2015:471, author = {Yansong Gao, Damith C. Ranasinghe, Gefei Li, Said F. Al-Sarawi, Omid Kavehei, and Derek Abbott}, title = {A Challenge Obfuscation Method for Thwarting Model Building Attacks on PUFs}, howpublished = {Cryptology ePrint Archive, Report 2015/471}, year = {2015}, url = {https://eprint.iacr.org/2015/471}, } @misc{cryptoeprint:2015:472, author = {Sai Sheshank Burra and Enrique Larraia and Jesper Buus Nielsen and Peter Sebastian Nordholt and Claudio Orlandi and Emmanuela Orsini and Peter Scholl and Nigel P. Smart}, title = {High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2015/472}, year = {2015}, url = {https://eprint.iacr.org/2015/472}, } @misc{cryptoeprint:2015:473, author = {Mehak Khurana and Meena Kumari}, title = {VARIANTS OF DIFFERENTIAL AND LINEAR CRYPTANALYSIS}, howpublished = {Cryptology ePrint Archive, Report 2015/473}, year = {2015}, url = {https://eprint.iacr.org/2015/473}, } @misc{cryptoeprint:2015:474, author = {Masahiro Yagisawa}, title = {Fully Homomorphic Encryption without bootstrapping}, howpublished = {Cryptology ePrint Archive, Report 2015/474}, year = {2015}, url = {https://eprint.iacr.org/2015/474}, } @misc{cryptoeprint:2015:475, author = {Eleonora Guerrini and Laurent Imbert and Théo Winterhalter}, title = {Randomizing scalar multiplication using exact covering systems of congruences}, howpublished = {Cryptology ePrint Archive, Report 2015/475}, year = {2015}, url = {https://eprint.iacr.org/2015/475}, } @misc{cryptoeprint:2015:476, author = {Bart Mennink}, title = {XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees}, howpublished = {Cryptology ePrint Archive, Report 2015/476}, year = {2015}, url = {https://eprint.iacr.org/2015/476}, } @misc{cryptoeprint:2015:477, author = {John Mattsson, Magnus Westerlund}, title = {Authentication Key Recovery on Galois Counter Mode (GCM)}, howpublished = {Cryptology ePrint Archive, Report 2015/477}, year = {2015}, url = {https://eprint.iacr.org/2015/477}, } @misc{cryptoeprint:2015:478, author = {Tibor Jager}, title = {How to Build Time-Lock Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/478}, year = {2015}, url = {https://eprint.iacr.org/2015/478}, } @misc{cryptoeprint:2015:479, author = {Martianus Frederic Ezerman and Hyung Tae Lee and San Ling and Khoa Nguyen and Huaxiong Wang}, title = {A Provably Secure Group Signature Scheme from Code-Based Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2015/479}, year = {2015}, url = {https://eprint.iacr.org/2015/479}, } @misc{cryptoeprint:2015:480, author = {Berry Schoenmakers, Meilof Veeningen, and Niels de Vreede}, title = {Trinocchio: Privacy-Friendly Outsourcing by Distributed Verifiable Computation}, howpublished = {Cryptology ePrint Archive, Report 2015/480}, year = {2015}, url = {https://eprint.iacr.org/2015/480}, } @misc{cryptoeprint:2015:481, author = {Theodosis Mourouzis and Guangyan Song and Nicolas Courtois and Michalis Christofii}, title = {Advanced Differential Cryptanalysis of Reduced-Round SIMON64/128 Using Large-Round Statistical Distinguishers}, howpublished = {Cryptology ePrint Archive, Report 2015/481}, year = {2015}, url = {https://eprint.iacr.org/2015/481}, } @misc{cryptoeprint:2015:482, author = {Jia Liu and Saqib A. Kakvi and Bogdan Warinschi}, title = {Extractable Witness Encryption and Timed-Release Encryption from Bitcoin}, howpublished = {Cryptology ePrint Archive, Report 2015/482}, year = {2015}, url = {https://eprint.iacr.org/2015/482}, } @misc{cryptoeprint:2015:483, author = {Shi Bai and Adeline Langlois and Tancr{\`e}de Lepoint and Amin Sakzad and Damien Stehle and Ron Steinfeld}, title = {Improved security proofs in lattice-based cryptography: using the R\'enyi divergence rather than the statistical distance}, howpublished = {Cryptology ePrint Archive, Report 2015/483}, year = {2015}, url = {https://eprint.iacr.org/2015/483}, } @misc{cryptoeprint:2015:484, author = {Jian Guo and J\'{e}r\'{e}my Jean and Nicky Mouha and Ivica Nikoli\'{c}}, title = {More Rounds, Less Security?}, howpublished = {Cryptology ePrint Archive, Report 2015/484}, year = {2015}, url = {https://eprint.iacr.org/2015/484}, } @misc{cryptoeprint:2015:485, author = {Elena Andreeva and Guy Barwell and Ritam Bhaumik and Mridul Nandi and Dan Page and Martijn Stam}, title = {Turning Online Ciphers Off}, howpublished = {Cryptology ePrint Archive, Report 2015/485}, year = {2015}, url = {https://eprint.iacr.org/2015/485}, } @misc{cryptoeprint:2015:486, author = {Jiangshan Yu, Mark Ryan, and Cas Cremers}, title = {DECIM: Detecting Endpoint Compromise In Messaging}, howpublished = {Cryptology ePrint Archive, Report 2015/486}, year = {2015}, url = {https://eprint.iacr.org/2015/486}, } @misc{cryptoeprint:2015:487, author = {Mihir Bellare, Igors Stepanovs and Stefano Tessaro}, title = {Contention in Cryptoland: Obfuscation, Leakage and UCE}, howpublished = {Cryptology ePrint Archive, Report 2015/487}, year = {2015}, url = {https://eprint.iacr.org/2015/487}, } @misc{cryptoeprint:2015:488, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, title = {On Black-Box Complexity of Universally Composable Security in the CRS model}, howpublished = {Cryptology ePrint Archive, Report 2015/488}, year = {2015}, url = {https://eprint.iacr.org/2015/488}, } @misc{cryptoeprint:2015:489, author = {Trinabh Gupta and Natacha Crooks and Whitney Mulhern and Srinath Setty and Lorenzo Alvisi and Michael Walfish}, title = {Scalable and private media consumption with Popcorn}, howpublished = {Cryptology ePrint Archive, Report 2015/489}, year = {2015}, url = {https://eprint.iacr.org/2015/489}, } @misc{cryptoeprint:2015:490, author = {Sonam Devgan Kaul and Amit K. Awasthi}, title = {Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement}, howpublished = {Cryptology ePrint Archive, Report 2015/490}, year = {2015}, url = {https://eprint.iacr.org/2015/490}, } @misc{cryptoeprint:2015:491, author = {Nishanth Chandran and Melissa Chase and Feng-Hao Liu and Ryo Nishimaki and Keita Xagawa}, title = {Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices}, howpublished = {Cryptology ePrint Archive, Report 2015/491}, year = {2015}, url = {https://eprint.iacr.org/2015/491}, } @misc{cryptoeprint:2015:492, author = {Vincent Grosso and François-Xavier Standaert and Sebastian Faust}, title = {Masking vs. Multiparty Computation: How Large is the Gap for AES?}, howpublished = {Cryptology ePrint Archive, Report 2015/492}, year = {2015}, url = {https://eprint.iacr.org/2015/492}, } @misc{cryptoeprint:2015:493, author = {Sikhar Patranabis and Abhishek Chakraborty and Debdeep Mukhopadhyay}, title = {Fault Tolerant Infective Countermeasure for AES}, howpublished = {Cryptology ePrint Archive, Report 2015/493}, year = {2015}, url = {https://eprint.iacr.org/2015/493}, } @misc{cryptoeprint:2015:494, author = {Yonglin Hao and Hongbo Yu}, title = {Cryptanalysis of the LSH and SHA-V Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2015/494}, year = {2015}, url = {https://eprint.iacr.org/2015/494}, } @misc{cryptoeprint:2015:495, author = {Sondre R{\o}njom}, title = {Powers of Subfield Polynomials and Algebraic Attacks on Word-Based Stream Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2015/495}, year = {2015}, url = {https://eprint.iacr.org/2015/495}, } @misc{cryptoeprint:2015:496, author = {Arthur Gervais and Hubert Ritzdorf and Mario Lucic and Srdjan Capkun}, title = {Quantifying Location Privacy Leakage from Transaction Prices}, howpublished = {Cryptology ePrint Archive, Report 2015/496}, year = {2015}, url = {https://eprint.iacr.org/2015/496}, } @misc{cryptoeprint:2015:497, author = {Zhangxiang Hu and Payman Mohassel and Mike Rosulek}, title = {Efficient Zero-Knowledge Proofs of Non-Algebraic Statements with Sublinear Amortized Cost}, howpublished = {Cryptology ePrint Archive, Report 2015/497}, year = {2015}, url = {https://eprint.iacr.org/2015/497}, } @misc{cryptoeprint:2015:498, author = {Jiajun Zhang and Haining Fan}, title = {Low Space Complexity CRT-based Bit-Parallel GF(2^n) Polynomial Basis Multipliers for Irreducible Trinomials}, howpublished = {Cryptology ePrint Archive, Report 2015/498}, year = {2015}, url = {https://eprint.iacr.org/2015/498}, } @misc{cryptoeprint:2015:499, author = {Dennis Hofheinz}, title = {Algebraic partitioning: Fully compact and (almost) tightly secure cryptography}, howpublished = {Cryptology ePrint Archive, Report 2015/499}, year = {2015}, url = {https://eprint.iacr.org/2015/499}, } @misc{cryptoeprint:2015:500, author = {Alberto Battistello and Christophe Giraud}, title = {Fault Cryptanalysis of CHES 2014 Symmetric Infective Countermeasure}, howpublished = {Cryptology ePrint Archive, Report 2015/500}, year = {2015}, url = {https://eprint.iacr.org/2015/500}, } @misc{cryptoeprint:2015:501, author = {Serge Fehr and Max Fillinger}, title = {Multi-Prover Commitments Against Non-Signaling Attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/501}, year = {2015}, url = {https://eprint.iacr.org/2015/501}, } @misc{cryptoeprint:2015:502, author = {George Danezis and Sarah Meiklejohn}, title = {Centrally Banked Cryptocurrencies}, howpublished = {Cryptology ePrint Archive, Report 2015/502}, year = {2015}, url = {https://eprint.iacr.org/2015/502}, } @misc{cryptoeprint:2015:503, author = {Kristian Gjøsteen and Anders Smedstuen Lund}, title = {The Norwegian Internet Voting Protocol: A new Instantiation}, howpublished = {Cryptology ePrint Archive, Report 2015/503}, year = {2015}, url = {https://eprint.iacr.org/2015/503}, } @misc{cryptoeprint:2015:504, author = {Brice Minaud and Yannick Seurin}, title = {The Iterated Random Permutation Problem with Applications to Cascade Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/504}, year = {2015}, url = {https://eprint.iacr.org/2015/504}, } @misc{cryptoeprint:2015:505, author = {Razvan Barbulescu and Pierrick Gaudry and Thorsten Kleinjung}, title = {The Tower Number Field Sieve}, howpublished = {Cryptology ePrint Archive, Report 2015/505}, year = {2015}, url = {https://eprint.iacr.org/2015/505}, } @misc{cryptoeprint:2015:506, author = {Gilles Barthe and Sonia Belaïd and François Dupressoir and Pierre-Alain Fouque and Benjamin Grégoire and Pierre-Yves Strub and Rébecca Zucchini}, title = {Strong Non-Interference and Type-Directed Higher-Order Masking}, howpublished = {Cryptology ePrint Archive, Report 2015/506}, year = {2015}, url = {https://eprint.iacr.org/2015/506}, } @misc{cryptoeprint:2015:507, author = {Itai Dinur and Orr Dunkelman and Thorsten Kranz and Gregor Leander}, title = {Decomposing the ASASA Block Cipher Construction}, howpublished = {Cryptology ePrint Archive, Report 2015/507}, year = {2015}, url = {https://eprint.iacr.org/2015/507}, } @misc{cryptoeprint:2015:508, author = {Santanu Sarkar and Prakash Dey and Avishek Adhikari and Subhamoy Maitra}, title = {Probabilistic Signature Based Framework for Differential Fault Analysis of Stream Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2015/508}, year = {2015}, url = {https://eprint.iacr.org/2015/508}, } @misc{cryptoeprint:2015:509, author = {Daniel R. L. Brown}, title = {A flaw in a theorem about Schnorr signatures}, howpublished = {Cryptology ePrint Archive, Report 2015/509}, year = {2015}, url = {https://eprint.iacr.org/2015/509}, } @misc{cryptoeprint:2015:510, author = {Gideon Samid}, title = {Equivoe-T: Transposition Equivocation Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2015/510}, year = {2015}, url = {https://eprint.iacr.org/2015/510}, } @misc{cryptoeprint:2015:511, author = {Baris Ege and Thomas Eisenbarth and Lejla Batina}, title = {Near Collision Side Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/511}, year = {2015}, url = {https://eprint.iacr.org/2015/511}, } @misc{cryptoeprint:2015:512, author = {Sami Saab and Andrew Leiserson and Michael Tunstall}, title = {Key Extraction from the Primary Side of a Switched-Mode Power Supply}, howpublished = {Cryptology ePrint Archive, Report 2015/512}, year = {2015}, url = {https://eprint.iacr.org/2015/512}, } @misc{cryptoeprint:2015:513, author = {Aurore Guillevic}, title = {Computing Individual Discrete Logarithms Faster in $GF(p^n)$}, howpublished = {Cryptology ePrint Archive, Report 2015/513}, year = {2015}, url = {https://eprint.iacr.org/2015/513}, } @misc{cryptoeprint:2015:514, author = {Nir Bitansky and Shafi Goldwasser and Abhishek Jain and Omer Paneth and Vinod Vaikuntanathan and Brent Waters}, title = {Time-Lock Puzzles from Randomized Encodings}, howpublished = {Cryptology ePrint Archive, Report 2015/514}, year = {2015}, url = {https://eprint.iacr.org/2015/514}, } @misc{cryptoeprint:2015:515, author = {Thomas Espitau and Pierre-Alain Fouque and Pierre Karpman}, title = {Higher-Order Differential Meet-in-The-Middle Preimage Attacks on SHA-1 and BLAKE}, howpublished = {Cryptology ePrint Archive, Report 2015/515}, year = {2015}, url = {https://eprint.iacr.org/2015/515}, } @misc{cryptoeprint:2015:516, author = {Brice Minaud and Patrick Derbez and Pierre-Alain Fouque and Pierre Karpman}, title = {Key-Recovery Attacks on ASASA}, howpublished = {Cryptology ePrint Archive, Report 2015/516}, year = {2015}, url = {https://eprint.iacr.org/2015/516}, } @misc{cryptoeprint:2015:517, author = {Giuseppe Ateniese and Bernardo Magri and Daniele Venturi}, title = {Subversion-Resilient Signatures: Definitions, Constructions and Applications}, howpublished = {Cryptology ePrint Archive, Report 2015/517}, year = {2015}, url = {https://eprint.iacr.org/2015/517}, } @misc{cryptoeprint:2015:518, author = {Ren Zhang and Bart Preneel}, title = {Broadcasting Intermediate Blocks as a Defense Mechanism Against Selfish-Mine in Bitcoin}, howpublished = {Cryptology ePrint Archive, Report 2015/518}, year = {2015}, url = {https://eprint.iacr.org/2015/518}, } @misc{cryptoeprint:2015:519, author = {Yongge Wang}, title = {Notes on Two Fully Homomorphic Encryption Schemes Without Bootstrapping}, howpublished = {Cryptology ePrint Archive, Report 2015/519}, year = {2015}, url = {https://eprint.iacr.org/2015/519}, } @misc{cryptoeprint:2015:520, author = {Suvradip Chakraborty and Y. Sreenivasarao and C. Pandu Rangan and Srinivasan Raghuraman}, title = {A Constant Time, Single Round Attribute-Based Authenticated Key Exchange in Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2015/520}, year = {2015}, url = {https://eprint.iacr.org/2015/520}, } @misc{cryptoeprint:2015:521, author = {Sergey Gorbunov and Silvio Micali}, title = {Democoin: A Publicly Verifiable and Jointly Serviced Cryptocurrency}, howpublished = {Cryptology ePrint Archive, Report 2015/521}, year = {2015}, url = {https://eprint.iacr.org/2015/521}, } @misc{cryptoeprint:2015:522, author = {Anja Becker, Nicolas Gama, Antoine Joux}, title = {Speeding-up lattice sieving without increasing the memory, using sub-quadratic nearest neighbor search}, howpublished = {Cryptology ePrint Archive, Report 2015/522}, year = {2015}, url = {https://eprint.iacr.org/2015/522}, } @misc{cryptoeprint:2015:523, author = {Yehuda Lindell and Benny Pinkas and Nigel P. Smart and Avishay Yanai}, title = {Efficient Constant Round Multi-Party Computation Combining BMR and SPDZ}, howpublished = {Cryptology ePrint Archive, Report 2015/523}, year = {2015}, url = {https://eprint.iacr.org/2015/523}, } @misc{cryptoeprint:2015:524, author = {Yansong Gao}, title = {Secure Key Exchange Protocol based on Virtual Proof of Reality}, howpublished = {Cryptology ePrint Archive, Report 2015/524}, year = {2015}, url = {https://eprint.iacr.org/2015/524}, } @misc{cryptoeprint:2015:525, author = {David Pointcheval and Olivier Sanders}, title = {Short Randomizable Signatures}, howpublished = {Cryptology ePrint Archive, Report 2015/525}, year = {2015}, url = {https://eprint.iacr.org/2015/525}, } @misc{cryptoeprint:2015:526, author = {Takanori Isobe and Kyoji Shibutani}, title = {Generic Key Recovery Attack on Feistel Scheme}, howpublished = {Cryptology ePrint Archive, Report 2015/526}, year = {2015}, url = {https://eprint.iacr.org/2015/526}, } @misc{cryptoeprint:2015:527, author = {Carolyn Whitnall and Elisabeth Oswald}, title = {Robust Profiling for DPA-Style Attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/527}, year = {2015}, url = {https://eprint.iacr.org/2015/527}, } @misc{cryptoeprint:2015:528, author = {Sunoo Park and Krzysztof Pietrzak and Albert Kwon and Joël Alwen and Georg Fuchsbauer and Peter Gaži}, title = {SpaceMint: A Cryptocurrency Based on Proofs of Space}, howpublished = {Cryptology ePrint Archive, Report 2015/528}, year = {2015}, url = {https://eprint.iacr.org/2015/528}, } @misc{cryptoeprint:2015:529, author = {Colin O'Flynn and Zhizhang Chen}, title = {Power Analysis Attacks against IEEE 802.15.4 Nodes}, howpublished = {Cryptology ePrint Archive, Report 2015/529}, year = {2015}, url = {https://eprint.iacr.org/2015/529}, } @misc{cryptoeprint:2015:530, author = {Pierre Karpman and Thomas Peyrin and Marc Stevens}, title = {Practical Free-Start Collision Attacks on 76-step SHA-1}, howpublished = {Cryptology ePrint Archive, Report 2015/530}, year = {2015}, url = {https://eprint.iacr.org/2015/530}, } @misc{cryptoeprint:2015:531, author = {Mohammad Hajiabadi, Bruce M. Kapron}, title = {Reproducible Circularly-Secure Bit Encryption: Applications and Realizations}, howpublished = {Cryptology ePrint Archive, Report 2015/531}, year = {2015}, url = {https://eprint.iacr.org/2015/531}, } @misc{cryptoeprint:2015:533, author = {Xiaoshuang Ma and Kexin Qiao}, title = {Related-Key Rectangle Attack on Round-reduced \textit{Khudra} Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2015/533}, year = {2015}, url = {https://eprint.iacr.org/2015/533}, } @misc{cryptoeprint:2015:534, author = {Sergey Agievich and Anastasiya Gorodilova and Nikolay Kolomeec and Svetla Nikova and Bart Preneel and Vincent Rijmen and George Shushuev and Natalia Tokareva and Valeria Vitkup}, title = {Problems, solutions and experience of the first international student's Olympiad in cryptography}, howpublished = {Cryptology ePrint Archive, Report 2015/534}, year = {2015}, url = {https://eprint.iacr.org/2015/534}, } @misc{cryptoeprint:2015:535, author = {Vincent Grosso and François-Xavier Standaert}, title = {ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?}, howpublished = {Cryptology ePrint Archive, Report 2015/535}, year = {2015}, url = {https://eprint.iacr.org/2015/535}, } @misc{cryptoeprint:2015:536, author = {François Durvaux and François-Xavier Standaert}, title = {From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces}, howpublished = {Cryptology ePrint Archive, Report 2015/536}, year = {2015}, url = {https://eprint.iacr.org/2015/536}, } @misc{cryptoeprint:2015:537, author = {François Durvaux and François-Xavier Standaert and Santos Merino Del Pozo,}, title = {Towards Easy Leakage Certification}, howpublished = {Cryptology ePrint Archive, Report 2015/537}, year = {2015}, url = {https://eprint.iacr.org/2015/537}, } @misc{cryptoeprint:2015:538, author = {Sarita Agrawal and Jay Patel and Manik Lal Das}, title = {Pairing Based Mutual Healing in Wireless Sensor Networks}, howpublished = {Cryptology ePrint Archive, Report 2015/538}, year = {2015}, url = {https://eprint.iacr.org/2015/538}, } @misc{cryptoeprint:2015:539, author = {Benoît Cogliati and Rodolphe Lampe and Yannick Seurin}, title = {Tweaking Even-Mansour Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2015/539}, year = {2015}, url = {https://eprint.iacr.org/2015/539}, } @misc{cryptoeprint:2015:540, author = {Gaurav Bansod, Narayan Pisharoty, and Abhijit Patil }, title = {PICO: An Ultra lightweight and Low power encryption design for pervasive computing}, howpublished = {Cryptology ePrint Archive, Report 2015/540}, year = {2015}, url = {https://eprint.iacr.org/2015/540}, } @misc{cryptoeprint:2015:541, author = {Bart Mennink and Reza Reyhanitabar and Damian Vizár}, title = {Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/541}, year = {2015}, url = {https://eprint.iacr.org/2015/541}, } @misc{cryptoeprint:2015:542, author = {Sonia Belaïd and Jean-Sébastien Coron and Pierre-Alain Fouque and Benoît Gérard and Jean-Gabriel Kammerer and Emmanuel Prouff}, title = {Improved Side-Channel Analysis of Finite-Field Multiplication}, howpublished = {Cryptology ePrint Archive, Report 2015/542}, year = {2015}, url = {https://eprint.iacr.org/2015/542}, } @misc{cryptoeprint:2015:543, author = {Moni Naor and Eylon Yogev}, title = {Bloom Filters in Adversarial Environments}, howpublished = {Cryptology ePrint Archive, Report 2015/543}, year = {2015}, url = {https://eprint.iacr.org/2015/543}, } @misc{cryptoeprint:2015:544, author = {Daniel R. L. Brown}, title = {Alternative cubics' rules with an algebraic appeal}, howpublished = {Cryptology ePrint Archive, Report 2015/544}, year = {2015}, url = {https://eprint.iacr.org/2015/544}, } @misc{cryptoeprint:2015:545, author = {Qinglong Zhang and Zongbin Liu and and Cunqing Ma and Changting Li and Jiwu Jing}, title = {FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs}, howpublished = {Cryptology ePrint Archive, Report 2015/545}, year = {2015}, url = {https://eprint.iacr.org/2015/545}, } @misc{cryptoeprint:2015:546, author = {Marcel Keller and Emmanuela Orsini and Peter Scholl}, title = {Actively Secure OT Extension with Optimal Overhead}, howpublished = {Cryptology ePrint Archive, Report 2015/546}, year = {2015}, url = {https://eprint.iacr.org/2015/546}, } @misc{cryptoeprint:2015:547, author = {Xiao Wang and S. Dov Gordon and Allen McIntosh and Jonathan Katz}, title = {Secure Computation of MIPS Machine Code}, howpublished = {Cryptology ePrint Archive, Report 2015/547}, year = {2015}, url = {https://eprint.iacr.org/2015/547}, } @misc{cryptoeprint:2015:548, author = {Yevgeniy Dodis and Ilya Mironov and Noah Stephens-Davidowitz}, title = {Message Transmission with Reverse Firewalls---Secure Communication on Corrupted Machines}, howpublished = {Cryptology ePrint Archive, Report 2015/548}, year = {2015}, url = {https://eprint.iacr.org/2015/548}, } @misc{cryptoeprint:2015:549, author = {Amir Hassani Karbasi, Reza Ebrahimi Atani }, title = {ILTRU: An NTRU-Like Public Key Cryptosystem Over Ideal Lattices}, howpublished = {Cryptology ePrint Archive, Report 2015/549}, year = {2015}, url = {https://eprint.iacr.org/2015/549}, } @misc{cryptoeprint:2015:550, author = {Charanjit S. Jutla}, title = {Upending Stock Market Structure Using Secure Multi-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2015/550}, year = {2015}, url = {https://eprint.iacr.org/2015/550}, } @misc{cryptoeprint:2015:551, author = {Anne Broadbent and Stacey Jeffery}, title = {Quantum homomorphic encryption for circuits of low $T$-gate complexity}, howpublished = {Cryptology ePrint Archive, Report 2015/551}, year = {2015}, url = {https://eprint.iacr.org/2015/551}, } @misc{cryptoeprint:2015:552, author = {Paul Kirchner and Pierre-Alain Fouque}, title = {An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices}, howpublished = {Cryptology ePrint Archive, Report 2015/552}, year = {2015}, url = {https://eprint.iacr.org/2015/552}, } @misc{cryptoeprint:2015:553, author = {Rafail Ostrovsky and Silas Richelson and Alessandra Scafuro}, title = {Round-Optimal Black-Box Two-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2015/553}, year = {2015}, url = {https://eprint.iacr.org/2015/553}, } @misc{cryptoeprint:2015:554, author = {Michel Abdalla and Fabrice Benhamouda and Alain Passelègue}, title = {An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security}, howpublished = {Cryptology ePrint Archive, Report 2015/554}, year = {2015}, url = {https://eprint.iacr.org/2015/554}, } @misc{cryptoeprint:2015:555, author = {Tapas Pandit and Sumit Kumar Pandey and Rana Barua}, title = {Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack}, howpublished = {Cryptology ePrint Archive, Report 2015/555}, year = {2015}, url = {https://eprint.iacr.org/2015/555}, } @misc{cryptoeprint:2015:556, author = {Sujoy Sinha Roy and Kimmo Järvinen and Ingrid Verbauwhede}, title = {Lightweight Coprocessor for Koblitz Curves: 283-bit ECC Including Scalar Conversion with only 4300 Gates}, howpublished = {Cryptology ePrint Archive, Report 2015/556}, year = {2015}, url = {https://eprint.iacr.org/2015/556}, } @misc{cryptoeprint:2015:557, author = {Takanori Isobe and Kyoji Shibutani}, title = {Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2015/557}, year = {2015}, url = {https://eprint.iacr.org/2015/557}, } @misc{cryptoeprint:2015:558, author = {Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto Koenig, Philemon von Bergen}, title = {Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting}, howpublished = {Cryptology ePrint Archive, Report 2015/558}, year = {2015}, url = {https://eprint.iacr.org/2015/558}, } @misc{cryptoeprint:2015:559, author = {Ran Canetti and Vipul Goyal and Abhishek Jain}, title = {Concurrent Secure Computation with Optimal Query Complexity}, howpublished = {Cryptology ePrint Archive, Report 2015/559}, year = {2015}, url = {https://eprint.iacr.org/2015/559}, } @misc{cryptoeprint:2015:560, author = {Olivier Blazy and Céline Chevalier}, title = {Generic Construction of UC-Secure Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2015/560}, year = {2015}, url = {https://eprint.iacr.org/2015/560}, } @misc{cryptoeprint:2015:561, author = {J. Longo and E. De Mulder and D. Page and M. Tunstall}, title = {SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip}, howpublished = {Cryptology ePrint Archive, Report 2015/561}, year = {2015}, url = {https://eprint.iacr.org/2015/561}, } @misc{cryptoeprint:2015:562, author = {Iraklis Leontiadis and Kaoutar Elkhiyaoui and Melek Önen and Refik Molva }, title = {PUDA – Privacy and Unforgeability for Data Aggregation}, howpublished = {Cryptology ePrint Archive, Report 2015/562}, year = {2015}, url = {https://eprint.iacr.org/2015/562}, } @misc{cryptoeprint:2015:563, author = {Muhammad Naveed and Erman Ayday and Ellen W. Clayton and Jacques Fellay and Carl A. Gunter and Jean-Pierre Hubaux and Bradley A. Malin and XiaoFeng Wang}, title = {Privacy in the Genomic Era}, howpublished = {Cryptology ePrint Archive, Report 2015/563}, year = {2015}, url = {https://eprint.iacr.org/2015/563}, } @misc{cryptoeprint:2015:564, author = {Victor Costan and Ilia Lebedev and Srinivas Devadas}, title = {Sanctum: Minimal Hardware Extensions for Strong Software Isolation}, howpublished = {Cryptology ePrint Archive, Report 2015/564}, year = {2015}, url = {https://eprint.iacr.org/2015/564}, } @misc{cryptoeprint:2015:565, author = {Craig Costello and Patrick Longa}, title = {FourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime}, howpublished = {Cryptology ePrint Archive, Report 2015/565}, year = {2015}, url = {https://eprint.iacr.org/2015/565}, } @misc{cryptoeprint:2015:566, author = {Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada}, title = {A Framework for Identity-Based Encryption with Almost Tight Security}, howpublished = {Cryptology ePrint Archive, Report 2015/566}, year = {2015}, url = {https://eprint.iacr.org/2015/566}, } @misc{cryptoeprint:2015:567, author = {Henri Gilbert and Jérôme Plût and Joana Treger}, title = {Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-boxes}, howpublished = {Cryptology ePrint Archive, Report 2015/567}, year = {2015}, url = {https://eprint.iacr.org/2015/567}, } @misc{cryptoeprint:2015:568, author = {Bingke Ma and Bao Li and Ronglin Hao and Xiaoqian Li}, title = {Cryptanalysis of Reduced-Round Whirlwind (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2015/568}, year = {2015}, url = {https://eprint.iacr.org/2015/568}, } @misc{cryptoeprint:2015:569, author = {Bingke Ma and Bao Li and Ronglin Hao and Xiaoqian Li}, title = {Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2015/569}, year = {2015}, url = {https://eprint.iacr.org/2015/569}, } @misc{cryptoeprint:2015:570, author = {Tarik Moataz and Travis Mayberry and Erik-Oliver Blass}, title = {Constant Communication ORAM with Small Blocksize}, howpublished = {Cryptology ePrint Archive, Report 2015/570}, year = {2015}, url = {https://eprint.iacr.org/2015/570}, } @misc{cryptoeprint:2015:571, author = {Tobias Schneider and Amir Moradi and Tim Güneysu}, title = {Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order - Extended Version}, howpublished = {Cryptology ePrint Archive, Report 2015/571}, year = {2015}, url = {https://eprint.iacr.org/2015/571}, } @misc{cryptoeprint:2015:572, author = {Eli Ben-Sasson and Iddo Ben-Tov and Ivan Damgard and Yuval Ishai and Noga ron-Zewi}, title = {On Public Key Encryption from Noisy Codewords}, howpublished = {Cryptology ePrint Archive, Report 2015/572}, year = {2015}, url = {https://eprint.iacr.org/2015/572}, } @misc{cryptoeprint:2015:573, author = {Ming-Deh A. Huang and Michiel Kosters and Sze Ling Yeo}, title = {Last fall degree, HFE, and Weil descent attacks on ECDLP}, howpublished = {Cryptology ePrint Archive, Report 2015/573}, year = {2015}, url = {https://eprint.iacr.org/2015/573}, } @misc{cryptoeprint:2015:574, author = {Aggelos Kiayias and Hong-Sheng Zhou and Vassilis Zikas}, title = {Fair and Robust Multi-Party Computation using a Global Transaction Ledger}, howpublished = {Cryptology ePrint Archive, Report 2015/574}, year = {2015}, url = {https://eprint.iacr.org/2015/574}, } @misc{cryptoeprint:2015:575, author = {Céline Blondeau and Thomas Peyrin and Lei Wang}, title = {Known-key Distinguisher on Full PRESENT}, howpublished = {Cryptology ePrint Archive, Report 2015/575}, year = {2015}, url = {https://eprint.iacr.org/2015/575}, } @misc{cryptoeprint:2015:576, author = {Michael Scott and Brian Spector}, title = {The Carnac protocol -- or how to read the contents of a sealed envelope}, howpublished = {Cryptology ePrint Archive, Report 2015/576}, year = {2015}, url = {https://eprint.iacr.org/2015/576}, } @misc{cryptoeprint:2015:577, author = {Manfred Lochter, Andreas Wiemers}, title = {Twist Insecurity}, howpublished = {Cryptology ePrint Archive, Report 2015/577}, year = {2015}, url = {https://eprint.iacr.org/2015/577}, } @misc{cryptoeprint:2015:578, author = {Arthur Gervais and Hubert Ritzdorf and Ghassan O. Karame and Srdjan Capkun}, title = {Tampering with the Delivery of Blocks and Transactions in Bitcoin}, howpublished = {Cryptology ePrint Archive, Report 2015/578}, year = {2015}, url = {https://eprint.iacr.org/2015/578}, } @misc{cryptoeprint:2015:579, author = {Mridul Nandi}, title = {A Simple Proof of a Distinguishing Bound of Iterated Uniform Random Permutation}, howpublished = {Cryptology ePrint Archive, Report 2015/579}, year = {2015}, url = {https://eprint.iacr.org/2015/579}, } @misc{cryptoeprint:2015:580, author = {Jan Camenisch and Maria Dubovitskaya and Kristiyan Haralambiev and Markulf Kohlweiss}, title = {Composable & Modular Anonymous Credentials: Definitions and Practical Constructions}, howpublished = {Cryptology ePrint Archive, Report 2015/580}, year = {2015}, url = {https://eprint.iacr.org/2015/580}, } @misc{cryptoeprint:2015:581, author = {Christina Brzuska and Arno Mittelbach}, title = {Universal Computational Extractors and the Superfluous Padding Assumption for Indistinguishability Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2015/581}, year = {2015}, url = {https://eprint.iacr.org/2015/581}, } @misc{cryptoeprint:2015:582, author = {Robert Lychev and Samuel Jero and Alexandra Boldyreva and Cristina Nita-Rotaru}, title = {How Secure and Quick is QUIC? Provable Security and Performance Analyses}, howpublished = {Cryptology ePrint Archive, Report 2015/582}, year = {2015}, url = {https://eprint.iacr.org/2015/582}, } @misc{cryptoeprint:2015:583, author = {Roel Maes and Vincent van der Leest and Erik van der Sluis and Frans Willems}, title = {Secure Key Generation from Biased PUFs}, howpublished = {Cryptology ePrint Archive, Report 2015/583}, year = {2015}, url = {https://eprint.iacr.org/2015/583}, } @misc{cryptoeprint:2015:584, author = {Denise Demirel and Jean Lancrenon}, title = {How to Securely Prolong the Computational Bindingness of Pedersen Commitments}, howpublished = {Cryptology ePrint Archive, Report 2015/584}, year = {2015}, url = {https://eprint.iacr.org/2015/584}, } @misc{cryptoeprint:2015:585, author = {Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers}, title = {SIMON and SPECK: Block Ciphers for the Internet of Things}, howpublished = {Cryptology ePrint Archive, Report 2015/585}, year = {2015}, url = {https://eprint.iacr.org/2015/585}, } @misc{cryptoeprint:2015:586, author = {Yuan Zhang and Chunxiang Xu and Shui Yu and Hongwei Li and Xiaojun Zhang}, title = {SCLPV: Secure Certificateless Public Verification for Cloud Storage in Cyber-physical-social System}, howpublished = {Cryptology ePrint Archive, Report 2015/586}, year = {2015}, url = {https://eprint.iacr.org/2015/586}, } @misc{cryptoeprint:2015:587, author = {Trupil Limbasiya and Nishant Doshi}, title = {AN ENHANCED BIOMETRIC BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD}, howpublished = {Cryptology ePrint Archive, Report 2015/587}, year = {2015}, url = {https://eprint.iacr.org/2015/587}, } @misc{cryptoeprint:2015:588, author = {Bimal Mandal and Pantelimon Stanica and Sugata Gangopadhyay and Enes Pasalic}, title = {An analysis of the $C$ class of bent functions}, howpublished = {Cryptology ePrint Archive, Report 2015/588}, year = {2015}, url = {https://eprint.iacr.org/2015/588}, } @misc{cryptoeprint:2015:589, author = {A.-M. Leventi-Peetz and J.-V. Peetz}, title = {Generating S-Box Multivariate Quadratic Equation Systems And Estimating Algebraic Attack Resistance Aided By SageMath}, howpublished = {Cryptology ePrint Archive, Report 2015/589}, year = {2015}, url = {https://eprint.iacr.org/2015/589}, } @misc{cryptoeprint:2015:590, author = {Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi}, title = {TriviA: A Fast and Secure Authenticated Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2015/590}, year = {2015}, url = {https://eprint.iacr.org/2015/590}, } @misc{cryptoeprint:2015:591, author = {Maciej Skorski}, title = {How much randomness can be extracted from memoryless Shannon entropy sources?}, howpublished = {Cryptology ePrint Archive, Report 2015/591}, year = {2015}, url = {https://eprint.iacr.org/2015/591}, } @misc{cryptoeprint:2015:592, author = {Milivoj Simeonovski and Fabian Bendun and Muhammad Rizwan Asghar and Michael Backes and Ninja Marnau and Peter Druschel}, title = {Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information}, howpublished = {Cryptology ePrint Archive, Report 2015/592}, year = {2015}, url = {https://eprint.iacr.org/2015/592}, } @misc{cryptoeprint:2015:593, author = {Patrick HADDAD and Viktor FISCHER and Florent BERNARD and Jean NICOLAI}, title = {A Physical Approach for Stochastic Modeling of TERO-based TRNG}, howpublished = {Cryptology ePrint Archive, Report 2015/593}, year = {2015}, url = {https://eprint.iacr.org/2015/593}, } @misc{cryptoeprint:2015:594, author = {Debrup Chakraborty and Cuauhtemoc Mancillas-Lopez and Palash Sarkar}, title = {Disk Encryption: Do We Need to Preserve Length?}, howpublished = {Cryptology ePrint Archive, Report 2015/594}, year = {2015}, url = {https://eprint.iacr.org/2015/594}, } @misc{cryptoeprint:2015:595, author = {Nahid Farhady Ghalaty and Bilgiday Yuce and Mostafa Taha and Patrick Schaumont}, title = {Differential Fault Intensity Analysis}, howpublished = {Cryptology ePrint Archive, Report 2015/595}, year = {2015}, url = {https://eprint.iacr.org/2015/595}, } @misc{cryptoeprint:2015:596, author = {Jean-Sebastien Coron and Craig Gentry and Shai Halevi and Tancrede Lepoint and Hemanta K. Maji and Eric Miles and Mariana Raykova and Amit Sahai and Mehdi Tibouchi}, title = {Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations}, howpublished = {Cryptology ePrint Archive, Report 2015/596}, year = {2015}, url = {https://eprint.iacr.org/2015/596}, } @misc{cryptoeprint:2015:597, author = {Amir Moradi and Alexander Wild}, title = {Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads?}, howpublished = {Cryptology ePrint Archive, Report 2015/597}, year = {2015}, url = {https://eprint.iacr.org/2015/597}, } @misc{cryptoeprint:2015:598, author = {Martin Pettai and Peeter Laud}, title = {Combining Differential Privacy and Secure Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2015/598}, year = {2015}, url = {https://eprint.iacr.org/2015/598}, } @misc{cryptoeprint:2015:599, author = {Krzysztof Pietrzak and Maciej Skorski}, title = {The Chain Rule for HILL Pseudoentropy, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2015/599}, year = {2015}, url = {https://eprint.iacr.org/2015/599}, } @misc{cryptoeprint:2015:600, author = {John Kelsey and Kerry A. McKay and Meltem Sonmez Turan}, title = {Predictive Models for Min-Entropy Estimation}, howpublished = {Cryptology ePrint Archive, Report 2015/600}, year = {2015}, url = {https://eprint.iacr.org/2015/600}, } @misc{cryptoeprint:2015:601, author = {Mei Wang, Zheng Yuan,Xiao Feng}, title = {A Secure Oblivious Transfer Protocol from Indistinguishing Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2015/601}, year = {2015}, url = {https://eprint.iacr.org/2015/601}, } @misc{cryptoeprint:2015:602, author = {Abhishek Chakraborty and Bodhisatwa Mazumdar and Debdeep Mukhopadhay }, title = {Combined Side-Channel and Fault Analysis Attack on Protected Grain Family of Stream Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2015/602}, year = {2015}, url = {https://eprint.iacr.org/2015/602}, } @misc{cryptoeprint:2015:603, author = {Claude Carlet and Sylvain Guilley}, title = {Complementary Dual Codes for Counter-measures to Side-Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/603}, year = {2015}, url = {https://eprint.iacr.org/2015/603}, } @misc{cryptoeprint:2015:604, author = {Eike Kiltz and Jiaxin Pan and Hoeteck Wee}, title = {Structure-Preserving Signatures from Standard Assumptions, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2015/604}, year = {2015}, url = {https://eprint.iacr.org/2015/604}, } @misc{cryptoeprint:2015:605, author = {Steven D. Galbraith and Ping Wang and Fangguo Zhang}, title = {Computing Elliptic Curve Discrete Logarithms with Improved Baby-step Giant-step Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2015/605}, year = {2015}, url = {https://eprint.iacr.org/2015/605}, } @misc{cryptoeprint:2015:606, author = {Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, and Taekyoung Kwon}, title = {Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM}, howpublished = {Cryptology ePrint Archive, Report 2015/606}, year = {2015}, url = {https://eprint.iacr.org/2015/606}, } @misc{cryptoeprint:2015:607, author = {Hitesh Tewari and Eamon O Nuallain}, title = {Netcoin - A Traceable P2P Electronic Cash System}, howpublished = {Cryptology ePrint Archive, Report 2015/607}, year = {2015}, url = {https://eprint.iacr.org/2015/607}, } @misc{cryptoeprint:2015:608, author = {Shweta Agrawal and Benoit Libert and Damien Stehle}, title = {Fully Secure Functional Encryption for Inner Products, from Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2015/608}, year = {2015}, url = {https://eprint.iacr.org/2015/608}, } @misc{cryptoeprint:2015:609, author = {Igor Semaev}, title = {Experimental Study of DIGIPASS GO3 and the Security of Authentication}, howpublished = {Cryptology ePrint Archive, Report 2015/609}, year = {2015}, url = {https://eprint.iacr.org/2015/609}, } @misc{cryptoeprint:2015:610, author = {Daniel J. Bernstein and Tung Chou and Peter Schwabe}, title = {McBits: fast constant-time code-based cryptography}, howpublished = {Cryptology ePrint Archive, Report 2015/610}, year = {2015}, url = {https://eprint.iacr.org/2015/610}, } @misc{cryptoeprint:2015:611, author = {Shijun Zhao and Qianying Zhang}, title = {A Unified Security Analysis of Two-phase Key Exchange Protocols in TPM 2.0}, howpublished = {Cryptology ePrint Archive, Report 2015/611}, year = {2015}, url = {https://eprint.iacr.org/2015/611}, } @misc{cryptoeprint:2015:612, author = {Gangqiang Yang and Bo Zhu and Valentin Suder and Mark D. Aagaard and Guang Gong}, title = {The Simeck Family of Lightweight Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2015/612}, year = {2015}, url = {https://eprint.iacr.org/2015/612}, } @misc{cryptoeprint:2015:613, author = {Jianting Ning, Xiaolei Dong, Zhenfu Cao and Lifei Wei}, title = {Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud}, howpublished = {Cryptology ePrint Archive, Report 2015/613}, year = {2015}, url = {https://eprint.iacr.org/2015/613}, } @misc{cryptoeprint:2015:614, author = {Fangguo Zhang}, title = {Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem}, howpublished = {Cryptology ePrint Archive, Report 2015/614}, year = {2015}, url = {https://eprint.iacr.org/2015/614}, } @misc{cryptoeprint:2015:615, author = {Nasour Bagheri, Masoumeh Safkhani and Hoda Jannati}, title = {Security Analysis of Niu et al. Authentication and Ownership Management Protocol}, howpublished = {Cryptology ePrint Archive, Report 2015/615}, year = {2015}, url = {https://eprint.iacr.org/2015/615}, } @misc{cryptoeprint:2015:616, author = {Lukasz Olejnik and Gunes Acar and Claude Castelluccia and Claudia Diaz}, title = {The leaking battery: A privacy analysis of the HTML5 Battery Status API}, howpublished = {Cryptology ePrint Archive, Report 2015/616}, year = {2015}, url = {https://eprint.iacr.org/2015/616}, } @misc{cryptoeprint:2015:617, author = {Boris Skoric and Wouter de Groot}, title = {Generalised tally-based decoders for traitor tracing and group testing}, howpublished = {Cryptology ePrint Archive, Report 2015/617}, year = {2015}, url = {https://eprint.iacr.org/2015/617}, } @misc{cryptoeprint:2015:618, author = {Juan Carlos Ku-Cauich and Guillermo Morales-Luna and Horacio Tapia-Recillas}, title = {An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities}, howpublished = {Cryptology ePrint Archive, Report 2015/618}, year = {2015}, url = {https://eprint.iacr.org/2015/618}, } @misc{cryptoeprint:2015:619, author = {Seher Tutdere and Osmanbey Uzunkol}, title = {Construction of Arithmetic Secret Sharing Schemes by Using Torsion Limits}, howpublished = {Cryptology ePrint Archive, Report 2015/619}, year = {2015}, url = {https://eprint.iacr.org/2015/619}, } @misc{cryptoeprint:2015:620, author = {Susumu Kiyoshima}, title = {Statistical Concurrent Non-malleable Zero-knowledge from One-way Functions}, howpublished = {Cryptology ePrint Archive, Report 2015/620}, year = {2015}, url = {https://eprint.iacr.org/2015/620}, } @misc{cryptoeprint:2015:621, author = {Sarani Bhattacharya, Debdeep Mukhopadhyay}, title = {Who watches the watchmen? : Utilizing Performance Monitors for Compromising keys of RSA on Intel Platforms}, howpublished = {Cryptology ePrint Archive, Report 2015/621}, year = {2015}, url = {https://eprint.iacr.org/2015/621}, } @misc{cryptoeprint:2015:622, author = {Nicolas Méloni and M. Anwar Hasan}, title = {Random Digit Representation of Integers}, howpublished = {Cryptology ePrint Archive, Report 2015/622}, year = {2015}, url = {https://eprint.iacr.org/2015/622}, } @misc{cryptoeprint:2015:623, author = {Abdelkarim Cherkaoui, Lilian Bossuet and Cédric Marchand}, title = {Design, Evaluation and Optimization of Physical Unclonable Functions based on Transient Effect Ring Oscillators}, howpublished = {Cryptology ePrint Archive, Report 2015/623}, year = {2015}, url = {https://eprint.iacr.org/2015/623}, } @misc{cryptoeprint:2015:624, author = {Viet Tung Hoang and Jonathan Katz and Alex J. Malozemoff}, title = {Automated Analysis and Synthesis of Authenticated Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2015/624}, year = {2015}, url = {https://eprint.iacr.org/2015/624}, } @misc{cryptoeprint:2015:625, author = {Mike Hamburg}, title = {Ed448-Goldilocks, a new elliptic curve}, howpublished = {Cryptology ePrint Archive, Report 2015/625}, year = {2015}, url = {https://eprint.iacr.org/2015/625}, } @misc{cryptoeprint:2015:626, author = {Georg Fuchsbauer and Christian Hanser and Daniel Slamanig}, title = {Practical Round-Optimal Blind Signatures in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2015/626}, year = {2015}, url = {https://eprint.iacr.org/2015/626}, } @misc{cryptoeprint:2015:627, author = {Justin Holmgren}, title = {On Necessary Padding with IO}, howpublished = {Cryptology ePrint Archive, Report 2015/627}, year = {2015}, url = {https://eprint.iacr.org/2015/627}, } @misc{cryptoeprint:2015:628, author = {Daniel Cabarcas and Denise Demirel and Florian Göpfert and Jean Lancrenon and Thomas Wunderer}, title = {An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme}, howpublished = {Cryptology ePrint Archive, Report 2015/628}, year = {2015}, url = {https://eprint.iacr.org/2015/628}, } @misc{cryptoeprint:2015:629, author = {Pyrros Chaidos and Véronique Cortier and Georg Fuchsbauer and David Galindo}, title = {BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme}, howpublished = {Cryptology ePrint Archive, Report 2015/629}, year = {2015}, url = {https://eprint.iacr.org/2015/629}, } @misc{cryptoeprint:2015:630, author = {Ivan Damg{\aa}rd and Jesper Buus Nielsen and Rafail Ostovsky and Adi Rosen}, title = {Unconditionally Secure Computation with Reduced Interaction}, howpublished = {Cryptology ePrint Archive, Report 2015/630}, year = {2015}, url = {https://eprint.iacr.org/2015/630}, } @misc{cryptoeprint:2015:631, author = {Thomas P\"oppelmann and Michael Naehrig and Andrew Putnam and Adrian Macias}, title = {Accelerating Homomorphic Evaluation on Reconfigurable Hardware}, howpublished = {Cryptology ePrint Archive, Report 2015/631}, year = {2015}, url = {https://eprint.iacr.org/2015/631}, } @misc{cryptoeprint:2015:632, author = {Mohammad Mahmoody and Ameer Mohammed and Soheil Nematihaji}, title = {On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models}, howpublished = {Cryptology ePrint Archive, Report 2015/632}, year = {2015}, url = {https://eprint.iacr.org/2015/632}, } @misc{cryptoeprint:2015:633, author = {Mehmet Sabır Kiraz, İsa Sertkaya, Osmanbey Uzunkol}, title = {An Efficient ID-Based Message Recoverable Privacy-Preserving Auditing Scheme}, howpublished = {Cryptology ePrint Archive, Report 2015/633}, year = {2015}, url = {https://eprint.iacr.org/2015/633}, } @misc{cryptoeprint:2015:634, author = {Benny Pinkas and Thomas Schneider and Gil Segev and Michael Zohner}, title = {Phasing: Private Set Intersection using Permutation-based Hashing}, howpublished = {Cryptology ePrint Archive, Report 2015/634}, year = {2015}, url = {https://eprint.iacr.org/2015/634}, } @misc{cryptoeprint:2015:635, author = {Chris Pavlovski and Colin Boyd}, title = {Microcash: Efficient Off-Line Small Payments}, howpublished = {Cryptology ePrint Archive, Report 2015/635}, year = {2015}, url = {https://eprint.iacr.org/2015/635}, } @misc{cryptoeprint:2015:636, author = {Matthias Hamann and Matthias Krause}, title = {On Stream Ciphers with Provable Beyond-the-Birthday-Bound Security against Time-Memory-Data Tradeoff Attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/636}, year = {2015}, url = {https://eprint.iacr.org/2015/636}, } @misc{cryptoeprint:2015:637, author = {Fenghua Li and Yanchao Wang and Rongna Xie and Jinbo Xiong and Fangfang Shan}, title = {A Novel Cyberspace-Oriented Access Control Model}, howpublished = {Cryptology ePrint Archive, Report 2015/637}, year = {2015}, url = {https://eprint.iacr.org/2015/637}, } @misc{cryptoeprint:2015:638, author = {Marco Indaco and Fabio Lauri and Andrea Miele and Pascal Trotta}, title = {An Efficient Many-Core Architecture for Elliptic Curve Cryptography Security Assessment}, howpublished = {Cryptology ePrint Archive, Report 2015/638}, year = {2015}, url = {https://eprint.iacr.org/2015/638}, } @misc{cryptoeprint:2015:639, author = {Hao Chen}, title = {Polynomial Time Reduction from Approximate Shortest Vector Problem to Principal Ideal Problem for Lattices in Some Cyclotomic Rings}, howpublished = {Cryptology ePrint Archive, Report 2015/639}, year = {2015}, url = {https://eprint.iacr.org/2015/639}, } @misc{cryptoeprint:2015:640, author = {Luís T. A. N. Brandão}, title = {Very-efficient simulatable flipping of many coins into a well}, howpublished = {Cryptology ePrint Archive, Report 2015/640}, year = {2015}, url = {https://eprint.iacr.org/2015/640}, } @misc{cryptoeprint:2015:641, author = {Jing Li, Licheng Wang}, title = {Noise-Free Symmetric Fully Homomorphic Encryption Based on Non-Commutative Rings}, howpublished = {Cryptology ePrint Archive, Report 2015/641}, year = {2015}, url = {https://eprint.iacr.org/2015/641}, } @misc{cryptoeprint:2015:642, author = {Muhammed F. Esgin and Mehmet S. Kiraz and Osmanbey Uzunkol}, title = {A New Partial Key Exposure Attack on Multi-power RSA}, howpublished = {Cryptology ePrint Archive, Report 2015/642}, year = {2015}, url = {https://eprint.iacr.org/2015/642}, } @misc{cryptoeprint:2015:643, author = {Jonathan Bootle and Andrea Cerulli and Pyrros Chaidos and Essam Ghadafi and Jens Groth and Christophe Petit}, title = {Short Accountable Ring Signatures Based on DDH}, howpublished = {Cryptology ePrint Archive, Report 2015/643}, year = {2015}, url = {https://eprint.iacr.org/2015/643}, } @misc{cryptoeprint:2015:644, author = {Adam Everspaugh and Rahul Chatterjee and Samuel Scott and Ari Juels and Thomas Ristenpart}, title = {The Pythia PRF Service}, howpublished = {Cryptology ePrint Archive, Report 2015/644}, year = {2015}, url = {https://eprint.iacr.org/2015/644}, } @misc{cryptoeprint:2015:645, author = {Clémentine Gritti, Rongmao Chen, Willy Susilo and Thomas Plantard}, title = {New Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy}, howpublished = {Cryptology ePrint Archive, Report 2015/645}, year = {2015}, url = {https://eprint.iacr.org/2015/645}, } @misc{cryptoeprint:2015:646, author = {Alex Biryukov and Dmitry Khovratovich}, title = {Decomposition attack on SASASASAS}, howpublished = {Cryptology ePrint Archive, Report 2015/646}, year = {2015}, url = {https://eprint.iacr.org/2015/646}, } @misc{cryptoeprint:2015:647, author = {Andrea Miele and Arjen K. Lenstra}, title = {Efficient ephemeral elliptic curve cryptographic keys}, howpublished = {Cryptology ePrint Archive, Report 2015/647}, year = {2015}, url = {https://eprint.iacr.org/2015/647}, } @misc{cryptoeprint:2015:648, author = {David Bernhard and Marc Fischlin and Bogdan Warinschi}, title = {Adaptive Proofs of Knowledge in the Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2015/648}, year = {2015}, url = {https://eprint.iacr.org/2015/648}, } @misc{cryptoeprint:2015:649, author = {David Bernhard and Marc Fischlin and Bogdan Warinschi}, title = {On the Hardness of Proving CCA-security of Signed ElGamal}, howpublished = {Cryptology ePrint Archive, Report 2015/649}, year = {2015}, url = {https://eprint.iacr.org/2015/649}, } @misc{cryptoeprint:2015:650, author = {Roman Oliynykov and Ivan Gorbenko and Oleksandr Kazymyrov and Victor Ruzhentsev and Oleksandr Kuznetsov and Yurii Gorbenko and Oleksandr Dyrda and Viktor Dolgov and Andrii Pushkaryov and Ruslan Mordvinov and Dmytro Kaidalov}, title = {A New Encryption Standard of Ukraine: The Kalyna Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2015/650}, year = {2015}, url = {https://eprint.iacr.org/2015/650}, } @misc{cryptoeprint:2015:651, author = {Stephan Kleber and Florian Unterstein and Matthias Matousek and Frank Kargl and Frank Slomka and Matthias Hiller}, title = {Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/651}, year = {2015}, url = {https://eprint.iacr.org/2015/651}, } @misc{cryptoeprint:2015:652, author = {Benjamin Dowling and Douglas Stebila}, title = {Modelling ciphersuite and version negotiation in the TLS protocol}, howpublished = {Cryptology ePrint Archive, Report 2015/652}, year = {2015}, url = {https://eprint.iacr.org/2015/652}, } @misc{cryptoeprint:2015:653, author = {Giulia Traverso and Denise Demirel and Johannes Buchmann}, title = {Homomorphic Signature Schemes - A survey}, howpublished = {Cryptology ePrint Archive, Report 2015/653}, year = {2015}, url = {https://eprint.iacr.org/2015/653}, } @misc{cryptoeprint:2015:654, author = {Bo Yang and Kang Yang and Yu Qin and Zhenfeng Zhang and Dengguo Feng}, title = {DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone}, howpublished = {Cryptology ePrint Archive, Report 2015/654}, year = {2015}, url = {https://eprint.iacr.org/2015/654}, } @misc{cryptoeprint:2015:655, author = {Nizamud Din, Arif Iqbal Umar, Abdul Waheed, Noor Ul Amin}, title = {An Efficient Multi-Message Multi-Receiver Signcryption Scheme with Forward Secrecy on Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2015/655}, year = {2015}, url = {https://eprint.iacr.org/2015/655}, } @misc{cryptoeprint:2015:656, author = {Ruhul Amin and G.P. Biswas}, title = {Cryptanalysis of a Markov Chain Based User Authentication Scheme}, howpublished = {Cryptology ePrint Archive, Report 2015/656}, year = {2015}, url = {https://eprint.iacr.org/2015/656}, } @misc{cryptoeprint:2015:657, author = {Duc-Phong Le, Chik How Tan and Michael Tunstall}, title = {Randomizing the Montgomery Powering Ladder}, howpublished = {Cryptology ePrint Archive, Report 2015/657}, year = {2015}, url = {https://eprint.iacr.org/2015/657}, } @misc{cryptoeprint:2015:658, author = {Pieter Maene and Ingrid Verbauwhede}, title = {Single-Cycle Implementations of Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2015/658}, year = {2015}, url = {https://eprint.iacr.org/2015/658}, } @misc{cryptoeprint:2015:659, author = {Jean-Pierre Flori and Jérôme Plût and Jean-René Reinhard and Martin Ekerå}, title = {Diversity and Transparency for ECC}, howpublished = {Cryptology ePrint Archive, Report 2015/659}, year = {2015}, url = {https://eprint.iacr.org/2015/659}, } @misc{cryptoeprint:2015:660, author = {Léo Ducas and Thomas Prest}, title = {A Hybrid Gaussian Sampler for Lattices over Rings}, howpublished = {Cryptology ePrint Archive, Report 2015/660}, year = {2015}, url = {https://eprint.iacr.org/2015/660}, } @misc{cryptoeprint:2015:661, author = {Shane Kepley and David Russo and Rainer Steinwandt}, title = {Cryptanalysis of a modern rotor machine in a multicast setting}, howpublished = {Cryptology ePrint Archive, Report 2015/661}, year = {2015}, url = {https://eprint.iacr.org/2015/661}, } @misc{cryptoeprint:2015:662, author = {Ryutaroh Matsumoto}, title = {Strong Security of the Strongly Multiplicative Ramp Secret Sharing based on Algebraic Curves}, howpublished = {Cryptology ePrint Archive, Report 2015/662}, year = {2015}, url = {https://eprint.iacr.org/2015/662}, } @misc{cryptoeprint:2015:663, author = {Nahid Farhady Ghalaty, Bilgiday Yuce, Patrick Schaumont }, title = {Analyzing the Efficiency of Biased-Fault Based Attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/663}, year = {2015}, url = {https://eprint.iacr.org/2015/663}, } @misc{cryptoeprint:2015:664, author = {Mahnush Movahedi and Jared Saia and Mahdi Zamani}, title = {Secure Multi-Party Shuffling}, howpublished = {Cryptology ePrint Archive, Report 2015/664}, year = {2015}, url = {https://eprint.iacr.org/2015/664}, } @misc{cryptoeprint:2015:665, author = {Romain Gay and Iordanis Kerenidis and Hoeteck Wee}, title = {Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption.}, howpublished = {Cryptology ePrint Archive, Report 2015/665}, year = {2015}, url = {https://eprint.iacr.org/2015/665}, } @misc{cryptoeprint:2015:666, author = {Huaifeng Chen and Xiaoyun Wang}, title = {Improved Linear Hull Attack on Round-Reduced \textsc{Simon} with Dynamic Key-guessing Techniques}, howpublished = {Cryptology ePrint Archive, Report 2015/666}, year = {2015}, url = {https://eprint.iacr.org/2015/666}, } @misc{cryptoeprint:2015:667, author = {Ming Li and Dongdai Lin}, title = {De Bruijn Sequences from Nonlinear Feedback Shift Registers}, howpublished = {Cryptology ePrint Archive, Report 2015/667}, year = {2015}, url = {https://eprint.iacr.org/2015/667}, } @misc{cryptoeprint:2015:668, author = {Muhammad Naveed}, title = {The Fallacy of Composition of Oblivious RAM and Searchable Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/668}, year = {2015}, url = {https://eprint.iacr.org/2015/668}, } @misc{cryptoeprint:2015:669, author = {Ekawat Homsirikamol and William Diehl and Ahmed Ferozpuri and Farnoud Farahmand and Malik Umar Sharif and Kris Gaj}, title = {GMU Hardware API for Authenticated Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2015/669}, year = {2015}, url = {https://eprint.iacr.org/2015/669}, } @misc{cryptoeprint:2015:670, author = {Bruno Robisson, Michel Agoyan, Patrick Soquet, S\'ebastien Le Henaff, Franck Wajsb\"urt, Pirouz Bazargan-Sabet, Guillaume Phan}, title = {Smart Security Management in Secure Devices}, howpublished = {Cryptology ePrint Archive, Report 2015/670}, year = {2015}, url = {https://eprint.iacr.org/2015/670}, } @misc{cryptoeprint:2015:671, author = {Peeter Laud and Alisa Pankova}, title = {Privacy-preserving Frequent Itemset Mining for Sparse and Dense Data}, howpublished = {Cryptology ePrint Archive, Report 2015/671}, year = {2015}, url = {https://eprint.iacr.org/2015/671}, } @misc{cryptoeprint:2015:672, author = {Allison Bishop and Abhishek Jain and Lucas Kowalczyk}, title = {Function-Hiding Inner Product Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/672}, year = {2015}, url = {https://eprint.iacr.org/2015/672}, } @misc{cryptoeprint:2015:673, author = {Mike Hamburg}, title = {Decaf: Eliminating cofactors through point compression}, howpublished = {Cryptology ePrint Archive, Report 2015/673}, year = {2015}, url = {https://eprint.iacr.org/2015/673}, } @misc{cryptoeprint:2015:674, author = {Roman Jagomägis and Peeter Laud and Alisa Pankova}, title = {Preprocessing-Based Verification of Multiparty Protocols with Honest Majority}, howpublished = {Cryptology ePrint Archive, Report 2015/674}, year = {2015}, url = {https://eprint.iacr.org/2015/674}, } @misc{cryptoeprint:2015:675, author = {Ahmed Kosba and Andrew Miller and Elaine Shi and Zikai Wen and Charalampos Papamanthou}, title = {Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts}, howpublished = {Cryptology ePrint Archive, Report 2015/675}, year = {2015}, url = {https://eprint.iacr.org/2015/675}, } @misc{cryptoeprint:2015:676, author = {Scott Fluhrer}, title = {Quantum Cryptanalysis of NTRU}, howpublished = {Cryptology ePrint Archive, Report 2015/676}, year = {2015}, url = {https://eprint.iacr.org/2015/676}, } @misc{cryptoeprint:2015:677, author = {Daniel J. Bernstein and Simon Josefsson and Tanja Lange and Peter Schwabe and Bo-Yin Yang}, title = {EdDSA for more curves}, howpublished = {Cryptology ePrint Archive, Report 2015/677}, year = {2015}, url = {https://eprint.iacr.org/2015/677}, } @misc{cryptoeprint:2015:678, author = {Thomas Pornin}, title = {Optimizing MAKWA on GPU and CPU}, howpublished = {Cryptology ePrint Archive, Report 2015/678}, year = {2015}, url = {https://eprint.iacr.org/2015/678}, } @misc{cryptoeprint:2015:679, author = {Subhabrata Samajder and Palash Sarkar}, title = {Another Look at Normal Approximations in Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2015/679}, year = {2015}, url = {https://eprint.iacr.org/2015/679}, } @misc{cryptoeprint:2015:680, author = {Yevgeniy Dodis, Tianren Liu, Martijn Stam, John Steinberger}, title = {Indifferentiability of Confusion-Diffusion Networks}, howpublished = {Cryptology ePrint Archive, Report 2015/680}, year = {2015}, url = {https://eprint.iacr.org/2015/680}, } @misc{cryptoeprint:2015:681, author = {Susan Hohenberger and Steven Myers and Rafael Pass and abhi shelat}, title = {ANONIZE: A Large-Scale Anonymous Survey System}, howpublished = {Cryptology ePrint Archive, Report 2015/681}, year = {2015}, url = {https://eprint.iacr.org/2015/681}, } @misc{cryptoeprint:2015:682, author = {Yosuke Todo}, title = {Integral Cryptanalysis on Full MISTY1}, howpublished = {Cryptology ePrint Archive, Report 2015/682}, year = {2015}, url = {https://eprint.iacr.org/2015/682}, } @misc{cryptoeprint:2015:683, author = {Irene Giacomelli and Ruxandra F. Olimid and Samuel Ranellucci}, title = {Security of Linear Secret-Sharing Schemes against Mass Surveillance}, howpublished = {Cryptology ePrint Archive, Report 2015/683}, year = {2015}, url = {https://eprint.iacr.org/2015/683}, } @misc{cryptoeprint:2015:684, author = {Aggelos Kiayias and Yona Raekow and Alexander Russell and Narasimha Shashidhar}, title = {A One-time Stegosystem and Applications to Efficient Covert Communication}, howpublished = {Cryptology ePrint Archive, Report 2015/684}, year = {2015}, url = {https://eprint.iacr.org/2015/684}, } @misc{cryptoeprint:2015:685, author = {Robert Granger and Thorsten Kleinjung and Jens Zumbr\"agel}, title = {On the discrete logarithm problem in finite fields of fixed characteristic}, howpublished = {Cryptology ePrint Archive, Report 2015/685}, year = {2015}, url = {https://eprint.iacr.org/2015/685}, } @misc{cryptoeprint:2015:686, author = {Azeem Irshad and Muhammad Sher and Shahzad Ashraf and Shahzad faisal and Mahmood Ul Hassan}, title = {Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment}, howpublished = {Cryptology ePrint Archive, Report 2015/686}, year = {2015}, url = {https://eprint.iacr.org/2015/686}, } @misc{cryptoeprint:2015:687, author = {Sean Hallgren and Adam Smith and Fang Song}, title = {Classical Cryptographic Protocols in a Quantum World}, howpublished = {Cryptology ePrint Archive, Report 2015/687}, year = {2015}, url = {https://eprint.iacr.org/2015/687}, } @misc{cryptoeprint:2015:688, author = {Hwajeong Seo and Zhe Liu and Yasuyuki Nogami and Jongseok Choi and Howon Kim }, title = {Binary Field Multiplication on ARMv8}, howpublished = {Cryptology ePrint Archive, Report 2015/688}, year = {2015}, url = {https://eprint.iacr.org/2015/688}, } @misc{cryptoeprint:2015:689, author = {Daniel P. Martin and Jonathan F. O'Connell and Elisabeth Oswald and Martijn Stam}, title = {Counting Keys in Parallel After a Side Channel Attack}, howpublished = {Cryptology ePrint Archive, Report 2015/689}, year = {2015}, url = {https://eprint.iacr.org/2015/689}, } @misc{cryptoeprint:2015:690, author = {Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar}, title = {Systematic Reverse Engineering of Cache Slice Selection in Intel Processors}, howpublished = {Cryptology ePrint Archive, Report 2015/690}, year = {2015}, url = {https://eprint.iacr.org/2015/690}, } @misc{cryptoeprint:2015:691, author = {Cong Chen and Mehmet Sinan Inci and Mostafa Taha and Thomas Eisenbarth}, title = {SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs}, howpublished = {Cryptology ePrint Archive, Report 2015/691}, year = {2015}, url = {https://eprint.iacr.org/2015/691}, } @misc{cryptoeprint:2015:692, author = {Yoshinori Aono and Takuya Hayashi and Le Trieu Phong and Lihua Wang}, title = {Fast and Secure Linear Regression and Biometric Authentication with Security Update}, howpublished = {Cryptology ePrint Archive, Report 2015/692}, year = {2015}, url = {https://eprint.iacr.org/2015/692}, } @misc{cryptoeprint:2015:693, author = {Jesper Buus Nielsen and Samuel Ranellucci}, title = {Foundations of Reactive Garbling Schemes}, howpublished = {Cryptology ePrint Archive, Report 2015/693}, year = {2015}, url = {https://eprint.iacr.org/2015/693}, } @misc{cryptoeprint:2015:694, author = {Tore Kasper Frederiksen and Thomas P. Jakobsen and Jesper Buus Nielsen and Roberto Trifiletti}, title = {On the Complexity of Additively Homomorphic UC Commitments}, howpublished = {Cryptology ePrint Archive, Report 2015/694}, year = {2015}, url = {https://eprint.iacr.org/2015/694}, } @misc{cryptoeprint:2015:695, author = {Alexander Russell and Qiang Tang and Moti Yung and Hong-Sheng Zhou}, title = {Cliptography: Clipping the Power of Kleptographic Attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/695}, year = {2015}, url = {https://eprint.iacr.org/2015/695}, } @misc{cryptoeprint:2015:696, author = {Miguel Morales Sandoval and Arturo Diaz Perez}, title = {Novel algorithms and hardware architectures for Montgomery Multiplication over GF(p)}, howpublished = {Cryptology ePrint Archive, Report 2015/696}, year = {2015}, url = {https://eprint.iacr.org/2015/696}, } @misc{cryptoeprint:2015:697, author = {Yandong Zheng, Hua Guo}, title = {On the Security of a Self-healing Group Key Distribution Scheme}, howpublished = {Cryptology ePrint Archive, Report 2015/697}, year = {2015}, url = {https://eprint.iacr.org/2015/697}, } @misc{cryptoeprint:2015:698, author = {Subhamoy Maitra}, title = {Chosen IV Cryptanalysis on Reduced Round ChaCha and Salsa}, howpublished = {Cryptology ePrint Archive, Report 2015/698}, year = {2015}, url = {https://eprint.iacr.org/2015/698}, } @misc{cryptoeprint:2015:699, author = {Ayantika Chatterjee and Indranil Sengupta}, title = {FURISC: FHE Encrypted URISC Design}, howpublished = {Cryptology ePrint Archive, Report 2015/699}, year = {2015}, url = {https://eprint.iacr.org/2015/699}, } @misc{cryptoeprint:2015:700, author = {Jimmy Jose and Dipanwita RoyChowdhury}, title = {Four Neighbourhood Cellular Automata as Better Cryptographic Primitives}, howpublished = {Cryptology ePrint Archive, Report 2015/700}, year = {2015}, url = {https://eprint.iacr.org/2015/700}, } @misc{cryptoeprint:2015:701, author = {Sébastien Canard and Baptiste Olivier and Tony Quertier}, title = {Differentially private instance-based noise mechanisms in practice}, howpublished = {Cryptology ePrint Archive, Report 2015/701}, year = {2015}, url = {https://eprint.iacr.org/2015/701}, } @misc{cryptoeprint:2015:702, author = {Loi Luu and Jason Teutsch and Raghav Kulkarni and Prateek Saxena}, title = {Demystifying incentives in the consensus computer}, howpublished = {Cryptology ePrint Archive, Report 2015/702}, year = {2015}, url = {https://eprint.iacr.org/2015/702}, } @misc{cryptoeprint:2015:703, author = {Mihir Bellare and Igors Stepanovs}, title = {Point-Function Obfuscation: A Framework and Generic Constructions}, howpublished = {Cryptology ePrint Archive, Report 2015/703}, year = {2015}, url = {https://eprint.iacr.org/2015/703}, } @misc{cryptoeprint:2015:704, author = {Nir Bitansky and Vinod Vaikuntanathan}, title = {Indistinguishability Obfuscation: from Approximate to Exact}, howpublished = {Cryptology ePrint Archive, Report 2015/704}, year = {2015}, url = {https://eprint.iacr.org/2015/704}, } @misc{cryptoeprint:2015:705, author = {Ashish Choudhury and Emmanuela Orsini and Arpita Patra and Nigel P. Smart}, title = {Linear Overhead Optimally-resilient Robust MPC Using Preprocessing}, howpublished = {Cryptology ePrint Archive, Report 2015/705}, year = {2015}, url = {https://eprint.iacr.org/2015/705}, } @misc{cryptoeprint:2015:706, author = {Stefan Kölbl and Arnab Roy}, title = {A Brief Comparison of Simon and Simeck}, howpublished = {Cryptology ePrint Archive, Report 2015/706}, year = {2015}, url = {https://eprint.iacr.org/2015/706}, } @misc{cryptoeprint:2015:707, author = {Siamak F. Shahandashti and Reihaneh Safavi-Naini and Nashad Ahmed Safa}, title = {Reconciling User Privacy and Implicit Authentication for Mobile Devices}, howpublished = {Cryptology ePrint Archive, Report 2015/707}, year = {2015}, url = {https://eprint.iacr.org/2015/707}, } @misc{cryptoeprint:2015:708, author = {Jeff Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte and Zhenfei Zhang}, title = {Choosing Parameters for NTRUEncrypt}, howpublished = {Cryptology ePrint Archive, Report 2015/708}, year = {2015}, url = {https://eprint.iacr.org/2015/708}, } @misc{cryptoeprint:2015:709, author = {Luka Malisa and Kari Kostiainen and Srdjan Capkun}, title = {Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception}, howpublished = {Cryptology ePrint Archive, Report 2015/709}, year = {2015}, url = {https://eprint.iacr.org/2015/709}, } @misc{cryptoeprint:2015:710, author = {Bernardo Ferreira and Jo\~{a}o Rodrigues and Jo\~{a}o Leit\~{a}o and Henrique Domingos}, title = {Privacy-Preserving Content-Based Image Retrieval in the Cloud (Extended Version)}, howpublished = {Cryptology ePrint Archive, Report 2015/710}, year = {2015}, url = {https://eprint.iacr.org/2015/710}, } @misc{cryptoeprint:2015:711, author = {Anne Canteaut and Sébastien Duval and Gaëtan Leurent}, title = {Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2015/711}, year = {2015}, url = {https://eprint.iacr.org/2015/711}, } @misc{cryptoeprint:2015:712, author = {David Bernhard and Bogdan Warinschi and Ngoc Khanh Nguyen}, title = {Adaptive Proofs have Straightline Extractors (in the Random Oracle Model)}, howpublished = {Cryptology ePrint Archive, Report 2015/712}, year = {2015}, url = {https://eprint.iacr.org/2015/712}, } @misc{cryptoeprint:2015:713, author = {Ka Ahmad Khoureich}, title = {Light-hHB: A New Version of hHB with Improved Session Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2015/713}, year = {2015}, url = {https://eprint.iacr.org/2015/713}, } @misc{cryptoeprint:2015:714, author = {Masao KASAHARA}, title = {New classes of public key cryptosystem K(XVI)SE(1)PKC constructed based on Reed-Solomon code over extension field of m=8 and K(XVI)SE(2)PKC, based on binary cyclic code.}, howpublished = {Cryptology ePrint Archive, Report 2015/714}, year = {2015}, url = {https://eprint.iacr.org/2015/714}, } @misc{cryptoeprint:2015:715, author = {Allison Bishop and Susan Hohenberger and Brent Waters}, title = {New Circular Security Counterexamples from Decision Linear and Learning with Errors}, howpublished = {Cryptology ePrint Archive, Report 2015/715}, year = {2015}, url = {https://eprint.iacr.org/2015/715}, } @misc{cryptoeprint:2015:716, author = {Nasour Bagheri}, title = {Linear Cryptanalysis of Reduced-Round SIMECK Variants}, howpublished = {Cryptology ePrint Archive, Report 2015/716}, year = {2015}, url = {https://eprint.iacr.org/2015/716}, } @misc{cryptoeprint:2015:717, author = {Pei Luo and Liwei Zhang and Yunsi Fei and A. Adam Ding}, title = {Towards Secure Cryptographic Software Implementation Against Side-Channel Power Analysis Attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/717}, year = {2015}, url = {https://eprint.iacr.org/2015/717}, } @misc{cryptoeprint:2015:718, author = {Leonid Reyzin and Sophia Yakoubov}, title = {Efficient Asynchronous Accumulators for Distributed PKI}, howpublished = {Cryptology ePrint Archive, Report 2015/718}, year = {2015}, url = {https://eprint.iacr.org/2015/718}, } @misc{cryptoeprint:2015:719, author = {Oscar Reparaz and Begül Bilgin and Svetla Nikova and Benedikt Gierlichs and Ingrid Verbauwhede}, title = {Consolidating masking schemes}, howpublished = {Cryptology ePrint Archive, Report 2015/719}, year = {2015}, url = {https://eprint.iacr.org/2015/719}, } @misc{cryptoeprint:2015:720, author = {Huijia Lin and Rafael Pass and Karn Seth and Sidharth Telang}, title = {Output-Compressing Randomized Encodings and Applications}, howpublished = {Cryptology ePrint Archive, Report 2015/720}, year = {2015}, url = {https://eprint.iacr.org/2015/720}, } @misc{cryptoeprint:2015:721, author = {Hoeteck Wee}, title = {KDM-Security via Homomorphic Smooth Projective Hashing}, howpublished = {Cryptology ePrint Archive, Report 2015/721}, year = {2015}, url = {https://eprint.iacr.org/2015/721}, } @misc{cryptoeprint:2015:722, author = {Tarik Moataz and Erik-Oliver Blass}, title = {Oblivious Substring Search with Updates}, howpublished = {Cryptology ePrint Archive, Report 2015/722}, year = {2015}, url = {https://eprint.iacr.org/2015/722}, } @misc{cryptoeprint:2015:723, author = {Alex Biryukov and Gaëtan Leurent and Léo Perrin}, title = {Cryptanalysis of Feistel Networks with Secret Round Functions}, howpublished = {Cryptology ePrint Archive, Report 2015/723}, year = {2015}, url = {https://eprint.iacr.org/2015/723}, } @misc{cryptoeprint:2015:724, author = {Oscar Reparaz and Sujoy Sinha Roy and Frederik Vercauteren and Ingrid Verbauwhede}, title = {A masked ring-LWE implementation}, howpublished = {Cryptology ePrint Archive, Report 2015/724}, year = {2015}, url = {https://eprint.iacr.org/2015/724}, } @misc{cryptoeprint:2015:725, author = {Eric Verheul and Sietse Ringers and Jaap-Henk Hoepman}, title = {The self-blindable U-Prove scheme from FC'14 is forgeable}, howpublished = {Cryptology ePrint Archive, Report 2015/725}, year = {2015}, url = {https://eprint.iacr.org/2015/725}, } @misc{cryptoeprint:2015:726, author = {Vladimir Shpilrain and Bianca Sosnovski}, title = {Compositions of linear functions and applications to hashing}, howpublished = {Cryptology ePrint Archive, Report 2015/726}, year = {2015}, url = {https://eprint.iacr.org/2015/726}, } @misc{cryptoeprint:2015:727, author = {Josep Balasch and Benedikt Gierlichs and Oscar Reparaz and Ingrid Verbauwhede}, title = {DPA, Bitslicing and Masking at 1 GHz}, howpublished = {Cryptology ePrint Archive, Report 2015/727}, year = {2015}, url = {https://eprint.iacr.org/2015/727}, } @misc{cryptoeprint:2015:728, author = {Richard J. Lipton and Rafail Ostrovsky and Vassilis Zikas}, title = {Provable Virus Detection: Using the Uncertainty Principle to Protect Against Malware}, howpublished = {Cryptology ePrint Archive, Report 2015/728}, year = {2015}, url = {https://eprint.iacr.org/2015/728}, } @misc{cryptoeprint:2015:729, author = {Alexandra Boldyreva and Taesoo Kim and Richard Lipton and Bogdan Warinschi}, title = {Provably-Secure Remote Memory Attestation to Prevent Heap Overflow Attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/729}, year = {2015}, url = {https://eprint.iacr.org/2015/729}, } @misc{cryptoeprint:2015:730, author = {Prabhanjan Ananth and Abhishek Jain and Amit Sahai}, title = {Indistinguishability Obfuscation from Functional Encryption for Simple Functions}, howpublished = {Cryptology ePrint Archive, Report 2015/730}, year = {2015}, url = {https://eprint.iacr.org/2015/730}, } @misc{cryptoeprint:2015:731, author = {Rodrigo Abarzúa and Santi Martínez and Valeria Mendoza}, title = {Same Value Analysis on Edwards Curves}, howpublished = {Cryptology ePrint Archive, Report 2015/731}, year = {2015}, url = {https://eprint.iacr.org/2015/731}, } @misc{cryptoeprint:2015:732, author = {Hwajeong Seo and Zhe Liu and Jongseok Choi and Taehwan Park and and Howon Kim}, title = {Compact Implementations of LEA Block Cipher for Low-End Microprocessors}, howpublished = {Cryptology ePrint Archive, Report 2015/732}, year = {2015}, url = {https://eprint.iacr.org/2015/732}, } @misc{cryptoeprint:2015:733, author = {Masahiro Yagisawa}, title = {Fully Homomorphic Encryption on Octonion Ring}, howpublished = {Cryptology ePrint Archive, Report 2015/733}, year = {2015}, url = {https://eprint.iacr.org/2015/733}, } @misc{cryptoeprint:2015:734, author = {Manoj Kumar and Saibal K. Pal and Anupama Panigrahi}, title = {On the Security of Extended Generalized Feistel Networks}, howpublished = {Cryptology ePrint Archive, Report 2015/734}, year = {2015}, url = {https://eprint.iacr.org/2015/734}, } @misc{cryptoeprint:2015:735, author = {Ilan Komargodski and Mark Zhandry}, title = {Cutting-Edge Cryptography Through the Lens of Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2015/735}, year = {2015}, url = {https://eprint.iacr.org/2015/735}, } @misc{cryptoeprint:2015:736, author = {Mingqiang Wang and Xiaoyun Wang and Kunxian Xia and Jincheng Zhuang}, title = {Solving LWE via List Decoding}, howpublished = {Cryptology ePrint Archive, Report 2015/736}, year = {2015}, url = {https://eprint.iacr.org/2015/736}, } @misc{cryptoeprint:2015:737, author = {Gu Chunsheng}, title = {New multilinear maps from ideal lattices}, howpublished = {Cryptology ePrint Archive, Report 2015/737}, year = {2015}, url = {https://eprint.iacr.org/2015/737}, } @misc{cryptoeprint:2015:738, author = {Kazuhiko Minematsu}, title = {Authenticated Encryption with Small Stretch (or, How to Accelerate AERO) }, howpublished = {Cryptology ePrint Archive, Report 2015/738}, year = {2015}, url = {https://eprint.iacr.org/2015/738}, } @misc{cryptoeprint:2015:739, author = {Hung Dang and Yun Long Chong and Francois Brun and Ee-Chien Chang}, title = {Practical and Scalable Sharing of Encrypted Data in Cloud Storage with Key Aggregation}, howpublished = {Cryptology ePrint Archive, Report 2015/739}, year = {2015}, url = {https://eprint.iacr.org/2015/739}, } @misc{cryptoeprint:2015:740, author = {Antonio Faonio and Jesper Buus Nielsen and Daniele Venturi}, title = {Predictable Arguments of Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2015/740}, year = {2015}, url = {https://eprint.iacr.org/2015/740}, } @misc{cryptoeprint:2015:741, author = {Mohammad Hajiabadi, Bruce M. Kapron, Venkatesh Srinivasan}, title = {On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2015/741}, year = {2015}, url = {https://eprint.iacr.org/2015/741}, } @misc{cryptoeprint:2015:742, author = {Can K{\i}z{\i}lkale and \"{O}mer E\v{g}ecio\v{g}lu and \c{C}etin Kaya Ko\c{c}}, title = {A Matrix Decomposition Method for Optimal Normal Basis Multiplication}, howpublished = {Cryptology ePrint Archive, Report 2015/742}, year = {2015}, url = {https://eprint.iacr.org/2015/742}, } @misc{cryptoeprint:2015:743, author = {Benoit Libert and Thomas Peters and Moti Yung}, title = {Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2015/743}, year = {2015}, url = {https://eprint.iacr.org/2015/743}, } @misc{cryptoeprint:2015:744, author = {Ege Gulcan and Aydin Aysu and Patrick Schaumont}, title = {BitCryptor: Bit-Serialized Compact Crypto Engine on Reconfigurable Hardware}, howpublished = {Cryptology ePrint Archive, Report 2015/744}, year = {2015}, url = {https://eprint.iacr.org/2015/744}, } @misc{cryptoeprint:2015:745, author = {Hwajeong Seo}, title = {Faster ECC over F2571 (feat. PMULL)}, howpublished = {Cryptology ePrint Archive, Report 2015/745}, year = {2015}, url = {https://eprint.iacr.org/2015/745}, } @misc{cryptoeprint:2015:746, author = {Achiya Bar-On}, title = {A 2^{70} Attack on the Full MISTY1}, howpublished = {Cryptology ePrint Archive, Report 2015/746}, year = {2015}, url = {https://eprint.iacr.org/2015/746}, } @misc{cryptoeprint:2015:747, author = {Huang Zhang and Fangguo Zhang and Baodian Wei and Yusong Du}, title = {Self-bilinear Map from One Way Encoding System and Indistinguishability Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2015/747}, year = {2015}, url = {https://eprint.iacr.org/2015/747}, } @misc{cryptoeprint:2015:748, author = {Jean Paul Degabriele and Pooya Farshim and Bertram Poettering}, title = {A More Cautious Approach to Security Against Mass Surveillance}, howpublished = {Cryptology ePrint Archive, Report 2015/748}, year = {2015}, url = {https://eprint.iacr.org/2015/748}, } @misc{cryptoeprint:2015:749, author = {Pascal Sasdrich and Amir Moradi and Tim Güneysu}, title = {Affine Equivalence and its Application to Tightening Threshold Implementations}, howpublished = {Cryptology ePrint Archive, Report 2015/749}, year = {2015}, url = {https://eprint.iacr.org/2015/749}, } @misc{cryptoeprint:2015:750, author = {Ryo Nishimaki and Daniel Wichs and Mark Zhandry}, title = {Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key}, howpublished = {Cryptology ePrint Archive, Report 2015/750}, year = {2015}, url = {https://eprint.iacr.org/2015/750}, } @misc{cryptoeprint:2015:751, author = {Shay Gueron and Yehuda Lindell and Ariel Nof and Benny Pinkas}, title = {Fast Garbling of Circuits Under Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2015/751}, year = {2015}, url = {https://eprint.iacr.org/2015/751}, } @misc{cryptoeprint:2015:752, author = {Gilad Asharov and Gil Segev}, title = {On Constructing One-Way Permutations from Indistinguishability Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2015/752}, year = {2015}, url = {https://eprint.iacr.org/2015/752}, } @misc{cryptoeprint:2015:753, author = {Joppe W. Bos and Charles Hubain and Wil Michiels and Philippe Teuwen}, title = {Differential Computation Analysis: Hiding your White-Box Designs is Not Enough}, howpublished = {Cryptology ePrint Archive, Report 2015/753}, year = {2015}, url = {https://eprint.iacr.org/2015/753}, } @misc{cryptoeprint:2015:754, author = {Anne Canteaut and Virginie Lallemand and Mar\'ia Naya-Plasencia}, title = {Related-Key Attack on Full-Round PICARO}, howpublished = {Cryptology ePrint Archive, Report 2015/754}, year = {2015}, url = {https://eprint.iacr.org/2015/754}, } @misc{cryptoeprint:2015:755, author = {Erdem Alkim and Nina Bindel and Johannes Buchmann and Özgür Dagdelen and Edward Eaton and Gus Gutoski and Juliane Krämer and Filip Pawlega}, title = {Revisiting TESLA in the quantum random oracle model}, howpublished = {Cryptology ePrint Archive, Report 2015/755}, year = {2015}, url = {https://eprint.iacr.org/2015/755}, } @misc{cryptoeprint:2015:756, author = {Yandong Zheng, Hua Guo}, title = {Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme}, howpublished = {Cryptology ePrint Archive, Report 2015/756}, year = {2015}, url = {https://eprint.iacr.org/2015/756}, } @misc{cryptoeprint:2015:757, author = {Matthias Hamann and Matthias Krause}, title = {Stream Cipher Operation Modes with Improved Security against Generic Collision Attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/757}, year = {2015}, url = {https://eprint.iacr.org/2015/757}, } @misc{cryptoeprint:2015:758, author = {Yara Elias and Kristin E. Lauter and Ekin Ozman and Katherine E. Stange}, title = {Ring-LWE Cryptography for the Number Theorist}, howpublished = {Cryptology ePrint Archive, Report 2015/758}, year = {2015}, url = {https://eprint.iacr.org/2015/758}, } @misc{cryptoeprint:2015:759, author = {Alice Pellet-Mary and Damien Stehle}, title = {Cryptanalysis of Gu's ideal multilinear map}, howpublished = {Cryptology ePrint Archive, Report 2015/759}, year = {2015}, url = {https://eprint.iacr.org/2015/759}, } @misc{cryptoeprint:2015:760, author = {Pol Van Aubel and Daniel J. Bernstein and Ruben Niederhagen}, title = {Investigating SRAM PUFs in large CPUs and GPUs}, howpublished = {Cryptology ePrint Archive, Report 2015/760}, year = {2015}, url = {https://eprint.iacr.org/2015/760}, } @misc{cryptoeprint:2015:761, author = {William Diehl}, title = {Implementation of the SCREAM Tweakable Block Cipher in MSP430 Assembly Language}, howpublished = {Cryptology ePrint Archive, Report 2015/761}, year = {2015}, url = {https://eprint.iacr.org/2015/761}, } @misc{cryptoeprint:2015:762, author = {Riham AlTawy and Ahmed Abdelkhalek and Amr M. Youssef}, title = {A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b}, howpublished = {Cryptology ePrint Archive, Report 2015/762}, year = {2015}, url = {https://eprint.iacr.org/2015/762}, } @misc{cryptoeprint:2015:763, author = {Rei Ueno, Naofumi Homma, Yukihiro Sugawara, Yasuyuki Nogami, and Takafumi Aoki}, title = {Highly Efficient GF(2^8) Inversion Circuit Based on Redundant GF Arithmetic and Its Application to AES Design}, howpublished = {Cryptology ePrint Archive, Report 2015/763}, year = {2015}, url = {https://eprint.iacr.org/2015/763}, } @misc{cryptoeprint:2015:764, author = {Jincheng Zhuang and Qi Cheng}, title = {On Generating Coset Representatives of PGL_2(\F_q) in PGL_2(\F_{q^2})}, howpublished = {Cryptology ePrint Archive, Report 2015/764}, year = {2015}, url = {https://eprint.iacr.org/2015/764}, } @misc{cryptoeprint:2015:765, author = {Victoria Fehr and Marc Fischlin}, title = {Sanitizable Signcryption: Sanitization over Encrypted Data (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2015/765}, year = {2015}, url = {https://eprint.iacr.org/2015/765}, } @misc{cryptoeprint:2015:766, author = {Peng Wang and Yuling Li and Liting Zhang and Kaiyan Zheng}, title = {Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications}, howpublished = {Cryptology ePrint Archive, Report 2015/766}, year = {2015}, url = {https://eprint.iacr.org/2015/766}, } @misc{cryptoeprint:2015:767, author = {Daniel J. Bernstein and Tanja Lange and Ruben Niederhagen}, title = {Dual EC: A Standardized Back Door}, howpublished = {Cryptology ePrint Archive, Report 2015/767}, year = {2015}, url = {https://eprint.iacr.org/2015/767}, } @misc{cryptoeprint:2015:768, author = {Pawel Swierczynski and Marc Fyrbiak and Philipp Koppe and Amir Moradi and Christof Paar}, title = {Interdiction in Practice – Hardware Trojan Against a High-Security USB Flash Drive}, howpublished = {Cryptology ePrint Archive, Report 2015/768}, year = {2015}, url = {https://eprint.iacr.org/2015/768}, } @misc{cryptoeprint:2015:769, author = {Andrej Bogdanov and Siyao Guo and Daniel Masny and Silas Richelson and Alon Rosen}, title = {On the Hardness of Learning with Rounding over Small Modulus}, howpublished = {Cryptology ePrint Archive, Report 2015/769}, year = {2015}, url = {https://eprint.iacr.org/2015/769}, } @misc{cryptoeprint:2015:770, author = {Michele Ciampi and Giuseppe Persiano and Luisa Siniscalchi and Ivan Visconti}, title = {A Transform for NIZK Almost as Efficient and General as the Fiat-Shamir Transform Without Programmable Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2015/770}, year = {2015}, url = {https://eprint.iacr.org/2015/770}, } @misc{cryptoeprint:2015:771, author = {Sebastian E. Schmittner}, title = {A SAT-based Public Key Cryptography Scheme}, howpublished = {Cryptology ePrint Archive, Report 2015/771}, year = {2015}, url = {https://eprint.iacr.org/2015/771}, } @misc{cryptoeprint:2015:772, author = {Sandro Coretti and Yevgeniy Dodis and Björn Tackmann and Daniele Venturi}, title = {Non-Malleable Encryption: Simpler, Shorter, Stronger}, howpublished = {Cryptology ePrint Archive, Report 2015/772}, year = {2015}, url = {https://eprint.iacr.org/2015/772}, } @misc{cryptoeprint:2015:773, author = {Shoni Gilboa and Shay Gueron }, title = {Distinguishing a truncated random permutation from a random function}, howpublished = {Cryptology ePrint Archive, Report 2015/773}, year = {2015}, url = {https://eprint.iacr.org/2015/773}, } @misc{cryptoeprint:2015:774, author = {Santanu Sarkar}, title = {Revisiting Prime Power RSA}, howpublished = {Cryptology ePrint Archive, Report 2015/774}, year = {2015}, url = {https://eprint.iacr.org/2015/774}, } @misc{cryptoeprint:2015:775, author = {S. M. Dehnavi and M. R. Mirzaee Shamsabad and A. Mahmoodi Rishakani and Y. Fekri Dabanloo}, title = {Efficient MDS Diffusion Layers Through Decomposition of Matrices}, howpublished = {Cryptology ePrint Archive, Report 2015/775}, year = {2015}, url = {https://eprint.iacr.org/2015/775}, } @misc{cryptoeprint:2015:776, author = {Prabhanjan Ananth and Amit Sahai}, title = {Functional Encryption for Turing Machines}, howpublished = {Cryptology ePrint Archive, Report 2015/776}, year = {2015}, url = {https://eprint.iacr.org/2015/776}, } @misc{cryptoeprint:2015:777, author = {Qinglan Zhao and Dong Zheng and Xiangxue Li and Xiaoli Dong}, title = {Arithmetic Walsh Transform of Boolean Functions with Linear Structures}, howpublished = {Cryptology ePrint Archive, Report 2015/777}, year = {2015}, url = {https://eprint.iacr.org/2015/777}, } @misc{cryptoeprint:2015:778, author = {Santanu Sarkar}, title = {Modular Inversion Hidden Number Problem -- Correction and Improvements}, howpublished = {Cryptology ePrint Archive, Report 2015/778}, year = {2015}, url = {https://eprint.iacr.org/2015/778}, } @misc{cryptoeprint:2015:779, author = {Masao KASAHARA}, title = {A Simple Scheme, for Strengthening Product-sum Type PKC}, howpublished = {Cryptology ePrint Archive, Report 2015/779}, year = {2015}, url = {https://eprint.iacr.org/2015/779}, } @misc{cryptoeprint:2015:780, author = {Martin R. Albrecht and Pooya Farshim and Dennis Hofheinz and Enrique Larraia and Kenneth G. Paterson}, title = {Multilinear Maps from Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2015/780}, year = {2015}, url = {https://eprint.iacr.org/2015/780}, } @misc{cryptoeprint:2015:781, author = {Daniel J. Bernstein and Chitchanok Chuengsatiansup and David Kohel and Tanja Lange}, title = {Twisted Hessian curves}, howpublished = {Cryptology ePrint Archive, Report 2015/781}, year = {2015}, url = {https://eprint.iacr.org/2015/781}, } @misc{cryptoeprint:2015:782, author = {Sergiu Bursuc}, title = {Secure two-party computation in applied pi-calculus: models and verification}, howpublished = {Cryptology ePrint Archive, Report 2015/782}, year = {2015}, url = {https://eprint.iacr.org/2015/782}, } @misc{cryptoeprint:2015:783, author = {Ivan Tjuawinata and Tao Huang and Hongjun Wu}, title = {Cryptanalysis of the Authenticated Encryption Algorithm COFFE}, howpublished = {Cryptology ePrint Archive, Report 2015/783}, year = {2015}, url = {https://eprint.iacr.org/2015/783}, } @misc{cryptoeprint:2015:784, author = {David Leslie and Chris Sherfield and Nigel P. Smart}, title = {Threshold FlipThem: When the winner does not need to take all}, howpublished = {Cryptology ePrint Archive, Report 2015/784}, year = {2015}, url = {https://eprint.iacr.org/2015/784}, } @misc{cryptoeprint:2015:785, author = {R\'emi G\'eraud and Diana Maimut and David Naccache}, title = {Double-Speed Barrett Moduli}, howpublished = {Cryptology ePrint Archive, Report 2015/785}, year = {2015}, url = {https://eprint.iacr.org/2015/785}, } @misc{cryptoeprint:2015:786, author = {Jean-Michel Cioranesco and Roman Korkikian and David Naccache and Rodrigo Portella do Canto}, title = {Buying AES Design Resistance with Speed and Energy}, howpublished = {Cryptology ePrint Archive, Report 2015/786}, year = {2015}, url = {https://eprint.iacr.org/2015/786}, } @misc{cryptoeprint:2015:787, author = {Houda Ferradi and R\'emi G\'eraud and Diana Maimut and David Naccache and Hang Zhou}, title = {Backtracking-Assisted Multiplication}, howpublished = {Cryptology ePrint Archive, Report 2015/787}, year = {2015}, url = {https://eprint.iacr.org/2015/787}, } @misc{cryptoeprint:2015:788, author = {Rahul Chatterjee and Joseph Bonneau and Ari Juels and Thomas Ristenpart}, title = {Cracking-Resistant Password Vaults using Natural Language Encoders}, howpublished = {Cryptology ePrint Archive, Report 2015/788}, year = {2015}, url = {https://eprint.iacr.org/2015/788}, } @misc{cryptoeprint:2015:789, author = {Gangqiang Yang and Mark D. Aagaard and Guang Gong}, title = {Efficient Hardware Implementations of the Warbler Pseudorandom Number Generator}, howpublished = {Cryptology ePrint Archive, Report 2015/789}, year = {2015}, url = {https://eprint.iacr.org/2015/789}, } @misc{cryptoeprint:2015:790, author = {Pantelimon Stanica}, title = {On weak and strong 2^k-bent Boolean functions}, howpublished = {Cryptology ePrint Archive, Report 2015/790}, year = {2015}, url = {https://eprint.iacr.org/2015/790}, } @misc{cryptoeprint:2015:791, author = {Omer Paneth and Amit Sahai}, title = {On the Equivalence of Obfuscation and Multilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2015/791}, year = {2015}, url = {https://eprint.iacr.org/2015/791}, } @misc{cryptoeprint:2015:792, author = {Dennis Hofheinz and Vanishree Rao and Daniel Wichs}, title = {Standard Security Does Not Imply Indistinguishability Under Selective Opening}, howpublished = {Cryptology ePrint Archive, Report 2015/792}, year = {2015}, url = {https://eprint.iacr.org/2015/792}, } @misc{cryptoeprint:2015:793, author = {Rabih Mohsen and Alexandre Miranda Pinto}, title = {Algorithmic Information Theory for Obfuscation Security}, howpublished = {Cryptology ePrint Archive, Report 2015/793}, year = {2015}, url = {https://eprint.iacr.org/2015/793}, } @misc{cryptoeprint:2015:794, author = {Pierre-Alain Fouque and Sylvain Guilley and Cédric Murdica and David Naccache}, title = {Safe-Errors on SPA Protected implementations with the Atomicity Technique}, howpublished = {Cryptology ePrint Archive, Report 2015/794}, year = {2015}, url = {https://eprint.iacr.org/2015/794}, } @misc{cryptoeprint:2015:795, author = {Andrey Bogdanov and Ilya Kizhvatov and Kamran Manzoor and Elmar Tischhauser and Marc Witteman}, title = {Fast and Memory-Efficient Key Recovery in Side-Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/795}, year = {2015}, url = {https://eprint.iacr.org/2015/795}, } @misc{cryptoeprint:2015:796, author = {Kartik Nayak and Srijan Kumar and Andrew Miller and Elaine Shi}, title = {Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack}, howpublished = {Cryptology ePrint Archive, Report 2015/796}, year = {2015}, url = {https://eprint.iacr.org/2015/796}, } @misc{cryptoeprint:2015:797, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, title = {What Security Can We Achieve within 4 Rounds?}, howpublished = {Cryptology ePrint Archive, Report 2015/797}, year = {2015}, url = {https://eprint.iacr.org/2015/797}, } @misc{cryptoeprint:2015:798, author = {Charles Herder and Ling Ren and Marten van Dijk and Meng-Day (Mandel) Yu and Srinivas Devadas}, title = {A Stateless Cryptographically-Secure Physical Unclonable Function}, howpublished = {Cryptology ePrint Archive, Report 2015/798}, year = {2015}, url = {https://eprint.iacr.org/2015/798}, } @misc{cryptoeprint:2015:799, author = {Hwajeong Seo and Chien-Ning Chen and Zhe Liu and Yasuyuki Nogami and Taehwan Park and Jongseok Choi and Howon Kim}, title = {Secure Binary Field Multiplication}, howpublished = {Cryptology ePrint Archive, Report 2015/799}, year = {2015}, url = {https://eprint.iacr.org/2015/799}, } @misc{cryptoeprint:2015:800, author = {Jihoon Cho, Kyu Young Choi, and Dukjae Moon}, title = {Hybrid WBC: Secure and efficient encryption schemes using the White-Box Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2015/800}, year = {2015}, url = {https://eprint.iacr.org/2015/800}, } @misc{cryptoeprint:2015:801, author = {Scott Fluhrer}, title = {Scalar Blinding on Elliptic Curves based on Primes with Special Structure}, howpublished = {Cryptology ePrint Archive, Report 2015/801}, year = {2015}, url = {https://eprint.iacr.org/2015/801}, } @misc{cryptoeprint:2015:802, author = {Shahram Khazaei and Siavash Ahmadi}, title = {Ciphertext-only attack on d*d Hill in O(d13^d)}, howpublished = {Cryptology ePrint Archive, Report 2015/802}, year = {2015}, url = {https://eprint.iacr.org/2015/802}, } @misc{cryptoeprint:2015:803, author = {Stian Fauskanger and Igor Semaev}, title = {Statistical and Algebraic Properties of DES}, howpublished = {Cryptology ePrint Archive, Report 2015/803}, year = {2015}, url = {https://eprint.iacr.org/2015/803}, } @misc{cryptoeprint:2015:804, author = {Sumit Chakraborty}, title = {SECURE MULTI-PARTY COMPUTATION: HOW TO SOLVE THE CONFLICT BETWEEN SECURITY & BUSINESS INTELLIGENCE }, howpublished = {Cryptology ePrint Archive, Report 2015/804}, year = {2015}, url = {https://eprint.iacr.org/2015/804}, } @misc{cryptoeprint:2015:805, author = {Tsutomu Iijima and Fumiyuki Momose and Jinhui Chao}, title = {A classification of elliptic curves with respect to the GHS attack in odd characteristic}, howpublished = {Cryptology ePrint Archive, Report 2015/805}, year = {2015}, url = {https://eprint.iacr.org/2015/805}, } @misc{cryptoeprint:2015:806, author = {Sikhar Patranabis and Abhishek Chakraborty and Debdeep Mukhopadhyay and P.P. Chakrabarti}, title = {Fault Space Transformation: A Generic Approach to Counter Differential Fault Analysis and Differential Fault Intensity Analysis on AES-like Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2015/806}, year = {2015}, url = {https://eprint.iacr.org/2015/806}, } @misc{cryptoeprint:2015:807, author = {Juan Garay and Björn Tackmann and Vassilis Zikas}, title = {Fair Distributed Computation of Reactive Functions}, howpublished = {Cryptology ePrint Archive, Report 2015/807}, year = {2015}, url = {https://eprint.iacr.org/2015/807}, } @misc{cryptoeprint:2015:808, author = {Mihir Bellare and Joseph Jaeger and Daniel Kane}, title = {Mass-surveillance without the State: Strongly Undetectable Algorithm-Substitution Attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/808}, year = {2015}, url = {https://eprint.iacr.org/2015/808}, } @misc{cryptoeprint:2015:809, author = {Alan Szepieniec and Bart Preneel}, title = {New Techniques for Electronic Voting}, howpublished = {Cryptology ePrint Archive, Report 2015/809}, year = {2015}, url = {https://eprint.iacr.org/2015/809}, } @misc{cryptoeprint:2015:810, author = {Michele Ciampi and Giuseppe Persiano and Alessandra Scafuro and Luisa Siniscalchi and Ivan Visconti}, title = {Improved OR Composition of Sigma-Protocols}, howpublished = {Cryptology ePrint Archive, Report 2015/810}, year = {2015}, url = {https://eprint.iacr.org/2015/810}, } @misc{cryptoeprint:2015:811, author = {Chrysanthi Mavromati}, title = {Key-recovery attacks against the MAC algorithm Chaskey}, howpublished = {Cryptology ePrint Archive, Report 2015/811}, year = {2015}, url = {https://eprint.iacr.org/2015/811}, } @misc{cryptoeprint:2015:812, author = {Alex Biryukov and Léo Perrin and Aleksei Udovenko}, title = {The Secret Structure of the S-Box of Streebog, Kuznechik and Stribob}, howpublished = {Cryptology ePrint Archive, Report 2015/812}, year = {2015}, url = {https://eprint.iacr.org/2015/812}, } @misc{cryptoeprint:2015:813, author = {Ritam Bhaumik and Mridul Nandi}, title = {Revisiting Turning Online Cipher Off}, howpublished = {Cryptology ePrint Archive, Report 2015/813}, year = {2015}, url = {https://eprint.iacr.org/2015/813}, } @misc{cryptoeprint:2015:814, author = {Qingji Zheng and Xiangxue Li and Aytac Azgin}, title = {CLKS: Certificateless Keyword Search on Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2015/814}, year = {2015}, url = {https://eprint.iacr.org/2015/814}, } @misc{cryptoeprint:2015:815, author = {Mohammad Mahmoody and Ameer Mohammed}, title = {On the Power of Hierarchical Identity-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/815}, year = {2015}, url = {https://eprint.iacr.org/2015/815}, } @misc{cryptoeprint:2015:816, author = {Valery Korzhik and Guillermo Morales-Luna and Sergei Tikhonov and Victor Yakovlev}, title = {Analysis of Keyless Massive MIMO-based Cryptosystem Security}, howpublished = {Cryptology ePrint Archive, Report 2015/816}, year = {2015}, url = {https://eprint.iacr.org/2015/816}, } @misc{cryptoeprint:2015:817, author = {Varsha Bhat Kukkala and Jaspal Singh Saini and S.R.S. Iyengar}, title = {Secure Multiparty Computation of a Social Network}, howpublished = {Cryptology ePrint Archive, Report 2015/817}, year = {2015}, url = {https://eprint.iacr.org/2015/817}, } @misc{cryptoeprint:2015:818, author = {Wei Dai and Berk Sunar}, title = {cuHE: A Homomorphic Encryption Accelerator Library}, howpublished = {Cryptology ePrint Archive, Report 2015/818}, year = {2015}, url = {https://eprint.iacr.org/2015/818}, } @misc{cryptoeprint:2015:819, author = {Jean-Luc Danger and Sylvain Guilley and Philippe Hoogvorst and Cédric Murdica and David Naccache}, title = {Improving the Big Mac Attack on Elliptic Curve Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2015/819}, year = {2015}, url = {https://eprint.iacr.org/2015/819}, } @misc{cryptoeprint:2015:820, author = {Junqing Gong and Jie Chen and Xiaolei Dong and Zhenfu Cao and Shaohua Tang}, title = {Extended Nested Dual System Groups, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2015/820}, year = {2015}, url = {https://eprint.iacr.org/2015/820}, } @misc{cryptoeprint:2015:821, author = {Gérald Gavin}, title = {A general framework for building noise-free homomorphic cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2015/821}, year = {2015}, url = {https://eprint.iacr.org/2015/821}, } @misc{cryptoeprint:2015:822, author = {Akshayaram Srinivasan and C. Pandu Rangan}, title = {Efficiently Obfuscating Re-Encryption Program under DDH Assumption}, howpublished = {Cryptology ePrint Archive, Report 2015/822}, year = {2015}, url = {https://eprint.iacr.org/2015/822}, } @misc{cryptoeprint:2015:823, author = {Anja Becker and Thijs Laarhoven}, title = {Efficient (ideal) lattice sieving using cross-polytope LSH}, howpublished = {Cryptology ePrint Archive, Report 2015/823}, year = {2015}, url = {https://eprint.iacr.org/2015/823}, } @misc{cryptoeprint:2015:824, author = {Jens Groth}, title = {Efficient Fully Structure-Preserving Signatures for Large Messages}, howpublished = {Cryptology ePrint Archive, Report 2015/824}, year = {2015}, url = {https://eprint.iacr.org/2015/824}, } @misc{cryptoeprint:2015:825, author = {Ding Wang and Ping Wang}, title = {The Emperor's New Password Creation Policies}, howpublished = {Cryptology ePrint Archive, Report 2015/825}, year = {2015}, url = {https://eprint.iacr.org/2015/825}, } @misc{cryptoeprint:2015:826, author = {Dario Catalano and Dario Fiore and Luca Nizzardo}, title = {Programmable Hash Functions go Private:Constructions and Applications to (Homomorphic) Signatures with Shorter Public Keys}, howpublished = {Cryptology ePrint Archive, Report 2015/826}, year = {2015}, url = {https://eprint.iacr.org/2015/826}, } @misc{cryptoeprint:2015:827, author = {Geumsook Ryu and Kwangsu Lee and Seunghwan Park and Dong Hoon Lee}, title = {Unbounded Hierarchical Identity-Based Encryption with Efficient Revocation}, howpublished = {Cryptology ePrint Archive, Report 2015/827}, year = {2015}, url = {https://eprint.iacr.org/2015/827}, } @misc{cryptoeprint:2015:828, author = {Ralph Ankele and Stefan Koelbl and Christian Rechberger}, title = {State-recovery analysis of Spritz}, howpublished = {Cryptology ePrint Archive, Report 2015/828}, year = {2015}, url = {https://eprint.iacr.org/2015/828}, } @misc{cryptoeprint:2015:829, author = {Nishanth Chandran and Srinivasan Raghuraman and Dhinakaran Vinayagamurthy}, title = {Reducing Depth in Constrained PRFs: From Bit-Fixing to NC1}, howpublished = {Cryptology ePrint Archive, Report 2015/829}, year = {2015}, url = {https://eprint.iacr.org/2015/829}, } @misc{cryptoeprint:2015:830, author = {Shiuan-Tzuo Shen and Amir Rezapour and Wen-Guey Tzeng}, title = {Unique Signature with Short Output from CDH Assumption}, howpublished = {Cryptology ePrint Archive, Report 2015/830}, year = {2015}, url = {https://eprint.iacr.org/2015/830}, } @misc{cryptoeprint:2015:831, author = {Syed Kamran Haider and Masab Ahmad and Farrukh Hijaz and Astha Patni and Ethan Johnson and Matthew Seita and Omer Khan and Marten van Dijk}, title = {M-MAP: Multi-Factor Memory Authentication for Secure Embedded Processors}, howpublished = {Cryptology ePrint Archive, Report 2015/831}, year = {2015}, url = {https://eprint.iacr.org/2015/831}, } @misc{cryptoeprint:2015:832, author = {David McCann, Kerstin Eder, Elisabeth Oswald}, title = {Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices}, howpublished = {Cryptology ePrint Archive, Report 2015/832}, year = {2015}, url = {https://eprint.iacr.org/2015/832}, } @misc{cryptoeprint:2015:833, author = {Mohammad Etemad and Alptekin Küpçü}, title = {Efficient Key Authentication Service for Secure End-to-end Communications}, howpublished = {Cryptology ePrint Archive, Report 2015/833}, year = {2015}, url = {https://eprint.iacr.org/2015/833}, } @misc{cryptoeprint:2015:834, author = {Kazuo Sakiyama and Takanori Machida and Arisa Matsubara and Yunfeng Kuai and Yu-ichi Hayashi and Takaaki Mizuki and Noriyuki Miura and Makoto Nagata}, title = {Authentication Using Side-Channel Information}, howpublished = {Cryptology ePrint Archive, Report 2015/834}, year = {2015}, url = {https://eprint.iacr.org/2015/834}, } @misc{cryptoeprint:2015:835, author = {Duc-Phong Le and Nadia El Mrabet and Chik How Tan}, title = {On near prime-order elliptic curves with small embedding degrees (Full version)}, howpublished = {Cryptology ePrint Archive, Report 2015/835}, year = {2015}, url = {https://eprint.iacr.org/2015/835}, } @misc{cryptoeprint:2015:836, author = {Benjamin Wesolowski and Pascal Junod}, title = {Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys}, howpublished = {Cryptology ePrint Archive, Report 2015/836}, year = {2015}, url = {https://eprint.iacr.org/2015/836}, } @misc{cryptoeprint:2015:837, author = {Nicolas BRUNEAU and Sylvain GUILLEY and Zakaria NAJM and Yannick TEGLIA}, title = {Multi-Variate High-Order Attacks of Shuffled Tables Recomputation}, howpublished = {Cryptology ePrint Archive, Report 2015/837}, year = {2015}, url = {https://eprint.iacr.org/2015/837}, } @misc{cryptoeprint:2015:838, author = {Hamza Abusalah and Georg Fuchsbauer and Krzysztof Pietrzak}, title = {Offline Witness Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/838}, year = {2015}, url = {https://eprint.iacr.org/2015/838}, } @misc{cryptoeprint:2015:839, author = {David Wong}, title = {Timing and Lattice Attacks on a Remote ECDSA OpenSSL Server: How Practical Are They Really?}, howpublished = {Cryptology ePrint Archive, Report 2015/839}, year = {2015}, url = {https://eprint.iacr.org/2015/839}, } @misc{cryptoeprint:2015:840, author = {Qianqian Yang and Lei Hu and Siwei Sun and Ling Song}, title = {Related-key Impossible Differential Analysis of Full Khudra}, howpublished = {Cryptology ePrint Archive, Report 2015/840}, year = {2015}, url = {https://eprint.iacr.org/2015/840}, } @misc{cryptoeprint:2015:841, author = {Vanga Odelu and Ashok Kumar Das and Adrijit Goswami}, title = {An Efficient CP-ABE with Constant Size Secret Keys using ECC for Lightweight Devices}, howpublished = {Cryptology ePrint Archive, Report 2015/841}, year = {2015}, url = {https://eprint.iacr.org/2015/841}, } @misc{cryptoeprint:2015:842, author = {Jaap-Henk Hoepman and Wouter Lueks and Sietse Ringers}, title = {On Linkability and Malleability in Self-blindable Credentials}, howpublished = {Cryptology ePrint Archive, Report 2015/842}, year = {2015}, url = {https://eprint.iacr.org/2015/842}, } @misc{cryptoeprint:2015:843, author = {David Derler and Daniel Slamanig}, title = {Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes}, howpublished = {Cryptology ePrint Archive, Report 2015/843}, year = {2015}, url = {https://eprint.iacr.org/2015/843}, } @misc{cryptoeprint:2015:844, author = {Jeff Hoffstein and Jill Pipher and John M. Schanck and Joseph H. Silverman and William Whyte and Zhenfei Zhang}, title = {DA-Encrypt: Homomorphic Encryption via Non-Archimedean Diophantine Approximation --- Preliminary Report}, howpublished = {Cryptology ePrint Archive, Report 2015/844}, year = {2015}, url = {https://eprint.iacr.org/2015/844}, } @misc{cryptoeprint:2015:845, author = {Zvika Brakerski and Craig Gentry and Shai Halevi and Tancrède Lepoint and Amit Sahai and Mehdi Tibouchi}, title = {Cryptanalysis of the Quadratic Zero-Testing of GGH}, howpublished = {Cryptology ePrint Archive, Report 2015/845}, year = {2015}, url = {https://eprint.iacr.org/2015/845}, } @misc{cryptoeprint:2015:846, author = {Ran Cohen and Iftach Haitner and Eran Omri and Lior Rotem}, title = {Characterization of Secure Multiparty Computation Without Broadcast}, howpublished = {Cryptology ePrint Archive, Report 2015/846}, year = {2015}, url = {https://eprint.iacr.org/2015/846}, } @misc{cryptoeprint:2015:847, author = {Subhadeep Banik and Andrey Bogdanov and Francesco Regazzoni}, title = {Exploring Energy Efficiency of Lightweight Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2015/847}, year = {2015}, url = {https://eprint.iacr.org/2015/847}, } @misc{cryptoeprint:2015:848, author = {Meltem Sonmez Turan and Rene Peralta}, title = {The Multiplicative Complexity of Boolean Functions on Four and Five Variables}, howpublished = {Cryptology ePrint Archive, Report 2015/848}, year = {2015}, url = {https://eprint.iacr.org/2015/848}, } @misc{cryptoeprint:2015:849, author = {Houda Ferradi, R\'emi G\'eraud, Diana Maimu\c{t}, David Naccache, and Amaury de Wargny}, title = {Regulating the Pace of von Neumann Correctors}, howpublished = {Cryptology ePrint Archive, Report 2015/849}, year = {2015}, url = {https://eprint.iacr.org/2015/849}, } @misc{cryptoeprint:2015:850, author = {Zhen Liu and Duncan S. Wong}, title = {Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-resistant Blackbox Traceable}, howpublished = {Cryptology ePrint Archive, Report 2015/850}, year = {2015}, url = {https://eprint.iacr.org/2015/850}, } @misc{cryptoeprint:2015:851, author = {Benoît Cogliati and Yannick Seurin}, title = {Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing}, howpublished = {Cryptology ePrint Archive, Report 2015/851}, year = {2015}, url = {https://eprint.iacr.org/2015/851}, } @misc{cryptoeprint:2015:852, author = {Matvei Kotov and Alexander Ushakov}, title = {Analysis of a key exchange protocol based on tropical matrix algebra}, howpublished = {Cryptology ePrint Archive, Report 2015/852}, year = {2015}, url = {https://eprint.iacr.org/2015/852}, } @misc{cryptoeprint:2015:853, author = {Georg Fuchsbauer and Felix Heuer and Eike Kiltz and Krzysztof Pietrzak}, title = {Standard Security Does Imply Security Against Selective Opening for Markov Distributions}, howpublished = {Cryptology ePrint Archive, Report 2015/853}, year = {2015}, url = {https://eprint.iacr.org/2015/853}, } @misc{cryptoeprint:2015:854, author = {Jeroen Delvaux and Dawu Gu and Ingrid Verbauwhede and Matthias Hiller and Meng-Day (Mandel) Yu}, title = {Efficient Fuzzy Extraction of PUF-Induced Secrets: Theory and Applications}, howpublished = {Cryptology ePrint Archive, Report 2015/854}, year = {2015}, url = {https://eprint.iacr.org/2015/854}, } @misc{cryptoeprint:2015:855, author = {GANESH YELLAPU}, title = {A new framework for keystream generators against Correlation, Linear and Distinguishing Attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/855}, year = {2015}, url = {https://eprint.iacr.org/2015/855}, } @misc{cryptoeprint:2015:856, author = {Khushboo Bussi and Dhananjoy Dey and P. R. Mishra and B.K. Dass}, title = {MGR HASH FUNCTION}, howpublished = {Cryptology ePrint Archive, Report 2015/856}, year = {2015}, url = {https://eprint.iacr.org/2015/856}, } @misc{cryptoeprint:2015:857, author = {Benjamin Fuller and Ariel Hamlin}, title = {Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy}, howpublished = {Cryptology ePrint Archive, Report 2015/857}, year = {2015}, url = {https://eprint.iacr.org/2015/857}, } @misc{cryptoeprint:2015:858, author = {Olivier Blazy and Saqib A. Kakvi}, title = {Skipping the $q$ in Group Signatures}, howpublished = {Cryptology ePrint Archive, Report 2015/858}, year = {2015}, url = {https://eprint.iacr.org/2015/858}, } @misc{cryptoeprint:2015:859, author = {Dianyan Xiao and Jincheng Zhuang and Qi Cheng}, title = {Factor Base Discrete Logarithms in Kummer Extensions}, howpublished = {Cryptology ePrint Archive, Report 2015/859}, year = {2015}, url = {https://eprint.iacr.org/2015/859}, } @misc{cryptoeprint:2015:860, author = {Carmit Hazay and Arpita Patra and Bogdan Warinschi }, title = {Selective Opening Security for Receivers}, howpublished = {Cryptology ePrint Archive, Report 2015/860}, year = {2015}, url = {https://eprint.iacr.org/2015/860}, } @misc{cryptoeprint:2015:861, author = {Chun Guo and Dongdai Lin}, title = {A Synthetic Indifferentiability Analysis of Interleaved Double-Key Even-Mansour Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2015/861}, year = {2015}, url = {https://eprint.iacr.org/2015/861}, } @misc{cryptoeprint:2015:862, author = {Dennis Hofheinz and Christian Matt and Ueli Maurer}, title = {Idealizing Identity-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/862}, year = {2015}, url = {https://eprint.iacr.org/2015/862}, } @misc{cryptoeprint:2015:863, author = {Elette Boyle and Moni Naor}, title = {Is There an Oblivious RAM Lower Bound?}, howpublished = {Cryptology ePrint Archive, Report 2015/863}, year = {2015}, url = {https://eprint.iacr.org/2015/863}, } @misc{cryptoeprint:2015:864, author = {Christine Jost and Ha Lam and Alexander Maximov and Ben Smeets}, title = {Encryption Performance Improvements of the Paillier Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2015/864}, year = {2015}, url = {https://eprint.iacr.org/2015/864}, } @misc{cryptoeprint:2015:865, author = {Alexander Koch and Stefan Walzer and Kevin Härtel}, title = {Card-based Cryptographic Protocols Using a Minimal Number of Cards}, howpublished = {Cryptology ePrint Archive, Report 2015/865}, year = {2015}, url = {https://eprint.iacr.org/2015/865}, } @misc{cryptoeprint:2015:866, author = {Shai Halevi}, title = {Graded Encoding, Variations on a Scheme}, howpublished = {Cryptology ePrint Archive, Report 2015/866}, year = {2015}, url = {https://eprint.iacr.org/2015/866}, } @misc{cryptoeprint:2015:867, author = {Michel Abdalla and Fabrice Benhamouda and Alain Passelègue}, title = {Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security}, howpublished = {Cryptology ePrint Archive, Report 2015/867}, year = {2015}, url = {https://eprint.iacr.org/2015/867}, } @misc{cryptoeprint:2015:868, author = {Stefano Tessaro}, title = {Optimally Secure Block Ciphers from Ideal Primitives}, howpublished = {Cryptology ePrint Archive, Report 2015/868}, year = {2015}, url = {https://eprint.iacr.org/2015/868}, } @misc{cryptoeprint:2015:869, author = {Tatsuaki Okamoto and Krzysztof Pietrzak and Brent Waters and Daniel Wichs}, title = {New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators}, howpublished = {Cryptology ePrint Archive, Report 2015/869}, year = {2015}, url = {https://eprint.iacr.org/2015/869}, } @misc{cryptoeprint:2015:870, author = {Mohammad Hajiabadi and Bruce M. Kapron}, title = {Gambling, Computational Information and Encryption Security}, howpublished = {Cryptology ePrint Archive, Report 2015/870}, year = {2015}, url = {https://eprint.iacr.org/2015/870}, } @misc{cryptoeprint:2015:871, author = {Shahin Tajik and Enrico Dietz and Sven Frohmann and Helmar Dittrich and Dmitry Nedospasov and Clemens Helfmeier and Jean-Pierre Seifert and Christian Boit and Heinz-Wilhelm Hübers}, title = {Photonic Side Channel Analysis of Arbiter PUFs}, howpublished = {Cryptology ePrint Archive, Report 2015/871}, year = {2015}, url = {https://eprint.iacr.org/2015/871}, } @misc{cryptoeprint:2015:872, author = {Seyed Salman Sajjadi GhaemMaghami, Afrooz Haghbin, Mahtab Mirmohseni}, title = {Traceability Improvements of a New RFID Protocol Based On EPC C1G2}, howpublished = {Cryptology ePrint Archive, Report 2015/872}, year = {2015}, url = {https://eprint.iacr.org/2015/872}, } @misc{cryptoeprint:2015:873, author = {Jian Liu, Sihem Mesnager, and Lusheng Chen}, title = {On the Diffusion Property of Iterated Functions}, howpublished = {Cryptology ePrint Archive, Report 2015/873}, year = {2015}, url = {https://eprint.iacr.org/2015/873}, } @misc{cryptoeprint:2015:874, author = {Yuanxi Dai and John Steinberger}, title = {Indifferentiability of 10-Round Feistel Networks}, howpublished = {Cryptology ePrint Archive, Report 2015/874}, year = {2015}, url = {https://eprint.iacr.org/2015/874}, } @misc{cryptoeprint:2015:875, author = {Ne\c{s}e Ko\c{c}ak, Sihem Mesnager and Ferruh \"{O}zbudak}, title = {Bent and Semi-bent Functions via Linear Translators}, howpublished = {Cryptology ePrint Archive, Report 2015/875}, year = {2015}, url = {https://eprint.iacr.org/2015/875}, } @misc{cryptoeprint:2015:876, author = {Dana Dachman-Soled and Jonathan Katz and Aishwarya Thiruvengadam}, title = {10-Round Feistel is Indifferentiable from an Ideal Cipher}, howpublished = {Cryptology ePrint Archive, Report 2015/876}, year = {2015}, url = {https://eprint.iacr.org/2015/876}, } @misc{cryptoeprint:2015:877, author = {Christophe Clavier and Julien Francq and Antoine Wurcker}, title = {Study of a Parity Check Based Fault-Detection Countermeasure for the AES Key Schedule}, howpublished = {Cryptology ePrint Archive, Report 2015/877}, year = {2015}, url = {https://eprint.iacr.org/2015/877}, } @misc{cryptoeprint:2015:878, author = {Edward Eaton and Fang Song}, title = {Making Existential-Unforgeable Signatures Strongly Unforgeable in the Quantum Random-Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2015/878}, year = {2015}, url = {https://eprint.iacr.org/2015/878}, } @misc{cryptoeprint:2015:879, author = {Martin Ekerå}, title = {Computing information on domain parameters from public keys selected uniformly at random}, howpublished = {Cryptology ePrint Archive, Report 2015/879}, year = {2015}, url = {https://eprint.iacr.org/2015/879}, } @misc{cryptoeprint:2015:880, author = {Mohammad Etemad and Alptekin Küpçü}, title = {Generic Efficient Dynamic Proofs of Retrievability}, howpublished = {Cryptology ePrint Archive, Report 2015/880}, year = {2015}, url = {https://eprint.iacr.org/2015/880}, } @misc{cryptoeprint:2015:881, author = {Peter Gaži and Krzysztof Pietrzak and Stefano Tessaro}, title = {Generic Security of NMAC and HMAC with Input Whitening}, howpublished = {Cryptology ePrint Archive, Report 2015/881}, year = {2015}, url = {https://eprint.iacr.org/2015/881}, } @misc{cryptoeprint:2015:882, author = {Margaux Dugardin and Sylvain Guilley and Martin Moreau and Zakaria Najm and Pablo Rauzy}, title = {Using Modular Extension to Provably Protect Edwards Curves Against Fault Attacks}, howpublished = {Cryptology ePrint Archive, Report 2015/882}, year = {2015}, url = {https://eprint.iacr.org/2015/882}, } @misc{cryptoeprint:2015:883, author = {Avijit Dutta and Goutam Paul}, title = {Revisiting Sum of CBC-MACs and Extending NI2-MAC to Achieve Beyond-Birthday Security}, howpublished = {Cryptology ePrint Archive, Report 2015/883}, year = {2015}, url = {https://eprint.iacr.org/2015/883}, } @misc{cryptoeprint:2015:884, author = {Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay}, title = {General Circuit Realizing Compact Revocable Attribute-Based Encryption from Multilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2015/884}, year = {2015}, url = {https://eprint.iacr.org/2015/884}, } @misc{cryptoeprint:2015:885, author = {Roman Oliynykov and Ivan Gorbenko and Oleksandr Kazymyrov and Victor Ruzhentsev and Oleksandr Kuznetsov and Yurii Gorbenko and Artem Boiko and Oleksandr Dyrda and Viktor Dolgov and Andrii Pushkaryov}, title = {A New Standard of Ukraine: The Kupyna Hash Function}, howpublished = {Cryptology ePrint Archive, Report 2015/885}, year = {2015}, url = {https://eprint.iacr.org/2015/885}, } @misc{cryptoeprint:2015:886, author = {R\'emi G\'eraud and Diana-Stefania Maimut and David Naccache and Rodrigo Portella do Canto and Emil Simion}, title = {Applying Cryptographic Acceleration Techniques to Error Correction}, howpublished = {Cryptology ePrint Archive, Report 2015/886}, year = {2015}, url = {https://eprint.iacr.org/2015/886}, } @misc{cryptoeprint:2015:887, author = {Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam}, title = {Composable Security in the Tamper Proof Hardware Model under Minimal Complexity}, howpublished = {Cryptology ePrint Archive, Report 2015/887}, year = {2015}, url = {https://eprint.iacr.org/2015/887}, } @misc{cryptoeprint:2015:888, author = {Kazuhiko Minematsu and Tetsu Iwata}, title = {Tweak-Length Extension for Tweakable Blockciphers}, howpublished = {Cryptology ePrint Archive, Report 2015/888}, year = {2015}, url = {https://eprint.iacr.org/2015/888}, } @misc{cryptoeprint:2015:889, author = {Anamaria Costache and Nigel P. Smart}, title = {Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?}, howpublished = {Cryptology ePrint Archive, Report 2015/889}, year = {2015}, url = {https://eprint.iacr.org/2015/889}, } @misc{cryptoeprint:2015:890, author = {Wenbin Zhang and Chik How Tan}, title = {MI-T-HFE, a New Multivariate Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2015/890}, year = {2015}, url = {https://eprint.iacr.org/2015/890}, } @misc{cryptoeprint:2015:891, author = {S\'ebastien Canard and Viet Cuong Trinh}, title = {Private Ciphertext-Policy Attribute-based Encryption Schemes With Constant-Size Ciphertext Supporting CNF Access Policy}, howpublished = {Cryptology ePrint Archive, Report 2015/891}, year = {2015}, url = {https://eprint.iacr.org/2015/891}, } @misc{cryptoeprint:2015:892, author = {Kenneth G. Paterson and Jacob C. N. Schuldt and Dale L. Sibborn and Hoeteck Wee}, title = {Security Against Related Randomness Attacks via Reconstructive Extractors}, howpublished = {Cryptology ePrint Archive, Report 2015/892}, year = {2015}, url = {https://eprint.iacr.org/2015/892}, } @misc{cryptoeprint:2015:893, author = {Christian Badertscher and Christian Matt and Ueli Maurer and Phillip Rogaway and Björn Tackmann}, title = {Robust Authenticated Encryption and the Limits of Symmetric Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2015/893}, year = {2015}, url = {https://eprint.iacr.org/2015/893}, } @misc{cryptoeprint:2015:894, author = {Richard Winter and Ana Salagean and Raphael C.-W. Phan}, title = {Comparison of cube attacks over different vector spaces}, howpublished = {Cryptology ePrint Archive, Report 2015/894}, year = {2015}, url = {https://eprint.iacr.org/2015/894}, } @misc{cryptoeprint:2015:895, author = {Guy Barwell and Dan Page and Martijn Stam}, title = {Rogue Decryption Failures: Reconciling AE Robustness Notions}, howpublished = {Cryptology ePrint Archive, Report 2015/895}, year = {2015}, url = {https://eprint.iacr.org/2015/895}, } @misc{cryptoeprint:2015:896, author = {Xiaoyang Dong and Leibo Li and Keting Jia and Xiaoyun Wang}, title = {Improved Attacks on Reduced-Round Camellia-128/192/256}, howpublished = {Cryptology ePrint Archive, Report 2015/896}, year = {2015}, url = {https://eprint.iacr.org/2015/896}, } @misc{cryptoeprint:2015:897, author = {Prosanta Gope}, title = {Integrity-Aware Parallelizable Cipher Feedback Mode for Real-time Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2015/897}, year = {2015}, url = {https://eprint.iacr.org/2015/897}, } @misc{cryptoeprint:2015:898, author = {Mehmet Sinan Inci and Berk Gulmezoglu and Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar}, title = {Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud}, howpublished = {Cryptology ePrint Archive, Report 2015/898}, year = {2015}, url = {https://eprint.iacr.org/2015/898}, } @misc{cryptoeprint:2015:899, author = {Payal Chaudhari and Maniklal Das}, title = {Privacy-preserving Attribute Based Searchable Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/899}, year = {2015}, url = {https://eprint.iacr.org/2015/899}, } @misc{cryptoeprint:2015:900, author = {Ferucio Laurentiu Tiplea and Emil Simion}, title = {New Results on Identity-based Encryption from Quadratic Residuosity}, howpublished = {Cryptology ePrint Archive, Report 2015/900}, year = {2015}, url = {https://eprint.iacr.org/2015/900}, } @misc{cryptoeprint:2015:901, author = {Tore Kasper Frederiksen and Marcel Keller and Emmanuela Orsini and Peter Scholl}, title = {A Unified Approach to MPC with Preprocessing using OT}, howpublished = {Cryptology ePrint Archive, Report 2015/901}, year = {2015}, url = {https://eprint.iacr.org/2015/901}, } @misc{cryptoeprint:2015:902, author = {Kexin Qiao and Lei Hu and Siwei Sun}, title = {Differential Analysis on Simeck and SIMON with Dynamic Key-guessing Techniques}, howpublished = {Cryptology ePrint Archive, Report 2015/902}, year = {2015}, url = {https://eprint.iacr.org/2015/902}, } @misc{cryptoeprint:2015:903, author = {Yannick Seurin}, title = {A Note on the Indifferentiability of the 10-Round Feistel Construction}, howpublished = {Cryptology ePrint Archive, Report 2015/903}, year = {2015}, url = {https://eprint.iacr.org/2015/903}, } @misc{cryptoeprint:2015:904, author = {Junqing Gong and Xiaolei Dong and Zhenfu Cao and Jie Chen}, title = {Almost-tight Identity Based Encryption against Selective Opening Attack}, howpublished = {Cryptology ePrint Archive, Report 2015/904}, year = {2015}, url = {https://eprint.iacr.org/2015/904}, } @misc{cryptoeprint:2015:905, author = {Yuval Yarom and Qian Ge and Fangfei Liu and Ruby B. Lee and Gernot Heiser}, title = {Mapping the Intel Last-Level Cache}, howpublished = {Cryptology ePrint Archive, Report 2015/905}, year = {2015}, url = {https://eprint.iacr.org/2015/905}, } @misc{cryptoeprint:2015:906, author = {Adnan Baysal and Suhap Sahin}, title = {RoadRunneR: A Small And Fast Bitslice Block Cipher For Low Cost 8-bit Processors}, howpublished = {Cryptology ePrint Archive, Report 2015/906}, year = {2015}, url = {https://eprint.iacr.org/2015/906}, } @misc{cryptoeprint:2015:907, author = {Shafi Goldwasser and Yael Tauman Kalai}, title = {Cryptographic Assumptions: A Position Paper}, howpublished = {Cryptology ePrint Archive, Report 2015/907}, year = {2015}, url = {https://eprint.iacr.org/2015/907}, } @misc{cryptoeprint:2015:908, author = {Martin M. Lauridsen and Christian Rechberger}, title = {Linear Distinguishers in the Key-less Setting: Application to PRESENT}, howpublished = {Cryptology ePrint Archive, Report 2015/908}, year = {2015}, url = {https://eprint.iacr.org/2015/908}, } @misc{cryptoeprint:2015:909, author = {Bart Mennink, Bart Preneel}, title = {On the Impact of Known-Key Attacks on Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2015/909}, year = {2015}, url = {https://eprint.iacr.org/2015/909}, } @misc{cryptoeprint:2015:910, author = {Alonso González and Alejandro Hevia and Carla Ràfols}, title = {QA-NIZK Arguments in Asymmetric Groups: New Tools and New Constructions}, howpublished = {Cryptology ePrint Archive, Report 2015/910}, year = {2015}, url = {https://eprint.iacr.org/2015/910}, } @misc{cryptoeprint:2015:911, author = {Kai Zhang and Jie Guan and Bin Hu and Dongdai Lin}, title = {Security Evaluation on Simeck against Zero Correlation Linear Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2015/911}, year = {2015}, url = {https://eprint.iacr.org/2015/911}, } @misc{cryptoeprint:2015:912, author = {Maxime Lecomte and Jacques Fournier and Philippe Maurine}, title = {Extraction of intrinsic structure for Hardware Trojan detection}, howpublished = {Cryptology ePrint Archive, Report 2015/912}, year = {2015}, url = {https://eprint.iacr.org/2015/912}, } @misc{cryptoeprint:2015:913, author = {Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay}, title = {Functional Signcryption: Notion, Construction, and Applications}, howpublished = {Cryptology ePrint Archive, Report 2015/913}, year = {2015}, url = {https://eprint.iacr.org/2015/913}, } @misc{cryptoeprint:2015:914, author = {Benjamin Dowling and Marc Fischlin and Felix Günther and Douglas Stebila}, title = {A Cryptographic Analysis of the TLS 1.3 Handshake Protocol Candidates}, howpublished = {Cryptology ePrint Archive, Report 2015/914}, year = {2015}, url = {https://eprint.iacr.org/2015/914}, } @misc{cryptoeprint:2015:915, author = {Mohammmad Hassan Ameri, Maryam Rajabzadeh Assar, Javad Mohajeri, Mahmoud Salmasizadeh}, title = {A Generic Construction for Verifiable Attribute-based Keyword Search Schemes}, howpublished = {Cryptology ePrint Archive, Report 2015/915}, year = {2015}, url = {https://eprint.iacr.org/2015/915}, } @misc{cryptoeprint:2015:916, author = {Subhabrata Samajder and Palash Sarkar}, title = {Rigorous Upper Bounds on Data Complexities of Block Cipher Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2015/916}, year = {2015}, url = {https://eprint.iacr.org/2015/916}, } @misc{cryptoeprint:2015:917, author = {Constantinos Patsakis and Panayiotis Kotzanikolaou and M ́elanie Bouroche}, title = {Private Proximity Testing on Steroids: An NTRU-based Protocol}, howpublished = {Cryptology ePrint Archive, Report 2015/917}, year = {2015}, url = {https://eprint.iacr.org/2015/917}, } @misc{cryptoeprint:2015:918, author = {Md Iftekhar Salam and Kenneth Koon-Ho Wong and Harry Bartlett and Leonie Simpson and Ed Dawson and Josef Pieprzyk}, title = {Finding State Collisions in the Authenticated Encryption Stream Cipher ACORN}, howpublished = {Cryptology ePrint Archive, Report 2015/918}, year = {2015}, url = {https://eprint.iacr.org/2015/918}, } @misc{cryptoeprint:2015:919, author = {Hung Dang and Anh Dinh and Ee-Chien Chang and Beng Chin Ooi}, title = {Privacy-preserving computation with trusted computing via Scramble-then-Compute}, howpublished = {Cryptology ePrint Archive, Report 2015/919}, year = {2015}, url = {https://eprint.iacr.org/2015/919}, } @misc{cryptoeprint:2015:920, author = {Giuseppe Ateniese and Antonio Faonio and Seny Kamara}, title = {Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage}, howpublished = {Cryptology ePrint Archive, Report 2015/920}, year = {2015}, url = {https://eprint.iacr.org/2015/920}, } @misc{cryptoeprint:2015:921, author = {Kwangsu Lee and Jong Hwan Park}, title = {Identity-Based Revocation from Subset Difference Methods under Simple Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2015/921}, year = {2015}, url = {https://eprint.iacr.org/2015/921}, } @misc{cryptoeprint:2015:922, author = {Thalia M. Laing and Keith M. Martin and Maura B. Paterson and Douglas R. Stinson}, title = {Localised Multisecret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2015/922}, year = {2015}, url = {https://eprint.iacr.org/2015/922}, } @misc{cryptoeprint:2015:923, author = {Sikhar Patranabis and Yash Shrivastava and Debdeep Mukhopadhyay}, title = {DYNAMIC KEY-AGGREGATE CRYPTOSYSTEM ON ELLIPTIC CURVES FOR ONLINE DATA SHARING}, howpublished = {Cryptology ePrint Archive, Report 2015/923}, year = {2015}, url = {https://eprint.iacr.org/2015/923}, } @misc{cryptoeprint:2015:924, author = {Cong Chen and Thomas Eisenbarth and Ingo von Maurich and Rainer Steinwandt}, title = {Masking Large Keys in Hardware: A Masked Implementation of McEliece}, howpublished = {Cryptology ePrint Archive, Report 2015/924}, year = {2015}, url = {https://eprint.iacr.org/2015/924}, } @misc{cryptoeprint:2015:925, author = {Poulami Das, Debapriya Basu Roy, Debdeep Mukhopadhyay}, title = {Exploiting the Order of Multiplier Operands: A Low Cost Approach for HCCA Resistance}, howpublished = {Cryptology ePrint Archive, Report 2015/925}, year = {2015}, url = {https://eprint.iacr.org/2015/925}, } @misc{cryptoeprint:2015:926, author = {Vadim N.Tsypyschev and Julia S.Vinogradova}, title = {CRITERION OF MAXIMAL PERIOD OF A TRINOMIAL OVER NONTRIVIAL GALOIS RING OF ODD CHARACTERISTIC}, howpublished = {Cryptology ePrint Archive, Report 2015/926}, year = {2015}, url = {https://eprint.iacr.org/2015/926}, } @misc{cryptoeprint:2015:927, author = {Sky Faber and Stanislaw Jarecki and Hugo Krawczyk and Quan Nguyen and Marcel Rosu and Michael Steiner}, title = {Rich Queries on Encrypted Data: Beyond Exact Matches}, howpublished = {Cryptology ePrint Archive, Report 2015/927}, year = {2015}, url = {https://eprint.iacr.org/2015/927}, } @misc{cryptoeprint:2015:928, author = {Hassan Noura and Damien Couroussé}, title = {HLDCA-WSN: Homomorphic Lightweight Data Confidentiality Algorithm for Wireless Sensor Network}, howpublished = {Cryptology ePrint Archive, Report 2015/928}, year = {2015}, url = {https://eprint.iacr.org/2015/928}, } @misc{cryptoeprint:2015:929, author = {Yongjun Zhao and Sherman S.M. Chow}, title = {Are you The One to Share? Secret Transfer with Access Structure}, howpublished = {Cryptology ePrint Archive, Report 2015/929}, year = {2015}, url = {https://eprint.iacr.org/2015/929}, } @misc{cryptoeprint:2015:930, author = {Antoine Joux and Cécile Pierrot}, title = {Nearly Sparse Linear Algebra and application to Discrete Logarithms Computations}, howpublished = {Cryptology ePrint Archive, Report 2015/930}, year = {2015}, url = {https://eprint.iacr.org/2015/930}, } @misc{cryptoeprint:2015:931, author = {Payman Mohassel and Mike Rosulek and Ye Zhang}, title = {Fast and Secure Three-party Computation: The Garbled Circuit Approach}, howpublished = {Cryptology ePrint Archive, Report 2015/931}, year = {2015}, url = {https://eprint.iacr.org/2015/931}, } @misc{cryptoeprint:2015:932, author = {Sikhar Patranabis and Debapriya Basu Roy and Debdeep Mukhopadhyay}, title = {Using Tweaks To Design Fault Resistant Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2015/932}, year = {2015}, url = {https://eprint.iacr.org/2015/932}, } @misc{cryptoeprint:2015:933, author = {Jayaprakash Kar}, title = {Cryptanalysis of Provably Secure Certi cateless Short Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2015/933}, year = {2015}, url = {https://eprint.iacr.org/2015/933}, } @misc{cryptoeprint:2015:934, author = {Jung Hee Cheon, and Changmin Lee, and Hansol Ryu}, title = {Cryptanalysis of the New CLT Multilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2015/934}, year = {2015}, url = {https://eprint.iacr.org/2015/934}, } @misc{cryptoeprint:2015:935, author = {Céline Blondeau and Kaisa Nyberg}, title = {Joint Data and Key Distribution of Simple, Multiple, and Multidimensional Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity}, howpublished = {Cryptology ePrint Archive, Report 2015/935}, year = {2015}, url = {https://eprint.iacr.org/2015/935}, } @misc{cryptoeprint:2015:936, author = {Seyed salman Sajjadi GhaemMaghami, Mahtab Mirmohseni, Afrooz Haghbin}, title = {A Privacy Preserving Improvement for SRTA in Telecare Medicine Information System}, howpublished = {Cryptology ePrint Archive, Report 2015/936}, year = {2015}, url = {https://eprint.iacr.org/2015/936}, } @misc{cryptoeprint:2015:937, author = {Aydin Aysu and Ege Gulcan and Daisuke Moriyama and Patrick Schaumont and Moti Yung}, title = {End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol}, howpublished = {Cryptology ePrint Archive, Report 2015/937}, year = {2015}, url = {https://eprint.iacr.org/2015/937}, } @misc{cryptoeprint:2015:938, author = {Dong Pyo Chi and Jeong Woon Choi and Jeong San Kim and Taewan Kim}, title = {Lattice Based Cryptography for Beginners}, howpublished = {Cryptology ePrint Archive, Report 2015/938}, year = {2015}, url = {https://eprint.iacr.org/2015/938}, } @misc{cryptoeprint:2015:939, author = {Chris Peikert}, title = {A Decade of Lattice Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2015/939}, year = {2015}, url = {https://eprint.iacr.org/2015/939}, } @misc{cryptoeprint:2015:940, author = {Almog Benin and Sivan Toledo and Eran Tromer}, title = {Secure Association for the Internet of Things}, howpublished = {Cryptology ePrint Archive, Report 2015/940}, year = {2015}, url = {https://eprint.iacr.org/2015/940}, } @misc{cryptoeprint:2015:941, author = {Brice Minaud and Pierre-Alain Fouque}, title = {Cryptanalysis of the New Multilinear Map over the Integers}, howpublished = {Cryptology ePrint Archive, Report 2015/941}, year = {2015}, url = {https://eprint.iacr.org/2015/941}, } @misc{cryptoeprint:2015:942, author = {Ben Smyth}, title = {Secrecy and independence for election schemes}, howpublished = {Cryptology ePrint Archive, Report 2015/942}, year = {2015}, url = {https://eprint.iacr.org/2015/942}, } @misc{cryptoeprint:2015:943, author = {Tung Chou}, title = {Sandy2x: New Curve25519 Speed Records}, howpublished = {Cryptology ePrint Archive, Report 2015/943}, year = {2015}, url = {https://eprint.iacr.org/2015/943}, } @misc{cryptoeprint:2015:944, author = {Palash Sarkar and Shashank Singh}, title = {New Complexity Trade-Offs for the (Multiple) Number Field Sieve Algorithm in Non-Prime Fields}, howpublished = {Cryptology ePrint Archive, Report 2015/944}, year = {2015}, url = {https://eprint.iacr.org/2015/944}, } @misc{cryptoeprint:2015:945, author = {Changyu Dong and Franziskus Kiefer}, title = {Secure Set-based Policy Checking and Its Application to Password Registration}, howpublished = {Cryptology ePrint Archive, Report 2015/945}, year = {2015}, url = {https://eprint.iacr.org/2015/945}, } @misc{cryptoeprint:2015:946, author = {Alex Biryukov and Dmitry Khovratovich}, title = {Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem}, howpublished = {Cryptology ePrint Archive, Report 2015/946}, year = {2015}, url = {https://eprint.iacr.org/2015/946}, } @misc{cryptoeprint:2015:947, author = {Yi-Ruei Chen, Shiuan-Tzuo Shen, Wen-Guey Tzeng}, title = {Weave ElGamal Encryption for Secure Outsourcing Algebraic Computations over Zp}, howpublished = {Cryptology ePrint Archive, Report 2015/947}, year = {2015}, url = {https://eprint.iacr.org/2015/947}, } @misc{cryptoeprint:2015:948, author = {Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref}, title = {A Provably Secure Short Signature Scheme from Coding Theory}, howpublished = {Cryptology ePrint Archive, Report 2015/948}, year = {2015}, url = {https://eprint.iacr.org/2015/948}, } @misc{cryptoeprint:2015:949, author = {Luca Melis and Hassan Jameel Asghar and Emiliano De Cristofaro and Mohamed Ali Kaafar}, title = {Private Processing of Outsourced Network Functions: Feasibility and Constructions}, howpublished = {Cryptology ePrint Archive, Report 2015/949}, year = {2015}, url = {https://eprint.iacr.org/2015/949}, } @misc{cryptoeprint:2015:950, author = {Shota Goto and Junji Shikata}, title = {A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2015/950}, year = {2015}, url = {https://eprint.iacr.org/2015/950}, } @misc{cryptoeprint:2015:951, author = {Mahdi Cheraghchi}, title = {Nearly Optimal Robust Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2015/951}, year = {2015}, url = {https://eprint.iacr.org/2015/951}, } @misc{cryptoeprint:2015:952, author = {Rafael Dowsley and Felipe Lacerda and Anderson C. A. Nascimento}, title = {Commitment and Oblivious Transfer in the Bounded Storage Model with Errors}, howpublished = {Cryptology ePrint Archive, Report 2015/952}, year = {2015}, url = {https://eprint.iacr.org/2015/952}, } @misc{cryptoeprint:2015:953, author = {Markku-Juhani O. Saarinen}, title = {Gaussian Sampling Precision in Lattice Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2015/953}, year = {2015}, url = {https://eprint.iacr.org/2015/953}, } @misc{cryptoeprint:2015:954, author = {Kaoutar Elkhiyaoui and Melek \"Onen and Refik Molva}, title = {Online-Offline Homomorphic Signatures for Polynomial Functions}, howpublished = {Cryptology ePrint Archive, Report 2015/954}, year = {2015}, url = {https://eprint.iacr.org/2015/954}, } @misc{cryptoeprint:2015:955, author = {Mridul Nandi and Tapas Pandit}, title = {On the Power of Pair Encodings: Frameworks for Predicate Cryptographic Primitives}, howpublished = {Cryptology ePrint Archive, Report 2015/955}, year = {2015}, url = {https://eprint.iacr.org/2015/955}, } @misc{cryptoeprint:2015:956, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Analysis of the Kupyna-256 Hash Function}, howpublished = {Cryptology ePrint Archive, Report 2015/956}, year = {2015}, url = {https://eprint.iacr.org/2015/956}, } @misc{cryptoeprint:2015:957, author = {Yael Tauman Kalai and Omer Paneth}, title = {Delegating RAM Computations}, howpublished = {Cryptology ePrint Archive, Report 2015/957}, year = {2015}, url = {https://eprint.iacr.org/2015/957}, } @misc{cryptoeprint:2015:958, author = {Nilanjan Datta and Avijit Dutta and Mridul Nandi and Goutam Paul and Liting Zhang}, title = {Building Single-Key Beyond Birthday Bound Message Authentication Code}, howpublished = {Cryptology ePrint Archive, Report 2015/958}, year = {2015}, url = {https://eprint.iacr.org/2015/958}, } @misc{cryptoeprint:2015:959, author = {Jian Zou, Le Dong}, title = {Cryptanalysis of the Round-Reduced Kupyna Hash Function}, howpublished = {Cryptology ePrint Archive, Report 2015/959}, year = {2015}, url = {https://eprint.iacr.org/2015/959}, } @misc{cryptoeprint:2015:960, author = {Öznur Arabacı and. Mehmet Sabir Kiraz and. İsa Sertkaya and. Osmanbey Uzunkol}, title = {More Efficient Secure Outsourcing Methods for Bilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2015/960}, year = {2015}, url = {https://eprint.iacr.org/2015/960}, } @misc{cryptoeprint:2015:961, author = {Essam Ghadafi}, title = {Short Structure-Preserving Signatures}, howpublished = {Cryptology ePrint Archive, Report 2015/961}, year = {2015}, url = {https://eprint.iacr.org/2015/961}, } @misc{cryptoeprint:2015:962, author = {Thuong T. Dang, Tri T. Ton, Van H. Dang, Thuc D. Nguyen}, title = {SOME REMARKS ON THE LOGARITHMIC SIGNATURES OF FINITE ABELIAN GROUPS}, howpublished = {Cryptology ePrint Archive, Report 2015/962}, year = {2015}, url = {https://eprint.iacr.org/2015/962}, } @misc{cryptoeprint:2015:963, author = {Houda Ferradi and R\'emi G\'eraud and David Naccache and Assia Tria}, title = {When Organized Crime Applies Academic Results - A Forensic Analysis of an In-Card Listening Device}, howpublished = {Cryptology ePrint Archive, Report 2015/963}, year = {2015}, url = {https://eprint.iacr.org/2015/963}, } @misc{cryptoeprint:2015:964, author = {Danping Shi and Lei Hu and Siwei Sun and Ling Song}, title = {Improved Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN}, howpublished = {Cryptology ePrint Archive, Report 2015/964}, year = {2015}, url = {https://eprint.iacr.org/2015/964}, } @misc{cryptoeprint:2015:965, author = {Miran Kim and Kristin Lauter}, title = {Private Genome Analysis through Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/965}, year = {2015}, url = {https://eprint.iacr.org/2015/965}, } @misc{cryptoeprint:2015:966, author = {Dustin Moody and Ray Perlner}, title = {Vulnerabilities of ``McEliece in the World of Escher"}, howpublished = {Cryptology ePrint Archive, Report 2015/966}, year = {2015}, url = {https://eprint.iacr.org/2015/966}, } @misc{cryptoeprint:2015:967, author = {Marc Stevens and Pierre Karpman and Thomas Peyrin}, title = {Freestart collision for full SHA-1}, howpublished = {Cryptology ePrint Archive, Report 2015/967}, year = {2015}, url = {https://eprint.iacr.org/2015/967}, } @misc{cryptoeprint:2015:968, author = {Gaëtan Leurent}, title = {Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning}, howpublished = {Cryptology ePrint Archive, Report 2015/968}, year = {2015}, url = {https://eprint.iacr.org/2015/968}, } @misc{cryptoeprint:2015:969, author = {Claude Crepéau and Raza Ali Kazmi}, title = {Zero-Knowledge Interactive Proof Systems for New Lattice Problems}, howpublished = {Cryptology ePrint Archive, Report 2015/969}, year = {2015}, url = {https://eprint.iacr.org/2015/969}, } @misc{cryptoeprint:2015:970, author = {Gu Chunsheng}, title = {Multilinear Maps over the Integers Using Modulus Switching}, howpublished = {Cryptology ePrint Archive, Report 2015/970}, year = {2015}, url = {https://eprint.iacr.org/2015/970}, } @misc{cryptoeprint:2015:971, author = {Hao Chen and Kristin E. Lauter and Katherine E. Stange}, title = {Attacks on the Search-RLWE problem with small error}, howpublished = {Cryptology ePrint Archive, Report 2015/971}, year = {2015}, url = {https://eprint.iacr.org/2015/971}, } @misc{cryptoeprint:2015:972, author = {David Pointcheval and Olivier Sanders and Jacques Traoré}, title = {Cut Down the Tree to Achieve Constant Complexity in Divisible E-Cash}, howpublished = {Cryptology ePrint Archive, Report 2015/972}, year = {2015}, url = {https://eprint.iacr.org/2015/972}, } @misc{cryptoeprint:2015:973, author = {Ashwin Jha and Mridul Nandi}, title = {Some Cryptanalytic Results on Zipper Hash and Concatenated Hash}, howpublished = {Cryptology ePrint Archive, Report 2015/973}, year = {2015}, url = {https://eprint.iacr.org/2015/973}, } @misc{cryptoeprint:2015:974, author = {Ehsan Aerabi and A. Elhadi Amirouche and Houda Ferradi and R\'emi G\'eraud David Naccache and Jean Vuillemin}, title = {The Conjoined Microprocessor}, howpublished = {Cryptology ePrint Archive, Report 2015/974}, year = {2015}, url = {https://eprint.iacr.org/2015/974}, } @misc{cryptoeprint:2015:975, author = {James Alderman and Christian Janson and Keith M. Martin and Sarah Louise Renwick}, title = {Extended Functionality in Verifiable Searchable Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/975}, year = {2015}, url = {https://eprint.iacr.org/2015/975}, } @misc{cryptoeprint:2015:976, author = {Alex Biryukov and Léo Perrin}, title = {On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure}, howpublished = {Cryptology ePrint Archive, Report 2015/976}, year = {2015}, url = {https://eprint.iacr.org/2015/976}, } @misc{cryptoeprint:2015:977, author = {Michał Wroński}, title = {Faster point scalar multiplication on NIST elliptic curves over GF(p) using (twisted) Edwards curves over GF(p³)}, howpublished = {Cryptology ePrint Archive, Report 2015/977}, year = {2015}, url = {https://eprint.iacr.org/2015/977}, } @misc{cryptoeprint:2015:978, author = {Hugo Krawczyk and Hoeteck Wee}, title = {The OPTLS Protocol and TLS 1.3}, howpublished = {Cryptology ePrint Archive, Report 2015/978}, year = {2015}, url = {https://eprint.iacr.org/2015/978}, } @misc{cryptoeprint:2015:979, author = {Raluca Ada Popa and Nickolai Zeldovich and Hari Balakrishnan}, title = {Guidelines for Using the CryptDB System Securely}, howpublished = {Cryptology ePrint Archive, Report 2015/979}, year = {2015}, url = {https://eprint.iacr.org/2015/979}, } @misc{cryptoeprint:2015:980, author = {Behzad Abdolmaleki, Hamidreza Bakhshi, Karim Baghery, Mohammad Reza Aref}, title = {Analysis of an RFID Authentication Protocol in Accordance with EPC Standards}, howpublished = {Cryptology ePrint Archive, Report 2015/980}, year = {2015}, url = {https://eprint.iacr.org/2015/980}, } @misc{cryptoeprint:2015:981, author = {Ayantika Chatterjee and Indranil Sengupta}, title = {Searching and Sorting of Fully Homomorphic Encrypted Data on Cloud}, howpublished = {Cryptology ePrint Archive, Report 2015/981}, year = {2015}, url = {https://eprint.iacr.org/2015/981}, } @misc{cryptoeprint:2015:982, author = {Sihem Mesnager}, title = {A note on constructions of bent functions from involutions}, howpublished = {Cryptology ePrint Archive, Report 2015/982}, year = {2015}, url = {https://eprint.iacr.org/2015/982}, } @misc{cryptoeprint:2015:983, author = {Ping Ngai Chung and Craig Costello and Benjamin Smith}, title = {Fast, uniform, and compact scalar multiplication for elliptic curves and genus 2 Jacobians with applications to signature schemes}, howpublished = {Cryptology ePrint Archive, Report 2015/983}, year = {2015}, url = {https://eprint.iacr.org/2015/983}, } @misc{cryptoeprint:2015:984, author = {Koh-ichi Nagao}, title = {Complexity of ECDLP under the First Fall Degree Assumption}, howpublished = {Cryptology ePrint Archive, Report 2015/984}, year = {2015}, url = {https://eprint.iacr.org/2015/984}, } @misc{cryptoeprint:2015:985, author = {Koh-ichi Nagao}, title = {Polynomial time reduction from 3SAT to solving low first fall degree multivariable cubic equations system}, howpublished = {Cryptology ePrint Archive, Report 2015/985}, year = {2015}, url = {https://eprint.iacr.org/2015/985}, } @misc{cryptoeprint:2015:986, author = {Koh-ichi Nagao}, title = {Bit Coincidence Mining Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2015/986}, year = {2015}, url = {https://eprint.iacr.org/2015/986}, } @misc{cryptoeprint:2015:987, author = {Yehuda Lindell and Ben Riva}, title = {Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2015/987}, year = {2015}, url = {https://eprint.iacr.org/2015/987}, } @misc{cryptoeprint:2015:988, author = {Mohamed Ahmed Abdelraheem and Javad Alizadeh and Hoda A. Alkhzaimi and Mohammad Reza Aref and Nasour Bagheri and Praveen Gauravaram}, title = {Improved Linear Cryptanalysis of reduced-round SIMON-32 and SIMON-48}, howpublished = {Cryptology ePrint Archive, Report 2015/988}, year = {2015}, url = {https://eprint.iacr.org/2015/988}, } @misc{cryptoeprint:2015:989, author = {Ivan Damgård and Rasmus Winther Zakarias}, title = {Fast Oblivious AES\\A dedicated application of the MiniMac protocol}, howpublished = {Cryptology ePrint Archive, Report 2015/989}, year = {2015}, url = {https://eprint.iacr.org/2015/989}, } @misc{cryptoeprint:2015:990, author = {Geoffroy Couteau and Thomas Peters and David Pointcheval}, title = {Encryption Switching Protocols}, howpublished = {Cryptology ePrint Archive, Report 2015/990}, year = {2015}, url = {https://eprint.iacr.org/2015/990}, } @misc{cryptoeprint:2015:991, author = {Mike Scott}, title = {Ed3363 (HighFive) -- An alternative Elliptic Curve}, howpublished = {Cryptology ePrint Archive, Report 2015/991}, year = {2015}, url = {https://eprint.iacr.org/2015/991}, } @misc{cryptoeprint:2015:992, author = {Jinsu Kim and Sungwook Kim and Jae Hong Seo}, title = {Multilinear Map via Scale-Invariant FHE: Enhancing Security and Efficiency}, howpublished = {Cryptology ePrint Archive, Report 2015/992}, year = {2015}, url = {https://eprint.iacr.org/2015/992}, } @misc{cryptoeprint:2015:993, author = {Daniel Apon and Xiong Fan and Feng-Hao Liu}, title = {Bi-Deniable Inner Product Encryption from LWE}, howpublished = {Cryptology ePrint Archive, Report 2015/993}, year = {2015}, url = {https://eprint.iacr.org/2015/993}, } @misc{cryptoeprint:2015:994, author = {Pei Luo and Liwei Zhang and Yunsi Fei and A. Adam Ding}, title = {An Efficient Scheme to Reduce Side-Channel Leakage of MAC-Keccak for Smart Card}, howpublished = {Cryptology ePrint Archive, Report 2015/994}, year = {2015}, url = {https://eprint.iacr.org/2015/994}, } @misc{cryptoeprint:2015:995, author = {Nitesh Emmadi and Praveen Gauravaram and Harika Narumanchi and Habeeb Syed}, title = {Updates on Sorting of Fully Homomorphic Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2015/995}, year = {2015}, url = {https://eprint.iacr.org/2015/995}, } @misc{cryptoeprint:2015:996, author = {Daniel J. Bernstein}, title = {Multi-user Schnorr security, revisited}, howpublished = {Cryptology ePrint Archive, Report 2015/996}, year = {2015}, url = {https://eprint.iacr.org/2015/996}, } @misc{cryptoeprint:2015:997, author = {Sanjam Garg and Omkant Pandey}, title = {Incremental Program Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2015/997}, year = {2015}, url = {https://eprint.iacr.org/2015/997}, } @misc{cryptoeprint:2015:998, author = {Paolo D'Arco and Navid Nasr Esfahani and Douglas R. Stinson}, title = {All or Nothing at All}, howpublished = {Cryptology ePrint Archive, Report 2015/998}, year = {2015}, url = {https://eprint.iacr.org/2015/998}, } @misc{cryptoeprint:2015:999, author = {Robert Granger and Philipp Jovanovic and Bart Mennink and Samuel Neves}, title = {Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption}, howpublished = {Cryptology ePrint Archive, Report 2015/999}, year = {2015}, url = {https://eprint.iacr.org/2015/999}, } @misc{cryptoeprint:2016:001, author = {Yalin Chen1 and Jue-Sam Chou*2 and Hung - Sheng Wu}, title = {Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment}, howpublished = {Cryptology ePrint Archive, Report 2016/001}, year = {2016}, url = {https://eprint.iacr.org/2016/001}, } @misc{cryptoeprint:2016:002, author = {Ali Can Atici and Cemal Yilmaz and Erkay Savas}, title = {Remote Cache-Timing Attack without Learning Phase}, howpublished = {Cryptology ePrint Archive, Report 2016/002}, year = {2016}, url = {https://eprint.iacr.org/2016/002}, } @misc{cryptoeprint:2016:003, author = {Nicolas T. Courtois}, title = {On Splitting a Point with Summation Polynomials in Binary Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2016/003}, year = {2016}, url = {https://eprint.iacr.org/2016/003}, } @misc{cryptoeprint:2016:004, author = {Arnold Neumaier}, title = {Bounding basis reduction properties}, howpublished = {Cryptology ePrint Archive, Report 2016/004}, year = {2016}, url = {https://eprint.iacr.org/2016/004}, } @misc{cryptoeprint:2016:005, author = {John Jones}, title = {A Columnar Transposition cipher in a contemporary setting.}, howpublished = {Cryptology ePrint Archive, Report 2016/005}, year = {2016}, url = {https://eprint.iacr.org/2016/005}, } @misc{cryptoeprint:2016:006, author = {Huijia Lin and Rafael Pass and Karn Seth and Sidharth Telang}, title = {Indistinguishability Obfuscation with Non-trivial Efficiency}, howpublished = {Cryptology ePrint Archive, Report 2016/006}, year = {2016}, url = {https://eprint.iacr.org/2016/006}, } @misc{cryptoeprint:2016:007, author = {Fabrice Benhamouda and Céline Chevalier and Adrian Thillard and Damien Vergnaud}, title = {Easing Coppersmith Methods using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness}, howpublished = {Cryptology ePrint Archive, Report 2016/007}, year = {2016}, url = {https://eprint.iacr.org/2016/007}, } @misc{cryptoeprint:2016:008, author = {David Chaum and Debajyoti Das and Farid Javani and Aniket Kate and Anna Krasnova and Joeri de Ruiter and Alan T. Sherman }, title = {cMix: Anonymization by High-Performance Scalable Mixing}, howpublished = {Cryptology ePrint Archive, Report 2016/008}, year = {2016}, url = {https://eprint.iacr.org/2016/008}, } @misc{cryptoeprint:2016:009, author = {Mahshid Delavar and Sattar Mirzakuchaki and Mohammad Hassan Ameri and Javad Mohajeri}, title = {PUF-BASED SOLUTIONS FOR SECURE COMMUNICATIONS IN ADVANCED METERING INFRASTRUCTURE (AMI)}, howpublished = {Cryptology ePrint Archive, Report 2016/009}, year = {2016}, url = {https://eprint.iacr.org/2016/009}, } @misc{cryptoeprint:2016:010, author = {Albrecht Petzoldt and Jintai Ding and Lih-Chung Wang}, title = {Eliminating Decryption Failures from the Simple Matrix Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2016/010}, year = {2016}, url = {https://eprint.iacr.org/2016/010}, } @misc{cryptoeprint:2016:011, author = {Michel Abdalla and Florian Bourse and Angelo De Caro and David Pointcheval}, title = {Better Security for Functional Encryption for Inner Product Evaluations}, howpublished = {Cryptology ePrint Archive, Report 2016/011}, year = {2016}, url = {https://eprint.iacr.org/2016/011}, } @misc{cryptoeprint:2016:012, author = {Ariel Hamlin and Nabil Schear and Emily Shen and Mayank Varia and Sophia Yakoubov and Arkady Yerukhimovich}, title = {Cryptography for Big Data Security}, howpublished = {Cryptology ePrint Archive, Report 2016/012}, year = {2016}, url = {https://eprint.iacr.org/2016/012}, } @misc{cryptoeprint:2016:013, author = {Rosario Gennaro and Steven Goldfeder and Arvind Narayanan}, title = {Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security}, howpublished = {Cryptology ePrint Archive, Report 2016/013}, year = {2016}, url = {https://eprint.iacr.org/2016/013}, } @misc{cryptoeprint:2016:014, author = {Manuel Barbosa and Bernardo Portela and Guillaume Scerri and Bogdan Warinschi}, title = {Foundations of Hardware-Based Attested Computation and Application to SGX}, howpublished = {Cryptology ePrint Archive, Report 2016/014}, year = {2016}, url = {https://eprint.iacr.org/2016/014}, } @misc{cryptoeprint:2016:015, author = {Ehsan Ebrahimi Targhi and Gelo Noel Tabia and Dominique Unruh}, title = {Quantum Collision-Resistance of Non-Uniformly Distributed Functions}, howpublished = {Cryptology ePrint Archive, Report 2016/015}, year = {2016}, url = {https://eprint.iacr.org/2016/015}, } @misc{cryptoeprint:2016:016, author = {Alexander Schaub and Rémi Bazin and Omar Hasan and Lionel Brunie}, title = {A trustless privacy-preserving reputation system}, howpublished = {Cryptology ePrint Archive, Report 2016/016}, year = {2016}, url = {https://eprint.iacr.org/2016/016}, } @misc{cryptoeprint:2016:017, author = {Helger Lipmaa and Payman Mohassel and Saeed Sadeghian}, title = {Valiant's Universal Circuit: Improvements, Implementation, and Applications}, howpublished = {Cryptology ePrint Archive, Report 2016/017}, year = {2016}, url = {https://eprint.iacr.org/2016/017}, } @misc{cryptoeprint:2016:018, author = {Afonso Arriaga and Manuel Barbosa and Pooya Farshim}, title = {Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2016/018}, year = {2016}, url = {https://eprint.iacr.org/2016/018}, } @misc{cryptoeprint:2016:019, author = {Hyung Tae Lee and San Ling and Huaxiong Wang}, title = {Analysis of Gong et al.'s CCA2-Secure Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/019}, year = {2016}, url = {https://eprint.iacr.org/2016/019}, } @misc{cryptoeprint:2016:020, author = {Yonglin Hao and Willi Meier}, title = {Truncated Differential Based Known-Key Attacks on Round-Reduced Simon}, howpublished = {Cryptology ePrint Archive, Report 2016/020}, year = {2016}, url = {https://eprint.iacr.org/2016/020}, } @misc{cryptoeprint:2016:021, author = {Eli Ben-Sasson and Alessandro Chiesa and Ariel Gabizon and Madars Virza}, title = {Quasi-Linear Size Zero Knowledge from Linear-Algebraic PCPs}, howpublished = {Cryptology ePrint Archive, Report 2016/021}, year = {2016}, url = {https://eprint.iacr.org/2016/021}, } @misc{cryptoeprint:2016:022, author = {Enes Pasalic and Amela Muratovic-Ribic and Samir Hodzic and Sugata Gangopadhyay}, title = {On derivatives of polynomials over finite fields through integration}, howpublished = {Cryptology ePrint Archive, Report 2016/022}, year = {2016}, url = {https://eprint.iacr.org/2016/022}, } @misc{cryptoeprint:2016:023, author = {Yalin Chen1 and Jue-Sam Chou*2 and I - Chiung Liao3}, title = {Improved on an improved remote user authentication scheme with key agreement}, howpublished = {Cryptology ePrint Archive, Report 2016/023}, year = {2016}, url = {https://eprint.iacr.org/2016/023}, } @misc{cryptoeprint:2016:024, author = {Patrick McCorry and Siamak F. Shahandashti and Feng Hao}, title = {Refund attacks on Bitcoin’s Payment Protocol}, howpublished = {Cryptology ePrint Archive, Report 2016/024}, year = {2016}, url = {https://eprint.iacr.org/2016/024}, } @misc{cryptoeprint:2016:025, author = {Khoongming Khoo and Eugene Lee and Thomas Peyrin and Siang Meng Sim}, title = {Human-readable Proof of the Related-Key Security of AES-128}, howpublished = {Cryptology ePrint Archive, Report 2016/025}, year = {2016}, url = {https://eprint.iacr.org/2016/025}, } @misc{cryptoeprint:2016:026, author = {Abhishek Chakraborty and Debdeep Mukhopadhyay}, title = {A Practical Template Attack on MICKEY-128 2.0 Using PSO Generated IVs and LS-SVM}, howpublished = {Cryptology ePrint Archive, Report 2016/026}, year = {2016}, url = {https://eprint.iacr.org/2016/026}, } @misc{cryptoeprint:2016:027, author = {Dan Boneh and Henry Corrigan-Gibbs and Stuart Schechter}, title = {Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks}, howpublished = {Cryptology ePrint Archive, Report 2016/027}, year = {2016}, url = {https://eprint.iacr.org/2016/027}, } @misc{cryptoeprint:2016:028, author = {Jos Wetzels and Wouter Bokslag}, title = {Sponges and Engines: An introduction to Keccak and Keyak}, howpublished = {Cryptology ePrint Archive, Report 2016/028}, year = {2016}, url = {https://eprint.iacr.org/2016/028}, } @misc{cryptoeprint:2016:029, author = {Jos Wetzels and Wouter Bokslag}, title = {Simple SIMON: FPGA implementations of the SIMON 64/128 Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2016/029}, year = {2016}, url = {https://eprint.iacr.org/2016/029}, } @misc{cryptoeprint:2016:030, author = {Sedat Akleylek and Nina Bindel and Johannes Buchmann and Juliane Krämer and Giorgia Azzurra Marson}, title = {An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation}, howpublished = {Cryptology ePrint Archive, Report 2016/030}, year = {2016}, url = {https://eprint.iacr.org/2016/030}, } @misc{cryptoeprint:2016:031, author = {Antonio de la Piedra}, title = {Beyond the selective disclosure of ABCs on RAM-constrained devices}, howpublished = {Cryptology ePrint Archive, Report 2016/031}, year = {2016}, url = {https://eprint.iacr.org/2016/031}, } @misc{cryptoeprint:2016:032, author = {Janaka Alawatugoda}, title = {On the Leakage-Resilient Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2016/032}, year = {2016}, url = {https://eprint.iacr.org/2016/032}, } @misc{cryptoeprint:2016:033, author = {Frederik Armknecht and Daisuke Moriyama and Ahmad-Reza Sadeghi and Moti Yung}, title = {Towards a Unified Security Model for Physically Unclonable Functions}, howpublished = {Cryptology ePrint Archive, Report 2016/033}, year = {2016}, url = {https://eprint.iacr.org/2016/033}, } @misc{cryptoeprint:2016:034, author = {Jan Camenisch and Robert R. Enderlein and Stephan Krenn and Ralf Kuesters and Daniel Rausch}, title = {Universal Composition with Responsive Environments}, howpublished = {Cryptology ePrint Archive, Report 2016/034}, year = {2016}, url = {https://eprint.iacr.org/2016/034}, } @misc{cryptoeprint:2016:035, author = {Tal Moran and Ilan Orlov}, title = {Rational Proofs of Space-Time}, howpublished = {Cryptology ePrint Archive, Report 2016/035}, year = {2016}, url = {https://eprint.iacr.org/2016/035}, } @misc{cryptoeprint:2016:036, author = {wentan Yi and Shaozhen Chen}, title = {Characterizations of the Degraded Boolean Function and Cryptanalysis of the SAFER Family}, howpublished = {Cryptology ePrint Archive, Report 2016/036}, year = {2016}, url = {https://eprint.iacr.org/2016/036}, } @misc{cryptoeprint:2016:037, author = {Thomas P. Jakobsen and Jesper Buus Nielsen and Claudio Orlandi}, title = {A Framework for Outsourcing of Secure Computation }, howpublished = {Cryptology ePrint Archive, Report 2016/037}, year = {2016}, url = {https://eprint.iacr.org/2016/037}, } @misc{cryptoeprint:2016:038, author = {Iraklis Symeonids and Bart Preneel}, title = {Collateral Damage in Online Social Networks: computing the significance of information collection}, howpublished = {Cryptology ePrint Archive, Report 2016/038}, year = {2016}, url = {https://eprint.iacr.org/2016/038}, } @misc{cryptoeprint:2016:039, author = {Muhammad Nadeem}, title = {Standard quantum bit commitment – an indefinite commitment time}, howpublished = {Cryptology ePrint Archive, Report 2016/039}, year = {2016}, url = {https://eprint.iacr.org/2016/039}, } @misc{cryptoeprint:2016:040, author = {Xuefei Cao, Bo Chen, Hui Li and Yulong Fu}, title = {Packet Header Anomaly Detection Using Bayesian Topic Models}, howpublished = {Cryptology ePrint Archive, Report 2016/040}, year = {2016}, url = {https://eprint.iacr.org/2016/040}, } @misc{cryptoeprint:2016:041, author = {Preeti Kulshrestha and Arun Kumar }, title = {A NEW UNLINKABLE SECRET HANDSHAKES SCHEME BASED ON ZSS}, howpublished = {Cryptology ePrint Archive, Report 2016/041}, year = {2016}, url = {https://eprint.iacr.org/2016/041}, } @misc{cryptoeprint:2016:042, author = {Khushboo Bussi and Dhananjoy Dey and Manoj Kumar and B. K. Dass}, title = {Neeva: A Lightweight Hash Function}, howpublished = {Cryptology ePrint Archive, Report 2016/042}, year = {2016}, url = {https://eprint.iacr.org/2016/042}, } @misc{cryptoeprint:2016:043, author = {Amir S. Mortazavi, Mahmoud Salmasizadeh, Amir Daneshgar}, title = {Strong Continuous Non-malleable Encoding Schemes with Tamper-Detection}, howpublished = {Cryptology ePrint Archive, Report 2016/043}, year = {2016}, url = {https://eprint.iacr.org/2016/043}, } @misc{cryptoeprint:2016:044, author = {Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E. Gunnells}, title = {Defeating the Ben-Zvi, Blackburn, and Tsaban Attack on the Algebraic Eraser}, howpublished = {Cryptology ePrint Archive, Report 2016/044}, year = {2016}, url = {https://eprint.iacr.org/2016/044}, } @misc{cryptoeprint:2016:045, author = {Xi-Jun Lin and Lin Sun and Haipeng Qu and Xiaoshuai Zhang}, title = {New Approaches for Secure Outsourcing Algorithm for Modular Exponentiations}, howpublished = {Cryptology ePrint Archive, Report 2016/045}, year = {2016}, url = {https://eprint.iacr.org/2016/045}, } @misc{cryptoeprint:2016:046, author = {Yehuda Lindell}, title = {How To Simulate It - A Tutorial on the Simulation Proof Technique}, howpublished = {Cryptology ePrint Archive, Report 2016/046}, year = {2016}, url = {https://eprint.iacr.org/2016/046}, } @misc{cryptoeprint:2016:047, author = {Andrey Bogdanov and Martin M. Lauridsen and Elmar Tischhauser}, title = {Comb to Pipeline: Fast Software Encryption Revisited}, howpublished = {Cryptology ePrint Archive, Report 2016/047}, year = {2016}, url = {https://eprint.iacr.org/2016/047}, } @misc{cryptoeprint:2016:048, author = {Carsten Baum and Ivan Damgård and Tomas Toft and Rasmus Zakarias}, title = {Better Preprocessing for Secure Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2016/048}, year = {2016}, url = {https://eprint.iacr.org/2016/048}, } @misc{cryptoeprint:2016:049, author = {Christoph M. Mayer}, title = {Implementing a Toolkit for Ring-LWE Based Cryptography in Arbitrary Cyclotomic Number Fields}, howpublished = {Cryptology ePrint Archive, Report 2016/049}, year = {2016}, url = {https://eprint.iacr.org/2016/049}, } @misc{cryptoeprint:2016:050, author = {Masahiro Yagisawa}, title = {Improved Fully Homomorphic Encryption with Composite Number Modulus}, howpublished = {Cryptology ePrint Archive, Report 2016/050}, year = {2016}, url = {https://eprint.iacr.org/2016/050}, } @misc{cryptoeprint:2016:051, author = {Jialin Huang and Serge Vaudenay and Xuejia Lai and Kaisa Nyberg}, title = {Capacity and Data Complexity in Multidimensional Linear Attack}, howpublished = {Cryptology ePrint Archive, Report 2016/051}, year = {2016}, url = {https://eprint.iacr.org/2016/051}, } @misc{cryptoeprint:2016:052, author = {Gunnar Hartung and Björn Kaidel and Alexander Koch and Jessica Koch and Andy Rupp}, title = {Fault-Tolerant Aggregate Signatures}, howpublished = {Cryptology ePrint Archive, Report 2016/052}, year = {2016}, url = {https://eprint.iacr.org/2016/052}, } @misc{cryptoeprint:2016:053, author = {khalid Javeed and Xiaojun Wang}, title = {Speed and Area Optimized Parallel Higher-Radix Modular Multipliers}, howpublished = {Cryptology ePrint Archive, Report 2016/053}, year = {2016}, url = {https://eprint.iacr.org/2016/053}, } @misc{cryptoeprint:2016:054, author = {Masahiro Yagisawa}, title = {Fully Homomorphic Public-Key Encryption with Two Ciphertexts based on Discrete Logarithm Problem}, howpublished = {Cryptology ePrint Archive, Report 2016/054}, year = {2016}, url = {https://eprint.iacr.org/2016/054}, } @misc{cryptoeprint:2016:055, author = {Aanchal Malhotra and Sharon Goldberg}, title = {Attacking NTP's Authenticated Broadcast Mode}, howpublished = {Cryptology ePrint Archive, Report 2016/055}, year = {2016}, url = {https://eprint.iacr.org/2016/055}, } @misc{cryptoeprint:2016:056, author = {Ethan Heilman and Foteini Baldimtsi and Sharon Goldberg}, title = {Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions}, howpublished = {Cryptology ePrint Archive, Report 2016/056}, year = {2016}, url = {https://eprint.iacr.org/2016/056}, } @misc{cryptoeprint:2016:057, author = {Durga Prasad Sahoo and Phuong Ha Nguyen and Rajat Subhra Chakraborty and Debdeep Mukhopadhyay}, title = {Architectural Bias: a Novel Statistical Metric to Evaluate Arbiter PUF Variants}, howpublished = {Cryptology ePrint Archive, Report 2016/057}, year = {2016}, url = {https://eprint.iacr.org/2016/057}, } @misc{cryptoeprint:2016:058, author = {Dimitrios Poulakis}, title = {New Lattice Attacks on DSA Schemes}, howpublished = {Cryptology ePrint Archive, Report 2016/058}, year = {2016}, url = {https://eprint.iacr.org/2016/058}, } @misc{cryptoeprint:2016:059, author = {Muhammad Nadeem}, title = {Secure positioning and quantum non-local correlations}, howpublished = {Cryptology ePrint Archive, Report 2016/059}, year = {2016}, url = {https://eprint.iacr.org/2016/059}, } @misc{cryptoeprint:2016:060, author = {Amir Herzberg and Yehonatan Kfir}, title = {CrypTopology:Plug, Play and Recover Key Management}, howpublished = {Cryptology ePrint Archive, Report 2016/060}, year = {2016}, url = {https://eprint.iacr.org/2016/060}, } @misc{cryptoeprint:2016:061, author = {Christina Garman and Matthew Green and Ian Miers }, title = {Accountable Privacy for Decentralized Anonymous Payments}, howpublished = {Cryptology ePrint Archive, Report 2016/061}, year = {2016}, url = {https://eprint.iacr.org/2016/061}, } @misc{cryptoeprint:2016:062, author = {Raphael Bost and Pierre-Alain Fouque and David Pointcheval}, title = {Verifiable Dynamic Symmetric Searchable Encryption: Optimality and Forward Security}, howpublished = {Cryptology ePrint Archive, Report 2016/062}, year = {2016}, url = {https://eprint.iacr.org/2016/062}, } @misc{cryptoeprint:2016:063, author = {Remi Bricout and Sean Murphy and Kenneth G. Paterson and Thyla van der Merwe}, title = {Analysing and Exploiting the Mantin Biases in RC4}, howpublished = {Cryptology ePrint Archive, Report 2016/063}, year = {2016}, url = {https://eprint.iacr.org/2016/063}, } @misc{cryptoeprint:2016:064, author = {Yohei Watanabe and Goichiro Hanaoka and Junji Shikata}, title = {Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness}, howpublished = {Cryptology ePrint Archive, Report 2016/064}, year = {2016}, url = {https://eprint.iacr.org/2016/064}, } @misc{cryptoeprint:2016:065, author = {Yasufumi Hashimoto}, title = {A note on Tensor Simple Matrix Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2016/065}, year = {2016}, url = {https://eprint.iacr.org/2016/065}, } @misc{cryptoeprint:2016:066, author = {Lingyue Qin and Huaifeng Chen and Xiaoyun Wang}, title = {Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-guessing Techniques}, howpublished = {Cryptology ePrint Archive, Report 2016/066}, year = {2016}, url = {https://eprint.iacr.org/2016/066}, } @misc{cryptoeprint:2016:067, author = {Henry Carter and Patrick Traynor}, title = {OPFE: Outsourcing Computation for Private Function Evaluation}, howpublished = {Cryptology ePrint Archive, Report 2016/067}, year = {2016}, url = {https://eprint.iacr.org/2016/067}, } @misc{cryptoeprint:2016:068, author = {Yongge Wang}, title = {Octonion Algebra and Noise-Free Fully Homomorphic Encryption (FHE) Schemes}, howpublished = {Cryptology ePrint Archive, Report 2016/068}, year = {2016}, url = {https://eprint.iacr.org/2016/068}, } @misc{cryptoeprint:2016:069, author = {Gergei Bana and Rohit Chadha}, title = {Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability}, howpublished = {Cryptology ePrint Archive, Report 2016/069}, year = {2016}, url = {https://eprint.iacr.org/2016/069}, } @misc{cryptoeprint:2016:070, author = {Kamil Kluczniak}, title = {Domain-Specific Pseudonymous Signatures Revisited}, howpublished = {Cryptology ePrint Archive, Report 2016/070}, year = {2016}, url = {https://eprint.iacr.org/2016/070}, } @misc{cryptoeprint:2016:071, author = {Alex Biryukov and Léo Perrin and Aleksei Udovenko}, title = {Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1 (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2016/071}, year = {2016}, url = {https://eprint.iacr.org/2016/071}, } @misc{cryptoeprint:2016:072, author = {Karthikeyan Bhargavan and Christina Brzuska and Cédric Fournet and Matthew Green and Markulf Kohlweiss and Santiago Zanella-Béguelin}, title = {Downgrade Resilience in Key-Exchange Protocols}, howpublished = {Cryptology ePrint Archive, Report 2016/072}, year = {2016}, url = {https://eprint.iacr.org/2016/072}, } @misc{cryptoeprint:2016:073, author = {Jinsheng Zhang and Wensheng Zhang and Daji Qiao}, title = {MU-ORAM: Dealing with Stealthy Privacy Attacks in Multi-User Data Outsourcing Services}, howpublished = {Cryptology ePrint Archive, Report 2016/073}, year = {2016}, url = {https://eprint.iacr.org/2016/073}, } @misc{cryptoeprint:2016:074, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, title = {On the Power of Secure Two-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2016/074}, year = {2016}, url = {https://eprint.iacr.org/2016/074}, } @misc{cryptoeprint:2016:075, author = {Gajraj Kuldeep and Devendra Kumar Yadav and A. K. Sharma }, title = {Weaknesses in Hadamard Based Symmetric Key Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2016/075}, year = {2016}, url = {https://eprint.iacr.org/2016/075}, } @misc{cryptoeprint:2016:076, author = {Xi-Jun Lin and Haipeng Qu and Xiaoshuai Zhang}, title = {New Efficient and Flexible Algorithms for Secure Outsourcing of Bilinear Pairings}, howpublished = {Cryptology ePrint Archive, Report 2016/076}, year = {2016}, url = {https://eprint.iacr.org/2016/076}, } @misc{cryptoeprint:2016:077, author = {Shahram Rasoolzadeh and Håvard Raddum}, title = {Improved Multi-Dimensional Meet-in-the-Middle Cryptanalysis of KATAN}, howpublished = {Cryptology ePrint Archive, Report 2016/077}, year = {2016}, url = {https://eprint.iacr.org/2016/077}, } @misc{cryptoeprint:2016:078, author = {Ge Bai \and Ivan Damgård \and Claudio Orlandi \and Yu Xia}, title = {Non-Interactive Verifiable Secret Sharing For Monotone Circuits}, howpublished = {Cryptology ePrint Archive, Report 2016/078}, year = {2016}, url = {https://eprint.iacr.org/2016/078}, } @misc{cryptoeprint:2016:079, author = {Qiang Tang and Balazs Pejo and Husen Wang}, title = {Protect both Integrity and Confidentiality in Outsourcing Collaborative Filtering Computations}, howpublished = {Cryptology ePrint Archive, Report 2016/079}, year = {2016}, url = {https://eprint.iacr.org/2016/079}, } @misc{cryptoeprint:2016:080, author = {Shahram Rasoolzadeh and Håvard Raddum}, title = {Cryptanalysis of PRINCE with Minimal Data}, howpublished = {Cryptology ePrint Archive, Report 2016/080}, year = {2016}, url = {https://eprint.iacr.org/2016/080}, } @misc{cryptoeprint:2016:081, author = {Benjamin Dowling and Marc Fischlin and Felix Günther and Douglas Stebila}, title = {A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol}, howpublished = {Cryptology ePrint Archive, Report 2016/081}, year = {2016}, url = {https://eprint.iacr.org/2016/081}, } @misc{cryptoeprint:2016:082, author = {Olivier Blazy and David Derler and Daniel Slamanig and Raphael Spreitzer}, title = {Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability}, howpublished = {Cryptology ePrint Archive, Report 2016/082}, year = {2016}, url = {https://eprint.iacr.org/2016/082}, } @misc{cryptoeprint:2016:083, author = {Sharon Goldberg and Moni Naor and Dimitrios Papadopoulos and Leonid Reyzin}, title = {NSEC5 from Elliptic Curves: Provably Preventing DNSSEC Zone Enumeration with Shorter Responses}, howpublished = {Cryptology ePrint Archive, Report 2016/083}, year = {2016}, url = {https://eprint.iacr.org/2016/083}, } @misc{cryptoeprint:2016:084, author = {Qianqian Yang and Lei Hu and Siwei Sun and Ling Song}, title = {Truncated Differential Analysis of Round-Reduced RoadRunneR Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2016/084}, year = {2016}, url = {https://eprint.iacr.org/2016/084}, } @misc{cryptoeprint:2016:085, author = {Scott Fluhrer}, title = {Cryptanalysis of ring-LWE based key exchange with key share reuse}, howpublished = {Cryptology ePrint Archive, Report 2016/085}, year = {2016}, url = {https://eprint.iacr.org/2016/085}, } @misc{cryptoeprint:2016:086, author = {Victor Costan and Srinivas Devadas}, title = {Intel SGX Explained}, howpublished = {Cryptology ePrint Archive, Report 2016/086}, year = {2016}, url = {https://eprint.iacr.org/2016/086}, } @misc{cryptoeprint:2016:087, author = {Christina Brzuska and Håkon Jacobsen and Douglas Stebila}, title = {Safely Exporting Keys from Secure Channels: On the Security of EAP-TLS and TLS Key Exporters}, howpublished = {Cryptology ePrint Archive, Report 2016/087}, year = {2016}, url = {https://eprint.iacr.org/2016/087}, } @misc{cryptoeprint:2016:088, author = {Tomer Ashur and Vincent Rijmen}, title = {On Linear Hulls and Trails}, howpublished = {Cryptology ePrint Archive, Report 2016/088}, year = {2016}, url = {https://eprint.iacr.org/2016/088}, } @misc{cryptoeprint:2016:089, author = {Johannes Buchmann and Florian Göpfert and Rachel Player and Thomas Wunderer}, title = {On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack}, howpublished = {Cryptology ePrint Archive, Report 2016/089}, year = {2016}, url = {https://eprint.iacr.org/2016/089}, } @misc{cryptoeprint:2016:090, author = {Joan Daemen}, title = {Spectral characterization of iterating lossy mappings}, howpublished = {Cryptology ePrint Archive, Report 2016/090}, year = {2016}, url = {https://eprint.iacr.org/2016/090}, } @misc{cryptoeprint:2016:091, author = {Simon R.~Blackburn and M.J.B.~Robshaw}, title = {On the Security of the Algebraic Eraser Tag Authentication Protocol}, howpublished = {Cryptology ePrint Archive, Report 2016/091}, year = {2016}, url = {https://eprint.iacr.org/2016/091}, } @misc{cryptoeprint:2016:092, author = {Subhadeep Banik and Takanori Isobe}, title = {Cryptanalysis of the Full Spritz Stream Cipher}, howpublished = {Cryptology ePrint Archive, Report 2016/092}, year = {2016}, url = {https://eprint.iacr.org/2016/092}, } @misc{cryptoeprint:2016:093, author = {Ágnes Kiss and Thomas Schneider}, title = {Valiant's Universal Circuit is Practical}, howpublished = {Cryptology ePrint Archive, Report 2016/093}, year = {2016}, url = {https://eprint.iacr.org/2016/093}, } @misc{cryptoeprint:2016:094, author = {Romain Gay and Dennis Hofheinz and Eike Kiltz and Hoeteck Wee}, title = {Tightly CCA-Secure Encryption without Pairings}, howpublished = {Cryptology ePrint Archive, Report 2016/094}, year = {2016}, url = {https://eprint.iacr.org/2016/094}, } @misc{cryptoeprint:2016:095, author = {Dingfeng Ye and Peng Liu}, title = {Obfuscation without Multilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2016/095}, year = {2016}, url = {https://eprint.iacr.org/2016/095}, } @misc{cryptoeprint:2016:096, author = {Bing Sun and Meicheng Liu and Jian Guo and Vincent Rijmen and Ruilin Li}, title = {Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2016/096}, year = {2016}, url = {https://eprint.iacr.org/2016/096}, } @misc{cryptoeprint:2016:097, author = {Shashi Kant Pandey and P.R.Mishra and B.K.Dass}, title = {A Maiorana-McFarland Construction of a GBF on Galois ring}, howpublished = {Cryptology ePrint Archive, Report 2016/097}, year = {2016}, url = {https://eprint.iacr.org/2016/097}, } @misc{cryptoeprint:2016:098, author = {Stefan Kölbl and Martin M. Lauridsen and Florian Mendel and Christian Rechberger}, title = {Haraka v2 - Efficient Short-Input Hashing for Post-Quantum Applications}, howpublished = {Cryptology ePrint Archive, Report 2016/098}, year = {2016}, url = {https://eprint.iacr.org/2016/098}, } @misc{cryptoeprint:2016:099, author = {Michael Clear and Ciaran McGoldrick}, title = {Attribute-Based Fully Homomorphic Encryption with a Bounded Number of Inputs}, howpublished = {Cryptology ePrint Archive, Report 2016/099}, year = {2016}, url = {https://eprint.iacr.org/2016/099}, } @misc{cryptoeprint:2016:1000, author = {Yupu Hu and Zhizhu Lian and Jiangshan Chen}, title = {Solving Trapdoor Basis of Ideal Lattice from Public Basis }, howpublished = {Cryptology ePrint Archive, Report 2016/1000}, year = {2016}, url = {https://eprint.iacr.org/2016/1000}, } @misc{cryptoeprint:2016:1001, author = {Amit Jana and Goutam Paul}, title = {Revisiting RC4 Key Collision: Faster Search Algorithm and New 22-byte Colliding Key Pairs}, howpublished = {Cryptology ePrint Archive, Report 2016/1001}, year = {2016}, url = {https://eprint.iacr.org/2016/1001}, } @misc{cryptoeprint:2016:1002, author = {Anders Smedstuen Lund and Martin Strand}, title = {Decryption phase in Norwegian electronic voting}, howpublished = {Cryptology ePrint Archive, Report 2016/1002}, year = {2016}, url = {https://eprint.iacr.org/2016/1002}, } @misc{cryptoeprint:2016:1003, author = {Daniel Apon and Nico D\"{o}ttling and Sanjam Garg and Pratyay Mukherjee}, title = {Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13}, howpublished = {Cryptology ePrint Archive, Report 2016/1003}, year = {2016}, url = {https://eprint.iacr.org/2016/1003}, } @misc{cryptoeprint:2016:1004, author = {Stefan Dziembowski and Sebastian Faust and Francois-Xavier Standaert }, title = {Private Circuits III: Hardware Trojan-Resilience via Testing Amplification}, howpublished = {Cryptology ePrint Archive, Report 2016/1004}, year = {2016}, url = {https://eprint.iacr.org/2016/1004}, } @misc{cryptoeprint:2016:1005, author = {Subhadeep Banik and Andrey Bogdanov and Francesco Regazzoni}, title = {Atomic-AES v2.0}, howpublished = {Cryptology ePrint Archive, Report 2016/1005}, year = {2016}, url = {https://eprint.iacr.org/2016/1005}, } @misc{cryptoeprint:2016:1006, author = {Aanchal Malhotra and Matthew Van Gundy and Mayank Varia and Haydn Kennedy and Jonathan Gardner and Sharon Goldberg}, title = {The Security of NTP’s Datagram Protocol}, howpublished = {Cryptology ePrint Archive, Report 2016/1006}, year = {2016}, url = {https://eprint.iacr.org/2016/1006}, } @misc{cryptoeprint:2016:1007, author = {Nicola Atzei and Massimo Bartoletti and Tiziana Cimoli}, title = {A survey of attacks on Ethereum smart contracts}, howpublished = {Cryptology ePrint Archive, Report 2016/1007}, year = {2016}, url = {https://eprint.iacr.org/2016/1007}, } @misc{cryptoeprint:2016:1008, author = {Jorge Munilla}, title = {KP+ : Fixing Availability Issues on KP Ownership Transfer Protocols}, howpublished = {Cryptology ePrint Archive, Report 2016/1008}, year = {2016}, url = {https://eprint.iacr.org/2016/1008}, } @misc{cryptoeprint:2016:1009, author = {Tobias Nilges}, title = {Efficient Resettably Secure Two-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2016/1009}, year = {2016}, url = {https://eprint.iacr.org/2016/1009}, } @misc{cryptoeprint:2016:100, author = {Jo\"el Alwen and Binyi Chen and Chethan Kamath and Vladimir Kolmogorov and Krzysztof Pietrzak and Stefano Tessaro}, title = {On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2016/100}, year = {2016}, url = {https://eprint.iacr.org/2016/100}, } @misc{cryptoeprint:2016:1010, author = {Yossi Gilad and Avichai Cohen and Amir Herzberg and Michael Schapira and Haya Shulman}, title = {Are We There Yet? On RPKI's Deployment and Security}, howpublished = {Cryptology ePrint Archive, Report 2016/1010}, year = {2016}, url = {https://eprint.iacr.org/2016/1010}, } @misc{cryptoeprint:2016:1011, author = {Jean-Sébastien Coron and Moon Sung Lee and Tancrède Lepoint and Mehdi Tibouchi}, title = {Zeroizing Attacks on Indistinguishability Obfuscation over CLT13}, howpublished = {Cryptology ePrint Archive, Report 2016/1011}, year = {2016}, url = {https://eprint.iacr.org/2016/1011}, } @misc{cryptoeprint:2016:1012, author = {Damien Vergnaud}, title = {Comment on "Attribute-Based Signatures for Supporting Anonymous Certification" by N. Kaaniche and M. Laurent (ESORICS 2016)}, howpublished = {Cryptology ePrint Archive, Report 2016/1012}, year = {2016}, url = {https://eprint.iacr.org/2016/1012}, } @misc{cryptoeprint:2016:1013, author = {Katriel Cohn-Gordon and Cas Cremers and Benjamin Dowling and Luke Garratt and Douglas Stebila}, title = {A Formal Security Analysis of the Signal Messaging Protocol}, howpublished = {Cryptology ePrint Archive, Report 2016/1013}, year = {2016}, url = {https://eprint.iacr.org/2016/1013}, } @misc{cryptoeprint:2016:1014, author = {Liqun Chen and Thalia M. Laing and Keith M. Martin}, title = {Revisiting and Extending the AONT-RS scheme: a Robust Computationally Secure Secret Sharing Scheme}, howpublished = {Cryptology ePrint Archive, Report 2016/1014}, year = {2016}, url = {https://eprint.iacr.org/2016/1014}, } @misc{cryptoeprint:2016:1015, author = {Yossi Gilad and Omar Sagga and Sharon Goldberg}, title = {MaxLength Considered Harmful to the RPKI}, howpublished = {Cryptology ePrint Archive, Report 2016/1015}, year = {2016}, url = {https://eprint.iacr.org/2016/1015}, } @misc{cryptoeprint:2016:1016, author = {Mihir Bellare and Bertram Poettering and Douglas Stebila}, title = {Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures}, howpublished = {Cryptology ePrint Archive, Report 2016/1016}, year = {2016}, url = {https://eprint.iacr.org/2016/1016}, } @misc{cryptoeprint:2016:1017, author = {Douglas Stebila and Michele Mosca}, title = {Post-Quantum Key Exchange for the Internet and the Open Quantum Safe Project}, howpublished = {Cryptology ePrint Archive, Report 2016/1017}, year = {2016}, url = {https://eprint.iacr.org/2016/1017}, } @misc{cryptoeprint:2016:1018, author = {Stephanos Matsumoto and Raphael M. Reischuk}, title = {IKP: Turning a PKI Around with Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2016/1018}, year = {2016}, url = {https://eprint.iacr.org/2016/1018}, } @misc{cryptoeprint:2016:1019, author = {Anamaria Costache and Nigel P. Smart and Srinivas Vivek}, title = {Faster Homomorphic Evaluation of Discrete Fourier Transforms}, howpublished = {Cryptology ePrint Archive, Report 2016/1019}, year = {2016}, url = {https://eprint.iacr.org/2016/1019}, } @misc{cryptoeprint:2016:101, author = {Benoit Libert and San Ling and Fabrice Mouhartem and Khoa Nguyen and Huaxiong Wang}, title = {Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2016/101}, year = {2016}, url = {https://eprint.iacr.org/2016/101}, } @misc{cryptoeprint:2016:1020, author = {Yu Chen and Jiang Zhang and Yi Deng and Jinyong Chang}, title = {KDM Security for Identity-Based Encryption: Constructions and Separations}, howpublished = {Cryptology ePrint Archive, Report 2016/1020}, year = {2016}, url = {https://eprint.iacr.org/2016/1020}, } @misc{cryptoeprint:2016:1021, author = {Yan Yan and Elisabeth Oswald and Theo Tryfonas}, title = {Cryptographic Randomness on a CC2538: a Case Study}, howpublished = {Cryptology ePrint Archive, Report 2016/1021}, year = {2016}, url = {https://eprint.iacr.org/2016/1021}, } @misc{cryptoeprint:2016:1022, author = {Eleonora Guerrini and Laurent Imbert and Théo Winterhalter}, title = {Randomized Mixed-Radix Scalar Multiplication}, howpublished = {Cryptology ePrint Archive, Report 2016/1022}, year = {2016}, url = {https://eprint.iacr.org/2016/1022}, } @misc{cryptoeprint:2016:1023, author = {Michael Hutter and Michael Tunstall}, title = {Constant-Time Higher-Order Boolean-to-Arithmetic Masking}, howpublished = {Cryptology ePrint Archive, Report 2016/1023}, year = {2016}, url = {https://eprint.iacr.org/2016/1023}, } @misc{cryptoeprint:2016:1024, author = {Rauf Mahmudlu and Valentina Banciu and Lejla Batina and Ileana Buhan}, title = {LDA-Based Clustering as a Side-Channel Distinguisher}, howpublished = {Cryptology ePrint Archive, Report 2016/1024}, year = {2016}, url = {https://eprint.iacr.org/2016/1024}, } @misc{cryptoeprint:2016:1025, author = {Wenlun Pan and Zhenzhen Bao and Dongdai Lin and Feng Liu}, title = {An Algorithm for Counting the Number of $2^n$-Periodic Binary Sequences with Fixed $k$-Error Linear Complexity}, howpublished = {Cryptology ePrint Archive, Report 2016/1025}, year = {2016}, url = {https://eprint.iacr.org/2016/1025}, } @misc{cryptoeprint:2016:1026, author = {Paulo S. L. M. Barreto and Patrick Longa and Michael Naehrig and Jefferson E. Ricardini and Gustavo Zanon}, title = {Sharper Ring-LWE Signatures}, howpublished = {Cryptology ePrint Archive, Report 2016/1026}, year = {2016}, url = {https://eprint.iacr.org/2016/1026}, } @misc{cryptoeprint:2016:1027, author = {Rafael Pass and Elaine Shi and Florian Tramer}, title = {Formal Abstractions for Attested Execution Secure Processors}, howpublished = {Cryptology ePrint Archive, Report 2016/1027}, year = {2016}, url = {https://eprint.iacr.org/2016/1027}, } @misc{cryptoeprint:2016:1028, author = {Mihir Bellare and Asha Camper Singh and Joseph Jaeger and Maya Nyayapati and Igors Stepanovs}, title = {Ratcheted Encryption and Key Exchange: The Security of Messaging}, howpublished = {Cryptology ePrint Archive, Report 2016/1028}, year = {2016}, url = {https://eprint.iacr.org/2016/1028}, } @misc{cryptoeprint:2016:1029, author = {Yuqiao Deng, Ge Song}, title = {Scalable Attribute-Based Encryption Under the Strictly Weaker Assumption Family}, howpublished = {Cryptology ePrint Archive, Report 2016/1029}, year = {2016}, url = {https://eprint.iacr.org/2016/1029}, } @misc{cryptoeprint:2016:102, author = {Sanjam Garg and Omkant Pandey and Akshayaram Srinivasan and Mark Zhandry}, title = {Breaking the Sub-Exponential Barrier in Obfustopia}, howpublished = {Cryptology ePrint Archive, Report 2016/102}, year = {2016}, url = {https://eprint.iacr.org/2016/102}, } @misc{cryptoeprint:2016:1030, author = {Yuqiao Deng, Ge Song}, title = {Novel Inner Product Encryption Resistant to Partial Collusion Attacks}, howpublished = {Cryptology ePrint Archive, Report 2016/1030}, year = {2016}, url = {https://eprint.iacr.org/2016/1030}, } @misc{cryptoeprint:2016:1031, author = {Durga Prasad Sahoo, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty, Phuong Ha Nguyen}, title = {A Multiplexer based Arbiter PUF Composition with Enhanced Reliability and Security}, howpublished = {Cryptology ePrint Archive, Report 2016/1031}, year = {2016}, url = {https://eprint.iacr.org/2016/1031}, } @misc{cryptoeprint:2016:1032, author = {Stanislaw Jarecki}, title = {Efficient Covert Two-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2016/1032}, year = {2016}, url = {https://eprint.iacr.org/2016/1032}, } @misc{cryptoeprint:2016:1033, author = {Alessandro Chiesa and Matthew Green and Jingcheng Liu and Peihan Miao and Ian Miers and Pratyush Mishra}, title = {Decentralized Anonymous Micropayments}, howpublished = {Cryptology ePrint Archive, Report 2016/1033}, year = {2016}, url = {https://eprint.iacr.org/2016/1033}, } @misc{cryptoeprint:2016:1034, author = {Arka Rai Choudhuri and Subhamoy Maitra}, title = {Significantly Improved Multi-bit Differentials for Reduced Round Salsa and ChaCha}, howpublished = {Cryptology ePrint Archive, Report 2016/1034}, year = {2016}, url = {https://eprint.iacr.org/2016/1034}, } @misc{cryptoeprint:2016:1035, author = {Maciej Skorski}, title = {Improved Estimation of Collision Entropy in High and Low-Entropy Regimes and Applications to Anomaly Detection}, howpublished = {Cryptology ePrint Archive, Report 2016/1035}, year = {2016}, url = {https://eprint.iacr.org/2016/1035}, } @misc{cryptoeprint:2016:1036, author = {Zhiyuan Guo and Renzhang Liu and Wenling Wu and Dongdai Lin}, title = {Direct Construction of Lightweight Rotational-XOR MDS Diffusion Layers}, howpublished = {Cryptology ePrint Archive, Report 2016/1036}, year = {2016}, url = {https://eprint.iacr.org/2016/1036}, } @misc{cryptoeprint:2016:1037, author = {Dawid Gawel and Maciej Kosarzecki and Poorvi L. Vora and Hua Wu and Filip Zagorski}, title = {Apollo - End-to-end Verifiable Internet Voting with Recovery from Vote Manipulation}, howpublished = {Cryptology ePrint Archive, Report 2016/1037}, year = {2016}, url = {https://eprint.iacr.org/2016/1037}, } @misc{cryptoeprint:2016:1038, author = {Shi-Feng Sun, Joseph K. Liu, Amin Sakzad, Ron Steinfeld, Tsz Hon Yuen}, title = {An Efficient Non-Interactive Multi-client Searchable Encryption with Support for Boolean Queries}, howpublished = {Cryptology ePrint Archive, Report 2016/1038}, year = {2016}, url = {https://eprint.iacr.org/2016/1038}, } @misc{cryptoeprint:2016:1039, author = {Simon Cogliani and Rémi Géraud and David Naccache}, title = {A Fiat-Shamir Implementation Note}, howpublished = {Cryptology ePrint Archive, Report 2016/1039}, year = {2016}, url = {https://eprint.iacr.org/2016/1039}, } @misc{cryptoeprint:2016:103, author = {Nicolas Courtois and Guangyan Song and Ryan Castellucci}, title = {Speed Optimizations in Bitcoin Key Recovery Attacks}, howpublished = {Cryptology ePrint Archive, Report 2016/103}, year = {2016}, url = {https://eprint.iacr.org/2016/103}, } @misc{cryptoeprint:2016:1040, author = {Koji Nuida}, title = {Semi-Honest Secure Multiparty Computation Can Be Insecure with Use of Even Almost Uniformly Random Number Generators}, howpublished = {Cryptology ePrint Archive, Report 2016/1040}, year = {2016}, url = {https://eprint.iacr.org/2016/1040}, } @misc{cryptoeprint:2016:1041, author = {Chia-Mu Yu}, title = {XDedup: Efficient Provably-Secure Cross-User Chunk-Level Client-Side Deduplicated Cloud Storage of Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2016/1041}, year = {2016}, url = {https://eprint.iacr.org/2016/1041}, } @misc{cryptoeprint:2016:1042, author = {Leon Groot Bruinderink and Andreas Hülsing}, title = {"Oops, I did it again" -- Security of One-Time Signatures under Two-Message Attacks}, howpublished = {Cryptology ePrint Archive, Report 2016/1042}, year = {2016}, url = {https://eprint.iacr.org/2016/1042}, } @misc{cryptoeprint:2016:1043, author = {Brandon Broadnax and Nico D{\"o}ttling and Gunnar Hartung and J{\"o}rn M{\"u}ller-Quade and Matthias Nagel}, title = {Concurrently Composable Security With Shielded Super-polynomial Simulators}, howpublished = {Cryptology ePrint Archive, Report 2016/1043}, year = {2016}, url = {https://eprint.iacr.org/2016/1043}, } @misc{cryptoeprint:2016:1044, author = {Brian Koziel, Reza Azarderakhsh, Mehran Mozaffari Kermani}, title = {Fast Hardware Architectures for Supersingular Isogeny Diffie-Hellman Key Exchange on FPGA}, howpublished = {Cryptology ePrint Archive, Report 2016/1044}, year = {2016}, url = {https://eprint.iacr.org/2016/1044}, } @misc{cryptoeprint:2016:1045, author = {Brian Koziel, Reza Azarderakhsh, David Jao, and Mehran Mozaffari-Kermani}, title = {On Fast Calculation of Addition Chains for Isogeny-Based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2016/1045}, year = {2016}, url = {https://eprint.iacr.org/2016/1045}, } @misc{cryptoeprint:2016:1046, author = {Angshuman karmakar and Sujoy Sinha Roy and Frederik Vercauteren and Ingrid Verbauwhede}, title = {Efficient Finite field multiplication for isogeny based post quantum cryptography}, howpublished = {Cryptology ePrint Archive, Report 2016/1046}, year = {2016}, url = {https://eprint.iacr.org/2016/1046}, } @misc{cryptoeprint:2016:1047, author = {Eyal Ronen and Colin O’Flynn and Adi Shamir and Achi-Or Weingarten}, title = {IoT Goes Nuclear: Creating a ZigBee Chain Reaction}, howpublished = {Cryptology ePrint Archive, Report 2016/1047}, year = {2016}, url = {https://eprint.iacr.org/2016/1047}, } @misc{cryptoeprint:2016:1048, author = {Juan A. Garay and Aggelos Kiayias and Nikos Leonardos}, title = {The Bitcoin Backbone Protocol with Chains of Variable Difficulty}, howpublished = {Cryptology ePrint Archive, Report 2016/1048}, year = {2016}, url = {https://eprint.iacr.org/2016/1048}, } @misc{cryptoeprint:2016:1049, author = {Michal Kulis and Pawel Lorek and Filip Zagorski}, title = {Randomized stopping times and provably secure pseudorandom permutation generators}, howpublished = {Cryptology ePrint Archive, Report 2016/1049}, year = {2016}, url = {https://eprint.iacr.org/2016/1049}, } @misc{cryptoeprint:2016:104, author = {Jos Wetzels}, title = {Open Sesame: The Password Hashing Competition and Argon2}, howpublished = {Cryptology ePrint Archive, Report 2016/104}, year = {2016}, url = {https://eprint.iacr.org/2016/104}, } @misc{cryptoeprint:2016:1050, author = {Alex van Poppelen}, title = {Cryptographic decoding of the Leech lattice}, howpublished = {Cryptology ePrint Archive, Report 2016/1050}, year = {2016}, url = {https://eprint.iacr.org/2016/1050}, } @misc{cryptoeprint:2016:1051, author = {Shuai Han and Shengli Liu and Lin Lyu}, title = {Super-Strong RKA Secure MAC, PKE and SE from Tag-based Hash Proof System}, howpublished = {Cryptology ePrint Archive, Report 2016/1051}, year = {2016}, url = {https://eprint.iacr.org/2016/1051}, } @misc{cryptoeprint:2016:1052, author = {Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E Gunnells}, title = {Hickory Hash(TM): Implementing an Instance of an Algebraic Eraser(TM) Hash Function on an MSP430 Microcontroller}, howpublished = {Cryptology ePrint Archive, Report 2016/1052}, year = {2016}, url = {https://eprint.iacr.org/2016/1052}, } @misc{cryptoeprint:2016:1053, author = {Ashutosh Dhar Dwivedi and Milo\v{s} Klou\v{c}ek and Pawel Morawiecki and Ivica Nikoli{\'c} and Josef Pieprzyk and Sebastian W{\'o}jtowicz }, title = {SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition}, howpublished = {Cryptology ePrint Archive, Report 2016/1053}, year = {2016}, url = {https://eprint.iacr.org/2016/1053}, } @misc{cryptoeprint:2016:1054, author = {Giulio Malavolta and Pedro Moreno-Sanchez and Aniket Kate and Matteo Maffei}, title = {SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks}, howpublished = {Cryptology ePrint Archive, Report 2016/1054}, year = {2016}, url = {https://eprint.iacr.org/2016/1054}, } @misc{cryptoeprint:2016:1055, author = {Jung Hee Cheon, Kyoo Hyung Han, Jinsu Kim, Changmin Lee, and Yongha Son}, title = {A Practical Post-Quantum Public-Key Cryptosystem Based on spLWE}, howpublished = {Cryptology ePrint Archive, Report 2016/1055}, year = {2016}, url = {https://eprint.iacr.org/2016/1055}, } @misc{cryptoeprint:2016:1056, author = {Atsushi Takayasu and Noboru Kunihiro}, title = {A Tool Kit for Partial Key Exposure Attacks on RSA}, howpublished = {Cryptology ePrint Archive, Report 2016/1056}, year = {2016}, url = {https://eprint.iacr.org/2016/1056}, } @misc{cryptoeprint:2016:1057, author = {Raad Bahmani and Manuel Barbosa and Ferdinand Brasser and Bernardo Portela and Ahmad-Reza Sadeghi and Guillaume Scerri and Bogdan Warinschi}, title = {Secure Multiparty Computation from SGX}, howpublished = {Cryptology ePrint Archive, Report 2016/1057}, year = {2016}, url = {https://eprint.iacr.org/2016/1057}, } @misc{cryptoeprint:2016:1058, author = {Markku-Juhani O. Saarinen}, title = {Ring-LWE Ciphertext Compression and Error Correction: Tools for Lightweight Post-Quantum Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2016/1058}, year = {2016}, url = {https://eprint.iacr.org/2016/1058}, } @misc{cryptoeprint:2016:1059, author = {Ping Zhang, Peng Wang, and Honggang Hu}, title = {The INT-RUP Security of OCB with Intermediate (Parity) Checksum}, howpublished = {Cryptology ePrint Archive, Report 2016/1059}, year = {2016}, url = {https://eprint.iacr.org/2016/1059}, } @misc{cryptoeprint:2016:105, author = {Kristian Gjøsteen and Martin Strand}, title = {Can there be efficient and natural FHE schemes?}, howpublished = {Cryptology ePrint Archive, Report 2016/105}, year = {2016}, url = {https://eprint.iacr.org/2016/105}, } @misc{cryptoeprint:2016:1060, author = {Jakub Breier}, title = {On Analyzing Program Behavior Under Fault Injection Attacks}, howpublished = {Cryptology ePrint Archive, Report 2016/1060}, year = {2016}, url = {https://eprint.iacr.org/2016/1060}, } @misc{cryptoeprint:2016:1061, author = {Joan Daemen}, title = {Changing of the Guards: a simple and efficient method for achieving uniformity in threshold sharing}, howpublished = {Cryptology ePrint Archive, Report 2016/1061}, year = {2016}, url = {https://eprint.iacr.org/2016/1061}, } @misc{cryptoeprint:2016:1062, author = {Alin Tomescu and Srinivas Devadas}, title = {Catena: Efficient Non-equivocation via Bitcoin}, howpublished = {Cryptology ePrint Archive, Report 2016/1062}, year = {2016}, url = {https://eprint.iacr.org/2016/1062}, } @misc{cryptoeprint:2016:1063, author = {Yuzhe Tang and Ju Chen}, title = {Log-Structure Authenticated Data Storage with Minimal Trust}, howpublished = {Cryptology ePrint Archive, Report 2016/1063}, year = {2016}, url = {https://eprint.iacr.org/2016/1063}, } @misc{cryptoeprint:2016:1064, author = {David Derler and Stephan Krenn and Daniel Slamanig}, title = {Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing}, howpublished = {Cryptology ePrint Archive, Report 2016/1064}, year = {2016}, url = {https://eprint.iacr.org/2016/1064}, } @misc{cryptoeprint:2016:1065, author = {Yasuhiko Ikematsu and Dung H. Duong and Albrecht Petzoldt and Tsuyoshi Takagi}, title = {Revisiting the Efficient Key Generation of ZHFE }, howpublished = {Cryptology ePrint Archive, Report 2016/1065}, year = {2016}, url = {https://eprint.iacr.org/2016/1065}, } @misc{cryptoeprint:2016:1066, author = {Aner Ben-Efraim and Yehuda Lindell and Eran Omri}, title = {Optimizing Semi-Honest Secure Multiparty Computation for the Internet}, howpublished = {Cryptology ePrint Archive, Report 2016/1066}, year = {2016}, url = {https://eprint.iacr.org/2016/1066}, } @misc{cryptoeprint:2016:1067, author = {Ewa Syta and Philipp Jovanovic and Eleftherios Kokoris Kogias and Nicolas Gailly and Linus Gasser and Ismail Khoffi and Michael J. Fischer and Bryan Ford}, title = {Scalable Bias-Resistant Distributed Randomness}, howpublished = {Cryptology ePrint Archive, Report 2016/1067}, year = {2016}, url = {https://eprint.iacr.org/2016/1067}, } @misc{cryptoeprint:2016:1068, author = {Elena Dubrova and Maxim Teslenko}, title = {On Finding Short Cycles in Cryptographic Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2016/1068}, year = {2016}, url = {https://eprint.iacr.org/2016/1068}, } @misc{cryptoeprint:2016:1069, author = {Jesper Buus Nielsen and Thomas Schneider and Roberto Trifiletti}, title = {Constant Round Maliciously Secure 2PC with Function-independent Preprocessing using LEGO}, howpublished = {Cryptology ePrint Archive, Report 2016/1069}, year = {2016}, url = {https://eprint.iacr.org/2016/1069}, } @misc{cryptoeprint:2016:106, author = {Ivan Damgård and Helene Haagh and Claudio Orlandi}, title = {Access Control Encryption: Enforcing Information Flow with Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2016/106}, year = {2016}, url = {https://eprint.iacr.org/2016/106}, } @misc{cryptoeprint:2016:1070, author = {Rex Fernando and Peter M. R. Rasmussen and Amit Sahai}, title = {Preventing CLT Attacks on Obfuscation with Linear Overhead}, howpublished = {Cryptology ePrint Archive, Report 2016/1070}, year = {2016}, url = {https://eprint.iacr.org/2016/1070}, } @misc{cryptoeprint:2016:1071, author = {Ben A. Fisch, Dhinakaran Vinayagamurthy, Dan Boneh, Sergey Gorbunov}, title = {Iron: Functional Encryption using Intel SGX}, howpublished = {Cryptology ePrint Archive, Report 2016/1071}, year = {2016}, url = {https://eprint.iacr.org/2016/1071}, } @misc{cryptoeprint:2016:1072, author = {Haruna Higo and Keisuke Tanaka and Akihiro Yamada and Kenji Yasunaga}, title = {Game-Theoretic Security for Two-Party Protocols}, howpublished = {Cryptology ePrint Archive, Report 2016/1072}, year = {2016}, url = {https://eprint.iacr.org/2016/1072}, } @misc{cryptoeprint:2016:1073, author = {Daniel Slamanig and Raphael Spreitzer and Thomas Unterluggauer}, title = {Linking-Based Revocation for Group Signatures: A Pragmatic Approach for Efficient Revocation Checks}, howpublished = {Cryptology ePrint Archive, Report 2016/1073}, year = {2016}, url = {https://eprint.iacr.org/2016/1073}, } @misc{cryptoeprint:2016:1074, author = {Thomas Unterluggauer and Mario Werner and Stefan Mangard}, title = {Side-Channel Plaintext-Recovery Attacks on Leakage-Resilient Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/1074}, year = {2016}, url = {https://eprint.iacr.org/2016/1074}, } @misc{cryptoeprint:2016:1075, author = {Chunsheng Gu}, title = {Cryptanalysis of Simple Matrix Scheme for Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/1075}, year = {2016}, url = {https://eprint.iacr.org/2016/1075}, } @misc{cryptoeprint:2016:1076, author = {Mark Zhandry}, title = {A Note on Quantum-Secure PRPs}, howpublished = {Cryptology ePrint Archive, Report 2016/1076}, year = {2016}, url = {https://eprint.iacr.org/2016/1076}, } @misc{cryptoeprint:2016:1077, author = {N. P. Karvelas and Andreas Peter and Stefan Katzenbeisser}, title = {Blurry-ORAM: A Multi-Client Oblivious Storage Architecture}, howpublished = {Cryptology ePrint Archive, Report 2016/1077}, year = {2016}, url = {https://eprint.iacr.org/2016/1077}, } @misc{cryptoeprint:2016:1078, author = {Deng Tang and Subhamoy Maitra}, title = {Construction of $n$-variable ($n\equiv 2 \bmod 4$) balanced Boolean functions with maximum absolute value in autocorrelation spectra $< 2^{\frac n2}$}, howpublished = {Cryptology ePrint Archive, Report 2016/1078}, year = {2016}, url = {https://eprint.iacr.org/2016/1078}, } @misc{cryptoeprint:2016:1079, author = {Dung Hoang Duong and Takanori Yasuda and Albrecht Petzoldt and Yacheng Wang and Tsuyoshi Takagi}, title = {Revisiting the Cubic UOV Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2016/1079}, year = {2016}, url = {https://eprint.iacr.org/2016/1079}, } @misc{cryptoeprint:2016:107, author = {Hitesh Tewari and Arthur Hughes}, title = {Fully Anonymous Transferable Ecash}, howpublished = {Cryptology ePrint Archive, Report 2016/107}, year = {2016}, url = {https://eprint.iacr.org/2016/107}, } @misc{cryptoeprint:2016:1080, author = {Thomas De Cnudde and Begül Bilgin and Benedikt Gierlichs and Ventzislav Nikov and Svetla Nikova and Vincent Rijmen}, title = {Does Coupling Affect the Security of Masked Implementations?}, howpublished = {Cryptology ePrint Archive, Report 2016/1080}, year = {2016}, url = {https://eprint.iacr.org/2016/1080}, } @misc{cryptoeprint:2016:1081, author = {David Nuñez, and Isaac Agudo, and Javier Lopez}, title = {Attacks to a proxy-mediated key agreement protocol based on symmetric encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/1081}, year = {2016}, url = {https://eprint.iacr.org/2016/1081}, } @misc{cryptoeprint:2016:1082, author = {Si Gao and Hua Chen and Wenling Wu and Limin Fan and Weiqiong Cao and Xiangliang Ma}, title = {My traces learn what you did in the dark: recovering secret signals without key guesses}, howpublished = {Cryptology ePrint Archive, Report 2016/1082}, year = {2016}, url = {https://eprint.iacr.org/2016/1082}, } @misc{cryptoeprint:2016:1083, author = {Dingding Jia and Xianhui Lu and Bao Li}, title = {Constructions Secure against Receiver Selective Opening and Chosen Ciphertext Attacks}, howpublished = {Cryptology ePrint Archive, Report 2016/1083}, year = {2016}, url = {https://eprint.iacr.org/2016/1083}, } @misc{cryptoeprint:2016:1084, author = {T-H. Hubert Chan and Elaine Shi}, title = {Circuit OPRAM: Unifying Statistically and Computationally Secure ORAMs and OPRAMs}, howpublished = {Cryptology ePrint Archive, Report 2016/1084}, year = {2016}, url = {https://eprint.iacr.org/2016/1084}, } @misc{cryptoeprint:2016:1085, author = {David Derler and Claudio Orlandi and Sebastian Ramacher and Christian Rechberger and Daniel Slamanig}, title = {Digital Signatures from Symmetric-Key Primitives}, howpublished = {Cryptology ePrint Archive, Report 2016/1085}, year = {2016}, url = {https://eprint.iacr.org/2016/1085}, } @misc{cryptoeprint:2016:1086, author = {Reyhaneh Rabaninejad and Mohammad Hassan Ameri and Mahshid Delavar and Javad Mohajeri}, title = {An Attribute-Based Anonymous Broadcast Encryption Scheme with Adaptive Security in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2016/1086}, year = {2016}, url = {https://eprint.iacr.org/2016/1086}, } @misc{cryptoeprint:2016:1087, author = {Tetsu Iwata and Bart Mennink and Damian Vizár}, title = {CENC is Optimally Secure}, howpublished = {Cryptology ePrint Archive, Report 2016/1087}, year = {2016}, url = {https://eprint.iacr.org/2016/1087}, } @misc{cryptoeprint:2016:1088, author = {Anat Paskin-Cherniavsky}, title = {How to infinitely share a secret more efficiently}, howpublished = {Cryptology ePrint Archive, Report 2016/1088}, year = {2016}, url = {https://eprint.iacr.org/2016/1088}, } @misc{cryptoeprint:2016:1089, author = {Jérémy Chotard and Duong Hieu Phan and David Pointcheval}, title = {Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms}, howpublished = {Cryptology ePrint Archive, Report 2016/1089}, year = {2016}, url = {https://eprint.iacr.org/2016/1089}, } @misc{cryptoeprint:2016:108, author = {Alex Davidson and Carlos Cid}, title = {An Efficient Toolkit for Computing Private Set Operations}, howpublished = {Cryptology ePrint Archive, Report 2016/108}, year = {2016}, url = {https://eprint.iacr.org/2016/108}, } @misc{cryptoeprint:2016:1090, author = {Ritam Bhaumik and Mridul Nandi}, title = {OleF: An Inverse-Free Online Cipher}, howpublished = {Cryptology ePrint Archive, Report 2016/1090}, year = {2016}, url = {https://eprint.iacr.org/2016/1090}, } @misc{cryptoeprint:2016:1091, author = {Yuan Ma and Jingqiang Lin and Jiwu Jing}, title = {On the Entropy of Oscillator-Based True Random Number Generators}, howpublished = {Cryptology ePrint Archive, Report 2016/1091}, year = {2016}, url = {https://eprint.iacr.org/2016/1091}, } @misc{cryptoeprint:2016:1092, author = {Alexandre Gélin and Thorsten Kleinjung and Arjen K. Lenstra}, title = {Parametrizations for Families of ECM-friendly curves}, howpublished = {Cryptology ePrint Archive, Report 2016/1092}, year = {2016}, url = {https://eprint.iacr.org/2016/1092}, } @misc{cryptoeprint:2016:1093, author = {Siva Nishok Dhanuskodi and Daniel Holcomb}, title = {Energy Optimization of Unrolled Block Ciphers using Combinational Checkpointing}, howpublished = {Cryptology ePrint Archive, Report 2016/1093}, year = {2016}, url = {https://eprint.iacr.org/2016/1093}, } @misc{cryptoeprint:2016:1094, author = {Yohei Watanabe and Keita Emura and Jae Hong Seo}, title = {New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters}, howpublished = {Cryptology ePrint Archive, Report 2016/1094}, year = {2016}, url = {https://eprint.iacr.org/2016/1094}, } @misc{cryptoeprint:2016:1095, author = {Noboru Kunihiro and Yuki Takahashi}, title = {Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise}, howpublished = {Cryptology ePrint Archive, Report 2016/1095}, year = {2016}, url = {https://eprint.iacr.org/2016/1095}, } @misc{cryptoeprint:2016:1096, author = {Huijia Lin}, title = {Indistinguishability Obfuscation from SXDH on 5-Linear Maps and Locality-5 PRGs}, howpublished = {Cryptology ePrint Archive, Report 2016/1096}, year = {2016}, url = {https://eprint.iacr.org/2016/1096}, } @misc{cryptoeprint:2016:1097, author = {Prabhanjan Ananth and Amit Sahai}, title = {Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degree-5 Multilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2016/1097}, year = {2016}, url = {https://eprint.iacr.org/2016/1097}, } @misc{cryptoeprint:2016:1098, author = {Zhiyuan Guo and Wenling Wu and Renzhang Liu and Liting Zhang}, title = {Multi-key Analysis of Tweakable Even-Mansour with Applications to Minalpher and OPP}, howpublished = {Cryptology ePrint Archive, Report 2016/1098}, year = {2016}, url = {https://eprint.iacr.org/2016/1098}, } @misc{cryptoeprint:2016:1099, author = {Arjun Chopra}, title = {Improved Parameters for the Ring-TESLA Digital Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2016/1099}, year = {2016}, url = {https://eprint.iacr.org/2016/1099}, } @misc{cryptoeprint:2016:109, author = {Ivan Damgård and Tomas Toft and Rasmus Winther Zakarias}, title = {Fast Multiparty Multiplications from shared bits}, howpublished = {Cryptology ePrint Archive, Report 2016/109}, year = {2016}, url = {https://eprint.iacr.org/2016/109}, } @misc{cryptoeprint:2016:1100, author = {Quentin Alamélou and Paul-Edmond Berthier and Chloé Cachet and Stéphane Cauchie and Benjamin Fuller and Philippe Gaborit}, title = {Pseudoentropic Isometries: A New Framework for Fuzzy Extractor Reusability}, howpublished = {Cryptology ePrint Archive, Report 2016/1100}, year = {2016}, url = {https://eprint.iacr.org/2016/1100}, } @misc{cryptoeprint:2016:1101, author = {Ling Sun, Wei Wang, Ru Liu, Meiqin Wang}, title = {MILP-Aided Bit-Based Division Property for ARX-Based Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2016/1101}, year = {2016}, url = {https://eprint.iacr.org/2016/1101}, } @misc{cryptoeprint:2016:1102, author = {Alfred Menezes and Palash Sarkar and Shashank Singh}, title = {Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2016/1102}, year = {2016}, url = {https://eprint.iacr.org/2016/1102}, } @misc{cryptoeprint:2016:1103, author = {Debrup Chakraborty and Sebati Ghosh and Palash Sarkar}, title = {A Fast Single-Key Two-Level Universal Hash Function}, howpublished = {Cryptology ePrint Archive, Report 2016/1103}, year = {2016}, url = {https://eprint.iacr.org/2016/1103}, } @misc{cryptoeprint:2016:1104, author = {Carmen Elisabetta Zaira Baltico and Dario Catalano and Dario Fiore}, title = {Practical Functional Encryption for Bilinear Forms}, howpublished = {Cryptology ePrint Archive, Report 2016/1104}, year = {2016}, url = {https://eprint.iacr.org/2016/1104}, } @misc{cryptoeprint:2016:1105, author = {Miguel Ambrona and Gilles Barthe and Benedikt Schmidt}, title = {Generic Transformations of Predicate Encodings: Constructions and Applications}, howpublished = {Cryptology ePrint Archive, Report 2016/1105}, year = {2016}, url = {https://eprint.iacr.org/2016/1105}, } @misc{cryptoeprint:2016:1106, author = {Romain Gay}, title = {Functional Encryption for Quadratic Functions, and Applications to Predicate Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/1106}, year = {2016}, url = {https://eprint.iacr.org/2016/1106}, } @misc{cryptoeprint:2016:1107, author = {Yi Deng}, title = {Magic Adversaries Versus Individual Reduction: Science Wins Either Way}, howpublished = {Cryptology ePrint Archive, Report 2016/1107}, year = {2016}, url = {https://eprint.iacr.org/2016/1107}, } @misc{cryptoeprint:2016:1108, author = {Guozhen Liu and Mohona Ghosh and Ling Song}, title = {Security Analysis of SKINNY under Related-Tweakey Settings (Long Paper)}, howpublished = {Cryptology ePrint Archive, Report 2016/1108}, year = {2016}, url = {https://eprint.iacr.org/2016/1108}, } @misc{cryptoeprint:2016:1109, author = {Tobias Oder and Tobias Schneider and Thomas Pöppelmann and Tim Güneysu}, title = {Practical CCA2-Secure and Masked Ring-LWE Implementation}, howpublished = {Cryptology ePrint Archive, Report 2016/1109}, year = {2016}, url = {https://eprint.iacr.org/2016/1109}, } @misc{cryptoeprint:2016:110, author = {Navid Alamati and Chris Peikert}, title = {Three's Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE}, howpublished = {Cryptology ePrint Archive, Report 2016/110}, year = {2016}, url = {https://eprint.iacr.org/2016/110}, } @misc{cryptoeprint:2016:1110, author = {Steven Goldfeder and Melissa Chase and Greg Zaverucha}, title = {Efficient Post-Quantum Zero-Knowledge and Signatures}, howpublished = {Cryptology ePrint Archive, Report 2016/1110}, year = {2016}, url = {https://eprint.iacr.org/2016/1110}, } @misc{cryptoeprint:2016:1111, author = {Pascal Sasdrich and Amir Moradi and Tim Güneysu}, title = {Hiding Higher-Order Side-Channel Leakage - Randomizing Cryptographic Implementations in Reconfigurable Hardware}, howpublished = {Cryptology ePrint Archive, Report 2016/1111}, year = {2016}, url = {https://eprint.iacr.org/2016/1111}, } @misc{cryptoeprint:2016:1112, author = {Victor Cauchois and Pierre Loidreau and Nabil Merkiche}, title = {Direct construction of quasi-involutory recursive-like MDS matrices from $2$-cyclic codes}, howpublished = {Cryptology ePrint Archive, Report 2016/1112}, year = {2016}, url = {https://eprint.iacr.org/2016/1112}, } @misc{cryptoeprint:2016:1113, author = {Sabyasachi Dutta and Tamal Bhore and Avishek Adhikari}, title = {Efficient Construction of Visual Cryptographic Scheme for Compartmented Access Structures}, howpublished = {Cryptology ePrint Archive, Report 2016/1113}, year = {2016}, url = {https://eprint.iacr.org/2016/1113}, } @misc{cryptoeprint:2016:1114, author = {Louiza Khati and Nicky Mouha and Damien Vergnaud}, title = {Full Disk Encryption: Bridging Theory and Practice}, howpublished = {Cryptology ePrint Archive, Report 2016/1114}, year = {2016}, url = {https://eprint.iacr.org/2016/1114}, } @misc{cryptoeprint:2016:1115, author = {Mohamed Tolba and Ahmed Abdelkhalek and Amr M. Youssef}, title = {Impossible Differential Cryptanalysis of Reduced-Round SKINNY}, howpublished = {Cryptology ePrint Archive, Report 2016/1115}, year = {2016}, url = {https://eprint.iacr.org/2016/1115}, } @misc{cryptoeprint:2016:1116, author = {Maciej Skorski}, title = {Evaluating Entropy for TRNGs: Efficient, Robust and Provably Secure}, howpublished = {Cryptology ePrint Archive, Report 2016/1116}, year = {2016}, url = {https://eprint.iacr.org/2016/1116}, } @misc{cryptoeprint:2016:1117, author = {Joppe W. Bos and Wouter Castryck and and Ilia Iliashenko and Frederik Vercauteren}, title = {Privacy-friendly Forecasting for the Smart Grid using Homomorphic Encryption and the Group Method of Data Handling}, howpublished = {Cryptology ePrint Archive, Report 2016/1117}, year = {2016}, url = {https://eprint.iacr.org/2016/1117}, } @misc{cryptoeprint:2016:1118, author = {Ruoxin Zhao and Baofeng Wu and Rui Zhang and Qian Zhang}, title = {Designing Optimal Implementations of Linear Layers (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2016/1118}, year = {2016}, url = {https://eprint.iacr.org/2016/1118}, } @misc{cryptoeprint:2016:1119, author = {Quentin Alamélou and Olivier Blazy and Stéphane Cauchie and Philippe Gaborit}, title = {A Code-Based Group Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2016/1119}, year = {2016}, url = {https://eprint.iacr.org/2016/1119}, } @misc{cryptoeprint:2016:111, author = {Yoshinori Aono and Takuya Hayashi and Le Trieu Phong and Lihua Wang}, title = {Scalable and Secure Logistic Regression via Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/111}, year = {2016}, url = {https://eprint.iacr.org/2016/111}, } @misc{cryptoeprint:2016:1120, author = {Sadegh Sadeghi and Tahere Mohammadi and Nasour Bagheri}, title = {Cryptanalysis of Reduced round SKINNY Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2016/1120}, year = {2016}, url = {https://eprint.iacr.org/2016/1120}, } @misc{cryptoeprint:2016:1121, author = {Farzaneh abed and Francesco Berti and Stefan Lucks}, title = {Insecurity of RCB: Leakage-Resilient Authenticated Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/1121}, year = {2016}, url = {https://eprint.iacr.org/2016/1121}, } @misc{cryptoeprint:2016:1122, author = {B. Skoric and M. de Vries}, title = {Quantum Key Recycling with eight-state encoding (The Quantum One Time Pad is more interesting than we thought)}, howpublished = {Cryptology ePrint Archive, Report 2016/1122}, year = {2016}, url = {https://eprint.iacr.org/2016/1122}, } @misc{cryptoeprint:2016:1123, author = {Oscar Reparaz and Josep Balasch and Ingrid Verbauwhede}, title = {Dude, is my code constant time?}, howpublished = {Cryptology ePrint Archive, Report 2016/1123}, year = {2016}, url = {https://eprint.iacr.org/2016/1123}, } @misc{cryptoeprint:2016:1124, author = {Kazuya Imamura and Kazuhiko Minematsu and Tetsu Iwata}, title = {Integrity Analysis of Authenticated Encryption Based on Stream Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2016/1124}, year = {2016}, url = {https://eprint.iacr.org/2016/1124}, } @misc{cryptoeprint:2016:1125, author = {Koksal Mus and Mehmet Sabir Kiraz and Murat Cenk and Isa Sertkaya}, title = {Estonian Voting Verification Mechanism Revisited}, howpublished = {Cryptology ePrint Archive, Report 2016/1125}, year = {2016}, url = {https://eprint.iacr.org/2016/1125}, } @misc{cryptoeprint:2016:1126, author = {Jung Hee Cheon and Duhyeong Kim and Joohee Lee and Yongsoo Song}, title = {Lizard: Cut off the Tail! Practical Post-Quantum Public-Key Encryption from LWE and LWR}, howpublished = {Cryptology ePrint Archive, Report 2016/1126}, year = {2016}, url = {https://eprint.iacr.org/2016/1126}, } @misc{cryptoeprint:2016:1127, author = {Ralph Ankele and Subhadeep Banik and Avik Chakraborti and Eik List and Florian Mendel and Siang Meng Sim and Gaoli Wang}, title = {Related-Key Impossible-Differential Attack on Reduced-Round SKINNY}, howpublished = {Cryptology ePrint Archive, Report 2016/1127}, year = {2016}, url = {https://eprint.iacr.org/2016/1127}, } @misc{cryptoeprint:2016:1128, author = {Martin Ekerå}, title = {Modifying Shor’s algorithm to compute short discrete logarithms}, howpublished = {Cryptology ePrint Archive, Report 2016/1128}, year = {2016}, url = {https://eprint.iacr.org/2016/1128}, } @misc{cryptoeprint:2016:1129, author = {Xi-Jun Lin, Zhen Yan, Qi Zhang and Haipeng Qu}, title = {Certificateless Public Key Encryption with Equality Test}, howpublished = {Cryptology ePrint Archive, Report 2016/1129}, year = {2016}, url = {https://eprint.iacr.org/2016/1129}, } @misc{cryptoeprint:2016:112, author = {Dario Fiore and Anca Nitulescu}, title = {On the (In)security of SNARKs in the Presence of Oracles}, howpublished = {Cryptology ePrint Archive, Report 2016/112}, year = {2016}, url = {https://eprint.iacr.org/2016/112}, } @misc{cryptoeprint:2016:1130, author = {Atakan Arslan and Suleyman Kardas and Sultan Aldirmaz and Sarp Erturk}, title = {Are RNGs Achilles’ heel of RFID Security and Privacy Protocols ?}, howpublished = {Cryptology ePrint Archive, Report 2016/1130}, year = {2016}, url = {https://eprint.iacr.org/2016/1130}, } @misc{cryptoeprint:2016:1131, author = {Shiyi ZHANG and Yongjuan WANG and Guangpu GAO}, title = {New construction of single cycle T-function families}, howpublished = {Cryptology ePrint Archive, Report 2016/1131}, year = {2016}, url = {https://eprint.iacr.org/2016/1131}, } @misc{cryptoeprint:2016:1132, author = {Dibyendu Roy and Sourav Mukhopadhyay}, title = {Some results on ACORN}, howpublished = {Cryptology ePrint Archive, Report 2016/1132}, year = {2016}, url = {https://eprint.iacr.org/2016/1132}, } @misc{cryptoeprint:2016:1133, author = {Pedro Maat C. Massolino and Joost Renes and Lejla Batina}, title = {Implementing Complete Formulas on Weierstrass Curves in Hardware}, howpublished = {Cryptology ePrint Archive, Report 2016/1133}, year = {2016}, url = {https://eprint.iacr.org/2016/1133}, } @misc{cryptoeprint:2016:1134, author = {Qiang Tang and Husen Wang}, title = {Privacy-preserving Hybrid Recommender System}, howpublished = {Cryptology ePrint Archive, Report 2016/1134}, year = {2016}, url = {https://eprint.iacr.org/2016/1134}, } @misc{cryptoeprint:2016:1135, author = {Thorben Moos and Amir Moradi and Bastian Richter}, title = {Static Power Side-Channel Analysis of a Threshold Implementation Prototype Chip}, howpublished = {Cryptology ePrint Archive, Report 2016/1135}, year = {2016}, url = {https://eprint.iacr.org/2016/1135}, } @misc{cryptoeprint:2016:1136, author = {Phan Duong Hieu and Neal Koblitz}, title = {Cryptography During the French and American Wars in Vietnam}, howpublished = {Cryptology ePrint Archive, Report 2016/1136}, year = {2016}, url = {https://eprint.iacr.org/2016/1136}, } @misc{cryptoeprint:2016:1137, author = {HoChang Lee, HyungChul Kang, Deukjo Hong, Jaechul Sung, Seokhie Hong}, title = {New Impossible Differential Characteristic of SPECK64 using MILP}, howpublished = {Cryptology ePrint Archive, Report 2016/1137}, year = {2016}, url = {https://eprint.iacr.org/2016/1137}, } @misc{cryptoeprint:2016:1138, author = {Takeshi Koshiba and Katsuyuki Takashima}, title = {Pairing Cryptography Meets Isogeny: A New Framework of Isogenous Pairing Groups}, howpublished = {Cryptology ePrint Archive, Report 2016/1138}, year = {2016}, url = {https://eprint.iacr.org/2016/1138}, } @misc{cryptoeprint:2016:1139, author = {Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo}, title = {Comments on “Flaw in the Security Analysis of Leakage-resilient Authenticated Key Exchange Protocol from CT-RSA 2016 and Restoring the Security Proof”}, howpublished = {Cryptology ePrint Archive, Report 2016/1139}, year = {2016}, url = {https://eprint.iacr.org/2016/1139}, } @misc{cryptoeprint:2016:113, author = {Serge Fehr and Max Fillinger}, title = {On the Composition of Two-Prover Commitments, and Applications to Multi-Round Relativistic Commitments}, howpublished = {Cryptology ePrint Archive, Report 2016/113}, year = {2016}, url = {https://eprint.iacr.org/2016/113}, } @misc{cryptoeprint:2016:1140, author = {Xiaoyi Li and Kaitai Liang and Zhen Liu and Duncan S. Wong}, title = {Attribute Based Encryption: Traitor Tracing, Revocation and Fully Security on Prime Order Groups}, howpublished = {Cryptology ePrint Archive, Report 2016/1140}, year = {2016}, url = {https://eprint.iacr.org/2016/1140}, } @misc{cryptoeprint:2016:1141, author = {Kartik Nayak and Jonathan Katz}, title = {An Oblivious Parallel RAM with $O(\log^2 N)$ Parallel Runtime Blowup}, howpublished = {Cryptology ePrint Archive, Report 2016/1141}, year = {2016}, url = {https://eprint.iacr.org/2016/1141}, } @misc{cryptoeprint:2016:1142, author = {Shiyi ZHANG and Yongjuan WANG and Guangpu GAO}, title = {New construction of single-cycle T-function families}, howpublished = {Cryptology ePrint Archive, Report 2016/1142}, year = {2016}, url = {https://eprint.iacr.org/2016/1142}, } @misc{cryptoeprint:2016:1143, author = {Yongbo Hu and Chen Zhang and Yeyang Zheng and Mathias Wagner}, title = {Ciphertext and Plaintext Leakage Reveals the Entire TDES Key}, howpublished = {Cryptology ePrint Archive, Report 2016/1143}, year = {2016}, url = {https://eprint.iacr.org/2016/1143}, } @misc{cryptoeprint:2016:1144, author = {Xavier Carpent and Sky Faber and Tomas Sander and Gene Tsudik}, title = {Private Projections & Variants}, howpublished = {Cryptology ePrint Archive, Report 2016/1144}, year = {2016}, url = {https://eprint.iacr.org/2016/1144}, } @misc{cryptoeprint:2016:1145, author = {Merrielle Spain and Mayank Varia}, title = {Evolving S-Boxes with Reduced Differential Power Analysis Susceptibility}, howpublished = {Cryptology ePrint Archive, Report 2016/1145}, year = {2016}, url = {https://eprint.iacr.org/2016/1145}, } @misc{cryptoeprint:2016:1146, author = {Zengpeng Li and Steven D. Galbraith and Chunguang Ma}, title = {Preventing Adaptive Key Recovery Attacks on the Gentry-Sahai-Waters Leveled Homomorphic Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2016/1146}, year = {2016}, url = {https://eprint.iacr.org/2016/1146}, } @misc{cryptoeprint:2016:1147, author = {Nasrollah Pakniat, Mahnaz Noroozi}, title = {Cryptanalysis of a certificateless aggregate signature scheme}, howpublished = {Cryptology ePrint Archive, Report 2016/1147}, year = {2016}, url = {https://eprint.iacr.org/2016/1147}, } @misc{cryptoeprint:2016:1148, author = {Frank Wang and Catherine Yun and Shafi Goldwasser and Vinod Vaikuntanathan and Matei Zaharia}, title = {Splinter: Practical Private Queries on Public Data}, howpublished = {Cryptology ePrint Archive, Report 2016/1148}, year = {2016}, url = {https://eprint.iacr.org/2016/1148}, } @misc{cryptoeprint:2016:1149, author = {Krishna Bagadia and Urbi Chatterjee and Debapriya Basu Roy and Debdeep Mukhopadhyay and Rajat Subhra Chakraborty}, title = {Exploiting Safe Error based Leakage of RFID Authentication Protocol using Hardware Trojan Horse}, howpublished = {Cryptology ePrint Archive, Report 2016/1149}, year = {2016}, url = {https://eprint.iacr.org/2016/1149}, } @misc{cryptoeprint:2016:114, author = {Mark Zhandry}, title = {The Magic of ELFs}, howpublished = {Cryptology ePrint Archive, Report 2016/114}, year = {2016}, url = {https://eprint.iacr.org/2016/114}, } @misc{cryptoeprint:2016:1150, author = {Rio LaVigne}, title = {Simple Homomorphisms of Cocks IBE and Applications}, howpublished = {Cryptology ePrint Archive, Report 2016/1150}, year = {2016}, url = {https://eprint.iacr.org/2016/1150}, } @misc{cryptoeprint:2016:1151, author = {Mike Scott}, title = {A Novel Multi-factor ID-based Designated Verifier Signature scheme}, howpublished = {Cryptology ePrint Archive, Report 2016/1151}, year = {2016}, url = {https://eprint.iacr.org/2016/1151}, } @misc{cryptoeprint:2016:1152, author = {Debapriya Basu Roy and Shivam Bhasin and Sylvain Guilley and Annelie Heuser and Sikhar Patranabis and Debdeep Mukhopadhyay}, title = {Leak Me If You Can: Does TVLA Reveal Success Rate?}, howpublished = {Cryptology ePrint Archive, Report 2016/1152}, year = {2016}, url = {https://eprint.iacr.org/2016/1152}, } @misc{cryptoeprint:2016:1153, author = {Momonari Kudo}, title = {Attacks against search Poly-LWE}, howpublished = {Cryptology ePrint Archive, Report 2016/1153}, year = {2016}, url = {https://eprint.iacr.org/2016/1153}, } @misc{cryptoeprint:2016:1154, author = {Steven D. Galbraith and Christophe Petit and Javier Silva}, title = {Signature Schemes Based On Supersingular Isogeny Problems}, howpublished = {Cryptology ePrint Archive, Report 2016/1154}, year = {2016}, url = {https://eprint.iacr.org/2016/1154}, } @misc{cryptoeprint:2016:1155, author = {Mathias Wagner and Yongbo Hu and Chen Zhang and Yeyang Zheng}, title = {Comparative Study of Various Approximations to the Covariance Matrix in Template Attacks}, howpublished = {Cryptology ePrint Archive, Report 2016/1155}, year = {2016}, url = {https://eprint.iacr.org/2016/1155}, } @misc{cryptoeprint:2016:1156, author = {Pablo Lamela Seijas and Simon Thompson and Darryl McAdams}, title = {Scripting smart contracts for distributed ledger technology}, howpublished = {Cryptology ePrint Archive, Report 2016/1156}, year = {2016}, url = {https://eprint.iacr.org/2016/1156}, } @misc{cryptoeprint:2016:1157, author = {Erdem Alkim and Léo Ducas and Thomas Pöppelmann and Peter Schwabe}, title = {NewHope without reconciliation}, howpublished = {Cryptology ePrint Archive, Report 2016/1157}, year = {2016}, url = {https://eprint.iacr.org/2016/1157}, } @misc{cryptoeprint:2016:1158, author = {Eric R. Verheul}, title = {Activate Later Certificates for V2X -- Combining ITS efficiency with privacy}, howpublished = {Cryptology ePrint Archive, Report 2016/1158}, year = {2016}, url = {https://eprint.iacr.org/2016/1158}, } @misc{cryptoeprint:2016:1159, author = {Yonatan Sompolinsky and Yoad Lewenberg and Aviv Zohar}, title = {SPECTRE: A Fast and Scalable Cryptocurrency Protocol}, howpublished = {Cryptology ePrint Archive, Report 2016/1159}, year = {2016}, url = {https://eprint.iacr.org/2016/1159}, } @misc{cryptoeprint:2016:115, author = {Joel Alwen and Jeremiah Blocki}, title = {Efficiently Computing Data-Independent Memory-Hard Functions}, howpublished = {Cryptology ePrint Archive, Report 2016/115}, year = {2016}, url = {https://eprint.iacr.org/2016/115}, } @misc{cryptoeprint:2016:1160, author = {Rui Zong and Xiaoyang Dong}, title = {Meet-in-the-Middle Attack on QARMA Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2016/1160}, year = {2016}, url = {https://eprint.iacr.org/2016/1160}, } @misc{cryptoeprint:2016:1161, author = {Rui Zong and Xiaoyang Dong and Xiaoyun Wang}, title = {Impossible Differential Attack on Simpira v2}, howpublished = {Cryptology ePrint Archive, Report 2016/1161}, year = {2016}, url = {https://eprint.iacr.org/2016/1161}, } @misc{cryptoeprint:2016:1162, author = {Jian Guo and Jérémy Jean and Ivica Nikolic and Yu Sasaki}, title = {Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions}, howpublished = {Cryptology ePrint Archive, Report 2016/1162}, year = {2016}, url = {https://eprint.iacr.org/2016/1162}, } @misc{cryptoeprint:2016:1163, author = {Wen-jie Lu and Shohei Kawasaki and Jun Sakuma}, title = {Using Fully Homomorphic Encryption for Statistical Analysis of Categorical, Ordinal and Numerical Data}, howpublished = {Cryptology ePrint Archive, Report 2016/1163}, year = {2016}, url = {https://eprint.iacr.org/2016/1163}, } @misc{cryptoeprint:2016:1164, author = {Ilaria Chillotti and Nicolas Gama and Louis Goubin }, title = {Attacking FHE-based applications by software fault injections}, howpublished = {Cryptology ePrint Archive, Report 2016/1164}, year = {2016}, url = {https://eprint.iacr.org/2016/1164}, } @misc{cryptoeprint:2016:1165, author = {Stuart Haber and William Horne and Miaomiao Zhang}, title = {Efficient Transparent Redactable Signatures with a Single Signature Invocation}, howpublished = {Cryptology ePrint Archive, Report 2016/1165}, year = {2016}, url = {https://eprint.iacr.org/2016/1165}, } @misc{cryptoeprint:2016:1166, author = {Maria Isabel Gonzalez Vasco and Angel L. Perez del Pozo and Adriana Suarez Corona}, title = {Group key exchange protocols withstanding ephemeral-key reveals}, howpublished = {Cryptology ePrint Archive, Report 2016/1166}, year = {2016}, url = {https://eprint.iacr.org/2016/1166}, } @misc{cryptoeprint:2016:1167, author = {Sumit Chakraborty}, title = {Mobile Commerce: Secure Multi-party Computation & Financial Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2016/1167}, year = {2016}, url = {https://eprint.iacr.org/2016/1167}, } @misc{cryptoeprint:2016:1168, author = {Alan Szepieniec and Bart Preneel}, title = {Generic Zero-Knowledge and Multivariate Quadratic Systems}, howpublished = {Cryptology ePrint Archive, Report 2016/1168}, year = {2016}, url = {https://eprint.iacr.org/2016/1168}, } @misc{cryptoeprint:2016:1169, author = {Qi Cheng and Jun Zhang and Jincheng Zhuang}, title = {LWE from Non-commutative Group Rings}, howpublished = {Cryptology ePrint Archive, Report 2016/1169}, year = {2016}, url = {https://eprint.iacr.org/2016/1169}, } @misc{cryptoeprint:2016:116, author = {Eli Ben-Sasson and Alessandro Chiesa and Nicholas Spooner}, title = {Interactive Oracle Proofs}, howpublished = {Cryptology ePrint Archive, Report 2016/116}, year = {2016}, url = {https://eprint.iacr.org/2016/116}, } @misc{cryptoeprint:2016:1170, author = {Christoph Dobraunig and Eik List}, title = {Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC}, howpublished = {Cryptology ePrint Archive, Report 2016/1170}, year = {2016}, url = {https://eprint.iacr.org/2016/1170}, } @misc{cryptoeprint:2016:1171, author = {Roberto Avanzi}, title = {A Salad of Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2016/1171}, year = {2016}, url = {https://eprint.iacr.org/2016/1171}, } @misc{cryptoeprint:2016:1172, author = {Ping Zhang and Honggang Hu}, title = {On the Provable Security of the Tweakable Even-Mansour Cipher Against Multi-Key and Related-Key Attacks}, howpublished = {Cryptology ePrint Archive, Report 2016/1172}, year = {2016}, url = {https://eprint.iacr.org/2016/1172}, } @misc{cryptoeprint:2016:1173, author = {Lijing Zhou, Licheng Wang and Yiru Sun}, title = {Construction of Lightweight MDS Matrices over the Matrix Polynomial Residue Ring}, howpublished = {Cryptology ePrint Archive, Report 2016/1173}, year = {2016}, url = {https://eprint.iacr.org/2016/1173}, } @misc{cryptoeprint:2016:1174, author = {Eik List and Mridul Nandi}, title = {Revisiting Full-PRF-Secure PMAC and Using It for Beyond-Birthday Authenticated Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/1174}, year = {2016}, url = {https://eprint.iacr.org/2016/1174}, } @misc{cryptoeprint:2016:1175, author = {Dario Catalano and Dario Fiore and Luca Nizzardo}, title = {On the Security Notions for Homomorphic Signatures}, howpublished = {Cryptology ePrint Archive, Report 2016/1175}, year = {2016}, url = {https://eprint.iacr.org/2016/1175}, } @misc{cryptoeprint:2016:1176, author = {Jintai Ding and Saed Alsayigh and Saraswathy RV and Scott Fluhrer and Xiaodong Lin}, title = {Leakage of Signal function with reused keys in RLWE key exchange}, howpublished = {Cryptology ePrint Archive, Report 2016/1176}, year = {2016}, url = {https://eprint.iacr.org/2016/1176}, } @misc{cryptoeprint:2016:1177, author = {Achiya Bar-On and Eli Biham and Orr Dunkelman and Nathan Keller}, title = {Efficient Slide Attacks}, howpublished = {Cryptology ePrint Archive, Report 2016/1177}, year = {2016}, url = {https://eprint.iacr.org/2016/1177}, } @misc{cryptoeprint:2016:1178, author = {Karthikeyan Bhargavan and Antoine Delignat-Lavaud and Cédric Fournet and Markulf Kohlweiss and Jianyang Pan and Jonathan Protzenko and Aseem Rastogi and Nikhil Swamy and Santiago Zanella-Béguelin and Jean Karim Zinzindohoué}, title = {Implementing and Proving the TLS 1.3 Record Layer}, howpublished = {Cryptology ePrint Archive, Report 2016/1178}, year = {2016}, url = {https://eprint.iacr.org/2016/1178}, } @misc{cryptoeprint:2016:1179, author = {Afonso Arriaga and Vincenzo Iovino and Qiang Tang}, title = {Updatable Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/1179}, year = {2016}, url = {https://eprint.iacr.org/2016/1179}, } @misc{cryptoeprint:2016:117, author = {Venkata Koppula and Brent Waters}, title = {Circular Security Separations for Arbitrary Length Cycles from LWE}, howpublished = {Cryptology ePrint Archive, Report 2016/117}, year = {2016}, url = {https://eprint.iacr.org/2016/117}, } @misc{cryptoeprint:2016:1180, author = {Sumit Kumar Debnath and Ratna Dutta}, title = {How to Meet Big Data When Private Set Intersection Realizes Constatnt Communication Complexity}, howpublished = {Cryptology ePrint Archive, Report 2016/1180}, year = {2016}, url = {https://eprint.iacr.org/2016/1180}, } @misc{cryptoeprint:2016:1181, author = {Yu Sasaki and Yosuke Todo}, title = {New Impossible Differential Search Tool from Design and Cryptanalysis Aspects}, howpublished = {Cryptology ePrint Archive, Report 2016/1181}, year = {2016}, url = {https://eprint.iacr.org/2016/1181}, } @misc{cryptoeprint:2016:1182, author = {Hyung Tae Lee and San Ling and Jae Hong Seo and Huaxiong Wang and Taek-Young Youn}, title = {Public Key Encryption with Equality Test in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2016/1182}, year = {2016}, url = {https://eprint.iacr.org/2016/1182}, } @misc{cryptoeprint:2016:1183, author = {Lilya Budaghyan and Tor Helleseth and Nian Li and Bo Sun}, title = {Some Results on the Known Classes of Quadratic APN Functions}, howpublished = {Cryptology ePrint Archive, Report 2016/1183}, year = {2016}, url = {https://eprint.iacr.org/2016/1183}, } @misc{cryptoeprint:2016:1184, author = {Sergi Delgado-Segura and Cristina Pérez-Solà and Jordi Herrera-Joancomartí and Guillermo Navarro-Arribas}, title = {Bitcoin Private Key Locked Transactions}, howpublished = {Cryptology ePrint Archive, Report 2016/1184}, year = {2016}, url = {https://eprint.iacr.org/2016/1184}, } @misc{cryptoeprint:2016:1185, author = {Kisoon Yoon, Jihoon Kwon, and Suhri Kim}, title = {A Digital Signature Scheme Based On Supersingular Isogeny Problem}, howpublished = {Cryptology ePrint Archive, Report 2016/1185}, year = {2016}, url = {https://eprint.iacr.org/2016/1185}, } @misc{cryptoeprint:2016:1186, author = {Maciej Skorski}, title = {On the Complexity of Breaking Pseudoentropy}, howpublished = {Cryptology ePrint Archive, Report 2016/1186}, year = {2016}, url = {https://eprint.iacr.org/2016/1186}, } @misc{cryptoeprint:2016:1187, author = {Emmanuel Fouotsa and Nadia El Mrabet and Aminatou Pecha}, title = {Optimal Ate Pairing on Elliptic Curves with Embedding Degree 9,15 and 27}, howpublished = {Cryptology ePrint Archive, Report 2016/1187}, year = {2016}, url = {https://eprint.iacr.org/2016/1187}, } @misc{cryptoeprint:2016:1188, author = {Guido Bertoni and Joan Daemen and Seth Hoffert and Michaël Peeters and Gilles Van Assche and Ronny Van Keer}, title = {Farfalle: parallel permutation-based cryptography}, howpublished = {Cryptology ePrint Archive, Report 2016/1188}, year = {2016}, url = {https://eprint.iacr.org/2016/1188}, } @misc{cryptoeprint:2016:1189, author = {Barak Shani}, title = {On the Bit Security of Elliptic Curve Diffie--Hellman}, howpublished = {Cryptology ePrint Archive, Report 2016/1189}, year = {2016}, url = {https://eprint.iacr.org/2016/1189}, } @misc{cryptoeprint:2016:118, author = {Zvika Brakerski and Vinod Vaikuntanathan}, title = {Circuit-ABE from LWE: Unbounded Attributes and Semi-Adaptive Security}, howpublished = {Cryptology ePrint Archive, Report 2016/118}, year = {2016}, url = {https://eprint.iacr.org/2016/118}, } @misc{cryptoeprint:2016:1190, author = {Ran Canetti and Oxana Poburinnaya and Muthuramakrishnan Venkitasubramaniam}, title = {Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model}, howpublished = {Cryptology ePrint Archive, Report 2016/1190}, year = {2016}, url = {https://eprint.iacr.org/2016/1190}, } @misc{cryptoeprint:2016:1191, author = {P.T. Breuer and J.P. Bowen}, title = {On the Security of Practical and Complete Homomorphic Encrypted Computation}, howpublished = {Cryptology ePrint Archive, Report 2016/1191}, year = {2016}, url = {https://eprint.iacr.org/2016/1191}, } @misc{cryptoeprint:2016:1192, author = {Antonio Faonio and Jesper Buus Nielsen}, title = {Non-Malleable Codes with Split-State Refresh}, howpublished = {Cryptology ePrint Archive, Report 2016/1192}, year = {2016}, url = {https://eprint.iacr.org/2016/1192}, } @misc{cryptoeprint:2016:1193, author = {Peter T. Breuer and Jonathan P. Bowen}, title = {Superscalar Encrypted RISC: Measure of a Secret Computer}, howpublished = {Cryptology ePrint Archive, Report 2016/1193}, year = {2016}, url = {https://eprint.iacr.org/2016/1193}, } @misc{cryptoeprint:2016:1194, author = {Carlos Aguilar and Olivier Blazy and Jean-Christophe Deneuville and Philippe Gaborit and Gilles Zémor}, title = {Efficient Encryption from Random Quasi-Cyclic Codes}, howpublished = {Cryptology ePrint Archive, Report 2016/1194}, year = {2016}, url = {https://eprint.iacr.org/2016/1194}, } @misc{cryptoeprint:2016:1195, author = {Cesar Pereida Garc{\'i}a and Billy Bob Brumley}, title = {Constant-Time Callees with Variable-Time Callers}, howpublished = {Cryptology ePrint Archive, Report 2016/1195}, year = {2016}, url = {https://eprint.iacr.org/2016/1195}, } @misc{cryptoeprint:2016:1196, author = {Gorka Irazoqui and Thomas Eisenbarth and Berk Sunar}, title = {MASCAT: Stopping Microarchitectural Attacks Before Execution}, howpublished = {Cryptology ePrint Archive, Report 2016/1196}, year = {2016}, url = {https://eprint.iacr.org/2016/1196}, } @misc{cryptoeprint:2016:119, author = {Christof Beierle and Thorsten Kranz and Gregor Leander}, title = {Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices}, howpublished = {Cryptology ePrint Archive, Report 2016/119}, year = {2016}, url = {https://eprint.iacr.org/2016/119}, } @misc{cryptoeprint:2016:120, author = {Ignacio Cascudo and Ivan Damgård and Felipe Lacerda and Samuel Ranellucci}, title = {Oblivious Transfer from Any Non-Trivial Elastic Noisy Channels via Secret Key Agreement}, howpublished = {Cryptology ePrint Archive, Report 2016/120}, year = {2016}, url = {https://eprint.iacr.org/2016/120}, } @misc{cryptoeprint:2016:121, author = {Tibor Jager}, title = {Tightly-Secure Pseudorandom Functions via Work Factor Partitioning}, howpublished = {Cryptology ePrint Archive, Report 2016/121}, year = {2016}, url = {https://eprint.iacr.org/2016/121}, } @misc{cryptoeprint:2016:122, author = {Shay Gueron and Nicky Mouha}, title = {Simpira v2: A Family of Efficient Permutations Using the AES Round Function}, howpublished = {Cryptology ePrint Archive, Report 2016/122}, year = {2016}, url = {https://eprint.iacr.org/2016/122}, } @misc{cryptoeprint:2016:123, author = {Michel Abdalla and Mario Cornejo and Anca Nitulescu and David Pointcheval}, title = {Robust Password-Protected Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2016/123}, year = {2016}, url = {https://eprint.iacr.org/2016/123}, } @misc{cryptoeprint:2016:124, author = {Pierrick Gaudry and Laurent Grémy and Marion Videau}, title = {Collecting relations for the Number Field Sieve in $GF(p^6)$}, howpublished = {Cryptology ePrint Archive, Report 2016/124}, year = {2016}, url = {https://eprint.iacr.org/2016/124}, } @misc{cryptoeprint:2016:125, author = {Daniel Apon and Xiong Fan and Feng-Hao Liu}, title = {Compact Identity Based Encryption from LWE}, howpublished = {Cryptology ePrint Archive, Report 2016/125}, year = {2016}, url = {https://eprint.iacr.org/2016/125}, } @misc{cryptoeprint:2016:126, author = {Emre Yüce and Ali Aydın Selçuk}, title = {Server Notaries: A Complementary Approach to the Web PKI Trust Model}, howpublished = {Cryptology ePrint Archive, Report 2016/126}, year = {2016}, url = {https://eprint.iacr.org/2016/126}, } @misc{cryptoeprint:2016:127, author = {Martin Albrecht, Shi Bai, Léo Ducas}, title = {A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and Graded Encoding Schemes}, howpublished = {Cryptology ePrint Archive, Report 2016/127}, year = {2016}, url = {https://eprint.iacr.org/2016/127}, } @misc{cryptoeprint:2016:128, author = {Geoffroy Couteau and Thomas Peters and David Pointcheval}, title = {Removing the Strong RSA Assumption from Arguments over the Integers}, howpublished = {Cryptology ePrint Archive, Report 2016/128}, year = {2016}, url = {https://eprint.iacr.org/2016/128}, } @misc{cryptoeprint:2016:129, author = {Daniel Genkin and Lev Pachmanov and Itamar Pipman and Eran Tromer}, title = {ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs}, howpublished = {Cryptology ePrint Archive, Report 2016/129}, year = {2016}, url = {https://eprint.iacr.org/2016/129}, } @misc{cryptoeprint:2016:130, author = {Loubna Ghammam and Emmanuel Fouotsa}, title = {On the Computation of the Optimal Ate Pairing at the 192-bit Security Level}, howpublished = {Cryptology ePrint Archive, Report 2016/130}, year = {2016}, url = {https://eprint.iacr.org/2016/130}, } @misc{cryptoeprint:2016:131, author = {Itai Dinur}, title = {New Attacks on the Concatenation and XOR Hash Combiners}, howpublished = {Cryptology ePrint Archive, Report 2016/131}, year = {2016}, url = {https://eprint.iacr.org/2016/131}, } @misc{cryptoeprint:2016:132, author = {Shahram Rasoolzadeh and Håvard Raddum}, title = {Cryptanalysis of 6-round PRINCE using 2 Known Plaintexts}, howpublished = {Cryptology ePrint Archive, Report 2016/132}, year = {2016}, url = {https://eprint.iacr.org/2016/132}, } @misc{cryptoeprint:2016:133, author = {Claude Carlet}, title = {On the nonlinearity of monotone Boolean functions}, howpublished = {Cryptology ePrint Archive, Report 2016/133}, year = {2016}, url = {https://eprint.iacr.org/2016/133}, } @misc{cryptoeprint:2016:134, author = {Michael T. Goodrich and Evgenios M. Kornaropoulos and Michael Mitzenmacher and Roberto Tamassia}, title = {More Practical and Secure History-Independent Hash Tables}, howpublished = {Cryptology ePrint Archive, Report 2016/134}, year = {2016}, url = {https://eprint.iacr.org/2016/134}, } @misc{cryptoeprint:2016:135, author = {Jung Hee Cheon and Pierre-Alain Fouque and Changmin Lee and Brice Minaud and Hansol Ryu}, title = {Cryptanalysis of the New CLT Multilinear Map over the Integers}, howpublished = {Cryptology ePrint Archive, Report 2016/135}, year = {2016}, url = {https://eprint.iacr.org/2016/135}, } @misc{cryptoeprint:2016:136, author = {Emmanuel Volte and Val\'erie Nachef and Nicolas Marri\`ere}, title = {Automatic Expectation and Variance Computing for Attacks on Feistel Schemes}, howpublished = {Cryptology ePrint Archive, Report 2016/136}, year = {2016}, url = {https://eprint.iacr.org/2016/136}, } @misc{cryptoeprint:2016:137, author = {Ignacio Cascudo and Ivan Damgård and Bernardo David and Nico Döttling and Jesper Buus Nielsen}, title = {Rate-1, Linear Time and Additively Homomorphic UC Commitments}, howpublished = {Cryptology ePrint Archive, Report 2016/137}, year = {2016}, url = {https://eprint.iacr.org/2016/137}, } @misc{cryptoeprint:2016:138, author = {Shoukat Ali, Murat Cenk}, title = {A new algorithm for residue multiplication modulo $2^{521}-1$}, howpublished = {Cryptology ePrint Archive, Report 2016/138}, year = {2016}, url = {https://eprint.iacr.org/2016/138}, } @misc{cryptoeprint:2016:139, author = {Jung Hee Cheon and Jinhyuck Jeong and Changmin Lee}, title = {An Algorithm for NTRU Problems and Cryptanalysis of the GGH Multilinear Map without a Low Level Encoding of Zero}, howpublished = {Cryptology ePrint Archive, Report 2016/139}, year = {2016}, url = {https://eprint.iacr.org/2016/139}, } @misc{cryptoeprint:2016:140, author = {Shota Yamada}, title = {Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters}, howpublished = {Cryptology ePrint Archive, Report 2016/140}, year = {2016}, url = {https://eprint.iacr.org/2016/140}, } @misc{cryptoeprint:2016:141, author = {Igor Semaev}, title = {On low degree polynomials in 2-round AES}, howpublished = {Cryptology ePrint Archive, Report 2016/141}, year = {2016}, url = {https://eprint.iacr.org/2016/141}, } @misc{cryptoeprint:2016:142, author = {Mihir Bellare and Daniel J. Bernstein and Stefano Tessaro}, title = {Hash-Function based PRFs: AMAC and its Multi-User Security}, howpublished = {Cryptology ePrint Archive, Report 2016/142}, year = {2016}, url = {https://eprint.iacr.org/2016/142}, } @misc{cryptoeprint:2016:143, author = {Lilya Budaghyan, Claude Carlet, Tor Helleseth, Nian Li, Bo Sun}, title = {On upper bounds for algebraic degrees of APN functions}, howpublished = {Cryptology ePrint Archive, Report 2016/143}, year = {2016}, url = {https://eprint.iacr.org/2016/143}, } @misc{cryptoeprint:2016:144, author = {Stanislaw Jarecki and Aggelos Kiayias and Hugo Krawczyk and Jiayu Xu}, title = {Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online)}, howpublished = {Cryptology ePrint Archive, Report 2016/144}, year = {2016}, url = {https://eprint.iacr.org/2016/144}, } @misc{cryptoeprint:2016:145, author = {Jeremiah Blocki and Hong-Sheng Zhou}, title = {Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond}, howpublished = {Cryptology ePrint Archive, Report 2016/145}, year = {2016}, url = {https://eprint.iacr.org/2016/145}, } @misc{cryptoeprint:2016:146, author = {Yoshinori Aono and Yuntao Wang and Takuya Hayashi and Tsuyoshi Takagi}, title = {Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator}, howpublished = {Cryptology ePrint Archive, Report 2016/146}, year = {2016}, url = {https://eprint.iacr.org/2016/146}, } @misc{cryptoeprint:2016:147, author = {Eric Miles and Amit Sahai and Mark Zhandry}, title = {Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13}, howpublished = {Cryptology ePrint Archive, Report 2016/147}, year = {2016}, url = {https://eprint.iacr.org/2016/147}, } @misc{cryptoeprint:2016:148, author = {Srinath M. S. and V. Chandrasekaran }, title = {Isogeny-based Quantum-resistant Undeniable Blind Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2016/148}, year = {2016}, url = {https://eprint.iacr.org/2016/148}, } @misc{cryptoeprint:2016:149, author = {Wentan Yi and Shaozhen Chen}, title = {Improved Integral and Zero-correlation Linear Cryptanalysis of Reduced-round CLEFIA Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2016/149}, year = {2016}, url = {https://eprint.iacr.org/2016/149}, } @misc{cryptoeprint:2016:150, author = {Carsten Baum}, title = {On Garbling Schemes with and without Privacy}, howpublished = {Cryptology ePrint Archive, Report 2016/150}, year = {2016}, url = {https://eprint.iacr.org/2016/150}, } @misc{cryptoeprint:2016:151, author = {Yu Yu and John Steinberger}, title = {Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN}, howpublished = {Cryptology ePrint Archive, Report 2016/151}, year = {2016}, url = {https://eprint.iacr.org/2016/151}, } @misc{cryptoeprint:2016:152, author = {Oscar Garcia-Morchon and Ronald Rietman and Ludo Tolhuizen and Jose-Luis Torre-Arce and Moon Sung Lee and Domingo Gomez-Perez and Jaime Gutierrez and Berry Schoenmakers}, title = {Attacks and parameter choices in HIMMO}, howpublished = {Cryptology ePrint Archive, Report 2016/152}, year = {2016}, url = {https://eprint.iacr.org/2016/152}, } @misc{cryptoeprint:2016:153, author = {Jeremiah Blocki and Anupam Datta and Joseph Bonneau}, title = {Differentially Private Password Frequency Lists}, howpublished = {Cryptology ePrint Archive, Report 2016/153}, year = {2016}, url = {https://eprint.iacr.org/2016/153}, } @misc{cryptoeprint:2016:154, author = {David Derler and Daniel Slamanig}, title = {Fully-Anonymous Short Dynamic Group Signatures Without Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/154}, year = {2016}, url = {https://eprint.iacr.org/2016/154}, } @misc{cryptoeprint:2016:155, author = {Jun Xu and Lei Hu and Santanu Sarkar and Xiaona Zhang and Zhangjie Huang and Liqiang Peng}, title = {Cryptanalysis of Multi-Prime $\Phi$-Hiding Assumption}, howpublished = {Cryptology ePrint Archive, Report 2016/155}, year = {2016}, url = {https://eprint.iacr.org/2016/155}, } @misc{cryptoeprint:2016:156, author = {Yehuda Lindell and Nigel P. Smart and Eduardo Soria-Vazquez}, title = {More Efficient Constant-Round Multi-Party Computation from BMR and SHE}, howpublished = {Cryptology ePrint Archive, Report 2016/156}, year = {2016}, url = {https://eprint.iacr.org/2016/156}, } @misc{cryptoeprint:2016:157, author = {Maciej Skorski}, title = {Key Derivation for Squared-Friendly Applications: Lower Bounds}, howpublished = {Cryptology ePrint Archive, Report 2016/157}, year = {2016}, url = {https://eprint.iacr.org/2016/157}, } @misc{cryptoeprint:2016:158, author = {Maciej Skórski}, title = {A Subgradient Algorithm For Computational Distances and Applications to Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2016/158}, year = {2016}, url = {https://eprint.iacr.org/2016/158}, } @misc{cryptoeprint:2016:159, author = {Krzysztof Pietrzak and Maciej Skorski}, title = {Pseudoentropy: Lower-bounds for Chain rules and Transformations}, howpublished = {Cryptology ePrint Archive, Report 2016/159}, year = {2016}, url = {https://eprint.iacr.org/2016/159}, } @misc{cryptoeprint:2016:160, author = {Tyge Tiessen}, title = {Polytopic Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2016/160}, year = {2016}, url = {https://eprint.iacr.org/2016/160}, } @misc{cryptoeprint:2016:161, author = {Ashwin Jha and Mridul Nandi}, title = {Revisiting Structure Graphs: Applications to CBC-MAC and EMAC}, howpublished = {Cryptology ePrint Archive, Report 2016/161}, year = {2016}, url = {https://eprint.iacr.org/2016/161}, } @misc{cryptoeprint:2016:162, author = {Mihir Bellare and Igors Stepanovs and Brent Waters}, title = {New Negative Results on Differing-Inputs Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2016/162}, year = {2016}, url = {https://eprint.iacr.org/2016/162}, } @misc{cryptoeprint:2016:163, author = {Irene Giacomelli and Jesper Madsen and Claudio Orlandi}, title = {ZKBoo: Faster Zero-Knowledge for Boolean Circuits}, howpublished = {Cryptology ePrint Archive, Report 2016/163}, year = {2016}, url = {https://eprint.iacr.org/2016/163}, } @misc{cryptoeprint:2016:164, author = {L\'eo Ducas and Damien Stehle}, title = {Sanitization of FHE Ciphertexts}, howpublished = {Cryptology ePrint Archive, Report 2016/164}, year = {2016}, url = {https://eprint.iacr.org/2016/164}, } @misc{cryptoeprint:2016:165, author = {Hung Dang and Ee-Chien Chang}, title = {PrAd: Enabling Privacy-Aware Location based Advertising}, howpublished = {Cryptology ePrint Archive, Report 2016/165}, year = {2016}, url = {https://eprint.iacr.org/2016/165}, } @misc{cryptoeprint:2016:166, author = {Gr\'egory Demay and Peter Ga\v{z}i and Ueli Maurer and Bj\"orn Tackmann}, title = {Per-Session Security: Password-Based Cryptography Revisited}, howpublished = {Cryptology ePrint Archive, Report 2016/166}, year = {2016}, url = {https://eprint.iacr.org/2016/166}, } @misc{cryptoeprint:2016:167, author = {Ilias Giechaskiel and Cas Cremers and Kasper Rasmussen}, title = {On Bitcoin Security in the Presence of Broken Crypto Primitives}, howpublished = {Cryptology ePrint Archive, Report 2016/167}, year = {2016}, url = {https://eprint.iacr.org/2016/167}, } @misc{cryptoeprint:2016:168, author = {Fan Zhang and Ethan Cecchetti and Kyle Croman and Ari Juels and Elaine Shi}, title = {Town Crier: An Authenticated Data Feed for Smart Contracts}, howpublished = {Cryptology ePrint Archive, Report 2016/168}, year = {2016}, url = {https://eprint.iacr.org/2016/168}, } @misc{cryptoeprint:2016:169, author = {Peter Gaži and Stefano Tessaro}, title = {Provably Robust Sponge-Based PRNGs and KDFs}, howpublished = {Cryptology ePrint Archive, Report 2016/169}, year = {2016}, url = {https://eprint.iacr.org/2016/169}, } @misc{cryptoeprint:2016:170, author = {Ran Raz}, title = {Fast Learning Requires Good Memory: A Time-Space Lower Bound for Parity Learning}, howpublished = {Cryptology ePrint Archive, Report 2016/170}, year = {2016}, url = {https://eprint.iacr.org/2016/170}, } @misc{cryptoeprint:2016:171, author = {Jacques Patarin and Val\'erie Nachef}, title = {Commutativity, Associativity, and Public Key Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2016/171}, year = {2016}, url = {https://eprint.iacr.org/2016/171}, } @misc{cryptoeprint:2016:172, author = {Yupeng Zhang and Jonathan Katz and Charalampos Papamanthou}, title = {All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/172}, year = {2016}, url = {https://eprint.iacr.org/2016/172}, } @misc{cryptoeprint:2016:173, author = {Marcin Andrychowicz and Stefan Dziembowski and and Sebastian Faust}, title = {Circuit Compilers with O(1/ log(n)) Leakage Rate}, howpublished = {Cryptology ePrint Archive, Report 2016/173}, year = {2016}, url = {https://eprint.iacr.org/2016/173}, } @misc{cryptoeprint:2016:174, author = {Joseph Jaeger and Thomas Ristenpart and Qiang Tang}, title = {Honey Encryption Beyond Message Recovery Security}, howpublished = {Cryptology ePrint Archive, Report 2016/174}, year = {2016}, url = {https://eprint.iacr.org/2016/174}, } @misc{cryptoeprint:2016:175, author = {Michele Ciampi and Giuseppe Persiano and Alessandra Scafuro and Luisa Siniscalchi and Ivan Visconti}, title = {Online/Offline OR Composition of Sigma Protocols}, howpublished = {Cryptology ePrint Archive, Report 2016/175}, year = {2016}, url = {https://eprint.iacr.org/2016/175}, } @misc{cryptoeprint:2016:176, author = {Xingguang Zhou and Jianwei Liu and Weiran Liu and Qianhong Wu}, title = {Anonymous Role-Based Access Control on E-Health Records}, howpublished = {Cryptology ePrint Archive, Report 2016/176}, year = {2016}, url = {https://eprint.iacr.org/2016/176}, } @misc{cryptoeprint:2016:177, author = {Christine van Vredendaal}, title = {Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key}, howpublished = {Cryptology ePrint Archive, Report 2016/177}, year = {2016}, url = {https://eprint.iacr.org/2016/177}, } @misc{cryptoeprint:2016:178, author = {Meiqin Wang, Tingting Cui, Huaifeng Chen, Ling Sun\inst, Long Wen, Andrey Bogdanov}, title = {Integrals go Statistical: Cryptanalysis of Full Skipjack Variants}, howpublished = {Cryptology ePrint Archive, Report 2016/178}, year = {2016}, url = {https://eprint.iacr.org/2016/178}, } @misc{cryptoeprint:2016:179, author = {Hugo Labrande and Emmanuel Thomé}, title = {Computing theta functions in quasi-linear time in genus 2 and above}, howpublished = {Cryptology ePrint Archive, Report 2016/179}, year = {2016}, url = {https://eprint.iacr.org/2016/179}, } @misc{cryptoeprint:2016:180, author = {Dennis Hofheinz and Tibor Jager and Andy Rupp}, title = {Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts}, howpublished = {Cryptology ePrint Archive, Report 2016/180}, year = {2016}, url = {https://eprint.iacr.org/2016/180}, } @misc{cryptoeprint:2016:181, author = {S. M. Dehnavi and A. Mahmoodi Rishakani and M. R. Mirzaee Shamsabad and Hamidreza Maimani and Einollah Pasha}, title = {Cryptographic Properties of Addition Modulo $2^n$}, howpublished = {Cryptology ePrint Archive, Report 2016/181}, year = {2016}, url = {https://eprint.iacr.org/2016/181}, } @misc{cryptoeprint:2016:182, author = {Souvik Sonar, Debapriya Basu Roy, Rajat Subhra Chakraborty and Debdeep Mukhopadhyay}, title = {Side-Channel Watchdog: Run-Time Evaluation of Side-Channel Vulnerability in FPGA-Based Crypto-systems}, howpublished = {Cryptology ePrint Archive, Report 2016/182}, year = {2016}, url = {https://eprint.iacr.org/2016/182}, } @misc{cryptoeprint:2016:183, author = {Houssem Maghrebi and Victor Servant and Julien Bringer}, title = {There is Wisdom in Harnessing the Strengths of your Enemy: Customized Encoding to Thwart Side-Channel Attacks -- Extended Version --}, howpublished = {Cryptology ePrint Archive, Report 2016/183}, year = {2016}, url = {https://eprint.iacr.org/2016/183}, } @misc{cryptoeprint:2016:184, author = {Jonathan Katz and Alex J. Malozemoff and Xiao Wang}, title = {Efficiently Enforcing Input Validity in Secure Two-party Computation}, howpublished = {Cryptology ePrint Archive, Report 2016/184}, year = {2016}, url = {https://eprint.iacr.org/2016/184}, } @misc{cryptoeprint:2016:185, author = {Atul Luykx and Bart Preneel and Alan Szepieniec and Kan Yasuda}, title = {On the Influence of Message Length in PMAC's Security Bounds}, howpublished = {Cryptology ePrint Archive, Report 2016/185}, year = {2016}, url = {https://eprint.iacr.org/2016/185}, } @misc{cryptoeprint:2016:186, author = {Meicheng Liu and Siang Meng Sim}, title = {Lightweight MDS Generalized Circulant Matrices (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2016/186}, year = {2016}, url = {https://eprint.iacr.org/2016/186}, } @misc{cryptoeprint:2016:187, author = {Carsten Baum and Emmanuela Orsini and Peter Scholl}, title = {Efficient Secure Multiparty Computation with Identifiable Abort}, howpublished = {Cryptology ePrint Archive, Report 2016/187}, year = {2016}, url = {https://eprint.iacr.org/2016/187}, } @misc{cryptoeprint:2016:188, author = {Faruk G\"olo\u{g}lu and Vincent Rijmen and Qingju Wang}, title = {On the division property of S-boxes}, howpublished = {Cryptology ePrint Archive, Report 2016/188}, year = {2016}, url = {https://eprint.iacr.org/2016/188}, } @misc{cryptoeprint:2016:189, author = {Dima Grigoriev and Laszlo B. Kish and Vladimir Shpilrain}, title = {Yao's millionaires' problem and public-key encryption without computational assumptions}, howpublished = {Cryptology ePrint Archive, Report 2016/189}, year = {2016}, url = {https://eprint.iacr.org/2016/189}, } @misc{cryptoeprint:2016:190, author = {Atul Luykx, Bart Preneel, Elmar Tischhauser, Kan Yasuda}, title = {A MAC Mode for Lightweight Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2016/190}, year = {2016}, url = {https://eprint.iacr.org/2016/190}, } @misc{cryptoeprint:2016:191, author = {Eike Kiltz and Daniel Masny and Jiaxin Pan}, title = {Optimal Security Proofs for Signatures from Identification Schemes}, howpublished = {Cryptology ePrint Archive, Report 2016/191}, year = {2016}, url = {https://eprint.iacr.org/2016/191}, } @misc{cryptoeprint:2016:192, author = {Douglas Miller and Adam Scrivener and Jesse Stern and Muthuramakrishnan Venkitasubramaniam}, title = {On Negation Complexity of Injections, Surjections and Collision-Resistance in Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2016/192}, year = {2016}, url = {https://eprint.iacr.org/2016/192}, } @misc{cryptoeprint:2016:193, author = {Hao Chen and Kristin Lauter and Katherine E. Stange}, title = {Security considerations for Galois non-dual RLWE families}, howpublished = {Cryptology ePrint Archive, Report 2016/193}, year = {2016}, url = {https://eprint.iacr.org/2016/193}, } @misc{cryptoeprint:2016:194, author = {Ilan Komargodski and Moni Naor and Eylon Yogev}, title = {How to Share a Secret, Infinitely}, howpublished = {Cryptology ePrint Archive, Report 2016/194}, year = {2016}, url = {https://eprint.iacr.org/2016/194}, } @misc{cryptoeprint:2016:195, author = {Atsushi Takayasu and Noboru Kunihiro}, title = {How to Generalize RSA Cryptanalyses}, howpublished = {Cryptology ePrint Archive, Report 2016/195}, year = {2016}, url = {https://eprint.iacr.org/2016/195}, } @misc{cryptoeprint:2016:196, author = {Chris Peikert and Sina Shiehian}, title = {Multi-Key FHE from LWE, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2016/196}, year = {2016}, url = {https://eprint.iacr.org/2016/196}, } @misc{cryptoeprint:2016:197, author = {Mayuresh Vivekanand Anand and Ehsan Ebrahimi Targhi and Gelo Noel Tabia and Dominique Unruh}, title = {Post-quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation}, howpublished = {Cryptology ePrint Archive, Report 2016/197}, year = {2016}, url = {https://eprint.iacr.org/2016/197}, } @misc{cryptoeprint:2016:198, author = {Ko Stoffelen}, title = {Optimizing S-box Implementations for Several Criteria using SAT Solvers}, howpublished = {Cryptology ePrint Archive, Report 2016/198}, year = {2016}, url = {https://eprint.iacr.org/2016/198}, } @misc{cryptoeprint:2016:199, author = {Andrew Miller and Yu Xia and Kyle Croman and Elaine Shi and Dawn Song}, title = {The Honey Badger of BFT Protocols}, howpublished = {Cryptology ePrint Archive, Report 2016/199}, year = {2016}, url = {https://eprint.iacr.org/2016/199}, } @misc{cryptoeprint:2016:200, author = {Yilei Chen}, title = {An Alternative View of the Graph-Induced Multilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2016/200}, year = {2016}, url = {https://eprint.iacr.org/2016/200}, } @misc{cryptoeprint:2016:201, author = {Nico Doettling and Daniel Kraschewski and Joern Mueller-Quade and Tobias Nilges}, title = {From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2016/201}, year = {2016}, url = {https://eprint.iacr.org/2016/201}, } @misc{cryptoeprint:2016:202, author = {Simona Samardjiska and Danilo Gligoroski}, title = {An Encryption Scheme based on Random Split of St-Gen Codes}, howpublished = {Cryptology ePrint Archive, Report 2016/202}, year = {2016}, url = {https://eprint.iacr.org/2016/202}, } @misc{cryptoeprint:2016:203, author = {Pascal Sasdrich and Amir Moradi and Tim Güneysu}, title = {White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels}, howpublished = {Cryptology ePrint Archive, Report 2016/203}, year = {2016}, url = {https://eprint.iacr.org/2016/203}, } @misc{cryptoeprint:2016:204, author = {Shay Gueron}, title = {A Memory Encryption Engine Suitable for General Purpose Processors}, howpublished = {Cryptology ePrint Archive, Report 2016/204}, year = {2016}, url = {https://eprint.iacr.org/2016/204}, } @misc{cryptoeprint:2016:205, author = {Derek Atkins and Dorian Goldfeld}, title = {Addressing the Algebraic Eraser Diffie--Hellman Over-the-Air Protocol}, howpublished = {Cryptology ePrint Archive, Report 2016/205}, year = {2016}, url = {https://eprint.iacr.org/2016/205}, } @misc{cryptoeprint:2016:206, author = {Johannes Blömer and Gennadij Liske}, title = {Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes}, howpublished = {Cryptology ePrint Archive, Report 2016/206}, year = {2016}, url = {https://eprint.iacr.org/2016/206}, } @misc{cryptoeprint:2016:207, author = {Dibyendu Roy and Sourav Mukhopadhyay}, title = {Fault analysis and weak key-IV attack on Sprout}, howpublished = {Cryptology ePrint Archive, Report 2016/207}, year = {2016}, url = {https://eprint.iacr.org/2016/207}, } @misc{cryptoeprint:2016:208, author = {Sandro Coretti and Juan Garay and Martin Hirt and Vassilis Zikas}, title = {Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions}, howpublished = {Cryptology ePrint Archive, Report 2016/208}, year = {2016}, url = {https://eprint.iacr.org/2016/208}, } @misc{cryptoeprint:2016:209, author = {Ling Song and Zhangjie Huang and Qianqian Yang}, title = {Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA}, howpublished = {Cryptology ePrint Archive, Report 2016/209}, year = {2016}, url = {https://eprint.iacr.org/2016/209}, } @misc{cryptoeprint:2016:210, author = {Boaz Barak}, title = {Hopes, Fears and Software Obfuscation: A Survey}, howpublished = {Cryptology ePrint Archive, Report 2016/210}, year = {2016}, url = {https://eprint.iacr.org/2016/210}, } @misc{cryptoeprint:2016:211, author = {Sonia Belaïd and Fabrice Benhamouda and Alain Passelègue and Emmanuel Prouff and Adrian Thillard and Damien Vergnaud}, title = {Randomness Complexity of Private Circuits for Multiplication}, howpublished = {Cryptology ePrint Archive, Report 2016/211}, year = {2016}, url = {https://eprint.iacr.org/2016/211}, } @misc{cryptoeprint:2016:212, author = {Vadim N.Tsypyschev }, title = {Low Linear Complexity Estimates for Coordinate Sequences of Linear Recurrences of Maximal Period over Galois Ring}, howpublished = {Cryptology ePrint Archive, Report 2016/212}, year = {2016}, url = {https://eprint.iacr.org/2016/212}, } @misc{cryptoeprint:2016:213, author = {Nir Bitansky and Zvika Brakerski and Yael Kalai and Omer Paneth and Vinod Vaikuntanathan}, title = {3-Message Zero Knowledge Against Human Ignorance}, howpublished = {Cryptology ePrint Archive, Report 2016/213}, year = {2016}, url = {https://eprint.iacr.org/2016/213}, } @misc{cryptoeprint:2016:214, author = {Pei Luo and Liwei Zhang and Yunsi Fei and A. Adam Ding}, title = {An Improvement of Both Security and Reliability for Keccak Implementations on Smart Card}, howpublished = {Cryptology ePrint Archive, Report 2016/214}, year = {2016}, url = {https://eprint.iacr.org/2016/214}, } @misc{cryptoeprint:2016:215, author = {Steven D. Galbraith and Shishay W. Gebregiyorgis and Sean Murphy}, title = {Algorithms for the Approximate Common Divisor Problem}, howpublished = {Cryptology ePrint Archive, Report 2016/215}, year = {2016}, url = {https://eprint.iacr.org/2016/215}, } @misc{cryptoeprint:2016:216, author = {Sumit Kumar Debnath and Ratna Dutta}, title = {Fair mPSI and mPSI-CA: Efficient Constructions in Prime Order Groups with Security in the Standard Model against Malicious Adversary}, howpublished = {Cryptology ePrint Archive, Report 2016/216}, year = {2016}, url = {https://eprint.iacr.org/2016/216}, } @misc{cryptoeprint:2016:217, author = {Eric R. Verheul}, title = {Practical backward unlinkable revocation in FIDO, German e-ID, Idemix and U-Prove}, howpublished = {Cryptology ePrint Archive, Report 2016/217}, year = {2016}, url = {https://eprint.iacr.org/2016/217}, } @misc{cryptoeprint:2016:218, author = {Danilo Gligoroski and Simona Samardjiska}, title = {Semantic Security and Key-Privacy With Random Split of St-Gen Codes}, howpublished = {Cryptology ePrint Archive, Report 2016/218}, year = {2016}, url = {https://eprint.iacr.org/2016/218}, } @misc{cryptoeprint:2016:219, author = {Jörg Schwenk}, title = {Nonce-based Kerberos is a Secure Delegated AKE Protocol}, howpublished = {Cryptology ePrint Archive, Report 2016/219}, year = {2016}, url = {https://eprint.iacr.org/2016/219}, } @misc{cryptoeprint:2016:220, author = {Paul Kirchner}, title = {Algorithms on Ideal over Complex Multiplication order}, howpublished = {Cryptology ePrint Archive, Report 2016/220}, year = {2016}, url = {https://eprint.iacr.org/2016/220}, } @misc{cryptoeprint:2016:221, author = {Katriel Cohn-Gordon and Cas Cremers and Luke Garratt}, title = {On Post-Compromise Security}, howpublished = {Cryptology ePrint Archive, Report 2016/221}, year = {2016}, url = {https://eprint.iacr.org/2016/221}, } @misc{cryptoeprint:2016:222, author = {Paul Kirchner and Pierre-Alain Fouque}, title = {Time-Memory Trade-Off for Lattice Enumeration in a Ball}, howpublished = {Cryptology ePrint Archive, Report 2016/222}, year = {2016}, url = {https://eprint.iacr.org/2016/222}, } @misc{cryptoeprint:2016:223, author = {Mehmet Sabır Kiraz and Osmanbey Uzunkol}, title = {Still Wrong Use of Pairings in Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2016/223}, year = {2016}, url = {https://eprint.iacr.org/2016/223}, } @misc{cryptoeprint:2016:224, author = {Yuval Yarom and Daniel Genkin and Nadia Heninger}, title = {CacheBleed: A Timing Attack on OpenSSL Constant Time RSA}, howpublished = {Cryptology ePrint Archive, Report 2016/224}, year = {2016}, url = {https://eprint.iacr.org/2016/224}, } @misc{cryptoeprint:2016:225, author = {Qian Guo, and Thomas Johansson}, title = {A New Birthday-Type Algorithm for Attacking the Fresh Re-Keying Countermeasure}, howpublished = {Cryptology ePrint Archive, Report 2016/225}, year = {2016}, url = {https://eprint.iacr.org/2016/225}, } @misc{cryptoeprint:2016:226, author = {Zvika Brakerski and Christina Brzuska and Nils Fleischhacker}, title = {On Statistically Secure Obfuscation with Approximate Correctness}, howpublished = {Cryptology ePrint Archive, Report 2016/226}, year = {2016}, url = {https://eprint.iacr.org/2016/226}, } @misc{cryptoeprint:2016:227, author = {Jean-Michel Cioranesco and Houda Ferradi and Rémi Géraud and David Naccache}, title = {Process Table Covert Channels: Exploitation and Countermeasures}, howpublished = {Cryptology ePrint Archive, Report 2016/227}, year = {2016}, url = {https://eprint.iacr.org/2016/227}, } @misc{cryptoeprint:2016:228, author = {Serguei Popov}, title = {On a decentralized trustless pseudo-random number generation algorithm}, howpublished = {Cryptology ePrint Archive, Report 2016/228}, year = {2016}, url = {https://eprint.iacr.org/2016/228}, } @misc{cryptoeprint:2016:229, author = {Reza Azarderakhsh, David Jao, Kassem Kalach, Brian Koziel, and Christopher Leonardi}, title = {Key Compression for Isogeny-Based Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2016/229}, year = {2016}, url = {https://eprint.iacr.org/2016/229}, } @misc{cryptoeprint:2016:230, author = {Daniel Genkin and Lev Pachmanov and Itamar Pipman and Eran Tromer and Yuval Yarom}, title = {ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels}, howpublished = {Cryptology ePrint Archive, Report 2016/230}, year = {2016}, url = {https://eprint.iacr.org/2016/230}, } @misc{cryptoeprint:2016:231, author = {Pierre Belgarric and Pierre-Alain Fouque and Gilles Macario-Rat and Mehdi Tibouchi}, title = {Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones}, howpublished = {Cryptology ePrint Archive, Report 2016/231}, year = {2016}, url = {https://eprint.iacr.org/2016/231}, } @misc{cryptoeprint:2016:232, author = {Sungwook Kim and Jinsu Kim and Dongyoung Koo and Yuna Kim and Hyunsoo Yoon and Junbum Shin}, title = {Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/232}, year = {2016}, url = {https://eprint.iacr.org/2016/232}, } @misc{cryptoeprint:2016:233, author = {Charanjit S. Jutla and Arnab Roy}, title = {Smooth NIZK Arguments with Applications to Asymmetric UC-PAKE and Threshold-IBE}, howpublished = {Cryptology ePrint Archive, Report 2016/233}, year = {2016}, url = {https://eprint.iacr.org/2016/233}, } @misc{cryptoeprint:2016:234, author = {Raphael Bost and Olivier Sanders}, title = {Trick or Tweak: On the (In)security of OTR’s Tweaks}, howpublished = {Cryptology ePrint Archive, Report 2016/234}, year = {2016}, url = {https://eprint.iacr.org/2016/234}, } @misc{cryptoeprint:2016:235, author = {Takahiro Matsuda and Goichiro Hanaoka}, title = {Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security}, howpublished = {Cryptology ePrint Archive, Report 2016/235}, year = {2016}, url = {https://eprint.iacr.org/2016/235}, } @misc{cryptoeprint:2016:236, author = {Guoyan Zhang and Meicheng Liu}, title = {A Distinguisher on PRESENT-Like Permutations with Application to SPONGENT}, howpublished = {Cryptology ePrint Archive, Report 2016/236}, year = {2016}, url = {https://eprint.iacr.org/2016/236}, } @misc{cryptoeprint:2016:237, author = {Shoichi Hirose}, title = {May-Ozerov Algorithm for Nearest-Neighbor Problem over $\mathbb{F}_{q}$ and Its Application to Information Set Decoding}, howpublished = {Cryptology ePrint Archive, Report 2016/237}, year = {2016}, url = {https://eprint.iacr.org/2016/237}, } @misc{cryptoeprint:2016:238, author = {Ágnes Kiss and Juliane Krämer and Pablo Rauzy and Jean-Pierre Seifert}, title = {Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT}, howpublished = {Cryptology ePrint Archive, Report 2016/238}, year = {2016}, url = {https://eprint.iacr.org/2016/238}, } @misc{cryptoeprint:2016:239, author = {Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren}, title = {Provably Weak Instances of Ring-LWE Revisited}, howpublished = {Cryptology ePrint Archive, Report 2016/239}, year = {2016}, url = {https://eprint.iacr.org/2016/239}, } @misc{cryptoeprint:2016:240, author = {Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren}, title = {On Error Distributions in Ring-based LWE}, howpublished = {Cryptology ePrint Archive, Report 2016/240}, year = {2016}, url = {https://eprint.iacr.org/2016/240}, } @misc{cryptoeprint:2016:241, author = {Boris Skoric}, title = {A trivial debiasing scheme for Helper Data Systems}, howpublished = {Cryptology ePrint Archive, Report 2016/241}, year = {2016}, url = {https://eprint.iacr.org/2016/241}, } @misc{cryptoeprint:2016:242, author = {Yusuke Sakai and Nuttapong Attrapadung and Goichiro Hanaoka}, title = {Attribute-Based Signatures for Circuits from Bilinear Map}, howpublished = {Cryptology ePrint Archive, Report 2016/242}, year = {2016}, url = {https://eprint.iacr.org/2016/242}, } @misc{cryptoeprint:2016:243, author = {Fuyuki Kitagawa and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka}, title = {On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions}, howpublished = {Cryptology ePrint Archive, Report 2016/243}, year = {2016}, url = {https://eprint.iacr.org/2016/243}, } @misc{cryptoeprint:2016:244, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Cryptanalysis of Simpira v1}, howpublished = {Cryptology ePrint Archive, Report 2016/244}, year = {2016}, url = {https://eprint.iacr.org/2016/244}, } @misc{cryptoeprint:2016:245, author = {Peter Linder}, title = {DEcryption Contract ENforcement Tool (DECENT): A Practical Alternative to Government Decryption Backdoors}, howpublished = {Cryptology ePrint Archive, Report 2016/245}, year = {2016}, url = {https://eprint.iacr.org/2016/245}, } @misc{cryptoeprint:2016:246, author = {Peder Sparell and Mikael Simovits}, title = {LINGUISTIC CRACKING OF PASSPHRASES USING MARKOV CHAINS}, howpublished = {Cryptology ePrint Archive, Report 2016/246}, year = {2016}, url = {https://eprint.iacr.org/2016/246}, } @misc{cryptoeprint:2016:247, author = {Wang Qiang and Zhou Fucai and Chen Chunyu and Li Fuxiang and Xu Zifeng}, title = {Public Veri able Function Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2016/247}, year = {2016}, url = {https://eprint.iacr.org/2016/247}, } @misc{cryptoeprint:2016:248, author = {Sondre Rønjom}, title = {Invariant subspaces in Simpira}, howpublished = {Cryptology ePrint Archive, Report 2016/248}, year = {2016}, url = {https://eprint.iacr.org/2016/248}, } @misc{cryptoeprint:2016:249, author = {Amir Moradi and Tobias Schneider}, title = {Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series}, howpublished = {Cryptology ePrint Archive, Report 2016/249}, year = {2016}, url = {https://eprint.iacr.org/2016/249}, } @misc{cryptoeprint:2016:250, author = {A. Costache and N.P. Smart and S. Vivek and A. Waller}, title = {Fixed Point Arithmetic in SHE Scheme}, howpublished = {Cryptology ePrint Archive, Report 2016/250}, year = {2016}, url = {https://eprint.iacr.org/2016/250}, } @misc{cryptoeprint:2016:251, author = {Gilad Asharov and Moni Naor and Gil Segev and Ido Shahaf}, title = {Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations}, howpublished = {Cryptology ePrint Archive, Report 2016/251}, year = {2016}, url = {https://eprint.iacr.org/2016/251}, } @misc{cryptoeprint:2016:252, author = {Sanjam Garg and Pratyay Mukherjee and Omkant Pandey and Antigoni Polychroniadou}, title = {The Exact Round Complexity of Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2016/252}, year = {2016}, url = {https://eprint.iacr.org/2016/252}, } @misc{cryptoeprint:2016:253, author = {Wenjie Xiong and André Schaller and Nikolaos A. Anagnostopoulos and Muhammad Umair Saleem and Sebastian Gabmeyer and Stefan Katzenbeisser and Jakub Szefer}, title = {Run-time Accessible DRAM PUFs in Commodity Devices}, howpublished = {Cryptology ePrint Archive, Report 2016/253}, year = {2016}, url = {https://eprint.iacr.org/2016/253}, } @misc{cryptoeprint:2016:254, author = {Pierrick Méaux and Anthony Journault and François-Xavier Standaert and Claude Carlet}, title = {Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts}, howpublished = {Cryptology ePrint Archive, Report 2016/254}, year = {2016}, url = {https://eprint.iacr.org/2016/254}, } @misc{cryptoeprint:2016:255, author = {Essam Ghadafi}, title = {More Efficient Structure-Preserving Signatures - Or: Bypassing the Type-III Lower Bounds}, howpublished = {Cryptology ePrint Archive, Report 2016/255}, year = {2016}, url = {https://eprint.iacr.org/2016/255}, } @misc{cryptoeprint:2016:256, author = {Qiumao Ma and Jinsheng Zhang and Wensheng Zhang and Daji Qiao}, title = {SE-ORAM: A Storage-Efficient Oblivious RAM for Privacy-Preserving Access to Cloud Storage}, howpublished = {Cryptology ePrint Archive, Report 2016/256}, year = {2016}, url = {https://eprint.iacr.org/2016/256}, } @misc{cryptoeprint:2016:257, author = {Huijia Lin}, title = {Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes}, howpublished = {Cryptology ePrint Archive, Report 2016/257}, year = {2016}, url = {https://eprint.iacr.org/2016/257}, } @misc{cryptoeprint:2016:258, author = {Olivier Blazy and Céline Chevalier}, title = {Structure-Preserving Smooth Projective Hashing}, howpublished = {Cryptology ePrint Archive, Report 2016/258}, year = {2016}, url = {https://eprint.iacr.org/2016/258}, } @misc{cryptoeprint:2016:259, author = {Olivier Blazy and Céline Chevalier and Paul Germouty}, title = {Adaptive Oblivious Transfer and Generalizations}, howpublished = {Cryptology ePrint Archive, Report 2016/259}, year = {2016}, url = {https://eprint.iacr.org/2016/259}, } @misc{cryptoeprint:2016:260, author = {Jens Groth}, title = {On the Size of Pairing-based Non-interactive Arguments}, howpublished = {Cryptology ePrint Archive, Report 2016/260}, year = {2016}, url = {https://eprint.iacr.org/2016/260}, } @misc{cryptoeprint:2016:261, author = {Oliver Willers and Christopher Huth and Jorge Guajardo and Helmut Seidel}, title = {MEMS-based Gyroscopes as Physical Unclonable Functions}, howpublished = {Cryptology ePrint Archive, Report 2016/261}, year = {2016}, url = {https://eprint.iacr.org/2016/261}, } @misc{cryptoeprint:2016:262, author = {Riccardo Longo and Chiara Marcolla and Massimiliano Sala}, title = {Collaborative Multi-Authority KP-ABE for Shorter Keys and Parameters}, howpublished = {Cryptology ePrint Archive, Report 2016/262}, year = {2016}, url = {https://eprint.iacr.org/2016/262}, } @misc{cryptoeprint:2016:263, author = {Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Jens Groth, Christophe Petit}, title = {Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting}, howpublished = {Cryptology ePrint Archive, Report 2016/263}, year = {2016}, url = {https://eprint.iacr.org/2016/263}, } @misc{cryptoeprint:2016:264, author = {Dahmun Goudarzi and Matthieu Rivain }, title = {How Fast Can Higher-Order Masking Be in Software?}, howpublished = {Cryptology ePrint Archive, Report 2016/264}, year = {2016}, url = {https://eprint.iacr.org/2016/264}, } @misc{cryptoeprint:2016:265, author = {Maura B. Paterson and Douglas R. Stinson and Jalaj Upadhyay}, title = {Multi-prover Proof-of-Retrievability}, howpublished = {Cryptology ePrint Archive, Report 2016/265}, year = {2016}, url = {https://eprint.iacr.org/2016/265}, } @misc{cryptoeprint:2016:266, author = {Shinichi Kawamura and Tomoko Yonemura and Yuichi Komano and Hideo Shimizu}, title = {Exact Error Bound of Cox-Rower Architecture for RNS Arithmetic}, howpublished = {Cryptology ePrint Archive, Report 2016/266}, year = {2016}, url = {https://eprint.iacr.org/2016/266}, } @misc{cryptoeprint:2016:267, author = {Yonglin Hao}, title = {Improved Meet-in-the-Middle Attacks on Round-Reduced Crypton-256}, howpublished = {Cryptology ePrint Archive, Report 2016/267}, year = {2016}, url = {https://eprint.iacr.org/2016/267}, } @misc{cryptoeprint:2016:268, author = {Ahmad Boorghany and Siavash Bayat-Sarmadi and Rasool Jalili}, title = {Efficient Lattice-based Authenticated Encryption: A Practice-Oriented Provable Security Approach}, howpublished = {Cryptology ePrint Archive, Report 2016/268}, year = {2016}, url = {https://eprint.iacr.org/2016/268}, } @misc{cryptoeprint:2016:269, author = {Ming Li and Dongdai Lin}, title = {The Adjacency Graphs of Linear Feedback Shift Registers with Primitive-like Characteristic Polynomials}, howpublished = {Cryptology ePrint Archive, Report 2016/269}, year = {2016}, url = {https://eprint.iacr.org/2016/269}, } @misc{cryptoeprint:2016:270, author = {Miguel Ambrona and Gilles Barthe and Benedikt Schmidt}, title = {Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model}, howpublished = {Cryptology ePrint Archive, Report 2016/270}, year = {2016}, url = {https://eprint.iacr.org/2016/270}, } @misc{cryptoeprint:2016:271, author = {Sébastien Duval and Virginie Lallemand and Yann Rotella}, title = {Cryptanalysis of the FLIP Family of Stream Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2016/271}, year = {2016}, url = {https://eprint.iacr.org/2016/271}, } @misc{cryptoeprint:2016:272, author = {Yevgeniy Dodis and Shai Halevi and Ron D. Rothblum and Daniel Wichs}, title = {Spooky Encryption and its Applications}, howpublished = {Cryptology ePrint Archive, Report 2016/272}, year = {2016}, url = {https://eprint.iacr.org/2016/272}, } @misc{cryptoeprint:2016:273, author = {Andrea Visconti and Simone Bossi and Hany Ragab and Alexandro Calò}, title = {On the weaknesses of PBKDF2}, howpublished = {Cryptology ePrint Archive, Report 2016/273}, year = {2016}, url = {https://eprint.iacr.org/2016/273}, } @misc{cryptoeprint:2016:274, author = {Simone Bossi and Andrea Visconti}, title = {What users should know about Full Disk Encryption based on LUKS}, howpublished = {Cryptology ePrint Archive, Report 2016/274}, year = {2016}, url = {https://eprint.iacr.org/2016/274}, } @misc{cryptoeprint:2016:275, author = {Bin Zhang and Lin Jiao and Mingsheng Wang}, title = {Faster Algorithms for Solving LPN}, howpublished = {Cryptology ePrint Archive, Report 2016/275}, year = {2016}, url = {https://eprint.iacr.org/2016/275}, } @misc{cryptoeprint:2016:276, author = {Markku-Juhani O. Saarinen}, title = {Arithmetic coding and blinding countermeasures for lattice signatures}, howpublished = {Cryptology ePrint Archive, Report 2016/276}, year = {2016}, url = {https://eprint.iacr.org/2016/276}, } @misc{cryptoeprint:2016:277, author = {Xi-Jun Lin and Haipeng Qu and Xiaoshuai Zhang}, title = {Public Key Encryption Supporting Equality Test and Flexible Authorization without Bilinear Pairings}, howpublished = {Cryptology ePrint Archive, Report 2016/277}, year = {2016}, url = {https://eprint.iacr.org/2016/277}, } @misc{cryptoeprint:2016:278, author = {Xiong Fan and Feng-Hao Liu}, title = {Various Proxy Re-Encryption Schemes from Lattices}, howpublished = {Cryptology ePrint Archive, Report 2016/278}, year = {2016}, url = {https://eprint.iacr.org/2016/278}, } @misc{cryptoeprint:2016:279, author = {Hamza Abusalah and Georg Fuchsbauer}, title = {Constrained PRFs for Unbounded Inputs with Short Keys}, howpublished = {Cryptology ePrint Archive, Report 2016/279}, year = {2016}, url = {https://eprint.iacr.org/2016/279}, } @misc{cryptoeprint:2016:280, author = {Pedro Maat C. Massolino and Lejla Batina and Ricardo Chaves and Nele Mentens}, title = {Low Power Montgomery Modular Multiplication on Reconfigurable Systems}, howpublished = {Cryptology ePrint Archive, Report 2016/280}, year = {2016}, url = {https://eprint.iacr.org/2016/280}, } @misc{cryptoeprint:2016:281, author = {Prabhanjan Ananth and Aayush Jain and Moni Naor and Amit Sahai and Eylon Yogev}, title = {Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security}, howpublished = {Cryptology ePrint Archive, Report 2016/281}, year = {2016}, url = {https://eprint.iacr.org/2016/281}, } @misc{cryptoeprint:2016:282, author = {Oscar Reparaz}, title = {Detecting flawed masking schemes with leakage detection tests}, howpublished = {Cryptology ePrint Archive, Report 2016/282}, year = {2016}, url = {https://eprint.iacr.org/2016/282}, } @misc{cryptoeprint:2016:283, author = {Gunnar Hartung}, title = {Secure Audit Logs with Verifiable Excerpts}, howpublished = {Cryptology ePrint Archive, Report 2016/283}, year = {2016}, url = {https://eprint.iacr.org/2016/283}, } @misc{cryptoeprint:2016:284, author = {Mehmet Sinan Inci and Berk Gulmezoglu and Thomas Eisenbarth and Berk Sunar}, title = {Co-location detection on the Cloud}, howpublished = {Cryptology ePrint Archive, Report 2016/284}, year = {2016}, url = {https://eprint.iacr.org/2016/284}, } @misc{cryptoeprint:2016:285, author = {Yosuke Todo and Masakatu Morii}, title = {Bit-Based Division Property and Application to Simon Family}, howpublished = {Cryptology ePrint Archive, Report 2016/285}, year = {2016}, url = {https://eprint.iacr.org/2016/285}, } @misc{cryptoeprint:2016:286, author = {Anastasiya Gorodilova}, title = {On a remarkable property of APN Gold functions}, howpublished = {Cryptology ePrint Archive, Report 2016/286}, year = {2016}, url = {https://eprint.iacr.org/2016/286}, } @misc{cryptoeprint:2016:287, author = {Veronique Cortier and David Galindo and Ralf Kuesters and Johannes Mueller and Tomasz Truderung}, title = {Verifiability Notions for E-Voting Protocols}, howpublished = {Cryptology ePrint Archive, Report 2016/287}, year = {2016}, url = {https://eprint.iacr.org/2016/287}, } @misc{cryptoeprint:2016:288, author = {Sonia Bogos and Serge Vaudenay}, title = {Optimization of LPN Solving Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2016/288}, year = {2016}, url = {https://eprint.iacr.org/2016/288}, } @misc{cryptoeprint:2016:289, author = {Marc Fischlin and Amir Herzberg and Hod Bin Noon and Haya Shulman}, title = {Obfuscation Combiners}, howpublished = {Cryptology ePrint Archive, Report 2016/289}, year = {2016}, url = {https://eprint.iacr.org/2016/289}, } @misc{cryptoeprint:2016:290, author = {Mihir Bellare and Björn Tackmann}, title = {Nonce-Based Cryptography: Retaining Security when Randomness Fails}, howpublished = {Cryptology ePrint Archive, Report 2016/290}, year = {2016}, url = {https://eprint.iacr.org/2016/290}, } @misc{cryptoeprint:2016:291, author = {Cynthia Dwork and Moni Naor and Guy N. Rothblum}, title = {Spooky Interaction and its Discontents: Compilers for Succinct Two-Message Argument Systems}, howpublished = {Cryptology ePrint Archive, Report 2016/291}, year = {2016}, url = {https://eprint.iacr.org/2016/291}, } @misc{cryptoeprint:2016:292, author = {Yusuke Naito and Kan Yasuda}, title = {New Bounds for Keyed Sponges with Extendable Output: Independence between Capacity and Message Length}, howpublished = {Cryptology ePrint Archive, Report 2016/292}, year = {2016}, url = {https://eprint.iacr.org/2016/292}, } @misc{cryptoeprint:2016:293, author = {David Nuñez, Isaac Agudo, and Javier Lopez}, title = {A Parametric Family of Attack Models for Proxy Re-Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/293}, year = {2016}, url = {https://eprint.iacr.org/2016/293}, } @misc{cryptoeprint:2016:294, author = {Weijia Wang and Yu Yu and Junrong Liu and Zheng Guo and François-Xavier Standaert Standaert and Dawu Gu and Sen Xu and Rong Fu}, title = {Evaluation and Improvement of Generic-Emulating DPA Attacks}, howpublished = {Cryptology ePrint Archive, Report 2016/294}, year = {2016}, url = {https://eprint.iacr.org/2016/294}, } @misc{cryptoeprint:2016:295, author = {Thomas Peyrin}, title = {Collision Attack on GRINDAHL}, howpublished = {Cryptology ePrint Archive, Report 2016/295}, year = {2016}, url = {https://eprint.iacr.org/2016/295}, } @misc{cryptoeprint:2016:296, author = {Sonia Bogos and Serge Vaudenay}, title = {How to Sequentialize Independent Parallel Attacks?}, howpublished = {Cryptology ePrint Archive, Report 2016/296}, year = {2016}, url = {https://eprint.iacr.org/2016/296}, } @misc{cryptoeprint:2016:297, author = {Liwei Zhang and A. Adam Ding and Yunsi Fei and Pei Luo}, title = {A Unified Metric for Quantifying Information Leakage of Cryptographic Devices under Power Analysis Attacks}, howpublished = {Cryptology ePrint Archive, Report 2016/297}, year = {2016}, url = {https://eprint.iacr.org/2016/297}, } @misc{cryptoeprint:2016:298, author = {Max Fillinger and Marc Stevens}, title = {Reverse-Engineering of the Cryptanalytic Attack Used in the Flame Super-Malware}, howpublished = {Cryptology ePrint Archive, Report 2016/298}, year = {2016}, url = {https://eprint.iacr.org/2016/298}, } @misc{cryptoeprint:2016:299, author = {Jérémy Jean and Ivica Nikolic}, title = {Efficient Design Strategies Based on the AES Round Function}, howpublished = {Cryptology ePrint Archive, Report 2016/299}, year = {2016}, url = {https://eprint.iacr.org/2016/299}, } @misc{cryptoeprint:2016:300, author = {Leon Groot Bruinderink and Andreas Hülsing and Tanja Lange and Yuval Yarom}, title = {Flush, Gauss, and Reload -- A Cache Attack on the BLISS Lattice-Based Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2016/300}, year = {2016}, url = {https://eprint.iacr.org/2016/300}, } @misc{cryptoeprint:2016:301, author = {Apoorvaa Deshpande and Venkata Koppula and Brent Waters}, title = {Constrained Pseudorandom Functions for Unconstrained Inputs}, howpublished = {Cryptology ePrint Archive, Report 2016/301}, year = {2016}, url = {https://eprint.iacr.org/2016/301}, } @misc{cryptoeprint:2016:302, author = {Alain Couvreur and Ayoub Otmani and Jean-Pierre Tillich and Valérie Gauthier-Umana}, title = {A Polynomial-Time Attack on the BBCRS Scheme}, howpublished = {Cryptology ePrint Archive, Report 2016/302}, year = {2016}, url = {https://eprint.iacr.org/2016/302}, } @misc{cryptoeprint:2016:303, author = {Yael Tauman Kalai and Guy N. Rothblum and Ron D. Rothblum}, title = {From Obfuscation to the Security of Fiat-Shamir for Proofs}, howpublished = {Cryptology ePrint Archive, Report 2016/303}, year = {2016}, url = {https://eprint.iacr.org/2016/303}, } @misc{cryptoeprint:2016:304, author = {Yacov Yacobi}, title = {A Fast Attribute Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/304}, year = {2016}, url = {https://eprint.iacr.org/2016/304}, } @misc{cryptoeprint:2016:305, author = {Jayaprakash Kar}, title = {Certi cateless Aggregate Short Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2016/305}, year = {2016}, url = {https://eprint.iacr.org/2016/305}, } @misc{cryptoeprint:2016:306, author = {Yevgeniy Dodis and Chaya Ganesh and Alexander Golovnev and Ari Juels and Thomas Ristenpart}, title = {A Formal Treatment of Backdoored Pseudorandom Generators}, howpublished = {Cryptology ePrint Archive, Report 2016/306}, year = {2016}, url = {https://eprint.iacr.org/2016/306}, } @misc{cryptoeprint:2016:307, author = {Marshall Ball and Dana Dachman-Soled and Mukul Kulkarni and Tal Malkin}, title = {Non-Malleable Codes for Bounded Depth, Bounded Fan-in Circuits}, howpublished = {Cryptology ePrint Archive, Report 2016/307}, year = {2016}, url = {https://eprint.iacr.org/2016/307}, } @misc{cryptoeprint:2016:308, author = {Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo}, title = {Strongly Leakage-Resilient Authenticated Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2016/308}, year = {2016}, url = {https://eprint.iacr.org/2016/308}, } @misc{cryptoeprint:2016:309, author = {Celine Chevalier and Fabien Laguillaumie and Damien Vergnaud}, title = {Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions}, howpublished = {Cryptology ePrint Archive, Report 2016/309}, year = {2016}, url = {https://eprint.iacr.org/2016/309}, } @misc{cryptoeprint:2016:310, author = {Qian Guo and Thomas Johansson and Paul Stankovski}, title = {Coded-BKW: Solving LWE Using Lattice Codes}, howpublished = {Cryptology ePrint Archive, Report 2016/310}, year = {2016}, url = {https://eprint.iacr.org/2016/310}, } @misc{cryptoeprint:2016:311, author = {Bin Zhang and Chao Xu and Willi Meier}, title = {Fast Correlation Attacks over Extension Fields, Large-unit Linear Approximation and Cryptanalysis of SNOW 2.0}, howpublished = {Cryptology ePrint Archive, Report 2016/311}, year = {2016}, url = {https://eprint.iacr.org/2016/311}, } @misc{cryptoeprint:2016:312, author = {Ivica Nikolic and Yu Sasaki}, title = {Refinements of the k-tree Algorithm for the Generalized Birthday Problem }, howpublished = {Cryptology ePrint Archive, Report 2016/312}, year = {2016}, url = {https://eprint.iacr.org/2016/312}, } @misc{cryptoeprint:2016:313, author = {Arno Mittelbach and Daniele Venturi}, title = {Fiat-Shamir for Highly Sound Protocols is Instantiable}, howpublished = {Cryptology ePrint Archive, Report 2016/313}, year = {2016}, url = {https://eprint.iacr.org/2016/313}, } @misc{cryptoeprint:2016:314, author = {Santos Merino Del Pozo and François-Xavier Standaert}, title = {Blind Source Separation from Single Measurements using Singular Spectrum Analysis}, howpublished = {Cryptology ePrint Archive, Report 2016/314}, year = {2016}, url = {https://eprint.iacr.org/2016/314}, } @misc{cryptoeprint:2016:315, author = {Yarkın Doröz and Berk Sunar}, title = {Flattening NTRU for Evaluation Key Free Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/315}, year = {2016}, url = {https://eprint.iacr.org/2016/315}, } @misc{cryptoeprint:2016:316, author = {Mohammad Mahmoody and Ameer Mohammed and Soheil Nematihaji and Rafael Pass and abhi shelat}, title = {A Note on Black-Box Separations for Indistinguishability Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2016/316}, year = {2016}, url = {https://eprint.iacr.org/2016/316}, } @misc{cryptoeprint:2016:317, author = {Rishab Goyal and Venkata Koppula and Brent Waters}, title = {Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy}, howpublished = {Cryptology ePrint Archive, Report 2016/317}, year = {2016}, url = {https://eprint.iacr.org/2016/317}, } @misc{cryptoeprint:2016:318, author = {Jayaprakash Kar and Sagar Naik}, title = {Generic Construction of Certificateless Signcryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2016/318}, year = {2016}, url = {https://eprint.iacr.org/2016/318}, } @misc{cryptoeprint:2016:319, author = {Brett Hemenway and Steve Lu and Rafail Ostrovsky and William Welser IV}, title = {High-precision Secure Computation of Satellite Collision Probabilities}, howpublished = {Cryptology ePrint Archive, Report 2016/319}, year = {2016}, url = {https://eprint.iacr.org/2016/319}, } @misc{cryptoeprint:2016:320, author = {Linus Feiten, Matthias Sauer, Bernd Becker}, title = {On Metrics to Quantify the Inter-Device Uniqueness of PUFs}, howpublished = {Cryptology ePrint Archive, Report 2016/320}, year = {2016}, url = {https://eprint.iacr.org/2016/320}, } @misc{cryptoeprint:2016:321, author = {Claude Carlet and Emmanuel Prouff and Matthieu Rivain and Thomas Roche}, title = {Algebraic Decomposition for Probing Security}, howpublished = {Cryptology ePrint Archive, Report 2016/321}, year = {2016}, url = {https://eprint.iacr.org/2016/321}, } @misc{cryptoeprint:2016:322, author = {Ulrich Rührmair}, title = {On the Security of PUF Protocols under Bad PUFs and PUFs-inside-PUFs Attacks}, howpublished = {Cryptology ePrint Archive, Report 2016/322}, year = {2016}, url = {https://eprint.iacr.org/2016/322}, } @misc{cryptoeprint:2016:323, author = {Chaohui Du and Guoqiang Bai}, title = {A Family of Scalable Polynomial Multiplier Architectures for Ring-LWE Based Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2016/323}, year = {2016}, url = {https://eprint.iacr.org/2016/323}, } @misc{cryptoeprint:2016:324, author = {Eli Ben-Sasson and Alessandro Chiesa and Ariel Gabizon and Michael Riabzev and Nicholas Spooner}, title = {Interactive Oracle Proofs with Constant Rate and Query Complexity}, howpublished = {Cryptology ePrint Archive, Report 2016/324}, year = {2016}, url = {https://eprint.iacr.org/2016/324}, } @misc{cryptoeprint:2016:325, author = {Taras Stanko and Fitria Nur Andini and Boris Skoric}, title = {Optimized quantization in Zero Leakage Helper Data Systems}, howpublished = {Cryptology ePrint Archive, Report 2016/325}, year = {2016}, url = {https://eprint.iacr.org/2016/325}, } @misc{cryptoeprint:2016:326, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Square Attack on 7-Round Kiasu-BC}, howpublished = {Cryptology ePrint Archive, Report 2016/326}, year = {2016}, url = {https://eprint.iacr.org/2016/326}, } @misc{cryptoeprint:2016:327, author = {Le Trieu Phong and Lihua Wang and Yoshinori Aono and Manh Ha Nguyen and Xavier Boyen}, title = {Proxy Re-Encryption Schemes with Key Privacy from LWE}, howpublished = {Cryptology ePrint Archive, Report 2016/327}, year = {2016}, url = {https://eprint.iacr.org/2016/327}, } @misc{cryptoeprint:2016:328, author = {Jennifer Balakrishnan and Sorina Ionica and Kristin Lauter and Christelle Vincent}, title = {Constructing genus 3 hyperelliptic Jacobians with CM}, howpublished = {Cryptology ePrint Archive, Report 2016/328}, year = {2016}, url = {https://eprint.iacr.org/2016/328}, } @misc{cryptoeprint:2016:329, author = {Emmanuel Thomé}, title = {A modified block Lanczos algorithm with fewer vectors}, howpublished = {Cryptology ePrint Archive, Report 2016/329}, year = {2016}, url = {https://eprint.iacr.org/2016/329}, } @misc{cryptoeprint:2016:330, author = {Michael Hutter and Jürgen Schilling and Peter Schwabe and Wolfgang Wieser}, title = {NaCl's Crypto_Box in Hardware}, howpublished = {Cryptology ePrint Archive, Report 2016/330}, year = {2016}, url = {https://eprint.iacr.org/2016/330}, } @misc{cryptoeprint:2016:331, author = {Fatih Tiryakio\u{g}lu and Mehmet Sabir Kiraz and Fatih Birinci and Mehmet Karahan}, title = {TRVote: A New, Trustworthy and Robust Electronic Voting System}, howpublished = {Cryptology ePrint Archive, Report 2016/331}, year = {2016}, url = {https://eprint.iacr.org/2016/331}, } @misc{cryptoeprint:2016:332, author = {Rafael Pass and abhi shelat }, title = {Micropayments for Decentralized Currencies}, howpublished = {Cryptology ePrint Archive, Report 2016/332}, year = {2016}, url = {https://eprint.iacr.org/2016/332}, } @misc{cryptoeprint:2016:333, author = {Ling Ren and Srinivas Devadas}, title = {Proof of Space from Stacked Expanders}, howpublished = {Cryptology ePrint Archive, Report 2016/333}, year = {2016}, url = {https://eprint.iacr.org/2016/333}, } @misc{cryptoeprint:2016:334, author = {Jung Hee Cheon and Duhyeong Kim}, title = {Probability that the k-gcd of products of positive integers is B-friable}, howpublished = {Cryptology ePrint Archive, Report 2016/334}, year = {2016}, url = {https://eprint.iacr.org/2016/334}, } @misc{cryptoeprint:2016:335, author = {Chunming Tang, Can Xiang, Yanfeng Qi, Keqin Feng}, title = {Complete characterization of generalized bent and 2^k-bent Boolean functions}, howpublished = {Cryptology ePrint Archive, Report 2016/335}, year = {2016}, url = {https://eprint.iacr.org/2016/335}, } @misc{cryptoeprint:2016:336, author = {Margarita Osadchy and Julio Hernandez-Castro and Stuart Gibson and Orr Dunkelman and Daniel P ́erez-Cabo}, title = {No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples with Applications to CAPTCHA}, howpublished = {Cryptology ePrint Archive, Report 2016/336}, year = {2016}, url = {https://eprint.iacr.org/2016/336}, } @misc{cryptoeprint:2016:337, author = {Martin Gábriš and Martin Stanek}, title = {State recovery of RC4 and Spritz Revisited}, howpublished = {Cryptology ePrint Archive, Report 2016/337}, year = {2016}, url = {https://eprint.iacr.org/2016/337}, } @misc{cryptoeprint:2016:338, author = {Siwei Sun, Lei Hu, Peng Wang, Meiqin Wang, Danping Shi, Xiaoshuang Ma, Qianqian Yang, Kai Fu}, title = {Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or}, howpublished = {Cryptology ePrint Archive, Report 2016/338}, year = {2016}, url = {https://eprint.iacr.org/2016/338}, } @misc{cryptoeprint:2016:339, author = {Zvika Brakerski and Renen Perlman}, title = {Lattice-Based Fully Dynamic Multi-Key FHE with Short Ciphertexts}, howpublished = {Cryptology ePrint Archive, Report 2016/339}, year = {2016}, url = {https://eprint.iacr.org/2016/339}, } @misc{cryptoeprint:2016:340, author = {Eshan Chattopadhyay and Vipul Goyal and Xin Li}, title = {Non-Malleable Extractors and Codes, with their Many Tampered Extensions}, howpublished = {Cryptology ePrint Archive, Report 2016/340}, year = {2016}, url = {https://eprint.iacr.org/2016/340}, } @misc{cryptoeprint:2016:341, author = {Adam L. Young and Moti Yung}, title = {Semantically Secure Anonymity: Foundations of Re-encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/341}, year = {2016}, url = {https://eprint.iacr.org/2016/341}, } @misc{cryptoeprint:2016:342, author = {Felix Heuer and Tibor Jager and Eike Kiltz and Sven Schäge}, title = {On the Selective Opening Security of Practical Public-Key Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2016/342}, year = {2016}, url = {https://eprint.iacr.org/2016/342}, } @misc{cryptoeprint:2016:343, author = {Eric Miles and Emanuele Viola}, title = {On the complexity of constructing pseudorandom functions (especially when they don't exist)}, howpublished = {Cryptology ePrint Archive, Report 2016/343}, year = {2016}, url = {https://eprint.iacr.org/2016/343}, } @misc{cryptoeprint:2016:344, author = {HeeWon Chung and Myungsun Kim}, title = {Encoding Rational Numbers for FHE-based Applications}, howpublished = {Cryptology ePrint Archive, Report 2016/344}, year = {2016}, url = {https://eprint.iacr.org/2016/344}, } @misc{cryptoeprint:2016:345, author = {Satsuya Ohata and Takahiro Matsuda and Kanta Matsuura}, title = {Provably Secure Password Reset Protocol: Model, Definition, and Generic Construction}, howpublished = {Cryptology ePrint Archive, Report 2016/345}, year = {2016}, url = {https://eprint.iacr.org/2016/345}, } @misc{cryptoeprint:2016:346, author = {Xi-Jun Lin and Lin Sun and Haipeng Qu}, title = {New Framework for Secure Server-Designation Public Key Encryption with Keyword Search}, howpublished = {Cryptology ePrint Archive, Report 2016/346}, year = {2016}, url = {https://eprint.iacr.org/2016/346}, } @misc{cryptoeprint:2016:347, author = {Payal Chaudhari and Manik Lal Das}, title = {Cryptanalysis of Searchable Anonymous Attribute Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/347}, year = {2016}, url = {https://eprint.iacr.org/2016/347}, } @misc{cryptoeprint:2016:348, author = {Oriol Farràs and Sebastià Martín and Carles Padró}, title = {A Note on Non-Perfect Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2016/348}, year = {2016}, url = {https://eprint.iacr.org/2016/348}, } @misc{cryptoeprint:2016:349, author = {Patrick Derbez}, title = {Note on Impossible Differential Attacks}, howpublished = {Cryptology ePrint Archive, Report 2016/349}, year = {2016}, url = {https://eprint.iacr.org/2016/349}, } @misc{cryptoeprint:2016:350, author = {Ran Cohen and Sandro Coretti and Juan Garay and Vassilis Zikas}, title = {Probabilistic Termination and Composability of Cryptographic Protocols}, howpublished = {Cryptology ePrint Archive, Report 2016/350}, year = {2016}, url = {https://eprint.iacr.org/2016/350}, } @misc{cryptoeprint:2016:351, author = {Chris Peikert}, title = {How (Not) to Instantiate Ring-LWE}, howpublished = {Cryptology ePrint Archive, Report 2016/351}, year = {2016}, url = {https://eprint.iacr.org/2016/351}, } @misc{cryptoeprint:2016:352, author = {Pascal Sasdrich and Tim Güneysu}, title = {Closing the Gap in RFC 7748: Implementing Curve448 in Hardware}, howpublished = {Cryptology ePrint Archive, Report 2016/352}, year = {2016}, url = {https://eprint.iacr.org/2016/352}, } @misc{cryptoeprint:2016:353, author = {Atsushi Takayasu and Noboru Kunihiro}, title = {General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA}, howpublished = {Cryptology ePrint Archive, Report 2016/353}, year = {2016}, url = {https://eprint.iacr.org/2016/353}, } @misc{cryptoeprint:2016:354, author = {Suvradip Chakraborty and Srinivasan Raghuraman and C. Pandu Rangan}, title = {A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers}, howpublished = {Cryptology ePrint Archive, Report 2016/354}, year = {2016}, url = {https://eprint.iacr.org/2016/354}, } @misc{cryptoeprint:2016:355, author = {Vahid Amin Ghafari, Honggang Hu, and Ying Chen}, title = {Fruit-v2: Ultra-Lightweight Stream Cipher with Shorter Internal State}, howpublished = {Cryptology ePrint Archive, Report 2016/355}, year = {2016}, url = {https://eprint.iacr.org/2016/355}, } @misc{cryptoeprint:2016:356, author = {Somindu C. Ramanna}, title = {More Efficient Constructions for Inner-Product Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/356}, year = {2016}, url = {https://eprint.iacr.org/2016/356}, } @misc{cryptoeprint:2016:357, author = {David McGrew and Panos Kampanakis and Scott Fluhrer and Stefan-Lukas Gazdag and Denis Butin and Johannes Buchmann}, title = {State Management for Hash-Based Signatures}, howpublished = {Cryptology ePrint Archive, Report 2016/357}, year = {2016}, url = {https://eprint.iacr.org/2016/357}, } @misc{cryptoeprint:2016:358, author = {Ari Juels and Ahmed Kosba and Elaine Shi}, title = {The Ring of Gyges: Investigating the Future of Criminal Smart Contracts}, howpublished = {Cryptology ePrint Archive, Report 2016/358}, year = {2016}, url = {https://eprint.iacr.org/2016/358}, } @misc{cryptoeprint:2016:359, author = {Nicolas Bruneau and Sylvain Guilley and Annelie Heuser and Damien Marion and Olivier Rioul}, title = {Less is More - Dimensionality Reduction from a Theoretical Perspective}, howpublished = {Cryptology ePrint Archive, Report 2016/359}, year = {2016}, url = {https://eprint.iacr.org/2016/359}, } @misc{cryptoeprint:2016:360, author = {Sanjit Chatterjee and Neal Koblitz and Alfred Menezes and Palash Sarkar}, title = {Another Look at Tightness II: Practical Issues in Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2016/360}, year = {2016}, url = {https://eprint.iacr.org/2016/360}, } @misc{cryptoeprint:2016:361, author = {Shweta Agrawal and Alon Rosen}, title = {Functional Encryption for Bounded Collusions, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2016/361}, year = {2016}, url = {https://eprint.iacr.org/2016/361}, } @misc{cryptoeprint:2016:362, author = {Lalitha Kiran Nemana and V. Ch. Venkaiah}, title = {An Empirical Study towards Refining the AKS Primality Testing Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2016/362}, year = {2016}, url = {https://eprint.iacr.org/2016/362}, } @misc{cryptoeprint:2016:363, author = {Houda Ferradi, Rémi Géraud, Diana Maimut,, David Naccache, and David Pointcheval}, title = {Legally Fair Contract Signing Without Keystones}, howpublished = {Cryptology ePrint Archive, Report 2016/363}, year = {2016}, url = {https://eprint.iacr.org/2016/363}, } @misc{cryptoeprint:2016:364, author = {Stéphanie Alt and Pierre-Alain Fouque and Gilles Macario-rat and Cristina Onete and Benjamin Richard}, title = {Cryptographic Analysis of the 3GPP AKA Protocol}, howpublished = {Cryptology ePrint Archive, Report 2016/364}, year = {2016}, url = {https://eprint.iacr.org/2016/364}, } @misc{cryptoeprint:2016:365, author = {Masahiro Ishii and Jérémie Detrey and Pierrick Gaudry and Atsuo Inomata and Kazutoshi Fujikawa}, title = {Fast Modular Arithmetic on the Kalray MPPA-256 Processor for an Energy-Efficient Implementation of ECM}, howpublished = {Cryptology ePrint Archive, Report 2016/365}, year = {2016}, url = {https://eprint.iacr.org/2016/365}, } @misc{cryptoeprint:2016:366, author = {Joost Renes and Peter Schwabe and Benjamin Smith and Lejla Batina}, title = {\(\mu\)Kummer: efficient hyperelliptic signatures and key exchange on microcontrollers}, howpublished = {Cryptology ePrint Archive, Report 2016/366}, year = {2016}, url = {https://eprint.iacr.org/2016/366}, } @misc{cryptoeprint:2016:367, author = {Falko Strenzke}, title = {An Analysis of OpenSSL's Random Number Generator}, howpublished = {Cryptology ePrint Archive, Report 2016/367}, year = {2016}, url = {https://eprint.iacr.org/2016/367}, } @misc{cryptoeprint:2016:368, author = {Jonathan Bootle and Andrea Cerulli and Pyrros Chaidos and Essam Ghadafi and Jens Groth}, title = {Foundations of Fully Dynamic Group Signatures}, howpublished = {Cryptology ePrint Archive, Report 2016/368}, year = {2016}, url = {https://eprint.iacr.org/2016/368}, } @misc{cryptoeprint:2016:369, author = {Ronald Cramer and Chaoping Xing and Chen Yuan}, title = {Efficient Multi-Point Local Decoding of Reed-Muller Codes via Interleaved Codex}, howpublished = {Cryptology ePrint Archive, Report 2016/369}, year = {2016}, url = {https://eprint.iacr.org/2016/369}, } @misc{cryptoeprint:2016:370, author = {Cecile Pierrot and Benjamin Wesolowski}, title = {Malleability of the blockchain’s entropy}, howpublished = {Cryptology ePrint Archive, Report 2016/370}, year = {2016}, url = {https://eprint.iacr.org/2016/370}, } @misc{cryptoeprint:2016:371, author = {Stéphanie Alt and Pierre-Alain Fouque and Gilles Macario-rat and Cristina Onete and Benjamin Richard}, title = {A Cryptographic Analysis of UMTS/LTE AKA}, howpublished = {Cryptology ePrint Archive, Report 2016/371}, year = {2016}, url = {https://eprint.iacr.org/2016/371}, } @misc{cryptoeprint:2016:372, author = {Mihir Bellare and Georg Fuchsbauer and Alessandra Scafuro}, title = {NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion}, howpublished = {Cryptology ePrint Archive, Report 2016/372}, year = {2016}, url = {https://eprint.iacr.org/2016/372}, } @misc{cryptoeprint:2016:373, author = {Dennis Hofheinz}, title = {Adaptive partitioning}, howpublished = {Cryptology ePrint Archive, Report 2016/373}, year = {2016}, url = {https://eprint.iacr.org/2016/373}, } @misc{cryptoeprint:2016:374, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel}, title = {Analysis of SHA-512/224 and SHA-512/256}, howpublished = {Cryptology ePrint Archive, Report 2016/374}, year = {2016}, url = {https://eprint.iacr.org/2016/374}, } @misc{cryptoeprint:2016:375, author = {Alon Rosen and Gil Segev and Ido Shahaf}, title = {Can PPAD Hardness be Based on Standard Cryptographic Assumptions?}, howpublished = {Cryptology ePrint Archive, Report 2016/375}, year = {2016}, url = {https://eprint.iacr.org/2016/375}, } @misc{cryptoeprint:2016:376, author = {Stephen Checkoway and Shaanan Cohney and Christina Garman and Matthew Green and Nadia Heninger and Jacob Maskiewicz and Eric Rescorla and Hovav Shacham and Ralf-Philipp Weinmann}, title = {A Systematic Analysis of the Juniper Dual EC Incident}, howpublished = {Cryptology ePrint Archive, Report 2016/376}, year = {2016}, url = {https://eprint.iacr.org/2016/376}, } @misc{cryptoeprint:2016:377, author = {Arka Rai Choudhuri and Subhamoy Maitra}, title = {Differential Cryptanalysis of Salsa and ChaCha -- An Evaluation with a Hybrid Model}, howpublished = {Cryptology ePrint Archive, Report 2016/377}, year = {2016}, url = {https://eprint.iacr.org/2016/377}, } @misc{cryptoeprint:2016:378, author = {Delaram Kahrobaei and Vladimir Shpilrain}, title = {Using semidirect product of (semi)groups in public key cryptography}, howpublished = {Cryptology ePrint Archive, Report 2016/378}, year = {2016}, url = {https://eprint.iacr.org/2016/378}, } @misc{cryptoeprint:2016:379, author = {Jean Lancrenon and Marjan Skrobot and Qiang Tang}, title = {Two More Efficient Variants of the J-PAKE Protocol}, howpublished = {Cryptology ePrint Archive, Report 2016/379}, year = {2016}, url = {https://eprint.iacr.org/2016/379}, } @misc{cryptoeprint:2016:380, author = {Elena Kirshanova and Alexander May and Friedrich Wiemer}, title = {Parallel Implementation of BDD enumeration for LWE}, howpublished = {Cryptology ePrint Archive, Report 2016/380}, year = {2016}, url = {https://eprint.iacr.org/2016/380}, } @misc{cryptoeprint:2016:381, author = {Florian Bourse and Rafaël Del Pino and Michele Minelli and Hoeteck Wee}, title = {FHE Circuit Privacy Almost For Free}, howpublished = {Cryptology ePrint Archive, Report 2016/381}, year = {2016}, url = {https://eprint.iacr.org/2016/381}, } @misc{cryptoeprint:2016:382, author = {Daniel J. Bernstein and Susanne Engels and Tanja Lange and Ruben Niederhagen and Christof Paar and Peter Schwabe and Ralf Zimmermann}, title = {Faster elliptic-curve discrete logarithms on FPGAs}, howpublished = {Cryptology ePrint Archive, Report 2016/382}, year = {2016}, url = {https://eprint.iacr.org/2016/382}, } @misc{cryptoeprint:2016:383, author = {Dung Hoang Duong and Albrecht Petzoldt and Tsuyoshi Takagi}, title = {Reducing the Key Size of the SRP Encryption Scheme - Extended version}, howpublished = {Cryptology ePrint Archive, Report 2016/383}, year = {2016}, url = {https://eprint.iacr.org/2016/383}, } @misc{cryptoeprint:2016:384, author = {Anne Canteaut and Yann Rotella}, title = {Attacks against Filter Generators Exploiting Monomial Mappings}, howpublished = {Cryptology ePrint Archive, Report 2016/384}, year = {2016}, url = {https://eprint.iacr.org/2016/384}, } @misc{cryptoeprint:2016:385, author = {Guillaume Bonnoron and Caroline Fontaine}, title = {A note on Ring-LWE security in the case of Fully Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/385}, year = {2016}, url = {https://eprint.iacr.org/2016/385}, } @misc{cryptoeprint:2016:386, author = {Vladimir Rožić and Bohan Yang and Nele Mentens and Ingrid Verbauwhede}, title = {Canary Numbers: Design for Light-weight Online Testability of True Random Number Generators}, howpublished = {Cryptology ePrint Archive, Report 2016/386}, year = {2016}, url = {https://eprint.iacr.org/2016/386}, } @misc{cryptoeprint:2016:387, author = {K. Baghery, B. Abdolmaleki, M. J. Emadi}, title = {Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags}, howpublished = {Cryptology ePrint Archive, Report 2016/387}, year = {2016}, url = {https://eprint.iacr.org/2016/387}, } @misc{cryptoeprint:2016:388, author = {Mojahed Mohamed and Xiaofen Wang and Xiaosong Zhang}, title = {Tightly-Secure Authenticated Key Exchange without NAXOS' approach based on Decision Linear Problem}, howpublished = {Cryptology ePrint Archive, Report 2016/388}, year = {2016}, url = {https://eprint.iacr.org/2016/388}, } @misc{cryptoeprint:2016:389, author = {Georg Fuchsbauer and Zahra Jafargholi and Krzysztof Pietrzak}, title = {A Quasipolynomial Reduction for Generalized Selective Decryption on Trees}, howpublished = {Cryptology ePrint Archive, Report 2016/389}, year = {2016}, url = {https://eprint.iacr.org/2016/389}, } @misc{cryptoeprint:2016:390, author = {Sanjam Garg and Pratyay Mukherjee and Akshayaram Srinivasan}, title = {Obfuscation without the Vulnerabilities of Multilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2016/390}, year = {2016}, url = {https://eprint.iacr.org/2016/390}, } @misc{cryptoeprint:2016:391, author = {Danilo Gligoroski and Simona Samardjiska}, title = {A Digital Signature Scheme Based on Random Split of St-Gen Codes}, howpublished = {Cryptology ePrint Archive, Report 2016/391}, year = {2016}, url = {https://eprint.iacr.org/2016/391}, } @misc{cryptoeprint:2016:392, author = {Ling Sun and Meiqin Wang}, title = {Towards a Further Understanding of Bit-Based Division Property}, howpublished = {Cryptology ePrint Archive, Report 2016/392}, year = {2016}, url = {https://eprint.iacr.org/2016/392}, } @misc{cryptoeprint:2016:393, author = {Ming Li and Dongdai Lin}, title = {De Bruijn Sequences, Adjacency Graphs and Cyclotomy}, howpublished = {Cryptology ePrint Archive, Report 2016/393}, year = {2016}, url = {https://eprint.iacr.org/2016/393}, } @misc{cryptoeprint:2016:394, author = {Benoît Cogliati and Yannick Seurin}, title = {Strengthening the Known-Key Security Notion for Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2016/394}, year = {2016}, url = {https://eprint.iacr.org/2016/394}, } @misc{cryptoeprint:2016:395, author = {Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel}, title = {Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch}, howpublished = {Cryptology ePrint Archive, Report 2016/395}, year = {2016}, url = {https://eprint.iacr.org/2016/395}, } @misc{cryptoeprint:2016:396, author = {Jérémy Jean}, title = {Cryptanalysis of Haraka}, howpublished = {Cryptology ePrint Archive, Report 2016/396}, year = {2016}, url = {https://eprint.iacr.org/2016/396}, } @misc{cryptoeprint:2016:397, author = {Ronald Cramer and Ivan Damgård and Nico Döttling and Irene Giacomelli and Chaoping Xing}, title = {Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model}, howpublished = {Cryptology ePrint Archive, Report 2016/397}, year = {2016}, url = {https://eprint.iacr.org/2016/397}, } @misc{cryptoeprint:2016:398, author = {Léo Perrin and Aleksei Udovenko}, title = {Algebraic Insights into the Secret Feistel Network (Full version)}, howpublished = {Cryptology ePrint Archive, Report 2016/398}, year = {2016}, url = {https://eprint.iacr.org/2016/398}, } @misc{cryptoeprint:2016:399, author = {Houda Ferradi and Rémi Géraud and David Naccache}, title = {Slow Motion Zero Knowledge Identifying With Colliding Commitments}, howpublished = {Cryptology ePrint Archive, Report 2016/399}, year = {2016}, url = {https://eprint.iacr.org/2016/399}, } @misc{cryptoeprint:2016:400, author = {Sunoo Park and Ronald L. Rivest}, title = {Towards Secure Quadratic Voting}, howpublished = {Cryptology ePrint Archive, Report 2016/400}, year = {2016}, url = {https://eprint.iacr.org/2016/400}, } @misc{cryptoeprint:2016:401, author = {Palash Sarkar and Shashank Singh}, title = {Tower Number Field Sieve Variant of a Recent Polynomial Selection Method}, howpublished = {Cryptology ePrint Archive, Report 2016/401}, year = {2016}, url = {https://eprint.iacr.org/2016/401}, } @misc{cryptoeprint:2016:402, author = {Seiko Arita and Shota Nakasato}, title = {Fully Homomorphic Encryption for Point Numbers}, howpublished = {Cryptology ePrint Archive, Report 2016/402}, year = {2016}, url = {https://eprint.iacr.org/2016/402}, } @misc{cryptoeprint:2016:403, author = {Sanjit Chatterjee and Alfred Menezes and Francisco Rodriguez-Henriquez}, title = {On Instantiating Pairing-Based Protocols with Elliptic Curves of Embedding Degree One}, howpublished = {Cryptology ePrint Archive, Report 2016/403}, year = {2016}, url = {https://eprint.iacr.org/2016/403}, } @misc{cryptoeprint:2016:404, author = {Subhabrata Samajder and Palash Sarkar}, title = {A New Test Statistic for Key Recovery Attacks Using Multiple Linear Approximations}, howpublished = {Cryptology ePrint Archive, Report 2016/404}, year = {2016}, url = {https://eprint.iacr.org/2016/404}, } @misc{cryptoeprint:2016:405, author = {Subhabrata Samajder and Palash Sarkar}, title = {Multiple Differential Cryptanalysis: A Rigorous Analysis}, howpublished = {Cryptology ePrint Archive, Report 2016/405}, year = {2016}, url = {https://eprint.iacr.org/2016/405}, } @misc{cryptoeprint:2016:406, author = {Yongqiang Li and Mingsheng Wang}, title = {On the Construction of Lightweight Circulant Involutory MDS Matrices}, howpublished = {Cryptology ePrint Archive, Report 2016/406}, year = {2016}, url = {https://eprint.iacr.org/2016/406}, } @misc{cryptoeprint:2016:407, author = {Kai Fu; Meiqin Wang; Yinghua Guo; Siwei Sun; Lei Hu}, title = {MILP-Based Automatic Search Algorithms for Diff erential and Linear Trails for Speck}, howpublished = {Cryptology ePrint Archive, Report 2016/407}, year = {2016}, url = {https://eprint.iacr.org/2016/407}, } @misc{cryptoeprint:2016:408, author = {Patrick McCorry and Malte M\"oser and Siamak F. Shahandashti and Feng Hao}, title = {Towards Bitcoin Payment Networks}, howpublished = {Cryptology ePrint Archive, Report 2016/408}, year = {2016}, url = {https://eprint.iacr.org/2016/408}, } @misc{cryptoeprint:2016:409, author = {Alex Biryukov; Vesselin Velichkov; Yann Le Corre}, title = {Automatic Search for the Best Trails in ARX: Application to Block Cipher \textsc{Speck}}, howpublished = {Cryptology ePrint Archive, Report 2016/409}, year = {2016}, url = {https://eprint.iacr.org/2016/409}, } @misc{cryptoeprint:2016:410, author = {Oscar Garcia-Morchon and Sauvik Bhattacharya and Ronald Rietman and Ludo Tolhuizen and Jose-Luis Torre-Arce and Maarten Bodlaender}, title = {Efficient Quantum-Resistant Trust Infrastructure based on HIMMO}, howpublished = {Cryptology ePrint Archive, Report 2016/410}, year = {2016}, url = {https://eprint.iacr.org/2016/410}, } @misc{cryptoeprint:2016:411, author = {Eric Verheul and Bart Jacobs and Carlo Meijer and Mireille Hildebrandt and Joeri de Ruiter}, title = {Polymorphic Encryption and Pseudonymisation for Personalised Healthcare}, howpublished = {Cryptology ePrint Archive, Report 2016/411}, year = {2016}, url = {https://eprint.iacr.org/2016/411}, } @misc{cryptoeprint:2016:412, author = {Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, and Bo-Yin Yang}, title = {Solving Quadratic Equations with XL on Parallel Architectures - extended version}, howpublished = {Cryptology ePrint Archive, Report 2016/412}, year = {2016}, url = {https://eprint.iacr.org/2016/412}, } @misc{cryptoeprint:2016:413, author = {Craig Costello and Patrick Longa and Michael Naehrig}, title = {Efficient algorithms for supersingular isogeny Diffie-Hellman}, howpublished = {Cryptology ePrint Archive, Report 2016/413}, year = {2016}, url = {https://eprint.iacr.org/2016/413}, } @misc{cryptoeprint:2016:414, author = {Li Lin and Wenling Wu and Yafei Zheng}, title = {Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2016/414}, year = {2016}, url = {https://eprint.iacr.org/2016/414}, } @misc{cryptoeprint:2016:415, author = {Nina Bindel and Johannes Buchmann and Juliane Krämer}, title = {Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks}, howpublished = {Cryptology ePrint Archive, Report 2016/415}, year = {2016}, url = {https://eprint.iacr.org/2016/415}, } @misc{cryptoeprint:2016:416, author = {R\'emi Bazin and Alexander Schaub and Omar Hasan and Lionel Brunie}, title = {A Decentralized Anonymity-Preserving Reputation System with Constant-time Score Retrieval}, howpublished = {Cryptology ePrint Archive, Report 2016/416}, year = {2016}, url = {https://eprint.iacr.org/2016/416}, } @misc{cryptoeprint:2016:417, author = {Lisa Kohl}, title = {New Tools for Multi-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2016/417}, year = {2016}, url = {https://eprint.iacr.org/2016/417}, } @misc{cryptoeprint:2016:418, author = {Zvika Brakerski and Or Dagmi}, title = {Shorter Circuit Obfuscation in Challenging Security Models}, howpublished = {Cryptology ePrint Archive, Report 2016/418}, year = {2016}, url = {https://eprint.iacr.org/2016/418}, } @misc{cryptoeprint:2016:419, author = {Yi LU and Yvo DESMEDT}, title = {Walsh-Hadamard Transform and Cryptographic Applications in Bias Computing}, howpublished = {Cryptology ePrint Archive, Report 2016/419}, year = {2016}, url = {https://eprint.iacr.org/2016/419}, } @misc{cryptoeprint:2016:420, author = {Santos Merino Del Pozo and François-Xavier Standaert}, title = {A note on the security of threshold implementations with $d+1$ input shares}, howpublished = {Cryptology ePrint Archive, Report 2016/420}, year = {2016}, url = {https://eprint.iacr.org/2016/420}, } @misc{cryptoeprint:2016:421, author = {Jung Hee Cheon and Andrey Kim and Miran Kim and Yongsoo Song}, title = {Homomorphic Encryption for Arithmetic of Approximate Numbers}, howpublished = {Cryptology ePrint Archive, Report 2016/421}, year = {2016}, url = {https://eprint.iacr.org/2016/421}, } @misc{cryptoeprint:2016:422, author = {Sumanta Sarkar and Siang Meng Sim}, title = {A deeper understanding of the XOR count distribution in the context of lightweight cryptography}, howpublished = {Cryptology ePrint Archive, Report 2016/422}, year = {2016}, url = {https://eprint.iacr.org/2016/422}, } @misc{cryptoeprint:2016:423, author = {Pooya Farshim and Arno Mittelbach}, title = {Modeling Random Oracles under Unpredictable Queries}, howpublished = {Cryptology ePrint Archive, Report 2016/423}, year = {2016}, url = {https://eprint.iacr.org/2016/423}, } @misc{cryptoeprint:2016:424, author = {Gorjan Alagic and Anne Broadbent and Bill Fefferman and Tommaso Gagliardoni and Christian Schaffner and Michael St. Jules}, title = {Computational Security of Quantum Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/424}, year = {2016}, url = {https://eprint.iacr.org/2016/424}, } @misc{cryptoeprint:2016:425, author = {Michel Abdalla and Romain Gay and Mariana Raykova and Hoeteck Wee }, title = {Multi-Input Inner-Product Functional Encryption from Pairings}, howpublished = {Cryptology ePrint Archive, Report 2016/425}, year = {2016}, url = {https://eprint.iacr.org/2016/425}, } @misc{cryptoeprint:2016:426, author = {Fahad Shaon and Murat Kantarcioglu}, title = {A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data}, howpublished = {Cryptology ePrint Archive, Report 2016/426}, year = {2016}, url = {https://eprint.iacr.org/2016/426}, } @misc{cryptoeprint:2016:427, author = {Varsha Bhat Kukkala and Jaspal Singh Saini and S.R.S. Iyengar}, title = {Privacy Preserving Network Analysis of Distributed Social Networks}, howpublished = {Cryptology ePrint Archive, Report 2016/427}, year = {2016}, url = {https://eprint.iacr.org/2016/427}, } @misc{cryptoeprint:2016:428, author = {Phuong Ha Nguyen and Durga Prasad Sahoo}, title = {An Efficient and Scalable Modeling Attack on Lightweight Secure Physically Unclonable Function}, howpublished = {Cryptology ePrint Archive, Report 2016/428}, year = {2016}, url = {https://eprint.iacr.org/2016/428}, } @misc{cryptoeprint:2016:429, author = {Boris Ryabko}, title = {Information-Theoretical Analysis of Two Shannon's Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2016/429}, year = {2016}, url = {https://eprint.iacr.org/2016/429}, } @misc{cryptoeprint:2016:430, author = {Jian Liu and Lusheng Chen and Sihem Mesnager}, title = {Partially homomorphic encryption schemes over finite fields}, howpublished = {Cryptology ePrint Archive, Report 2016/430}, year = {2016}, url = {https://eprint.iacr.org/2016/430}, } @misc{cryptoeprint:2016:431, author = {David Bernhard, Oksana Kulyk, Melanie Volkamer}, title = {Security Proofs for Participation Privacy, Receipt-Freeness, Ballot Privacy, and Verifiability Against Malicious Bulletin Board for the Helios Voting Scheme}, howpublished = {Cryptology ePrint Archive, Report 2016/431}, year = {2016}, url = {https://eprint.iacr.org/2016/431}, } @misc{cryptoeprint:2016:432, author = {Kwangsu Lee and Dong Hoon Lee}, title = {Two-Input Functional Encryption for Inner Products from Bilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2016/432}, year = {2016}, url = {https://eprint.iacr.org/2016/432}, } @misc{cryptoeprint:2016:433, author = {Guillaume Scerri and Ryan Stanley-Oakes}, title = {Analysis of Key Wrapping APIs: Generic Policies, Computational Security}, howpublished = {Cryptology ePrint Archive, Report 2016/433}, year = {2016}, url = {https://eprint.iacr.org/2016/433}, } @misc{cryptoeprint:2016:434, author = {Cong Chen and Mohammad Farmani and Thomas Eisenbarth}, title = {A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile-and Why it is Not}, howpublished = {Cryptology ePrint Archive, Report 2016/434}, year = {2016}, url = {https://eprint.iacr.org/2016/434}, } @misc{cryptoeprint:2016:435, author = {Rafael del Pino and Vadim Lyubashevsky and David Pointcheval }, title = {The Whole is Less than the Sum of its Parts: Constructing More Efficient Lattice-Based AKEs}, howpublished = {Cryptology ePrint Archive, Report 2016/435}, year = {2016}, url = {https://eprint.iacr.org/2016/435}, } @misc{cryptoeprint:2016:436, author = {Nasour Bagheri and Tao Huang and Keting Jia and Florian Mendel and Yu Sasaki}, title = {Cryptanalysis of Reduced NORX}, howpublished = {Cryptology ePrint Archive, Report 2016/436}, year = {2016}, url = {https://eprint.iacr.org/2016/436}, } @misc{cryptoeprint:2016:437, author = {Sonia Bogos and Serge Vaudenay}, title = {Observations on the LPN Solving Algorithm from Eurocrypt'16}, howpublished = {Cryptology ePrint Archive, Report 2016/437}, year = {2016}, url = {https://eprint.iacr.org/2016/437}, } @misc{cryptoeprint:2016:438, author = {Ralf Kuesters and Johannes Mueller and Enrico Scapin and Tomasz Truderung}, title = {sElect: A Lightweight Verifiable Remote Voting System}, howpublished = {Cryptology ePrint Archive, Report 2016/438}, year = {2016}, url = {https://eprint.iacr.org/2016/438}, } @misc{cryptoeprint:2016:439, author = {Hao Chen}, title = {A Measure Version of Gaussian Heuristic}, howpublished = {Cryptology ePrint Archive, Report 2016/439}, year = {2016}, url = {https://eprint.iacr.org/2016/439}, } @misc{cryptoeprint:2016:440, author = {Sam Kim and Kevin Lewi and Avradip Mandal and Hart Montgomery and Arnab Roy and David J. Wu}, title = {Function-Hiding Inner Product Encryption is Practical}, howpublished = {Cryptology ePrint Archive, Report 2016/440}, year = {2016}, url = {https://eprint.iacr.org/2016/440}, } @misc{cryptoeprint:2016:441, author = {Durga Prasad Sahoo and Sikhar Patranabis and Debdeep Mukhopadhyay and Rajat Subhra Chakraborty}, title = {Fault Tolerant Implementations of Delay-based Physically Unclonable Functions on FPGA}, howpublished = {Cryptology ePrint Archive, Report 2016/441}, year = {2016}, url = {https://eprint.iacr.org/2016/441}, } @misc{cryptoeprint:2016:442, author = {Franziskus Kiefer and Mark Manulis}, title = {Blind Password Registration for Verifier-based PAKE}, howpublished = {Cryptology ePrint Archive, Report 2016/442}, year = {2016}, url = {https://eprint.iacr.org/2016/442}, } @misc{cryptoeprint:2016:443, author = {Simon Cogliani and Houda Ferradi and R\'emi G\'eraud and David Naccache}, title = {Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2016/443}, year = {2016}, url = {https://eprint.iacr.org/2016/443}, } @misc{cryptoeprint:2016:444, author = {Roberto Avanzi}, title = {The QARMA Block Cipher Family -- Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes}, howpublished = {Cryptology ePrint Archive, Report 2016/444}, year = {2016}, url = {https://eprint.iacr.org/2016/444}, } @misc{cryptoeprint:2016:445, author = {Alhassan Khedr and Glenn Gulak}, title = {SecureMed: Secure Medical Computation using GPU-Accelerated Homomorphic Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2016/445}, year = {2016}, url = {https://eprint.iacr.org/2016/445}, } @misc{cryptoeprint:2016:446, author = {Boris Skoric}, title = {Quantum key distribution with combined conjugate coding and information overloading}, howpublished = {Cryptology ePrint Archive, Report 2016/446}, year = {2016}, url = {https://eprint.iacr.org/2016/446}, } @misc{cryptoeprint:2016:447, author = {Peter Hyun-Jeen Lee and Siamak F. Shahandashti}, title = {Theoretical Attacks on E2E Voting Systems}, howpublished = {Cryptology ePrint Archive, Report 2016/447}, year = {2016}, url = {https://eprint.iacr.org/2016/447}, } @misc{cryptoeprint:2016:448, author = {Zhengjun Cao and Lihua Liu}, title = {A Note on ``Outsourcing Large Matrix Inversion Computation to a Public Cloud"}, howpublished = {Cryptology ePrint Archive, Report 2016/448}, year = {2016}, url = {https://eprint.iacr.org/2016/448}, } @misc{cryptoeprint:2016:449, author = {Thomas Espitau and Pierre-Alain Fouque and Benoît Gérard and Mehdi Tibouchi}, title = {Loop-Abort Faults on Lattice-Based Fiat–Shamir and Hash-and-Sign Signatures}, howpublished = {Cryptology ePrint Archive, Report 2016/449}, year = {2016}, url = {https://eprint.iacr.org/2016/449}, } @misc{cryptoeprint:2016:450, author = {Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh and Mohammad Reza Aref}, title = {A Provably Secure Code-based Concurrent Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2016/450}, year = {2016}, url = {https://eprint.iacr.org/2016/450}, } @misc{cryptoeprint:2016:451, author = {Wacław Banasik and Stefan Dziembowski and Daniel Malinowski}, title = {Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts}, howpublished = {Cryptology ePrint Archive, Report 2016/451}, year = {2016}, url = {https://eprint.iacr.org/2016/451}, } @misc{cryptoeprint:2016:452, author = {Benjamin Dowling and Felix Günther and Udyani Herath and Douglas Stebila}, title = {Secure Logging Schemes and Certificate Transparency}, howpublished = {Cryptology ePrint Archive, Report 2016/452}, year = {2016}, url = {https://eprint.iacr.org/2016/452}, } @misc{cryptoeprint:2016:453, author = {Seny Kamara and Tarik Moataz}, title = {SQL on Structurally-Encrypted Databases}, howpublished = {Cryptology ePrint Archive, Report 2016/453}, year = {2016}, url = {https://eprint.iacr.org/2016/453}, } @misc{cryptoeprint:2016:454, author = {Rafael Pass and Lior Seeman and abhi shelat}, title = {Analysis of the Blockchain Protocol in Asynchronous Networks}, howpublished = {Cryptology ePrint Archive, Report 2016/454}, year = {2016}, url = {https://eprint.iacr.org/2016/454}, } @misc{cryptoeprint:2016:455, author = {Linus Feiten, Matthias Sauer}, title = {Extracting the RC4 secret key of the Open Smart Grid Protocol}, howpublished = {Cryptology ePrint Archive, Report 2016/455}, year = {2016}, url = {https://eprint.iacr.org/2016/455}, } @misc{cryptoeprint:2016:456, author = {Yuval Ishai, Eyal Kushilevitz, Manoj Prabhakaran, Amit Sahai, Ching-Hua Yu}, title = {Secure Protocol Transformations}, howpublished = {Cryptology ePrint Archive, Report 2016/456}, year = {2016}, url = {https://eprint.iacr.org/2016/456}, } @misc{cryptoeprint:2016:457, author = {Wei Yuan}, title = {Dynamic Policy Update for Ciphertext-Policy Attribute-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/457}, year = {2016}, url = {https://eprint.iacr.org/2016/457}, } @misc{cryptoeprint:2016:458, author = {Adam Groce and Alex Ledger and Alex J. Malozemoff and Arkady Yerukhimovich}, title = {CompGC: Efficient Offline/Online Semi-honest Two-party Computation}, howpublished = {Cryptology ePrint Archive, Report 2016/458}, year = {2016}, url = {https://eprint.iacr.org/2016/458}, } @misc{cryptoeprint:2016:459, author = {Zvika Brakerski and Justin Holmgren and Yael Kalai}, title = {Non-Interactive RAM and Batch NP Delegation from any PIR}, howpublished = {Cryptology ePrint Archive, Report 2016/459}, year = {2016}, url = {https://eprint.iacr.org/2016/459}, } @misc{cryptoeprint:2016:460, author = {Kwangsu Lee and Seunghwan Park}, title = {Revocable Hierarchical Identity-Based Encryption with Shorter Private Keys and Update Keys}, howpublished = {Cryptology ePrint Archive, Report 2016/460}, year = {2016}, url = {https://eprint.iacr.org/2016/460}, } @misc{cryptoeprint:2016:461, author = {Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange and Christine van Vredendaal}, title = {NTRU Prime: reducing attack surface at low cost}, howpublished = {Cryptology ePrint Archive, Report 2016/461}, year = {2016}, url = {https://eprint.iacr.org/2016/461}, } @misc{cryptoeprint:2016:462, author = {Masahiro Yagisawa}, title = {Fully Homomorphic Encryption with Isotropic Elements}, howpublished = {Cryptology ePrint Archive, Report 2016/462}, year = {2016}, url = {https://eprint.iacr.org/2016/462}, } @misc{cryptoeprint:2016:463, author = {Reza Reyhanitabar and Serge Vaudenay and Damian Vizár}, title = {Authenticated Encryption with Variable Stretch}, howpublished = {Cryptology ePrint Archive, Report 2016/463}, year = {2016}, url = {https://eprint.iacr.org/2016/463}, } @misc{cryptoeprint:2016:464, author = {Kyle Soska and Albert Kwon and Nicolas Christin and Srinivas Devadas}, title = {Beaver: A Decentralized Anonymous Marketplace with Secure Reputation}, howpublished = {Cryptology ePrint Archive, Report 2016/464}, year = {2016}, url = {https://eprint.iacr.org/2016/464}, } @misc{cryptoeprint:2016:465, author = {Subhabrata Samajder and Palash Sarkar}, title = {Can Large Deviation Theory be Used for Estimating Data Complexity?}, howpublished = {Cryptology ePrint Archive, Report 2016/465}, year = {2016}, url = {https://eprint.iacr.org/2016/465}, } @misc{cryptoeprint:2016:466, author = {Ania Piotrowska and Jamie Hayes and Nethanel Gelernter and George Danezis and Amir Herzberg}, title = {AnNotify: A Private Notification Service}, howpublished = {Cryptology ePrint Archive, Report 2016/466}, year = {2016}, url = {https://eprint.iacr.org/2016/466}, } @misc{cryptoeprint:2016:467, author = {Shay Gueron and Fabian Schlieker}, title = {Speeding up R-LWE post-quantum key exchange}, howpublished = {Cryptology ePrint Archive, Report 2016/467}, year = {2016}, url = {https://eprint.iacr.org/2016/467}, } @misc{cryptoeprint:2016:468, author = {Maciej A. Czyzewski}, title = {Chaos Machine: Different Approach to the Application and Significance of Numbers}, howpublished = {Cryptology ePrint Archive, Report 2016/468}, year = {2016}, url = {https://eprint.iacr.org/2016/468}, } @misc{cryptoeprint:2016:469, author = {Andrew Egbert and Brad Chun and Thomas Otte}, title = {Identity Chains}, howpublished = {Cryptology ePrint Archive, Report 2016/469}, year = {2016}, url = {https://eprint.iacr.org/2016/469}, } @misc{cryptoeprint:2016:470, author = {Myungsun Kim and Hyung Tae Lee and San Ling and Shu Qin Ren and Benjamin Hong Meng Tan and Huaxiong Wang}, title = {Better Security for Queries on Encrypted Databases}, howpublished = {Cryptology ePrint Archive, Report 2016/470}, year = {2016}, url = {https://eprint.iacr.org/2016/470}, } @misc{cryptoeprint:2016:471, author = {Wei Dai and John Schanck and Berk Sunar and William Whyte and Zhenfei Zhang}, title = {NTRU Modular Lattice Signature Scheme on CUDA GPUs}, howpublished = {Cryptology ePrint Archive, Report 2016/471}, year = {2016}, url = {https://eprint.iacr.org/2016/471}, } @misc{cryptoeprint:2016:472, author = {Loubna Ghammam and Emmanuel Fouotsa}, title = {Adequate Elliptic Curve for Computing the Product of n Pairings}, howpublished = {Cryptology ePrint Archive, Report 2016/472}, year = {2016}, url = {https://eprint.iacr.org/2016/472}, } @misc{cryptoeprint:2016:473, author = {Thomas Unterluggauer and Stefan Mangard}, title = {Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/473}, year = {2016}, url = {https://eprint.iacr.org/2016/473}, } @misc{cryptoeprint:2016:474, author = {Gideon Samid}, title = {T-Proof: Secure Communication via Non-Algorithmic Randomization}, howpublished = {Cryptology ePrint Archive, Report 2016/474}, year = {2016}, url = {https://eprint.iacr.org/2016/474}, } @misc{cryptoeprint:2016:475, author = {Hanno Böck and Aaron Zauner and Sean Devlin and Juraj Somorovsky and Philipp Jovanovic}, title = {Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS}, howpublished = {Cryptology ePrint Archive, Report 2016/475}, year = {2016}, url = {https://eprint.iacr.org/2016/475}, } @misc{cryptoeprint:2016:476, author = {Keita Xagawa}, title = {Groth-Sahai Proofs Revisited Again: A Bug in ``Optimized'' Randomization}, howpublished = {Cryptology ePrint Archive, Report 2016/476}, year = {2016}, url = {https://eprint.iacr.org/2016/476}, } @misc{cryptoeprint:2016:477, author = {Kazuma Ohara, Keita Emura, Goichiro Hanaoka, Ai Ishida, Kazuo Ohta, Yusuke Sakai}, title = {Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology}, howpublished = {Cryptology ePrint Archive, Report 2016/477}, year = {2016}, url = {https://eprint.iacr.org/2016/477}, } @misc{cryptoeprint:2016:478, author = {Erman Ayday and Qiang Tang and Arif Yilmaz}, title = {Cryptographic Solutions for Credibility and Liability Issues of Genomic Data}, howpublished = {Cryptology ePrint Archive, Report 2016/478}, year = {2016}, url = {https://eprint.iacr.org/2016/478}, } @misc{cryptoeprint:2016:479, author = {Jakub Szefer}, title = {Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses}, howpublished = {Cryptology ePrint Archive, Report 2016/479}, year = {2016}, url = {https://eprint.iacr.org/2016/479}, } @misc{cryptoeprint:2016:480, author = {Pierre-Alain Fouque and Cristina Onete and Benjamin Richard}, title = {Achieving Better Privacy for the 3GPP AKA Protocol}, howpublished = {Cryptology ePrint Archive, Report 2016/480}, year = {2016}, url = {https://eprint.iacr.org/2016/480}, } @misc{cryptoeprint:2016:481, author = {Amir Moradi and Tobias Schneider}, title = {Side-Channel Analysis Protection and Low-Latency in Action - case study of PRINCE and Midori}, howpublished = {Cryptology ePrint Archive, Report 2016/481}, year = {2016}, url = {https://eprint.iacr.org/2016/481}, } @misc{cryptoeprint:2016:482, author = {Shashank Agrawal and David J. Wu}, title = {Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2016/482}, year = {2016}, url = {https://eprint.iacr.org/2016/482}, } @misc{cryptoeprint:2016:483, author = {Hiroaki Anada and Seiko Arita and Kouichi Sakurai}, title = {Proofs of Knowledge on Monotone Predicates and its Application to Attribute-Based Identifications and Signatures}, howpublished = {Cryptology ePrint Archive, Report 2016/483}, year = {2016}, url = {https://eprint.iacr.org/2016/483}, } @misc{cryptoeprint:2016:484, author = {Jung Hee Cheon and HeeWon Chung and Myungsun Kim and Kang-Won Lee}, title = {Ghostshell: Secure Biometric Authentication using Integrity-based Homomorphic Evaluations}, howpublished = {Cryptology ePrint Archive, Report 2016/484}, year = {2016}, url = {https://eprint.iacr.org/2016/484}, } @misc{cryptoeprint:2016:485, author = {Palash Sarkar and Shashank Singh}, title = {A General Polynomial Selection Method and New Asymptotic Complexities for the Tower Number Field Sieve Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2016/485}, year = {2016}, url = {https://eprint.iacr.org/2016/485}, } @misc{cryptoeprint:2016:486, author = {Hannes Gross and Stefan Mangard and Thomas Korak}, title = {Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order}, howpublished = {Cryptology ePrint Archive, Report 2016/486}, year = {2016}, url = {https://eprint.iacr.org/2016/486}, } @misc{cryptoeprint:2016:487, author = {Amine MRABET, Nadia EL-MRABET, Ronan LASHERMES, Jean Baptiste RIGAUD, Belgacem BOUALLEGUE, Sihem MESNAGER and Mohsen MACHHOUT}, title = {A Systolic Hardware Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2016/487}, year = {2016}, url = {https://eprint.iacr.org/2016/487}, } @misc{cryptoeprint:2016:488, author = {Husen Wang and Qiang Tang}, title = {Efficient Homomorphic Integer Polynomial Evaluation based on GSW FHE}, howpublished = {Cryptology ePrint Archive, Report 2016/488}, year = {2016}, url = {https://eprint.iacr.org/2016/488}, } @misc{cryptoeprint:2016:489, author = {Nethanel Gelernter and Amir Herzberg and Hemi Leibowitz}, title = {Two Cents for Strong Anonymity: The Anonymous Post-office Protocol}, howpublished = {Cryptology ePrint Archive, Report 2016/489}, year = {2016}, url = {https://eprint.iacr.org/2016/489}, } @misc{cryptoeprint:2016:490, author = {Cihangir Tezcan}, title = {Truncated, Impossible, and Improbable Differential Analysis of Ascon}, howpublished = {Cryptology ePrint Archive, Report 2016/490}, year = {2016}, url = {https://eprint.iacr.org/2016/490}, } @misc{cryptoeprint:2016:491, author = {Daniel P. Martin and Luke Mather and Elisabeth Oswald and Martijn Stam}, title = {Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations}, howpublished = {Cryptology ePrint Archive, Report 2016/491}, year = {2016}, url = {https://eprint.iacr.org/2016/491}, } @misc{cryptoeprint:2016:492, author = {Martin Albrecht and Lorenzo Grassi and Christian Rechberger and Arnab Roy and Tyge Tiessen}, title = {MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity}, howpublished = {Cryptology ePrint Archive, Report 2016/492}, year = {2016}, url = {https://eprint.iacr.org/2016/492}, } @misc{cryptoeprint:2016:493, author = {Arnaud Bannier and Nicolas Bodin and Eric Filiol}, title = {Partition-Based Trapdoor Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2016/493}, year = {2016}, url = {https://eprint.iacr.org/2016/493}, } @misc{cryptoeprint:2016:494, author = {Bo Yang and Kang Yang and Zhenfeng Zhang and Yu Qin and Dengguo Feng}, title = {AEP-M: Practical Anonymous E-Payment for Mobile Devices using ARM TrustZone and Divisible E-Cash (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2016/494}, year = {2016}, url = {https://eprint.iacr.org/2016/494}, } @misc{cryptoeprint:2016:495, author = {Jesper Buus Nielsen and Claudio Orlandi}, title = {Cross&Clean: Amortized Garbled Circuits with Constant Overhead}, howpublished = {Cryptology ePrint Archive, Report 2016/495}, year = {2016}, url = {https://eprint.iacr.org/2016/495}, } @misc{cryptoeprint:2016:496, author = {Daniel Kraschewski and Dakshita Khurana and Hemanta K. Maji and Manoj Prabhakaran and Amit Sahai}, title = {All Complete Functionalities are Reversible}, howpublished = {Cryptology ePrint Archive, Report 2016/496}, year = {2016}, url = {https://eprint.iacr.org/2016/496}, } @misc{cryptoeprint:2016:497, author = {Dakshita Khurana and Hemanta K. Maji and Amit Sahai}, title = {Secure Computation from Elastic Noisy Channels}, howpublished = {Cryptology ePrint Archive, Report 2016/497}, year = {2016}, url = {https://eprint.iacr.org/2016/497}, } @misc{cryptoeprint:2016:498, author = {Xavier Boyen and Qinyi Li}, title = {Towards Tightly Secure Short Signature and IBE}, howpublished = {Cryptology ePrint Archive, Report 2016/498}, year = {2016}, url = {https://eprint.iacr.org/2016/498}, } @misc{cryptoeprint:2016:499, author = {Gideon Samid}, title = {Drone Targeted Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2016/499}, year = {2016}, url = {https://eprint.iacr.org/2016/499}, } @misc{cryptoeprint:2016:500, author = {Jong Hwan Park and Kwangsu Lee and Dong Hoon Lee}, title = {Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups}, howpublished = {Cryptology ePrint Archive, Report 2016/500}, year = {2016}, url = {https://eprint.iacr.org/2016/500}, } @misc{cryptoeprint:2016:501, author = {Libo He, Chen Yuan, Hu Xiong, and Zhiguang Qin}, title = {Certificateless Key Insulated Encryption: Cryptographic Primitive for Achieving Key-escrow free and Key-exposure Resilience}, howpublished = {Cryptology ePrint Archive, Report 2016/501}, year = {2016}, url = {https://eprint.iacr.org/2016/501}, } @misc{cryptoeprint:2016:502, author = {Christina Boura and Avik Chakraborti and Gaëtan Leurent and Goutam Paul and Dhiman Saha and Hadi Soleimany and Valentin Suder}, title = {Key Recovery Attack against 2.5-round pi-Cipher}, howpublished = {Cryptology ePrint Archive, Report 2016/502}, year = {2016}, url = {https://eprint.iacr.org/2016/502}, } @misc{cryptoeprint:2016:503, author = {Rachid El Bansarkhani and Mohamed Saied Emam Mohamed and Albrecht Petzoldt}, title = {MQSAS - A Multivariate Sequential Aggregate Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2016/503}, year = {2016}, url = {https://eprint.iacr.org/2016/503}, } @misc{cryptoeprint:2016:504, author = {Patrick Longa and Michael Naehrig}, title = {Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2016/504}, year = {2016}, url = {https://eprint.iacr.org/2016/504}, } @misc{cryptoeprint:2016:505, author = {Marcel Keller and Emmanuela Orsini and Peter Scholl}, title = {MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2016/505}, year = {2016}, url = {https://eprint.iacr.org/2016/505}, } @misc{cryptoeprint:2016:506, author = {Ioana-Cristina Panait and Cristian Pop and Alexandru Sirbu and Adelina Vidovici and Emil Simion}, title = {TOR - Didactic pluggable transport}, howpublished = {Cryptology ePrint Archive, Report 2016/506}, year = {2016}, url = {https://eprint.iacr.org/2016/506}, } @misc{cryptoeprint:2016:507, author = {Aurore Guillevic and François Morain and Emmanuel Thomé}, title = {Solving discrete logarithms on a 170-bit MNT curve by pairing reduction}, howpublished = {Cryptology ePrint Archive, Report 2016/507}, year = {2016}, url = {https://eprint.iacr.org/2016/507}, } @misc{cryptoeprint:2016:508, author = {Dominique Unruh}, title = {Collapse-binding quantum commitments without random oracles}, howpublished = {Cryptology ePrint Archive, Report 2016/508}, year = {2016}, url = {https://eprint.iacr.org/2016/508}, } @misc{cryptoeprint:2016:509, author = {Xiaoyang Dong and Xiaoyun Wang}, title = {Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes}, howpublished = {Cryptology ePrint Archive, Report 2016/509}, year = {2016}, url = {https://eprint.iacr.org/2016/509}, } @misc{cryptoeprint:2016:510, author = {Jean-Claude Bajard and Julien Eynard and Anwar Hasan and Vincent Zucca}, title = {A Full RNS Variant of FV like Somewhat Homomorphic Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2016/510}, year = {2016}, url = {https://eprint.iacr.org/2016/510}, } @misc{cryptoeprint:2016:511, author = {Ran Canetti and Oxana Poburinnaya and Mariana Raykova}, title = {Optimal-Rate Non-Committing Encryption in a CRS Model}, howpublished = {Cryptology ePrint Archive, Report 2016/511}, year = {2016}, url = {https://eprint.iacr.org/2016/511}, } @misc{cryptoeprint:2016:512, author = {Lucjan Hanzlik and Kamil Kluczniak}, title = {Security Analysis of ePrint Report 2016/500 "Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups"}, howpublished = {Cryptology ePrint Archive, Report 2016/512}, year = {2016}, url = {https://eprint.iacr.org/2016/512}, } @misc{cryptoeprint:2016:513, author = {Michael Tunstall and Gilbert Goodwill}, title = {Applying TVLA to Public Key Cryptographic Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2016/513}, year = {2016}, url = {https://eprint.iacr.org/2016/513}, } @misc{cryptoeprint:2016:514, author = {Yu Yu and Jiang Zhang}, title = {Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN}, howpublished = {Cryptology ePrint Archive, Report 2016/514}, year = {2016}, url = {https://eprint.iacr.org/2016/514}, } @misc{cryptoeprint:2016:515, author = {Mihai Barbulescu and Adrian Stratulat and Vlad Traista-Popescu and Emil Simion }, title = {RSA Weak Public Keys available on the Internet}, howpublished = {Cryptology ePrint Archive, Report 2016/515}, year = {2016}, url = {https://eprint.iacr.org/2016/515}, } @misc{cryptoeprint:2016:516, author = {Ferucio Laurentiu Tiplea and George Teseleanu and Sorin Iftene and Anca-Maria Nica}, title = {Boneh-Gentry-Hamburg's Identity-based Encryption Schemes Revisited}, howpublished = {Cryptology ePrint Archive, Report 2016/516}, year = {2016}, url = {https://eprint.iacr.org/2016/516}, } @misc{cryptoeprint:2016:517, author = {David McCann and Elisabeth Oswald and Carolyn Whitnall}, title = {Towards Practical Tools for Side Channel Aware Software Engineering: `Grey Box' Modelling for Instruction Leakages}, howpublished = {Cryptology ePrint Archive, Report 2016/517}, year = {2016}, url = {https://eprint.iacr.org/2016/517}, } @misc{cryptoeprint:2016:518, author = {Vladimir Kolesnikov and Hugo Krawczyk and Yehuda Lindell and Alex J. Malozemoff and Tal Rabin}, title = {Attribute-based Key Exchange with General Policies}, howpublished = {Cryptology ePrint Archive, Report 2016/518}, year = {2016}, url = {https://eprint.iacr.org/2016/518}, } @misc{cryptoeprint:2016:519, author = {Benny Applebaum; Pavel Raykov}, title = {On the Relationship between Statistical Zero-Knowledge and Statistical Randomized Encodings}, howpublished = {Cryptology ePrint Archive, Report 2016/519}, year = {2016}, url = {https://eprint.iacr.org/2016/519}, } @misc{cryptoeprint:2016:520, author = {Franziskus Kiefer and Mark Manulis}, title = {Universally Composable Two-Server PAKE}, howpublished = {Cryptology ePrint Archive, Report 2016/520}, year = {2016}, url = {https://eprint.iacr.org/2016/520}, } @misc{cryptoeprint:2016:521, author = {Frédéric Lafitte and Liran Lerman and Olivier Markowitch and Dirk Van Heule}, title = {SAT-based cryptanalysis of ACORN}, howpublished = {Cryptology ePrint Archive, Report 2016/521}, year = {2016}, url = {https://eprint.iacr.org/2016/521}, } @misc{cryptoeprint:2016:522, author = {Daisuke Fujimoto and Shivam Bhasin and Makoto Nagata and Jean-Luc Danger}, title = {A Novel Methodology for Testing Hardware Security and Trust Exploiting On-Chip Power Noise Measurements (Extended Version)}, howpublished = {Cryptology ePrint Archive, Report 2016/522}, year = {2016}, url = {https://eprint.iacr.org/2016/522}, } @misc{cryptoeprint:2016:523, author = {Jiang Zhang and Yu Chen and Zhenfeng Zhang}, title = {Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes}, howpublished = {Cryptology ePrint Archive, Report 2016/523}, year = {2016}, url = {https://eprint.iacr.org/2016/523}, } @misc{cryptoeprint:2016:524, author = {Sanjam Garg and Akshayaram Srinivasan}, title = {Single-Key to Multi-Key Functional Encryption with Polynomial Loss}, howpublished = {Cryptology ePrint Archive, Report 2016/524}, year = {2016}, url = {https://eprint.iacr.org/2016/524}, } @misc{cryptoeprint:2016:525, author = {Benoît Cogliati and Yannick Seurin}, title = {EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC}, howpublished = {Cryptology ePrint Archive, Report 2016/525}, year = {2016}, url = {https://eprint.iacr.org/2016/525}, } @misc{cryptoeprint:2016:526, author = {Taechan Kim and Jinhyuck Jeong}, title = {Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension Degree}, howpublished = {Cryptology ePrint Archive, Report 2016/526}, year = {2016}, url = {https://eprint.iacr.org/2016/526}, } @misc{cryptoeprint:2016:527, author = {Giuseppe Ateniese and Aggelos Kiayias and Bernardo Magri and Yiannis Tselekounis and Daniele Venturi}, title = {Secure Outsourcing of Circuit Manufacturing}, howpublished = {Cryptology ePrint Archive, Report 2016/527}, year = {2016}, url = {https://eprint.iacr.org/2016/527}, } @misc{cryptoeprint:2016:528, author = {Thomas Espitau and Antoine Joux}, title = {Adaptive precision LLL and Potential-LLL reductions with Interval arithmetic}, howpublished = {Cryptology ePrint Archive, Report 2016/528}, year = {2016}, url = {https://eprint.iacr.org/2016/528}, } @misc{cryptoeprint:2016:529, author = {Antonio Faonio and Daniele Venturi}, title = {Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience}, howpublished = {Cryptology ePrint Archive, Report 2016/529}, year = {2016}, url = {https://eprint.iacr.org/2016/529}, } @misc{cryptoeprint:2016:530, author = {Alexander Russell and Qiang Tang and Moti Yung and Hong-Sheng Zhou}, title = {Destroying Steganography via Amalgamation: Kleptographically CPA Secure Public Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/530}, year = {2016}, url = {https://eprint.iacr.org/2016/530}, } @misc{cryptoeprint:2016:531, author = {Alexandre Gélin and Antoine Joux}, title = {Reducing number field defining polynomials: An application to class group computations}, howpublished = {Cryptology ePrint Archive, Report 2016/531}, year = {2016}, url = {https://eprint.iacr.org/2016/531}, } @misc{cryptoeprint:2016:532, author = {Tomer Ashur and Achiya Bar-On and Orr Dunkelman}, title = {Cryptanalysis of GOST2}, howpublished = {Cryptology ePrint Archive, Report 2016/532}, year = {2016}, url = {https://eprint.iacr.org/2016/532}, } @misc{cryptoeprint:2016:533, author = {Bing Sun and Meicheng Liu and Jian Guo and Longjiang Qu and Vincent Rijmen}, title = {New Insights on AES-like SPN Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2016/533}, year = {2016}, url = {https://eprint.iacr.org/2016/533}, } @misc{cryptoeprint:2016:534, author = {Tomer Ashur and Bart Mennink}, title = {Damaging, Simplifying, and Salvaging p-OMD}, howpublished = {Cryptology ePrint Archive, Report 2016/534}, year = {2016}, url = {https://eprint.iacr.org/2016/534}, } @misc{cryptoeprint:2016:535, author = {Chen Zhan and Wang Xiaoyun}, title = {Impossible Differential Cryptanalysis of Midori}, howpublished = {Cryptology ePrint Archive, Report 2016/535}, year = {2016}, url = {https://eprint.iacr.org/2016/535}, } @misc{cryptoeprint:2016:536, author = {Joshua Brody and Stefan Dziembowski and Sebastian Faust and Krzysztof Pietrzak}, title = {Position-Based Cryptography and Multiparty Communication Complexity}, howpublished = {Cryptology ePrint Archive, Report 2016/536}, year = {2016}, url = {https://eprint.iacr.org/2016/536}, } @misc{cryptoeprint:2016:537, author = {Palash Sarkar and Shashank Singh}, title = {A Generalisation of the Conjugation Method for Polynomial Selection for the Extended Tower Number Field Sieve Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2016/537}, year = {2016}, url = {https://eprint.iacr.org/2016/537}, } @misc{cryptoeprint:2016:538, author = {Carsten Baum and Ivan Damgård and Kasper Larsen and Michael Nielsen}, title = {How to prove knowledge of small secrets}, howpublished = {Cryptology ePrint Archive, Report 2016/538}, year = {2016}, url = {https://eprint.iacr.org/2016/538}, } @misc{cryptoeprint:2016:539, author = {Léo Perrin, Aleksei Udovenko and Alex Biryukov}, title = {Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2016/539}, year = {2016}, url = {https://eprint.iacr.org/2016/539}, } @misc{cryptoeprint:2016:540, author = {Alberto Battistello and Jean-Sebastien Coron and Emmanuel Prouff and Rina Zeitoun}, title = {Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme}, howpublished = {Cryptology ePrint Archive, Report 2016/540}, year = {2016}, url = {https://eprint.iacr.org/2016/540}, } @misc{cryptoeprint:2016:541, author = {Mihir Bellare and Daniel Kane and Phillip Rogaway}, title = {Big-Key Symmetric Encryption: Resisting Key Exfiltration}, howpublished = {Cryptology ePrint Archive, Report 2016/541}, year = {2016}, url = {https://eprint.iacr.org/2016/541}, } @misc{cryptoeprint:2016:542, author = {Lorenzo Grassi and Christian Rechberger and Dragos Rotaru and Peter Scholl and Nigel P. Smart}, title = {MPC-Friendly Symmetric Key Primitives}, howpublished = {Cryptology ePrint Archive, Report 2016/542}, year = {2016}, url = {https://eprint.iacr.org/2016/542}, } @misc{cryptoeprint:2016:543, author = {Adam J. Aviv and Seung Geol Choi and Travis Mayberry and Daniel S. Roche}, title = {ObliviSync: Practical Oblivious File Backup and Synchronization}, howpublished = {Cryptology ePrint Archive, Report 2016/543}, year = {2016}, url = {https://eprint.iacr.org/2016/543}, } @misc{cryptoeprint:2016:544, author = {Geoffroy Couteau}, title = {Efficient Secure Comparison Protocols}, howpublished = {Cryptology ePrint Archive, Report 2016/544}, year = {2016}, url = {https://eprint.iacr.org/2016/544}, } @misc{cryptoeprint:2016:545, author = {Aggelos Kiayias and Giorgos Panagiotakos}, title = {On Trees, Chains and Fast Transactions in the Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2016/545}, year = {2016}, url = {https://eprint.iacr.org/2016/545}, } @misc{cryptoeprint:2016:546, author = {Lucas Schabhüser and Denise Demirel and Johannes Buchmann}, title = {An Unconditionally Hiding Auditing Procedure for Multi-Party Computations}, howpublished = {Cryptology ePrint Archive, Report 2016/546}, year = {2016}, url = {https://eprint.iacr.org/2016/546}, } @misc{cryptoeprint:2016:547, author = {Markus Kammerstetter; Markus Muellner; Daniel Burian; Christian Kudera; Wolfgang Kastner}, title = {Efficient High-Speed WPA2 Brute Force Attacks using Scalable Low-Cost FPGA Clustering}, howpublished = {Cryptology ePrint Archive, Report 2016/547}, year = {2016}, url = {https://eprint.iacr.org/2016/547}, } @misc{cryptoeprint:2016:548, author = {Brent Carmer and Mike Rosulek}, title = {Linicrypt: A Model for Practical Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2016/548}, year = {2016}, url = {https://eprint.iacr.org/2016/548}, } @misc{cryptoeprint:2016:549, author = {Xiong Fan and Juan Garay and Payman Mohassel}, title = {Short and Adjustable Signatures}, howpublished = {Cryptology ePrint Archive, Report 2016/549}, year = {2016}, url = {https://eprint.iacr.org/2016/549}, } @misc{cryptoeprint:2016:550, author = {Andrew D. Zonenberg; Bulent Yener}, title = {Antikernel: A Decentralized Secure Hardware-Software Operating System Architecture}, howpublished = {Cryptology ePrint Archive, Report 2016/550}, year = {2016}, url = {https://eprint.iacr.org/2016/550}, } @misc{cryptoeprint:2016:551, author = {Jean-Sebastien Coron and Rina Zeitoun}, title = {Improved Factorization of $N=p^rq^s$}, howpublished = {Cryptology ePrint Archive, Report 2016/551}, year = {2016}, url = {https://eprint.iacr.org/2016/551}, } @misc{cryptoeprint:2016:552, author = {Jintai Ding and Saed Alsayigh and Jean Lancrenon and Saraswathy RV and Michael Snook}, title = {Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-QuantumWorld}, howpublished = {Cryptology ePrint Archive, Report 2016/552}, year = {2016}, url = {https://eprint.iacr.org/2016/552}, } @misc{cryptoeprint:2016:553, author = {Iraklis Leontiadis and Ming Li}, title = {Storage Efficient Substring Searchable Symmetric Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/553}, year = {2016}, url = {https://eprint.iacr.org/2016/553}, } @misc{cryptoeprint:2016:554, author = {Christina Boura and Anne Canteaut}, title = {Another view of the division property}, howpublished = {Cryptology ePrint Archive, Report 2016/554}, year = {2016}, url = {https://eprint.iacr.org/2016/554}, } @misc{cryptoeprint:2016:555, author = {Arthur Gervais and Ghassan O. Karame and Karl Wüst and Vasileios Glykantzis and Hubert Ritzdorf and Srdjan Capkun}, title = {On the Security and Performance of Proof of Work Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2016/555}, year = {2016}, url = {https://eprint.iacr.org/2016/555}, } @misc{cryptoeprint:2016:556, author = {Martin Hirt and Ueli Maurer and Daniel Tschudi and Vassilis Zikas}, title = {Network-Hiding Communication and Applications to Multi-Party Protocols}, howpublished = {Cryptology ePrint Archive, Report 2016/556}, year = {2016}, url = {https://eprint.iacr.org/2016/556}, } @misc{cryptoeprint:2016:557, author = {Dahmun Goudarzi and Matthieu Rivain}, title = {On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking}, howpublished = {Cryptology ePrint Archive, Report 2016/557}, year = {2016}, url = {https://eprint.iacr.org/2016/557}, } @misc{cryptoeprint:2016:558, author = {Nir Bitansky and Ryo Nishimaki and Alain Passelègue and Daniel Wichs}, title = {From Cryptomania to Obfustopia through Secret-Key Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/558}, year = {2016}, url = {https://eprint.iacr.org/2016/558}, } @misc{cryptoeprint:2016:559, author = {Yfke Dulek and Christian Schaffner and Florian Speelman}, title = {Quantum homomorphic encryption for polynomial-sized circuits}, howpublished = {Cryptology ePrint Archive, Report 2016/559}, year = {2016}, url = {https://eprint.iacr.org/2016/559}, } @misc{cryptoeprint:2016:560, author = {Itai Dinur; Orr Dunkelman; Nathan Keller; Adi Shamir}, title = {Memory-Efficient Algorithms for Finding Needles in Haystacks}, howpublished = {Cryptology ePrint Archive, Report 2016/560}, year = {2016}, url = {https://eprint.iacr.org/2016/560}, } @misc{cryptoeprint:2016:561, author = {Baiyu Li and Daniele Micciancio}, title = {Compactness vs Collusion Resistance in Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/561}, year = {2016}, url = {https://eprint.iacr.org/2016/561}, } @misc{cryptoeprint:2016:562, author = {Daniel Apon and Xiong Fan and Feng-Hao Liu}, title = {Deniable Attribute Based Encryption for Branching Programs from LWE}, howpublished = {Cryptology ePrint Archive, Report 2016/562}, year = {2016}, url = {https://eprint.iacr.org/2016/562}, } @misc{cryptoeprint:2016:563, author = {Carmen Kempka and Ryo Kikuchi and Susumu Kiyoshima and Koutarou Suzuki}, title = {Garbling Scheme for Formulas with Constant Size of Garbled Gates}, howpublished = {Cryptology ePrint Archive, Report 2016/563}, year = {2016}, url = {https://eprint.iacr.org/2016/563}, } @misc{cryptoeprint:2016:564, author = {Mihir Bellare and Bjoern Tackmann}, title = {The Multi-User Security of Authenticated Encryption: AES-GCM in TLS 1.3}, howpublished = {Cryptology ePrint Archive, Report 2016/564}, year = {2016}, url = {https://eprint.iacr.org/2016/564}, } @misc{cryptoeprint:2016:565, author = {Andrej Bogdanov; Yuval Ishai; Emanuele Viola; Christopher Williamson}, title = {Bounded Indistinguishability and the Complexity of Recovering Secrets}, howpublished = {Cryptology ePrint Archive, Report 2016/565}, year = {2016}, url = {https://eprint.iacr.org/2016/565}, } @misc{cryptoeprint:2016:566, author = {Michele Ciampi and Rafail Ostrovsky and Luisa Siniscalchi and Ivan Visconti}, title = {Concurrent Non-Malleable Commitments (and More) in 3 Rounds }, howpublished = {Cryptology ePrint Archive, Report 2016/566}, year = {2016}, url = {https://eprint.iacr.org/2016/566}, } @misc{cryptoeprint:2016:567, author = {Takashi Yamakawa; Shota Yamada; Goichiro Hanaoka; Noboru Kunihiro}, title = {Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli}, howpublished = {Cryptology ePrint Archive, Report 2016/567}, year = {2016}, url = {https://eprint.iacr.org/2016/567}, } @misc{cryptoeprint:2016:568, author = {Tobias Boelter and Rishabh Poddar and Raluca Ada Popa}, title = {A Secure One-Roundtrip Index for Range Queries}, howpublished = {Cryptology ePrint Archive, Report 2016/568}, year = {2016}, url = {https://eprint.iacr.org/2016/568}, } @misc{cryptoeprint:2016:569, author = {Kimmo Järvinen and Andrea Miele and Reza Azarderakhsh and Patrick Longa}, title = {FourQ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields}, howpublished = {Cryptology ePrint Archive, Report 2016/569}, year = {2016}, url = {https://eprint.iacr.org/2016/569}, } @misc{cryptoeprint:2016:570, author = {Masayuki Abe, Fumitaka Hoshino, Miyako Ohkubo}, title = {Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion using Integer Programming}, howpublished = {Cryptology ePrint Archive, Report 2016/570}, year = {2016}, url = {https://eprint.iacr.org/2016/570}, } @misc{cryptoeprint:2016:571, author = {Romain poussier and François-Xavier Standaert and Vincent Grosso}, title = {Simple Key Enumeration (and Rank Estimation) using Histograms: an Integrated Approach}, howpublished = {Cryptology ePrint Archive, Report 2016/571}, year = {2016}, url = {https://eprint.iacr.org/2016/571}, } @misc{cryptoeprint:2016:572, author = {Jean-Sebastien Coron and Aurelien Greuet and Emmanuel Prouff and Rina Zeitoun}, title = {Faster Evaluation of SBoxes via Common Shares}, howpublished = {Cryptology ePrint Archive, Report 2016/572}, year = {2016}, url = {https://eprint.iacr.org/2016/572}, } @misc{cryptoeprint:2016:573, author = {Stefan Dziembowski and Sebastian Faust and Gottfried Herold and Anthony Journault and Daniel Masny and Francois-Xavier Standaert}, title = {Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems}, howpublished = {Cryptology ePrint Archive, Report 2016/573}, year = {2016}, url = {https://eprint.iacr.org/2016/573}, } @misc{cryptoeprint:2016:574, author = {Nir Bitansky and Akshay Degwekar and Vinod Vaikuntanathan}, title = {Structure vs Hardness through the Obfuscation Lens}, howpublished = {Cryptology ePrint Archive, Report 2016/574}, year = {2016}, url = {https://eprint.iacr.org/2016/574}, } @misc{cryptoeprint:2016:575, author = {Ethan Heilman and Leen Alshenibr and Foteini Baldimtsi and Alessandra Scafuro and Sharon Goldberg}, title = {TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub}, howpublished = {Cryptology ePrint Archive, Report 2016/575}, year = {2016}, url = {https://eprint.iacr.org/2016/575}, } @misc{cryptoeprint:2016:576, author = {Gilad Asharov and Alon Rosen and Gil Segev}, title = {Indistinguishability Obfuscation Does Not Reduce to Structured Languages}, howpublished = {Cryptology ePrint Archive, Report 2016/576}, year = {2016}, url = {https://eprint.iacr.org/2016/576}, } @misc{cryptoeprint:2016:577, author = {Jean Paul Degabriele and Kenneth G. Paterson and Jacob C. N. Schuldt and Joanne Woodage}, title = {Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results}, howpublished = {Cryptology ePrint Archive, Report 2016/577}, year = {2016}, url = {https://eprint.iacr.org/2016/577}, } @misc{cryptoeprint:2016:578, author = {Viet Tung Hoang and Stefano Tessaro}, title = {Key-alternating Ciphers and Key-length Extension: Exact Bounds and Multi-user Security}, howpublished = {Cryptology ePrint Archive, Report 2016/578}, year = {2016}, url = {https://eprint.iacr.org/2016/578}, } @misc{cryptoeprint:2016:579, author = {Patrick Derbez; Pierre-Alain Fouque}, title = {Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks}, howpublished = {Cryptology ePrint Archive, Report 2016/579}, year = {2016}, url = {https://eprint.iacr.org/2016/579}, } @misc{cryptoeprint:2016:580, author = {Akshay Degwekar; Vinod Vaikuntanathan; Prashant Nalini Vasudevan}, title = {Fine-grained Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2016/580}, year = {2016}, url = {https://eprint.iacr.org/2016/580}, } @misc{cryptoeprint:2016:581, author = {Jan Camenisch; Maria Dubovitskaya; Alfredo Rial}, title = {UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens}, howpublished = {Cryptology ePrint Archive, Report 2016/581}, year = {2016}, url = {https://eprint.iacr.org/2016/581}, } @misc{cryptoeprint:2016:582, author = {Tanujay Saha}, title = {TV-PUF : A Fast Lightweight Analog Physically Unclonable Function}, howpublished = {Cryptology ePrint Archive, Report 2016/582}, year = {2016}, url = {https://eprint.iacr.org/2016/582}, } @misc{cryptoeprint:2016:583, author = {Melissa Chase; Chaya Ganesh; Payman Mohassel}, title = {Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials}, howpublished = {Cryptology ePrint Archive, Report 2016/583}, year = {2016}, url = {https://eprint.iacr.org/2016/583}, } @misc{cryptoeprint:2016:584, author = {Ranjit Kumaresan; Srinivasan Raghuraman; Adam Sealfon}, title = {Network Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2016/584}, year = {2016}, url = {https://eprint.iacr.org/2016/584}, } @misc{cryptoeprint:2016:585, author = {Elette Boyle; Niv Gilboa; Yuval Ishai}, title = {Breaking the Circuit Size Barrier for Secure Computation Under DDH}, howpublished = {Cryptology ePrint Archive, Report 2016/585}, year = {2016}, url = {https://eprint.iacr.org/2016/585}, } @misc{cryptoeprint:2016:586, author = {Thomas Shrimpton; Martijn Stam; Bogdan Warinschi}, title = {A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case}, howpublished = {Cryptology ePrint Archive, Report 2016/586}, year = {2016}, url = {https://eprint.iacr.org/2016/586}, } @misc{cryptoeprint:2016:587, author = {Sergey Agievich and Vadim Marchuk and Alexander Maslau and Vlad Semenov}, title = {Bash-f: another LRX sponge function}, howpublished = {Cryptology ePrint Archive, Report 2016/587}, year = {2016}, url = {https://eprint.iacr.org/2016/587}, } @misc{cryptoeprint:2016:588, author = {Eric Miles and Amit Sahai and Mark Zhandry}, title = {Secure obfuscation in a weak multilinear map model: A simple construction secure against all known attacks}, howpublished = {Cryptology ePrint Archive, Report 2016/588}, year = {2016}, url = {https://eprint.iacr.org/2016/588}, } @misc{cryptoeprint:2016:589, author = {Jacob Alperin-Sheriff and Daniel Apon}, title = {Dimension-Preserving Reductions from LWE to LWR}, howpublished = {Cryptology ePrint Archive, Report 2016/589}, year = {2016}, url = {https://eprint.iacr.org/2016/589}, } @misc{cryptoeprint:2016:590, author = {Yang Xie; Ankur Srivastava}, title = {Mitigating SAT Attack on Logic Locking}, howpublished = {Cryptology ePrint Archive, Report 2016/590}, year = {2016}, url = {https://eprint.iacr.org/2016/590}, } @misc{cryptoeprint:2016:591, author = {Rishabh Poddar and Tobias Boelter and Raluca Ada Popa}, title = {Arx: A Strongly Encrypted Database System}, howpublished = {Cryptology ePrint Archive, Report 2016/591}, year = {2016}, url = {https://eprint.iacr.org/2016/591}, } @misc{cryptoeprint:2016:592, author = {Lorenzo Grassi and Christian Rechberger and Sondre Rønjom}, title = {Subspace Trail Cryptanalysis and its Applications to AES}, howpublished = {Cryptology ePrint Archive, Report 2016/592}, year = {2016}, url = {https://eprint.iacr.org/2016/592}, } @misc{cryptoeprint:2016:593, author = {Heiko Lohrke; Shahin Tajik; Christian Boit; Jean-Pierre Seifert}, title = {No Place to Hide: Contactless Probing of Secret Data on FPGAs}, howpublished = {Cryptology ePrint Archive, Report 2016/593}, year = {2016}, url = {https://eprint.iacr.org/2016/593}, } @misc{cryptoeprint:2016:594, author = {Cesar Pereida García and Billy Bob Brumley and Yuval Yarom}, title = {"Make Sure DSA Signing Exponentiations Really are Constant-Time''}, howpublished = {Cryptology ePrint Archive, Report 2016/594}, year = {2016}, url = {https://eprint.iacr.org/2016/594}, } @misc{cryptoeprint:2016:595, author = {Rei Ueno; Sumio Morioka; Naofumi Homma; Takafumi Aoki}, title = {A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths --- Toward Efficient CBC-Mode Implementation}, howpublished = {Cryptology ePrint Archive, Report 2016/595}, year = {2016}, url = {https://eprint.iacr.org/2016/595}, } @misc{cryptoeprint:2016:596, author = {Mehmet S. Inci; Berk Gulmezoglu; Gorka Irazoqui; Thomas Eisenbarth; Berk Sunar}, title = {Cache Attacks Enable Bulk Key Recovery on the Cloud}, howpublished = {Cryptology ePrint Archive, Report 2016/596}, year = {2016}, url = {https://eprint.iacr.org/2016/596}, } @misc{cryptoeprint:2016:597, author = {Margaux Dugardin; Sylvain Guilley; Jean-Luc Danger; Zakaria Najm; Olivier Rioul}, title = {Correlated Extra-Reductions Defeat Blinded Regular Exponentiation - Extended Version}, howpublished = {Cryptology ePrint Archive, Report 2016/597}, year = {2016}, url = {https://eprint.iacr.org/2016/597}, } @misc{cryptoeprint:2016:598, author = {Ryan Henry}, title = {Polynomial Batch Codes for Efficient IT-PIR}, howpublished = {Cryptology ePrint Archive, Report 2016/598}, year = {2016}, url = {https://eprint.iacr.org/2016/598}, } @misc{cryptoeprint:2016:599, author = {Nico D\"{o}ttling and Sanjam Garg and Divya Gupta and Peihan Miao and Pratyay Mukherjee}, title = {Obfuscation from Low Noise Multilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2016/599}, year = {2016}, url = {https://eprint.iacr.org/2016/599}, } @misc{cryptoeprint:2016:600, author = {Samaneh Ghandali; Georg T. Becker; Daniel Holcomb; Christof Paar}, title = {A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks}, howpublished = {Cryptology ePrint Archive, Report 2016/600}, year = {2016}, url = {https://eprint.iacr.org/2016/600}, } @misc{cryptoeprint:2016:601, author = {Shalabh Jain and Jorge Guajardo}, title = {Physical Layer Group Key Agreement for Automotive Controller Area Networks}, howpublished = {Cryptology ePrint Archive, Report 2016/601}, year = {2016}, url = {https://eprint.iacr.org/2016/601}, } @misc{cryptoeprint:2016:602, author = {Gilad Asharov and Yehuda Lindell and Thomas Schneider and Michael Zohner}, title = {More Efficient Oblivious Transfer Extensions}, howpublished = {Cryptology ePrint Archive, Report 2016/602}, year = {2016}, url = {https://eprint.iacr.org/2016/602}, } @misc{cryptoeprint:2016:603, author = {Thomaz Oliveira and Julio López and Francisco Rodríguez-Henríquez}, title = {Software implementation of Koblitz curves over quadratic fields}, howpublished = {Cryptology ePrint Archive, Report 2016/603}, year = {2016}, url = {https://eprint.iacr.org/2016/603}, } @misc{cryptoeprint:2016:604, author = {Amir S. Mortazavia and Mahmoud Salmasizadeh and Amir Daneshgar}, title = {FMNV Continuous Non-malleable Encoding Scheme is More Efficient Than Believed}, howpublished = {Cryptology ePrint Archive, Report 2016/604}, year = {2016}, url = {https://eprint.iacr.org/2016/604}, } @misc{cryptoeprint:2016:605, author = {Razvan Barbulescu and Pierrick Gaudry and Aurore Guillevic and François Morain}, title = {Improving NFS for the discrete logarithm problem in non-prime finite fields}, howpublished = {Cryptology ePrint Archive, Report 2016/605}, year = {2016}, url = {https://eprint.iacr.org/2016/605}, } @misc{cryptoeprint:2016:606, author = {Fatemeh Ganji and Shahin Tajik and Fabian Fäßler and Jean-Pierre Seifert}, title = {Strong Machine Learning Attack against PUFs with No Mathematical Model}, howpublished = {Cryptology ePrint Archive, Report 2016/606}, year = {2016}, url = {https://eprint.iacr.org/2016/606}, } @misc{cryptoeprint:2016:607, author = {Mehrad Jaberi and Hamid Mala}, title = {Protocols for Authenticated Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2016/607}, year = {2016}, url = {https://eprint.iacr.org/2016/607}, } @misc{cryptoeprint:2016:608, author = {Hoda Maleki, Reza Rahaeimehr, and Marten van Dijk}, title = {LightSource: Ultra Lightweight Clone Detection of RFID Tags from Software Unclonable Responses}, howpublished = {Cryptology ePrint Archive, Report 2016/608}, year = {2016}, url = {https://eprint.iacr.org/2016/608}, } @misc{cryptoeprint:2016:609, author = {Jake Longo and Daniel P. Martin and Luke Mather and Elisabeth Oswald and Benjamin Sach and Martijn Stam}, title = {How low can you go? Using side-channel data to enhance brute-force key recovery}, howpublished = {Cryptology ePrint Archive, Report 2016/609}, year = {2016}, url = {https://eprint.iacr.org/2016/609}, } @misc{cryptoeprint:2016:610, author = {Aloni Cohen and Saleet Klein}, title = {The GGM Function Family is Weakly One-Way}, howpublished = {Cryptology ePrint Archive, Report 2016/610}, year = {2016}, url = {https://eprint.iacr.org/2016/610}, } @misc{cryptoeprint:2016:611, author = {Robert Cunningham and Benjamin Fuller and Sophia Yakoubov}, title = {Catching MPC Cheaters: Identification and Openability}, howpublished = {Cryptology ePrint Archive, Report 2016/611}, year = {2016}, url = {https://eprint.iacr.org/2016/611}, } @misc{cryptoeprint:2016:612, author = {Kevin Lewi and David J. Wu}, title = {Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds}, howpublished = {Cryptology ePrint Archive, Report 2016/612}, year = {2016}, url = {https://eprint.iacr.org/2016/612}, } @misc{cryptoeprint:2016:613, author = {Qian Ge and Yuval Yarom and David Cock and Gernot Heiser}, title = {A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware}, howpublished = {Cryptology ePrint Archive, Report 2016/613}, year = {2016}, url = {https://eprint.iacr.org/2016/613}, } @misc{cryptoeprint:2016:614, author = {Ran Canetti and Oxana Poburinnaya and Muthuramakrishnan Venkitasubramaniam}, title = {Better Two-Round Adaptive Multi-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2016/614}, year = {2016}, url = {https://eprint.iacr.org/2016/614}, } @misc{cryptoeprint:2016:615, author = {Jeremias Mechler and Jörn Müller-Quade and Tobias Nilges}, title = {Universally Composable (Non-Interactive) Two-Party Computation from Untrusted Reusable Hardware Tokens}, howpublished = {Cryptology ePrint Archive, Report 2016/615}, year = {2016}, url = {https://eprint.iacr.org/2016/615}, } @misc{cryptoeprint:2016:616, author = {Christoph Dobraunig and Maria Eichlseder and Thomas Korak and Victor Lomné and Florian Mendel}, title = {Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2016/616}, year = {2016}, url = {https://eprint.iacr.org/2016/616}, } @misc{cryptoeprint:2016:617, author = {Yuzhe Tang}, title = {On the Impossibility of Merkle Merge Homomorphism}, howpublished = {Cryptology ePrint Archive, Report 2016/617}, year = {2016}, url = {https://eprint.iacr.org/2016/617}, } @misc{cryptoeprint:2016:618, author = {Sarani Bhattacharya; Debdeep Mukhopadhyay}, title = {Curious case of Rowhammer: Flipping Secret Exponent Bits using Timing Analysis}, howpublished = {Cryptology ePrint Archive, Report 2016/618}, year = {2016}, url = {https://eprint.iacr.org/2016/618}, } @misc{cryptoeprint:2016:619, author = {Kevin Lewi and Alex J. Malozemoff and Daniel Apon and Brent Carmer and Adam Foltzer and Daniel Wagner and David W. Archer and Dan Boneh and Jonathan Katz and Mariana Raykova}, title = {5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs}, howpublished = {Cryptology ePrint Archive, Report 2016/619}, year = {2016}, url = {https://eprint.iacr.org/2016/619}, } @misc{cryptoeprint:2016:620, author = {Ran Gilad-Bachrach and Kim Laine and Kristin Lauter and Peter Rindal and Mike Rosulek}, title = {Secure Data Exchange: A Marketplace in the Cloud}, howpublished = {Cryptology ePrint Archive, Report 2016/620}, year = {2016}, url = {https://eprint.iacr.org/2016/620}, } @misc{cryptoeprint:2016:621, author = {Michele Ciampi and Rafail Ostrovsky and Luisa Siniscalchi and Ivan Visconti}, title = {4-Round Concurrent Non-Malleable Commitments from One-Way Functions}, howpublished = {Cryptology ePrint Archive, Report 2016/621}, year = {2016}, url = {https://eprint.iacr.org/2016/621}, } @misc{cryptoeprint:2016:622, author = {Marc Joye and Alain Passelègue}, title = {Function-Revealing Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/622}, year = {2016}, url = {https://eprint.iacr.org/2016/622}, } @misc{cryptoeprint:2016:623, author = {Dhiman Saha; Dipanwita Roy Chowdhury}, title = {EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ}, howpublished = {Cryptology ePrint Archive, Report 2016/623}, year = {2016}, url = {https://eprint.iacr.org/2016/623}, } @misc{cryptoeprint:2016:624, author = {Baiyu Li and Daniele Micciancio}, title = {Equational Security Proofs of Oblivious Transfer Protocols}, howpublished = {Cryptology ePrint Archive, Report 2016/624}, year = {2016}, url = {https://eprint.iacr.org/2016/624}, } @misc{cryptoeprint:2016:625, author = {Kota Kondo and Yu Sasaki and Tetsu Iwata}, title = {On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants}, howpublished = {Cryptology ePrint Archive, Report 2016/625}, year = {2016}, url = {https://eprint.iacr.org/2016/625}, } @misc{cryptoeprint:2016:626, author = {Ekawat Homsirikamol and William Diehl and Ahmed Ferozpuri and Farnoud Farahmand and Panasayya Yalla and Jens-Peter Kaps and Kris Gaj}, title = {CAESAR Hardware API}, howpublished = {Cryptology ePrint Archive, Report 2016/626}, year = {2016}, url = {https://eprint.iacr.org/2016/626}, } @misc{cryptoeprint:2016:627, author = {Gideon Samid}, title = {Cyber Passport: Preventing Massive Identity Theft }, howpublished = {Cryptology ePrint Archive, Report 2016/627}, year = {2016}, url = {https://eprint.iacr.org/2016/627}, } @misc{cryptoeprint:2016:628, author = {Liliya R. Ahmetzyanova and Evgeny K. Alekseev and Igor B. Oshkin and Stanislav V. Smyshlyaev and Lolita A. Sonina}, title = {On the properties of the CTR encryption mode of the Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro Key Meshing}, howpublished = {Cryptology ePrint Archive, Report 2016/628}, year = {2016}, url = {https://eprint.iacr.org/2016/628}, } @misc{cryptoeprint:2016:629, author = {Saikrishna Badrinarayanan and Vipul Goyal and Aayush Jain and Amit Sahai}, title = {Verifiable Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/629}, year = {2016}, url = {https://eprint.iacr.org/2016/629}, } @misc{cryptoeprint:2016:630, author = {Ravikumar Selvam and Dillibabu Shanmugam and Suganya Annadurai and Jothi Rangasamy}, title = {Decomposed S-Boxes and DPA Attacks: A Quantitative Case Study using PRINCE}, howpublished = {Cryptology ePrint Archive, Report 2016/630}, year = {2016}, url = {https://eprint.iacr.org/2016/630}, } @misc{cryptoeprint:2016:631, author = {Thomas De Cnudde and Oscar Reparaz and Begül Bilgin and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {Masking AES with d+1 Shares in Hardware}, howpublished = {Cryptology ePrint Archive, Report 2016/631}, year = {2016}, url = {https://eprint.iacr.org/2016/631}, } @misc{cryptoeprint:2016:632, author = {Peter Rindal and Mike Rosulek}, title = {Faster Malicious 2-party Secure Computation with Online/Ofine Dual Execution}, howpublished = {Cryptology ePrint Archive, Report 2016/632}, year = {2016}, url = {https://eprint.iacr.org/2016/632}, } @misc{cryptoeprint:2016:633, author = {Loi Luu and Duc-Hiep Chu and Hrishi Olickel and Prateek Saxena and Aquinas Hobor}, title = {Making Smart Contracts Smarter}, howpublished = {Cryptology ePrint Archive, Report 2016/633}, year = {2016}, url = {https://eprint.iacr.org/2016/633}, } @misc{cryptoeprint:2016:634, author = {Weiran Liu and Jianwei Liu and Qianhong Wu and Bo Qin and David Naccache and Houda Ferradi}, title = {Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing}, howpublished = {Cryptology ePrint Archive, Report 2016/634}, year = {2016}, url = {https://eprint.iacr.org/2016/634}, } @misc{cryptoeprint:2016:635, author = {Florian Tramer and Fan Zhang and Huang Lin and Jean-Pierre Hubaux and Ari Juels and Elaine Shi}, title = {Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2016/635}, year = {2016}, url = {https://eprint.iacr.org/2016/635}, } @misc{cryptoeprint:2016:636, author = {Saikrishna Badrinarayanan and Dakshita Khurana and Rafail Ostrovsky and Ivan Visconti}, title = {Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs}, howpublished = {Cryptology ePrint Archive, Report 2016/636}, year = {2016}, url = {https://eprint.iacr.org/2016/636}, } @misc{cryptoeprint:2016:637, author = {Wenbin Zhang and Chik How Tan}, title = {On the Security and Key Generation of the ZHFE Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2016/637}, year = {2016}, url = {https://eprint.iacr.org/2016/637}, } @misc{cryptoeprint:2016:638, author = {Shoichi Hirose and Atsushi Yabumoto}, title = {A Tweak for a PRF Mode of a Compression Function and Its Applications}, howpublished = {Cryptology ePrint Archive, Report 2016/638}, year = {2016}, url = {https://eprint.iacr.org/2016/638}, } @misc{cryptoeprint:2016:639, author = {Qiang Tang and Balazs Pejo}, title = {Game-Theoretic Framework for Integrity Veri cation in Computation Outsourcing}, howpublished = {Cryptology ePrint Archive, Report 2016/639}, year = {2016}, url = {https://eprint.iacr.org/2016/639}, } @misc{cryptoeprint:2016:640, author = {Asli Bay and Oguzhan Ersoy and Ferhat Karakoç}, title = {Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2016/640}, year = {2016}, url = {https://eprint.iacr.org/2016/640}, } @misc{cryptoeprint:2016:641, author = {Pawel Swierczynski and Georg T. Becker and Amir Moradi and Christof Paar}, title = {Bitstream Fault Injections (BiFI) – Automated Fault Attacks against SRAM-based FPGAs}, howpublished = {Cryptology ePrint Archive, Report 2016/641}, year = {2016}, url = {https://eprint.iacr.org/2016/641}, } @misc{cryptoeprint:2016:642, author = {Pierre-Alain Fouque and Pierre Karpman and Paul Kirchner and Brice Minaud}, title = {Efficient and Provable White-Box Primitives}, howpublished = {Cryptology ePrint Archive, Report 2016/642}, year = {2016}, url = {https://eprint.iacr.org/2016/642}, } @misc{cryptoeprint:2016:643, author = {Jesper Buus Nielsen and Samuel Ranellucci}, title = {On the Computational Overhead of MPC with Dishonest Majority}, howpublished = {Cryptology ePrint Archive, Report 2016/643}, year = {2016}, url = {https://eprint.iacr.org/2016/643}, } @misc{cryptoeprint:2016:644, author = {David Wong}, title = {How to Backdoor Diffie-Hellman}, howpublished = {Cryptology ePrint Archive, Report 2016/644}, year = {2016}, url = {https://eprint.iacr.org/2016/644}, } @misc{cryptoeprint:2016:645, author = {Patrick Longa}, title = {FourQNEON: Faster Elliptic Curve Scalar Multiplications on ARM Processors}, howpublished = {Cryptology ePrint Archive, Report 2016/645}, year = {2016}, url = {https://eprint.iacr.org/2016/645}, } @misc{cryptoeprint:2016:646, author = {Eli Ben-Sasson and Iddo Ben-Tov and Alessandro Chiesa and Ariel Gabizon and Daniel Genkin and Matan Hamilis and Evgenya Pergament and Michael Riabzev and Mark Silberstein and Eran Tromer and Madars Virza}, title = {Computational integrity with a public random string from quasi-linear PCPs}, howpublished = {Cryptology ePrint Archive, Report 2016/646}, year = {2016}, url = {https://eprint.iacr.org/2016/646}, } @misc{cryptoeprint:2016:647, author = {Erik Boss and Vincent Grosso and Tim Güneysu and Gregor Leander and Amir Moradi and Tobias Schneider}, title = {Strong 8-bit Sboxes with Efficient Masking in Hardware}, howpublished = {Cryptology ePrint Archive, Report 2016/647}, year = {2016}, url = {https://eprint.iacr.org/2016/647}, } @misc{cryptoeprint:2016:648, author = {Tobias Schneider and Amir Moradi and Tim Güneysu}, title = {ParTI -- Towards Combined Hardware Countermeasures against Side-Channel and Fault-Injection Attacks}, howpublished = {Cryptology ePrint Archive, Report 2016/648}, year = {2016}, url = {https://eprint.iacr.org/2016/648}, } @misc{cryptoeprint:2016:649, author = {Behzad Abdolmaleki and Karim Baghery and Shahram Khazaei and Mohammad Reza Aref}, title = {Game-Based Privacy Analysis of RFID Security Schemes for Confident Authentication in IoT}, howpublished = {Cryptology ePrint Archive, Report 2016/649}, year = {2016}, url = {https://eprint.iacr.org/2016/649}, } @misc{cryptoeprint:2016:650, author = {Peeter Laud and Alisa Pankova}, title = {Securing Multiparty Protocols against the Exposure of Data to Honest Parties}, howpublished = {Cryptology ePrint Archive, Report 2016/650}, year = {2016}, url = {https://eprint.iacr.org/2016/650}, } @misc{cryptoeprint:2016:651, author = {Christof Beierle}, title = {Pen and Paper Arguments for SIMON and SIMON-like Designs}, howpublished = {Cryptology ePrint Archive, Report 2016/651}, year = {2016}, url = {https://eprint.iacr.org/2016/651}, } @misc{cryptoeprint:2016:652, author = {Arnaud BANNIER and Nicolas BODIN and Eric FILIOL}, title = {Automatic Search for a Maximum Probability Differential Characteristic in a Substitution-Permutation Network}, howpublished = {Cryptology ePrint Archive, Report 2016/652}, year = {2016}, url = {https://eprint.iacr.org/2016/652}, } @misc{cryptoeprint:2016:653, author = {Masahiro Yagisawa}, title = {Fully Homomorphic Encryption with Zero Norm Cipher Text}, howpublished = {Cryptology ePrint Archive, Report 2016/653}, year = {2016}, url = {https://eprint.iacr.org/2016/653}, } @misc{cryptoeprint:2016:654, author = {Shweta Agrawal}, title = {Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks}, howpublished = {Cryptology ePrint Archive, Report 2016/654}, year = {2016}, url = {https://eprint.iacr.org/2016/654}, } @misc{cryptoeprint:2016:655, author = {Jongkil Kim and Willy Susilo and Fuchun Guo and Man Ho Au}, title = {A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups}, howpublished = {Cryptology ePrint Archive, Report 2016/655}, year = {2016}, url = {https://eprint.iacr.org/2016/655}, } @misc{cryptoeprint:2016:656, author = {Eiichiro Fujisaki}, title = {Improving Practical UC-Secure Commitments based on the DDH Assumption}, howpublished = {Cryptology ePrint Archive, Report 2016/656}, year = {2016}, url = {https://eprint.iacr.org/2016/656}, } @misc{cryptoeprint:2016:657, author = {Tatiana Bradley and Sky Faber and Gene Tsudik}, title = {Bounded Size-Hiding Private Set Intersection}, howpublished = {Cryptology ePrint Archive, Report 2016/657}, year = {2016}, url = {https://eprint.iacr.org/2016/657}, } @misc{cryptoeprint:2016:658, author = {Kevin Atighehchi and Alexis Bonnecaze}, title = {Asymptotic Analysis of Plausible Tree Hash Modes for SHA-3}, howpublished = {Cryptology ePrint Archive, Report 2016/658}, year = {2016}, url = {https://eprint.iacr.org/2016/658}, } @misc{cryptoeprint:2016:659, author = {Joppe Bos and Craig Costello and L\'eo Ducas and Ilya Mironov and Michael Naehrig and Valeria Nikolaenko and Ananth Raghunathan and Douglas Stebila}, title = {Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE}, howpublished = {Cryptology ePrint Archive, Report 2016/659}, year = {2016}, url = {https://eprint.iacr.org/2016/659}, } @misc{cryptoeprint:2016:660, author = {Christof Beierle and Jérémy Jean and Stefan Kölbl and Gregor Leander and Amir Moradi and Thomas Peyrin and Yu Sasaki and Pascal Sasdrich and Siang Meng Sim}, title = {The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS}, howpublished = {Cryptology ePrint Archive, Report 2016/660}, year = {2016}, url = {https://eprint.iacr.org/2016/660}, } @misc{cryptoeprint:2016:661, author = {David Cash and Feng-Hao Liu and Adam O'Neill and Cong Zhang}, title = {Reducing the Leakage in Practical Order-Revealing Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/661}, year = {2016}, url = {https://eprint.iacr.org/2016/661}, } @misc{cryptoeprint:2016:662, author = {Georg Fuchsbauer and Christian Hanser and Chethan Kamath and Daniel Slamanig}, title = {Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2016/662}, year = {2016}, url = {https://eprint.iacr.org/2016/662}, } @misc{cryptoeprint:2016:663, author = {Jan Camenisch and Manu Drijvers and Anja Lehmann}, title = {Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited}, howpublished = {Cryptology ePrint Archive, Report 2016/663}, year = {2016}, url = {https://eprint.iacr.org/2016/663}, } @misc{cryptoeprint:2016:664, author = {Yoo-Seung Won and Dong-Guk Han}, title = {Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices}, howpublished = {Cryptology ePrint Archive, Report 2016/664}, year = {2016}, url = {https://eprint.iacr.org/2016/664}, } @misc{cryptoeprint:2016:665, author = {Mikkel Lambæk}, title = {Breaking and Fixing Private Set Intersection Protocols}, howpublished = {Cryptology ePrint Archive, Report 2016/665}, year = {2016}, url = {https://eprint.iacr.org/2016/665}, } @misc{cryptoeprint:2016:666, author = {WeiGuo Zhang and LuYang Li and Enes Pasalic}, title = {Construction of resilient S-boxes with higher-dimensional vectorial outputs and strictly almost optimal nonlinearity}, howpublished = {Cryptology ePrint Archive, Report 2016/666}, year = {2016}, url = {https://eprint.iacr.org/2016/666}, } @misc{cryptoeprint:2016:667, author = {Andrey Bogdanov and Elmar Tischhauser and Philip S. Vejre}, title = {Multivariate Profiling of Hulls for Linear Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2016/667}, year = {2016}, url = {https://eprint.iacr.org/2016/667}, } @misc{cryptoeprint:2016:668, author = {Wei Yuan}, title = {Analysis of a Secure and Verifiable Policy Update Outsourcing Scheme for Big Data Access Control in the Cloud}, howpublished = {Cryptology ePrint Archive, Report 2016/668}, year = {2016}, url = {https://eprint.iacr.org/2016/668}, } @misc{cryptoeprint:2016:669, author = {Brian Koziel, Amir Jalali, Reza Azarderakhsh, Mehran Mozaffari Kermani and David Jao}, title = {NEON-SIDH: Efficient Implementation of Supersingular Isogeny Diffie-Hellman Key-Exchange Protocol on ARM}, howpublished = {Cryptology ePrint Archive, Report 2016/669}, year = {2016}, url = {https://eprint.iacr.org/2016/669}, } @misc{cryptoeprint:2016:670, author = {Siamak F. Shahandashti and Feng Hao}, title = {DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities}, howpublished = {Cryptology ePrint Archive, Report 2016/670}, year = {2016}, url = {https://eprint.iacr.org/2016/670}, } @misc{cryptoeprint:2016:671, author = {Yongzhuang Wei and Enes Pasalic and Fengrong Zhang and Samir Hod\v zi\'c}, title = {Efficient probabilistic algorithm for estimating the algebraic properties of Boolean functions for large $n$}, howpublished = {Cryptology ePrint Archive, Report 2016/671}, year = {2016}, url = {https://eprint.iacr.org/2016/671}, } @misc{cryptoeprint:2016:672, author = {Brian Koziel, Reza Azarderakhsh, Mehran Mozaffari Kermani, David Jao}, title = {Post-Quantum Cryptography on FPGA Based on Isogenies on Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2016/672}, year = {2016}, url = {https://eprint.iacr.org/2016/672}, } @misc{cryptoeprint:2016:673, author = {Abderrahmane Nitaj and Willy Susilo and Joseph Tonien}, title = {Dirichlet Product for Boolean Functions}, howpublished = {Cryptology ePrint Archive, Report 2016/673}, year = {2016}, url = {https://eprint.iacr.org/2016/673}, } @misc{cryptoeprint:2016:674, author = {URBI CHATTERJEE, RAJAT SUBHRA CHAKRABORTY and DEBDEEP MUKHOPADHYAY}, title = {A PUF-based Secure Communication Protocol for IoT}, howpublished = {Cryptology ePrint Archive, Report 2016/674}, year = {2016}, url = {https://eprint.iacr.org/2016/674}, } @misc{cryptoeprint:2016:675, author = {Angela Jäschke and Frederik Armknecht}, title = {Accelerating Homomorphic Computations on Rational Numbers}, howpublished = {Cryptology ePrint Archive, Report 2016/675}, year = {2016}, url = {https://eprint.iacr.org/2016/675}, } @misc{cryptoeprint:2016:676, author = {Xiaoyang Dong and Yanzhao Shen}, title = {Cryptanalysis of Reduced-Round Midori64 Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2016/676}, year = {2016}, url = {https://eprint.iacr.org/2016/676}, } @misc{cryptoeprint:2016:677, author = {Mohamed Sabt and Jacques Traor\'{e}}, title = {Breaking Into the KeyStore: A Practical Forgery Attack Against Android KeyStore}, howpublished = {Cryptology ePrint Archive, Report 2016/677}, year = {2016}, url = {https://eprint.iacr.org/2016/677}, } @misc{cryptoeprint:2016:678, author = {Michael Backes and Amir Herzberg and Aniket Kate and Ivan Pryvalov}, title = {Anonymous RAM}, howpublished = {Cryptology ePrint Archive, Report 2016/678}, year = {2016}, url = {https://eprint.iacr.org/2016/678}, } @misc{cryptoeprint:2016:679, author = {Jihoon Cho and Kyu Young Choi and Orr Dunkelman and Nathan Keller and Dukjae Moon and Aviya Vaidberg}, title = {Hybrid WBC: Secure and Efficient White-Box Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2016/679}, year = {2016}, url = {https://eprint.iacr.org/2016/679}, } @misc{cryptoeprint:2016:680, author = {Colin Boyd and Christopher Carr}, title = {Fair Client Puzzles from the Bitcoin Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2016/680}, year = {2016}, url = {https://eprint.iacr.org/2016/680}, } @misc{cryptoeprint:2016:681, author = {Ronald Cramer, Ivan Damgard, Chaoping Xing, Chen Yuan}, title = {Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness Slack}, howpublished = {Cryptology ePrint Archive, Report 2016/681}, year = {2016}, url = {https://eprint.iacr.org/2016/681}, } @misc{cryptoeprint:2016:682, author = {Steven D. Galbraith, Joel Laity and Barak Shani}, title = {Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations}, howpublished = {Cryptology ePrint Archive, Report 2016/682}, year = {2016}, url = {https://eprint.iacr.org/2016/682}, } @misc{cryptoeprint:2016:683, author = {Rasmus Dahlberg and Tobias Pulls and Roel Peeters}, title = {Efficient Sparse Merkle Trees: Caching Strategies and Secure (Non-)Membership Proofs}, howpublished = {Cryptology ePrint Archive, Report 2016/683}, year = {2016}, url = {https://eprint.iacr.org/2016/683}, } @misc{cryptoeprint:2016:684, author = {Aurore Guillevic}, title = {Faster individual discrete logarithms with the QPA and NFS variants}, howpublished = {Cryptology ePrint Archive, Report 2016/684}, year = {2016}, url = {https://eprint.iacr.org/2016/684}, } @misc{cryptoeprint:2016:685, author = {W. Sean Kennedy and Vladimir Kolesnikov and Gordon Wilfong}, title = {Overlaying Circuit Clauses for Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2016/685}, year = {2016}, url = {https://eprint.iacr.org/2016/685}, } @misc{cryptoeprint:2016:686, author = {Ting Li and Jian Bai and Yao sun and Dingkang Wang and Dongdai Lin}, title = {The Lightest 4x4 MDS Matrices over GL(4, $\mathbb{F}_2$)}, howpublished = {Cryptology ePrint Archive, Report 2016/686}, year = {2016}, url = {https://eprint.iacr.org/2016/686}, } @misc{cryptoeprint:2016:687, author = {Martin Albrecht and Christian Rechberger and Thomas Schneider and Tyge Tiessen and Michael Zohner}, title = {Ciphers for MPC and FHE}, howpublished = {Cryptology ePrint Archive, Report 2016/687}, year = {2016}, url = {https://eprint.iacr.org/2016/687}, } @misc{cryptoeprint:2016:688, author = {Antonio Marcedone and Rafael Pass and abhi shelat}, title = {Bounded KDM Security from iO and OWF}, howpublished = {Cryptology ePrint Archive, Report 2016/688}, year = {2016}, url = {https://eprint.iacr.org/2016/688}, } @misc{cryptoeprint:2016:689, author = {Tingting Cui and Keting Jia and Kai Fu and Shiyao Chen and Meiqin Wang}, title = {New Automatic Search Tool for Impossible Differentials and Zero-Correlation Linear Approximations}, howpublished = {Cryptology ePrint Archive, Report 2016/689}, year = {2016}, url = {https://eprint.iacr.org/2016/689}, } @misc{cryptoeprint:2016:690, author = {Myrto Arapinis and Véronique Cortier and Steve Kremer}, title = {When Are Three Voters Enough for Privacy Properties?}, howpublished = {Cryptology ePrint Archive, Report 2016/690}, year = {2016}, url = {https://eprint.iacr.org/2016/690}, } @misc{cryptoeprint:2016:691, author = {Zvika Brakerski and David Cash and Rotem Tsabary and Hoeteck Wee}, title = {Targeted Homomorphic Attribute Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/691}, year = {2016}, url = {https://eprint.iacr.org/2016/691}, } @misc{cryptoeprint:2016:692, author = {Jiguo Li, Hong Yuan and Yichen Zhang}, title = {Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks}, howpublished = {Cryptology ePrint Archive, Report 2016/692}, year = {2016}, url = {https://eprint.iacr.org/2016/692}, } @misc{cryptoeprint:2016:693, author = {Sikhar Patranabis and Debdeep Mukhopadhyay}, title = {Identity-Based Key Aggregate Cryptosystem from Multilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2016/693}, year = {2016}, url = {https://eprint.iacr.org/2016/693}, } @misc{cryptoeprint:2016:694, author = {Yin Li and Xingpo Ma and Yu Zhang and Chuanda Qi}, title = {Mastrovito Form of Non-recursive Karatsuba Multiplier for All Trinomials}, howpublished = {Cryptology ePrint Archive, Report 2016/694}, year = {2016}, url = {https://eprint.iacr.org/2016/694}, } @misc{cryptoeprint:2016:695, author = {Ivan Damgård and Jesper Buus Nielsen and Michael Nielsen and Samuel Ranellucci}, title = {Gate-scrambling Revisited - or: The TinyTable protocol for 2-Party Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2016/695}, year = {2016}, url = {https://eprint.iacr.org/2016/695}, } @misc{cryptoeprint:2016:696, author = {Süleyman Kardaş and Mehmet Sabır Kiraz}, title = {Solving the Secure Storage Dilemma: An Efficient Scheme for Secure Deduplication with Privacy-Preserving Public Auditing}, howpublished = {Cryptology ePrint Archive, Report 2016/696}, year = {2016}, url = {https://eprint.iacr.org/2016/696}, } @misc{cryptoeprint:2016:697, author = {Damian Viz\'{a}r}, title = {Ciphertext Forgery on HANUMAN}, howpublished = {Cryptology ePrint Archive, Report 2016/697}, year = {2016}, url = {https://eprint.iacr.org/2016/697}, } @misc{cryptoeprint:2016:698, author = {Zhengjun Cao and Lihua Liu}, title = {A Note on One Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud}, howpublished = {Cryptology ePrint Archive, Report 2016/698}, year = {2016}, url = {https://eprint.iacr.org/2016/698}, } @misc{cryptoeprint:2016:699, author = {Zhengjun Cao and Lihua Liu}, title = {A Note on One Privacy-Preserving Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data}, howpublished = {Cryptology ePrint Archive, Report 2016/699}, year = {2016}, url = {https://eprint.iacr.org/2016/699}, } @misc{cryptoeprint:2016:700, author = {Sami Saab, Pankaj Rohatgi, and Craig Hampel}, title = {Side-Channel Protections for Cryptographic Instruction Set Extensions}, howpublished = {Cryptology ePrint Archive, Report 2016/700}, year = {2016}, url = {https://eprint.iacr.org/2016/700}, } @misc{cryptoeprint:2016:701, author = {Matthew Green and Ian Miers}, title = {Bolt: Anonymous Payment Channels for Decentralized Currencies}, howpublished = {Cryptology ePrint Archive, Report 2016/701}, year = {2016}, url = {https://eprint.iacr.org/2016/701}, } @misc{cryptoeprint:2016:702, author = {Jacques Patarin}, title = {Mirror Theory and Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2016/702}, year = {2016}, url = {https://eprint.iacr.org/2016/702}, } @misc{cryptoeprint:2016:703, author = {Sebastian R. Verschoor and Tanja Lange}, title = {(In-)Secure messaging with the Silent Circle instant messaging protocol}, howpublished = {Cryptology ePrint Archive, Report 2016/703}, year = {2016}, url = {https://eprint.iacr.org/2016/703}, } @misc{cryptoeprint:2016:704, author = {Nicolas T. Courtois}, title = {High Saturation Complete Graph Approach for EC Point Decomposition and ECDL Problem}, howpublished = {Cryptology ePrint Archive, Report 2016/704}, year = {2016}, url = {https://eprint.iacr.org/2016/704}, } @misc{cryptoeprint:2016:705, author = {Shiyi ZHANG and Yongjuan WANG and Guangpu GAO}, title = {New construction of single cycle T-function families}, howpublished = {Cryptology ePrint Archive, Report 2016/705}, year = {2016}, url = {https://eprint.iacr.org/2016/705}, } @misc{cryptoeprint:2016:706, author = {Jan Camenisch, Robert R. Enderlein, and Ueli Maurer}, title = {Memory Erasability Amplification}, howpublished = {Cryptology ePrint Archive, Report 2016/706}, year = {2016}, url = {https://eprint.iacr.org/2016/706}, } @misc{cryptoeprint:2016:707, author = {Dana Dachman-Soled and Angela Park and Ben San Nicolas}, title = {Towards a Characterization of the Related-Key Attack Security of the Iterated Even-Mansour Cipher}, howpublished = {Cryptology ePrint Archive, Report 2016/707}, year = {2016}, url = {https://eprint.iacr.org/2016/707}, } @misc{cryptoeprint:2016:708, author = {Ming-Shing Chen and Andreas Hülsing and Joost Rijneveld and Simona Samardjiska and Peter Schwabe}, title = {From 5-pass MQ-based identification to MQ-based signatures}, howpublished = {Cryptology ePrint Archive, Report 2016/708}, year = {2016}, url = {https://eprint.iacr.org/2016/708}, } @misc{cryptoeprint:2016:709, author = {Pei Luo and Yunsi Fei and Liwei Zhang and A. Adam Ding}, title = {Differential Fault Analysis of SHA3-224 and SHA3-256}, howpublished = {Cryptology ePrint Archive, Report 2016/709}, year = {2016}, url = {https://eprint.iacr.org/2016/709}, } @misc{cryptoeprint:2016:710, author = {Mostafa Taha, Arash Reyhani-Masoleh and Patrick Schaumont}, title = {Keymill: Side-Channel Resilient Key Generator}, howpublished = {Cryptology ePrint Archive, Report 2016/710}, year = {2016}, url = {https://eprint.iacr.org/2016/710}, } @misc{cryptoeprint:2016:711, author = {Hugo Krawczyk}, title = {A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3)}, howpublished = {Cryptology ePrint Archive, Report 2016/711}, year = {2016}, url = {https://eprint.iacr.org/2016/711}, } @misc{cryptoeprint:2016:712, author = {Basel Halak and Said Subhan Waizi and Asad Islam}, title = {A Survey of Hardware Implementations of Elliptic Curve Cryptographic Systems}, howpublished = {Cryptology ePrint Archive, Report 2016/712}, year = {2016}, url = {https://eprint.iacr.org/2016/712}, } @misc{cryptoeprint:2016:713, author = {Shi Bai and Thijs Laarhoven and Damien Stehle}, title = {Tuple lattice sieving}, howpublished = {Cryptology ePrint Archive, Report 2016/713}, year = {2016}, url = {https://eprint.iacr.org/2016/713}, } @misc{cryptoeprint:2016:714, author = {Peter Schwabe and Ko Stoffelen}, title = {All the AES You Need on Cortex-M3 and M4}, howpublished = {Cryptology ePrint Archive, Report 2016/714}, year = {2016}, url = {https://eprint.iacr.org/2016/714}, } @misc{cryptoeprint:2016:715, author = {Tim Beyne and Begül Bilgin}, title = {Uniform First-Order Threshold Implementations}, howpublished = {Cryptology ePrint Archive, Report 2016/715}, year = {2016}, url = {https://eprint.iacr.org/2016/715}, } @misc{cryptoeprint:2016:716, author = {Tuyet Duong and Lei Fan and Hong-Sheng Zhou}, title = {2-hop Blockchain: Combining Proof-of-Work and Proof-of-Stake Securely}, howpublished = {Cryptology ePrint Archive, Report 2016/716}, year = {2016}, url = {https://eprint.iacr.org/2016/716}, } @misc{cryptoeprint:2016:717, author = {Paul Kirchner and Pierre-Alain Fouque}, title = {Comparison between Subfield and Straightforward Attacks on NTRU}, howpublished = {Cryptology ePrint Archive, Report 2016/717}, year = {2016}, url = {https://eprint.iacr.org/2016/717}, } @misc{cryptoeprint:2016:718, author = {David Cash and Paul Grubbs and Jason Perry and Thomas Ristenpart}, title = {Leakage-Abuse Attacks Against Searchable Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/718}, year = {2016}, url = {https://eprint.iacr.org/2016/718}, } @misc{cryptoeprint:2016:719, author = {Tobias Schneider and Amir Moradi and François-Xavier Standaert and Tim Güneysu}, title = {Bridging the Gap: Advanced Tools for Side-Channel Leakage Estimation beyond Gaussian Templates and Histograms}, howpublished = {Cryptology ePrint Archive, Report 2016/719}, year = {2016}, url = {https://eprint.iacr.org/2016/719}, } @misc{cryptoeprint:2016:720, author = {Seung Geol Choi and Dana Dachman-Soled and Tal Malkin and Hoeteck Wee}, title = {A Black-Box Construction of Non-Malleable Encryption from Semantically Secure Encryption }, howpublished = {Cryptology ePrint Archive, Report 2016/720}, year = {2016}, url = {https://eprint.iacr.org/2016/720}, } @misc{cryptoeprint:2016:721, author = {Lucas Kowalczyk and Tal Malkin and Jonathan Ullman and Mark Zhandry}, title = {Strong Hardness of Privacy from Weak Traitor Tracing}, howpublished = {Cryptology ePrint Archive, Report 2016/721}, year = {2016}, url = {https://eprint.iacr.org/2016/721}, } @misc{cryptoeprint:2016:722, author = {Li Lin and Wenling Wu}, title = {Improved Meet-in-the-Middle Attacks on Reduced-Round Kalyna-128/256 and Kalyna-256/512}, howpublished = {Cryptology ePrint Archive, Report 2016/722}, year = {2016}, url = {https://eprint.iacr.org/2016/722}, } @misc{cryptoeprint:2016:723, author = {Marc Fischlin and Anja Lehmann and Krzysztof Pietrzak}, title = {Robust Multi-Property Combiners for Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2016/723}, year = {2016}, url = {https://eprint.iacr.org/2016/723}, } @misc{cryptoeprint:2016:724, author = {Frederik Armknecht and Jens-Matthias Bohli and David Froelicher and Ghassan O. Karame}, title = {SPORT: Sharing Proofs of Retrievability across Tenants}, howpublished = {Cryptology ePrint Archive, Report 2016/724}, year = {2016}, url = {https://eprint.iacr.org/2016/724}, } @misc{cryptoeprint:2016:725, author = {Mustafa Khairallah and Maged Ghoneima}, title = {Tile-Based Modular Architecture for Accelerating Homomorphic Function Evaluation on FPGA}, howpublished = {Cryptology ePrint Archive, Report 2016/725}, year = {2016}, url = {https://eprint.iacr.org/2016/725}, } @misc{cryptoeprint:2016:726, author = {Oriol Farràs and Jordi Ribes-González and Sara Ricci}, title = {Local Bounds for the Optimal Information Ratio of Secret Sharing Schemes}, howpublished = {Cryptology ePrint Archive, Report 2016/726}, year = {2016}, url = {https://eprint.iacr.org/2016/726}, } @misc{cryptoeprint:2016:727, author = {Yuqing Zhu and Jincheng Zhuang and Chang Lv and Dongdai Lin}, title = {Improvements on the Individual Logarithm Step in Extended Tower Number Field Sieve}, howpublished = {Cryptology ePrint Archive, Report 2016/727}, year = {2016}, url = {https://eprint.iacr.org/2016/727}, } @misc{cryptoeprint:2016:728, author = {Raphael Bost}, title = {Sophos - Forward Secure Searchable Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/728}, year = {2016}, url = {https://eprint.iacr.org/2016/728}, } @misc{cryptoeprint:2016:729, author = {Herman Galteland and Stig F. Mjølsnes and Ruxandra F. Olimid}, title = {Attacks on cMix - Some Small Overlooked Details}, howpublished = {Cryptology ePrint Archive, Report 2016/729}, year = {2016}, url = {https://eprint.iacr.org/2016/729}, } @misc{cryptoeprint:2016:730, author = {Dana Dachman-Soled and S. Dov Gordon and Feng-Hao Liu and Adam O’Neill and Hong-Sheng Zhou}, title = {Leakage-Resilient Public-Key Encryption from Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2016/730}, year = {2016}, url = {https://eprint.iacr.org/2016/730}, } @misc{cryptoeprint:2016:731, author = {Mohammad Mardani Shahrbabak and Shahab Abdolmaleky}, title = {SRMAP and ISLAP Authentication Protocols: Attacks and Improvements}, howpublished = {Cryptology ePrint Archive, Report 2016/731}, year = {2016}, url = {https://eprint.iacr.org/2016/731}, } @misc{cryptoeprint:2016:732, author = {Yosuke Todo and Gregor Leander and Yu Sasaki}, title = {Nonlinear Invariant Attack --Practical Attack on Full SCREAM, iSCREAM, and Midori64}, howpublished = {Cryptology ePrint Archive, Report 2016/732}, year = {2016}, url = {https://eprint.iacr.org/2016/732}, } @misc{cryptoeprint:2016:733, author = {Thomas Wunderer}, title = {Revisiting the Hybrid Attack: Improved Analysis and Refined Security Estimates}, howpublished = {Cryptology ePrint Archive, Report 2016/733}, year = {2016}, url = {https://eprint.iacr.org/2016/733}, } @misc{cryptoeprint:2016:734, author = {Aram Jivanyan and Gurgen Khachatryan and Andriy Oliynyk and Mykola Raievskyi}, title = {Efficient Oblivious Transfer Protocols based on White-Box Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2016/734}, year = {2016}, url = {https://eprint.iacr.org/2016/734}, } @misc{cryptoeprint:2016:735, author = {Brett Hemenway and Rafail Ostrovsky}, title = {Efficient Robust Secret Sharing from Expander Graphs}, howpublished = {Cryptology ePrint Archive, Report 2016/735}, year = {2016}, url = {https://eprint.iacr.org/2016/735}, } @misc{cryptoeprint:2016:736, author = {Martine De Cock and Rafael Dowsley and Caleb Horst and Raj Katti and Anderson C. A. Nascimento and Stacey C. Newman and Wing-Sea Poon}, title = {Efficient and Private Scoring of Decision Trees, Support Vector Machines and Logistic Regression Models based on Pre-Computation}, howpublished = {Cryptology ePrint Archive, Report 2016/736}, year = {2016}, url = {https://eprint.iacr.org/2016/736}, } @misc{cryptoeprint:2016:737, author = {Edgar González and Guillermo Morales-Luna and Feliú D. Sagols}, title = {Zero Knowledge Authentication Protocols With Algebraic Geometry Techniques}, howpublished = {Cryptology ePrint Archive, Report 2016/737}, year = {2016}, url = {https://eprint.iacr.org/2016/737}, } @misc{cryptoeprint:2016:738, author = {Masahiro Yagisawa}, title = {FHPKE with Zero Norm Noises based on DLA&CDH}, howpublished = {Cryptology ePrint Archive, Report 2016/738}, year = {2016}, url = {https://eprint.iacr.org/2016/738}, } @misc{cryptoeprint:2016:739, author = {Ryan Amiri and Aysajan Abidin and Petros Wallden and Erika Andersson}, title = {Unconditionally Secure Signatures}, howpublished = {Cryptology ePrint Archive, Report 2016/739}, year = {2016}, url = {https://eprint.iacr.org/2016/739}, } @misc{cryptoeprint:2016:740, author = {Ankele, Ralph and Ankele, Robin}, title = {Software Benchmarking of the 2$^{\text{nd}}$ round CAESAR Candidates}, howpublished = {Cryptology ePrint Archive, Report 2016/740}, year = {2016}, url = {https://eprint.iacr.org/2016/740}, } @misc{cryptoeprint:2016:741, author = {Hoda Maleki and Saeed Valizadeh and William Koch and Azer Bestavros and Marten van Dijk}, title = {MARKOV MODELING OF MOVING TARGET DEFENSE GAMES}, howpublished = {Cryptology ePrint Archive, Report 2016/741}, year = {2016}, url = {https://eprint.iacr.org/2016/741}, } @misc{cryptoeprint:2016:742, author = {Johannes Braun and Johannes Buchmann and Denise Demirel and Mikio Fujiwara and Matthias Geihs and Shiho Moriai and Masahide Sasaki and Atsushi Waseda}, title = {LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper)}, howpublished = {Cryptology ePrint Archive, Report 2016/742}, year = {2016}, url = {https://eprint.iacr.org/2016/742}, } @misc{cryptoeprint:2016:743, author = {Md Iftekhar Salam and Harry Bartlett and Ed Dawson and Josef Pieprzyk and Leonie Simpson and Kenneth Koon-Ho Wong}, title = {Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN}, howpublished = {Cryptology ePrint Archive, Report 2016/743}, year = {2016}, url = {https://eprint.iacr.org/2016/743}, } @misc{cryptoeprint:2016:744, author = {Xi Chen, Longjiang Qu, Chao Li and Jiao Du}, title = {A New Method to Investigate the CCZ-Equivalence between Functions with Low Differential Uniformity}, howpublished = {Cryptology ePrint Archive, Report 2016/744}, year = {2016}, url = {https://eprint.iacr.org/2016/744}, } @misc{cryptoeprint:2016:745, author = {Solenn Brunet and Sébastien Canard and Sébastien Gambs and Baptiste Olivier}, title = {Novel differentially private mechanisms for graphs}, howpublished = {Cryptology ePrint Archive, Report 2016/745}, year = {2016}, url = {https://eprint.iacr.org/2016/745}, } @misc{cryptoeprint:2016:746, author = {Peter Rindal and Mike Rosulek}, title = {Improved Private Set Intersection against Malicious Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2016/746}, year = {2016}, url = {https://eprint.iacr.org/2016/746}, } @misc{cryptoeprint:2016:747, author = {Pasquale Forte and Diego Romano and Giovanni Schmid}, title = {Beyond Bitcoin -- Part II: Blockchain-based systems without mining}, howpublished = {Cryptology ePrint Archive, Report 2016/747}, year = {2016}, url = {https://eprint.iacr.org/2016/747}, } @misc{cryptoeprint:2016:748, author = {Mohammad Etemad and Alptekin Küpçü}, title = {A Generic Dynamic Provable Data Possession Framework}, howpublished = {Cryptology ePrint Archive, Report 2016/748}, year = {2016}, url = {https://eprint.iacr.org/2016/748}, } @misc{cryptoeprint:2016:749, author = {Kwangsu Lee}, title = {Revocable Hierarchical Identity-Based Encryption with Adaptive Security}, howpublished = {Cryptology ePrint Archive, Report 2016/749}, year = {2016}, url = {https://eprint.iacr.org/2016/749}, } @misc{cryptoeprint:2016:750, author = {Simon Cogliani and Bao Feng and Houda Ferradi and R\'emi G\'eraud and Diana Maimut and David Naccache and Rodrigo Portella do Canto and Guilin Wang}, title = {Public-Key Based Lightweight Swarm Authentication}, howpublished = {Cryptology ePrint Archive, Report 2016/750}, year = {2016}, url = {https://eprint.iacr.org/2016/750}, } @misc{cryptoeprint:2016:751, author = {Adnan Baysal and Mustafa Çoban and Mehmet Özen}, title = {Feistel Like Construction of Involutory Binary Matrices With High Branch Number}, howpublished = {Cryptology ePrint Archive, Report 2016/751}, year = {2016}, url = {https://eprint.iacr.org/2016/751}, } @misc{cryptoeprint:2016:752, author = {Adnan Baysal and Ünal Kocabaş}, title = {ELiF : An Extremely Lightweight & Flexible Block Cipher Family and Its Experimental Security}, howpublished = {Cryptology ePrint Archive, Report 2016/752}, year = {2016}, url = {https://eprint.iacr.org/2016/752}, } @misc{cryptoeprint:2016:753, author = {Shi Bai and Damien Stehle and Weiqiang Wen}, title = {Improved Reduction from the Bounded Distance Decoding Problem to the Unique Shortest Vector Problem in Lattices}, howpublished = {Cryptology ePrint Archive, Report 2016/753}, year = {2016}, url = {https://eprint.iacr.org/2016/753}, } @misc{cryptoeprint:2016:754, author = {Christoph Dobraunig and Maria Eichlseder and Daniel Kales and Florian Mendel}, title = {Practical Key Recovery Attack on MANTIS-5}, howpublished = {Cryptology ePrint Archive, Report 2016/754}, year = {2016}, url = {https://eprint.iacr.org/2016/754}, } @misc{cryptoeprint:2016:755, author = {Michael T. Goodrich and Evgenios M. Kornaropoulos and Michael Mitzenmacher and Roberto Tamassia}, title = {Auditable Data Structures}, howpublished = {Cryptology ePrint Archive, Report 2016/755}, year = {2016}, url = {https://eprint.iacr.org/2016/755}, } @misc{cryptoeprint:2016:756, author = {David Bernhard and Véronique Cortier and Olivier Pereira and Ben Smyth and Bogdan Warinschi}, title = {Adapting Helios for provable ballot privacy}, howpublished = {Cryptology ePrint Archive, Report 2016/756}, year = {2016}, url = {https://eprint.iacr.org/2016/756}, } @misc{cryptoeprint:2016:757, author = {Giuseppe Ateniese and Bernardo Magri and Daniele Venturi and Ewerton Andrade}, title = {Redactable Blockchain -- or -- Rewriting History in Bitcoin and Friends}, howpublished = {Cryptology ePrint Archive, Report 2016/757}, year = {2016}, url = {https://eprint.iacr.org/2016/757}, } @misc{cryptoeprint:2016:758, author = {Erdem Alkim and Philipp Jakubeit and Peter Schwabe}, title = {A new hope on ARM Cortex-M}, howpublished = {Cryptology ePrint Archive, Report 2016/758}, year = {2016}, url = {https://eprint.iacr.org/2016/758}, } @misc{cryptoeprint:2016:759, author = {Jo\"el Alwen and Jeremiah Blocki}, title = {Towards Practical Attacks on Argon2i and Balloon Hashing}, howpublished = {Cryptology ePrint Archive, Report 2016/759}, year = {2016}, url = {https://eprint.iacr.org/2016/759}, } @misc{cryptoeprint:2016:760, author = {Russell Impagliazzo; Ragesh Jaiswal; Valentine Kabanets; Bruce M. Kapron; Valerie King; Stefano Tessaro}, title = {Simultaneous Secrecy and Reliability Amplification for a General Channel Model}, howpublished = {Cryptology ePrint Archive, Report 2016/760}, year = {2016}, url = {https://eprint.iacr.org/2016/760}, } @misc{cryptoeprint:2016:761, author = {Xiaopeng Yang and Wenping Ma}, title = {Two-party authenticated key exchange protocol using lattice-based cryptography}, howpublished = {Cryptology ePrint Archive, Report 2016/761}, year = {2016}, url = {https://eprint.iacr.org/2016/761}, } @misc{cryptoeprint:2016:762, author = {Xiao Wang and Alex J. Malozemoff and Jonathan Katz}, title = {Faster Secure Two-Party Computation in the Single-Execution Setting}, howpublished = {Cryptology ePrint Archive, Report 2016/762}, year = {2016}, url = {https://eprint.iacr.org/2016/762}, } @misc{cryptoeprint:2016:763, author = {Houda Ferradi and Rémi Géraud and David Naccache}, title = {Human Public-Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/763}, year = {2016}, url = {https://eprint.iacr.org/2016/763}, } @misc{cryptoeprint:2016:764, author = {Tim Dittler and Florian Tschorsch and Stefan Dietzel and Björn Scheuermann}, title = {ANOTEL: Cellular Networks with Location Privacy (Extended Version)}, howpublished = {Cryptology ePrint Archive, Report 2016/764}, year = {2016}, url = {https://eprint.iacr.org/2016/764}, } @misc{cryptoeprint:2016:765, author = {David Bernhard and Bogdan Warinschi}, title = {Cryptographic Voting — A Gentle Introduction}, howpublished = {Cryptology ePrint Archive, Report 2016/765}, year = {2016}, url = {https://eprint.iacr.org/2016/765}, } @misc{cryptoeprint:2016:766, author = {Benoît Libert and Somindu C. Ramanna and Moti Yung}, title = {Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2016/766}, year = {2016}, url = {https://eprint.iacr.org/2016/766}, } @misc{cryptoeprint:2016:767, author = {Jean-Pierre Flori}, title = {A conjecture about Gauss sums and bentness of binomial Boolean functions}, howpublished = {Cryptology ePrint Archive, Report 2016/767}, year = {2016}, url = {https://eprint.iacr.org/2016/767}, } @misc{cryptoeprint:2016:768, author = {Toshinori Araki and Jun Furukawa and Yehuda Lindell and Ariel Nof and Kazuma Ohara}, title = {High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority}, howpublished = {Cryptology ePrint Archive, Report 2016/768}, year = {2016}, url = {https://eprint.iacr.org/2016/768}, } @misc{cryptoeprint:2016:769, author = {Nikolaos Athanasios Anagnostopoulos and Stefan Katzenbeisser and Markus Rosenstihl and André Schaller and Sebastian Gabmeyer and Tolga Arul}, title = {Low-temperature data remanence attacks against intrinsic SRAM PUFs}, howpublished = {Cryptology ePrint Archive, Report 2016/769}, year = {2016}, url = {https://eprint.iacr.org/2016/769}, } @misc{cryptoeprint:2016:770, author = {Guido Bertoni and Joan Daemen and Michaël Peeters and Gilles Van Assche and Ronny Van Keer}, title = {KangarooTwelve: fast hashing based on Keccak-p}, howpublished = {Cryptology ePrint Archive, Report 2016/770}, year = {2016}, url = {https://eprint.iacr.org/2016/770}, } @misc{cryptoeprint:2016:771, author = {David Bernhard and Olivier Pereira and Bogdan Warinschi}, title = {How not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios}, howpublished = {Cryptology ePrint Archive, Report 2016/771}, year = {2016}, url = {https://eprint.iacr.org/2016/771}, } @misc{cryptoeprint:2016:772, author = {Pierre BELGARRIC and Shivam BHASIN and Nicolas BRUNEAU and Jean-Luc DANGER and Nicolas DEBANDE and Sylvain GUILLEY and Annelie HEUSER and Zakaria NAJM and Olivier RIOUL}, title = {Time-Frequency Analysis for Second-Order Attacks}, howpublished = {Cryptology ePrint Archive, Report 2016/772}, year = {2016}, url = {https://eprint.iacr.org/2016/772}, } @misc{cryptoeprint:2016:773, author = {Vassil Dimitrov and Liisi Kerik and Toomas Krips and Jaak Randmets and Jan Willemson}, title = {Alternative Implementations of Secure Real Numbers}, howpublished = {Cryptology ePrint Archive, Report 2016/773}, year = {2016}, url = {https://eprint.iacr.org/2016/773}, } @misc{cryptoeprint:2016:774, author = {Tanujay Saha and Vikash Sehwag}, title = {TV-PUF : A Fast Lightweight Aging-Resistant Threshold Voltage PUF}, howpublished = {Cryptology ePrint Archive, Report 2016/774}, year = {2016}, url = {https://eprint.iacr.org/2016/774}, } @misc{cryptoeprint:2016:775, author = {Sonia Bogos and John Gaspoz and Serge Vaudenay}, title = {Cryptanalysis of a Homomorphic Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2016/775}, year = {2016}, url = {https://eprint.iacr.org/2016/775}, } @misc{cryptoeprint:2016:776, author = {Arnis Parsovs}, title = {Homomorphic Tallying for the Estonian Internet Voting System}, howpublished = {Cryptology ePrint Archive, Report 2016/776}, year = {2016}, url = {https://eprint.iacr.org/2016/776}, } @misc{cryptoeprint:2016:777, author = {Ping Ngai Chung and Craig Costello and Benjamin Smith}, title = {Fast, uniform scalar multiplication for genus 2 Jacobians with fast Kummers}, howpublished = {Cryptology ePrint Archive, Report 2016/777}, year = {2016}, url = {https://eprint.iacr.org/2016/777}, } @misc{cryptoeprint:2016:778, author = {Sumit Chakraborty}, title = {Algorithmic Mechanism Construction bridging Secure Multiparty Computation and Intelligent Reasoning}, howpublished = {Cryptology ePrint Archive, Report 2016/778}, year = {2016}, url = {https://eprint.iacr.org/2016/778}, } @misc{cryptoeprint:2016:779, author = {Maryam Rajabzadeh Asaar}, title = {Code-based Strong Designated Verifier Signatures: Security Analysis and a New Construction}, howpublished = {Cryptology ePrint Archive, Report 2016/779}, year = {2016}, url = {https://eprint.iacr.org/2016/779}, } @misc{cryptoeprint:2016:780, author = {Mohammmad Hassan Ameri and Javad Mohajeri and Mahmoud Salmasizadeh}, title = {Efficient and Provable Secure Anonymous Hierarchical Identity-based Broadcast Encryption (HIBBE) Scheme without Random Oracle}, howpublished = {Cryptology ePrint Archive, Report 2016/780}, year = {2016}, url = {https://eprint.iacr.org/2016/780}, } @misc{cryptoeprint:2016:781, author = {Justin Bed{\H{o}} and Thomas Conway and Kim Ramchen and Vanessa Teague}, title = {Privately Matching $k$-mers}, howpublished = {Cryptology ePrint Archive, Report 2016/781}, year = {2016}, url = {https://eprint.iacr.org/2016/781}, } @misc{cryptoeprint:2016:782, author = {Eric Crockett and Chris Peikert}, title = {Challenges for Ring-LWE}, howpublished = {Cryptology ePrint Archive, Report 2016/782}, year = {2016}, url = {https://eprint.iacr.org/2016/782}, } @misc{cryptoeprint:2016:783, author = {Joël Alwen and Peter Gaži and Chethan Kamath and Karen Klein and Georg Osang and Krzysztof Pietrzak and Leonid Reyzin and Michal Rolínek and Michal Rybár}, title = {On the Memory-Hardness of Data-Independent Password-Hashing Functions}, howpublished = {Cryptology ePrint Archive, Report 2016/783}, year = {2016}, url = {https://eprint.iacr.org/2016/783}, } @misc{cryptoeprint:2016:784, author = {Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay}, title = {Verifiable and Delegatable Constrained Pseudorandom Functions for Unconstrained Inputs}, howpublished = {Cryptology ePrint Archive, Report 2016/784}, year = {2016}, url = {https://eprint.iacr.org/2016/784}, } @misc{cryptoeprint:2016:785, author = {Fabrice Benhamouda and Tancrède Lepoint and Claire Mathieu and Hang Zhou}, title = {Optimization of Bootstrapping in Circuits}, howpublished = {Cryptology ePrint Archive, Report 2016/785}, year = {2016}, url = {https://eprint.iacr.org/2016/785}, } @misc{cryptoeprint:2016:786, author = {F. Betül Durak and Thomas M. DuBuisson and David Cash}, title = {What Else is Revealed by Order-Revealing Encryption?}, howpublished = {Cryptology ePrint Archive, Report 2016/786}, year = {2016}, url = {https://eprint.iacr.org/2016/786}, } @misc{cryptoeprint:2016:787, author = {Yasufumi Hashimoto}, title = {On the security of new vinegar-like variant of multivariate signature scheme}, howpublished = {Cryptology ePrint Archive, Report 2016/787}, year = {2016}, url = {https://eprint.iacr.org/2016/787}, } @misc{cryptoeprint:2016:788, author = {Yasufumi Hashimoto}, title = {On the security of Cubic UOV and its variants}, howpublished = {Cryptology ePrint Archive, Report 2016/788}, year = {2016}, url = {https://eprint.iacr.org/2016/788}, } @misc{cryptoeprint:2016:789, author = {Kirat Pal Singh, Shiwani Dod}, title = {An Efficient Hardware design and Implementation of Advanced Encryption Standard (AES) Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2016/789}, year = {2016}, url = {https://eprint.iacr.org/2016/789}, } @misc{cryptoeprint:2016:790, author = {Senyang Huang, Xiaoyun Wang, Guangwu Xu, Meiqin Wang, Jingyuan Zhao}, title = {Conditional Cube Attack on Reduced-Round Keccak Sponge Function}, howpublished = {Cryptology ePrint Archive, Report 2016/790}, year = {2016}, url = {https://eprint.iacr.org/2016/790}, } @misc{cryptoeprint:2016:791, author = {Ilan Komargodski}, title = {Leakage Resilient One-Way Functions: The Auxiliary-Input Setting}, howpublished = {Cryptology ePrint Archive, Report 2016/791}, year = {2016}, url = {https://eprint.iacr.org/2016/791}, } @misc{cryptoeprint:2016:792, author = {David Derler and Daniel Slamanig}, title = {Key-Homomorphic Signatures and Applications to Multiparty Signatures and Non-Interactive Zero-Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2016/792}, year = {2016}, url = {https://eprint.iacr.org/2016/792}, } @misc{cryptoeprint:2016:793, author = {Christoph Dobraunig and Maria Eichlseder and Thomas Korak and Florian Mendel}, title = {Side-Channel Analysis of Keymill}, howpublished = {Cryptology ePrint Archive, Report 2016/793}, year = {2016}, url = {https://eprint.iacr.org/2016/793}, } @misc{cryptoeprint:2016:794, author = {Mihir Bellare and Viet Tung Hoang and Stefano Tessaro}, title = {Message-recovery attacks on Feistel-based Format Preserving Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/794}, year = {2016}, url = {https://eprint.iacr.org/2016/794}, } @misc{cryptoeprint:2016:795, author = {Huijia Lin and Vinod Vaikuntanathan}, title = {Indistinguishability Obfuscation from DDH-like Assumptions on Constant-Degree Graded Encodings}, howpublished = {Cryptology ePrint Archive, Report 2016/795}, year = {2016}, url = {https://eprint.iacr.org/2016/795}, } @misc{cryptoeprint:2016:796, author = {Vadim Lyubashevsky}, title = {Digital Signatures Based on the Hardness of Ideal Lattice Problems in all Rings}, howpublished = {Cryptology ePrint Archive, Report 2016/796}, year = {2016}, url = {https://eprint.iacr.org/2016/796}, } @misc{cryptoeprint:2016:797, author = {Aysajan Abidin and Abdelrahaman Aly and Sara Cleemput and Mustafa A. Mustafa}, title = {An MPC-based Privacy-Preserving Protocol for a Local Electricity Trading Market}, howpublished = {Cryptology ePrint Archive, Report 2016/797}, year = {2016}, url = {https://eprint.iacr.org/2016/797}, } @misc{cryptoeprint:2016:798, author = {Karthikeyan Bhargavan and Gaëtan Leurent}, title = {On the Practical (In-)Security of 64-bit Block Ciphers: Collision Attacks on HTTP over TLS and OpenVPN}, howpublished = {Cryptology ePrint Archive, Report 2016/798}, year = {2016}, url = {https://eprint.iacr.org/2016/798}, } @misc{cryptoeprint:2016:799, author = {Vladimir Kolesnikov and Ranjit Kumaresan and Mike Rosulek and Ni Trieu}, title = {Efficient Batched Oblivious PRF with Applications to Private Set Intersection}, howpublished = {Cryptology ePrint Archive, Report 2016/799}, year = {2016}, url = {https://eprint.iacr.org/2016/799}, } @misc{cryptoeprint:2016:800, author = {Bar Alon and Eran Omri}, title = {Almost-Optimally Fair Multiparty Coin-Tossing with Nearly Three-Quarters Malicious}, howpublished = {Cryptology ePrint Archive, Report 2016/800}, year = {2016}, url = {https://eprint.iacr.org/2016/800}, } @misc{cryptoeprint:2016:801, author = {Gizem S. \c{C}etin and Wei Dai and Yark{\i}n Dor\"{o}z and William J. Martin and Berk Sunar}, title = {Blind Web Search: How far are we from a privacy preserving search engine?}, howpublished = {Cryptology ePrint Archive, Report 2016/801}, year = {2016}, url = {https://eprint.iacr.org/2016/801}, } @misc{cryptoeprint:2016:802, author = {Hung Dang and Erick Purwanto and Ee-Chien Chang}, title = {Proofs of Data Residency: Checking whether Your Cloud Files Have Been Relocated}, howpublished = {Cryptology ePrint Archive, Report 2016/802}, year = {2016}, url = {https://eprint.iacr.org/2016/802}, } @misc{cryptoeprint:2016:803, author = {Kirat Pal Singh}, title = {Biometric Based Network Security Using MIPS Cryptography Processor}, howpublished = {Cryptology ePrint Archive, Report 2016/803}, year = {2016}, url = {https://eprint.iacr.org/2016/803}, } @misc{cryptoeprint:2016:804, author = {Dario Fiore and Aikaterini Mitrokotsa and Luca Nizzardo and Elena Pagnin}, title = {Multi-Key Homomorphic Authenticators}, howpublished = {Cryptology ePrint Archive, Report 2016/804}, year = {2016}, url = {https://eprint.iacr.org/2016/804}, } @misc{cryptoeprint:2016:805, author = {Carmit Hazay and Avishay Yanai}, title = {Constant-Round Maliciously Secure Two-Party Computation in the RAM Model}, howpublished = {Cryptology ePrint Archive, Report 2016/805}, year = {2016}, url = {https://eprint.iacr.org/2016/805}, } @misc{cryptoeprint:2016:806, author = {Mohammad Hadi Valizadeh}, title = {Healing the Hill Cipher, Improved Approach to Secure Modified Hill against Zero-plaintext Attack }, howpublished = {Cryptology ePrint Archive, Report 2016/806}, year = {2016}, url = {https://eprint.iacr.org/2016/806}, } @misc{cryptoeprint:2016:807, author = {Hyunjin Ahn, Dong-Guk Han}, title = {Multilateral White-Box Cryptanalysis: Case study on WB-AES of CHES Challenge 2016}, howpublished = {Cryptology ePrint Archive, Report 2016/807}, year = {2016}, url = {https://eprint.iacr.org/2016/807}, } @misc{cryptoeprint:2016:808, author = {Maciej Skorski}, title = {Simulating Auxiliary Inputs, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2016/808}, year = {2016}, url = {https://eprint.iacr.org/2016/808}, } @misc{cryptoeprint:2016:809, author = {Daniel Genkin; Yuval Ishai; Mor Weiss}, title = {Binary AMD Circuits from Secure Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2016/809}, year = {2016}, url = {https://eprint.iacr.org/2016/809}, } @misc{cryptoeprint:2016:810, author = {Colin O'Flynn}, title = {Fault Injection using Crowbars on Embedded Systems}, howpublished = {Cryptology ePrint Archive, Report 2016/810}, year = {2016}, url = {https://eprint.iacr.org/2016/810}, } @misc{cryptoeprint:2016:811, author = {Ling Sun and Wei Wang and Meiqin Wang}, title = {MILP-Aided Bit-Based Division Property for Primitives with Non-Bit-Permutation Linear Layers}, howpublished = {Cryptology ePrint Archive, Report 2016/811}, year = {2016}, url = {https://eprint.iacr.org/2016/811}, } @misc{cryptoeprint:2016:812, author = {Dana Dachman-Soled}, title = {Towards Non-Black-Box Separations of Public Key Encryption and One Way Function}, howpublished = {Cryptology ePrint Archive, Report 2016/812}, year = {2016}, url = {https://eprint.iacr.org/2016/812}, } @misc{cryptoeprint:2016:813, author = {Benny Applebaum and Pavel Raykov}, title = {Fast Pseudorandom Functions Based on Expander Graphs}, howpublished = {Cryptology ePrint Archive, Report 2016/813}, year = {2016}, url = {https://eprint.iacr.org/2016/813}, } @misc{cryptoeprint:2016:814, author = {Zahra Jafargholi and Daniel Wichs}, title = {Adaptive Security of Yao's Garbled Circuits}, howpublished = {Cryptology ePrint Archive, Report 2016/814}, year = {2016}, url = {https://eprint.iacr.org/2016/814}, } @misc{cryptoeprint:2016:815, author = {Sanjam Garg and Divya Gupta and Peihan Miao and Omkant Pandey}, title = {Secure Multiparty RAM Computation in Constant Rounds}, howpublished = {Cryptology ePrint Archive, Report 2016/815}, year = {2016}, url = {https://eprint.iacr.org/2016/815}, } @misc{cryptoeprint:2016:816, author = {Mark Bun and Thomas Steinke}, title = {Concentrated Differential Privacy: Simplifications, Extensions, and Lower Bounds}, howpublished = {Cryptology ePrint Archive, Report 2016/816}, year = {2016}, url = {https://eprint.iacr.org/2016/816}, } @misc{cryptoeprint:2016:817, author = {Sanjam Garg and Eric Miles and Pratyay Mukherjee and Amit Sahai and Akshayaram Srinivasan and Mark Zhandry}, title = {Secure Obfuscation in a Weak Multilinear Map Model}, howpublished = {Cryptology ePrint Archive, Report 2016/817}, year = {2016}, url = {https://eprint.iacr.org/2016/817}, } @misc{cryptoeprint:2016:818, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, title = {Composable Adaptive Secure Protocols without Setup under Polytime Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2016/818}, year = {2016}, url = {https://eprint.iacr.org/2016/818}, } @misc{cryptoeprint:2016:819, author = {Shashank Agrawal and Manoj Prabhakaran and Ching-Hua Yu}, title = {Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents}, howpublished = {Cryptology ePrint Archive, Report 2016/819}, year = {2016}, url = {https://eprint.iacr.org/2016/819}, } @misc{cryptoeprint:2016:820, author = {Mark Bun and Yi-Hsiu Chen and Salil Vadhan}, title = {Separating Computational and Statistical Differential Privacy in the Client-Server Model}, howpublished = {Cryptology ePrint Archive, Report 2016/820}, year = {2016}, url = {https://eprint.iacr.org/2016/820}, } @misc{cryptoeprint:2016:821, author = {Duggirala Meher Krishna and Duggirala Ravi}, title = {Multivariate Cryptography with Mappings of Discrete Logarithms and Polynomials}, howpublished = {Cryptology ePrint Archive, Report 2016/821}, year = {2016}, url = {https://eprint.iacr.org/2016/821}, } @misc{cryptoeprint:2016:822, author = {Maryam Rajabzadeh Asaar and Mahmoud Salmasizadeh and Willy Susilo and Akbar Majidi}, title = {A Secure and Efficient Authentication Technique for Vehicular Ad-Hoc Networks}, howpublished = {Cryptology ePrint Archive, Report 2016/822}, year = {2016}, url = {https://eprint.iacr.org/2016/822}, } @misc{cryptoeprint:2016:823, author = {Rachid El Bansarkhani and Ali El Kaafarani}, title = {Post-Quantum Attribute-Based Signatures from Lattice Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2016/823}, year = {2016}, url = {https://eprint.iacr.org/2016/823}, } @misc{cryptoeprint:2016:824, author = {Tim Ruffing and Pedro Moreno-Sanchez and Aniket Kate}, title = {P2P Mixing and Unlinkable Bitcoin Transactions}, howpublished = {Cryptology ePrint Archive, Report 2016/824}, year = {2016}, url = {https://eprint.iacr.org/2016/824}, } @misc{cryptoeprint:2016:825, author = {Chun Guo and Dongdai Lin and Meicheng Liu}, title = {Revisiting Cascade Ciphers in Indifferentiability Setting}, howpublished = {Cryptology ePrint Archive, Report 2016/825}, year = {2016}, url = {https://eprint.iacr.org/2016/825}, } @misc{cryptoeprint:2016:826, author = {Tomer Ashur and Yunwen Liu}, title = {Rotational Cryptanalysis in the Presence of Constants}, howpublished = {Cryptology ePrint Archive, Report 2016/826}, year = {2016}, url = {https://eprint.iacr.org/2016/826}, } @misc{cryptoeprint:2016:827, author = {Atul Luykx and Bart Mennink and Samuel Neves}, title = {Security Analysis of BLAKE2's Modes of Operation}, howpublished = {Cryptology ePrint Archive, Report 2016/827}, year = {2016}, url = {https://eprint.iacr.org/2016/827}, } @misc{cryptoeprint:2016:828, author = {Shahram Rasoolzadeh and Håvard Raddum}, title = {Faster Key Recovery Attack on Round-Reduced PRINCE}, howpublished = {Cryptology ePrint Archive, Report 2016/828}, year = {2016}, url = {https://eprint.iacr.org/2016/828}, } @misc{cryptoeprint:2016:829, author = {Shuai Han and Shengli Liu and Lin Lyu}, title = {Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions}, howpublished = {Cryptology ePrint Archive, Report 2016/829}, year = {2016}, url = {https://eprint.iacr.org/2016/829}, } @misc{cryptoeprint:2016:830, author = {Ian Miers and Payman Mohassel}, title = {IO-DSSE: Scaling Dynamic Searchable Encryption to Millions of Indexes By Improving Locality}, howpublished = {Cryptology ePrint Archive, Report 2016/830}, year = {2016}, url = {https://eprint.iacr.org/2016/830}, } @misc{cryptoeprint:2016:831, author = {Jürgen Pulkus and Srinivas Vivek}, title = {Reducing the Number of Non-linear Multiplications in Masking Schemes}, howpublished = {Cryptology ePrint Archive, Report 2016/831}, year = {2016}, url = {https://eprint.iacr.org/2016/831}, } @misc{cryptoeprint:2016:832, author = {Colin Chaigneau and Henri Gilbert}, title = {Is AEZ v4.1 Sufficiently Resilient Against Key-Recovery Attacks?}, howpublished = {Cryptology ePrint Archive, Report 2016/832}, year = {2016}, url = {https://eprint.iacr.org/2016/832}, } @misc{cryptoeprint:2016:833, author = {Kazuki Yoneyama and Reo Yoshida and Yuto Kawahara and Tetsutaro Kobayashi and Hitoshi Fuji and Tomohide Yamamoto}, title = {Multi-Cast Key Distribution: Scalable, Dynamic and Provably Secure Construction}, howpublished = {Cryptology ePrint Archive, Report 2016/833}, year = {2016}, url = {https://eprint.iacr.org/2016/833}, } @misc{cryptoeprint:2016:834, author = {Russell W. F. Lai and Raymond K. H. Tai and Harry W. H. Wong and Sherman S. M. Chow}, title = {A Zoo of Homomorphic Signatures: Multi-Key and Key-Homomorphism}, howpublished = {Cryptology ePrint Archive, Report 2016/834}, year = {2016}, url = {https://eprint.iacr.org/2016/834}, } @misc{cryptoeprint:2016:835, author = {Sumanta Sarkar and Habeeb Syed }, title = {Lightweight Diffusion Layer: Importance of Toeplitz Matrices}, howpublished = {Cryptology ePrint Archive, Report 2016/835}, year = {2016}, url = {https://eprint.iacr.org/2016/835}, } @misc{cryptoeprint:2016:836, author = {H. Gopalakrishna Gadiyar and R. Padma}, title = {The Discrete Logarithm Problem over Prime Fields can be transformed to a Linear Multivariable Chinese Remainder Theorem}, howpublished = {Cryptology ePrint Archive, Report 2016/836}, year = {2016}, url = {https://eprint.iacr.org/2016/836}, } @misc{cryptoeprint:2016:837, author = {Jung Hee Cheon and Damien Stehle}, title = {Fully Homomorphic Encryption over the Integers Revisited}, howpublished = {Cryptology ePrint Archive, Report 2016/837}, year = {2016}, url = {https://eprint.iacr.org/2016/837}, } @misc{cryptoeprint:2016:838, author = {Masoumeh Safkhani and Nasour Bagheri}, title = {Passive Secret Disclosure Attack on an Ultralightweight Authentication Protocol for Internet of Things}, howpublished = {Cryptology ePrint Archive, Report 2016/838}, year = {2016}, url = {https://eprint.iacr.org/2016/838}, } @misc{cryptoeprint:2016:839, author = {Zejun Xiang and Wentao Zhang and Dongdai Lin}, title = {On the Division Property of SIMON48 and SIMON64}, howpublished = {Cryptology ePrint Archive, Report 2016/839}, year = {2016}, url = {https://eprint.iacr.org/2016/839}, } @misc{cryptoeprint:2016:840, author = {Melissa Chase and Mary Maller and Sarah Meiklejohn}, title = {Deja Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2016/840}, year = {2016}, url = {https://eprint.iacr.org/2016/840}, } @misc{cryptoeprint:2016:841, author = {Guido Bertoni and Marco Martinoli}, title = {A Methodology for the Characterisation of Leakages in Combinatorial Logic}, howpublished = {Cryptology ePrint Archive, Report 2016/841}, year = {2016}, url = {https://eprint.iacr.org/2016/841}, } @misc{cryptoeprint:2016:842, author = {Seung Geol Choi and Dana Dachman-Soled and Tal Malkin and Hoeteck Wee }, title = {Improved, Black-Box, Non-Malleable Encryption from Semantic Security}, howpublished = {Cryptology ePrint Archive, Report 2016/842}, year = {2016}, url = {https://eprint.iacr.org/2016/842}, } @misc{cryptoeprint:2016:843, author = {Shuichi Katsumata and Shota Yamada}, title = {Partitioning via Non-Linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2016/843}, year = {2016}, url = {https://eprint.iacr.org/2016/843}, } @misc{cryptoeprint:2016:844, author = {Kamalesh Acharya and Ratna Dutta}, title = {Secure and Efficient Construction of Broadcast Encryption with Dealership}, howpublished = {Cryptology ePrint Archive, Report 2016/844}, year = {2016}, url = {https://eprint.iacr.org/2016/844}, } @misc{cryptoeprint:2016:845, author = {Felix Heuer and Bertram Poettering}, title = {Selective Opening Security from Simulatable Data Encapsulation}, howpublished = {Cryptology ePrint Archive, Report 2016/845}, year = {2016}, url = {https://eprint.iacr.org/2016/845}, } @misc{cryptoeprint:2016:846, author = {Onur Demir and Wenjie Xiong and Faisal Zaghloul and Jakub Szefer}, title = {Survey of Approaches for Security Verification of Hardware/Software Systems}, howpublished = {Cryptology ePrint Archive, Report 2016/846}, year = {2016}, url = {https://eprint.iacr.org/2016/846}, } @misc{cryptoeprint:2016:847, author = {Jianwei Li}, title = {On the smallest ratio problem of lattice bases}, howpublished = {Cryptology ePrint Archive, Report 2016/847}, year = {2016}, url = {https://eprint.iacr.org/2016/847}, } @misc{cryptoeprint:2016:848, author = {Linfeng Zhou}, title = {From Weakly Selective to Selective Security in Compact Functional Encryption, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2016/848}, year = {2016}, url = {https://eprint.iacr.org/2016/848}, } @misc{cryptoeprint:2016:849, author = {Ittai Abraham and Christopher W. Fletcher and Kartik Nayak and Benny Pinkas and Ling Ren}, title = {Asymptotically Tight Bounds for Composing ORAM with PIR}, howpublished = {Cryptology ePrint Archive, Report 2016/849}, year = {2016}, url = {https://eprint.iacr.org/2016/849}, } @misc{cryptoeprint:2016:850, author = {Conor Patrick and Bilgiday Yuce and Nahid Farhady Ghalaty and Patrick Schaumont}, title = {Lightweight Fault Attack Resistance in Software Using Intra-Instruction Redundancy}, howpublished = {Cryptology ePrint Archive, Report 2016/850}, year = {2016}, url = {https://eprint.iacr.org/2016/850}, } @misc{cryptoeprint:2016:851, author = {Ivica Nikolic and Yu Sasaki}, title = {A New Algorithm for the Unbalanced Meet-in-the-Middle Problem}, howpublished = {Cryptology ePrint Archive, Report 2016/851}, year = {2016}, url = {https://eprint.iacr.org/2016/851}, } @misc{cryptoeprint:2016:852, author = {Arnold Neumaier and Damien Stehle}, title = {Faster LLL-type Reduction of Lattice Bases}, howpublished = {Cryptology ePrint Archive, Report 2016/852}, year = {2016}, url = {https://eprint.iacr.org/2016/852}, } @misc{cryptoeprint:2016:853, author = {Tetsu Iwata and Kazuhiko Minematsu}, title = {Stronger Security Variants of GCM-SIV}, howpublished = {Cryptology ePrint Archive, Report 2016/853}, year = {2016}, url = {https://eprint.iacr.org/2016/853}, } @misc{cryptoeprint:2016:854, author = {Matthias Hiller and Michael Pehl and Gerhard Kramer and Georg Sigl}, title = {Algebraic Security Analysis of Key Generation with Physical Unclonable Functions}, howpublished = {Cryptology ePrint Archive, Report 2016/854}, year = {2016}, url = {https://eprint.iacr.org/2016/854}, } @misc{cryptoeprint:2016:855, author = {Douglas R. Stinson and Ruizhong Wei}, title = {Combinatorial Repairability for Threshold Schemes}, howpublished = {Cryptology ePrint Archive, Report 2016/855}, year = {2016}, url = {https://eprint.iacr.org/2016/855}, } @misc{cryptoeprint:2016:856, author = {Ronald L. Rivest and Jacob C. N. Schuldt}, title = {Spritz---a spongy RC4-like stream cipher and hash function.}, howpublished = {Cryptology ePrint Archive, Report 2016/856}, year = {2016}, url = {https://eprint.iacr.org/2016/856}, } @misc{cryptoeprint:2016:857, author = {Zejun Xiang and Wentao Zhang and Zhenzhen Bao and Dongdai Lin}, title = {Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2016/857}, year = {2016}, url = {https://eprint.iacr.org/2016/857}, } @misc{cryptoeprint:2016:858, author = {Qian Guo and Thomas Johansson and Paul Stankovski}, title = {A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors}, howpublished = {Cryptology ePrint Archive, Report 2016/858}, year = {2016}, url = {https://eprint.iacr.org/2016/858}, } @misc{cryptoeprint:2016:859, author = {Steven D. Galbraith and Christophe Petit and Barak Shani and Yan Bo Ti}, title = {On the Security of Supersingular Isogeny Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2016/859}, year = {2016}, url = {https://eprint.iacr.org/2016/859}, } @misc{cryptoeprint:2016:860, author = {Junqing Gong and Xiaolei Dong and Jie Chen and Zhenfu Cao}, title = {Efficient IBE with Tight Reduction to Standard Assumption in the Multi-challenge Setting}, howpublished = {Cryptology ePrint Archive, Report 2016/860}, year = {2016}, url = {https://eprint.iacr.org/2016/860}, } @misc{cryptoeprint:2016:861, author = {Jack Doerner and David Evans and abhi shelat}, title = {Secure Stable Matching at Scale}, howpublished = {Cryptology ePrint Archive, Report 2016/861}, year = {2016}, url = {https://eprint.iacr.org/2016/861}, } @misc{cryptoeprint:2016:862, author = {Suvradip Chakraborty and Goutam Paul and C. Pandu Rangan}, title = {Flaw in the Security Analysis of Leakage-resilient Authenticated Key Exchange Protocol from CT-RSA 2016 and Restoring the Security Proof}, howpublished = {Cryptology ePrint Archive, Report 2016/862}, year = {2016}, url = {https://eprint.iacr.org/2016/862}, } @misc{cryptoeprint:2016:863, author = {Shuangyi Zhu and Yuan Ma and Jingqiang Lin and Jia Zhuang and Jiwu Jing}, title = {More Powerful and Reliable Second-level Statistical Randomness Tests for NIST SP 800-22}, howpublished = {Cryptology ePrint Archive, Report 2016/863}, year = {2016}, url = {https://eprint.iacr.org/2016/863}, } @misc{cryptoeprint:2016:864, author = {Thomas Shrimpton and R. Seth Terashima}, title = {Salvaging Weak Security Bounds for Blockcipher-Based Constructions}, howpublished = {Cryptology ePrint Archive, Report 2016/864}, year = {2016}, url = {https://eprint.iacr.org/2016/864}, } @misc{cryptoeprint:2016:865, author = {Sarah Miracle and Scott Yilek}, title = {Reverse Cycle Walking and Its Applications}, howpublished = {Cryptology ePrint Archive, Report 2016/865}, year = {2016}, url = {https://eprint.iacr.org/2016/865}, } @misc{cryptoeprint:2016:866, author = {Prastudy Fauzi and Helger Lipmaa and Michał Zając}, title = {A Shuffle Argument Secure in the Generic Model}, howpublished = {Cryptology ePrint Archive, Report 2016/866}, year = {2016}, url = {https://eprint.iacr.org/2016/866}, } @misc{cryptoeprint:2016:867, author = {Eduard Marin and Enrique Argones Rúa and Dave Singelée and Bart Preneel}, title = {A survey on physiological-signal-based security for medical devices}, howpublished = {Cryptology ePrint Archive, Report 2016/867}, year = {2016}, url = {https://eprint.iacr.org/2016/867}, } @misc{cryptoeprint:2016:868, author = {Viet Tung Hoang and Jonathan Katz and Adam O’Neill and Mohammad Zaheri}, title = {Selective-Opening Security in the Presence of Randomness Failures}, howpublished = {Cryptology ePrint Archive, Report 2016/868}, year = {2016}, url = {https://eprint.iacr.org/2016/868}, } @misc{cryptoeprint:2016:869, author = {Ted Chinburg and Brett Hemenway and Nadia Heninger and Zachary Scherr}, title = {Cryptographic applications of capacity theory: On the optimality of Coppersmith's method for univariate polynomials}, howpublished = {Cryptology ePrint Archive, Report 2016/869}, year = {2016}, url = {https://eprint.iacr.org/2016/869}, } @misc{cryptoeprint:2016:870, author = {Ilaria Chillotti and Nicolas Gama and Mariya Georgieva and Malika Izabachène}, title = {Faster Fully Homomorphic Encryption: Bootstrapping in less than 0.1 Seconds}, howpublished = {Cryptology ePrint Archive, Report 2016/870}, year = {2016}, url = {https://eprint.iacr.org/2016/870}, } @misc{cryptoeprint:2016:871, author = {Xavier Boyen and Christopher Carr and Thomas Haines}, title = {Blockchain-Free Cryptocurrencies: A Framework for Truly Decentralised Fast Transactions}, howpublished = {Cryptology ePrint Archive, Report 2016/871}, year = {2016}, url = {https://eprint.iacr.org/2016/871}, } @misc{cryptoeprint:2016:872, author = {Fuchun Guo and Willy Susilo and Yi Mu and Rongmao Chen and Jianchang Lai and Guomin Yang}, title = {Iterated Random Oracle: A Universal Approach for Finding Loss in Security Reduction}, howpublished = {Cryptology ePrint Archive, Report 2016/872}, year = {2016}, url = {https://eprint.iacr.org/2016/872}, } @misc{cryptoeprint:2016:873, author = {Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo and Mingwu Zhang}, title = {Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2016/873}, year = {2016}, url = {https://eprint.iacr.org/2016/873}, } @misc{cryptoeprint:2016:875, author = {Joël Alwen and Jeremiah Blocki and Krzysztof Pietrzak}, title = {Depth-Robust Graphs and Their Cumulative Memory Complexity}, howpublished = {Cryptology ePrint Archive, Report 2016/875}, year = {2016}, url = {https://eprint.iacr.org/2016/875}, } @misc{cryptoeprint:2016:876, author = {Lei Wang and Jian Guo and Guoyan Zhang and Jingyuan Zhao and Dawu Gu}, title = {How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers}, howpublished = {Cryptology ePrint Archive, Report 2016/876}, year = {2016}, url = {https://eprint.iacr.org/2016/876}, } @misc{cryptoeprint:2016:877, author = {Yuyu Wang, Zongyang Zhang, Takahiro Matsuda, Goichiro Hanaoka, and Keisuke Tanaka}, title = {How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones}, howpublished = {Cryptology ePrint Archive, Report 2016/877}, year = {2016}, url = {https://eprint.iacr.org/2016/877}, } @misc{cryptoeprint:2016:878, author = {Jian Guo and Meicheng Liu and Ling Song}, title = {Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak}, howpublished = {Cryptology ePrint Archive, Report 2016/878}, year = {2016}, url = {https://eprint.iacr.org/2016/878}, } @misc{cryptoeprint:2016:879, author = {Benoît Libert and San Ling and Fabrice Mouhartem and Khoa Nguyen and Huaxiong Wang}, title = {Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/879}, year = {2016}, url = {https://eprint.iacr.org/2016/879}, } @misc{cryptoeprint:2016:880, author = {Silvio Biagioni and Daniel Masny and Daniele Venturi}, title = {Naor-Yung Paradigm with Shared Randomness and Applications}, howpublished = {Cryptology ePrint Archive, Report 2016/880}, year = {2016}, url = {https://eprint.iacr.org/2016/880}, } @misc{cryptoeprint:2016:881, author = {Anindya Shankar Bhandari}, title = {Near Collisions in the RC4 Stream Cipher}, howpublished = {Cryptology ePrint Archive, Report 2016/881}, year = {2016}, url = {https://eprint.iacr.org/2016/881}, } @misc{cryptoeprint:2016:882, author = {Jinsheng Zhang and Qiumao Ma and Wensheng Zhang and Daji Qiao}, title = {MSKT-ORAM: A Constant Bandwidth ORAM without Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/882}, year = {2016}, url = {https://eprint.iacr.org/2016/882}, } @misc{cryptoeprint:2016:883, author = {Nikolaj Volgushev and Malte Schwarzkopf and Andrei Lapets and Mayank Varia and Azer Bestavros}, title = {DEMO: Integrating MPC in Big Data Workflows}, howpublished = {Cryptology ePrint Archive, Report 2016/883}, year = {2016}, url = {https://eprint.iacr.org/2016/883}, } @misc{cryptoeprint:2016:884, author = {Ben Lampert and Riad S. Wahby and Shane Leonard and Philip Levis}, title = {Robust, low-cost, auditable random number generation for embedded system security}, howpublished = {Cryptology ePrint Archive, Report 2016/884}, year = {2016}, url = {https://eprint.iacr.org/2016/884}, } @misc{cryptoeprint:2016:885, author = {Ronald Cramer and Léo Ducas and Benjamin Wesolowski}, title = {Short Stickelberger Class Relations and application to Ideal-SVP}, howpublished = {Cryptology ePrint Archive, Report 2016/885}, year = {2016}, url = {https://eprint.iacr.org/2016/885}, } @misc{cryptoeprint:2016:886, author = {Daniel Hutchinson}, title = {A Robust and Sponge-Like PRNG with Improved Efficiency}, howpublished = {Cryptology ePrint Archive, Report 2016/886}, year = {2016}, url = {https://eprint.iacr.org/2016/886}, } @misc{cryptoeprint:2016:887, author = {Anne Canteaut and Sébastien Duval and Léo Perrin}, title = {A generalisation of Dillon's APN permutation with the best known differential and nonlinear properties for all fields of size $2^{4k+2}$}, howpublished = {Cryptology ePrint Archive, Report 2016/887}, year = {2016}, url = {https://eprint.iacr.org/2016/887}, } @misc{cryptoeprint:2016:888, author = {Thijs Laarhoven}, title = {Finding closest lattice vectors using approximate Voronoi cells}, howpublished = {Cryptology ePrint Archive, Report 2016/888}, year = {2016}, url = {https://eprint.iacr.org/2016/888}, } @misc{cryptoeprint:2016:889, author = {Aggelos Kiayias and Alexander Russell and Bernardo David and Roman Oliynykov}, title = {Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol}, howpublished = {Cryptology ePrint Archive, Report 2016/889}, year = {2016}, url = {https://eprint.iacr.org/2016/889}, } @misc{cryptoeprint:2016:890, author = {Artur Mariano and Thijs Laarhoven and Christian Bischof}, title = {A Parallel Variant of LDSieve for the SVP on Lattices}, howpublished = {Cryptology ePrint Archive, Report 2016/890}, year = {2016}, url = {https://eprint.iacr.org/2016/890}, } @misc{cryptoeprint:2016:891, author = {Jie Chen and Junqing Gong and Jian Weng}, title = {Tightly Secure IBE under Constant-size Master Public Key}, howpublished = {Cryptology ePrint Archive, Report 2016/891}, year = {2016}, url = {https://eprint.iacr.org/2016/891}, } @misc{cryptoeprint:2016:892, author = {Adrià Gascón and Phillipp Schoppmann and Borja Balle and Mariana Raykova and Jack Doerner and Samee Zahur and David Evans}, title = {Privacy-Preserving Distributed Linear Regression on High-Dimensional Data}, howpublished = {Cryptology ePrint Archive, Report 2016/892}, year = {2016}, url = {https://eprint.iacr.org/2016/892}, } @misc{cryptoeprint:2016:893, author = {Raluca Ada Popa and Emily Stark and Jonas Helfer and Steven Valdez and Nickolai Zeldovich and M. Frans Kaashoek and Hari Balakrishnan}, title = {Building web applications on top of encrypted data using Mylar}, howpublished = {Cryptology ePrint Archive, Report 2016/893}, year = {2016}, url = {https://eprint.iacr.org/2016/893}, } @misc{cryptoeprint:2016:894, author = {Chun Guo and Dongdai Lin}, title = {Indifferentiability of 3-Round Even-Mansour with Random Oracle Key Derivation}, howpublished = {Cryptology ePrint Archive, Report 2016/894}, year = {2016}, url = {https://eprint.iacr.org/2016/894}, } @misc{cryptoeprint:2016:895, author = {Paul Grubbs and Kevin Sekniqi and Vincent Bindschaedler and Muhammad Naveed and Thomas Ristenpart}, title = {Leakage-Abuse Attacks against Order-Revealing Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/895}, year = {2016}, url = {https://eprint.iacr.org/2016/895}, } @misc{cryptoeprint:2016:896, author = {Muhammad Yasin and Bodhisatwa Mazumdar and Ozgur Sinanoglu and Jeyavijayan Rajendran}, title = {Security Analysis of Anti-SAT}, howpublished = {Cryptology ePrint Archive, Report 2016/896}, year = {2016}, url = {https://eprint.iacr.org/2016/896}, } @misc{cryptoeprint:2016:897, author = {Gérald Gavin}, title = {An efficient somewhat homomorphic encryption scheme based on factorization}, howpublished = {Cryptology ePrint Archive, Report 2016/897}, year = {2016}, url = {https://eprint.iacr.org/2016/897}, } @misc{cryptoeprint:2016:898, author = {Sha Tao and Elena Dubrova}, title = {Physical Unclonable Functions based on Temperature Compensated Ring Oscillators}, howpublished = {Cryptology ePrint Archive, Report 2016/898}, year = {2016}, url = {https://eprint.iacr.org/2016/898}, } @misc{cryptoeprint:2016:899, author = {Kittiphop Phalakarn and Kittiphon Phalakarn and Vorapong Suppakitpaisarn}, title = {Parallelized Side-Channel Attack Resisted Scalar Multiplication Using q-Based Addition-Subtraction k-chains}, howpublished = {Cryptology ePrint Archive, Report 2016/899}, year = {2016}, url = {https://eprint.iacr.org/2016/899}, } @misc{cryptoeprint:2016:900, author = {Arthur Gervais and Alexandros Filios and Vincent Lenders and Srdjan Capkun}, title = {Quantifying Web Adblocker Privacy}, howpublished = {Cryptology ePrint Archive, Report 2016/900}, year = {2016}, url = {https://eprint.iacr.org/2016/900}, } @misc{cryptoeprint:2016:901, author = {Mathilde Igier and Serge Vaudenay}, title = {Distance Bounding based on PUF}, howpublished = {Cryptology ePrint Archive, Report 2016/901}, year = {2016}, url = {https://eprint.iacr.org/2016/901}, } @misc{cryptoeprint:2016:902, author = {Bin Liu and Bogdan Warinschi}, title = {Universally Composable Cryptographic Role-Based Access Control}, howpublished = {Cryptology ePrint Archive, Report 2016/902}, year = {2016}, url = {https://eprint.iacr.org/2016/902}, } @misc{cryptoeprint:2016:903, author = {Ueli Maurer and Renato Renner}, title = {From Indifferentiability to Constructive Cryptography (and Back)}, howpublished = {Cryptology ePrint Archive, Report 2016/903}, year = {2016}, url = {https://eprint.iacr.org/2016/903}, } @misc{cryptoeprint:2016:904, author = {Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay}, title = {Succinct Predicate and Online-Offline Multi-Input Inner Product Encryptions under Standard Static Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2016/904}, year = {2016}, url = {https://eprint.iacr.org/2016/904}, } @misc{cryptoeprint:2016:905, author = {Masoumeh Safkhani and Nasour Bagheri}, title = {Generalized Desynchronization Attack on UMAP: Application to RCIA, KMAP, SLAP and SASI$^+$ protocols}, howpublished = {Cryptology ePrint Archive, Report 2016/905}, year = {2016}, url = {https://eprint.iacr.org/2016/905}, } @misc{cryptoeprint:2016:906, author = {Tianren Liu}, title = {On Basing Search SIVP on NP-Hardness}, howpublished = {Cryptology ePrint Archive, Report 2016/906}, year = {2016}, url = {https://eprint.iacr.org/2016/906}, } @misc{cryptoeprint:2016:907, author = {Peihan Miao}, title = {Cut-and-Choose for Garbled RAM}, howpublished = {Cryptology ePrint Archive, Report 2016/907}, year = {2016}, url = {https://eprint.iacr.org/2016/907}, } @misc{cryptoeprint:2016:908, author = {Kalikinkar Mandal and Basel Alomair and Radha Poovendran}, title = {Secure Error-Tolerant Graph Matching Protocols}, howpublished = {Cryptology ePrint Archive, Report 2016/908}, year = {2016}, url = {https://eprint.iacr.org/2016/908}, } @misc{cryptoeprint:2016:909, author = {Bo-Yuan Peng and Yuan-Che Hsu and Yu-Jia Chen and Di-Chia Chueh and Chen-Mou Cheng and Bo-Yin Yang}, title = {Multi-core FPGA Implementation of ECC with Homogeneous Co-Z Coordinate Representation}, howpublished = {Cryptology ePrint Archive, Report 2016/909}, year = {2016}, url = {https://eprint.iacr.org/2016/909}, } @misc{cryptoeprint:2016:910, author = {Léo Ducas and Wessel P.J. van Woerden}, title = {The closest vector problem in tensored root lattices of type A and in their duals}, howpublished = {Cryptology ePrint Archive, Report 2016/910}, year = {2016}, url = {https://eprint.iacr.org/2016/910}, } @misc{cryptoeprint:2016:911, author = {Mohamed Saied Emam Mohamed and Albrecht Petzoldt}, title = {The Shortest Signatures Ever}, howpublished = {Cryptology ePrint Archive, Report 2016/911}, year = {2016}, url = {https://eprint.iacr.org/2016/911}, } @misc{cryptoeprint:2016:912, author = {Gilles Barthe and François Dupressoir and Sebastian Faust and Benjamin Grégoire and François-Xavier Standaert and Pierre-Yves Strub}, title = {Parallel Implementations of Masking Schemes and the Bounded Moment Leakage Model}, howpublished = {Cryptology ePrint Archive, Report 2016/912}, year = {2016}, url = {https://eprint.iacr.org/2016/912}, } @misc{cryptoeprint:2016:913, author = {Boru Gong and Yunlei Zhao}, title = {Small Field Attack, and Revisiting RLWE-Based Authenticated Key Exchange from Eurocrypt'15}, howpublished = {Cryptology ePrint Archive, Report 2016/913}, year = {2016}, url = {https://eprint.iacr.org/2016/913}, } @misc{cryptoeprint:2016:914, author = {Gora Adj and Isaac Canales-Mart\'inez and Nareli Cruz-Cort\'es and Alfred Menezes and Thomaz Oliveira and Luis Rivera-Zamarripa and Francisco Rodr\'iguez-Henr\'iquez}, title = {Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields}, howpublished = {Cryptology ePrint Archive, Report 2016/914}, year = {2016}, url = {https://eprint.iacr.org/2016/914}, } @misc{cryptoeprint:2016:915, author = {Melissa Chase and Sarah Meiklejohn}, title = {Transparency Overlays and Applications}, howpublished = {Cryptology ePrint Archive, Report 2016/915}, year = {2016}, url = {https://eprint.iacr.org/2016/915}, } @misc{cryptoeprint:2016:916, author = {Rafael Pass and Elaine Shi}, title = {FruitChains: A Fair Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2016/916}, year = {2016}, url = {https://eprint.iacr.org/2016/916}, } @misc{cryptoeprint:2016:917, author = {Rafael Pass and Elaine Shi}, title = {Hybrid Consensus: Efficient Consensus in the Permissionless Model}, howpublished = {Cryptology ePrint Archive, Report 2016/917}, year = {2016}, url = {https://eprint.iacr.org/2016/917}, } @misc{cryptoeprint:2016:918, author = {Rafael Pass and Elaine Shi}, title = {The Sleepy Model of Consensus}, howpublished = {Cryptology ePrint Archive, Report 2016/918}, year = {2016}, url = {https://eprint.iacr.org/2016/918}, } @misc{cryptoeprint:2016:919, author = {Phil Daian and Rafael Pass and Elaine Shi}, title = {Snow White: Provably Secure Proofs of Stake}, howpublished = {Cryptology ePrint Archive, Report 2016/919}, year = {2016}, url = {https://eprint.iacr.org/2016/919}, } @misc{cryptoeprint:2016:920, author = {Paul Grubbs and Richard McPherson and Muhammad Naveed and Thomas Ristenpart and Vitaly Shmatikov}, title = {Breaking Web Applications Built On Top of Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2016/920}, year = {2016}, url = {https://eprint.iacr.org/2016/920}, } @misc{cryptoeprint:2016:921, author = {Houssem Maghrebi and Thibault Portigliatti and Emmanuel Prouff}, title = {Breaking Cryptographic Implementations Using Deep Learning Techniques}, howpublished = {Cryptology ePrint Archive, Report 2016/921}, year = {2016}, url = {https://eprint.iacr.org/2016/921}, } @misc{cryptoeprint:2016:922, author = {Wei Yang, Yuchen Cao, Ke Ma, and Hailong Zhang}, title = {Side-Channel Leakage Evaluation and Detection Based on Communication Theory}, howpublished = {Cryptology ePrint Archive, Report 2016/922}, year = {2016}, url = {https://eprint.iacr.org/2016/922}, } @misc{cryptoeprint:2016:923, author = {Erick Nascimento and Lukasz Chmielewski and David Oswald and Peter Schwabe}, title = {Attacking embedded ECC implementations through cmov side channels}, howpublished = {Cryptology ePrint Archive, Report 2016/923}, year = {2016}, url = {https://eprint.iacr.org/2016/923}, } @misc{cryptoeprint:2016:924, author = {Koh-ichi Nagao}, title = {Bit Coincidence Mining Algorithm II}, howpublished = {Cryptology ePrint Archive, Report 2016/924}, year = {2016}, url = {https://eprint.iacr.org/2016/924}, } @misc{cryptoeprint:2016:925, author = {Liang Wang and Rafael Pass and abhi shelat and Thomas Ristenpart}, title = {Secure Channel Injection and Anonymous Proofs of Account Ownership}, howpublished = {Cryptology ePrint Archive, Report 2016/925}, year = {2016}, url = {https://eprint.iacr.org/2016/925}, } @misc{cryptoeprint:2016:926, author = {Matthias Hamann and Matthias Krause and Willi Meier}, title = {LIZARD - A Lightweight Stream Cipher for Power-constrained Devices}, howpublished = {Cryptology ePrint Archive, Report 2016/926}, year = {2016}, url = {https://eprint.iacr.org/2016/926}, } @misc{cryptoeprint:2016:927, author = {Subhadeep Banik and Andrey Bogdanov and Francesco Regazzoni}, title = {Atomic-AES: A Compact Implementation of the AES Encryption/Decryption Core}, howpublished = {Cryptology ePrint Archive, Report 2016/927}, year = {2016}, url = {https://eprint.iacr.org/2016/927}, } @misc{cryptoeprint:2016:928, author = {Massoud Hadian Dehkordi and Ali Safi}, title = {The complexity of the connected graph access structure on seven participants}, howpublished = {Cryptology ePrint Archive, Report 2016/928}, year = {2016}, url = {https://eprint.iacr.org/2016/928}, } @misc{cryptoeprint:2016:929, author = {Tanujay Sha}, title = {A Generalized Ideal Secret Sharing Scheme}, howpublished = {Cryptology ePrint Archive, Report 2016/929}, year = {2016}, url = {https://eprint.iacr.org/2016/929}, } @misc{cryptoeprint:2016:930, author = {Benny Pinkas and Thomas Schneider and Michael Zohner}, title = {Scalable Private Set Intersection Based on OT Extension}, howpublished = {Cryptology ePrint Archive, Report 2016/930}, year = {2016}, url = {https://eprint.iacr.org/2016/930}, } @misc{cryptoeprint:2016:931, author = {Jakub Breier and Xiaolu Hou}, title = {Feeding Two Cats with One Bowl: On Designing a Fault and Side-Channel Resistant Software Encoding Scheme (Extended Version)}, howpublished = {Cryptology ePrint Archive, Report 2016/931}, year = {2016}, url = {https://eprint.iacr.org/2016/931}, } @misc{cryptoeprint:2016:932, author = {Jakub Breier and Dirmanto Jap and Shivam Bhasin}, title = {Mistakes Are Proof That You Are Trying: On Verifying Software Encoding Schemes' Resistance to Fault Injection Attacks}, howpublished = {Cryptology ePrint Archive, Report 2016/932}, year = {2016}, url = {https://eprint.iacr.org/2016/932}, } @misc{cryptoeprint:2016:933, author = {Michele Orrù and Emmanuela Orsini and Peter Scholl}, title = {Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection}, howpublished = {Cryptology ePrint Archive, Report 2016/933}, year = {2016}, url = {https://eprint.iacr.org/2016/933}, } @misc{cryptoeprint:2016:934, author = {Prabhanjan Ananth and Aloni Cohen and Abhishek Jain}, title = {Cryptography with Updates}, howpublished = {Cryptology ePrint Archive, Report 2016/934}, year = {2016}, url = {https://eprint.iacr.org/2016/934}, } @misc{cryptoeprint:2016:935, author = {Hannes Gross and Manuel Jelinek and Stefan Mangard and Thomas Unterluggauer and Mario Werner}, title = {Concealing Secrets in Embedded Processors Designs}, howpublished = {Cryptology ePrint Archive, Report 2016/935}, year = {2016}, url = {https://eprint.iacr.org/2016/935}, } @misc{cryptoeprint:2016:936, author = {Vadim N. Tsypyschev}, title = {Linear Complexity of Designs based on Coordinate Sequences of LRS and on Digital Sequences of Matrix/Skew LRS Coordinate Sequences over Galois Ring}, howpublished = {Cryptology ePrint Archive, Report 2016/936}, year = {2016}, url = {https://eprint.iacr.org/2016/936}, } @misc{cryptoeprint:2016:937, author = {Nur Azman Abu and Shekh Faisal Abdul-Latip and Muhammad Rezal Kamel Ariffin}, title = {A Comparative S-Index in Factoring RSA Modulus via Lucas Sequences}, howpublished = {Cryptology ePrint Archive, Report 2016/937}, year = {2016}, url = {https://eprint.iacr.org/2016/937}, } @misc{cryptoeprint:2016:938, author = {Sabyasachi Karati and Palash Sarkar}, title = {Kummer for Genus One over Prime Order Fields}, howpublished = {Cryptology ePrint Archive, Report 2016/938}, year = {2016}, url = {https://eprint.iacr.org/2016/938}, } @misc{cryptoeprint:2016:939, author = {Brice Colombier and Lilian Bossuet, and David Hély and Viktor Fischer}, title = {Key Reconciliation Protocols for Error Correction of Silicon PUF Responses}, howpublished = {Cryptology ePrint Archive, Report 2016/939}, year = {2016}, url = {https://eprint.iacr.org/2016/939}, } @misc{cryptoeprint:2016:940, author = {Arpita Patra and Pratik Sarkar and Ajith Suresh}, title = {Fast Actively Secure OT Extension for Short Secrets}, howpublished = {Cryptology ePrint Archive, Report 2016/940}, year = {2016}, url = {https://eprint.iacr.org/2016/940}, } @misc{cryptoeprint:2016:941, author = {Jian Bai and Dingkang Wang}, title = {A New Class of Differentially 4-uniform Permutations from the Inverse Function}, howpublished = {Cryptology ePrint Archive, Report 2016/941}, year = {2016}, url = {https://eprint.iacr.org/2016/941}, } @misc{cryptoeprint:2016:942, author = {Peeter Laud and Alisa Pankova}, title = {Optimizing Secure Computation Programs with Private Conditionals}, howpublished = {Cryptology ePrint Archive, Report 2016/942}, year = {2016}, url = {https://eprint.iacr.org/2016/942}, } @misc{cryptoeprint:2016:943, author = {Nirvan Tyagi and Yossi Gilad and Derek Leung and Matei Zaharia and Nickolai Zeldovich}, title = {Stadium: A Distributed Metadata-Private Messaging System}, howpublished = {Cryptology ePrint Archive, Report 2016/943}, year = {2016}, url = {https://eprint.iacr.org/2016/943}, } @misc{cryptoeprint:2016:944, author = {Jun Furukawa and Yehuda Lindell and Ariel Nof and Or Weinstein}, title = {High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority}, howpublished = {Cryptology ePrint Archive, Report 2016/944}, year = {2016}, url = {https://eprint.iacr.org/2016/944}, } @misc{cryptoeprint:2016:945, author = {Kostas Papapagiannopoulos}, title = {High throughput in slices: the case of PRESENT, PRINCE and KATAN64 ciphers}, howpublished = {Cryptology ePrint Archive, Report 2016/945}, year = {2016}, url = {https://eprint.iacr.org/2016/945}, } @misc{cryptoeprint:2016:946, author = {Wouter de Groot and Kostas Papagiannopoulos and Antonio de La Piedra and Erik Schneider and Lejla Batina}, title = {Bitsliced Masking and ARM: Friends or Foes?}, howpublished = {Cryptology ePrint Archive, Report 2016/946}, year = {2016}, url = {https://eprint.iacr.org/2016/946}, } @misc{cryptoeprint:2016:947, author = {Ernest Hunter Brooks and Dimitar Jetchev and Benjamin Wesolowski}, title = {Isogeny graphs of ordinary abelian varieties}, howpublished = {Cryptology ePrint Archive, Report 2016/947}, year = {2016}, url = {https://eprint.iacr.org/2016/947}, } @misc{cryptoeprint:2016:948, author = {Foteini Baldimtsi and Dimitrios Papadopoulos and Stavros Papadopoulos and Alessandra Scafuro and Nikos Triandopoulos}, title = {Secure Computation in Online Social Networks}, howpublished = {Cryptology ePrint Archive, Report 2016/948}, year = {2016}, url = {https://eprint.iacr.org/2016/948}, } @misc{cryptoeprint:2016:949, author = {Jongkil Kim and Willy Susilo and Fuchun Guo and Man Ho Au}, title = {Functional Encryption for Computational Hiding in Prime Order Groups via Pair Encodings}, howpublished = {Cryptology ePrint Archive, Report 2016/949}, year = {2016}, url = {https://eprint.iacr.org/2016/949}, } @misc{cryptoeprint:2016:950, author = {Zhongxiang Zheng and Xiaoyun Wang and Guangwu Xu and Yang Yu}, title = {Orthogonalized Lattice Enumeration for Solving SVP}, howpublished = {Cryptology ePrint Archive, Report 2016/950}, year = {2016}, url = {https://eprint.iacr.org/2016/950}, } @misc{cryptoeprint:2016:951, author = {Geoffroy Couteau}, title = {Revisiting Covert Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2016/951}, year = {2016}, url = {https://eprint.iacr.org/2016/951}, } @misc{cryptoeprint:2016:952, author = {Christoph Dobraunig and Maria Eichlseder and Stefan Mangard and Florian Mendel and Thomas Unterluggauer}, title = {ISAP -- Towards Side-Channel Secure Authenticated Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/952}, year = {2016}, url = {https://eprint.iacr.org/2016/952}, } @misc{cryptoeprint:2016:953, author = {Linfeng Zhou}, title = {Collusion-Resistant Broadcast Encryption with Tight Reductions and Beyond}, howpublished = {Cryptology ePrint Archive, Report 2016/953}, year = {2016}, url = {https://eprint.iacr.org/2016/953}, } @misc{cryptoeprint:2016:954, author = {WeiGuo Zhang and Enes Pasalic}, title = {Improving the lower bound on the maximum nonlinearity of 1-resilient Boolean functions and designing functions satisfying all cryptographic criteria}, howpublished = {Cryptology ePrint Archive, Report 2016/954}, year = {2016}, url = {https://eprint.iacr.org/2016/954}, } @misc{cryptoeprint:2016:955, author = {Massimo Bartoletti and Roberto Zunino}, title = {Constant-deposit multiparty lotteries on Bitcoin}, howpublished = {Cryptology ePrint Archive, Report 2016/955}, year = {2016}, url = {https://eprint.iacr.org/2016/955}, } @misc{cryptoeprint:2016:956, author = {Jacques Patarin}, title = {Two Simple Composition Theorems with H-coefficients}, howpublished = {Cryptology ePrint Archive, Report 2016/956}, year = {2016}, url = {https://eprint.iacr.org/2016/956}, } @misc{cryptoeprint:2016:957, author = {Thomas Espitau and Pierre-Alain Fouque and Alexandre Gélin and Paul Kirchner}, title = {Computing generator in cyclotomic integer rings}, howpublished = {Cryptology ePrint Archive, Report 2016/957}, year = {2016}, url = {https://eprint.iacr.org/2016/957}, } @misc{cryptoeprint:2016:958, author = {Michał Zieliński}, title = {SafeDeflate: compression without leaking secrets}, howpublished = {Cryptology ePrint Archive, Report 2016/958}, year = {2016}, url = {https://eprint.iacr.org/2016/958}, } @misc{cryptoeprint:2016:959, author = {Shashank Agrawal and Venkata Koppula and Brent Waters}, title = {Impossibility of Simulation Secure Functional Encryption Even with Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2016/959}, year = {2016}, url = {https://eprint.iacr.org/2016/959}, } @misc{cryptoeprint:2016:960, author = {Gorjan Alagic and Alexander Russell}, title = {Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts}, howpublished = {Cryptology ePrint Archive, Report 2016/960}, year = {2016}, url = {https://eprint.iacr.org/2016/960}, } @misc{cryptoeprint:2016:961, author = {Joshua Fried and Pierrick Gaudry and Nadia Heninger and Emmanuel Thom\'e}, title = {A kilobit hidden SNFS discrete logarithm computation}, howpublished = {Cryptology ePrint Archive, Report 2016/961}, year = {2016}, url = {https://eprint.iacr.org/2016/961}, } @misc{cryptoeprint:2016:962, author = {Nir Bitansky and Huijia Lin and Omer Paneth}, title = {On Removing Graded Encodings from Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/962}, year = {2016}, url = {https://eprint.iacr.org/2016/962}, } @misc{cryptoeprint:2016:963, author = {Craig Costello and David Jao and Patrick Longa and Michael Naehrig and Joost Renes and David Urbanik}, title = {Efficient compression of SIDH public keys}, howpublished = {Cryptology ePrint Archive, Report 2016/963}, year = {2016}, url = {https://eprint.iacr.org/2016/963}, } @misc{cryptoeprint:2016:964, author = {Lorenzo Grassi and Christian Rechberger}, title = {Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE}, howpublished = {Cryptology ePrint Archive, Report 2016/964}, year = {2016}, url = {https://eprint.iacr.org/2016/964}, } @misc{cryptoeprint:2016:965, author = {Maciej Skorski}, title = {A Cryptographic Proof of Regularity Lemmas: Simpler Unified Proofs and Refined Bounds}, howpublished = {Cryptology ePrint Archive, Report 2016/965}, year = {2016}, url = {https://eprint.iacr.org/2016/965}, } @misc{cryptoeprint:2016:966, author = {Bahram Rashidi, Sayed Masoud Sayedi, Reza Rezaeian Farashahi}, title = {High-speed VLSI implementation of Digit-serial Gaussian normal basis Multiplication over GF(2m)}, howpublished = {Cryptology ePrint Archive, Report 2016/966}, year = {2016}, url = {https://eprint.iacr.org/2016/966}, } @misc{cryptoeprint:2016:967, author = {Pei Luo and Yunsi Fei}, title = {Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack}, howpublished = {Cryptology ePrint Archive, Report 2016/967}, year = {2016}, url = {https://eprint.iacr.org/2016/967}, } @misc{cryptoeprint:2016:968, author = {Pei Luo and Chao Luo and Yunsi Fei}, title = {System Clock and Power Supply Cross-Checking for Glitch Detection}, howpublished = {Cryptology ePrint Archive, Report 2016/968}, year = {2016}, url = {https://eprint.iacr.org/2016/968}, } @misc{cryptoeprint:2016:969, author = {Marshall Ball and Tal Malkin and Mike Rosulek}, title = {Garbling Gadgets for Boolean and Arithmetic Circuits}, howpublished = {Cryptology ePrint Archive, Report 2016/969}, year = {2016}, url = {https://eprint.iacr.org/2016/969}, } @misc{cryptoeprint:2016:970, author = {Liwei Zhang; A. Adam Ding; Yunsi Fei; Zhen Hang Jiang}, title = {Statistical Analysis for Access-Driven Cache Attacks Against AES}, howpublished = {Cryptology ePrint Archive, Report 2016/970}, year = {2016}, url = {https://eprint.iacr.org/2016/970}, } @misc{cryptoeprint:2016:971, author = {B. Skoric and P.W.H. Pinkse and A.P. Mosk}, title = {Authenticated communication from Quantum Readout of PUFs}, howpublished = {Cryptology ePrint Archive, Report 2016/971}, year = {2016}, url = {https://eprint.iacr.org/2016/971}, } @misc{cryptoeprint:2016:972, author = {Helene Haagh and Yue Ji and Chenxing Li and Claudio Orlandi and and Yifan Song}, title = {Revealing Encryption for Partial Ordering}, howpublished = {Cryptology ePrint Archive, Report 2016/972}, year = {2016}, url = {https://eprint.iacr.org/2016/972}, } @misc{cryptoeprint:2016:973, author = {Jian Guo and J\'er\'emy Jean and Ivica Nikoli\'c and Kexin Qiao and Yu Sasaki and Siang Meng Sim}, title = {Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs}, howpublished = {Cryptology ePrint Archive, Report 2016/973}, year = {2016}, url = {https://eprint.iacr.org/2016/973}, } @misc{cryptoeprint:2016:974, author = {Khoa Nguyen and Huaxiong Wang and Juanyang Zhang}, title = {Server-Aided Revocable Identity-Based Encryption from Lattices}, howpublished = {Cryptology ePrint Archive, Report 2016/974}, year = {2016}, url = {https://eprint.iacr.org/2016/974}, } @misc{cryptoeprint:2016:975, author = {Gina Gallegos-Garcia and Vincenzo Iovino and Alfredo Rial and Peter B. Roenne and Peter Y. A. Ryan}, title = {(Universal) Unconditional Verifiability in E-Voting without Trusted Parties}, howpublished = {Cryptology ePrint Archive, Report 2016/975}, year = {2016}, url = {https://eprint.iacr.org/2016/975}, } @misc{cryptoeprint:2016:976, author = {Ran Cohen and Chris Peikert}, title = {On Adaptively Secure Multiparty Computation with a Short CRS}, howpublished = {Cryptology ePrint Archive, Report 2016/976}, year = {2016}, url = {https://eprint.iacr.org/2016/976}, } @misc{cryptoeprint:2016:977, author = {Frederik Armknecht and Colin Boyd and Gareth T. Davies and Kristian Gjøsteen and Mohsen Toorani}, title = {Side channels in deduplication: trade-offs between leakage and efficiency}, howpublished = {Cryptology ePrint Archive, Report 2016/977}, year = {2016}, url = {https://eprint.iacr.org/2016/977}, } @misc{cryptoeprint:2016:978, author = {Muhammad Yasin and Ozgur Sinanoglu and Jeyavijayan Rajendran }, title = {Testing the Trustworthiness of IC Testing: An Oracle-less Attack on IC Camouflaging}, howpublished = {Cryptology ePrint Archive, Report 2016/978}, year = {2016}, url = {https://eprint.iacr.org/2016/978}, } @misc{cryptoeprint:2016:979, author = {Zhengjun Cao, Lihua Liu}, title = {The Reason Why Some Divide-and-Conquer Algorithms Cannot Be Efficiently Implemented}, howpublished = {Cryptology ePrint Archive, Report 2016/979}, year = {2016}, url = {https://eprint.iacr.org/2016/979}, } @misc{cryptoeprint:2016:980, author = {Ning Zhang and Kun Sun and Deborah Shands and Wenjing Lou and Y. Thomas Hou}, title = {TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices}, howpublished = {Cryptology ePrint Archive, Report 2016/980}, year = {2016}, url = {https://eprint.iacr.org/2016/980}, } @misc{cryptoeprint:2016:981, author = {Wakaha Ogata and Kaoru Kurosawa}, title = {Efficient No-dictionary Verifiable SSE}, howpublished = {Cryptology ePrint Archive, Report 2016/981}, year = {2016}, url = {https://eprint.iacr.org/2016/981}, } @misc{cryptoeprint:2016:982, author = {Christopher Huth and Daniela Becker and Jorge Guajardo and Paul Duplys and Tim G\"uneysu}, title = {Securing Systems with Scarce Entropy: LWE-Based Lossless Computational Fuzzy Extractor for the IoT}, howpublished = {Cryptology ePrint Archive, Report 2016/982}, year = {2016}, url = {https://eprint.iacr.org/2016/982}, } @misc{cryptoeprint:2016:983, author = {Avijit Dutta and Ashwin Jha and Mridul Nandi}, title = {Exact Security Analysis of Hash-then-Mask Type Probabilistic MAC Constructions}, howpublished = {Cryptology ePrint Archive, Report 2016/983}, year = {2016}, url = {https://eprint.iacr.org/2016/983}, } @misc{cryptoeprint:2016:984, author = {Daniel Dinu and Léo Perrin and Aleksei Udovenko and Vesselin Velichkov and Johann Großschädl and Alex Biryukov}, title = {Design Strategies for ARX with Provable Bounds: SPARX and LAX (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2016/984}, year = {2016}, url = {https://eprint.iacr.org/2016/984}, } @misc{cryptoeprint:2016:985, author = {Dario Fiore and Cédric Fournet and Esha Ghosh and Markulf Kohlweiss and Olga Ohrimenko and Bryan Parno}, title = {Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data}, howpublished = {Cryptology ePrint Archive, Report 2016/985}, year = {2016}, url = {https://eprint.iacr.org/2016/985}, } @misc{cryptoeprint:2016:986, author = {Joppe W. Bos and Simon Friedberger}, title = {Fast Arithmetic Modulo $2^xp^y\pm 1$}, howpublished = {Cryptology ePrint Archive, Report 2016/986}, year = {2016}, url = {https://eprint.iacr.org/2016/986}, } @misc{cryptoeprint:2016:987, author = {Sylvain Guilley and Annelie Heuser and Olivier Rioul}, title = {A Key to Success -- Success Exponents for Side-Channel Distinguishers}, howpublished = {Cryptology ePrint Archive, Report 2016/987}, year = {2016}, url = {https://eprint.iacr.org/2016/987}, } @misc{cryptoeprint:2016:988, author = {Eli Ben-Sasson and Alessandro Chiesa and Michael A. Forbes and Ariel Gabizon and Michael Riabzev and Nicholas Spooner}, title = {Zero Knowledge Protocols from Succinct Constraint Detection}, howpublished = {Cryptology ePrint Archive, Report 2016/988}, year = {2016}, url = {https://eprint.iacr.org/2016/988}, } @misc{cryptoeprint:2016:989, author = {Jo\"el Alwen and Binyi Chen and Krzysztof Pietrzak and Leonid Reyzin and Stefano Tessaro}, title = {Scrypt is Maximally Memory-Hard}, howpublished = {Cryptology ePrint Archive, Report 2016/989}, year = {2016}, url = {https://eprint.iacr.org/2016/989}, } @misc{cryptoeprint:2016:990, author = {Tomer Ashur and Tim Beyne and Vincent Rijmen}, title = {Revisiting the Wrong-Key-Randomization Hypothesis}, howpublished = {Cryptology ePrint Archive, Report 2016/990}, year = {2016}, url = {https://eprint.iacr.org/2016/990}, } @misc{cryptoeprint:2016:991, author = {Juan A. Garay and Aggelos Kiayias and Nikos Leonardos and Giorgos Panagiotakos}, title = {Bootstrapping the Blockchain --- Directly}, howpublished = {Cryptology ePrint Archive, Report 2016/991}, year = {2016}, url = {https://eprint.iacr.org/2016/991}, } @misc{cryptoeprint:2016:992, author = {Matthew Amy and Olivia Di Matteo and Vlad Gheorghiu and Michele Mosca and Alex Parent and John Schanck}, title = {Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3}, howpublished = {Cryptology ePrint Archive, Report 2016/992}, year = {2016}, url = {https://eprint.iacr.org/2016/992}, } @misc{cryptoeprint:2016:993, author = {Liran Lerman and Olivier Markowitch and Nikita Veshchikov}, title = {Comparing Sboxes of Ciphers from the Perspective of Side-Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2016/993}, year = {2016}, url = {https://eprint.iacr.org/2016/993}, } @misc{cryptoeprint:2016:994, author = {Leonid Reyzin and Dmitry Meshkov and Alexander Chepurnoy and Sasha Ivanov}, title = {Improving Authenticated Dynamic Dictionaries, with Applications to Cryptocurrencies}, howpublished = {Cryptology ePrint Archive, Report 2016/994}, year = {2016}, url = {https://eprint.iacr.org/2016/994}, } @misc{cryptoeprint:2016:995, author = {Luke Valenta and David Adrian and Antonio Sanso and Shaanan Cohney and Joshua Fried and Marcella Hastings and J. Alex Halderman and Nadia Heninger}, title = {Measuring small subgroup attacks against Diffie-Hellman}, howpublished = {Cryptology ePrint Archive, Report 2016/995}, year = {2016}, url = {https://eprint.iacr.org/2016/995}, } @misc{cryptoeprint:2016:996, author = {Francesco Berti and François Koeune and Olivier Pereira and Thomas Peters and François-Xavier Standaert}, title = {Leakage-Resilient and Misuse-Resistant Authenticated Encryption}, howpublished = {Cryptology ePrint Archive, Report 2016/996}, year = {2016}, url = {https://eprint.iacr.org/2016/996}, } @misc{cryptoeprint:2016:997, author = {Carsten Baum and Ivan Damgård and Sabine Oechsner and Chris Peikert}, title = {Efficient Commitments and Zero-Knowledge Protocols from Ring-SIS with Applications to Lattice-based Threshold Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2016/997}, year = {2016}, url = {https://eprint.iacr.org/2016/997}, } @misc{cryptoeprint:2016:998, author = {Yilei Chen and Craig Gentry and Shai Halevi}, title = {Cryptanalyses of Candidate Branching Program Obfuscators}, howpublished = {Cryptology ePrint Archive, Report 2016/998}, year = {2016}, url = {https://eprint.iacr.org/2016/998}, } @misc{cryptoeprint:2016:999, author = {Kristen Dorey and Nicholas Chang-Fong and Aleksander Essex}, title = {Indiscreet Logs: Persistent Diffie-Hellman Backdoors in TLS}, howpublished = {Cryptology ePrint Archive, Report 2016/999}, year = {2016}, url = {https://eprint.iacr.org/2016/999}, } @misc{cryptoeprint:2017:001, author = {Jorge Luis Villar}, title = {Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems}, howpublished = {Cryptology ePrint Archive, Report 2017/001}, year = {2017}, url = {https://eprint.iacr.org/2017/001}, } @misc{cryptoeprint:2017:002, author = {Ping Zhang, Honggang Hu, and Peng Wang}, title = {Generalized Tweakable Even-Mansour Cipher with Strong Security Guarantee and Its Application to Authenticated Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/002}, year = {2017}, url = {https://eprint.iacr.org/2017/002}, } @misc{cryptoeprint:2017:003, author = {Mike Hamburg}, title = {The STROBE protocol framework}, howpublished = {Cryptology ePrint Archive, Report 2017/003}, year = {2017}, url = {https://eprint.iacr.org/2017/003}, } @misc{cryptoeprint:2017:004, author = {Sungwook Kim and Jinsu Kim and Jae Hong Seo}, title = {A New Approach for Practical Function-Private Inner Product Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/004}, year = {2017}, url = {https://eprint.iacr.org/2017/004}, } @misc{cryptoeprint:2017:005, author = {Bahram Rashidi, Reza Rezaeian Farashahi, Sayed Masoud Sayedi}, title = {High-speed Hardware Implementations of Point Multiplication for Binary Edwards and Generalized Hessian Curves }, howpublished = {Cryptology ePrint Archive, Report 2017/005}, year = {2017}, url = {https://eprint.iacr.org/2017/005}, } @misc{cryptoeprint:2017:006, author = {Eduardo Ruiz Duarte}, title = {Reduced Mumford divisors of a genus 2 curve through its jacobian function field}, howpublished = {Cryptology ePrint Archive, Report 2017/006}, year = {2017}, url = {https://eprint.iacr.org/2017/006}, } @misc{cryptoeprint:2017:007, author = {Hossein Arabnezhad-Khanoki and Babak Sadeghiyan and Josef Pieprzyk}, title = {Algebraic Attack Efficiency versus S-box Representation}, howpublished = {Cryptology ePrint Archive, Report 2017/007}, year = {2017}, url = {https://eprint.iacr.org/2017/007}, } @misc{cryptoeprint:2017:008, author = {Joshua Gancher and Adam Groce and Alex Ledger}, title = {Externally Verifiable Oblivious RAM}, howpublished = {Cryptology ePrint Archive, Report 2017/008}, year = {2017}, url = {https://eprint.iacr.org/2017/008}, } @misc{cryptoeprint:2017:009, author = {Georg Fuchsbauer and Romain Gay and Lucas Kowalczyk and Claudio Orlandi}, title = {Access Control Encryption for Equality, Comparison, and More}, howpublished = {Cryptology ePrint Archive, Report 2017/009}, year = {2017}, url = {https://eprint.iacr.org/2017/009}, } @misc{cryptoeprint:2017:010, author = {Wutichai Chongchitmate and Rafail Ostrovsky}, title = {Circuit-Private Multi-Key FHE}, howpublished = {Cryptology ePrint Archive, Report 2017/010}, year = {2017}, url = {https://eprint.iacr.org/2017/010}, } @misc{cryptoeprint:2017:011, author = {Jan Camenisch and David Derler and Stephan Krenn and Henrich C. Pöhls and Kai Samelin and Daniel Slamanig}, title = {Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures}, howpublished = {Cryptology ePrint Archive, Report 2017/011}, year = {2017}, url = {https://eprint.iacr.org/2017/011}, } @misc{cryptoeprint:2017:012, author = {Venkata Koppula and Andrew Poelstra and Brent Waters}, title = {Universal Samplers with Fast Verification}, howpublished = {Cryptology ePrint Archive, Report 2017/012}, year = {2017}, url = {https://eprint.iacr.org/2017/012}, } @misc{cryptoeprint:2017:013, author = {Meilof Veeningen}, title = {Pinocchio-Based Adaptive zk-SNARKs and Secure/Correct Adaptive Function Evaluation}, howpublished = {Cryptology ePrint Archive, Report 2017/013}, year = {2017}, url = {https://eprint.iacr.org/2017/013}, } @misc{cryptoeprint:2017:014, author = {Tommaso Gagliardoni and Nikolaos P. Karvelas and Stefan Katzenbeisser}, title = {ORAMs in a Quantum World}, howpublished = {Cryptology ePrint Archive, Report 2017/014}, year = {2017}, url = {https://eprint.iacr.org/2017/014}, } @misc{cryptoeprint:2017:015, author = {Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi}, title = {Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-Malleable Codes}, howpublished = {Cryptology ePrint Archive, Report 2017/015}, year = {2017}, url = {https://eprint.iacr.org/2017/015}, } @misc{cryptoeprint:2017:016, author = {Yevgeniy Dodis and Jonathan Katz and John Steinberger and Aishwarya Thiruvengadam and Zhe Zhang}, title = {Provable Security of Substitution-Permutation Networks}, howpublished = {Cryptology ePrint Archive, Report 2017/016}, year = {2017}, url = {https://eprint.iacr.org/2017/016}, } @misc{cryptoeprint:2017:017, author = {Gottfried Herold and Elena Kirshanova}, title = {Improved Algorithms for the Approximate k-List Problem in Euclidean Norm}, howpublished = {Cryptology ePrint Archive, Report 2017/017}, year = {2017}, url = {https://eprint.iacr.org/2017/017}, } @misc{cryptoeprint:2017:018, author = {Nir Bitansky}, title = {Verifiable Random Functions from Non-Interactive Witness-Indistinguishable Proofs}, howpublished = {Cryptology ePrint Archive, Report 2017/018}, year = {2017}, url = {https://eprint.iacr.org/2017/018}, } @misc{cryptoeprint:2017:019, author = {Loi Luu and Yaron Velner and Jason Teutsch and Prateek Saxena}, title = {SmartPool: Practical Decentralized Pooled Mining}, howpublished = {Cryptology ePrint Archive, Report 2017/019}, year = {2017}, url = {https://eprint.iacr.org/2017/019}, } @misc{cryptoeprint:2017:020, author = {Olivier Levillain and Maxence Tury and Nicolas Vivet}, title = {concerto: A Methodology Towards Reproducible Analyses of TLS Datasets}, howpublished = {Cryptology ePrint Archive, Report 2017/020}, year = {2017}, url = {https://eprint.iacr.org/2017/020}, } @misc{cryptoeprint:2017:021, author = {Rishab Goyal and Susan Hohenberger and Venkata Koppula and Brent Waters}, title = {A Generic Approach to Constructing and Proving Verifiable Random Functions}, howpublished = {Cryptology ePrint Archive, Report 2017/021}, year = {2017}, url = {https://eprint.iacr.org/2017/021}, } @misc{cryptoeprint:2017:022, author = {Jan Camenisch and Anja Lehmann}, title = {Privacy for Distributed Databases via (Un)linkable Pseudonyms}, howpublished = {Cryptology ePrint Archive, Report 2017/022}, year = {2017}, url = {https://eprint.iacr.org/2017/022}, } @misc{cryptoeprint:2017:023, author = {Nuttapong Attrapadung}, title = {Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits}, howpublished = {Cryptology ePrint Archive, Report 2017/023}, year = {2017}, url = {https://eprint.iacr.org/2017/023}, } @misc{cryptoeprint:2017:024, author = {Mohamed Ahmed Abdelraheem and Tobias Andersson and Christian Gehrmann}, title = {Searchable Encrypted Relational Databases: Risks and Countermeasures}, howpublished = {Cryptology ePrint Archive, Report 2017/024}, year = {2017}, url = {https://eprint.iacr.org/2017/024}, } @misc{cryptoeprint:2017:025, author = {Charanjit S. Jutla and Arnab Roy}, title = {Improved Structure Preserving Signatures under Standard Bilinear Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2017/025}, year = {2017}, url = {https://eprint.iacr.org/2017/025}, } @misc{cryptoeprint:2017:026, author = {Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam}, title = {Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model}, howpublished = {Cryptology ePrint Archive, Report 2017/026}, year = {2017}, url = {https://eprint.iacr.org/2017/026}, } @misc{cryptoeprint:2017:027, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, title = {Scalable Multi-Party Private Set-Intersection}, howpublished = {Cryptology ePrint Archive, Report 2017/027}, year = {2017}, url = {https://eprint.iacr.org/2017/027}, } @misc{cryptoeprint:2017:028, author = {Varun Chandrasekaran and Lakshminarayanan Subramanian}, title = {A Decentralized PKI In A Mobile Ecosystem}, howpublished = {Cryptology ePrint Archive, Report 2017/028}, year = {2017}, url = {https://eprint.iacr.org/2017/028}, } @misc{cryptoeprint:2017:029, author = {Gene Itkis and Emily Shen and Mayank Varia and David Wilson and Arkady Yerukhimovich}, title = {Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2017/029}, year = {2017}, url = {https://eprint.iacr.org/2017/029}, } @misc{cryptoeprint:2017:030, author = {Xiao Wang and Samuel Ranellucci and Jonathan Katz}, title = {Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2017/030}, year = {2017}, url = {https://eprint.iacr.org/2017/030}, } @misc{cryptoeprint:2017:031, author = {Marc Beunardeau and Houda Ferradi and Rémi Géraud and David Naccache}, title = {Honey Encryption for Language}, howpublished = {Cryptology ePrint Archive, Report 2017/031}, year = {2017}, url = {https://eprint.iacr.org/2017/031}, } @misc{cryptoeprint:2017:032, author = {Mohamed Sabt and Jacques Traoré}, title = {Cryptanalysis of GlobalPlatform Secure Channel Protocols}, howpublished = {Cryptology ePrint Archive, Report 2017/032}, year = {2017}, url = {https://eprint.iacr.org/2017/032}, } @misc{cryptoeprint:2017:033, author = {Peter Pessl}, title = {Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures}, howpublished = {Cryptology ePrint Archive, Report 2017/033}, year = {2017}, url = {https://eprint.iacr.org/2017/033}, } @misc{cryptoeprint:2017:034, author = {Alex Biryukov and Aleksei Udovenko and Vesselin Velichkov}, title = {Analysis of the NORX Core Permutation}, howpublished = {Cryptology ePrint Archive, Report 2017/034}, year = {2017}, url = {https://eprint.iacr.org/2017/034}, } @misc{cryptoeprint:2017:035, author = {Hervé Chabanne and Amaury de Wargny and Jonathan Milgram and Constance Morel and Emmanuel Prouff}, title = {Privacy-Preserving Classification on Deep Neural Network}, howpublished = {Cryptology ePrint Archive, Report 2017/035}, year = {2017}, url = {https://eprint.iacr.org/2017/035}, } @misc{cryptoeprint:2017:036, author = {Benny Applebaum and Naama Haramaty and Yuval Ishai and Eyal Kushilevitz and Vinod Vaikuntanathan}, title = {Low-Complexity Cryptographic Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2017/036}, year = {2017}, url = {https://eprint.iacr.org/2017/036}, } @misc{cryptoeprint:2017:037, author = {Daniel J. Bernstein and Chitchanok Chuengsatiansup and Tanja Lange}, title = {Double-base scalar multiplication revisited}, howpublished = {Cryptology ePrint Archive, Report 2017/037}, year = {2017}, url = {https://eprint.iacr.org/2017/037}, } @misc{cryptoeprint:2017:038, author = {Fabrice Benhamouda and Florian Bourse and Helger Lipmaa}, title = {CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2017/038}, year = {2017}, url = {https://eprint.iacr.org/2017/038}, } @misc{cryptoeprint:2017:039, author = {Iraklis Symeonidis, Abdelrahaman Aly, Mustafa A. Mustafa, Bart Mennink, Siemen Dhooghe, Bart Preneel}, title = {SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2017/039}, year = {2017}, url = {https://eprint.iacr.org/2017/039}, } @misc{cryptoeprint:2017:040, author = {Aggelos Kiayias and Feng-Hao Liu and Yiannis Tselekounis}, title = {Practical Non-Malleable Codes from $\ell$-more Extractable Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2017/040}, year = {2017}, url = {https://eprint.iacr.org/2017/040}, } @misc{cryptoeprint:2017:041, author = {Yongge Wang and Qutaibah m. Malluhi}, title = {Reducing Garbled Circuit Size While Preserving Circuit Gate Privacy}, howpublished = {Cryptology ePrint Archive, Report 2017/041}, year = {2017}, url = {https://eprint.iacr.org/2017/041}, } @misc{cryptoeprint:2017:042, author = {Yuanxi Dai and Yannick Seurin and John Steinberger and Aishwarya Thiruvengadam}, title = {Indifferentiability of Iterated Even-Mansour Ciphers with Non-Idealized Key-Schedules: Five Rounds are Necessary and Sufficient}, howpublished = {Cryptology ePrint Archive, Report 2017/042}, year = {2017}, url = {https://eprint.iacr.org/2017/042}, } @misc{cryptoeprint:2017:043, author = {Foteini Baldimtsi and Jan Camenisch and Maria Dubovitskaya and Anna Lysyanskaya and Leonid Reyzin and Kai Samelin and Sophia Yakoubov}, title = {Accumulators with Applications to Anonymity-Preserving Revocation}, howpublished = {Cryptology ePrint Archive, Report 2017/043}, year = {2017}, url = {https://eprint.iacr.org/2017/043}, } @misc{cryptoeprint:2017:044, author = {Matthew McKague and David Eyers}, title = {Anonymous contribution of data}, howpublished = {Cryptology ePrint Archive, Report 2017/044}, year = {2017}, url = {https://eprint.iacr.org/2017/044}, } @misc{cryptoeprint:2017:045, author = {Essam Ghadafi}, title = {Efficient Round-Optimal Blind Signatures in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2017/045}, year = {2017}, url = {https://eprint.iacr.org/2017/045}, } @misc{cryptoeprint:2017:046, author = {Matthieu Giraud and Alexandre Anzala-Yamajako and Olivier Bernard and Pascal Lafourcade}, title = {Practical Passive Leakage-Abuse Attacks Against Symmetric Searchable Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/046}, year = {2017}, url = {https://eprint.iacr.org/2017/046}, } @misc{cryptoeprint:2017:047, author = {Martin R. Albrecht}, title = {On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL}, howpublished = {Cryptology ePrint Archive, Report 2017/047}, year = {2017}, url = {https://eprint.iacr.org/2017/047}, } @misc{cryptoeprint:2017:048, author = {Sinisa Matetic and Mansoor Ahmed and Kari Kostiainen and Aritra Dhar and David Sommer and Arthur Gervais and Ari Juels and Srdjan Capkun}, title = {ROTE: Rollback Protection for Trusted Execution}, howpublished = {Cryptology ePrint Archive, Report 2017/048}, year = {2017}, url = {https://eprint.iacr.org/2017/048}, } @misc{cryptoeprint:2017:049, author = {El Bansarkhani Rachid}, title = {LARA - A Design Concept for Lattice-based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/049}, year = {2017}, url = {https://eprint.iacr.org/2017/049}, } @misc{cryptoeprint:2017:050, author = {Peter T. Breuer}, title = {An Obfuscating Compiler}, howpublished = {Cryptology ePrint Archive, Report 2017/050}, year = {2017}, url = {https://eprint.iacr.org/2017/050}, } @misc{cryptoeprint:2017:051, author = {Saikrishna Badrinarayanan and Vipul Goyal and Aayush Jain and Amit Sahai}, title = {A note on VRFs from Verifiable Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/051}, year = {2017}, url = {https://eprint.iacr.org/2017/051}, } @misc{cryptoeprint:2017:052, author = {Boris Skoric}, title = {A short note on the security of Round-Robin Differential Phase-Shift QKD}, howpublished = {Cryptology ePrint Archive, Report 2017/052}, year = {2017}, url = {https://eprint.iacr.org/2017/052}, } @misc{cryptoeprint:2017:053, author = {Dimitar Jetchev and Benjamin Wesolowski}, title = {Horizontal isogeny graphs of ordinary abelian varieties and the discrete logarithm problem}, howpublished = {Cryptology ePrint Archive, Report 2017/053}, year = {2017}, url = {https://eprint.iacr.org/2017/053}, } @misc{cryptoeprint:2017:054, author = {Javier Herranz}, title = {Attribute-Based Encryption Implies Identity-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/054}, year = {2017}, url = {https://eprint.iacr.org/2017/054}, } @misc{cryptoeprint:2017:055, author = {Prabhat Kushwaha and Ayan Mahalanobis}, title = {A Probabilistic Baby-Step Giant-Step Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2017/055}, year = {2017}, url = {https://eprint.iacr.org/2017/055}, } @misc{cryptoeprint:2017:056, author = {Feng Hao and Dylan Clarke and Brian Randell and Siamak F. Shahandashti}, title = {Verifiable Classroom Voting in Practice}, howpublished = {Cryptology ePrint Archive, Report 2017/056}, year = {2017}, url = {https://eprint.iacr.org/2017/056}, } @misc{cryptoeprint:2017:057, author = {Mathias Wagner and Stefan Heyse}, title = {Single--Trace Template Attack on the DES Round Keys of a Recent Smart Card}, howpublished = {Cryptology ePrint Archive, Report 2017/057}, year = {2017}, url = {https://eprint.iacr.org/2017/057}, } @misc{cryptoeprint:2017:058, author = {Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E Gunnells}, title = {WalnutDSA(TM): A Quantum-Resistant Digital Signature Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2017/058}, year = {2017}, url = {https://eprint.iacr.org/2017/058}, } @misc{cryptoeprint:2017:059, author = {Kamalesh Acharya and Ratna Dutta}, title = {Adaptively Secure Recipient Revocable Broadcast Encryption with Constant size Ciphertext}, howpublished = {Cryptology ePrint Archive, Report 2017/059}, year = {2017}, url = {https://eprint.iacr.org/2017/059}, } @misc{cryptoeprint:2017:060, author = {Jacqueline Brendel and Marc Fischlin}, title = {Zero Round-Trip Time for the Extended Access Control Protocol}, howpublished = {Cryptology ePrint Archive, Report 2017/060}, year = {2017}, url = {https://eprint.iacr.org/2017/060}, } @misc{cryptoeprint:2017:061, author = {Tibor Jager and Rafael Kurek}, title = {Continuous Collision Resistance and its Applications}, howpublished = {Cryptology ePrint Archive, Report 2017/061}, year = {2017}, url = {https://eprint.iacr.org/2017/061}, } @misc{cryptoeprint:2017:062, author = {Arash Afshar and Payman Mohassel and Mike Rosulek}, title = {Efficient Maliciously Secure Two Party Computation for Mixed Programs}, howpublished = {Cryptology ePrint Archive, Report 2017/062}, year = {2017}, url = {https://eprint.iacr.org/2017/062}, } @misc{cryptoeprint:2017:063, author = {Chaya Ganesh and Arpita Patra}, title = {Optimal Extension Protocols for Byzantine Broadcast and Agreement}, howpublished = {Cryptology ePrint Archive, Report 2017/063}, year = {2017}, url = {https://eprint.iacr.org/2017/063}, } @misc{cryptoeprint:2017:064, author = {Yin Li and Yu Zhang}, title = {Fast Montgomery-like Square Root Computation over $GF(2^m)$ for All Trinomials}, howpublished = {Cryptology ePrint Archive, Report 2017/064}, year = {2017}, url = {https://eprint.iacr.org/2017/064}, } @misc{cryptoeprint:2017:065, author = {Daniel Benarroch and Zvika Brakerski and Tancrède Lepoint}, title = {FHE Over the Integers: Decomposed and Batched in the Post-Quantum Regime}, howpublished = {Cryptology ePrint Archive, Report 2017/065}, year = {2017}, url = {https://eprint.iacr.org/2017/065}, } @misc{cryptoeprint:2017:066, author = {Seiko Arita and Sari Handa}, title = {Subring Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/066}, year = {2017}, url = {https://eprint.iacr.org/2017/066}, } @misc{cryptoeprint:2017:067, author = {Thorsten Kleinjung and Claus Diem and Arjen K. Lenstra and Christine Priplata and Colin Stahlke}, title = {Computation of a 768-bit prime field discrete logarithm}, howpublished = {Cryptology ePrint Archive, Report 2017/067}, year = {2017}, url = {https://eprint.iacr.org/2017/067}, } @misc{cryptoeprint:2017:068, author = {Guy Barwell and Daniel P. Martin and Elisabeth Oswald and Martijn Stam}, title = {Authenticated Encryption in the Face of Protocol and Side Channel Leakage}, howpublished = {Cryptology ePrint Archive, Report 2017/068}, year = {2017}, url = {https://eprint.iacr.org/2017/068}, } @misc{cryptoeprint:2017:069, author = {Peter Gaži and Krzysztof Pietrzak and Michal Rybár}, title = {The Exact Security of PMAC}, howpublished = {Cryptology ePrint Archive, Report 2017/069}, year = {2017}, url = {https://eprint.iacr.org/2017/069}, } @misc{cryptoeprint:2017:070, author = {Charlie Jacomme and Steve Kremer and Guillaume Scerri}, title = {Symbolic Models for Isolated Execution Environments}, howpublished = {Cryptology ePrint Archive, Report 2017/070}, year = {2017}, url = {https://eprint.iacr.org/2017/070}, } @misc{cryptoeprint:2017:071, author = {Seojin Kim, HyungChul Kang, Deukjo Hong, Jaechul Sung, Seokhie Hong}, title = {Efficient Differential Trail Searching Algorithm for ARX Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2017/071}, year = {2017}, url = {https://eprint.iacr.org/2017/071}, } @misc{cryptoeprint:2017:072, author = {Carmen Kempka and Ryo Kikuchi and Koutarou Suzuki}, title = {How to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling Schemes}, howpublished = {Cryptology ePrint Archive, Report 2017/072}, year = {2017}, url = {https://eprint.iacr.org/2017/072}, } @misc{cryptoeprint:2017:073, author = {Ji Won Yoon, Hyoungshick Kim, Hyun-Ju Jo, Hyelim Lee and Kwangsu Lee}, title = {Visual Honey Encryption: Application to Steganography}, howpublished = {Cryptology ePrint Archive, Report 2017/073}, year = {2017}, url = {https://eprint.iacr.org/2017/073}, } @misc{cryptoeprint:2017:074, author = {Joo-Im Kim and Ji Won Yoon}, title = {Honey Chatting: A novel instant messaging system robust to eavesdropping over communication}, howpublished = {Cryptology ePrint Archive, Report 2017/074}, year = {2017}, url = {https://eprint.iacr.org/2017/074}, } @misc{cryptoeprint:2017:075, author = {Benjamin Lac and Marc Beunardeau and Anne Canteaut and Jacques Fournier and Renaud Sirdey}, title = {A First DFA on PRIDE: from Theory to Practice (extended version)}, howpublished = {Cryptology ePrint Archive, Report 2017/075}, year = {2017}, url = {https://eprint.iacr.org/2017/075}, } @misc{cryptoeprint:2017:076, author = {Benjamin Lac and Anne Canteaut and Jacques Fournier and Renaud Sirdey}, title = {DFA on LS-Designs with a Practical Implementation on SCREAM (extended version)}, howpublished = {Cryptology ePrint Archive, Report 2017/076}, year = {2017}, url = {https://eprint.iacr.org/2017/076}, } @misc{cryptoeprint:2017:077, author = {Martin Ekerå and Johan Håstad}, title = {Quantum algorithms for computing short discrete logarithms and factoring RSA integers}, howpublished = {Cryptology ePrint Archive, Report 2017/077}, year = {2017}, url = {https://eprint.iacr.org/2017/077}, } @misc{cryptoeprint:2017:078, author = {Andre Esser and Robert Kübler and Alexander May}, title = {LPN Decoded}, howpublished = {Cryptology ePrint Archive, Report 2017/078}, year = {2017}, url = {https://eprint.iacr.org/2017/078}, } @misc{cryptoeprint:2017:079, author = {Jung Hee Cheon and Kyoohyung Han and Duhyeong Kim}, title = {Faster Bootstrapping of FHE over the Integers}, howpublished = {Cryptology ePrint Archive, Report 2017/079}, year = {2017}, url = {https://eprint.iacr.org/2017/079}, } @misc{cryptoeprint:2017:080, author = {Ilan Komargodski and Gil Segev}, title = {From Minicrypt to Obfustopia via Private-Key Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/080}, year = {2017}, url = {https://eprint.iacr.org/2017/080}, } @misc{cryptoeprint:2017:081, author = {Ivo Kubjas and Tiit Pikma and Jan Willemson}, title = {Estonian Voting Verification Mechanism Revisited Again}, howpublished = {Cryptology ePrint Archive, Report 2017/081}, year = {2017}, url = {https://eprint.iacr.org/2017/081}, } @misc{cryptoeprint:2017:082, author = {Marc Fischlin and Felix Günther}, title = {Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates}, howpublished = {Cryptology ePrint Archive, Report 2017/082}, year = {2017}, url = {https://eprint.iacr.org/2017/082}, } @misc{cryptoeprint:2017:083, author = {Anna Johnston}, title = {Shor's Algorithm and Factoring: Don't Throw Away the Odd Orders}, howpublished = {Cryptology ePrint Archive, Report 2017/083}, year = {2017}, url = {https://eprint.iacr.org/2017/083}, } @misc{cryptoeprint:2017:084, author = {Laszlo Hars}, title = {Hardware Bit-Mixers}, howpublished = {Cryptology ePrint Archive, Report 2017/084}, year = {2017}, url = {https://eprint.iacr.org/2017/084}, } @misc{cryptoeprint:2017:085, author = {Laszlo Hars}, title = {Information Security Applications of Bit-Mixers}, howpublished = {Cryptology ePrint Archive, Report 2017/085}, year = {2017}, url = {https://eprint.iacr.org/2017/085}, } @misc{cryptoeprint:2017:086, author = {David Derler and Sebastian Ramacher and Daniel Slamanig}, title = {Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation}, howpublished = {Cryptology ePrint Archive, Report 2017/086}, year = {2017}, url = {https://eprint.iacr.org/2017/086}, } @misc{cryptoeprint:2017:087, author = {Sabyasachi Dey and Santanu Sarkar}, title = {Cryptanalysis of full round Fruit}, howpublished = {Cryptology ePrint Archive, Report 2017/087}, year = {2017}, url = {https://eprint.iacr.org/2017/087}, } @misc{cryptoeprint:2017:088, author = {Subhamoy Maitra, Akhilesh Siddhanti}, title = {A Differential Fault Attack on Plantlet}, howpublished = {Cryptology ePrint Archive, Report 2017/088}, year = {2017}, url = {https://eprint.iacr.org/2017/088}, } @misc{cryptoeprint:2017:089, author = {Yuri Borissov, and Peter Boyvalenkov, and Robert Tsenkov}, title = {On a Linear Cryptanalysis of a Family of Modified DES Ciphers with Even Weight S-boxes}, howpublished = {Cryptology ePrint Archive, Report 2017/089}, year = {2017}, url = {https://eprint.iacr.org/2017/089}, } @misc{cryptoeprint:2017:090, author = {Saiyu Qi and Yichen Li and Yuanqing Zheng and Yong Qi}, title = {Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud}, howpublished = {Cryptology ePrint Archive, Report 2017/090}, year = {2017}, url = {https://eprint.iacr.org/2017/090}, } @misc{cryptoeprint:2017:091, author = {Vincent Herbert and Bhaskar Biswas and Caroline Fontaine}, title = {Design and Implementation of Low Depth Pairing-based Homomorphic Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2017/091}, year = {2017}, url = {https://eprint.iacr.org/2017/091}, } @misc{cryptoeprint:2017:092, author = {Atsushi Takayasu and Yao Lu and Liqiang Peng}, title = {Small CRT-Exponent RSA Revisited}, howpublished = {Cryptology ePrint Archive, Report 2017/092}, year = {2017}, url = {https://eprint.iacr.org/2017/092}, } @misc{cryptoeprint:2017:093, author = {Vasyl Ustimenko}, title = {On new multivariate cryptosystems based on hidden Eulerian equations over finite fields}, howpublished = {Cryptology ePrint Archive, Report 2017/093}, year = {2017}, url = {https://eprint.iacr.org/2017/093}, } @misc{cryptoeprint:2017:094, author = {Shalev Ben-David and Or Sattath}, title = {Quantum Tokens for Digital Signatures}, howpublished = {Cryptology ePrint Archive, Report 2017/094}, year = {2017}, url = {https://eprint.iacr.org/2017/094}, } @misc{cryptoeprint:2017:095, author = {Gunnar Hartung}, title = {Attacks on Secure Logging Schemes}, howpublished = {Cryptology ePrint Archive, Report 2017/095}, year = {2017}, url = {https://eprint.iacr.org/2017/095}, } @misc{cryptoeprint:2017:096, author = {Shota Yamada}, title = {Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalized Partitioning Techniques}, howpublished = {Cryptology ePrint Archive, Report 2017/096}, year = {2017}, url = {https://eprint.iacr.org/2017/096}, } @misc{cryptoeprint:2017:097, author = {Claude Carlet and Pierrick M\'eaux and Yann Rotella}, title = {Boolean functions with restricted input and their robustness; application to the FLIP cipher}, howpublished = {Cryptology ePrint Archive, Report 2017/097}, year = {2017}, url = {https://eprint.iacr.org/2017/097}, } @misc{cryptoeprint:2017:098, author = {Vanesa Daza and Nikolaos Makriyannis}, title = {Designing Fully Secure Protocols for Secure Two-Party Computation of Constant-Domain Functions}, howpublished = {Cryptology ePrint Archive, Report 2017/098}, year = {2017}, url = {https://eprint.iacr.org/2017/098}, } @misc{cryptoeprint:2017:099, author = {Dimitrios Papadopoulos and Duane Wessels and Shumon Huque and Moni Naor and Jan V\v{c}el\'ak and Leonid Reyzin and Sharon Goldberg }, title = {Making NSEC5 Practical for DNSSEC}, howpublished = {Cryptology ePrint Archive, Report 2017/099}, year = {2017}, url = {https://eprint.iacr.org/2017/099}, } @misc{cryptoeprint:2017:1000, author = {Hemi Leibowitz and Ania Piotrowska and George Danezis and Amir Herzberg}, title = {No right to remain silent: Isolating Malicious Mixes}, howpublished = {Cryptology ePrint Archive, Report 2017/1000}, year = {2017}, url = {https://eprint.iacr.org/2017/1000}, } @misc{cryptoeprint:2017:1001, author = {Mark Zhandry and Cong Zhang}, title = {Impossibility of Order-Revealing Encryption in Idealized Models}, howpublished = {Cryptology ePrint Archive, Report 2017/1001}, year = {2017}, url = {https://eprint.iacr.org/2017/1001}, } @misc{cryptoeprint:2017:1002, author = {Zhe Li and San Ling and Chaoping Xing and Sze Ling Yeo}, title = {On the Closest Vector Problem for Lattices Constructed from Polynomials and Their Cryptographic Applications}, howpublished = {Cryptology ePrint Archive, Report 2017/1002}, year = {2017}, url = {https://eprint.iacr.org/2017/1002}, } @misc{cryptoeprint:2017:1003, author = {Varsha Dani and Valerie King and Mahnush Movahedi and Jared Saia and Mahdi Zamani}, title = {Secure Multi-Party Computation in Large Networks}, howpublished = {Cryptology ePrint Archive, Report 2017/1003}, year = {2017}, url = {https://eprint.iacr.org/2017/1003}, } @misc{cryptoeprint:2017:1004, author = {Sanjam Garg and Akshayaram Srinivasan}, title = {Garbled Protocols and Two-Round MPC from Bilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2017/1004}, year = {2017}, url = {https://eprint.iacr.org/2017/1004}, } @misc{cryptoeprint:2017:1005, author = {Tsunekazu Saito and Keita Xagawa and Takashi Yamakawa}, title = {Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2017/1005}, year = {2017}, url = {https://eprint.iacr.org/2017/1005}, } @misc{cryptoeprint:2017:1006, author = {Ashish Choudhury and Arpita Patra and Divya Ravi}, title = {Round and Communication Efficient Unconditionally-secure MPC with $t < n/3$ in Partially Synchronous Network}, howpublished = {Cryptology ePrint Archive, Report 2017/1006}, year = {2017}, url = {https://eprint.iacr.org/2017/1006}, } @misc{cryptoeprint:2017:1007, author = {Herman Galteland and Kristian Gjøsteen}, title = {Malware encryption schemes - rerandomizable ciphertexts encrypted using environmental keys}, howpublished = {Cryptology ePrint Archive, Report 2017/1007}, year = {2017}, url = {https://eprint.iacr.org/2017/1007}, } @misc{cryptoeprint:2017:1008, author = {Sayandeep Saha and Dirmanto Jap and Sikhar Patranabis and Debdeep Mukhopadhyay and Shivam Bhasin and Pallab Dasgupta}, title = {Automatic Characterization of Exploitable Faults: A Machine Learning Approach}, howpublished = {Cryptology ePrint Archive, Report 2017/1008}, year = {2017}, url = {https://eprint.iacr.org/2017/1008}, } @misc{cryptoeprint:2017:1009, author = {Gabriel Gallin and Turku Ozlum Celik and Arnaud Tisserand}, title = {Architecture level Optimizations for Kummer based HECC on FPGAs}, howpublished = {Cryptology ePrint Archive, Report 2017/1009}, year = {2017}, url = {https://eprint.iacr.org/2017/1009}, } @misc{cryptoeprint:2017:100, author = {Dan Boneh and Sam Kim and Hart Montgomery}, title = {Private Puncturable PRFs From Standard Lattice Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2017/100}, year = {2017}, url = {https://eprint.iacr.org/2017/100}, } @misc{cryptoeprint:2017:1010, author = {Jun Liu and Yupu Hu}, title = {A New Digital Rights Management Solution Based on White-Box Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2017/1010}, year = {2017}, url = {https://eprint.iacr.org/2017/1010}, } @misc{cryptoeprint:2017:1011, author = {Eduard Hauck and Julian Loss}, title = {Efficient and Universally Composable Protocols for Oblivious Transfer from the CDH Assumption}, howpublished = {Cryptology ePrint Archive, Report 2017/1011}, year = {2017}, url = {https://eprint.iacr.org/2017/1011}, } @misc{cryptoeprint:2017:1012, author = {Wenquan Bi and Zheng Li and Xiaoyang Dong and Lu Li and Xiaoyun Wang}, title = {Conditional Cube Attack on Round-Reduced River Keyak}, howpublished = {Cryptology ePrint Archive, Report 2017/1012}, year = {2017}, url = {https://eprint.iacr.org/2017/1012}, } @misc{cryptoeprint:2017:1013, author = {Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren}, title = {Homomorphic SIMMD Operations: Single Instruction Much More Data}, howpublished = {Cryptology ePrint Archive, Report 2017/1013}, year = {2017}, url = {https://eprint.iacr.org/2017/1013}, } @misc{cryptoeprint:2017:1014, author = {Damian Poddebniak and Juraj Somorovsky and Sebastian Schinzel and Manfred Lochter and Paul Rösler}, title = {Attacking Deterministic Signature Schemes using Fault Attacks}, howpublished = {Cryptology ePrint Archive, Report 2017/1014}, year = {2017}, url = {https://eprint.iacr.org/2017/1014}, } @misc{cryptoeprint:2017:1015, author = {Armando Faz-Hern\'andez and Julio L\'opez and Eduardo Ochoa-Jim\'enez and Francisco Rodr\'iguez-Henr\'iquez}, title = {A Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol}, howpublished = {Cryptology ePrint Archive, Report 2017/1015}, year = {2017}, url = {https://eprint.iacr.org/2017/1015}, } @misc{cryptoeprint:2017:1016, author = {Sahar Mazloom and S. Dov Gordon}, title = {Differentially Private Access Patterns in Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2017/1016}, year = {2017}, url = {https://eprint.iacr.org/2017/1016}, } @misc{cryptoeprint:2017:1017, author = {Virginie Lallemand and Shahram Rasoolzadeh}, title = {Differential Cryptanalysis of 18-Round PRIDE}, howpublished = {Cryptology ePrint Archive, Report 2017/1017}, year = {2017}, url = {https://eprint.iacr.org/2017/1017}, } @misc{cryptoeprint:2017:1018, author = {Sergi Delgado-Segura and Cristina P\'{e}rez-Sol\`{a} and Guillermo Navarro-Arribas and Jordi Herrera-Joancomart\'{\i}}, title = {A Fair Protocol for Data Trading Based on Bitcoin Transactions}, howpublished = {Cryptology ePrint Archive, Report 2017/1018}, year = {2017}, url = {https://eprint.iacr.org/2017/1018}, } @misc{cryptoeprint:2017:1019, author = {Mustafa Khairallah and Anupam Chattopadhyay and Thomas Peyrin}, title = {Looting the LUTs : FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/1019}, year = {2017}, url = {https://eprint.iacr.org/2017/1019}, } @misc{cryptoeprint:2017:101, author = {J\'er\'emy Jean and Thomas Peyrin and Siang Meng Sim}, title = {Optimizing Implementations of Lightweight Building Blocks}, howpublished = {Cryptology ePrint Archive, Report 2017/101}, year = {2017}, url = {https://eprint.iacr.org/2017/101}, } @misc{cryptoeprint:2017:1020, author = {Wei Yu and Saud Al Musa and Guangwu Xu and Bao Li}, title = {A Novel Pre-Computation Scheme of Window $\tau$NAF for Koblitz Curves}, howpublished = {Cryptology ePrint Archive, Report 2017/1020}, year = {2017}, url = {https://eprint.iacr.org/2017/1020}, } @misc{cryptoeprint:2017:1021, author = {Alexandre Adomnicai and Jacques J.A. Fournier and Laurent Masson}, title = {Bricklayer Attack: A Side-Channel Analysis on the ChaCha Quarter Round}, howpublished = {Cryptology ePrint Archive, Report 2017/1021}, year = {2017}, url = {https://eprint.iacr.org/2017/1021}, } @misc{cryptoeprint:2017:1022, author = {Rachid El Bansarkhani and Ali El Kaafarani}, title = {Direct Anonymous Attestation from Lattices}, howpublished = {Cryptology ePrint Archive, Report 2017/1022}, year = {2017}, url = {https://eprint.iacr.org/2017/1022}, } @misc{cryptoeprint:2017:1023, author = {Ashrujit Ghoshal and Thomas De Cnudde}, title = {Several Masked Implementations of the Boyar-Peralta AES S-Box}, howpublished = {Cryptology ePrint Archive, Report 2017/1023}, year = {2017}, url = {https://eprint.iacr.org/2017/1023}, } @misc{cryptoeprint:2017:1024, author = {Srinivas Vivek}, title = {Revisiting a Masked Lookup-Table Compression Scheme}, howpublished = {Cryptology ePrint Archive, Report 2017/1024}, year = {2017}, url = {https://eprint.iacr.org/2017/1024}, } @misc{cryptoeprint:2017:1025, author = {Andreas Hülsing and Tanja Lange and Kit Smeets}, title = {Rounded Gaussians -- Fast and Secure Constant-Time Sampling for Lattice-Based Crypto}, howpublished = {Cryptology ePrint Archive, Report 2017/1025}, year = {2017}, url = {https://eprint.iacr.org/2017/1025}, } @misc{cryptoeprint:2017:1026, author = {Jian Guo and Ling Song}, title = {Cube Attack against Full Kravatte}, howpublished = {Cryptology ePrint Archive, Report 2017/1026}, year = {2017}, url = {https://eprint.iacr.org/2017/1026}, } @misc{cryptoeprint:2017:1027, author = {Bjørn Møller Greve and Håvard Raddum and Gunnar Fløystad and Øyvind Ytrehus}, title = {Eliminating Variables in Boolean Equation Systems}, howpublished = {Cryptology ePrint Archive, Report 2017/1027}, year = {2017}, url = {https://eprint.iacr.org/2017/1027}, } @misc{cryptoeprint:2017:1028, author = {Rajendra Kumar and Mahesh Sreekumar Rajasree}, title = {Cryptanalysis of 1-Round KECCAK}, howpublished = {Cryptology ePrint Archive, Report 2017/1028}, year = {2017}, url = {https://eprint.iacr.org/2017/1028}, } @misc{cryptoeprint:2017:1029, author = {Pyrros Chaidos and Geoffroy Couteau}, title = {Efficient Designated-Verifier Non-Interactive Zero-Knowledge Proofs of Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2017/1029}, year = {2017}, url = {https://eprint.iacr.org/2017/1029}, } @misc{cryptoeprint:2017:102, author = {Serge Fehr and Louis Salvail}, title = {Quantum Authentication and Encryption with Key Recycling}, howpublished = {Cryptology ePrint Archive, Report 2017/102}, year = {2017}, url = {https://eprint.iacr.org/2017/102}, } @misc{cryptoeprint:2017:1030, author = {Ling Song and Jian Guo and Danping Shi}, title = {New MILP Modeling: Improved Conditional Cube Attacks to Keccak-based Constructions}, howpublished = {Cryptology ePrint Archive, Report 2017/1030}, year = {2017}, url = {https://eprint.iacr.org/2017/1030}, } @misc{cryptoeprint:2017:1031, author = {Sumanta Sarkar and Habeeb Syed and Rajat Sadhukhan and Debdeep Mukhopadhyay}, title = {Lightweight Design Choices for LED-like Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2017/1031}, year = {2017}, url = {https://eprint.iacr.org/2017/1031}, } @misc{cryptoeprint:2017:1032, author = {Giulia Traverso and Denise Demirel and Johannes Buchmann}, title = {Performing Computations on Hierarchically Shared Secrets}, howpublished = {Cryptology ePrint Archive, Report 2017/1032}, year = {2017}, url = {https://eprint.iacr.org/2017/1032}, } @misc{cryptoeprint:2017:1033, author = {T-H. Hubert Chan and Kai-Min Chung and Bruce Maggs and Elaine Shi}, title = {Foundations of Differentially Oblivious Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2017/1033}, year = {2017}, url = {https://eprint.iacr.org/2017/1033}, } @misc{cryptoeprint:2017:1034, author = {Sebastian Meiser and Esfandiar Mohammadi}, title = {Privacy Buckets: A numeric method for k-fold tight differential privacy}, howpublished = {Cryptology ePrint Archive, Report 2017/1034}, year = {2017}, url = {https://eprint.iacr.org/2017/1034}, } @misc{cryptoeprint:2017:1035, author = {Tassos Dimitriou}, title = {Privacy-respecting Reward Generation and Accumulation for Participatory Sensing Applications}, howpublished = {Cryptology ePrint Archive, Report 2017/1035}, year = {2017}, url = {https://eprint.iacr.org/2017/1035}, } @misc{cryptoeprint:2017:1036, author = {Yunwen Liu and Glenn De Witte and Adrián Ranea and Tomer Ashur}, title = {Rotational-XOR Cryptanalysis of Reduced-round SPECK}, howpublished = {Cryptology ePrint Archive, Report 2017/1036}, year = {2017}, url = {https://eprint.iacr.org/2017/1036}, } @misc{cryptoeprint:2017:1037, author = {Pierre-Louis Cayrel and Edoardo Persichetti and Cheikh Thiecoumba Gueye and Ousmane N'diaye and Jean Belo Klamti and Gilbert Ndollane Dione and Brice Odilon Boidje}, title = {DAGS: Key Encapsulation using Dyadic GS Codes}, howpublished = {Cryptology ePrint Archive, Report 2017/1037}, year = {2017}, url = {https://eprint.iacr.org/2017/1037}, } @misc{cryptoeprint:2017:1038, author = {Hervé Chabanne and Julien Keuffer and Refik Molva}, title = {Embedded Proofs for Verifiable Neural Networks}, howpublished = {Cryptology ePrint Archive, Report 2017/1038}, year = {2017}, url = {https://eprint.iacr.org/2017/1038}, } @misc{cryptoeprint:2017:1039, author = {Muslum Ozgur Ozmen and Attila A. Yavuz}, title = {Dronecrypt - An Ultra-Low Energy Cryptographic Framework for Small Aerial Drones}, howpublished = {Cryptology ePrint Archive, Report 2017/1039}, year = {2017}, url = {https://eprint.iacr.org/2017/1039}, } @misc{cryptoeprint:2017:103, author = {Hannes Gross and Stefan Mangard}, title = {Reconciling d+1 Masking in Hardware and Software}, howpublished = {Cryptology ePrint Archive, Report 2017/103}, year = {2017}, url = {https://eprint.iacr.org/2017/103}, } @misc{cryptoeprint:2017:1040, author = {Naina Gupta and Arpan Jati and Anupam Chattopadhyay and Somitra Kumar Sanadhya and Donghoon Chang}, title = {Threshold Implementations of GIFT: A Trade-off Analysis}, howpublished = {Cryptology ePrint Archive, Report 2017/1040}, year = {2017}, url = {https://eprint.iacr.org/2017/1040}, } @misc{cryptoeprint:2017:1041, author = {Ivan Damgård and Ji Luo and Sabine Oechsner and Peter Scholl and Mark Simkin}, title = {Compact Zero-Knowledge Proofs of Small Hamming Weight}, howpublished = {Cryptology ePrint Archive, Report 2017/1041}, year = {2017}, url = {https://eprint.iacr.org/2017/1041}, } @misc{cryptoeprint:2017:1042, author = {René Bødker Christensen}, title = {On one-round reliable message transmission}, howpublished = {Cryptology ePrint Archive, Report 2017/1042}, year = {2017}, url = {https://eprint.iacr.org/2017/1042}, } @misc{cryptoeprint:2017:1043, author = {Yi Liu and Qi Wang}, title = {An E-voting Protocol Based on Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2017/1043}, year = {2017}, url = {https://eprint.iacr.org/2017/1043}, } @misc{cryptoeprint:2017:1044, author = {Erik-Oliver Blass and Florian Kerschbaum}, title = {Strain: A Secure Auction for Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2017/1044}, year = {2017}, url = {https://eprint.iacr.org/2017/1044}, } @misc{cryptoeprint:2017:1045, author = {Jos\'{e} Becerra and Vincenzo Iovino and Dimiter Ostrev and Petra \v{S}ala and Marjan \v{S}krobot}, title = {Tightly-Secure PAK(E)}, howpublished = {Cryptology ePrint Archive, Report 2017/1045}, year = {2017}, url = {https://eprint.iacr.org/2017/1045}, } @misc{cryptoeprint:2017:1046, author = {Byron Marohn and Charles V. Wright and Wu-chi Feng and Mike Rosulek and Rakesh B. Bobba}, title = {Approximate Thumbnail Preserving Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/1046}, year = {2017}, url = {https://eprint.iacr.org/2017/1046}, } @misc{cryptoeprint:2017:1047, author = {Josep Balasch and Sebastian Faust and Benedikt Gierlichs and Clara Paglialonga and François-Xavier Standaert}, title = {Consolidating Inner Product Masking}, howpublished = {Cryptology ePrint Archive, Report 2017/1047}, year = {2017}, url = {https://eprint.iacr.org/2017/1047}, } @misc{cryptoeprint:2017:1048, author = {Divya Gupta and Hemanta K. Maji and Mingyuan Wang}, title = {Constant-rate Three-state Non-malleable Code}, howpublished = {Cryptology ePrint Archive, Report 2017/1048}, year = {2017}, url = {https://eprint.iacr.org/2017/1048}, } @misc{cryptoeprint:2017:1049, author = {Sarah McCarthy and Neil Smyth and Elizabeth O’Sullivan}, title = {A Practical Implementation of Identity-Based Encryption over NTRU Lattices}, howpublished = {Cryptology ePrint Archive, Report 2017/1049}, year = {2017}, url = {https://eprint.iacr.org/2017/1049}, } @misc{cryptoeprint:2017:104, author = {Shai Halevi and Tzipora Halevi and Victor Shoup and Noah Stephens-Davidowitz}, title = {Implementing BP-Obfuscation Using Graph-Induced Encoding}, howpublished = {Cryptology ePrint Archive, Report 2017/104}, year = {2017}, url = {https://eprint.iacr.org/2017/104}, } @misc{cryptoeprint:2017:1050, author = {Sean Bowe and Ariel Gabizon and Ian Miers}, title = {Scalable Multi-party Computation for zk-SNARK Parameters in the Random Beacon Model}, howpublished = {Cryptology ePrint Archive, Report 2017/1050}, year = {2017}, url = {https://eprint.iacr.org/2017/1050}, } @misc{cryptoeprint:2017:1051, author = {Xinping Zhou and Carolyn Whitnall and Elisabeth Oswald and Degang Sun and Zhu Wang}, title = {A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher}, howpublished = {Cryptology ePrint Archive, Report 2017/1051}, year = {2017}, url = {https://eprint.iacr.org/2017/1051}, } @misc{cryptoeprint:2017:1052, author = {Charles V. Wright and David Pouliot}, title = {Early Detection and Analysis of Leakage Abuse Vulnerabilities}, howpublished = {Cryptology ePrint Archive, Report 2017/1052}, year = {2017}, url = {https://eprint.iacr.org/2017/1052}, } @misc{cryptoeprint:2017:1053, author = {Gilles Barthe and François Dupressoir and Benjamin Grégoire}, title = {A Note on 'Further Improving Efficiency of Higher-Order Masking Scheme by Decreasing Randomness Complexity'}, howpublished = {Cryptology ePrint Archive, Report 2017/1053}, year = {2017}, url = {https://eprint.iacr.org/2017/1053}, } @misc{cryptoeprint:2017:1054, author = {Seyed Farhad Aghili and Hamid Mala}, title = {On the security of another CRC based ultralightweight RFID authentication protocol}, howpublished = {Cryptology ePrint Archive, Report 2017/1054}, year = {2017}, url = {https://eprint.iacr.org/2017/1054}, } @misc{cryptoeprint:2017:1055, author = {Luca Mariot and Stjepan Picek and Alberto Leporati and Domagoj Jakobovic}, title = {Cellular Automata Based S-boxes}, howpublished = {Cryptology ePrint Archive, Report 2017/1055}, year = {2017}, url = {https://eprint.iacr.org/2017/1055}, } @misc{cryptoeprint:2017:1056, author = {Shai Halevi and Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam}, title = {Round-Optimal Secure Multi-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2017/1056}, year = {2017}, url = {https://eprint.iacr.org/2017/1056}, } @misc{cryptoeprint:2017:1057, author = {Joppe W. Bos and Peter L. Montgomery}, title = {Montgomery Arithmetic from a Software Perspective}, howpublished = {Cryptology ePrint Archive, Report 2017/1057}, year = {2017}, url = {https://eprint.iacr.org/2017/1057}, } @misc{cryptoeprint:2017:1058, author = {Zhengzhong Jin and Yunlei Zhao}, title = {Optimal Key Consensus in Presence of Noise}, howpublished = {Cryptology ePrint Archive, Report 2017/1058}, year = {2017}, url = {https://eprint.iacr.org/2017/1058}, } @misc{cryptoeprint:2017:1059, author = {Lijing Zhou and Licheng Wang and Yiru Sun}, title = {CP-consensus: a Blockchain Protocol Based on Synchronous Timestamps of Compass Satellite}, howpublished = {Cryptology ePrint Archive, Report 2017/1059}, year = {2017}, url = {https://eprint.iacr.org/2017/1059}, } @misc{cryptoeprint:2017:105, author = {Ling Yang and Fuyang Fang and Xianhui Lu and Wen-Tao Zhu and Qiongxiao Wang and Shen Yan and Shiran Pan}, title = {A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem}, howpublished = {Cryptology ePrint Archive, Report 2017/105}, year = {2017}, url = {https://eprint.iacr.org/2017/105}, } @misc{cryptoeprint:2017:1060, author = {Raphael Bost and Pierre-Alain Fouque}, title = {Thwarting Leakage Abuse Attacks against Searchable Encryption -- A Formal Approach and Applications to Database Padding}, howpublished = {Cryptology ePrint Archive, Report 2017/1060}, year = {2017}, url = {https://eprint.iacr.org/2017/1060}, } @misc{cryptoeprint:2017:1061, author = {Marshall Ball and Dana Dachman-Soled and Mukul Kulkarni and Tal Malkin}, title = {Non-Malleable Codes from Average-Case Hardness: AC0, Decision Trees, and Streaming Space-Bounded Tampering}, howpublished = {Cryptology ePrint Archive, Report 2017/1061}, year = {2017}, url = {https://eprint.iacr.org/2017/1061}, } @misc{cryptoeprint:2017:1062, author = {Tianren Liu and Vinod Vaikuntanathan and Hoeteck Wee}, title = {Towards Breaking the Exponential Barrier for General Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2017/1062}, year = {2017}, url = {https://eprint.iacr.org/2017/1062}, } @misc{cryptoeprint:2017:1063, author = {Qingju Wang and Yonglin Hao and Yosuke Todo and Chaoyun Li and Takanori Isobe and Willi Meier}, title = {Improved Division Property Based Cube Attacks Exploiting Low Degree Property of Superpoly}, howpublished = {Cryptology ePrint Archive, Report 2017/1063}, year = {2017}, url = {https://eprint.iacr.org/2017/1063}, } @misc{cryptoeprint:2017:1064, author = {Satrajit Ghosh and Tobias Nilges}, title = {An Algebraic Approach to Maliciously Secure Private Set Intersection}, howpublished = {Cryptology ePrint Archive, Report 2017/1064}, year = {2017}, url = {https://eprint.iacr.org/2017/1064}, } @misc{cryptoeprint:2017:1065, author = {Reyhaneh Rabaninejad and Maryam Rajabzadeh Asaar and Mahmoud Ahmadian Attari and Mohammad Reza Aref}, title = {On the Security of a Lightweight Cloud Data Auditing Scheme}, howpublished = {Cryptology ePrint Archive, Report 2017/1065}, year = {2017}, url = {https://eprint.iacr.org/2017/1065}, } @misc{cryptoeprint:2017:1066, author = {Benedikt B\"unz and Jonathan Bootle and Dan Boneh and Andrew Poelstra and Pieter Wuille and Greg Maxwell}, title = {Bulletproofs: Efficient Range Proofs for Confidential Transactions}, howpublished = {Cryptology ePrint Archive, Report 2017/1066}, year = {2017}, url = {https://eprint.iacr.org/2017/1066}, } @misc{cryptoeprint:2017:1067, author = {Frederik Armknecht and Jens-Matthias Bohli and Ghassan O. Karame and Wenting Li}, title = {Sharding PoW-based Blockchains via Proofs of Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2017/1067}, year = {2017}, url = {https://eprint.iacr.org/2017/1067}, } @misc{cryptoeprint:2017:1068, author = {Marie-Sarah Lacharité and Kenneth G. Paterson}, title = {Frequency-smoothing encryption: preventing snapshot attacks on deterministically-encrypted data}, howpublished = {Cryptology ePrint Archive, Report 2017/1068}, year = {2017}, url = {https://eprint.iacr.org/2017/1068}, } @misc{cryptoeprint:2017:1069, author = {Brandon Broadnax and Valerie Fetzer and Jörn Müller-Quade and Andy Rupp}, title = {Non-Malleability vs. CCA-Security: The Case of Commitments}, howpublished = {Cryptology ePrint Archive, Report 2017/1069}, year = {2017}, url = {https://eprint.iacr.org/2017/1069}, } @misc{cryptoeprint:2017:106, author = {Ivan Puddu, Alexandra Dmitrienko, Srdjan Capkun}, title = {$\mu$chain: How to Forget without Hard Forks}, howpublished = {Cryptology ePrint Archive, Report 2017/106}, year = {2017}, url = {https://eprint.iacr.org/2017/106}, } @misc{cryptoeprint:2017:1070, author = {Christian Cachin and Angelo De Caro and Pedro Moreno-Sanchez and Bj{\"o}rn Tackmann and Marko Vukoli\'{c} }, title = {The Transaction Graph for Modeling Blockchain Semantics}, howpublished = {Cryptology ePrint Archive, Report 2017/1070}, year = {2017}, url = {https://eprint.iacr.org/2017/1070}, } @misc{cryptoeprint:2017:1071, author = {Le Dong and Yongxia Mao}, title = {Meet-in-the-Middle Attacks on 3-Line Generalized Feistel Networks}, howpublished = {Cryptology ePrint Archive, Report 2017/1071}, year = {2017}, url = {https://eprint.iacr.org/2017/1071}, } @misc{cryptoeprint:2017:1072, author = {Sabyasachi Dey and Santanu Sarkar}, title = {Settling the mystery of $Z_r=r$ in RC4}, howpublished = {Cryptology ePrint Archive, Report 2017/1072}, year = {2017}, url = {https://eprint.iacr.org/2017/1072}, } @misc{cryptoeprint:2017:1073, author = {Sikhar Patranabis and Jakub Breier and Debdeep Mukhopadhyay and Shivam Bhasin}, title = {One Plus One is More than Two: A Practical Combination of Power and Fault Analysis Attacks on PRESENT and PRESENT-like Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2017/1073}, year = {2017}, url = {https://eprint.iacr.org/2017/1073}, } @misc{cryptoeprint:2017:1074, author = {S V Dilip Kumar and Sikhar Patranabis and Jakub Breier and Debdeep Mukhopadhyay and Shivam Bhasin and Anupam Chattopadhyay and Anubhab Baksi}, title = {A Practical Fault Attack on ARX-like Ciphers with a Case Study on ChaCha20}, howpublished = {Cryptology ePrint Archive, Report 2017/1074}, year = {2017}, url = {https://eprint.iacr.org/2017/1074}, } @misc{cryptoeprint:2017:1075, author = {Ashwin Jha and Eik List and Kazuhiko Minematsu and Sweta Mishra and Mridul Nandi}, title = {XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing}, howpublished = {Cryptology ePrint Archive, Report 2017/1075}, year = {2017}, url = {https://eprint.iacr.org/2017/1075}, } @misc{cryptoeprint:2017:1076, author = {Martin Bunder and Abderrahmane Nitaj and Willy Susilo and Joseph Tonien}, title = {A generalized attack on RSA type cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2017/1076}, year = {2017}, url = {https://eprint.iacr.org/2017/1076}, } @misc{cryptoeprint:2017:1077, author = {Maher Boudabra and Abderrahmane Nitaj}, title = {A New Generalization of the KMOV Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2017/1077}, year = {2017}, url = {https://eprint.iacr.org/2017/1077}, } @misc{cryptoeprint:2017:1078, author = {Vincent Bindschaedler and Paul Grubbs and David Cash and Thomas Ristenpart and Vitaly Shmatikov}, title = {The Tao of Inference in Privacy-Protected Databases}, howpublished = {Cryptology ePrint Archive, Report 2017/1078}, year = {2017}, url = {https://eprint.iacr.org/2017/1078}, } @misc{cryptoeprint:2017:1079, author = {Andreas Wiemers and Dominik Klein}, title = {Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack}, howpublished = {Cryptology ePrint Archive, Report 2017/1079}, year = {2017}, url = {https://eprint.iacr.org/2017/1079}, } @misc{cryptoeprint:2017:107, author = {Erik-Oliver Blass and Guevara Noubir}, title = {Secure Logging with Crash Tolerance}, howpublished = {Cryptology ePrint Archive, Report 2017/107}, year = {2017}, url = {https://eprint.iacr.org/2017/107}, } @misc{cryptoeprint:2017:1080, author = {Mark Zhandry}, title = {Quantum Lighning Never Strikes the Same State Twice}, howpublished = {Cryptology ePrint Archive, Report 2017/1080}, year = {2017}, url = {https://eprint.iacr.org/2017/1080}, } @misc{cryptoeprint:2017:1081, author = {Colin D. Walter}, title = {The Montgomery and Joye Powering Ladders are Dual}, howpublished = {Cryptology ePrint Archive, Report 2017/1081}, year = {2017}, url = {https://eprint.iacr.org/2017/1081}, } @misc{cryptoeprint:2017:1082, author = {Lucian Cojocar and Kostas Papagiannopoulos and Niek Timmers}, title = {Instruction Duplication: Leaky and Not Too Fault-Tolerant!}, howpublished = {Cryptology ePrint Archive, Report 2017/1082}, year = {2017}, url = {https://eprint.iacr.org/2017/1082}, } @misc{cryptoeprint:2017:1083, author = {Zhi Chen and Junjie Shen and Alex Nicolau and Alex Veidenbaum and Nahid Farhady Ghalaty and Rosario Cammarota}, title = {CAMFAS: A Compiler Approach to Mitigate Fault Attacks via Enhanced SIMDization}, howpublished = {Cryptology ePrint Archive, Report 2017/1083}, year = {2017}, url = {https://eprint.iacr.org/2017/1083}, } @misc{cryptoeprint:2017:1084, author = {Dylan Toh and Jacob Teo and Khoongming Khoo and Siang Meng Sim}, title = {Lightweight MDS Serial-type Matrices with Minimal Fixed XOR Count}, howpublished = {Cryptology ePrint Archive, Report 2017/1084}, year = {2017}, url = {https://eprint.iacr.org/2017/1084}, } @misc{cryptoeprint:2017:1085, author = {Stjepan Picek and Annelie Heuser and Alan Jovic and Axel Legay and Karlo Knezevic}, title = {Profiled SCA with a New Twist: Semi-supervised Learning}, howpublished = {Cryptology ePrint Archive, Report 2017/1085}, year = {2017}, url = {https://eprint.iacr.org/2017/1085}, } @misc{cryptoeprint:2017:1086, author = {Xingchen Wang and Yunlei Zhao}, title = {File-injection Attack and Forward Security for Order-revealing Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/1086}, year = {2017}, url = {https://eprint.iacr.org/2017/1086}, } @misc{cryptoeprint:2017:1087, author = {Arjen K. Lenstra}, title = {General purpose integer factoring}, howpublished = {Cryptology ePrint Archive, Report 2017/1087}, year = {2017}, url = {https://eprint.iacr.org/2017/1087}, } @misc{cryptoeprint:2017:1088, author = {Saikrishna Badrinarayanan and Vipul Goyal and Abhishek Jain and Yael Tauman Kalai and Dakshita Khurana and Amit Sahai}, title = {Promise Zero Knowledge and its Applications to Round Optimal MPC}, howpublished = {Cryptology ePrint Archive, Report 2017/1088}, year = {2017}, url = {https://eprint.iacr.org/2017/1088}, } @misc{cryptoeprint:2017:1089, author = {Jian Liu and Li Duan and Yong Li and N. Asokan}, title = {Secure Deduplication of Encrypted Data: Refined Model and New Constructions}, howpublished = {Cryptology ePrint Archive, Report 2017/1089}, year = {2017}, url = {https://eprint.iacr.org/2017/1089}, } @misc{cryptoeprint:2017:108, author = {Elad Carmon and Jean-Pierre Seifert and Avishai Wool}, title = {Photonic Side Channel Attacks Against RSA}, howpublished = {Cryptology ePrint Archive, Report 2017/108}, year = {2017}, url = {https://eprint.iacr.org/2017/108}, } @misc{cryptoeprint:2017:1090, author = {Lorenz Breidenbach and Phil Daian and Florian Tramèr and Ari Juels}, title = {Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts}, howpublished = {Cryptology ePrint Archive, Report 2017/1090}, year = {2017}, url = {https://eprint.iacr.org/2017/1090}, } @misc{cryptoeprint:2017:1091, author = {Arka Rai Choudhuri and Matthew Green and Abhishek Jain and Gabriel Kaptchuk and Ian Miers}, title = {Fairness in an Unfair World: Fair Multiparty Computation from public Bulletin Boards}, howpublished = {Cryptology ePrint Archive, Report 2017/1091}, year = {2017}, url = {https://eprint.iacr.org/2017/1091}, } @misc{cryptoeprint:2017:1092, author = {Nishanth Chandran and Wutichai Chongchitmate and Rafail Ostrovsky and Ivan Visconti}, title = {Universally Composable Secure Two and Multi-party Computation in the Corruptible Tamper-Proof Hardware Token Model}, howpublished = {Cryptology ePrint Archive, Report 2017/1092}, year = {2017}, url = {https://eprint.iacr.org/2017/1092}, } @misc{cryptoeprint:2017:1093, author = {Thomas Espel and Laurent Katz and Guillaume Robin}, title = {Proposal for Protocol on a Quorum Blockchain with Zero Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2017/1093}, year = {2017}, url = {https://eprint.iacr.org/2017/1093}, } @misc{cryptoeprint:2017:1094, author = {Chris Peikert and Sina Shiehian}, title = {Privately Constraining and Programming PRFs, the LWE Way}, howpublished = {Cryptology ePrint Archive, Report 2017/1094}, year = {2017}, url = {https://eprint.iacr.org/2017/1094}, } @misc{cryptoeprint:2017:1095, author = {Sergi Delgado-Segura and Cristina Pérez-Solà and Guillermo Navarro-Arribas and Jordi Herrera-Joancomartí}, title = {Analysis of the Bitcoin UTXO set}, howpublished = {Cryptology ePrint Archive, Report 2017/1095}, year = {2017}, url = {https://eprint.iacr.org/2017/1095}, } @misc{cryptoeprint:2017:1096, author = {Haodong Jiang and Zhenfeng Zhang and Long Chen and Hong Wang and Zhi Ma}, title = {Post-quantum IND-CCA-secure KEM without Additional Hash}, howpublished = {Cryptology ePrint Archive, Report 2017/1096}, year = {2017}, url = {https://eprint.iacr.org/2017/1096}, } @misc{cryptoeprint:2017:1097, author = {Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar}, title = {Non-malleable Randomness Encoders and their Applications}, howpublished = {Cryptology ePrint Archive, Report 2017/1097}, year = {2017}, url = {https://eprint.iacr.org/2017/1097}, } @misc{cryptoeprint:2017:1098, author = {David Pouliot and Scott Griffy and Charles V. Wright}, title = {The Strength of Weak Randomization: Efficiently Searchable Encryption with Minimal Leakage}, howpublished = {Cryptology ePrint Archive, Report 2017/1098}, year = {2017}, url = {https://eprint.iacr.org/2017/1098}, } @misc{cryptoeprint:2017:1099, author = {Sadegh Jamshidpour and Zahra Ahmadian}, title = {Security Analysis of a Dynamic Threshold Secret Sharing Scheme Using Linear Subspace Method}, howpublished = {Cryptology ePrint Archive, Report 2017/1099}, year = {2017}, url = {https://eprint.iacr.org/2017/1099}, } @misc{cryptoeprint:2017:109, author = {Yevgeniy Dodis and Dario Fiore}, title = {Unilaterally-Authenticated Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2017/109}, year = {2017}, url = {https://eprint.iacr.org/2017/109}, } @misc{cryptoeprint:2017:1100, author = {Weijia Wang and Zhijie Wang and Bing Li and Qiuxiang Dong and Dijiang Huang}, title = {IR-CP-ABE: Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Flexible Secure Group-Based Communication }, howpublished = {Cryptology ePrint Archive, Report 2017/1100}, year = {2017}, url = {https://eprint.iacr.org/2017/1100}, } @misc{cryptoeprint:2017:1101, author = {Qiuxiang Dong and Dijiang Huang and Jim Luo and Myong Kang}, title = {HIR-CP-ABE: Hierarchical Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Secure and Flexible Data Sharing}, howpublished = {Cryptology ePrint Archive, Report 2017/1101}, year = {2017}, url = {https://eprint.iacr.org/2017/1101}, } @misc{cryptoeprint:2017:1102, author = {Qiuxiang Dong and Dijiang Huang and Jim Luo and Myong Kang}, title = {ID-HABE: Incorporating ID-based Revocation, Delegation, and Authority Hierarchy into Attribute-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/1102}, year = {2017}, url = {https://eprint.iacr.org/2017/1102}, } @misc{cryptoeprint:2017:1103, author = {Vahid Amin Ghafari and Honggang Hu}, title = {A new chosen IV statistical distinguishing framework to attack symmetric ciphers, and its application to ACORN-v3 and Grain-128a}, howpublished = {Cryptology ePrint Archive, Report 2017/1103}, year = {2017}, url = {https://eprint.iacr.org/2017/1103}, } @misc{cryptoeprint:2017:1104, author = {Yang Wang and Mingqiang Wang}, title = {Efficient provable-secure NTRUEncrypt over any cyclotomic field}, howpublished = {Cryptology ePrint Archive, Report 2017/1104}, year = {2017}, url = {https://eprint.iacr.org/2017/1104}, } @misc{cryptoeprint:2017:1105, author = {Zheli Liu and Siyi Lv and Yu Wei and Jin Li and Joseph K. Liu and Yang Xiang}, title = {FFSSE: Flexible Forward Secure Searchable Encryption with Efficient Performance}, howpublished = {Cryptology ePrint Archive, Report 2017/1105}, year = {2017}, url = {https://eprint.iacr.org/2017/1105}, } @misc{cryptoeprint:2017:1106, author = {Weijin Wang and Yu Qin and Jingbin Liu and Dengguo Feng}, title = {Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2017/1106}, year = {2017}, url = {https://eprint.iacr.org/2017/1106}, } @misc{cryptoeprint:2017:1107, author = {Lucas Kowalczyk and Tal Malkin and Jonathan Ullman and Daniel Wichs}, title = {Hardness of Non-Interactive Differential Privacy from One-Way Functions}, howpublished = {Cryptology ePrint Archive, Report 2017/1107}, year = {2017}, url = {https://eprint.iacr.org/2017/1107}, } @misc{cryptoeprint:2017:1108, author = {Kristin Lauter and Michael Naehrig}, title = {Cryptographic Pairings}, howpublished = {Cryptology ePrint Archive, Report 2017/1108}, year = {2017}, url = {https://eprint.iacr.org/2017/1108}, } @misc{cryptoeprint:2017:1109, author = {Nishanth Chandran and Divya Gupta and Aseem Rastogi and Rahul Sharma and Shardul Tripathi}, title = {EzPC: Programmable, Efficient, and Scalable Secure Two-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2017/1109}, year = {2017}, url = {https://eprint.iacr.org/2017/1109}, } @misc{cryptoeprint:2017:110, author = {Patrick McCorry and Siamak F. Shahandashti and Feng Hao}, title = {A Smart Contract for Boardroom Voting with Maximum Voter Privacy}, howpublished = {Cryptology ePrint Archive, Report 2017/110}, year = {2017}, url = {https://eprint.iacr.org/2017/110}, } @misc{cryptoeprint:2017:1110, author = {Stjepan Picek and Annelie Heuser and Alan Jovic and Axel Legay}, title = {On the Relevance of Feature Selection for Profiled Side-channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2017/1110}, year = {2017}, url = {https://eprint.iacr.org/2017/1110}, } @misc{cryptoeprint:2017:1111, author = {Pierre-Alain Dupont and Julia Hesse and David Pointcheval and Leonid Reyzin and Sophia Yakoubov}, title = {Fuzzy Authenticated Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2017/1111}, year = {2017}, url = {https://eprint.iacr.org/2017/1111}, } @misc{cryptoeprint:2017:1112, author = {Changhai Ou and Degang Sun and Zhu Wang and Xinping Zhou and Wei Cheng}, title = {Manifold Learning Towards Masking Implementations: A First Study}, howpublished = {Cryptology ePrint Archive, Report 2017/1112}, year = {2017}, url = {https://eprint.iacr.org/2017/1112}, } @misc{cryptoeprint:2017:1113, author = {Henry Corrigan-Gibbs and Dmitry Kogan}, title = {The Discrete-Logarithm Problem with Preprocessing}, howpublished = {Cryptology ePrint Archive, Report 2017/1113}, year = {2017}, url = {https://eprint.iacr.org/2017/1113}, } @misc{cryptoeprint:2017:1114, author = {Florian Bourse and Michele Minelli and Matthias Minihold and Pascal Paillier}, title = {Fast Homomorphic Evaluation of Deep Discretized Neural Networks}, howpublished = {Cryptology ePrint Archive, Report 2017/1114}, year = {2017}, url = {https://eprint.iacr.org/2017/1114}, } @misc{cryptoeprint:2017:1115, author = {Colin D. Walter}, title = {Hardware Aspects of Montgomery Modular Multiplication}, howpublished = {Cryptology ePrint Archive, Report 2017/1115}, year = {2017}, url = {https://eprint.iacr.org/2017/1115}, } @misc{cryptoeprint:2017:1116, author = {Kaisei Kajita and Kazuto Ogawa and Eiichiro Fujisaki}, title = {A Constant-Size Signature Scheme with a Tighter Reduction from the CDH Assumption}, howpublished = {Cryptology ePrint Archive, Report 2017/1116}, year = {2017}, url = {https://eprint.iacr.org/2017/1116}, } @misc{cryptoeprint:2017:1117, author = {Rishab Goyal and Venkata Koppula and Brent Waters}, title = {Risky Traitor Tracing and New Differential Privacy Negative Results}, howpublished = {Cryptology ePrint Archive, Report 2017/1117}, year = {2017}, url = {https://eprint.iacr.org/2017/1117}, } @misc{cryptoeprint:2017:1118, author = {Ittai Abraham and Dahlia Malkhi and Kartik Nayak and Ling Ren and Alexander Spiegelman}, title = {Solida: A Blockchain Protocol Based on Reconfigurable Byzantine Consensus}, howpublished = {Cryptology ePrint Archive, Report 2017/1118}, year = {2017}, url = {https://eprint.iacr.org/2017/1118}, } @misc{cryptoeprint:2017:1119, author = {Léonard Benedetti and Aurélien Thierry and Julien Francq}, title = {Detection of cryptographic algorithms with grap}, howpublished = {Cryptology ePrint Archive, Report 2017/1119}, year = {2017}, url = {https://eprint.iacr.org/2017/1119}, } @misc{cryptoeprint:2017:111, author = {Jonathan Burns and Daniel Moore and Katrina Ray and Ryan Speers and Brian Vohaska}, title = {EC-OPRF: Oblivious Pseudorandom Functions using Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2017/111}, year = {2017}, url = {https://eprint.iacr.org/2017/111}, } @misc{cryptoeprint:2017:1120, author = {David Cash and Cong Zhang}, title = {A Ciphertext-Size Lower Bound for Order-Preserving Encryption with Limited Leakage}, howpublished = {Cryptology ePrint Archive, Report 2017/1120}, year = {2017}, url = {https://eprint.iacr.org/2017/1120}, } @misc{cryptoeprint:2017:1121, author = {Valérie Nachef and Nicolas Marrière and Emmanuel Volte}, title = {Differential Attacks on LILLIPUT Cipher}, howpublished = {Cryptology ePrint Archive, Report 2017/1121}, year = {2017}, url = {https://eprint.iacr.org/2017/1121}, } @misc{cryptoeprint:2017:1122, author = {Martin Ekerå}, title = {On post-processing in the quantum algorithm for computing short discrete logarithms}, howpublished = {Cryptology ePrint Archive, Report 2017/1122}, year = {2017}, url = {https://eprint.iacr.org/2017/1122}, } @misc{cryptoeprint:2017:1123, author = {Cecilia Boschini and Jan Camenisch and Gregory Neven}, title = {Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs}, howpublished = {Cryptology ePrint Archive, Report 2017/1123}, year = {2017}, url = {https://eprint.iacr.org/2017/1123}, } @misc{cryptoeprint:2017:1124, author = {Nicola Atzei and Massimo Bartoletti and Stefano Lande and Roberto Zunino}, title = {A formal model of Bitcoin transactions}, howpublished = {Cryptology ePrint Archive, Report 2017/1124}, year = {2017}, url = {https://eprint.iacr.org/2017/1124}, } @misc{cryptoeprint:2017:1125, author = {Fabrice Benhamouda and Huijia Lin}, title = {k-Round MPC from k-Round OT via Garbled Interactive Circuits}, howpublished = {Cryptology ePrint Archive, Report 2017/1125}, year = {2017}, url = {https://eprint.iacr.org/2017/1125}, } @misc{cryptoeprint:2017:1126, author = {Robin Ankele and Andrew Simpson}, title = {Privacy Notions for Privacy-Preserving Distributed Data Mining: Foundations and Privacy Games}, howpublished = {Cryptology ePrint Archive, Report 2017/1126}, year = {2017}, url = {https://eprint.iacr.org/2017/1126}, } @misc{cryptoeprint:2017:1127, author = {Dana Dachman-Soled and Huijing Gong and Mukul Kulkarni and Aria Shahverdi}, title = {On the Leakage Resilience of Ideal-Lattice Based Public Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/1127}, year = {2017}, url = {https://eprint.iacr.org/2017/1127}, } @misc{cryptoeprint:2017:1128, author = {Meenakshi Kansal and Ratna Dutta and Sourav Mukhopadhyay}, title = {Forward Secure Efficient Group Signature in Dynamic Setting using Lattices}, howpublished = {Cryptology ePrint Archive, Report 2017/1128}, year = {2017}, url = {https://eprint.iacr.org/2017/1128}, } @misc{cryptoeprint:2017:1129, author = {Mariya Bessonov and Dima Grigoriev and Vladimir Shpilrain }, title = {Probabilistic solution of Yao's millionaires' problem}, howpublished = {Cryptology ePrint Archive, Report 2017/1129}, year = {2017}, url = {https://eprint.iacr.org/2017/1129}, } @misc{cryptoeprint:2017:112, author = {Xavier Bultel and Pascal Lafourcade}, title = {Zero-Knowledge Proxy Re-Identification Revisited}, howpublished = {Cryptology ePrint Archive, Report 2017/112}, year = {2017}, url = {https://eprint.iacr.org/2017/112}, } @misc{cryptoeprint:2017:1130, author = {Daniel Jost and Ueli Maurer and Joao L. Ribeiro}, title = {Information-Theoretic Secret-Key Agreement: The Secret-Key Rate as a Function of the Channel Quality Ratio}, howpublished = {Cryptology ePrint Archive, Report 2017/1130}, year = {2017}, url = {https://eprint.iacr.org/2017/1130}, } @misc{cryptoeprint:2017:1131, author = {Mikhail Anokhin}, title = {A Certain Family of Subgroups of $\mathbb Z_n^\star$ Is Weakly Pseudo-Free under the General Integer Factoring Intractability Assumption}, howpublished = {Cryptology ePrint Archive, Report 2017/1131}, year = {2017}, url = {https://eprint.iacr.org/2017/1131}, } @misc{cryptoeprint:2017:1132, author = {Riad S. Wahby and Ioanna Tzialla and abhi shelat and Justin Thaler and Michael Walfish}, title = {Doubly-efficient zkSNARKs without trusted setup}, howpublished = {Cryptology ePrint Archive, Report 2017/1132}, year = {2017}, url = {https://eprint.iacr.org/2017/1132}, } @misc{cryptoeprint:2017:1133, author = {Anton Muehlemann}, title = {Sentiment Protocol: A Decentralized Protocol Leveraging Crowd Sourced Wisdom}, howpublished = {Cryptology ePrint Archive, Report 2017/1133}, year = {2017}, url = {https://eprint.iacr.org/2017/1133}, } @misc{cryptoeprint:2017:1134, author = {Jeroen Delvaux}, title = {Attacks on the PUF-Based Authentication Protocols YeHL16 and GaoMAAR17}, howpublished = {Cryptology ePrint Archive, Report 2017/1134}, year = {2017}, url = {https://eprint.iacr.org/2017/1134}, } @misc{cryptoeprint:2017:1135, author = {Albrecht Petzoldt}, title = {On the Complexity of the Hybrid Approach on HFEv-}, howpublished = {Cryptology ePrint Archive, Report 2017/1135}, year = {2017}, url = {https://eprint.iacr.org/2017/1135}, } @misc{cryptoeprint:2017:1136, author = {Maria Eichlseder and Daniel Kales}, title = {Clustering Related-Tweak Characteristics: Application to MANTIS-6}, howpublished = {Cryptology ePrint Archive, Report 2017/1136}, year = {2017}, url = {https://eprint.iacr.org/2017/1136}, } @misc{cryptoeprint:2017:1137, author = {Daniel Kales and Maria Eichlseder and Florian Mendel}, title = {Note on the Robustness of CAESAR Candidates}, howpublished = {Cryptology ePrint Archive, Report 2017/1137}, year = {2017}, url = {https://eprint.iacr.org/2017/1137}, } @misc{cryptoeprint:2017:1138, author = {Justin Holmgren and Lisa Yang}, title = {(A Counterexample to) Parallel Repetition for Non-Signaling Multi-Player Games}, howpublished = {Cryptology ePrint Archive, Report 2017/1138}, year = {2017}, url = {https://eprint.iacr.org/2017/1138}, } @misc{cryptoeprint:2017:1139, author = {Leif Both and Alexander May}, title = {Decoding Linear Codes with High Error Rate and its Impact for LPN Security}, howpublished = {Cryptology ePrint Archive, Report 2017/1139}, year = {2017}, url = {https://eprint.iacr.org/2017/1139}, } @misc{cryptoeprint:2017:113, author = {Pei Luo and Konstantinos Athanasiou and Yunsi Fei and Thomas Wahl}, title = {Algebraic Fault Analysis of SHA-3}, howpublished = {Cryptology ePrint Archive, Report 2017/113}, year = {2017}, url = {https://eprint.iacr.org/2017/113}, } @misc{cryptoeprint:2017:1140, author = {Robin Kwant and Tanja Lange and Kimberley Thissen}, title = {Lattice Klepto: Turning Post-Quantum Crypto Against Itself}, howpublished = {Cryptology ePrint Archive, Report 2017/1140}, year = {2017}, url = {https://eprint.iacr.org/2017/1140}, } @misc{cryptoeprint:2017:1141, author = {Virendra Sule and Anmol Yadav}, title = {Cryptanalysis of Bivium using a Boolean all solution solver}, howpublished = {Cryptology ePrint Archive, Report 2017/1141}, year = {2017}, url = {https://eprint.iacr.org/2017/1141}, } @misc{cryptoeprint:2017:1142, author = {Sebastian Angel and Hao Chen and Kim Laine and Srinath Setty}, title = {PIR with compressed queries and amortized computation}, howpublished = {Cryptology ePrint Archive, Report 2017/1142}, year = {2017}, url = {https://eprint.iacr.org/2017/1142}, } @misc{cryptoeprint:2017:1143, author = {Gustavo H. M. Zanon and Marcos A. Simplicio Jr. and Geovandro C. C. F. Pereira and Javad Doliskani and Paulo S. L. M. Barreto}, title = {Faster isogeny-based compressed key agreement}, howpublished = {Cryptology ePrint Archive, Report 2017/1143}, year = {2017}, url = {https://eprint.iacr.org/2017/1143}, } @misc{cryptoeprint:2017:1144, author = {Wei Cheng and Chao Zheng and Yuchen Cao and Yongbin Zhou and Hailong Zhang and Sylvain Guilley and Laurent Sauvage}, title = {How Far Can We Reach? Breaking RSM-Masked AES-128 Implementation Using Only One Trace}, howpublished = {Cryptology ePrint Archive, Report 2017/1144}, year = {2017}, url = {https://eprint.iacr.org/2017/1144}, } @misc{cryptoeprint:2017:1145, author = {Yupeng Zhang and Daniel Genkin and Jonathan Katz and Dimitrios Papadopoulos and Charalampos Papamanthou}, title = {vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases}, howpublished = {Cryptology ePrint Archive, Report 2017/1145}, year = {2017}, url = {https://eprint.iacr.org/2017/1145}, } @misc{cryptoeprint:2017:1146, author = {Yupeng Zhang and Daniel Genkin and Jonathan Katz and Dimitrios Papadopoulos and Charalampos Papamanthou}, title = {A Zero-Knowledge Version of vSQL}, howpublished = {Cryptology ePrint Archive, Report 2017/1146}, year = {2017}, url = {https://eprint.iacr.org/2017/1146}, } @misc{cryptoeprint:2017:1147, author = {Serge Vaudenay and Damian Vizár}, title = {Under Pressure: Security of Caesar Candidates beyond their Guarantees}, howpublished = {Cryptology ePrint Archive, Report 2017/1147}, year = {2017}, url = {https://eprint.iacr.org/2017/1147}, } @misc{cryptoeprint:2017:1148, author = {Léo Perrin and Angela Promitzer and Sebastian Ramacher and Christian Rechberger}, title = {Improvements to the Linear Layer of LowMC: A Faster Picnic}, howpublished = {Cryptology ePrint Archive, Report 2017/1148}, year = {2017}, url = {https://eprint.iacr.org/2017/1148}, } @misc{cryptoeprint:2017:1149, author = {Jintai Ding and Ray Perlner and Albrecht Petzoldt and Daniel Smith-Tone}, title = {Improved Cryptanalysis of HFEv- via Projection}, howpublished = {Cryptology ePrint Archive, Report 2017/1149}, year = {2017}, url = {https://eprint.iacr.org/2017/1149}, } @misc{cryptoeprint:2017:114, author = {Itay Berman and Ron D. Rothblum and Vinod Vaikuntanathan}, title = {Zero-Knowledge Proofs of Proximity}, howpublished = {Cryptology ePrint Archive, Report 2017/114}, year = {2017}, url = {https://eprint.iacr.org/2017/114}, } @misc{cryptoeprint:2017:1150, author = {Vladimir Kolesnikov and Mike Rosulek and Ni Trieu}, title = {SWiM: Secure Wildcard Pattern Matching From OT Extension}, howpublished = {Cryptology ePrint Archive, Report 2017/1150}, year = {2017}, url = {https://eprint.iacr.org/2017/1150}, } @misc{cryptoeprint:2017:1151, author = {Thorsten Kranz and Gregor Leander and Ko Stoffelen and Friedrich Wiemer}, title = {Shorter Linear Straight-Line Programs for MDS Matrices}, howpublished = {Cryptology ePrint Archive, Report 2017/1151}, year = {2017}, url = {https://eprint.iacr.org/2017/1151}, } @misc{cryptoeprint:2017:1152, author = {Catherine Meadows}, title = {Symbolic Security Criteria for Blockwise Adaptive Secure Modes of Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/1152}, year = {2017}, url = {https://eprint.iacr.org/2017/1152}, } @misc{cryptoeprint:2017:1153, author = {Iddo Bentov and Yan Ji and Fan Zhang and Yunqi Li and Xueyuan Zhao and Lorenz Breidenbach and Philip Daian and Ari Juels}, title = {Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware}, howpublished = {Cryptology ePrint Archive, Report 2017/1153}, year = {2017}, url = {https://eprint.iacr.org/2017/1153}, } @misc{cryptoeprint:2017:1154, author = {David Derler and Sebastian Ramacher and Daniel Slamanig}, title = {Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives}, howpublished = {Cryptology ePrint Archive, Report 2017/1154}, year = {2017}, url = {https://eprint.iacr.org/2017/1154}, } @misc{cryptoeprint:2017:1155, author = {Thalia M. Laing and Douglas R. Stinson}, title = {A Survey and Refinement of Repairable Threshold Schemes}, howpublished = {Cryptology ePrint Archive, Report 2017/1155}, year = {2017}, url = {https://eprint.iacr.org/2017/1155}, } @misc{cryptoeprint:2017:1156, author = {Sanjam Garg and Akshayaram Srinivasan}, title = {Two-Round Multiparty Secure Computation from Minimal Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2017/1156}, year = {2017}, url = {https://eprint.iacr.org/2017/1156}, } @misc{cryptoeprint:2017:1157, author = {Ebrahim M. Songhori and M. Sadegh Riazi and Siam U. Hussain and Ahmad-Reza Sadeghi and Farinaz Koushanfar}, title = {ARM2GC: Simple and Efficient Garbled Circuit Framework by Skipping}, howpublished = {Cryptology ePrint Archive, Report 2017/1157}, year = {2017}, url = {https://eprint.iacr.org/2017/1157}, } @misc{cryptoeprint:2017:1158, author = {Thang Hoang and Attila A. Yavuz and Betul F. Durak and Jorge Guajardo}, title = {Oblivious Dynamic Searchable Encryption via Distributed PIR and ORAM}, howpublished = {Cryptology ePrint Archive, Report 2017/1158}, year = {2017}, url = {https://eprint.iacr.org/2017/1158}, } @misc{cryptoeprint:2017:1159, author = {Gu Chunsheng}, title = {Cryptanalysis of indistinguishability obfuscation using GGH13 without ideals}, howpublished = {Cryptology ePrint Archive, Report 2017/1159}, year = {2017}, url = {https://eprint.iacr.org/2017/1159}, } @misc{cryptoeprint:2017:115, author = {Sietse Ringers and Eric Verheul and Jaap-Henk Hoepman}, title = {An efficient self-blindable attribute-based credential scheme}, howpublished = {Cryptology ePrint Archive, Report 2017/115}, year = {2017}, url = {https://eprint.iacr.org/2017/115}, } @misc{cryptoeprint:2017:1160, author = {Daniel Hart and DoHoon Kim and Giacomo Micheli and Guillermo Pascual Perez and Christophe Petit and Yuxuan Quek}, title = {A Practical Cryptanalysis of WalnutDSA}, howpublished = {Cryptology ePrint Archive, Report 2017/1160}, year = {2017}, url = {https://eprint.iacr.org/2017/1160}, } @misc{cryptoeprint:2017:1161, author = {Sankhanil Dey and Ranjan Ghosh}, title = {A Review of Existing 4-bit Crypto S-box cryptanalysis Techniques and Two New Techniques with 4-bit Boolean Functions for Cryptanalysis of 4-bit Crypto S-boxes. }, howpublished = {Cryptology ePrint Archive, Report 2017/1161}, year = {2017}, url = {https://eprint.iacr.org/2017/1161}, } @misc{cryptoeprint:2017:1162, author = {Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E Gunnells}, title = {Kayawood, a Key Agreement Protocol}, howpublished = {Cryptology ePrint Archive, Report 2017/1162}, year = {2017}, url = {https://eprint.iacr.org/2017/1162}, } @misc{cryptoeprint:2017:1163, author = {Najwa Aaraj and Florian Caullery and Marc Manzano}, title = {MILP-aided Cryptanalysis of Round Reduced ChaCha}, howpublished = {Cryptology ePrint Archive, Report 2017/1163}, year = {2017}, url = {https://eprint.iacr.org/2017/1163}, } @misc{cryptoeprint:2017:1164, author = {M. Sadegh Riazi and Christian Weinert and Oleksandr Tkachenko and Ebrahim M. Songhori and Thomas Schneider and Farinaz Koushanfar}, title = {Chameleon: A Hybrid Secure Computation Framework for Machine Learning Applications}, howpublished = {Cryptology ePrint Archive, Report 2017/1164}, year = {2017}, url = {https://eprint.iacr.org/2017/1164}, } @misc{cryptoeprint:2017:1165, author = {Megha Byali and Arpita Patra and Divya Ravi and Pratik Sarkar}, title = {Efficient, Round-optimal, Universally-Composable Oblivious Transfer and Commitment Scheme with Adaptive Security}, howpublished = {Cryptology ePrint Archive, Report 2017/1165}, year = {2017}, url = {https://eprint.iacr.org/2017/1165}, } @misc{cryptoeprint:2017:1166, author = {Jakub Breier and Dirmanto Jap and Shivam Bhasin}, title = {SCADPA: Side-Channel Assisted Differential-Plaintext Attack on Bit Permutation Based Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2017/1166}, year = {2017}, url = {https://eprint.iacr.org/2017/1166}, } @misc{cryptoeprint:2017:1167, author = {Sanjay Bhattacherjee and Palash Sarkar}, title = {Cryptocurrency Voting Games}, howpublished = {Cryptology ePrint Archive, Report 2017/1167}, year = {2017}, url = {https://eprint.iacr.org/2017/1167}, } @misc{cryptoeprint:2017:1168, author = {Fabien Coelho and Arnaud Larroche and Baptiste Colin}, title = {Itsuku: a Memory-Hardened Proof-of-Work Scheme}, howpublished = {Cryptology ePrint Archive, Report 2017/1168}, year = {2017}, url = {https://eprint.iacr.org/2017/1168}, } @misc{cryptoeprint:2017:1169, author = {David Berend and Bernhard Jungk and Shivam Bhasin}, title = {There Goes Your PIN: Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting}, howpublished = {Cryptology ePrint Archive, Report 2017/1169}, year = {2017}, url = {https://eprint.iacr.org/2017/1169}, } @misc{cryptoeprint:2017:116, author = {Vincent Grosso and François-Xavier Standaert}, title = {Masking Proofs are Tight (and How to Exploit it in Security Evaluations)}, howpublished = {Cryptology ePrint Archive, Report 2017/116}, year = {2017}, url = {https://eprint.iacr.org/2017/116}, } @misc{cryptoeprint:2017:1170, author = {Yuanqi Shen and Amin Rezaei and Hai Zhou}, title = {SAT-based Bit-flipping Attack on Logic Encryptions}, howpublished = {Cryptology ePrint Archive, Report 2017/1170}, year = {2017}, url = {https://eprint.iacr.org/2017/1170}, } @misc{cryptoeprint:2017:1171, author = {Koen de Boer and Léo Ducas and Stacey Jeffery and Ronald de Wolf}, title = {Attacks on the AJPS Mersenne-based cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2017/1171}, year = {2017}, url = {https://eprint.iacr.org/2017/1171}, } @misc{cryptoeprint:2017:1172, author = {Matthias Hamann and Matthias Krause and Willi Meier}, title = {A Note on Stream Ciphers that Continuously Use the IV}, howpublished = {Cryptology ePrint Archive, Report 2017/1172}, year = {2017}, url = {https://eprint.iacr.org/2017/1172}, } @misc{cryptoeprint:2017:1173, author = {Osmanbey Uzunkol and Öznur Kalkar and İsa Sertkaya}, title = {Fully Verifiable Secure Delegation of Pairing Computation: Cryptanalysis and An Efficient Construction}, howpublished = {Cryptology ePrint Archive, Report 2017/1173}, year = {2017}, url = {https://eprint.iacr.org/2017/1173}, } @misc{cryptoeprint:2017:1174, author = {Md. Al-Amin Khandaker and Yuki Nanjo and Loubna Ghammam and Sylvain Duquesne and Yasuyuki Nogami and Yuta Kodera}, title = {Efficient Optimal Ate Pairing at 128-bit Security Level}, howpublished = {Cryptology ePrint Archive, Report 2017/1174}, year = {2017}, url = {https://eprint.iacr.org/2017/1174}, } @misc{cryptoeprint:2017:1175, author = {Alan Szepieniec and Bart Preneel}, title = {Short Solutions to Nonlinear Systems of Equations}, howpublished = {Cryptology ePrint Archive, Report 2017/1175}, year = {2017}, url = {https://eprint.iacr.org/2017/1175}, } @misc{cryptoeprint:2017:1176, author = {Amin Rezaei and Yuanqi Shen and Shuyu Kong and Jie Gu and Hai Zhou}, title = {Cyclic Locking and Memristor-based Obfuscation Against CycSAT and Inside Foundry Attacks}, howpublished = {Cryptology ePrint Archive, Report 2017/1176}, year = {2017}, url = {https://eprint.iacr.org/2017/1176}, } @misc{cryptoeprint:2017:1177, author = {Sailesh Simhadri and James Steel and Benjamin Fuller}, title = {Reusable Authentication from the Iris}, howpublished = {Cryptology ePrint Archive, Report 2017/1177}, year = {2017}, url = {https://eprint.iacr.org/2017/1177}, } @misc{cryptoeprint:2017:1178, author = {Xinwei Gao and Jintai Ding and Saraswathy RV and Lin Li and Jiqiang Liu}, title = {Comparison analysis and efficient implementation of reconciliation-based RLWE key exchange protocol}, howpublished = {Cryptology ePrint Archive, Report 2017/1178}, year = {2017}, url = {https://eprint.iacr.org/2017/1178}, } @misc{cryptoeprint:2017:1179, author = {Claude Carlet and Stjepan Picek}, title = {On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials}, howpublished = {Cryptology ePrint Archive, Report 2017/1179}, year = {2017}, url = {https://eprint.iacr.org/2017/1179}, } @misc{cryptoeprint:2017:117, author = {Zhaohui Cheng}, title = {The SM9 Cryptographic Schemes}, howpublished = {Cryptology ePrint Archive, Report 2017/117}, year = {2017}, url = {https://eprint.iacr.org/2017/117}, } @misc{cryptoeprint:2017:1180, author = {Wen Wang and Jakub Szefer and Ruben Niederhagen}, title = {FPGA-based Niederreiter Cryptosystem using Binary Goppa Codes}, howpublished = {Cryptology ePrint Archive, Report 2017/1180}, year = {2017}, url = {https://eprint.iacr.org/2017/1180}, } @misc{cryptoeprint:2017:1181, author = {Ruben Niederhagen and Kai-Chun Ning and Bo-Yin Yang}, title = {Implementing Joux-Vitse's Crossbred Algorithm for Solving MQ Systems over GF(2) on GPUs}, howpublished = {Cryptology ePrint Archive, Report 2017/1181}, year = {2017}, url = {https://eprint.iacr.org/2017/1181}, } @misc{cryptoeprint:2017:1182, author = {Merav Parter and Eylon Yogev}, title = {Distributed Computing Made Secure: A New Cycle Cover Theorem}, howpublished = {Cryptology ePrint Archive, Report 2017/1182}, year = {2017}, url = {https://eprint.iacr.org/2017/1182}, } @misc{cryptoeprint:2017:1183, author = {Hayo Baan and Sauvik Bhattacharaya and Oscar Garcia-Morchon and Ronald Rietman and Ludo Tolhuizen and Jose-Luis Torre-Arce and Zhenfei Zhang}, title = {Round2: KEM and PKE based on GLWR}, howpublished = {Cryptology ePrint Archive, Report 2017/1183}, year = {2017}, url = {https://eprint.iacr.org/2017/1183}, } @misc{cryptoeprint:2017:1184, author = {Ryann Cartor and Daniel Smith-Tone}, title = {EFLASH: A New Multivariate Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2017/1184}, year = {2017}, url = {https://eprint.iacr.org/2017/1184}, } @misc{cryptoeprint:2017:1185, author = {Jintai Ding and Scott Fluhrer and Saraswathy RV}, title = {Complete Attack on RLWE Key Exchange with reused keys, without Signal Leakage}, howpublished = {Cryptology ePrint Archive, Report 2017/1185}, year = {2017}, url = {https://eprint.iacr.org/2017/1185}, } @misc{cryptoeprint:2017:1186, author = {Aner Ben-Efraim}, title = {On Multiparty Garbling of Arithmetic Circuits}, howpublished = {Cryptology ePrint Archive, Report 2017/1186}, year = {2017}, url = {https://eprint.iacr.org/2017/1186}, } @misc{cryptoeprint:2017:1187, author = {Sanjam Garg and Mohammad Mahmoody and Daniel Masny and Izaak Meckler}, title = {On the Round Complexity of OT Extension}, howpublished = {Cryptology ePrint Archive, Report 2017/1187}, year = {2017}, url = {https://eprint.iacr.org/2017/1187}, } @misc{cryptoeprint:2017:1188, author = {Kenta Takahashi and Takahiro Matsuda and Takao Murakami and Goichiro Hanaoka and Masakatsu Nishigaki}, title = {Signature Schemes with a Fuzzy Private Key}, howpublished = {Cryptology ePrint Archive, Report 2017/1188}, year = {2017}, url = {https://eprint.iacr.org/2017/1188}, } @misc{cryptoeprint:2017:1189, author = {Hanno Böck and Juraj Somorovsky and Craig Young}, title = {Return Of Bleichenbacher's Oracle Threat (ROBOT)}, howpublished = {Cryptology ePrint Archive, Report 2017/1189}, year = {2017}, url = {https://eprint.iacr.org/2017/1189}, } @misc{cryptoeprint:2017:118, author = {Lorenzo Grassi and Christian Rechberger and and Sondre Rønjom}, title = {A New Structural-Differential Property of 5-Round AES}, howpublished = {Cryptology ePrint Archive, Report 2017/118}, year = {2017}, url = {https://eprint.iacr.org/2017/118}, } @misc{cryptoeprint:2017:1190, author = {Eleftheria Makri and Dragos Rotaru and Nigel P. Smart and Frederik Vercauteren}, title = {PICS: Private Image Classification with SVM}, howpublished = {Cryptology ePrint Archive, Report 2017/1190}, year = {2017}, url = {https://eprint.iacr.org/2017/1190}, } @misc{cryptoeprint:2017:1191, author = {Marc Fischlin and Felix Günther and Giorgia Azzurra Marson and Kenneth G. Paterson}, title = {Data Is a Stream: Security of Stream-Based Channels}, howpublished = {Cryptology ePrint Archive, Report 2017/1191}, year = {2017}, url = {https://eprint.iacr.org/2017/1191}, } @misc{cryptoeprint:2017:1192, author = {Xinwei Gao and Jintai Ding and Lin Li and Saraswathy RV and Jiqiang Liu}, title = {Efficient Implementation of Password-Based Authenticated Key Exchange from RLWE and Post-Quantum TLS}, howpublished = {Cryptology ePrint Archive, Report 2017/1192}, year = {2017}, url = {https://eprint.iacr.org/2017/1192}, } @misc{cryptoeprint:2017:1193, author = {Victor Arribas and Begül Bilgin and George Petrides and Svetla Nikova and Vincent Rijmen}, title = {Rhythmic Keccak: SCA Security and Low Latency in HW}, howpublished = {Cryptology ePrint Archive, Report 2017/1193}, year = {2017}, url = {https://eprint.iacr.org/2017/1193}, } @misc{cryptoeprint:2017:1194, author = {Ivan Tjuawinata and Tao Huang and Hongjun Wu}, title = {Improved Differential Cryptanalysis on Generalized Feistel Schemes}, howpublished = {Cryptology ePrint Archive, Report 2017/1194}, year = {2017}, url = {https://eprint.iacr.org/2017/1194}, } @misc{cryptoeprint:2017:1195, author = {Oscar Reparaz and Lauren De Meyer and Begül Bilgin and Victor Arribas and Svetla Nikova and Ventzislav Nikov and Nigel Smart}, title = {CAPA: The Spirit of Beaver against Physical Attacks}, howpublished = {Cryptology ePrint Archive, Report 2017/1195}, year = {2017}, url = {https://eprint.iacr.org/2017/1195}, } @misc{cryptoeprint:2017:1196, author = {Xinwei Gao and Jintai Ding and Jiqiang Liu and Lin Li}, title = {Post-Quantum Secure Remote Password Protocol from RLWE Problem}, howpublished = {Cryptology ePrint Archive, Report 2017/1196}, year = {2017}, url = {https://eprint.iacr.org/2017/1196}, } @misc{cryptoeprint:2017:1197, author = {David Pointcheval and Olivier Sanders}, title = {Reassessing Security of Randomizable Signatures}, howpublished = {Cryptology ePrint Archive, Report 2017/1197}, year = {2017}, url = {https://eprint.iacr.org/2017/1197}, } @misc{cryptoeprint:2017:1198, author = {Joost Renes}, title = {Computing isogenies between Montgomery curves using the action of (0,0)}, howpublished = {Cryptology ePrint Archive, Report 2017/1198}, year = {2017}, url = {https://eprint.iacr.org/2017/1198}, } @misc{cryptoeprint:2017:1199, author = {Xiaoyang Dong and Xiaoyun Wang}, title = {Quantum Key-recovery Attack on Feistel Structures}, howpublished = {Cryptology ePrint Archive, Report 2017/1199}, year = {2017}, url = {https://eprint.iacr.org/2017/1199}, } @misc{cryptoeprint:2017:119, author = {Christopher Portmann}, title = {Quantum Authentication with Key Recycling}, howpublished = {Cryptology ePrint Archive, Report 2017/119}, year = {2017}, url = {https://eprint.iacr.org/2017/119}, } @misc{cryptoeprint:2017:1200, author = {Lorenzo Grassi}, title = {MixColumns Properties and Attacks on (round-reduced) AES with a Single Secret S-Box}, howpublished = {Cryptology ePrint Archive, Report 2017/1200}, year = {2017}, url = {https://eprint.iacr.org/2017/1200}, } @misc{cryptoeprint:2017:1201, author = {Rupeng Yang and Man Ho Au and Junzuo Lai and Qiuliang Xu and Zuoxia Yu}, title = {Collusion Resistant Watermarking Schemes for Cryptographic Functionalities}, howpublished = {Cryptology ePrint Archive, Report 2017/1201}, year = {2017}, url = {https://eprint.iacr.org/2017/1201}, } @misc{cryptoeprint:2017:1202, author = {Javad Doliskani and Geovandro C. C. F. Pereira and Paulo S. L. M. Barreto}, title = {Faster Cryptographic Hash Function From Supersingular Isogeny Graphs}, howpublished = {Cryptology ePrint Archive, Report 2017/1202}, year = {2017}, url = {https://eprint.iacr.org/2017/1202}, } @misc{cryptoeprint:2017:1203, author = {David Derler and Sebastian Ramacher and Daniel Slamanig}, title = {Short Double- and N-Times-Authentication-Preventing Signatures from ECDSA and More}, howpublished = {Cryptology ePrint Archive, Report 2017/1203}, year = {2017}, url = {https://eprint.iacr.org/2017/1203}, } @misc{cryptoeprint:2017:1204, author = {Erick Nascimento and Lukasz Chmielewski}, title = {Applying Horizontal Clustering Side-Channel Attacks on Embedded ECC Implementations}, howpublished = {Cryptology ePrint Archive, Report 2017/1204}, year = {2017}, url = {https://eprint.iacr.org/2017/1204}, } @misc{cryptoeprint:2017:1205, author = {Sabyasachi Karati and Palash Sarkar}, title = {Connecting Legendre with Kummer and Edwards}, howpublished = {Cryptology ePrint Archive, Report 2017/1205}, year = {2017}, url = {https://eprint.iacr.org/2017/1205}, } @misc{cryptoeprint:2017:1206, author = {Daniel J. Bernstein and Bo-Yin Yang}, title = {Asymptotically faster quantum algorithms to solve multivariate quadratic equations}, howpublished = {Cryptology ePrint Archive, Report 2017/1206}, year = {2017}, url = {https://eprint.iacr.org/2017/1206}, } @misc{cryptoeprint:2017:1207, author = {Mingqiang Wang and Xue Wang and Tao Zhan}, title = {Unconditionally secure multi-party quantum commitment scheme}, howpublished = {Cryptology ePrint Archive, Report 2017/1207}, year = {2017}, url = {https://eprint.iacr.org/2017/1207}, } @misc{cryptoeprint:2017:1208, author = {Colin Boyd and Gareth T. Davies and Kristian Gjøsteen and Mohsen Toorani and Håvard Raddum}, title = {Security notions for cloud storage and deduplication}, howpublished = {Cryptology ePrint Archive, Report 2017/1208}, year = {2017}, url = {https://eprint.iacr.org/2017/1208}, } @misc{cryptoeprint:2017:1209, author = {Yiyuan Luo and Xuejia Lai }, title = {Improvements for Finding Impossible Differentials of Block Cipher Structures}, howpublished = {Cryptology ePrint Archive, Report 2017/1209}, year = {2017}, url = {https://eprint.iacr.org/2017/1209}, } @misc{cryptoeprint:2017:120, author = {Rishab Goyal and Venkata Koppula and Brent Waters}, title = {Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption}, howpublished = {Cryptology ePrint Archive, Report 2017/120}, year = {2017}, url = {https://eprint.iacr.org/2017/120}, } @misc{cryptoeprint:2017:1210, author = {Gilles Macario-Rat and Jacques Patarin}, title = {Two-Face: New Public Key Multivariate Schemes}, howpublished = {Cryptology ePrint Archive, Report 2017/1210}, year = {2017}, url = {https://eprint.iacr.org/2017/1210}, } @misc{cryptoeprint:2017:1211, author = {Qingju Wang and Lorenzo Grassi and Christain Rechberger}, title = {Zero-Sum Partitions of PHOTON Permutations}, howpublished = {Cryptology ePrint Archive, Report 2017/1211}, year = {2017}, url = {https://eprint.iacr.org/2017/1211}, } @misc{cryptoeprint:2017:1212, author = {Oana Stan and Mohamed-Haykel Zayani and Renaud Sirdey and Amira Ben Hamida and Alessandro Ferreira Leite and Mallek Mziou-Sallami}, title = {A New Crypto-Classifier Service for Energy Efficiency in Smart Cities}, howpublished = {Cryptology ePrint Archive, Report 2017/1212}, year = {2017}, url = {https://eprint.iacr.org/2017/1212}, } @misc{cryptoeprint:2017:1213, author = {Michael Meyer and Steffen Reith and Fabio Campos}, title = {On hybrid SIDH schemes using Edwards and Montgomery curve arithmetic}, howpublished = {Cryptology ePrint Archive, Report 2017/1213}, year = {2017}, url = {https://eprint.iacr.org/2017/1213}, } @misc{cryptoeprint:2017:1214, author = {Daniel J. Bernstein and Leon Groot Bruinderink and Tanja Lange and Lorenz Panny}, title = {"HILA5 Pindakaas": On the CCA security of lattice-based encryption with error correction}, howpublished = {Cryptology ePrint Archive, Report 2017/1214}, year = {2017}, url = {https://eprint.iacr.org/2017/1214}, } @misc{cryptoeprint:2017:1215, author = {Rouzbeh Behnia and Muslum Ozgur Ozmen and Attila A. Yavuz }, title = {Lattice-Based Public Key Encryption with Keyword Search}, howpublished = {Cryptology ePrint Archive, Report 2017/1215}, year = {2017}, url = {https://eprint.iacr.org/2017/1215}, } @misc{cryptoeprint:2017:1216, author = {Xavier Carpent and Norrathep Rattanavipanon and Gene Tsudik}, title = {Probabilistic and Considerate Attestation of IoT Devices against Roving Malware}, howpublished = {Cryptology ePrint Archive, Report 2017/1216}, year = {2017}, url = {https://eprint.iacr.org/2017/1216}, } @misc{cryptoeprint:2017:1217, author = {Shan Fu and Zongyue Wang and Fanxing Wei and Guoai Xu and An Wang}, title = {Linear Regression Side Channel Attack Applied on Constant XOR}, howpublished = {Cryptology ePrint Archive, Report 2017/1217}, year = {2017}, url = {https://eprint.iacr.org/2017/1217}, } @misc{cryptoeprint:2017:1218, author = {Dimitris Mouris and Nektarios Georgios Tsoutsos and Michail Maniatakos}, title = {TERMinator Suite: Benchmarking Privacy-Preserving Architectures}, howpublished = {Cryptology ePrint Archive, Report 2017/1218}, year = {2017}, url = {https://eprint.iacr.org/2017/1218}, } @misc{cryptoeprint:2017:1219, author = {Subhabrata Samajder and Palash Sarkar}, title = {Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations}, howpublished = {Cryptology ePrint Archive, Report 2017/1219}, year = {2017}, url = {https://eprint.iacr.org/2017/1219}, } @misc{cryptoeprint:2017:121, author = {David Kohel}, title = {Twisted $\mu_4$-normal form for elliptic curves}, howpublished = {Cryptology ePrint Archive, Report 2017/121}, year = {2017}, url = {https://eprint.iacr.org/2017/121}, } @misc{cryptoeprint:2017:1220, author = {Lynn Batten and Xun Yi}, title = {Off-line Digital Cash Schemes Providing Unlinkability, Anonymity and Change}, howpublished = {Cryptology ePrint Archive, Report 2017/1220}, year = {2017}, url = {https://eprint.iacr.org/2017/1220}, } @misc{cryptoeprint:2017:1221, author = {Marten van Dijk and Chenglu Jin and Hoda Maleki and Phuong Ha Nguyen and Reza Rahaeimehr}, title = {Weak-Unforgeable Tags for Secure Supply Chain Management}, howpublished = {Cryptology ePrint Archive, Report 2017/1221}, year = {2017}, url = {https://eprint.iacr.org/2017/1221}, } @misc{cryptoeprint:2017:1222, author = {Muslum Ozgur Ozmen and Thang Hoang and Attila A. Yavuz}, title = {Forward-Private Dynamic Searchable Symmetric Encryption with Efficient Search}, howpublished = {Cryptology ePrint Archive, Report 2017/1222}, year = {2017}, url = {https://eprint.iacr.org/2017/1222}, } @misc{cryptoeprint:2017:1223, author = {Hannes Gross and Rinat Iusupov and Stefan Mangard and Roderick Bloem}, title = {Generic Low-Latency Masking}, howpublished = {Cryptology ePrint Archive, Report 2017/1223}, year = {2017}, url = {https://eprint.iacr.org/2017/1223}, } @misc{cryptoeprint:2017:1224, author = {Keita Xagawa}, title = {Practical Cryptanalysis of a Public-key Encryption Scheme Based on Non-linear Indeterminate Equations at SAC 2017}, howpublished = {Cryptology ePrint Archive, Report 2017/1224}, year = {2017}, url = {https://eprint.iacr.org/2017/1224}, } @misc{cryptoeprint:2017:1225, author = {Yehuda Lindell and Avishay Yanai}, title = {Fast Garbling of Circuits over 3-Valued Logic}, howpublished = {Cryptology ePrint Archive, Report 2017/1225}, year = {2017}, url = {https://eprint.iacr.org/2017/1225}, } @misc{cryptoeprint:2017:1226, author = {Navid Alamati and Chris Peikert and Noah Stephens-Davidowitz}, title = {New (and Old) Proof Systems for Lattice Problems}, howpublished = {Cryptology ePrint Archive, Report 2017/1226}, year = {2017}, url = {https://eprint.iacr.org/2017/1226}, } @misc{cryptoeprint:2017:1227, author = {Victor Arribas and Svetla Nikova and Vincent Rijmen}, title = {VerMI: Verification Tool for Masked Implementations}, howpublished = {Cryptology ePrint Archive, Report 2017/1227}, year = {2017}, url = {https://eprint.iacr.org/2017/1227}, } @misc{cryptoeprint:2017:1228, author = {Gottfried Herold and Elena Kirshanova and Thijs Laarhoven}, title = {Speed-ups and time-memory trade-offs for tuple lattice sieving }, howpublished = {Cryptology ePrint Archive, Report 2017/1228}, year = {2017}, url = {https://eprint.iacr.org/2017/1228}, } @misc{cryptoeprint:2017:1229, author = {Akinori Hosoyamada and Yu Sasaki}, title = {Quantum Meet-in-the-Middle Attacks: Applications to Generic Feistel Constructions}, howpublished = {Cryptology ePrint Archive, Report 2017/1229}, year = {2017}, url = {https://eprint.iacr.org/2017/1229}, } @misc{cryptoeprint:2017:122, author = {Vadim Lyubashevsky and Gregory Neven}, title = {One-Shot Verifiable Encryption from Lattices}, howpublished = {Cryptology ePrint Archive, Report 2017/122}, year = {2017}, url = {https://eprint.iacr.org/2017/122}, } @misc{cryptoeprint:2017:1230, author = {Marcel Keller and Valerio Pastro and Dragos Rotaru}, title = {Overdrive: Making SPDZ Great Again}, howpublished = {Cryptology ePrint Archive, Report 2017/1230}, year = {2017}, url = {https://eprint.iacr.org/2017/1230}, } @misc{cryptoeprint:2017:1231, author = {Houda Ferradi and David Naccache}, title = {Integer Reconstruction Public-Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/1231}, year = {2017}, url = {https://eprint.iacr.org/2017/1231}, } @misc{cryptoeprint:2017:1232, author = {Motahhareh Gharahi and Shahram Khazaei}, title = {Optimal Linear Secret Sharing Schemes for Graph Access Structures on Six Participants}, howpublished = {Cryptology ePrint Archive, Report 2017/1232}, year = {2017}, url = {https://eprint.iacr.org/2017/1232}, } @misc{cryptoeprint:2017:1233, author = {Gilles Barthe and Benjamin Grégoire and Vincent Laporte}, title = {Provably secure compilation of side-channel countermeasures}, howpublished = {Cryptology ePrint Archive, Report 2017/1233}, year = {2017}, url = {https://eprint.iacr.org/2017/1233}, } @misc{cryptoeprint:2017:1234, author = {Christina Boura and Ilaria Chillotti and Nicolas Gama and Dimitar Jetchev and Stanislav Peceny and Alexander Petric}, title = {High-Precision Privacy-Preserving Real-Valued Function Evaluation}, howpublished = {Cryptology ePrint Archive, Report 2017/1234}, year = {2017}, url = {https://eprint.iacr.org/2017/1234}, } @misc{cryptoeprint:2017:1235, author = {Rafaël del Pino and Vadim Lyubashevsky and Gregory Neven and Gregor Seiler}, title = {Practical Quantum-Safe Voting from Lattices}, howpublished = {Cryptology ePrint Archive, Report 2017/1235}, year = {2017}, url = {https://eprint.iacr.org/2017/1235}, } @misc{cryptoeprint:2017:1236, author = {Jean-Charles Faug\`{e}re and Kelsey Horan and Delaram Kahrobaei and Marc Kaplan and Elham Kashefi and Ludovic Perret}, title = {Fast Quantum Algorithm for Solving Multivariate Quadratic Equations}, howpublished = {Cryptology ePrint Archive, Report 2017/1236}, year = {2017}, url = {https://eprint.iacr.org/2017/1236}, } @misc{cryptoeprint:2017:1237, author = {Thang Hoang and Attila A. Yavuz and Jorge Guajardo}, title = {A High-Security Searchable Encryption Framework for Privacy-Critical Cloud Storage Services}, howpublished = {Cryptology ePrint Archive, Report 2017/1237}, year = {2017}, url = {https://eprint.iacr.org/2017/1237}, } @misc{cryptoeprint:2017:1238, author = {Thang Hoang and Ceyhun D. Ozkaptan and Gabriel Hackebeil and Attila A. Yavuz}, title = {Efficient Oblivious Data Structures for Database Services on the Cloud}, howpublished = {Cryptology ePrint Archive, Report 2017/1238}, year = {2017}, url = {https://eprint.iacr.org/2017/1238}, } @misc{cryptoeprint:2017:1239, author = {Shunli Ma and Yi Deng and Debiao He and Jiang Zhang and Xiang Xie}, title = {An Efficient NIZK Scheme for Privacy-Preserving Transactions over Account-Model Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2017/1239}, year = {2017}, url = {https://eprint.iacr.org/2017/1239}, } @misc{cryptoeprint:2017:123, author = {Rishab Goyal and Venkata Koppula and Brent Waters}, title = {Separating IND-CPA and Circular Security for Unbounded Length Key Cycles}, howpublished = {Cryptology ePrint Archive, Report 2017/123}, year = {2017}, url = {https://eprint.iacr.org/2017/123}, } @misc{cryptoeprint:2017:1240, author = {Mridula Singh and Patrick Leu and Srdjan Capkun}, title = {UWB with Pulse Reordering: Securing Ranging against Relay and Physical Layer Attacks}, howpublished = {Cryptology ePrint Archive, Report 2017/1240}, year = {2017}, url = {https://eprint.iacr.org/2017/1240}, } @misc{cryptoeprint:2017:1241, author = {Koichiro Akiyama and Yasuhiro Goto and Shinya Okumura and Tsuyoshi Takagi and Koji Nuida and Goichiro Hanaoka and Hideo Shimizu and Yasuhiko Ikematsu}, title = {A Public-key Encryption Scheme Based on Non-linear Indeterminate Equations (Giophantus)}, howpublished = {Cryptology ePrint Archive, Report 2017/1241}, year = {2017}, url = {https://eprint.iacr.org/2017/1241}, } @misc{cryptoeprint:2017:1242, author = {Taotao Li and Parhat Abla and Mingsheng Wang and Qianwen Wei}, title = {Designing Proof of Transaction Puzzles for Cryptocurrency}, howpublished = {Cryptology ePrint Archive, Report 2017/1242}, year = {2017}, url = {https://eprint.iacr.org/2017/1242}, } @misc{cryptoeprint:2017:1243, author = {Li Hongda and Pan Dongxue and Ni Peifang}, title = {Augmented Black-Box Zero-Knowledge Simulation And Zero Knowledge Argument for NP}, howpublished = {Cryptology ePrint Archive, Report 2017/1243}, year = {2017}, url = {https://eprint.iacr.org/2017/1243}, } @misc{cryptoeprint:2017:1244, author = {Shuang Qiu and Rui Zhang and Yongbin Zhou and Wei Cheng}, title = {Correction on “Further Improving Efficiency of Higher-Order Masking Schemes by Decreasing Randomness Complexity”}, howpublished = {Cryptology ePrint Archive, Report 2017/1244}, year = {2017}, url = {https://eprint.iacr.org/2017/1244}, } @misc{cryptoeprint:2017:1245, author = {Aritra Dhar and Der-Yeuan Yu and Srdjan Capkun}, title = {IntegriKey: End-to-End Integrity Protection of User Input}, howpublished = {Cryptology ePrint Archive, Report 2017/1245}, year = {2017}, url = {https://eprint.iacr.org/2017/1245}, } @misc{cryptoeprint:2017:1246, author = {Alessandro Cilardo and Andrea Primativo}, title = {Verification of FPGA-augmented trusted computing mechanisms based on Applied Pi Calculus}, howpublished = {Cryptology ePrint Archive, Report 2017/1246}, year = {2017}, url = {https://eprint.iacr.org/2017/1246}, } @misc{cryptoeprint:2017:1247, author = {Min Liang and Li Yang}, title = {Block encryption of quantum messages}, howpublished = {Cryptology ePrint Archive, Report 2017/1247}, year = {2017}, url = {https://eprint.iacr.org/2017/1247}, } @misc{cryptoeprint:2017:1248, author = {Elette Boyle and Niv Gilboa and Yuval Ishai and Huijia Lin and Stefano Tessaro}, title = {Foundations of Homomorphic Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2017/1248}, year = {2017}, url = {https://eprint.iacr.org/2017/1248}, } @misc{cryptoeprint:2017:1249, author = {Zheng Li and Xiaoyang Dong and Xiaoyun Wang}, title = {Quantum Cryptanalysis on Some Generalized Feistel Schemes}, howpublished = {Cryptology ePrint Archive, Report 2017/1249}, year = {2017}, url = {https://eprint.iacr.org/2017/1249}, } @misc{cryptoeprint:2017:124, author = {Sanjam Garg and Susumu Kiyoshima and Omkant Pandey}, title = {On the Exact Round Complexity of Self-Composable Two-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2017/124}, year = {2017}, url = {https://eprint.iacr.org/2017/124}, } @misc{cryptoeprint:2017:1250, author = {Saikrishna Badrinarayanan and Yael Tauman Kalai and Dakshita Khurana and Amit Sahai and Daniel Wichs}, title = {Non-Interactive Delegation for Low-Space Non-Deterministic Computation}, howpublished = {Cryptology ePrint Archive, Report 2017/1250}, year = {2017}, url = {https://eprint.iacr.org/2017/1250}, } @misc{cryptoeprint:2017:1251, author = {Nir Drucker and Shay Gueron}, title = {A toolbox for software optimization of QC-MDPC code-based cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2017/1251}, year = {2017}, url = {https://eprint.iacr.org/2017/1251}, } @misc{cryptoeprint:2017:1252, author = {Jacqueline Brendel and Marc Fischlin and Felix Günther}, title = {Breakdown Resilience of Key Exchange Protocols and the Cases of NewHope and TLS 1.3}, howpublished = {Cryptology ePrint Archive, Report 2017/1252}, year = {2017}, url = {https://eprint.iacr.org/2017/1252}, } @misc{cryptoeprint:2017:1253, author = {Yann Le Corre and Johann Gro{\ss}sch{\"a}dl and Daniel Dinu}, title = {Micro-Architectural Power Simulator for Leakage Assessment of Cryptographic Software on ARM Cortex-M3 Processors}, howpublished = {Cryptology ePrint Archive, Report 2017/1253}, year = {2017}, url = {https://eprint.iacr.org/2017/1253}, } @misc{cryptoeprint:2017:1254, author = {Kamil Doruk Gür and Yuriy Polyakov and Kurt Rohloff and Gerard W. Ryan and Hadi Sajjadpour and Erkay Savaş}, title = {Practical Applications of Improved Gaussian Sampling for Trapdoor Lattices}, howpublished = {Cryptology ePrint Archive, Report 2017/1254}, year = {2017}, url = {https://eprint.iacr.org/2017/1254}, } @misc{cryptoeprint:2017:1255, author = {Hanqing Liu and Na Ruan and Rongtian Du and Weijia Jia}, title = {On the Strategy and Behavior of Bitcoin Mining with N-attackers}, howpublished = {Cryptology ePrint Archive, Report 2017/1255}, year = {2017}, url = {https://eprint.iacr.org/2017/1255}, } @misc{cryptoeprint:2017:1256, author = {Ran Canetti and Kyle Hogan and Aanchal Malhotra and Mayank Varia}, title = {A Universally Composable Treatment of Network Time}, howpublished = {Cryptology ePrint Archive, Report 2017/1256}, year = {2017}, url = {https://eprint.iacr.org/2017/1256}, } @misc{cryptoeprint:2017:1257, author = {Oscar Reparaz and Benedikt Gierlichs}, title = {A first-order chosen-plaintext DPA attack on the third round of DES}, howpublished = {Cryptology ePrint Archive, Report 2017/1257}, year = {2017}, url = {https://eprint.iacr.org/2017/1257}, } @misc{cryptoeprint:2017:1258, author = {Yongge Wang and Qutaibah m. Malluhi}, title = {Remarks on Quaternions/Octonion Based Diffie-Hellman Key Exchange Protocol Submitted to NIST PQC Project}, howpublished = {Cryptology ePrint Archive, Report 2017/1258}, year = {2017}, url = {https://eprint.iacr.org/2017/1258}, } @misc{cryptoeprint:2017:1259, author = {Haoyu Li and Renzhang Liu and Yanbin Pan and Tianyuan Xie}, title = {Cryptanalysis of HK17}, howpublished = {Cryptology ePrint Archive, Report 2017/1259}, year = {2017}, url = {https://eprint.iacr.org/2017/1259}, } @misc{cryptoeprint:2017:125, author = {Payman Mohassel and Mike Rosulek}, title = {Non-Interactive Secure 2PC in the Offline/Online and Batch Settings}, howpublished = {Cryptology ePrint Archive, Report 2017/125}, year = {2017}, url = {https://eprint.iacr.org/2017/125}, } @misc{cryptoeprint:2017:1260, author = {Yu Yu and Jiang Zhang and Jian Weng and Chun Guo and Xiangxue Li}, title = {Learning Parity with Noise Implies Collision Resistant Hashing}, howpublished = {Cryptology ePrint Archive, Report 2017/1260}, year = {2017}, url = {https://eprint.iacr.org/2017/1260}, } @misc{cryptoeprint:2017:1261, author = {Sachin Kumar and Jawad Haj-Yahya and Mustafa Khairallah and Anupam Chattopadhyay}, title = {A Comprehensive Performance Analysis of Hardware Implementations of CAESAR Candidates}, howpublished = {Cryptology ePrint Archive, Report 2017/1261}, year = {2017}, url = {https://eprint.iacr.org/2017/1261}, } @misc{cryptoeprint:2017:1262, author = {Gary McGuire and Daniela Mueller}, title = {A few more index calculus algorithms for the ECDLP}, howpublished = {Cryptology ePrint Archive, Report 2017/1262}, year = {2017}, url = {https://eprint.iacr.org/2017/1262}, } @misc{cryptoeprint:2017:126, author = {Seny Kamara and Tarik Moataz}, title = {Boolean Searchable Symmetric Encryption with Worst-Case Sub-Linear Complexity}, howpublished = {Cryptology ePrint Archive, Report 2017/126}, year = {2017}, url = {https://eprint.iacr.org/2017/126}, } @misc{cryptoeprint:2017:127, author = {Prabhanjan Ananth and Aayush Jain and Amit Sahai}, title = {Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/127}, year = {2017}, url = {https://eprint.iacr.org/2017/127}, } @misc{cryptoeprint:2017:128, author = {Kexin Qiao and Ling Song and Meicheng Liu and Jian Guo}, title = {New Collision Attacks on Round-Reduced Keccak}, howpublished = {Cryptology ePrint Archive, Report 2017/128}, year = {2017}, url = {https://eprint.iacr.org/2017/128}, } @misc{cryptoeprint:2017:129, author = {Payman Mohassel and Mike Rosulek and Alessandra Scafuro}, title = {Sublinear Zero-Knowledge Arguments for RAM Programs}, howpublished = {Cryptology ePrint Archive, Report 2017/129}, year = {2017}, url = {https://eprint.iacr.org/2017/129}, } @misc{cryptoeprint:2017:130, author = {Adi Akavia and Tal Moran}, title = {Topology-Hiding Computation Beyond Logarithmic Diameter}, howpublished = {Cryptology ePrint Archive, Report 2017/130}, year = {2017}, url = {https://eprint.iacr.org/2017/130}, } @misc{cryptoeprint:2017:131, author = {Albrecht Petzoldt and Alan Szepieniec and Mohamed Saied Emam Mohamed}, title = {A Practical Multivariate Blind Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2017/131}, year = {2017}, url = {https://eprint.iacr.org/2017/131}, } @misc{cryptoeprint:2017:132, author = {Roel Peeters, Jens Hermans and Aysajan Abidin}, title = {Attacks on Karlsson and Mitrokotsa's Grouping-Proof-Distance-Bounding Protocol}, howpublished = {Cryptology ePrint Archive, Report 2017/132}, year = {2017}, url = {https://eprint.iacr.org/2017/132}, } @misc{cryptoeprint:2017:133, author = {Christian Badertscher and Ueli Maurer}, title = {Composable and Robust Outsourced Storage}, howpublished = {Cryptology ePrint Archive, Report 2017/133}, year = {2017}, url = {https://eprint.iacr.org/2017/133}, } @misc{cryptoeprint:2017:134, author = {Ryan Stanley-Oakes}, title = {A Provably Secure PKCS\#11 Configuration Without Authenticated Attributes}, howpublished = {Cryptology ePrint Archive, Report 2017/134}, year = {2017}, url = {https://eprint.iacr.org/2017/134}, } @misc{cryptoeprint:2017:135, author = {Xiong Fan and Chaya Ganesh and Vladimir Kolesnikov}, title = {Hashing Garbled Circuits for Free}, howpublished = {Cryptology ePrint Archive, Report 2017/135}, year = {2017}, url = {https://eprint.iacr.org/2017/135}, } @misc{cryptoeprint:2017:136, author = {Anna Johnston}, title = {Dispersed Cryptography and the Quotient Ring Transform}, howpublished = {Cryptology ePrint Archive, Report 2017/136}, year = {2017}, url = {https://eprint.iacr.org/2017/136}, } @misc{cryptoeprint:2017:137, author = {Paul Grubbs and Thomas Ristenpart and Yuval Yarom}, title = {Modifying an Enciphering Scheme after Deployment}, howpublished = {Cryptology ePrint Archive, Report 2017/137}, year = {2017}, url = {https://eprint.iacr.org/2017/137}, } @misc{cryptoeprint:2017:138, author = {François-Xavier Standaert}, title = {How (not) to Use Welch's T-test in Side-Channel Security Evaluations}, howpublished = {Cryptology ePrint Archive, Report 2017/138}, year = {2017}, url = {https://eprint.iacr.org/2017/138}, } @misc{cryptoeprint:2017:139, author = {David Gérault and Pascal Lafourcade and Marine Minier and Christine Solnon}, title = {Revisiting AES Related-Key Differential Attacks with Constraint Programming}, howpublished = {Cryptology ePrint Archive, Report 2017/139}, year = {2017}, url = {https://eprint.iacr.org/2017/139}, } @misc{cryptoeprint:2017:140, author = {Nina Bindel and Johannes Buchmann and Florian Göpfert and Markus Schmidt}, title = {Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples}, howpublished = {Cryptology ePrint Archive, Report 2017/140}, year = {2017}, url = {https://eprint.iacr.org/2017/140}, } @misc{cryptoeprint:2017:141, author = {Dario Fiore and Maria Isabel Gonzalez Vasco and Claudio Soriente}, title = {Partitioned Group Password-Based Authenticated Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2017/141}, year = {2017}, url = {https://eprint.iacr.org/2017/141}, } @misc{cryptoeprint:2017:142, author = {Jean-François Biasse and Thomas Espitau and Pierre-Alain Fouque and Alexandre Gélin and Paul Kirchner}, title = {Computing generator in cyclotomic integer rings, A subfield algorithm for the Principal Ideal Problem in L(1/2) and application to cryptanalysis of a FHE scheme}, howpublished = {Cryptology ePrint Archive, Report 2017/142}, year = {2017}, url = {https://eprint.iacr.org/2017/142}, } @misc{cryptoeprint:2017:143, author = {Ran Canetti and Yilei Chen}, title = {Constraint-hiding Constrained PRFs for NC1 from LWE}, howpublished = {Cryptology ePrint Archive, Report 2017/143}, year = {2017}, url = {https://eprint.iacr.org/2017/143}, } @misc{cryptoeprint:2017:144, author = {Gilad Asharov and Shai Halevi and Yehuda Lindell and Tal Rabin}, title = {Privacy-Preserving Search of Similar Patients in Genomic Data}, howpublished = {Cryptology ePrint Archive, Report 2017/144}, year = {2017}, url = {https://eprint.iacr.org/2017/144}, } @misc{cryptoeprint:2017:145, author = {Viet Tung Hoang and Stefano Tessaro}, title = {The Multi-User Security of Double Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/145}, year = {2017}, url = {https://eprint.iacr.org/2017/145}, } @misc{cryptoeprint:2017:146, author = {Mohammad Hajiabadi and Bruce M. Kapron}, title = {Toward Fine-Grained Blackbox Separations Between Semantic and Circular-Security Notions}, howpublished = {Cryptology ePrint Archive, Report 2017/146}, year = {2017}, url = {https://eprint.iacr.org/2017/146}, } @misc{cryptoeprint:2017:147, author = {Amos Beimel and Yuval Ishai and Eyal Kushilevitz}, title = {Ad Hoc PSM Protocols: Secure Computation Without Coordination}, howpublished = {Cryptology ePrint Archive, Report 2017/147}, year = {2017}, url = {https://eprint.iacr.org/2017/147}, } @misc{cryptoeprint:2017:148, author = {Olivier Sanders and Cristina Onete and Pierre-Alain Fouque}, title = {Pattern Matching on Encrypted Streams: Applications to DPI and searches on genomic data}, howpublished = {Cryptology ePrint Archive, Report 2017/148}, year = {2017}, url = {https://eprint.iacr.org/2017/148}, } @misc{cryptoeprint:2017:149, author = {Christian Badertscher and Ueli Maurer and Daniel Tschudi and Vassilis Zikas}, title = {Bitcoin as a Transaction Ledger: A Composable Treatment}, howpublished = {Cryptology ePrint Archive, Report 2017/149}, year = {2017}, url = {https://eprint.iacr.org/2017/149}, } @misc{cryptoeprint:2017:150, author = {Elette Boyle and Niv Gilboa and Yuval Ishai}, title = {Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation}, howpublished = {Cryptology ePrint Archive, Report 2017/150}, year = {2017}, url = {https://eprint.iacr.org/2017/150}, } @misc{cryptoeprint:2017:151, author = {Carmen Elisabetta Zaira Baltico and Dario Catalano and Dario Fiore and Romain Gay}, title = {Practical Functional Encryption for Quadratic Functions with Applications to Predicate Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/151}, year = {2017}, url = {https://eprint.iacr.org/2017/151}, } @misc{cryptoeprint:2017:152, author = {Fermi Ma and Mark Zhandry}, title = {Encryptor Combiners: A Unified Approach to Multiparty NIKE, (H)IBE, and Broadcast Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/152}, year = {2017}, url = {https://eprint.iacr.org/2017/152}, } @misc{cryptoeprint:2017:153, author = {Iraklis Leontiadis and Ming Li}, title = {Storage Efficient Substring Searchable Symmetric Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/153}, year = {2017}, url = {https://eprint.iacr.org/2017/153}, } @misc{cryptoeprint:2017:154, author = {Thorsten Kranz and Friedrich Wiemer and Gregor Leander}, title = {Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2017/154}, year = {2017}, url = {https://eprint.iacr.org/2017/154}, } @misc{cryptoeprint:2017:155, author = {Yoshinori Aono and Phong Q. Nguyen}, title = {Random Sampling Revisited: Lattice Enumeration with Discrete Pruning}, howpublished = {Cryptology ePrint Archive, Report 2017/155}, year = {2017}, url = {https://eprint.iacr.org/2017/155}, } @misc{cryptoeprint:2017:156, author = {Orfeas Stefanos Thyfronitis Litos and Dionysis Zindros}, title = {Trust Is Risk: A Decentralized Financial Trust Platform}, howpublished = {Cryptology ePrint Archive, Report 2017/156}, year = {2017}, url = {https://eprint.iacr.org/2017/156}, } @misc{cryptoeprint:2017:157, author = {Kim Ramchen}, title = {Detecting General Algebraic Manipulation Attacks}, howpublished = {Cryptology ePrint Archive, Report 2017/157}, year = {2017}, url = {https://eprint.iacr.org/2017/157}, } @misc{cryptoeprint:2017:158, author = {Martin Potthast and Christian Forler and Eik List and Stefan Lucks}, title = {Passphone: Outsourcing Phone-based Web Authentication while Protecting User Privacy}, howpublished = {Cryptology ePrint Archive, Report 2017/158}, year = {2017}, url = {https://eprint.iacr.org/2017/158}, } @misc{cryptoeprint:2017:159, author = {Xiaoyang Dong and Zheng Li and Xiaoyun Wang and Ling Qin}, title = {Cube-like Attack on Round-Reduced Initialization of Ketje Sr}, howpublished = {Cryptology ePrint Archive, Report 2017/159}, year = {2017}, url = {https://eprint.iacr.org/2017/159}, } @misc{cryptoeprint:2017:160, author = {Zheng Li and Xiaoyang Dong and Xiaoyun Wang}, title = {Conditional Cube Attack on Round-Reduced ASCON}, howpublished = {Cryptology ePrint Archive, Report 2017/160}, year = {2017}, url = {https://eprint.iacr.org/2017/160}, } @misc{cryptoeprint:2017:161, author = {Giorgia Azzurra Marson and Bertram Poettering}, title = {Security Notions for Bidirectional Channels}, howpublished = {Cryptology ePrint Archive, Report 2017/161}, year = {2017}, url = {https://eprint.iacr.org/2017/161}, } @misc{cryptoeprint:2017:162, author = {Siwei Sun and David Gerault and Pascal Lafourcade and Qianqian Yang and Yosuke Todo and Kexin Qiao and Lei Hu}, title = {Analysis of AES, SKINNY, and Others with Constraint Programming}, howpublished = {Cryptology ePrint Archive, Report 2017/162}, year = {2017}, url = {https://eprint.iacr.org/2017/162}, } @misc{cryptoeprint:2017:163, author = {Anamaria Costache and Nigel P. Smart}, title = {Homomorphic Encryption without Gaussian Noise}, howpublished = {Cryptology ePrint Archive, Report 2017/163}, year = {2017}, url = {https://eprint.iacr.org/2017/163}, } @misc{cryptoeprint:2017:164, author = {Benny Applebaum and Barak Arkis and Pavel Raykov and Prashant Nalini Vasudevan}, title = {Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and Separations}, howpublished = {Cryptology ePrint Archive, Report 2017/164}, year = {2017}, url = {https://eprint.iacr.org/2017/164}, } @misc{cryptoeprint:2017:165, author = {Dhiman Saha and Sukhendu Kuila and Dipanwita Roy Chowdhury}, title = {SymSum: Symmetric-Sum Distinguishers Against Round Reduced SHA3}, howpublished = {Cryptology ePrint Archive, Report 2017/165}, year = {2017}, url = {https://eprint.iacr.org/2017/165}, } @misc{cryptoeprint:2017:166, author = {Kristian Gjøsteen and Martin Strand}, title = {A roadmap to fully homomorphic elections: Stronger security, better verifiability}, howpublished = {Cryptology ePrint Archive, Report 2017/166}, year = {2017}, url = {https://eprint.iacr.org/2017/166}, } @misc{cryptoeprint:2017:167, author = {Christian A. Gorke and Christian Janson and Frederik Armknecht and Carlos Cid}, title = {Cloud Storage File Recoverability}, howpublished = {Cryptology ePrint Archive, Report 2017/167}, year = {2017}, url = {https://eprint.iacr.org/2017/167}, } @misc{cryptoeprint:2017:168, author = {Shay Gueron and Adam Langley and Yehuda Lindell}, title = {AES-GCM-SIV: Specification and Analysis}, howpublished = {Cryptology ePrint Archive, Report 2017/168}, year = {2017}, url = {https://eprint.iacr.org/2017/168}, } @misc{cryptoeprint:2017:169, author = {Nicholas Hilbert, Christian Storer, Dan Lin, Wei Jiang}, title = {UFace: Your Universal Password That No One Can See}, howpublished = {Cryptology ePrint Archive, Report 2017/169}, year = {2017}, url = {https://eprint.iacr.org/2017/169}, } @misc{cryptoeprint:2017:170, author = {Martin Seysen}, title = {Error-free protection of EC point multiplication by modular extension}, howpublished = {Cryptology ePrint Archive, Report 2017/170}, year = {2017}, url = {https://eprint.iacr.org/2017/170}, } @misc{cryptoeprint:2017:171, author = {Daniel P. Martin and Ashley Montanaro and Elisabeth Oswald and Dan Shepherd}, title = {Quantum Key Search with Side Channel Advice}, howpublished = {Cryptology ePrint Archive, Report 2017/171}, year = {2017}, url = {https://eprint.iacr.org/2017/171}, } @misc{cryptoeprint:2017:172, author = {Ashwin Jha and Avradip Mandal and Mridul Nandi}, title = {On The Exact Security of Message Authentication Using Pseudorandom Functions}, howpublished = {Cryptology ePrint Archive, Report 2017/172}, year = {2017}, url = {https://eprint.iacr.org/2017/172}, } @misc{cryptoeprint:2017:173, author = {Marc Stevens and Dan Shumow}, title = {Speeding up detection of SHA-1 collision attacks using unavoidable attack conditions}, howpublished = {Cryptology ePrint Archive, Report 2017/173}, year = {2017}, url = {https://eprint.iacr.org/2017/173}, } @misc{cryptoeprint:2017:174, author = {Ruiyu Zhu and Yan Huang}, title = {Cost-Aware Cut-and-Choose Games with Applications in Cryptography and Prefix-Free Codes}, howpublished = {Cryptology ePrint Archive, Report 2017/174}, year = {2017}, url = {https://eprint.iacr.org/2017/174}, } @misc{cryptoeprint:2017:175, author = {Goutam Paul and Souvik Ray}, title = {Analysis of Burn-in period for RC4 State Transition}, howpublished = {Cryptology ePrint Archive, Report 2017/175}, year = {2017}, url = {https://eprint.iacr.org/2017/175}, } @misc{cryptoeprint:2017:176, author = {Yuval Ishai and Mor Weiss}, title = {Probabilistically Checkable Proofs of Proximity with Zero-Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2017/176}, year = {2017}, url = {https://eprint.iacr.org/2017/176}, } @misc{cryptoeprint:2017:177, author = {Navid Nasr Esfahani, Ian Goldberg and D. R. Stinson}, title = {Some results on the existence of $t$-all-or-nothing transforms over arbitrary alphabets}, howpublished = {Cryptology ePrint Archive, Report 2017/177}, year = {2017}, url = {https://eprint.iacr.org/2017/177}, } @misc{cryptoeprint:2017:178, author = {Zhengbin Liu and Yongqiang Li and Mingsheng Wang}, title = {Optimal Differential Trails in SIMON-like Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2017/178}, year = {2017}, url = {https://eprint.iacr.org/2017/178}, } @misc{cryptoeprint:2017:179, author = {Fan Zhang and Ittay Eyal and Robert Escriva and Ari Juels and Robbert van Renesse}, title = {REM: Resource-Efficient Mining for Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2017/179}, year = {2017}, url = {https://eprint.iacr.org/2017/179}, } @misc{cryptoeprint:2017:180, author = {Yaoqi Jia and Shruti Tople and Tarik Moataz and Deli Gong and Prateek Saxena and Zhenkai Liang}, title = {Robust Synchronous P2P Primitives Using SGX Enclaves}, howpublished = {Cryptology ePrint Archive, Report 2017/180}, year = {2017}, url = {https://eprint.iacr.org/2017/180}, } @misc{cryptoeprint:2017:181, author = {Silvia Mella and Joan Daemen and Gilles Van Assche}, title = {New techniques for trail bounds and application to differential trails in Keccak}, howpublished = {Cryptology ePrint Archive, Report 2017/181}, year = {2017}, url = {https://eprint.iacr.org/2017/181}, } @misc{cryptoeprint:2017:182, author = {Leif Both and Alexander May}, title = {The Approximate $k$-List Problem}, howpublished = {Cryptology ePrint Archive, Report 2017/182}, year = {2017}, url = {https://eprint.iacr.org/2017/182}, } @misc{cryptoeprint:2017:183, author = {Subhadeep Banik and Andrey Bogdanov and Takanori Isobe and Martin Bjerregaard Jepsen}, title = {Analysis of Software Countermeasures for Whitebox Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/183}, year = {2017}, url = {https://eprint.iacr.org/2017/183}, } @misc{cryptoeprint:2017:184, author = {Guillaume Endignoux, Damian Vizár}, title = {Linking Online Misuse-Resistant Authenticated Encryption and Blockwise Attack Models}, howpublished = {Cryptology ePrint Archive, Report 2017/184}, year = {2017}, url = {https://eprint.iacr.org/2017/184}, } @misc{cryptoeprint:2017:185, author = {Setareh Sharifian, and Reihaneh Safavi-Naini, and Fuchun Lin}, title = {A Virtual Wiretap Channel for Secure MessageTransmission}, howpublished = {Cryptology ePrint Archive, Report 2017/185}, year = {2017}, url = {https://eprint.iacr.org/2017/185}, } @misc{cryptoeprint:2017:186, author = {Youngho Yoo and Reza Azarderakhsh and Amir Jalali and David Jao and Vladimir Soukharev}, title = {A Post-Quantum Digital Signature Scheme Based on Supersingular Isogenies}, howpublished = {Cryptology ePrint Archive, Report 2017/186}, year = {2017}, url = {https://eprint.iacr.org/2017/186}, } @misc{cryptoeprint:2017:187, author = {H. Gopalakrishna Gadiyar and R. Padma}, title = {The discrete logarithm problem over prime fields: the safe prime case. The Smart attack, non-canonical lifts and logarithmic derivatives}, howpublished = {Cryptology ePrint Archive, Report 2017/187}, year = {2017}, url = {https://eprint.iacr.org/2017/187}, } @misc{cryptoeprint:2017:188, author = {Wenying Zhang and Vincent Rijmen}, title = {Division Cryptanalysis of Block Ciphers with a Binary Diffusion Layer}, howpublished = {Cryptology ePrint Archive, Report 2017/188}, year = {2017}, url = {https://eprint.iacr.org/2017/188}, } @misc{cryptoeprint:2017:189, author = {Xiao Wang and Samuel Ranellucci and Jonathan Katz}, title = {Global-Scale Secure Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2017/189}, year = {2017}, url = {https://eprint.iacr.org/2017/189}, } @misc{cryptoeprint:2017:190, author = {Marc Stevens and Elie Bursztein and Pierre Karpman and Ange Albertini and Yarik Markov}, title = {The first collision for full SHA-1}, howpublished = {Cryptology ePrint Archive, Report 2017/190}, year = {2017}, url = {https://eprint.iacr.org/2017/190}, } @misc{cryptoeprint:2017:191, author = {David Sommer and Aritra Dhar and Luka Malisa and Esfandiar Mohammadi and Daniel Ronzani and Srdjan Capkun}, title = {CoverUp: Privacy Through "Forced" Participation in Anonymous Communication Networks}, howpublished = {Cryptology ePrint Archive, Report 2017/191}, year = {2017}, url = {https://eprint.iacr.org/2017/191}, } @misc{cryptoeprint:2017:192, author = {Shuyang Tang and Zhiqiang Liu and Zhen Liu and Yu Long and Shengli Liu}, title = {Improved Hybrid Consensus Scheme with Privacy-preserving Property}, howpublished = {Cryptology ePrint Archive, Report 2017/192}, year = {2017}, url = {https://eprint.iacr.org/2017/192}, } @misc{cryptoeprint:2017:193, author = {Shuwen Deng and Do\u{g}uhan G\"{u}m\"{u}\c{s}o\u{g}lu and Wenjie Xiong and Y. Serhan Gener and Onur Demir and Jakub Szefer}, title = {SecChisel: Language and Tool for Practical and Scalable Security Verification of Security-Aware Hardware Architectures}, howpublished = {Cryptology ePrint Archive, Report 2017/193}, year = {2017}, url = {https://eprint.iacr.org/2017/193}, } @misc{cryptoeprint:2017:194, author = {Andrea Visconti and Chiara Valentina Schiavo and René Peralta}, title = {Improved upper bounds for the expected circuit complexity of dense systems of linear equations over GF(2)}, howpublished = {Cryptology ePrint Archive, Report 2017/194}, year = {2017}, url = {https://eprint.iacr.org/2017/194}, } @misc{cryptoeprint:2017:195, author = {Chaoyun Li and Qingju Wang}, title = {Design of Lightweight Linear Diffusion Layers from Near-MDS Matrices}, howpublished = {Cryptology ePrint Archive, Report 2017/195}, year = {2017}, url = {https://eprint.iacr.org/2017/195}, } @misc{cryptoeprint:2017:196, author = {BaoHong Li, Guoqing Xu and Yinliang Zhao}, title = {Attribute-based concurrent signatures}, howpublished = {Cryptology ePrint Archive, Report 2017/196}, year = {2017}, url = {https://eprint.iacr.org/2017/196}, } @misc{cryptoeprint:2017:197, author = {Wenying Zhang, Zhaohui Xing and Keqin Feng}, title = {A Construction of Bent Functions with Optimal Algebraic Degree and Large Symmetric Group}, howpublished = {Cryptology ePrint Archive, Report 2017/197}, year = {2017}, url = {https://eprint.iacr.org/2017/197}, } @misc{cryptoeprint:2017:198, author = {Masahiro Yagisawa}, title = {FHE with Recursive Ciphertext }, howpublished = {Cryptology ePrint Archive, Report 2017/198}, year = {2017}, url = {https://eprint.iacr.org/2017/198}, } @misc{cryptoeprint:2017:199, author = {Dustin Moody and Ray Perlner and Daniel Smith-Tone}, title = {Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2017/199}, year = {2017}, url = {https://eprint.iacr.org/2017/199}, } @misc{cryptoeprint:2017:200, author = {Jan Camenisch and Manu Drijvers and Anja Lehmann}, title = {Anonymous Attestation with Subverted TPMs}, howpublished = {Cryptology ePrint Archive, Report 2017/200}, year = {2017}, url = {https://eprint.iacr.org/2017/200}, } @misc{cryptoeprint:2017:201, author = {Gabriel Kaptchuk and Ian Miers and Matthew Green}, title = {Managing Secrets with Consensus Networks: Fairness, Ransomware and Access Control}, howpublished = {Cryptology ePrint Archive, Report 2017/201}, year = {2017}, url = {https://eprint.iacr.org/2017/201}, } @misc{cryptoeprint:2017:202, author = {Marshall Ball and Alon Rosen and Manuel Sabin and Prashant Nalini Vasudevan}, title = {Average-Case Fine-Grained Hardness}, howpublished = {Cryptology ePrint Archive, Report 2017/202}, year = {2017}, url = {https://eprint.iacr.org/2017/202}, } @misc{cryptoeprint:2017:203, author = {Marshall Ball and Alon Rosen and Manuel Sabin and Prashant Nalini Vasudevan}, title = {Proofs of Useful Work}, howpublished = {Cryptology ePrint Archive, Report 2017/203}, year = {2017}, url = {https://eprint.iacr.org/2017/203}, } @misc{cryptoeprint:2017:204, author = {Tomer Ashur, Daniël Bodden, and Orr Dunkelman}, title = {Linear Cryptanalysis Using Low-bias Linear Approximations}, howpublished = {Cryptology ePrint Archive, Report 2017/204}, year = {2017}, url = {https://eprint.iacr.org/2017/204}, } @misc{cryptoeprint:2017:205, author = {Anindya Shankar Bhandari and Dipanwita Roy Chowdhury}, title = {ZETA: Towards Tagless Authenticated Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/205}, year = {2017}, url = {https://eprint.iacr.org/2017/205}, } @misc{cryptoeprint:2017:206, author = {Yongge Wang }, title = {Revised Quantum Resistant Public Key Encryption Scheme RLCE and IND-CCA2 Security for McEliece Schemes}, howpublished = {Cryptology ePrint Archive, Report 2017/206}, year = {2017}, url = {https://eprint.iacr.org/2017/206}, } @misc{cryptoeprint:2017:207, author = {Gizem S Cetin and Hao Chen and Kim Laine and Kristin Lauter and Peter Rindal and Yuhou Xia}, title = {Private Queries on Encrypted Genomic Data}, howpublished = {Cryptology ePrint Archive, Report 2017/207}, year = {2017}, url = {https://eprint.iacr.org/2017/207}, } @misc{cryptoeprint:2017:208, author = {Sylvain Ruhault}, title = {SoK: Security Models for Pseudo-Random Number Generators}, howpublished = {Cryptology ePrint Archive, Report 2017/208}, year = {2017}, url = {https://eprint.iacr.org/2017/208}, } @misc{cryptoeprint:2017:209, author = {Qipeng Liu and Mark Zhandry}, title = {Exploding Obfuscation: A Framework for Building Applications of Obfuscation From Polynomial Hardness}, howpublished = {Cryptology ePrint Archive, Report 2017/209}, year = {2017}, url = {https://eprint.iacr.org/2017/209}, } @misc{cryptoeprint:2017:210, author = {Charles Herder and Benjamin Fuller and Marten van Dijk and Srinivas Devadas}, title = {Public Key Cryptosystems with Noisy Secret Keys}, howpublished = {Cryptology ePrint Archive, Report 2017/210}, year = {2017}, url = {https://eprint.iacr.org/2017/210}, } @misc{cryptoeprint:2017:211, author = {James Alderman and Keith M. Martin and Sarah Louise Renwick}, title = {Multi-level Access in Searchable Symmetric Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/211}, year = {2017}, url = {https://eprint.iacr.org/2017/211}, } @misc{cryptoeprint:2017:212, author = {Craig Costello and Benjamin Smith}, title = {Montgomery curves and their arithmetic: The case of large characteristic fields}, howpublished = {Cryptology ePrint Archive, Report 2017/212}, year = {2017}, url = {https://eprint.iacr.org/2017/212}, } @misc{cryptoeprint:2017:213, author = {Ghazal Kachigar and Jean-Pierre Tillich}, title = {Quantum Information Set Decoding Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2017/213}, year = {2017}, url = {https://eprint.iacr.org/2017/213}, } @misc{cryptoeprint:2017:214, author = {Carmit Hazay and Peter Scholl and Eduardo Soria-Vazquez}, title = {Low Cost Constant Round MPC Combining BMR and Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2017/214}, year = {2017}, url = {https://eprint.iacr.org/2017/214}, } @misc{cryptoeprint:2017:215, author = {Ozgur Oksuz and Iraklis Leontiadis and Sixia Chen and Alexander Russell and Qiang Tang and Bing Wang}, title = {SEVDSI: Secure, Efficient and Verifiable Data Set Intersection}, howpublished = {Cryptology ePrint Archive, Report 2017/215}, year = {2017}, url = {https://eprint.iacr.org/2017/215}, } @misc{cryptoeprint:2017:216, author = {Ignacio Cascudo and Bernardo David}, title = {SCRAPE: Scalable Randomness Attested by Public Entities}, howpublished = {Cryptology ePrint Archive, Report 2017/216}, year = {2017}, url = {https://eprint.iacr.org/2017/216}, } @misc{cryptoeprint:2017:217, author = {Kuo-Hui Yeh}, title = {Cryptanalysis of Wang et al’s Certificateless Signature Scheme without Bilinear Pairings}, howpublished = {Cryptology ePrint Archive, Report 2017/217}, year = {2017}, url = {https://eprint.iacr.org/2017/217}, } @misc{cryptoeprint:2017:218, author = {Kenji Yasunaga and Kosuke Yuzawa}, title = {Repeated Games for Generating Randomness in Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/218}, year = {2017}, url = {https://eprint.iacr.org/2017/218}, } @misc{cryptoeprint:2017:219, author = {Chun-I Fan and Yi-Fan Tseng and Chih-Wen Lin}, title = {Attribute-Based Encryption from Identity-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/219}, year = {2017}, url = {https://eprint.iacr.org/2017/219}, } @misc{cryptoeprint:2017:220, author = {Kazuhiko Minematsu and Tetsu Iwata}, title = {Cryptanalysis of PMACx, PMAC2x, and SIVx}, howpublished = {Cryptology ePrint Archive, Report 2017/220}, year = {2017}, url = {https://eprint.iacr.org/2017/220}, } @misc{cryptoeprint:2017:221, author = {Florian Göpfert and Christine van Vredendaal and Thomas Wunderer}, title = {A Hybrid Lattice Basis Reduction and Quantum Search Attack on LWE}, howpublished = {Cryptology ePrint Archive, Report 2017/221}, year = {2017}, url = {https://eprint.iacr.org/2017/221}, } @misc{cryptoeprint:2017:222, author = {Nizamud Dina, Arif Iqbal Umar, Abdul Waheed, Noor ul Amin}, title = {A Note on Obtain Confidentiality or/ and Authenticity in Big Data by ID-Based Generalized Signcryption}, howpublished = {Cryptology ePrint Archive, Report 2017/222}, year = {2017}, url = {https://eprint.iacr.org/2017/222}, } @misc{cryptoeprint:2017:223, author = {Felix Günther and Britta Hale and Tibor Jager and Sebastian Lauer}, title = {0-RTT Key Exchange with Full Forward Secrecy}, howpublished = {Cryptology ePrint Archive, Report 2017/223}, year = {2017}, url = {https://eprint.iacr.org/2017/223}, } @misc{cryptoeprint:2017:224, author = {Hao Chen and Kim Laine and Rachel Player}, title = {Simple Encrypted Arithmetic Library - SEAL v2.1}, howpublished = {Cryptology ePrint Archive, Report 2017/224}, year = {2017}, url = {https://eprint.iacr.org/2017/224}, } @misc{cryptoeprint:2017:225, author = {Ling Ren and Srinivas Devadas}, title = {Bandwidth Hard Functions for ASIC Resistance}, howpublished = {Cryptology ePrint Archive, Report 2017/225}, year = {2017}, url = {https://eprint.iacr.org/2017/225}, } @misc{cryptoeprint:2017:226, author = {Ruiyu Zhu and Yan Huang}, title = {JIMU: Faster LEGO-based Secure Computation using Additive Homomorphic Hashes}, howpublished = {Cryptology ePrint Archive, Report 2017/226}, year = {2017}, url = {https://eprint.iacr.org/2017/226}, } @misc{cryptoeprint:2017:227, author = {Hubert Ritzdorf and Claudio Soriente and Ghassan O. Karame and Srdjan Marinovic and Damian Gruber and Srdjan Capkun}, title = {Towards Shared Ownership in the Cloud}, howpublished = {Cryptology ePrint Archive, Report 2017/227}, year = {2017}, url = {https://eprint.iacr.org/2017/227}, } @misc{cryptoeprint:2017:228, author = {João Sá Sousa and Cédric Lefebvre and Zhicong Huang and Jean Louis Raisaro and Carlos Aguilar and Marc-Olivier Killijian and Jean-Pierre Hubaux}, title = {Efficient and Secure Outsourcing of Genomic Data Storage}, howpublished = {Cryptology ePrint Archive, Report 2017/228}, year = {2017}, url = {https://eprint.iacr.org/2017/228}, } @misc{cryptoeprint:2017:229, author = {Claude Cr\'epeau and Nan Yang}, title = {Multi-Prover Interactive Proofs: Unsound Foundations}, howpublished = {Cryptology ePrint Archive, Report 2017/229}, year = {2017}, url = {https://eprint.iacr.org/2017/229}, } @misc{cryptoeprint:2017:230, author = {Yaron Velner and Jason Teutsch and Loi Luu}, title = {Smart Contracts Make Bitcoin Mining Pools Vulnerable}, howpublished = {Cryptology ePrint Archive, Report 2017/230}, year = {2017}, url = {https://eprint.iacr.org/2017/230}, } @misc{cryptoeprint:2017:231, author = {Sergey Agievich}, title = {EHE: nonce misuse-resistant message authentication}, howpublished = {Cryptology ePrint Archive, Report 2017/231}, year = {2017}, url = {https://eprint.iacr.org/2017/231}, } @misc{cryptoeprint:2017:232, author = {Alexander Chepurnoy and Tuyet Duong and Lei Fan and Hong-Sheng Zhou}, title = {TwinsCoin: A Cryptocurrency via Proof-of-Work and Proof-of-Stake}, howpublished = {Cryptology ePrint Archive, Report 2017/232}, year = {2017}, url = {https://eprint.iacr.org/2017/232}, } @misc{cryptoeprint:2017:233, author = {Shashank Agrawal and Melissa Chase}, title = {Simplifying Design and Analysis of Complex Predicate Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2017/233}, year = {2017}, url = {https://eprint.iacr.org/2017/233}, } @misc{cryptoeprint:2017:234, author = {Kevin Milner and Cas Cremers and Jiangshan Yu and Mark Ryan}, title = {Automatically Detecting the Misuse of Secrets: Foundations, Design Principles, and Applications}, howpublished = {Cryptology ePrint Archive, Report 2017/234}, year = {2017}, url = {https://eprint.iacr.org/2017/234}, } @misc{cryptoeprint:2017:235, author = {Isheeta Nargis}, title = {Efficient Oblivious Transfer from Lossy Threshold Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/235}, year = {2017}, url = {https://eprint.iacr.org/2017/235}, } @misc{cryptoeprint:2017:236, author = {Pierre Loidreau}, title = {A new rank metric codes based encryption scheme}, howpublished = {Cryptology ePrint Archive, Report 2017/236}, year = {2017}, url = {https://eprint.iacr.org/2017/236}, } @misc{cryptoeprint:2017:237, author = {Tim Ruffing and Giulio Malavolta}, title = {Switch Commitments: A Safety Switch for Confidential Transactions}, howpublished = {Cryptology ePrint Archive, Report 2017/237}, year = {2017}, url = {https://eprint.iacr.org/2017/237}, } @misc{cryptoeprint:2017:238, author = {Tim Ruffing and Pedro Moreno-Sanchez}, title = {Mixing Confidential Transactions: Comprehensive Transaction Privacy for Bitcoin}, howpublished = {Cryptology ePrint Archive, Report 2017/238}, year = {2017}, url = {https://eprint.iacr.org/2017/238}, } @misc{cryptoeprint:2017:239, author = {Tomer Ashur and Orr Dunkelman and Atul Luykx}, title = {Boosting Authenticated Encryption Robustness With Minimal Modifications}, howpublished = {Cryptology ePrint Archive, Report 2017/239}, year = {2017}, url = {https://eprint.iacr.org/2017/239}, } @misc{cryptoeprint:2017:240, author = {Dan Boneh and Yuval Ishai and Amit Sahai and David J. Wu}, title = {Lattice-Based SNARGs and Their Application to More Efficient Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2017/240}, year = {2017}, url = {https://eprint.iacr.org/2017/240}, } @misc{cryptoeprint:2017:241, author = {Alexander Russell and Cristopher Moore and Aggelos Kiayias and Saad Quader}, title = {Forkable Strings are Rare}, howpublished = {Cryptology ePrint Archive, Report 2017/241}, year = {2017}, url = {https://eprint.iacr.org/2017/241}, } @misc{cryptoeprint:2017:242, author = {Riad S. Wahby and Ye Ji and Andrew J. Blumberg and abhi shelat and Justin Thaler and Michael Walfish and Thomas Wies}, title = {Full accounting for verifiable outsourcing}, howpublished = {Cryptology ePrint Archive, Report 2017/242}, year = {2017}, url = {https://eprint.iacr.org/2017/242}, } @misc{cryptoeprint:2017:243, author = {Colin Boyd and Xavier Boyen and Christopher Carr and Thomas Haines}, title = {Key Recovery: Inert and Public}, howpublished = {Cryptology ePrint Archive, Report 2017/243}, year = {2017}, url = {https://eprint.iacr.org/2017/243}, } @misc{cryptoeprint:2017:244, author = {Mateus Borges and Quoc-Sang Phan and Antonio Filieri and Corina S. P\u{a}s\u{a}reanu}, title = {Model-counting Approaches For Nonlinear Numerical Constraints}, howpublished = {Cryptology ePrint Archive, Report 2017/244}, year = {2017}, url = {https://eprint.iacr.org/2017/244}, } @misc{cryptoeprint:2017:245, author = {Berk Gulmezoglu and Thomas Eisenbarth and Berk Sunar}, title = {Cache-Base Application Detection in the Cloud Using Machine Learning}, howpublished = {Cryptology ePrint Archive, Report 2017/245}, year = {2017}, url = {https://eprint.iacr.org/2017/245}, } @misc{cryptoeprint:2017:246, author = {Joël Cathébras and Alexandre Carbon and Renaud Sirdey and Nicolas Ventroux}, title = {An Analysis of FV Parameters Impact Towards its Hardware Acceleration}, howpublished = {Cryptology ePrint Archive, Report 2017/246}, year = {2017}, url = {https://eprint.iacr.org/2017/246}, } @misc{cryptoeprint:2017:247, author = {Mohamed Saied Emam Mohamed and Albrecht Petzoldt}, title = {Efficient Multivariate Ring Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2017/247}, year = {2017}, url = {https://eprint.iacr.org/2017/247}, } @misc{cryptoeprint:2017:248, author = {Dillibabu Shanmugam and Ravikumar Selvam and Suganya Annadurai}, title = {IPcore implementation susceptibility: A case study of Low latency ciphers}, howpublished = {Cryptology ePrint Archive, Report 2017/248}, year = {2017}, url = {https://eprint.iacr.org/2017/248}, } @misc{cryptoeprint:2017:249, author = {Mitar Milutinovic and Warren He and Howard Wu and Maxinder Kanwal}, title = {Proof of Luck: an Efficient Blockchain Consensus Protocol}, howpublished = {Cryptology ePrint Archive, Report 2017/249}, year = {2017}, url = {https://eprint.iacr.org/2017/249}, } @misc{cryptoeprint:2017:250, author = {Huijia Lin and Stefano Tessaro }, title = {Indistinguishability Obfuscation from Trilinear Maps and Block-Wise Local PRGs}, howpublished = {Cryptology ePrint Archive, Report 2017/250}, year = {2017}, url = {https://eprint.iacr.org/2017/250}, } @misc{cryptoeprint:2017:251, author = {Dan Boneh and Rosario Gennaro and Steven Goldfeder and Sam Kim}, title = {A Lattice-Based Universal Thresholdizer for Cryptographic Systems}, howpublished = {Cryptology ePrint Archive, Report 2017/251}, year = {2017}, url = {https://eprint.iacr.org/2017/251}, } @misc{cryptoeprint:2017:252, author = {Jean-Sebastien Coron}, title = {High-Order Conversion From Boolean to Arithmetic Masking}, howpublished = {Cryptology ePrint Archive, Report 2017/252}, year = {2017}, url = {https://eprint.iacr.org/2017/252}, } @misc{cryptoeprint:2017:253, author = {Chris Brzuska and Håkon Jacobsen}, title = {A Modular Security Analysis of EAP and IEEE 802.11}, howpublished = {Cryptology ePrint Archive, Report 2017/253}, year = {2017}, url = {https://eprint.iacr.org/2017/253}, } @misc{cryptoeprint:2017:254, author = {Changhai Ou and Degang Sun and Zhu Wang and Xinping Zhou}, title = {Towards Easy Key Enumeration}, howpublished = {Cryptology ePrint Archive, Report 2017/254}, year = {2017}, url = {https://eprint.iacr.org/2017/254}, } @misc{cryptoeprint:2017:255, author = {Lorenzo Grassi and Christian Rechberger}, title = {New and Old Limits for AES Known-Key Distinguishers}, howpublished = {Cryptology ePrint Archive, Report 2017/255}, year = {2017}, url = {https://eprint.iacr.org/2017/255}, } @misc{cryptoeprint:2017:256, author = {Ralf Kuesters and Daniel Rausch}, title = {A Framework for Universally Composable Diffie-Hellman Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2017/256}, year = {2017}, url = {https://eprint.iacr.org/2017/256}, } @misc{cryptoeprint:2017:257, author = {Aayush Jain and Peter M. R. Rasmussen and Amit Sahai}, title = {Threshold Fully Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/257}, year = {2017}, url = {https://eprint.iacr.org/2017/257}, } @misc{cryptoeprint:2017:258, author = {Chris Peikert and Oded Regev and Noah Stephens-Davidowitz}, title = {Pseudorandomness of Ring-LWE for Any Ring and Modulus}, howpublished = {Cryptology ePrint Archive, Report 2017/258}, year = {2017}, url = {https://eprint.iacr.org/2017/258}, } @misc{cryptoeprint:2017:259, author = {Daniele Micciancio and Michael Walter}, title = {Gaussian Sampling over the Integers: Efficient, Generic, Constant-Time}, howpublished = {Cryptology ePrint Archive, Report 2017/259}, year = {2017}, url = {https://eprint.iacr.org/2017/259}, } @misc{cryptoeprint:2017:260, author = {Shoichi Hirose and Yu Sasaki and Kan Yasuda}, title = {Message-Recovery MACs and Verification-Unskippable AE}, howpublished = {Cryptology ePrint Archive, Report 2017/260}, year = {2017}, url = {https://eprint.iacr.org/2017/260}, } @misc{cryptoeprint:2017:261, author = {Annelie Heuser, Stjepan Picek, Sylvain Guilley, Nele Mentens}, title = {Side-channel Analysis of Lightweight Ciphers: Does Lightweight Equal Easy?}, howpublished = {Cryptology ePrint Archive, Report 2017/261}, year = {2017}, url = {https://eprint.iacr.org/2017/261}, } @misc{cryptoeprint:2017:262, author = {Peter Scholl and Nigel P. Smart and Tim Wood}, title = {When It’s All Just Too Much: Outsourcing MPC-Preprocessing}, howpublished = {Cryptology ePrint Archive, Report 2017/262}, year = {2017}, url = {https://eprint.iacr.org/2017/262}, } @misc{cryptoeprint:2017:263, author = {Sylvain Guilley and Liran Lerman}, title = {Bivariate attacks and confusion coefficients}, howpublished = {Cryptology ePrint Archive, Report 2017/263}, year = {2017}, url = {https://eprint.iacr.org/2017/263}, } @misc{cryptoeprint:2017:264, author = {Thomaz Oliveira and Julio L\'opez and H\"useyin H{\i}\c{s}{\i}l and Armando Faz-Hern\'andez and Francisco Rodrı\'iguez-Henrı\'iquez }, title = {A note on how to (pre-)compute a ladder}, howpublished = {Cryptology ePrint Archive, Report 2017/264}, year = {2017}, url = {https://eprint.iacr.org/2017/264}, } @misc{cryptoeprint:2017:265, author = {Kamalesh Acharya and Ratna Dutta}, title = {Enhanced Outsider-anonymous Broadcast Encryption with Subset Difference Revocation}, howpublished = {Cryptology ePrint Archive, Report 2017/265}, year = {2017}, url = {https://eprint.iacr.org/2017/265}, } @misc{cryptoeprint:2017:266, author = {Tyge Tiessen}, title = {From Higher-Order Differentials to Polytopic Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2017/266}, year = {2017}, url = {https://eprint.iacr.org/2017/266}, } @misc{cryptoeprint:2017:267, author = {Seungkwang Lee}, title = {A Masked White-box Cryptographic Implementation for Protecting against Differential Computation Analysis}, howpublished = {Cryptology ePrint Archive, Report 2017/267}, year = {2017}, url = {https://eprint.iacr.org/2017/267}, } @misc{cryptoeprint:2017:268, author = {Russell W. F. Lai and Tao Zhang and Sherman S. M. Chow and Dominique Schröder }, title = {Efficient Sanitizable Signatures without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2017/268}, year = {2017}, url = {https://eprint.iacr.org/2017/268}, } @misc{cryptoeprint:2017:269, author = {Okan Seker and Thomas Eisenbarth and Rainer Steinwandt}, title = {Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks}, howpublished = {Cryptology ePrint Archive, Report 2017/269}, year = {2017}, url = {https://eprint.iacr.org/2017/269}, } @misc{cryptoeprint:2017:270, author = {Keita Inasawa and Kenji Yasunaga}, title = {Rational Proofs against Rational Verifiers}, howpublished = {Cryptology ePrint Archive, Report 2017/270}, year = {2017}, url = {https://eprint.iacr.org/2017/270}, } @misc{cryptoeprint:2017:271, author = {Jean-Sebastien Coron and Franck Rondepierre and Rina Zeitoun}, title = {High Order Masking of Look-up Tables with Common Shares}, howpublished = {Cryptology ePrint Archive, Report 2017/271}, year = {2017}, url = {https://eprint.iacr.org/2017/271}, } @misc{cryptoeprint:2017:272, author = {Florian Unterstein and Johann Heyszl and Fabrizio De Santis and Robert Specht}, title = {Dissecting Leakage Resilient PRFs with Multivariate Localized EM Attacks - A Practical Security Evaluation on FPGA}, howpublished = {Cryptology ePrint Archive, Report 2017/272}, year = {2017}, url = {https://eprint.iacr.org/2017/272}, } @misc{cryptoeprint:2017:273, author = {Huijia Lin and Rafael Pass and Pratik Soni}, title = {Two-Round and Non-interactive Concurrent Non-Malleable Commitments from Time-Lock Puzzles}, howpublished = {Cryptology ePrint Archive, Report 2017/273}, year = {2017}, url = {https://eprint.iacr.org/2017/273}, } @misc{cryptoeprint:2017:274, author = {Rishab Goyal and Venkata Koppula and Brent Waters}, title = {Lockable Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2017/274}, year = {2017}, url = {https://eprint.iacr.org/2017/274}, } @misc{cryptoeprint:2017:275, author = {Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka}, title = {Simple Generic Constructions of Succinct Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/275}, year = {2017}, url = {https://eprint.iacr.org/2017/275}, } @misc{cryptoeprint:2017:276, author = {Daniel Wichs and Giorgos Zirdelis}, title = {Obfuscating Compute-and-Compare Programs under LWE}, howpublished = {Cryptology ePrint Archive, Report 2017/276}, year = {2017}, url = {https://eprint.iacr.org/2017/276}, } @misc{cryptoeprint:2017:277, author = {Alex Lombardi and Vinod Vaikuntanathan}, title = {Minimizing the Complexity of Goldreich's Pseudorandom Generator}, howpublished = {Cryptology ePrint Archive, Report 2017/277}, year = {2017}, url = {https://eprint.iacr.org/2017/277}, } @misc{cryptoeprint:2017:278, author = {Yunwen Liu and Vincent Rijmen}, title = {New Observations on Invariant Subspace Attack}, howpublished = {Cryptology ePrint Archive, Report 2017/278}, year = {2017}, url = {https://eprint.iacr.org/2017/278}, } @misc{cryptoeprint:2017:279, author = {Melissa Chase and David Derler and Steven Goldfeder and Claudio Orlandi and Sebastian Ramacher and Christian Rechberger and Daniel Slamanig and Greg Zaverucha}, title = {Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives}, howpublished = {Cryptology ePrint Archive, Report 2017/279}, year = {2017}, url = {https://eprint.iacr.org/2017/279}, } @misc{cryptoeprint:2017:280, author = {Rafael del Pino and Vadim Lyubashevsky}, title = {Amortization with Fewer Equations for Proving Knowledge of Small Secrets}, howpublished = {Cryptology ePrint Archive, Report 2017/280}, year = {2017}, url = {https://eprint.iacr.org/2017/280}, } @misc{cryptoeprint:2017:281, author = {Keith Bonawitz and Vladimir Ivanov and Ben Kreuter and Antonio Marcedone and H. Brendan McMahan and Sarvar Patel and Daniel Ramage and Aaron Segal and Karn Seth}, title = {Practical Secure Aggregation for Privacy Preserving Machine Learning}, howpublished = {Cryptology ePrint Archive, Report 2017/281}, year = {2017}, url = {https://eprint.iacr.org/2017/281}, } @misc{cryptoeprint:2017:282, author = {Dominique Unruh}, title = {Collapsing sponges: Post-quantum security of the sponge construction}, howpublished = {Cryptology ePrint Archive, Report 2017/282}, year = {2017}, url = {https://eprint.iacr.org/2017/282}, } @misc{cryptoeprint:2017:283, author = {Thorben Moos and Amir Moradi}, title = {On the Easiness of Turning Higher-Order Leakages into First-Order}, howpublished = {Cryptology ePrint Archive, Report 2017/283}, year = {2017}, url = {https://eprint.iacr.org/2017/283}, } @misc{cryptoeprint:2017:284, author = {Maik Ender and Alexander Wild and Amir Moradi}, title = {SafeDRP: Yet Another Way Toward Power-Equalized Designs in FPGA}, howpublished = {Cryptology ePrint Archive, Report 2017/284}, year = {2017}, url = {https://eprint.iacr.org/2017/284}, } @misc{cryptoeprint:2017:285, author = {Kamil Doruk G\"{u}r and Yuriy Polyakov and Kurt Rohloff and Gerard W. Ryan and Erkay Sava\c{s}}, title = {Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors}, howpublished = {Cryptology ePrint Archive, Report 2017/285}, year = {2017}, url = {https://eprint.iacr.org/2017/285}, } @misc{cryptoeprint:2017:286, author = {Wenquan Bi and Zheng Li and Xiaoyang Dong and Xiaoyun Wang}, title = {Impossible Differential Attack on Midori128 Using Rebound-like Technique}, howpublished = {Cryptology ePrint Archive, Report 2017/286}, year = {2017}, url = {https://eprint.iacr.org/2017/286}, } @misc{cryptoeprint:2017:287, author = {Liwei Zhang and A. Adam Ding and Francois Durvaux and Francois-Xavier Standaert and Yunsi Fei}, title = {Towards Sound and Optimal Leakage Detection Procedure (Extended Version)}, howpublished = {Cryptology ePrint Archive, Report 2017/287}, year = {2017}, url = {https://eprint.iacr.org/2017/287}, } @misc{cryptoeprint:2017:288, author = {Pooya Farshim and Claudio Orlandi and Răzvan Roşie}, title = {Security of Symmetric Primitives under Incorrect Usage of Keys}, howpublished = {Cryptology ePrint Archive, Report 2017/288}, year = {2017}, url = {https://eprint.iacr.org/2017/288}, } @misc{cryptoeprint:2017:289, author = {Matthias Krause}, title = {On the Hardness of Trivium and Grain with respect to Generic Time-Memory-Data Tradeoff Attacks}, howpublished = {Cryptology ePrint Archive, Report 2017/289}, year = {2017}, url = {https://eprint.iacr.org/2017/289}, } @misc{cryptoeprint:2017:290, author = {Yuanqi Shen and Hai Zhou}, title = {Double DIP: Re-Evaluating Security of Logic Encryption Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2017/290}, year = {2017}, url = {https://eprint.iacr.org/2017/290}, } @misc{cryptoeprint:2017:291, author = {Dakshita Khurana and Amit Sahai}, title = {How to Achieve Non-Malleability in One or Two Rounds}, howpublished = {Cryptology ePrint Archive, Report 2017/291}, year = {2017}, url = {https://eprint.iacr.org/2017/291}, } @misc{cryptoeprint:2017:292, author = {Shihui Fu and Xiutao Feng}, title = {Involutory Differentially 4-Uniform Permutations from Known Constructions}, howpublished = {Cryptology ePrint Archive, Report 2017/292}, year = {2017}, url = {https://eprint.iacr.org/2017/292}, } @misc{cryptoeprint:2017:293, author = {Daniel J. Bernstein and Tanja Lange}, title = {Montgomery curves and the Montgomery ladder}, howpublished = {Cryptology ePrint Archive, Report 2017/293}, year = {2017}, url = {https://eprint.iacr.org/2017/293}, } @misc{cryptoeprint:2017:294, author = {Jung Hee Cheon and Miran Kim and Yongsoo Song}, title = {Secure Searching of Biomarkers Using Hybrid Homomorphic Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2017/294}, year = {2017}, url = {https://eprint.iacr.org/2017/294}, } @misc{cryptoeprint:2017:295, author = {Ludo Tolhuizen and Ronald Rietman and Oscar Garcia-Morchon}, title = {Improved key-reconciliation method}, howpublished = {Cryptology ePrint Archive, Report 2017/295}, year = {2017}, url = {https://eprint.iacr.org/2017/295}, } @misc{cryptoeprint:2017:296, author = {Adi Akavia and Rio LaVigne and Tal Moran}, title = {Topology-Hiding Computation on all Graphs}, howpublished = {Cryptology ePrint Archive, Report 2017/296}, year = {2017}, url = {https://eprint.iacr.org/2017/296}, } @misc{cryptoeprint:2017:297, author = {Gildas Avoine and Xavier Bultel and S\'ebastien Gambs and David G\'erault and Pascal Lafourcade and Cristina Onete and Jean-Marc Robert}, title = {A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding Protocol}, howpublished = {Cryptology ePrint Archive, Report 2017/297}, year = {2017}, url = {https://eprint.iacr.org/2017/297}, } @misc{cryptoeprint:2017:298, author = {Séamus Brannigan and Neil Smyth and Tobias Oder and Felipe Valencia and Elizabeth O’Sullivan and Tim Güneysu and Francesco Regazzoni}, title = {An Investigation of Sources of Randomness Within Discrete Gaussian Sampling}, howpublished = {Cryptology ePrint Archive, Report 2017/298}, year = {2017}, url = {https://eprint.iacr.org/2017/298}, } @misc{cryptoeprint:2017:299, author = {Hao Chen and Kim Laine and Peter Rindal}, title = {Fast Private Set Intersection from Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/299}, year = {2017}, url = {https://eprint.iacr.org/2017/299}, } @misc{cryptoeprint:2017:300, author = {Iddo Bentov and Pavel Hub\'{a}\v{c}ek and Tal Moran and Asaf Nadler}, title = {Tortoise and Hares Consensus: the Meshcash Framework for Incentive-Compatible, Scalable Cryptocurrencies}, howpublished = {Cryptology ePrint Archive, Report 2017/300}, year = {2017}, url = {https://eprint.iacr.org/2017/300}, } @misc{cryptoeprint:2017:301, author = {Alex Lombardi and Vinod Vaikuntanathan}, title = {Limits on the Locality of Pseudorandom Generators and Applications to Indistinguishability Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2017/301}, year = {2017}, url = {https://eprint.iacr.org/2017/301}, } @misc{cryptoeprint:2017:302, author = {Jan Czajkowski and Leon Groot Bruinderink and Andreas Hülsing and Christian Schaffner}, title = {Quantum preimage, 2nd-preimage, and collision resistance of SHA3}, howpublished = {Cryptology ePrint Archive, Report 2017/302}, year = {2017}, url = {https://eprint.iacr.org/2017/302}, } @misc{cryptoeprint:2017:303, author = {Dana Dachman-Soled and Mukul Kulkarni and Aria Shahverdi}, title = {Locally Decodable and Updatable Non-Malleable Codes in the Bounded Retrieval Model}, howpublished = {Cryptology ePrint Archive, Report 2017/303}, year = {2017}, url = {https://eprint.iacr.org/2017/303}, } @misc{cryptoeprint:2017:304, author = {Yang Yu and Guangwu Xu and Xiaoyun Wang}, title = {Provably Secure NTRUEncrypt over More General Cyclotomic Rings}, howpublished = {Cryptology ePrint Archive, Report 2017/304}, year = {2017}, url = {https://eprint.iacr.org/2017/304}, } @misc{cryptoeprint:2017:305, author = {Alessandro Chiesa and Michael A. Forbes and Nicholas Spooner}, title = {A Zero Knowledge Sumcheck and its Applications}, howpublished = {Cryptology ePrint Archive, Report 2017/305}, year = {2017}, url = {https://eprint.iacr.org/2017/305}, } @misc{cryptoeprint:2017:306, author = {Yosuke Todo, Takanori Isobe, Yonglin Hao, Willi Meier}, title = {Cube Attacks on Non-Blackbox Polynomials Based on Division Property}, howpublished = {Cryptology ePrint Archive, Report 2017/306}, year = {2017}, url = {https://eprint.iacr.org/2017/306}, } @misc{cryptoeprint:2017:307, author = {Ittai Abraham and Srinivas Devadas and Danny Dolev and Kartik Nayak and Ling Ren}, title = {Efficient Synchronous Byzantine Consensus}, howpublished = {Cryptology ePrint Archive, Report 2017/307}, year = {2017}, url = {https://eprint.iacr.org/2017/307}, } @misc{cryptoeprint:2017:308, author = {Nicholas Genise and Daniele Micciancio}, title = {Faster Gaussian Sampling for Trapdoor Lattices with Arbitrary Modulus}, howpublished = {Cryptology ePrint Archive, Report 2017/308}, year = {2017}, url = {https://eprint.iacr.org/2017/308}, } @misc{cryptoeprint:2017:309, author = {Maiki Fujita and Takeshi Koshiba}, title = {Perfectly Secure Message Transmission Scheme against Rational Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2017/309}, year = {2017}, url = {https://eprint.iacr.org/2017/309}, } @misc{cryptoeprint:2017:310, author = {Shuai Han and Shengli Liu}, title = {KDM-Secure Public-Key Encryption from Constant-Noise LPN}, howpublished = {Cryptology ePrint Archive, Report 2017/310}, year = {2017}, url = {https://eprint.iacr.org/2017/310}, } @misc{cryptoeprint:2017:311, author = {Aaron Hutchinson and Koray Karabina}, title = {Constructing Multidimensional Differential Addition Chains and their Applications}, howpublished = {Cryptology ePrint Archive, Report 2017/311}, year = {2017}, url = {https://eprint.iacr.org/2017/311}, } @misc{cryptoeprint:2017:312, author = {Boaz Barak and Zvika Brakerski and Ilan Komargodski and Pravesh K. Kothari}, title = {Limits on Low-Degree Pseudorandom Generators (Or: Sum-of-Squares Meets Program Obfuscation)}, howpublished = {Cryptology ePrint Archive, Report 2017/312}, year = {2017}, url = {https://eprint.iacr.org/2017/312}, } @misc{cryptoeprint:2017:313, author = {Yanqing Yao, Hua Guo, Zhoujun Li}, title = {A Generic Approach to Identity-based Sequential Aggregate Signatures: New constructions from 2-level HIBE Schemes}, howpublished = {Cryptology ePrint Archive, Report 2017/313}, year = {2017}, url = {https://eprint.iacr.org/2017/313}, } @misc{cryptoeprint:2017:314, author = {Daniel J. Bernstein and Tanja Lange}, title = {Post-quantum cryptography---dealing with the fallout of physics success}, howpublished = {Cryptology ePrint Archive, Report 2017/314}, year = {2017}, url = {https://eprint.iacr.org/2017/314}, } @misc{cryptoeprint:2017:315, author = {Bernardo Ferreira, Joaão Leitão, Henrique Domingos}, title = {Multimodal Indexable Encryption for Mobile Cloud-based Applications (Extended Version)}, howpublished = {Cryptology ePrint Archive, Report 2017/315}, year = {2017}, url = {https://eprint.iacr.org/2017/315}, } @misc{cryptoeprint:2017:316, author = {Yan Yan and Elisabeth Oswald and Theo Tryfonas}, title = {Exploring Potential 6LoWPAN Traffic Side Channels}, howpublished = {Cryptology ePrint Archive, Report 2017/316}, year = {2017}, url = {https://eprint.iacr.org/2017/316}, } @misc{cryptoeprint:2017:317, author = {Ethan Cecchetti and Fan Zhang and Yan Ji and Ahmed Kosba and Ari Juels and Elaine Shi}, title = {Solidus: Confidential Distributed Ledger Transactions via PVORM}, howpublished = {Cryptology ePrint Archive, Report 2017/317}, year = {2017}, url = {https://eprint.iacr.org/2017/317}, } @misc{cryptoeprint:2017:318, author = {Sikhar Patranabis and Debdeep Mukhopadhyay}, title = {Key-Aggregate Searchable Encryption with Constant-Size Trapdoors for Fine-Grained Access Control in the Cloud}, howpublished = {Cryptology ePrint Archive, Report 2017/318}, year = {2017}, url = {https://eprint.iacr.org/2017/318}, } @misc{cryptoeprint:2017:319, author = {Sikhar Patranabis and Debdeep Mukhopadhyay}, title = {Embed-Augment-Recover: Function Private Predicate Encryption from Minimal Assumptions in the Public-Key Setting}, howpublished = {Cryptology ePrint Archive, Report 2017/319}, year = {2017}, url = {https://eprint.iacr.org/2017/319}, } @misc{cryptoeprint:2017:320, author = {Neriman Gamze Orhon and Huseyin Hisil}, title = {Speeding up Huff Form of Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2017/320}, year = {2017}, url = {https://eprint.iacr.org/2017/320}, } @misc{cryptoeprint:2017:321, author = {Dingfeng Ye and Peng Liu and Jun Xu}, title = {Towards Practical Obfuscation of General Circuits}, howpublished = {Cryptology ePrint Archive, Report 2017/321}, year = {2017}, url = {https://eprint.iacr.org/2017/321}, } @misc{cryptoeprint:2017:322, author = {Jun Xu and Santanu Sarkar and Lei Hu}, title = {Approximate Polynomial Common Divisor Problem Relates to Noisy Multipolynomial Reconstruction}, howpublished = {Cryptology ePrint Archive, Report 2017/322}, year = {2017}, url = {https://eprint.iacr.org/2017/322}, } @misc{cryptoeprint:2017:323, author = {Atsushi Takayasu and Yohei Watanabe}, title = {Lattice-based Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance}, howpublished = {Cryptology ePrint Archive, Report 2017/323}, year = {2017}, url = {https://eprint.iacr.org/2017/323}, } @misc{cryptoeprint:2017:324, author = {Srikanth ch, Veni Madhavan C.E. and Kumar Swamy H.V.}, title = {Family of PRGs based on Collections of Arithmetic Progressions}, howpublished = {Cryptology ePrint Archive, Report 2017/324}, year = {2017}, url = {https://eprint.iacr.org/2017/324}, } @misc{cryptoeprint:2017:325, author = {Rolf Haenni and Reto E. Koenig and Philipp Locher and Eric Dubuis}, title = {CHVote System Specification}, howpublished = {Cryptology ePrint Archive, Report 2017/325}, year = {2017}, url = {https://eprint.iacr.org/2017/325}, } @misc{cryptoeprint:2017:326, author = {Manuel Barbosa and Dario Catalano and Dario Fiore}, title = {Labeled Homomorphic Encryption: Scalable and Privacy-Preserving Processing of Outsourced Data}, howpublished = {Cryptology ePrint Archive, Report 2017/326}, year = {2017}, url = {https://eprint.iacr.org/2017/326}, } @misc{cryptoeprint:2017:327, author = {Alan Szepieniec and Ward Beullens and Bart Preneel}, title = {MQ Signatures for PKI}, howpublished = {Cryptology ePrint Archive, Report 2017/327}, year = {2017}, url = {https://eprint.iacr.org/2017/327}, } @misc{cryptoeprint:2017:328, author = {Debrup Chakraborty and Sebati Ghosh and Palash Sarkar}, title = {Evaluating Bernstein-Rabin-Winograd Polynomials}, howpublished = {Cryptology ePrint Archive, Report 2017/328}, year = {2017}, url = {https://eprint.iacr.org/2017/328}, } @misc{cryptoeprint:2017:329, author = {Matteo Maffei (TU Wien); Giulio Malavolta (FAU); Manuel Reinert (CISPA, Saarland University); Dominique Schr\"oder (FAU)}, title = {Maliciously Secure Multi-Client ORAM}, howpublished = {Cryptology ePrint Archive, Report 2017/329}, year = {2017}, url = {https://eprint.iacr.org/2017/329}, } @misc{cryptoeprint:2017:330, author = {Abhishek Jain and Yael Tauman Kalai and Dakshita Khurana and Ron Rothblum}, title = {Distinguisher-Dependent Simulation in Two Rounds and its Applications}, howpublished = {Cryptology ePrint Archive, Report 2017/330}, year = {2017}, url = {https://eprint.iacr.org/2017/330}, } @misc{cryptoeprint:2017:331, author = {Daan Leermakers and Boris Skoric}, title = {Optimal attacks on qubit-based Quantum Key Recycling}, howpublished = {Cryptology ePrint Archive, Report 2017/331}, year = {2017}, url = {https://eprint.iacr.org/2017/331}, } @misc{cryptoeprint:2017:332, author = {Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel}, title = {Reforgeability of Authenticated Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2017/332}, year = {2017}, url = {https://eprint.iacr.org/2017/332}, } @misc{cryptoeprint:2017:333, author = {Charlotte Bonte and Carl Bootland and Joppe W. Bos and Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren}, title = {Faster Homomorphic Function Evaluation using Non-Integral Base Encoding}, howpublished = {Cryptology ePrint Archive, Report 2017/333}, year = {2017}, url = {https://eprint.iacr.org/2017/333}, } @misc{cryptoeprint:2017:334, author = {Razvan Barbulescu and Sylvain Duquesne}, title = {Updating key size estimations for pairings}, howpublished = {Cryptology ePrint Archive, Report 2017/334}, year = {2017}, url = {https://eprint.iacr.org/2017/334}, } @misc{cryptoeprint:2017:335, author = {Irene Giacomelli and Somesh Jha and C. David Page}, title = {Privacy-Preserving Linear Regression on Distributed Data}, howpublished = {Cryptology ePrint Archive, Report 2017/335}, year = {2017}, url = {https://eprint.iacr.org/2017/335}, } @misc{cryptoeprint:2017:336, author = {Carmina GEORGESCU and Alina PETRESCU-NITA and Emil SIMION and Antonela TOMA}, title = {NIST RANDOMNESS TESTS (IN)DEPENDENCE }, howpublished = {Cryptology ePrint Archive, Report 2017/336}, year = {2017}, url = {https://eprint.iacr.org/2017/336}, } @misc{cryptoeprint:2017:337, author = {Gang Sheng and Chunming Tang and Wei Gao and Yunlu Cai and Xing Hu}, title = {Authentication of Outsourced Linear Function Query with Efficient Updates}, howpublished = {Cryptology ePrint Archive, Report 2017/337}, year = {2017}, url = {https://eprint.iacr.org/2017/337}, } @misc{cryptoeprint:2017:338, author = {Amrit Kumar and Cl\'{e}ment Fischer and Shruti Tople and Prateek Saxena}, title = {A Traceability Analysis of Monero's Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2017/338}, year = {2017}, url = {https://eprint.iacr.org/2017/338}, } @misc{cryptoeprint:2017:339, author = {Alan Kaminsky}, title = {ElsieFour: A Low-Tech Authenticated Encryption Algorithm For Human-to-Human Communication}, howpublished = {Cryptology ePrint Archive, Report 2017/339}, year = {2017}, url = {https://eprint.iacr.org/2017/339}, } @misc{cryptoeprint:2017:340, author = {Diana Popa and Emil Simion}, title = {Enhancing Security by Combining Biometrics and Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2017/340}, year = {2017}, url = {https://eprint.iacr.org/2017/340}, } @misc{cryptoeprint:2017:341, author = {Dragoş Dumitrescu and Ioan-Mihail Stan and Emil Simion}, title = {Steganography techniques}, howpublished = {Cryptology ePrint Archive, Report 2017/341}, year = {2017}, url = {https://eprint.iacr.org/2017/341}, } @misc{cryptoeprint:2017:342, author = {Gu Chunsheng}, title = {Multilinear Maps Using a Variant of Ring-LWE}, howpublished = {Cryptology ePrint Archive, Report 2017/342}, year = {2017}, url = {https://eprint.iacr.org/2017/342}, } @misc{cryptoeprint:2017:343, author = {Essam Ghadafi and Jens Groth}, title = {Towards a Classification of Non-interactive Computational Assumptions in Cyclic Groups}, howpublished = {Cryptology ePrint Archive, Report 2017/343}, year = {2017}, url = {https://eprint.iacr.org/2017/343}, } @misc{cryptoeprint:2017:344, author = {Vladimir Kolesnikov and Jesper Buus Nielsen and Mike Rosulek and Ni Trieu and Roberto Trifiletti}, title = {DUPLO: Unifying Cut-and-Choose for Garbled Circuits}, howpublished = {Cryptology ePrint Archive, Report 2017/344}, year = {2017}, url = {https://eprint.iacr.org/2017/344}, } @misc{cryptoeprint:2017:345, author = {Kostas Papagiannopoulos and Nikita Veshchikov}, title = {Mind the Gap: Towards Secure 1st-order Masking in Software}, howpublished = {Cryptology ePrint Archive, Report 2017/345}, year = {2017}, url = {https://eprint.iacr.org/2017/345}, } @misc{cryptoeprint:2017:346, author = {Subhadeep Banik and Takanori Isobe}, title = {Some cryptanalytic results on Lizard}, howpublished = {Cryptology ePrint Archive, Report 2017/346}, year = {2017}, url = {https://eprint.iacr.org/2017/346}, } @misc{cryptoeprint:2017:347, author = {Naghmeh Karimi and Jean-Luc Danger and Florent Lozac'h and Sylvain Guilley}, title = {Predictive Aging of Reliability of two Delay PUFs}, howpublished = {Cryptology ePrint Archive, Report 2017/347}, year = {2017}, url = {https://eprint.iacr.org/2017/347}, } @misc{cryptoeprint:2017:348, author = {Muhammad Yasin and Bodhisatwa Mazumdar and Ozugr Sinanoglu and Jeyavijayan Rajendran}, title = {Removal Attacks on Logic Locking and Camouflaging Techniques}, howpublished = {Cryptology ePrint Archive, Report 2017/348}, year = {2017}, url = {https://eprint.iacr.org/2017/348}, } @misc{cryptoeprint:2017:349, author = {Panos Kampanakis, Scott Fluhrer}, title = {LMS vs XMSS: Comparion of two Hash-Based Signature Standards}, howpublished = {Cryptology ePrint Archive, Report 2017/349}, year = {2017}, url = {https://eprint.iacr.org/2017/349}, } @misc{cryptoeprint:2017:350, author = {Thomaz Oliveira and Julio L\'opez and Francisco Rodr\'iguez-Henr\'iquez}, title = {The Montgomery ladder on binary elliptic curves}, howpublished = {Cryptology ePrint Archive, Report 2017/350}, year = {2017}, url = {https://eprint.iacr.org/2017/350}, } @misc{cryptoeprint:2017:351, author = {Daniel J. Bernstein and Nadia Heninger and Paul Lou and Luke Valenta}, title = {Post-quantum RSA}, howpublished = {Cryptology ePrint Archive, Report 2017/351}, year = {2017}, url = {https://eprint.iacr.org/2017/351}, } @misc{cryptoeprint:2017:352, author = {Daniel J. Bernstein and Jean-François Biasse and Michele Mosca}, title = {A low-resource quantum factoring algorithm}, howpublished = {Cryptology ePrint Archive, Report 2017/352}, year = {2017}, url = {https://eprint.iacr.org/2017/352}, } @misc{cryptoeprint:2017:353, author = {San Ling and Khoa Nguyen and Huaxiong Wang and Yanhong Xu}, title = {Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease}, howpublished = {Cryptology ePrint Archive, Report 2017/353}, year = {2017}, url = {https://eprint.iacr.org/2017/353}, } @misc{cryptoeprint:2017:354, author = {Martin R. Albrecht and Emmanuela Orsini and Kenneth G. Paterson and Guy Peer and Nigel P. Smart}, title = {Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts}, howpublished = {Cryptology ePrint Archive, Report 2017/354}, year = {2017}, url = {https://eprint.iacr.org/2017/354}, } @misc{cryptoeprint:2017:355, author = {Joppe W. Bos and Charles Hubain and Wil Michiels and Cristofaro Mune and Eloi Sanfelix Gonzalez and Philippe Teuwen}, title = {White-Box Cryptography: Don't Forget About Grey Box Attacks}, howpublished = {Cryptology ePrint Archive, Report 2017/355}, year = {2017}, url = {https://eprint.iacr.org/2017/355}, } @misc{cryptoeprint:2017:356, author = {Bart Mennink and Alan Szepieniec}, title = {XOR of PRPs in a Quantum World}, howpublished = {Cryptology ePrint Archive, Report 2017/356}, year = {2017}, url = {https://eprint.iacr.org/2017/356}, } @misc{cryptoeprint:2017:357, author = {Nico D\"ottling and Jesper Buus Nielsen and Maciej Obremski}, title = {Information Theoretic Continuously Non-Malleable Codes in the Constant Split-State Model}, howpublished = {Cryptology ePrint Archive, Report 2017/357}, year = {2017}, url = {https://eprint.iacr.org/2017/357}, } @misc{cryptoeprint:2017:358, author = {Olivier Blazy and Céline Chevalier and Paul Germouty}, title = {Almost Optimal Oblivious Transfer from QA-NIZK}, howpublished = {Cryptology ePrint Archive, Report 2017/358}, year = {2017}, url = {https://eprint.iacr.org/2017/358}, } @misc{cryptoeprint:2017:359, author = {Tianren Liu and Vinod Vaikuntanathan and Hoeteck Wee}, title = {Conditional Disclosure of Secrets via Non-Linear Reconstruction}, howpublished = {Cryptology ePrint Archive, Report 2017/359}, year = {2017}, url = {https://eprint.iacr.org/2017/359}, } @misc{cryptoeprint:2017:360, author = {Dongqing Xu, Debiao He, Kim-Kwang Raymond Choo, Jianhua Chen}, title = {Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error}, howpublished = {Cryptology ePrint Archive, Report 2017/360}, year = {2017}, url = {https://eprint.iacr.org/2017/360}, } @misc{cryptoeprint:2017:361, author = {Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka}, title = {Indistinguishability Obfuscation for All Circuits from Secret-Key Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/361}, year = {2017}, url = {https://eprint.iacr.org/2017/361}, } @misc{cryptoeprint:2017:362, author = {Jesper Buus Nielsen}, title = {Universally Composable Zero-Knowledge Proof of Membership}, howpublished = {Cryptology ePrint Archive, Report 2017/362}, year = {2017}, url = {https://eprint.iacr.org/2017/362}, } @misc{cryptoeprint:2017:363, author = {Stanislaw Jarecki and Aggelos Kiayias and Hugo Krawczyk and Jiayu Xu}, title = {TOPPSS: Cost-minimal Password-Protected Secret Sharing based on Threshold OPRF}, howpublished = {Cryptology ePrint Archive, Report 2017/363}, year = {2017}, url = {https://eprint.iacr.org/2017/363}, } @misc{cryptoeprint:2017:364, author = {Ran Cohen and Sandro Coretti and Juan Garay and Vassilis Zikas}, title = {Round-Preserving Parallel Composition of Probabilistic-Termination Cryptographic Protocols}, howpublished = {Cryptology ePrint Archive, Report 2017/364}, year = {2017}, url = {https://eprint.iacr.org/2017/364}, } @misc{cryptoeprint:2017:365, author = {Boaz Barak}, title = {The Complexity of Public-Key Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2017/365}, year = {2017}, url = {https://eprint.iacr.org/2017/365}, } @misc{cryptoeprint:2017:366, author = {Gideon Samid and Serguei Popov}, title = {BitFlip: A Randomness-Rich Cipher}, howpublished = {Cryptology ePrint Archive, Report 2017/366}, year = {2017}, url = {https://eprint.iacr.org/2017/366}, } @misc{cryptoeprint:2017:367, author = {Zhiqiang Liu and Shuyang Tang and Sherman S.M. Chow and Zhen Liu and Yu Long}, title = {Fork-Free Hybrid Consensus with Flexible Proof-of-Activity}, howpublished = {Cryptology ePrint Archive, Report 2017/367}, year = {2017}, url = {https://eprint.iacr.org/2017/367}, } @misc{cryptoeprint:2017:368, author = {Sumanta Sarkar and Habeeb Syed}, title = {Analysis of Toeplitz MDS Matrices}, howpublished = {Cryptology ePrint Archive, Report 2017/368}, year = {2017}, url = {https://eprint.iacr.org/2017/368}, } @misc{cryptoeprint:2017:369, author = {Yihua Zhang and Marina Blanton and Fattaneh Bayatbabolghani }, title = {Enforcing Input Correctness via Certification in Garbled Circuit Evaluation}, howpublished = {Cryptology ePrint Archive, Report 2017/369}, year = {2017}, url = {https://eprint.iacr.org/2017/369}, } @misc{cryptoeprint:2017:370, author = {Ziya Alper Genç and Vincenzo Iovino and Alfredo Rial}, title = {"The Simplest Protocol for Oblivious Transfer'' Revisited}, howpublished = {Cryptology ePrint Archive, Report 2017/370}, year = {2017}, url = {https://eprint.iacr.org/2017/370}, } @misc{cryptoeprint:2017:371, author = {Lijing Zhou, Licheng Wang and Yiru Sun}, title = {On the Construction of Lightweight Orthogonal MDS Matrices}, howpublished = {Cryptology ePrint Archive, Report 2017/371}, year = {2017}, url = {https://eprint.iacr.org/2017/371}, } @misc{cryptoeprint:2017:372, author = {Antoine Joux and Vanessa Vitse}, title = {A crossbred algorithm for solving Boolean polynomial systems}, howpublished = {Cryptology ePrint Archive, Report 2017/372}, year = {2017}, url = {https://eprint.iacr.org/2017/372}, } @misc{cryptoeprint:2017:373, author = {Ryo Hiromasa and Yutaka Kawai}, title = {Fully Dynamic Multi Target Homomorphic Attribute-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/373}, year = {2017}, url = {https://eprint.iacr.org/2017/373}, } @misc{cryptoeprint:2017:374, author = {Alexandre Gélin and Benjamin Wesolowski}, title = {Loop-abort faults on supersingular isogeny cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2017/374}, year = {2017}, url = {https://eprint.iacr.org/2017/374}, } @misc{cryptoeprint:2017:375, author = {Karl Wüst and Arthur Gervais}, title = {Do you need a Blockchain?}, howpublished = {Cryptology ePrint Archive, Report 2017/375}, year = {2017}, url = {https://eprint.iacr.org/2017/375}, } @misc{cryptoeprint:2017:376, author = {P. R. Mishra, Sumanta Sarkar and Indivar Gupta}, title = {Determining the Minimum Degree of an S-box}, howpublished = {Cryptology ePrint Archive, Report 2017/376}, year = {2017}, url = {https://eprint.iacr.org/2017/376}, } @misc{cryptoeprint:2017:377, author = {Stefan Wüller and Ulrike Meyer and Susanne Wetzel}, title = {Privacy-Preserving Multi-Party Bartering Secure Against Active Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2017/377}, year = {2017}, url = {https://eprint.iacr.org/2017/377}, } @misc{cryptoeprint:2017:378, author = {Marcel Keller and Emmanuela Orsini and Dragos Rotaru and Peter Scholl and Eduardo Soria-Vazquez and Srinivas Vivek}, title = {Faster Secure Multi-Party Computation of AES and DES Using Lookup Tables}, howpublished = {Cryptology ePrint Archive, Report 2017/378}, year = {2017}, url = {https://eprint.iacr.org/2017/378}, } @misc{cryptoeprint:2017:379, author = {Yan Bo Ti}, title = {Fault attack on Supersingular Isogeny Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2017/379}, year = {2017}, url = {https://eprint.iacr.org/2017/379}, } @misc{cryptoeprint:2017:380, author = {Sam Kim and David J. Wu}, title = {Watermarking Cryptographic Functionalities from Standard Lattice Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2017/380}, year = {2017}, url = {https://eprint.iacr.org/2017/380}, } @misc{cryptoeprint:2017:381, author = {Alexandre de Castro}, title = {Quantum one-way permutation over the finite field of two elements}, howpublished = {Cryptology ePrint Archive, Report 2017/381}, year = {2017}, url = {https://eprint.iacr.org/2017/381}, } @misc{cryptoeprint:2017:382, author = {Steven Cavanaugh}, title = {A General Degenerate Grouping Power Attack with Specific Application to SIMON and SPECK}, howpublished = {Cryptology ePrint Archive, Report 2017/382}, year = {2017}, url = {https://eprint.iacr.org/2017/382}, } @misc{cryptoeprint:2017:383, author = {Travis Scholl}, title = {Super-Isolated Elliptic Curves and Abelian Surfaces in Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2017/383}, year = {2017}, url = {https://eprint.iacr.org/2017/383}, } @misc{cryptoeprint:2017:384, author = {Matthias Hamann and Matthias Krause and Willi Meier and Bin Zhang}, title = {Time-Memory-Data Tradeoff Attacks against Small-State Stream Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2017/384}, year = {2017}, url = {https://eprint.iacr.org/2017/384}, } @misc{cryptoeprint:2017:385, author = {Benny Applebaum}, title = {Garbled Circuits as Randomized Encodings of Functions: a Primer}, howpublished = {Cryptology ePrint Archive, Report 2017/385}, year = {2017}, url = {https://eprint.iacr.org/2017/385}, } @misc{cryptoeprint:2017:386, author = {Zvika Brakerski and Shai Halevi and Antigoni Polychroniadou}, title = {Four Round Secure Computation without Setup}, howpublished = {Cryptology ePrint Archive, Report 2017/386}, year = {2017}, url = {https://eprint.iacr.org/2017/386}, } @misc{cryptoeprint:2017:387, author = {Chen Xu and Jingwei Chen and Wenyuan Wu and Yong Feng}, title = {Homomorphically Encrypted Arithmetic Operations over the Integer Ring}, howpublished = {Cryptology ePrint Archive, Report 2017/387}, year = {2017}, url = {https://eprint.iacr.org/2017/387}, } @misc{cryptoeprint:2017:388, author = {Silvan Streit and Fabrizio De Santis}, title = {Post-Quantum Key Exchange on ARMv8-A -- A New Hope for NEON made Simple}, howpublished = {Cryptology ePrint Archive, Report 2017/388}, year = {2017}, url = {https://eprint.iacr.org/2017/388}, } @misc{cryptoeprint:2017:389, author = {Rupeng Yang and Man Ho Au and Qiuliang Xu and Zuoxia Yu}, title = {Decentralized Blacklistable Anonymous Credentials with Reputation}, howpublished = {Cryptology ePrint Archive, Report 2017/389}, year = {2017}, url = {https://eprint.iacr.org/2017/389}, } @misc{cryptoeprint:2017:390, author = {Yi Deng and Xuyang Song and Jingyue Yu and Yu Chen}, title = {On Instance Compression, Schnorr/Guillou-Quisquater, and the Security of Classic Protocols for Unique Witness Relations}, howpublished = {Cryptology ePrint Archive, Report 2017/390}, year = {2017}, url = {https://eprint.iacr.org/2017/390}, } @misc{cryptoeprint:2017:391, author = {Subhabrata Samajder and Palash Sarkar}, title = {Another Look at Success Probability in Linear Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2017/391}, year = {2017}, url = {https://eprint.iacr.org/2017/391}, } @misc{cryptoeprint:2017:392, author = {Sébastien Canard and Sergiu Carpov and Donald Nokam Kuate and Renaud Sirdey}, title = {Running compression algorithms in the encrypted domain: a case-study on the homomorphic execution of RLE}, howpublished = {Cryptology ePrint Archive, Report 2017/392}, year = {2017}, url = {https://eprint.iacr.org/2017/392}, } @misc{cryptoeprint:2017:393, author = {Gilad Asharov and Daniel Demmler and Michael Schapira and Thomas Schneider and Gil Segev and Scott Shenker and Michael Zohner}, title = {Privacy-Preserving Interdomain Routing at Internet Scale}, howpublished = {Cryptology ePrint Archive, Report 2017/393}, year = {2017}, url = {https://eprint.iacr.org/2017/393}, } @misc{cryptoeprint:2017:394, author = {Cristina Pérez-Solà and Sergi Delgado-Segura and Guillermo Navarro-Arribas and Jordi Herrera-Joancomartı́}, title = {Double-spending Prevention for Bitcoin zero-confirmation transactions}, howpublished = {Cryptology ePrint Archive, Report 2017/394}, year = {2017}, url = {https://eprint.iacr.org/2017/394}, } @misc{cryptoeprint:2017:395, author = {Hannes Gross and David Schaffenrath and Stefan Mangard}, title = {Higher-Order Side-Channel Protected Implementations of Keccak}, howpublished = {Cryptology ePrint Archive, Report 2017/395}, year = {2017}, url = {https://eprint.iacr.org/2017/395}, } @misc{cryptoeprint:2017:396, author = {Payman Mohassel and Yupeng Zhang}, title = {SecureML: A System for Scalable Privacy-Preserving Machine Learning}, howpublished = {Cryptology ePrint Archive, Report 2017/396}, year = {2017}, url = {https://eprint.iacr.org/2017/396}, } @misc{cryptoeprint:2017:397, author = {Edoardo Persichetti}, title = {Efficient Digital Signatures From Coding Theory}, howpublished = {Cryptology ePrint Archive, Report 2017/397}, year = {2017}, url = {https://eprint.iacr.org/2017/397}, } @misc{cryptoeprint:2017:398, author = {Dominique Unruh}, title = {Post-Quantum Security of Fiat-Shamir}, howpublished = {Cryptology ePrint Archive, Report 2017/398}, year = {2017}, url = {https://eprint.iacr.org/2017/398}, } @misc{cryptoeprint:2017:399, author = {David McCann and Elisabeth Oswald}, title = {Practical Evaluation of Masking Software Countermeasures on an IoT processor}, howpublished = {Cryptology ePrint Archive, Report 2017/399}, year = {2017}, url = {https://eprint.iacr.org/2017/399}, } @misc{cryptoeprint:2017:400, author = {Cédric Van Rompay and Refik Molva and Melek Önen}, title = {A Leakage-Abuse Attack Against Multi-User Searchable Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/400}, year = {2017}, url = {https://eprint.iacr.org/2017/400}, } @misc{cryptoeprint:2017:401, author = {Quoc-Sang Phan and Lucas Bang and Corina S. P\u{a}s\u{a}reanu and Pasquale Malacaria and Tevfik Bultan}, title = {Synthesis of Adaptive Side-Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2017/401}, year = {2017}, url = {https://eprint.iacr.org/2017/401}, } @misc{cryptoeprint:2017:402, author = {Prabhanjan Ananth and Arka Rai Choudhuri and Abhishek Jain}, title = {A New Approach to Round-Optimal Secure Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2017/402}, year = {2017}, url = {https://eprint.iacr.org/2017/402}, } @misc{cryptoeprint:2017:403, author = {Masaaki Shirase}, title = {Condition on composite numbers easily factored with elliptic curve method}, howpublished = {Cryptology ePrint Archive, Report 2017/403}, year = {2017}, url = {https://eprint.iacr.org/2017/403}, } @misc{cryptoeprint:2017:404, author = {Jens Bauch and Daniel J. Bernstein and Henry de Valence and Tanja Lange and Christine van Vredendaal}, title = {Short generators without quantum computers: the case of multiquadratics}, howpublished = {Cryptology ePrint Archive, Report 2017/404}, year = {2017}, url = {https://eprint.iacr.org/2017/404}, } @misc{cryptoeprint:2017:405, author = {Jingjing Wang and Xiaoyu Zhang and Jingjing guo and Jianfeng Wang}, title = {Security Analysis of ``PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-Healthcare''}, howpublished = {Cryptology ePrint Archive, Report 2017/405}, year = {2017}, url = {https://eprint.iacr.org/2017/405}, } @misc{cryptoeprint:2017:406, author = {Eleftherios Kokoris-Kogias and Philipp Jovanovic and Linus Gasser and Nicolas Gailly and Ewa Syta and Bryan Ford}, title = {OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding}, howpublished = {Cryptology ePrint Archive, Report 2017/406}, year = {2017}, url = {https://eprint.iacr.org/2017/406}, } @misc{cryptoeprint:2017:407, author = {Peter Rindal and Roberto Trifiletti}, title = {SplitCommit: Implementing and Analyzing Homomorphic UC Commitments}, howpublished = {Cryptology ePrint Archive, Report 2017/407}, year = {2017}, url = {https://eprint.iacr.org/2017/407}, } @misc{cryptoeprint:2017:408, author = {Jihye Kim and Seunghwa Lee and Jiwon Lee and Hyunok Oh}, title = {Combinatorial Subset Difference Public Key Broadcast Encryption Scheme for Secure Multicast}, howpublished = {Cryptology ePrint Archive, Report 2017/408}, year = {2017}, url = {https://eprint.iacr.org/2017/408}, } @misc{cryptoeprint:2017:409, author = {Satrajit Ghosh and Jesper Buus Nielsen and Tobias Nilges}, title = {Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead}, howpublished = {Cryptology ePrint Archive, Report 2017/409}, year = {2017}, url = {https://eprint.iacr.org/2017/409}, } @misc{cryptoeprint:2017:410, author = {Yuriy Polyakov and Kurt Rohloff and Gyana Sahu and Vinod Vaikuntanthan}, title = {Fast Proxy Re-Encryption for Publish/Subscribe Systems}, howpublished = {Cryptology ePrint Archive, Report 2017/410}, year = {2017}, url = {https://eprint.iacr.org/2017/410}, } @misc{cryptoeprint:2017:411, author = {\c{C}etin Kaya Ko\c{c}}, title = {A New Algorithm for Inversion mod $p^k$}, howpublished = {Cryptology ePrint Archive, Report 2017/411}, year = {2017}, url = {https://eprint.iacr.org/2017/411}, } @misc{cryptoeprint:2017:412, author = {Ximing Fu and Xiaoyun Wang and Jiazhe Chen and Marc Stevens}, title = {Determining the Nonexistent Terms of Non-linear Multivariate Polynomials: How to Break Grain-128 More Efficiently}, howpublished = {Cryptology ePrint Archive, Report 2017/412}, year = {2017}, url = {https://eprint.iacr.org/2017/412}, } @misc{cryptoeprint:2017:413, author = {Abhishek Chakraborty and Ankit Mondal and Ankur Srivastava}, title = {Correlation Power Analysis Attack against STT-MRAM Based Cyptosystems}, howpublished = {Cryptology ePrint Archive, Report 2017/413}, year = {2017}, url = {https://eprint.iacr.org/2017/413}, } @misc{cryptoeprint:2017:414, author = {Alex Biryukov and Leo Perrin}, title = {Symmetrically and Asymmetrically Hard Cryptography (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2017/414}, year = {2017}, url = {https://eprint.iacr.org/2017/414}, } @misc{cryptoeprint:2017:415, author = {Osman Bicer and Muhammed Ali Bingol and Mehmet Sabir Kiraz and Albert Levi}, title = {Towards Practical PFE: An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates}, howpublished = {Cryptology ePrint Archive, Report 2017/415}, year = {2017}, url = {https://eprint.iacr.org/2017/415}, } @misc{cryptoeprint:2017:416, author = {Ioana Boureanu and David Gerault and Pascal Lafourcade and Cristina Onete}, title = {Breaking and Fixing the HB+DB protocol}, howpublished = {Cryptology ePrint Archive, Report 2017/416}, year = {2017}, url = {https://eprint.iacr.org/2017/416}, } @misc{cryptoeprint:2017:417, author = {Massimo Bartoletti and Stefano Lande and Alessandro Sebastian Podda}, title = {A Proof-of-Stake protocol for consensus on Bitcoin subchains}, howpublished = {Cryptology ePrint Archive, Report 2017/417}, year = {2017}, url = {https://eprint.iacr.org/2017/417}, } @misc{cryptoeprint:2017:418, author = {Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo}, title = {Strong Authenticated Key Exchange with Auxiliary Inputs}, howpublished = {Cryptology ePrint Archive, Report 2017/418}, year = {2017}, url = {https://eprint.iacr.org/2017/418}, } @misc{cryptoeprint:2017:419, author = {Alessandro Budroni and Federico Pintore}, title = {Efficient hash maps to \mathbb{G}_2 on BLS curves}, howpublished = {Cryptology ePrint Archive, Report 2017/419}, year = {2017}, url = {https://eprint.iacr.org/2017/419}, } @misc{cryptoeprint:2017:420, author = {Shiyi Zhang and Yongjuan Wang and Yang Gao and Tao Wang}, title = {Construction and Filtration of Lightweight Formalized MDS Matrices}, howpublished = {Cryptology ePrint Archive, Report 2017/420}, year = {2017}, url = {https://eprint.iacr.org/2017/420}, } @misc{cryptoeprint:2017:421, author = {\'Eric Brier and R\'emi G\'eraud and David Naccache}, title = {Exploring Naccache-Stern Knapsack Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/421}, year = {2017}, url = {https://eprint.iacr.org/2017/421}, } @misc{cryptoeprint:2017:422, author = {Urbi Chatterjee and Vidya Govindan and Rajat Sadhukhan and Debdeep Mukhopadhyay and Rajat Subhra Chakraborty and Debashis Mahata and Mukesh Prabhu}, title = {PUF+IBE: Blending Physically Unclonable Functions with Identity Based Encryption for Authentication and Key Exchange in IoTs}, howpublished = {Cryptology ePrint Archive, Report 2017/422}, year = {2017}, url = {https://eprint.iacr.org/2017/422}, } @misc{cryptoeprint:2017:423, author = {Alexander Koch and Stefan Walzer}, title = {Foundations for Actively Secure Card-based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2017/423}, year = {2017}, url = {https://eprint.iacr.org/2017/423}, } @misc{cryptoeprint:2017:424, author = {Markku-Juhani O. Saarinen}, title = {HILA5: On Reliability, Reconciliation, and Error Correction for Ring-LWE Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/424}, year = {2017}, url = {https://eprint.iacr.org/2017/424}, } @misc{cryptoeprint:2017:425, author = {Akihiro Nishimura and Takuya Nishida and Yu-ichi Hayashi and Takaaki Mizuki and Hideaki Sone}, title = {Card-Based Protocols Using Unequal Division Shuffles}, howpublished = {Cryptology ePrint Archive, Report 2017/425}, year = {2017}, url = {https://eprint.iacr.org/2017/425}, } @misc{cryptoeprint:2017:426, author = {Masahiro Yagisawa}, title = {FHPKE based on multivariate discrete logarithm problem}, howpublished = {Cryptology ePrint Archive, Report 2017/426}, year = {2017}, url = {https://eprint.iacr.org/2017/426}, } @misc{cryptoeprint:2017:427, author = {Gregor Leander and Alexander May}, title = {Grover Meets Simon - Quantumly Attacking the FX-construction}, howpublished = {Cryptology ePrint Archive, Report 2017/427}, year = {2017}, url = {https://eprint.iacr.org/2017/427}, } @misc{cryptoeprint:2017:428, author = {Douglas R. Stinson}, title = {Optimal Ramp Schemes and Related Combinatorial Objects}, howpublished = {Cryptology ePrint Archive, Report 2017/428}, year = {2017}, url = {https://eprint.iacr.org/2017/428}, } @misc{cryptoeprint:2017:429, author = {Christian Badertscher and Christian Matt and Ueli Maurer}, title = {Strengthening Access Control Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/429}, year = {2017}, url = {https://eprint.iacr.org/2017/429}, } @misc{cryptoeprint:2017:430, author = {Ilaria Chillotti and Nicolas Gama and Mariya Georgieva and Malika Izabachène}, title = {Improving TFHE: faster packed homomorphic operations and efficient circuit bootstrapping}, howpublished = {Cryptology ePrint Archive, Report 2017/430}, year = {2017}, url = {https://eprint.iacr.org/2017/430}, } @misc{cryptoeprint:2017:431, author = {Nilanjan Datta and Atul Luykx and Bart Mennink and Mridul Nandi}, title = {Understanding RUP Integrity of COLM}, howpublished = {Cryptology ePrint Archive, Report 2017/431}, year = {2017}, url = {https://eprint.iacr.org/2017/431}, } @misc{cryptoeprint:2017:432, author = {Kaisa Nyberg}, title = {Statistical and Linear Independence of Binary Random Variables}, howpublished = {Cryptology ePrint Archive, Report 2017/432}, year = {2017}, url = {https://eprint.iacr.org/2017/432}, } @misc{cryptoeprint:2017:433, author = {Saikrishna Badrinarayanan and Sanjam Garg and Yuval Ishai and Amit Sahai and Akshay Wadia}, title = {Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2017/433}, year = {2017}, url = {https://eprint.iacr.org/2017/433}, } @misc{cryptoeprint:2017:434, author = {Zhe Liu and Patrick Longa and Geovandro Pereira and Oscar Reparaz and Hwajeong Seo}, title = {FourQ on embedded devices with strong countermeasures against side-channel attacks}, howpublished = {Cryptology ePrint Archive, Report 2017/434}, year = {2017}, url = {https://eprint.iacr.org/2017/434}, } @misc{cryptoeprint:2017:435, author = {Atul Luykx and Bart Mennink and Kenneth G. Paterson}, title = {Analyzing Multi-Key Security Degradation}, howpublished = {Cryptology ePrint Archive, Report 2017/435}, year = {2017}, url = {https://eprint.iacr.org/2017/435}, } @misc{cryptoeprint:2017:436, author = {Kaiyan Zheng and Peng Wang}, title = {A Uniform Class of Weak Keys for Universal Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2017/436}, year = {2017}, url = {https://eprint.iacr.org/2017/436}, } @misc{cryptoeprint:2017:437, author = {Michael Scott}, title = {Slothful reduction}, howpublished = {Cryptology ePrint Archive, Report 2017/437}, year = {2017}, url = {https://eprint.iacr.org/2017/437}, } @misc{cryptoeprint:2017:438, author = {James Howe and M\'aire O'Neill}, title = {GLITCH: A Discrete Gaussian Testing Suite For Lattice-Based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2017/438}, year = {2017}, url = {https://eprint.iacr.org/2017/438}, } @misc{cryptoeprint:2017:439, author = {Abdelrahaman Aly and Mathieu Van Vyve}, title = {Practically Efficient Secure Single-Commodity Multi-Market Auctions}, howpublished = {Cryptology ePrint Archive, Report 2017/439}, year = {2017}, url = {https://eprint.iacr.org/2017/439}, } @misc{cryptoeprint:2017:440, author = {Nicolas T. Courtois and Klaus Schmeh and Jörg Drobick and Jacques Patarin and Maria-Bristena Oprisanu and Matteo Scarlata and Om Bhallamudi}, title = {Cryptographic Security Analysis of T-310}, howpublished = {Cryptology ePrint Archive, Report 2017/440}, year = {2017}, url = {https://eprint.iacr.org/2017/440}, } @misc{cryptoeprint:2017:441, author = {Suvradip Chakraborty and Janaka Alawatugoda and C. Pandu Rangan}, title = {New Approach to Practical Leakage-Resilient Public-Key Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2017/441}, year = {2017}, url = {https://eprint.iacr.org/2017/441}, } @misc{cryptoeprint:2017:442, author = {Jeremiah Blocki and Samson Zhou}, title = {On the Depth-Robustness and Cumulative Pebbling Cost of Argon2i}, howpublished = {Cryptology ePrint Archive, Report 2017/442}, year = {2017}, url = {https://eprint.iacr.org/2017/442}, } @misc{cryptoeprint:2017:443, author = {Joel Alwen and Jeremiah Blocki and Ben Harsha}, title = {Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions}, howpublished = {Cryptology ePrint Archive, Report 2017/443}, year = {2017}, url = {https://eprint.iacr.org/2017/443}, } @misc{cryptoeprint:2017:444, author = {Ming Li, Jian Weng, Anjia Yang, Wei Lu,Yue Zhang, Lin Hou, Jianan Liu}, title = {CrowdBC: A Blockchain-based Decentralized Framework for Crowdsourcing}, howpublished = {Cryptology ePrint Archive, Report 2017/444}, year = {2017}, url = {https://eprint.iacr.org/2017/444}, } @misc{cryptoeprint:2017:445, author = {Michael Till Beck and Jan Camenisch and David Derler and Stephan Krenn and Henrich C. Pöhls and Kai Samelin and Daniel Slamanig}, title = {Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures}, howpublished = {Cryptology ePrint Archive, Report 2017/445}, year = {2017}, url = {https://eprint.iacr.org/2017/445}, } @misc{cryptoeprint:2017:446, author = {Diana Maimut and George Teseleanu}, title = {Secretly Embedding Trapdoors into Contract Signing Protocols}, howpublished = {Cryptology ePrint Archive, Report 2017/446}, year = {2017}, url = {https://eprint.iacr.org/2017/446}, } @misc{cryptoeprint:2017:447, author = {Huige Li and Haibo Tian and Fangguo Zhang}, title = {Block Chain based Searchable Symmetric Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/447}, year = {2017}, url = {https://eprint.iacr.org/2017/447}, } @misc{cryptoeprint:2017:448, author = {Alex Davidson}, title = {Obfuscation of Bloom Filter Queries from Ring-LWE}, howpublished = {Cryptology ePrint Archive, Report 2017/448}, year = {2017}, url = {https://eprint.iacr.org/2017/448}, } @misc{cryptoeprint:2017:449, author = {Shihui Fu and Xiutao Feng and Baofeng Wu}, title = {Differentially 4-Uniform Permutations with the Best Known Nonlinearity from Butterflies}, howpublished = {Cryptology ePrint Archive, Report 2017/449}, year = {2017}, url = {https://eprint.iacr.org/2017/449}, } @misc{cryptoeprint:2017:450, author = {Elena Pagnin and Aikaterini Mitrokotsa}, title = {Privacy-preserving biometric authentication: challenges and directions}, howpublished = {Cryptology ePrint Archive, Report 2017/450}, year = {2017}, url = {https://eprint.iacr.org/2017/450}, } @misc{cryptoeprint:2017:451, author = {Suvradip Chakraborty and Goutam Paul and C. Pandu Rangan}, title = {Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE}, howpublished = {Cryptology ePrint Archive, Report 2017/451}, year = {2017}, url = {https://eprint.iacr.org/2017/451}, } @misc{cryptoeprint:2017:452, author = {Jian Liu and Mika Juuti and Yao Lu and N. Asokan}, title = {Oblivious Neural Network Predictions via MiniONN transformations}, howpublished = {Cryptology ePrint Archive, Report 2017/452}, year = {2017}, url = {https://eprint.iacr.org/2017/452}, } @misc{cryptoeprint:2017:453, author = {Johannes Bl\"{o}mer and Gennadij Liske}, title = {Subtleties in Security Definitions for Predicate Encryption with Public Index}, howpublished = {Cryptology ePrint Archive, Report 2017/453}, year = {2017}, url = {https://eprint.iacr.org/2017/453}, } @misc{cryptoeprint:2017:454, author = {Yossi Gilad and Rotem Hemo and Silvio Micali and Georgios Vlachos and Nickolai Zeldovich}, title = {Algorand: Scaling Byzantine Agreements for Cryptocurrencies}, howpublished = {Cryptology ePrint Archive, Report 2017/454}, year = {2017}, url = {https://eprint.iacr.org/2017/454}, } @misc{cryptoeprint:2017:455, author = {Daniel Apon and Xiong Fan and Feng-Hao Liu}, title = {Vector Encoding over Lattices and Its Applications}, howpublished = {Cryptology ePrint Archive, Report 2017/455}, year = {2017}, url = {https://eprint.iacr.org/2017/455}, } @misc{cryptoeprint:2017:456, author = {Xiong Fan and Feng-Hao Liu}, title = {Proxy Re-Encryption and Re-Signatures from Lattices}, howpublished = {Cryptology ePrint Archive, Report 2017/456}, year = {2017}, url = {https://eprint.iacr.org/2017/456}, } @misc{cryptoeprint:2017:457, author = {Masahito Hayashi and Takeshi Koshiba}, title = {Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters without Honest Majority}, howpublished = {Cryptology ePrint Archive, Report 2017/457}, year = {2017}, url = {https://eprint.iacr.org/2017/457}, } @misc{cryptoeprint:2017:458, author = {Matthew Tamayo-Rios and Jean-Charles Faugère and Ludovic Perret and Peng Hui How and Robin Zhang}, title = {Fully Homomorphic Encryption Using Multivariate Polynomials}, howpublished = {Cryptology ePrint Archive, Report 2017/458}, year = {2017}, url = {https://eprint.iacr.org/2017/458}, } @misc{cryptoeprint:2017:459, author = {Phuong Ha Nguyen and Durga Prasad Sahoo and Rajat Subhra Chakraborty and Debdeep Mukhopadhyay}, title = {Security Analysis of Arbiter PUF and Its Lightweight Compositions Under Predictability Test}, howpublished = {Cryptology ePrint Archive, Report 2017/459}, year = {2017}, url = {https://eprint.iacr.org/2017/459}, } @misc{cryptoeprint:2017:460, author = {Nina Bindel and Udyani Herath and Matthew McKague and Douglas Stebila}, title = {Transitioning to a Quantum-Resistant Public Key Infrastructure}, howpublished = {Cryptology ePrint Archive, Report 2017/460}, year = {2017}, url = {https://eprint.iacr.org/2017/460}, } @misc{cryptoeprint:2017:461, author = {Daniel Jost and Ueli Maurer}, title = {Context-Restricted Indifferentiability: Generalizing UCE and Implications on the Soundness of Hash-Function Constructions}, howpublished = {Cryptology ePrint Archive, Report 2017/461}, year = {2017}, url = {https://eprint.iacr.org/2017/461}, } @misc{cryptoeprint:2017:462, author = {Suvradip Chakraborty and Chester Rebeiro and Debdeep Mukhopadhyay and C. Pandu Rangan}, title = {Leakage-Resilient Tweakable Encryption from One-Way Functions}, howpublished = {Cryptology ePrint Archive, Report 2017/462}, year = {2017}, url = {https://eprint.iacr.org/2017/462}, } @misc{cryptoeprint:2017:463, author = {Christof Beierle and Anne Canteaut and Gregor Leander and Yann Rotella}, title = {Proving Resistance against Invariant Attacks: How to Choose the Round Constants}, howpublished = {Cryptology ePrint Archive, Report 2017/463}, year = {2017}, url = {https://eprint.iacr.org/2017/463}, } @misc{cryptoeprint:2017:464, author = {Mike Rosulek and Morgan Shirley}, title = {On the Structure of Unconditional UC Hybrid Protocols}, howpublished = {Cryptology ePrint Archive, Report 2017/464}, year = {2017}, url = {https://eprint.iacr.org/2017/464}, } @misc{cryptoeprint:2017:465, author = {Riham AlTawy and Muhammad ElSheikh and Amr M. Youssef and Guang Gong}, title = {Lelantos: A Blockchain-based Anonymous Physical Delivery System}, howpublished = {Cryptology ePrint Archive, Report 2017/465}, year = {2017}, url = {https://eprint.iacr.org/2017/465}, } @misc{cryptoeprint:2017:466, author = {Yusuke Naito}, title = {Tweakable Blockciphers for Efficient Authenticated Encryptions with Beyond the Birthday-Bound Security}, howpublished = {Cryptology ePrint Archive, Report 2017/466}, year = {2017}, url = {https://eprint.iacr.org/2017/466}, } @misc{cryptoeprint:2017:467, author = {Sam Kim and David J. Wu}, title = {Access Control Encryption for General Policies from Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2017/467}, year = {2017}, url = {https://eprint.iacr.org/2017/467}, } @misc{cryptoeprint:2017:468, author = {Paul Grubbs and Thomas Ristenpart and Vitaly Shmatikov}, title = {Why Your Encrypted Database Is Not Secure}, howpublished = {Cryptology ePrint Archive, Report 2017/468}, year = {2017}, url = {https://eprint.iacr.org/2017/468}, } @misc{cryptoeprint:2017:469, author = {Hiroaki Anada and Seiko Arita}, title = {Short CCA-Secure Ciphertext-Policy Attribute-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/469}, year = {2017}, url = {https://eprint.iacr.org/2017/469}, } @misc{cryptoeprint:2017:470, author = {José Becerra and Vincenzo Iovino and Dimiter Ostrev and Marjan Skrobot}, title = {On the Relation Between SIM and IND-RoR Security Models for PAKEs}, howpublished = {Cryptology ePrint Archive, Report 2017/470}, year = {2017}, url = {https://eprint.iacr.org/2017/470}, } @misc{cryptoeprint:2017:471, author = {Jacob Alperin-Sheriff and Jintai Ding and Albrecht Petzoldt and Daniel Smith Tone}, title = {Total Break of the Fully Homomorphic Multivariate Encryption Scheme of 2017/458: Decryption can not be of low degree}, howpublished = {Cryptology ePrint Archive, Report 2017/471}, year = {2017}, url = {https://eprint.iacr.org/2017/471}, } @misc{cryptoeprint:2017:472, author = {Cengiz Orencik and Erkay Savas and Mahmoud Alewiwi}, title = {A Unified Framework for Secure Search Over Encrypted Cloud Data}, howpublished = {Cryptology ePrint Archive, Report 2017/472}, year = {2017}, url = {https://eprint.iacr.org/2017/472}, } @misc{cryptoeprint:2017:473, author = {Bart Mennink and Samuel Neves}, title = {Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror Theory}, howpublished = {Cryptology ePrint Archive, Report 2017/473}, year = {2017}, url = {https://eprint.iacr.org/2017/473}, } @misc{cryptoeprint:2017:474, author = {Bart Mennink}, title = {Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security}, howpublished = {Cryptology ePrint Archive, Report 2017/474}, year = {2017}, url = {https://eprint.iacr.org/2017/474}, } @misc{cryptoeprint:2017:475, author = {Pooya Farshim and Louiza Khati and Damien Vergnaud}, title = {Security of Even--Mansour Ciphers under Key-Dependent Messages}, howpublished = {Cryptology ePrint Archive, Report 2017/475}, year = {2017}, url = {https://eprint.iacr.org/2017/475}, } @misc{cryptoeprint:2017:476, author = {Mihir Bellare and Adam O'Neill and Igors Stepanovs}, title = {Forward-Security under Continual Leakage}, howpublished = {Cryptology ePrint Archive, Report 2017/476}, year = {2017}, url = {https://eprint.iacr.org/2017/476}, } @misc{cryptoeprint:2017:477, author = {Dan Boneh and Sam Kim and David J. Wu}, title = {Constrained Keys for Invertible Pseudorandom Functions}, howpublished = {Cryptology ePrint Archive, Report 2017/477}, year = {2017}, url = {https://eprint.iacr.org/2017/477}, } @misc{cryptoeprint:2017:478, author = {Anne Canteaut and Eran Lambooij and Samuel Neves and Shahram Rasoolzadeh and Yu Sasaki and Marc Stevens}, title = {Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds}, howpublished = {Cryptology ePrint Archive, Report 2017/478}, year = {2017}, url = {https://eprint.iacr.org/2017/478}, } @misc{cryptoeprint:2017:479, author = {Keita Emura}, title = {Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2017/479}, year = {2017}, url = {https://eprint.iacr.org/2017/479}, } @misc{cryptoeprint:2017:480, author = {Thomas Prest}, title = {Sharper Bounds in Lattice-Based Cryptography using the Rényi Divergence}, howpublished = {Cryptology ePrint Archive, Report 2017/480}, year = {2017}, url = {https://eprint.iacr.org/2017/480}, } @misc{cryptoeprint:2017:481, author = {Divesh Aggarwal and Antoine Joux and Anupam Prakash and Miklos Santha}, title = {A New Public-Key Cryptosystem via Mersenne Numbers}, howpublished = {Cryptology ePrint Archive, Report 2017/481}, year = {2017}, url = {https://eprint.iacr.org/2017/481}, } @misc{cryptoeprint:2017:482, author = {Léo Ducas and Alice Pellet--Mary}, title = {On the Statistical Leak of the GGH13 Multilinear Map and some Variants}, howpublished = {Cryptology ePrint Archive, Report 2017/482}, year = {2017}, url = {https://eprint.iacr.org/2017/482}, } @misc{cryptoeprint:2017:483, author = {Sergiu Carpov and Pascal Aubry and Renaud Sirdey}, title = {A multi-start heuristic for multiplicative depth minimization of boolean circuits}, howpublished = {Cryptology ePrint Archive, Report 2017/483}, year = {2017}, url = {https://eprint.iacr.org/2017/483}, } @misc{cryptoeprint:2017:484, author = {Jung Hee Cheon and Minki Hhan and Changmin Lee}, title = {Cryptanalysis of Middle Lattice on the Overstretched NTRU Problem for General Modulus Polynomial}, howpublished = {Cryptology ePrint Archive, Report 2017/484}, year = {2017}, url = {https://eprint.iacr.org/2017/484}, } @misc{cryptoeprint:2017:485, author = {Jiangshan Yu and Mark Ryan and Liqun Chen}, title = {Authenticating compromisable storage systems}, howpublished = {Cryptology ePrint Archive, Report 2017/485}, year = {2017}, url = {https://eprint.iacr.org/2017/485}, } @misc{cryptoeprint:2017:486, author = {Ilan Komargodski and Moni Naor and Eylon Yogev}, title = {Collision Resistant Hashing for Paranoids: Dealing with Multiple Collisions}, howpublished = {Cryptology ePrint Archive, Report 2017/486}, year = {2017}, url = {https://eprint.iacr.org/2017/486}, } @misc{cryptoeprint:2017:487, author = {Yi LU}, title = {New Linear Attacks on Block Cipher GOST}, howpublished = {Cryptology ePrint Archive, Report 2017/487}, year = {2017}, url = {https://eprint.iacr.org/2017/487}, } @misc{cryptoeprint:2017:488, author = {Nir Bitansky and Yael Tauman Kalai and Omer Paneth}, title = {Multi-Collision Resistance: A Paradigm for Keyless Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2017/488}, year = {2017}, url = {https://eprint.iacr.org/2017/488}, } @misc{cryptoeprint:2017:489, author = {Itay Berman and Akshay Degwekar and Ron D. Rothblum and Prashant Nalini Vasudevan}, title = {Multi Collision Resistant Hash Functions and their Applications}, howpublished = {Cryptology ePrint Archive, Report 2017/489}, year = {2017}, url = {https://eprint.iacr.org/2017/489}, } @misc{cryptoeprint:2017:490, author = {Peter Pessl and Leon Groot Bruinderink and Yuval Yarom}, title = {To BLISS-B or not to be - Attacking strongSwan's Implementation of Post-Quantum Signatures}, howpublished = {Cryptology ePrint Archive, Report 2017/490}, year = {2017}, url = {https://eprint.iacr.org/2017/490}, } @misc{cryptoeprint:2017:491, author = {Chongwon Cho and Nico Döttling and Sanjam Garg and Divya Gupta and Peihan Miao and Antigoni Polychroniadou}, title = {Laconic Oblivious Transfer and its Applications}, howpublished = {Cryptology ePrint Archive, Report 2017/491}, year = {2017}, url = {https://eprint.iacr.org/2017/491}, } @misc{cryptoeprint:2017:492, author = {Marcel Keller and Dragos Rotaru and Nigel P. Smart and Tim Wood}, title = {Reducing Communication Channels in MPC}, howpublished = {Cryptology ePrint Archive, Report 2017/492}, year = {2017}, url = {https://eprint.iacr.org/2017/492}, } @misc{cryptoeprint:2017:493, author = {Georg T. Becker}, title = {Robust Fuzzy Extractors and Helper Data Manipulation Attacks Revisited: Theory vs Practice}, howpublished = {Cryptology ePrint Archive, Report 2017/493}, year = {2017}, url = {https://eprint.iacr.org/2017/493}, } @misc{cryptoeprint:2017:494, author = {Tomas Fabsic and Viliam Hromada and Paul Stankovski and Pavol Zajac and Qian Guo and Thomas Johansson}, title = {A Reaction Attack on the QC-LDPC McEliece Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2017/494}, year = {2017}, url = {https://eprint.iacr.org/2017/494}, } @misc{cryptoeprint:2017:495, author = {Tibor Jager and Martijn Stam and Ryan Stanley-Oakes and Bogdan Warinschi}, title = {Multi-Key Authenticated Encryption with Corruptions: Reductions are Lossy}, howpublished = {Cryptology ePrint Archive, Report 2017/495}, year = {2017}, url = {https://eprint.iacr.org/2017/495}, } @misc{cryptoeprint:2017:496, author = {Dragos Rotaru and Nigel P. Smart and Martijn Stam}, title = {Modes of Operation Suitable for Computing on Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2017/496}, year = {2017}, url = {https://eprint.iacr.org/2017/496}, } @misc{cryptoeprint:2017:497, author = {Itai Dinur and Niv Nadler}, title = {Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme}, howpublished = {Cryptology ePrint Archive, Report 2017/497}, year = {2017}, url = {https://eprint.iacr.org/2017/497}, } @misc{cryptoeprint:2017:498, author = {Joan Daemen and Bart Mennink and Gilles Van Assche}, title = {Full-State Keyed Duplex With Built-In Multi-User Support}, howpublished = {Cryptology ePrint Archive, Report 2017/498}, year = {2017}, url = {https://eprint.iacr.org/2017/498}, } @misc{cryptoeprint:2017:499, author = {Fuchun Guo and Rongmao Chen and Willy Susilo and Jianchang Lai and Guomin Yang and Yi Mu}, title = {Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample}, howpublished = {Cryptology ePrint Archive, Report 2017/499}, year = {2017}, url = {https://eprint.iacr.org/2017/499}, } @misc{cryptoeprint:2017:500, author = {Michel Abdalla and Fabrice Benhamouda and Alain Passelègue}, title = {Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2017/500}, year = {2017}, url = {https://eprint.iacr.org/2017/500}, } @misc{cryptoeprint:2017:501, author = {Felix Günther and Sogol Mazaheri}, title = {A Formal Treatment of Multi-key Channels}, howpublished = {Cryptology ePrint Archive, Report 2017/501}, year = {2017}, url = {https://eprint.iacr.org/2017/501}, } @misc{cryptoeprint:2017:502, author = {Bita Darvish Rouhani and M. Sadegh Riazi and Farinaz Koushanfar}, title = {DeepSecure: Scalable Provably-Secure Deep Learning}, howpublished = {Cryptology ePrint Archive, Report 2017/502}, year = {2017}, url = {https://eprint.iacr.org/2017/502}, } @misc{cryptoeprint:2017:503, author = {Guilhem Castagnos and Laurent Imbert and Fabien Laguillaumie}, title = {Encryption Switching Protocols Revisited: Switching modulo $p$}, howpublished = {Cryptology ePrint Archive, Report 2017/503}, year = {2017}, url = {https://eprint.iacr.org/2017/503}, } @misc{cryptoeprint:2017:504, author = {Craig Costello and Huseyin Hisil}, title = {A simple and compact algorithm for SIDH with arbitrary degree isogenies}, howpublished = {Cryptology ePrint Archive, Report 2017/504}, year = {2017}, url = {https://eprint.iacr.org/2017/504}, } @misc{cryptoeprint:2017:505, author = {Thomas Espitau and Pierre-Alain Fouque and Benoit Gerard and Mehdi Tibouchi}, title = {Side-Channel Attacks on BLISS Lattice-Based Signatures -- Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers}, howpublished = {Cryptology ePrint Archive, Report 2017/505}, year = {2017}, url = {https://eprint.iacr.org/2017/505}, } @misc{cryptoeprint:2017:506, author = {Maciej Skorski}, title = {Optimal Overcoming Weak Expectations}, howpublished = {Cryptology ePrint Archive, Report 2017/506}, year = {2017}, url = {https://eprint.iacr.org/2017/506}, } @misc{cryptoeprint:2017:507, author = {Maciej Obremski and Maciej Skórski}, title = {Inverted Leftover Hash Lemma}, howpublished = {Cryptology ePrint Archive, Report 2017/507}, year = {2017}, url = {https://eprint.iacr.org/2017/507}, } @misc{cryptoeprint:2017:508, author = {Victor Cauchois and Clément Gomez and Reynald Lercier}, title = {Generalized Distinguishing Attack: A New Cryptanalysis of AES-like Permutations}, howpublished = {Cryptology ePrint Archive, Report 2017/508}, year = {2017}, url = {https://eprint.iacr.org/2017/508}, } @misc{cryptoeprint:2017:509, author = {Fang Song and Aaram Yun}, title = {Quantum Security of NMAC and Related Constructions}, howpublished = {Cryptology ePrint Archive, Report 2017/509}, year = {2017}, url = {https://eprint.iacr.org/2017/509}, } @misc{cryptoeprint:2017:510, author = {Alexandra Boldyreva and Christopher Patton and Thomas Shrimpton}, title = {Hedging Public-Key Encryption in the Real World}, howpublished = {Cryptology ePrint Archive, Report 2017/510}, year = {2017}, url = {https://eprint.iacr.org/2017/510}, } @misc{cryptoeprint:2017:511, author = {Alex Biryukov and Leo Perrin}, title = {State of the Art in Lightweight Symmetric Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2017/511}, year = {2017}, url = {https://eprint.iacr.org/2017/511}, } @misc{cryptoeprint:2017:512, author = {Dr. M. AMUTHA PRABAKAR and Dr. B. INDRANI and M. KARTHIGAI VENI}, title = {PROVABLY SECURE TWO-FACTOR AUTHENTICATION SCHEME FOR E-HEALTH USING SMART CARD}, howpublished = {Cryptology ePrint Archive, Report 2017/512}, year = {2017}, url = {https://eprint.iacr.org/2017/512}, } @misc{cryptoeprint:2017:513, author = {Patrick Holzer and Thomas Wunderer}, title = {Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor $p^\alpha q^\beta$}, howpublished = {Cryptology ePrint Archive, Report 2017/513}, year = {2017}, url = {https://eprint.iacr.org/2017/513}, } @misc{cryptoeprint:2017:514, author = {Philippe Gaborit and Adrien Hauteville and Duong Hieu Phan and Jean-Pierre Tillich}, title = {Identity-based Encryption from Codes with Rank Metric}, howpublished = {Cryptology ePrint Archive, Report 2017/514}, year = {2017}, url = {https://eprint.iacr.org/2017/514}, } @misc{cryptoeprint:2017:515, author = {Zahra Jafargholi and Chethan Kamath and Karen Klein and Ilan Komargodski and Krzysztof Pietrzak and Daniel Wichs}, title = {Be Adaptive, Avoid Overcommitting}, howpublished = {Cryptology ePrint Archive, Report 2017/515}, year = {2017}, url = {https://eprint.iacr.org/2017/515}, } @misc{cryptoeprint:2017:516, author = {Claude Carlet}, title = {Characterizations of the differential uniformity of vectorial functions by the Walsh transform}, howpublished = {Cryptology ePrint Archive, Report 2017/516}, year = {2017}, url = {https://eprint.iacr.org/2017/516}, } @misc{cryptoeprint:2017:517, author = {Jacqueline Brendel and Marc Fischlin and Felix Günther and Christian Janson}, title = {PRF-ODH: Relations, Instantiations, and Impossibility Results}, howpublished = {Cryptology ePrint Archive, Report 2017/517}, year = {2017}, url = {https://eprint.iacr.org/2017/517}, } @misc{cryptoeprint:2017:518, author = {Joost Renes and Benjamin Smith}, title = {qDSA: Small and Secure Digital Signatures with Curve-based Diffie-Hellman Key Pairs}, howpublished = {Cryptology ePrint Archive, Report 2017/518}, year = {2017}, url = {https://eprint.iacr.org/2017/518}, } @misc{cryptoeprint:2017:519, author = {Nishanth Chandran and Juan A. Garay and Payman Mohassel and Satyanarayana Vusirikala}, title = {Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case}, howpublished = {Cryptology ePrint Archive, Report 2017/519}, year = {2017}, url = {https://eprint.iacr.org/2017/519}, } @misc{cryptoeprint:2017:520, author = {Juan Garay and Yuval Ishai and Rafail Ostrovsky and Vassilis Zikas}, title = {The Price of Low Communication in Secure Multi-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2017/520}, year = {2017}, url = {https://eprint.iacr.org/2017/520}, } @misc{cryptoeprint:2017:521, author = {F. Betül Durak and Serge Vaudenay}, title = {Breaking the FF3 Format-Preserving Encryption Standard Over Small Domains}, howpublished = {Cryptology ePrint Archive, Report 2017/521}, year = {2017}, url = {https://eprint.iacr.org/2017/521}, } @misc{cryptoeprint:2017:522, author = {Marc Beunardeau and Aisling Connolly and Rémi Géraud and David Naccache}, title = {On the Hardness of the Mersenne Low Hamming Ratio Assumption}, howpublished = {Cryptology ePrint Archive, Report 2017/522}, year = {2017}, url = {https://eprint.iacr.org/2017/522}, } @misc{cryptoeprint:2017:523, author = {Vadim Lyubashevsky and Gregor Seiler}, title = {Partially Splitting Rings for Faster Lattice-Based Zero-Knowledge Proofs}, howpublished = {Cryptology ePrint Archive, Report 2017/523}, year = {2017}, url = {https://eprint.iacr.org/2017/523}, } @misc{cryptoeprint:2017:524, author = {Masayuki Abe and Dennis Hofheinz and Ryo Nishimaki and Miyako Ohkubo and Jiaxin Pan}, title = {Compact Structure-preserving Signatures with Almost Tight Security}, howpublished = {Cryptology ePrint Archive, Report 2017/524}, year = {2017}, url = {https://eprint.iacr.org/2017/524}, } @misc{cryptoeprint:2017:525, author = {Romain Gay and Dennis Hofheinz and Lisa Kohl}, title = {Kurosawa-Desmedt Meets Tight Security}, howpublished = {Cryptology ePrint Archive, Report 2017/525}, year = {2017}, url = {https://eprint.iacr.org/2017/525}, } @misc{cryptoeprint:2017:526, author = {Jiangshan Yu and Mark Ryan}, title = {Evaluating web PKIs}, howpublished = {Cryptology ePrint Archive, Report 2017/526}, year = {2017}, url = {https://eprint.iacr.org/2017/526}, } @misc{cryptoeprint:2017:527, author = {Adam Everspaugh and Kenneth Paterson and Thomas Ristenpart and Sam Scott}, title = {Key Rotation for Authenticated Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/527}, year = {2017}, url = {https://eprint.iacr.org/2017/527}, } @misc{cryptoeprint:2017:528, author = {Claude Carlet}, title = {Componentwise APNness, Walsh uniformity of APN functions and cyclic-additive difference sets}, howpublished = {Cryptology ePrint Archive, Report 2017/528}, year = {2017}, url = {https://eprint.iacr.org/2017/528}, } @misc{cryptoeprint:2017:529, author = {Ling Song and Guohong Liao and Jian Guo}, title = {Non-Full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak}, howpublished = {Cryptology ePrint Archive, Report 2017/529}, year = {2017}, url = {https://eprint.iacr.org/2017/529}, } @misc{cryptoeprint:2017:530, author = {Sebastian Faust and Kristina Hostakova and Pratyay Mukherjee and Daniele Venturi}, title = {Non-Malleable Codes for Space-Bounded Tampering}, howpublished = {Cryptology ePrint Archive, Report 2017/530}, year = {2017}, url = {https://eprint.iacr.org/2017/530}, } @misc{cryptoeprint:2017:531, author = {Stjepan Picek and Annelie Heuser and Sylvain Guilley}, title = {Template Attack vs Bayes Classifier}, howpublished = {Cryptology ePrint Archive, Report 2017/531}, year = {2017}, url = {https://eprint.iacr.org/2017/531}, } @misc{cryptoeprint:2017:532, author = {Xavier Boyen and Qinyi Li}, title = {All-But-Many Lossy Trapdoor Functions from Lattices and Applications}, howpublished = {Cryptology ePrint Archive, Report 2017/532}, year = {2017}, url = {https://eprint.iacr.org/2017/532}, } @misc{cryptoeprint:2017:533, author = {Gorjan Alagic and Christian Majenz}, title = {Quantum non-malleability and authentication}, howpublished = {Cryptology ePrint Archive, Report 2017/533}, year = {2017}, url = {https://eprint.iacr.org/2017/533}, } @misc{cryptoeprint:2017:534, author = {Zhenzhen Bao and Lei Wang and Jian Guo and Dawu Gu}, title = {Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners}, howpublished = {Cryptology ePrint Archive, Report 2017/534}, year = {2017}, url = {https://eprint.iacr.org/2017/534}, } @misc{cryptoeprint:2017:535, author = {Tetsu Iwata and Kazuhiko Minematsu and Thomas Peyrin and Yannick Seurin}, title = {ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication}, howpublished = {Cryptology ePrint Archive, Report 2017/535}, year = {2017}, url = {https://eprint.iacr.org/2017/535}, } @misc{cryptoeprint:2017:536, author = {Jean Karim Zinzindohoué, Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche}, title = {HACL*: A Verified Modern Cryptographic Library}, howpublished = {Cryptology ePrint Archive, Report 2017/536}, year = {2017}, url = {https://eprint.iacr.org/2017/536}, } @misc{cryptoeprint:2017:537, author = {Wei Dai and Viet Tung Hoang and Stefano Tessaro}, title = {Information-theoretic Indistinguishability via the Chi-squared Method}, howpublished = {Cryptology ePrint Archive, Report 2017/537}, year = {2017}, url = {https://eprint.iacr.org/2017/537}, } @misc{cryptoeprint:2017:538, author = {Sumegha Garg and Henry Yuen and Mark Zhandry}, title = {New security notions and feasibility results for authentication of quantum data}, howpublished = {Cryptology ePrint Archive, Report 2017/538}, year = {2017}, url = {https://eprint.iacr.org/2017/538}, } @misc{cryptoeprint:2017:539, author = {Pratik Soni and Stefano Tessaro}, title = {Public-Seed Pseudorandom Permutations}, howpublished = {Cryptology ePrint Archive, Report 2017/539}, year = {2017}, url = {https://eprint.iacr.org/2017/539}, } @misc{cryptoeprint:2017:540, author = {Jens Groth and Mary Maller}, title = {Snarky Signatures: \\ Minimal Signatures of Knowledge from Simulation-Extractable SNARKs}, howpublished = {Cryptology ePrint Archive, Report 2017/540}, year = {2017}, url = {https://eprint.iacr.org/2017/540}, } @misc{cryptoeprint:2017:541, author = {Sanjam Garg and Mohammad Mahmoody and Ameer Mohammed}, title = {Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives}, howpublished = {Cryptology ePrint Archive, Report 2017/541}, year = {2017}, url = {https://eprint.iacr.org/2017/541}, } @misc{cryptoeprint:2017:542, author = {Joanne Woodage and Rahul Chatterjee and Yevgeniy Dodis and Ari Juels and Thomas Ristenpart}, title = {A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing}, howpublished = {Cryptology ePrint Archive, Report 2017/542}, year = {2017}, url = {https://eprint.iacr.org/2017/542}, } @misc{cryptoeprint:2017:543, author = {Nico D\"ottling and Sanjam Garg}, title = {Identity-Based Encryption from the Diffie-Hellman Assumption}, howpublished = {Cryptology ePrint Archive, Report 2017/543}, year = {2017}, url = {https://eprint.iacr.org/2017/543}, } @misc{cryptoeprint:2017:544, author = {Elette Boyle and Saleet Klein and Alon Rosen and Gil Segev}, title = {Securing Abe's Mix-net Against Malicious Verifiers via Witness Indistinguishability}, howpublished = {Cryptology ePrint Archive, Report 2017/544}, year = {2017}, url = {https://eprint.iacr.org/2017/544}, } @misc{cryptoeprint:2017:545, author = {Ignacio Cascudo and Ivan Damgård and Oriol Farràs and Samuel Ranellucci}, title = {Resource-efficient OT combiners with active security}, howpublished = {Cryptology ePrint Archive, Report 2017/545}, year = {2017}, url = {https://eprint.iacr.org/2017/545}, } @misc{cryptoeprint:2017:546, author = {Hitesh Tewari and Arthur Hughes and Stefan Weber and Tomas Barry}, title = {X509CLOUD - FRAMEWORK FOR A UBIQUITOUS PKI}, howpublished = {Cryptology ePrint Archive, Report 2017/546}, year = {2017}, url = {https://eprint.iacr.org/2017/546}, } @misc{cryptoeprint:2017:547, author = {Seyed Farhad Aghili and Hamid Mala}, title = {Security Analysis of an Ultra-lightweight RFID Authentication Protocol for M-commerce}, howpublished = {Cryptology ePrint Archive, Report 2017/547}, year = {2017}, url = {https://eprint.iacr.org/2017/547}, } @misc{cryptoeprint:2017:548, author = {Yark{\i}n Dor\"oz and Jeffrey Hoffstein and Jill Pipher and Joseph H. Silverman and Berk Sunar and William Whyte and Zhenfei Zhang}, title = {Fully Homomorphic Encryption from the Finite Field Isomorphism Problem}, howpublished = {Cryptology ePrint Archive, Report 2017/548}, year = {2017}, url = {https://eprint.iacr.org/2017/548}, } @misc{cryptoeprint:2017:549, author = {Sajin Sasy and Sergey Gorbunov and Christopher W. Fletcher}, title = {ZeroTrace : Oblivious Memory Primitives from Intel SGX}, howpublished = {Cryptology ePrint Archive, Report 2017/549}, year = {2017}, url = {https://eprint.iacr.org/2017/549}, } @misc{cryptoeprint:2017:550, author = {Tore Frederiksen and Benny Pinkas and Avishay Yanay}, title = {Committed MPC - Maliciously Secure Multiparty Computation from Homomorphic Commitments}, howpublished = {Cryptology ePrint Archive, Report 2017/550}, year = {2017}, url = {https://eprint.iacr.org/2017/550}, } @misc{cryptoeprint:2017:551, author = {Fatemeh Ganji and Shahin Tajik and Jean-Pierre Seifert}, title = {Noise-Tolerant Machine Learning Attacks against Physically Unclonable Functions}, howpublished = {Cryptology ePrint Archive, Report 2017/551}, year = {2017}, url = {https://eprint.iacr.org/2017/551}, } @misc{cryptoeprint:2017:552, author = {Yehuda Lindell}, title = {Fast Secure Two-Party ECDSA Signing}, howpublished = {Cryptology ePrint Archive, Report 2017/552}, year = {2017}, url = {https://eprint.iacr.org/2017/552}, } @misc{cryptoeprint:2017:553, author = {Scott Fluhrer}, title = {Further Analysis of a Proposed Hash-Based Signature Standard}, howpublished = {Cryptology ePrint Archive, Report 2017/553}, year = {2017}, url = {https://eprint.iacr.org/2017/553}, } @misc{cryptoeprint:2017:554, author = {Renaud Dubois}, title = {Trapping ECC with Invalid Curve Bug Attacks}, howpublished = {Cryptology ePrint Archive, Report 2017/554}, year = {2017}, url = {https://eprint.iacr.org/2017/554}, } @misc{cryptoeprint:2017:555, author = {Fabrice Benhamouda and Hugo Krawczyk and Tal Rabin}, title = {Robust Non-Interactive Multiparty Computation Against Constant-Size Collusion}, howpublished = {Cryptology ePrint Archive, Report 2017/555}, year = {2017}, url = {https://eprint.iacr.org/2017/555}, } @misc{cryptoeprint:2017:556, author = {Sankhanil Dey and Ranjan Ghosh}, title = {Multiplication and Division over Extended Galois Field GF($p^q$): A new Approach to find Monic Irreducible Polynomials over any Galois Field GF($p^q$).}, howpublished = {Cryptology ePrint Archive, Report 2017/556}, year = {2017}, url = {https://eprint.iacr.org/2017/556}, } @misc{cryptoeprint:2017:557, author = {Foteini Baldimtsi and Aggelos Kiayias and Katerina Samari}, title = {Watermarking Public-key Cryptographic Functionalities and Implementations}, howpublished = {Cryptology ePrint Archive, Report 2017/557}, year = {2017}, url = {https://eprint.iacr.org/2017/557}, } @misc{cryptoeprint:2017:558, author = {Mehmet Sabir Kiraz and Ziya Alper Genç and Erdinç Öztürk}, title = {Detecting Large Integer Arithmetic for Defense Against Crypto Ransomware}, howpublished = {Cryptology ePrint Archive, Report 2017/558}, year = {2017}, url = {https://eprint.iacr.org/2017/558}, } @misc{cryptoeprint:2017:559, author = {Alexandra Boldyreva and Shan Chen and Pierre-Alain Dupont and David Pointcheval}, title = {Human Computing for Handling Strong Corruptions in Authenticated Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2017/559}, year = {2017}, url = {https://eprint.iacr.org/2017/559}, } @misc{cryptoeprint:2017:560, author = {Ray Beaulieu and Douglas Shors and Jason Smith and Stefan Treatman-Clark and Bryan Weeks and Louis Wingers}, title = {Notes on the design and analysis of SIMON and SPECK}, howpublished = {Cryptology ePrint Archive, Report 2017/560}, year = {2017}, url = {https://eprint.iacr.org/2017/560}, } @misc{cryptoeprint:2017:561, author = {Yashvanth Kondi and Arpita Patra}, title = {Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic}, howpublished = {Cryptology ePrint Archive, Report 2017/561}, year = {2017}, url = {https://eprint.iacr.org/2017/561}, } @misc{cryptoeprint:2017:562, author = {Björn Haase and Benoît Labrique}, title = {Making Password Authenticated Key Exchange Suitable For Resource-Constrained Industrial Control Devices}, howpublished = {Cryptology ePrint Archive, Report 2017/562}, year = {2017}, url = {https://eprint.iacr.org/2017/562}, } @misc{cryptoeprint:2017:563, author = {Jacob Alperin-Sheriff and Daniel Apon}, title = {Weak is Better: Tightly Secure Short Signatures from Weak PRFs}, howpublished = {Cryptology ePrint Archive, Report 2017/563}, year = {2017}, url = {https://eprint.iacr.org/2017/563}, } @misc{cryptoeprint:2017:564, author = {Manaar Alam and Sarani Bhattacharya and Debdeep Mukhopadhyay and Sourangshu Bhattacharya}, title = {Performance Counters to Rescue: A Machine Learning based safeguard against Micro-architectural Side-Channel-Attacks}, howpublished = {Cryptology ePrint Archive, Report 2017/564}, year = {2017}, url = {https://eprint.iacr.org/2017/564}, } @misc{cryptoeprint:2017:565, author = {Pramod Subramanyan and Rohit Sinha and Ilia Lebedev and Srinivas Devadas and Sanjit Seshia}, title = {A Formal Foundation for Secure Remote Execution of Enclaves}, howpublished = {Cryptology ePrint Archive, Report 2017/565}, year = {2017}, url = {https://eprint.iacr.org/2017/565}, } @misc{cryptoeprint:2017:566, author = {Matteo Campanelli and Rosario Gennaro and Steven Goldfeder and Luca Nizzardo}, title = {Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services}, howpublished = {Cryptology ePrint Archive, Report 2017/566}, year = {2017}, url = {https://eprint.iacr.org/2017/566}, } @misc{cryptoeprint:2017:567, author = {Elette Boyle and Yuval Ishai and Rafael Pass and Mary Wootters}, title = {Can We Access a Database Both Locally and Privately?}, howpublished = {Cryptology ePrint Archive, Report 2017/567}, year = {2017}, url = {https://eprint.iacr.org/2017/567}, } @misc{cryptoeprint:2017:568, author = {Ran Canetti and Justin Holmgren and Silas Richelson}, title = {Towards Doubly Efficient Private Information Retrieval}, howpublished = {Cryptology ePrint Archive, Report 2017/568}, year = {2017}, url = {https://eprint.iacr.org/2017/568}, } @misc{cryptoeprint:2017:569, author = {Yihua Zhang and Marina Blanton and Fattaneh Bayatbabolghani }, title = {Enforcing Input Correctness via Certification in Garbled Circuit Evaluation}, howpublished = {Cryptology ePrint Archive, Report 2017/569}, year = {2017}, url = {https://eprint.iacr.org/2017/569}, } @misc{cryptoeprint:2017:570, author = {Anders P. K. Dalskov and Claudio Orlandi}, title = {Assessing the No-Knowledge Property of SpiderOak ONE}, howpublished = {Cryptology ePrint Archive, Report 2017/570}, year = {2017}, url = {https://eprint.iacr.org/2017/570}, } @misc{cryptoeprint:2017:571, author = {Christophe Petit}, title = {Faster Algorithms for Isogeny Problems using Torsion Point Images}, howpublished = {Cryptology ePrint Archive, Report 2017/571}, year = {2017}, url = {https://eprint.iacr.org/2017/571}, } @misc{cryptoeprint:2017:572, author = {Phuong Ha Nguyen and Durga Prasad Sahoo and Chenglu Jin and Kaleel Mahmood and Marten van Dijk}, title = {MXPUF: Secure PUF Design against State-of-the-art Modeling Attacks}, howpublished = {Cryptology ePrint Archive, Report 2017/572}, year = {2017}, url = {https://eprint.iacr.org/2017/572}, } @misc{cryptoeprint:2017:573, author = {Bernardo David and Peter Ga{\v{z}}i and Aggelos Kiayias and Alexander Russell}, title = {Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake protocol}, howpublished = {Cryptology ePrint Archive, Report 2017/573}, year = {2017}, url = {https://eprint.iacr.org/2017/573}, } @misc{cryptoeprint:2017:574, author = {Hamidreza Yazdanpanah, Mohammadreza Hasani Ahangar, Mahdi Azizi and Arash Ghafouri}, title = {A Secure User Authentication and Key Agreement Scheme for HWSN Tailored for the Internet of Things Environment}, howpublished = {Cryptology ePrint Archive, Report 2017/574}, year = {2017}, url = {https://eprint.iacr.org/2017/574}, } @misc{cryptoeprint:2017:575, author = {Ehsan Ebrahimi and Dominique Unruh}, title = {Quantum Collision-Resistance of Non-uniformly Distributed Functions: Upper and Lower Bounds}, howpublished = {Cryptology ePrint Archive, Report 2017/575}, year = {2017}, url = {https://eprint.iacr.org/2017/575}, } @misc{cryptoeprint:2017:576, author = {Zhengbin Liu and Yongqiang Li and Mingsheng Wang}, title = {The Security of SIMON-like Ciphers Against Linear Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2017/576}, year = {2017}, url = {https://eprint.iacr.org/2017/576}, } @misc{cryptoeprint:2017:577, author = {Steffen Schulz and André Schaller and Florian Kohnhäuser and Stefan Katzenbeisser}, title = {Boot Attestation: Secure Remote Reporting with Off-The-Shelf IoT Sensors}, howpublished = {Cryptology ePrint Archive, Report 2017/577}, year = {2017}, url = {https://eprint.iacr.org/2017/577}, } @misc{cryptoeprint:2017:578, author = {Hubert Ritzdorf and Karl Wüst and Arthur Gervais and Guillaume Felley and Srdjan Capkun}, title = {TLS-N: Non-repudiation over TLS Enabling - Ubiquitous Content Signing for Disintermediation}, howpublished = {Cryptology ePrint Archive, Report 2017/578}, year = {2017}, url = {https://eprint.iacr.org/2017/578}, } @misc{cryptoeprint:2017:579, author = {Mridul Nandi}, title = {Birthday Attack on Dual EWCDM}, howpublished = {Cryptology ePrint Archive, Report 2017/579}, year = {2017}, url = {https://eprint.iacr.org/2017/579}, } @misc{cryptoeprint:2017:580, author = {Riddhi Ghosal}, title = {Analysing Relations involving small number of Monomials in AES S- Box}, howpublished = {Cryptology ePrint Archive, Report 2017/580}, year = {2017}, url = {https://eprint.iacr.org/2017/580}, } @misc{cryptoeprint:2017:581, author = {Gilles Dequen and Sorina Ionica and Monika Trimoska}, title = {Parallel Collision Search with Radix Trees}, howpublished = {Cryptology ePrint Archive, Report 2017/581}, year = {2017}, url = {https://eprint.iacr.org/2017/581}, } @misc{cryptoeprint:2017:582, author = {Angela Jäschke and Frederik Armknecht}, title = {(Finite) Field Work: Choosing the Best Encoding of Numbers for FHE Computation}, howpublished = {Cryptology ePrint Archive, Report 2017/582}, year = {2017}, url = {https://eprint.iacr.org/2017/582}, } @misc{cryptoeprint:2017:583, author = {Thomas Espitau and Pierre-Alain Fouque and Benoit Gerard and Mehdi Tibouchi}, title = {Side-Channel Attacks on BLISS Lattice-Based Signatures -- Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers}, howpublished = {Cryptology ePrint Archive, Report 2017/583}, year = {2017}, url = {https://eprint.iacr.org/2017/583}, } @misc{cryptoeprint:2017:584, author = {Luka Malisa and Kari Kostiainen and Thomas Knell and David Sommer and Srdjan Capkun}, title = {Hacking in the Blind: (Almost) Invisible Runtime User Interface Attacks}, howpublished = {Cryptology ePrint Archive, Report 2017/584}, year = {2017}, url = {https://eprint.iacr.org/2017/584}, } @misc{cryptoeprint:2017:585, author = {Pavel Tarasov and Hitesh Tewari}, title = {Internet Voting Using Zcash}, howpublished = {Cryptology ePrint Archive, Report 2017/585}, year = {2017}, url = {https://eprint.iacr.org/2017/585}, } @misc{cryptoeprint:2017:586, author = {Daniel S. Roche and Adam J. Aviv and Seung Geol Choi and Travis Mayberry}, title = {Deterministic, Stash-Free Write-Only ORAM}, howpublished = {Cryptology ePrint Archive, Report 2017/586}, year = {2017}, url = {https://eprint.iacr.org/2017/586}, } @misc{cryptoeprint:2017:587, author = {Georg Fuchsbauer}, title = {Subversion-zero-knowledge SNARKs}, howpublished = {Cryptology ePrint Archive, Report 2017/587}, year = {2017}, url = {https://eprint.iacr.org/2017/587}, } @misc{cryptoeprint:2017:588, author = {Maciej Obremski and Maciej Skorski}, title = {Renyi Entropy Estimation Revisited}, howpublished = {Cryptology ePrint Archive, Report 2017/588}, year = {2017}, url = {https://eprint.iacr.org/2017/588}, } @misc{cryptoeprint:2017:589, author = {Juay Guan Hee}, title = {An Attempt to Cryptanalyze A Partially Known Cipher Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2017/589}, year = {2017}, url = {https://eprint.iacr.org/2017/589}, } @misc{cryptoeprint:2017:590, author = {Linru Zhang and Gongxian Zeng and Yuechen Chen and Siu-Ming Yiu and Nairen Cao and Zheli Liu}, title = {Constant bandwidth ORAM with small block size using PIR operations}, howpublished = {Cryptology ePrint Archive, Report 2017/590}, year = {2017}, url = {https://eprint.iacr.org/2017/590}, } @misc{cryptoeprint:2017:591, author = {Hildur Olafsdottir and Aanjhan Ranganathan and Srdjan Capkun}, title = {On the Security of Carrier Phase-based Ranging}, howpublished = {Cryptology ePrint Archive, Report 2017/591}, year = {2017}, url = {https://eprint.iacr.org/2017/591}, } @misc{cryptoeprint:2017:592, author = {Anja Becker and Dusan Kostic}, title = {Speeding up lattice sieve with Xeon Phi coprocessor}, howpublished = {Cryptology ePrint Archive, Report 2017/592}, year = {2017}, url = {https://eprint.iacr.org/2017/592}, } @misc{cryptoeprint:2017:593, author = {Alessio Caminata and Elisa Gorla}, title = {Solving Multivariate Polynomial Systems and an Invariant from Commutative Algebra}, howpublished = {Cryptology ePrint Archive, Report 2017/593}, year = {2017}, url = {https://eprint.iacr.org/2017/593}, } @misc{cryptoeprint:2017:594, author = {Robert Primas and Peter Pessl and Stefan Mangard}, title = {Single-Trace Side-Channel Attacks on Masked Lattice-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/594}, year = {2017}, url = {https://eprint.iacr.org/2017/594}, } @misc{cryptoeprint:2017:595, author = {Wen Wang and Jakub Szefer and Ruben Niederhagen}, title = {FPGA-based Key Generator for the Niederreiter Cryptosystem using Binary Goppa Codes}, howpublished = {Cryptology ePrint Archive, Report 2017/595}, year = {2017}, url = {https://eprint.iacr.org/2017/595}, } @misc{cryptoeprint:2017:596, author = {Mélissa Rossi and Mike Hamburg and Michael Hutter and Mark E. Marson}, title = {A Side-Channel Assisted Cryptanalytic Attack Against QcBits}, howpublished = {Cryptology ePrint Archive, Report 2017/596}, year = {2017}, url = {https://eprint.iacr.org/2017/596}, } @misc{cryptoeprint:2017:597, author = {Saikrishna Badrinarayanan and Vipul Goyal and Abhishek Jain and Dakshita Khurana and Amit Sahai}, title = {Round Optimal Concurrent MPC via Strong Simulation}, howpublished = {Cryptology ePrint Archive, Report 2017/597}, year = {2017}, url = {https://eprint.iacr.org/2017/597}, } @misc{cryptoeprint:2017:598, author = {Martin Roetteler and Michael Naehrig and Krysta M. Svore and Kristin Lauter}, title = {Quantum Resource Estimates for Computing Elliptic Curve Discrete Logarithms}, howpublished = {Cryptology ePrint Archive, Report 2017/598}, year = {2017}, url = {https://eprint.iacr.org/2017/598}, } @misc{cryptoeprint:2017:599, author = {Behzad Abdolmaleki and Karim Baghery and Helger Lipmaa and Michal Zajac}, title = {A Subversion-Resistant SNARK}, howpublished = {Cryptology ePrint Archive, Report 2017/599}, year = {2017}, url = {https://eprint.iacr.org/2017/599}, } @misc{cryptoeprint:2017:600, author = {Jeremy Jean and Amir Moradi and Thomas Peyrin and Pascal Sasdrich}, title = {Bit-Sliding: A Generic Technique for Bit-Serial Implementations of SPN-based Primitives -- Applications to AES, PRESENT and SKINNY}, howpublished = {Cryptology ePrint Archive, Report 2017/600}, year = {2017}, url = {https://eprint.iacr.org/2017/600}, } @misc{cryptoeprint:2017:601, author = {Wei Dai and Yark{\i}n Dor\"{o}z and Yuriy Polyakov and Kurt Rohloff and Hadi Sajjadpour and Erkay Sava\c{s} and Berk Sunar}, title = {Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme}, howpublished = {Cryptology ePrint Archive, Report 2017/601}, year = {2017}, url = {https://eprint.iacr.org/2017/601}, } @misc{cryptoeprint:2017:602, author = {Sean Bowe and Ariel Gabizon and Matthew D. Green}, title = {A multi-party protocol for constructing the public parameters of the Pinocchio zk-SNARK}, howpublished = {Cryptology ePrint Archive, Report 2017/602}, year = {2017}, url = {https://eprint.iacr.org/2017/602}, } @misc{cryptoeprint:2017:603, author = {Donghoon Chang and Arpan Jati and Sweta Mishra and Somitra Kumar Sanadhya}, title = {Cryptanalytic Time-Memory Tradeoff for Password Hashing Schemes}, howpublished = {Cryptology ePrint Archive, Report 2017/603}, year = {2017}, url = {https://eprint.iacr.org/2017/603}, } @misc{cryptoeprint:2017:604, author = {Dennis Hofheinz and Kathrin Hövelmanns and Eike Kiltz}, title = {A Modular Analysis of the Fujisaki-Okamoto Transformation}, howpublished = {Cryptology ePrint Archive, Report 2017/604}, year = {2017}, url = {https://eprint.iacr.org/2017/604}, } @misc{cryptoeprint:2017:605, author = {Xavier Bultel and Pascal Lafourcade}, title = {Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures}, howpublished = {Cryptology ePrint Archive, Report 2017/605}, year = {2017}, url = {https://eprint.iacr.org/2017/605}, } @misc{cryptoeprint:2017:606, author = {Johannes Buchmann and Niklas Büscher and Florian Göpfert and Stefan Katzenbeisser and Juliane Krämer and Daniele Micciancio and Sander Siim and Christine van Vredendaal and Michael Walter}, title = {Creating Cryptographic Challenges Using Multi-Party Computation: The LWE Challenge}, howpublished = {Cryptology ePrint Archive, Report 2017/606}, year = {2017}, url = {https://eprint.iacr.org/2017/606}, } @misc{cryptoeprint:2017:607, author = {Edward Eaton}, title = {Leighton-Micali Hash-Based Signatures in the Quantum Random-Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2017/607}, year = {2017}, url = {https://eprint.iacr.org/2017/607}, } @misc{cryptoeprint:2017:608, author = {Vincent Immler and Robert Specht and Florian Unterstein}, title = {Your Rails Cannot Hide From Localized EM: How Dual-Rail Logic Fails on FPGAs}, howpublished = {Cryptology ePrint Archive, Report 2017/608}, year = {2017}, url = {https://eprint.iacr.org/2017/608}, } @misc{cryptoeprint:2017:609, author = {Alessandro Amadori and Federico Pintore and Massimiliano Sala}, title = {On the discrete logarithm problem for prime-field elliptic curves}, howpublished = {Cryptology ePrint Archive, Report 2017/609}, year = {2017}, url = {https://eprint.iacr.org/2017/609}, } @misc{cryptoeprint:2017:610, author = {Céline Blondeau and Roberto Civino and Massimiliano Sala}, title = {Differential Attacks: Using Alternative Operations}, howpublished = {Cryptology ePrint Archive, Report 2017/610}, year = {2017}, url = {https://eprint.iacr.org/2017/610}, } @misc{cryptoeprint:2017:611, author = {David Leslie and Chris Sherfield and Nigel P. Smart}, title = {Multi-Rate Threshold FlipThem}, howpublished = {Cryptology ePrint Archive, Report 2017/611}, year = {2017}, url = {https://eprint.iacr.org/2017/611}, } @misc{cryptoeprint:2017:612, author = {Martin R. Albrecht and Amit Deo}, title = {Large Modulus Ring-LWE >= Module-LWE}, howpublished = {Cryptology ePrint Archive, Report 2017/612}, year = {2017}, url = {https://eprint.iacr.org/2017/612}, } @misc{cryptoeprint:2017:613, author = {Hocheol Shin and Dohyun Kim and Yujin Kwon and Yongdae Kim}, title = {Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications}, howpublished = {Cryptology ePrint Archive, Report 2017/613}, year = {2017}, url = {https://eprint.iacr.org/2017/613}, } @misc{cryptoeprint:2017:614, author = {Mathias Wagner and Stefan Heyse}, title = {Brute–Force Search Strategies for Single–Trace and Few–Traces Template Attacks on the DES Round Keys of a Recent Smart Card}, howpublished = {Cryptology ePrint Archive, Report 2017/614}, year = {2017}, url = {https://eprint.iacr.org/2017/614}, } @misc{cryptoeprint:2017:615, author = {Nabil Alkeilani Alkadri and Johannes Buchmann and Rachid El Bansarkhani and Juliane Kr\"amer}, title = {A Framework to Select Parameters for Lattice-Based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2017/615}, year = {2017}, url = {https://eprint.iacr.org/2017/615}, } @misc{cryptoeprint:2017:616, author = {Bingsheng Zhang and Hong-Sheng Zhou}, title = {Statement Voting}, howpublished = {Cryptology ePrint Archive, Report 2017/616}, year = {2017}, url = {https://eprint.iacr.org/2017/616}, } @misc{cryptoeprint:2017:617, author = {Benny Applebaum and Ivan Damg{\aa}rd and Yuval Ishai and Michael Nielsen and Lior Zichron}, title = {Secure Arithmetic Computation with Constant Computational Overhead}, howpublished = {Cryptology ePrint Archive, Report 2017/617}, year = {2017}, url = {https://eprint.iacr.org/2017/617}, } @misc{cryptoeprint:2017:618, author = {Ahmad Moghimi and Gorka Irazoqui and Thomas Eisenbarth}, title = {CacheZoom: How SGX Amplifies The Power of Cache Attacks}, howpublished = {Cryptology ePrint Archive, Report 2017/618}, year = {2017}, url = {https://eprint.iacr.org/2017/618}, } @misc{cryptoeprint:2017:619, author = {Qiong Huang and Jianye Huang}, title = {Black-Box Constructions of Signature Schemes in the Bounded Leakage Setting}, howpublished = {Cryptology ePrint Archive, Report 2017/619}, year = {2017}, url = {https://eprint.iacr.org/2017/619}, } @misc{cryptoeprint:2017:620, author = {Georg Fuchsbauer and Eike Kiltz and Julian Loss}, title = {The Algebraic Group Model and its Applications}, howpublished = {Cryptology ePrint Archive, Report 2017/620}, year = {2017}, url = {https://eprint.iacr.org/2017/620}, } @misc{cryptoeprint:2017:621, author = {Xiaolin Xu and Bicky Shakya and Mark M. Tehranipoor and Domenic Forte}, title = {Novel Bypass Attack and BDD-based Tradeoff Analysis Against all Known Logic Locking Attacks}, howpublished = {Cryptology ePrint Archive, Report 2017/621}, year = {2017}, url = {https://eprint.iacr.org/2017/621}, } @misc{cryptoeprint:2017:622, author = {Subhadeep Banik and Sumit Kumar Pandey and Thomas Peyrin and Siang Meng Sim and Yosuke Todo and Yu Sasaki}, title = {GIFT: A Small Present}, howpublished = {Cryptology ePrint Archive, Report 2017/622}, year = {2017}, url = {https://eprint.iacr.org/2017/622}, } @misc{cryptoeprint:2017:623, author = {Marios O. Choudary and P.G. Popescu}, title = {Back to Massey: Impressively fast, scalable and tight security evaluation tools}, howpublished = {Cryptology ePrint Archive, Report 2017/623}, year = {2017}, url = {https://eprint.iacr.org/2017/623}, } @misc{cryptoeprint:2017:624, author = {Oscar Reparaz and Benedikt Gierlichs and Ingrid Verbauwhede}, title = {Fast Leakage Assessment}, howpublished = {Cryptology ePrint Archive, Report 2017/624}, year = {2017}, url = {https://eprint.iacr.org/2017/624}, } @misc{cryptoeprint:2017:625, author = {Nisha Jacob and Johann Heyszl and Andreas Zankl and Carsten Rolfes and Georg Sigl}, title = {How to Break Secure Boot on FPGA SoCs through Malicious Hardware}, howpublished = {Cryptology ePrint Archive, Report 2017/625}, year = {2017}, url = {https://eprint.iacr.org/2017/625}, } @misc{cryptoeprint:2017:626, author = {Hai Zhou and Ruifeng Jiang and Shuyu Kong}, title = {CycSAT: SAT-Based Attack on Cyclic Logic Encryptions}, howpublished = {Cryptology ePrint Archive, Report 2017/626}, year = {2017}, url = {https://eprint.iacr.org/2017/626}, } @misc{cryptoeprint:2017:627, author = {Daniel J. Bernstein and Joachim Breitner and Daniel Genkin and Leon Groot Bruinderink and Nadia Heninger and Tanja Lange and Christine van Vredendaal and Yuval Yarom}, title = {Sliding right into disaster: Left-to-right sliding windows leak}, howpublished = {Cryptology ePrint Archive, Report 2017/627}, year = {2017}, url = {https://eprint.iacr.org/2017/627}, } @misc{cryptoeprint:2017:628, author = {Miruna Rosca and Amin Sakzad and Ron Steinfeld and Damien Stehle}, title = {Middle-Product Learning With Errors}, howpublished = {Cryptology ePrint Archive, Report 2017/628}, year = {2017}, url = {https://eprint.iacr.org/2017/628}, } @misc{cryptoeprint:2017:629, author = {Romain Poussier and Yuanyuan Zhou and François-Xavier Standaert}, title = {A Systematic Approach to the Side-Channel Analysis of ECC Implementations with Worst-Case Horizontal Attacks}, howpublished = {Cryptology ePrint Archive, Report 2017/629}, year = {2017}, url = {https://eprint.iacr.org/2017/629}, } @misc{cryptoeprint:2017:630, author = {Daniel J. Bernstein and Stefan Kölbl and Stefan Lucks and Pedro Maat Costa Massolino and Florian Mendel and Kashif Nawaz and Tobias Schneider and Peter Schwabe and François-Xavier Standaert and Yosuke Todo and Benoît Viguier}, title = {Gimli: a cross-platform permutation}, howpublished = {Cryptology ePrint Archive, Report 2017/630}, year = {2017}, url = {https://eprint.iacr.org/2017/630}, } @misc{cryptoeprint:2017:631, author = {Ran Canetti and Amit Lichtenberg}, title = {Certifying Trapdoor Permutations, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2017/631}, year = {2017}, url = {https://eprint.iacr.org/2017/631}, } @misc{cryptoeprint:2017:632, author = {Dahmun Goudarzi and Matthieu Rivain and Damien Vergnaud and Srinivas Vivek}, title = {Generalized Polynomial Decomposition for S-boxes with Application to Side-Channel Countermeasures}, howpublished = {Cryptology ePrint Archive, Report 2017/632}, year = {2017}, url = {https://eprint.iacr.org/2017/632}, } @misc{cryptoeprint:2017:633, author = {Leo Ducas and Tancrede Lepoint and Vadim Lyubashevsky and Peter Schwabe and Gregor Seiler and Damien Stehle}, title = {CRYSTALS -- Dilithium: Digital Signatures from Module Lattices}, howpublished = {Cryptology ePrint Archive, Report 2017/633}, year = {2017}, url = {https://eprint.iacr.org/2017/633}, } @misc{cryptoeprint:2017:634, author = {Joppe Bos and Léo Ducas and Eike Kiltz and Tancrède Lepoint and Vadim Lyubashevsky and John M. Schanck and Peter Schwabe and Damien Stehlé}, title = {CRYSTALS -- Kyber: a CCA-secure module-lattice-based KEM}, howpublished = {Cryptology ePrint Archive, Report 2017/634}, year = {2017}, url = {https://eprint.iacr.org/2017/634}, } @misc{cryptoeprint:2017:635, author = {Stefan Dziembowski and Lisa Eckey and Sebastian Faust and Daniel Malinowski}, title = {PERUN: Virtual Payment Channels over Cryptographic Currencies}, howpublished = {Cryptology ePrint Archive, Report 2017/635}, year = {2017}, url = {https://eprint.iacr.org/2017/635}, } @misc{cryptoeprint:2017:636, author = {Ming-Shing Chen and Wen-Ding Li and Bo-Yuan Peng and Bo-Yin Yang and Chen-Mou Cheng}, title = {Implementing 128-bit Secure MPKC Signatures}, howpublished = {Cryptology ePrint Archive, Report 2017/636}, year = {2017}, url = {https://eprint.iacr.org/2017/636}, } @misc{cryptoeprint:2017:637, author = {Anthony Journault and François-Xavier Standaert}, title = {Very High Order Masking: Efficient Implementation and Security Evaluation}, howpublished = {Cryptology ePrint Archive, Report 2017/637}, year = {2017}, url = {https://eprint.iacr.org/2017/637}, } @misc{cryptoeprint:2017:638, author = {Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka}, title = {From Single-Key to Collusion-Resistant Secret-Key Functional Encryption by Leveraging Succinctness}, howpublished = {Cryptology ePrint Archive, Report 2017/638}, year = {2017}, url = {https://eprint.iacr.org/2017/638}, } @misc{cryptoeprint:2017:639, author = {Jan Camenisch and Liqun Chen and Manu Drijvers and Anja Lehmann and David Novick and Rainer Urian}, title = {One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation}, howpublished = {Cryptology ePrint Archive, Report 2017/639}, year = {2017}, url = {https://eprint.iacr.org/2017/639}, } @misc{cryptoeprint:2017:640, author = {Fabrice Benhamouda and Houda Ferradi and Rémi Géraud and David Naccache}, title = {Non-Interactive Provably Secure Attestations for Arbitrary RSA Prime Generation Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2017/640}, year = {2017}, url = {https://eprint.iacr.org/2017/640}, } @misc{cryptoeprint:2017:641, author = {Gu Chunsheng}, title = {Integer Version of Ring-LWE and its Applications}, howpublished = {Cryptology ePrint Archive, Report 2017/641}, year = {2017}, url = {https://eprint.iacr.org/2017/641}, } @misc{cryptoeprint:2017:642, author = {Nasrollah Pakniat and Mahnaz Noroozi and Ziba Eslami}, title = {Reducing Multi-Secret Sharing Problem to Sharing a Single Secret Based on Cellular Automata}, howpublished = {Cryptology ePrint Archive, Report 2017/642}, year = {2017}, url = {https://eprint.iacr.org/2017/642}, } @misc{cryptoeprint:2017:643, author = {Morten Dahl and Valerio Pastro and Mathieu Poumeyrol}, title = {Private Data Aggregation on a Budget}, howpublished = {Cryptology ePrint Archive, Report 2017/643}, year = {2017}, url = {https://eprint.iacr.org/2017/643}, } @misc{cryptoeprint:2017:644, author = {Alexander Chepurnoy and Dmitry Meshkov}, title = {On Space-Scarce Economy In Blockchain Systems}, howpublished = {Cryptology ePrint Archive, Report 2017/644}, year = {2017}, url = {https://eprint.iacr.org/2017/644}, } @misc{cryptoeprint:2017:645, author = {Shay Gueron and Nicky Mouha}, title = {SPHINCS-Simpira: Fast Stateless Hash-based Signatures with Post-quantum Security}, howpublished = {Cryptology ePrint Archive, Report 2017/645}, year = {2017}, url = {https://eprint.iacr.org/2017/645}, } @misc{cryptoeprint:2017:646, author = {Mehrdad Nojoumian}, title = {Rational Trust Modeling}, howpublished = {Cryptology ePrint Archive, Report 2017/646}, year = {2017}, url = {https://eprint.iacr.org/2017/646}, } @misc{cryptoeprint:2017:647, author = {Subhamoy Maitra and Nishant Sinha and Akhilesh Siddhanti and Ravi Anand and Sugata Gangopadhyay}, title = {A TMDTO Attack Against Lizard}, howpublished = {Cryptology ePrint Archive, Report 2017/647}, year = {2017}, url = {https://eprint.iacr.org/2017/647}, } @misc{cryptoeprint:2017:648, author = {Kirill Nikitin and Eleftherios Kokoris-Kogias and Philipp Jovanovic and Linus Gasser and Nicolas Gailly and Ismail Khoffi and Justin Cappos and Bryan Ford}, title = {CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds}, howpublished = {Cryptology ePrint Archive, Report 2017/648}, year = {2017}, url = {https://eprint.iacr.org/2017/648}, } @misc{cryptoeprint:2017:649, author = {Avik Chakraborti and Tetsu Iwata and Kazuhiko Minematsu and Mridul Nandi}, title = {Blockcipher-based Authenticated Encryption: How Small Can We Go?}, howpublished = {Cryptology ePrint Archive, Report 2017/649}, year = {2017}, url = {https://eprint.iacr.org/2017/649}, } @misc{cryptoeprint:2017:650, author = {Shweta Agrawal and Sanjay Bhattacherjee and Duong Hieu Phan and Damien Stehle and Shota Yamada}, title = {Efficient Public Trace and Revoke from Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2017/650}, year = {2017}, url = {https://eprint.iacr.org/2017/650}, } @misc{cryptoeprint:2017:651, author = {Gildas Avoine and Lo{\"i}c Ferreira}, title = {Rescuing LoRaWAN 1.0}, howpublished = {Cryptology ePrint Archive, Report 2017/651}, year = {2017}, url = {https://eprint.iacr.org/2017/651}, } @misc{cryptoeprint:2017:652, author = {Andrej Bogdanov and Alon Rosen}, title = {Pseudorandom Functions: Three Decades Later}, howpublished = {Cryptology ePrint Archive, Report 2017/652}, year = {2017}, url = {https://eprint.iacr.org/2017/652}, } @misc{cryptoeprint:2017:653, author = {Fanbao Liu and Fengmei Liu}, title = {Universal Forgery with Birthday Paradox: Application to Blockcipher-based Message Authentication Codes and Authenticated Encryptions}, howpublished = {Cryptology ePrint Archive, Report 2017/653}, year = {2017}, url = {https://eprint.iacr.org/2017/653}, } @misc{cryptoeprint:2017:654, author = {Tom Eccles and Basel Halak}, title = {A Secure and Private Billing Protocol for Smart Metering}, howpublished = {Cryptology ePrint Archive, Report 2017/654}, year = {2017}, url = {https://eprint.iacr.org/2017/654}, } @misc{cryptoeprint:2017:655, author = {Jiao Hu and Ruilin Li and Chaojing Tang}, title = {A Real-time Inversion Attack on the GMR-2 Cipher Used in the Satellite Phones}, howpublished = {Cryptology ePrint Archive, Report 2017/655}, year = {2017}, url = {https://eprint.iacr.org/2017/655}, } @misc{cryptoeprint:2017:656, author = {Lei Fan and Hong-Sheng Zhou}, title = {iChing: A Scalable Proof-of-Stake Blockchain in the Open Setting (or, How to Mimic Nakamoto's Design via Proof-of-Stake)}, howpublished = {Cryptology ePrint Archive, Report 2017/656}, year = {2017}, url = {https://eprint.iacr.org/2017/656}, } @misc{cryptoeprint:2017:657, author = {Sanjit Chatterjee and Sayantan Mukherjee and Tapas Pandit}, title = {CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient}, howpublished = {Cryptology ePrint Archive, Report 2017/657}, year = {2017}, url = {https://eprint.iacr.org/2017/657}, } @misc{cryptoeprint:2017:658, author = {Avradip Mandal and John Mitchell and Hart Montgomery and Arnab Roy}, title = {Privacy for Targeted Advertising}, howpublished = {Cryptology ePrint Archive, Report 2017/658}, year = {2017}, url = {https://eprint.iacr.org/2017/658}, } @misc{cryptoeprint:2017:659, author = {Russell W. F. Lai and Sherman S. M. Chow }, title = {Forward-Secure Searchable Encryption on Labeled Bipartite Graphs}, howpublished = {Cryptology ePrint Archive, Report 2017/659}, year = {2017}, url = {https://eprint.iacr.org/2017/659}, } @misc{cryptoeprint:2017:660, author = {Changhai Ou and Zhu Wang and Degang Sun and Xinping Zhou}, title = {Profiling Good Leakage Models For Masked Implementations}, howpublished = {Cryptology ePrint Archive, Report 2017/660}, year = {2017}, url = {https://eprint.iacr.org/2017/660}, } @misc{cryptoeprint:2017:661, author = {Bernardo Ferreira and João Leitão and Henrique Domingos}, title = {MuSE: Multimodal Searchable Encryption for Cloud Applications}, howpublished = {Cryptology ePrint Archive, Report 2017/661}, year = {2017}, url = {https://eprint.iacr.org/2017/661}, } @misc{cryptoeprint:2017:662, author = {Thomas Debris-Alazard and Nicolas Sendrier and Jean-Pierre Tillich }, title = {SURF: A new code-based signature scheme}, howpublished = {Cryptology ePrint Archive, Report 2017/662}, year = {2017}, url = {https://eprint.iacr.org/2017/662}, } @misc{cryptoeprint:2017:663, author = {Thomas Unterluggauer and Mario Werner and Stefan Mangard}, title = {Securing Memory Encryption and Authentication Against Side-Channel Attacks Using Unprotected Primitives}, howpublished = {Cryptology ePrint Archive, Report 2017/663}, year = {2017}, url = {https://eprint.iacr.org/2017/663}, } @misc{cryptoeprint:2017:664, author = {Paul Grubbs and Jiahui Lu and Thomas Ristenpart}, title = {Message Franking via Committing Authenticated Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/664}, year = {2017}, url = {https://eprint.iacr.org/2017/664}, } @misc{cryptoeprint:2017:665, author = {Michael Raskin}, title = {Lower bounds on communication for multiparty computation of multiple «AND» instances with secret sharing}, howpublished = {Cryptology ePrint Archive, Report 2017/665}, year = {2017}, url = {https://eprint.iacr.org/2017/665}, } @misc{cryptoeprint:2017:666, author = {Katriel Cohn-Gordon and Cas Cremers and Luke Garratt and Jon Millican and Kevin Milner}, title = {On Ends-to-Ends Encryption: Asynchronous Group Messaging with Strong Security Guarantees}, howpublished = {Cryptology ePrint Archive, Report 2017/666}, year = {2017}, url = {https://eprint.iacr.org/2017/666}, } @misc{cryptoeprint:2017:667, author = {Andreas Hülsing and Joost Rijneveld and John M. Schanck and Peter Schwabe}, title = {High-speed key encapsulation from NTRU}, howpublished = {Cryptology ePrint Archive, Report 2017/667}, year = {2017}, url = {https://eprint.iacr.org/2017/667}, } @misc{cryptoeprint:2017:668, author = {Sikhar Patranabis and Debdeep Mukhopadhyay}, title = {Spot the Black Hat in a Dark Room: Parallelized Controlled Access Searchable Encryption on FPGAs}, howpublished = {Cryptology ePrint Archive, Report 2017/668}, year = {2017}, url = {https://eprint.iacr.org/2017/668}, } @misc{cryptoeprint:2017:669, author = {Kwang Ho Kim and Junyop Choe and Song Yun Kim and Namsu Kim and Sekung Hong}, title = {Speeding up Elliptic Curve Scalar Multiplication without Precomputation}, howpublished = {Cryptology ePrint Archive, Report 2017/669}, year = {2017}, url = {https://eprint.iacr.org/2017/669}, } @misc{cryptoeprint:2017:670, author = {Ágnes Kiss and Jian Liu and Thomas Schneider and N. Asokan and Benny Pinkas}, title = {Private Set Intersection for Unequal Set Sizes with Mobile Applications}, howpublished = {Cryptology ePrint Archive, Report 2017/670}, year = {2017}, url = {https://eprint.iacr.org/2017/670}, } @misc{cryptoeprint:2017:671, author = {Alex Biryukov and Daniel Feher and Dmitry Khovratovich}, title = {Guru: Universal Reputation Module for Distributed Consensus Protocols}, howpublished = {Cryptology ePrint Archive, Report 2017/671}, year = {2017}, url = {https://eprint.iacr.org/2017/671}, } @misc{cryptoeprint:2017:672, author = {Anat Paskin-Cherniavsky and Slava Radune}, title = {Coding for interactive communication beyond threshold adversaries}, howpublished = {Cryptology ePrint Archive, Report 2017/672}, year = {2017}, url = {https://eprint.iacr.org/2017/672}, } @misc{cryptoeprint:2017:673, author = {Sayandeep Saha, and Ujjawal Kumar, and Debdeep Mukhopadhyay, and Pallab Dasgupta}, title = {Differential Fault Analysis Automation}, howpublished = {Cryptology ePrint Archive, Report 2017/673}, year = {2017}, url = {https://eprint.iacr.org/2017/673}, } @misc{cryptoeprint:2017:674, author = {Mario Werner and Thomas Unterluggauer and Robert Schilling and David Schaffenrath and Stefan Mangard}, title = {Transparent Memory Encryption and Authentication}, howpublished = {Cryptology ePrint Archive, Report 2017/674}, year = {2017}, url = {https://eprint.iacr.org/2017/674}, } @misc{cryptoeprint:2017:675, author = {Benedikt Auerbach and David Cash and Manuel Fersch and Eike Kiltz}, title = {Memory-Tight Reductions}, howpublished = {Cryptology ePrint Archive, Report 2017/675}, year = {2017}, url = {https://eprint.iacr.org/2017/675}, } @misc{cryptoeprint:2017:676, author = {Rajkumar Ramasamy and S.Sree Vivek and Praveen George and Bharat S. Rawal Kshatriya}, title = {Dynamic Verifiable Encrypted Keyword Search Using Bitmap Index and Homomorphic MAC}, howpublished = {Cryptology ePrint Archive, Report 2017/676}, year = {2017}, url = {https://eprint.iacr.org/2017/676}, } @misc{cryptoeprint:2017:677, author = {Amanda C. Davi Resende and Diego F. Aranha}, title = {Faster Unbalanced Private Set Intersection}, howpublished = {Cryptology ePrint Archive, Report 2017/677}, year = {2017}, url = {https://eprint.iacr.org/2017/677}, } @misc{cryptoeprint:2017:678, author = {Akhilesh Anilkumar Siddhanti and Santanu Sarkar and Subhamoy Maitra and Anupam Chattopadhyay}, title = {Differential Fault Attack on Grain v1, ACORN v3 and Lizard}, howpublished = {Cryptology ePrint Archive, Report 2017/678}, year = {2017}, url = {https://eprint.iacr.org/2017/678}, } @misc{cryptoeprint:2017:679, author = {Nils L\"{o}ken}, title = {Searchable Encryption with Access Control}, howpublished = {Cryptology ePrint Archive, Report 2017/679}, year = {2017}, url = {https://eprint.iacr.org/2017/679}, } @misc{cryptoeprint:2017:680, author = {Ming-Shing Chen and Andreas Hülsing and Joost Rijneveld and Simona Samardjiska and Peter Schwabe}, title = {SOFIA: MQ-based signatures in the QROM}, howpublished = {Cryptology ePrint Archive, Report 2017/680}, year = {2017}, url = {https://eprint.iacr.org/2017/680}, } @misc{cryptoeprint:2017:681, author = {Alexandre de Castro}, title = {Controlled-NOT function can provoke biased interpretation from Bell's test experiments}, howpublished = {Cryptology ePrint Archive, Report 2017/681}, year = {2017}, url = {https://eprint.iacr.org/2017/681}, } @misc{cryptoeprint:2017:682, author = {Alexandros Zacharakis and Panagiotis Grontas and Aris Pagourtzis}, title = {Conditional Blind Signatures}, howpublished = {Cryptology ePrint Archive, Report 2017/682}, year = {2017}, url = {https://eprint.iacr.org/2017/682}, } @misc{cryptoeprint:2017:683, author = {Ruiyu Zhu and Yan Huang}, title = {Efficient Privacy-Preserving General Edit Distance and Beyond}, howpublished = {Cryptology ePrint Archive, Report 2017/683}, year = {2017}, url = {https://eprint.iacr.org/2017/683}, } @misc{cryptoeprint:2017:684, author = {Yuncong Zhang and Yu Long and Zhen Liu and Zhiqiang Liu and Dawu Gu}, title = {Z-Channel: Scalable and Efficient Scheme in Zerocash}, howpublished = {Cryptology ePrint Archive, Report 2017/684}, year = {2017}, url = {https://eprint.iacr.org/2017/684}, } @misc{cryptoeprint:2017:685, author = {Dongxi Liu and Nan Li and Jongkil Kim and Surya Nepal}, title = {Compact-LWE: Enabling Practically Lightweight Public Key Encryption for Leveled IoT Device Authentication}, howpublished = {Cryptology ePrint Archive, Report 2017/685}, year = {2017}, url = {https://eprint.iacr.org/2017/685}, } @misc{cryptoeprint:2017:686, author = {Ren Zhang and Bart Preneel}, title = {On the Necessity of a Prescribed Block Validity Consensus: Analyzing Bitcoin Unlimited Mining Protocol}, howpublished = {Cryptology ePrint Archive, Report 2017/686}, year = {2017}, url = {https://eprint.iacr.org/2017/686}, } @misc{cryptoeprint:2017:687, author = {Jessica Covington and Megan Golbek and Mike Rosulek}, title = {Impossibility of Secure Multi-Party Products in Non-Abelian Groups}, howpublished = {Cryptology ePrint Archive, Report 2017/687}, year = {2017}, url = {https://eprint.iacr.org/2017/687}, } @misc{cryptoeprint:2017:688, author = {Marko Balogh and Edward Eaton and Fang Song}, title = {Quantum Collision-Finding in Non-Uniform Random Functions}, howpublished = {Cryptology ePrint Archive, Report 2017/688}, year = {2017}, url = {https://eprint.iacr.org/2017/688}, } @misc{cryptoeprint:2017:689, author = {Yasufumi Hashimoto}, title = {On the security of HMFEv}, howpublished = {Cryptology ePrint Archive, Report 2017/689}, year = {2017}, url = {https://eprint.iacr.org/2017/689}, } @misc{cryptoeprint:2017:690, author = {Po-Chun Kuo and Wen-Ding Li and Yu-Wei Chen and Yuan-Che Hsu and Bo-Yuan Peng and Chen-Mou Cheng and Bo-Yin Yang}, title = {Post-Quantum Key Exchange on FPGAs}, howpublished = {Cryptology ePrint Archive, Report 2017/690}, year = {2017}, url = {https://eprint.iacr.org/2017/690}, } @misc{cryptoeprint:2017:691, author = {Fanbao Liu and Fengmei Liu}, title = {Universal Forgery and Key Recovery Attacks: Application to FKS, FKD and Keyak}, howpublished = {Cryptology ePrint Archive, Report 2017/691}, year = {2017}, url = {https://eprint.iacr.org/2017/691}, } @misc{cryptoeprint:2017:692, author = {Deepesh Data and Manoj Prabhakaran}, title = {Towards Characterizing Securely Computable Two-Party Randomized Functions}, howpublished = {Cryptology ePrint Archive, Report 2017/692}, year = {2017}, url = {https://eprint.iacr.org/2017/692}, } @misc{cryptoeprint:2017:693, author = {Carlos Cid and Tao Huang and Thomas Peyrin and Yu Sasaki and Ling Song}, title = {Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2017/693}, year = {2017}, url = {https://eprint.iacr.org/2017/693}, } @misc{cryptoeprint:2017:694, author = {Patrick McCorry and Ethan Heilman and Andrew Miller}, title = {Atomically Trading with Roger: Gambling on the success of a hardfork}, howpublished = {Cryptology ePrint Archive, Report 2017/694}, year = {2017}, url = {https://eprint.iacr.org/2017/694}, } @misc{cryptoeprint:2017:695, author = {Christian Cachin and Jan Camenisch and Eduarda Freire-Stoegbuchner and Anja Lehmann}, title = {Updatable Tokenization: Formal Definitions and Provably Secure Constructions}, howpublished = {Cryptology ePrint Archive, Report 2017/695}, year = {2017}, url = {https://eprint.iacr.org/2017/695}, } @misc{cryptoeprint:2017:696, author = {Hai Zhou}, title = {A Humble Theory and Application for Logic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/696}, year = {2017}, url = {https://eprint.iacr.org/2017/696}, } @misc{cryptoeprint:2017:697, author = {Liliya R. Ahmetzyanova and Evgeny K. Alekseev and Igor B. Oshkin and Stanislav V. Smyshlyaev }, title = {Increasing the Lifetime of Symmetric Keys for the GCM Mode by Internal Re-keying}, howpublished = {Cryptology ePrint Archive, Report 2017/697}, year = {2017}, url = {https://eprint.iacr.org/2017/697}, } @misc{cryptoeprint:2017:698, author = {Sean Murphy and Rachel Player}, title = {Noise Distributions in Homomorphic Ring-LWE}, howpublished = {Cryptology ePrint Archive, Report 2017/698}, year = {2017}, url = {https://eprint.iacr.org/2017/698}, } @misc{cryptoeprint:2017:699, author = {Damien Couroussé and Thierno Barry and Bruno Robisson and Philippe Jaillon and Olivier Potin and Jean-Louis Lanet}, title = {Runtime Code Polymorphism as a Protection Against Side Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2017/699}, year = {2017}, url = {https://eprint.iacr.org/2017/699}, } @misc{cryptoeprint:2017:700, author = {Johannes Buchmann and Denise Demirel and Lucas Schabhüser and Patrick Struck}, title = {Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public Verifiability}, howpublished = {Cryptology ePrint Archive, Report 2017/700}, year = {2017}, url = {https://eprint.iacr.org/2017/700}, } @misc{cryptoeprint:2017:701, author = {Marie-Sarah Lacharité and Brice Minaud and Kenneth G. Paterson}, title = {Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage}, howpublished = {Cryptology ePrint Archive, Report 2017/701}, year = {2017}, url = {https://eprint.iacr.org/2017/701}, } @misc{cryptoeprint:2017:702, author = {Shay Gueron and Yehuda Lindell}, title = {Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation}, howpublished = {Cryptology ePrint Archive, Report 2017/702}, year = {2017}, url = {https://eprint.iacr.org/2017/702}, } @misc{cryptoeprint:2017:703, author = {Helger Lipmaa}, title = {Optimally Sound Sigma Protocols Under DCRA}, howpublished = {Cryptology ePrint Archive, Report 2017/703}, year = {2017}, url = {https://eprint.iacr.org/2017/703}, } @misc{cryptoeprint:2017:704, author = {Zhongxiang Zheng and Chunhuan Zhao and Haining Fan and Xiaoyun Wang}, title = {A Key Backup Scheme Based on Bitcoin}, howpublished = {Cryptology ePrint Archive, Report 2017/704}, year = {2017}, url = {https://eprint.iacr.org/2017/704}, } @misc{cryptoeprint:2017:705, author = {Aikaterini Mitrokotsa and Cristina Onete and Elena Pagnin and Mahesh Perera}, title = {Multi-Hop Distance Estimation: How Far are You?}, howpublished = {Cryptology ePrint Archive, Report 2017/705}, year = {2017}, url = {https://eprint.iacr.org/2017/705}, } @misc{cryptoeprint:2017:706, author = {Hugues Thiebeauld and Georges Gagnerot and Antoine Wurcker and Christophe Clavier}, title = {SCATTER : A New Dimension in Side-Channel}, howpublished = {Cryptology ePrint Archive, Report 2017/706}, year = {2017}, url = {https://eprint.iacr.org/2017/706}, } @misc{cryptoeprint:2017:707, author = {Irene Giacomelli and Somesh Jha and C. David Page and Kyonghwan Yoon}, title = {Privacy-Preserving Ridge Regression on Distributed Data}, howpublished = {Cryptology ePrint Archive, Report 2017/707}, year = {2017}, url = {https://eprint.iacr.org/2017/707}, } @misc{cryptoeprint:2017:708, author = {Tetsu Iwata and Yannick Seurin}, title = {Reconsidering the Security Bound of AES-GCM-SIV}, howpublished = {Cryptology ePrint Archive, Report 2017/708}, year = {2017}, url = {https://eprint.iacr.org/2017/708}, } @misc{cryptoeprint:2017:709, author = {Sauvik Bhattacharya and Oscar Garcia-Morchon and Ronald Rietman and Ludo Tolhuizen}, title = {spKEX: An optimized lattice-based key exchange}, howpublished = {Cryptology ePrint Archive, Report 2017/709}, year = {2017}, url = {https://eprint.iacr.org/2017/709}, } @misc{cryptoeprint:2017:710, author = {Abhinav Aggarwal and Varsha Dani and Thomas P. Hayes and Jared Saia}, title = {Distributed Computing with Channel Noise}, howpublished = {Cryptology ePrint Archive, Report 2017/710}, year = {2017}, url = {https://eprint.iacr.org/2017/710}, } @misc{cryptoeprint:2017:711, author = {Sebastian Faust and Vincent Grosso and Santos Merino Del Pozo and Clara Paglialonga and François-Xavier Standaert}, title = {Composable Masking Schemes in the Presence of Physical Defaults and the Robust Probing Model}, howpublished = {Cryptology ePrint Archive, Report 2017/711}, year = {2017}, url = {https://eprint.iacr.org/2017/711}, } @misc{cryptoeprint:2017:712, author = {Vasyl Ustimenko}, title = {On desynchronised El Gamal algorithm}, howpublished = {Cryptology ePrint Archive, Report 2017/712}, year = {2017}, url = {https://eprint.iacr.org/2017/712}, } @misc{cryptoeprint:2017:713, author = {Paul Rösler and Christian Mainka and Jörg Schwenk}, title = {More is Less: How Group Chats Weaken the Security of Instant Messengers Signal, WhatsApp, and Threema}, howpublished = {Cryptology ePrint Archive, Report 2017/713}, year = {2017}, url = {https://eprint.iacr.org/2017/713}, } @misc{cryptoeprint:2017:714, author = {Shafi Goldwasser and Saleet Klein and Daniel Wichs}, title = {The Edited Truth}, howpublished = {Cryptology ePrint Archive, Report 2017/714}, year = {2017}, url = {https://eprint.iacr.org/2017/714}, } @misc{cryptoeprint:2017:715, author = {Le Trieu Phong and Yoshinori Aono and Takuya Hayashi and Lihua Wang and Shiho Moriai}, title = {Privacy-Preserving Deep Learning via Additively Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/715}, year = {2017}, url = {https://eprint.iacr.org/2017/715}, } @misc{cryptoeprint:2017:716, author = {Huang Zhang and Fangguo Zhang and Haibo Tian and Man Ho Au}, title = {Anonymous Post-Quantum Cryptocash}, howpublished = {Cryptology ePrint Archive, Report 2017/716}, year = {2017}, url = {https://eprint.iacr.org/2017/716}, } @misc{cryptoeprint:2017:717, author = {Hassan Qahur Al Mahri and Leonie Simpson and Harry Bartlett and Ed Dawson and Kenneth Koon-Ho Wong}, title = {Fault Attacks on XEX Mode with Application to certain Authenticated Encryption Modes}, howpublished = {Cryptology ePrint Archive, Report 2017/717}, year = {2017}, url = {https://eprint.iacr.org/2017/717}, } @misc{cryptoeprint:2017:718, author = {Ahmad Akmal Aminuddin Mohd Kamal and Keiichi Iwamura}, title = {Conditionally Secure Secrecy Computation using Secret Sharing Scheme for n<2k-1 (full paper)}, howpublished = {Cryptology ePrint Archive, Report 2017/718}, year = {2017}, url = {https://eprint.iacr.org/2017/718}, } @misc{cryptoeprint:2017:719, author = {Jacqueline Brendel and Denise Demirel}, title = {Efficient Proactive Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2017/719}, year = {2017}, url = {https://eprint.iacr.org/2017/719}, } @misc{cryptoeprint:2017:720, author = {Bailey Kacsmar and Sarah Plosker and Ryan Henry}, title = {Computing Low-Weight Discrete Logarithms}, howpublished = {Cryptology ePrint Archive, Report 2017/720}, year = {2017}, url = {https://eprint.iacr.org/2017/720}, } @misc{cryptoeprint:2017:721, author = {Donghoon Chang and Sweta Mishra and Somitra Kumar Sanadhya and Ajit Pratap Singh1}, title = {On Making U2F Protocol Leakage-Resilient via Re-keying}, howpublished = {Cryptology ePrint Archive, Report 2017/721}, year = {2017}, url = {https://eprint.iacr.org/2017/721}, } @misc{cryptoeprint:2017:722, author = {Helger Lipmaa and Kateryna Pavlyk}, title = {A Simpler Rate-Optimal CPIR Protocol}, howpublished = {Cryptology ePrint Archive, Report 2017/722}, year = {2017}, url = {https://eprint.iacr.org/2017/722}, } @misc{cryptoeprint:2017:723, author = {Rotem Tsabary}, title = {An Equivalence Between Attribute-Based Signatures and Homomorphic Signatures, and New Constructions for Both}, howpublished = {Cryptology ePrint Archive, Report 2017/723}, year = {2017}, url = {https://eprint.iacr.org/2017/723}, } @misc{cryptoeprint:2017:724, author = {Giulia Traverso and Denise Demirel and Johannes Buchmann}, title = {Dynamic and Verifiable Hierarchical Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2017/724}, year = {2017}, url = {https://eprint.iacr.org/2017/724}, } @misc{cryptoeprint:2017:725, author = {Giulia Traverso and Denise Demirel and Sheikh Mahbub Habib and Johannes Buchmann}, title = {AS$^3$: Adaptive Social Secret Sharing for Distributed Storage Systems}, howpublished = {Cryptology ePrint Archive, Report 2017/725}, year = {2017}, url = {https://eprint.iacr.org/2017/725}, } @misc{cryptoeprint:2017:726, author = {David FONTAINE AND Olivier VIVOLO}, title = {Proposal of primitive polynomials for Linux kernel PRNG}, howpublished = {Cryptology ePrint Archive, Report 2017/726}, year = {2017}, url = {https://eprint.iacr.org/2017/726}, } @misc{cryptoeprint:2017:727, author = {Michael Scott}, title = {A note on the implementation of the Number Theoretic Transform}, howpublished = {Cryptology ePrint Archive, Report 2017/727}, year = {2017}, url = {https://eprint.iacr.org/2017/727}, } @misc{cryptoeprint:2017:728, author = {Giulia Traverso and Carlos Garcia Cordero and Mehrdad Nojoumian and Reza Azarderakhsh and Denise Demirel and Sheikh Mahbub Habib and Johannes Buchmann}, title = {Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems}, howpublished = {Cryptology ePrint Archive, Report 2017/728}, year = {2017}, url = {https://eprint.iacr.org/2017/728}, } @misc{cryptoeprint:2017:729, author = {Subhabrata Samajder and Palash Sarkar}, title = {Success Probability of Multiple/Multidimensional Linear Cryptanalysis Under General Key Randomisation Hypotheses}, howpublished = {Cryptology ePrint Archive, Report 2017/729}, year = {2017}, url = {https://eprint.iacr.org/2017/729}, } @misc{cryptoeprint:2017:730, author = {Yang Yu and Léo Ducas}, title = {Second Order Statistical Behavior of LLL and BKZ}, howpublished = {Cryptology ePrint Archive, Report 2017/730}, year = {2017}, url = {https://eprint.iacr.org/2017/730}, } @misc{cryptoeprint:2017:731, author = {Dmitry Meshkov and Alexander Chepurnoy and Marc Jansen}, title = {Revisiting Difficulty Control for Blockchain Systems}, howpublished = {Cryptology ePrint Archive, Report 2017/731}, year = {2017}, url = {https://eprint.iacr.org/2017/731}, } @misc{cryptoeprint:2017:732, author = {Marc Joye}, title = {Privacy-Preserving Ridge Regression Without Garbled Circuits}, howpublished = {Cryptology ePrint Archive, Report 2017/732}, year = {2017}, url = {https://eprint.iacr.org/2017/732}, } @misc{cryptoeprint:2017:733, author = {Yongge Wang}, title = {Decoding Generalized Reed-Solomon Codes and Its Application to RLCE Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2017/733}, year = {2017}, url = {https://eprint.iacr.org/2017/733}, } @misc{cryptoeprint:2017:734, author = {Dakshita Khurana}, title = {Round Optimal Concurrent Non-Malleability from Polynomial Hardness}, howpublished = {Cryptology ePrint Archive, Report 2017/734}, year = {2017}, url = {https://eprint.iacr.org/2017/734}, } @misc{cryptoeprint:2017:735, author = {TanPing ZHOU and XiaoYuan YANG and LongFei LIU and Wei ZHANG and YiTao DING}, title = {Faster Bootstrapping with Multiple Addends}, howpublished = {Cryptology ePrint Archive, Report 2017/735}, year = {2017}, url = {https://eprint.iacr.org/2017/735}, } @misc{cryptoeprint:2017:736, author = {Yogesh Swami}, title = {SGX Remote Attestation is not Sufficient}, howpublished = {Cryptology ePrint Archive, Report 2017/736}, year = {2017}, url = {https://eprint.iacr.org/2017/736}, } @misc{cryptoeprint:2017:737, author = {Hanyu Quan and Boyang Wang and Iraklis Leontiadis and Ming Li and Yuqing Zhang}, title = {SecReach: Secure Reachability Computation on Encrypted Location Check-in Data}, howpublished = {Cryptology ePrint Archive, Report 2017/737}, year = {2017}, url = {https://eprint.iacr.org/2017/737}, } @misc{cryptoeprint:2017:738, author = {Mihaela Ion and Ben Kreuter and Erhan Nergiz and Sarvar Patel and Shobhit Saxena and Karn Seth and David Shanahan and Moti Yung}, title = {Private Intersection-Sum Protocol with Applications to Attributing Aggregate Ad Conversions}, howpublished = {Cryptology ePrint Archive, Report 2017/738}, year = {2017}, url = {https://eprint.iacr.org/2017/738}, } @misc{cryptoeprint:2017:739, author = {Iraklis Leontiadis and Reza Curtmola}, title = {Secure Storage with Replication and Transparent Deduplication}, howpublished = {Cryptology ePrint Archive, Report 2017/739}, year = {2017}, url = {https://eprint.iacr.org/2017/739}, } @misc{cryptoeprint:2017:740, author = {Eleonora Cagli and C\'ecile Dumas and Emmanuel Prouff}, title = {Convolutional Neural Networks with Data Augmentation against Jitter-Based Countermeasures -- Profiling Attacks without Pre-Processing --}, howpublished = {Cryptology ePrint Archive, Report 2017/740}, year = {2017}, url = {https://eprint.iacr.org/2017/740}, } @misc{cryptoeprint:2017:741, author = {Peng Xu and Xia Gao and Wei Wang and Willy Susilo and Qianhong Wu and Hai Jin}, title = {Dynamic Searchable Public-Key Ciphertexts with Fast Performance and Practical Security}, howpublished = {Cryptology ePrint Archive, Report 2017/741}, year = {2017}, url = {https://eprint.iacr.org/2017/741}, } @misc{cryptoeprint:2017:742, author = {Jonathan Bootle and Mehdi Tibouchi}, title = {Cryptanalysis of Compact-LWE}, howpublished = {Cryptology ePrint Archive, Report 2017/742}, year = {2017}, url = {https://eprint.iacr.org/2017/742}, } @misc{cryptoeprint:2017:743, author = {Mike Hamburg}, title = {Cryptanalysis of 22 1/2 rounds of Gimli}, howpublished = {Cryptology ePrint Archive, Report 2017/743}, year = {2017}, url = {https://eprint.iacr.org/2017/743}, } @misc{cryptoeprint:2017:744, author = {Virendra Kumar and Jonathan Petit and William Whyte}, title = {Binary Hash Tree based Certificate Access Management}, howpublished = {Cryptology ePrint Archive, Report 2017/744}, year = {2017}, url = {https://eprint.iacr.org/2017/744}, } @misc{cryptoeprint:2017:745, author = {Burton S. Kaliski Jr.}, title = {A Quantum ``Magic Box'' for the Discrete Logarithm Problem}, howpublished = {Cryptology ePrint Archive, Report 2017/745}, year = {2017}, url = {https://eprint.iacr.org/2017/745}, } @misc{cryptoeprint:2017:746, author = {Michel Abdalla and Fabrice Benhamouda and David Pointcheval}, title = {On the Tightness of Forward-Secure Signature Reductions}, howpublished = {Cryptology ePrint Archive, Report 2017/746}, year = {2017}, url = {https://eprint.iacr.org/2017/746}, } @misc{cryptoeprint:2017:747, author = {Riham AlTawy and Raghvendra Rohit and Morgan He and Kalikinkar Mandal and Gangqiang Yang and Guang Gong}, title = {sLiSCP: Simeck-based Permutations for Lightweight Sponge Cryptographic Primitives}, howpublished = {Cryptology ePrint Archive, Report 2017/747}, year = {2017}, url = {https://eprint.iacr.org/2017/747}, } @misc{cryptoeprint:2017:748, author = {Jean-Claude Bajard and Julien Eynard and Anwar Hasan and Paulo Martins and Leonel Sousa and Vincent Zucca}, title = {Efficient reductions in cyclotomic rings - Application to R-LWE based FHE schemes}, howpublished = {Cryptology ePrint Archive, Report 2017/748}, year = {2017}, url = {https://eprint.iacr.org/2017/748}, } @misc{cryptoeprint:2017:749, author = {Ioannis Demertzis and Dimitrios Papadopoulos and Charalampos Papamanthou}, title = {Searchable Encryption with Optimal Locality: Achieving Sublogarithmic Read Efficiency}, howpublished = {Cryptology ePrint Archive, Report 2017/749}, year = {2017}, url = {https://eprint.iacr.org/2017/749}, } @misc{cryptoeprint:2017:750, author = {Răzvan Roşie}, title = {Adaptive-Secure VRFs with Shorter Keys from Static Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2017/750}, year = {2017}, url = {https://eprint.iacr.org/2017/750}, } @misc{cryptoeprint:2017:751, author = {Rémi Géraud and David Naccache and Răzvan Roşie}, title = {Twisting Lattice and Graph Techniques to Compress Transactional Ledgers}, howpublished = {Cryptology ePrint Archive, Report 2017/751}, year = {2017}, url = {https://eprint.iacr.org/2017/751}, } @misc{cryptoeprint:2017:752, author = {Michael Clear and Ciaran McGoldrick}, title = {Attribute-Based Group Homomorphic Encryption and Additively Homomorphic IBE}, howpublished = {Cryptology ePrint Archive, Report 2017/752}, year = {2017}, url = {https://eprint.iacr.org/2017/752}, } @misc{cryptoeprint:2017:753, author = {David A. Basin and Andreas Lochbihler and S. Reza Sefidgar}, title = {CryptHOL: Game-based Proofs in Higher-order Logic}, howpublished = {Cryptology ePrint Archive, Report 2017/753}, year = {2017}, url = {https://eprint.iacr.org/2017/753}, } @misc{cryptoeprint:2017:754, author = {Ahto Buldas and Matthias Geihs and Johannes Buchmann}, title = {Long-Term Secure Time-Stamping using Preimage-Aware Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2017/754}, year = {2017}, url = {https://eprint.iacr.org/2017/754}, } @misc{cryptoeprint:2017:755, author = {Daniel Apon and Chongwon Cho and Karim Eldefrawy and Jonathan Katz}, title = {Efficient, Reusable Fuzzy Extractors from LWE}, howpublished = {Cryptology ePrint Archive, Report 2017/755}, year = {2017}, url = {https://eprint.iacr.org/2017/755}, } @misc{cryptoeprint:2017:756, author = {Xavier Bultel and Manik Lal Das and Hardik Gajera and David Gérault and Matthieu Giraud and Pascal Lafourcade}, title = {Verifiable Private Polynomial Evaluation}, howpublished = {Cryptology ePrint Archive, Report 2017/756}, year = {2017}, url = {https://eprint.iacr.org/2017/756}, } @misc{cryptoeprint:2017:757, author = {Paulo S. L. M. Barreto and Shay Gueron and Tim Gueneysu and Rafael Misoczki and Edoardo Persichetti and Nicolas Sendrier and Jean-Pierre Tillich}, title = {CAKE: Code-based Algorithm for Key Encapsulation}, howpublished = {Cryptology ePrint Archive, Report 2017/757}, year = {2017}, url = {https://eprint.iacr.org/2017/757}, } @misc{cryptoeprint:2017:758, author = {Fabrice Boudot}, title = {On Improving Integer Factorization and Discrete Logarithm Computation using Partial Triangulation}, howpublished = {Cryptology ePrint Archive, Report 2017/758}, year = {2017}, url = {https://eprint.iacr.org/2017/758}, } @misc{cryptoeprint:2017:759, author = {Carsten Baum and Vadim Lyubashevsky}, title = {Simple Amortized Proofs of Shortness for Linear Relations over Polynomial Rings}, howpublished = {Cryptology ePrint Archive, Report 2017/759}, year = {2017}, url = {https://eprint.iacr.org/2017/759}, } @misc{cryptoeprint:2017:760, author = {Subhadeep Banik and Sumit Kumar Pandey and Thomas Peyrin and Yu Sasaki and Siang Meng Sim and Yosuke Todo}, title = {GIFT: A Small Present (Full version)}, howpublished = {Cryptology ePrint Archive, Report 2017/760}, year = {2017}, url = {https://eprint.iacr.org/2017/760}, } @misc{cryptoeprint:2017:761, author = {Yang Xie and Ankur Srivastava}, title = {Anti-SAT: Mitigating SAT Attack on Logic Locking}, howpublished = {Cryptology ePrint Archive, Report 2017/761}, year = {2017}, url = {https://eprint.iacr.org/2017/761}, } @misc{cryptoeprint:2017:762, author = {Melissa Chase and Ran Gilad-Bachrach and Kim Laine and Kristin Lauter and Peter Rindal}, title = {Private Collaborative Neural Network Learning}, howpublished = {Cryptology ePrint Archive, Report 2017/762}, year = {2017}, url = {https://eprint.iacr.org/2017/762}, } @misc{cryptoeprint:2017:763, author = {Masahiro Yagisawa}, title = {Improved Fully Homomorphic Encryption without Bootstrapping}, howpublished = {Cryptology ePrint Archive, Report 2017/763}, year = {2017}, url = {https://eprint.iacr.org/2017/763}, } @misc{cryptoeprint:2017:764, author = {Xinping Zhou and Carolyn Whitnall and Elisabeth Oswald and Degang Sun and Zhu Wang}, title = {Categorising and Comparing Cluster-Based DPA Distinguishers}, howpublished = {Cryptology ePrint Archive, Report 2017/764}, year = {2017}, url = {https://eprint.iacr.org/2017/764}, } @misc{cryptoeprint:2017:765, author = {Vahid Amin Ghafari and Honggang Hu and Mohammadsadegh alizadeh}, title = {Necessary conditions for designing secure stream ciphers with the minimal internal states}, howpublished = {Cryptology ePrint Archive, Report 2017/765}, year = {2017}, url = {https://eprint.iacr.org/2017/765}, } @misc{cryptoeprint:2017:766, author = {Arjun Chopra}, title = {GLYPH: A New Insantiation of the GLP Digital Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2017/766}, year = {2017}, url = {https://eprint.iacr.org/2017/766}, } @misc{cryptoeprint:2017:767, author = {Xavier Bonnetain}, title = {Quantum Key-Recovery on full AEZ}, howpublished = {Cryptology ePrint Archive, Report 2017/767}, year = {2017}, url = {https://eprint.iacr.org/2017/767}, } @misc{cryptoeprint:2017:768, author = {S.Sharmila Deva Selvi and Arinjita Paul and C. Pandu Rangan}, title = {An Efficient Certificateless Proxy Re-Encryption Scheme without Pairing}, howpublished = {Cryptology ePrint Archive, Report 2017/768}, year = {2017}, url = {https://eprint.iacr.org/2017/768}, } @misc{cryptoeprint:2017:769, author = {Peter Rindal and Mike Rosulek}, title = {Malicious-Secure Private Set Intersection via Dual Execution}, howpublished = {Cryptology ePrint Archive, Report 2017/769}, year = {2017}, url = {https://eprint.iacr.org/2017/769}, } @misc{cryptoeprint:2017:770, author = {Angelo Massimo Perillo and Emiliano De Cristofaro}, title = {PAPEETE: Private, Authorized, and Fast Personal Genomic Testing}, howpublished = {Cryptology ePrint Archive, Report 2017/770}, year = {2017}, url = {https://eprint.iacr.org/2017/770}, } @misc{cryptoeprint:2017:771, author = {Jan Czajkowski and Leon Groot Bruinderink and Andreas H{\"u}lsing and Christian Schaffner and Dominique Unruh}, title = {Post-quantum security of the sponge construction}, howpublished = {Cryptology ePrint Archive, Report 2017/771}, year = {2017}, url = {https://eprint.iacr.org/2017/771}, } @misc{cryptoeprint:2017:772, author = {Gilad Asharov and T-H. Hubert Chan and Kartik Nayak and Rafael Pass and Ling Ren and Elaine Shi}, title = {Oblivious Computation with Data Locality}, howpublished = {Cryptology ePrint Archive, Report 2017/772}, year = {2017}, url = {https://eprint.iacr.org/2017/772}, } @misc{cryptoeprint:2017:773, author = {Sebastian Messmer and Jochen Rill and Dirk Achenbach and J\"orn M\"uller-Quade}, title = {A Novel Cryptographic Framework for Cloud File Systems and CryFS, a Provably-Secure Construction}, howpublished = {Cryptology ePrint Archive, Report 2017/773}, year = {2017}, url = {https://eprint.iacr.org/2017/773}, } @misc{cryptoeprint:2017:774, author = {Steven D. Galbraith and Frederik Vercauteren}, title = {Computational problems in supersingular elliptic curve isogenies}, howpublished = {Cryptology ePrint Archive, Report 2017/774}, year = {2017}, url = {https://eprint.iacr.org/2017/774}, } @misc{cryptoeprint:2017:775, author = {Juan A. Garay and Aggelos Kiayias and Giorgos Panagiotakos}, title = {Proofs of Work for Blockchain Protocols}, howpublished = {Cryptology ePrint Archive, Report 2017/775}, year = {2017}, url = {https://eprint.iacr.org/2017/775}, } @misc{cryptoeprint:2017:776, author = {Ward Beullens and Bart Preneel}, title = {Field lifting for smaller UOV public keys}, howpublished = {Cryptology ePrint Archive, Report 2017/776}, year = {2017}, url = {https://eprint.iacr.org/2017/776}, } @misc{cryptoeprint:2017:777, author = {Sanjit Chatterjee and Deepak Garg and Aniket Kate and Tobias Theobald}, title = {Encrypting Messages for Incomplete Chains of Certificates}, howpublished = {Cryptology ePrint Archive, Report 2017/777}, year = {2017}, url = {https://eprint.iacr.org/2017/777}, } @misc{cryptoeprint:2017:778, author = {Nikolaos Alexopoulos and Aggelos Kiayias and Riivo Talviste and Thomas Zacharias }, title = {MCMix: Anonymous Messaging via Secure Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2017/778}, year = {2017}, url = {https://eprint.iacr.org/2017/778}, } @misc{cryptoeprint:2017:779, author = {Bibhas Chandra Das and Md Kutubuddin Sardar and Avishek Adhikari}, title = {Efficient Constructions for $t$-$ (k,n)^{*}$-Random Grid Visual Cryptographic Schemes}, howpublished = {Cryptology ePrint Archive, Report 2017/779}, year = {2017}, url = {https://eprint.iacr.org/2017/779}, } @misc{cryptoeprint:2017:780, author = {Bin Zhang and Xinxin Gong}, title = {New Algorithms for Solving LPN}, howpublished = {Cryptology ePrint Archive, Report 2017/780}, year = {2017}, url = {https://eprint.iacr.org/2017/780}, } @misc{cryptoeprint:2017:781, author = {Rupeng Yang and Man Ho Au and Junzuo Lai and Qiuliang Xu and Zuoxia Yu}, title = {Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern’s Protocols and Weak PRF with Efficient Protocols from LWR}, howpublished = {Cryptology ePrint Archive, Report 2017/781}, year = {2017}, url = {https://eprint.iacr.org/2017/781}, } @misc{cryptoeprint:2017:782, author = {Wanfen Guo and Xiaolei Dong and Zhenfu Cao and Jiachen Shen}, title = {Efficient Attribute-Based Secure Keyword Search on the Cloud Storage}, howpublished = {Cryptology ePrint Archive, Report 2017/782}, year = {2017}, url = {https://eprint.iacr.org/2017/782}, } @misc{cryptoeprint:2017:783, author = {Marc Fyrbiak and Sebastian Wallat and Pawel Swierczynski and Max Hoffmann and Sebastian Hoppach and Matthias Wilhelm and Tobias Weidlich and Russell Tessier and Christof Paar}, title = {HAL- The Missing Piece of the Puzzle for Hardware Reverse Engineering, Trojan Detection and Insertion}, howpublished = {Cryptology ePrint Archive, Report 2017/783}, year = {2017}, url = {https://eprint.iacr.org/2017/783}, } @misc{cryptoeprint:2017:784, author = {Colin Boyd and Britta Hale}, title = {Secure Channels and Termination: The Last Word on TLS}, howpublished = {Cryptology ePrint Archive, Report 2017/784}, year = {2017}, url = {https://eprint.iacr.org/2017/784}, } @misc{cryptoeprint:2017:785, author = {Aloni Cohen}, title = {What about Bob? The Inadequacy of CPA Security for Proxy Reencryption}, howpublished = {Cryptology ePrint Archive, Report 2017/785}, year = {2017}, url = {https://eprint.iacr.org/2017/785}, } @misc{cryptoeprint:2017:786, author = {Giorgia Azzurra Marson and Bertram Poettering}, title = {With one it is easy, with many it gets complicated: Understanding Channel Security for Groups}, howpublished = {Cryptology ePrint Archive, Report 2017/786}, year = {2017}, url = {https://eprint.iacr.org/2017/786}, } @misc{cryptoeprint:2017:787, author = {Lukas Zobernig and Steven D. Galbraith and Giovanni Russello}, title = {Indistinguishable Predicates: A New Tool for Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2017/787}, year = {2017}, url = {https://eprint.iacr.org/2017/787}, } @misc{cryptoeprint:2017:788, author = {William Diehl}, title = {Attack on AES Implementation Exploiting Publicly-visible Partial Result}, howpublished = {Cryptology ePrint Archive, Report 2017/788}, year = {2017}, url = {https://eprint.iacr.org/2017/788}, } @misc{cryptoeprint:2017:789, author = {Gustavo Banegas and Daniel J. Bernstein}, title = {Low-communication parallel quantum multi-target preimage search}, howpublished = {Cryptology ePrint Archive, Report 2017/789}, year = {2017}, url = {https://eprint.iacr.org/2017/789}, } @misc{cryptoeprint:2017:790, author = {Nico D\"ottling and Satrajit Ghosh and Jesper Buus Nielsen and Tobias Nilges and Roberto Trifiletti}, title = {TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation}, howpublished = {Cryptology ePrint Archive, Report 2017/790}, year = {2017}, url = {https://eprint.iacr.org/2017/790}, } @misc{cryptoeprint:2017:791, author = {Aljosha Judmayer and Alexei Zamyatin and Nicholas Stifter and Artemios G. Voyiatzis and Edgar Weippl}, title = {Merged Mining: Curse of Cure?}, howpublished = {Cryptology ePrint Archive, Report 2017/791}, year = {2017}, url = {https://eprint.iacr.org/2017/791}, } @misc{cryptoeprint:2017:792, author = {Jean-Marie Chauvet}, title = {Gimli, Lord of the Glittering TRS-80}, howpublished = {Cryptology ePrint Archive, Report 2017/792}, year = {2017}, url = {https://eprint.iacr.org/2017/792}, } @misc{cryptoeprint:2017:793, author = {Tung Chou}, title = {McBits Revisited}, howpublished = {Cryptology ePrint Archive, Report 2017/793}, year = {2017}, url = {https://eprint.iacr.org/2017/793}, } @misc{cryptoeprint:2017:794, author = {Elena Pagnin and Aikaterini Mitrokotsa and Keisuke Tanaka}, title = {Anonymous Single-Round Server-Aided Verification}, howpublished = {Cryptology ePrint Archive, Report 2017/794}, year = {2017}, url = {https://eprint.iacr.org/2017/794}, } @misc{cryptoeprint:2017:795, author = {Zvika Brakerski and Rotem Tsabary and Vinod Vaikuntanathan and Hoeteck Wee}, title = {Private Constrained PRFs (and More) from LWE}, howpublished = {Cryptology ePrint Archive, Report 2017/795}, year = {2017}, url = {https://eprint.iacr.org/2017/795}, } @misc{cryptoeprint:2017:796, author = {Sikhar Patranabis and Debdeep Mukhopadhyay}, title = {Lightweight Symmetric-Key Hidden Vector Encryption without Pairings}, howpublished = {Cryptology ePrint Archive, Report 2017/796}, year = {2017}, url = {https://eprint.iacr.org/2017/796}, } @misc{cryptoeprint:2017:797, author = {Parvin Rastegari and Mehdi Berenjkoub}, title = {Multi-Designated Verifiers Signature Schemes with Threshold Verifiability: Generic Pattern and a Concrete Scheme in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2017/797}, year = {2017}, url = {https://eprint.iacr.org/2017/797}, } @misc{cryptoeprint:2017:798, author = {Daniel Günther and Ágnes Kiss and Thomas Schneider}, title = {More Efficient Universal Circuit Constructions}, howpublished = {Cryptology ePrint Archive, Report 2017/798}, year = {2017}, url = {https://eprint.iacr.org/2017/798}, } @misc{cryptoeprint:2017:799, author = {Vladimir Kolesnikov and Naor Matania and Benny Pinkas and Mike Rosulek and Ni Trieu }, title = {Practical Multi-party Private Set Intersection from Symmetric-Key Techniques}, howpublished = {Cryptology ePrint Archive, Report 2017/799}, year = {2017}, url = {https://eprint.iacr.org/2017/799}, } @misc{cryptoeprint:2017:800, author = {Fukang Liu and Florian Mendel and Gaoli Wang}, title = {Collisions and Semi-Free-Start Collisions for Round-Reduced RIPEMD-160}, howpublished = {Cryptology ePrint Archive, Report 2017/800}, year = {2017}, url = {https://eprint.iacr.org/2017/800}, } @misc{cryptoeprint:2017:801, author = {Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay}, title = {Attribute-Based Signatures for Turing Machines}, howpublished = {Cryptology ePrint Archive, Report 2017/801}, year = {2017}, url = {https://eprint.iacr.org/2017/801}, } @misc{cryptoeprint:2017:802, author = {Gottfried Herold and Max Hoffmann and Michael Kloo\ss and Carla R\`afols and Andy Rupp}, title = {New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs}, howpublished = {Cryptology ePrint Archive, Report 2017/802}, year = {2017}, url = {https://eprint.iacr.org/2017/802}, } @misc{cryptoeprint:2017:803, author = {Andrei Lapets and Mayank Varia and Azer Bestavros and Frederick Jansen}, title = {Role-Based Ecosystem Model for Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications}, howpublished = {Cryptology ePrint Archive, Report 2017/803}, year = {2017}, url = {https://eprint.iacr.org/2017/803}, } @misc{cryptoeprint:2017:804, author = {Zheng Li and Wenquan Bi and Xiaoyang Dong and Xiaoyun Wang}, title = {Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method}, howpublished = {Cryptology ePrint Archive, Report 2017/804}, year = {2017}, url = {https://eprint.iacr.org/2017/804}, } @misc{cryptoeprint:2017:805, author = {Raphael Bost and Brice Minaud and Olga Ohrimenko}, title = {Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives}, howpublished = {Cryptology ePrint Archive, Report 2017/805}, year = {2017}, url = {https://eprint.iacr.org/2017/805}, } @misc{cryptoeprint:2017:806, author = {Daniel Genkin and Luke Valenta and Yuval Yarom}, title = {May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519}, howpublished = {Cryptology ePrint Archive, Report 2017/806}, year = {2017}, url = {https://eprint.iacr.org/2017/806}, } @misc{cryptoeprint:2017:807, author = {Shashank Agrawal and Melissa Chase}, title = {FAME: Fast Attribute-based Message Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/807}, year = {2017}, url = {https://eprint.iacr.org/2017/807}, } @misc{cryptoeprint:2017:808, author = {Shuichi Katsumata}, title = {On the Untapped Potential of Encoding Predicates by Arithmetic Circuits and Their Applications}, howpublished = {Cryptology ePrint Archive, Report 2017/808}, year = {2017}, url = {https://eprint.iacr.org/2017/808}, } @misc{cryptoeprint:2017:809, author = {Hao Chen and Kim Laine and Rachel Player and Yuhou Xia}, title = {High-Precision Arithmetic in Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/809}, year = {2017}, url = {https://eprint.iacr.org/2017/809}, } @misc{cryptoeprint:2017:810, author = {Rahul Chatterjee and Joanne Woodage and Yuval Pnueli and Anusha Chowdhury and Thomas Ristenpart}, title = {The TypTop System: Personalized Typo-tolerant Password Checking}, howpublished = {Cryptology ePrint Archive, Report 2017/810}, year = {2017}, url = {https://eprint.iacr.org/2017/810}, } @misc{cryptoeprint:2017:811, author = {Scott Fluhrer}, title = {Reassessing Grover's Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2017/811}, year = {2017}, url = {https://eprint.iacr.org/2017/811}, } @misc{cryptoeprint:2017:812, author = {Bart Mennink and Samuel Neves}, title = {Optimal PRFs from Blockcipher Designs}, howpublished = {Cryptology ePrint Archive, Report 2017/812}, year = {2017}, url = {https://eprint.iacr.org/2017/812}, } @misc{cryptoeprint:2017:813, author = {Angela Jäschke and Björn Grohmann and Frederik Armknecht and Andreas Schaad}, title = {Industrial Feasibility of Private Information Retrieval}, howpublished = {Cryptology ePrint Archive, Report 2017/813}, year = {2017}, url = {https://eprint.iacr.org/2017/813}, } @misc{cryptoeprint:2017:814, author = {Philipp Koppermann and Fabrizio De Santis and Johann Heyszl and Georg Sigl}, title = {Fast FPGA Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve}, howpublished = {Cryptology ePrint Archive, Report 2017/814}, year = {2017}, url = {https://eprint.iacr.org/2017/814}, } @misc{cryptoeprint:2017:815, author = {Martin R. Albrecht and Florian Göpfert and Fernando Virdia and Thomas Wunderer}, title = {Revisiting the Expected Cost of Solving uSVP and Applications to LWE}, howpublished = {Cryptology ePrint Archive, Report 2017/815}, year = {2017}, url = {https://eprint.iacr.org/2017/815}, } @misc{cryptoeprint:2017:816, author = {Yehuda Lindell and Ariel Nof}, title = {A Framework for Constructing Fast MPC over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority}, howpublished = {Cryptology ePrint Archive, Report 2017/816}, year = {2017}, url = {https://eprint.iacr.org/2017/816}, } @misc{cryptoeprint:2017:817, author = {Parvin Rastegari and Mehdi Berenjkoub}, title = {A Universal Designated Verifier Signature Scheme with Non-Delegatability in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2017/817}, year = {2017}, url = {https://eprint.iacr.org/2017/817}, } @misc{cryptoeprint:2017:818, author = {Yong Li and Sven Schäge}, title = {No-Match Attacks and Robust Partnering Definitions – Defining Trivial Attacks for Security Protocols is Not Trivial}, howpublished = {Cryptology ePrint Archive, Report 2017/818}, year = {2017}, url = {https://eprint.iacr.org/2017/818}, } @misc{cryptoeprint:2017:819, author = {Thang Hoang and Ceyhun D. Ozkaptan and Attila A. Yavuz and Jorge Guajardo and Tam Nguyen}, title = {S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2017/819}, year = {2017}, url = {https://eprint.iacr.org/2017/819}, } @misc{cryptoeprint:2017:820, author = {Giulio Malavolta and Pedro Moreno-Sanchez and Aniket Kate and Matteo Maffei and Srivatsan Ravi}, title = {Concurrency and Privacy with Payment-Channel Networks}, howpublished = {Cryptology ePrint Archive, Report 2017/820}, year = {2017}, url = {https://eprint.iacr.org/2017/820}, } @misc{cryptoeprint:2017:821, author = {José Bacelar Almeida and Manuel Barbosa and Gilles Barthe and François Dupressoir and Benjamin Grégoire and Vincent Laporte and Vitor Pereira}, title = {A Fast and Verified Software Stack for Secure Function Evaluation}, howpublished = {Cryptology ePrint Archive, Report 2017/821}, year = {2017}, url = {https://eprint.iacr.org/2017/821}, } @misc{cryptoeprint:2017:822, author = {Shahin Tajik and Heiko Lohrke and Jean-Pierre Seifert and Christian Boit}, title = {On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs}, howpublished = {Cryptology ePrint Archive, Report 2017/822}, year = {2017}, url = {https://eprint.iacr.org/2017/822}, } @misc{cryptoeprint:2017:823, author = {Rami Khalil and Arthur Gervais}, title = {Revive: Rebalancing Off-Blockchain Payment Networks}, howpublished = {Cryptology ePrint Archive, Report 2017/823}, year = {2017}, url = {https://eprint.iacr.org/2017/823}, } @misc{cryptoeprint:2017:824, author = {Ela Berners-Lee}, title = {Improved Security Notions for Proxy Re-Encryption to Enforce Access Control}, howpublished = {Cryptology ePrint Archive, Report 2017/824}, year = {2017}, url = {https://eprint.iacr.org/2017/824}, } @misc{cryptoeprint:2017:825, author = {Syed Mahbub Hafiz and Ryan Henry}, title = {Querying for Queries: Indexes of Queries for Efficient and Expressive IT-PIR}, howpublished = {Cryptology ePrint Archive, Report 2017/825}, year = {2017}, url = {https://eprint.iacr.org/2017/825}, } @misc{cryptoeprint:2017:826, author = {Brent Carmer and Alex J. Malozemoff and Mariana Raykova}, title = {5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits}, howpublished = {Cryptology ePrint Archive, Report 2017/826}, year = {2017}, url = {https://eprint.iacr.org/2017/826}, } @misc{cryptoeprint:2017:827, author = {Jack Doerner and abhi shelat}, title = {Scaling ORAM for Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2017/827}, year = {2017}, url = {https://eprint.iacr.org/2017/827}, } @misc{cryptoeprint:2017:828, author = {Animesh Chhotaray and Adib Nahiyan and Thomas Shrimpton and Domenic J Forte and Mark Tehranipoor}, title = {Standardizing Bad Cryptographic Practice - A Teardown of the IEEE Standard for Protecting Electronic-design Intellectual Property}, howpublished = {Cryptology ePrint Archive, Report 2017/828}, year = {2017}, url = {https://eprint.iacr.org/2017/828}, } @misc{cryptoeprint:2017:829, author = {Jakub Breier and Xiaolu Hou}, title = {Automated Fault Analysis of Assembly Code (With a Case Study on PRESENT Implementation)}, howpublished = {Cryptology ePrint Archive, Report 2017/829}, year = {2017}, url = {https://eprint.iacr.org/2017/829}, } @misc{cryptoeprint:2017:830, author = {Daan Leermakers and Boris Skoric}, title = {Security proof for Round Robin Differential Phase Shift QKD}, howpublished = {Cryptology ePrint Archive, Report 2017/830}, year = {2017}, url = {https://eprint.iacr.org/2017/830}, } @misc{cryptoeprint:2017:831, author = {Geng Wang and Haiyang Zhang and Fengmei Liu}, title = {Security Proof of JAMBU under Nonce Respecting and Nonce Misuse Cases}, howpublished = {Cryptology ePrint Archive, Report 2017/831}, year = {2017}, url = {https://eprint.iacr.org/2017/831}, } @misc{cryptoeprint:2017:832, author = {Lorenzo Grassi}, title = {Structural Truncated Differential Attacks on round-reduced AES}, howpublished = {Cryptology ePrint Archive, Report 2017/832}, year = {2017}, url = {https://eprint.iacr.org/2017/832}, } @misc{cryptoeprint:2017:833, author = {Steven Myers and Adam Shull}, title = {Efficient Hybrid Proxy Re-Encryption for Practical Revocation and Key Rotation}, howpublished = {Cryptology ePrint Archive, Report 2017/833}, year = {2017}, url = {https://eprint.iacr.org/2017/833}, } @misc{cryptoeprint:2017:834, author = {Daniel Masny}, title = {Authentication from Weak PRFs with Hidden Auxiliary Input}, howpublished = {Cryptology ePrint Archive, Report 2017/834}, year = {2017}, url = {https://eprint.iacr.org/2017/834}, } @misc{cryptoeprint:2017:835, author = {Stephen D. Miller and Bhargav Narayanan and Ramarathnam Venkatesan}, title = {Coppersmith's lattices and ``focus groups'': an attack on small-exponent RSA}, howpublished = {Cryptology ePrint Archive, Report 2017/835}, year = {2017}, url = {https://eprint.iacr.org/2017/835}, } @misc{cryptoeprint:2017:836, author = {Yin Li and Xingpo Ma and Qin Chen and Chuanda Qi}, title = {Efficient Square-based Montgomery Multiplier for All Type C.1 Pentanomials}, howpublished = {Cryptology ePrint Archive, Report 2017/836}, year = {2017}, url = {https://eprint.iacr.org/2017/836}, } @misc{cryptoeprint:2017:837, author = {Avijit Dutta and Ashwin Jha and Mridul Nandi}, title = {Tight Security Analysis of EHtM MAC}, howpublished = {Cryptology ePrint Archive, Report 2017/837}, year = {2017}, url = {https://eprint.iacr.org/2017/837}, } @misc{cryptoeprint:2017:838, author = {Jiang Zhang and Yu Yu}, title = {Two-Round PAKE from Approximate SPH and Instantiations from Lattices}, howpublished = {Cryptology ePrint Archive, Report 2017/838}, year = {2017}, url = {https://eprint.iacr.org/2017/838}, } @misc{cryptoeprint:2017:839, author = {Jing Li and Licheng Wang}, title = {Noiseless Fully Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/839}, year = {2017}, url = {https://eprint.iacr.org/2017/839}, } @misc{cryptoeprint:2017:840, author = {Saud Al Musa and Guangwu Xu}, title = {Fast Scalar Multiplication for Elliptic Curves over Binary Fields by Efficiently Computable Formulas}, howpublished = {Cryptology ePrint Archive, Report 2017/840}, year = {2017}, url = {https://eprint.iacr.org/2017/840}, } @misc{cryptoeprint:2017:841, author = {Yu Long Chen and Atul Luykx and Bart Mennink and Bart Preneel}, title = {Efficient Length Doubling From Tweakable Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2017/841}, year = {2017}, url = {https://eprint.iacr.org/2017/841}, } @misc{cryptoeprint:2017:842, author = {Darren Hurley-Smith and Julio Hernandez-Castro}, title = {Quam Bene Non Quantum: Bias in a Family of Quantum Random Number Generators}, howpublished = {Cryptology ePrint Archive, Report 2017/842}, year = {2017}, url = {https://eprint.iacr.org/2017/842}, } @misc{cryptoeprint:2017:843, author = {Federico Giacon and Eike Kiltz and Bertram Poettering}, title = {Hybrid Encryption in a Multi-User Setting, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2017/843}, year = {2017}, url = {https://eprint.iacr.org/2017/843}, } @misc{cryptoeprint:2017:844, author = {David Bruce Cousins and Giovanni Di Crescenzo and Kamil Doruk G\"{u}r and Kevin King and Yuriy Polyakov and Kurt Rohloff and Gerard W. Ryan and Erkay Sava\c{s}}, title = {Implementing Conjunction Obfuscation under Entropic Ring LWE}, howpublished = {Cryptology ePrint Archive, Report 2017/844}, year = {2017}, url = {https://eprint.iacr.org/2017/844}, } @misc{cryptoeprint:2017:845, author = {Ritam Bhaumik and Mridul Nandi}, title = {Improved Security for OCB3}, howpublished = {Cryptology ePrint Archive, Report 2017/845}, year = {2017}, url = {https://eprint.iacr.org/2017/845}, } @misc{cryptoeprint:2017:846, author = {Yaron Gvili}, title = {How to Prove Megabytes (Per Second)}, howpublished = {Cryptology ePrint Archive, Report 2017/846}, year = {2017}, url = {https://eprint.iacr.org/2017/846}, } @misc{cryptoeprint:2017:847, author = {Andr\'e Chailloux and Mar\'ia Naya-Plasencia and Andr\'e Schrottenloher}, title = {An Efficient Quantum Collision Search Algorithm and Implications on Symmetric Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2017/847}, year = {2017}, url = {https://eprint.iacr.org/2017/847}, } @misc{cryptoeprint:2017:848, author = {Nilanjan Datta and Avijit Dutta and Mridul Nandi and Goutam Paul and Liting Zhang}, title = {Single Key Variant of PMAC_Plus}, howpublished = {Cryptology ePrint Archive, Report 2017/848}, year = {2017}, url = {https://eprint.iacr.org/2017/848}, } @misc{cryptoeprint:2017:849, author = {Debrup Chakraborty and Sebati Ghosh and Cuauhtemoc Mancillas Lopez and Palash Sarkar}, title = {FAST: A New Family of Secure and Efficient Tweakable Enciphering Schemes}, howpublished = {Cryptology ePrint Archive, Report 2017/849}, year = {2017}, url = {https://eprint.iacr.org/2017/849}, } @misc{cryptoeprint:2017:850, author = {Evgenios M. Kornaropoulos and Petros Efstathopoulos}, title = {Breaking and Fixing Secure Similarity Approximations: Dealing with Adversarially Perturbed Inputs}, howpublished = {Cryptology ePrint Archive, Report 2017/850}, year = {2017}, url = {https://eprint.iacr.org/2017/850}, } @misc{cryptoeprint:2017:851, author = {Ivica Nikolić}, title = {How to Use Metaheuristics for Design of Symmetric-Key Primitives}, howpublished = {Cryptology ePrint Archive, Report 2017/851}, year = {2017}, url = {https://eprint.iacr.org/2017/851}, } @misc{cryptoeprint:2017:852, author = {Yusuke Naito}, title = {Blockcipher-based MACs: Beyond the Birthday Bound without Message Length}, howpublished = {Cryptology ePrint Archive, Report 2017/852}, year = {2017}, url = {https://eprint.iacr.org/2017/852}, } @misc{cryptoeprint:2017:853, author = {Cyprien de Saint Guilhem and Nigel P. Smart and Bogdan Warinschi}, title = {Generic Forward-Secure Key Agreement Without Signatures}, howpublished = {Cryptology ePrint Archive, Report 2017/853}, year = {2017}, url = {https://eprint.iacr.org/2017/853}, } @misc{cryptoeprint:2017:854, author = {Khoa Nguyen and Benjamin Hong Meng Tan and Huaxiong Wang}, title = {Zero-Knowledge Password Policy Check from Lattices}, howpublished = {Cryptology ePrint Archive, Report 2017/854}, year = {2017}, url = {https://eprint.iacr.org/2017/854}, } @misc{cryptoeprint:2017:855, author = {Xiaojuan Zhang and Xiutao Feng and Dongdai Lin}, title = {Fault Attack on ACORN v3}, howpublished = {Cryptology ePrint Archive, Report 2017/855}, year = {2017}, url = {https://eprint.iacr.org/2017/855}, } @misc{cryptoeprint:2017:856, author = {Benoît Libert and San Ling and Khoa Nguyen and Huaxiong Wang}, title = {Zero-Knowledge Arguments for Lattice-Based PRFs and Applications to E-Cash}, howpublished = {Cryptology ePrint Archive, Report 2017/856}, year = {2017}, url = {https://eprint.iacr.org/2017/856}, } @misc{cryptoeprint:2017:857, author = {Anthony Barnett and Jay Santokhi and Michael Simpson and Nigel P. Smart and Charlie Stainton-Bygrave and Srnivas Vivek and Adrian Waller}, title = {Image Classification using non-linear Support Vector Machines on Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2017/857}, year = {2017}, url = {https://eprint.iacr.org/2017/857}, } @misc{cryptoeprint:2017:858, author = {Pei Luo and Yunsi Fei and Liwei Zhang and A. Adam Ding}, title = {Differential Fault Analysis of SHA-3 under Relaxed Fault Models}, howpublished = {Cryptology ePrint Archive, Report 2017/858}, year = {2017}, url = {https://eprint.iacr.org/2017/858}, } @misc{cryptoeprint:2017:859, author = {Jie Chen and Junqing Gong}, title = {ABE with Tag Made Easy: Concise Framework and New Instantiations in Prime-order Groups}, howpublished = {Cryptology ePrint Archive, Report 2017/859}, year = {2017}, url = {https://eprint.iacr.org/2017/859}, } @misc{cryptoeprint:2017:860, author = {Ling Sun and Wei Wang and Meiqin Wang}, title = {Automatic Search of Bit-Based Division Property for ARX Ciphers and Word-Based Division Property}, howpublished = {Cryptology ePrint Archive, Report 2017/860}, year = {2017}, url = {https://eprint.iacr.org/2017/860}, } @misc{cryptoeprint:2017:861, author = {T-H. Hubert Chan and Kai-Min Chung and Elaine Shi}, title = {On the Depth of Oblivious Parallel RAM}, howpublished = {Cryptology ePrint Archive, Report 2017/861}, year = {2017}, url = {https://eprint.iacr.org/2017/861}, } @misc{cryptoeprint:2017:862, author = {Aner Ben-Efraim and Yehuda Lindell and Eran Omri}, title = {Efficient Scalable Constant-Round MPC via Garbled Circuits}, howpublished = {Cryptology ePrint Archive, Report 2017/862}, year = {2017}, url = {https://eprint.iacr.org/2017/862}, } @misc{cryptoeprint:2017:863, author = {Julia Kastner and Alexander Koch and Stefan Walzer and Daiki Miyahara and Yu-ichi Hayashi and Takaaki Mizuki and Hideaki Sone}, title = {The Minimum Number of Cards in Practical Card-based Protocols}, howpublished = {Cryptology ePrint Archive, Report 2017/863}, year = {2017}, url = {https://eprint.iacr.org/2017/863}, } @misc{cryptoeprint:2017:864, author = {Akinori Hosoyamada and Yu Sasaki and Keita Xagawa}, title = {Quantum Multicollision-Finding Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2017/864}, year = {2017}, url = {https://eprint.iacr.org/2017/864}, } @misc{cryptoeprint:2017:865, author = {Maik Ender and Samaneh Ghandali and Amir Moradi and Christof Paar}, title = {The First Thorough Side-Channel Hardware Trojan}, howpublished = {Cryptology ePrint Archive, Report 2017/865}, year = {2017}, url = {https://eprint.iacr.org/2017/865}, } @misc{cryptoeprint:2017:866, author = {Papa B. Seye and Augustin P. Sarr}, title = {Enhanced Modelling of Authenticated Key Exchange Security}, howpublished = {Cryptology ePrint Archive, Report 2017/866}, year = {2017}, url = {https://eprint.iacr.org/2017/866}, } @misc{cryptoeprint:2017:867, author = {S.Sharmila Deva Selvi and Arinjita Paul and C. Pandu Rangan}, title = {On the security of a Certificateless Proxy Re-Encryption Scheme without Pairing}, howpublished = {Cryptology ePrint Archive, Report 2017/867}, year = {2017}, url = {https://eprint.iacr.org/2017/867}, } @misc{cryptoeprint:2017:868, author = {Takanori Isobe and Kyoji Shibutani}, title = {New Key Recovery Attacks on Minimal Two-Round Even-Mansour Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2017/868}, year = {2017}, url = {https://eprint.iacr.org/2017/868}, } @misc{cryptoeprint:2017:869, author = {Sebastian Faust and Clara Paglialonga and Tobias Schneider}, title = {Amortizing Randomness Complexity in Private Circuits}, howpublished = {Cryptology ePrint Archive, Report 2017/869}, year = {2017}, url = {https://eprint.iacr.org/2017/869}, } @misc{cryptoeprint:2017:870, author = {Eike Kiltz and Julian Loss and Jiaxin Pan}, title = {Tightly-Secure Signatures from Five-Move Identification Protocols}, howpublished = {Cryptology ePrint Archive, Report 2017/870}, year = {2017}, url = {https://eprint.iacr.org/2017/870}, } @misc{cryptoeprint:2017:871, author = {Shai Halevi and Yuval Ishai and Abhishek Jain and Ilan Komargodski and Amit Sahai and Eylon Yogev}, title = {Non-Interactive Multiparty Computation without Correlated Randomness}, howpublished = {Cryptology ePrint Archive, Report 2017/871}, year = {2017}, url = {https://eprint.iacr.org/2017/871}, } @misc{cryptoeprint:2017:872, author = {Jonathan Bootle and Andrea Cerulli and Essam Ghadafi and Jens Groth and Mohammad Hajiabadi and Sune K. Jakobsen}, title = {Linear-Time Zero-Knowledge Proofs for Arithmetic Circuit Satisfiability}, howpublished = {Cryptology ePrint Archive, Report 2017/872}, year = {2017}, url = {https://eprint.iacr.org/2017/872}, } @misc{cryptoeprint:2017:873, author = {Sarah Miracle and Scott Yilek}, title = {Cycle Slicer: An Algorithm for Building Permutations on Special Domains}, howpublished = {Cryptology ePrint Archive, Report 2017/873}, year = {2017}, url = {https://eprint.iacr.org/2017/873}, } @misc{cryptoeprint:2017:874, author = {Zvika Brakerski and Aayush Jain and Ilan Komargodski and Alain Passelegue and Daniel Wichs}, title = {Non-Trivial Witness Encryption and Null-iO from Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2017/874}, year = {2017}, url = {https://eprint.iacr.org/2017/874}, } @misc{cryptoeprint:2017:875, author = {Iddo Bentov and Ranjit Kumaresan and Andrew Miller}, title = {Instantaneous Decentralized Poker}, howpublished = {Cryptology ePrint Archive, Report 2017/875}, year = {2017}, url = {https://eprint.iacr.org/2017/875}, } @misc{cryptoeprint:2017:876, author = {Benoit Libert and Amin Sakzad and Damien Stehle and Ron Steinfeld}, title = {All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE}, howpublished = {Cryptology ePrint Archive, Report 2017/876}, year = {2017}, url = {https://eprint.iacr.org/2017/876}, } @misc{cryptoeprint:2017:877, author = {Mihir Bellare and Viet Tung Hoang}, title = {Identity-Based Format-Preserving Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/877}, year = {2017}, url = {https://eprint.iacr.org/2017/877}, } @misc{cryptoeprint:2017:878, author = {David Cerezo Sánchez}, title = {Raziel: Private and Verifiable Smart Contracts on Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2017/878}, year = {2017}, url = {https://eprint.iacr.org/2017/878}, } @misc{cryptoeprint:2017:879, author = {Jean-Sebastien Coron}, title = {Formal Verification of Side-channel Countermeasures via Elementary Circuit Transformations}, howpublished = {Cryptology ePrint Archive, Report 2017/879}, year = {2017}, url = {https://eprint.iacr.org/2017/879}, } @misc{cryptoeprint:2017:880, author = {Danielle Morgan and Arnis Parsovs}, title = {Using the Estonian Electronic Identity Card for Authentication to a Machine (Extended Version)}, howpublished = {Cryptology ePrint Archive, Report 2017/880}, year = {2017}, url = {https://eprint.iacr.org/2017/880}, } @misc{cryptoeprint:2017:881, author = {Sarah Meiklejohn and Rebekah Mercer}, title = {M{\"o}bius: Trustless Tumbling for Transaction Privacy}, howpublished = {Cryptology ePrint Archive, Report 2017/881}, year = {2017}, url = {https://eprint.iacr.org/2017/881}, } @misc{cryptoeprint:2017:882, author = {Baptiste Olivier and Tony Quertier}, title = {Towards an in-depth understanding of privacy parameters for randomized sanitization mechanisms}, howpublished = {Cryptology ePrint Archive, Report 2017/882}, year = {2017}, url = {https://eprint.iacr.org/2017/882}, } @misc{cryptoeprint:2017:883, author = {Ilya Mironov and Gil Segev and Ido Shahaf}, title = {Strengthening the Security of Encrypted Databases: Non-Transitive JOINs}, howpublished = {Cryptology ePrint Archive, Report 2017/883}, year = {2017}, url = {https://eprint.iacr.org/2017/883}, } @misc{cryptoeprint:2017:884, author = {Giulia Bianco and Elisa Gorla}, title = {Scalar multiplication in compressed coordinates in the trace-zero subgroup}, howpublished = {Cryptology ePrint Archive, Report 2017/884}, year = {2017}, url = {https://eprint.iacr.org/2017/884}, } @misc{cryptoeprint:2017:885, author = {Shruti Tople and Hung Dang and Prateek Saxena and Ee-Chien Chang}, title = {PermuteRam: Optimizing Oblivious Computation for Efficiency}, howpublished = {Cryptology ePrint Archive, Report 2017/885}, year = {2017}, url = {https://eprint.iacr.org/2017/885}, } @misc{cryptoeprint:2017:886, author = {Giulia Bianco and Elisa Gorla}, title = {Compression for trace zero points on twisted Edwards curves}, howpublished = {Cryptology ePrint Archive, Report 2017/886}, year = {2017}, url = {https://eprint.iacr.org/2017/886}, } @misc{cryptoeprint:2017:887, author = {Zvika Brakerski and Yael Tauman Kalai and Renen Perlman}, title = {Succinct Spooky Free Compilers Are Not Black Box Sound}, howpublished = {Cryptology ePrint Archive, Report 2017/887}, year = {2017}, url = {https://eprint.iacr.org/2017/887}, } @misc{cryptoeprint:2017:888, author = {Philippe Camacho and Fernando Krell}, title = {An asynchronous provably-secure protocol for hidden services}, howpublished = {Cryptology ePrint Archive, Report 2017/888}, year = {2017}, url = {https://eprint.iacr.org/2017/888}, } @misc{cryptoeprint:2017:889, author = {Alexander Maximov and Helena Sjoberg}, title = {On Fast Multiplication in Binary Finite Fields and Optimal Primitive Polynomials over GF(2)}, howpublished = {Cryptology ePrint Archive, Report 2017/889}, year = {2017}, url = {https://eprint.iacr.org/2017/889}, } @misc{cryptoeprint:2017:890, author = {Manuel Fersch and Eike Kiltz and Bertram Poettering}, title = {On the One-Per-Message Unforgeability of (EC)DSA and its Variants}, howpublished = {Cryptology ePrint Archive, Report 2017/890}, year = {2017}, url = {https://eprint.iacr.org/2017/890}, } @misc{cryptoeprint:2017:891, author = {Nicky Mouha and Mohammad S Raunak and D. Richard Kuhn and Raghu Kacker}, title = {Finding Bugs in Cryptographic Hash Function Implementations}, howpublished = {Cryptology ePrint Archive, Report 2017/891}, year = {2017}, url = {https://eprint.iacr.org/2017/891}, } @misc{cryptoeprint:2017:892, author = {Ritam Bhaumik and Nilanjan Datta and Avijit Dutta and Nicky Mouha and Mridul Nandi}, title = {The Iterated Random Function Problem}, howpublished = {Cryptology ePrint Archive, Report 2017/892}, year = {2017}, url = {https://eprint.iacr.org/2017/892}, } @misc{cryptoeprint:2017:893, author = {Hamza Abusalah and Jo\"el Alwen and Bram Cohen and Danylo Khilko and Krzysztof Pietrzak and Leonid Reyzin}, title = {Beyond Hellman's Time-Memory Trade-Offs with Applications to Proofs of Space}, howpublished = {Cryptology ePrint Archive, Report 2017/893}, year = {2017}, url = {https://eprint.iacr.org/2017/893}, } @misc{cryptoeprint:2017:894, author = {Prastudy Fauzi and Helger Lipmaa and Janno Siim and Michal Zajac}, title = {An Efficient Pairing-Based Shuffle Argument}, howpublished = {Cryptology ePrint Archive, Report 2017/894}, year = {2017}, url = {https://eprint.iacr.org/2017/894}, } @misc{cryptoeprint:2017:895, author = {Andrey Bogdanov and Philip S. Vejre}, title = {Linear Cryptanalysis of DES with Asymmetries}, howpublished = {Cryptology ePrint Archive, Report 2017/895}, year = {2017}, url = {https://eprint.iacr.org/2017/895}, } @misc{cryptoeprint:2017:896, author = {Ashokkumar C and M. Bhargav Sri Venkatesh and Ravi Prakash Giri and Bernard Menezes}, title = {Design, Implementation and Performance Analysis of Highly Efficient Algorithms for AES Key Retrieval in Access-driven Cache-based Side Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2017/896}, year = {2017}, url = {https://eprint.iacr.org/2017/896}, } @misc{cryptoeprint:2017:897, author = {Roderick Bloem and Hannes Gross and Rinat Iusupov and Bettina Könighofer and Stefan Mangard and Johannes Winter}, title = {Formal Verification of Masked Hardware Implementations in the Presence of Glitches}, howpublished = {Cryptology ePrint Archive, Report 2017/897}, year = {2017}, url = {https://eprint.iacr.org/2017/897}, } @misc{cryptoeprint:2017:898, author = {Stefan Kölbl}, title = {Putting Wings on SPHINCS}, howpublished = {Cryptology ePrint Archive, Report 2017/898}, year = {2017}, url = {https://eprint.iacr.org/2017/898}, } @misc{cryptoeprint:2017:899, author = {Bernardo David and Rafael Dowsley and Mario Larangeira}, title = {Kaleidoscope: An Efficient Poker Protocol with Payment Distribution and Penalty Enforcement}, howpublished = {Cryptology ePrint Archive, Report 2017/899}, year = {2017}, url = {https://eprint.iacr.org/2017/899}, } @misc{cryptoeprint:2017:900, author = {Núria Costa and Ramiro Martínez and Paz Morillo}, title = {Proof of a shuffle for lattice-based cryptography (Full version)}, howpublished = {Cryptology ePrint Archive, Report 2017/900}, year = {2017}, url = {https://eprint.iacr.org/2017/900}, } @misc{cryptoeprint:2017:901, author = {Christian Cachin and Esha Ghosh and Dimitrios Papadopoulos and Bj\"orn Tackmann}, title = {Stateful Multi-Client Verifiable Computation}, howpublished = {Cryptology ePrint Archive, Report 2017/901}, year = {2017}, url = {https://eprint.iacr.org/2017/901}, } @misc{cryptoeprint:2017:902, author = {Essam Ghadafi}, title = {How Low Can You Go? Short Structure-Preserving Signatures for Diffie-Hellman Vectors}, howpublished = {Cryptology ePrint Archive, Report 2017/902}, year = {2017}, url = {https://eprint.iacr.org/2017/902}, } @misc{cryptoeprint:2017:903, author = {Omer Paneth and Guy N. Rothblum}, title = {On Zero-Testable Homomorphic Encryption and Publicly Verifiable Non-Interactive Arguments}, howpublished = {Cryptology ePrint Archive, Report 2017/903}, year = {2017}, url = {https://eprint.iacr.org/2017/903}, } @misc{cryptoeprint:2017:904, author = {Srinivas Devadas and Ling Ren and Hanshen Xiao}, title = {On Iterative Collision Search for LPN and Subset Sum}, howpublished = {Cryptology ePrint Archive, Report 2017/904}, year = {2017}, url = {https://eprint.iacr.org/2017/904}, } @misc{cryptoeprint:2017:905, author = {Alonso González}, title = {A Ring Signature of size $\Theta(\sqrt[3]{n})$ without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2017/905}, year = {2017}, url = {https://eprint.iacr.org/2017/905}, } @misc{cryptoeprint:2017:906, author = {Martin R. Albrecht and Alex Davidson and Enrique Larraia}, title = {Notes On GGH13 Without The Presence Of Ideals}, howpublished = {Cryptology ePrint Archive, Report 2017/906}, year = {2017}, url = {https://eprint.iacr.org/2017/906}, } @misc{cryptoeprint:2017:907, author = {Anastasiya Gorodilova}, title = {On differential equivalence of APN functions}, howpublished = {Cryptology ePrint Archive, Report 2017/907}, year = {2017}, url = {https://eprint.iacr.org/2017/907}, } @misc{cryptoeprint:2017:908, author = {Ivan Damgård and Claudio Orlandi and Mark Simkin}, title = {Yet Another Compiler for Active Security or: Efficient MPC Over Arbitrary Rings}, howpublished = {Cryptology ePrint Archive, Report 2017/908}, year = {2017}, url = {https://eprint.iacr.org/2017/908}, } @misc{cryptoeprint:2017:909, author = {Jean-Philippe Aumasson and Guillaume Endignoux}, title = {Clarifying the subset-resilience problem}, howpublished = {Cryptology ePrint Archive, Report 2017/909}, year = {2017}, url = {https://eprint.iacr.org/2017/909}, } @misc{cryptoeprint:2017:910, author = {Benjamin Lac and Anne Canteaut and Jacques J.A. Fournier and Renaud Sirdey}, title = {Thwarting Fault Attacks using the Internal Redundancy Countermeasure (IRC)}, howpublished = {Cryptology ePrint Archive, Report 2017/910}, year = {2017}, url = {https://eprint.iacr.org/2017/910}, } @misc{cryptoeprint:2017:911, author = {Vincent Immler and Matthias Hiller and Qinzhi Liu and Andreas Lenz and Antonia Wachter-Zeh}, title = {Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs}, howpublished = {Cryptology ePrint Archive, Report 2017/911}, year = {2017}, url = {https://eprint.iacr.org/2017/911}, } @misc{cryptoeprint:2017:912, author = {Paul Laird}, title = {On Two Round Rerunnable MPC Protocols}, howpublished = {Cryptology ePrint Archive, Report 2017/912}, year = {2017}, url = {https://eprint.iacr.org/2017/912}, } @misc{cryptoeprint:2017:913, author = {Rafael Pass and Elaine Shi}, title = {Thunderella: Blockchains with Optimistic Instant Confirmation}, howpublished = {Cryptology ePrint Archive, Report 2017/913}, year = {2017}, url = {https://eprint.iacr.org/2017/913}, } @misc{cryptoeprint:2017:914, author = {T-H. Hubert Chan and Yue Guo and Wei-Kai Lin and Elaine Shi}, title = {Cache-Oblivious and Data-Oblivious Sorting and Applications}, howpublished = {Cryptology ePrint Archive, Report 2017/914}, year = {2017}, url = {https://eprint.iacr.org/2017/914}, } @misc{cryptoeprint:2017:915, author = {Lisa Eckey and Sebastian Faust and Julian Loss}, title = {Efficient Algorithms for Broadcast and Consensus Based on Proofs of Work}, howpublished = {Cryptology ePrint Archive, Report 2017/915}, year = {2017}, url = {https://eprint.iacr.org/2017/915}, } @misc{cryptoeprint:2017:916, author = {Eike Kiltz and Vadim Lyubashevsky and Christian Schaffner}, title = {A Concrete Treatment of Fiat-Shamir Signatures in the Quantum Random-Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2017/916}, year = {2017}, url = {https://eprint.iacr.org/2017/916}, } @misc{cryptoeprint:2017:917, author = {Moses Liskov}, title = {A practical, perfectly secure password scheme in the bounded retrieval model}, howpublished = {Cryptology ePrint Archive, Report 2017/917}, year = {2017}, url = {https://eprint.iacr.org/2017/917}, } @misc{cryptoeprint:2017:918, author = {Herv\'e Chabanne and Houssem Maghrebi and Emmanuel Prouff}, title = {Linear Repairing Codes and Side-Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2017/918}, year = {2017}, url = {https://eprint.iacr.org/2017/918}, } @misc{cryptoeprint:2017:919, author = {Oriol Farras and Tarik Kaced and Sebastia Martin and Carles Padro}, title = {Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2017/919}, year = {2017}, url = {https://eprint.iacr.org/2017/919}, } @misc{cryptoeprint:2017:920, author = {Michele Ciampi and Rafail Ostrovsky and Luisa Siniscalchi and Ivan Visconti}, title = {Round-Optimal Secure Two-Party Computation from Trapdoor Permutations}, howpublished = {Cryptology ePrint Archive, Report 2017/920}, year = {2017}, url = {https://eprint.iacr.org/2017/920}, } @misc{cryptoeprint:2017:921, author = {Shi-Feng Sun and Man Ho Au and Joseph K. Liu and Tsz Hon Yuen and Dawu Gu}, title = {RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero}, howpublished = {Cryptology ePrint Archive, Report 2017/921}, year = {2017}, url = {https://eprint.iacr.org/2017/921}, } @misc{cryptoeprint:2017:922, author = {Shachar Lovett and Jiapeng Zhang}, title = {On the impossibility of entropy reversal, and its application to zero-knowledge proofs}, howpublished = {Cryptology ePrint Archive, Report 2017/922}, year = {2017}, url = {https://eprint.iacr.org/2017/922}, } @misc{cryptoeprint:2017:923, author = {Long Chen and Zhenfeng Zhang and Xueqing Wang}, title = {Batched Multi-hop Multi-key FHE from ring-LWE with Compact Ciphertext Extension}, howpublished = {Cryptology ePrint Archive, Report 2017/923}, year = {2017}, url = {https://eprint.iacr.org/2017/923}, } @misc{cryptoeprint:2017:924, author = {T-H. Hubert Chan and Yue Guo and Wei-Kai Lin and Elaine Shi }, title = {Oblivious Hashing Revisited, and Applications to Asymptotically Efficient ORAM and OPRAM}, howpublished = {Cryptology ePrint Archive, Report 2017/924}, year = {2017}, url = {https://eprint.iacr.org/2017/924}, } @misc{cryptoeprint:2017:925, author = {Wutichai Chongchitmate and Rafail Ostrovsky and Ivan Visconti}, title = {Resettably-Sound Resettable Zero Knowledge in Constant Rounds}, howpublished = {Cryptology ePrint Archive, Report 2017/925}, year = {2017}, url = {https://eprint.iacr.org/2017/925}, } @misc{cryptoeprint:2017:926, author = {Daniel Genkin and Yual Ishai and Mor Weiss}, title = {How to Construct a Leakage-Resilient (Stateless) Trusted Party}, howpublished = {Cryptology ePrint Archive, Report 2017/926}, year = {2017}, url = {https://eprint.iacr.org/2017/926}, } @misc{cryptoeprint:2017:927, author = {Kuan Cheng and Yuval Ishai and Xin Li}, title = {Near-Optimal Secret Sharing and Error Correcting Codes in AC0}, howpublished = {Cryptology ePrint Archive, Report 2017/927}, year = {2017}, url = {https://eprint.iacr.org/2017/927}, } @misc{cryptoeprint:2017:928, author = {Jeremy Blackthorne and Benjamin Kaiser and Benjamin Fuller and Bulent Yener}, title = {Environmental Authentication in Malware}, howpublished = {Cryptology ePrint Archive, Report 2017/928}, year = {2017}, url = {https://eprint.iacr.org/2017/928}, } @misc{cryptoeprint:2017:929, author = {Dahmun Goudarzi and Antoine Joux and Matthieu Rivain}, title = {How to Securely Compute with Noisy Leakage in Quasilinear Complexity}, howpublished = {Cryptology ePrint Archive, Report 2017/929}, year = {2017}, url = {https://eprint.iacr.org/2017/929}, } @misc{cryptoeprint:2017:930, author = {Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar}, title = {Four-state Non-malleable Codes with Explicit Constant Rate}, howpublished = {Cryptology ePrint Archive, Report 2017/930}, year = {2017}, url = {https://eprint.iacr.org/2017/930}, } @misc{cryptoeprint:2017:931, author = {Michele Ciampi and Rafail Ostrovsky and Luisa Siniscalchi and Ivan Visconti}, title = {Delayed-Input Non-Malleable Zero Knowledge and Multi-Party Coin Tossing in Four Rounds}, howpublished = {Cryptology ePrint Archive, Report 2017/931}, year = {2017}, url = {https://eprint.iacr.org/2017/931}, } @misc{cryptoeprint:2017:932, author = {Nils Wisiol and Christoph Graebnitz and Marian Margraf and Manuel Oswald and Tudor A. A. Soroceanu and Benjamin Zengin}, title = {Why Attackers Lose: Design and Security Analysis of Arbitrarily Large XOR Arbiter PUFs}, howpublished = {Cryptology ePrint Archive, Report 2017/932}, year = {2017}, url = {https://eprint.iacr.org/2017/932}, } @misc{cryptoeprint:2017:933, author = {Jean-Philippe Aumasson and Guillaume Endignoux}, title = {Improving Stateless Hash-Based Signatures}, howpublished = {Cryptology ePrint Archive, Report 2017/933}, year = {2017}, url = {https://eprint.iacr.org/2017/933}, } @misc{cryptoeprint:2017:934, author = {Zahra Jafargholi and Alessandra Scafuro and Daniel Wichs}, title = {Adaptively Indistinguishable Garbled Circuits}, howpublished = {Cryptology ePrint Archive, Report 2017/934}, year = {2017}, url = {https://eprint.iacr.org/2017/934}, } @misc{cryptoeprint:2017:935, author = {Rishab Goyal and Vipul Goyal}, title = {Overcoming Cryptographic Impossibility Results using Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2017/935}, year = {2017}, url = {https://eprint.iacr.org/2017/935}, } @misc{cryptoeprint:2017:936, author = {André Chailloux and Thomas Debris-Alazard}, title = {A tight security reduction in the quantum random oracle model for code-based signature schemes}, howpublished = {Cryptology ePrint Archive, Report 2017/936}, year = {2017}, url = {https://eprint.iacr.org/2017/936}, } @misc{cryptoeprint:2017:937, author = {Sandro Coretti and Yevgeniy Dodis and Siyao Guo and John Steinberger}, title = {Random Oracles and Non-Uniformity}, howpublished = {Cryptology ePrint Archive, Report 2017/937}, year = {2017}, url = {https://eprint.iacr.org/2017/937}, } @misc{cryptoeprint:2017:938, author = {Philip Lafrance and Alfred Menezes}, title = {On the security of the WOTS-PRF signature scheme}, howpublished = {Cryptology ePrint Archive, Report 2017/938}, year = {2017}, url = {https://eprint.iacr.org/2017/938}, } @misc{cryptoeprint:2017:939, author = {Changhai Ou and Degang Sun and Zhu Wang and Xinping Zhou}, title = {Towards Optimal Pre-processing in Leakage Detection}, howpublished = {Cryptology ePrint Archive, Report 2017/939}, year = {2017}, url = {https://eprint.iacr.org/2017/939}, } @misc{cryptoeprint:2017:940, author = {Amos Beimel and Oriol Farr\`as and Yuval Mintz and Naty Peter}, title = {Linear Secret-Sharing Schemes for Forbidden Graph Access Structures}, howpublished = {Cryptology ePrint Archive, Report 2017/940}, year = {2017}, url = {https://eprint.iacr.org/2017/940}, } @misc{cryptoeprint:2017:941, author = {Reyhaneh Rabaninejad and Mahmoud Ahmadian Attari and Maryam Rajabzadeh Asaar and Mohammad Reza Aref}, title = {CoRPA: A Novel Efficient Shared Data Auditing Protocol in Cloud Storage}, howpublished = {Cryptology ePrint Archive, Report 2017/941}, year = {2017}, url = {https://eprint.iacr.org/2017/941}, } @misc{cryptoeprint:2017:942, author = {Prabhanjan Ananth and Abhishek Jain}, title = {On Secure Two-Party Computation in Three Rounds}, howpublished = {Cryptology ePrint Archive, Report 2017/942}, year = {2017}, url = {https://eprint.iacr.org/2017/942}, } @misc{cryptoeprint:2017:943, author = {Sanjam Garg and Mohammad Mahmoody and Ameer Mohammed}, title = {When does Functional Encryption Imply Obfuscation?}, howpublished = {Cryptology ePrint Archive, Report 2017/943}, year = {2017}, url = {https://eprint.iacr.org/2017/943}, } @misc{cryptoeprint:2017:944, author = {Susumu Kiyoshima and Huijia Lin and Muthuramakrishnan Venkitasubramaniam}, title = {A Unified Approach to Constructing Black-box UC Protocols in Trusted Setup Models}, howpublished = {Cryptology ePrint Archive, Report 2017/944}, year = {2017}, url = {https://eprint.iacr.org/2017/944}, } @misc{cryptoeprint:2017:945, author = {Joël Alwen and Björn Tackmann}, title = {Moderately Hard Functions: Definition, Instantiations, and Applications}, howpublished = {Cryptology ePrint Archive, Report 2017/945}, year = {2017}, url = {https://eprint.iacr.org/2017/945}, } @misc{cryptoeprint:2017:946, author = {Fermi Ma and Mark Zhandry}, title = {New Multilinear Maps from CLT13 with Provable Security Against Zeroizing Attacks}, howpublished = {Cryptology ePrint Archive, Report 2017/946}, year = {2017}, url = {https://eprint.iacr.org/2017/946}, } @misc{cryptoeprint:2017:947, author = {Carmit Hazay and Yuval Ishai and Muthuramakrishnan Venkitasubramaniam}, title = {Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model}, howpublished = {Cryptology ePrint Archive, Report 2017/947}, year = {2017}, url = {https://eprint.iacr.org/2017/947}, } @misc{cryptoeprint:2017:948, author = {Ilan Komargodski and Anat Paskin-Cherniavsky}, title = {Evolving Secret Sharing: Dynamic Thresholds and Robustness}, howpublished = {Cryptology ePrint Archive, Report 2017/948}, year = {2017}, url = {https://eprint.iacr.org/2017/948}, } @misc{cryptoeprint:2017:949, author = {Gunnar Hartung and Björn Kaidel and Alexander Koch and Jessica Koch and Dominik Hartmann}, title = {Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures}, howpublished = {Cryptology ePrint Archive, Report 2017/949}, year = {2017}, url = {https://eprint.iacr.org/2017/949}, } @misc{cryptoeprint:2017:950, author = {Saeed Mahloujifar and Mohammad Mahmoody}, title = {Blockwise $p$-Tampering Attacks on Cryptographic Primitives, Extractors, and Learners}, howpublished = {Cryptology ePrint Archive, Report 2017/950}, year = {2017}, url = {https://eprint.iacr.org/2017/950}, } @misc{cryptoeprint:2017:951, author = {Nina Bindel and Johannes Buchmann and Juliane Krämer and Heiko Mantel and Johannes Schickel and Alexandra Weber}, title = {Bounding the cache-side-channel leakage of lattice-based signature schemes using program semantics}, howpublished = {Cryptology ePrint Archive, Report 2017/951}, year = {2017}, url = {https://eprint.iacr.org/2017/951}, } @misc{cryptoeprint:2017:952, author = {Yehuda Lindell and Tal Rabin}, title = {Secure Two-Party Computation with Fairness -- A Necessary Design Principle}, howpublished = {Cryptology ePrint Archive, Report 2017/952}, year = {2017}, url = {https://eprint.iacr.org/2017/952}, } @misc{cryptoeprint:2017:953, author = {George Teseleanu}, title = {Threshold Kleptographic Attacks on Discrete Logarithm Based Signatures}, howpublished = {Cryptology ePrint Archive, Report 2017/953}, year = {2017}, url = {https://eprint.iacr.org/2017/953}, } @misc{cryptoeprint:2017:954, author = {Debajyoti Das and Sebastian Meiser and Esfandiar Mohammadi and Aniket Kate}, title = {Anonymity Trilemma: Strong Anonymity, Low Bandwidth, Low Latency---Choose Two}, howpublished = {Cryptology ePrint Archive, Report 2017/954}, year = {2017}, url = {https://eprint.iacr.org/2017/954}, } @misc{cryptoeprint:2017:955, author = {Charlotte Bonte and Eleftheria Makri and Amin Ardeshirdavani and Jaak Simm and Yves Moreau and Frederik Vercauteren}, title = {Privacy-Preserving Genome-Wide Association Study is Practical }, howpublished = {Cryptology ePrint Archive, Report 2017/955}, year = {2017}, url = {https://eprint.iacr.org/2017/955}, } @misc{cryptoeprint:2017:956, author = {Dan Boneh and Rosario Gennaro and Steven Goldfeder and Aayush Jain and Sam Kim and Peter M. R. Rasmussen and Amit Sahai}, title = {Threshold Cryptosystems From Threshold Fully Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/956}, year = {2017}, url = {https://eprint.iacr.org/2017/956}, } @misc{cryptoeprint:2017:957, author = {Nico Döttling and Sanjam Garg}, title = {From Selective IBE to Full IBE and Selective HIBE}, howpublished = {Cryptology ePrint Archive, Report 2017/957}, year = {2017}, url = {https://eprint.iacr.org/2017/957}, } @misc{cryptoeprint:2017:958, author = {Nico Döttling and Nils Fleischhacker and Johannes Krupp and Dominique Schröder}, title = {Two-Message, Oblivious Evaluation of Cryptographic Functionalities}, howpublished = {Cryptology ePrint Archive, Report 2017/958}, year = {2017}, url = {https://eprint.iacr.org/2017/958}, } @misc{cryptoeprint:2017:959, author = {Dung Hoang Duong and Masaya Yasuda and Tsuyoshi Takagi}, title = {Choosing Parameters for the Subfield Lattice Attack against overstretched NTRU}, howpublished = {Cryptology ePrint Archive, Report 2017/959}, year = {2017}, url = {https://eprint.iacr.org/2017/959}, } @misc{cryptoeprint:2017:960, author = {Gorjan Alagic and Tommaso Gagliardoni and Christian Majenz}, title = {Unforgeable Quantum Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/960}, year = {2017}, url = {https://eprint.iacr.org/2017/960}, } @misc{cryptoeprint:2017:961, author = {Jos\'{e} Becerra and Petra Sala and Marjan \v{S}krobot}, title = {An Offline Dictionary Attack against zkPAKE Protocol}, howpublished = {Cryptology ePrint Archive, Report 2017/961}, year = {2017}, url = {https://eprint.iacr.org/2017/961}, } @misc{cryptoeprint:2017:962, author = {Christophe Petit and Kristin Lauter}, title = {Hard and easy problems for supersingular isogeny graphs}, howpublished = {Cryptology ePrint Archive, Report 2017/962}, year = {2017}, url = {https://eprint.iacr.org/2017/962}, } @misc{cryptoeprint:2017:963, author = {Aggelos Kiayias and Andrew Miller and Dionysis Zindros}, title = {Non-interactive proofs of proof-of-work}, howpublished = {Cryptology ePrint Archive, Report 2017/963}, year = {2017}, url = {https://eprint.iacr.org/2017/963}, } @misc{cryptoeprint:2017:964, author = {Sarvar Patel and Giuseppe Persiano and Kevin Yeo}, title = {Recursive ORAMs with Practical Constructions}, howpublished = {Cryptology ePrint Archive, Report 2017/964}, year = {2017}, url = {https://eprint.iacr.org/2017/964}, } @misc{cryptoeprint:2017:965, author = {Andreas H{\"u}lsing}, title = {WOTS+ -- Shorter Signatures for Hash-Based Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2017/965}, year = {2017}, url = {https://eprint.iacr.org/2017/965}, } @misc{cryptoeprint:2017:966, author = {Andreas H\"{u}lsing and Lea Rausch and Johannes Buchmann}, title = {Optimal Parameters for XMSS^MT}, howpublished = {Cryptology ePrint Archive, Report 2017/966}, year = {2017}, url = {https://eprint.iacr.org/2017/966}, } @misc{cryptoeprint:2017:967, author = {Zvika Brakerski and Alex Lombardi and Gil Segev and Vinod Vaikuntanathan}, title = {Anonymous IBE, Leakage Resilience and Circular Security from New Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2017/967}, year = {2017}, url = {https://eprint.iacr.org/2017/967}, } @misc{cryptoeprint:2017:968, author = {Sarani Bhattacharya and Clementine Maurice and Shivam Bhasin and Debdeep Mukhopadhyay}, title = {Template Attack on Blinded Scalar Multiplication with Asynchronous perf-ioctl Calls}, howpublished = {Cryptology ePrint Archive, Report 2017/968}, year = {2017}, url = {https://eprint.iacr.org/2017/968}, } @misc{cryptoeprint:2017:969, author = {Bei Liang and Aikaterini Mitrokotsa}, title = {Fast and Adaptively Secure Signatures in the Random Oracle Model from Indistinguishability Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2017/969}, year = {2017}, url = {https://eprint.iacr.org/2017/969}, } @misc{cryptoeprint:2017:970, author = {Jia Xu and Ee-Chien Chang and Jianying Zhou}, title = {A New Functional Encryption for Multidimensional Range Query}, howpublished = {Cryptology ePrint Archive, Report 2017/970}, year = {2017}, url = {https://eprint.iacr.org/2017/970}, } @misc{cryptoeprint:2017:971, author = {Abdelrahaman Aly and Sara Cleemput}, title = {An Improved Protocol for Securely Solving the Shortest Path Problem and its Application to Combinatorial Auctions}, howpublished = {Cryptology ePrint Archive, Report 2017/971}, year = {2017}, url = {https://eprint.iacr.org/2017/971}, } @misc{cryptoeprint:2017:972, author = {Michel Abdalla and Dario Catalano and Dario Fiore and Romain Gay and Bogdan Ursu}, title = {Multi-Input Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions without Pairings}, howpublished = {Cryptology ePrint Archive, Report 2017/972}, year = {2017}, url = {https://eprint.iacr.org/2017/972}, } @misc{cryptoeprint:2017:973, author = {Sarvar Patel and Giuseppe Persiano and Kevin Yeo}, title = {Symmetric Searchable Encryption with Sharing and Unsharing}, howpublished = {Cryptology ePrint Archive, Report 2017/973}, year = {2017}, url = {https://eprint.iacr.org/2017/973}, } @misc{cryptoeprint:2017:974, author = {Muoi Tran and Loi Luu and Min Suk Kang and Iddo Bentov and Prateek Saxena}, title = {Obscuro: A Bitcoin Mixer using Trusted Execution Environments}, howpublished = {Cryptology ePrint Archive, Report 2017/974}, year = {2017}, url = {https://eprint.iacr.org/2017/974}, } @misc{cryptoeprint:2017:975, author = {Christopher Ambrose and Joppe W. Bos and Björn Fay and Marc Joye and Manfred Lochter and Bruce Murray}, title = {Differential Attacks on Deterministic Signatures}, howpublished = {Cryptology ePrint Archive, Report 2017/975}, year = {2017}, url = {https://eprint.iacr.org/2017/975}, } @misc{cryptoeprint:2017:976, author = {Mike Rosulek}, title = {Improvements for Gate-Hiding Garbled Circuits}, howpublished = {Cryptology ePrint Archive, Report 2017/976}, year = {2017}, url = {https://eprint.iacr.org/2017/976}, } @misc{cryptoeprint:2017:977, author = {Akinori Hosoyamada and Yu Sasaki}, title = {Cryptanalysis against Symmetric-Key Schemes with Online Classical Queries and Offline Quantum Computations}, howpublished = {Cryptology ePrint Archive, Report 2017/977}, year = {2017}, url = {https://eprint.iacr.org/2017/977}, } @misc{cryptoeprint:2017:978, author = {Nico Döttling and Sanjam Garg and Mohammad Hajiabadi and Daniel Masny}, title = {New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2017/978}, year = {2017}, url = {https://eprint.iacr.org/2017/978}, } @misc{cryptoeprint:2017:979, author = {Irene Giacomelli and Somesh Jha and Marc Joye and C. David Page and Kyonghwan Yoon}, title = {Privacy-Preserving Ridge Regression over Distributed Data from LHE}, howpublished = {Cryptology ePrint Archive, Report 2017/979}, year = {2017}, url = {https://eprint.iacr.org/2017/979}, } @misc{cryptoeprint:2017:980, author = {Sondre R{\o}njom and Navid Ghaedi Bardeh and Tor Helleseth}, title = {Yoyo Tricks with AES}, howpublished = {Cryptology ePrint Archive, Report 2017/980}, year = {2017}, url = {https://eprint.iacr.org/2017/980}, } @misc{cryptoeprint:2017:981, author = {Marcel Keller and Avishay Yanai}, title = {Efficient Maliciously Secure Multiparty Computation for RAM}, howpublished = {Cryptology ePrint Archive, Report 2017/981}, year = {2017}, url = {https://eprint.iacr.org/2017/981}, } @misc{cryptoeprint:2017:982, author = {Katriel Cohn-Gordon and Cas Cremers}, title = {Mind the Gap: Where Provable Security and Real-World Messaging Don't Quite Meet}, howpublished = {Cryptology ePrint Archive, Report 2017/982}, year = {2017}, url = {https://eprint.iacr.org/2017/982}, } @misc{cryptoeprint:2017:983, author = {Miguel Ambrona and Gilles Barthe and Romain Gay and Hoeteck Wee}, title = {Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions}, howpublished = {Cryptology ePrint Archive, Report 2017/983}, year = {2017}, url = {https://eprint.iacr.org/2017/983}, } @misc{cryptoeprint:2017:984, author = {Marc Fischlin and Sogol Mazaheri}, title = {Self-Guarding Cryptographic Protocols against Algorithm Substitution Attacks}, howpublished = {Cryptology ePrint Archive, Report 2017/984}, year = {2017}, url = {https://eprint.iacr.org/2017/984}, } @misc{cryptoeprint:2017:985, author = {Niels Samwel and Lejla Batina and Guido Bertoni and Joan Daemen and Ruggero Susella}, title = {Breaking Ed25519 in WolfSSL}, howpublished = {Cryptology ePrint Archive, Report 2017/985}, year = {2017}, url = {https://eprint.iacr.org/2017/985}, } @misc{cryptoeprint:2017:986, author = {Kirsten Eisentraeger and Sean Hallgren and Travis Morrison}, title = {On the Hardness of Computing Endomorphism Rings of Supersingular Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2017/986}, year = {2017}, url = {https://eprint.iacr.org/2017/986}, } @misc{cryptoeprint:2017:987, author = {Fuyuki Kitagawa and Keisuke Tanaka}, title = {Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2017/987}, year = {2017}, url = {https://eprint.iacr.org/2017/987}, } @misc{cryptoeprint:2017:988, author = {Yusong Du and Baodian Wei}, title = {On Rejection Sampling Algorithms for Centered Discrete Gaussian Distribution over Integers}, howpublished = {Cryptology ePrint Archive, Report 2017/988}, year = {2017}, url = {https://eprint.iacr.org/2017/988}, } @misc{cryptoeprint:2017:989, author = {Jérémy Chotard and Edouard Dufour Sans and Duong Hieu Phan and David Pointcheval}, title = {Decentralized Multi-Client Functional Encryption for Inner Product}, howpublished = {Cryptology ePrint Archive, Report 2017/989}, year = {2017}, url = {https://eprint.iacr.org/2017/989}, } @misc{cryptoeprint:2017:990, author = {Sumanta Sarkar and Habeeb Syed}, title = {Bounds on the Differential Branch Number of Permutations}, howpublished = {Cryptology ePrint Archive, Report 2017/990}, year = {2017}, url = {https://eprint.iacr.org/2017/990}, } @misc{cryptoeprint:2017:991, author = {Wei Feng and Yu Qin and Shijun Zhao and Dengguo Feng}, title = {Secure Code Updates for Smart Embedded Devices based on PUFs}, howpublished = {Cryptology ePrint Archive, Report 2017/991}, year = {2017}, url = {https://eprint.iacr.org/2017/991}, } @misc{cryptoeprint:2017:992, author = {Thomas Unterluggauer and Thomas Korak and Stefan Mangard and Robert Schilling and Luca Benini and Frank Gürkaynak and Michael Muehlberghuber}, title = {Leakage Bounds for Gaussian Side Channels}, howpublished = {Cryptology ePrint Archive, Report 2017/992}, year = {2017}, url = {https://eprint.iacr.org/2017/992}, } @misc{cryptoeprint:2017:993, author = {Paulo S. L. M. Barreto and Bernardo David and Rafael Dowsley and Kirill Morozov and Anderson C. A. Nascimento}, title = {A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM}, howpublished = {Cryptology ePrint Archive, Report 2017/993}, year = {2017}, url = {https://eprint.iacr.org/2017/993}, } @misc{cryptoeprint:2017:994, author = {S. Fauskanger and I. Semaev}, title = {Separable Statistics and Multidimensional Linear Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2017/994}, year = {2017}, url = {https://eprint.iacr.org/2017/994}, } @misc{cryptoeprint:2017:995, author = {Jeffrey Hoffstein and Jill Pipher and William Whyte and Zhenfei Zhang}, title = {A signature scheme from Learning with Truncation}, howpublished = {Cryptology ePrint Archive, Report 2017/995}, year = {2017}, url = {https://eprint.iacr.org/2017/995}, } @misc{cryptoeprint:2017:996, author = {Guillaume Bonnoron and Léo Ducas and Max Fillinger}, title = {Large FHE gates from Tensored Homomorphic Accumulator}, howpublished = {Cryptology ePrint Archive, Report 2017/996}, year = {2017}, url = {https://eprint.iacr.org/2017/996}, } @misc{cryptoeprint:2017:997, author = {Fabrice Benhamouda and Olivier Blazy and Léo Ducas and Willy Quach}, title = {Hash Proof Systems over Lattices Revisited}, howpublished = {Cryptology ePrint Archive, Report 2017/997}, year = {2017}, url = {https://eprint.iacr.org/2017/997}, } @misc{cryptoeprint:2017:998, author = {Yuanqi Shen and Amin Rezaei and Hai Zhou}, title = {A Comparative Investigation of Approximate Attacks on Logic Encryptions}, howpublished = {Cryptology ePrint Archive, Report 2017/998}, year = {2017}, url = {https://eprint.iacr.org/2017/998}, } @misc{cryptoeprint:2017:999, author = {Léo Ducas}, title = {Shortest Vector from Lattice Sieving: a Few Dimensions for Free}, howpublished = {Cryptology ePrint Archive, Report 2017/999}, year = {2017}, url = {https://eprint.iacr.org/2017/999}, } @misc{cryptoeprint:2018:001, author = {Benny Applebaum and Barak Arkis}, title = {Conditional Disclosure of Secrets and $d$-Uniform Secret Sharing with Constant Information Rate}, howpublished = {Cryptology ePrint Archive, Report 2018/001}, year = {2018}, url = {https://eprint.iacr.org/2018/001}, } @misc{cryptoeprint:2018:002, author = {Cagdas Calik and Meltem Sonmez Turan and Rene Peralta}, title = {The Multiplicative Complexity of 6-variable Boolean Functions}, howpublished = {Cryptology ePrint Archive, Report 2018/002}, year = {2018}, url = {https://eprint.iacr.org/2018/002}, } @misc{cryptoeprint:2018:003, author = {Moni Naor and Benny Pinkas and Eyal Ronen}, title = {How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior}, howpublished = {Cryptology ePrint Archive, Report 2018/003}, year = {2018}, url = {https://eprint.iacr.org/2018/003}, } @misc{cryptoeprint:2018:004, author = {Stjepan Picek and Ioannis Petros Samiotis and Annelie Heuser and Jaehun Kim and Shivam Bhasin and Axel Legay}, title = {On the Performance of Deep Learning for Side-channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2018/004}, year = {2018}, url = {https://eprint.iacr.org/2018/004}, } @misc{cryptoeprint:2018:005, author = {Xiao Wang and Dov Gordon and Jonathan Katz }, title = {Simple and Efficient Two-Server ORAM}, howpublished = {Cryptology ePrint Archive, Report 2018/005}, year = {2018}, url = {https://eprint.iacr.org/2018/005}, } @misc{cryptoeprint:2018:006, author = {Liran Lerman and Stjepan Picek and Nikita Veshchikov and Olivier Markowitch}, title = {Higher Order Side-Channel Attacks Resilient S-boxes}, howpublished = {Cryptology ePrint Archive, Report 2018/006}, year = {2018}, url = {https://eprint.iacr.org/2018/006}, } @misc{cryptoeprint:2018:007, author = {Qiong Huang and Hongbo Li}, title = {An Efficient Public-Key Searchable Encryption Scheme Secure against Inside Keyword Guessing Attacks}, howpublished = {Cryptology ePrint Archive, Report 2018/007}, year = {2018}, url = {https://eprint.iacr.org/2018/007}, } @misc{cryptoeprint:2018:008, author = {Yu-Ao Chen and Xiao-Shan Gao}, title = {Quantum Algorithms for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2018/008}, year = {2018}, url = {https://eprint.iacr.org/2018/008}, } @misc{cryptoeprint:2018:009, author = {Jérôme Courtois and Lokman Abbas-Turki and Jean-Claude Bajard}, title = {Evaluation of Resilience of randomized RNS implementation }, howpublished = {Cryptology ePrint Archive, Report 2018/009}, year = {2018}, url = {https://eprint.iacr.org/2018/009}, } @misc{cryptoeprint:2018:010, author = {Thomas Agrikola and Dennis Hofheinz}, title = {Interactively Secure Groups from Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2018/010}, year = {2018}, url = {https://eprint.iacr.org/2018/010}, } @misc{cryptoeprint:2018:011, author = {Pooya Farshim and Julia Hesse and Dennis Hofheinz and Enrique Larraia}, title = {Graded Encoding Schemes from Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2018/011}, year = {2018}, url = {https://eprint.iacr.org/2018/011}, } @misc{cryptoeprint:2018:012, author = {Falk Schellenberg and Dennis R.E. Gnad and Amir Moradi and Mehdi B. Tahoori}, title = {An Inside Job: Remote Power Analysis Attacks on FPGAs}, howpublished = {Cryptology ePrint Archive, Report 2018/012}, year = {2018}, url = {https://eprint.iacr.org/2018/012}, } @misc{cryptoeprint:2018:013, author = {Benedikt Auerbach and Bertram Poettering}, title = {Hashing solutions instead of generating problems: On the interactive certification of RSA moduli}, howpublished = {Cryptology ePrint Archive, Report 2018/013}, year = {2018}, url = {https://eprint.iacr.org/2018/013}, } @misc{cryptoeprint:2018:014, author = {Kaiyan Zheng and Peng Wang}, title = {Ubiquitous Weak-key Classes of BRW-polynomial Function}, howpublished = {Cryptology ePrint Archive, Report 2018/014}, year = {2018}, url = {https://eprint.iacr.org/2018/014}, } @misc{cryptoeprint:2018:015, author = {Christian Badertscher and Ueli Maurer and Björn Tackmann}, title = {On Composable Security for Digital Signatures}, howpublished = {Cryptology ePrint Archive, Report 2018/015}, year = {2018}, url = {https://eprint.iacr.org/2018/015}, } @misc{cryptoeprint:2018:016, author = {Murali Godi and Roopa Vishwanathan}, title = {New Techniques for Public Key Encryption with Sender Recovery}, howpublished = {Cryptology ePrint Archive, Report 2018/016}, year = {2018}, url = {https://eprint.iacr.org/2018/016}, } @misc{cryptoeprint:2018:017, author = {Ben Smyth}, title = {Verifiability of Helios Mixnet}, howpublished = {Cryptology ePrint Archive, Report 2018/017}, year = {2018}, url = {https://eprint.iacr.org/2018/017}, } @misc{cryptoeprint:2018:018, author = {Ariel Hamlin and abhi shelat and Mor Weiss and Daniel Wichs}, title = {Multi-Key Searchable Encryption, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2018/018}, year = {2018}, url = {https://eprint.iacr.org/2018/018}, } @misc{cryptoeprint:2018:019, author = {Daniel P. Martin and Luke Mather and Elisabeth Oswald}, title = {Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited. }, howpublished = {Cryptology ePrint Archive, Report 2018/019}, year = {2018}, url = {https://eprint.iacr.org/2018/019}, } @misc{cryptoeprint:2018:020, author = {Haoyu Li and Renzhang Liu and Yanbin Pan and Tianyuan Xie}, title = {Cryptanalysis of Compact-LWE Submitted to NIST PQC Project}, howpublished = {Cryptology ePrint Archive, Report 2018/020}, year = {2018}, url = {https://eprint.iacr.org/2018/020}, } @misc{cryptoeprint:2018:021, author = {Yu Chen and Baodong Qin and Haiyang Xue}, title = {Regularly Lossy Functions and Their Applications}, howpublished = {Cryptology ePrint Archive, Report 2018/021}, year = {2018}, url = {https://eprint.iacr.org/2018/021}, } @misc{cryptoeprint:2018:022, author = {Ali El Kaafarani and Shuichi Katsumata}, title = {Attribute-based Signatures for Unbounded Circuits in the ROM and Efficient Instantiations from Lattices}, howpublished = {Cryptology ePrint Archive, Report 2018/022}, year = {2018}, url = {https://eprint.iacr.org/2018/022}, } @misc{cryptoeprint:2018:023, author = {Benedikt Auerbach and Mihir Bellare and Eike Kiltz}, title = {Public-Key Encryption Resistant to Parameter Subversion and its Realization from Efficiently-Embeddable Groups}, howpublished = {Cryptology ePrint Archive, Report 2018/023}, year = {2018}, url = {https://eprint.iacr.org/2018/023}, } @misc{cryptoeprint:2018:024, author = {Federico Giacon and Felix Heuer and Bertram Poettering}, title = {KEM Combiners}, howpublished = {Cryptology ePrint Archive, Report 2018/024}, year = {2018}, url = {https://eprint.iacr.org/2018/024}, } @misc{cryptoeprint:2018:025, author = {Zhengan Huang and Junzuo Lai and Wenbin Chen and Man Ho Au and Zhen Peng and Jin Li}, title = {Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures}, howpublished = {Cryptology ePrint Archive, Report 2018/025}, year = {2018}, url = {https://eprint.iacr.org/2018/025}, } @misc{cryptoeprint:2018:026, author = {Christopher Carr and Anamaria Costache and Gareth T. Davies and Kristian Gjøsteen and Martin Strand}, title = {Zero-Knowledge Proof of Decryption for FHE Ciphertexts}, howpublished = {Cryptology ePrint Archive, Report 2018/026}, year = {2018}, url = {https://eprint.iacr.org/2018/026}, } @misc{cryptoeprint:2018:027, author = {Martin Strand}, title = {A verifiable shuffle for the GSW cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2018/027}, year = {2018}, url = {https://eprint.iacr.org/2018/027}, } @misc{cryptoeprint:2018:028, author = {Muslum Ozgur Ozmen and Rouzbeh Behnia and Attila A. Yavuz}, title = {Compact Energy and Delay-aware Authentication}, howpublished = {Cryptology ePrint Archive, Report 2018/028}, year = {2018}, url = {https://eprint.iacr.org/2018/028}, } @misc{cryptoeprint:2018:029, author = {Johannes Blömer and Fabian Eidens and Jakob Juhnke}, title = {Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems}, howpublished = {Cryptology ePrint Archive, Report 2018/029}, year = {2018}, url = {https://eprint.iacr.org/2018/029}, } @misc{cryptoeprint:2018:030, author = {Lin Lyu and Shengli Liu and Shuai Han and Dawu Gu}, title = {Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2018/030}, year = {2018}, url = {https://eprint.iacr.org/2018/030}, } @misc{cryptoeprint:2018:031, author = {Markus Jakobsson}, title = {Secure Remote Attestation}, howpublished = {Cryptology ePrint Archive, Report 2018/031}, year = {2018}, url = {https://eprint.iacr.org/2018/031}, } @misc{cryptoeprint:2018:032, author = {Markus Jakobsson}, title = {Publicly Verifiable Proofs of Space}, howpublished = {Cryptology ePrint Archive, Report 2018/032}, year = {2018}, url = {https://eprint.iacr.org/2018/032}, } @misc{cryptoeprint:2018:033, author = {Stanislaw Jarecki and Hugo Krawczyk and Maliheh Shirvanian and Nitesh Saxena}, title = {Two-Factor Authentication with End-to-End Password Security}, howpublished = {Cryptology ePrint Archive, Report 2018/033}, year = {2018}, url = {https://eprint.iacr.org/2018/033}, } @misc{cryptoeprint:2018:034, author = {San Ling and Khoa Nguyen and Huaxiong Wang and Yanhong Xu}, title = {Constant-size Group Signatures from Lattices}, howpublished = {Cryptology ePrint Archive, Report 2018/034}, year = {2018}, url = {https://eprint.iacr.org/2018/034}, } @misc{cryptoeprint:2018:035, author = {Lucas Schabh\"user and Johannes Buchmann and Patrick Struck}, title = {A Linearly Homomorphic Signature Scheme From Weaker Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2018/035}, year = {2018}, url = {https://eprint.iacr.org/2018/035}, } @misc{cryptoeprint:2018:036, author = {Peter Scholl}, title = {Extending Oblivious Transfer with Low Communication via Key-Homomorphic PRFs}, howpublished = {Cryptology ePrint Archive, Report 2018/036}, year = {2018}, url = {https://eprint.iacr.org/2018/036}, } @misc{cryptoeprint:2018:037, author = {Georg Fuchsbauer and Romain Gay}, title = {Weakly Secure Equivalence-Class Signatures from Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2018/037}, year = {2018}, url = {https://eprint.iacr.org/2018/037}, } @misc{cryptoeprint:2018:038, author = {Yuval Ishai and Manika Mittal and Rafail Ostrovsky}, title = {On the Message Complexity of Secure Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2018/038}, year = {2018}, url = {https://eprint.iacr.org/2018/038}, } @misc{cryptoeprint:2018:039, author = {Gregor Seiler}, title = {Faster AVX2 optimized NTT multiplication for Ring-LWE lattice cryptography}, howpublished = {Cryptology ePrint Archive, Report 2018/039}, year = {2018}, url = {https://eprint.iacr.org/2018/039}, } @misc{cryptoeprint:2018:040, author = {Seb Neumayer and Mayank Varia and Ittay Eyal}, title = {An Analysis of Acceptance Policies For Blockchain Transactions}, howpublished = {Cryptology ePrint Archive, Report 2018/040}, year = {2018}, url = {https://eprint.iacr.org/2018/040}, } @misc{cryptoeprint:2018:041, author = {Takahiro Matsuda and Jacob C.N. Schuldt}, title = {Related Randomness Security for Public Key Encryption, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2018/041}, year = {2018}, url = {https://eprint.iacr.org/2018/041}, } @misc{cryptoeprint:2018:042, author = {Charanjit S. Jutla and Miyako Ohkubo and Arnab Roy}, title = {Improved (Almost) Tightly-Secure Structure-Preserving Signatures}, howpublished = {Cryptology ePrint Archive, Report 2018/042}, year = {2018}, url = {https://eprint.iacr.org/2018/042}, } @misc{cryptoeprint:2018:043, author = {Chaya Ganesh and Yashvanth Kondi and Arpita Patra and Pratik Sarkar}, title = {Efficient Adaptively Secure Zero-knowledge from Garbled Circuits}, howpublished = {Cryptology ePrint Archive, Report 2018/043}, year = {2018}, url = {https://eprint.iacr.org/2018/043}, } @misc{cryptoeprint:2018:044, author = {Tadanori Teruya and Kenji Kashiwabara and Goichiro Hanaoka}, title = {Fast Lattice Basis Reduction Suitable for Massive Parallelization and Its Application to the Shortest Vector Problem}, howpublished = {Cryptology ePrint Archive, Report 2018/044}, year = {2018}, url = {https://eprint.iacr.org/2018/044}, } @misc{cryptoeprint:2018:045, author = {Jonathan Bootle and Jens Groth}, title = {Efficient Batch Zero-Knowledge Arguments for Low Degree Polynomials}, howpublished = {Cryptology ePrint Archive, Report 2018/045}, year = {2018}, url = {https://eprint.iacr.org/2018/045}, } @misc{cryptoeprint:2018:046, author = {Eli Ben-Sasson and Iddo Bentov and Yinon Horesh and Michael Riabzev}, title = {Scalable, transparent, and post-quantum secure computational integrity}, howpublished = {Cryptology ePrint Archive, Report 2018/046}, year = {2018}, url = {https://eprint.iacr.org/2018/046}, } @misc{cryptoeprint:2018:047, author = {Boris Ryabko and Aleksandr Soskov}, title = {The distinguishing attack on Speck, Simon, Simeck, HIGHT and LEA}, howpublished = {Cryptology ePrint Archive, Report 2018/047}, year = {2018}, url = {https://eprint.iacr.org/2018/047}, } @misc{cryptoeprint:2018:048, author = {Alireza mehrdad and Farokhlagha Moazami and Hadi Soleimany}, title = {Impossible Differential Cryptanalysis on Deoxys-BC-256}, howpublished = {Cryptology ePrint Archive, Report 2018/048}, year = {2018}, url = {https://eprint.iacr.org/2018/048}, } @misc{cryptoeprint:2018:049, author = {Alex Biryukov and Aleksei Udovenko}, title = {Attacks and Countermeasures for White-box Designs}, howpublished = {Cryptology ePrint Archive, Report 2018/049}, year = {2018}, url = {https://eprint.iacr.org/2018/049}, } @misc{cryptoeprint:2018:050, author = {Christian Badertscher and Fabio Banfi and Ueli Maurer}, title = {A Constructive Perspective on Signcryption Security}, howpublished = {Cryptology ePrint Archive, Report 2018/050}, year = {2018}, url = {https://eprint.iacr.org/2018/050}, } @misc{cryptoeprint:2018:051, author = {Eftychios Theodorakis and John C. Mitchell}, title = {Semantic Security Invariance under Variant Computational Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2018/051}, year = {2018}, url = {https://eprint.iacr.org/2018/051}, } @misc{cryptoeprint:2018:052, author = {Mohammad Etemad and Mohammad Mahmoody and David Evans}, title = {Optimizing Trees for Static Searchable Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/052}, year = {2018}, url = {https://eprint.iacr.org/2018/052}, } @misc{cryptoeprint:2018:053, author = {Emmanuel Prouff and Remi Strullu and Ryad Benadjila and Eleonora Cagli and Cecile Dumas}, title = {Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database}, howpublished = {Cryptology ePrint Archive, Report 2018/053}, year = {2018}, url = {https://eprint.iacr.org/2018/053}, } @misc{cryptoeprint:2018:054, author = {Romain Gay and Dennis Hofheinz and Lisa Kohl and Jiaxin Pan}, title = {More Efficient (Almost) Tightly Secure Structure-Preserving Signatures}, howpublished = {Cryptology ePrint Archive, Report 2018/054}, year = {2018}, url = {https://eprint.iacr.org/2018/054}, } @misc{cryptoeprint:2018:055, author = {Florian Unterstein and Johann Heyszl and Fabrizio De Santis and Robert Specht and Georg Sigl}, title = {High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And An Improved Construction}, howpublished = {Cryptology ePrint Archive, Report 2018/055}, year = {2018}, url = {https://eprint.iacr.org/2018/055}, } @misc{cryptoeprint:2018:056, author = {François Gérard and Keno Merckx}, title = {Post-Quantum Signcryption From Lattice-Based Signatures}, howpublished = {Cryptology ePrint Archive, Report 2018/056}, year = {2018}, url = {https://eprint.iacr.org/2018/056}, } @misc{cryptoeprint:2018:057, author = {Foteini Baldimtsi and Sharon Goldberg and Leonid Reyzin and Omar Sagga}, title = {Certifying RSA Public Keys with an Efficient NIZK}, howpublished = {Cryptology ePrint Archive, Report 2018/057}, year = {2018}, url = {https://eprint.iacr.org/2018/057}, } @misc{cryptoeprint:2018:058, author = {Divesh Aggarwal and Tomasz Kazana and Maciej Obremski}, title = {Leakage-resilient Algebraic Manipulation Detection Codes with Optimal Parameters}, howpublished = {Cryptology ePrint Archive, Report 2018/058}, year = {2018}, url = {https://eprint.iacr.org/2018/058}, } @misc{cryptoeprint:2018:059, author = {Chen-Dong Ye and Tian Tian}, title = {New Insights into Divide-and-Conquer Attacks on the Round-Reduced Keccak-MAC}, howpublished = {Cryptology ePrint Archive, Report 2018/059}, year = {2018}, url = {https://eprint.iacr.org/2018/059}, } @misc{cryptoeprint:2018:060, author = {Abhinav Aggarwal and Yue Guo}, title = {A Simple Reduction from State Machine Replication to Binary Agreement in Partially Synchronous or Asynchronous Networks}, howpublished = {Cryptology ePrint Archive, Report 2018/060}, year = {2018}, url = {https://eprint.iacr.org/2018/060}, } @misc{cryptoeprint:2018:061, author = {Pratish Datta and Tatsuaki Okamoto and Junichi Tomida}, title = {Full-Hiding (Unbounded) Multi-Input Inner Product Functional Encryption from the $k$-Linear Assumption}, howpublished = {Cryptology ePrint Archive, Report 2018/061}, year = {2018}, url = {https://eprint.iacr.org/2018/061}, } @misc{cryptoeprint:2018:062, author = {Na-Young Ahn and Dong Hoon Lee }, title = {Countermeasures against a side-channel attack in a kernel memory}, howpublished = {Cryptology ePrint Archive, Report 2018/062}, year = {2018}, url = {https://eprint.iacr.org/2018/062}, } @misc{cryptoeprint:2018:063, author = {Panos Kampanakis and Peter Panburana and Ellie Daw and Daniel Van Geest}, title = {The Viability of Post-quantum X.509 Certificates}, howpublished = {Cryptology ePrint Archive, Report 2018/063}, year = {2018}, url = {https://eprint.iacr.org/2018/063}, } @misc{cryptoeprint:2018:064, author = {Sukanya Saha and Krishnendu Rarhi and Abhishek Bhattacharya}, title = {Systematization Of A 256-Bit Lightweight Block Cipher Marvin}, howpublished = {Cryptology ePrint Archive, Report 2018/064}, year = {2018}, url = {https://eprint.iacr.org/2018/064}, } @misc{cryptoeprint:2018:065, author = {Claude Cr\'epeau and Nan Yang}, title = {New Perspectives on Multi-Prover Interactive Proofs}, howpublished = {Cryptology ePrint Archive, Report 2018/065}, year = {2018}, url = {https://eprint.iacr.org/2018/065}, } @misc{cryptoeprint:2018:066, author = {Hassan Qahur Al Mahri and Leonie Simpson and Harry Bartlett and Ed Dawson and Kenneth Koon-Ho Wong}, title = {Tweaking Generic OTR to Avoid Forgery Attacks}, howpublished = {Cryptology ePrint Archive, Report 2018/066}, year = {2018}, url = {https://eprint.iacr.org/2018/066}, } @misc{cryptoeprint:2018:067, author = {Hao Chen and Kyoohyung Han}, title = {Homomorphic Lower Digits Removal and Improved FHE Bootstrapping}, howpublished = {Cryptology ePrint Archive, Report 2018/067}, year = {2018}, url = {https://eprint.iacr.org/2018/067}, } @misc{cryptoeprint:2018:068, author = {Gregory Maxwell and Andrew Poelstra and Yannick Seurin and Pieter Wuille}, title = {Simple Schnorr Multi-Signatures with Applications to Bitcoin}, howpublished = {Cryptology ePrint Archive, Report 2018/068}, year = {2018}, url = {https://eprint.iacr.org/2018/068}, } @misc{cryptoeprint:2018:069, author = {Marc Beunardeau and Aisling Connolly and Houda Ferradi and Rémi Géraud and David Naccache and Damien Vergnaud}, title = {Reusing Nonces in Schnorr Signatures}, howpublished = {Cryptology ePrint Archive, Report 2018/069}, year = {2018}, url = {https://eprint.iacr.org/2018/069}, } @misc{cryptoeprint:2018:070, author = {Craig Gentry and Adam O'Neill and Leonid Reyzin}, title = {A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures}, howpublished = {Cryptology ePrint Archive, Report 2018/070}, year = {2018}, url = {https://eprint.iacr.org/2018/070}, } @misc{cryptoeprint:2018:071, author = {Christoph Dobraunig and Maria Eichlseder and Thomas Korak and Stefan Mangard and Florian Mendel and Robert Primas}, title = {Exploiting Ineffective Fault Inductions on Symmetric Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2018/071}, year = {2018}, url = {https://eprint.iacr.org/2018/071}, } @misc{cryptoeprint:2018:072, author = {Ashrujit Ghoshal and Sikhar Patranabis and Debdeep Mukhopadhyay}, title = {Template-based Fault Injection Analysis of Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2018/072}, year = {2018}, url = {https://eprint.iacr.org/2018/072}, } @misc{cryptoeprint:2018:073, author = {Chiraag Juvekar and Vinod Vaikuntanathan and Anantha Chandrakasan}, title = {GAZELLE: A Low Latency Framework for Secure Neural Network Inference}, howpublished = {Cryptology ePrint Archive, Report 2018/073}, year = {2018}, url = {https://eprint.iacr.org/2018/073}, } @misc{cryptoeprint:2018:074, author = {Miran Kim and Yongsoo Song and Shuang Wang and Yuhou Xia and Xiaoqian Jiang}, title = {Secure Logistic Regression based on Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/074}, year = {2018}, url = {https://eprint.iacr.org/2018/074}, } @misc{cryptoeprint:2018:075, author = {Wenquan Bi and Xiaoyang Dong and Zheng Li and Rui Zong and Xiaoyun Wang}, title = {MILP-aided Cube-attack-like Cryptanalysis on Keccak Keyed Modes}, howpublished = {Cryptology ePrint Archive, Report 2018/075}, year = {2018}, url = {https://eprint.iacr.org/2018/075}, } @misc{cryptoeprint:2018:076, author = {Daniel Dinu and Ilya Kizhvatov}, title = {EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread}, howpublished = {Cryptology ePrint Archive, Report 2018/076}, year = {2018}, url = {https://eprint.iacr.org/2018/076}, } @misc{cryptoeprint:2018:077, author = {Daniele Micciancio and Michael Walter}, title = {On the Bit Security of Cryptographic Primitives}, howpublished = {Cryptology ePrint Archive, Report 2018/077}, year = {2018}, url = {https://eprint.iacr.org/2018/077}, } @misc{cryptoeprint:2018:078, author = {Alexander Chepurnoy and Vasily Kharin and Dmitry Meshkov}, title = {A Systematic Approach To Cryptocurrency Fees}, howpublished = {Cryptology ePrint Archive, Report 2018/078}, year = {2018}, url = {https://eprint.iacr.org/2018/078}, } @misc{cryptoeprint:2018:079, author = {Thijs Laarhoven and Artur Mariano}, title = {Progressive lattice sieving}, howpublished = {Cryptology ePrint Archive, Report 2018/079}, year = {2018}, url = {https://eprint.iacr.org/2018/079}, } @misc{cryptoeprint:2018:080, author = {Benjamin Dowling and Kenneth G. Paterson}, title = {A Cryptographic Analysis of the WireGuard Protocol}, howpublished = {Cryptology ePrint Archive, Report 2018/080}, year = {2018}, url = {https://eprint.iacr.org/2018/080}, } @misc{cryptoeprint:2018:081, author = {Jintai Ding and Saraswathy RV and Saed Alsayigh and Crystal Clough}, title = {How to validate the secret of a Ring Learning with Errors (RLWE) key}, howpublished = {Cryptology ePrint Archive, Report 2018/081}, year = {2018}, url = {https://eprint.iacr.org/2018/081}, } @misc{cryptoeprint:2018:082, author = {Susan Hohenberger and Brent Waters}, title = {Synchronized Aggregate Signatures from the RSA Assumption}, howpublished = {Cryptology ePrint Archive, Report 2018/082}, year = {2018}, url = {https://eprint.iacr.org/2018/082}, } @misc{cryptoeprint:2018:083, author = {Maki Yoshida and Satoshi Obana}, title = {Flaws in a Verifiably Multiplicative Secret Sharing Scheme from ICITS 2017}, howpublished = {Cryptology ePrint Archive, Report 2018/083}, year = {2018}, url = {https://eprint.iacr.org/2018/083}, } @misc{cryptoeprint:2018:084, author = {Gideon Samid}, title = {Threat-Adjusting Security: BitFlip as an AI-Ready, Post-Quantum cipher}, howpublished = {Cryptology ePrint Archive, Report 2018/084}, year = {2018}, url = {https://eprint.iacr.org/2018/084}, } @misc{cryptoeprint:2018:085, author = {Anubhab Baksi and Shivam Bhasin and Jakub Breier and Mustafa Khairallah and Thomas Peyrin}, title = {Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version)}, howpublished = {Cryptology ePrint Archive, Report 2018/085}, year = {2018}, url = {https://eprint.iacr.org/2018/085}, } @misc{cryptoeprint:2018:086, author = {Claude Carlet and Xi Chen}, title = {Constructing low-weight dth-order correlation-immune Boolean functions through the Fourier-Hadamard transform}, howpublished = {Cryptology ePrint Archive, Report 2018/086}, year = {2018}, url = {https://eprint.iacr.org/2018/086}, } @misc{cryptoeprint:2018:087, author = {Alexei Zamyatin and Nicholas Stifter and Aljosha Judmayer and Philipp Schindler and Edgar Weippl and William J. Knottenbelt}, title = {(Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice}, howpublished = {Cryptology ePrint Archive, Report 2018/087}, year = {2018}, url = {https://eprint.iacr.org/2018/087}, } @misc{cryptoeprint:2018:088, author = {Masahiro Yagisawa}, title = {Fully homomorphic public-key encryption with small ciphertext size}, howpublished = {Cryptology ePrint Archive, Report 2018/088}, year = {2018}, url = {https://eprint.iacr.org/2018/088}, } @misc{cryptoeprint:2018:089, author = {Marcos A. Simplicio Jr. and Eduardo Lopes Cominetti and Harsh Kupwade Patil and Jefferson E. Ricardini and Marcos Vinicius M. Silva}, title = {The Unified Butterfly Effect: Efficient Security Credential Management System for Vehicular Communications}, howpublished = {Cryptology ePrint Archive, Report 2018/089}, year = {2018}, url = {https://eprint.iacr.org/2018/089}, } @misc{cryptoeprint:2018:090, author = {Cédric Van Rompay and Refik Molva and Melek Önen}, title = {Secure and Scalable Multi-User Searchable Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/090}, year = {2018}, url = {https://eprint.iacr.org/2018/090}, } @misc{cryptoeprint:2018:091, author = {Alessandro De Piccoli and Andrea Visconti and Ottavio Giulio Rizzo}, title = {Polynomial multiplication over binary finite fields: new upper bounds}, howpublished = {Cryptology ePrint Archive, Report 2018/091}, year = {2018}, url = {https://eprint.iacr.org/2018/091}, } @misc{cryptoeprint:2018:092, author = {Kerem Varici and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {Constructions of S-boxes with uniform sharing}, howpublished = {Cryptology ePrint Archive, Report 2018/092}, year = {2018}, url = {https://eprint.iacr.org/2018/092}, } @misc{cryptoeprint:2018:093, author = {Kenneth G. Paterson and Jacob C.N. Schuldt}, title = {Statistical Attacks on Cookie Masking for RC4}, howpublished = {Cryptology ePrint Archive, Report 2018/093}, year = {2018}, url = {https://eprint.iacr.org/2018/093}, } @misc{cryptoeprint:2018:094, author = {Linh Tung Vo}, title = {Parameterization of Edwards curves on the rational field Q with given torsion subgroups}, howpublished = {Cryptology ePrint Archive, Report 2018/094}, year = {2018}, url = {https://eprint.iacr.org/2018/094}, } @misc{cryptoeprint:2018:095, author = {Cees-Bart Breunesse and Ilya Kizhvatov and Ruben Muijrers and Albert Spruyt}, title = {Towards Fully Automated Analysis of Whiteboxes: Perfect Dimensionality Reduction for Perfect Leakage}, howpublished = {Cryptology ePrint Archive, Report 2018/095}, year = {2018}, url = {https://eprint.iacr.org/2018/095}, } @misc{cryptoeprint:2018:096, author = {Fan Zhang and Philip Daian and Iddo Bentov and Ari Juels}, title = {Paralysis Proofs: Safe Access-Structure Updates for Cryptocurrencies and More}, howpublished = {Cryptology ePrint Archive, Report 2018/096}, year = {2018}, url = {https://eprint.iacr.org/2018/096}, } @misc{cryptoeprint:2018:097, author = {Andrea Visconti and Federico Gorla}, title = {Exploiting an HMAC-SHA-1 optimization to speed up PBKDF2}, howpublished = {Cryptology ePrint Archive, Report 2018/097}, year = {2018}, url = {https://eprint.iacr.org/2018/097}, } @misc{cryptoeprint:2018:098, author = {Louis Goubin and Pascal Paillier and Matthieu Rivain and Junwei Wang}, title = {How to Reveal the Secrets of an Obscure White-Box Implementation}, howpublished = {Cryptology ePrint Archive, Report 2018/098}, year = {2018}, url = {https://eprint.iacr.org/2018/098}, } @misc{cryptoeprint:2018:099, author = {Ignacio Cascudo and Jaron Skovsted Gundersen and Diego Ruano}, title = {Improved Bounds on the Threshold Gap in Ramp Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2018/099}, year = {2018}, url = {https://eprint.iacr.org/2018/099}, } @misc{cryptoeprint:2018:1000, author = {Nuttapong Attrapadung and Takahiro Matsuda and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, title = {Adaptively Single-Key Secure Constrained PRFs for NC1}, howpublished = {Cryptology ePrint Archive, Report 2018/1000}, year = {2018}, url = {https://eprint.iacr.org/2018/1000}, } @misc{cryptoeprint:2018:1001, author = {Sergiu Carpov and Caroline Fontaine and Damien Ligier and Renaud Sirdey}, title = {Illuminating the Dark or how to recover what should not be seen}, howpublished = {Cryptology ePrint Archive, Report 2018/1001}, year = {2018}, url = {https://eprint.iacr.org/2018/1001}, } @misc{cryptoeprint:2018:1002, author = {C Ashokkumar and Bholanath Roy and M Bhargav Sri Venkatesh and Bernard L Menezes}, title = {"S-Box" Implementation of AES is NOT side-channel resistant}, howpublished = {Cryptology ePrint Archive, Report 2018/1002}, year = {2018}, url = {https://eprint.iacr.org/2018/1002}, } @misc{cryptoeprint:2018:1003, author = {Adi Akavia and Dan Feldman and Hayim Shaul}, title = {Secure Data Retrieval On The Cloud Homomorphic Encryption Meets Coresets}, howpublished = {Cryptology ePrint Archive, Report 2018/1003}, year = {2018}, url = {https://eprint.iacr.org/2018/1003}, } @misc{cryptoeprint:2018:1004, author = {Ran Canetti and Yilei Chen and Justin Holmgren and Alex Lombardi and Guy N. Rothblum and Ron D. Rothblum}, title = {Fiat-Shamir From Simpler Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2018/1004}, year = {2018}, url = {https://eprint.iacr.org/2018/1004}, } @misc{cryptoeprint:2018:1005, author = {Luke Demarest and Benjamin Fuller and Alexander Russell}, title = {Handling Correlated Errors: Hardness of LWE in the Exponent}, howpublished = {Cryptology ePrint Archive, Report 2018/1005}, year = {2018}, url = {https://eprint.iacr.org/2018/1005}, } @misc{cryptoeprint:2018:1006, author = {Yehuda Lindell and Ariel Nof and Samuel Ranellucci}, title = {Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody}, howpublished = {Cryptology ePrint Archive, Report 2018/1006}, year = {2018}, url = {https://eprint.iacr.org/2018/1006}, } @misc{cryptoeprint:2018:1007, author = {Hannes Gross and Lauren De Meyer and Martin Krenn and Stefan Mangard}, title = {Masking the AES with Only Two Random Bits}, howpublished = {Cryptology ePrint Archive, Report 2018/1007}, year = {2018}, url = {https://eprint.iacr.org/2018/1007}, } @misc{cryptoeprint:2018:1008, author = {Kaushik Nath and Palash Sarkar}, title = {Efficient Inversion In (Pseudo-)Mersenne Prime Order Fields}, howpublished = {Cryptology ePrint Archive, Report 2018/1008}, year = {2018}, url = {https://eprint.iacr.org/2018/1008}, } @misc{cryptoeprint:2018:1009, author = {Xianhui Lu and Yamin Liu and Zhenfei Zhang and Dingding Jia and Haiyang Xue and Jingnan He and Bao Li}, title = {LAC: Practical Ring-LWE Based Public-Key Encryption with Byte-Level Modulus}, howpublished = {Cryptology ePrint Archive, Report 2018/1009}, year = {2018}, url = {https://eprint.iacr.org/2018/1009}, } @misc{cryptoeprint:2018:100, author = {Hart Montgomery}, title = {A Nonstandard Variant of Learning with Rounding with Polynomial Modulus and Unbounded Samples}, howpublished = {Cryptology ePrint Archive, Report 2018/100}, year = {2018}, url = {https://eprint.iacr.org/2018/100}, } @misc{cryptoeprint:2018:1010, author = {Aggelos Kiayias and Murat Osmanoglu and Alexander Russell and Qiang Tang}, title = {Space Efficient Computational Multi-Secret Sharing and Its Applications}, howpublished = {Cryptology ePrint Archive, Report 2018/1010}, year = {2018}, url = {https://eprint.iacr.org/2018/1010}, } @misc{cryptoeprint:2018:1011, author = {Anne Canteaut and Virginie Lallemand and Gregor Leander and Patrick Neumann and Friedrich Wiemer}, title = {BISON - Instantiating the Whitened Swap-Or-Not Construction}, howpublished = {Cryptology ePrint Archive, Report 2018/1011}, year = {2018}, url = {https://eprint.iacr.org/2018/1011}, } @misc{cryptoeprint:2018:1012, author = {Guido Bertoni and Joan Daemen and Seth Hoffert and Michaël Peeters and Gilles Van Assche and Ronny Van Keer}, title = {The authenticated encryption schemes Kravatte-SANE and Kravatte-SANSE}, howpublished = {Cryptology ePrint Archive, Report 2018/1012}, year = {2018}, url = {https://eprint.iacr.org/2018/1012}, } @misc{cryptoeprint:2018:1013, author = {Eduardo Chielle and Oleg Mazonka and Nektarios Georgios Tsoutsos and Michail Maniatakos}, title = {E$^3$: A Framework for Compiling C++ Programs with Encrypted Operands}, howpublished = {Cryptology ePrint Archive, Report 2018/1013}, year = {2018}, url = {https://eprint.iacr.org/2018/1013}, } @misc{cryptoeprint:2018:1014, author = {Eduardo Cuevas-Farf\'an and Miguel Morales-Sandoval and Ren\'e Cumplido}, title = {An FPGA-based programmable processor for bilinear pairings}, howpublished = {Cryptology ePrint Archive, Report 2018/1014}, year = {2018}, url = {https://eprint.iacr.org/2018/1014}, } @misc{cryptoeprint:2018:1015, author = {Marshall Ball and Dana Dachman-Soled and Mukul Kulkarni and Huijia Lin and Tal Malkin}, title = {Non-Malleable Codes Against Bounded Polynomial Time Tampering}, howpublished = {Cryptology ePrint Archive, Report 2018/1015}, year = {2018}, url = {https://eprint.iacr.org/2018/1015}, } @misc{cryptoeprint:2018:1016, author = {Gerben Geltink}, title = {Concealing Ketje: A Lightweight PUF-Based Privacy Preserving Authentication Protocol}, howpublished = {Cryptology ePrint Archive, Report 2018/1016}, year = {2018}, url = {https://eprint.iacr.org/2018/1016}, } @misc{cryptoeprint:2018:1017, author = {Georgios Fotiadis and Elisavet Konstantinou}, title = {TNFS Resistant Families of Pairing-Friendly Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2018/1017}, year = {2018}, url = {https://eprint.iacr.org/2018/1017}, } @misc{cryptoeprint:2018:1018, author = {Matthias J. Kannwischer and Joost Rijneveld and Peter Schwabe}, title = {Faster multiplication in $\mathbb{Z}_{2^m}[x]$ on Cortex-M4 to speed up NIST PQC candidates}, howpublished = {Cryptology ePrint Archive, Report 2018/1018}, year = {2018}, url = {https://eprint.iacr.org/2018/1018}, } @misc{cryptoeprint:2018:1019, author = {Chloé Hébant and Duong Hieu Phan and David Pointcheval}, title = {Decentralized Evaluation of Quadratic Polynomials on Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2018/1019}, year = {2018}, url = {https://eprint.iacr.org/2018/1019}, } @misc{cryptoeprint:2018:101, author = {Mustafa A. Mustafa and Sara Cleemput and Abdelrahaman Aly and Aysajan Abidin}, title = {A Secure and Privacy-preserving Protocol for Smart Metering Operational Data Collection}, howpublished = {Cryptology ePrint Archive, Report 2018/101}, year = {2018}, url = {https://eprint.iacr.org/2018/101}, } @misc{cryptoeprint:2018:1020, author = {Saikrishna Badrinarayanan and Abhishek Jain and Rafail Ostrovsky and Ivan Visconti}, title = {Non-Interactive Secure Computation from One-Way Functions}, howpublished = {Cryptology ePrint Archive, Report 2018/1020}, year = {2018}, url = {https://eprint.iacr.org/2018/1020}, } @misc{cryptoeprint:2018:1021, author = {Jérémy Chotard and Edouard Dufour Sans and Romain Gay and Duong Hieu Phan and David Pointcheval}, title = {Multi-Client Functional Encryption with Repetition for Inner Product}, howpublished = {Cryptology ePrint Archive, Report 2018/1021}, year = {2018}, url = {https://eprint.iacr.org/2018/1021}, } @misc{cryptoeprint:2018:1022, author = {Liang Wang and Gilad Asharov and Rafael Pass and Thomas Ristenpart and abhi shelat}, title = {Blind Certificate Authorities}, howpublished = {Cryptology ePrint Archive, Report 2018/1022}, year = {2018}, url = {https://eprint.iacr.org/2018/1022}, } @misc{cryptoeprint:2018:1023, author = {Jaehun Kim and Stjepan Picek and Annelie Heuser and Shivam Bhasin and Alan Hanjalic}, title = {Make Some Noise: Unleashing the Power of Convolutional Neural Networks for Profiled Side-channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2018/1023}, year = {2018}, url = {https://eprint.iacr.org/2018/1023}, } @misc{cryptoeprint:2018:1024, author = {Sinisa Matetic and Karl Wüst and Moritz Schneider and Ian Miers and Kari Kostiainen and Srdjan Capkun}, title = {ZLiTE: Lightweight Clients for Shielded Zcash Transactions using Trusted Execution}, howpublished = {Cryptology ePrint Archive, Report 2018/1024}, year = {2018}, url = {https://eprint.iacr.org/2018/1024}, } @misc{cryptoeprint:2018:1025, author = {Yanan Bai and Jingwei Chen and Yong Feng and Wenyuan Wu}, title = {Integer Matrices Homomorphic Encryption and Its application}, howpublished = {Cryptology ePrint Archive, Report 2018/1025}, year = {2018}, url = {https://eprint.iacr.org/2018/1025}, } @misc{cryptoeprint:2018:1026, author = {Chitchanok Chuengsatiansup and Chloe Martindale}, title = {Pairing-Friendly Twisted Hessian Curves}, howpublished = {Cryptology ePrint Archive, Report 2018/1026}, year = {2018}, url = {https://eprint.iacr.org/2018/1026}, } @misc{cryptoeprint:2018:1027, author = {Diana Maimut and George Teseleanu}, title = {A Unified Security Perspective on Legally Fair Contract Signing Protocols}, howpublished = {Cryptology ePrint Archive, Report 2018/1027}, year = {2018}, url = {https://eprint.iacr.org/2018/1027}, } @misc{cryptoeprint:2018:1028, author = {Ittai Abraham and Srinivas Devadas and Danny Dolev and Kartik Nayak and Ling Ren}, title = {Synchronous Byzantine Agreement with Expected $O(1)$ Rounds, Expected $O(n^2)$ Communication, and Optimal Resilience}, howpublished = {Cryptology ePrint Archive, Report 2018/1028}, year = {2018}, url = {https://eprint.iacr.org/2018/1028}, } @misc{cryptoeprint:2018:1029, author = {Zhe Li and Chaoping Xing and Sze Ling Yeo}, title = {Reducing the Key Size of McEliece Cryptosystem from Goppa Codes via Permutations}, howpublished = {Cryptology ePrint Archive, Report 2018/1029}, year = {2018}, url = {https://eprint.iacr.org/2018/1029}, } @misc{cryptoeprint:2018:102, author = {Laurent Castelnovi and Ange Martinelli and Thomas Prest}, title = {Grafting Trees: a Fault Attack against the SPHINCS framework}, howpublished = {Cryptology ePrint Archive, Report 2018/102}, year = {2018}, url = {https://eprint.iacr.org/2018/102}, } @misc{cryptoeprint:2018:1030, author = {Sanjam Garg and Mohammad Hajiabadi and Mohammad Mahmoody and Ahmadreza Rahimi and Sruthi Sekar}, title = {Registration-Based Encryption from Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2018/1030}, year = {2018}, url = {https://eprint.iacr.org/2018/1030}, } @misc{cryptoeprint:2018:1031, author = {Roderick Bloem and Hannes Gross and Rinat Iusupov and Martin Krenn and Stefan Mangard}, title = {Sharing Independence & Relabeling: Efficient Formal Verification of Higher-Order Masking}, howpublished = {Cryptology ePrint Archive, Report 2018/1031}, year = {2018}, url = {https://eprint.iacr.org/2018/1031}, } @misc{cryptoeprint:2018:1032, author = {Diego Chialva and Ann Dooms}, title = {Conditionals in Homomorphic Encryption and Machine Learning Applications}, howpublished = {Cryptology ePrint Archive, Report 2018/1032}, year = {2018}, url = {https://eprint.iacr.org/2018/1032}, } @misc{cryptoeprint:2018:1033, author = {Atsushi Fujioka and Katsuyuki Takashima and Kazuki Yoneyama}, title = {One-Round Authenticated Group Key Exchange from Isogenies}, howpublished = {Cryptology ePrint Archive, Report 2018/1033}, year = {2018}, url = {https://eprint.iacr.org/2018/1033}, } @misc{cryptoeprint:2018:1034, author = {Michael Kraitsberg and Yehuda Lindell and Valery Osheter and Younes Talibi Alaoui}, title = {Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2018/1034}, year = {2018}, url = {https://eprint.iacr.org/2018/1034}, } @misc{cryptoeprint:2018:1035, author = {Madalina Bolboceanu}, title = {Relating different Polynomial-LWE problems}, howpublished = {Cryptology ePrint Archive, Report 2018/1035}, year = {2018}, url = {https://eprint.iacr.org/2018/1035}, } @misc{cryptoeprint:2018:1036, author = {Anne Canteaut and Léo Perrin and Shizhu Tian}, title = {If a Generalised Butterfly is APN then it Operates on 6 Bits}, howpublished = {Cryptology ePrint Archive, Report 2018/1036}, year = {2018}, url = {https://eprint.iacr.org/2018/1036}, } @misc{cryptoeprint:2018:1037, author = {Jo\"el Alwen and Sandro Coretti and Yevgeniy Dodis}, title = {The Double Ratchet: Security Notions, Proofs, and Modularization for the Signal Protocol}, howpublished = {Cryptology ePrint Archive, Report 2018/1037}, year = {2018}, url = {https://eprint.iacr.org/2018/1037}, } @misc{cryptoeprint:2018:1038, author = {Michael Scott}, title = {On inversion modulo pseudo-Mersenne primes}, howpublished = {Cryptology ePrint Archive, Report 2018/1038}, year = {2018}, url = {https://eprint.iacr.org/2018/1038}, } @misc{cryptoeprint:2018:1039, author = {Georg Fuchsbauer and Michele Orrù and Yannick Seurin}, title = {Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble}, howpublished = {Cryptology ePrint Archive, Report 2018/1039}, year = {2018}, url = {https://eprint.iacr.org/2018/1039}, } @misc{cryptoeprint:2018:103, author = {Svetla Nikova and Ventzislav Nikov and Vincent Rijmen }, title = {Decomposition of Permutations in a Finite Field}, howpublished = {Cryptology ePrint Archive, Report 2018/103}, year = {2018}, url = {https://eprint.iacr.org/2018/103}, } @misc{cryptoeprint:2018:1040, author = {Akiko Inoue and Kazuhiko Minematsu}, title = {Cryptanalysis of OCB2}, howpublished = {Cryptology ePrint Archive, Report 2018/1040}, year = {2018}, url = {https://eprint.iacr.org/2018/1040}, } @misc{cryptoeprint:2018:1041, author = {Xiaoqian Jiang and Miran Kim and Kristin Lauter and Yongsoo Song}, title = {Secure Outsourced Matrix Computation and Application to Neural Networks}, howpublished = {Cryptology ePrint Archive, Report 2018/1041}, year = {2018}, url = {https://eprint.iacr.org/2018/1041}, } @misc{cryptoeprint:2018:1042, author = {Brice Colombier and Alexandre Menu and Jean-Max Dutertre and Pierre-Alain Moëllic and Jean-Baptiste Rigaud and Jean-Luc Danger}, title = {Laser-induced Single-bit Faults in Flash Memory: Instructions Corruption on a 32-bit Microcontroller}, howpublished = {Cryptology ePrint Archive, Report 2018/1042}, year = {2018}, url = {https://eprint.iacr.org/2018/1042}, } @misc{cryptoeprint:2018:1043, author = {Hao Chen and Ilaria Chillotti and Yongsoo Song}, title = {Improved Bootstrapping for Approximate Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/1043}, year = {2018}, url = {https://eprint.iacr.org/2018/1043}, } @misc{cryptoeprint:2018:1044, author = {Masahito Ishizaka and Kanta Matsuura}, title = {Strongly Unforgeable Signatures Resilient to Polynomially Hard-to-Invert Leakage under Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2018/1044}, year = {2018}, url = {https://eprint.iacr.org/2018/1044}, } @misc{cryptoeprint:2018:1045, author = {John Cartlidge and Nigel P. Smart and Younes Talibi Alaoui}, title = {MPC Joins the Dark Side}, howpublished = {Cryptology ePrint Archive, Report 2018/1045}, year = {2018}, url = {https://eprint.iacr.org/2018/1045}, } @misc{cryptoeprint:2018:1046, author = {Claude Carlet and Xi Chen* and Longjiang Qu}, title = {Constructing Infinite Families of Low Differential Uniformity $(n,m)$-Functions with $m>n/2$}, howpublished = {Cryptology ePrint Archive, Report 2018/1046}, year = {2018}, url = {https://eprint.iacr.org/2018/1046}, } @misc{cryptoeprint:2018:1047, author = {Seungkwang Lee and Nam-su Jho and Myungchul Kim}, title = {A Key Leakage Preventive White-box Cryptographic Implementation}, howpublished = {Cryptology ePrint Archive, Report 2018/1047}, year = {2018}, url = {https://eprint.iacr.org/2018/1047}, } @misc{cryptoeprint:2018:1048, author = {Aggelos Kiayias and Dionysis Zindros}, title = {Proof-of-Work Sidechains}, howpublished = {Cryptology ePrint Archive, Report 2018/1048}, year = {2018}, url = {https://eprint.iacr.org/2018/1048}, } @misc{cryptoeprint:2018:1049, author = {Aggelos Kiayias and Alexander Russell}, title = {Ouroboros-BFT: A Simple Byzantine Fault Tolerant Consensus Protocol}, howpublished = {Cryptology ePrint Archive, Report 2018/1049}, year = {2018}, url = {https://eprint.iacr.org/2018/1049}, } @misc{cryptoeprint:2018:104, author = {Yonatan Sompolinsky and Aviv Zohar}, title = {PHANTOM: A Scalable BlockDAG Protocol}, howpublished = {Cryptology ePrint Archive, Report 2018/104}, year = {2018}, url = {https://eprint.iacr.org/2018/104}, } @misc{cryptoeprint:2018:1050, author = {Easwar Vivek Mangipudi and Krutarth Rao and Jeremy Clark and Aniket Kate}, title = {Automated Penalization of Data Breaches using Crypto-augmented Smart Contracts}, howpublished = {Cryptology ePrint Archive, Report 2018/1050}, year = {2018}, url = {https://eprint.iacr.org/2018/1050}, } @misc{cryptoeprint:2018:1051, author = {Giuseppe Persiano and Kevin Yeo}, title = {Lower Bounds for Differentially Private RAMs}, howpublished = {Cryptology ePrint Archive, Report 2018/1051}, year = {2018}, url = {https://eprint.iacr.org/2018/1051}, } @misc{cryptoeprint:2018:1052, author = {David Bernhard and Véronique Cortier and Pierrick Gaudry and Mathieu Turuani and Bogdan Warinschi}, title = {Verifiability Analysis of CHVote}, howpublished = {Cryptology ePrint Archive, Report 2018/1052}, year = {2018}, url = {https://eprint.iacr.org/2018/1052}, } @misc{cryptoeprint:2018:1053, author = {Jothi Rangasamy and Lakshmi Kuppusamy}, title = {Revisiting Single-server Algorithms for Outsourcing Modular Exponentiation}, howpublished = {Cryptology ePrint Archive, Report 2018/1053}, year = {2018}, url = {https://eprint.iacr.org/2018/1053}, } @misc{cryptoeprint:2018:1054, author = {Tanping Zhou and Ningbo Li and Xiaoyuan Yang and Yiliang Han and Wenchao Liu}, title = {Efficient Multi-key FHE with short extended ciphertexts and less public parameters}, howpublished = {Cryptology ePrint Archive, Report 2018/1054}, year = {2018}, url = {https://eprint.iacr.org/2018/1054}, } @misc{cryptoeprint:2018:1055, author = {Pan Dongxue and Li Hongda and Ni Peifang}, title = {Candidate Differing-Inputs Obfuscation from Indistinguishability Obfuscation and Auxiliary-Input Point Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2018/1055}, year = {2018}, url = {https://eprint.iacr.org/2018/1055}, } @misc{cryptoeprint:2018:1056, author = {Ahmad Al Badawi and Jin Chao and Jie Lin and Chan Fook Mun and Sim Jun Jie and Benjamin Hong Meng Tan and Xiao Nan and Khin Mi Mi Aung and Vijay Ramaseshan Chandrasekhar}, title = {The AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data with GPUs}, howpublished = {Cryptology ePrint Archive, Report 2018/1056}, year = {2018}, url = {https://eprint.iacr.org/2018/1056}, } @misc{cryptoeprint:2018:1057, author = {Liliya Akhmetzyanova and Cas Cremers and Luke Garratt and Stanislav V. Smyshlyaev}, title = {Security Analysis for Randomness Improvements for Security Protocols}, howpublished = {Cryptology ePrint Archive, Report 2018/1057}, year = {2018}, url = {https://eprint.iacr.org/2018/1057}, } @misc{cryptoeprint:2018:1058, author = {Yuzhao Cui and Qiong Huang and Jianye Huang and Hongbo Li and Guomin Yang}, title = {Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification}, howpublished = {Cryptology ePrint Archive, Report 2018/1058}, year = {2018}, url = {https://eprint.iacr.org/2018/1058}, } @misc{cryptoeprint:2018:1059, author = {Daniel J. Bernstein and Tanja Lange and Chloe Martindale and Lorenz Panny}, title = {Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies}, howpublished = {Cryptology ePrint Archive, Report 2018/1059}, year = {2018}, url = {https://eprint.iacr.org/2018/1059}, } @misc{cryptoeprint:2018:105, author = {Michele Ciampi and Claudio Orlandi}, title = {Combining Private Set-Intersection with Secure Two-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2018/105}, year = {2018}, url = {https://eprint.iacr.org/2018/105}, } @misc{cryptoeprint:2018:1060, author = {Alejandro Cabrera Aldaya and Billy Bob Brumley and Sohaib ul Hassan and Cesar Pereida Garc\'ia and Nicola Tuveri}, title = {Port Contention for Fun and Profit}, howpublished = {Cryptology ePrint Archive, Report 2018/1060}, year = {2018}, url = {https://eprint.iacr.org/2018/1060}, } @misc{cryptoeprint:2018:1061, author = {Behnam Zahednejad and Majid Bayat and Ashok Kumar Das}, title = {On the Design of a Secure Proxy Signature-based Handover Authentication Scheme for LTEWireless Networks}, howpublished = {Cryptology ePrint Archive, Report 2018/1061}, year = {2018}, url = {https://eprint.iacr.org/2018/1061}, } @misc{cryptoeprint:2018:1062, author = {Manuel Zander and Tom Waite and Dominik Harz}, title = {DAGsim: Simulation of DAG-based distributed ledger protocols}, howpublished = {Cryptology ePrint Archive, Report 2018/1062}, year = {2018}, url = {https://eprint.iacr.org/2018/1062}, } @misc{cryptoeprint:2018:1063, author = {Mashael AlSabah and Gabriele Oligeri and Ryan Riley}, title = {Your Culture is in Your Password: An Analysis of a Demographically-diverse Password Dataset}, howpublished = {Cryptology ePrint Archive, Report 2018/1063}, year = {2018}, url = {https://eprint.iacr.org/2018/1063}, } @misc{cryptoeprint:2018:1064, author = {Nithyashankari Gummidipoondi Jayasankaran and Adriana Sanabria Borbon and Edgar Sanchez-Sinencio and Jiang Hu and Jeyavijayan Rajendran}, title = {Towards Provably-Secure Analog and Mixed-Signal Locking Against Overproduction}, howpublished = {Cryptology ePrint Archive, Report 2018/1064}, year = {2018}, url = {https://eprint.iacr.org/2018/1064}, } @misc{cryptoeprint:2018:1065, author = {Russell W. F. Lai and Giulio Malavolta and Dominique Schröder }, title = {Homomorphic Secret Sharing for Low Degree Polynomials}, howpublished = {Cryptology ePrint Archive, Report 2018/1065}, year = {2018}, url = {https://eprint.iacr.org/2018/1065}, } @misc{cryptoeprint:2018:1066, author = {Akinori Hosoyamada and Takashi Yamakawa}, title = {Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness}, howpublished = {Cryptology ePrint Archive, Report 2018/1066}, year = {2018}, url = {https://eprint.iacr.org/2018/1066}, } @misc{cryptoeprint:2018:1067, author = {Xavier Bonnetain and María Naya-Plasencia and André Schrottenloher}, title = {On Quantum Slide Attacks}, howpublished = {Cryptology ePrint Archive, Report 2018/1067}, year = {2018}, url = {https://eprint.iacr.org/2018/1067}, } @misc{cryptoeprint:2018:1068, author = {Dana Dachman-Soled and Huijing Gong and Mukul Kulkarni and Aria Shahverdi}, title = {Partial Key Exposure in Ring-LWE-Based Cryptosystems: Attacks and Resilience}, howpublished = {Cryptology ePrint Archive, Report 2018/1068}, year = {2018}, url = {https://eprint.iacr.org/2018/1068}, } @misc{cryptoeprint:2018:1069, author = {Eshan Chattopadhyay and Xin Li}, title = {Non-Malleable Extractors and Codes for Composition of Tampering, Interleaved Tampering and More}, howpublished = {Cryptology ePrint Archive, Report 2018/1069}, year = {2018}, url = {https://eprint.iacr.org/2018/1069}, } @misc{cryptoeprint:2018:106, author = {Sebastian Berndt and Maciej Liśkiewicz}, title = {On the Gold Standard for Security of Universal Steganography}, howpublished = {Cryptology ePrint Archive, Report 2018/106}, year = {2018}, url = {https://eprint.iacr.org/2018/106}, } @misc{cryptoeprint:2018:1070, author = {Kwak Wi Song and Kim Chol Un}, title = {A New Batch FHE Scheme over the Integers}, howpublished = {Cryptology ePrint Archive, Report 2018/1070}, year = {2018}, url = {https://eprint.iacr.org/2018/1070}, } @misc{cryptoeprint:2018:1071, author = {Murat Yasin Kubilay and Mehmet Sabir Kiraz and Haci Ali Mantar}, title = {CertLedger: A New PKI Model with Certi cate Transparency Based on Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2018/1071}, year = {2018}, url = {https://eprint.iacr.org/2018/1071}, } @misc{cryptoeprint:2018:1072, author = {Mahdi Sajadieh and Mohsen Mousavi}, title = {Construction of Lightweight MDS Matrices from Generalized Feistel Structures}, howpublished = {Cryptology ePrint Archive, Report 2018/1072}, year = {2018}, url = {https://eprint.iacr.org/2018/1072}, } @misc{cryptoeprint:2018:1073, author = {Jung Hee Cheon and Kyoohyung Han and Minki Hhan}, title = {Faster Homomorphic Discrete Fourier Transforms and Improved FHE Bootstrapping}, howpublished = {Cryptology ePrint Archive, Report 2018/1073}, year = {2018}, url = {https://eprint.iacr.org/2018/1073}, } @misc{cryptoeprint:2018:1074, author = {Felix Wegener and Amir Moradi}, title = {Yet Another Size Record for AES: A First-Order SCA Secure AES S-box Based on GF($2^8$) Multiplication}, howpublished = {Cryptology ePrint Archive, Report 2018/1074}, year = {2018}, url = {https://eprint.iacr.org/2018/1074}, } @misc{cryptoeprint:2018:1075, author = {Jannis Bossert and Eik List and Stefan Lucks}, title = {Rectangle and Impossible-differential Cryptanalysis on Versions of ForkAES}, howpublished = {Cryptology ePrint Archive, Report 2018/1075}, year = {2018}, url = {https://eprint.iacr.org/2018/1075}, } @misc{cryptoeprint:2018:1076, author = {Kai-Min Chung and Yue Guo and Wei-Kai Lin and Rafael Pass and Elaine Shi}, title = {Game Theoretic Notions of Fairness in Multi-Party Coin Toss}, howpublished = {Cryptology ePrint Archive, Report 2018/1076}, year = {2018}, url = {https://eprint.iacr.org/2018/1076}, } @misc{cryptoeprint:2018:1077, author = {Hart Montgomery}, title = {More Efficient Lattice PRFs from Keyed Pseudorandom Synthesizers}, howpublished = {Cryptology ePrint Archive, Report 2018/1077}, year = {2018}, url = {https://eprint.iacr.org/2018/1077}, } @misc{cryptoeprint:2018:1078, author = {Prabhanjan Ananth and Arka Rai Choudhuri and Aarushi Goel and Abhishek Jain}, title = {Two Round Information-Theoretic MPC with Malicious Security}, howpublished = {Cryptology ePrint Archive, Report 2018/1078}, year = {2018}, url = {https://eprint.iacr.org/2018/1078}, } @misc{cryptoeprint:2018:1079, author = {Elaine Shi}, title = {Analysis of Deterministic Longest-Chain Protocols}, howpublished = {Cryptology ePrint Archive, Report 2018/1079}, year = {2018}, url = {https://eprint.iacr.org/2018/1079}, } @misc{cryptoeprint:2018:107, author = {Carsten Baum and Huang Lin and and Sabine Oechsner}, title = {Towards Practical Lattice-Based One-Time Linkable Ring Signatures}, howpublished = {Cryptology ePrint Archive, Report 2018/107}, year = {2018}, url = {https://eprint.iacr.org/2018/107}, } @misc{cryptoeprint:2018:1080, author = {Yiwen Gao and Yongbin Zhou and Wei Cheng}, title = {How Does Strict Parallelism Affect Security? A Case Study on the Side-Channel Attacks against GPU-based Bitsliced AES Implementation}, howpublished = {Cryptology ePrint Archive, Report 2018/1080}, year = {2018}, url = {https://eprint.iacr.org/2018/1080}, } @misc{cryptoeprint:2018:1081, author = {Jung Hee Cheon and Wonhee Cho and Minki Hhan and Jiseung Kim and Changmin Lee}, title = {Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15 Multilinear Map}, howpublished = {Cryptology ePrint Archive, Report 2018/1081}, year = {2018}, url = {https://eprint.iacr.org/2018/1081}, } @misc{cryptoeprint:2018:1082, author = {Chen-Dong Ye and Tian Tian}, title = {Deterministic Cube Attacks: A New Method to Recover Superpolies in Practice}, howpublished = {Cryptology ePrint Archive, Report 2018/1082}, year = {2018}, url = {https://eprint.iacr.org/2018/1082}, } @misc{cryptoeprint:2018:1083, author = {Sarvar Patel and Giuseppe Persiano and Kevin Yeo}, title = {Private Stateful Information Retrieval}, howpublished = {Cryptology ePrint Archive, Report 2018/1083}, year = {2018}, url = {https://eprint.iacr.org/2018/1083}, } @misc{cryptoeprint:2018:1084, author = {Qianlan Bai and Xinyan Zhou and Xing Wang and Yuedong Xu and Xin Wang and Qingsheng Kong}, title = {A Deep Dive into Blockchain Selfish Mining}, howpublished = {Cryptology ePrint Archive, Report 2018/1084}, year = {2018}, url = {https://eprint.iacr.org/2018/1084}, } @misc{cryptoeprint:2018:1085, author = {Vitaly Kiryukhin}, title = {Exact maximum expected differential and linear probability for 2-round Kuznyechik}, howpublished = {Cryptology ePrint Archive, Report 2018/1085}, year = {2018}, url = {https://eprint.iacr.org/2018/1085}, } @misc{cryptoeprint:2018:1086, author = {Alexandr Andoni and Tal Malkin and Negev Shekel Nosatzki}, title = {Two Party Distribution Testing: Communication and Security}, howpublished = {Cryptology ePrint Archive, Report 2018/1086}, year = {2018}, url = {https://eprint.iacr.org/2018/1086}, } @misc{cryptoeprint:2018:1087, author = {Bertram Poettering}, title = {Breaking the confidentiality of OCB2}, howpublished = {Cryptology ePrint Archive, Report 2018/1087}, year = {2018}, url = {https://eprint.iacr.org/2018/1087}, } @misc{cryptoeprint:2018:1088, author = {Nele Mentens and Vojtech Miskovsky and Martin Novotny and Jo Vliegen}, title = {High-speed Side-channel-protected Encryption and Authentication in Hardware}, howpublished = {Cryptology ePrint Archive, Report 2018/1088}, year = {2018}, url = {https://eprint.iacr.org/2018/1088}, } @misc{cryptoeprint:2018:1089, author = {Jan-Pieter D'Anvers and Frederik Vercauteren and Ingrid Verbauwhede}, title = {On the impact of decryption failures on the security of LWE/LWR based schemes}, howpublished = {Cryptology ePrint Archive, Report 2018/1089}, year = {2018}, url = {https://eprint.iacr.org/2018/1089}, } @misc{cryptoeprint:2018:108, author = {F. Betül Durak and Serge Vaudenay}, title = {Generic Round-Function Recovery for Feistel Networks over Small Domains}, howpublished = {Cryptology ePrint Archive, Report 2018/108}, year = {2018}, url = {https://eprint.iacr.org/2018/108}, } @misc{cryptoeprint:2018:1090, author = {Tetsu Iwata}, title = {Plaintext Recovery Attack of OCB2}, howpublished = {Cryptology ePrint Archive, Report 2018/1090}, year = {2018}, url = {https://eprint.iacr.org/2018/1090}, } @misc{cryptoeprint:2018:1091, author = {Keisuke Hara and Fuyuki Kitagawa and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka}, title = {Simulation-based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2018/1091}, year = {2018}, url = {https://eprint.iacr.org/2018/1091}, } @misc{cryptoeprint:2018:1092, author = {Felix Wegener and Christian Baiker and Amir Moradi}, title = {Shuffle and Mix: On the Diffusion of Randomness in Threshold Implementations of Keccak}, howpublished = {Cryptology ePrint Archive, Report 2018/1092}, year = {2018}, url = {https://eprint.iacr.org/2018/1092}, } @misc{cryptoeprint:2018:1093, author = {Pratish Datta and Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/1093}, year = {2018}, url = {https://eprint.iacr.org/2018/1093}, } @misc{cryptoeprint:2018:1094, author = {Giuseppe Ateniese and Danilo Francati and David Nuñez and Daniele Venturi}, title = {Match Me if You Can: Matchmaking Encryption and its Applications}, howpublished = {Cryptology ePrint Archive, Report 2018/1094}, year = {2018}, url = {https://eprint.iacr.org/2018/1094}, } @misc{cryptoeprint:2018:1095, author = {Wen-Ran Zhang}, title = {Scalable One-Time Pad --- From Information Theoretic Security to Information Conservational Security}, howpublished = {Cryptology ePrint Archive, Report 2018/1095}, year = {2018}, url = {https://eprint.iacr.org/2018/1095}, } @misc{cryptoeprint:2018:1096, author = {Qipeng Liu and Mark Zhandry}, title = {On Finding Quantum Multi-collisions}, howpublished = {Cryptology ePrint Archive, Report 2018/1096}, year = {2018}, url = {https://eprint.iacr.org/2018/1096}, } @misc{cryptoeprint:2018:1097, author = {Michael Schliep and Nicholas Hopper}, title = {End-to-End Secure Mobile Group Messaging with Conversation Integrity and Deniability}, howpublished = {Cryptology ePrint Archive, Report 2018/1097}, year = {2018}, url = {https://eprint.iacr.org/2018/1097}, } @misc{cryptoeprint:2018:1098, author = {Tomer Ashur and Siemen Dhooghe}, title = {MARVELlous: a STARK-Friendly Family of Cryptographic Primitives}, howpublished = {Cryptology ePrint Archive, Report 2018/1098}, year = {2018}, url = {https://eprint.iacr.org/2018/1098}, } @misc{cryptoeprint:2018:1099, author = {Ágnes Kiss and Masoud Naderpour and Jian Liu and N. Asokan and Thomas Schneider}, title = {SoK: Modular and Efficient Private Decision Tree Evaluation}, howpublished = {Cryptology ePrint Archive, Report 2018/1099}, year = {2018}, url = {https://eprint.iacr.org/2018/1099}, } @misc{cryptoeprint:2018:109, author = {Soda Diop and Bernard Ousmane Sané and Nafissatou Diarra and Michel Seck}, title = {NTRU-LPR IND-CPA: A New Ideal Lattices-based Scheme}, howpublished = {Cryptology ePrint Archive, Report 2018/109}, year = {2018}, url = {https://eprint.iacr.org/2018/109}, } @misc{cryptoeprint:2018:1100, author = {Thijs Veugen}, title = {Correction to "Improving the DGK comparison protocol"}, howpublished = {Cryptology ePrint Archive, Report 2018/1100}, year = {2018}, url = {https://eprint.iacr.org/2018/1100}, } @misc{cryptoeprint:2018:1101, author = {Lunzhi Deng}, title = {Insecurity of a provably secure and lightweight certificateless signature scheme for IIoT environments}, howpublished = {Cryptology ePrint Archive, Report 2018/1101}, year = {2018}, url = {https://eprint.iacr.org/2018/1101}, } @misc{cryptoeprint:2018:1102, author = {Mohammad Ali and Javad Mohajeri and Mohammad-Reza Sadeghi}, title = {A fully distributed revocable ciphertext-policy hierarchical attribute-based encryption without pairing}, howpublished = {Cryptology ePrint Archive, Report 2018/1102}, year = {2018}, url = {https://eprint.iacr.org/2018/1102}, } @misc{cryptoeprint:2018:1103, author = {Victoria Vysotskaya}, title = {Some Properties of Modular Addition}, howpublished = {Cryptology ePrint Archive, Report 2018/1103}, year = {2018}, url = {https://eprint.iacr.org/2018/1103}, } @misc{cryptoeprint:2018:1104, author = {Dima Grigoriev and Vladimir Shpilrain}, title = {Tropical cryptography II: extensions by homomorphisms}, howpublished = {Cryptology ePrint Archive, Report 2018/1104}, year = {2018}, url = {https://eprint.iacr.org/2018/1104}, } @misc{cryptoeprint:2018:1105, author = {Chaya Ganesh and Claudio Orlandi and Daniel Tschudi}, title = {Proof-of-Stake Protocols for Privacy-Aware Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2018/1105}, year = {2018}, url = {https://eprint.iacr.org/2018/1105}, } @misc{cryptoeprint:2018:1106, author = {Max Hoffmann and Valerie Fetzer and Matthias Nagel and Andy Rupp and Rebecca Schwerdt}, title = {P4TC---Provably-Secure yet Practical Privacy-Preserving Toll Collection}, howpublished = {Cryptology ePrint Archive, Report 2018/1106}, year = {2018}, url = {https://eprint.iacr.org/2018/1106}, } @misc{cryptoeprint:2018:1107, author = {S. M. Dehnavi}, title = {Further observations on SIMON and SPECK families of block ciphers}, howpublished = {Cryptology ePrint Archive, Report 2018/1107}, year = {2018}, url = {https://eprint.iacr.org/2018/1107}, } @misc{cryptoeprint:2018:1108, author = {Cheng Hong and Jonathan Katz and Vladimir Kolesnikov and Wen-jie Lu and Xiao Wang}, title = {Covert Security with Public Verifiability: Faster, Leaner, and Simpler}, howpublished = {Cryptology ePrint Archive, Report 2018/1108}, year = {2018}, url = {https://eprint.iacr.org/2018/1108}, } @misc{cryptoeprint:2018:1109, author = {Thomas Decru and Lorenz Panny and Frederik Vercauteren}, title = {Faster SeaSign signatures through improved rejection sampling}, howpublished = {Cryptology ePrint Archive, Report 2018/1109}, year = {2018}, url = {https://eprint.iacr.org/2018/1109}, } @misc{cryptoeprint:2018:110, author = {John Baena and Daniel Cabarcas and Daniel Escudero and Karan Khathuria and Javier Verbel}, title = {Rank Analysis of Cubic Multivariate Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2018/110}, year = {2018}, url = {https://eprint.iacr.org/2018/110}, } @misc{cryptoeprint:2018:1110, author = {Dominic Deuber and Nico Döttling and Bernardo Magri and Giulio Malavolta and Sri Aravinda Krishnan Thyagarajan}, title = {Minting Mechanisms for Blockchain -- or -- Moving from Cryptoassets to Cryptocurrencies}, howpublished = {Cryptology ePrint Archive, Report 2018/1110}, year = {2018}, url = {https://eprint.iacr.org/2018/1110}, } @misc{cryptoeprint:2018:1111, author = {Paulo S. L. M. Barreto and Edoardo Persichetti}, title = {Cryptanalysis of the Wave Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2018/1111}, year = {2018}, url = {https://eprint.iacr.org/2018/1111}, } @misc{cryptoeprint:2018:1112, author = {Tai-Yuan Chen and Wei-Ning Huang and Po-Chun Kuo and Hao Chung and Tzu-Wei Chao}, title = {DEXON: A Highly Scalable, Decentralized DAG-Based Consensus Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2018/1112}, year = {2018}, url = {https://eprint.iacr.org/2018/1112}, } @misc{cryptoeprint:2018:1113, author = {Alexander Koch and Stefan Walzer}, title = {Private Function Evaluation with Cards}, howpublished = {Cryptology ePrint Archive, Report 2018/1113}, year = {2018}, url = {https://eprint.iacr.org/2018/1113}, } @misc{cryptoeprint:2018:1114, author = {Subhadeep Banik and Francesco Regazzoni and Serge Vaudenay}, title = {Lightweight Circuits with Shift and Swap}, howpublished = {Cryptology ePrint Archive, Report 2018/1114}, year = {2018}, url = {https://eprint.iacr.org/2018/1114}, } @misc{cryptoeprint:2018:1115, author = {Remi Clarisse and Olivier Sanders}, title = {Short Group Signature in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2018/1115}, year = {2018}, url = {https://eprint.iacr.org/2018/1115}, } @misc{cryptoeprint:2018:1116, author = {Joppe W. Bos and Simon Friedberger and Marco Martinoli and Elisabeth Oswald and Martijn Stam}, title = {Fly, you fool! Faster Frodo for the ARM Cortex-M4}, howpublished = {Cryptology ePrint Archive, Report 2018/1116}, year = {2018}, url = {https://eprint.iacr.org/2018/1116}, } @misc{cryptoeprint:2018:1117, author = {Felix Wegener and Amir Moradi}, title = {A Note on Transitional Leakage When Masking AES with Only Two Bits of Randomness}, howpublished = {Cryptology ePrint Archive, Report 2018/1117}, year = {2018}, url = {https://eprint.iacr.org/2018/1117}, } @misc{cryptoeprint:2018:1118, author = {Yael Tauman Kalai and Dakshita Khurana}, title = {Non-Interactive Non-Malleability from Quantum Supremacy}, howpublished = {Cryptology ePrint Archive, Report 2018/1118}, year = {2018}, url = {https://eprint.iacr.org/2018/1118}, } @misc{cryptoeprint:2018:1119, author = {Matthias Fitzi and Peter Ga{\v{z}}i and Aggelos Kiayias and Alexander Russell}, title = {Parallel Chains: Improving Throughput and Latency of Blockchain Protocols via Parallel Composition}, howpublished = {Cryptology ePrint Archive, Report 2018/1119}, year = {2018}, url = {https://eprint.iacr.org/2018/1119}, } @misc{cryptoeprint:2018:111, author = {Håvard Raddum and Pavol Zajac}, title = {MRHS Solver Based on Linear Algebra and Exhaustive Search}, howpublished = {Cryptology ePrint Archive, Report 2018/111}, year = {2018}, url = {https://eprint.iacr.org/2018/111}, } @misc{cryptoeprint:2018:1120, author = {Masahito Gotaishi and Shigeo Tsujii}, title = {Organizational Cryptography for Access Control}, howpublished = {Cryptology ePrint Archive, Report 2018/1120}, year = {2018}, url = {https://eprint.iacr.org/2018/1120}, } @misc{cryptoeprint:2018:1121, author = {Nadim Kobeissi}, title = {An Analysis of the ProtonMail Cryptographic Architecture}, howpublished = {Cryptology ePrint Archive, Report 2018/1121}, year = {2018}, url = {https://eprint.iacr.org/2018/1121}, } @misc{cryptoeprint:2018:1122, author = {Akinori Hosoyamada and Yu Sasaki and Seiichiro Tani and Keita Xagawa}, title = {Improved Quantum Multicollision-Finding Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2018/1122}, year = {2018}, url = {https://eprint.iacr.org/2018/1122}, } @misc{cryptoeprint:2018:1123, author = {Stjepan Picek and Annelie Heuser and Cesare Alippi and Francesco Regazzoni}, title = {When Theory Meets Practice: A Framework for Robust Profiled Side-channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2018/1123}, year = {2018}, url = {https://eprint.iacr.org/2018/1123}, } @misc{cryptoeprint:2018:1124, author = {Sergiu Costea and Marios O. Choudary and Doru Gucea and Björn Tackmann and Costin Raiciu}, title = {Secure Opportunistic Multipath Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2018/1124}, year = {2018}, url = {https://eprint.iacr.org/2018/1124}, } @misc{cryptoeprint:2018:1125, author = {Massimo Bartoletti and Roberto Zunino}, title = {Verifying liquidity of Bitcoin contracts}, howpublished = {Cryptology ePrint Archive, Report 2018/1125}, year = {2018}, url = {https://eprint.iacr.org/2018/1125}, } @misc{cryptoeprint:2018:1126, author = {Dingfeng Ye and Danping Shi and Peng Wang}, title = {Lightweight AE and HASH in a Single Round Function}, howpublished = {Cryptology ePrint Archive, Report 2018/1126}, year = {2018}, url = {https://eprint.iacr.org/2018/1126}, } @misc{cryptoeprint:2018:1127, author = {P. Arun Babu and Jithin Jose Thomas}, title = {Freestyle, a randomized version of ChaCha for resisting offline brute-force and dictionary attacks}, howpublished = {Cryptology ePrint Archive, Report 2018/1127}, year = {2018}, url = {https://eprint.iacr.org/2018/1127}, } @misc{cryptoeprint:2018:1128, author = {Kang Yang and Liqun Chen and Zhenfeng Zhang and Chris Newton and Bo Yang and Li Xi}, title = {Direct Anonymous Attestation with Optimal TPM Signing Efficiency}, howpublished = {Cryptology ePrint Archive, Report 2018/1128}, year = {2018}, url = {https://eprint.iacr.org/2018/1128}, } @misc{cryptoeprint:2018:1129, author = {Jean-Sebastien Coron and Hilder V. L. Pereira}, title = {On Kilian's Randomization of Multilinear Map Encodings}, howpublished = {Cryptology ePrint Archive, Report 2018/1129}, year = {2018}, url = {https://eprint.iacr.org/2018/1129}, } @misc{cryptoeprint:2018:112, author = {Benjamin Harsha and Jeremiah Blocki}, title = {Just in Time Hashing}, howpublished = {Cryptology ePrint Archive, Report 2018/112}, year = {2018}, url = {https://eprint.iacr.org/2018/112}, } @misc{cryptoeprint:2018:1130, author = {Ashwin Jha and Mridul Nandi}, title = {Applications of H-Technique: Revisiting Symmetric Key Security Analysis}, howpublished = {Cryptology ePrint Archive, Report 2018/1130}, year = {2018}, url = {https://eprint.iacr.org/2018/1130}, } @misc{cryptoeprint:2018:1131, author = {Arinjita Paul and Varshika Srinivasavaradhan and S. Sharmila Deva Selvi and C. Pandu Rangan}, title = {A CCA-secure collusion-resistant Identity-based Proxy Re-encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2018/1131}, year = {2018}, url = {https://eprint.iacr.org/2018/1131}, } @misc{cryptoeprint:2018:1132, author = {Thomas Kerber and Markulf Kohlweiss and Aggelos Kiayias and Vassilis Zikas}, title = {Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake}, howpublished = {Cryptology ePrint Archive, Report 2018/1132}, year = {2018}, url = {https://eprint.iacr.org/2018/1132}, } @misc{cryptoeprint:2018:1133, author = {Vamshi Krishna Kammadanam and Virendra R. Sule and Yi Hong}, title = {A Public Key Exchange Cryptosystem Based on Ideal Secrecy}, howpublished = {Cryptology ePrint Archive, Report 2018/1133}, year = {2018}, url = {https://eprint.iacr.org/2018/1133}, } @misc{cryptoeprint:2018:1134, author = {Nicholas Stifter and Philipp Schindler and Aljosha Judmayer and Alexei Zamyatin and Andreas Kern and Edgar Weippl}, title = {Echoes of the Past: Recovering Blockchain Metrics From Merged Mining}, howpublished = {Cryptology ePrint Archive, Report 2018/1134}, year = {2018}, url = {https://eprint.iacr.org/2018/1134}, } @misc{cryptoeprint:2018:1135, author = {Sébastien Andreina and Jens-Matthias Bohli and Ghassan O. Karame and Wenting Li and Giorgia Azzurra Marson}, title = {PoTS - A Secure Proof of TEE-Stake for Permissionless Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2018/1135}, year = {2018}, url = {https://eprint.iacr.org/2018/1135}, } @misc{cryptoeprint:2018:1136, author = {S. Sharmila Deva Selvi and Arinjita Paul and C. Pandu Rangan}, title = {A Provably-Secure Unidirectional Proxy Re-Encryption Scheme Without Pairing in the Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2018/1136}, year = {2018}, url = {https://eprint.iacr.org/2018/1136}, } @misc{cryptoeprint:2018:1137, author = {Jasper Scholten}, title = {Genus 2 curves with given split Jacobian}, howpublished = {Cryptology ePrint Archive, Report 2018/1137}, year = {2018}, url = {https://eprint.iacr.org/2018/1137}, } @misc{cryptoeprint:2018:1138, author = {Ashutosh Kumar and Raghu Meka and Amit Sahai}, title = {Leakage-Resilient Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2018/1138}, year = {2018}, url = {https://eprint.iacr.org/2018/1138}, } @misc{cryptoeprint:2018:1139, author = {Kexin Hu and Zhenfeng Zhang and Kaiven Guo}, title = {Breaking the Binding: Attacks on the Merkle Approach to Prove Liabilities and its Applications}, howpublished = {Cryptology ePrint Archive, Report 2018/1139}, year = {2018}, url = {https://eprint.iacr.org/2018/1139}, } @misc{cryptoeprint:2018:113, author = {Lauren De Meyer and Begül Bilgin}, title = {Classification of Balanced Quadratic Functions}, howpublished = {Cryptology ePrint Archive, Report 2018/113}, year = {2018}, url = {https://eprint.iacr.org/2018/113}, } @misc{cryptoeprint:2018:1140, author = {Antonio Faonio}, title = {Efficient Fully-Leakage Resilient One-More Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2018/1140}, year = {2018}, url = {https://eprint.iacr.org/2018/1140}, } @misc{cryptoeprint:2018:1141, author = {Muslum Ozgur Ozmen and Rouzbeh Behnia and Attila A. Yavuz}, title = {Fast Authentication from Aggregate Signatures with Improved Security}, howpublished = {Cryptology ePrint Archive, Report 2018/1141}, year = {2018}, url = {https://eprint.iacr.org/2018/1141}, } @misc{cryptoeprint:2018:1142, author = {Simon-Philipp Merz and Christophe Petit}, title = {On the (non) obfuscating power of Garside Normal Forms}, howpublished = {Cryptology ePrint Archive, Report 2018/1142}, year = {2018}, url = {https://eprint.iacr.org/2018/1142}, } @misc{cryptoeprint:2018:1143, author = {Patrik Ekdahl and Thomas Johansson and Alexander Maximov and Jing Yang}, title = {A new SNOW stream cipher called SNOW-V}, howpublished = {Cryptology ePrint Archive, Report 2018/1143}, year = {2018}, url = {https://eprint.iacr.org/2018/1143}, } @misc{cryptoeprint:2018:1144, author = {Saikrishna Badrinarayanan and Akshayaram Srinivasan}, title = {Revisiting Non-Malleable Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2018/1144}, year = {2018}, url = {https://eprint.iacr.org/2018/1144}, } @misc{cryptoeprint:2018:1145, author = {Fenghua Li and Hui Li and Ben Niu and Jinjun Chen}, title = {Privacy Computing: Concept, Computing Framework And Future Development Trends}, howpublished = {Cryptology ePrint Archive, Report 2018/1145}, year = {2018}, url = {https://eprint.iacr.org/2018/1145}, } @misc{cryptoeprint:2018:1146, author = {Deepak Sirone and Pramod Subramanyan}, title = {Functional Analysis Attacks on Logic Locking}, howpublished = {Cryptology ePrint Archive, Report 2018/1146}, year = {2018}, url = {https://eprint.iacr.org/2018/1146}, } @misc{cryptoeprint:2018:1147, author = {Divesh Aggarwal and Ivan Damgard and Jesper Buus Nielsen and Maciej Obremski and Erick Purwanto and Joao Ribeiro and Mark Simkin}, title = {Stronger Leakage-Resilient and Non-Malleable Secret-Sharing Schemes for General Access Structures}, howpublished = {Cryptology ePrint Archive, Report 2018/1147}, year = {2018}, url = {https://eprint.iacr.org/2018/1147}, } @misc{cryptoeprint:2018:1148, author = {Mirosław Kutyłowski and Lucjan Hanzlik and Kamil Kluczniak}, title = {Towards Practical Security of Pseudonymous Signature on the BSI eIDAS Token}, howpublished = {Cryptology ePrint Archive, Report 2018/1148}, year = {2018}, url = {https://eprint.iacr.org/2018/1148}, } @misc{cryptoeprint:2018:1149, author = {Changhai Ou and Chengju Zhou and Siew-Kei Lam}, title = {Compressive Sensing based Leakage Sampling and Reconstruction: A First Study}, howpublished = {Cryptology ePrint Archive, Report 2018/1149}, year = {2018}, url = {https://eprint.iacr.org/2018/1149}, } @misc{cryptoeprint:2018:114, author = {Colin Boyd and Gareth T. Davies and Kristian Gjøsteen and Yao Jiang}, title = {Offline Assisted Group Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2018/114}, year = {2018}, url = {https://eprint.iacr.org/2018/114}, } @misc{cryptoeprint:2018:1150, author = {Gorjan Alagic and Christian Majenz and Alexander Russell and Fang Song}, title = {Quantum-secure message authentication via blind-unforgeability}, howpublished = {Cryptology ePrint Archive, Report 2018/1150}, year = {2018}, url = {https://eprint.iacr.org/2018/1150}, } @misc{cryptoeprint:2018:1151, author = {Bing Zeng}, title = {Analysis Of The Simulatability Of An Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2018/1151}, year = {2018}, url = {https://eprint.iacr.org/2018/1151}, } @misc{cryptoeprint:2018:1152, author = {Qingzhao Zhang and Yijun Leng and Lei Fan}, title = {Blockchain-based P2P File Sharing Incentive}, howpublished = {Cryptology ePrint Archive, Report 2018/1152}, year = {2018}, url = {https://eprint.iacr.org/2018/1152}, } @misc{cryptoeprint:2018:1153, author = {Ittai Abraham and Dahlia Malkhi and Kartik Nayak and Ling Ren}, title = {Dfinity Consensus, Explored}, howpublished = {Cryptology ePrint Archive, Report 2018/1153}, year = {2018}, url = {https://eprint.iacr.org/2018/1153}, } @misc{cryptoeprint:2018:1154, author = {Akshayaram Srinivasan and Prashant Nalini Vasudevan}, title = {Leakage Resilient Secret Sharing and Applications}, howpublished = {Cryptology ePrint Archive, Report 2018/1154}, year = {2018}, url = {https://eprint.iacr.org/2018/1154}, } @misc{cryptoeprint:2018:1155, author = {Pedro Branco and Jintai Ding and Manuel Goulão and Paulo Mateus}, title = {Universally Composable Oblivious Transfer Protocol based on the RLWE Assumption}, howpublished = {Cryptology ePrint Archive, Report 2018/1155}, year = {2018}, url = {https://eprint.iacr.org/2018/1155}, } @misc{cryptoeprint:2018:1156, author = {Eunkyung Kim and Hyang-Sook Lee and Jeongeun Park}, title = {Towards Round-Optimal Secure Multiparty Computations: Multikey FHE without a CRS}, howpublished = {Cryptology ePrint Archive, Report 2018/1156}, year = {2018}, url = {https://eprint.iacr.org/2018/1156}, } @misc{cryptoeprint:2018:1157, author = {Douglas Wikström}, title = {Special Soundness Revisited}, howpublished = {Cryptology ePrint Archive, Report 2018/1157}, year = {2018}, url = {https://eprint.iacr.org/2018/1157}, } @misc{cryptoeprint:2018:1158, author = {Elette Boyle and Rio LaVigne and Vinod Vaikuntanathan}, title = {Adversarially Robust Property Preserving Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2018/1158}, year = {2018}, url = {https://eprint.iacr.org/2018/1158}, } @misc{cryptoeprint:2018:1159, author = {Sihem Mesnage and Kwang Ho Kim and Myong Song Jo}, title = {Improved upper bound on root number of linearized polynomials and its application to nonlinearity estimation of Boolean functions}, howpublished = {Cryptology ePrint Archive, Report 2018/1159}, year = {2018}, url = {https://eprint.iacr.org/2018/1159}, } @misc{cryptoeprint:2018:115, author = {Itai Dinur}, title = {An Improved Affine Equivalence Algorithm for Random Permutations}, howpublished = {Cryptology ePrint Archive, Report 2018/115}, year = {2018}, url = {https://eprint.iacr.org/2018/115}, } @misc{cryptoeprint:2018:1160, author = {Natalia Tokareva}, title = {Algebraic normal form of a bent function: properties and restrictions}, howpublished = {Cryptology ePrint Archive, Report 2018/1160}, year = {2018}, url = {https://eprint.iacr.org/2018/1160}, } @misc{cryptoeprint:2018:1161, author = {Ran Cohen and abhi shelat and Daniel Wichs}, title = {Adaptively Secure MPC with Sublinear Communication Complexity}, howpublished = {Cryptology ePrint Archive, Report 2018/1161}, year = {2018}, url = {https://eprint.iacr.org/2018/1161}, } @misc{cryptoeprint:2018:1162, author = {Geoffroy Couteau and Aurélien Dupin and Pierrick Méaux and Mélissa Rossi and Yann Rotella}, title = {On the Concrete Security of Goldreich’s Pseudorandom Generator}, howpublished = {Cryptology ePrint Archive, Report 2018/1162}, year = {2018}, url = {https://eprint.iacr.org/2018/1162}, } @misc{cryptoeprint:2018:1163, author = {Joachim Breitner}, title = {More on sliding right}, howpublished = {Cryptology ePrint Archive, Report 2018/1163}, year = {2018}, url = {https://eprint.iacr.org/2018/1163}, } @misc{cryptoeprint:2018:1164, author = {Gorjan Alagic and Tommaso Gagliardoni and Christian Majenz}, title = {Can you sign a quantum state}, howpublished = {Cryptology ePrint Archive, Report 2018/1164}, year = {2018}, url = {https://eprint.iacr.org/2018/1164}, } @misc{cryptoeprint:2018:1165, author = {Yunlei Zhao}, title = {Identity-Concealed Authenticated Encryption and Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2018/1165}, year = {2018}, url = {https://eprint.iacr.org/2018/1165}, } @misc{cryptoeprint:2018:1166, author = {Jianting Ning and Hung Dang and Ruomu Hou and Ee-Chien Chang}, title = {Keeping Time-Release Secrets through Smart Contracts}, howpublished = {Cryptology ePrint Archive, Report 2018/1166}, year = {2018}, url = {https://eprint.iacr.org/2018/1166}, } @misc{cryptoeprint:2018:1167, author = {Ravi Kishore and Ashutosh Kumar and Chiranjeevi Vanarasa and Kannan Srinathan}, title = {On the Price of Proactivizing Round-Optimal Perfectly Secret Message Transmission}, howpublished = {Cryptology ePrint Archive, Report 2018/1167}, year = {2018}, url = {https://eprint.iacr.org/2018/1167}, } @misc{cryptoeprint:2018:1168, author = {Shangqi Lai and Sikhar Patranabis and Amin Sakzad and Joseph K. Liu and Debdeep Mukhopadhyay and Ron Steinfeld and Shi-Feng Sun and Dongxi Liu and Cong Zuo}, title = {Result Pattern Hiding Searchable Encryption for Conjunctive Queries}, howpublished = {Cryptology ePrint Archive, Report 2018/1168}, year = {2018}, url = {https://eprint.iacr.org/2018/1168}, } @misc{cryptoeprint:2018:1169, author = {Benny Applebaum and Prashant Nalini Vasudevan}, title = {Placing Conditional Disclosure of Secrets in the Communication Complexity Universe}, howpublished = {Cryptology ePrint Archive, Report 2018/1169}, year = {2018}, url = {https://eprint.iacr.org/2018/1169}, } @misc{cryptoeprint:2018:116, author = {Jie Chen and Junqing Gong and Lucas Kowalczyk and Hoeteck Wee}, title = {Unbounded ABE via Bilinear Entropy Expansion, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2018/116}, year = {2018}, url = {https://eprint.iacr.org/2018/116}, } @misc{cryptoeprint:2018:1170, author = {Nairen Cao and Adam O'Neill and Mohammad Zaheri}, title = {Towards RSA-OAEP without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2018/1170}, year = {2018}, url = {https://eprint.iacr.org/2018/1170}, } @misc{cryptoeprint:2018:1171, author = {Chenglu Jin and Marten van Dijk and Michael Reiter and Haibin Zhang}, title = {PwoP: Intrusion-Tolerant and Privacy-Preserving Sensor Fusion}, howpublished = {Cryptology ePrint Archive, Report 2018/1171}, year = {2018}, url = {https://eprint.iacr.org/2018/1171}, } @misc{cryptoeprint:2018:1172, author = {Jan-Pieter D'Anvers and Frederik Vercauteren and Ingrid Verbauwhede}, title = {The impact of error dependencies on Ring/Mod-LWE/LWR based schemes}, howpublished = {Cryptology ePrint Archive, Report 2018/1172}, year = {2018}, url = {https://eprint.iacr.org/2018/1172}, } @misc{cryptoeprint:2018:1173, author = {Eyal Ronen and Robert Gillham and Daniel Genkin and Adi Shamir and David Wong and Yuval Yarom}, title = {The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations}, howpublished = {Cryptology ePrint Archive, Report 2018/1173}, year = {2018}, url = {https://eprint.iacr.org/2018/1173}, } @misc{cryptoeprint:2018:1174, author = {John M. Schanck}, title = {A Comparison of NTRU Variants}, howpublished = {Cryptology ePrint Archive, Report 2018/1174}, year = {2018}, url = {https://eprint.iacr.org/2018/1174}, } @misc{cryptoeprint:2018:1175, author = {Ravishankar Borgaonkar and Lucca Hirschi and Shinjo Park and Altaf Shaik}, title = {New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols}, howpublished = {Cryptology ePrint Archive, Report 2018/1175}, year = {2018}, url = {https://eprint.iacr.org/2018/1175}, } @misc{cryptoeprint:2018:1176, author = {Olivier Blazy and Paul Germouty and Duong Hieu Phan}, title = {Downgradable Identity-based Encryption and Applications}, howpublished = {Cryptology ePrint Archive, Report 2018/1176}, year = {2018}, url = {https://eprint.iacr.org/2018/1176}, } @misc{cryptoeprint:2018:1177, author = {Louis Goubin and Geraldine Monsalve and Juan Reutter and Francisco Vial Prado}, title = {Excalibur Key-Generation Protocols For DAG Hierarchic Decryption}, howpublished = {Cryptology ePrint Archive, Report 2018/1177}, year = {2018}, url = {https://eprint.iacr.org/2018/1177}, } @misc{cryptoeprint:2018:1178, author = {Mikhail Anokhin}, title = {Pseudo-Free Families of Computational Universal Algebras}, howpublished = {Cryptology ePrint Archive, Report 2018/1178}, year = {2018}, url = {https://eprint.iacr.org/2018/1178}, } @misc{cryptoeprint:2018:1179, author = {Ronal Pranil Chand and Maheswara Rao Valluri}, title = {Elliptic Curves in Generalized Huff's Model}, howpublished = {Cryptology ePrint Archive, Report 2018/1179}, year = {2018}, url = {https://eprint.iacr.org/2018/1179}, } @misc{cryptoeprint:2018:117, author = {Shai Halevi and Yuriy Polyakov and Victor Shoup}, title = {An Improved RNS Variant of the BFV Homomorphic Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2018/117}, year = {2018}, url = {https://eprint.iacr.org/2018/117}, } @misc{cryptoeprint:2018:1180, author = {Leixiao Cheng and Boru Gong and Yunlei Zhao}, title = {Lattice-Based Signature from Key Consensus}, howpublished = {Cryptology ePrint Archive, Report 2018/1180}, year = {2018}, url = {https://eprint.iacr.org/2018/1180}, } @misc{cryptoeprint:2018:1181, author = {Christian Wittke and Ievgen Kabin and Dan Klann and Zoya Dyka and Anton Datsuk and Peter Langendoerfer}, title = {Horizontal DEMA Attack as the Criterion to Select the Best Suitable EM Probe}, howpublished = {Cryptology ePrint Archive, Report 2018/1181}, year = {2018}, url = {https://eprint.iacr.org/2018/1181}, } @misc{cryptoeprint:2018:1182, author = {Fangguo Zhang and Zhuoran Zhang}, title = {Code-based Cryptosystem from Quasi-Cyclic Elliptic Codes}, howpublished = {Cryptology ePrint Archive, Report 2018/1182}, year = {2018}, url = {https://eprint.iacr.org/2018/1182}, } @misc{cryptoeprint:2018:1183, author = {Benedikt Auerbach and Eike Kiltz and Bertram Poettering and Stefan Schoenen}, title = {Lossy Trapdoor Permutations with Improved Lossiness}, howpublished = {Cryptology ePrint Archive, Report 2018/1183}, year = {2018}, url = {https://eprint.iacr.org/2018/1183}, } @misc{cryptoeprint:2018:1184, author = {Nasser Alsalami and Bingsheng Zhang}, title = {Uncontrolled Randomness in Blockchains: Covert Bulletin Board for Illicit Activities}, howpublished = {Cryptology ePrint Archive, Report 2018/1184}, year = {2018}, url = {https://eprint.iacr.org/2018/1184}, } @misc{cryptoeprint:2018:1185, author = {Gorjan Alagic and Stacey Jeffery and Maris Ozols and Alexander Poremba}, title = {On Quantum Chosen-Ciphertext Attacks and Learning with Errors}, howpublished = {Cryptology ePrint Archive, Report 2018/1185}, year = {2018}, url = {https://eprint.iacr.org/2018/1185}, } @misc{cryptoeprint:2018:1186, author = {Senpeng Wang and Bin Hu and Jie Guan and Kai Zhang and Tairong Shi}, title = {MILP Method of Searching Integral Distinguishers Based on Division Property Using Three Subsets}, howpublished = {Cryptology ePrint Archive, Report 2018/1186}, year = {2018}, url = {https://eprint.iacr.org/2018/1186}, } @misc{cryptoeprint:2018:1187, author = {Kai Hu and Meiqin Wang}, title = {Automatic Search for A Variant of Division Property Using Three Subsets (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2018/1187}, year = {2018}, url = {https://eprint.iacr.org/2018/1187}, } @misc{cryptoeprint:2018:1188, author = {Dan Boneh and Benedikt B\"unz and Ben Fisch}, title = {Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2018/1188}, year = {2018}, url = {https://eprint.iacr.org/2018/1188}, } @misc{cryptoeprint:2018:1189, author = {Quang Do and Ben Martini and Kim-Kwang Raymond Choo}, title = {The Role of the Adversary Model in Applied Security Research}, howpublished = {Cryptology ePrint Archive, Report 2018/1189}, year = {2018}, url = {https://eprint.iacr.org/2018/1189}, } @misc{cryptoeprint:2018:118, author = {Anja Lehmann and Bjoern Tackmann}, title = {Updatable Encryption with Post-Compromise Security}, howpublished = {Cryptology ePrint Archive, Report 2018/118}, year = {2018}, url = {https://eprint.iacr.org/2018/118}, } @misc{cryptoeprint:2018:1190, author = {Sanjit Chatterjee and Sayantan Mukherjee}, title = {Large Universe Subset Predicate Encryption Based on Static Assumption (without Random Oracle)}, howpublished = {Cryptology ePrint Archive, Report 2018/1190}, year = {2018}, url = {https://eprint.iacr.org/2018/1190}, } @misc{cryptoeprint:2018:1191, author = {Rajendra Kumar and Nikhil Mittal and Shashank Singh}, title = {Cryptanalysis of 2-round KECCAK-384}, howpublished = {Cryptology ePrint Archive, Report 2018/1191}, year = {2018}, url = {https://eprint.iacr.org/2018/1191}, } @misc{cryptoeprint:2018:1192, author = {Nicolas Aragon and Olivier Blazy and Philippe Gaborit and Adrien Hauteville and Gilles Zémor}, title = {Durandal: a rank metric based signature scheme}, howpublished = {Cryptology ePrint Archive, Report 2018/1192}, year = {2018}, url = {https://eprint.iacr.org/2018/1192}, } @misc{cryptoeprint:2018:1193, author = {Gembu Ito and Akinori Hosoyamada and Ryutaroh Matsumoto and Yu Sasaki and Tetsu Iwata}, title = {Quantum Chosen-Ciphertext Attacks against Feistel Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2018/1193}, year = {2018}, url = {https://eprint.iacr.org/2018/1193}, } @misc{cryptoeprint:2018:1194, author = {Christof Beierle and Alex Biryukov and Aleksei Udovenko}, title = {On Degree-d Zero-Sum Sets of Full Rank}, howpublished = {Cryptology ePrint Archive, Report 2018/1194}, year = {2018}, url = {https://eprint.iacr.org/2018/1194}, } @misc{cryptoeprint:2018:1195, author = {Lauren De Meyer and Victor Arribas and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {M&M: Masks and Macs against Physical Attacks}, howpublished = {Cryptology ePrint Archive, Report 2018/1195}, year = {2018}, url = {https://eprint.iacr.org/2018/1195}, } @misc{cryptoeprint:2018:1196, author = {Loïc Masure and Cécile Dumas and Emmanuel Prouff}, title = {Gradient Visualization for General Characterization in Profiling Attacks}, howpublished = {Cryptology ePrint Archive, Report 2018/1196}, year = {2018}, url = {https://eprint.iacr.org/2018/1196}, } @misc{cryptoeprint:2018:1197, author = {NICOLAS BELLEVILLE and DAMIEN COUROUSSÉ and KARINE HEYDEMANN and HENRI-PIERRE CHARLES}, title = {Automated software protection for the masses against side-channel attacks}, howpublished = {Cryptology ePrint Archive, Report 2018/1197}, year = {2018}, url = {https://eprint.iacr.org/2018/1197}, } @misc{cryptoeprint:2018:1198, author = {Michael Meyer and Fabio Campos and Steffen Reith}, title = {On Lions and Elligators: An efficient constant-time implementation of CSIDH}, howpublished = {Cryptology ePrint Archive, Report 2018/1198}, year = {2018}, url = {https://eprint.iacr.org/2018/1198}, } @misc{cryptoeprint:2018:1199, author = {Steven Galbraith and Lorenz Panny and Benjamin Smith and Frederik Vercauteren}, title = {Quantum Equivalence of the DLP and CDHP for Group Actions}, howpublished = {Cryptology ePrint Archive, Report 2018/1199}, year = {2018}, url = {https://eprint.iacr.org/2018/1199}, } @misc{cryptoeprint:2018:119, author = {Daniel Genkin and Lev Pachmanov and Eran Tromer and Yuval Yarom}, title = {Drive-by Key-Extraction Cache Attacks from Portable Code}, howpublished = {Cryptology ePrint Archive, Report 2018/119}, year = {2018}, url = {https://eprint.iacr.org/2018/119}, } @misc{cryptoeprint:2018:1200, author = {Julian Renner and Sven Puchinger and Antonia Wachter-Zeh}, title = {On a Rank-Metric Code-Based Cryptosystem with Small Key Size}, howpublished = {Cryptology ePrint Archive, Report 2018/1200}, year = {2018}, url = {https://eprint.iacr.org/2018/1200}, } @misc{cryptoeprint:2018:1201, author = {Joonsang Baek and Willy Susilo and Jongkil Kim and Yang-Wai Chow}, title = {Subversion in Practice: How to Efficiently Undermine Signatures}, howpublished = {Cryptology ePrint Archive, Report 2018/1201}, year = {2018}, url = {https://eprint.iacr.org/2018/1201}, } @misc{cryptoeprint:2018:1202, author = {Jihye Kim and Jiwon Lee and Hankyung Ko and Donghwan Oh and Semin Han and Kwonho Jeong and Hyunok Oh}, title = {AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems}, howpublished = {Cryptology ePrint Archive, Report 2018/1202}, year = {2018}, url = {https://eprint.iacr.org/2018/1202}, } @misc{cryptoeprint:2018:1203, author = {Gustavo Banegas and Paulo S. L. M. Barreto and Brice Odilon Boidje and Pierre-Louis Cayrel and Gilbert Ndollane Dione and Kris Gaj and Cheikh Thiecoumba Gueye and Richard Haeussler and Jean Belo Klamti and Ousmane N'diaye and Duc Tri Nguyen and Edoardo Persichetti and Jefferson E. Ricardini}, title = {DAGS: Reloaded Revisiting Dyadic Key Encapsulation}, howpublished = {Cryptology ePrint Archive, Report 2018/1203}, year = {2018}, url = {https://eprint.iacr.org/2018/1203}, } @misc{cryptoeprint:2018:1204, author = {Antonis Michalas}, title = {The Lord of the Shares: Combining Attribute-Based Encryption and Searchable Encryption for Flexible Data Sharing}, howpublished = {Cryptology ePrint Archive, Report 2018/1204}, year = {2018}, url = {https://eprint.iacr.org/2018/1204}, } @misc{cryptoeprint:2018:1205, author = {Jean-Christophe Deneuville and Philippe Gaborit}, title = {Cryptanalysis of a code-based one-time signature}, howpublished = {Cryptology ePrint Archive, Report 2018/1205}, year = {2018}, url = {https://eprint.iacr.org/2018/1205}, } @misc{cryptoeprint:2018:1206, author = {Derek Zhang and Alex Su and Felix Xu and Jiang Chen}, title = {ARPA Whitepaper}, howpublished = {Cryptology ePrint Archive, Report 2018/1206}, year = {2018}, url = {https://eprint.iacr.org/2018/1206}, } @misc{cryptoeprint:2018:1207, author = {Nicolas Sendrier and Valentin Vasseur}, title = {On the Decoding Failure Rate of QC-MDPC Bit-Flipping Decoders}, howpublished = {Cryptology ePrint Archive, Report 2018/1207}, year = {2018}, url = {https://eprint.iacr.org/2018/1207}, } @misc{cryptoeprint:2018:1208, author = {Jun Xu and Santanu Sarkar and Lei Hu}, title = {Revisiting Orthogonal Lattice Attacks on Approximate Common Divisor Problems and their Applications}, howpublished = {Cryptology ePrint Archive, Report 2018/1208}, year = {2018}, url = {https://eprint.iacr.org/2018/1208}, } @misc{cryptoeprint:2018:1209, author = {Min Liang}, title = {Teleportation-based quantum homomorphic encryption scheme with quasi-compactness and perfect security}, howpublished = {Cryptology ePrint Archive, Report 2018/1209}, year = {2018}, url = {https://eprint.iacr.org/2018/1209}, } @misc{cryptoeprint:2018:120, author = {Benny Pinkas and Thomas Schneider and Christian Weinert and Udi Wieder}, title = {Efficient Circuit-based PSI via Cuckoo Hashing}, howpublished = {Cryptology ePrint Archive, Report 2018/120}, year = {2018}, url = {https://eprint.iacr.org/2018/120}, } @misc{cryptoeprint:2018:1210, author = {Arijit Dutta and Saravanan Vijayakumaran}, title = {MProve: A Proof of Assets Protocol for Monero Exchanges}, howpublished = {Cryptology ePrint Archive, Report 2018/1210}, year = {2018}, url = {https://eprint.iacr.org/2018/1210}, } @misc{cryptoeprint:2018:1211, author = {Suhyeon Lee and Seungjoo Kim}, title = {Countering Block Withholding Attack Effciently}, howpublished = {Cryptology ePrint Archive, Report 2018/1211}, year = {2018}, url = {https://eprint.iacr.org/2018/1211}, } @misc{cryptoeprint:2018:1212, author = {Itai Dinur and Niv Nadler}, title = {Multi-Target Attacks on the Picnic Signature Scheme and Related Protocols}, howpublished = {Cryptology ePrint Archive, Report 2018/1212}, year = {2018}, url = {https://eprint.iacr.org/2018/1212}, } @misc{cryptoeprint:2018:1213, author = {Yevhenii ZOTKIN and Francis OLIVIER and Eric BOURBAO}, title = {Deep Learning vs Template Attacks in front of fundamental targets: experimental study}, howpublished = {Cryptology ePrint Archive, Report 2018/1213}, year = {2018}, url = {https://eprint.iacr.org/2018/1213}, } @misc{cryptoeprint:2018:1214, author = {Joohee Lee and Dongwoo Kim and Duhyeong Kim and Yongsoo Song and Junbum Shin and Jung Hee Cheon1}, title = {Instant Privacy-Preserving Biometric Authentication for Hamming Distance}, howpublished = {Cryptology ePrint Archive, Report 2018/1214}, year = {2018}, url = {https://eprint.iacr.org/2018/1214}, } @misc{cryptoeprint:2018:1215, author = {Suhri Kim and Kisoon Yoon and Jihoon Kwon and Young-Ho Park and Seokhie Hong}, title = {New Hybrid Method for Isogeny-based Cryptosystems using Edwards Curves}, howpublished = {Cryptology ePrint Archive, Report 2018/1215}, year = {2018}, url = {https://eprint.iacr.org/2018/1215}, } @misc{cryptoeprint:2018:1216, author = {Thomas Debris-Alazard and Nicolas Sendrier and Jean-Pierre Tillich}, title = {This is Not an Attack on Wave}, howpublished = {Cryptology ePrint Archive, Report 2018/1216}, year = {2018}, url = {https://eprint.iacr.org/2018/1216}, } @misc{cryptoeprint:2018:1217, author = {Lilya Budaghyan and Claude Carlet and Tor Helleseth and Nikolay Kaleyski}, title = {Changing Points in APN Functions}, howpublished = {Cryptology ePrint Archive, Report 2018/1217}, year = {2018}, url = {https://eprint.iacr.org/2018/1217}, } @misc{cryptoeprint:2018:1218, author = {Dan Boneh and Yuval Ishai and Alain Passel\`egue and Amit Sahai and David J. Wu}, title = {Exploring Crypto Dark Matter: New Simple PRF Candidates and Their Applications}, howpublished = {Cryptology ePrint Archive, Report 2018/1218}, year = {2018}, url = {https://eprint.iacr.org/2018/1218}, } @misc{cryptoeprint:2018:1219, author = {Tomer Ashur and Raluca Posteuca}, title = {Cryptanalysis of the Full DES and the Full 3DES Using a New Linear Property}, howpublished = {Cryptology ePrint Archive, Report 2018/1219}, year = {2018}, url = {https://eprint.iacr.org/2018/1219}, } @misc{cryptoeprint:2018:121, author = {Daniel R. L. Brown}, title = {ECC mod 8^91+5}, howpublished = {Cryptology ePrint Archive, Report 2018/121}, year = {2018}, url = {https://eprint.iacr.org/2018/121}, } @misc{cryptoeprint:2018:1220, author = {Taiga Mizuide, Atsushi Takayasu, and Tsuyoshi Takagi}, title = {Tight Reductions for Diffie-Hellman Variants in the Algebraic Group Model}, howpublished = {Cryptology ePrint Archive, Report 2018/1220}, year = {2018}, url = {https://eprint.iacr.org/2018/1220}, } @misc{cryptoeprint:2018:1221, author = {M. Delcourt and T. Kleinjung and A.K. Lenstra and S. Nath and D. Page and N. Smart}, title = {Using the Cloud to Determine Key Strengths -- Triennial Update}, howpublished = {Cryptology ePrint Archive, Report 2018/1221}, year = {2018}, url = {https://eprint.iacr.org/2018/1221}, } @misc{cryptoeprint:2018:1222, author = {Cheng Chen and Nicholas Genise and Daniele Micciancio and Yuriy Polyakov and Kurt Rohloff}, title = {Implementing Token-Based Obfuscation under (Ring) LWE}, howpublished = {Cryptology ePrint Archive, Report 2018/1222}, year = {2018}, url = {https://eprint.iacr.org/2018/1222}, } @misc{cryptoeprint:2018:1223, author = {Alexander Nilsson and Thomas Johansson and Paul Stankovski Wagner}, title = {Error Amplification in Code-based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2018/1223}, year = {2018}, url = {https://eprint.iacr.org/2018/1223}, } @misc{cryptoeprint:2018:1224, author = {Essam Ghadafi}, title = {Further Lower Bounds for Structure-Preserving Signatures in Asymmetric Bilinear Groups}, howpublished = {Cryptology ePrint Archive, Report 2018/1224}, year = {2018}, url = {https://eprint.iacr.org/2018/1224}, } @misc{cryptoeprint:2018:1225, author = {Wen Wang and Bernhard Jungk and Julian Wälde and Shuwen Deng and Naina Gupta and Jakub Szefer and Ruben Niederhagen }, title = {XMSS and Embedded Systems - XMSS Hardware Accelerators for RISC-V}, howpublished = {Cryptology ePrint Archive, Report 2018/1225}, year = {2018}, url = {https://eprint.iacr.org/2018/1225}, } @misc{cryptoeprint:2018:1226, author = {Michael Tunstall and Louiza Papachristodoulou and Kostas Papagiannopoulos}, title = {Boolean Exponent Splitting}, howpublished = {Cryptology ePrint Archive, Report 2018/1226}, year = {2018}, url = {https://eprint.iacr.org/2018/1226}, } @misc{cryptoeprint:2018:1227, author = {Louis Cianciullo and Hossein Ghodosi }, title = {Efficient Information Theoretic Multi-Party Computation from Oblivious Linear Evaluation}, howpublished = {Cryptology ePrint Archive, Report 2018/1227}, year = {2018}, url = {https://eprint.iacr.org/2018/1227}, } @misc{cryptoeprint:2018:1228, author = {Marina Blanton and Chen Yuan}, title = {Multi-Party Oblivious RAM based on Function Secret Sharing and Replicated Secret Sharing Arithmetic}, howpublished = {Cryptology ePrint Archive, Report 2018/1228}, year = {2018}, url = {https://eprint.iacr.org/2018/1228}, } @misc{cryptoeprint:2018:1229, author = {Yingpu Deng, Lixia Luo and Guanju Xiao}, title = {On Some Computational Problems in Local Fields}, howpublished = {Cryptology ePrint Archive, Report 2018/1229}, year = {2018}, url = {https://eprint.iacr.org/2018/1229}, } @misc{cryptoeprint:2018:122, author = {Massimo Bartoletti and Roberto Zunino}, title = {BitML: a calculus for Bitcoin smart contracts}, howpublished = {Cryptology ePrint Archive, Report 2018/122}, year = {2018}, url = {https://eprint.iacr.org/2018/122}, } @misc{cryptoeprint:2018:1230, author = {Suhyeon Lee and Seungjoo Kim}, title = {Pooled Mining Makes Selfish Mining Tricky}, howpublished = {Cryptology ePrint Archive, Report 2018/1230}, year = {2018}, url = {https://eprint.iacr.org/2018/1230}, } @misc{cryptoeprint:2018:1231, author = {Endre Abraham}, title = {Post-quantum verifiable random functions from ring signatures}, howpublished = {Cryptology ePrint Archive, Report 2018/1231}, year = {2018}, url = {https://eprint.iacr.org/2018/1231}, } @misc{cryptoeprint:2018:1232, author = {D S V Madala and Mahabir Prasad Jhanwar and Anupam Chattopadhyay}, title = {Certificate Transparency Using Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2018/1232}, year = {2018}, url = {https://eprint.iacr.org/2018/1232}, } @misc{cryptoeprint:2018:1233, author = {Suyash Kandele and Souradyuti Paul}, title = {Key Assignment Scheme with Authenticated Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/1233}, year = {2018}, url = {https://eprint.iacr.org/2018/1233}, } @misc{cryptoeprint:2018:1234, author = {Raymond K. Zhao and Ron Steinfeld and Amin Sakzad}, title = {FACCT: FAst, Compact, and Constant-Time Discrete Gaussian Sampler over Integers}, howpublished = {Cryptology ePrint Archive, Report 2018/1234}, year = {2018}, url = {https://eprint.iacr.org/2018/1234}, } @misc{cryptoeprint:2018:1235, author = {Adi Akavia and Craig Gentry and Shai Halevi and Max Leibovich}, title = {Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free}, howpublished = {Cryptology ePrint Archive, Report 2018/1235}, year = {2018}, url = {https://eprint.iacr.org/2018/1235}, } @misc{cryptoeprint:2018:1236, author = {Mark Abspoel and Niek J. Bouman and Berry Schoenmakers and Niels de Vreede}, title = {Fast Secure Comparison for Medium-Sized Integers and Its Application in Binarized Neural Networks}, howpublished = {Cryptology ePrint Archive, Report 2018/1236}, year = {2018}, url = {https://eprint.iacr.org/2018/1236}, } @misc{cryptoeprint:2018:1237, author = {Boaz Barak and Samuel B. Hopkins and Aayush Jain and Pravesh Kothari and Amit Sahai}, title = {Sum-of-Squares Meets Program Obfuscation, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2018/1237}, year = {2018}, url = {https://eprint.iacr.org/2018/1237}, } @misc{cryptoeprint:2018:1238, author = {Ye Yuan and Kazuhide Fukushima and Junting Xiao and Shinsaku Kiyomoto and Tsuyoshi Takagi}, title = {Memory-Constrained Implementation of Lattice-based Encryption Scheme on the Standard Java Card Platform}, howpublished = {Cryptology ePrint Archive, Report 2018/1238}, year = {2018}, url = {https://eprint.iacr.org/2018/1238}, } @misc{cryptoeprint:2018:1239, author = {Peter Gaži and Aggelos Kiayias and Dionysis Zindros}, title = {Proof-of-Stake Sidechains}, howpublished = {Cryptology ePrint Archive, Report 2018/1239}, year = {2018}, url = {https://eprint.iacr.org/2018/1239}, } @misc{cryptoeprint:2018:123, author = {Howard M. Heys}, title = {Distributed Time-Memory Tradeoff Attacks on Ciphers (with Application to Stream Ciphers and Counter Mode)}, howpublished = {Cryptology ePrint Archive, Report 2018/123}, year = {2018}, url = {https://eprint.iacr.org/2018/123}, } @misc{cryptoeprint:2018:1240, author = {Nadim Kobeissi}, title = {Jevil's Encryption Systems}, howpublished = {Cryptology ePrint Archive, Report 2018/1240}, year = {2018}, url = {https://eprint.iacr.org/2018/1240}, } @misc{cryptoeprint:2018:1241, author = {Foteini Baldimtsi and Ran Canetti and Sophia Yakoubov}, title = {Universally Composable Accumulators}, howpublished = {Cryptology ePrint Archive, Report 2018/1241}, year = {2018}, url = {https://eprint.iacr.org/2018/1241}, } @misc{cryptoeprint:2018:1242, author = {Nicolas T. Courtois}, title = {Structural Nonlinear Invariant Attacks on T-310: Attacking Arbitrary Boolean Functions}, howpublished = {Cryptology ePrint Archive, Report 2018/1242}, year = {2018}, url = {https://eprint.iacr.org/2018/1242}, } @misc{cryptoeprint:2018:1243, author = {Ioana Boureanu and David Gerault and Pascal Lafourcade}, title = {Implementation-Level Corruptions in Distance Bounding -- Exhibiting Faults and Provably-Secure Fixes in the Electronic Payment Protocol PayPass --}, howpublished = {Cryptology ePrint Archive, Report 2018/1243}, year = {2018}, url = {https://eprint.iacr.org/2018/1243}, } @misc{cryptoeprint:2018:1244, author = {Ran Canetti and Sunoo Park and Oxana Poburinnaya}, title = {Fully Bideniable Interactive Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/1244}, year = {2018}, url = {https://eprint.iacr.org/2018/1244}, } @misc{cryptoeprint:2018:1245, author = {Jung Hee Cheon and Andrey Kim and Donggeon Yhee }, title = {Multi-dimensional Packing for HEAAN for Approximate Matrix Arithmetics}, howpublished = {Cryptology ePrint Archive, Report 2018/1245}, year = {2018}, url = {https://eprint.iacr.org/2018/1245}, } @misc{cryptoeprint:2018:1246, author = {Dat Le Tien and Frank Eliassen}, title = {Senopra: Reconciling Data Privacy and Utility via Attested Smart Contract Execution}, howpublished = {Cryptology ePrint Archive, Report 2018/1246}, year = {2018}, url = {https://eprint.iacr.org/2018/1246}, } @misc{cryptoeprint:2018:1247, author = {Paulo S. L. M. Barreto and Jefferson E. Ricardini and Marcos A. Simplicio Jr. and Harsh Kupwade Patil}, title = {qSCMS: Post-quantum certificate provisioning process for V2X}, howpublished = {Cryptology ePrint Archive, Report 2018/1247}, year = {2018}, url = {https://eprint.iacr.org/2018/1247}, } @misc{cryptoeprint:2018:1248, author = {Ran Canetti and Alex Lombardi and Daniel Wichs}, title = {Non-Interactive Zero Knowledge and Correlation Intractability from Circular-Secure FHE}, howpublished = {Cryptology ePrint Archive, Report 2018/1248}, year = {2018}, url = {https://eprint.iacr.org/2018/1248}, } @misc{cryptoeprint:2018:1249, author = {NingBo Li and TanPing Zhou and XiaoYuan Yang and YiLiang Han and Longfei Liu and WenChao Liu}, title = {Two round multiparty computation via Multi-key fully homomorphic encryption with faster homomorphic evaluations}, howpublished = {Cryptology ePrint Archive, Report 2018/1249}, year = {2018}, url = {https://eprint.iacr.org/2018/1249}, } @misc{cryptoeprint:2018:124, author = {Nguyen Tuan Anh and Nguyen Bui Cuong}, title = {Evaluating the indistinguishability of the XTS mode in the proposed security model}, howpublished = {Cryptology ePrint Archive, Report 2018/124}, year = {2018}, url = {https://eprint.iacr.org/2018/124}, } @misc{cryptoeprint:2018:1250, author = {Sikhar Patranabis and Debdeep Mukhopadhyay and Somindu C. Ramanna}, title = {Function Private Predicate Encryption for Low Min-Entropy Predicates}, howpublished = {Cryptology ePrint Archive, Report 2018/1250}, year = {2018}, url = {https://eprint.iacr.org/2018/1250}, } @misc{cryptoeprint:2018:1251, author = {San Ling and Khoa Nguyen and Huaxiong Wang and Yanhong Xu}, title = {Accountable Tracing Signatures from Lattices}, howpublished = {Cryptology ePrint Archive, Report 2018/1251}, year = {2018}, url = {https://eprint.iacr.org/2018/1251}, } @misc{cryptoeprint:2018:125, author = {Pasca Vlad-Raul and Simion Emil}, title = {Challenges in cyber security - Ransomware Phenomenon}, howpublished = {Cryptology ePrint Archive, Report 2018/125}, year = {2018}, url = {https://eprint.iacr.org/2018/125}, } @misc{cryptoeprint:2018:126, author = {Phillip Rogaway and Yusi Zhang}, title = {Onion-AE: Foundations of Nested Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/126}, year = {2018}, url = {https://eprint.iacr.org/2018/126}, } @misc{cryptoeprint:2018:127, author = {Robert Künnemann and Deepak Garg and Michael Backes}, title = {Accountability in Security Protocols}, howpublished = {Cryptology ePrint Archive, Report 2018/127}, year = {2018}, url = {https://eprint.iacr.org/2018/127}, } @misc{cryptoeprint:2018:128, author = {Charanjit S. Jutla}, title = {Authenticated Encryption Mode IAPM using SHA-3's Public Random Permutation}, howpublished = {Cryptology ePrint Archive, Report 2018/128}, year = {2018}, url = {https://eprint.iacr.org/2018/128}, } @misc{cryptoeprint:2018:129, author = {Tuyet Duong and Alexander Chepurnoy and Hong-Sheng Zhou}, title = {Multi-mode Cryptocurrency Systems}, howpublished = {Cryptology ePrint Archive, Report 2018/129}, year = {2018}, url = {https://eprint.iacr.org/2018/129}, } @misc{cryptoeprint:2018:130, author = {Mojtaba Zaheri and Babak Sadeghiyan}, title = {SMT-based Cube Attack on Simeck32/64}, howpublished = {Cryptology ePrint Archive, Report 2018/130}, year = {2018}, url = {https://eprint.iacr.org/2018/130}, } @misc{cryptoeprint:2018:131, author = {Ran Canetti and Yilei Chen and Leonid Reyzin and Ron D. Rothblum}, title = {Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/131}, year = {2018}, url = {https://eprint.iacr.org/2018/131}, } @misc{cryptoeprint:2018:132, author = {Gora Adj and Omran Ahmadi and Alfred Menezes}, title = {ON ISOGENY GRAPHS OF SUPERSINGULAR ELLIPTIC CURVES OVER FINITE FIELDS}, howpublished = {Cryptology ePrint Archive, Report 2018/132}, year = {2018}, url = {https://eprint.iacr.org/2018/132}, } @misc{cryptoeprint:2018:133, author = {Dan Boneh and Yuval Ishai and Amit Sahai and David J. Wu}, title = {Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs}, howpublished = {Cryptology ePrint Archive, Report 2018/133}, year = {2018}, url = {https://eprint.iacr.org/2018/133}, } @misc{cryptoeprint:2018:134, author = {Ayan Mahalanobis and Vivek Mallick}, title = {A Las Vegas algorithm to solve the elliptic curve discrete logarithm problem}, howpublished = {Cryptology ePrint Archive, Report 2018/134}, year = {2018}, url = {https://eprint.iacr.org/2018/134}, } @misc{cryptoeprint:2018:135, author = {Daniel Jost and Christian Badertscher and Fabio Banfi}, title = {A note on the equivalence of IND-CCA & INT-PTXT and IND-CCA & INT-CTXT}, howpublished = {Cryptology ePrint Archive, Report 2018/135}, year = {2018}, url = {https://eprint.iacr.org/2018/135}, } @misc{cryptoeprint:2018:136, author = {Priyanka Bose and Viet Tung Hoang and Stefano Tessaro}, title = {Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds}, howpublished = {Cryptology ePrint Archive, Report 2018/136}, year = {2018}, url = {https://eprint.iacr.org/2018/136}, } @misc{cryptoeprint:2018:137, author = {Pratik Soni and Stefano Tessaro}, title = {Naor-Reingold Goes Public: The Complexity of Known-key Security}, howpublished = {Cryptology ePrint Archive, Report 2018/137}, year = {2018}, url = {https://eprint.iacr.org/2018/137}, } @misc{cryptoeprint:2018:138, author = {Christian Badertscher and Juan Garay and Ueli Maurer and Daniel Tschudi and Vassilis Zikas}, title = {But Why does it Work? A Rational Protocol Design Treatment of Bitcoin}, howpublished = {Cryptology ePrint Archive, Report 2018/138}, year = {2018}, url = {https://eprint.iacr.org/2018/138}, } @misc{cryptoeprint:2018:139, author = {Wen-jie Lu and Jun Sakuma}, title = {Faster Multiplication Triplet Generation from Homomorphic Encryption for Practical Privacy-Preserving Machine Learning under a Narrow Bandwidth}, howpublished = {Cryptology ePrint Archive, Report 2018/139}, year = {2018}, url = {https://eprint.iacr.org/2018/139}, } @misc{cryptoeprint:2018:140, author = {Tomas Fabsic and Viliam Hromada and Pavol Zajac}, title = {A Reaction Attack on LEDApkc}, howpublished = {Cryptology ePrint Archive, Report 2018/140}, year = {2018}, url = {https://eprint.iacr.org/2018/140}, } @misc{cryptoeprint:2018:141, author = {Baiyu Li and Daniele Micciancio}, title = {Symbolic security of garbled circuits}, howpublished = {Cryptology ePrint Archive, Report 2018/141}, year = {2018}, url = {https://eprint.iacr.org/2018/141}, } @misc{cryptoeprint:2018:142, author = {Rui Zong and Xiaoyang Dong and Xiaoyun Wang}, title = {MILP-Aided Related-Tweak/Key Impossible Differential Attack and Its applications to QARMA, Joltik-BC}, howpublished = {Cryptology ePrint Archive, Report 2018/142}, year = {2018}, url = {https://eprint.iacr.org/2018/142}, } @misc{cryptoeprint:2018:143, author = {Shahram Khazaei}, title = {Conjecturally Superpolynomial Lower Bound for Share Size}, howpublished = {Cryptology ePrint Archive, Report 2018/143}, year = {2018}, url = {https://eprint.iacr.org/2018/143}, } @misc{cryptoeprint:2018:144, author = {Benny Applebaum and Thomas Holenstein and Manoj Mishra and Ofer Shayevitz}, title = {The Communication Complexity of Private Simultaneous Messages, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2018/144}, year = {2018}, url = {https://eprint.iacr.org/2018/144}, } @misc{cryptoeprint:2018:145, author = {Bin Zhang and Chao Xu and Willi Meier}, title = {Fast Near Collision Attack on the Grain v1 Stream Cipher}, howpublished = {Cryptology ePrint Archive, Report 2018/145}, year = {2018}, url = {https://eprint.iacr.org/2018/145}, } @misc{cryptoeprint:2018:146, author = {Léo Ducas and Cécile Pierrot}, title = {Polynomial Time Bounded Distance Decoding near Minkowski’s Bound in Discrete Logarithm Lattices}, howpublished = {Cryptology ePrint Archive, Report 2018/146}, year = {2018}, url = {https://eprint.iacr.org/2018/146}, } @misc{cryptoeprint:2018:147, author = {Joel Alwen and Jeremiah Blocki and Krzysztof Pietrzak}, title = {Sustained Space Complexity}, howpublished = {Cryptology ePrint Archive, Report 2018/147}, year = {2018}, url = {https://eprint.iacr.org/2018/147}, } @misc{cryptoeprint:2018:148, author = {Amos Beimel and Eyal Kushilevitz and Pnina Nissim}, title = {The Complexity of Multiparty PSM Protocols and Related Models}, howpublished = {Cryptology ePrint Archive, Report 2018/148}, year = {2018}, url = {https://eprint.iacr.org/2018/148}, } @misc{cryptoeprint:2018:149, author = {Ilan Komargodski and Eylon Yogev}, title = {Another Step Towards Realizing Random Oracles: Non-Malleable Point Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2018/149}, year = {2018}, url = {https://eprint.iacr.org/2018/149}, } @misc{cryptoeprint:2018:150, author = {Tim Fritzmann and Thomas P\"oppelmann and Johanna Sepulveda}, title = {Analysis of Error-Correcting Codes for Lattice-Based Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2018/150}, year = {2018}, url = {https://eprint.iacr.org/2018/150}, } @misc{cryptoeprint:2018:151, author = {Sanjam Garg and Akshayaram Srinivasan}, title = {Adaptively Secure Garbling with Near Optimal Online Complexity}, howpublished = {Cryptology ePrint Archive, Report 2018/151}, year = {2018}, url = {https://eprint.iacr.org/2018/151}, } @misc{cryptoeprint:2018:152, author = {Jung-Keun Lee and Bonwook Koo and Woo-Hwan Kim}, title = {Related-Key Linear Cryptanalysis on SIMON}, howpublished = {Cryptology ePrint Archive, Report 2018/152}, year = {2018}, url = {https://eprint.iacr.org/2018/152}, } @misc{cryptoeprint:2018:153, author = {Jung Hee Cheon and Kyoohyung Han and Andrey Kim and Miran Kim and Yongsoo Song}, title = {Bootstrapping for Approximate Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/153}, year = {2018}, url = {https://eprint.iacr.org/2018/153}, } @misc{cryptoeprint:2018:154, author = {Nuttapong Attrapadung and Takahiro Matsuda and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, title = {Constrained PRFs for NC1 in Traditional Groups}, howpublished = {Cryptology ePrint Archive, Report 2018/154}, year = {2018}, url = {https://eprint.iacr.org/2018/154}, } @misc{cryptoeprint:2018:155, author = {Yuyu Wang and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka}, title = {Memory Lower Bounds of Reductions Revisited}, howpublished = {Cryptology ePrint Archive, Report 2018/155}, year = {2018}, url = {https://eprint.iacr.org/2018/155}, } @misc{cryptoeprint:2018:156, author = {Sanjam Garg and Susumu Kiyoshima and Omkant Pandey}, title = {A New Approach to Black-Box Concurrent Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2018/156}, year = {2018}, url = {https://eprint.iacr.org/2018/156}, } @misc{cryptoeprint:2018:157, author = {Bernardo David and Rafael Dowsley and Mario Larangeira}, title = {ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement}, howpublished = {Cryptology ePrint Archive, Report 2018/157}, year = {2018}, url = {https://eprint.iacr.org/2018/157}, } @misc{cryptoeprint:2018:158, author = {Meicheng Liu and Jingchun Yang and Wenhao Wang and Dongdai Lin}, title = {Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery}, howpublished = {Cryptology ePrint Archive, Report 2018/158}, year = {2018}, url = {https://eprint.iacr.org/2018/158}, } @misc{cryptoeprint:2018:159, author = {Gaëtan Leurent and Ferdinand Sibleyras}, title = {The Missing Difference Problem, and its Applications to Counter Mode Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/159}, year = {2018}, url = {https://eprint.iacr.org/2018/159}, } @misc{cryptoeprint:2018:160, author = {Sinisa Matetic and Moritz Schneider and Andrew Miller and Ari Juels and Srdjan Capkun}, title = {DelegaTEE: Brokered Delegation Using Trusted Execution Environments}, howpublished = {Cryptology ePrint Archive, Report 2018/160}, year = {2018}, url = {https://eprint.iacr.org/2018/160}, } @misc{cryptoeprint:2018:161, author = {Carlos Cid and Tao Huang and Thomas Peyrin and Yu Sasaki and Ling Song}, title = {Boomerang Connectivity Table: A New Cryptanalysis Tool}, howpublished = {Cryptology ePrint Archive, Report 2018/161}, year = {2018}, url = {https://eprint.iacr.org/2018/161}, } @misc{cryptoeprint:2018:162, author = {Jean Paul Degabriele and Martijn Stam}, title = {Untagging Tor: A Formal Treatment of Onion Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/162}, year = {2018}, url = {https://eprint.iacr.org/2018/162}, } @misc{cryptoeprint:2018:163, author = {Stanislaw Jarecki and Hugo Krawczyk and Jiayu Xu}, title = {OPAQUE: An Asymmetric PAKE Protocol Secure Against Pre-Computation Attacks}, howpublished = {Cryptology ePrint Archive, Report 2018/163}, year = {2018}, url = {https://eprint.iacr.org/2018/163}, } @misc{cryptoeprint:2018:164, author = {Pavel Hub\'{a}\v{c}ek and Alon Rosen and Margarita Vald}, title = {An Efficiency-Preserving Transformation from Honest-Verifier Statistical Zero-Knowledge to Statistical Zero-Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2018/164}, year = {2018}, url = {https://eprint.iacr.org/2018/164}, } @misc{cryptoeprint:2018:165, author = {Jan Camenisch and Manu Drijvers and Tommaso Gagliardoni and Anja Lehmann and Gregory Neven}, title = {The Wonderful World of Global Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2018/165}, year = {2018}, url = {https://eprint.iacr.org/2018/165}, } @misc{cryptoeprint:2018:166, author = {Atul Luykx and Bart Preneel}, title = {Optimal Forgeries Against Polynomial-Based MACs and GCM}, howpublished = {Cryptology ePrint Archive, Report 2018/166}, year = {2018}, url = {https://eprint.iacr.org/2018/166}, } @misc{cryptoeprint:2018:167, author = {Nils Fleischhacker and Vipul Goyal and Abhishek Jain}, title = {On the Existence of Three Round Zero-Knowledge Proofs}, howpublished = {Cryptology ePrint Archive, Report 2018/167}, year = {2018}, url = {https://eprint.iacr.org/2018/167}, } @misc{cryptoeprint:2018:168, author = {Yael Tauman Kalai and Dakshita Khurana and Amit Sahai}, title = {Statistical Witness Indistinguishability (and more) in Two Messages}, howpublished = {Cryptology ePrint Archive, Report 2018/168}, year = {2018}, url = {https://eprint.iacr.org/2018/168}, } @misc{cryptoeprint:2018:169, author = {Srimanta Bhattacharya and Mridul Nandi}, title = {Full Indifferentiable Security of the Xor of Two or More Random Permutations Using the $\chi^2$ Method}, howpublished = {Cryptology ePrint Archive, Report 2018/169}, year = {2018}, url = {https://eprint.iacr.org/2018/169}, } @misc{cryptoeprint:2018:170, author = {Miruna Rosca and Damien Stehl\'{e} and Alexandre Wallet}, title = {On the Ring-LWE and Polynomial-LWE problems}, howpublished = {Cryptology ePrint Archive, Report 2018/170}, year = {2018}, url = {https://eprint.iacr.org/2018/170}, } @misc{cryptoeprint:2018:171, author = {Yi-Hsiu Chen and Kai-Min Chung and Jyun-Jie Liao}, title = {On the Complexity of Simulating Auxiliary Input}, howpublished = {Cryptology ePrint Archive, Report 2018/171}, year = {2018}, url = {https://eprint.iacr.org/2018/171}, } @misc{cryptoeprint:2018:172, author = {Felix Wegener and Amir Moradi}, title = {A First-Order SCA Resistant AES without Fresh Randomness}, howpublished = {Cryptology ePrint Archive, Report 2018/172}, year = {2018}, url = {https://eprint.iacr.org/2018/172}, } @misc{cryptoeprint:2018:173, author = {Benjamin Grégoire and Kostas Papagiannopoulos and Peter Schwabe and Ko Stoffelen}, title = {Vectorizing Higher-Order Masking}, howpublished = {Cryptology ePrint Archive, Report 2018/173}, year = {2018}, url = {https://eprint.iacr.org/2018/173}, } @misc{cryptoeprint:2018:174, author = {Chen-Dong Ye and Tian Tian}, title = {A New Framework for Finding Nonlinear Superpolies in Cube Attacks against Trivium-Like Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2018/174}, year = {2018}, url = {https://eprint.iacr.org/2018/174}, } @misc{cryptoeprint:2018:175, author = {Vincent Grosso}, title = {Scalable Key Rank Estimation (and Key Enumeration) Algorithm for Large Keys}, howpublished = {Cryptology ePrint Archive, Report 2018/175}, year = {2018}, url = {https://eprint.iacr.org/2018/175}, } @misc{cryptoeprint:2018:176, author = {Kamil Kluczniak and Man Ho Au}, title = {Fine-Tuning Decentralized Anonymous Payment Systems based on Arguments for Arithmetic Circuit Satisfiability}, howpublished = {Cryptology ePrint Archive, Report 2018/176}, year = {2018}, url = {https://eprint.iacr.org/2018/176}, } @misc{cryptoeprint:2018:177, author = {Houssem Maghrebi and Emmanuel Prouff}, title = {On the Use of Independent Component Analysis to Denoise Side-Channel Measurements}, howpublished = {Cryptology ePrint Archive, Report 2018/177}, year = {2018}, url = {https://eprint.iacr.org/2018/177}, } @misc{cryptoeprint:2018:178, author = {Zhi Hu and Lin Wang and Chang-An Zhao}, title = {Fast Formulae for Arithmetic of Degenerate Divisors on Genus Two Curves}, howpublished = {Cryptology ePrint Archive, Report 2018/178}, year = {2018}, url = {https://eprint.iacr.org/2018/178}, } @misc{cryptoeprint:2018:179, author = {Ken Goss and Wei Jiang}, title = {Efficient and Constant-Rounds Secure Comparison through Dynamic Groups and Asymmetric Computations}, howpublished = {Cryptology ePrint Archive, Report 2018/179}, year = {2018}, url = {https://eprint.iacr.org/2018/179}, } @misc{cryptoeprint:2018:180, author = {Sanjam Garg and Peihan Miao and Akshayaram Srinivasan}, title = {Two-Round Multiparty Secure Computation Minimizing Public Key Operations}, howpublished = {Cryptology ePrint Archive, Report 2018/180}, year = {2018}, url = {https://eprint.iacr.org/2018/180}, } @misc{cryptoeprint:2018:181, author = {Christoph Dobraunig and Maria Eichlseder and Lorenzo Grassi and Virginie Lallemand and Gregor Leander and Eik List and Florian Mendel and Christian Rechberger}, title = {Rasta: A cipher with low ANDdepth and few ANDs per bit}, howpublished = {Cryptology ePrint Archive, Report 2018/181}, year = {2018}, url = {https://eprint.iacr.org/2018/181}, } @misc{cryptoeprint:2018:182, author = {Lorenzo Grassi and Christian Rechberger}, title = {New Rigorous Analysis of Truncated Differentials for 5-round AES}, howpublished = {Cryptology ePrint Archive, Report 2018/182}, year = {2018}, url = {https://eprint.iacr.org/2018/182}, } @misc{cryptoeprint:2018:183, author = {Bram Cohen and Krzysztof Pietrzak}, title = {Simple Proofs of Sequential Work}, howpublished = {Cryptology ePrint Archive, Report 2018/183}, year = {2018}, url = {https://eprint.iacr.org/2018/183}, } @misc{cryptoeprint:2018:184, author = {Yongjun Zhao and Sherman S. M. Chow}, title = {Can you find the one for me? Privacy-Preserving Matchmaking via Threshold PSI}, howpublished = {Cryptology ePrint Archive, Report 2018/184}, year = {2018}, url = {https://eprint.iacr.org/2018/184}, } @misc{cryptoeprint:2018:185, author = {Marcos A. Simplicio Jr. and Eduardo Lopes Cominetti and Harsh Kupwade Patil and Jefferson E. Ricardini and Leonardo T. D. Ferraz and Marcos Vinicius M. Silva}, title = {A privacy-preserving method for temporarily linking/revoking pseudonym certificates in vehicular networks}, howpublished = {Cryptology ePrint Archive, Report 2018/185}, year = {2018}, url = {https://eprint.iacr.org/2018/185}, } @misc{cryptoeprint:2018:186, author = {Daniel R. L. Brown}, title = {RKHD ElGamal signing and 1-way sums}, howpublished = {Cryptology ePrint Archive, Report 2018/186}, year = {2018}, url = {https://eprint.iacr.org/2018/186}, } @misc{cryptoeprint:2018:187, author = {Sean Bowe and Ariel Gabizon}, title = {Making Groth's zk-SNARK Simulation Extractable in the Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2018/187}, year = {2018}, url = {https://eprint.iacr.org/2018/187}, } @misc{cryptoeprint:2018:188, author = {Stephen D. Miller and Noah Stephens-Davidowitz}, title = {Generalizations of Banaszczyk's transference theorems and tail bound}, howpublished = {Cryptology ePrint Archive, Report 2018/188}, year = {2018}, url = {https://eprint.iacr.org/2018/188}, } @misc{cryptoeprint:2018:189, author = {Pascal Sasdrich and René Bock and Amir Moradi}, title = {Threshold Implementation in Software - Case Study of PRESENT}, howpublished = {Cryptology ePrint Archive, Report 2018/189}, year = {2018}, url = {https://eprint.iacr.org/2018/189}, } @misc{cryptoeprint:2018:190, author = {Sikhar Patranabis and Debdeep Mukhopadhyay}, title = {New Lower Bounds on Predicate Entropy for Function Private Public-Key Predicate Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/190}, year = {2018}, url = {https://eprint.iacr.org/2018/190}, } @misc{cryptoeprint:2018:191, author = {Michael Backes and Lucjan Hanzlik and Kamil Kluczniak and Jonas Schneider}, title = {Signatures with Flexible Public Key: A Unified Approach to Privacy-Preserving Signatures (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2018/191}, year = {2018}, url = {https://eprint.iacr.org/2018/191}, } @misc{cryptoeprint:2018:192, author = {Nicola Atzei and Massimo Bartoletti and Tiziana Cimoli and Stefano Lande and Roberto Zunino}, title = {SoK: unraveling Bitcoin smart contracts}, howpublished = {Cryptology ePrint Archive, Report 2018/192}, year = {2018}, url = {https://eprint.iacr.org/2018/192}, } @misc{cryptoeprint:2018:193, author = {Michael Scott}, title = {A New Family of Pairing-Friendly elliptic curves}, howpublished = {Cryptology ePrint Archive, Report 2018/193}, year = {2018}, url = {https://eprint.iacr.org/2018/193}, } @misc{cryptoeprint:2018:194, author = {Krzysztof Pietrzak}, title = {Proofs of Catalytic Space}, howpublished = {Cryptology ePrint Archive, Report 2018/194}, year = {2018}, url = {https://eprint.iacr.org/2018/194}, } @misc{cryptoeprint:2018:195, author = {Ghous Amjad and Seny Kamara and Tarik Moataz }, title = {Breach-Resistant Structured Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/195}, year = {2018}, url = {https://eprint.iacr.org/2018/195}, } @misc{cryptoeprint:2018:196, author = {Benjamin Timon}, title = {Non-Profiled Deep Learning-Based Side-Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2018/196}, year = {2018}, url = {https://eprint.iacr.org/2018/196}, } @misc{cryptoeprint:2018:197, author = {Philippe Jacquet and Bernard Mans}, title = {Green Mining: toward a less energetic impact of cryptocurrencies}, howpublished = {Cryptology ePrint Archive, Report 2018/197}, year = {2018}, url = {https://eprint.iacr.org/2018/197}, } @misc{cryptoeprint:2018:198, author = {Ximing Fu and Xiaoyun Wang and Xiaoyang Dong and Willi Meier}, title = {A Key-recovery Attack on 855-round Trivium}, howpublished = {Cryptology ePrint Archive, Report 2018/198}, year = {2018}, url = {https://eprint.iacr.org/2018/198}, } @misc{cryptoeprint:2018:199, author = {David Derler and Tibor Jager and Daniel Slamanig and Christoph Striecks}, title = {Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2018/199}, year = {2018}, url = {https://eprint.iacr.org/2018/199}, } @misc{cryptoeprint:2018:200, author = {Eugene Pilyankevich and Ignat Korchagin and Andrey Mnatsakanov}, title = {Hermes. A framework for cryptographically assured access control and data security}, howpublished = {Cryptology ePrint Archive, Report 2018/200}, year = {2018}, url = {https://eprint.iacr.org/2018/200}, } @misc{cryptoeprint:2018:201, author = {Jim Basilakis and Bahman Javadi}, title = {Efficient Parallel Binary Operations on Homomorphic Encrypted Real Numbers}, howpublished = {Cryptology ePrint Archive, Report 2018/201}, year = {2018}, url = {https://eprint.iacr.org/2018/201}, } @misc{cryptoeprint:2018:202, author = {Jack L.H. Crawford and Craig Gentry and Shai Halevi and Daniel Platt and Victor Shoup}, title = {Doing Real Work with FHE: The Case of Logistic Regression}, howpublished = {Cryptology ePrint Archive, Report 2018/202}, year = {2018}, url = {https://eprint.iacr.org/2018/202}, } @misc{cryptoeprint:2018:203, author = {Anita Aghaie and Amir Moradi and Shahram Rasoolzadeh and Falk Schellenberg and Tobias Schneider}, title = {Impeccable Circuits}, howpublished = {Cryptology ePrint Archive, Report 2018/203}, year = {2018}, url = {https://eprint.iacr.org/2018/203}, } @misc{cryptoeprint:2018:204, author = {Serge Fehr and Pierre Karpman and Bart Mennink}, title = {Short Non-Malleable Codes from Related-Key Secure Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2018/204}, year = {2018}, url = {https://eprint.iacr.org/2018/204}, } @misc{cryptoeprint:2018:205, author = {Thaddeus Dryja and Quanquan C. Liu and Sunoo Park}, title = {Static-Memory-Hard Functions and Nonlinear Space-Time Tradeoffs via Pebbling}, howpublished = {Cryptology ePrint Archive, Report 2018/205}, year = {2018}, url = {https://eprint.iacr.org/2018/205}, } @misc{cryptoeprint:2018:206, author = {Edouard Dufour Sans and Romain Gay and David Pointcheval}, title = {Reading in the Dark: Classifying Encrypted Digits with Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/206}, year = {2018}, url = {https://eprint.iacr.org/2018/206}, } @misc{cryptoeprint:2018:207, author = {Marshall Ball and Dana Dachman-Soled and Siyao Guo and Tal Malkin and Li-Yang Tan}, title = {Non-Malleable Codes for Small-Depth Circuits}, howpublished = {Cryptology ePrint Archive, Report 2018/207}, year = {2018}, url = {https://eprint.iacr.org/2018/207}, } @misc{cryptoeprint:2018:208, author = {Carmit Hazay and Emmanuela Orsini and Peter Scholl and Eduardo Soria-Vazquez}, title = {Efficient MPC from Syndrome Decoding (or: Honey, I Shrunk the Keys)}, howpublished = {Cryptology ePrint Archive, Report 2018/208}, year = {2018}, url = {https://eprint.iacr.org/2018/208}, } @misc{cryptoeprint:2018:209, author = {Eleftherios Kokoris-Kogias and Enis Ceyhun Alp and Sandra Deepthy Siby and Nicolas Gaillya and Philipp Jovanovic and Linus Gasser and Bryan Ford}, title = {Hidden in Plain Sight: Storing and Managing Secrets on a Public Ledger}, howpublished = {Cryptology ePrint Archive, Report 2018/209}, year = {2018}, url = {https://eprint.iacr.org/2018/209}, } @misc{cryptoeprint:2018:210, author = {Allison Bishop and Lucas Kowalczyk and Tal Malkin and Valerio Pastro and Mariana Raykova and Kevin Shi}, title = {A Simple Obfuscation Scheme for Pattern-Matching with Wildcards}, howpublished = {Cryptology ePrint Archive, Report 2018/210}, year = {2018}, url = {https://eprint.iacr.org/2018/210}, } @misc{cryptoeprint:2018:211, author = {Prasanna Ravi and Shivam Bhasin and Anupam Chattopadhyay}, title = {Number "Not" Used Once - Key Recovery Fault Attacks on LWE Based Lattice Cryptographic Schemes}, howpublished = {Cryptology ePrint Archive, Report 2018/211}, year = {2018}, url = {https://eprint.iacr.org/2018/211}, } @misc{cryptoeprint:2018:212, author = {Thibaut Horel and Sunoo Park and Silas Richelson and Vinod Vaikuntanathan}, title = {How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts}, howpublished = {Cryptology ePrint Archive, Report 2018/212}, year = {2018}, url = {https://eprint.iacr.org/2018/212}, } @misc{cryptoeprint:2018:213, author = {I. Stewart and D. Ilie and A. Zamyatin and S. Werner and M.F. Torshizi and W.J. Knottenbelt}, title = {Committing to Quantum Resistance: A Slow Defence for Bitcoin against a Fast Quantum Computing Attack}, howpublished = {Cryptology ePrint Archive, Report 2018/213}, year = {2018}, url = {https://eprint.iacr.org/2018/213}, } @misc{cryptoeprint:2018:214, author = {Ahmad Khoureich Ka}, title = {R-MAC - A lightwheight authentication protocol for RFID Tags}, howpublished = {Cryptology ePrint Archive, Report 2018/214}, year = {2018}, url = {https://eprint.iacr.org/2018/214}, } @misc{cryptoeprint:2018:215, author = {Panagiotis Grontas and Aris Pagourtzis and Alexandros Zacharakis and Bingsheng Zhang}, title = {Towards everlasting privacy and efficient coercion resistance in remote electronic voting}, howpublished = {Cryptology ePrint Archive, Report 2018/215}, year = {2018}, url = {https://eprint.iacr.org/2018/215}, } @misc{cryptoeprint:2018:216, author = {S. Dov Gordon and Samuel Ranellucci and Xiao Wang}, title = {Secure Computation with Low Communication from Cross-checking}, howpublished = {Cryptology ePrint Archive, Report 2018/216}, year = {2018}, url = {https://eprint.iacr.org/2018/216}, } @misc{cryptoeprint:2018:217, author = {Mihir Bellare and Wei Dai}, title = {Defending Against Key Exfiltration: Efficiency Improvements for Big-Key Cryptography via Large-Alphabet Subkey Prediction}, howpublished = {Cryptology ePrint Archive, Report 2018/217}, year = {2018}, url = {https://eprint.iacr.org/2018/217}, } @misc{cryptoeprint:2018:218, author = {Jakub Breier and Xiaolu Hou and Yang Liu}, title = {Fault Resilient Encoding Schemes in Software: How Far Can We Go?}, howpublished = {Cryptology ePrint Archive, Report 2018/218}, year = {2018}, url = {https://eprint.iacr.org/2018/218}, } @misc{cryptoeprint:2018:219, author = {Jakub Breier and Dirmanto Jap and Xiaolu Hou and Shivam Bhasin}, title = {On Side-Channel Vulnerabilities of Bit Permutations: Key Recovery and Reverse Engineering}, howpublished = {Cryptology ePrint Archive, Report 2018/219}, year = {2018}, url = {https://eprint.iacr.org/2018/219}, } @misc{cryptoeprint:2018:220, author = {Shruti Tople and Yaoqi Jia and Prateek Saxena}, title = {PRO-ORAM: Constant Latency Read-Only Oblivious RAM}, howpublished = {Cryptology ePrint Archive, Report 2018/220}, year = {2018}, url = {https://eprint.iacr.org/2018/220}, } @misc{cryptoeprint:2018:221, author = {Jeremiah Blocki and Ling Ren and Samson Zhou}, title = {Bandwidth-Hard Functions: Reductions and Lower Bounds}, howpublished = {Cryptology ePrint Archive, Report 2018/221}, year = {2018}, url = {https://eprint.iacr.org/2018/221}, } @misc{cryptoeprint:2018:222, author = {Elizabeth A. Quaglia and Ben Smyth}, title = {Authentication with weaker trust assumptions for voting systems}, howpublished = {Cryptology ePrint Archive, Report 2018/222}, year = {2018}, url = {https://eprint.iacr.org/2018/222}, } @misc{cryptoeprint:2018:223, author = {Bertram Poettering}, title = {Shorter double-authentication preventing signatures for small address spaces}, howpublished = {Cryptology ePrint Archive, Report 2018/223}, year = {2018}, url = {https://eprint.iacr.org/2018/223}, } @misc{cryptoeprint:2018:224, author = {Rhys Carlton and Aleksander Essex and Krzysztof Kapulkin}, title = {Threshold Properties of Prime Power Subgroups with Application to Secure Integer Comparisons}, howpublished = {Cryptology ePrint Archive, Report 2018/224}, year = {2018}, url = {https://eprint.iacr.org/2018/224}, } @misc{cryptoeprint:2018:225, author = {Ben Smyth}, title = {A foundation for secret, verifiable elections}, howpublished = {Cryptology ePrint Archive, Report 2018/225}, year = {2018}, url = {https://eprint.iacr.org/2018/225}, } @misc{cryptoeprint:2018:226, author = {Sandro Coretti and Yevgeniy Dodis and Siyao Guo}, title = {Non-Uniform Bounds in the Random-Permutation, Ideal-Cipher, and Generic-Group Models}, howpublished = {Cryptology ePrint Archive, Report 2018/226}, year = {2018}, url = {https://eprint.iacr.org/2018/226}, } @misc{cryptoeprint:2018:227, author = {Wei-Kai Lin and Elaine Shi and Tiancheng Xie}, title = {Can We Overcome the $n \log n$ Barrier for Oblivious Sorting?}, howpublished = {Cryptology ePrint Archive, Report 2018/227}, year = {2018}, url = {https://eprint.iacr.org/2018/227}, } @misc{cryptoeprint:2018:228, author = {Georg Fuchsbauer and Michele Orrù}, title = {Non-interactive zaps of knowledge}, howpublished = {Cryptology ePrint Archive, Report 2018/228}, year = {2018}, url = {https://eprint.iacr.org/2018/228}, } @misc{cryptoeprint:2018:229, author = {Wei Dai and William Whyte and Zhenfei Zhang}, title = {Optimizing polynomial convolution for NTRUEncrypt}, howpublished = {Cryptology ePrint Archive, Report 2018/229}, year = {2018}, url = {https://eprint.iacr.org/2018/229}, } @misc{cryptoeprint:2018:230, author = {Jan-Pieter D’Anvers, Angshuman Karmakar Sujoy Sinha Roy, and Frederik Vercauteren}, title = {Saber: Module-LWR based key exchange, CPA-secure encryption and CCA-secure KEM}, howpublished = {Cryptology ePrint Archive, Report 2018/230}, year = {2018}, url = {https://eprint.iacr.org/2018/230}, } @misc{cryptoeprint:2018:231, author = {Zhengjun Cao and Lihua Liu}, title = {Remarks on Bell's Inequality}, howpublished = {Cryptology ePrint Archive, Report 2018/231}, year = {2018}, url = {https://eprint.iacr.org/2018/231}, } @misc{cryptoeprint:2018:232, author = {Masahiro Yagisawa}, title = {Improved fully homomorphic public-key encryption with small ciphertext size}, howpublished = {Cryptology ePrint Archive, Report 2018/232}, year = {2018}, url = {https://eprint.iacr.org/2018/232}, } @misc{cryptoeprint:2018:233, author = {Charlotte Bonte and Frederik Vercauteren }, title = {Privacy-Preserving Logistic Regression Training}, howpublished = {Cryptology ePrint Archive, Report 2018/233}, year = {2018}, url = {https://eprint.iacr.org/2018/233}, } @misc{cryptoeprint:2018:234, author = {Hagen Sparka and Florian Tschorsch and Björn Scheuermann}, title = {P2KMV: A Privacy-preserving Counting Sketch for Efficient and Accurate Set Intersection Cardinality Estimations}, howpublished = {Cryptology ePrint Archive, Report 2018/234}, year = {2018}, url = {https://eprint.iacr.org/2018/234}, } @misc{cryptoeprint:2018:235, author = {Julian Loss and Tal Moran}, title = {Combining Asynchronous and Synchronous Byzantine Agreement: The Best of Both Worlds}, howpublished = {Cryptology ePrint Archive, Report 2018/235}, year = {2018}, url = {https://eprint.iacr.org/2018/235}, } @misc{cryptoeprint:2018:236, author = {Yuval Marcus and Ethan Heilman and Sharon Goldberg}, title = {Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network}, howpublished = {Cryptology ePrint Archive, Report 2018/236}, year = {2018}, url = {https://eprint.iacr.org/2018/236}, } @misc{cryptoeprint:2018:237, author = {Julia Hesse and Dennis Hofheinz and Lisa Kohl}, title = {On Tightly Secure Non-Interactive Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2018/237}, year = {2018}, url = {https://eprint.iacr.org/2018/237}, } @misc{cryptoeprint:2018:238, author = {Brett Hemenway Falk and Daniel Noble and Rafail Ostrovsky}, title = {Private Set Intersection with Linear Communication from General Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2018/238}, year = {2018}, url = {https://eprint.iacr.org/2018/238}, } @misc{cryptoeprint:2018:239, author = {Jiangshan Yu and David Kozhaya and Jeremie Decouchant and Paulo Esteves-Verissimo}, title = {RepuCoin: Your Reputation is Your Power}, howpublished = {Cryptology ePrint Archive, Report 2018/239}, year = {2018}, url = {https://eprint.iacr.org/2018/239}, } @misc{cryptoeprint:2018:240, author = {Ron D. Rothblum and Adam Sealfon and Katerina Sotiraki}, title = {Towards Non-Interactive Zero-Knowledge for NP from LWE}, howpublished = {Cryptology ePrint Archive, Report 2018/240}, year = {2018}, url = {https://eprint.iacr.org/2018/240}, } @misc{cryptoeprint:2018:241, author = {Neha Narula and Willy Vasquez and Madars Virza}, title = {zkLedger: Privacy-Preserving Auditing for Distributed Ledgers}, howpublished = {Cryptology ePrint Archive, Report 2018/241}, year = {2018}, url = {https://eprint.iacr.org/2018/241}, } @misc{cryptoeprint:2018:242, author = {Sudhakar Kumawat and Souradyuti Paul}, title = {A New Constant-size Accountable Ring Signature Scheme Without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2018/242}, year = {2018}, url = {https://eprint.iacr.org/2018/242}, } @misc{cryptoeprint:2018:243, author = {Indra Deep Mastan and Souradyuti Paul}, title = {A New Approach to Deanonymization of Unreachable Bitcoin Nodes}, howpublished = {Cryptology ePrint Archive, Report 2018/243}, year = {2018}, url = {https://eprint.iacr.org/2018/243}, } @misc{cryptoeprint:2018:244, author = {Shai Halevi and Victor Shoup}, title = {Faster Homomorphic Linear Transformations in HElib}, howpublished = {Cryptology ePrint Archive, Report 2018/244}, year = {2018}, url = {https://eprint.iacr.org/2018/244}, } @misc{cryptoeprint:2018:245, author = {Adi Akavia and Dan Feldman and Hayim Shaul}, title = {Secure Search via Multi-Ring Fully Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/245}, year = {2018}, url = {https://eprint.iacr.org/2018/245}, } @misc{cryptoeprint:2018:246, author = {Chris Culnane and Olivier Pereira and Kim Ramchen and Vanessa Teague}, title = {Universally Verifiable MPC with Applications to IRV Ballot Counting}, howpublished = {Cryptology ePrint Archive, Report 2018/246}, year = {2018}, url = {https://eprint.iacr.org/2018/246}, } @misc{cryptoeprint:2018:247, author = {Thang Hoang and Muslum Ozgur Ozmen and Yeongjin Jang and Attila A. Yavuz}, title = {Hardware-Supported ORAM in Effect: Practical Oblivious Search and Update on Very Large Dataset}, howpublished = {Cryptology ePrint Archive, Report 2018/247}, year = {2018}, url = {https://eprint.iacr.org/2018/247}, } @misc{cryptoeprint:2018:248, author = {Peter Gaži and Aggelos Kiayias and Alexander Russell}, title = {Stake-Bleeding Attacks on Proof-of-Stake Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2018/248}, year = {2018}, url = {https://eprint.iacr.org/2018/248}, } @misc{cryptoeprint:2018:249, author = {Zhengjun Cao and Jeffrey Uhlmann and Lihua Liu}, title = {Analysis of Deutsch-Jozsa Quantum Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2018/249}, year = {2018}, url = {https://eprint.iacr.org/2018/249}, } @misc{cryptoeprint:2018:250, author = {Xiong Fan and Qiang Tang}, title = {Making Public Key Functional Encryption Function Private, Distributively}, howpublished = {Cryptology ePrint Archive, Report 2018/250}, year = {2018}, url = {https://eprint.iacr.org/2018/250}, } @misc{cryptoeprint:2018:251, author = {Rohit Sinha and Mihai Christodorescu}, title = {VeritasDB: High Throughput Key-Value Store with Integrity}, howpublished = {Cryptology ePrint Archive, Report 2018/251}, year = {2018}, url = {https://eprint.iacr.org/2018/251}, } @misc{cryptoeprint:2018:252, author = {Yongge Wang and Qutaibah m. Malluhi}, title = {The Limit of Blockchains: Infeasibility of a Smart Obama-Trump Contract}, howpublished = {Cryptology ePrint Archive, Report 2018/252}, year = {2018}, url = {https://eprint.iacr.org/2018/252}, } @misc{cryptoeprint:2018:253, author = {Nadim Kobeissi}, title = {Capsule: A Protocol for Secure Collaborative Document Editing}, howpublished = {Cryptology ePrint Archive, Report 2018/253}, year = {2018}, url = {https://eprint.iacr.org/2018/253}, } @misc{cryptoeprint:2018:254, author = {Andrey Kim and Yongsoo Song and Miran Kim and Keewoo Lee and Jung Hee Cheon}, title = {Logistic Regression Model Training based on the Approximate Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/254}, year = {2018}, url = {https://eprint.iacr.org/2018/254}, } @misc{cryptoeprint:2018:255, author = {Rio Lavigne and Chen-Da Liu-Zhang and Ueli Maurer and Tal Moran and Marta Mularczyk and Daniel Tschudi}, title = {Topology-Hiding Computation Beyond Semi-Honest Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2018/255}, year = {2018}, url = {https://eprint.iacr.org/2018/255}, } @misc{cryptoeprint:2018:256, author = {Edward Eaton and Matthieu Lequesne and Alex Parent and Nicolas Sendrier}, title = {QC-MDPC: A Timing Attack and a CCA2 KEM}, howpublished = {Cryptology ePrint Archive, Report 2018/256}, year = {2018}, url = {https://eprint.iacr.org/2018/256}, } @misc{cryptoeprint:2018:257, author = {Tore Vincent Carstens and Ehsan Ebrahimi and Gelo Noel Tabia and Dominique Unruh}, title = {On Quantum Indifferentiability}, howpublished = {Cryptology ePrint Archive, Report 2018/257}, year = {2018}, url = {https://eprint.iacr.org/2018/257}, } @misc{cryptoeprint:2018:258, author = {Alya Geogiana Buja and Shekh Faisal Abdul-Latip and Rabiah Ahmad}, title = {Fault Analysis of the KTANTAN Family of Block Ciphers: A Revisited Work of Fault Analysis of the KATAN Family of Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2018/258}, year = {2018}, url = {https://eprint.iacr.org/2018/258}, } @misc{cryptoeprint:2018:259, author = {Zheng Yang and Kimmo Järvinen}, title = {The Death and Rebirth of Privacy-Preserving WiFi Fingerprint Localization with Paillier Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/259}, year = {2018}, url = {https://eprint.iacr.org/2018/259}, } @misc{cryptoeprint:2018:260, author = {Sébastien Duval and Gaëtan Leurent}, title = {MDS Matrices with Lightweight Circuits}, howpublished = {Cryptology ePrint Archive, Report 2018/260}, year = {2018}, url = {https://eprint.iacr.org/2018/260}, } @misc{cryptoeprint:2018:261, author = {Dan Boneh and Saba Eskandarian and Ben Fisch}, title = {Post-Quantum Group Signatures from Symmetric Primitives}, howpublished = {Cryptology ePrint Archive, Report 2018/261}, year = {2018}, url = {https://eprint.iacr.org/2018/261}, } @misc{cryptoeprint:2018:262, author = {Joachim Zahnentferner}, title = {Chimeric Ledgers: Translating and Unifying UTXO-based and Account-based Cryptocurrencies}, howpublished = {Cryptology ePrint Archive, Report 2018/262}, year = {2018}, url = {https://eprint.iacr.org/2018/262}, } @misc{cryptoeprint:2018:263, author = {Seyyed Mahdi Sedaghat and Mohammad Hassan Ameri and Mahshid Delavar and Javad Mohajeri and Mohammad Reza Aref}, title = {An Efficient and Secure Attribute-Based Signcryption Scheme for Smart Grid Applications}, howpublished = {Cryptology ePrint Archive, Report 2018/263}, year = {2018}, url = {https://eprint.iacr.org/2018/263}, } @misc{cryptoeprint:2018:264, author = {Daan Leermakers and Boris Skoric}, title = {Security proof for Quantum Key Recycling with noise}, howpublished = {Cryptology ePrint Archive, Report 2018/264}, year = {2018}, url = {https://eprint.iacr.org/2018/264}, } @misc{cryptoeprint:2018:265, author = {Ayesha Khalid and James Howe and Ciara Rafferty and Francesco Regazzoni and Maire O’Neill}, title = {Compact, Scalable, and Efficient Discrete Gaussian Samplers for Lattice-Based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2018/265}, year = {2018}, url = {https://eprint.iacr.org/2018/265}, } @misc{cryptoeprint:2018:266, author = {Steven D. Galbraith}, title = {Authenticated key exchange for SIDH}, howpublished = {Cryptology ePrint Archive, Report 2018/266}, year = {2018}, url = {https://eprint.iacr.org/2018/266}, } @misc{cryptoeprint:2018:267, author = {Patrick Longa}, title = {A Note on Post-Quantum Authenticated Key Exchange from Supersingular Isogenies}, howpublished = {Cryptology ePrint Archive, Report 2018/267}, year = {2018}, url = {https://eprint.iacr.org/2018/267}, } @misc{cryptoeprint:2018:268, author = {Michael Raskin and Mark Simkin}, title = {Oblivious RAM with Small Storage Overhead}, howpublished = {Cryptology ePrint Archive, Report 2018/268}, year = {2018}, url = {https://eprint.iacr.org/2018/268}, } @misc{cryptoeprint:2018:269, author = {Derek Leung and Adam Suhl and Yossi Gilad and Nickolai Zeldovich}, title = {Vault: Fast Bootstrapping for Cryptocurrencies}, howpublished = {Cryptology ePrint Archive, Report 2018/269}, year = {2018}, url = {https://eprint.iacr.org/2018/269}, } @misc{cryptoeprint:2018:270, author = {Douglas R. Stinson}, title = {A Brief Retrospective Look at the Cayley-Purser Public-key Cryptosystem, 19 Years Later}, howpublished = {Cryptology ePrint Archive, Report 2018/270}, year = {2018}, url = {https://eprint.iacr.org/2018/270}, } @misc{cryptoeprint:2018:271, author = {Borching Su}, title = {MathCoin: A Blockchain Proposal that Helps Verify Mathematical Theorems In Public}, howpublished = {Cryptology ePrint Archive, Report 2018/271}, year = {2018}, url = {https://eprint.iacr.org/2018/271}, } @misc{cryptoeprint:2018:272, author = {Sam Kim and David J. Wu}, title = {Multi-Theorem Preprocessing NIZKs from Lattices}, howpublished = {Cryptology ePrint Archive, Report 2018/272}, year = {2018}, url = {https://eprint.iacr.org/2018/272}, } @misc{cryptoeprint:2018:273, author = {Prabhanjan Ananth and Xiong Fan}, title = {Attribute Based Encryption for RAMs from LWE}, howpublished = {Cryptology ePrint Archive, Report 2018/273}, year = {2018}, url = {https://eprint.iacr.org/2018/273}, } @misc{cryptoeprint:2018:274, author = {Rachid El Bansarkhani and Rafael Misoczki}, title = {G-Merkle: A Hash-Based Group Signature Scheme From Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2018/274}, year = {2018}, url = {https://eprint.iacr.org/2018/274}, } @misc{cryptoeprint:2018:275, author = {Rosario Gennaro and Michele Minelli and Anca Nitulescu and Michele Orrù}, title = {Lattice-Based zk-SNARKs from SSPs}, howpublished = {Cryptology ePrint Archive, Report 2018/275}, year = {2018}, url = {https://eprint.iacr.org/2018/275}, } @misc{cryptoeprint:2018:276, author = {Mark Zhandry}, title = {How to Record Quantum Queries, and Applications to Quantum Indifferentiability}, howpublished = {Cryptology ePrint Archive, Report 2018/276}, year = {2018}, url = {https://eprint.iacr.org/2018/276}, } @misc{cryptoeprint:2018:277, author = {Sebastian Meiser}, title = {Approximate and Probabilistic Differential Privacy Definitions}, howpublished = {Cryptology ePrint Archive, Report 2018/277}, year = {2018}, url = {https://eprint.iacr.org/2018/277}, } @misc{cryptoeprint:2018:278, author = {Rémi Géraud and David Naccache}, title = {Mixed-radix Naccache-Stern encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/278}, year = {2018}, url = {https://eprint.iacr.org/2018/278}, } @misc{cryptoeprint:2018:279, author = {Zvika Brakerski and Vadim Lyubashevsky and Vinod Vaikuntanathan and Daniel Wichs}, title = {Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing}, howpublished = {Cryptology ePrint Archive, Report 2018/279}, year = {2018}, url = {https://eprint.iacr.org/2018/279}, } @misc{cryptoeprint:2018:280, author = {Jens Groth and Markulf Kohlweiss and Mary Maller and Sarah Meiklejohn and Ian Miers}, title = {Updatable and Universal Common Reference Strings with Applications to zk-SNARKs}, howpublished = {Cryptology ePrint Archive, Report 2018/280}, year = {2018}, url = {https://eprint.iacr.org/2018/280}, } @misc{cryptoeprint:2018:281, author = {Saikrishna Badrinarayanan and Dakshita Khurana and Amit Sahai and Brent Waters}, title = {Upgrading to Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/281}, year = {2018}, url = {https://eprint.iacr.org/2018/281}, } @misc{cryptoeprint:2018:282, author = {Jason LeGrow and David Jao and Reza Azarderakhsh}, title = {Modeling Quantum-Safe Authenticated Key Establishment, and an Isogeny-Based Protocol}, howpublished = {Cryptology ePrint Archive, Report 2018/282}, year = {2018}, url = {https://eprint.iacr.org/2018/282}, } @misc{cryptoeprint:2018:283, author = {Gizem S. \c{C}etin and Berk Sunar}, title = {Homomorphic Rank Sort Using Surrogate Polynomials}, howpublished = {Cryptology ePrint Archive, Report 2018/283}, year = {2018}, url = {https://eprint.iacr.org/2018/283}, } @misc{cryptoeprint:2018:284, author = {Qichun Wang}, title = {Hadamard Matrices, $d$-Linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights}, howpublished = {Cryptology ePrint Archive, Report 2018/284}, year = {2018}, url = {https://eprint.iacr.org/2018/284}, } @misc{cryptoeprint:2018:285, author = {Iraklis Symeonidis and Gergely Biczók and Fatemeh Shirazi and Cristina Pérez-Solà and Jessica Schroers and Bart Preneel}, title = {Collateral Damage of Facebook Applications: a Comprehensive Study}, howpublished = {Cryptology ePrint Archive, Report 2018/285}, year = {2018}, url = {https://eprint.iacr.org/2018/285}, } @misc{cryptoeprint:2018:286, author = {Björn Haase and Benoît Labrique}, title = {AuCPace: Efficient verifier-based PAKE protocol tailored for the IIoT}, howpublished = {Cryptology ePrint Archive, Report 2018/286}, year = {2018}, url = {https://eprint.iacr.org/2018/286}, } @misc{cryptoeprint:2018:287, author = {Atanu Basu and Indranil Sengupta}, title = {Secure Cloud Storage Scheme Based On Hybrid Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2018/287}, year = {2018}, url = {https://eprint.iacr.org/2018/287}, } @misc{cryptoeprint:2018:288, author = {Ke Gu and Na Wu}, title = {Constant Size Traceable Ring Signature Scheme without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2018/288}, year = {2018}, url = {https://eprint.iacr.org/2018/288}, } @misc{cryptoeprint:2018:289, author = {Phillipp Schoppmann and Adrià Gascón and Borja Balle}, title = {Private Nearest Neighbors Classification in Federated Databases}, howpublished = {Cryptology ePrint Archive, Report 2018/289}, year = {2018}, url = {https://eprint.iacr.org/2018/289}, } @misc{cryptoeprint:2018:290, author = {Vireshwar Kumar and He Li and Noah Luther and Pranav Asokan and Jung-Min (Jerry) Park and Kaigui Bian and Martin B. H. Weiss and Taieb Znati}, title = {Lightweight Anonymous Subscription with Efficient Revocation}, howpublished = {Cryptology ePrint Archive, Report 2018/290}, year = {2018}, url = {https://eprint.iacr.org/2018/290}, } @misc{cryptoeprint:2018:291, author = {Guido Marco Bertoni and Lorenzo Grassi and Filippo Melzani}, title = {Simulations of Optical Emissions for Attacking AES and Masked AES}, howpublished = {Cryptology ePrint Archive, Report 2018/291}, year = {2018}, url = {https://eprint.iacr.org/2018/291}, } @misc{cryptoeprint:2018:292, author = {Brice Minaud}, title = {Linear Biases in AEGIS Keystream}, howpublished = {Cryptology ePrint Archive, Report 2018/292}, year = {2018}, url = {https://eprint.iacr.org/2018/292}, } @misc{cryptoeprint:2018:293, author = {Eshan Chattopadhyay and Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar }, title = {Privacy Amplification from Non-malleable Codes}, howpublished = {Cryptology ePrint Archive, Report 2018/293}, year = {2018}, url = {https://eprint.iacr.org/2018/293}, } @misc{cryptoeprint:2018:294, author = {Yang Yu and Léo Ducas}, title = {Learning strikes again: the case of the DRS signature scheme}, howpublished = {Cryptology ePrint Archive, Report 2018/294}, year = {2018}, url = {https://eprint.iacr.org/2018/294}, } @misc{cryptoeprint:2018:295, author = {Sayandeep Saha and Debdeep Mukhopadhyay and Pallab Dasgupta}, title = {ExpFault: An Automated Framework for Exploitable Fault Characterization in Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2018/295}, year = {2018}, url = {https://eprint.iacr.org/2018/295}, } @misc{cryptoeprint:2018:296, author = {Bertram Poettering and Paul Rösler}, title = {Ratcheted key exchange, revisited}, howpublished = {Cryptology ePrint Archive, Report 2018/296}, year = {2018}, url = {https://eprint.iacr.org/2018/296}, } @misc{cryptoeprint:2018:297, author = {Matteo Campanelli and Rosario Gennaro}, title = {Fine-Grained Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2018/297}, year = {2018}, url = {https://eprint.iacr.org/2018/297}, } @misc{cryptoeprint:2018:298, author = {Luke Valenta and Nick Sullivan and Antonio Sanso and Nadia Heninger}, title = {In search of CurveSwap: Measuring elliptic curve implementations in the wild}, howpublished = {Cryptology ePrint Archive, Report 2018/298}, year = {2018}, url = {https://eprint.iacr.org/2018/298}, } @misc{cryptoeprint:2018:299, author = {Stephen Farrell}, title = {Clusters of Re-used Keys}, howpublished = {Cryptology ePrint Archive, Report 2018/299}, year = {2018}, url = {https://eprint.iacr.org/2018/299}, } @misc{cryptoeprint:2018:300, author = {Pascal Mainini and Rolf Haenni}, title = {Outsourcing Modular Exponentiation in Cryptographic Web Applications}, howpublished = {Cryptology ePrint Archive, Report 2018/300}, year = {2018}, url = {https://eprint.iacr.org/2018/300}, } @misc{cryptoeprint:2018:301, author = {Estuardo Alpirez Bock and Chris Brzuska and Wil Michiels and Alexander Treff}, title = {On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2018/301}, year = {2018}, url = {https://eprint.iacr.org/2018/301}, } @misc{cryptoeprint:2018:302, author = {Rafael Pass and Elaine Shi}, title = {Rethinking Large-Scale Consensus}, howpublished = {Cryptology ePrint Archive, Report 2018/302}, year = {2018}, url = {https://eprint.iacr.org/2018/302}, } @misc{cryptoeprint:2018:303, author = {Bernardo David and Rafael Dowsley and Mario Larangeira}, title = {21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State}, howpublished = {Cryptology ePrint Archive, Report 2018/303}, year = {2018}, url = {https://eprint.iacr.org/2018/303}, } @misc{cryptoeprint:2018:304, author = {Peizhao Hu and Sherman S.M. Chow and Asma Aloufi}, title = {Geosocial Query with User-Controlled Privacy}, howpublished = {Cryptology ePrint Archive, Report 2018/304}, year = {2018}, url = {https://eprint.iacr.org/2018/304}, } @misc{cryptoeprint:2018:305, author = {Olivier Bernard and Renaud Dubois and Simon Masson}, title = {Efficient four-dimensional GLV curve with high security}, howpublished = {Cryptology ePrint Archive, Report 2018/305}, year = {2018}, url = {https://eprint.iacr.org/2018/305}, } @misc{cryptoeprint:2018:306, author = {Chris Brzuska and Antoine Delignat-Lavaud and Konrad Kohbrok and Markulf Kohlweiss}, title = {State-Separating Proofs: A Reduction Methodology for Real-World Protocols}, howpublished = {Cryptology ePrint Archive, Report 2018/306}, year = {2018}, url = {https://eprint.iacr.org/2018/306}, } @misc{cryptoeprint:2018:307, author = {Travis Scholl}, title = {Isolated Curves and the MOV Attack}, howpublished = {Cryptology ePrint Archive, Report 2018/307}, year = {2018}, url = {https://eprint.iacr.org/2018/307}, } @misc{cryptoeprint:2018:308, author = {Anat Paskin-Cherniavsky}, title = {On Perfectly Secure 2PC in the OT-hybrid model}, howpublished = {Cryptology ePrint Archive, Report 2018/308}, year = {2018}, url = {https://eprint.iacr.org/2018/308}, } @misc{cryptoeprint:2018:309, author = {Zhongxiang Zheng and Xiaoyun Wang and Guangwu Xu and Chunhuan Zhao}, title = {Error Estimation of Practical Convolution Discrete Gaussian Sampling}, howpublished = {Cryptology ePrint Archive, Report 2018/309}, year = {2018}, url = {https://eprint.iacr.org/2018/309}, } @misc{cryptoeprint:2018:310, author = {Yasufumi Hashimoto and Yasuhiko Ikematsu and Tsuyoshi Takagi}, title = {Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017}, howpublished = {Cryptology ePrint Archive, Report 2018/310}, year = {2018}, url = {https://eprint.iacr.org/2018/310}, } @misc{cryptoeprint:2018:311, author = {Bita Darvish Rouhani and Huili Chen and Farinaz Koushanfar}, title = {DeepSigns: A Generic Watermarking Framework for IP Protection of Deep Learning Models}, howpublished = {Cryptology ePrint Archive, Report 2018/311}, year = {2018}, url = {https://eprint.iacr.org/2018/311}, } @misc{cryptoeprint:2018:312, author = {Chunsheng Gu }, title = {Multilinear maps via secret ring}, howpublished = {Cryptology ePrint Archive, Report 2018/312}, year = {2018}, url = {https://eprint.iacr.org/2018/312}, } @misc{cryptoeprint:2018:313, author = {Gora Adj and Daniel Cervantes-V\'{a}zquez and Jes\'{u}s-Javier Chi-Dom\'{i}nguez and Alfred Menezes and Francisco Rodr\'iguez-Henr\'iquez}, title = {On the cost of computing isogenies between supersingular elliptic curves}, howpublished = {Cryptology ePrint Archive, Report 2018/313}, year = {2018}, url = {https://eprint.iacr.org/2018/313}, } @misc{cryptoeprint:2018:314, author = {Sergiu Carpov and Thibaud Tortech}, title = {Secure top most significant genome variants search: iDASH 2017 competition}, howpublished = {Cryptology ePrint Archive, Report 2018/314}, year = {2018}, url = {https://eprint.iacr.org/2018/314}, } @misc{cryptoeprint:2018:315, author = {Dahmun Goudarzi and Anthony Journault and Matthieu Rivain and François-Xavier Standaert}, title = {Secure Multiplication for Bitslice Higher-Order Masking: Optimisation and Comparison}, howpublished = {Cryptology ePrint Archive, Report 2018/315}, year = {2018}, url = {https://eprint.iacr.org/2018/315}, } @misc{cryptoeprint:2018:316, author = {Vipul Goyal and Ashutosh Kumar}, title = {Non-Malleable Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2018/316}, year = {2018}, url = {https://eprint.iacr.org/2018/316}, } @misc{cryptoeprint:2018:317, author = {Dor Fledel and Avishai Wool}, title = {Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock}, howpublished = {Cryptology ePrint Archive, Report 2018/317}, year = {2018}, url = {https://eprint.iacr.org/2018/317}, } @misc{cryptoeprint:2018:318, author = {Ward Beullens and Simon R. Blackburn}, title = {Practical attacks against the Walnut digital signature scheme}, howpublished = {Cryptology ePrint Archive, Report 2018/318}, year = {2018}, url = {https://eprint.iacr.org/2018/318}, } @misc{cryptoeprint:2018:319, author = {Philipp Schindler and Aljosha Judmayer and Nicholas Stifter and Edgar Weippl}, title = {HydRand: Practical Continuous Distributed Randomness}, howpublished = {Cryptology ePrint Archive, Report 2018/319}, year = {2018}, url = {https://eprint.iacr.org/2018/319}, } @misc{cryptoeprint:2018:320, author = {Stefan Dziembowski and Sebastian Faust and Kristina Hostakova}, title = {Foundations of State Channel Networks}, howpublished = {Cryptology ePrint Archive, Report 2018/320}, year = {2018}, url = {https://eprint.iacr.org/2018/320}, } @misc{cryptoeprint:2018:321, author = {David Derler and Stephan Krenn and Thomas Lorünser and Sebastian Ramacher and Daniel Slamanig and Christoph Striecks}, title = {Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications}, howpublished = {Cryptology ePrint Archive, Report 2018/321}, year = {2018}, url = {https://eprint.iacr.org/2018/321}, } @misc{cryptoeprint:2018:322, author = {Huili Chen and Bita Darvish Rohani and Farinaz Koushanfar}, title = {DeepMarks: A Digital Fingerprinting Framework for Deep Neural Networks}, howpublished = {Cryptology ePrint Archive, Report 2018/322}, year = {2018}, url = {https://eprint.iacr.org/2018/322}, } @misc{cryptoeprint:2018:323, author = {Sanaz Taheri Boshrooyeh and Alptekin Küpçü and Öznur Özkasap}, title = {PPAD: Privacy Preserving Group-Based ADvertising in Online Social Networks}, howpublished = {Cryptology ePrint Archive, Report 2018/323}, year = {2018}, url = {https://eprint.iacr.org/2018/323}, } @misc{cryptoeprint:2018:324, author = {Marcos A. Simplicio Jr. and Eduardo Lopes Cominetti and Harsh Kupwade Patil and Jefferson E. Ricardini and Marcos Vinicius M. Silva}, title = {ACPC: Efficient revocation of pseudonym certificates using activation codes}, howpublished = {Cryptology ePrint Archive, Report 2018/324}, year = {2018}, url = {https://eprint.iacr.org/2018/324}, } @misc{cryptoeprint:2018:325, author = {John M. Schanck}, title = {Multi-power Post-quantum RSA}, howpublished = {Cryptology ePrint Archive, Report 2018/325}, year = {2018}, url = {https://eprint.iacr.org/2018/325}, } @misc{cryptoeprint:2018:326, author = {Claude Crepeau and Nan Yang}, title = {Verifier Non-Locality in Interactive Proofs}, howpublished = {Cryptology ePrint Archive, Report 2018/326}, year = {2018}, url = {https://eprint.iacr.org/2018/326}, } @misc{cryptoeprint:2018:327, author = {Zhengjun Cao and Lihua Liu}, title = {A Note On Groth-Ostrovsky-Sahai Non-Interactive Zero-Knowledge Proof System}, howpublished = {Cryptology ePrint Archive, Report 2018/327}, year = {2018}, url = {https://eprint.iacr.org/2018/327}, } @misc{cryptoeprint:2018:328, author = {Luk Bettale and Jean-Sebastien Coron and Rina Zeitoun}, title = {Improved High-Order Conversion From Boolean to Arithmetic Masking}, howpublished = {Cryptology ePrint Archive, Report 2018/328}, year = {2018}, url = {https://eprint.iacr.org/2018/328}, } @misc{cryptoeprint:2018:329, author = {Pasquale Malacaria and MHR. Khouzani and Corina S. P\u{a}s\u{a}reanu and Quoc-Sang Phan and Kasper Luckow}, title = {Symbolic Side-Channel Analysis for Probabilistic Programs}, howpublished = {Cryptology ePrint Archive, Report 2018/329}, year = {2018}, url = {https://eprint.iacr.org/2018/329}, } @misc{cryptoeprint:2018:330, author = {Joseph K. Liu and Tsz Hon Yuen and Peng Zhang and Kaitai Liang}, title = {Time-Based Direct Revocable Ciphertext-Policy Attribute-Based Encryption with Short Revocation List}, howpublished = {Cryptology ePrint Archive, Report 2018/330}, year = {2018}, url = {https://eprint.iacr.org/2018/330}, } @misc{cryptoeprint:2018:331, author = {Martin R. Albrecht and Benjamin R. Curtis and Amit Deo and Alex Davidson and Rachel Player and Eamonn W. Postlethwaite and Fernando Virdia and Thomas Wunderer}, title = {Estimate all the {LWE, NTRU} schemes!}, howpublished = {Cryptology ePrint Archive, Report 2018/331}, year = {2018}, url = {https://eprint.iacr.org/2018/331}, } @misc{cryptoeprint:2018:332, author = {Ralph Ankele and Eik List}, title = {Differential Cryptanalysis of Round-Reduced Sparx-64/128}, howpublished = {Cryptology ePrint Archive, Report 2018/332}, year = {2018}, url = {https://eprint.iacr.org/2018/332}, } @misc{cryptoeprint:2018:333, author = {Tianren Liu and Vinod Vaikuntanathan}, title = {Breaking the Circuit-Size Barrier in Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2018/333}, year = {2018}, url = {https://eprint.iacr.org/2018/333}, } @misc{cryptoeprint:2018:334, author = {Dong Yang and Wen-feng Qi and Hua-jin Chen}, title = {Impossible Differential Attack on QARMA Family of Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2018/334}, year = {2018}, url = {https://eprint.iacr.org/2018/334}, } @misc{cryptoeprint:2018:335, author = {Nir Drucker and Shay Gueron}, title = {Fast modular squaring with AVX512IFMA}, howpublished = {Cryptology ePrint Archive, Report 2018/335}, year = {2018}, url = {https://eprint.iacr.org/2018/335}, } @misc{cryptoeprint:2018:336, author = {David Urbanik and David Jao}, title = {SoK: The Problem Landscape of SIDH}, howpublished = {Cryptology ePrint Archive, Report 2018/336}, year = {2018}, url = {https://eprint.iacr.org/2018/336}, } @misc{cryptoeprint:2018:337, author = {Marc Fischlin and Patrick Harasser}, title = {Invisible Sanitizable Signatures and Public-Key Encryption are Equivalent}, howpublished = {Cryptology ePrint Archive, Report 2018/337}, year = {2018}, url = {https://eprint.iacr.org/2018/337}, } @misc{cryptoeprint:2018:338, author = {Zvika Brakerski}, title = {Quantum FHE (Almost) As Secure as Classical}, howpublished = {Cryptology ePrint Archive, Report 2018/338}, year = {2018}, url = {https://eprint.iacr.org/2018/338}, } @misc{cryptoeprint:2018:339, author = {Thomas Debris-Alazard and Jean-Pierre Tillich }, title = {A polynomial attack on a NIST proposal: RankSign, a code-based signature in rank metric}, howpublished = {Cryptology ePrint Archive, Report 2018/339}, year = {2018}, url = {https://eprint.iacr.org/2018/339}, } @misc{cryptoeprint:2018:340, author = {Johannes Bl\"{o}mer and Jan Bobolz}, title = {Delegatable Attribute-based Anonymous Credentials from Dynamically Malleable Signatures}, howpublished = {Cryptology ePrint Archive, Report 2018/340}, year = {2018}, url = {https://eprint.iacr.org/2018/340}, } @misc{cryptoeprint:2018:341, author = {William Diehl and Abubakr Abdulgadir and Farnoud Farahmand and Jens-Peter Kaps and Kris Gaj}, title = {Comparison of Cost of Protection Against Differential Power Analysis of Selected Authenticated Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2018/341}, year = {2018}, url = {https://eprint.iacr.org/2018/341}, } @misc{cryptoeprint:2018:342, author = {Ralph Ankele and Florian Böhl and Simon Friedberger}, title = {MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth}, howpublished = {Cryptology ePrint Archive, Report 2018/342}, year = {2018}, url = {https://eprint.iacr.org/2018/342}, } @misc{cryptoeprint:2018:343, author = {Duc Viet Le and Mahimna Kelkar and Aniket Kate}, title = {Flexible Signatures: Towards Making Authentication Suitable for Real-Time Environments}, howpublished = {Cryptology ePrint Archive, Report 2018/343}, year = {2018}, url = {https://eprint.iacr.org/2018/343}, } @misc{cryptoeprint:2018:344, author = {Andrea Cerulli and Emiliano De Cristofaro and Claudio Soriente}, title = {Nothing Refreshes Like a RePSI: Reactive Private Set Intersection}, howpublished = {Cryptology ePrint Archive, Report 2018/344}, year = {2018}, url = {https://eprint.iacr.org/2018/344}, } @misc{cryptoeprint:2018:345, author = {Mamunur Rashid Akand and Reihaneh Safavi-Naini}, title = {In-region Authentication}, howpublished = {Cryptology ePrint Archive, Report 2018/345}, year = {2018}, url = {https://eprint.iacr.org/2018/345}, } @misc{cryptoeprint:2018:346, author = {Rishab Goyal and Venkata Koppula and Brent Waters}, title = {Collusion Resistant Traitor Tracing from Learning with Errors}, howpublished = {Cryptology ePrint Archive, Report 2018/346}, year = {2018}, url = {https://eprint.iacr.org/2018/346}, } @misc{cryptoeprint:2018:347, author = {Stanislaw Jarecki and Boyang Wei}, title = {3PC ORAM with Low Latency, Low Bandwidth, and Fast Batch Retrieval}, howpublished = {Cryptology ePrint Archive, Report 2018/347}, year = {2018}, url = {https://eprint.iacr.org/2018/347}, } @misc{cryptoeprint:2018:348, author = {Dimaz Ankaa Wijaya and Joseph Liu and Ron Steinfeld and Dongxi Liu}, title = {Monero Ring Attack: Recreating Zero Mixin Transaction Effect}, howpublished = {Cryptology ePrint Archive, Report 2018/348}, year = {2018}, url = {https://eprint.iacr.org/2018/348}, } @misc{cryptoeprint:2018:349, author = {Joanne Woodage and Dan Shumow}, title = {An Analysis of the NIST SP 800-90A Standard}, howpublished = {Cryptology ePrint Archive, Report 2018/349}, year = {2018}, url = {https://eprint.iacr.org/2018/349}, } @misc{cryptoeprint:2018:350, author = {Phuong Ha Nguyen and Durga Prasad Sahoo and Chenglu Jin and Kaleel Mahmood and Ulrich Rührmair and Marten van Dijk}, title = {The Interpose PUF: Secure PUF Design against State-of-the-art Machine Learning Attacks}, howpublished = {Cryptology ePrint Archive, Report 2018/350}, year = {2018}, url = {https://eprint.iacr.org/2018/350}, } @misc{cryptoeprint:2018:351, author = {Miloslav Homer}, title = {A Chosen Plaintext Attack on Offset Public Permutation Mode}, howpublished = {Cryptology ePrint Archive, Report 2018/351}, year = {2018}, url = {https://eprint.iacr.org/2018/351}, } @misc{cryptoeprint:2018:352, author = {Kai-Min Chung and Marios Georgiou and Ching-Yi Lai and Vassilis Zikas}, title = {Cryptography with Dispensable Backdoors}, howpublished = {Cryptology ePrint Archive, Report 2018/352}, year = {2018}, url = {https://eprint.iacr.org/2018/352}, } @misc{cryptoeprint:2018:353, author = {Xin Li}, title = {Non-Malleable Extractors and Non-Malleable Codes: Partially Optimal Constructions}, howpublished = {Cryptology ePrint Archive, Report 2018/353}, year = {2018}, url = {https://eprint.iacr.org/2018/353}, } @misc{cryptoeprint:2018:354, author = {Nicola Tuveri and Billy B. Brumley}, title = {Start your ENGINEs: dynamically loadable contemporary crypto}, howpublished = {Cryptology ePrint Archive, Report 2018/354}, year = {2018}, url = {https://eprint.iacr.org/2018/354}, } @misc{cryptoeprint:2018:355, author = {Leon Groot Bruinderink and Peter Pessl}, title = {Differential Fault Attacks on Deterministic Lattice Signatures}, howpublished = {Cryptology ePrint Archive, Report 2018/355}, year = {2018}, url = {https://eprint.iacr.org/2018/355}, } @misc{cryptoeprint:2018:356, author = {Jheyne N. Ortiz and Robson R. de Araujo and Ricardo Dahab and Diego F. Aranha and Sueli I. R. Costa}, title = {In Praise of Twisted Canonical Embedding}, howpublished = {Cryptology ePrint Archive, Report 2018/356}, year = {2018}, url = {https://eprint.iacr.org/2018/356}, } @misc{cryptoeprint:2018:357, author = {Christoph Dobraunig and Maria Eichlseder and Hannes Gross and Stefan Mangard and Florian Mendel and Robert Primas}, title = {Statistical Ineffective Fault Attacks on Masked AES with Fault Countermeasures}, howpublished = {Cryptology ePrint Archive, Report 2018/357}, year = {2018}, url = {https://eprint.iacr.org/2018/357}, } @misc{cryptoeprint:2018:358, author = {Yansong Gao and Chenglu Jin and Jeeson Kim and Hussein Nili and Xiaolin Xu and Wayne Burleson and Omid Kavehei and Marten van Dijk and Damith C. Ranasinghe and Ulrich Rührmair}, title = {Efficient Erasable PUFs from Programmable Logic and Memristors}, howpublished = {Cryptology ePrint Archive, Report 2018/358}, year = {2018}, url = {https://eprint.iacr.org/2018/358}, } @misc{cryptoeprint:2018:359, author = {Christina-Angeliki Toli and Abdelrahaman Aly and Bart Preneel}, title = {Privacy-Preserving Multibiometric Authentication in Cloud with Untrusted Database Providers}, howpublished = {Cryptology ePrint Archive, Report 2018/359}, year = {2018}, url = {https://eprint.iacr.org/2018/359}, } @misc{cryptoeprint:2018:360, author = {Yilei Chen and Vinod Vaikuntanathan and Hoeteck Wee}, title = {GGH15 Beyond Permutation Branching Programs: Proofs, Attacks, and Candidates}, howpublished = {Cryptology ePrint Archive, Report 2018/360}, year = {2018}, url = {https://eprint.iacr.org/2018/360}, } @misc{cryptoeprint:2018:361, author = {Zheng Yang and Yu Chen and Song Luo}, title = {Two-message Key Exchange with Strong Security from Ideal Lattices}, howpublished = {Cryptology ePrint Archive, Report 2018/361}, year = {2018}, url = {https://eprint.iacr.org/2018/361}, } @misc{cryptoeprint:2018:362, author = {Marc Fischlin and Christian Janson and Sogol Mazaheri}, title = {Backdoored Hash Functions: Immunizing HMAC and HKDF}, howpublished = {Cryptology ePrint Archive, Report 2018/362}, year = {2018}, url = {https://eprint.iacr.org/2018/362}, } @misc{cryptoeprint:2018:363, author = {Ariel Hamlin and Rafail Ostrovsky and Mor Weiss and Daniel Wichs}, title = {Private Anonymous Data Access}, howpublished = {Cryptology ePrint Archive, Report 2018/363}, year = {2018}, url = {https://eprint.iacr.org/2018/363}, } @misc{cryptoeprint:2018:364, author = {T-H. Hubert Chan and Kartik Nayak and Elaine Shi}, title = {Perfectly Secure Oblivious Parallel RAM}, howpublished = {Cryptology ePrint Archive, Report 2018/364}, year = {2018}, url = {https://eprint.iacr.org/2018/364}, } @misc{cryptoeprint:2018:365, author = {Ahmad Ahmadi and Reihaneh Safavi-Naini and Mamunur Akand}, title = {Anonymous Distance-Bounding Identification}, howpublished = {Cryptology ePrint Archive, Report 2018/365}, year = {2018}, url = {https://eprint.iacr.org/2018/365}, } @misc{cryptoeprint:2018:366, author = {Ahmad Ahmadi and Reihaneh Safavi-Naini}, title = {Directional Distance-Bounding Identification Protocols}, howpublished = {Cryptology ePrint Archive, Report 2018/366}, year = {2018}, url = {https://eprint.iacr.org/2018/366}, } @misc{cryptoeprint:2018:367, author = {Alejandro Cabrera Aldaya and Cesar Pereida Garc{\'i}a and Luis Manuel Alvarez Tapia and Billy Bob Brumley}, title = {Cache-Timing Attacks on RSA Key Generation}, howpublished = {Cryptology ePrint Archive, Report 2018/367}, year = {2018}, url = {https://eprint.iacr.org/2018/367}, } @misc{cryptoeprint:2018:368, author = {Shashank Agrawal and Shweta Agrawal and Manoj Prabhakaran}, title = {Encryption with Untrusted Keys: Security against Chosen Objects Attack}, howpublished = {Cryptology ePrint Archive, Report 2018/368}, year = {2018}, url = {https://eprint.iacr.org/2018/368}, } @misc{cryptoeprint:2018:369, author = {Hyung Tae Lee and Huaxiong Wang and Kai Zhang}, title = {Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017}, howpublished = {Cryptology ePrint Archive, Report 2018/369}, year = {2018}, url = {https://eprint.iacr.org/2018/369}, } @misc{cryptoeprint:2018:370, author = {A.V. Menyachikhin}, title = {Spectral-linear and spectral-differential methods for generating S-boxes having almost optimal cryptographic parameters}, howpublished = {Cryptology ePrint Archive, Report 2018/370}, year = {2018}, url = {https://eprint.iacr.org/2018/370}, } @misc{cryptoeprint:2018:371, author = {Kirsten Eisentraeger and Sean Hallgren and Kristin Lauter and Travis Morrison and Christophe Petit}, title = {Supersingular isogeny graphs and endomorphism rings: reductions and solutions}, howpublished = {Cryptology ePrint Archive, Report 2018/371}, year = {2018}, url = {https://eprint.iacr.org/2018/371}, } @misc{cryptoeprint:2018:372, author = {Alexander R. Block and Divya Gupta and Hemanta K. Maji and Hai H. Nguyen}, title = {Secure Computation using Leaky Correlations (Asymptotically Optimal Constructions)}, howpublished = {Cryptology ePrint Archive, Report 2018/372}, year = {2018}, url = {https://eprint.iacr.org/2018/372}, } @misc{cryptoeprint:2018:373, author = {Sarvar Patel and Giuseppe Persiano and Mariana Raykova and Kevin Yeo}, title = {PanORAMa: Oblivious RAM with Logarithmic Overhead}, howpublished = {Cryptology ePrint Archive, Report 2018/373}, year = {2018}, url = {https://eprint.iacr.org/2018/373}, } @misc{cryptoeprint:2018:374, author = {Zhenzhen Bao and Jian Guo and Lei Wang}, title = {Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions}, howpublished = {Cryptology ePrint Archive, Report 2018/374}, year = {2018}, url = {https://eprint.iacr.org/2018/374}, } @misc{cryptoeprint:2018:375, author = {Zvika Brakerski and Yael Tauman Kalai}, title = {Monotone Batch NP-Delegation with Applications to Access Control}, howpublished = {Cryptology ePrint Archive, Report 2018/375}, year = {2018}, url = {https://eprint.iacr.org/2018/375}, } @misc{cryptoeprint:2018:376, author = {Joppe W. Bos and Simon Friedberger}, title = {Arithmetic Considerations for Isogeny Based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2018/376}, year = {2018}, url = {https://eprint.iacr.org/2018/376}, } @misc{cryptoeprint:2018:377, author = {Jing Chen and Sergey Gorbunov and Silvio Micali and Georgios Vlachos}, title = {ALGORAND AGREEMENT: Super Fast and Partition Resilient Byzantine Agreement}, howpublished = {Cryptology ePrint Archive, Report 2018/377}, year = {2018}, url = {https://eprint.iacr.org/2018/377}, } @misc{cryptoeprint:2018:378, author = {Christian Badertscher and Peter Ga{\v{z}}i and Aggelos Kiayias and Alexander Russell and Vassilis Zikas}, title = {Composable Proof-of-Stake Blockchains with Dynamic Availability}, howpublished = {Cryptology ePrint Archive, Report 2018/378}, year = {2018}, url = {https://eprint.iacr.org/2018/378}, } @misc{cryptoeprint:2018:379, author = {Wilson Alberto Torres and Ron Steinfeld and Amin Sakzad and Joseph K. Liu and Veronika Kuchta and Nandita Bhattacharjee and Man Ho Au and Jacob Cheng}, title = {Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0)}, howpublished = {Cryptology ePrint Archive, Report 2018/379}, year = {2018}, url = {https://eprint.iacr.org/2018/379}, } @misc{cryptoeprint:2018:380, author = {Jonathan Bootle and Andrea Cerulli and Jens Groth and Sune Jakobsen and Mary Maller}, title = {Nearly Linear-Time Zero-Knowledge Proofs for Correct Program Execution}, howpublished = {Cryptology ePrint Archive, Report 2018/380}, year = {2018}, url = {https://eprint.iacr.org/2018/380}, } @misc{cryptoeprint:2018:381, author = {Gilles Barthe and Sonia Belaïd and Thomas Espitau and Pierre-Alain Fouque and Benjamin Grégoire and Mélissa Rossi and Mehdi Tibouchi}, title = {Masking the GLP Lattice-Based Signature Scheme at Any Order}, howpublished = {Cryptology ePrint Archive, Report 2018/381}, year = {2018}, url = {https://eprint.iacr.org/2018/381}, } @misc{cryptoeprint:2018:382, author = {Donghoon Chang and Amit Kumar Chauhan and Sandeep Kumar and Somitra Kumar Sanadhya}, title = {Revocable Identity-based Encryption from Codes with Rank Metric}, howpublished = {Cryptology ePrint Archive, Report 2018/382}, year = {2018}, url = {https://eprint.iacr.org/2018/382}, } @misc{cryptoeprint:2018:383, author = {Wouter Castryck and Tanja Lange and Chloe Martindale and Lorenz Panny and Joost Renes}, title = {CSIDH: An Efficient Post-Quantum Commutative Group Action}, howpublished = {Cryptology ePrint Archive, Report 2018/383}, year = {2018}, url = {https://eprint.iacr.org/2018/383}, } @misc{cryptoeprint:2018:384, author = {Ioana Boureanu and David Gerault and Pascal Lafourcade2}, title = {Fine-Grained and Application-Ready Distance-Bounding Security}, howpublished = {Cryptology ePrint Archive, Report 2018/384}, year = {2018}, url = {https://eprint.iacr.org/2018/384}, } @misc{cryptoeprint:2018:385, author = {Justin Holmgren and Alex Lombardi}, title = {Cryptographic Hashing From Strong One-Way Functions}, howpublished = {Cryptology ePrint Archive, Report 2018/385}, year = {2018}, url = {https://eprint.iacr.org/2018/385}, } @misc{cryptoeprint:2018:386, author = {Zhaohui Cheng and Liqun Chen}, title = {Certificateless Public Key Signature Schemes from Standard Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2018/386}, year = {2018}, url = {https://eprint.iacr.org/2018/386}, } @misc{cryptoeprint:2018:387, author = {Ryo Kikuchi and Dai Ikarashi and Takahiro Matsuda and Koki Hamada and Koji Chida}, title = {Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority}, howpublished = {Cryptology ePrint Archive, Report 2018/387}, year = {2018}, url = {https://eprint.iacr.org/2018/387}, } @misc{cryptoeprint:2018:388, author = {Seyed Farhad Aghili and Hamid Mala}, title = {Security Analysis of Fan et al. Lightweight RFID Authentication Protocol for Privacy Protection in IoT}, howpublished = {Cryptology ePrint Archive, Report 2018/388}, year = {2018}, url = {https://eprint.iacr.org/2018/388}, } @misc{cryptoeprint:2018:389, author = {Yotam Harchol and Ittai Abraham and Benny Pinkas}, title = {Distributed SSH Key Management with Proactive RSA Threshold Signatures}, howpublished = {Cryptology ePrint Archive, Report 2018/389}, year = {2018}, url = {https://eprint.iacr.org/2018/389}, } @misc{cryptoeprint:2018:390, author = {Baoyu Zhu and Xiaoyang Dong and Hongbo Yu}, title = {MILP-based Differential Attack on Round-reduced GIFT}, howpublished = {Cryptology ePrint Archive, Report 2018/390}, year = {2018}, url = {https://eprint.iacr.org/2018/390}, } @misc{cryptoeprint:2018:391, author = {Romain Gay and Lucas Kowalczyk and Hoeteck Wee}, title = {Tight Adaptively Secure Broadcast Encryption with Short Ciphertexts and Keys}, howpublished = {Cryptology ePrint Archive, Report 2018/391}, year = {2018}, url = {https://eprint.iacr.org/2018/391}, } @misc{cryptoeprint:2018:392, author = {Nir Drucker and Shay Gueron}, title = {Making AES great again: the forthcoming vectorized AES instruction}, howpublished = {Cryptology ePrint Archive, Report 2018/392}, year = {2018}, url = {https://eprint.iacr.org/2018/392}, } @misc{cryptoeprint:2018:393, author = {Matvei Kotov and Anton Menshov and Alexander Ushakov}, title = {AN ATTACK ON THE WALNUT DIGITAL SIGNATURE ALGORITHM}, howpublished = {Cryptology ePrint Archive, Report 2018/393}, year = {2018}, url = {https://eprint.iacr.org/2018/393}, } @misc{cryptoeprint:2018:394, author = {Laasya Bangalore and Ashish Choudhury and Arpita Patra}, title = {Almost-Surely Terminating Asynchronous Byzantine Agreement Revisited}, howpublished = {Cryptology ePrint Archive, Report 2018/394}, year = {2018}, url = {https://eprint.iacr.org/2018/394}, } @misc{cryptoeprint:2018:395, author = {Alexander R. Block and Hemanta K. Maji and Hai H. Nguyen}, title = {Embedding Multiplications at a Linear Rate and its Applications}, howpublished = {Cryptology ePrint Archive, Report 2018/395}, year = {2018}, url = {https://eprint.iacr.org/2018/395}, } @misc{cryptoeprint:2018:396, author = {Akira Takahashi and Mehdi Tibouchi and Masayuki Abe}, title = {New Bleichenbacher Records: Practical Fault Attacks on qDSA Signatures}, howpublished = {Cryptology ePrint Archive, Report 2018/396}, year = {2018}, url = {https://eprint.iacr.org/2018/396}, } @misc{cryptoeprint:2018:397, author = {Jung Hee Cheon and Minki Hhan and Jiseung Kim and Changmin Lee }, title = {Limitation of the HHSS Obfuscation: Lattice based Distinguishing Attack }, howpublished = {Cryptology ePrint Archive, Report 2018/397}, year = {2018}, url = {https://eprint.iacr.org/2018/397}, } @misc{cryptoeprint:2018:398, author = {Massimo Bartoletti and Tiziana Cimoli and Roberto Zunino}, title = {Fun with Bitcoin smart contracts}, howpublished = {Cryptology ePrint Archive, Report 2018/398}, year = {2018}, url = {https://eprint.iacr.org/2018/398}, } @misc{cryptoeprint:2018:399, author = {Sergey Grebnev}, title = {On the Feasibility of an ECDLP Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2018/399}, year = {2018}, url = {https://eprint.iacr.org/2018/399}, } @misc{cryptoeprint:2018:400, author = {Nicholas Stifter and Aljosha Judmayer and Philipp Schindler and Alexei Zamyatin and Edgar Weippl}, title = {Agreement with Satoshi – On the Formalization of Nakamoto Consensus}, howpublished = {Cryptology ePrint Archive, Report 2018/400}, year = {2018}, url = {https://eprint.iacr.org/2018/400}, } @misc{cryptoeprint:2018:401, author = {Nada EL Kassem and Liqun Chen and Rachid El Bansarkhani and Ali El Kaafarani and Jan Camenisch and Patrick Hough}, title = {L-DAA: Lattice-Based Direct Anonymous Attestation}, howpublished = {Cryptology ePrint Archive, Report 2018/401}, year = {2018}, url = {https://eprint.iacr.org/2018/401}, } @misc{cryptoeprint:2018:402, author = {Ioana Boureanu and Anda Anda}, title = {Another Look at Relay and Distance-based Attacks in Contactless Payments}, howpublished = {Cryptology ePrint Archive, Report 2018/402}, year = {2018}, url = {https://eprint.iacr.org/2018/402}, } @misc{cryptoeprint:2018:403, author = {Payman Mohassel and Peter Rindal}, title = {ABY3: A Mixed Protocol Framework for Machine Learning}, howpublished = {Cryptology ePrint Archive, Report 2018/403}, year = {2018}, url = {https://eprint.iacr.org/2018/403}, } @misc{cryptoeprint:2018:404, author = {José Bacelar Almeida and Manuel Barbosa and Gilles Barthe and Hugo Pacheco and Vitor Pereira and Bernardo Portela}, title = {Enforcing ideal-world leakage bounds in real-world secret sharing MPC frameworks}, howpublished = {Cryptology ePrint Archive, Report 2018/404}, year = {2018}, url = {https://eprint.iacr.org/2018/404}, } @misc{cryptoeprint:2018:405, author = {Sankhanil Dey and Ranjan Ghosh}, title = {A review of cryptographic properties of S-boxes with Generation and Analysis of crypto secure S-boxes.}, howpublished = {Cryptology ePrint Archive, Report 2018/405}, year = {2018}, url = {https://eprint.iacr.org/2018/405}, } @misc{cryptoeprint:2018:406, author = {Gideon Samid}, title = {“Larger Keys, Less Complexity” A Strategic Proposition}, howpublished = {Cryptology ePrint Archive, Report 2018/406}, year = {2018}, url = {https://eprint.iacr.org/2018/406}, } @misc{cryptoeprint:2018:407, author = {Cencen Wan and Yuncong Zhang and Chen Pan and Zhiqiang Liu and Yu Long and Zhen Liu and Yu Yu and Shuyang Tang}, title = {Goshawk: A Novel Efficient, Robust and Flexible Blockchain Protocol}, howpublished = {Cryptology ePrint Archive, Report 2018/407}, year = {2018}, url = {https://eprint.iacr.org/2018/407}, } @misc{cryptoeprint:2018:408, author = {Jung Hee Cheon and Minki Hhan and Jiseung Kim and Changmin Lee}, title = {Cryptanalyses of Branching Program Obfuscations over GGH13 Multilinear Map from NTRU Attack}, howpublished = {Cryptology ePrint Archive, Report 2018/408}, year = {2018}, url = {https://eprint.iacr.org/2018/408}, } @misc{cryptoeprint:2018:409, author = {Willy Quach and Hoeteck Wee and Daniel Wichs}, title = {Laconic Function Evaluation and Applications}, howpublished = {Cryptology ePrint Archive, Report 2018/409}, year = {2018}, url = {https://eprint.iacr.org/2018/409}, } @misc{cryptoeprint:2018:410, author = {Zhengjun Cao and Lihua Liu}, title = {A Note On Clauser-Horne-Shimony-Holt Inequality}, howpublished = {Cryptology ePrint Archive, Report 2018/410}, year = {2018}, url = {https://eprint.iacr.org/2018/410}, } @misc{cryptoeprint:2018:411, author = {Angela Jäschke and Frederik Armknecht}, title = {Unsupervised Machine Learning on Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2018/411}, year = {2018}, url = {https://eprint.iacr.org/2018/411}, } @misc{cryptoeprint:2018:412, author = {Karl Wüst and Kari Kostiainen and Vedran Capkun and Srdjan Capkun}, title = {PRCash: Centrally-Issued Digital Currency with Privacy and Regulation}, howpublished = {Cryptology ePrint Archive, Report 2018/412}, year = {2018}, url = {https://eprint.iacr.org/2018/412}, } @misc{cryptoeprint:2018:413, author = {Kevin Lewi and Callen Rain and Stephen Weis and Yueting Lee and Haozhi Xiong and Benjamin Yang}, title = {Scaling Backend Authentication at Facebook}, howpublished = {Cryptology ePrint Archive, Report 2018/413}, year = {2018}, url = {https://eprint.iacr.org/2018/413}, } @misc{cryptoeprint:2018:414, author = {Yunlei Zhao}, title = {Aggregation of Gamma-Signatures and Applications to Bitcoin}, howpublished = {Cryptology ePrint Archive, Report 2018/414}, year = {2018}, url = {https://eprint.iacr.org/2018/414}, } @misc{cryptoeprint:2018:415, author = {Alexei Zamyatin and Nicholas Stifter and Philipp Schindler and Edgar Weippl and William J. Knottenbelt}, title = {Flux: Revisting Near Blocks for Proof-of-Work Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2018/415}, year = {2018}, url = {https://eprint.iacr.org/2018/415}, } @misc{cryptoeprint:2018:416, author = {Nadim Kobeissi and Natalia Kulatova}, title = {Ledger Design Language: Towards Formal Reasoning and Implementation for Public Ledgers}, howpublished = {Cryptology ePrint Archive, Report 2018/416}, year = {2018}, url = {https://eprint.iacr.org/2018/416}, } @misc{cryptoeprint:2018:417, author = {Manu Drijvers and Kasra Edalatnejad and Bryan Ford and Gregory Neven}, title = {Okamoto Beats Schnorr: On the Provable Security of Multi-Signatures}, howpublished = {Cryptology ePrint Archive, Report 2018/417}, year = {2018}, url = {https://eprint.iacr.org/2018/417}, } @misc{cryptoeprint:2018:418, author = {Vladimir Kiriansky and Ilia Lebedev and Saman Amarasinghe and Srinivas Devadas and Joel Emer}, title = {DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors}, howpublished = {Cryptology ePrint Archive, Report 2018/418}, year = {2018}, url = {https://eprint.iacr.org/2018/418}, } @misc{cryptoeprint:2018:419, author = {Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Michele Orrù}, title = {Homomorphic Secret Sharing: Optimizations and Applications}, howpublished = {Cryptology ePrint Archive, Report 2018/419}, year = {2018}, url = {https://eprint.iacr.org/2018/419}, } @misc{cryptoeprint:2018:420, author = {Shuichi Katsumata and Takahiro Matsuda and Atsushi Takayasu}, title = {Lattice-based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance}, howpublished = {Cryptology ePrint Archive, Report 2018/420}, year = {2018}, url = {https://eprint.iacr.org/2018/420}, } @misc{cryptoeprint:2018:421, author = {Ilaria Chillotti and Nicolas Gama and Mariya Georgieva and Malika Izabachène}, title = {TFHE: Fast Fully Homomorphic Encryption over the Torus}, howpublished = {Cryptology ePrint Archive, Report 2018/421}, year = {2018}, url = {https://eprint.iacr.org/2018/421}, } @misc{cryptoeprint:2018:422, author = {Suyash Kandele and Souradyuti Paul}, title = {Message-locked Encryption with File Update}, howpublished = {Cryptology ePrint Archive, Report 2018/422}, year = {2018}, url = {https://eprint.iacr.org/2018/422}, } @misc{cryptoeprint:2018:423, author = {Kasper Green Larsen and Jesper Buus Nielsen}, title = {Yes, There is an Oblivious RAM Lower Bound!}, howpublished = {Cryptology ePrint Archive, Report 2018/423}, year = {2018}, url = {https://eprint.iacr.org/2018/423}, } @misc{cryptoeprint:2018:424, author = {Lachlan J. Gunn and Ricardo Vieitez Parra and N. Asokan}, title = {On The Use of Remote Attestation to Break and Repair Deniability}, howpublished = {Cryptology ePrint Archive, Report 2018/424}, year = {2018}, url = {https://eprint.iacr.org/2018/424}, } @misc{cryptoeprint:2018:425, author = {Martin R. Albrecht and Christian Hanser and Andrea Hoeller and Thomas Pöppelmann and Fernando Virdia and Andreas Wallner}, title = {Learning with Errors on RSA Co-Processors}, howpublished = {Cryptology ePrint Archive, Report 2018/425}, year = {2018}, url = {https://eprint.iacr.org/2018/425}, } @misc{cryptoeprint:2018:426, author = {Georg Fucshbauer and Chethan Kamath and Karen Klein and Krzysztof Pietrzak}, title = {Adaptively Secure Proxy Re-encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/426}, year = {2018}, url = {https://eprint.iacr.org/2018/426}, } @misc{cryptoeprint:2018:427, author = {Ilia Lebedev and Kyle Hogan and Srinivas Devadas}, title = {Secure Boot and Remote Attestation in the Sanctum Processor}, howpublished = {Cryptology ePrint Archive, Report 2018/427}, year = {2018}, url = {https://eprint.iacr.org/2018/427}, } @misc{cryptoeprint:2018:428, author = {Shobhit Sinha and Sandip Karmakar}, title = {Differential Fault Analysis of Rectangle-80}, howpublished = {Cryptology ePrint Archive, Report 2018/428}, year = {2018}, url = {https://eprint.iacr.org/2018/428}, } @misc{cryptoeprint:2018:429, author = {Ignacio Cascudo and Ronald Cramer and Chaoping Xing and Chen Yuan}, title = {Amortized Complexity of Information-Theoretically Secure MPC Revisited}, howpublished = {Cryptology ePrint Archive, Report 2018/429}, year = {2018}, url = {https://eprint.iacr.org/2018/429}, } @misc{cryptoeprint:2018:430, author = {Faruk G\"{o}lo\u{g}lu and Antoine Joux}, title = {A Simplified Approach to Rigorous Degree 2 Elimination in Discrete Logarithm Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2018/430}, year = {2018}, url = {https://eprint.iacr.org/2018/430}, } @misc{cryptoeprint:2018:431, author = {Anubhab Baksi and Vikramkumar Pudi and Swagata Mandal and Anupam Chattopadhyay}, title = {Lightweight ASIC Implementation of AEGIS-128}, howpublished = {Cryptology ePrint Archive, Report 2018/431}, year = {2018}, url = {https://eprint.iacr.org/2018/431}, } @misc{cryptoeprint:2018:432, author = {Xavier Bonnetain and María Naya-Plasencia}, title = {Hidden Shift Quantum Cryptanalysis and Implications}, howpublished = {Cryptology ePrint Archive, Report 2018/432}, year = {2018}, url = {https://eprint.iacr.org/2018/432}, } @misc{cryptoeprint:2018:433, author = {Guowen Xu and Hongwei Li}, title = {Achieving Fine-grained Multi-keyword Ranked Search over Encrypted Cloud Data}, howpublished = {Cryptology ePrint Archive, Report 2018/433}, year = {2018}, url = {https://eprint.iacr.org/2018/433}, } @misc{cryptoeprint:2018:434, author = {Bart Mennink}, title = {Towards Tight Security of Cascaded LRW2}, howpublished = {Cryptology ePrint Archive, Report 2018/434}, year = {2018}, url = {https://eprint.iacr.org/2018/434}, } @misc{cryptoeprint:2018:435, author = {Bingsheng Zhang and Roman Oliynykov and Hamed Balogun}, title = {A Treasury System for Cryptocurrencies: Enabling Better Collaborative Intelligence}, howpublished = {Cryptology ePrint Archive, Report 2018/435}, year = {2018}, url = {https://eprint.iacr.org/2018/435}, } @misc{cryptoeprint:2018:436, author = {Ashish Choudhury and Gayathri Garimella and Arpita Patra and Divya Ravi and Pratik Sarkar}, title = {Crash-tolerant Consensus in Directed Graph Revisited}, howpublished = {Cryptology ePrint Archive, Report 2018/436}, year = {2018}, url = {https://eprint.iacr.org/2018/436}, } @misc{cryptoeprint:2018:437, author = {Ben Berger and Zvika Brakerski}, title = {Zero-Knowledge Protocols for Search Problems}, howpublished = {Cryptology ePrint Archive, Report 2018/437}, year = {2018}, url = {https://eprint.iacr.org/2018/437}, } @misc{cryptoeprint:2018:438, author = {Gaëtan Cassiers and François-Xavier Standaert}, title = {Improved Bitslice Masking: from Optimized Non-Interference to Probe Isolation}, howpublished = {Cryptology ePrint Archive, Report 2018/438}, year = {2018}, url = {https://eprint.iacr.org/2018/438}, } @misc{cryptoeprint:2018:439, author = {Sonia Bela{\"i}d and Dahmun Goudarzi and Matthieu Rivain}, title = {Tight Private Circuits: Achieving Probing Security with the Least Refreshing}, howpublished = {Cryptology ePrint Archive, Report 2018/439}, year = {2018}, url = {https://eprint.iacr.org/2018/439}, } @misc{cryptoeprint:2018:440, author = {Handan Kılınç and Serge Vaudenay}, title = {Formal Analysis of Distance Bounding with Secure Hardware}, howpublished = {Cryptology ePrint Archive, Report 2018/440}, year = {2018}, url = {https://eprint.iacr.org/2018/440}, } @misc{cryptoeprint:2018:441, author = {Amos Beimel and Naty Peter}, title = {Optimal Linear Multiparty Conditional Disclosure of Secrets Protocols}, howpublished = {Cryptology ePrint Archive, Report 2018/441}, year = {2018}, url = {https://eprint.iacr.org/2018/441}, } @misc{cryptoeprint:2018:442, author = {Sameer Wagh and Divya Gupta and Nishanth Chandran}, title = {SecureNN: Efficient and Private Neural Network Training}, howpublished = {Cryptology ePrint Archive, Report 2018/442}, year = {2018}, url = {https://eprint.iacr.org/2018/442}, } @misc{cryptoeprint:2018:443, author = {Rishab Goyal}, title = {Quantum Multi-Key Homomorphic Encryption for Polynomial-Sized Circuits}, howpublished = {Cryptology ePrint Archive, Report 2018/443}, year = {2018}, url = {https://eprint.iacr.org/2018/443}, } @misc{cryptoeprint:2018:444, author = {Bing Zeng}, title = {Founding Cryptography on Smooth Projective Hashing}, howpublished = {Cryptology ePrint Archive, Report 2018/444}, year = {2018}, url = {https://eprint.iacr.org/2018/444}, } @misc{cryptoeprint:2018:445, author = {Yang Wang and Mingqiang Wang}, title = {CRPSF and NTRU Signatures over cyclotomic fields}, howpublished = {Cryptology ePrint Archive, Report 2018/445}, year = {2018}, url = {https://eprint.iacr.org/2018/445}, } @misc{cryptoeprint:2018:446, author = {Hua Dong and Li Yang}, title = {A voting scheme with post-quantum security based on physical laws}, howpublished = {Cryptology ePrint Archive, Report 2018/446}, year = {2018}, url = {https://eprint.iacr.org/2018/446}, } @misc{cryptoeprint:2018:447, author = {Xiaofeng Xie and Tian Tian}, title = {Improved Distinguisher Search Techniques Based on Parity Sets}, howpublished = {Cryptology ePrint Archive, Report 2018/447}, year = {2018}, url = {https://eprint.iacr.org/2018/447}, } @misc{cryptoeprint:2018:448, author = {Shoichi Hirose and Junji Shikata}, title = {Non-adaptive Group-Testing Aggregate MAC Scheme}, howpublished = {Cryptology ePrint Archive, Report 2018/448}, year = {2018}, url = {https://eprint.iacr.org/2018/448}, } @misc{cryptoeprint:2018:449, author = {Bart Mennink}, title = {Key Prediction Security of Keyed Sponges}, howpublished = {Cryptology ePrint Archive, Report 2018/449}, year = {2018}, url = {https://eprint.iacr.org/2018/449}, } @misc{cryptoeprint:2018:450, author = {David W. Archer and Dan Bogdanov and Y. Lindell and Liina Kamm and Kurt Nielsen and Jakob Illeborg Pagter and Nigel P. Smart and Rebecca N. Wright}, title = {From Keys to Databases -- Real-World Applications of Secure Multi-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2018/450}, year = {2018}, url = {https://eprint.iacr.org/2018/450}, } @misc{cryptoeprint:2018:451, author = {Shuichi Katsumata and Shota Yamada and Takashi Yamakawa}, title = {Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2018/451}, year = {2018}, url = {https://eprint.iacr.org/2018/451}, } @misc{cryptoeprint:2018:452, author = {Panjin Kim and Kyung Chul Jeong and Daewan Han}, title = {Time-Space Complexity of Quantum Search Algorithms in Symmetric Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2018/452}, year = {2018}, url = {https://eprint.iacr.org/2018/452}, } @misc{cryptoeprint:2018:453, author = {Cecilia Boschini and Jan Camenisch and Gregory Neven}, title = {Floppy-Sized Group Signatures from Lattices}, howpublished = {Cryptology ePrint Archive, Report 2018/453}, year = {2018}, url = {https://eprint.iacr.org/2018/453}, } @misc{cryptoeprint:2018:454, author = {Mohsen Minaei and Pedro Moreno-Sanchez and Aniket Kate}, title = {R3C3: Cryptographically secure Censorship Resistant Rendezvous using Cryptocurrencies}, howpublished = {Cryptology ePrint Archive, Report 2018/454}, year = {2018}, url = {https://eprint.iacr.org/2018/454}, } @misc{cryptoeprint:2018:455, author = {Serdar Boztas}, title = {On Renyi Entropies and their Applications to Guessing Attacks in Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2018/455}, year = {2018}, url = {https://eprint.iacr.org/2018/455}, } @misc{cryptoeprint:2018:456, author = {Elise Barelli and Alain Couvreur}, title = {An efficient structural attack on NIST submission DAGS}, howpublished = {Cryptology ePrint Archive, Report 2018/456}, year = {2018}, url = {https://eprint.iacr.org/2018/456}, } @misc{cryptoeprint:2018:457, author = {Prabhanjan Ananth and Saikrishna Badrinarayanan and Aayush Jain and Nathan Manohar and Amit Sahai}, title = {From FE Combiners to Secure MPC and Back}, howpublished = {Cryptology ePrint Archive, Report 2018/457}, year = {2018}, url = {https://eprint.iacr.org/2018/457}, } @misc{cryptoeprint:2018:458, author = {Ian McQuoid and Trevor Swope and Mike Rosulek}, title = {Characterizing Collision and Second-Preimage Resistance in Linicrypt}, howpublished = {Cryptology ePrint Archive, Report 2018/458}, year = {2018}, url = {https://eprint.iacr.org/2018/458}, } @misc{cryptoeprint:2018:459, author = {Paulo Barreto and Glaucio Oliveira and Waldyr Benits}, title = {Supersingular Isogeny Oblivious Transfer }, howpublished = {Cryptology ePrint Archive, Report 2018/459}, year = {2018}, url = {https://eprint.iacr.org/2018/459}, } @misc{cryptoeprint:2018:460, author = {Mahdi Zamani and Mahnush Movahedi and Mariana Raykova}, title = {RapidChain: A Fast Blockchain Protocol via Full Sharding}, howpublished = {Cryptology ePrint Archive, Report 2018/460}, year = {2018}, url = {https://eprint.iacr.org/2018/460}, } @misc{cryptoeprint:2018:461, author = {Benjamin Fuller and Lowen Peng}, title = {When are Continuous-Source Fuzzy Extractors Possible?}, howpublished = {Cryptology ePrint Archive, Report 2018/461}, year = {2018}, url = {https://eprint.iacr.org/2018/461}, } @misc{cryptoeprint:2018:462, author = {Hao Chen and Ran Gilad-Bachrach and Kyoohyung Han and Zhicong Huang and Amir Jalali and Kim Laine and Kristin Lauter}, title = {Logistic regression over encrypted data from fully homomorphic encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/462}, year = {2018}, url = {https://eprint.iacr.org/2018/462}, } @misc{cryptoeprint:2018:463, author = {Takashi Yamakawa and Shota Yamada and Goichiro Hanaoka and Noboru Kunihiro}, title = {Generic Hardness of Inversion on Ring and Its Relation to Self-Bilinear Map}, howpublished = {Cryptology ePrint Archive, Report 2018/463}, year = {2018}, url = {https://eprint.iacr.org/2018/463}, } @misc{cryptoeprint:2018:464, author = {Tomer Ashur and Maria Eichlseder and Martin M. Lauridsen and Gaëtan Leurent and Brice Minaud and Yann Rotella and Yu Sasaki and Benoît Viguier}, title = {Cryptanalysis of MORUS}, howpublished = {Cryptology ePrint Archive, Report 2018/464}, year = {2018}, url = {https://eprint.iacr.org/2018/464}, } @misc{cryptoeprint:2018:465, author = {Geoffroy Couteau}, title = {A Note on the Communication Complexity of Multiparty Computation in the Correlated Randomness Model}, howpublished = {Cryptology ePrint Archive, Report 2018/465}, year = {2018}, url = {https://eprint.iacr.org/2018/465}, } @misc{cryptoeprint:2018:466, author = {Somnath Panja and Bimal Kumar Roy}, title = {A secure end-to-end verifiable e-voting system using zero knowledge based blockchain}, howpublished = {Cryptology ePrint Archive, Report 2018/466}, year = {2018}, url = {https://eprint.iacr.org/2018/466}, } @misc{cryptoeprint:2018:467, author = {Nigel P. Smart and Tim Wood}, title = {Error-Detecting in Monotone Span Programs with Application to Communication Efficient Multi-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2018/467}, year = {2018}, url = {https://eprint.iacr.org/2018/467}, } @misc{cryptoeprint:2018:468, author = {Yaobin Shen and Lei Wang and Dawu Gu}, title = {ISO/IEC 9797-1 Revisited: Beyond Birthday Bound}, howpublished = {Cryptology ePrint Archive, Report 2018/468}, year = {2018}, url = {https://eprint.iacr.org/2018/468}, } @misc{cryptoeprint:2018:469, author = {Joachim Zahnentferner}, title = {An Abstract Model of UTxO-based Cryptocurrencies with Scripts}, howpublished = {Cryptology ePrint Archive, Report 2018/469}, year = {2018}, url = {https://eprint.iacr.org/2018/469}, } @misc{cryptoeprint:2018:470, author = {Thomas Agrikola and Geoffroy Couteau and Dennis Hofheinz}, title = {The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO}, howpublished = {Cryptology ePrint Archive, Report 2018/470}, year = {2018}, url = {https://eprint.iacr.org/2018/470}, } @misc{cryptoeprint:2018:471, author = {Anrin Chakraborti and Adam J. Aviv and Seung Geol Choi and Travis Mayberry and Daniel S. Roche and Radu Sion }, title = {Efficient Range ORAM with $\mathbb{O}(\log^{2}{N})$ Locality}, howpublished = {Cryptology ePrint Archive, Report 2018/471}, year = {2018}, url = {https://eprint.iacr.org/2018/471}, } @misc{cryptoeprint:2018:472, author = {Giulio Malavolta and Pedro Moreno-Sanchez and Clara Schneidewind and Aniket Kate and Matteo Maffei}, title = {Multi-Hop Locks for Secure, Privacy-Preserving and Interoperable Payment-Channel Networks}, howpublished = {Cryptology ePrint Archive, Report 2018/472}, year = {2018}, url = {https://eprint.iacr.org/2018/472}, } @misc{cryptoeprint:2018:473, author = {Daniele Friolo and Daniel Masny and Daniele Venturi}, title = {Secure Multi-Party Computation from Strongly Uniform Key Agreement}, howpublished = {Cryptology ePrint Archive, Report 2018/473}, year = {2018}, url = {https://eprint.iacr.org/2018/473}, } @misc{cryptoeprint:2018:474, author = {Peter Sebastian Nordholt and Meilof Veeningen}, title = {Minimising Communication in Honest-Majority MPC by Batchwise Multiplication Verification}, howpublished = {Cryptology ePrint Archive, Report 2018/474}, year = {2018}, url = {https://eprint.iacr.org/2018/474}, } @misc{cryptoeprint:2018:475, author = {Jonathan Katz and Vladimir Kolesnikov and Xiao Wang}, title = {Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures}, howpublished = {Cryptology ePrint Archive, Report 2018/475}, year = {2018}, url = {https://eprint.iacr.org/2018/475}, } @misc{cryptoeprint:2018:476, author = {Stjepan Picek and Annelie Heuser and Alan Jovic and Shivam Bhasin and Francesco Regazzoni}, title = {The Curse of Class Imbalance and Conflicting Metrics with Machine Learning for Side-channel Evaluations}, howpublished = {Cryptology ePrint Archive, Report 2018/476}, year = {2018}, url = {https://eprint.iacr.org/2018/476}, } @misc{cryptoeprint:2018:477, author = {Lejla Batina and Shivam Bhasin and Dirmanto Jap and Stjepan Picek}, title = {CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information}, howpublished = {Cryptology ePrint Archive, Report 2018/477}, year = {2018}, url = {https://eprint.iacr.org/2018/477}, } @misc{cryptoeprint:2018:478, author = {Ali Aydin Selcuk}, title = {On Non-Monotonicity of the Success Probability in Linear Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2018/478}, year = {2018}, url = {https://eprint.iacr.org/2018/478}, } @misc{cryptoeprint:2018:479, author = {Adrian G. Schipor}, title = {On the security of Jhanwar-Barua Identity-Based Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2018/479}, year = {2018}, url = {https://eprint.iacr.org/2018/479}, } @misc{cryptoeprint:2018:480, author = {Ilan Komargodski and Eylon Yogev}, title = {On Distributional Collision Resistant Hashing}, howpublished = {Cryptology ePrint Archive, Report 2018/480}, year = {2018}, url = {https://eprint.iacr.org/2018/480}, } @misc{cryptoeprint:2018:481, author = {Arpita Patra and Divya Ravi}, title = {On the Exact Round Complexity of Secure Three-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2018/481}, year = {2018}, url = {https://eprint.iacr.org/2018/481}, } @misc{cryptoeprint:2018:482, author = {Ronald Cramer and Ivan Damgård and Daniel Escudero and Peter Scholl and Chaoping Xing}, title = {SPDZ2k: Efficient MPC mod 2^k for Dishonest Majority}, howpublished = {Cryptology ePrint Archive, Report 2018/482}, year = {2018}, url = {https://eprint.iacr.org/2018/482}, } @misc{cryptoeprint:2018:483, author = {Dan Boneh and Manu Drijvers and Gregory Neven}, title = {Compact Multi-Signatures for Smaller Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2018/483}, year = {2018}, url = {https://eprint.iacr.org/2018/483}, } @misc{cryptoeprint:2018:484, author = {Chun Guo and Olivier Pereira and Thomas Peters and François-Xavier Standaert}, title = {Leakage-Resilient Authenticated Encryption with Misuse in the Leveled Leakage Setting: Definitions, Separation Results, and Constructions}, howpublished = {Cryptology ePrint Archive, Report 2018/484}, year = {2018}, url = {https://eprint.iacr.org/2018/484}, } @misc{cryptoeprint:2018:485, author = {Luca De Feo and Jean Kieffer and Benjamin Smith}, title = {Towards practical key exchange from ordinary isogeny graphs}, howpublished = {Cryptology ePrint Archive, Report 2018/485}, year = {2018}, url = {https://eprint.iacr.org/2018/485}, } @misc{cryptoeprint:2018:486, author = {Ghada Dessouky and Farinaz Koushanfar and Ahmad-Reza Sadeghi and Thomas Schneider and Shaza Zeitouni and Michael Zohner}, title = {Pushing the Communication Barrier in Secure Computation using Lookup Tables}, howpublished = {Cryptology ePrint Archive, Report 2018/486}, year = {2018}, url = {https://eprint.iacr.org/2018/486}, } @misc{cryptoeprint:2018:487, author = {Edouard Dufour Sans and David Pointcheval}, title = {Unbounded Inner Product Functional Encryption, with Succinct Keys}, howpublished = {Cryptology ePrint Archive, Report 2018/487}, year = {2018}, url = {https://eprint.iacr.org/2018/487}, } @misc{cryptoeprint:2018:488, author = {Benoît Cogliati and Jooyoung Lee}, title = {Wide Tweakable Block Ciphers Based on Substitution-Permutation Networks: Security Beyond the Birthday Bound}, howpublished = {Cryptology ePrint Archive, Report 2018/488}, year = {2018}, url = {https://eprint.iacr.org/2018/488}, } @misc{cryptoeprint:2018:489, author = {Changyu Dong and Yilei Wang and Amjad Aldweesh and Patrick McCorry and Aad van Moorsel}, title = {Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing}, howpublished = {Cryptology ePrint Archive, Report 2018/489}, year = {2018}, url = {https://eprint.iacr.org/2018/489}, } @misc{cryptoeprint:2018:490, author = {Thorben Moos and Amir Moradi and Tobias Schneider and François-Xavier Standaert}, title = {Glitch-Resistant Masking Revisited - or Why Proofs in the Robust Probing Model are Needed}, howpublished = {Cryptology ePrint Archive, Report 2018/490}, year = {2018}, url = {https://eprint.iacr.org/2018/490}, } @misc{cryptoeprint:2018:491, author = {Matvei Kotov and Anton Menshov and Alexey Myasnikov and Dmitry Panteleev and Alexander Ushakov}, title = {Conjugacy Separation Problem in Braids: an Attack on the Original Colored Burau Key Agreement Protocol}, howpublished = {Cryptology ePrint Archive, Report 2018/491}, year = {2018}, url = {https://eprint.iacr.org/2018/491}, } @misc{cryptoeprint:2018:492, author = {Pierre Karpman and Daniel S. Roche}, title = {New Instantiations of the CRYPTO 2017 Masking Schemes}, howpublished = {Cryptology ePrint Archive, Report 2018/492}, year = {2018}, url = {https://eprint.iacr.org/2018/492}, } @misc{cryptoeprint:2018:493, author = {Lior Rotem and Gil Segev}, title = {Out-of-Band Authentication in Group Messaging: Computational, Statistical, Optimal}, howpublished = {Cryptology ePrint Archive, Report 2018/493}, year = {2018}, url = {https://eprint.iacr.org/2018/493}, } @misc{cryptoeprint:2018:494, author = {Zvika Brakerski and Renen Perlman}, title = {Order-LWE and the Hardness of Ring-LWE with Entropic Secrets}, howpublished = {Cryptology ePrint Archive, Report 2018/494}, year = {2018}, url = {https://eprint.iacr.org/2018/494}, } @misc{cryptoeprint:2018:495, author = {Changyu Dong and Grigorios Loukides}, title = {Approximating Private Set Union/Intersection Cardinality with Logarithmic Complexity}, howpublished = {Cryptology ePrint Archive, Report 2018/495}, year = {2018}, url = {https://eprint.iacr.org/2018/495}, } @misc{cryptoeprint:2018:496, author = {Aydin Abadi and Sotirios Terzis and Roberto Metere and Changyu Dong}, title = {Efficient Delegated Private Set Intersection on Outsourced Private Datasets}, howpublished = {Cryptology ePrint Archive, Report 2018/496}, year = {2018}, url = {https://eprint.iacr.org/2018/496}, } @misc{cryptoeprint:2018:497, author = {Xiangfu Song and Changyu Dong and Dandan Yuan and Qiuliang Xu and Minghao Zhao}, title = {Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency}, howpublished = {Cryptology ePrint Archive, Report 2018/497}, year = {2018}, url = {https://eprint.iacr.org/2018/497}, } @misc{cryptoeprint:2018:498, author = {Qian Guo and Vincent Grosso and François-Xavier Standaert}, title = {Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint}, howpublished = {Cryptology ePrint Archive, Report 2018/498}, year = {2018}, url = {https://eprint.iacr.org/2018/498}, } @misc{cryptoeprint:2018:499, author = {Jack Doerner and Yashvanth Kondi and Eysa Lee and abhi shelat}, title = {Secure Two-party Threshold ECDSA from ECDSA Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2018/499}, year = {2018}, url = {https://eprint.iacr.org/2018/499}, } @misc{cryptoeprint:2018:500, author = {Nilanjan Datta and Avijit Dutta and Mridul Nandi and Kan Yasuda}, title = {Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC}, howpublished = {Cryptology ePrint Archive, Report 2018/500}, year = {2018}, url = {https://eprint.iacr.org/2018/500}, } @misc{cryptoeprint:2018:501, author = {Radu Ciucanu and Matthieu Giraud and Pascal Lafourcade and Lihua Ye}, title = {Secure Grouping and Aggregation with MapReduce}, howpublished = {Cryptology ePrint Archive, Report 2018/501}, year = {2018}, url = {https://eprint.iacr.org/2018/501}, } @misc{cryptoeprint:2018:502, author = {Helene Haagh and Aleksandr Karbyshev and Sabine Oechsner and Bas Spitters and Pierre-Yves Strub}, title = {Computer-aided proofs for multiparty computation with active security}, howpublished = {Cryptology ePrint Archive, Report 2018/502}, year = {2018}, url = {https://eprint.iacr.org/2018/502}, } @misc{cryptoeprint:2018:503, author = {Gideon Samid}, title = {Finger Printing Data}, howpublished = {Cryptology ePrint Archive, Report 2018/503}, year = {2018}, url = {https://eprint.iacr.org/2018/503}, } @misc{cryptoeprint:2018:504, author = {Xiaoyang Dong and Bingyou Dong and Xiaoyun Wang}, title = {Quantum Attacks on Some Feistel Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2018/504}, year = {2018}, url = {https://eprint.iacr.org/2018/504}, } @misc{cryptoeprint:2018:505, author = {Gilles Barthe and Sonia Belaïd and François Dupressoir and Pierre-Alain Fouque and Benjamin Grégoire and François-Xavier Standaert and Pierre-Yves Strub}, title = {Improved Parallel Mask Refreshing Algorithms: Generic Solutions with Parametrized Non-Interference \& Automated Optimizations}, howpublished = {Cryptology ePrint Archive, Report 2018/505}, year = {2018}, url = {https://eprint.iacr.org/2018/505}, } @misc{cryptoeprint:2018:506, author = {Ran Gelles and Anat Paskin-Cherniavsky and Vassilis Zikas}, title = {Secure Two-Party Computation over Unreliable Channels}, howpublished = {Cryptology ePrint Archive, Report 2018/506}, year = {2018}, url = {https://eprint.iacr.org/2018/506}, } @misc{cryptoeprint:2018:507, author = {Gilad Asharov and Gil Segev and Ido Shahaf}, title = {Tight Tradeoffs in Searchable Symmetric Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/507}, year = {2018}, url = {https://eprint.iacr.org/2018/507}, } @misc{cryptoeprint:2018:508, author = {Mriganka Mandal and Ratna Dutta}, title = {Cost-Effective Private Linear Key Agreement With Adaptive CCA Security from Prime Order Multilinear Maps and Tracing Traitors}, howpublished = {Cryptology ePrint Archive, Report 2018/508}, year = {2018}, url = {https://eprint.iacr.org/2018/508}, } @misc{cryptoeprint:2018:509, author = {Fukang Liu and Gaoli Wang and Zhenfu Cao}, title = {Improved Collision Attack on Reduced RIPEMD-160}, howpublished = {Cryptology ePrint Archive, Report 2018/509}, year = {2018}, url = {https://eprint.iacr.org/2018/509}, } @misc{cryptoeprint:2018:510, author = {Dominik Klein}, title = {Key-Secrecy of PACE with OTS/CafeOBJ}, howpublished = {Cryptology ePrint Archive, Report 2018/510}, year = {2018}, url = {https://eprint.iacr.org/2018/510}, } @misc{cryptoeprint:2018:511, author = {James Bartusek and Jiaxin Guan and Fermi Ma and Mark Zhandry}, title = {Preventing Zeroizing Attacks on GGH15}, howpublished = {Cryptology ePrint Archive, Report 2018/511}, year = {2018}, url = {https://eprint.iacr.org/2018/511}, } @misc{cryptoeprint:2018:512, author = {Weiqing You and Xiaoming Chen and Wenxi Li}, title = {Provably Secure Integration Cryptosystem on Non-Commutative Group}, howpublished = {Cryptology ePrint Archive, Report 2018/512}, year = {2018}, url = {https://eprint.iacr.org/2018/512}, } @misc{cryptoeprint:2018:513, author = {Cristina Pérez-Solà and Sergi Delgado-Segura and Guillermo Navarro-Arribas and Jordi Herrera-Joancomart}, title = {Another coin bites the dust: An analysis of dust in UTXO based cryptocurrencies}, howpublished = {Cryptology ePrint Archive, Report 2018/513}, year = {2018}, url = {https://eprint.iacr.org/2018/513}, } @misc{cryptoeprint:2018:514, author = {Ben Fisch and Shashwat Silas}, title = {Weak Compression and (In)security of Rational Proofs of Storage}, howpublished = {Cryptology ePrint Archive, Report 2018/514}, year = {2018}, url = {https://eprint.iacr.org/2018/514}, } @misc{cryptoeprint:2018:515, author = {Osman Bicer and Muhammed Ali Bingol and Mehmet Sabir Kiraz}, title = {Highly Efficient and Reusable Private Function Evaluation with Linear Complexity}, howpublished = {Cryptology ePrint Archive, Report 2018/515}, year = {2018}, url = {https://eprint.iacr.org/2018/515}, } @misc{cryptoeprint:2018:516, author = {Atsushi Takayasu and Noboru Kunihiro}, title = {Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound}, howpublished = {Cryptology ePrint Archive, Report 2018/516}, year = {2018}, url = {https://eprint.iacr.org/2018/516}, } @misc{cryptoeprint:2018:517, author = {Dana Dachman-Soled and Mukul Kulkarni}, title = {Upper and Lower Bounds for Continuous Non-Malleable Codes}, howpublished = {Cryptology ePrint Archive, Report 2018/517}, year = {2018}, url = {https://eprint.iacr.org/2018/517}, } @misc{cryptoeprint:2018:518, author = {Onur G\"unl\"u and Tasnad Kernetzky and Onurcan I\c{s}can and Vladimir Sidorenko and Gerhard Kramer and Rafael F. Schaefer}, title = {Secure and Reliable Key Agreement with Physical Unclonable Functions}, howpublished = {Cryptology ePrint Archive, Report 2018/518}, year = {2018}, url = {https://eprint.iacr.org/2018/518}, } @misc{cryptoeprint:2018:519, author = {Brandon Broadnax and Alexander Koch and Jeremias Mechler and Tobias Müller and Jörn Müller-Quade and Matthias Nagel}, title = {Fortified Universal Composability: Taking Advantage of Simple Secure Hardware Modules}, howpublished = {Cryptology ePrint Archive, Report 2018/519}, year = {2018}, url = {https://eprint.iacr.org/2018/519}, } @misc{cryptoeprint:2018:520, author = {Mridul Nandi}, title = {Bernstein Bound on WCS is Tight - Repairing Luykx-Preneel Optimal Forgeries}, howpublished = {Cryptology ePrint Archive, Report 2018/520}, year = {2018}, url = {https://eprint.iacr.org/2018/520}, } @misc{cryptoeprint:2018:521, author = {Gil Segev and Ido Shahaf}, title = {Ciphertext Expansion in Limited-Leakage Order-Preserving Encryption: A Tight Computational Lower Bound}, howpublished = {Cryptology ePrint Archive, Report 2018/521}, year = {2018}, url = {https://eprint.iacr.org/2018/521}, } @misc{cryptoeprint:2018:522, author = {Yosuke Todo and Takanori Isobe and Willi Meier and Kazumaro Aoki and Bin Zhang}, title = {Fast Correlation Attack Revisited --Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1}, howpublished = {Cryptology ePrint Archive, Report 2018/522}, year = {2018}, url = {https://eprint.iacr.org/2018/522}, } @misc{cryptoeprint:2018:523, author = {Adam Bobowski and Marcin Słowik}, title = {Reducing Complexity of Pairing Comparisons using Polynomial Evaluation}, howpublished = {Cryptology ePrint Archive, Report 2018/523}, year = {2018}, url = {https://eprint.iacr.org/2018/523}, } @misc{cryptoeprint:2018:524, author = {Bing Zeng}, title = {New Smooth Projective Hashing For Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2018/524}, year = {2018}, url = {https://eprint.iacr.org/2018/524}, } @misc{cryptoeprint:2018:525, author = {Aurélien Dupin and Jean-Marc Robert and Christophe Bidan}, title = {Location-Proof System based on Secure Multi-Party Computations}, howpublished = {Cryptology ePrint Archive, Report 2018/525}, year = {2018}, url = {https://eprint.iacr.org/2018/525}, } @misc{cryptoeprint:2018:526, author = {Daniel J. Bernstein and Edoardo Persichetti}, title = {Towards KEM Unification}, howpublished = {Cryptology ePrint Archive, Report 2018/526}, year = {2018}, url = {https://eprint.iacr.org/2018/526}, } @misc{cryptoeprint:2018:527, author = {Achiya Bar-On and Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir}, title = {Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities}, howpublished = {Cryptology ePrint Archive, Report 2018/527}, year = {2018}, url = {https://eprint.iacr.org/2018/527}, } @misc{cryptoeprint:2018:528, author = {Alain Couvreur and Matthieu Lequesne and Jean-Pierre Tillich}, title = {Recovering short secret keys of RLCE in polynomial time}, howpublished = {Cryptology ePrint Archive, Report 2018/528}, year = {2018}, url = {https://eprint.iacr.org/2018/528}, } @misc{cryptoeprint:2018:529, author = {Sanjam Garg and Mohammad Hajiabadi}, title = {Trapdoor Functions from the Computational Diffie-Hellman Assumption}, howpublished = {Cryptology ePrint Archive, Report 2018/529}, year = {2018}, url = {https://eprint.iacr.org/2018/529}, } @misc{cryptoeprint:2018:530, author = {Zvika Brakerski and Nico Döttling}, title = {Two-Message Statistical Sender-Private OT from LWE}, howpublished = {Cryptology ePrint Archive, Report 2018/530}, year = {2018}, url = {https://eprint.iacr.org/2018/530}, } @misc{cryptoeprint:2018:531, author = {Claude Carlet and Abderrahman Daif and Sylvain Guilley and Cédric Tavernier}, title = {Polynomial direct sum masking to protect against both SCA and FIA}, howpublished = {Cryptology ePrint Archive, Report 2018/531}, year = {2018}, url = {https://eprint.iacr.org/2018/531}, } @misc{cryptoeprint:2018:532, author = {Daniele Micciancio and Jessica Sorrell}, title = {Ring packing and amortized FHEW bootstrapping}, howpublished = {Cryptology ePrint Archive, Report 2018/532}, year = {2018}, url = {https://eprint.iacr.org/2018/532}, } @misc{cryptoeprint:2018:533, author = {Alice Pellet-Mary}, title = {Quantum Attacks against Indistinguishablility Obfuscators Proved Secure in the Weak Multilinear Map Model}, howpublished = {Cryptology ePrint Archive, Report 2018/533}, year = {2018}, url = {https://eprint.iacr.org/2018/533}, } @misc{cryptoeprint:2018:534, author = {Michael Kounavis and David Durham and Sergej Deutsch and Antonios Papadimitriou and Amitabh Das}, title = {Cryptographic Constructions Supporting Implicit Data Integrity}, howpublished = {Cryptology ePrint Archive, Report 2018/534}, year = {2018}, url = {https://eprint.iacr.org/2018/534}, } @misc{cryptoeprint:2018:535, author = {Kurt M. Alonso and Jordi Herrera Joancomartí}, title = {Monero - Privacy in the Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2018/535}, year = {2018}, url = {https://eprint.iacr.org/2018/535}, } @misc{cryptoeprint:2018:536, author = {Long Chen and Zhenfeng Zhang and Zhenfei Zhang}, title = {On the Hardness of the Computational Ring-LWR Problem and its Applications}, howpublished = {Cryptology ePrint Archive, Report 2018/536}, year = {2018}, url = {https://eprint.iacr.org/2018/536}, } @misc{cryptoeprint:2018:537, author = {Xavier Bonnetain and André Schrottenloher}, title = {Quantum Security Analysis of CSIDH and Ordinary Isogeny-based Schemes}, howpublished = {Cryptology ePrint Archive, Report 2018/537}, year = {2018}, url = {https://eprint.iacr.org/2018/537}, } @misc{cryptoeprint:2018:538, author = {Aggelos Kiayias and Feng-Hao Liu and Yiannis Tselekounis}, title = {Non-Malleable Codes for Partial Functions with Manipulation Detection}, howpublished = {Cryptology ePrint Archive, Report 2018/538}, year = {2018}, url = {https://eprint.iacr.org/2018/538}, } @misc{cryptoeprint:2018:539, author = {Daniel Smith-Tone}, title = {Extracting Linearization Equations from Noisy Sources}, howpublished = {Cryptology ePrint Archive, Report 2018/539}, year = {2018}, url = {https://eprint.iacr.org/2018/539}, } @misc{cryptoeprint:2018:540, author = {Elette Boyle and Ran Cohen and Deepesh Data and Pavel Hubacek}, title = {Must the Communication Graph of MPC Protocols be an Expander?}, howpublished = {Cryptology ePrint Archive, Report 2018/540}, year = {2018}, url = {https://eprint.iacr.org/2018/540}, } @misc{cryptoeprint:2018:541, author = {Gaëtan Leurent and Mridul Nandi and Ferdinand Sibleyras}, title = {Generic Attacks against Beyond-Birthday-Bound MACs}, howpublished = {Cryptology ePrint Archive, Report 2018/541}, year = {2018}, url = {https://eprint.iacr.org/2018/541}, } @misc{cryptoeprint:2018:542, author = {Rafail Ostrovsky and Giuseppe Persiano and Daniele Venturi and Ivan Visconti}, title = {Continuously Non-Malleable Codes in the Split-State Model from Minimal Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2018/542}, year = {2018}, url = {https://eprint.iacr.org/2018/542}, } @misc{cryptoeprint:2018:543, author = {Kristian Gjøsteen and Tibor Jager}, title = {Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2018/543}, year = {2018}, url = {https://eprint.iacr.org/2018/543}, } @misc{cryptoeprint:2018:544, author = {Zhengfeng Ji and Yi-Kai Liu and Fang Song}, title = {Pseudorandom Quantum States}, howpublished = {Cryptology ePrint Archive, Report 2018/544}, year = {2018}, url = {https://eprint.iacr.org/2018/544}, } @misc{cryptoeprint:2018:545, author = {Xiaolu Hou and Jakub Breier and Fuyuan Zhang and Yang Liu}, title = {Fully Automated Differential Fault Analysis on Software Implementations of Cryptographic Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2018/545}, year = {2018}, url = {https://eprint.iacr.org/2018/545}, } @misc{cryptoeprint:2018:546, author = {Yoshinori Aono and Phong Q. Nguyen and Yixin Shen}, title = {Quantum Lattice Enumeration and Tweaking Discrete Pruning}, howpublished = {Cryptology ePrint Archive, Report 2018/546}, year = {2018}, url = {https://eprint.iacr.org/2018/546}, } @misc{cryptoeprint:2018:547, author = {Manuel Barbosa and Pooya Farshim}, title = {Indifferentiable Authenticated Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/547}, year = {2018}, url = {https://eprint.iacr.org/2018/547}, } @misc{cryptoeprint:2018:548, author = {Itay Berman and Akshay Degwekar and Ron D. Rothblum and Prashant Nalini Vasudevan}, title = {From Laconic Zero-Knowledge to Public-Key Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2018/548}, year = {2018}, url = {https://eprint.iacr.org/2018/548}, } @misc{cryptoeprint:2018:549, author = {Sanjam Garg and Rafail Ostrovsky and Akshayaram Srinivasan}, title = {Adaptive Garbled RAM from Laconic Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2018/549}, year = {2018}, url = {https://eprint.iacr.org/2018/549}, } @misc{cryptoeprint:2018:550, author = {Liron David and Avishai Wool}, title = {PRank: Fast Analytical Rank Estimation via Pareto Distributions}, howpublished = {Cryptology ePrint Archive, Report 2018/550}, year = {2018}, url = {https://eprint.iacr.org/2018/550}, } @misc{cryptoeprint:2018:551, author = {Seny Kamara and Tarik Moataz and Olga Ohrimenko}, title = {Structured Encryption and Leakage Suppression}, howpublished = {Cryptology ePrint Archive, Report 2018/551}, year = {2018}, url = {https://eprint.iacr.org/2018/551}, } @misc{cryptoeprint:2018:552, author = {Gilad Asharov and Naomi Ephraim and Ilan Komargodski and Rafael Pass}, title = {On the Complexity of Compressing Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2018/552}, year = {2018}, url = {https://eprint.iacr.org/2018/552}, } @misc{cryptoeprint:2018:553, author = {Joseph Jaeger and Igors Stepanovs}, title = {Optimal Channel Security Against Fine-Grained State Compromise: The Safety of Messaging}, howpublished = {Cryptology ePrint Archive, Report 2018/553}, year = {2018}, url = {https://eprint.iacr.org/2018/553}, } @misc{cryptoeprint:2018:554, author = {Gustavo Banegas and Ricardo Custódio and Daniel Panario}, title = {A new class of irreducible pentanomials for polynomial based multipliers in binary fields}, howpublished = {Cryptology ePrint Archive, Report 2018/554}, year = {2018}, url = {https://eprint.iacr.org/2018/554}, } @misc{cryptoeprint:2018:555, author = {Sanjam Garg and Mohammad Hajiabadi and Mohammad Mahmoody and Ameer Mohammed}, title = {Limits on the Power of Garbling Techniques for Public-Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/555}, year = {2018}, url = {https://eprint.iacr.org/2018/555}, } @misc{cryptoeprint:2018:556, author = {Viet Tung Hoang and Stefano Tessaro and Ni Trieu}, title = {The Curse of Small Domains: New Attacks on Format-Preserving Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/556}, year = {2018}, url = {https://eprint.iacr.org/2018/556}, } @misc{cryptoeprint:2018:557, author = {Shashank Agrawal and Chaya Ganesh and Payman Mohassel}, title = {Non-Interactive Zero-Knowledge Proofs for Composite Statements}, howpublished = {Cryptology ePrint Archive, Report 2018/557}, year = {2018}, url = {https://eprint.iacr.org/2018/557}, } @misc{cryptoeprint:2018:558, author = {Phillip Rogaway and Yusi Zhang}, title = {Simplifying Game-Based Definitions: Indistinguishability up to Correctness and Its Application to Stateful AE}, howpublished = {Cryptology ePrint Archive, Report 2018/558}, year = {2018}, url = {https://eprint.iacr.org/2018/558}, } @misc{cryptoeprint:2018:559, author = {Marshall Ball and Alon Rosen and Manuel Sabin and Prashant Nalini Vasudevan}, title = {Proofs of Work from Worst-Case Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2018/559}, year = {2018}, url = {https://eprint.iacr.org/2018/559}, } @misc{cryptoeprint:2018:560, author = {Carsten Baum and Jonathan Bootle and Andrea Cerulli and Rafael del Pino and Jens Groth and Vadim Lyubashevsky}, title = {Sub-Linear Lattice-Based Zero-Knowledge Arguments for Arithmetic Circuits}, howpublished = {Cryptology ePrint Archive, Report 2018/560}, year = {2018}, url = {https://eprint.iacr.org/2018/560}, } @misc{cryptoeprint:2018:561, author = {Emmanuelle Anceaume and Antonella Del Pozzo and Romaric Ludinard and Maria Potop-Butucaru and Sara Tucci-Piergiovanni}, title = {Blockchain Abstract Data Type}, howpublished = {Cryptology ePrint Archive, Report 2018/561}, year = {2018}, url = {https://eprint.iacr.org/2018/561}, } @misc{cryptoeprint:2018:562, author = {Gilles Barthe and Sonia Belaïd and Pierre-Alain Fouque and Benjamin Grégoire}, title = {maskVerif: a formal tool for analyzing software and hardware masked implementations}, howpublished = {Cryptology ePrint Archive, Report 2018/562}, year = {2018}, url = {https://eprint.iacr.org/2018/562}, } @misc{cryptoeprint:2018:563, author = {Tim van de Kamp and Andreas Peter and Maarten H. Everts and Willem Jonker}, title = {Multi-client Predicate-only Encryption for Conjunctive Equality Tests}, howpublished = {Cryptology ePrint Archive, Report 2018/563}, year = {2018}, url = {https://eprint.iacr.org/2018/563}, } @misc{cryptoeprint:2018:564, author = {Yuyu Wang and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka}, title = {Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties}, howpublished = {Cryptology ePrint Archive, Report 2018/564}, year = {2018}, url = {https://eprint.iacr.org/2018/564}, } @misc{cryptoeprint:2018:565, author = {Jung Hee Cheon and Andrey Kim}, title = {Homomorphic Encryption for Approximate Matrix Arithmetic}, howpublished = {Cryptology ePrint Archive, Report 2018/565}, year = {2018}, url = {https://eprint.iacr.org/2018/565}, } @misc{cryptoeprint:2018:566, author = {Prabhanjan Ananth and Yuval Ishai and Amit Sahai}, title = {Private Circuits: A Modular Approach}, howpublished = {Cryptology ePrint Archive, Report 2018/566}, year = {2018}, url = {https://eprint.iacr.org/2018/566}, } @misc{cryptoeprint:2018:567, author = {Aggelos Kiayias and Annabell Kuldmaa and Helger Lipmaa and Janno Siim and Thomas Zacharias}, title = {On the Security Properties of e-Voting Bulletin Boards}, howpublished = {Cryptology ePrint Archive, Report 2018/567}, year = {2018}, url = {https://eprint.iacr.org/2018/567}, } @misc{cryptoeprint:2018:568, author = {Shixiong Wang and Longjiang Qu and Chao Li and Shaojing Fu}, title = {Finding Small Solutions of the Equation $Bx-Ay=z$ and Its Applications to Cryptanalysis of the RSA Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2018/568}, year = {2018}, url = {https://eprint.iacr.org/2018/568}, } @misc{cryptoeprint:2018:569, author = {Andre Esser and Felix Heuer and Robert Kübler and Alexander May and and Christian Sohler}, title = {Dissection-BKW}, howpublished = {Cryptology ePrint Archive, Report 2018/569}, year = {2018}, url = {https://eprint.iacr.org/2018/569}, } @misc{cryptoeprint:2018:570, author = {Koji Chida and Daniel Genkin and Koki Hamada and Dai Ikarashi and Ryo Kikuchi and Yehuda Lindell and Ariel Nof}, title = {Fast Large-Scale Honest-Majority MPC for Malicious Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2018/570}, year = {2018}, url = {https://eprint.iacr.org/2018/570}, } @misc{cryptoeprint:2018:571, author = {Elette Boyle and Yuval Ishai and Antigoni Polychroniadou}, title = {Limits of Practical Sublinear Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2018/571}, year = {2018}, url = {https://eprint.iacr.org/2018/571}, } @misc{cryptoeprint:2018:572, author = {Prabhanjan Ananth and Arka Rai Choudhuri and Aarushi Goel and Abhishek Jain}, title = {Round-Optimal Secure Multiparty Computation with Honest Majority}, howpublished = {Cryptology ePrint Archive, Report 2018/572}, year = {2018}, url = {https://eprint.iacr.org/2018/572}, } @misc{cryptoeprint:2018:573, author = {Farnoud Farahmand and William Diehl and Abubakr Abdulgadir and Jens-Peter Kaps and Kris Gaj}, title = {Improved Lightweight Implementations of CAESAR Authenticated Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2018/573}, year = {2018}, url = {https://eprint.iacr.org/2018/573}, } @misc{cryptoeprint:2018:574, author = {Yackolley Amoussou-Guenou and Antonella Del Pozzo and Maria Potop-Butucaru and Sara Tucci-Piergiovanni}, title = {Correctness and Fairness of Tendermint-core Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2018/574}, year = {2018}, url = {https://eprint.iacr.org/2018/574}, } @misc{cryptoeprint:2018:575, author = {Itai Dinur}, title = {An Algorithmic Framework for the Generalized Birthday Problem}, howpublished = {Cryptology ePrint Archive, Report 2018/575}, year = {2018}, url = {https://eprint.iacr.org/2018/575}, } @misc{cryptoeprint:2018:576, author = {Pooya Farshim and Georg Fuchsbauer and Alain Passelègue}, title = {Simpler Constructions of Asymmetric Primitives from Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2018/576}, year = {2018}, url = {https://eprint.iacr.org/2018/576}, } @misc{cryptoeprint:2018:577, author = {Tore Kasper Frederiksen and Yehuda Lindell and Valery Osheter and Benny Pinkas}, title = {Fast Distributed RSA Key Generation for Semi-Honest and Malicious Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2018/577}, year = {2018}, url = {https://eprint.iacr.org/2018/577}, } @misc{cryptoeprint:2018:578, author = {Jonathan Katz and Samuel Ranellucci and Mike Rosulek and Xiao Wang}, title = {Optimizing Authenticated Garbling for Faster Secure Two-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2018/578}, year = {2018}, url = {https://eprint.iacr.org/2018/578}, } @misc{cryptoeprint:2018:579, author = {Daniel Demmler and Peter Rindal and Mike Rosulek and Ni Trieu}, title = {PIR-PSI: Scaling Private Contact Discovery}, howpublished = {Cryptology ePrint Archive, Report 2018/579}, year = {2018}, url = {https://eprint.iacr.org/2018/579}, } @misc{cryptoeprint:2018:580, author = {Saikrishna Badrinarayanan and Aayush Jain and Nathan Manohar and Amit Sahai}, title = {Secure MPC: Laziness Leads to GOD}, howpublished = {Cryptology ePrint Archive, Report 2018/580}, year = {2018}, url = {https://eprint.iacr.org/2018/580}, } @misc{cryptoeprint:2018:581, author = {Patrick McCorry and Alexander Hicks and Sarah Meiklejohn}, title = {Smart contracts for bribing miners}, howpublished = {Cryptology ePrint Archive, Report 2018/581}, year = {2018}, url = {https://eprint.iacr.org/2018/581}, } @misc{cryptoeprint:2018:582, author = {Patrick McCorry and Surya Bakshi and Iddo Bentov and Andrew Miller and Sarah Meiklejohn}, title = {Pisa: Arbitration Outsourcing for State Channels}, howpublished = {Cryptology ePrint Archive, Report 2018/582}, year = {2018}, url = {https://eprint.iacr.org/2018/582}, } @misc{cryptoeprint:2018:583, author = {Mugurel Barcau and Vicentiu Pasol}, title = {Ring Homomorphic Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2018/583}, year = {2018}, url = {https://eprint.iacr.org/2018/583}, } @misc{cryptoeprint:2018:584, author = {Mugurel Barcau and Vicentiu Pasol}, title = {Bounded Fully Homomorphic Encryption from Monoid Algebras}, howpublished = {Cryptology ePrint Archive, Report 2018/584}, year = {2018}, url = {https://eprint.iacr.org/2018/584}, } @misc{cryptoeprint:2018:585, author = {Jung Hee Cheon and Seungwan Hong and Changmin Lee and Yongha Son}, title = {Polynomial Functional Encryption Scheme with Linear Ciphertext Size}, howpublished = {Cryptology ePrint Archive, Report 2018/585}, year = {2018}, url = {https://eprint.iacr.org/2018/585}, } @misc{cryptoeprint:2018:586, author = {Yoshinori Aono and Phong Q. Nguyen and Takanobu Seito and Junji Shikata}, title = {Lower Bounds on Lattice Enumeration with Extreme Pruning}, howpublished = {Cryptology ePrint Archive, Report 2018/586}, year = {2018}, url = {https://eprint.iacr.org/2018/586}, } @misc{cryptoeprint:2018:587, author = {Tapas Pal and Ratna Dutta}, title = {Constructing Witness PRF and Offline Witness Encryption Without Multilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2018/587}, year = {2018}, url = {https://eprint.iacr.org/2018/587}, } @misc{cryptoeprint:2018:588, author = {Guilherme Borges and Henrique Domingos and Bernardo Ferreira and João Leitão and Tiago Oliveira and Bernardo Portela}, title = {BISEN: Efficient Boolean Searchable Symmetric Encryption with Verifiability and Minimal Leakage}, howpublished = {Cryptology ePrint Archive, Report 2018/588}, year = {2018}, url = {https://eprint.iacr.org/2018/588}, } @misc{cryptoeprint:2018:589, author = {Ahmad Al Badawi and Yuriy Polyakov and Khin Mi Mi Aung and Bharadwaj Veeravalli and Kurt Rohloff}, title = {Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2018/589}, year = {2018}, url = {https://eprint.iacr.org/2018/589}, } @misc{cryptoeprint:2018:590, author = {Xiaoming Chen and Weiqing You}, title = {The Twin Conjugacy Search Problem and Applications}, howpublished = {Cryptology ePrint Archive, Report 2018/590}, year = {2018}, url = {https://eprint.iacr.org/2018/590}, } @misc{cryptoeprint:2018:591, author = {Sankhanil Dey and Ranjan Ghosh}, title = {4-bit crypto S-boxes: Generation with irreducible polynomials over Galois field GF(24) and cryptanalysis.}, howpublished = {Cryptology ePrint Archive, Report 2018/591}, year = {2018}, url = {https://eprint.iacr.org/2018/591}, } @misc{cryptoeprint:2018:592, author = {Sergey Agievich}, title = {XS-circuits in Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2018/592}, year = {2018}, url = {https://eprint.iacr.org/2018/592}, } @misc{cryptoeprint:2018:593, author = {Anamaria Costache and Brooke Feigon and Kristin Lauter and Maike Massierer and Anna Puskas}, title = {Ramanujan graphs in cryptography}, howpublished = {Cryptology ePrint Archive, Report 2018/593}, year = {2018}, url = {https://eprint.iacr.org/2018/593}, } @misc{cryptoeprint:2018:594, author = {Sadegh Sadeghi and Nasour Bagheri}, title = {Cryptanalysis of SFN Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2018/594}, year = {2018}, url = {https://eprint.iacr.org/2018/594}, } @misc{cryptoeprint:2018:595, author = {Subhrajyoti Deb and Bubu Bhuyan, and Sartaj Ul Hasan}, title = {Randomness analysis for multiple-recursive matrix generator}, howpublished = {Cryptology ePrint Archive, Report 2018/595}, year = {2018}, url = {https://eprint.iacr.org/2018/595}, } @misc{cryptoeprint:2018:596, author = {Ivan Damgård and Tomasz Kazana and Maciej Obremski and Varun Raj and Luisa Siniscalchi}, title = {Continuous NMC Secure Against Permutations and Overwrites, with Applications to CCA Secure Commitments}, howpublished = {Cryptology ePrint Archive, Report 2018/596}, year = {2018}, url = {https://eprint.iacr.org/2018/596}, } @misc{cryptoeprint:2018:597, author = {Lauren De Meyer and Begül Bilgin and Oscar Reparaz}, title = {Consolidating Security Notions in Hardware Masking}, howpublished = {Cryptology ePrint Archive, Report 2018/597}, year = {2018}, url = {https://eprint.iacr.org/2018/597}, } @misc{cryptoeprint:2018:598, author = {Vlad Constantin Craciun and Andrei Mogage and Emil Simion }, title = {Trends in design of ransomware viruses}, howpublished = {Cryptology ePrint Archive, Report 2018/598}, year = {2018}, url = {https://eprint.iacr.org/2018/598}, } @misc{cryptoeprint:2018:599, author = {Lucas Schabh{\"u}ser and Denis Butin and Johannes Buchmann}, title = {CHQS: Publicly Verifiable Homomorphic Signatures Beyond the Linear Case}, howpublished = {Cryptology ePrint Archive, Report 2018/599}, year = {2018}, url = {https://eprint.iacr.org/2018/599}, } @misc{cryptoeprint:2018:600, author = {Gaurav Bansod and Abhijit Patil and Narayan Pisharoty}, title = {GRANULE: An Ultra lightweight cipher design for embedded security }, howpublished = {Cryptology ePrint Archive, Report 2018/600}, year = {2018}, url = {https://eprint.iacr.org/2018/600}, } @misc{cryptoeprint:2018:601, author = {Dan Boneh, Joseph Bonneau, Benedikt Bünz, Ben Fisch}, title = {Verifiable Delay Functions}, howpublished = {Cryptology ePrint Archive, Report 2018/601}, year = {2018}, url = {https://eprint.iacr.org/2018/601}, } @misc{cryptoeprint:2018:602, author = {Kyle Hogan and Hoda Maleki and Reza Rahaeimehr and Ran Canetti and Marten van Dijk and Jason Hennessey and Mayank Varia and Haibin Zhang}, title = {On the Universally Composable Security of OpenStack}, howpublished = {Cryptology ePrint Archive, Report 2018/602}, year = {2018}, url = {https://eprint.iacr.org/2018/602}, } @misc{cryptoeprint:2018:603, author = {Ignacio Cascudo and René Bødker Christensen and Jaron Skovsted Gundersen}, title = {Actively Secure OT-Extension from q-ary Linear Codes}, howpublished = {Cryptology ePrint Archive, Report 2018/603}, year = {2018}, url = {https://eprint.iacr.org/2018/603}, } @misc{cryptoeprint:2018:604, author = {Matvei Kotov and Anton Menshov and Alexander Ushakov}, title = {Attack on Kayawood Protocol: Uncloaking Private Keys}, howpublished = {Cryptology ePrint Archive, Report 2018/604}, year = {2018}, url = {https://eprint.iacr.org/2018/604}, } @misc{cryptoeprint:2018:605, author = {Yin Li and Yu Zhang and Xiaoli Guo and Chuanda Qi}, title = {N-term Karatsuba Algorithm and its Application to Multiplier designs for Special Trinomials}, howpublished = {Cryptology ePrint Archive, Report 2018/605}, year = {2018}, url = {https://eprint.iacr.org/2018/605}, } @misc{cryptoeprint:2018:606, author = {Antonio Faonio and Jesper Buus Nielsen and Mark Simkin and Daniele Venturi}, title = {Continuously Non-Malleable Codes with Split-State Refresh}, howpublished = {Cryptology ePrint Archive, Report 2018/606}, year = {2018}, url = {https://eprint.iacr.org/2018/606}, } @misc{cryptoeprint:2018:607, author = {Melissa Chase and Apoorvaa Deshpande and Esha Ghosh}, title = {Privacy Preserving Verifiable Key Directories}, howpublished = {Cryptology ePrint Archive, Report 2018/607}, year = {2018}, url = {https://eprint.iacr.org/2018/607}, } @misc{cryptoeprint:2018:608, author = {Hamid Nejatollahi and Nikil Dutt and Indranil Banerjee and Rosario Cammarota}, title = {Domain-specific Accelerators for Ideal Lattice-based Public Key Protocols}, howpublished = {Cryptology ePrint Archive, Report 2018/608}, year = {2018}, url = {https://eprint.iacr.org/2018/608}, } @misc{cryptoeprint:2018:609, author = {Mengce Zheng}, title = {Improved Results on Factoring General RSA Moduli with Known Bits}, howpublished = {Cryptology ePrint Archive, Report 2018/609}, year = {2018}, url = {https://eprint.iacr.org/2018/609}, } @misc{cryptoeprint:2018:610, author = {Constantin-Catalin Dragan and Daniel Gardham and Mark Manulis}, title = {Hierarchical Attribute-based Signatures}, howpublished = {Cryptology ePrint Archive, Report 2018/610}, year = {2018}, url = {https://eprint.iacr.org/2018/610}, } @misc{cryptoeprint:2018:611, author = {Ebo van der Laan and Erik Poll and Joost Rijneveld and Joeri de Ruiter and Peter Schwabe and Jan Verschuren}, title = {Is Java Card ready for hash-based signatures?}, howpublished = {Cryptology ePrint Archive, Report 2018/611}, year = {2018}, url = {https://eprint.iacr.org/2018/611}, } @misc{cryptoeprint:2018:612, author = {Tim Ruffing and Sri Aravinda Thyagarajan and Viktoria Ronge and Dominique Schröder}, title = {Burning Zerocoins for Fun and for Profit: A Cryptographic Denial-of-Spending Attack on the Zerocoin Protocol}, howpublished = {Cryptology ePrint Archive, Report 2018/612}, year = {2018}, url = {https://eprint.iacr.org/2018/612}, } @misc{cryptoeprint:2018:613, author = {Nir Bitansky and Huijia Lin}, title = {One-Message Zero Knowledge and Non-Malleable Commitments}, howpublished = {Cryptology ePrint Archive, Report 2018/613}, year = {2018}, url = {https://eprint.iacr.org/2018/613}, } @misc{cryptoeprint:2018:614, author = {Daniel P. Martin and Marco Martinoli}, title = {A Note on Key Rank}, howpublished = {Cryptology ePrint Archive, Report 2018/614}, year = {2018}, url = {https://eprint.iacr.org/2018/614}, } @misc{cryptoeprint:2018:615, author = {Prabhanjan Ananth and Aayush Jain and Dakshita Khurana and Amit Sahai}, title = {Indistinguishability Obfuscation Without Multilinear Maps: iO from LWE, Bilinear Maps, and Weak Pseudorandomness}, howpublished = {Cryptology ePrint Archive, Report 2018/615}, year = {2018}, url = {https://eprint.iacr.org/2018/615}, } @misc{cryptoeprint:2018:616, author = {Dario Fiore and Elena Pagnin}, title = {Matrioska: A Compiler for Multi-Key Homomorphic Signatures}, howpublished = {Cryptology ePrint Archive, Report 2018/616}, year = {2018}, url = {https://eprint.iacr.org/2018/616}, } @misc{cryptoeprint:2018:617, author = {Christina Boura and Anne Canteaut and Jérémy Jean and Valentin Suder }, title = {Two Notions of Differential Equivalence on Sboxes}, howpublished = {Cryptology ePrint Archive, Report 2018/617}, year = {2018}, url = {https://eprint.iacr.org/2018/617}, } @misc{cryptoeprint:2018:618, author = {Reynier Antonio de la Cruz Jiménez}, title = {On some methods for constructing almost optimal S-Boxes and their resilience against side-channel attacks}, howpublished = {Cryptology ePrint Archive, Report 2018/618}, year = {2018}, url = {https://eprint.iacr.org/2018/618}, } @misc{cryptoeprint:2018:619, author = {Mor Weiss and Daniel Wichs}, title = {Is there an Oblivious RAM Lower Bound for Online Reads?}, howpublished = {Cryptology ePrint Archive, Report 2018/619}, year = {2018}, url = {https://eprint.iacr.org/2018/619}, } @misc{cryptoeprint:2018:620, author = {Debayan Das and Mayukh Nath and Baibhab Chatterjee and Santosh Ghosh and Shreyas Sen}, title = {Ground-up Root-cause Analysis guided Low-Overhead Generic Countermeasure for Electro-Magnetic Side-Channel Attack}, howpublished = {Cryptology ePrint Archive, Report 2018/620}, year = {2018}, url = {https://eprint.iacr.org/2018/620}, } @misc{cryptoeprint:2018:621, author = {Ben Lapid and Avishai Wool}, title = {Cache-Attacks on the ARM TrustZone implementations of AES-256 and AES-256-GCM via GPU-based analysis}, howpublished = {Cryptology ePrint Archive, Report 2018/621}, year = {2018}, url = {https://eprint.iacr.org/2018/621}, } @misc{cryptoeprint:2018:622, author = {Sergiu Carpov and Malika Izabachène and Victor Mollimard}, title = {New techniques for multi-value homomorphic evaluation and applications}, howpublished = {Cryptology ePrint Archive, Report 2018/622}, year = {2018}, url = {https://eprint.iacr.org/2018/622}, } @misc{cryptoeprint:2018:623, author = {Benjamin Wesolowski}, title = {Slow-timed hash functions}, howpublished = {Cryptology ePrint Archive, Report 2018/623}, year = {2018}, url = {https://eprint.iacr.org/2018/623}, } @misc{cryptoeprint:2018:624, author = {Gergei Bana and Rohit Chadha and Ajay Kumar Eeralla}, title = {Formal Analysis of Vote Privacy using Computationally Complete Symbolic Attacker}, howpublished = {Cryptology ePrint Archive, Report 2018/624}, year = {2018}, url = {https://eprint.iacr.org/2018/624}, } @misc{cryptoeprint:2018:625, author = {Mihir Bellare and Joseph Jaeger and Julia Len}, title = {Better Than Advertised: Improved Collision-Resistance Guarantees for MD-Based Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2018/625}, year = {2018}, url = {https://eprint.iacr.org/2018/625}, } @misc{cryptoeprint:2018:626, author = {Sergiu Carpov and Oana Stan}, title = {Efficient Evaluation of Low Degree Multivariate Polynomials in Ring-LWE Homomorphic Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2018/626}, year = {2018}, url = {https://eprint.iacr.org/2018/626}, } @misc{cryptoeprint:2018:627, author = {Krzysztof Pietrzak}, title = {Simple Verifiable Delay Functions}, howpublished = {Cryptology ePrint Archive, Report 2018/627}, year = {2018}, url = {https://eprint.iacr.org/2018/627}, } @misc{cryptoeprint:2018:628, author = {Cong Zuo and Shi-Feng Sun and Joseph K. Liu and Jun Shao and Josef Pieprzyk }, title = {Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security}, howpublished = {Cryptology ePrint Archive, Report 2018/628}, year = {2018}, url = {https://eprint.iacr.org/2018/628}, } @misc{cryptoeprint:2018:629, author = {Lucas Schabh\"{u}ser and Denis Butin and Johannes Buchmann}, title = {Context Hiding Multi-Key Linearly Homomorphic Authenticators}, howpublished = {Cryptology ePrint Archive, Report 2018/629}, year = {2018}, url = {https://eprint.iacr.org/2018/629}, } @misc{cryptoeprint:2018:630, author = {Gabrielle De Micheli and Nadia Heninger and Barak Shani}, title = {Characterizing overstretched NTRU attacks}, howpublished = {Cryptology ePrint Archive, Report 2018/630}, year = {2018}, url = {https://eprint.iacr.org/2018/630}, } @misc{cryptoeprint:2018:631, author = {Orr Dunkelman}, title = {Efficient Construction of the Boomerang Connection Table}, howpublished = {Cryptology ePrint Archive, Report 2018/631}, year = {2018}, url = {https://eprint.iacr.org/2018/631}, } @misc{cryptoeprint:2018:632, author = {Clementine Gritti and Melek Onen and Refik Molva}, title = {CHARIOT: Cloud-Assisted Access Control for the Internet of Things}, howpublished = {Cryptology ePrint Archive, Report 2018/632}, year = {2018}, url = {https://eprint.iacr.org/2018/632}, } @misc{cryptoeprint:2018:633, author = {Shweta Agrawal}, title = {New Methods for Indistinguishability Obfuscation: Bootstrapping and Instantiation}, howpublished = {Cryptology ePrint Archive, Report 2018/633}, year = {2018}, url = {https://eprint.iacr.org/2018/633}, } @misc{cryptoeprint:2018:634, author = {Christopher Patton and Thomas Shrimpton}, title = {Partially specified channels: The TLS 1.3 record layer without elision}, howpublished = {Cryptology ePrint Archive, Report 2018/634}, year = {2018}, url = {https://eprint.iacr.org/2018/634}, } @misc{cryptoeprint:2018:635, author = {Tomer Ashur and Raluca Posteuca}, title = {On linear hulls in one round of DES}, howpublished = {Cryptology ePrint Archive, Report 2018/635}, year = {2018}, url = {https://eprint.iacr.org/2018/635}, } @misc{cryptoeprint:2018:636, author = {Daode Zhang and Kai Zhang and Bao Li and Xianhui Lu and Haiyang Xue and Jie Li}, title = {Lattice-Based Dual Receiver Encryption and More}, howpublished = {Cryptology ePrint Archive, Report 2018/636}, year = {2018}, url = {https://eprint.iacr.org/2018/636}, } @misc{cryptoeprint:2018:637, author = {Shuhong Gao}, title = {Efficient Fully Homomorphic Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2018/637}, year = {2018}, url = {https://eprint.iacr.org/2018/637}, } @misc{cryptoeprint:2018:638, author = {Nirvan Tyagi and Muhammad Haris Mughees and Thomas Ristenpart and Ian Miers}, title = {BurnBox: Self-Revocable Encryption in a World Of Compelled Access}, howpublished = {Cryptology ePrint Archive, Report 2018/638}, year = {2018}, url = {https://eprint.iacr.org/2018/638}, } @misc{cryptoeprint:2018:639, author = {Lucas Schabh\"{u}ser and Denis Butin and Denise Demirel and Johanens Buchmann}, title = {Function-Dependent Commitments for Verifiable Multi-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2018/639}, year = {2018}, url = {https://eprint.iacr.org/2018/639}, } @misc{cryptoeprint:2018:640, author = {Masayuki Abe and Miguel Ambrona and Miyako Ohkubo and Mehdi Tibouchi}, title = {Lower Bounds on Structure-Preserving Signatures for Bilateral Messages}, howpublished = {Cryptology ePrint Archive, Report 2018/640}, year = {2018}, url = {https://eprint.iacr.org/2018/640}, } @misc{cryptoeprint:2018:641, author = {Michael Backes and Lucjan Hanzlik and Jonas Schneider}, title = {Membership Privacy for Fully Dynamic Group Signatures}, howpublished = {Cryptology ePrint Archive, Report 2018/641}, year = {2018}, url = {https://eprint.iacr.org/2018/641}, } @misc{cryptoeprint:2018:642, author = {Rami Khalil and Arthur Gervais}, title = {NOCUST - A Non-Custodial 2nd-Layer Financial Intermediary}, howpublished = {Cryptology ePrint Archive, Report 2018/642}, year = {2018}, url = {https://eprint.iacr.org/2018/642}, } @misc{cryptoeprint:2018:643, author = {Alexei Zamyatin and Dominik Harz and William J. Knottenbelt}, title = {Issue, Trade, Redeem: Crossing Systems Bounds with Cryptocurrency-Backed Tokens}, howpublished = {Cryptology ePrint Archive, Report 2018/643}, year = {2018}, url = {https://eprint.iacr.org/2018/643}, } @misc{cryptoeprint:2018:644, author = {Osmanbey Uzunkol and Jothi Rangasamy and Lakshmi Kuppusamy}, title = {Hide The Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT}, howpublished = {Cryptology ePrint Archive, Report 2018/644}, year = {2018}, url = {https://eprint.iacr.org/2018/644}, } @misc{cryptoeprint:2018:645, author = {Lucas Kowalczyk and Jiahui Liu and Kailash Meiyappan and Tal Malkin}, title = {Mitigating the One-Use Restriction in Attribute-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/645}, year = {2018}, url = {https://eprint.iacr.org/2018/645}, } @misc{cryptoeprint:2018:646, author = {Huijia Lin and Christian Matt}, title = {Pseudo Flawed-Smudging Generators and Their Application to Indistinguishability Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2018/646}, year = {2018}, url = {https://eprint.iacr.org/2018/646}, } @misc{cryptoeprint:2018:647, author = {Thorsten Kleinjung and Benjamin Wesolowski}, title = {A new perspective on the powers of two descent for discrete logarithms in finite fields}, howpublished = {Cryptology ePrint Archive, Report 2018/647}, year = {2018}, url = {https://eprint.iacr.org/2018/647}, } @misc{cryptoeprint:2018:648, author = {Cyprien Delpech de Saint Guilhem and Emmanuela Orsini and Christophe Petit and Nigel P. Smart}, title = {Secure Oblivious Transfer from Semi-Commutative Masking}, howpublished = {Cryptology ePrint Archive, Report 2018/648}, year = {2018}, url = {https://eprint.iacr.org/2018/648}, } @misc{cryptoeprint:2018:649, author = {Susumu Kiyoshima}, title = {No-signaling Linear PCPs}, howpublished = {Cryptology ePrint Archive, Report 2018/649}, year = {2018}, url = {https://eprint.iacr.org/2018/649}, } @misc{cryptoeprint:2018:650, author = {Gustavo Banegas and Paulo S. L. M. Barreto and Edoardo Persichetti and Paolo Santini}, title = {Designing Efficient Dyadic Operations for Cryptographic Applications}, howpublished = {Cryptology ePrint Archive, Report 2018/650}, year = {2018}, url = {https://eprint.iacr.org/2018/650}, } @misc{cryptoeprint:2018:651, author = {Nicola Tuveri and Sohaib ul Hassan and Cesar Pereida García and Billy Brumley}, title = {Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study}, howpublished = {Cryptology ePrint Archive, Report 2018/651}, year = {2018}, url = {https://eprint.iacr.org/2018/651}, } @misc{cryptoeprint:2018:652, author = {Fukang Liu}, title = {Efficient Collision Attack Frameworks for RIPEMD-160}, howpublished = {Cryptology ePrint Archive, Report 2018/652}, year = {2018}, url = {https://eprint.iacr.org/2018/652}, } @misc{cryptoeprint:2018:653, author = {Pierre-Alain Fouque and Benjamin Hadjibeyli and Paul Kirchner}, title = {Homomorphic Evaluation of Lattice-Based Symmetric Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2018/653}, year = {2018}, url = {https://eprint.iacr.org/2018/653}, } @misc{cryptoeprint:2018:654, author = {Ivan Damgård and Chaya Ganesh and Claudio Orlandi}, title = {Proofs of Replicated Storage Without Timing Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2018/654}, year = {2018}, url = {https://eprint.iacr.org/2018/654}, } @misc{cryptoeprint:2018:655, author = {Lijing Zhou and Licheng Wang and Yiru Sun and Pin Lv}, title = {Loamit: A Blockchain-based Residual Loanable-limit Query System}, howpublished = {Cryptology ePrint Archive, Report 2018/655}, year = {2018}, url = {https://eprint.iacr.org/2018/655}, } @misc{cryptoeprint:2018:656, author = {Abhishek Bajpai and S V Kulgod}, title = {FPGA Cluster based high performance Cryptanalysis framework}, howpublished = {Cryptology ePrint Archive, Report 2018/656}, year = {2018}, url = {https://eprint.iacr.org/2018/656}, } @misc{cryptoeprint:2018:657, author = {Bin Yu and Joseph Liu and Amin Sakzad and Surya Nepal and Paul Rimba and Ron Steinfeld and Man Ho Au}, title = {Platform-independent Secure Blockchain-Based Voting System}, howpublished = {Cryptology ePrint Archive, Report 2018/657}, year = {2018}, url = {https://eprint.iacr.org/2018/657}, } @misc{cryptoeprint:2018:658, author = {Konstantinos Chalkias and James Brown and Mike Hearn and Tommy Lillehagen and Igor Nitto and Thomas Schroeter}, title = {Blockchained Post-Quantum Signatures}, howpublished = {Cryptology ePrint Archive, Report 2018/658}, year = {2018}, url = {https://eprint.iacr.org/2018/658}, } @misc{cryptoeprint:2018:659, author = {Sihem Mesnager and Kwang Ho Kim and Junyop Choe and Chunming Tang}, title = {On the Menezes-Teske-Weng’s conjecture}, howpublished = {Cryptology ePrint Archive, Report 2018/659}, year = {2018}, url = {https://eprint.iacr.org/2018/659}, } @misc{cryptoeprint:2018:660, author = {Xun Yi and Kwok-Yan Lam and Dieter Gollmann}, title = {A New Blind ECDSA Scheme for Bitcoin Transaction Anonymity}, howpublished = {Cryptology ePrint Archive, Report 2018/660}, year = {2018}, url = {https://eprint.iacr.org/2018/660}, } @misc{cryptoeprint:2018:661, author = {Christoph Döpmann and Sebastian Rust and Florian Tschorsch}, title = {Exploring Deployment Strategies for the Tor Network}, howpublished = {Cryptology ePrint Archive, Report 2018/661}, year = {2018}, url = {https://eprint.iacr.org/2018/661}, } @misc{cryptoeprint:2018:662, author = {Kyoohyung Han and Seungwan Hong and Jung Hee Cheon and Daejun Park}, title = {Efficient Logistic Regression on Large Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2018/662}, year = {2018}, url = {https://eprint.iacr.org/2018/662}, } @misc{cryptoeprint:2018:663, author = {Pradeep Kumar Mishra and Deevashwer Rathee and Dung Hoang Duong and Masaya Yasuda}, title = {Fast Secure Matrix Multiplications over Ring-Based Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/663}, year = {2018}, url = {https://eprint.iacr.org/2018/663}, } @misc{cryptoeprint:2018:664, author = {Shafi Goldwasser and Sunoo Park}, title = {Public Accountability vs. Secret Laws: Can They Coexist?}, howpublished = {Cryptology ePrint Archive, Report 2018/664}, year = {2018}, url = {https://eprint.iacr.org/2018/664}, } @misc{cryptoeprint:2018:665, author = {Dan Boneh and Darren Glass and Daniel Krashen and Kristin Lauter and Shahed Sharif and Alice Silverberg and Mehdi Tibouchi and Mark Zhandry}, title = {Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2018/665}, year = {2018}, url = {https://eprint.iacr.org/2018/665}, } @misc{cryptoeprint:2018:666, author = {Paolo Santini and Edoardo Persichetti and Marco Baldi}, title = {Reproducible Codes and Cryptographic Applications}, howpublished = {Cryptology ePrint Archive, Report 2018/666}, year = {2018}, url = {https://eprint.iacr.org/2018/666}, } @misc{cryptoeprint:2018:667, author = {Mustafa Khairallah and Anupam Chattopadhyay and Bimal Mandal and Subhamoy Maitra}, title = {On Hardware Implementation of Tang-Maitra Boolean Functions}, howpublished = {Cryptology ePrint Archive, Report 2018/667}, year = {2018}, url = {https://eprint.iacr.org/2018/667}, } @misc{cryptoeprint:2018:668, author = {Takanori Isobe and Kazuhiko Minematsu}, title = {Breaking Message Integrity of an End-to-End Encryption Scheme of LINE}, howpublished = {Cryptology ePrint Archive, Report 2018/668}, year = {2018}, url = {https://eprint.iacr.org/2018/668}, } @misc{cryptoeprint:2018:669, author = {Cyril Bouvier and Laurent Imbert}, title = {Faster cofactorization with ECM using mixed representations}, howpublished = {Cryptology ePrint Archive, Report 2018/669}, year = {2018}, url = {https://eprint.iacr.org/2018/669}, } @misc{cryptoeprint:2018:670, author = {Ward Beullens and Bart Preneel and Alan Szepieniec}, title = {Public Key Compression for Constrained Linear Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2018/670}, year = {2018}, url = {https://eprint.iacr.org/2018/670}, } @misc{cryptoeprint:2018:671, author = {Joey Green and Arnab Roy and Elisabeth Oswald}, title = {A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES}, howpublished = {Cryptology ePrint Archive, Report 2018/671}, year = {2018}, url = {https://eprint.iacr.org/2018/671}, } @misc{cryptoeprint:2018:672, author = {Martin R. Albrecht and Amit Deo and Kenneth G. Paterson}, title = {Cold Boot Attacks on Ring and Module LWE Keys Under the NTT}, howpublished = {Cryptology ePrint Archive, Report 2018/672}, year = {2018}, url = {https://eprint.iacr.org/2018/672}, } @misc{cryptoeprint:2018:673, author = {Matthias J. Kannwischer and Aymeric Genêt and Denis Butin and Juliane Krämer and Johannes Buchmann}, title = {Differential Power Analysis of XMSS and SPHINCS}, howpublished = {Cryptology ePrint Archive, Report 2018/673}, year = {2018}, url = {https://eprint.iacr.org/2018/673}, } @misc{cryptoeprint:2018:674, author = {Aymeric Genêt and Matthias J. Kannwischer and Hervé Pelletier and Andrew McLauchlan}, title = {Practical Fault Injection Attacks on SPHINCS}, howpublished = {Cryptology ePrint Archive, Report 2018/674}, year = {2018}, url = {https://eprint.iacr.org/2018/674}, } @misc{cryptoeprint:2018:675, author = {Jeffrey Hoffstein and Joseph H. Silverman and William Whyte and Zhenfei Zhang}, title = {A signature scheme from the finite field isomorphism problem}, howpublished = {Cryptology ePrint Archive, Report 2018/675}, year = {2018}, url = {https://eprint.iacr.org/2018/675}, } @misc{cryptoeprint:2018:676, author = {Thorben Moos and Amir Moradi and Bastian Richter}, title = {Static Power Side-Channel Analysis - A Survey on Measurement Factors}, howpublished = {Cryptology ePrint Archive, Report 2018/676}, year = {2018}, url = {https://eprint.iacr.org/2018/676}, } @misc{cryptoeprint:2018:677, author = {François Gérard}, title = {Module-lattice KEM Over a Ring of Dimension 128 for Embedded Systems}, howpublished = {Cryptology ePrint Archive, Report 2018/677}, year = {2018}, url = {https://eprint.iacr.org/2018/677}, } @misc{cryptoeprint:2018:678, author = {Ben Fisch}, title = {PoReps: Proofs of Space on Useful Data}, howpublished = {Cryptology ePrint Archive, Report 2018/678}, year = {2018}, url = {https://eprint.iacr.org/2018/678}, } @misc{cryptoeprint:2018:679, author = {Jia-Si Weng and Jian Weng and Ming Li and Yue Zhang and Weiqi Luo}, title = {DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-based Incentive}, howpublished = {Cryptology ePrint Archive, Report 2018/679}, year = {2018}, url = {https://eprint.iacr.org/2018/679}, } @misc{cryptoeprint:2018:680, author = {Rui Zong and Xiaoyang Dong and Xiaoyun Wang}, title = {Related-Tweakey Impossible Differential Attack on Reduced-Round Deoxys-BC-256}, howpublished = {Cryptology ePrint Archive, Report 2018/680}, year = {2018}, url = {https://eprint.iacr.org/2018/680}, } @misc{cryptoeprint:2018:681, author = {Jung Hee Cheon and Jinhyuck Jeong and Dongwoo Kim and Jongchan Lee}, title = {A Reusable Fuzzy Extractor with Practical Storage Size}, howpublished = {Cryptology ePrint Archive, Report 2018/681}, year = {2018}, url = {https://eprint.iacr.org/2018/681}, } @misc{cryptoeprint:2018:682, author = {Angshuman Karmakar and Jose Maria Bermudo Mera and Sujoy Sinha Roy and Ingrid Verbauwhede}, title = {Saber on ARM CCA-secure module lattice-based key encapsulation on ARM}, howpublished = {Cryptology ePrint Archive, Report 2018/682}, year = {2018}, url = {https://eprint.iacr.org/2018/682}, } @misc{cryptoeprint:2018:683, author = {Oksana Kulyk and Melanie Volkamer}, title = {Usability is not Enough: Lessons Learned from 'Human Factors in Security' Research for Verifiability}, howpublished = {Cryptology ePrint Archive, Report 2018/683}, year = {2018}, url = {https://eprint.iacr.org/2018/683}, } @misc{cryptoeprint:2018:684, author = {Ethan Cecchetti and Ian Miers and Ari Juels}, title = {PIEs: Public Incompressible Encodings for Decentralized Storage}, howpublished = {Cryptology ePrint Archive, Report 2018/684}, year = {2018}, url = {https://eprint.iacr.org/2018/684}, } @misc{cryptoeprint:2018:685, author = {Sven Heiberg and Ivo Kubjas and Janno Siim and Jan Willemson}, title = {On Trade-offs of Applying Block Chains for Electronic Voting Bulletin Boards}, howpublished = {Cryptology ePrint Archive, Report 2018/685}, year = {2018}, url = {https://eprint.iacr.org/2018/685}, } @misc{cryptoeprint:2018:686, author = {James Howe and Tobias Oder and Markus Krausz and Tim Güneysu}, title = {Standard Lattice-Based Key Encapsulation on Embedded Devices}, howpublished = {Cryptology ePrint Archive, Report 2018/686}, year = {2018}, url = {https://eprint.iacr.org/2018/686}, } @misc{cryptoeprint:2018:687, author = {Joppe W. Bos and Simon Friedberger and Marco Martinoli and Elisabeth Oswald and Martijn Stam}, title = {Assessing the Feasibility of Single Trace Power Analysis of Frodo}, howpublished = {Cryptology ePrint Archive, Report 2018/687}, year = {2018}, url = {https://eprint.iacr.org/2018/687}, } @misc{cryptoeprint:2018:688, author = {Zahra Eskandari and Andreas Brasen Kidmose and Stefan Kölbl and Tyge Tiessen}, title = {Finding Integral Distinguishers with Ease}, howpublished = {Cryptology ePrint Archive, Report 2018/688}, year = {2018}, url = {https://eprint.iacr.org/2018/688}, } @misc{cryptoeprint:2018:689, author = {Ralph Ankele and Stefan Kölbl}, title = {Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2018/689}, year = {2018}, url = {https://eprint.iacr.org/2018/689}, } @misc{cryptoeprint:2018:690, author = {Zilong Wang and Honggang Hu}, title = {Efficient KEA-Style Lattice-Based Authenticated Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2018/690}, year = {2018}, url = {https://eprint.iacr.org/2018/690}, } @misc{cryptoeprint:2018:691, author = {Howard Wu and Wenting Zheng and Alessandro Chiesa and Raluca Ada Popa and Ion Stoica}, title = {DIZK: A Distributed Zero Knowledge Proof System}, howpublished = {Cryptology ePrint Archive, Report 2018/691}, year = {2018}, url = {https://eprint.iacr.org/2018/691}, } @misc{cryptoeprint:2018:692, author = {Diana Maimut and George Teseleanu }, title = {New Configurations of Grain Ciphers: Security Against Slide Attacks}, howpublished = {Cryptology ePrint Archive, Report 2018/692}, year = {2018}, url = {https://eprint.iacr.org/2018/692}, } @misc{cryptoeprint:2018:693, author = {Bernhard Jungk and Richard Petri and Marc Stöttinger}, title = {Efficient Side-Channel Protections of ARX Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2018/693}, year = {2018}, url = {https://eprint.iacr.org/2018/693}, } @misc{cryptoeprint:2018:694, author = {Kimmo Järvinen and Ágnes Kiss and Thomas Schneider and Oleksandr Tkachenko and Zheng Yang}, title = {Faster Privacy-Preserving Location Proximity Schemes}, howpublished = {Cryptology ePrint Archive, Report 2018/694}, year = {2018}, url = {https://eprint.iacr.org/2018/694}, } @misc{cryptoeprint:2018:695, author = {Maliheh Shirvanian and Stanislaw Jarecki and Hugo Krawczyk and Nitesh Saxena }, title = {SPHINX: A Password Store that Perfectly Hides Passwords from Itself}, howpublished = {Cryptology ePrint Archive, Report 2018/695}, year = {2018}, url = {https://eprint.iacr.org/2018/695}, } @misc{cryptoeprint:2018:696, author = {Junichi Tomida and Katsuyuki Takashima}, title = {Unbounded Inner Product Functional Encryption from Bilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2018/696}, year = {2018}, url = {https://eprint.iacr.org/2018/696}, } @misc{cryptoeprint:2018:697, author = {Jonathan Frankle and Sunoo Park and Daniel Shaar and Shafi Goldwasser and Daniel J. Weitzner}, title = {Practical Accountability of Secret Processes}, howpublished = {Cryptology ePrint Archive, Report 2018/697}, year = {2018}, url = {https://eprint.iacr.org/2018/697}, } @misc{cryptoeprint:2018:698, author = {David Cash and Feng-Hao Liu and Adam O'Neill and Mark Zhandry and Cong Zhang}, title = {Parameter-Hiding Order Revealing Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/698}, year = {2018}, url = {https://eprint.iacr.org/2018/698}, } @misc{cryptoeprint:2018:699, author = {Raghvendra Rohit and Guang Gong}, title = {Correlated Sequence Attack on Reduced-Round Simon-32/64 and Simeck-32/64}, howpublished = {Cryptology ePrint Archive, Report 2018/699}, year = {2018}, url = {https://eprint.iacr.org/2018/699}, } @misc{cryptoeprint:2018:700, author = {Hwajeong Seo and Zhe Liu and Patrick Longa and Zhi Hu}, title = {SIDH on ARM: Faster Modular Multiplications for Faster Post-Quantum Supersingular Isogeny Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2018/700}, year = {2018}, url = {https://eprint.iacr.org/2018/700}, } @misc{cryptoeprint:2018:701, author = {Yen-Lung Lai}, title = {How to Correct More Errors in a Secure Sketch}, howpublished = {Cryptology ePrint Archive, Report 2018/701}, year = {2018}, url = {https://eprint.iacr.org/2018/701}, } @misc{cryptoeprint:2018:702, author = {Ben Fisch}, title = {Tight Proofs of Space and Replication}, howpublished = {Cryptology ePrint Archive, Report 2018/702}, year = {2018}, url = {https://eprint.iacr.org/2018/702}, } @misc{cryptoeprint:2018:703, author = {Niek J. Bouman and Niels de Vreede}, title = {New Protocols for Secure Linear Algebra: Pivoting-Free Elimination and Fast Block-Recursive Matrix Decomposition}, howpublished = {Cryptology ePrint Archive, Report 2018/703}, year = {2018}, url = {https://eprint.iacr.org/2018/703}, } @misc{cryptoeprint:2018:704, author = {Hisham S. Galal and Amr M. Youssef}, title = {Verifiable Sealed-Bid Auction on the Ethereum Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2018/704}, year = {2018}, url = {https://eprint.iacr.org/2018/704}, } @misc{cryptoeprint:2018:705, author = {Russell W.F. Lai and Giulio Malavolta}, title = {Optimal Succinct Arguments via Hidden Order Groups}, howpublished = {Cryptology ePrint Archive, Report 2018/705}, year = {2018}, url = {https://eprint.iacr.org/2018/705}, } @misc{cryptoeprint:2018:706, author = {Paul Bunn and Jonathan Katz and Eyal Kushilevitz and Rafail Ostrovsky}, title = {Efficient 3-Party Distributed ORAM}, howpublished = {Cryptology ePrint Archive, Report 2018/706}, year = {2018}, url = {https://eprint.iacr.org/2018/706}, } @misc{cryptoeprint:2018:707, author = {Elette Boyle and Niv Gilboa and Yuval Ishai}, title = {Function Secret Sharing: Improvements and Extensions}, howpublished = {Cryptology ePrint Archive, Report 2018/707}, year = {2018}, url = {https://eprint.iacr.org/2018/707}, } @misc{cryptoeprint:2018:708, author = {Alexandre Adomnicai and Jacques J.A. Fournier and Laurent Masson}, title = {Masking the Lightweight Authenticated Ciphers ACORN and Ascon in Software}, howpublished = {Cryptology ePrint Archive, Report 2018/708}, year = {2018}, url = {https://eprint.iacr.org/2018/708}, } @misc{cryptoeprint:2018:709, author = {Vanessa Vitse}, title = {Simple oblivious transfer protocols compatible with Kummer and supersingular isogenies}, howpublished = {Cryptology ePrint Archive, Report 2018/709}, year = {2018}, url = {https://eprint.iacr.org/2018/709}, } @misc{cryptoeprint:2018:710, author = {Megha Byali and Arun Joseph and Arpita Patra and Divya Ravi}, title = {Fast Secure Computation for Small Population over the Internet}, howpublished = {Cryptology ePrint Archive, Report 2018/710}, year = {2018}, url = {https://eprint.iacr.org/2018/710}, } @misc{cryptoeprint:2018:711, author = {Kallepu Raju and Appala Naidu Tentuand and V. Ch. Venkaiah}, title = {Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing: Generalization and Countermeasures}, howpublished = {Cryptology ePrint Archive, Report 2018/711}, year = {2018}, url = {https://eprint.iacr.org/2018/711}, } @misc{cryptoeprint:2018:712, author = {Dan Boneh and Benedikt B\"unz and Ben Fisch}, title = {A Survey of Two Verifiable Delay Functions}, howpublished = {Cryptology ePrint Archive, Report 2018/712}, year = {2018}, url = {https://eprint.iacr.org/2018/712}, } @misc{cryptoeprint:2018:713, author = {Anne Canteaut and Léo Perrin}, title = {On CCZ-Equivalence, Extended-Affine Equivalence, and Function Twisting}, howpublished = {Cryptology ePrint Archive, Report 2018/713}, year = {2018}, url = {https://eprint.iacr.org/2018/713}, } @misc{cryptoeprint:2018:714, author = {Jean-Charles Faugère and Eliane Koussa and Gilles Macario-Rat and Jacques Patarin and Ludovic Perret}, title = {PKP-Based Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2018/714}, year = {2018}, url = {https://eprint.iacr.org/2018/714}, } @misc{cryptoeprint:2018:715, author = {Mohamed Ahmed Abdelraheem and Tobias Andersson and Christian Gehrmann and Cornelius Glackin}, title = {Practical Attacks on Relational Databases Protected via Searchable Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/715}, year = {2018}, url = {https://eprint.iacr.org/2018/715}, } @misc{cryptoeprint:2018:716, author = {Benoît Libert and San Ling and Khoa Nguyen and Huaxiong Wang}, title = {Lattice-Based Zero-Knowledge Arguments for Integer Relations}, howpublished = {Cryptology ePrint Archive, Report 2018/716}, year = {2018}, url = {https://eprint.iacr.org/2018/716}, } @misc{cryptoeprint:2018:717, author = {Heiko Lohrke and Shahin Tajik and Thilo Krachenfels and Christian Boit and Jean-Pierre Seifert}, title = {Key Extraction using Thermal Laser Stimulation: A Case Study on Xilinx Ultrascale FPGAs}, howpublished = {Cryptology ePrint Archive, Report 2018/717}, year = {2018}, url = {https://eprint.iacr.org/2018/717}, } @misc{cryptoeprint:2018:718, author = {Koji Nuida}, title = {Keeping or Losing Tiny-Error Correctness of Cryptosystems Implemented by Secure Pseudorandom Generators}, howpublished = {Cryptology ePrint Archive, Report 2018/718}, year = {2018}, url = {https://eprint.iacr.org/2018/718}, } @misc{cryptoeprint:2018:719, author = {Evgenios M. Kornaropoulos and Charalampos Papamanthou and Roberto Tamassia}, title = {Data Recovery on Encrypted Databases With k-Nearest Neighbor Query Leakage}, howpublished = {Cryptology ePrint Archive, Report 2018/719}, year = {2018}, url = {https://eprint.iacr.org/2018/719}, } @misc{cryptoeprint:2018:720, author = {Paul Crowley and Eric Biggers}, title = {HPolyC: length-preserving encryption for entry-level processors}, howpublished = {Cryptology ePrint Archive, Report 2018/720}, year = {2018}, url = {https://eprint.iacr.org/2018/720}, } @misc{cryptoeprint:2018:721, author = {Alin Tomescu and Vivek Bhupatiraju and Dimitrios Papadopoulos and Charalampos Papamanthou and Nikos Triandopoulos and Srinivas Devadas}, title = {Transparency Logs via Append-only Authenticated Dictionaries}, howpublished = {Cryptology ePrint Archive, Report 2018/721}, year = {2018}, url = {https://eprint.iacr.org/2018/721}, } @misc{cryptoeprint:2018:722, author = {Henning Kopp and Frank Kargl and Christoph B{\"o}sch and Andreas Peter}, title = {uMine: a Blockchain based on Human Miners}, howpublished = {Cryptology ePrint Archive, Report 2018/722}, year = {2018}, url = {https://eprint.iacr.org/2018/722}, } @misc{cryptoeprint:2018:723, author = {Markku-Juhani O. Saarinen and Sauvik Bhattacharya and Oscar Garcia-Morchon and Ronald Rietman and Ludo Tolhuizen and Zhenfei Zhang}, title = {Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M}, howpublished = {Cryptology ePrint Archive, Report 2018/723}, year = {2018}, url = {https://eprint.iacr.org/2018/723}, } @misc{cryptoeprint:2018:724, author = {Nele Mentens and Edoardo Charbon and Francesco Regazzoni}, title = {Rethinking Secure FPGAs: Towards a Cryptography-friendly Configurable Cell Architecture and its Automated Design Flow}, howpublished = {Cryptology ePrint Archive, Report 2018/724}, year = {2018}, url = {https://eprint.iacr.org/2018/724}, } @misc{cryptoeprint:2018:725, author = {Sauvik Bhattacharya and Oscar Garcia-Morchon and Thijs Laarhoven and Ronald Rietman and Markku-Juhani O. Saarinen and Ludo Tolhuizen and Zhenfei Zhang}, title = {Round5: Compact and Fast Post-Quantum Public-Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/725}, year = {2018}, url = {https://eprint.iacr.org/2018/725}, } @misc{cryptoeprint:2018:726, author = {Kai Hu and Tingting Cui and Chao Gao and Meiqin Wang}, title = {Towards Key-Dependent Integral and Impossible Differential Distinguishers on 5-Round AES}, howpublished = {Cryptology ePrint Archive, Report 2018/726}, year = {2018}, url = {https://eprint.iacr.org/2018/726}, } @misc{cryptoeprint:2018:727, author = {Shashank Agrawal and Payman Mohassel and Pratyay Mukherjee and Peter Rindal}, title = {DiSE: Distributed Symmetric-key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/727}, year = {2018}, url = {https://eprint.iacr.org/2018/727}, } @misc{cryptoeprint:2018:728, author = {Takeshi Okamoto and Raylin Tso and Michitomo Yamaguchi and Eiji Okamoto}, title = {A $k$-out-of-$n$ Ring Signature with Flexible Participation for Signers}, howpublished = {Cryptology ePrint Archive, Report 2018/728}, year = {2018}, url = {https://eprint.iacr.org/2018/728}, } @misc{cryptoeprint:2018:729, author = {Thierry Simon and Lejla Batina and Joan Daemen and Vincent Grosso and Pedro Maat Costa Massolino and Kostas Papagiannopoulos and Francesco Regazzoni and Niels Samwel}, title = {Towards Lightweight Cryptographic Primitives with Built-in Fault-Detection}, howpublished = {Cryptology ePrint Archive, Report 2018/729}, year = {2018}, url = {https://eprint.iacr.org/2018/729}, } @misc{cryptoeprint:2018:730, author = {Atsushi Fujioka and Katsuyuki Takashima and Shintaro Terada and Kazuki Yoneyama}, title = {Supersingular Isogeny Diffie-Hellman Authenticated Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2018/730}, year = {2018}, url = {https://eprint.iacr.org/2018/730}, } @misc{cryptoeprint:2018:731, author = {Itai Dinur and Nathan Keller and Ohad Klein}, title = {An Optimal Distributed Discrete Log Protocol with Applications to Homomorphic Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2018/731}, year = {2018}, url = {https://eprint.iacr.org/2018/731}, } @misc{cryptoeprint:2018:732, author = {Avradip Mandal and John C. Mitchell and Hart Montgomery and Arnab Roy}, title = {Data Oblivious Genome Variants Search on Intel SGX}, howpublished = {Cryptology ePrint Archive, Report 2018/732}, year = {2018}, url = {https://eprint.iacr.org/2018/732}, } @misc{cryptoeprint:2018:733, author = {Stanislaw Jarecki and Hugo Krawczyk and Jason Resch}, title = {Threshold Partially-Oblivious PRFs with Applications to Key Management}, howpublished = {Cryptology ePrint Archive, Report 2018/733}, year = {2018}, url = {https://eprint.iacr.org/2018/733}, } @misc{cryptoeprint:2018:734, author = {George Teseleanu}, title = {Random Number Generators Can Be Fooled to Behave Badly}, howpublished = {Cryptology ePrint Archive, Report 2018/734}, year = {2018}, url = {https://eprint.iacr.org/2018/734}, } @misc{cryptoeprint:2018:735, author = {Lijing Zhou and Licheng Wang and Yiru Sun and Tianyi Ai}, title = {BeeHive: Double Non-interactive Secure Multi-party Computation}, howpublished = {Cryptology ePrint Archive, Report 2018/735}, year = {2018}, url = {https://eprint.iacr.org/2018/735}, } @misc{cryptoeprint:2018:736, author = {Marina Blanton and Myoungin Jeong}, title = {Improved Signature Schemes for Secure Multi-Party Computation with Certified Inputs}, howpublished = {Cryptology ePrint Archive, Report 2018/736}, year = {2018}, url = {https://eprint.iacr.org/2018/736}, } @misc{cryptoeprint:2018:737, author = {Tobias Pulls and Rasmus Dahlberg}, title = {Steady: A Simple End-to-End Secure Logging System}, howpublished = {Cryptology ePrint Archive, Report 2018/737}, year = {2018}, url = {https://eprint.iacr.org/2018/737}, } @misc{cryptoeprint:2018:738, author = {Sanjit Chatterjee and R. Kabaleeshwaran}, title = {Towards Static Assumption Based Cryptosystem in Pairing Setting: Further Applications of D\'{e}j\`{a}Q and Dual-Form Signature}, howpublished = {Cryptology ePrint Archive, Report 2018/738}, year = {2018}, url = {https://eprint.iacr.org/2018/738}, } @misc{cryptoeprint:2018:739, author = {Mahdi Sajadieh and Mohammad Vaziri}, title = {Using MILP in Analysis of Feistel Structures and Improving Type II GFS by Switching Mechanism}, howpublished = {Cryptology ePrint Archive, Report 2018/739}, year = {2018}, url = {https://eprint.iacr.org/2018/739}, } @misc{cryptoeprint:2018:740, author = {Stefan Dziembowski and Lisa Eckey and Sebastian Faust}, title = {FairSwap: How to fairly exchange digital goods}, howpublished = {Cryptology ePrint Archive, Report 2018/740}, year = {2018}, url = {https://eprint.iacr.org/2018/740}, } @misc{cryptoeprint:2018:741, author = {Alexander May and Gottfried Herold}, title = {LP Solutions of Vectorial Integer Subset Sums - Cryptanalysis of Galbraith's Binary Matrix LWE}, howpublished = {Cryptology ePrint Archive, Report 2018/741}, year = {2018}, url = {https://eprint.iacr.org/2018/741}, } @misc{cryptoeprint:2018:742, author = {Hiroaki Anada and Seiko Arita}, title = {Witness-Indistinguishable Arguments with $\Sigma$-Protocols for Bundled Witness Spaces and its Application to Global Identities}, howpublished = {Cryptology ePrint Archive, Report 2018/742}, year = {2018}, url = {https://eprint.iacr.org/2018/742}, } @misc{cryptoeprint:2018:743, author = {Aurélien Dupin and David Pointcheval and Christophe Bidan}, title = {On the Leakage of Corrupted Garbled Circuits}, howpublished = {Cryptology ePrint Archive, Report 2018/743}, year = {2018}, url = {https://eprint.iacr.org/2018/743}, } @misc{cryptoeprint:2018:744, author = {Leon J. Helsloot and Gamze Tillem and Zekeriya Erkin}, title = {BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2018/744}, year = {2018}, url = {https://eprint.iacr.org/2018/744}, } @misc{cryptoeprint:2018:745, author = {Jingdian Ming and Wei Cheng and Huizhong Li and Guang Yang and Yongbin Zhou and Qian Zhang}, title = {Achilles' Heel: the Unbalanced Mask Sets May Destroy a Masking Countermeasure}, howpublished = {Cryptology ePrint Archive, Report 2018/745}, year = {2018}, url = {https://eprint.iacr.org/2018/745}, } @misc{cryptoeprint:2018:746, author = {Fuchun Lin and Mahdi Cheraghchi and Venkatesan Guruswami and Reihaneh Safavi-Naini and Huaxiong Wang}, title = {Secret Sharing with Binary Shares}, howpublished = {Cryptology ePrint Archive, Report 2018/746}, year = {2018}, url = {https://eprint.iacr.org/2018/746}, } @misc{cryptoeprint:2018:747, author = {Eyal Ronen and Kenneth G. Paterson and Adi Shamir}, title = {Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure}, howpublished = {Cryptology ePrint Archive, Report 2018/747}, year = {2018}, url = {https://eprint.iacr.org/2018/747}, } @misc{cryptoeprint:2018:748, author = {Colin Boyd and Gareth T. Davies and Kristian Gjøsteen and Håvard Raddum and Mohsen Toorani}, title = {Definitions for Plaintext-Existence Hiding in Cloud Storage}, howpublished = {Cryptology ePrint Archive, Report 2018/748}, year = {2018}, url = {https://eprint.iacr.org/2018/748}, } @misc{cryptoeprint:2018:749, author = {Martin R. Albrecht and Jake Massimo and Kenneth G. Paterson and Juraj Somorovsky}, title = {Prime and Prejudice: Primality Testing Under Adversarial Conditions}, howpublished = {Cryptology ePrint Archive, Report 2018/749}, year = {2018}, url = {https://eprint.iacr.org/2018/749}, } @misc{cryptoeprint:2018:750, author = {Vipul Goyal and Ashutosh Kumar}, title = {Non-Malleable Secret Sharing for General Access Structures}, howpublished = {Cryptology ePrint Archive, Report 2018/750}, year = {2018}, url = {https://eprint.iacr.org/2018/750}, } @misc{cryptoeprint:2018:751, author = {Assi Barak and Martin Hirt and Lior Koskas and Yehuda Lindell}, title = {An End-to-End System for Large Scale P2P MPC-as-a-Service and Low-Bandwidth MPC for Weak Participants}, howpublished = {Cryptology ePrint Archive, Report 2018/751}, year = {2018}, url = {https://eprint.iacr.org/2018/751}, } @misc{cryptoeprint:2018:752, author = {David Urbanik}, title = {Isogeny Secrets can be Traded}, howpublished = {Cryptology ePrint Archive, Report 2018/752}, year = {2018}, url = {https://eprint.iacr.org/2018/752}, } @misc{cryptoeprint:2018:753, author = {Yan Michalevsky and Marc Joye}, title = {Decentralized Policy-Hiding Attribute-Based Encryption with Receiver Privacy}, howpublished = {Cryptology ePrint Archive, Report 2018/753}, year = {2018}, url = {https://eprint.iacr.org/2018/753}, } @misc{cryptoeprint:2018:754, author = {Juan Garay and Aggelos Kiayias}, title = {SoK: A Consensus Taxonomy in the Blockchain Era}, howpublished = {Cryptology ePrint Archive, Report 2018/754}, year = {2018}, url = {https://eprint.iacr.org/2018/754}, } @misc{cryptoeprint:2018:755, author = {Zhengan Huang and Junzuo Lai and Wenbin Chen and Man Ho Au and Zhen Peng and Jin Li}, title = {Simulation-Based Selective Opening Security for Receivers under Chosen-Ciphertext Attacks}, howpublished = {Cryptology ePrint Archive, Report 2018/755}, year = {2018}, url = {https://eprint.iacr.org/2018/755}, } @misc{cryptoeprint:2018:756, author = {Craig Gentry and Charanjit S. Jutla}, title = {Obfuscation Using Tensor Products}, howpublished = {Cryptology ePrint Archive, Report 2018/756}, year = {2018}, url = {https://eprint.iacr.org/2018/756}, } @misc{cryptoeprint:2018:757, author = {Kimmo Halunen and Outi-Marja Latvala}, title = {Cryptography for Human Senses}, howpublished = {Cryptology ePrint Archive, Report 2018/757}, year = {2018}, url = {https://eprint.iacr.org/2018/757}, } @misc{cryptoeprint:2018:758, author = {Christina Boura and Nicolas Gama and Mariya Georgieva}, title = {Chimera: a unified framework for B/FV, TFHE and HEAAN fully homomorphic encryption and predictions for deep learning}, howpublished = {Cryptology ePrint Archive, Report 2018/758}, year = {2018}, url = {https://eprint.iacr.org/2018/758}, } @misc{cryptoeprint:2018:759, author = {Prabhanjan Ananth and Alex Lombardi}, title = {Succinct Garbling Schemes from Functional Encryption through a Local Simulation Paradigm}, howpublished = {Cryptology ePrint Archive, Report 2018/759}, year = {2018}, url = {https://eprint.iacr.org/2018/759}, } @misc{cryptoeprint:2018:760, author = {Xiu Xu and Haiyang Xue and Kunpeng Wang and Song Tian and Bei Liang and Wei yu}, title = {Strongly Secure Authenticated Key Exchange from Supersingular Isogeny}, howpublished = {Cryptology ePrint Archive, Report 2018/760}, year = {2018}, url = {https://eprint.iacr.org/2018/760}, } @misc{cryptoeprint:2018:761, author = {N. Mahdion and Hadi Soleimany and Pouya Habibi and Farokhlagha Moazami}, title = {New Single-Trace Side-Channel Attacks on a Specific Class of Elgamal Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2018/761}, year = {2018}, url = {https://eprint.iacr.org/2018/761}, } @misc{cryptoeprint:2018:762, author = {Toshinori Araki and Assi Barak and Jun Furukawa and Marcel Keller and Yehuda Lindell and Kazuma Ohara and Hikaru Tsuchida}, title = {Generalizing the SPDZ Compiler For Other Protocols}, howpublished = {Cryptology ePrint Archive, Report 2018/762}, year = {2018}, url = {https://eprint.iacr.org/2018/762}, } @misc{cryptoeprint:2018:763, author = {Tim Beyne}, title = {Block Cipher Invariants as Eigenvectors of Correlation Matrices}, howpublished = {Cryptology ePrint Archive, Report 2018/763}, year = {2018}, url = {https://eprint.iacr.org/2018/763}, } @misc{cryptoeprint:2018:764, author = {Mathias Hall-Andersen and Philip S. Vejre}, title = {Generating Graphs Packed with Paths}, howpublished = {Cryptology ePrint Archive, Report 2018/764}, year = {2018}, url = {https://eprint.iacr.org/2018/764}, } @misc{cryptoeprint:2018:765, author = {Gilles Barthe and Xiong Fan and Joshua Gancher and Benjamin Grégoire and Charlie Jacomme and Elaine Shi}, title = {Symbolic Proofs for Lattice-Based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2018/765}, year = {2018}, url = {https://eprint.iacr.org/2018/765}, } @misc{cryptoeprint:2018:766, author = {Nadim Kobeissi and Karthikeyan Bhargavan}, title = {Noise Explorer: Fully Automated Modeling and Verification for Arbitrary Noise Protocols}, howpublished = {Cryptology ePrint Archive, Report 2018/766}, year = {2018}, url = {https://eprint.iacr.org/2018/766}, } @misc{cryptoeprint:2018:767, author = {Joan Daemen and Seth Hoffert and Gilles Van Assche and Ronny Van Keer}, title = {Xoodoo cookbook}, howpublished = {Cryptology ePrint Archive, Report 2018/767}, year = {2018}, url = {https://eprint.iacr.org/2018/767}, } @misc{cryptoeprint:2018:768, author = {Ameera Salem Al Abdouli and Mohamed Al Ali and Emanuele Bellini and Florian Caullery and Alexandros Hasikos and Marc Manzano and Victor Mateu}, title = {DRANKULA: a McEliece-like rank metric based cryptosystem implementation}, howpublished = {Cryptology ePrint Archive, Report 2018/768}, year = {2018}, url = {https://eprint.iacr.org/2018/768}, } @misc{cryptoeprint:2018:769, author = {Lilya Budaghyan and Marco Calderini and Claude Carlet and Robert S. Coulter and Irene Villa}, title = {Constructing APN functions through isotopic shifts}, howpublished = {Cryptology ePrint Archive, Report 2018/769}, year = {2018}, url = {https://eprint.iacr.org/2018/769}, } @misc{cryptoeprint:2018:770, author = {Balthazar Bauer and Pooya Farshim and Sogol Mazaheri}, title = {Combiners for Backdoored Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2018/770}, year = {2018}, url = {https://eprint.iacr.org/2018/770}, } @misc{cryptoeprint:2018:771, author = {Sanjam Garg and Akshayaram Srinivasan}, title = {A Simple Construction of iO for Turing Machines}, howpublished = {Cryptology ePrint Archive, Report 2018/771}, year = {2018}, url = {https://eprint.iacr.org/2018/771}, } @misc{cryptoeprint:2018:772, author = {Itai Dinur}, title = {Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC}, howpublished = {Cryptology ePrint Archive, Report 2018/772}, year = {2018}, url = {https://eprint.iacr.org/2018/772}, } @misc{cryptoeprint:2018:773, author = {Muhammed F. Esgin and Ron Steinfeld and Amin Sakzad and Joseph K. Liu and Dongxi Liu}, title = {Short Lattice-based One-out-of-Many Proofs and Applications to Ring Signatures}, howpublished = {Cryptology ePrint Archive, Report 2018/773}, year = {2018}, url = {https://eprint.iacr.org/2018/773}, } @misc{cryptoeprint:2018:774, author = {Brandon Goodell and Sarang Noether}, title = {Thring Signatures and their Applications to Spender-Ambiguous Digital Currencies}, howpublished = {Cryptology ePrint Archive, Report 2018/774}, year = {2018}, url = {https://eprint.iacr.org/2018/774}, } @misc{cryptoeprint:2018:775, author = {Matilda Backendal and Mihir Bellare and Jessica Sorrell and Jiahao Sun}, title = {The Fiat-Shamir Zoo: Relating the Security of Different Signature Variants}, howpublished = {Cryptology ePrint Archive, Report 2018/775}, year = {2018}, url = {https://eprint.iacr.org/2018/775}, } @misc{cryptoeprint:2018:776, author = {Yael Kalai and Omer Paneth and Lisa Yang }, title = {On Publicly Verifiable Delegation From Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2018/776}, year = {2018}, url = {https://eprint.iacr.org/2018/776}, } @misc{cryptoeprint:2018:777, author = {Wei Yin and Qiaoyan Wen and Kaitai Liang and Zhenfei Zhang and Liqun Chen and Hanbing Yan and Hua Zhang}, title = {Delegation of Decryption Rights with Revocability from Learning with Errors}, howpublished = {Cryptology ePrint Archive, Report 2018/777}, year = {2018}, url = {https://eprint.iacr.org/2018/777}, } @misc{cryptoeprint:2018:778, author = {Katerina Sotiraki and Manolis Zampetakis and Giorgos Zirdelis}, title = {PPP-Completeness with Connections to Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2018/778}, year = {2018}, url = {https://eprint.iacr.org/2018/778}, } @misc{cryptoeprint:2018:779, author = {Rafael del Pino and Vadim Lyubashevsky and Gregor Seiler}, title = {Lattice-Based Group Signatures and Zero-Knowledge Proofs of Automorphism Stability}, howpublished = {Cryptology ePrint Archive, Report 2018/779}, year = {2018}, url = {https://eprint.iacr.org/2018/779}, } @misc{cryptoeprint:2018:780, author = {Rajani Singh and Ashutosh Dhar Dwivedi and Gautam Srivastava}, title = {Bitcoin Mining: A Game Theoretic Analysis}, howpublished = {Cryptology ePrint Archive, Report 2018/780}, year = {2018}, url = {https://eprint.iacr.org/2018/780}, } @misc{cryptoeprint:2018:781, author = {Yu Chen and Yuyu Wang and Hong-sheng Zhou}, title = {Leakage-Resilient Cryptography from Puncturable Primitives and Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2018/781}, year = {2018}, url = {https://eprint.iacr.org/2018/781}, } @misc{cryptoeprint:2018:782, author = {Michael Meyer and Steffen Reith}, title = {A faster way to the CSIDH}, howpublished = {Cryptology ePrint Archive, Report 2018/782}, year = {2018}, url = {https://eprint.iacr.org/2018/782}, } @misc{cryptoeprint:2018:783, author = {Yu Long Chen and Bart Mennink and Mridul Nandi}, title = {Short Variable Length Domain Extenders With Beyond Birthday Bound Security}, howpublished = {Cryptology ePrint Archive, Report 2018/783}, year = {2018}, url = {https://eprint.iacr.org/2018/783}, } @misc{cryptoeprint:2018:784, author = {ByeongHak Lee and Jooyoung Lee}, title = {Tweakable Block Ciphers Secure Beyond the Birthday Bound in the Ideal Cipher Model}, howpublished = {Cryptology ePrint Archive, Report 2018/784}, year = {2018}, url = {https://eprint.iacr.org/2018/784}, } @misc{cryptoeprint:2018:785, author = {Carl Bootland and Wouter Castryck and Ilia Iliashenko and Frederik Vercauteren}, title = {Efficiently Processing Complex-Valued Data in Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/785}, year = {2018}, url = {https://eprint.iacr.org/2018/785}, } @misc{cryptoeprint:2018:786, author = {Zhongxiang Zheng and Guangwu Xu and Chunhuan Zhao}, title = {Discrete Gaussian Measures and New Bounds of the Smoothing Parameter for Lattices}, howpublished = {Cryptology ePrint Archive, Report 2018/786}, year = {2018}, url = {https://eprint.iacr.org/2018/786}, } @misc{cryptoeprint:2018:787, author = {Hao Chen and Zhicong Huang and Kim Laine and Peter Rindal}, title = {Labeled PSI from Fully Homomorphic Encryption with Malicious Security}, howpublished = {Cryptology ePrint Archive, Report 2018/787}, year = {2018}, url = {https://eprint.iacr.org/2018/787}, } @misc{cryptoeprint:2018:788, author = {Marcos A. Simplicio Jr. and Eduardo Lopes Cominetti and Harsh Kupwade Patil and Jefferson E. Ricardini and Leonardo T. D. Ferraz and Marcos Vinicius M. Silva}, title = {Privacy-preserving linkage/revocation of VANET certificates without LAs}, howpublished = {Cryptology ePrint Archive, Report 2018/788}, year = {2018}, url = {https://eprint.iacr.org/2018/788}, } @misc{cryptoeprint:2018:789, author = {Vladimir Kolesnikov}, title = {Free IF: How to Omit Inactive Branches and Implement S-Universal Garbled Circuit (Almost) for Free}, howpublished = {Cryptology ePrint Archive, Report 2018/789}, year = {2018}, url = {https://eprint.iacr.org/2018/789}, } @misc{cryptoeprint:2018:790, author = {David Derler and Sebastian Ramacher and Daniel Slamanig}, title = {Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation}, howpublished = {Cryptology ePrint Archive, Report 2018/790}, year = {2018}, url = {https://eprint.iacr.org/2018/790}, } @misc{cryptoeprint:2018:791, author = {Guilhem Castagnos and Fabien Laguillaumie and Ida Tucker}, title = {Practical Fully Secure Unrestricted Inner Product Functional Encryption modulo $p$}, howpublished = {Cryptology ePrint Archive, Report 2018/791}, year = {2018}, url = {https://eprint.iacr.org/2018/791}, } @misc{cryptoeprint:2018:792, author = {Joppe W. Bos and Simon J. Friedberger}, title = {Faster Modular Arithmetic For Isogeny Based Crypto on Embedded Devices}, howpublished = {Cryptology ePrint Archive, Report 2018/792}, year = {2018}, url = {https://eprint.iacr.org/2018/792}, } @misc{cryptoeprint:2018:793, author = {Tetsu Iwata and Virginie Lallemand and Gregor Leander and Yu Sasaki}, title = {Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions}, howpublished = {Cryptology ePrint Archive, Report 2018/793}, year = {2018}, url = {https://eprint.iacr.org/2018/793}, } @misc{cryptoeprint:2018:794, author = {Louis Goubin and Francisco Vial-Prado}, title = {Blending FHE-NTRU keys – The Excalibur Property}, howpublished = {Cryptology ePrint Archive, Report 2018/794}, year = {2018}, url = {https://eprint.iacr.org/2018/794}, } @misc{cryptoeprint:2018:795, author = {Fangguo Zhang and Shengli Liu}, title = {Solving ECDLP via List Decoding}, howpublished = {Cryptology ePrint Archive, Report 2018/795}, year = {2018}, url = {https://eprint.iacr.org/2018/795}, } @misc{cryptoeprint:2018:796, author = {Lilya Budaghyan and Marco Calderini and Irene Villa}, title = {On relations between CCZ- and EA-equivalences}, howpublished = {Cryptology ePrint Archive, Report 2018/796}, year = {2018}, url = {https://eprint.iacr.org/2018/796}, } @misc{cryptoeprint:2018:797, author = {Martin Ekerå}, title = {Quantum algorithms for computing general discrete logarithms and orders with tradeoffs}, howpublished = {Cryptology ePrint Archive, Report 2018/797}, year = {2018}, url = {https://eprint.iacr.org/2018/797}, } @misc{cryptoeprint:2018:798, author = {Houda Ferradi and Rémi Géraud and Sylvain Guillet and David Naccache and Mehdi Tibouchi}, title = {Recovering Secrets From Prefix-Dependent Leakage}, howpublished = {Cryptology ePrint Archive, Report 2018/798}, year = {2018}, url = {https://eprint.iacr.org/2018/798}, } @misc{cryptoeprint:2018:799, author = {Fukang Liu}, title = {Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2018/799}, year = {2018}, url = {https://eprint.iacr.org/2018/799}, } @misc{cryptoeprint:2018:800, author = {Puwen Wei and Quan Yuan and Yuliang Zheng}, title = {Security of the Blockchain against Long Delay Attack}, howpublished = {Cryptology ePrint Archive, Report 2018/800}, year = {2018}, url = {https://eprint.iacr.org/2018/800}, } @misc{cryptoeprint:2018:801, author = {Deevashwer Rathee and Pradeep Kumar Mishra and Masaya Yasuda}, title = {Faster PCA and Linear Regression through Hypercubes in HElib}, howpublished = {Cryptology ePrint Archive, Report 2018/801}, year = {2018}, url = {https://eprint.iacr.org/2018/801}, } @misc{cryptoeprint:2018:802, author = {Masahito Hayashi and Takeshi Koshiba}, title = {Secure Modulo Zero-Sum Randomness as Cryptographic Resource}, howpublished = {Cryptology ePrint Archive, Report 2018/802}, year = {2018}, url = {https://eprint.iacr.org/2018/802}, } @misc{cryptoeprint:2018:803, author = {Sinisa Matetic and Karl Wüst and Moritz Schneider and Kari Kostiainen and Ghassan Karame and Srdjan Capkun}, title = {BITE: Bitcoin Lightweight Client Privacy using Trusted Execution}, howpublished = {Cryptology ePrint Archive, Report 2018/803}, year = {2018}, url = {https://eprint.iacr.org/2018/803}, } @misc{cryptoeprint:2018:804, author = {Nilanjan Datta and Avijit Dutta and Mridul Nandi and Goutam Paul}, title = {Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF}, howpublished = {Cryptology ePrint Archive, Report 2018/804}, year = {2018}, url = {https://eprint.iacr.org/2018/804}, } @misc{cryptoeprint:2018:805, author = {Avik Chakraborti and Nilanjan Datta and Mridul Nandi and Kan Yasuda}, title = {Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2018/805}, year = {2018}, url = {https://eprint.iacr.org/2018/805}, } @misc{cryptoeprint:2018:806, author = {Victor Arribas and Svetla Nikova and Vincent Rijmen}, title = {Guards in Action: First-Order SCA Secure Implementations of Ketje without Additional Randomness}, howpublished = {Cryptology ePrint Archive, Report 2018/806}, year = {2018}, url = {https://eprint.iacr.org/2018/806}, } @misc{cryptoeprint:2018:807, author = {Nicolas T. Courtois}, title = {On the Existence of Non-Linear Invariants and Algebraic Polynomial Constructive Approach to Backdoors in Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2018/807}, year = {2018}, url = {https://eprint.iacr.org/2018/807}, } @misc{cryptoeprint:2018:808, author = {Jiyong Yu and Lucas Hsiung and Mohamad El Hajj and Christopher W. Fletcher}, title = {Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing}, howpublished = {Cryptology ePrint Archive, Report 2018/808}, year = {2018}, url = {https://eprint.iacr.org/2018/808}, } @misc{cryptoeprint:2018:809, author = {Christoph Dobraunig and Maria Eichlseder and Florian Mendel and Markus Schofnegger}, title = {Algebraic Cryptanalysis of Frit}, howpublished = {Cryptology ePrint Archive, Report 2018/809}, year = {2018}, url = {https://eprint.iacr.org/2018/809}, } @misc{cryptoeprint:2018:810, author = {Ling Song and Jian Guo}, title = {Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP}, howpublished = {Cryptology ePrint Archive, Report 2018/810}, year = {2018}, url = {https://eprint.iacr.org/2018/810}, } @misc{cryptoeprint:2018:811, author = {Orr Dunkelman and Senyang Huang}, title = {Reconstructing an S-box from its Difference Distribution Table}, howpublished = {Cryptology ePrint Archive, Report 2018/811}, year = {2018}, url = {https://eprint.iacr.org/2018/811}, } @misc{cryptoeprint:2018:812, author = {Lior Rotem and Gil Segev}, title = {Injective Trapdoor Functions via Derandomization: How Strong is Rudich’s Black-Box Barrier?}, howpublished = {Cryptology ePrint Archive, Report 2018/812}, year = {2018}, url = {https://eprint.iacr.org/2018/812}, } @misc{cryptoeprint:2018:813, author = {Danping Shi and Siwei Sun and Patrick Derbez and Yosuke Todo and Bing Sun and Lei Hu}, title = {Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints}, howpublished = {Cryptology ePrint Archive, Report 2018/813}, year = {2018}, url = {https://eprint.iacr.org/2018/813}, } @misc{cryptoeprint:2018:814, author = {Yudi Zhang and Debiao He and Xinyi Huang and Ding Wang and Kim-Kwang Raymond Choo}, title = {White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2018/814}, year = {2018}, url = {https://eprint.iacr.org/2018/814}, } @misc{cryptoeprint:2018:815, author = {Yoshitatsu Matsuda and Tadanori Teruya and Kenji Kasiwabara}, title = {Estimation of the Success Probability of Random Sampling by the Gram-Charlier Approximation}, howpublished = {Cryptology ePrint Archive, Report 2018/815}, year = {2018}, url = {https://eprint.iacr.org/2018/815}, } @misc{cryptoeprint:2018:816, author = {Chun Guo and Lei Wang}, title = {Revisiting Key-alternating Feistel Ciphers for Shorter Keys and Multi-user Security}, howpublished = {Cryptology ePrint Archive, Report 2018/816}, year = {2018}, url = {https://eprint.iacr.org/2018/816}, } @misc{cryptoeprint:2018:817, author = {Haiyang Xue and Xianhui Lu and Bao Li and Bei Liang and Jingnan He}, title = {Understanding and Constructing AKE via Double-key Key Encapsulation Mechanism}, howpublished = {Cryptology ePrint Archive, Report 2018/817}, year = {2018}, url = {https://eprint.iacr.org/2018/817}, } @misc{cryptoeprint:2018:818, author = {Yunhua Wen and Shengli Liu}, title = {Robustly Reusable Fuzzy Extractor from Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2018/818}, year = {2018}, url = {https://eprint.iacr.org/2018/818}, } @misc{cryptoeprint:2018:819, author = {Ritam Bhaumik and Eik List and Mridul Nandi}, title = {ZCZ - Achieving n-bit SPRP Security with a Minimal Number of Tweakable-block-cipher Calls}, howpublished = {Cryptology ePrint Archive, Report 2018/819}, year = {2018}, url = {https://eprint.iacr.org/2018/819}, } @misc{cryptoeprint:2018:820, author = {David Sommer and Esfandiar Mohammadi and Sebastian Meiser}, title = {Privacy Loss Classes: The Central Limit Theorem in Differential Privacy}, howpublished = {Cryptology ePrint Archive, Report 2018/820}, year = {2018}, url = {https://eprint.iacr.org/2018/820}, } @misc{cryptoeprint:2018:821, author = {Prasanna Ravi and Mahabir P. Jhanwar and James Howe and Anupam Chattopadhyay and Shivam Bhasin}, title = {Side-channel Assisted Existential Forgery Attack on Dilithium - A NIST PQC candidate}, howpublished = {Cryptology ePrint Archive, Report 2018/821}, year = {2018}, url = {https://eprint.iacr.org/2018/821}, } @misc{cryptoeprint:2018:822, author = {Jonathan Bootle and Claire Delaplace and Thomas Espitau and Pierre-Alain Fouque and Mehdi Tibouchi}, title = {LWE Without Modular Reduction and Improved Side-Channel Attacks Against BLISS}, howpublished = {Cryptology ePrint Archive, Report 2018/822}, year = {2018}, url = {https://eprint.iacr.org/2018/822}, } @misc{cryptoeprint:2018:823, author = {Moni Naor and Lior Rotem and Gil Segev}, title = {The Security of Lazy Users in Out-of-Band Authentication}, howpublished = {Cryptology ePrint Archive, Report 2018/823}, year = {2018}, url = {https://eprint.iacr.org/2018/823}, } @misc{cryptoeprint:2018:824, author = {Luca De Feo and Steven D. Galbraith}, title = {SeaSign: Compact isogeny signatures from class group actions}, howpublished = {Cryptology ePrint Archive, Report 2018/824}, year = {2018}, url = {https://eprint.iacr.org/2018/824}, } @misc{cryptoeprint:2018:825, author = {Kostas Papagiannopoulos}, title = {Low Randomness Masking and Shuffling: An Evaluation Using Mutual Information}, howpublished = {Cryptology ePrint Archive, Report 2018/825}, year = {2018}, url = {https://eprint.iacr.org/2018/825}, } @misc{cryptoeprint:2018:826, author = {Tibor Jager and Rafael Kurek and Jiaxin Pan}, title = {Simple and More Efficient PRFs with Tight Security from LWE and Matrix-DDH}, howpublished = {Cryptology ePrint Archive, Report 2018/826}, year = {2018}, url = {https://eprint.iacr.org/2018/826}, } @misc{cryptoeprint:2018:827, author = {Sébastien Canard and David Pointcheval and Quentin Santos and Jacques Traoré}, title = {Practical Strategy-Resistant Privacy-Preserving Elections}, howpublished = {Cryptology ePrint Archive, Report 2018/827}, year = {2018}, url = {https://eprint.iacr.org/2018/827}, } @misc{cryptoeprint:2018:828, author = {Eli Ben-Sasson and Alessandro Chiesa and Michael Riabzev and Nicholas Spooner and Madars Virza and Nicholas P. Ward}, title = {Aurora: Transparent Succinct Arguments for R1CS}, howpublished = {Cryptology ePrint Archive, Report 2018/828}, year = {2018}, url = {https://eprint.iacr.org/2018/828}, } @misc{cryptoeprint:2018:829, author = {Wutichai Chongchitmate and Rafail Ostrovsky}, title = {Information-Theoretic Broadcast with Dishonest Majority for Long Messages}, howpublished = {Cryptology ePrint Archive, Report 2018/829}, year = {2018}, url = {https://eprint.iacr.org/2018/829}, } @misc{cryptoeprint:2018:830, author = {Andreas Wiemers}, title = {A remark on a success rate model fpr DPA and CPA}, howpublished = {Cryptology ePrint Archive, Report 2018/830}, year = {2018}, url = {https://eprint.iacr.org/2018/830}, } @misc{cryptoeprint:2018:831, author = {Keita Xagawa}, title = {Practical Attack on RaCoSS-R}, howpublished = {Cryptology ePrint Archive, Report 2018/831}, year = {2018}, url = {https://eprint.iacr.org/2018/831}, } @misc{cryptoeprint:2018:832, author = {Ashrujit Ghoshal and Rajat Sadhukhan and Sikhar Patranabis and Nilanjan Datta and Stjepan Picek and Debdeep Mukhopadhyay }, title = {Lightweight and Side-channel Secure 4x4 S-Boxes from Cellular Automata Rules}, howpublished = {Cryptology ePrint Archive, Report 2018/832}, year = {2018}, url = {https://eprint.iacr.org/2018/832}, } @misc{cryptoeprint:2018:833, author = {Jie Chen and Junqing Gong and Hoeteck Wee}, title = {Improved Inner-product Encryption with Adaptive Security and Full Attribute-hiding}, howpublished = {Cryptology ePrint Archive, Report 2018/833}, year = {2018}, url = {https://eprint.iacr.org/2018/833}, } @misc{cryptoeprint:2018:834, author = {Dennis Hofheinz and Dingding Jia and Jiaxin Pan}, title = {Identity-based Encryption Tightly Secure under Chosen-ciphertext Attacks}, howpublished = {Cryptology ePrint Archive, Report 2018/834}, year = {2018}, url = {https://eprint.iacr.org/2018/834}, } @misc{cryptoeprint:2018:835, author = {Kai Bemmann and Johannes Blömer and Jan Bobolz and Henrik Bröcher and Denis Diemert and Fabian Eidens and Lukas Eilers and Jan Haltermann and Jakob Juhnke and Burhan Otour and Laurens Porzenheim and Simon Pukrop and Erik Schilling and Michael Schlichtig and Marcel Stienemeier}, title = {Fully-Featured Anonymous Credentials with Reputation System}, howpublished = {Cryptology ePrint Archive, Report 2018/835}, year = {2018}, url = {https://eprint.iacr.org/2018/835}, } @misc{cryptoeprint:2018:836, author = {Aljosha Judmayer and Nicholas Stifter and Philipp Schindler and Edgar Weippl}, title = {Pitchforks in Cryptocurrencies: Enforcing rule changes through offensive forking- and consensus techniques}, howpublished = {Cryptology ePrint Archive, Report 2018/836}, year = {2018}, url = {https://eprint.iacr.org/2018/836}, } @misc{cryptoeprint:2018:837, author = {Yu Ning and Fuyou Miao and Wenchao Huang and Keju Meng and Yan Xiong and Xingfu Wang}, title = {Constructing Ideal Secret Sharing Schemes based on Chinese Remainder Theorem}, howpublished = {Cryptology ePrint Archive, Report 2018/837}, year = {2018}, url = {https://eprint.iacr.org/2018/837}, } @misc{cryptoeprint:2018:838, author = {Keita Xagawa and Takashi Yamakawa}, title = {(Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2018/838}, year = {2018}, url = {https://eprint.iacr.org/2018/838}, } @misc{cryptoeprint:2018:839, author = {Huseyin Hisil and Joost Renes}, title = {On Kummer Lines With Full Rational 2-torsion and Their Usage in Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2018/839}, year = {2018}, url = {https://eprint.iacr.org/2018/839}, } @misc{cryptoeprint:2018:840, author = {Nico Döttling and Ryo Nishimaki}, title = {Universal Proxy Re-Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/840}, year = {2018}, url = {https://eprint.iacr.org/2018/840}, } @misc{cryptoeprint:2018:841, author = {Akinori Hosoyamada and Kan Yasuda}, title = {Building Quantum-One-Way Functions from Block Ciphers: Davies-Meyer and Merkle-Damgård Constructions}, howpublished = {Cryptology ePrint Archive, Report 2018/841}, year = {2018}, url = {https://eprint.iacr.org/2018/841}, } @misc{cryptoeprint:2018:842, author = {Yusuke Sakai and Shuichi Katsumata and Nuttapong Attrapadung and Goichiro Hanaoka}, title = {Attribute-Based Signatures for Unbounded Languages from Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2018/842}, year = {2018}, url = {https://eprint.iacr.org/2018/842}, } @misc{cryptoeprint:2018:843, author = {Carmit Hazay and Emmanuela Orsini and Peter Scholl and Eduardo Soria-Vazquez}, title = {Concretely Efficient Large-Scale MPC with Active Security (or, TinyKeys for TinyOT)}, howpublished = {Cryptology ePrint Archive, Report 2018/843}, year = {2018}, url = {https://eprint.iacr.org/2018/843}, } @misc{cryptoeprint:2018:844, author = {Jean Paul Degabriele and Marc Fischlin}, title = {Simulatable Channels: Extended Security that is Universally Composable and Easier to Prove}, howpublished = {Cryptology ePrint Archive, Report 2018/844}, year = {2018}, url = {https://eprint.iacr.org/2018/844}, } @misc{cryptoeprint:2018:845, author = {Fuyuki Kitagawa and Keisuke Tanaka}, title = {A Framework for Achieving KDM-CCA Secure Public-Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/845}, year = {2018}, url = {https://eprint.iacr.org/2018/845}, } @misc{cryptoeprint:2018:846, author = {Jia Xu and Jianying Zhou}, title = {Strong Leakage Resilient Encryption by Hiding Partial Ciphertext}, howpublished = {Cryptology ePrint Archive, Report 2018/846}, year = {2018}, url = {https://eprint.iacr.org/2018/846}, } @misc{cryptoeprint:2018:847, author = {Venkata Koppula and Brent Waters}, title = {Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/847}, year = {2018}, url = {https://eprint.iacr.org/2018/847}, } @misc{cryptoeprint:2018:848, author = {Pyrros Chaidos and Olga Fourtounelli and Aggelos Kiayias and Thomas Zacharias}, title = {A Universally Composable Framework for the Privacy of Email Ecosystems}, howpublished = {Cryptology ePrint Archive, Report 2018/848}, year = {2018}, url = {https://eprint.iacr.org/2018/848}, } @misc{cryptoeprint:2018:849, author = {Masayuki Abe and Charanjit S. Jutla and Miyako Ohkubo and Arnab Roy}, title = {Improved (Almost) Tightly-Secure Simulation-Sound QA-NIZK with Applications}, howpublished = {Cryptology ePrint Archive, Report 2018/849}, year = {2018}, url = {https://eprint.iacr.org/2018/849}, } @misc{cryptoeprint:2018:850, author = {Craig Costello}, title = {Computing supersingular isogenies on Kummer surfaces}, howpublished = {Cryptology ePrint Archive, Report 2018/850}, year = {2018}, url = {https://eprint.iacr.org/2018/850}, } @misc{cryptoeprint:2018:851, author = {T-H. Hubert Chan and Jonathan Katz and Kartik Nayak and Antigoni Polychroniadou and Elaine Shi}, title = {More is Less: Perfectly Secure Oblivious Algorithms in the Multi-Server Setting}, howpublished = {Cryptology ePrint Archive, Report 2018/851}, year = {2018}, url = {https://eprint.iacr.org/2018/851}, } @misc{cryptoeprint:2018:852, author = {Christoph Dobraunig and Stefan Mangard and Florian Mendel and Robert Primas}, title = {Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje}, howpublished = {Cryptology ePrint Archive, Report 2018/852}, year = {2018}, url = {https://eprint.iacr.org/2018/852}, } @misc{cryptoeprint:2018:853, author = {Christos Patsonakis and Katerina Samari and Mema Roussopoulos and Aggelos Kiayias }, title = {Towards a Smart Contract-based, Decentralized, Public-Key Infrastructure}, howpublished = {Cryptology ePrint Archive, Report 2018/853}, year = {2018}, url = {https://eprint.iacr.org/2018/853}, } @misc{cryptoeprint:2018:854, author = {Saeed Mahloujifar and Mahammad Mahmoody and Ameer Mohammed}, title = {Multi-party Poisoning through Generalized $p$-Tampering}, howpublished = {Cryptology ePrint Archive, Report 2018/854}, year = {2018}, url = {https://eprint.iacr.org/2018/854}, } @misc{cryptoeprint:2018:855, author = {Tibor Jager and Saqib A. Kakvi and Alexander May}, title = {On the Security of the PKCS#1 v1.5 Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2018/855}, year = {2018}, url = {https://eprint.iacr.org/2018/855}, } @misc{cryptoeprint:2018:856, author = {Shi Bai and Damien Stehlé and Weiqiang Wen}, title = {Measuring, simulating and exploiting the head concavity phenomenon in BKZ}, howpublished = {Cryptology ePrint Archive, Report 2018/856}, year = {2018}, url = {https://eprint.iacr.org/2018/856}, } @misc{cryptoeprint:2018:857, author = {Xingye Lu and Man Ho Au and Zhenfei Zhang}, title = {Raptor: A Practical Lattice-Based (Linkable) Ring Signature}, howpublished = {Cryptology ePrint Archive, Report 2018/857}, year = {2018}, url = {https://eprint.iacr.org/2018/857}, } @misc{cryptoeprint:2018:858, author = {Stephan Krenn and Kai Samelin and Dieter Sommer}, title = {Stronger Security for Sanitizable Signatures}, howpublished = {Cryptology ePrint Archive, Report 2018/858}, year = {2018}, url = {https://eprint.iacr.org/2018/858}, } @misc{cryptoeprint:2018:859, author = {Christian Rechberger and Hadi Soleimany and Tyge Tiessen}, title = {Cryptanalysis of Low-Data Instances of Full LowMCv2}, howpublished = {Cryptology ePrint Archive, Report 2018/859}, year = {2018}, url = {https://eprint.iacr.org/2018/859}, } @misc{cryptoeprint:2018:860, author = {Archita Agarwal and Maurice Herlihy and Seny Kamara and Tarik Moataz}, title = {Encrypted Databases for Differential Privacy}, howpublished = {Cryptology ePrint Archive, Report 2018/860}, year = {2018}, url = {https://eprint.iacr.org/2018/860}, } @misc{cryptoeprint:2018:861, author = {Justin Holmgren and Ron D. Rothblum}, title = {Delegating Computations with (almost) Minimal Time and Space Overhead}, howpublished = {Cryptology ePrint Archive, Report 2018/861}, year = {2018}, url = {https://eprint.iacr.org/2018/861}, } @misc{cryptoeprint:2018:862, author = {Nils Wisiol and Marian Margraf}, title = {Attacking RO-PUFs with Enhanced Challenge-Response Pairs}, howpublished = {Cryptology ePrint Archive, Report 2018/862}, year = {2018}, url = {https://eprint.iacr.org/2018/862}, } @misc{cryptoeprint:2018:863, author = {Avi Asayag and Gad Cohen and Ido Grayevsky and Maya Leshkowitz and Ori Rottenstreich and Ronen Tamari and David Yakira}, title = {Helix: A Scalable and Fair Consensus Algorithm Resistant to Ordering Manipulation}, howpublished = {Cryptology ePrint Archive, Report 2018/863}, year = {2018}, url = {https://eprint.iacr.org/2018/863}, } @misc{cryptoeprint:2018:864, author = {Antonio Faonio and Dario Fiore}, title = {Optimistic Mixing, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2018/864}, year = {2018}, url = {https://eprint.iacr.org/2018/864}, } @misc{cryptoeprint:2018:865, author = {Lauren De Meyer and Oscar Reparaz and Begül Bilgin}, title = {Multiplicative Masking for AES in Hardware}, howpublished = {Cryptology ePrint Archive, Report 2018/865}, year = {2018}, url = {https://eprint.iacr.org/2018/865}, } @misc{cryptoeprint:2018:866, author = {Saikrishna Badrinarayanan and Rex Fernando and Venkata Koppula and Amit Sahai and Brent Waters}, title = {Output Compression, MPC, and iO for Turing Machines}, howpublished = {Cryptology ePrint Archive, Report 2018/866}, year = {2018}, url = {https://eprint.iacr.org/2018/866}, } @misc{cryptoeprint:2018:867, author = {Liron David and Avishai Wool}, title = {Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling}, howpublished = {Cryptology ePrint Archive, Report 2018/867}, year = {2018}, url = {https://eprint.iacr.org/2018/867}, } @misc{cryptoeprint:2018:868, author = {Dea Saka Kurnia Putra and Mohamad Ali Sadikin and Susila Windarta}, title = {S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard }, howpublished = {Cryptology ePrint Archive, Report 2018/868}, year = {2018}, url = {https://eprint.iacr.org/2018/868}, } @misc{cryptoeprint:2018:869, author = {Andrey Bogdanov and Matthieu Rivain and Philip S. Vejre and Junwei Wang}, title = {Higher-Order DCA against Standard Side-Channel Countermeasures}, howpublished = {Cryptology ePrint Archive, Report 2018/869}, year = {2018}, url = {https://eprint.iacr.org/2018/869}, } @misc{cryptoeprint:2018:870, author = {George Teseleanu}, title = {Unifying Kleptographic Attacks}, howpublished = {Cryptology ePrint Archive, Report 2018/870}, year = {2018}, url = {https://eprint.iacr.org/2018/870}, } @misc{cryptoeprint:2018:871, author = {Si Gao and Elisabeth Oswald and Hua Chen and Wei Xi}, title = {Non-profiled Mask Recovery: the impact of Independent Component Analysis}, howpublished = {Cryptology ePrint Archive, Report 2018/871}, year = {2018}, url = {https://eprint.iacr.org/2018/871}, } @misc{cryptoeprint:2018:872, author = {Sanjam Garg and Romain Gay and Mohammad Hajiabadi}, title = {New Techniques for Efficient Trapdoor Functions and Applications}, howpublished = {Cryptology ePrint Archive, Report 2018/872}, year = {2018}, url = {https://eprint.iacr.org/2018/872}, } @misc{cryptoeprint:2018:873, author = {Rouzbeh Behnia and Muslum Ozgur Ozmen and Attila A. Yavuz and Mike Rosulek}, title = {TACHYON: Fast Signatures from Compact Knapsack}, howpublished = {Cryptology ePrint Archive, Report 2018/873}, year = {2018}, url = {https://eprint.iacr.org/2018/873}, } @misc{cryptoeprint:2018:874, author = {Johannes Bl{\"o}mer and Fabian Eidens and Jakob Juhnke}, title = {Enhanced Security of Attribute-Based Signatures}, howpublished = {Cryptology ePrint Archive, Report 2018/874}, year = {2018}, url = {https://eprint.iacr.org/2018/874}, } @misc{cryptoeprint:2018:875, author = {Varun Narayanan and Vinod M. Prabahakaran}, title = {Oblivious Transfer in Incomplete Networks}, howpublished = {Cryptology ePrint Archive, Report 2018/875}, year = {2018}, url = {https://eprint.iacr.org/2018/875}, } @misc{cryptoeprint:2018:876, author = {Haibat Khan and Benjamin Dowling and Keith M. Martin}, title = {Identity Confidentiality in 5G Mobile Telephony Systems}, howpublished = {Cryptology ePrint Archive, Report 2018/876}, year = {2018}, url = {https://eprint.iacr.org/2018/876}, } @misc{cryptoeprint:2018:877, author = {Behzad Abdolmaleki and Helger Lipmaa and Janno Siim and Micha{\l} Zaj\k{a}c}, title = {On QA-NIZK in the BPK Model}, howpublished = {Cryptology ePrint Archive, Report 2018/877}, year = {2018}, url = {https://eprint.iacr.org/2018/877}, } @misc{cryptoeprint:2018:878, author = {Marc Joye and Yan Michalevsky}, title = {RSA Signatures Under Hardware Restrictions}, howpublished = {Cryptology ePrint Archive, Report 2018/878}, year = {2018}, url = {https://eprint.iacr.org/2018/878}, } @misc{cryptoeprint:2018:879, author = {Ke Gu and Bo Yin}, title = {Efficient Group Signature Scheme without Pairings}, howpublished = {Cryptology ePrint Archive, Report 2018/879}, year = {2018}, url = {https://eprint.iacr.org/2018/879}, } @misc{cryptoeprint:2018:880, author = {Christophe Pfeifer and Patrick Haddad}, title = {Spread: a new layer for profiled deep-learning side-channel attacks}, howpublished = {Cryptology ePrint Archive, Report 2018/880}, year = {2018}, url = {https://eprint.iacr.org/2018/880}, } @misc{cryptoeprint:2018:881, author = {Falk Schellenberg and Dennis R.E. Gnad and Amir Moradi and Mehdi B. Tahoori}, title = {Remote Inter-Chip Power Analysis Side-Channel Attacks at Board-Level}, howpublished = {Cryptology ePrint Archive, Report 2018/881}, year = {2018}, url = {https://eprint.iacr.org/2018/881}, } @misc{cryptoeprint:2018:882, author = {Benjamin Smith}, title = {Pre- and post-quantum Diffie--Hellman from groups, actions, and isogenies}, howpublished = {Cryptology ePrint Archive, Report 2018/882}, year = {2018}, url = {https://eprint.iacr.org/2018/882}, } @misc{cryptoeprint:2018:883, author = {Suvradip Chakraborty and C. Pandu Rangan}, title = {Public Key Encryption Resilient to Post-Challenge Leakage and Tampering Attacks}, howpublished = {Cryptology ePrint Archive, Report 2018/883}, year = {2018}, url = {https://eprint.iacr.org/2018/883}, } @misc{cryptoeprint:2018:884, author = {Alan Szepieniec and Reza Reyhanitabar and Bart Preneel}, title = {Key Encapsulation from Noisy Key Agreement in the Quantum Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2018/884}, year = {2018}, url = {https://eprint.iacr.org/2018/884}, } @misc{cryptoeprint:2018:885, author = {Shashank Agrawal and Peihan Miao and Payman Mohassel and Pratyay Mukherjee}, title = {PASTA: PASsword-based Threshold Authentication}, howpublished = {Cryptology ePrint Archive, Report 2018/885}, year = {2018}, url = {https://eprint.iacr.org/2018/885}, } @misc{cryptoeprint:2018:886, author = {Oleg Taraskin and Vladimir Soukharev and David Jao and Jason LeGrow}, title = {An Isogeny-Based Password-Authenticated Key Establishment Protocol}, howpublished = {Cryptology ePrint Archive, Report 2018/886}, year = {2018}, url = {https://eprint.iacr.org/2018/886}, } @misc{cryptoeprint:2018:887, author = {Serge Fehr}, title = {Classical Proofs for the Quantum Collapsing Property of Classical Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2018/887}, year = {2018}, url = {https://eprint.iacr.org/2018/887}, } @misc{cryptoeprint:2018:888, author = {Thom Wiggers}, title = {Energy-Efficient ARM64 Cluster with Cryptanalytic Applications: 80 Cores That Do Not Cost You an ARM and a Leg}, howpublished = {Cryptology ePrint Archive, Report 2018/888}, year = {2018}, url = {https://eprint.iacr.org/2018/888}, } @misc{cryptoeprint:2018:889, author = {F. Betül Durak and Serge Vaudenay}, title = {Bidirectional Asynchronous Ratcheted Key Agreement without Key-Update Primitives}, howpublished = {Cryptology ePrint Archive, Report 2018/889}, year = {2018}, url = {https://eprint.iacr.org/2018/889}, } @misc{cryptoeprint:2018:890, author = {Alex Davidson and Ryo Nishimaki}, title = {A Bit-fixing PRF with O(1) Collusion-Resistance from LWE}, howpublished = {Cryptology ePrint Archive, Report 2018/890}, year = {2018}, url = {https://eprint.iacr.org/2018/890}, } @misc{cryptoeprint:2018:891, author = {Seyed Farhad Aghili and Hamid Mala}, title = {Breaking a Lightweight M2M Authentication Protocol for Communications in IIoT Environment}, howpublished = {Cryptology ePrint Archive, Report 2018/891}, year = {2018}, url = {https://eprint.iacr.org/2018/891}, } @misc{cryptoeprint:2018:892, author = {Gilad Asharov and Ilan Komargodski and Wei-Kai Lin and Kartik Nayak and Elaine Shi}, title = {OptORAMa: Optimal Oblivious RAM}, howpublished = {Cryptology ePrint Archive, Report 2018/892}, year = {2018}, url = {https://eprint.iacr.org/2018/892}, } @misc{cryptoeprint:2018:893, author = {Manfred Lochter}, title = {Blockchain as cryptanalytic tool}, howpublished = {Cryptology ePrint Archive, Report 2018/893}, year = {2018}, url = {https://eprint.iacr.org/2018/893}, } @misc{cryptoeprint:2018:894, author = {Benny Applebaum and Zvika Brakerski and Rotem Tsabary}, title = {Perfect Secure Computation in Two Rounds}, howpublished = {Cryptology ePrint Archive, Report 2018/894}, year = {2018}, url = {https://eprint.iacr.org/2018/894}, } @misc{cryptoeprint:2018:895, author = {Nir Bitansky and Omer Paneth}, title = {Weak Zero-Knowledge Beyond the Black-Box Barrier}, howpublished = {Cryptology ePrint Archive, Report 2018/895}, year = {2018}, url = {https://eprint.iacr.org/2018/895}, } @misc{cryptoeprint:2018:896, author = {Apoorvaa Deshpande and Yael Kalai}, title = {Proofs of Ignorance and Applications to 2-Message Witness Hiding}, howpublished = {Cryptology ePrint Archive, Report 2018/896}, year = {2018}, url = {https://eprint.iacr.org/2018/896}, } @misc{cryptoeprint:2018:897, author = {Yilei Chen and Vinod Vaikuntanathan and Brent Waters and Hoeteck Wee and Daniel Wichs }, title = {Traitor-Tracing from LWE Made Simple and Attribute-Based}, howpublished = {Cryptology ePrint Archive, Report 2018/897}, year = {2018}, url = {https://eprint.iacr.org/2018/897}, } @misc{cryptoeprint:2018:898, author = {Ashutosh Dhar Dwivedi and Gautam Srivastava}, title = {Differential Cryptanalysis in ARX Ciphers, Applications to LEA}, howpublished = {Cryptology ePrint Archive, Report 2018/898}, year = {2018}, url = {https://eprint.iacr.org/2018/898}, } @misc{cryptoeprint:2018:899, author = {Ashutosh Dhar Dwivedi and Pawel Morawiecki}, title = {Differential cryptanalysis in ARX ciphers, Application to SPECK}, howpublished = {Cryptology ePrint Archive, Report 2018/899}, year = {2018}, url = {https://eprint.iacr.org/2018/899}, } @misc{cryptoeprint:2018:900, author = {Mohammad Hajiabadi}, title = {Enhancements Are Blackbox Non-Trivial: Impossibility of Enhanced Trapdoor Permutations from Standard Trapdoor Permutations}, howpublished = {Cryptology ePrint Archive, Report 2018/900}, year = {2018}, url = {https://eprint.iacr.org/2018/900}, } @misc{cryptoeprint:2018:901, author = {Iftach Haitner and Nikolaos Makriyannis and Eran Omri}, title = {On the Complexity of Fair Coin Flipping}, howpublished = {Cryptology ePrint Archive, Report 2018/901}, year = {2018}, url = {https://eprint.iacr.org/2018/901}, } @misc{cryptoeprint:2018:902, author = {Aritra Dhar and Ivan Puddu and Kari Kostiainen and Srdjan Capkun}, title = {ProximiTEE: Hardened SGX Attestation and Trusted Path through Proximity Verification}, howpublished = {Cryptology ePrint Archive, Report 2018/902}, year = {2018}, url = {https://eprint.iacr.org/2018/902}, } @misc{cryptoeprint:2018:903, author = {Nina Bindel and Jacqueline Brendel and Marc Fischlin and Brian Goncalves and Douglas Stebila}, title = {Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2018/903}, year = {2018}, url = {https://eprint.iacr.org/2018/903}, } @misc{cryptoeprint:2018:904, author = {Andris Ambainis and Mike Hamburg and Dominique Unruh}, title = {Quantum security proofs using semi-classical oracles}, howpublished = {Cryptology ePrint Archive, Report 2018/904}, year = {2018}, url = {https://eprint.iacr.org/2018/904}, } @misc{cryptoeprint:2018:905, author = {Andrew Morgan and Rafael Pass}, title = {On the Security Loss of Unique Signatures}, howpublished = {Cryptology ePrint Archive, Report 2018/905}, year = {2018}, url = {https://eprint.iacr.org/2018/905}, } @misc{cryptoeprint:2018:906, author = {Daniel Wichs and Willy Quach and Giorgos Zirdelis}, title = {Watermarking PRFs under Standard Assumptions: Public Marking and Security with Extraction Queries}, howpublished = {Cryptology ePrint Archive, Report 2018/906}, year = {2018}, url = {https://eprint.iacr.org/2018/906}, } @misc{cryptoeprint:2018:907, author = {Srinath Setty and Sebastian Angel and Trinabh Gupta and Jonathan Lee}, title = {Proving the correct execution of concurrent services in zero-knowledge}, howpublished = {Cryptology ePrint Archive, Report 2018/907}, year = {2018}, url = {https://eprint.iacr.org/2018/907}, } @misc{cryptoeprint:2018:908, author = {Shweta Agrawal and Monosij Maitra}, title = {FE and iO for Turing Machines from Minimal Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2018/908}, year = {2018}, url = {https://eprint.iacr.org/2018/908}, } @misc{cryptoeprint:2018:909, author = {Sanjam Garg and Yuval Ishai and Akshayaram Srinivasan}, title = {Two-Round MPC: Information-Theoretic and Black-Box}, howpublished = {Cryptology ePrint Archive, Report 2018/909}, year = {2018}, url = {https://eprint.iacr.org/2018/909}, } @misc{cryptoeprint:2018:910, author = {Frédéric Dupuis and Serge Fehr and Philippe Lamontagne and Louis Salvail}, title = {Secure Certification of Mixed Quantum States with Application to Two-Party Randomness Generation}, howpublished = {Cryptology ePrint Archive, Report 2018/910}, year = {2018}, url = {https://eprint.iacr.org/2018/910}, } @misc{cryptoeprint:2018:911, author = {Andrew Morgan and Rafael Pass}, title = {Achieving Fair Treatment in Algorithmic Classification}, howpublished = {Cryptology ePrint Archive, Report 2018/911}, year = {2018}, url = {https://eprint.iacr.org/2018/911}, } @misc{cryptoeprint:2018:912, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, title = {Round-Optimal Fully Black-Box Zero-Knowledge Arguments from One-Way Permutations}, howpublished = {Cryptology ePrint Archive, Report 2018/912}, year = {2018}, url = {https://eprint.iacr.org/2018/912}, } @misc{cryptoeprint:2018:913, author = {Shai Halevi and Yuval Ishai and Eyal Kushilevitz and Tal Rabin}, title = {Best Possible Information-Theoretic MPC}, howpublished = {Cryptology ePrint Archive, Report 2018/913}, year = {2018}, url = {https://eprint.iacr.org/2018/913}, } @misc{cryptoeprint:2018:914, author = {Shuichi Katsumata and Shota Yamada}, title = {Note on Constructing Constrained PRFs from OWFs with Constant Collusion Resistance}, howpublished = {Cryptology ePrint Archive, Report 2018/914}, year = {2018}, url = {https://eprint.iacr.org/2018/914}, } @misc{cryptoeprint:2018:915, author = {Nasrollah Pakniat}, title = {On the Security of a Certificateless Strong Designated Verifier Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2018/915}, year = {2018}, url = {https://eprint.iacr.org/2018/915}, } @misc{cryptoeprint:2018:916, author = {Elena Andreeva and Reza Reyhanitabar and Kerem Varici and Damian Vizár}, title = {Forking a Blockcipher for Authenticated Encryption of Very Short Messages}, howpublished = {Cryptology ePrint Archive, Report 2018/916}, year = {2018}, url = {https://eprint.iacr.org/2018/916}, } @misc{cryptoeprint:2018:917, author = {Alex Sangers and Maran van Heesch and Thomas Attema and Thijs Veugen and Mark Wiggerman and Jan Veldsink and Oscar Bloemen and Dani\"el Worm}, title = {Secure multiparty PageRank algorithm for collaborative fraud detection}, howpublished = {Cryptology ePrint Archive, Report 2018/917}, year = {2018}, url = {https://eprint.iacr.org/2018/917}, } @misc{cryptoeprint:2018:918, author = {Alejandro Ranchal Pedrosa and Maria Potop-Butucaru and Sara Tucci-Piergiovanni}, title = {Lightning Factories}, howpublished = {Cryptology ePrint Archive, Report 2018/918}, year = {2018}, url = {https://eprint.iacr.org/2018/918}, } @misc{cryptoeprint:2018:919, author = {Sanjam Garg and Mohammad Hajiabadi and Mohammad Mahmoody and Ahmadreza Rahimi}, title = {Registration-Based Encryption: Removing Private-Key Generator from IBE}, howpublished = {Cryptology ePrint Archive, Report 2018/919}, year = {2018}, url = {https://eprint.iacr.org/2018/919}, } @misc{cryptoeprint:2018:920, author = {Loïs Huguenin-Dumittan and Iraklis Leontiadis}, title = {A Message Franking Channel}, howpublished = {Cryptology ePrint Archive, Report 2018/920}, year = {2018}, url = {https://eprint.iacr.org/2018/920}, } @misc{cryptoeprint:2018:921, author = {Dakshita Khurana and Rafail Ostrovsky and Akshayaram Srinivasan}, title = {Round Optimal Black-Box “Commit-and-Prove”}, howpublished = {Cryptology ePrint Archive, Report 2018/921}, year = {2018}, url = {https://eprint.iacr.org/2018/921}, } @misc{cryptoeprint:2018:922, author = {Dušan Božilov and Miroslav Knežević and Ventzislav Nikov}, title = {Optimized Threshold Implementations: Securing Cryptographic Accelerators for Low-Energy and Low-Latency Applications}, howpublished = {Cryptology ePrint Archive, Report 2018/922}, year = {2018}, url = {https://eprint.iacr.org/2018/922}, } @misc{cryptoeprint:2018:923, author = {Elizabeth C. Crites and Anna Lysyanskaya}, title = {Delegatable Anonymous Credentials from Mercurial Signatures}, howpublished = {Cryptology ePrint Archive, Report 2018/923}, year = {2018}, url = {https://eprint.iacr.org/2018/923}, } @misc{cryptoeprint:2018:924, author = {Andreas Hülsing and Christoph Busold and Johannes Buchmann}, title = {Forward Secure Signatures on Smart Cards}, howpublished = {Cryptology ePrint Archive, Report 2018/924}, year = {2018}, url = {https://eprint.iacr.org/2018/924}, } @misc{cryptoeprint:2018:925, author = {Songze Li and Mingchao Yu and A. Salman Avestimehr and Sreeram Kannan and Pramod Viswanath}, title = {PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security Simultaneously}, howpublished = {Cryptology ePrint Archive, Report 2018/925}, year = {2018}, url = {https://eprint.iacr.org/2018/925}, } @misc{cryptoeprint:2018:926, author = {Salim Ali Altug and Yilei Chen}, title = {A Candidate Group with Infeasible Inversion}, howpublished = {Cryptology ePrint Archive, Report 2018/926}, year = {2018}, url = {https://eprint.iacr.org/2018/926}, } @misc{cryptoeprint:2018:927, author = {Benoît Libert and Damien Stehlé and Radu Titiu}, title = {Adaptively Secure Distributed PRFs from LWE}, howpublished = {Cryptology ePrint Archive, Report 2018/927}, year = {2018}, url = {https://eprint.iacr.org/2018/927}, } @misc{cryptoeprint:2018:928, author = {Kathrin Hövelmanns and Eike Kiltz and Sven Schäge and Dominique Unruh}, title = {Generic Authenticated Key Exchange in the Quantum Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2018/928}, year = {2018}, url = {https://eprint.iacr.org/2018/928}, } @misc{cryptoeprint:2018:929, author = {Peter M. R. Rasmussen and Amit Sahai}, title = {Expander Graphs are Non-Malleable Codes}, howpublished = {Cryptology ePrint Archive, Report 2018/929}, year = {2018}, url = {https://eprint.iacr.org/2018/929}, } @misc{cryptoeprint:2018:930, author = {Kim Gyu-Chol and Li Su-Chol}, title = {A study on the fast ElGamal encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/930}, year = {2018}, url = {https://eprint.iacr.org/2018/930}, } @misc{cryptoeprint:2018:931, author = {Jung Hee Cheon and Kyoohyung Han and Andrey Kim and Miran Kim and Yongsoo Song}, title = {A Full RNS Variant of Approximate Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2018/931}, year = {2018}, url = {https://eprint.iacr.org/2018/931}, } @misc{cryptoeprint:2018:932, author = {Philipp Koppermann and Eduard Pop and Johann Heyszl and Georg Sigl}, title = {18 Seconds to Key Exchange: Limitations of Supersingular Isogeny Diffie-Hellman on Embedded Devices}, howpublished = {Cryptology ePrint Archive, Report 2018/932}, year = {2018}, url = {https://eprint.iacr.org/2018/932}, } @misc{cryptoeprint:2018:933, author = {Ferucio Laurentiu Tiplea and Constantin Catalin Dragan}, title = {Asymptotically Ideal CRT-based Secret Sharing Schemes for Multilevel and Compartmented Access Structures}, howpublished = {Cryptology ePrint Archive, Report 2018/933}, year = {2018}, url = {https://eprint.iacr.org/2018/933}, } @misc{cryptoeprint:2018:934, author = {Yuichi Komano and Hideo Shimizu and Hideyuki Miyake}, title = {Integrative Acceleration of First-Order Boolean Masking for Embedded IoT Devices}, howpublished = {Cryptology ePrint Archive, Report 2018/934}, year = {2018}, url = {https://eprint.iacr.org/2018/934}, } @misc{cryptoeprint:2018:935, author = {Subhabrata Samajder and Palash Sarkar}, title = {Distinguishing Error of Nonlinear Invariant Attacks}, howpublished = {Cryptology ePrint Archive, Report 2018/935}, year = {2018}, url = {https://eprint.iacr.org/2018/935}, } @misc{cryptoeprint:2018:936, author = {James Bartusek and Tancrède Lepoint and Fermi Ma and Mark Zhandry}, title = {New Techniques for Obfuscating Conjunctions}, howpublished = {Cryptology ePrint Archive, Report 2018/936}, year = {2018}, url = {https://eprint.iacr.org/2018/936}, } @misc{cryptoeprint:2018:937, author = {Mathias Wagner and Stefan Heyse}, title = {Improved Brute-Force Search Strategies for Single-Trace and Few-Traces Template Attacks on the DES Round Keys}, howpublished = {Cryptology ePrint Archive, Report 2018/937}, year = {2018}, url = {https://eprint.iacr.org/2018/937}, } @misc{cryptoeprint:2018:938, author = {Iraklis Leontiadis and Serge Vaudenay}, title = {Private Message Franking with After Opening Privacy}, howpublished = {Cryptology ePrint Archive, Report 2018/938}, year = {2018}, url = {https://eprint.iacr.org/2018/938}, } @misc{cryptoeprint:2018:939, author = {Marcella Hastings and Nadia Heninger and Eric Wustrow}, title = {The Proof is in the Pudding: Proofs of Work for Solving Discrete Logarithms}, howpublished = {Cryptology ePrint Archive, Report 2018/939}, year = {2018}, url = {https://eprint.iacr.org/2018/939}, } @misc{cryptoeprint:2018:940, author = {Melissa Chase and Yevgeniy Dodis and Yuval Ishai and Daniel Kraschewski and Tianren Liu and Rafail Ostrovsky and Vinod Vaikuntanathan}, title = {Reusable Non-Interactive Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2018/940}, year = {2018}, url = {https://eprint.iacr.org/2018/940}, } @misc{cryptoeprint:2018:941, author = {Andreas Lochbihler and S. Reza Sefidgar}, title = {A tutorial introduction to CryptHOL}, howpublished = {Cryptology ePrint Archive, Report 2018/941}, year = {2018}, url = {https://eprint.iacr.org/2018/941}, } @misc{cryptoeprint:2018:942, author = {Carsten Baum and Bernardo David and Rafael Dowsley}, title = {Insured MPC: Efficient Secure Multiparty Computation with Punishable Abort}, howpublished = {Cryptology ePrint Archive, Report 2018/942}, year = {2018}, url = {https://eprint.iacr.org/2018/942}, } @misc{cryptoeprint:2018:943, author = {Shuoyao Zhao and Yu Yu and Jiang Zhang and Hanlin Liu}, title = {Valiant's Universal Circuits Revisited: an Overall Improvement and a Lower Bound}, howpublished = {Cryptology ePrint Archive, Report 2018/943}, year = {2018}, url = {https://eprint.iacr.org/2018/943}, } @misc{cryptoeprint:2018:944, author = {Jeremiah Blocki and Ben Harsha and Siteng Kang and Seunghoon Lee and Lu Xing and Samson Zhou}, title = {Data-Independent Memory Hard Functions: New Attacks and Stronger Constructions}, howpublished = {Cryptology ePrint Archive, Report 2018/944}, year = {2018}, url = {https://eprint.iacr.org/2018/944}, } @misc{cryptoeprint:2018:945, author = {Balthazar Bauer and Jevgēnijs Vihrovs and Hoeteck Wee}, title = {On the Inner Product Predicate and a Generalization of Matching Vector Families}, howpublished = {Cryptology ePrint Archive, Report 2018/945}, year = {2018}, url = {https://eprint.iacr.org/2018/945}, } @misc{cryptoeprint:2018:946, author = {Nicholas Genise and Daniele Micciancio and Yuriy Polyakov}, title = {Building an Efficient Lattice Gadget Toolkit: Subgaussian Sampling and More}, howpublished = {Cryptology ePrint Archive, Report 2018/946}, year = {2018}, url = {https://eprint.iacr.org/2018/946}, } @misc{cryptoeprint:2018:947, author = {Yasufumi Hashimoto}, title = {On the security of Circulant UOV/Rainbow}, howpublished = {Cryptology ePrint Archive, Report 2018/947}, year = {2018}, url = {https://eprint.iacr.org/2018/947}, } @misc{cryptoeprint:2018:948, author = {Elnaz Bagherzadeh and Zahra Ahmadian}, title = {MILP-Based Automatic Differential Searches for LEA and HIGHT}, howpublished = {Cryptology ePrint Archive, Report 2018/948}, year = {2018}, url = {https://eprint.iacr.org/2018/948}, } @misc{cryptoeprint:2018:949, author = {Si Gao and Arnab Roy and Elisabeth Oswald}, title = {Constructing TI-friendly Substitution Boxes using Shift-Invariant Permutations}, howpublished = {Cryptology ePrint Archive, Report 2018/949}, year = {2018}, url = {https://eprint.iacr.org/2018/949}, } @misc{cryptoeprint:2018:950, author = {Liliya R. Akhmetzyanova, and Evgeny K. Alekseev, and Stanislav V. Smyshlyaev}, title = {Security bound for CTR-ACPKM internally re-keyed encryption mode}, howpublished = {Cryptology ePrint Archive, Report 2018/950}, year = {2018}, url = {https://eprint.iacr.org/2018/950}, } @misc{cryptoeprint:2018:951, author = {Alexander Koch}, title = {The Landscape of Optimal Card-based Protocols}, howpublished = {Cryptology ePrint Archive, Report 2018/951}, year = {2018}, url = {https://eprint.iacr.org/2018/951}, } @misc{cryptoeprint:2018:952, author = {Duhyeong Kim and Yongsoo Song}, title = {Approximate Homomorphic Encryption over the Conjugate-invariant Ring}, howpublished = {Cryptology ePrint Archive, Report 2018/952}, year = {2018}, url = {https://eprint.iacr.org/2018/952}, } @misc{cryptoeprint:2018:953, author = {Dmytro Bogatov and George Kollios and Leo Reyzin}, title = {A Comparative Evaluation of Order-Preserving and Order-Revealing Schemes and Protocols}, howpublished = {Cryptology ePrint Archive, Report 2018/953}, year = {2018}, url = {https://eprint.iacr.org/2018/953}, } @misc{cryptoeprint:2018:954, author = {Daniel Jost and Ueli Maurer and Marta Mularczyk}, title = {Efficient Ratcheting: Almost-Optimal Guarantees for Secure Messaging}, howpublished = {Cryptology ePrint Archive, Report 2018/954}, year = {2018}, url = {https://eprint.iacr.org/2018/954}, } @misc{cryptoeprint:2018:955, author = {Faraz Haider}, title = {Compact Sparse Merkle Trees}, howpublished = {Cryptology ePrint Archive, Report 2018/955}, year = {2018}, url = {https://eprint.iacr.org/2018/955}, } @misc{cryptoeprint:2018:956, author = {Zhen Liu and Guomin Yang and Duncan S. Wong and Khoa Nguyen and Huaxiong Wang}, title = {Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key}, howpublished = {Cryptology ePrint Archive, Report 2018/956}, year = {2018}, url = {https://eprint.iacr.org/2018/956}, } @misc{cryptoeprint:2018:957, author = {Peter Fenteany and Benjamin Fuller}, title = {Non-malleable Digital Lockers}, howpublished = {Cryptology ePrint Archive, Report 2018/957}, year = {2018}, url = {https://eprint.iacr.org/2018/957}, } @misc{cryptoeprint:2018:958, author = {Dennis Hofheinz and Ngoc Khanh Nguyen}, title = {On Tightly Secure Primitives in the Multi-Instance Setting}, howpublished = {Cryptology ePrint Archive, Report 2018/958}, year = {2018}, url = {https://eprint.iacr.org/2018/958}, } @misc{cryptoeprint:2018:959, author = {Changhai Ou and Xinping Zhou and Siew-Kei Lam}, title = {Information Entropy Based Leakage Certification}, howpublished = {Cryptology ePrint Archive, Report 2018/959}, year = {2018}, url = {https://eprint.iacr.org/2018/959}, } @misc{cryptoeprint:2018:960, author = {Anne Broadbent and Sevag Gharibian and Hong-Sheng Zhou}, title = {Towards Quantum One-Time Memories from Stateless Hardware}, howpublished = {Cryptology ePrint Archive, Report 2018/960}, year = {2018}, url = {https://eprint.iacr.org/2018/960}, } @misc{cryptoeprint:2018:961, author = {Shaofeng Zhu and Hua Chen and Limin Fan and Meihui Chen and Wei Xi and Dengguo Feng}, title = {Jitter Estimation with High Accuracy for Oscillator-Based TRNGs}, howpublished = {Cryptology ePrint Archive, Report 2018/961}, year = {2018}, url = {https://eprint.iacr.org/2018/961}, } @misc{cryptoeprint:2018:962, author = {Sean Bowe and Alessandro Chiesa and Matthew Green and Ian Miers and Pratyush Mishra and Howard Wu}, title = {Zexe: Enabling Decentralized Private Computation}, howpublished = {Cryptology ePrint Archive, Report 2018/962}, year = {2018}, url = {https://eprint.iacr.org/2018/962}, } @misc{cryptoeprint:2018:963, author = {Zhen Liu and Duncan S. Wong}, title = {On Enabling Attribute-Based Encryption to Be Traceable against Traitors}, howpublished = {Cryptology ePrint Archive, Report 2018/963}, year = {2018}, url = {https://eprint.iacr.org/2018/963}, } @misc{cryptoeprint:2018:964, author = {Saud Al Musa and Guangwu Xu }, title = {Fast Scalar Multiplication for Elliptic Curves over Prime Fields by Efficiently Computable Formulas}, howpublished = {Cryptology ePrint Archive, Report 2018/964}, year = {2018}, url = {https://eprint.iacr.org/2018/964}, } @misc{cryptoeprint:2018:965, author = {Paul Grubbs and Marie-Sarah Lacharité and Brice Minaud and Kenny Paterson}, title = {Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries}, howpublished = {Cryptology ePrint Archive, Report 2018/965}, year = {2018}, url = {https://eprint.iacr.org/2018/965}, } @misc{cryptoeprint:2018:966, author = {Carl Bootland and Wouter Castryck and Frederik Vercauteren}, title = {On the Security of the Multivariate Ring Learning with Errors Problem}, howpublished = {Cryptology ePrint Archive, Report 2018/966}, year = {2018}, url = {https://eprint.iacr.org/2018/966}, } @misc{cryptoeprint:2018:967, author = {Laurent Grémy}, title = {Higher dimensional sieving for the number field sieve algorithms}, howpublished = {Cryptology ePrint Archive, Report 2018/967}, year = {2018}, url = {https://eprint.iacr.org/2018/967}, } @misc{cryptoeprint:2018:968, author = {Alexander Chepurnoy and Charalampos Papamanthou and Yupeng Zhang}, title = {Edrax: A Cryptocurrency with Stateless Transaction Validation}, howpublished = {Cryptology ePrint Archive, Report 2018/968}, year = {2018}, url = {https://eprint.iacr.org/2018/968}, } @misc{cryptoeprint:2018:969, author = {Georgios Fotiadis and Chloe Martindale}, title = {Optimal TNFS-secure pairings on elliptic curves with even embedding degree}, howpublished = {Cryptology ePrint Archive, Report 2018/969}, year = {2018}, url = {https://eprint.iacr.org/2018/969}, } @misc{cryptoeprint:2018:970, author = {Stephan Krenn and Henrich C. Pöhls and Kai Samelin and Daniel Slamanig}, title = {Protean Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2018/970}, year = {2018}, url = {https://eprint.iacr.org/2018/970}, } @misc{cryptoeprint:2018:971, author = {Stephan Krenn and Henrich C. Pöhls and Kai Samelin and Daniel Slamanig}, title = {Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications}, howpublished = {Cryptology ePrint Archive, Report 2018/971}, year = {2018}, url = {https://eprint.iacr.org/2018/971}, } @misc{cryptoeprint:2018:972, author = {Yonglin Hao and Lin Jiao and Chaoyun Li and Willi Meier and Yosuke Todo and Qingju Wang}, title = {Observations on the Dynamic Cube Attack of 855-Round TRIVIUM from Crypto'18}, howpublished = {Cryptology ePrint Archive, Report 2018/972}, year = {2018}, url = {https://eprint.iacr.org/2018/972}, } @misc{cryptoeprint:2018:973, author = {Aayush Jain and Amit Sahai}, title = {How to leverage hardness of constant-degree expanding polynomials over $\mathbb{R}$ to build iO}, howpublished = {Cryptology ePrint Archive, Report 2018/973}, year = {2018}, url = {https://eprint.iacr.org/2018/973}, } @misc{cryptoeprint:2018:974, author = {Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka and Takashi Yamakawa}, title = {Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously}, howpublished = {Cryptology ePrint Archive, Report 2018/974}, year = {2018}, url = {https://eprint.iacr.org/2018/974}, } @misc{cryptoeprint:2018:975, author = {Devriş İşler and Alptekin Küpçü and Aykut Coskun}, title = {User Study on Single Password Authentication}, howpublished = {Cryptology ePrint Archive, Report 2018/975}, year = {2018}, url = {https://eprint.iacr.org/2018/975}, } @misc{cryptoeprint:2018:976, author = {Devriş İşler and Alptekin Küpçü}, title = {Distributed Single Password Protocol Framework}, howpublished = {Cryptology ePrint Archive, Report 2018/976}, year = {2018}, url = {https://eprint.iacr.org/2018/976}, } @misc{cryptoeprint:2018:977, author = {Devriş İşler and Alptekin Küpçü}, title = {Threshold Single Password Authentication}, howpublished = {Cryptology ePrint Archive, Report 2018/977}, year = {2018}, url = {https://eprint.iacr.org/2018/977}, } @misc{cryptoeprint:2018:978, author = {Seny Kamara and Tarik Moataz}, title = {Encrypted Multi-Maps with Computationally-Secure Leakage}, howpublished = {Cryptology ePrint Archive, Report 2018/978}, year = {2018}, url = {https://eprint.iacr.org/2018/978}, } @misc{cryptoeprint:2018:979, author = {Carlos Andres Lara-Nino and Arturo Diaz-Perez and Miguel Morales-Sandoval}, title = {FPGA-based Assessment of Midori and GIFT Lightweight Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2018/979}, year = {2018}, url = {https://eprint.iacr.org/2018/979}, } @misc{cryptoeprint:2018:980, author = {T-H. Hubert Chan and Rafael Pass and Elaine Shi}, title = {PiLi: An Extremely Simple Synchronous Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2018/980}, year = {2018}, url = {https://eprint.iacr.org/2018/980}, } @misc{cryptoeprint:2018:981, author = {T-H. Hubert Chan and Rafael Pass and Elaine Shi}, title = {PaLa: A Simple Partially Synchronous Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2018/981}, year = {2018}, url = {https://eprint.iacr.org/2018/981}, } @misc{cryptoeprint:2018:982, author = {Alex Davidson and Shuichi Katsumata and Ryo Nishimaki and Shota Yamada}, title = {Constrained PRFs for Bit-fixing from OWFs with Constant Collusion Resistance}, howpublished = {Cryptology ePrint Archive, Report 2018/982}, year = {2018}, url = {https://eprint.iacr.org/2018/982}, } @misc{cryptoeprint:2018:983, author = {Ignacio Cascudo and Ivan Damgård and Bernardo David and Nico Döttling and Rafael Dowsley and Irene Giacomelli}, title = {Efficient UC Commitment Extension with Homomorphism for Free (and Applications)}, howpublished = {Cryptology ePrint Archive, Report 2018/983}, year = {2018}, url = {https://eprint.iacr.org/2018/983}, } @misc{cryptoeprint:2018:984, author = {Maciej Skorski}, title = {Pseudorandomness Against Mean and Variance Bounded Attackers}, howpublished = {Cryptology ePrint Archive, Report 2018/984}, year = {2018}, url = {https://eprint.iacr.org/2018/984}, } @misc{cryptoeprint:2018:985, author = {Kaushik Nath and Palash Sarkar}, title = {Efficient Inversion In (Pseudo-)Mersenne Prime Order Fields}, howpublished = {Cryptology ePrint Archive, Report 2018/985}, year = {2018}, url = {https://eprint.iacr.org/2018/985}, } @misc{cryptoeprint:2018:986, author = {Sam Kim and David J. Wu}, title = {Watermarking PRFs from Lattices: Stronger Security via Extractable PRFs}, howpublished = {Cryptology ePrint Archive, Report 2018/986}, year = {2018}, url = {https://eprint.iacr.org/2018/986}, } @misc{cryptoeprint:2018:987, author = {Yehuda Lindell and Ariel Nof and Samuel Ranellucci}, title = {Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody}, howpublished = {Cryptology ePrint Archive, Report 2018/987}, year = {2018}, url = {https://eprint.iacr.org/2018/987}, } @misc{cryptoeprint:2018:988, author = {Daniele Micciancio}, title = {On the Hardness of Learning With Errors with Binary Secrets}, howpublished = {Cryptology ePrint Archive, Report 2018/988}, year = {2018}, url = {https://eprint.iacr.org/2018/988}, } @misc{cryptoeprint:2018:989, author = {Bohdan Kovalenko and Anton Kudin}, title = {Kleptography trapdoor free cryptographic protocols}, howpublished = {Cryptology ePrint Archive, Report 2018/989}, year = {2018}, url = {https://eprint.iacr.org/2018/989}, } @misc{cryptoeprint:2018:990, author = {Prastudy Fauzi and Sarah Meiklejohn and Rebekah Mercer and Claudio Orlandi}, title = {QuisQuis: A New Design for Anonymous Cryptocurrencies}, howpublished = {Cryptology ePrint Archive, Report 2018/990}, year = {2018}, url = {https://eprint.iacr.org/2018/990}, } @misc{cryptoeprint:2018:991, author = {Francesco Berti and Olivier Pereira and Thomas Peters}, title = {Reconsidering Generic Composition: the Tag-then-Encrypt case}, howpublished = {Cryptology ePrint Archive, Report 2018/991}, year = {2018}, url = {https://eprint.iacr.org/2018/991}, } @misc{cryptoeprint:2018:992, author = {Vivek Bagaria and Sreeram Kannan and David Tse and Giulia Fanti and Pramod Viswanath }, title = {Deconstructing the Blockchain to Approach Physical Limits}, howpublished = {Cryptology ePrint Archive, Report 2018/992}, year = {2018}, url = {https://eprint.iacr.org/2018/992}, } @misc{cryptoeprint:2018:993, author = {Viet Tung Hoang and Stefano Tessaro and Aishwarya Thiruvengadam}, title = {The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization}, howpublished = {Cryptology ePrint Archive, Report 2018/993}, year = {2018}, url = {https://eprint.iacr.org/2018/993}, } @misc{cryptoeprint:2018:994, author = {Long Chen and Qiang Tang}, title = {People Who Live in Glass Houses Should not Throw Stones: Targeted Opening Message Franking Schemes }, howpublished = {Cryptology ePrint Archive, Report 2018/994}, year = {2018}, url = {https://eprint.iacr.org/2018/994}, } @misc{cryptoeprint:2018:995, author = {Shuai Zhou and Haiyang Xue and Daode Zhang and Kunpeng Wang and Xianhui Lu and Bao Li and Jingnan He}, title = {Preprocess-then-NTT Technique and Its Applications to KYBER and NEWHOPE}, howpublished = {Cryptology ePrint Archive, Report 2018/995}, year = {2018}, url = {https://eprint.iacr.org/2018/995}, } @misc{cryptoeprint:2018:996, author = {Thomas Debris-Alazard and Nicolas Sendrier and Jean-Pierre Tillich }, title = {Wave: A New Code-Based Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2018/996}, year = {2018}, url = {https://eprint.iacr.org/2018/996}, } @misc{cryptoeprint:2018:997, author = {Leonid Reyzin and Adam Smith and Sophia Yakoubov}, title = {Turning HATE Into LOVE: Homomorphic Ad Hoc Threshold Encryption for Scalable MPC}, howpublished = {Cryptology ePrint Archive, Report 2018/997}, year = {2018}, url = {https://eprint.iacr.org/2018/997}, } @misc{cryptoeprint:2018:998, author = {Chen Li}, title = {A Key Recovery Attack on Streamlined NTRU Prime}, howpublished = {Cryptology ePrint Archive, Report 2018/998}, year = {2018}, url = {https://eprint.iacr.org/2018/998}, } @misc{cryptoeprint:2018:999, author = {Ximing Fu and Xiaoyun Wang and Xiaoyang Dong and Willi Meier and Yonglin Hao and Boxin Zhao}, title = {A Refinement of ``A Key-recovery Attack on 855-round Trivium" From CRYPTO 2018}, howpublished = {Cryptology ePrint Archive, Report 2018/999}, year = {2018}, url = {https://eprint.iacr.org/2018/999}, } @misc{cryptoeprint:2019:001, author = {Ilia Lebedev and Kyle Hogan and Jules Drean and David Kohlbrenner and Dayeol Lee and Krste Asanović and Dawn Song and Srinivas Devadas}, title = {Sanctorum: A lightweight security monitor for secure enclaves}, howpublished = {Cryptology ePrint Archive, Report 2019/001}, year = {2019}, url = {https://eprint.iacr.org/2019/001}, } @misc{cryptoeprint:2019:002, author = {Jianye Huang and Qiong Huang}, title = {Leakage-Resilient Group Signature: Definitions and Constructions}, howpublished = {Cryptology ePrint Archive, Report 2019/002}, year = {2019}, url = {https://eprint.iacr.org/2019/002}, } @misc{cryptoeprint:2019:003, author = {Yuntao Liu and Yang Xie and Abhishek Charkraborty and Ankur Srivastava}, title = {Secure and Effective Logic Locking for Machine Learning Applications}, howpublished = {Cryptology ePrint Archive, Report 2019/003}, year = {2019}, url = {https://eprint.iacr.org/2019/003}, } @misc{cryptoeprint:2019:004, author = {Guillaume Dabosville and Houssem Maghrebi and Alexis Lhuillery and Julien Bringer and Thanh-Ha Le}, title = {On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks}, howpublished = {Cryptology ePrint Archive, Report 2019/004}, year = {2019}, url = {https://eprint.iacr.org/2019/004}, } @misc{cryptoeprint:2019:005, author = {Lilas Alrahis, Muhammad Yasin, Hani Saleh, Baker Mohammad, Mahmoud Al-Qutayri, and Ozgur Sinanoglu}, title = {ScanSAT: Unlocking Obfuscated Scan Chains}, howpublished = {Cryptology ePrint Archive, Report 2019/005}, year = {2019}, url = {https://eprint.iacr.org/2019/005}, } @misc{cryptoeprint:2019:006, author = {Antonio Marcedone and Rafael Pass and abhi shelat}, title = {Minimizing Trust in Hardware Wallets with Two Factor Signatures}, howpublished = {Cryptology ePrint Archive, Report 2019/006}, year = {2019}, url = {https://eprint.iacr.org/2019/006}, } @misc{cryptoeprint:2019:007, author = {Matthias Hamann and Matthias Krause}, title = {Tight Security Bounds for Generic Stream Cipher Constructions}, howpublished = {Cryptology ePrint Archive, Report 2019/007}, year = {2019}, url = {https://eprint.iacr.org/2019/007}, } @misc{cryptoeprint:2019:008, author = {Jingyu Pan and Shivam Bhasin and Fan Zhang and Kui Ren}, title = {One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis}, howpublished = {Cryptology ePrint Archive, Report 2019/008}, year = {2019}, url = {https://eprint.iacr.org/2019/008}, } @misc{cryptoeprint:2019:009, author = {Qian Guo and Thomas Johansson and Erik Mårtensson and Paul Stankovski Wagner}, title = {On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving}, howpublished = {Cryptology ePrint Archive, Report 2019/009}, year = {2019}, url = {https://eprint.iacr.org/2019/009}, } @misc{cryptoeprint:2019:010, author = {Rodrigo Abarzúa and Claudio Valencia and Julio López}, title = {Survey for Performance & Security Problems of Passive Side-channel Attacks Countermeasures in ECC}, howpublished = {Cryptology ePrint Archive, Report 2019/010}, year = {2019}, url = {https://eprint.iacr.org/2019/010}, } @misc{cryptoeprint:2019:011, author = {Paul Grubbs and Marie-Sarah Lacharité and Brice Minaud and Kenneth G. Paterson}, title = {Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks}, howpublished = {Cryptology ePrint Archive, Report 2019/011}, year = {2019}, url = {https://eprint.iacr.org/2019/011}, } @misc{cryptoeprint:2019:012, author = {Sihem Mesnager and Kwang Ho Kim and Dujin Jo and Junyop Choe and Munhyon Han and Dok Nam Lee}, title = {A Proof of the Beierle-Kranz-Leander’s Conjecture related to Lightweight Multiplication in $F_{2^n}$}, howpublished = {Cryptology ePrint Archive, Report 2019/012}, year = {2019}, url = {https://eprint.iacr.org/2019/012}, } @misc{cryptoeprint:2019:013, author = {Changhai Ou and Siew-Kei Lam}, title = {Full Collision Attack: Pushing the Limits of Exhaustible Key Spaces}, howpublished = {Cryptology ePrint Archive, Report 2019/013}, year = {2019}, url = {https://eprint.iacr.org/2019/013}, } @misc{cryptoeprint:2019:014, author = {Gaurav Panwar and Satyajayant Misra and Roopa Vishwanathan}, title = {BlAnC: Blockchain-based Anonymous and Decentralized Credit Networks}, howpublished = {Cryptology ePrint Archive, Report 2019/014}, year = {2019}, url = {https://eprint.iacr.org/2019/014}, } @misc{cryptoeprint:2019:015, author = {Thomas Pornin and Thomas Prest}, title = {More Efficient Algorithms for the NTRU Key Generation using the Field Norm}, howpublished = {Cryptology ePrint Archive, Report 2019/015}, year = {2019}, url = {https://eprint.iacr.org/2019/015}, } @misc{cryptoeprint:2019:016, author = {Yevgeniy Dodis and Paul Grubbs and Thomas Ristenpart and Joanne Woodage}, title = {Fast Message Franking: From Invisible Salamanders to Encryptment}, howpublished = {Cryptology ePrint Archive, Report 2019/016}, year = {2019}, url = {https://eprint.iacr.org/2019/016}, } @misc{cryptoeprint:2019:017, author = {Sai Krishna Deepak Maram and Fan Zhang and Lun Wang and Andrew Low and Yupeng Zhang and Ari Juels and Dawn Song}, title = {CHURP: Dynamic-Committee Proactive Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2019/017}, year = {2019}, url = {https://eprint.iacr.org/2019/017}, } @misc{cryptoeprint:2019:018, author = {Yunhua Wen and Shengli Liu and Dawu Gu}, title = {Generic Constructions of Robustly Reusable Fuzzy Extractor}, howpublished = {Cryptology ePrint Archive, Report 2019/018}, year = {2019}, url = {https://eprint.iacr.org/2019/018}, } @misc{cryptoeprint:2019:019, author = {Chunning Zhou and Wentao Zhang and Tianyou Ding and Zejun Xiang}, title = {Improving the MILP-based Security Evaluation Algorithms against Differential Cryptanalysis Using Divide-and-Conquer Approach}, howpublished = {Cryptology ePrint Archive, Report 2019/019}, year = {2019}, url = {https://eprint.iacr.org/2019/019}, } @misc{cryptoeprint:2019:020, author = {Michel Abdalla and Fabrice Benhamouda and Markulf Kolhweiss and Hendrik Waldner}, title = {Decentralizing Inner-Product Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/020}, year = {2019}, url = {https://eprint.iacr.org/2019/020}, } @misc{cryptoeprint:2019:021, author = {Ilya Aldanov}, title = {CryptoNote+}, howpublished = {Cryptology ePrint Archive, Report 2019/021}, year = {2019}, url = {https://eprint.iacr.org/2019/021}, } @misc{cryptoeprint:2019:022, author = {Anthony Demeri and Thomas Conroy and Alex Nolan and William Diehl}, title = {The BIG Cipher: Design, Security Analysis, and Hardware-Software Optimization Techniques}, howpublished = {Cryptology ePrint Archive, Report 2019/022}, year = {2019}, url = {https://eprint.iacr.org/2019/022}, } @misc{cryptoeprint:2019:023, author = {Joachim Breitner and Nadia Heninger}, title = {Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies}, howpublished = {Cryptology ePrint Archive, Report 2019/023}, year = {2019}, url = {https://eprint.iacr.org/2019/023}, } @misc{cryptoeprint:2019:024, author = {Yalin Chen and Jue-Sam Chou and Fang-Qi Zhou}, title = {A publicly verifiable quantum signature scheme based on asymmetric quantum cryptography}, howpublished = {Cryptology ePrint Archive, Report 2019/024}, year = {2019}, url = {https://eprint.iacr.org/2019/024}, } @misc{cryptoeprint:2019:025, author = {Yu Liu and Huicong Liang and Muzhou Li and Luning Huang and Kai Hu and Chenhe Yang and Meiqin Wang}, title = {STP Models of Optimal Differential and Linear Trail for S-box Based Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2019/025}, year = {2019}, url = {https://eprint.iacr.org/2019/025}, } @misc{cryptoeprint:2019:026, author = {Ben Smyth and Yoshikazu Hanatani }, title = {Non-malleable encryption with proofs of plaintext knowledge and applications to voting}, howpublished = {Cryptology ePrint Archive, Report 2019/026}, year = {2019}, url = {https://eprint.iacr.org/2019/026}, } @misc{cryptoeprint:2019:027, author = {Lydia Garms and Anja Lehmann}, title = {Group Signatures with Selective Linkability}, howpublished = {Cryptology ePrint Archive, Report 2019/027}, year = {2019}, url = {https://eprint.iacr.org/2019/027}, } @misc{cryptoeprint:2019:028, author = {Mathias Hall-Andersen and David Wong and Nick Sullivan and Alishah Chator}, title = {nQUIC: Noise-Based QUIC Packet Protection}, howpublished = {Cryptology ePrint Archive, Report 2019/028}, year = {2019}, url = {https://eprint.iacr.org/2019/028}, } @misc{cryptoeprint:2019:029, author = {Huiwen Jia and Yupu Hu and Chunming Tang and Yanhua Zhang}, title = {Upper Bound on $\lambda_1(\Lambda^{\bot}(\mathbf A))$}, howpublished = {Cryptology ePrint Archive, Report 2019/029}, year = {2019}, url = {https://eprint.iacr.org/2019/029}, } @misc{cryptoeprint:2019:030, author = {Ke Wang and Zhenfeng Zhang}, title = {Analysis of Two Countermeasures against the Signal Leakage Attack}, howpublished = {Cryptology ePrint Archive, Report 2019/030}, year = {2019}, url = {https://eprint.iacr.org/2019/030}, } @misc{cryptoeprint:2019:031, author = {Rishab Goyal and Satyanarayana Vusirikala and Brent Waters}, title = {Collusion Resistant Broadcast and Trace from Positional Witness Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/031}, year = {2019}, url = {https://eprint.iacr.org/2019/031}, } @misc{cryptoeprint:2019:032, author = {Steven Galbraith and Jake Massimo and Kenneth G. Paterson}, title = {Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation}, howpublished = {Cryptology ePrint Archive, Report 2019/032}, year = {2019}, url = {https://eprint.iacr.org/2019/032}, } @misc{cryptoeprint:2019:033, author = {Zhedong Wang and Xiong Fan and Feng-Hao Liu}, title = {FE for Inner Products and Its Application to Decentralized ABE}, howpublished = {Cryptology ePrint Archive, Report 2019/033}, year = {2019}, url = {https://eprint.iacr.org/2019/033}, } @misc{cryptoeprint:2019:034, author = {Myrto Arapinis and Andriana Gkaniatsou and Dimitris Karakostas and Aggelos Kiayias}, title = {A Formal Treatment of Hardware Wallets}, howpublished = {Cryptology ePrint Archive, Report 2019/034}, year = {2019}, url = {https://eprint.iacr.org/2019/034}, } @misc{cryptoeprint:2019:035, author = {Daniele Cozzo and Nigel P. Smart}, title = {Using TopGear in Overdrive: A more efficient ZKPoK for SPDZ}, howpublished = {Cryptology ePrint Archive, Report 2019/035}, year = {2019}, url = {https://eprint.iacr.org/2019/035}, } @misc{cryptoeprint:2019:036, author = {Shuichi Katsumata and Shota Yamada}, title = {Non-Zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR}, howpublished = {Cryptology ePrint Archive, Report 2019/036}, year = {2019}, url = {https://eprint.iacr.org/2019/036}, } @misc{cryptoeprint:2019:037, author = {Aron Gohr}, title = {Improving Attacks on Speck32/64 using Deep Learning}, howpublished = {Cryptology ePrint Archive, Report 2019/037}, year = {2019}, url = {https://eprint.iacr.org/2019/037}, } @misc{cryptoeprint:2019:038, author = {Aijun Ge and Puwen Wei}, title = {Identity-based Broadcast Encryption with Efficient Revocation}, howpublished = {Cryptology ePrint Archive, Report 2019/038}, year = {2019}, url = {https://eprint.iacr.org/2019/038}, } @misc{cryptoeprint:2019:039, author = {Stephan Krenn and Henrich C. Pöhls and Kai Samelin and Daniel Slamanig}, title = {Fully Invisible Protean Signatures Schemes}, howpublished = {Cryptology ePrint Archive, Report 2019/039}, year = {2019}, url = {https://eprint.iacr.org/2019/039}, } @misc{cryptoeprint:2019:040, author = {Vadim Lyubashevsky and Gregor Seiler}, title = {NTTRU: Truly Fast NTRU Using NTT}, howpublished = {Cryptology ePrint Archive, Report 2019/040}, year = {2019}, url = {https://eprint.iacr.org/2019/040}, } @misc{cryptoeprint:2019:041, author = {Bartosz Zoltak}, title = {Message Authentication (MAC) Algorithm For The VMPC-R (RC4-like) Stream Cipher}, howpublished = {Cryptology ePrint Archive, Report 2019/041}, year = {2019}, url = {https://eprint.iacr.org/2019/041}, } @misc{cryptoeprint:2019:042, author = {Lisa Kohl}, title = {Hunting and Gathering - Verifiable Random Functions from Standard Assumptions with Short Proofs}, howpublished = {Cryptology ePrint Archive, Report 2019/042}, year = {2019}, url = {https://eprint.iacr.org/2019/042}, } @misc{cryptoeprint:2019:043, author = {Qian Guo and Thomas Johansson and Alexander Nilsson}, title = {A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke}, howpublished = {Cryptology ePrint Archive, Report 2019/043}, year = {2019}, url = {https://eprint.iacr.org/2019/043}, } @misc{cryptoeprint:2019:044, author = {Ahmad Almorabea}, title = {Toha Key Hardened Function }, howpublished = {Cryptology ePrint Archive, Report 2019/044}, year = {2019}, url = {https://eprint.iacr.org/2019/044}, } @misc{cryptoeprint:2019:045, author = {Ryo Nishimaki and Takashi Yamakawa}, title = {Leakage-resilient Identity-based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio}, howpublished = {Cryptology ePrint Archive, Report 2019/045}, year = {2019}, url = {https://eprint.iacr.org/2019/045}, } @misc{cryptoeprint:2019:046, author = {Alan Szepieniec and Bart Preneel}, title = {Block-Anti-Circulant Unbalanced Oil and Vinegar}, howpublished = {Cryptology ePrint Archive, Report 2019/046}, year = {2019}, url = {https://eprint.iacr.org/2019/046}, } @misc{cryptoeprint:2019:047, author = {Kanad Basu and Deepraj Soni and Mohammed Nabeel and Ramesh Karri}, title = {NIST Post-Quantum Cryptography- A Hardware Evaluation Study}, howpublished = {Cryptology ePrint Archive, Report 2019/047}, year = {2019}, url = {https://eprint.iacr.org/2019/047}, } @misc{cryptoeprint:2019:048, author = {Eyal Kushilevitz and Tamer Mour}, title = {Sub-logarithmic Distributed Oblivious RAM with Small Block Size}, howpublished = {Cryptology ePrint Archive, Report 2019/048}, year = {2019}, url = {https://eprint.iacr.org/2019/048}, } @misc{cryptoeprint:2019:049, author = {Lingchen Li and Wenling Wu and Yafei Zheng and Lei Zhang}, title = {The Relationship between the Construction and Solution of the MILP Models and Applications}, howpublished = {Cryptology ePrint Archive, Report 2019/049}, year = {2019}, url = {https://eprint.iacr.org/2019/049}, } @misc{cryptoeprint:2019:050, author = {Takahiro Matsuda and Kenta Takahashi and Takao Murakami and Goichiro Hanaoka}, title = {Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions}, howpublished = {Cryptology ePrint Archive, Report 2019/050}, year = {2019}, url = {https://eprint.iacr.org/2019/050}, } @misc{cryptoeprint:2019:051, author = {Daode Zhang and Jie Li and Bao Li and Xianhui Lu and Haiyang Xue and Dingding Jia and Yamin Liu}, title = {Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy}, howpublished = {Cryptology ePrint Archive, Report 2019/051}, year = {2019}, url = {https://eprint.iacr.org/2019/051}, } @misc{cryptoeprint:2019:052, author = {Haodong Jiang and Zhenfeng Zhang and Zhi Ma}, title = {Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2019/052}, year = {2019}, url = {https://eprint.iacr.org/2019/052}, } @misc{cryptoeprint:2019:053, author = {Yongcheng Song and Xinyi Huang and Yi Mu and Wei Wu}, title = {A New Code-based Signature Scheme with Shorter Public Key}, howpublished = {Cryptology ePrint Archive, Report 2019/053}, year = {2019}, url = {https://eprint.iacr.org/2019/053}, } @misc{cryptoeprint:2019:054, author = {Mathieu Carbone and Vincent Conin and Marie-Angela Cornelie and Francois Dassance and Guillaume Dufresne and Cecile Dumas and Emmanuel Prouff and Alexandre Venelli}, title = {Deep Learning to Evaluate Secure RSA Implementations}, howpublished = {Cryptology ePrint Archive, Report 2019/054}, year = {2019}, url = {https://eprint.iacr.org/2019/054}, } @misc{cryptoeprint:2019:055, author = {Sandro Coretti and Antonio Faonio and Daniele Venturi}, title = {Rate-Optimizing Compilers for Continuously Non-Malleable Codes}, howpublished = {Cryptology ePrint Archive, Report 2019/055}, year = {2019}, url = {https://eprint.iacr.org/2019/055}, } @misc{cryptoeprint:2019:056, author = {Ward Beullens and Hoeteck Wee}, title = {Obfuscating simple functionalities from knowledge assumptions}, howpublished = {Cryptology ePrint Archive, Report 2019/056}, year = {2019}, url = {https://eprint.iacr.org/2019/056}, } @misc{cryptoeprint:2019:057, author = {Rafael del Pino and Vadim Lyubashevsky and Gregor Seiler}, title = {Short Discrete Log Proofs for FHE and Ring-LWE Ciphertexts}, howpublished = {Cryptology ePrint Archive, Report 2019/057}, year = {2019}, url = {https://eprint.iacr.org/2019/057}, } @misc{cryptoeprint:2019:058, author = {Roman Langrehr and Jiaxin Pan}, title = {Tightly secure hierarchical identity-based encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/058}, year = {2019}, url = {https://eprint.iacr.org/2019/058}, } @misc{cryptoeprint:2019:059, author = {Yuanqi Shen and You Li and Amin Rezaei and Shuyu Kong and David Dlott and Hai Zhou}, title = {BeSAT: Behavioral SAT-based Attack on Cyclic Logic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/059}, year = {2019}, url = {https://eprint.iacr.org/2019/059}, } @misc{cryptoeprint:2019:060, author = {Amin Rezaei and You Li and Yuanqi Shen and Shuyu Kong and Hai Zhou}, title = {CycSAT-Unresolvable Cyclic Logic Encryption Using Unreachable States}, howpublished = {Cryptology ePrint Archive, Report 2019/060}, year = {2019}, url = {https://eprint.iacr.org/2019/060}, } @misc{cryptoeprint:2019:061, author = {Yuanqi Shen and You Li and Shuyu Kong and Amin Rezaei and Hai Zhou}, title = {SigAttack: New High-level SAT-based Attack on Logic Encryptions}, howpublished = {Cryptology ePrint Archive, Report 2019/061}, year = {2019}, url = {https://eprint.iacr.org/2019/061}, } @misc{cryptoeprint:2019:062, author = {Michael Clear and Ciaran McGoldrick}, title = {Additively Homomorphic IBE from Higher Residuosity}, howpublished = {Cryptology ePrint Archive, Report 2019/062}, year = {2019}, url = {https://eprint.iacr.org/2019/062}, } @misc{cryptoeprint:2019:063, author = {Michael Backes and Lucjan Hanzlik and Amir Herzberg and Aniket Kate and Ivan Pryvalov}, title = {Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup}, howpublished = {Cryptology ePrint Archive, Report 2019/063}, year = {2019}, url = {https://eprint.iacr.org/2019/063}, } @misc{cryptoeprint:2019:064, author = {Keita Emura and Takuya Hayashi}, title = {A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Application to Identity Management}, howpublished = {Cryptology ePrint Archive, Report 2019/064}, year = {2019}, url = {https://eprint.iacr.org/2019/064}, } @misc{cryptoeprint:2019:065, author = {Jan Camenisch and Manu Drijvers and Björn Tackmann}, title = {Multi-Protocol UC and its Use for Building Modular and Efficient Protocols}, howpublished = {Cryptology ePrint Archive, Report 2019/065}, year = {2019}, url = {https://eprint.iacr.org/2019/065}, } @misc{cryptoeprint:2019:066, author = {Alessandra Scafuro and Luisa Siniscalchi and Ivan Visconti}, title = {Publicly Verifiable Proofs from Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2019/066}, year = {2019}, url = {https://eprint.iacr.org/2019/066}, } @misc{cryptoeprint:2019:067, author = {George Teseleanu}, title = {Managing Your Kleptographic Subscription Plan}, howpublished = {Cryptology ePrint Archive, Report 2019/067}, year = {2019}, url = {https://eprint.iacr.org/2019/067}, } @misc{cryptoeprint:2019:068, author = {Michael Walter}, title = {Sampling the Integers with Low Relative Error}, howpublished = {Cryptology ePrint Archive, Report 2019/068}, year = {2019}, url = {https://eprint.iacr.org/2019/068}, } @misc{cryptoeprint:2019:069, author = {Jan Czajkowski and Andreas Hülsing and Christian Schaffner}, title = {Quantum Indistinguishability of Random Sponges}, howpublished = {Cryptology ePrint Archive, Report 2019/069}, year = {2019}, url = {https://eprint.iacr.org/2019/069}, } @misc{cryptoeprint:2019:070, author = {Sam M. Werner and Paul J. Pritz and Alexei Zamyatin and William J. Knottenbelt}, title = {Uncle Traps: Harvesting Rewards in a Queue-based Ethereum Mining Pool}, howpublished = {Cryptology ePrint Archive, Report 2019/070}, year = {2019}, url = {https://eprint.iacr.org/2019/070}, } @misc{cryptoeprint:2019:071, author = {Zhilin Zhang and Ke Wang and Weipeng Lin and Ada Wai-Chee Fu and Raymond Chi-Wing Wong}, title = {Repeatable Oblivious Shuffling of Large Outsourced Data Blocks}, howpublished = {Cryptology ePrint Archive, Report 2019/071}, year = {2019}, url = {https://eprint.iacr.org/2019/071}, } @misc{cryptoeprint:2019:072, author = {Alex Vazquez}, title = {ZeroCT: Improving ZeroCoin with Confidential Transactions and more}, howpublished = {Cryptology ePrint Archive, Report 2019/072}, year = {2019}, url = {https://eprint.iacr.org/2019/072}, } @misc{cryptoeprint:2019:073, author = {Cristian Hristea and Ferucio Laurentiu Tiplea}, title = {Destructive Privacy and Mutual Authentication in Vaudenay's RFID Model}, howpublished = {Cryptology ePrint Archive, Report 2019/073}, year = {2019}, url = {https://eprint.iacr.org/2019/073}, } @misc{cryptoeprint:2019:074, author = {Chun Guo and Jonathan Katz and Xiao Wang and Yu Yu}, title = {Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2019/074}, year = {2019}, url = {https://eprint.iacr.org/2019/074}, } @misc{cryptoeprint:2019:075, author = {Aurélie Bauer and Henri Gilbert and Guénaël Renault and Mélissa Rossi}, title = {Assessment of the Key-Reuse Resilience of NewHope}, howpublished = {Cryptology ePrint Archive, Report 2019/075}, year = {2019}, url = {https://eprint.iacr.org/2019/075}, } @misc{cryptoeprint:2019:076, author = {Matthieu Rivain and Junwei Wang}, title = {Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations}, howpublished = {Cryptology ePrint Archive, Report 2019/076}, year = {2019}, url = {https://eprint.iacr.org/2019/076}, } @misc{cryptoeprint:2019:077, author = {Michael Scott}, title = {Pairing Implementation Revisited}, howpublished = {Cryptology ePrint Archive, Report 2019/077}, year = {2019}, url = {https://eprint.iacr.org/2019/077}, } @misc{cryptoeprint:2019:078, author = {Alan Kaminsky}, title = {Testing the Randomness of Cryptographic Function Mappings}, howpublished = {Cryptology ePrint Archive, Report 2019/078}, year = {2019}, url = {https://eprint.iacr.org/2019/078}, } @misc{cryptoeprint:2019:079, author = {Kangquan Li and Longjiang Qu and Bing Sun and Chao Li}, title = {New Results about the Boomerang Uniformity of Permutation Polynomials}, howpublished = {Cryptology ePrint Archive, Report 2019/079}, year = {2019}, url = {https://eprint.iacr.org/2019/079}, } @misc{cryptoeprint:2019:080, author = {Aner Ben Efraim and Eran Omri}, title = {Turbospeedz: Double Your Online SPDZ! Improving SPDZ using Function Dependent Preprocessing}, howpublished = {Cryptology ePrint Archive, Report 2019/080}, year = {2019}, url = {https://eprint.iacr.org/2019/080}, } @misc{cryptoeprint:2019:081, author = {Stephan Krenn and Kai Samelin and Christoph Striecks}, title = {Practical Group-Signatures with Privacy-Friendly Openings}, howpublished = {Cryptology ePrint Archive, Report 2019/081}, year = {2019}, url = {https://eprint.iacr.org/2019/081}, } @misc{cryptoeprint:2019:082, author = {Nils Fleischhacker and Giulio Malavolta and Dominique Schröder}, title = {Arithmetic Garbling from Bilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2019/082}, year = {2019}, url = {https://eprint.iacr.org/2019/082}, } @misc{cryptoeprint:2019:083, author = {Zhen Liu and Yanbin Pan and Zhenfei Zhang}, title = {Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15}, howpublished = {Cryptology ePrint Archive, Report 2019/083}, year = {2019}, url = {https://eprint.iacr.org/2019/083}, } @misc{cryptoeprint:2019:084, author = {Peter T. Breuer}, title = {An Information Obfuscation Calculus for Encrypted Computing }, howpublished = {Cryptology ePrint Archive, Report 2019/084}, year = {2019}, url = {https://eprint.iacr.org/2019/084}, } @misc{cryptoeprint:2019:085, author = {Erdem Alkim and Paulo S. L. M. Barreto and Nina Bindel and Patrick Longa and Jefferson E. Ricardini}, title = {The Lattice-Based Digital Signature Scheme qTESLA}, howpublished = {Cryptology ePrint Archive, Report 2019/085}, year = {2019}, url = {https://eprint.iacr.org/2019/085}, } @misc{cryptoeprint:2019:086, author = {George Teseleanu}, title = {Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG}, howpublished = {Cryptology ePrint Archive, Report 2019/086}, year = {2019}, url = {https://eprint.iacr.org/2019/086}, } @misc{cryptoeprint:2019:087, author = {Laltu Sardar and Sushmita Ruj}, title = {The Secure Link Prediction Problem}, howpublished = {Cryptology ePrint Archive, Report 2019/087}, year = {2019}, url = {https://eprint.iacr.org/2019/087}, } @misc{cryptoeprint:2019:088, author = {Nir Drucker and Shay Gueron}, title = {Continuous Key Agreement with Reduced Bandwidth}, howpublished = {Cryptology ePrint Archive, Report 2019/088}, year = {2019}, url = {https://eprint.iacr.org/2019/088}, } @misc{cryptoeprint:2019:089, author = {Martin R. Albrecht and Léo Ducas and Gottfried Herold and Elena Kirshanova and Eamonn W. Postlethwaite and Marc Stevens}, title = {The General Sieve Kernel and New Records in Lattice Reduction}, howpublished = {Cryptology ePrint Archive, Report 2019/089}, year = {2019}, url = {https://eprint.iacr.org/2019/089}, } @misc{cryptoeprint:2019:090, author = {Hayo Baan and Sauvik Bhattacharya and Scott Fluhrer and Oscar Garcia-Morchon and Thijs Laarhoven and Ronald Rietman and Markku-Juhani O. Saarinen and Ludo Tolhuizen and Zhenfei Zhang}, title = {Round5: Compact and Fast Post-Quantum Public-Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/090}, year = {2019}, url = {https://eprint.iacr.org/2019/090}, } @misc{cryptoeprint:2019:091, author = {Li Hongda and Pan Dongxue and Ni Peifang}, title = {Efficient Zero-Knowledge for NP from Secure Two-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2019/091}, year = {2019}, url = {https://eprint.iacr.org/2019/091}, } @misc{cryptoeprint:2019:092, author = {Léo Perrin}, title = {Partitions in the S-Box of Streebog and Kuznyechik}, howpublished = {Cryptology ePrint Archive, Report 2019/092}, year = {2019}, url = {https://eprint.iacr.org/2019/092}, } @misc{cryptoeprint:2019:093, author = {Muhammad Rezal Kamel Ariffin and Abderrahmane Nitaj and Yanbin Pan and Nur Azman Abu}, title = {Key Encapsulation Mechanism From Modular Multivariate Linear Equations}, howpublished = {Cryptology ePrint Archive, Report 2019/093}, year = {2019}, url = {https://eprint.iacr.org/2019/093}, } @misc{cryptoeprint:2019:094, author = {Aron Gohr and Sven Jacob and Werner Schindler}, title = {CHES 2018 Side Channel Contest CTF - Solution of the AES Challenges}, howpublished = {Cryptology ePrint Archive, Report 2019/094}, year = {2019}, url = {https://eprint.iacr.org/2019/094}, } @misc{cryptoeprint:2019:095, author = {Patrick Derbez and Pierre-Alain Fouque and Jérémy Jean and Baptiste Lambin}, title = {Variants of the AES Key Schedule for Better Truncated Differential Bounds}, howpublished = {Cryptology ePrint Archive, Report 2019/095}, year = {2019}, url = {https://eprint.iacr.org/2019/095}, } @misc{cryptoeprint:2019:096, author = {Patrick Derbez and Pierre-Alain Fouque and Baptiste Lambin and Brice Minaud}, title = {On Recovering Affine Encodings in White-Box Implementations}, howpublished = {Cryptology ePrint Archive, Report 2019/096}, year = {2019}, url = {https://eprint.iacr.org/2019/096}, } @misc{cryptoeprint:2019:097, author = {Patrick Derbez and Pierre-Alain Fouque and Baptiste Lambin}, title = {Linearly equivalent S-boxes and the Division Property}, howpublished = {Cryptology ePrint Archive, Report 2019/097}, year = {2019}, url = {https://eprint.iacr.org/2019/097}, } @misc{cryptoeprint:2019:098, author = {Pedro Branco}, title = {A Post-Quantum UC-Commitment Scheme in the Global Random Oracle Model from Code-Based Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2019/098}, year = {2019}, url = {https://eprint.iacr.org/2019/098}, } @misc{cryptoeprint:2019:099, author = {Mary Maller and Sean Bowe and Markulf Kohlweiss and Sarah Meiklejohn}, title = {Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings}, howpublished = {Cryptology ePrint Archive, Report 2019/099}, year = {2019}, url = {https://eprint.iacr.org/2019/099}, } @misc{cryptoeprint:2019:1000, author = {Aisling Connolly and Pooya Farshim and Georg Fuchsbauer}, title = {Security of Symmetric Primitives against Key-Correlated Attacks}, howpublished = {Cryptology ePrint Archive, Report 2019/1000}, year = {2019}, url = {https://eprint.iacr.org/2019/1000}, } @misc{cryptoeprint:2019:1001, author = {Shi Bai and Katharina Boudgoust and Dipayan Das and Adeline Roux-Langlois and Weiqiang Wen and Zhenfei Zhang}, title = {Middle-Product Learning with Rounding Problem and its Applications}, howpublished = {Cryptology ePrint Archive, Report 2019/1001}, year = {2019}, url = {https://eprint.iacr.org/2019/1001}, } @misc{cryptoeprint:2019:1002, author = {Shizhu Tian and Christina Boura and Léo Perrin}, title = {Boomerang Uniformity of Popular S-box Constructions}, howpublished = {Cryptology ePrint Archive, Report 2019/1002}, year = {2019}, url = {https://eprint.iacr.org/2019/1002}, } @misc{cryptoeprint:2019:1003, author = {Thinh Dang and Dustin Moody}, title = {Twisted Hessian Isogenies}, howpublished = {Cryptology ePrint Archive, Report 2019/1003}, year = {2019}, url = {https://eprint.iacr.org/2019/1003}, } @misc{cryptoeprint:2019:1004, author = {Elena Andreeva and Virginie Lallemand and Antoon Purnal and Reza Reyhanitabar and Arnab Roy and Damian Vizar}, title = {Forkcipher: a New Primitive for Authenticated Encryption of Very Short Messages}, howpublished = {Cryptology ePrint Archive, Report 2019/1004}, year = {2019}, url = {https://eprint.iacr.org/2019/1004}, } @misc{cryptoeprint:2019:1005, author = {Siemen Dhooghe and Svetla Nikova and Vincent Rijmen}, title = {Threshold Implementations in the Robust Probing Model}, howpublished = {Cryptology ePrint Archive, Report 2019/1005}, year = {2019}, url = {https://eprint.iacr.org/2019/1005}, } @misc{cryptoeprint:2019:1006, author = {Francesco Lucente Stabile and Carey Patrick Atkins}, title = {Lucente Stabile Atkins (LSA) Cryptosystem (Unbreakable)}, howpublished = {Cryptology ePrint Archive, Report 2019/1006}, year = {2019}, url = {https://eprint.iacr.org/2019/1006}, } @misc{cryptoeprint:2019:1007, author = {Philippe Elbaz-Vincent and Cyril Hugounenq and Sébastien Riou}, title = {SPAE a mode of operation for AES on low-cost hardware}, howpublished = {Cryptology ePrint Archive, Report 2019/1007}, year = {2019}, url = {https://eprint.iacr.org/2019/1007}, } @misc{cryptoeprint:2019:1008, author = {Olivier Bronchain and François-Xavier Standaert}, title = {Side-Channel Countermeasures' Dissection and the Limits of Closed Source Security Evaluations}, howpublished = {Cryptology ePrint Archive, Report 2019/1008}, year = {2019}, url = {https://eprint.iacr.org/2019/1008}, } @misc{cryptoeprint:2019:1009, author = {Jintai Ding and Seungki Kim and Tsuyoshi Takagi and Yuntao Wang}, title = {LLL and stochastic sandpile models}, howpublished = {Cryptology ePrint Archive, Report 2019/1009}, year = {2019}, url = {https://eprint.iacr.org/2019/1009}, } @misc{cryptoeprint:2019:100, author = {Wei-Lun Huang and Jiun-Peng Chen and Bo-Yin Yang}, title = {Correlation Power Analysis on NTRU Prime and Related Countermeasures}, howpublished = {Cryptology ePrint Archive, Report 2019/100}, year = {2019}, url = {https://eprint.iacr.org/2019/100}, } @misc{cryptoeprint:2019:1010, author = {Rishab Goyal and Venkata Koppula and Satyanarayana Vusirikala and Brent Waters}, title = {On Perfect Correctness in (Lockable) Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2019/1010}, year = {2019}, url = {https://eprint.iacr.org/2019/1010}, } @misc{cryptoeprint:2019:1011, author = {Raymond K. Zhao and Ron Steinfeld and Amin Sakzad}, title = {Compact and Scalable Arbitrary-centered Discrete Gaussian Sampling over Integers}, howpublished = {Cryptology ePrint Archive, Report 2019/1011}, year = {2019}, url = {https://eprint.iacr.org/2019/1011}, } @misc{cryptoeprint:2019:1012, author = {Fuyuki Kitagawa and Takahiro Matsuda and Keisuke Tanaka}, title = {Simple and Efficient KDM-CCA Secure Public Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/1012}, year = {2019}, url = {https://eprint.iacr.org/2019/1012}, } @misc{cryptoeprint:2019:1013, author = {Carolyn Whitnall and Elisabeth Oswald}, title = {A Critical Analysis of ISO 17825 (`Testing methods for the mitigation of non-invasive attack classes against cryptographic modules')}, howpublished = {Cryptology ePrint Archive, Report 2019/1013}, year = {2019}, url = {https://eprint.iacr.org/2019/1013}, } @misc{cryptoeprint:2019:1014, author = {Estuardo Alpirez Bock and Chris Brzuska and Marc Fischlin and Christian Janson and Wil Michiels}, title = {Security Reductions for White-Box Key-Storage in Mobile Payments}, howpublished = {Cryptology ePrint Archive, Report 2019/1014}, year = {2019}, url = {https://eprint.iacr.org/2019/1014}, } @misc{cryptoeprint:2019:1015, author = {Eleftherios Kokoris-Kogias and Alexander Spiegelman and Dahlia Malkhi and Ittai Abraham}, title = {Bootstrapping Consensus Without Trusted Setup: Fully Asynchronous Distributed Key Generation}, howpublished = {Cryptology ePrint Archive, Report 2019/1015}, year = {2019}, url = {https://eprint.iacr.org/2019/1015}, } @misc{cryptoeprint:2019:1016, author = {Elena Kirshanova and Erik Mårtensson and Eamonn W. Postlethwaite and Subhayan Roy Moulik}, title = {Quantum Algorithms for the Approximate $k$-List Problem and their Application to Lattice Sieving}, howpublished = {Cryptology ePrint Archive, Report 2019/1016}, year = {2019}, url = {https://eprint.iacr.org/2019/1016}, } @misc{cryptoeprint:2019:1017, author = {Mihir Bellare and Wei Dai and Lucy Li}, title = {The Local Forking Lemma and its Application to Deterministic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/1017}, year = {2019}, url = {https://eprint.iacr.org/2019/1017}, } @misc{cryptoeprint:2019:1018, author = {Julia Kastner and Jiaxin Pan}, title = {Towards Instantiating the Algebraic Group Model}, howpublished = {Cryptology ePrint Archive, Report 2019/1018}, year = {2019}, url = {https://eprint.iacr.org/2019/1018}, } @misc{cryptoeprint:2019:1019, author = {Yongha Son and Jung Hee Cheon}, title = {Revisiting the Hybrid attack on sparse and ternary secret LWE}, howpublished = {Cryptology ePrint Archive, Report 2019/1019}, year = {2019}, url = {https://eprint.iacr.org/2019/1019}, } @misc{cryptoeprint:2019:101, author = {Sergiu Carpov and Nicolas Gama and Mariya Georgieva and Juan Ramon Troncoso-Pastoriza}, title = {Privacy-preserving semi-parallel logistic regression training with Fully Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/101}, year = {2019}, url = {https://eprint.iacr.org/2019/101}, } @misc{cryptoeprint:2019:1020, author = {Alexander Vlasov and Konstantin Panarin}, title = {Transparent Polynomial Commitment Scheme with Polylogarithmic Communication Complexity}, howpublished = {Cryptology ePrint Archive, Report 2019/1020}, year = {2019}, url = {https://eprint.iacr.org/2019/1020}, } @misc{cryptoeprint:2019:1021, author = {Sean Bowe and Jack Grigg and Daira Hopwood}, title = {Halo: Recursive Proof Composition without a Trusted Setup}, howpublished = {Cryptology ePrint Archive, Report 2019/1021}, year = {2019}, url = {https://eprint.iacr.org/2019/1021}, } @misc{cryptoeprint:2019:1022, author = {Jintai Ding and Joshua Deaton and Zheng Zhang and Kurt Schmidt and Vishakha}, title = {A Simple Key Reuse Attack on Ntru Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2019/1022}, year = {2019}, url = {https://eprint.iacr.org/2019/1022}, } @misc{cryptoeprint:2019:1023, author = {Dor Bitan and Shlomi Dolev}, title = {Randomly Rotate Qubits Compute and Reverse --- IT-Secure Non-Interactive Fully-Compact Homomorphic Quantum Computations over Classical Data Using Random Bases}, howpublished = {Cryptology ePrint Archive, Report 2019/1023}, year = {2019}, url = {https://eprint.iacr.org/2019/1023}, } @misc{cryptoeprint:2019:1024, author = {Dor Bitan and Shlomi Dolev}, title = {Optimal-Round Preprocessing-MPC via Polynomial Representation and Distributed Random Matrix (extended abstract)}, howpublished = {Cryptology ePrint Archive, Report 2019/1024}, year = {2019}, url = {https://eprint.iacr.org/2019/1024}, } @misc{cryptoeprint:2019:1025, author = {Gilad Asharov and Naomi Ephraim and Ilan Komargodski and Rafael Pass}, title = {On Perfect Correctness without Derandomization}, howpublished = {Cryptology ePrint Archive, Report 2019/1025}, year = {2019}, url = {https://eprint.iacr.org/2019/1025}, } @misc{cryptoeprint:2019:1026, author = {Mojtaba Khalili and Daniel Slamanig}, title = {Efficient Tightly-Secure Structure-Preserving Signatures and Unbounded Simulation-Sound QA-NIZK Proofs}, howpublished = {Cryptology ePrint Archive, Report 2019/1026}, year = {2019}, url = {https://eprint.iacr.org/2019/1026}, } @misc{cryptoeprint:2019:1027, author = {Marcel Tiepelt and Alan Szepieniec}, title = {Quantum LLL with an Application to Mersenne Number Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2019/1027}, year = {2019}, url = {https://eprint.iacr.org/2019/1027}, } @misc{cryptoeprint:2019:1028, author = {Divesh Aggarwal and Bogdan Ursu and Serge Vaudenay}, title = {Faster Sieving Algorithm for Approximate SVP with Constant Approximation Factors}, howpublished = {Cryptology ePrint Archive, Report 2019/1028}, year = {2019}, url = {https://eprint.iacr.org/2019/1028}, } @misc{cryptoeprint:2019:1029, author = {Yilei Chen and Nicholas Genise and Pratyay Mukherjee}, title = {Approximate Trapdoors for Lattices and Smaller Hash-and-Sign Signatures}, howpublished = {Cryptology ePrint Archive, Report 2019/1029}, year = {2019}, url = {https://eprint.iacr.org/2019/1029}, } @misc{cryptoeprint:2019:102, author = {Hisham S. Galal and Amr M. Youssef}, title = {Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum}, howpublished = {Cryptology ePrint Archive, Report 2019/102}, year = {2019}, url = {https://eprint.iacr.org/2019/102}, } @misc{cryptoeprint:2019:1030, author = {Aayush Jain and Huijia Lin and Christian Matt and Amit Sahai}, title = {How to leverage hardness of constant degree expanding polynomials over R to build iO}, howpublished = {Cryptology ePrint Archive, Report 2019/1030}, year = {2019}, url = {https://eprint.iacr.org/2019/1030}, } @misc{cryptoeprint:2019:1031, author = {Rahim Toluee and Taraneh Eghlidos}, title = {An efficient and secure ID-based multi-proxy multi-signature scheme based on lattice}, howpublished = {Cryptology ePrint Archive, Report 2019/1031}, year = {2019}, url = {https://eprint.iacr.org/2019/1031}, } @misc{cryptoeprint:2019:1032, author = {Shai Halevi and Yuval Ishai and Eyal Kushilevitz and Nikolaos Makriyannis and Tal Rabin}, title = {On Fully Secure MPC with Solitary Output }, howpublished = {Cryptology ePrint Archive, Report 2019/1032}, year = {2019}, url = {https://eprint.iacr.org/2019/1032}, } @misc{cryptoeprint:2019:1033, author = {John Chan and Phillip Rogaway}, title = {Anonymous AE}, howpublished = {Cryptology ePrint Archive, Report 2019/1033}, year = {2019}, url = {https://eprint.iacr.org/2019/1033}, } @misc{cryptoeprint:2019:1034, author = {Jean Paul Degabriele and Christian Janson and Patrick Struck}, title = {Sponges Resist Leakage: The Case of Authenticated Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/1034}, year = {2019}, url = {https://eprint.iacr.org/2019/1034}, } @misc{cryptoeprint:2019:1035, author = {Changmin Lee and Alice Pellet-Mary and Damien Stehlé and Alexandre Wallet}, title = {An LLL Algorithm for Module Lattices}, howpublished = {Cryptology ePrint Archive, Report 2019/1035}, year = {2019}, url = {https://eprint.iacr.org/2019/1035}, } @misc{cryptoeprint:2019:1036, author = {Kazuki Yoneyama}, title = {Post-Quantum Variants of ISO/IEC Standards: Compact Chosen Ciphertext Secure Key Encapsulation Mechanism from Isogenies}, howpublished = {Cryptology ePrint Archive, Report 2019/1036}, year = {2019}, url = {https://eprint.iacr.org/2019/1036}, } @misc{cryptoeprint:2019:1037, author = {Alexander Koch and Michael Schrempp and Michael Kirsten}, title = {Card-based Cryptography Meets Formal Verification}, howpublished = {Cryptology ePrint Archive, Report 2019/1037}, year = {2019}, url = {https://eprint.iacr.org/2019/1037}, } @misc{cryptoeprint:2019:1038, author = {Johannes Blömer and Nils Löken}, title = {Dynamic Searchable Encryption with Access Control}, howpublished = {Cryptology ePrint Archive, Report 2019/1038}, year = {2019}, url = {https://eprint.iacr.org/2019/1038}, } @misc{cryptoeprint:2019:1039, author = {Henrique S. Ogawa and Thomas E. Luther and Jefferson E. Ricardini and Helmiton Cunha and Marcos Simplicio Jr. and Diego F. Aranha and Ruud Derwig and Harsh Kupwade-Patil}, title = {Accelerated V2X provisioning with Extensible Processor Platform}, howpublished = {Cryptology ePrint Archive, Report 2019/1039}, year = {2019}, url = {https://eprint.iacr.org/2019/1039}, } @misc{cryptoeprint:2019:103, author = {Samuel Jaques and John M. Schanck}, title = {Quantum cryptanalysis in the RAM model: Claw-finding attacks on SIKE}, howpublished = {Cryptology ePrint Archive, Report 2019/103}, year = {2019}, url = {https://eprint.iacr.org/2019/103}, } @misc{cryptoeprint:2019:1040, author = {Abhishek Chakraborty and Ankur Srivastava}, title = {Hardware-Software Co-Design Based Obfuscation of Hardware Accelerators}, howpublished = {Cryptology ePrint Archive, Report 2019/1040}, year = {2019}, url = {https://eprint.iacr.org/2019/1040}, } @misc{cryptoeprint:2019:1041, author = {Swapnil Paliwal and Anvita Chandrakar}, title = {A Conditional Privacy Preserving Authentication and Multi Party Group Key Establishment Scheme for Real-Time Application in VANETs}, howpublished = {Cryptology ePrint Archive, Report 2019/1041}, year = {2019}, url = {https://eprint.iacr.org/2019/1041}, } @misc{cryptoeprint:2019:1042, author = {José Bacelar Almeida and Manuel Barbosa and Gilles Barthe and Matthew Campagna and Ernie Cohen and Benjamin Gregoire and Vitor Pereira and Bernardo Portela and Pierre-Yves Strub and Serdar Tasiran}, title = {A Machine-Checked Proof of Security for AWS Key Management Service}, howpublished = {Cryptology ePrint Archive, Report 2019/1042}, year = {2019}, url = {https://eprint.iacr.org/2019/1042}, } @misc{cryptoeprint:2019:1043, author = {Eli Biham and Lior Neumann}, title = {Breaking the Bluetooth Pairing – The Fixed Coordinate Invalid Curve Attack}, howpublished = {Cryptology ePrint Archive, Report 2019/1043}, year = {2019}, url = {https://eprint.iacr.org/2019/1043}, } @misc{cryptoeprint:2019:1044, author = {Rishab Goyal and Satyanarayana Vusirikala}, title = {Verifiable Registration-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/1044}, year = {2019}, url = {https://eprint.iacr.org/2019/1044}, } @misc{cryptoeprint:2019:1045, author = {Josh Alman and Robin Hui}, title = {Predicate Encryption from Bilinear Maps and One-Sided Probabilistic Rank}, howpublished = {Cryptology ePrint Archive, Report 2019/1045}, year = {2019}, url = {https://eprint.iacr.org/2019/1045}, } @misc{cryptoeprint:2019:1046, author = {Henry Corrigan-Gibbs and Dmitry Kogan}, title = {The Function-Inversion Problem: Barriers and Opportunities}, howpublished = {Cryptology ePrint Archive, Report 2019/1046}, year = {2019}, url = {https://eprint.iacr.org/2019/1046}, } @misc{cryptoeprint:2019:1047, author = {Alessandro Chiesa and Yuncong Hu and Mary Maller and Pratyush Mishra and Noah Vesely and Nicholas Ward}, title = {Marlin: Preprocessing zkSNARKs with Universal and Updatable SRS}, howpublished = {Cryptology ePrint Archive, Report 2019/1047}, year = {2019}, url = {https://eprint.iacr.org/2019/1047}, } @misc{cryptoeprint:2019:1048, author = {Dmitrii Koshelev}, title = {A new elliptic curve point compression method based on $\mathbb{F}_{\!p}$-rationality of some generalized Kummer surfaces}, howpublished = {Cryptology ePrint Archive, Report 2019/1048}, year = {2019}, url = {https://eprint.iacr.org/2019/1048}, } @misc{cryptoeprint:2019:1049, author = {Nishant Kumar and Mayank Rathee and Nishanth Chandran and Divya Gupta and Aseem Rastogi and Rahul Sharma}, title = {CrypTFlow: Secure TensorFlow Inference}, howpublished = {Cryptology ePrint Archive, Report 2019/1049}, year = {2019}, url = {https://eprint.iacr.org/2019/1049}, } @misc{cryptoeprint:2019:104, author = {Naomi Farley and Robert Fitzpatrick and Duncan Jones}, title = {BADGER - Blockchain Auditable Distributed (RSA) key GEneRation}, howpublished = {Cryptology ePrint Archive, Report 2019/104}, year = {2019}, url = {https://eprint.iacr.org/2019/104}, } @misc{cryptoeprint:2019:1050, author = {Abderrahmane Nitaj and Emmanuel Fouotsa}, title = {A New Attack on RSA and Demytko's Elliptic Curve Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2019/1050}, year = {2019}, url = {https://eprint.iacr.org/2019/1050}, } @misc{cryptoeprint:2019:1051, author = {Maher Boudabra and Abderrahmane Nitaj}, title = {A New Public Key Cryptosystem Based on Edwards Curves}, howpublished = {Cryptology ePrint Archive, Report 2019/1051}, year = {2019}, url = {https://eprint.iacr.org/2019/1051}, } @misc{cryptoeprint:2019:1052, author = {Abderrahmane Nitaj and Willy Susilo and Joseph Tonien}, title = {Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2019/1052}, year = {2019}, url = {https://eprint.iacr.org/2019/1052}, } @misc{cryptoeprint:2019:1053, author = {Marc Fischlin and Felix Günther}, title = {Modeling Memory Faults in Signature and Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2019/1053}, year = {2019}, url = {https://eprint.iacr.org/2019/1053}, } @misc{cryptoeprint:2019:1054, author = {David Cerezo Sánchez}, title = {Truthful and Faithful Monetary Policy for a Stablecoin Conducted by a Decentralised, Encrypted Artificial Intelligence}, howpublished = {Cryptology ePrint Archive, Report 2019/1054}, year = {2019}, url = {https://eprint.iacr.org/2019/1054}, } @misc{cryptoeprint:2019:1055, author = {Cong Zuo and Shi-Feng Sun and Joseph K. Liu and Jun Shao and Josef Pieprzyk}, title = {Dynamic Searchable Symmetric Encryption with Forward and Stronger Backward Privacy}, howpublished = {Cryptology ePrint Archive, Report 2019/1055}, year = {2019}, url = {https://eprint.iacr.org/2019/1055}, } @misc{cryptoeprint:2019:1056, author = {Sarah Arpin and Catalina Camacho-Navarro and Kristin Lauter and Joelle Lim and Kristina Nelson and Travis Scholl and Jana Sotáková}, title = {Adventures in Supersingularland}, howpublished = {Cryptology ePrint Archive, Report 2019/1056}, year = {2019}, url = {https://eprint.iacr.org/2019/1056}, } @misc{cryptoeprint:2019:1057, author = {Andrea Caforio and Subhadeep Banik}, title = {A Study of Persistent Fault Analysis}, howpublished = {Cryptology ePrint Archive, Report 2019/1057}, year = {2019}, url = {https://eprint.iacr.org/2019/1057}, } @misc{cryptoeprint:2019:1058, author = {Elli Androulaki and Jan Camenisch and Angelo De Caro and Maria Dubovitskaya and Kaoutar Elkhiyaoui and Bjoern Tackmann}, title = {Privacy-preserving auditable token payments in a permissioned blockchain system}, howpublished = {Cryptology ePrint Archive, Report 2019/1058}, year = {2019}, url = {https://eprint.iacr.org/2019/1058}, } @misc{cryptoeprint:2019:1059, author = {Daniele Di Tullio and Ankan Pal}, title = {A New Method for Geometric Interpretation of Elliptic Curve Discrete Logarithm Problem}, howpublished = {Cryptology ePrint Archive, Report 2019/1059}, year = {2019}, url = {https://eprint.iacr.org/2019/1059}, } @misc{cryptoeprint:2019:105, author = {Antonio Faonio and Daniele Venturi}, title = {Non-Malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate}, howpublished = {Cryptology ePrint Archive, Report 2019/105}, year = {2019}, url = {https://eprint.iacr.org/2019/105}, } @misc{cryptoeprint:2019:1060, author = {Daniele Cozzo and Nigel P. smart}, title = {Sharing the LUOV: Threshold Post-Quantum Signatures}, howpublished = {Cryptology ePrint Archive, Report 2019/1060}, year = {2019}, url = {https://eprint.iacr.org/2019/1060}, } @misc{cryptoeprint:2019:1061, author = {Ulrich Haböck and Stephan Krenn}, title = {Breaking and Fixing Anonymous Credentials for the Cloud (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2019/1061}, year = {2019}, url = {https://eprint.iacr.org/2019/1061}, } @misc{cryptoeprint:2019:1062, author = {Noga Ron-Zewi and Ron D. Rothblum}, title = {Local Proofs Approaching the Witness Length}, howpublished = {Cryptology ePrint Archive, Report 2019/1062}, year = {2019}, url = {https://eprint.iacr.org/2019/1062}, } @misc{cryptoeprint:2019:1063, author = {Behzad Abdolmaleki and Hamidreza Khoshakhlagh and Daniel Slamanig}, title = {A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing}, howpublished = {Cryptology ePrint Archive, Report 2019/1063}, year = {2019}, url = {https://eprint.iacr.org/2019/1063}, } @misc{cryptoeprint:2019:1064, author = {Julia Hesse}, title = {Separating Standard and Asymmetric Password-Authenticated Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2019/1064}, year = {2019}, url = {https://eprint.iacr.org/2019/1064}, } @misc{cryptoeprint:2019:1065, author = {Karim Baghery}, title = {Subversion-Resistant Commitment Schemes: Definitions and Constructions}, howpublished = {Cryptology ePrint Archive, Report 2019/1065}, year = {2019}, url = {https://eprint.iacr.org/2019/1065}, } @misc{cryptoeprint:2019:1066, author = {M. Sadegh Riazi and Kim Laine and Blake Pelton and Wei Dai}, title = {HEAX: High-Performance Architecture for Computation on Homomorphically Encrypted Data in the Cloud}, howpublished = {Cryptology ePrint Archive, Report 2019/1066}, year = {2019}, url = {https://eprint.iacr.org/2019/1066}, } @misc{cryptoeprint:2019:1067, author = {Alex Lombardi and Vinod Vaikuntanathan and Thuy Duong Vuong}, title = {Lattice Trapdoors and IBE from Middle-Product LWE}, howpublished = {Cryptology ePrint Archive, Report 2019/1067}, year = {2019}, url = {https://eprint.iacr.org/2019/1067}, } @misc{cryptoeprint:2019:1068, author = {Joey Green and Tilo Burghardt and Elisabeth Oswald }, title = {Not a Free Lunch but a Cheap Lunch: Experimental Results for Training Many Neural Nets}, howpublished = {Cryptology ePrint Archive, Report 2019/1068}, year = {2019}, url = {https://eprint.iacr.org/2019/1068}, } @misc{cryptoeprint:2019:1069, author = {Yoshiki Abe and Mitsugu Iwamoto and Kazuo Ohta}, title = {Efficient Private PEZ Protocols for Symmetric Functions}, howpublished = {Cryptology ePrint Archive, Report 2019/1069}, year = {2019}, url = {https://eprint.iacr.org/2019/1069}, } @misc{cryptoeprint:2019:106, author = {Hongbing Wang and Yunlei Zhao}, title = {Identity-Based Higncryption}, howpublished = {Cryptology ePrint Archive, Report 2019/106}, year = {2019}, url = {https://eprint.iacr.org/2019/106}, } @misc{cryptoeprint:2019:1070, author = {Robi Pedersen and Osmanbey Uzunkol}, title = {Secure Delegation of Isogeny Computations and Cryptographic Applications}, howpublished = {Cryptology ePrint Archive, Report 2019/1070}, year = {2019}, url = {https://eprint.iacr.org/2019/1070}, } @misc{cryptoeprint:2019:1071, author = {Martin Brisfors and Sebastian Forsmark}, title = {DLSCA: a Tool for Deep Learning Side Channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2019/1071}, year = {2019}, url = {https://eprint.iacr.org/2019/1071}, } @misc{cryptoeprint:2019:1072, author = {Nico Döttling and Sanjam Garg and Mohammad Hajiabadi and Kevin Liu and Giulio Malavolta}, title = {Rate-1 Trapdoor Functions from the Diffie-Hellman Problem}, howpublished = {Cryptology ePrint Archive, Report 2019/1072}, year = {2019}, url = {https://eprint.iacr.org/2019/1072}, } @misc{cryptoeprint:2019:1073, author = {Jan Camenisch and Stephan Krenn and Ralf Kuesters and Daniel Rausch}, title = {iUC: Flexible Universal Composability Made Simple}, howpublished = {Cryptology ePrint Archive, Report 2019/1073}, year = {2019}, url = {https://eprint.iacr.org/2019/1073}, } @misc{cryptoeprint:2019:1074, author = {Dirk Thatmann}, title = {Non-monotonic Practical ABE with Direct Revocation, Blackbox Tracability, and a Large Attribute Universe}, howpublished = {Cryptology ePrint Archive, Report 2019/1074}, year = {2019}, url = {https://eprint.iacr.org/2019/1074}, } @misc{cryptoeprint:2019:1075, author = {Henry Corrigan-Gibbs and Dmitry Kogan}, title = {Private Information Retrieval with Sublinear Online Time}, howpublished = {Cryptology ePrint Archive, Report 2019/1075}, year = {2019}, url = {https://eprint.iacr.org/2019/1075}, } @misc{cryptoeprint:2019:1076, author = {Alessandro Chiesa and Dev Ojha and Nicholas Spooner}, title = {Fractal: Post-Quantum and Transparent Recursive Proofs from Holography}, howpublished = {Cryptology ePrint Archive, Report 2019/1076}, year = {2019}, url = {https://eprint.iacr.org/2019/1076}, } @misc{cryptoeprint:2019:1077, author = {Kai-Min Chung; Luowen Qian}, title = {Adaptively Secure Garbling Schemes for Parallel Computations}, howpublished = {Cryptology ePrint Archive, Report 2019/1077}, year = {2019}, url = {https://eprint.iacr.org/2019/1077}, } @misc{cryptoeprint:2019:1078, author = {Tran Viet Xuan Phuong and Willy Susilo and Jongkil Kim and Guomin Yang and Dongxi Liu}, title = {Puncturable Proxy Re-Encryption supporting to Group Messaging Service}, howpublished = {Cryptology ePrint Archive, Report 2019/1078}, year = {2019}, url = {https://eprint.iacr.org/2019/1078}, } @misc{cryptoeprint:2019:1079, author = {Yiming Zhu and Yanbin Pan and Zhen Liu}, title = {When NTT Meets Karatsuba: Preprocess-then-NTT Technique Revisited}, howpublished = {Cryptology ePrint Archive, Report 2019/1079}, year = {2019}, url = {https://eprint.iacr.org/2019/1079}, } @misc{cryptoeprint:2019:107, author = {Shun Li and Siwei Sun and Chaoyun Li and Zihao Wei and Lei Hu}, title = {Constructing Low-latency Involutory MDS Matrices with Lightweight Circuit}, howpublished = {Cryptology ePrint Archive, Report 2019/107}, year = {2019}, url = {https://eprint.iacr.org/2019/107}, } @misc{cryptoeprint:2019:1080, author = {Fukang Liu and Takanori Isobe and Willi Meier}, title = {Preimages and Collisions for Up to 5-Round Gimli-Hash Using Divide-and-Conquer Methods}, howpublished = {Cryptology ePrint Archive, Report 2019/1080}, year = {2019}, url = {https://eprint.iacr.org/2019/1080}, } @misc{cryptoeprint:2019:1081, author = {Raymond Chee and Kartik Chitturi and Edouard Dufour-Sans and Kyle Soska}, title = {OCEAN: A Built-In Replacement for Mining Pools}, howpublished = {Cryptology ePrint Archive, Report 2019/1081}, year = {2019}, url = {https://eprint.iacr.org/2019/1081}, } @misc{cryptoeprint:2019:1082, author = {Hyang-Sook Lee and Jeongeun Park}, title = {On the Security of Multikey Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/1082}, year = {2019}, url = {https://eprint.iacr.org/2019/1082}, } @misc{cryptoeprint:2019:1083, author = {Eman Salem Alashwali and Kasper Rasmussen}, title = {What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS}, howpublished = {Cryptology ePrint Archive, Report 2019/1083}, year = {2019}, url = {https://eprint.iacr.org/2019/1083}, } @misc{cryptoeprint:2019:1084, author = {Phillipp Schoppmann and Adrià Gascón and Leonie Reichert and Mariana Raykova}, title = {Distributed Vector-OLE: Improved Constructions and Implementation}, howpublished = {Cryptology ePrint Archive, Report 2019/1084}, year = {2019}, url = {https://eprint.iacr.org/2019/1084}, } @misc{cryptoeprint:2019:1085, author = {Yilei Chen and Minki Hhan and Vinod Vaikuntanathan and Hoeteck Wee}, title = {Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2019/1085}, year = {2019}, url = {https://eprint.iacr.org/2019/1085}, } @misc{cryptoeprint:2019:1086, author = {Daniel J. Bernstein and Andreas Hülsing and Stefan Kölbl and Ruben Niederhagen and Joost Rijneveld and Peter Schwabe}, title = {The SPHINCS+ Signature Framework}, howpublished = {Cryptology ePrint Archive, Report 2019/1086}, year = {2019}, url = {https://eprint.iacr.org/2019/1086}, } @misc{cryptoeprint:2019:1087, author = {Shyam Murthy and Srinivas Vivek}, title = {Cryptanalysis of a Protocol for Efficient Sorting on SHE Encrypted Data }, howpublished = {Cryptology ePrint Archive, Report 2019/1087}, year = {2019}, url = {https://eprint.iacr.org/2019/1087}, } @misc{cryptoeprint:2019:1088, author = {Clinton Ehrlich and Anna Guzova}, title = {KRNC: New Foundations for Permissionless Byzantine Consensus and Global Monetary Stability }, howpublished = {Cryptology ePrint Archive, Report 2019/1088}, year = {2019}, url = {https://eprint.iacr.org/2019/1088}, } @misc{cryptoeprint:2019:1089, author = {Josiah Johnson Umezurike}, title = {Lattice-Face Key Infrastructure (LFKI) for Quantum Resistant Computing}, howpublished = {Cryptology ePrint Archive, Report 2019/1089}, year = {2019}, url = {https://eprint.iacr.org/2019/1089}, } @misc{cryptoeprint:2019:108, author = {Navid Alamati and Hart Montgomery and Sikhar Patranabis and Arnab Roy}, title = {Minicrypt Primitives with Algebraic Structure and Applications}, howpublished = {Cryptology ePrint Archive, Report 2019/108}, year = {2019}, url = {https://eprint.iacr.org/2019/108}, } @misc{cryptoeprint:2019:1090, author = {Xinggu Chen and Haining Fan}, title = {Low Complexity MDS Matrices Using $GF(2^n)$ SPB or GPB}, howpublished = {Cryptology ePrint Archive, Report 2019/1090}, year = {2019}, url = {https://eprint.iacr.org/2019/1090}, } @misc{cryptoeprint:2019:1091, author = {Nils Wisiol and Niklas Pirnay}, title = {Short Paper: XOR Arbiter PUFs have Systematic Response Bias}, howpublished = {Cryptology ePrint Archive, Report 2019/1091}, year = {2019}, url = {https://eprint.iacr.org/2019/1091}, } @misc{cryptoeprint:2019:1092, author = {Georgia Avarikioti and Orfeas Stefanos Thyfronitis Litos and Roger Wattenhofer}, title = {Cerberus Channels: Incentivizing Watchtowers for Bitcoin}, howpublished = {Cryptology ePrint Archive, Report 2019/1092}, year = {2019}, url = {https://eprint.iacr.org/2019/1092}, } @misc{cryptoeprint:2019:1093, author = {Minki Hhan and Keita Xagawa and Takashi Yamakawa}, title = {Quantum Random Oracle Model with Auxiliary Input}, howpublished = {Cryptology ePrint Archive, Report 2019/1093}, year = {2019}, url = {https://eprint.iacr.org/2019/1093}, } @misc{cryptoeprint:2019:1094, author = {Marshall Ball and Elette Boyle and Ran Cohen and Tal Malkin and Tal Moran}, title = {Is Information-Theoretic Topology-Hiding Computation Possible?}, howpublished = {Cryptology ePrint Archive, Report 2019/1094}, year = {2019}, url = {https://eprint.iacr.org/2019/1094}, } @misc{cryptoeprint:2019:1095, author = {Elette Boyle and Niv Gilboa and Yuval Ishai}, title = {Secure Computation with Preprocessing via Function Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2019/1095}, year = {2019}, url = {https://eprint.iacr.org/2019/1095}, } @misc{cryptoeprint:2019:1096, author = {Kostis Karantias and Aggelos Kiayias and Dionysis Zindros}, title = {Proof-of-Burn}, howpublished = {Cryptology ePrint Archive, Report 2019/1096}, year = {2019}, url = {https://eprint.iacr.org/2019/1096}, } @misc{cryptoeprint:2019:1097, author = {Dmytro Bogatov and Angelo De Caro and Kaoutar Elkhiyaoui and Björn Tackmann}, title = {Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric}, howpublished = {Cryptology ePrint Archive, Report 2019/1097}, year = {2019}, url = {https://eprint.iacr.org/2019/1097}, } @misc{cryptoeprint:2019:1098, author = {Eleftheria Makri and Tim Wood }, title = {Full-Threshold Actively-Secure Multiparty Arithmetic Circuit Garbling}, howpublished = {Cryptology ePrint Archive, Report 2019/1098}, year = {2019}, url = {https://eprint.iacr.org/2019/1098}, } @misc{cryptoeprint:2019:1099, author = {Eman Salem Alashwali and Kasper Rasmussen}, title = {On the Feasibility of Fine-Grained TLS Security Configurations in Web Browsers Based on the Requested Domain Name}, howpublished = {Cryptology ePrint Archive, Report 2019/1099}, year = {2019}, url = {https://eprint.iacr.org/2019/1099}, } @misc{cryptoeprint:2019:109, author = {Ahmet Can Mert and Erdinc Ozturk and Erkay Savas}, title = {Design and Implementation of a Fast and Scalable NTT-Based Polynomial Multiplier Architecture}, howpublished = {Cryptology ePrint Archive, Report 2019/109}, year = {2019}, url = {https://eprint.iacr.org/2019/109}, } @misc{cryptoeprint:2019:1100, author = {Qi Chen and Chunming Tang and Zhiqiang Lin}, title = {Efficient Explicit Constructions of Multipartite Secret Sharing Schemes}, howpublished = {Cryptology ePrint Archive, Report 2019/1100}, year = {2019}, url = {https://eprint.iacr.org/2019/1100}, } @misc{cryptoeprint:2019:1101, author = {Jiang Zhang and Yu Yu and Dengguo Feng and Shuqin Fan and Zhenfeng Zhang}, title = {On the (Quantum) Random Oracle Methodology: New Separations and More}, howpublished = {Cryptology ePrint Archive, Report 2019/1101}, year = {2019}, url = {https://eprint.iacr.org/2019/1101}, } @misc{cryptoeprint:2019:1102, author = {Wulu Li and Lei Chen and Xin Lai and Xiao Zhang and Jiajun Xin}, title = {Applications on traceable range proofs from fully regulatable privacy-preserving blockchains}, howpublished = {Cryptology ePrint Archive, Report 2019/1102}, year = {2019}, url = {https://eprint.iacr.org/2019/1102}, } @misc{cryptoeprint:2019:1103, author = {Rahul Chatterjee and M. Sadegh Riazi and Tanmoy Chowdhury and Emanuela Marasco and Farinaz Koushanfar and Ari Juels}, title = {Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2019/1103}, year = {2019}, url = {https://eprint.iacr.org/2019/1103}, } @misc{cryptoeprint:2019:1104, author = {Kang Yang and Xiao Wang and Jiang Zhang}, title = {More Efficient MPC from Improved Triple Generation and Authenticated Garbling}, howpublished = {Cryptology ePrint Archive, Report 2019/1104}, year = {2019}, url = {https://eprint.iacr.org/2019/1104}, } @misc{cryptoeprint:2019:1105, author = {Jeremiah Blocki and Seunghoon Lee}, title = {On the Multi-User Security of Short Schnorr Signatures}, howpublished = {Cryptology ePrint Archive, Report 2019/1105}, year = {2019}, url = {https://eprint.iacr.org/2019/1105}, } @misc{cryptoeprint:2019:1106, author = {Jean-Sébastien Coron and Aurélien Greuet and Rina Zeitoun}, title = {Side-channel Masking with Pseudo-Random Generator}, howpublished = {Cryptology ePrint Archive, Report 2019/1106}, year = {2019}, url = {https://eprint.iacr.org/2019/1106}, } @misc{cryptoeprint:2019:1107, author = {Lorenzo Grassi and Reinhard Lüftenegger and Christian Rechberger and Dragos Rotaru and Markus Schofnegger}, title = {On a Generalization of Substitution-Permutation Networks: The HADES Design Strategy}, howpublished = {Cryptology ePrint Archive, Report 2019/1107}, year = {2019}, url = {https://eprint.iacr.org/2019/1107}, } @misc{cryptoeprint:2019:1108, author = {Kasper Green Larsen and Mark Simkin and Kevin Yeo}, title = {Lower Bounds for Multi-Server Oblivious RAMs}, howpublished = {Cryptology ePrint Archive, Report 2019/1108}, year = {2019}, url = {https://eprint.iacr.org/2019/1108}, } @misc{cryptoeprint:2019:1109, author = {Alberto Pedrouzo-Ulloa and Juan Ramón Troncoso-Pastoriza and Nicolas Gama and Mariya Georgieva and Fernando Pérez-González}, title = {Revisiting Multivariate Ring Learning with Errors and its Applications on Lattice-based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2019/1109}, year = {2019}, url = {https://eprint.iacr.org/2019/1109}, } @misc{cryptoeprint:2019:110, author = {Suhri Kim and Kisoon Yoon and Young-Ho Park and Seokhie Hong}, title = {Optimized Method for Computing Odd-Degree Isogenies on Edwards Curves}, howpublished = {Cryptology ePrint Archive, Report 2019/110}, year = {2019}, url = {https://eprint.iacr.org/2019/110}, } @misc{cryptoeprint:2019:1110, author = {Jing Xu and Xinyu Li and Lingyuan Yin and Bingyong Guo and Han Feng and Zhenfeng Zhang}, title = {Redactable Proof-of-Stake Blockchain with Fast Confirmation}, howpublished = {Cryptology ePrint Archive, Report 2019/1110}, year = {2019}, url = {https://eprint.iacr.org/2019/1110}, } @misc{cryptoeprint:2019:1111, author = {Mikerah Quintyne-Collins}, title = {Short Paper: Towards Characterizing Sybil Attacks in Cryptocurrency Mixers}, howpublished = {Cryptology ePrint Archive, Report 2019/1111}, year = {2019}, url = {https://eprint.iacr.org/2019/1111}, } @misc{cryptoeprint:2019:1112, author = {George Teseleanu}, title = {Subliminal Hash Channels}, howpublished = {Cryptology ePrint Archive, Report 2019/1112}, year = {2019}, url = {https://eprint.iacr.org/2019/1112}, } @misc{cryptoeprint:2019:1113, author = {Oliver Masters and Hamish Hunt and Enrico Steffinlongo and Jack Crawford and Flavio Bergamaschi}, title = {Towards a Homomorphic Machine Learning Big Data Pipeline for the Financial Services Sector}, howpublished = {Cryptology ePrint Archive, Report 2019/1113}, year = {2019}, url = {https://eprint.iacr.org/2019/1113}, } @misc{cryptoeprint:2019:1114, author = {Jung Hee Cheon and Minki Hhan and Seungwan Hong and Yongha Son}, title = {A Hybrid of Dual and Meet-in-the-Middle Attack on Sparse and Ternary Secret LWE}, howpublished = {Cryptology ePrint Archive, Report 2019/1114}, year = {2019}, url = {https://eprint.iacr.org/2019/1114}, } @misc{cryptoeprint:2019:1115, author = {Rui Zong and Xiaoyang Dong and Xiaoyun Wang}, title = {Collision Attacks on Round-Reduced Gimli-Hash/Ascon-Xof/Ascon-Hash}, howpublished = {Cryptology ePrint Archive, Report 2019/1115}, year = {2019}, url = {https://eprint.iacr.org/2019/1115}, } @misc{cryptoeprint:2019:1116, author = {Ankit Garg and Yael Tauman Kalai and Dakshita Khurana}, title = {Computational Extractors with Negligible Error in the CRS Model}, howpublished = {Cryptology ePrint Archive, Report 2019/1116}, year = {2019}, url = {https://eprint.iacr.org/2019/1116}, } @misc{cryptoeprint:2019:1117, author = {Yen-Lung Lai}, title = {NP-completeness Reduction for Semiprimes Factorization Problem}, howpublished = {Cryptology ePrint Archive, Report 2019/1117}, year = {2019}, url = {https://eprint.iacr.org/2019/1117}, } @misc{cryptoeprint:2019:1118, author = {Yalin Chen and Chang Hsiang and Liang-Chun Wang and Yu-Yuan Chou and Jue-Sam Chou *}, title = {A Diffie-Hellman quantum session key establishment protocol without entanglement}, howpublished = {Cryptology ePrint Archive, Report 2019/1118}, year = {2019}, url = {https://eprint.iacr.org/2019/1118}, } @misc{cryptoeprint:2019:1119, author = {Antonis Michalas and Alexandros Bakas and Hai-Van Dang and Alexandr Zalitko}, title = {MicroSCOPE: Enabling Access Control in Searchable Encryption with the use of Attribute-based Encryption and SGX (Extended Version)}, howpublished = {Cryptology ePrint Archive, Report 2019/1119}, year = {2019}, url = {https://eprint.iacr.org/2019/1119}, } @misc{cryptoeprint:2019:111, author = {Yin Li and Yu Zhang and Xingpo Ma and Chuanda Qi}, title = {On the Complexity of non-recursive $n$-term Karatsuba Multiplier for Trinomials}, howpublished = {Cryptology ePrint Archive, Report 2019/111}, year = {2019}, url = {https://eprint.iacr.org/2019/111}, } @misc{cryptoeprint:2019:1120, author = {Mojtaba Khalili and Daniel Slamanig and Mohammad Dakhilalian}, title = {Structure-Preserving Signatures on Equivalence Classes From Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2019/1120}, year = {2019}, url = {https://eprint.iacr.org/2019/1120}, } @misc{cryptoeprint:2019:1121, author = {Aaron Hutchinson and Jason LeGrow and Brian Koziel and Reza Azarderakhsh}, title = {Further Optimizations of CSIDH: A Systematic Approach to Efficient Strategies, Permutations, and Bound Vectors}, howpublished = {Cryptology ePrint Archive, Report 2019/1121}, year = {2019}, url = {https://eprint.iacr.org/2019/1121}, } @misc{cryptoeprint:2019:1122, author = {Martin R. Albrecht and Benjamin R. Curtis and Thomas Wunderer}, title = {Exploring Trade-offs in Batch Bounded Distance Decoding}, howpublished = {Cryptology ePrint Archive, Report 2019/1122}, year = {2019}, url = {https://eprint.iacr.org/2019/1122}, } @misc{cryptoeprint:2019:1123, author = {Laltu Sardar and Sushmita Ruj}, title = {FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE scheme}, howpublished = {Cryptology ePrint Archive, Report 2019/1123}, year = {2019}, url = {https://eprint.iacr.org/2019/1123}, } @misc{cryptoeprint:2019:1124, author = {Amos Beimel and Hussien Othman}, title = {Evolving Ramp Secret Sharing with a Small Gap}, howpublished = {Cryptology ePrint Archive, Report 2019/1124}, year = {2019}, url = {https://eprint.iacr.org/2019/1124}, } @misc{cryptoeprint:2019:1125, author = {Karim Baghery and Behzad Abdolmaleki and Shahram Khazaei and Mohammad Reza Aref}, title = {Breaking Anonymity of Some Recent Lightweight RFID Authentication Protocols}, howpublished = {Cryptology ePrint Archive, Report 2019/1125}, year = {2019}, url = {https://eprint.iacr.org/2019/1125}, } @misc{cryptoeprint:2019:1126, author = {Archita Agarwal and Seny Kamara}, title = {Encrypted Distributed Hash Tables}, howpublished = {Cryptology ePrint Archive, Report 2019/1126}, year = {2019}, url = {https://eprint.iacr.org/2019/1126}, } @misc{cryptoeprint:2019:1127, author = {Kazuhiko Minematsu and Norifumi Kamiya}, title = {Symmetric-key Corruption Detection : When XOR-MACs Meet Combinatorial Group Testing}, howpublished = {Cryptology ePrint Archive, Report 2019/1127}, year = {2019}, url = {https://eprint.iacr.org/2019/1127}, } @misc{cryptoeprint:2019:1128, author = {Alexei Zamyatin and Mustafa Al-Bassam and Dionysis Zindros and Eleftherios Kokoris-Kogias and Pedro Moreno-Sanchez and Aggelos Kiayias and William J. Knottenbelt}, title = {SoK: Communication Across Distributed Ledgers}, howpublished = {Cryptology ePrint Archive, Report 2019/1128}, year = {2019}, url = {https://eprint.iacr.org/2019/1128}, } @misc{cryptoeprint:2019:1129, author = {Tilen Marc and Miha Stopar and Jan Hartman and Manca Bizjak and Jolanda Modic}, title = {Privacy-Enhanced Machine Learning with Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/1129}, year = {2019}, url = {https://eprint.iacr.org/2019/1129}, } @misc{cryptoeprint:2019:112, author = {Bjørn Greve and Øyvind Ytrehus and Håvard Raddum}, title = {Variable Elimination - a Tool for Algebraic Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2019/112}, year = {2019}, url = {https://eprint.iacr.org/2019/112}, } @misc{cryptoeprint:2019:1130, author = {V. Ustimenko }, title = {On affine Cremona semigroups, corresponding protocols of Non-commutative Cryptography and encryption with several nonlinear multivariate transformations on secure Eulerian mode.}, howpublished = {Cryptology ePrint Archive, Report 2019/1130}, year = {2019}, url = {https://eprint.iacr.org/2019/1130}, } @misc{cryptoeprint:2019:1131, author = {Pasin Manurangsi and Akshayaram Srinivasan and Prashant Nalini Vasudevan}, title = {Nearly Optimal Robust Secret Sharing against Rushing Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2019/1131}, year = {2019}, url = {https://eprint.iacr.org/2019/1131}, } @misc{cryptoeprint:2019:1132, author = {Sarvar Patel and Giuseppe Persiano and Kevin Yeo}, title = {Leakage Cell Probe Model: Lower Bounds for Key-Equality Mitigation in Encrypted Multi-Maps}, howpublished = {Cryptology ePrint Archive, Report 2019/1132}, year = {2019}, url = {https://eprint.iacr.org/2019/1132}, } @misc{cryptoeprint:2019:1133, author = {Gang Wang}, title = {Threat Models and Security of Phase-Change Memory}, howpublished = {Cryptology ePrint Archive, Report 2019/1133}, year = {2019}, url = {https://eprint.iacr.org/2019/1133}, } @misc{cryptoeprint:2019:1134, author = {Ronald Cramer and Chaoping Xing}, title = {Blackbox Secret Sharing Revisited: A Coding-Theoretic Approach with Application to Expansionless Near-Threshold Schemes}, howpublished = {Cryptology ePrint Archive, Report 2019/1134}, year = {2019}, url = {https://eprint.iacr.org/2019/1134}, } @misc{cryptoeprint:2019:1135, author = {Arinjita Paul and S. Sharmila Deva Selvi and C. Pandu Rangan}, title = {A Provably Secure Conditional Proxy Re-Encryption Scheme without Pairing}, howpublished = {Cryptology ePrint Archive, Report 2019/1135}, year = {2019}, url = {https://eprint.iacr.org/2019/1135}, } @misc{cryptoeprint:2019:1136, author = {Thijs Veugen and Thomas Attema and Gabriele Spini}, title = {An implementation of the Paillier crypto system with threshold decryption without a trusted dealer}, howpublished = {Cryptology ePrint Archive, Report 2019/1136}, year = {2019}, url = {https://eprint.iacr.org/2019/1136}, } @misc{cryptoeprint:2019:1137, author = {Ronald Cramer and Chaoping Xing and Chen Yuan}, title = {On the Complexity of Arithmetic Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2019/1137}, year = {2019}, url = {https://eprint.iacr.org/2019/1137}, } @misc{cryptoeprint:2019:1138, author = {Gang Wang and Zhijie Jerry Shi and Mark Nixon and Song Han}, title = {ChainSplitter: Towards Blockchain-based Industrial IoT Architecture for Supporting Hierarchical Storage}, howpublished = {Cryptology ePrint Archive, Report 2019/1138}, year = {2019}, url = {https://eprint.iacr.org/2019/1138}, } @misc{cryptoeprint:2019:1139, author = {Mingchao Yu and Saeid Sahraei and Songze Li and Salman Avestimehr and Sreeram Kannan and Pramod Viswanath}, title = {Coded Merkle Tree: Solving Data Availability Attacks in Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2019/1139}, year = {2019}, url = {https://eprint.iacr.org/2019/1139}, } @misc{cryptoeprint:2019:113, author = {Ferucio Laurentiu Tiplea and Cristian Hristea}, title = {Privacy and Reader-first Authentication in Vaudenay's RFID Model with Temporary State Disclosure}, howpublished = {Cryptology ePrint Archive, Report 2019/113}, year = {2019}, url = {https://eprint.iacr.org/2019/113}, } @misc{cryptoeprint:2019:1140, author = {Utsav Banerjee and Tenzin S. Ukyab and Anantha P. Chandrakasan}, title = {Sapphire: A Configurable Crypto-Processor for Post-Quantum Lattice-based Protocols (Extended Version)}, howpublished = {Cryptology ePrint Archive, Report 2019/1140}, year = {2019}, url = {https://eprint.iacr.org/2019/1140}, } @misc{cryptoeprint:2019:1141, author = {Murat Yasin Kubilay and Mehmet Sabir Kiraz and Haci Ali Mantar and Ramazan Girgin}, title = {KORGAN: An Efficient PKI Architecture Based on Permissioned-Blockchain by Modifying PBFT Through Dynamic Threshold Signatures}, howpublished = {Cryptology ePrint Archive, Report 2019/1141}, year = {2019}, url = {https://eprint.iacr.org/2019/1141}, } @misc{cryptoeprint:2019:1142, author = {Tamalika Mukherjee and Noah Stephens-Davidowitz }, title = {Lattice Reduction for Modules, or How to Reduce ModuleSVP to ModuleSVP}, howpublished = {Cryptology ePrint Archive, Report 2019/1142}, year = {2019}, url = {https://eprint.iacr.org/2019/1142}, } @misc{cryptoeprint:2019:1143, author = {Iraklis Leontiadis and Reza Curtmola}, title = {Auditable Compressed Storage}, howpublished = {Cryptology ePrint Archive, Report 2019/1143}, year = {2019}, url = {https://eprint.iacr.org/2019/1143}, } @misc{cryptoeprint:2019:1144, author = {Sanjit Chatterjee and R. Kabaleeshwaran}, title = {Rerandomizable Signatures under Standard Assumption}, howpublished = {Cryptology ePrint Archive, Report 2019/1144}, year = {2019}, url = {https://eprint.iacr.org/2019/1144}, } @misc{cryptoeprint:2019:1145, author = {Craig Costello}, title = {B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion}, howpublished = {Cryptology ePrint Archive, Report 2019/1145}, year = {2019}, url = {https://eprint.iacr.org/2019/1145}, } @misc{cryptoeprint:2019:1146, author = {Samuel Jaques and Michael Naehrig and Martin Roetteler and Fernando Virdia}, title = {Implementing Grover oracles for quantum key search on AES and LowMC}, howpublished = {Cryptology ePrint Archive, Report 2019/1146}, year = {2019}, url = {https://eprint.iacr.org/2019/1146}, } @misc{cryptoeprint:2019:1147, author = {Steve Thakur}, title = {Batching non-membership proofs with bilinear accumulators}, howpublished = {Cryptology ePrint Archive, Report 2019/1147}, year = {2019}, url = {https://eprint.iacr.org/2019/1147}, } @misc{cryptoeprint:2019:1148, author = {Benjamin R. Curtis and Rachel Player}, title = {On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/1148}, year = {2019}, url = {https://eprint.iacr.org/2019/1148}, } @misc{cryptoeprint:2019:1149, author = {Cristina Pérez-Solà and Alejandro Ranchal-Pedrosa and Jordi Herrera-Joancomartí and Guillermo Navarro-Arribas and Joaquin Garcia-Alfaro}, title = {LockDown: Balance Availability Attack against Lightning Network Channels}, howpublished = {Cryptology ePrint Archive, Report 2019/1149}, year = {2019}, url = {https://eprint.iacr.org/2019/1149}, } @misc{cryptoeprint:2019:114, author = {Rosario Gennaro and Steven Goldfeder}, title = {Fast Multiparty Threshold ECDSA with Fast Trustless Setup}, howpublished = {Cryptology ePrint Archive, Report 2019/114}, year = {2019}, url = {https://eprint.iacr.org/2019/114}, } @misc{cryptoeprint:2019:1150, author = {Alexandru Cojocaru and Juan Garay and Aggelos Kiayias and Fang Song and Petros Wallden}, title = {The Bitcoin Backbone Protocol Against Quantum Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2019/1150}, year = {2019}, url = {https://eprint.iacr.org/2019/1150}, } @misc{cryptoeprint:2019:1151, author = {Yusuke Yoshida and Fuyuki Kitagawa and Keisuke Tanaka}, title = {Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based on the DDH Problem}, howpublished = {Cryptology ePrint Archive, Report 2019/1151}, year = {2019}, url = {https://eprint.iacr.org/2019/1151}, } @misc{cryptoeprint:2019:1152, author = {Jonas Krautter and Dennis R.E. Gnad and Falk Schellenberg and Amir Moradi and Mehdi B. Tahoori}, title = {Active Fences against Voltage-based Side Channels in Multi-Tenant FPGAs}, howpublished = {Cryptology ePrint Archive, Report 2019/1152}, year = {2019}, url = {https://eprint.iacr.org/2019/1152}, } @misc{cryptoeprint:2019:1153, author = {Ivan Damgard and Helene Haagh and Rebekah Mercer and Anca Nitulescu and Claudio Orlandi and Sophia Yakoubov}, title = {Stronger Notions and Constructions for Multi-Designated Verifier Signatures}, howpublished = {Cryptology ePrint Archive, Report 2019/1153}, year = {2019}, url = {https://eprint.iacr.org/2019/1153}, } @misc{cryptoeprint:2019:1154, author = {Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir}, title = {The Retracing Boomerang Attack}, howpublished = {Cryptology ePrint Archive, Report 2019/1154}, year = {2019}, url = {https://eprint.iacr.org/2019/1154}, } @misc{cryptoeprint:2019:1155, author = {José Bacelar Almeida and Cécile Baritel-Ruet and Manuel Barbosa and Gilles Barthe and François Dupressoir and Benjamin Grégoire and Vincent Laporte and Tiago Oliveira and Alley Stoughton and Pierre-Yves Strub}, title = {Machine-Checked Proofs for Cryptographic Standards}, howpublished = {Cryptology ePrint Archive, Report 2019/1155}, year = {2019}, url = {https://eprint.iacr.org/2019/1155}, } @misc{cryptoeprint:2019:1156, author = {Divesh Aggarwal and Maciej Obremski and João Ribeiro and Luisa Siniscalchi and Ivan Visconti}, title = {How to Extract Useful Randomness from Unreliable Sources}, howpublished = {Cryptology ePrint Archive, Report 2019/1156}, year = {2019}, url = {https://eprint.iacr.org/2019/1156}, } @misc{cryptoeprint:2019:1157, author = {Srimanta Bhattacharya and Mridul Nandi}, title = {A Note on the Chi-square Method : A Tool for Proving Cryptographic Security}, howpublished = {Cryptology ePrint Archive, Report 2019/1157}, year = {2019}, url = {https://eprint.iacr.org/2019/1157}, } @misc{cryptoeprint:2019:1158, author = {Payman Mohassel and Mike Rosulek and Ni Trieu}, title = {Practical Privacy-Preserving K-means Clustering}, howpublished = {Cryptology ePrint Archive, Report 2019/1158}, year = {2019}, url = {https://eprint.iacr.org/2019/1158}, } @misc{cryptoeprint:2019:1159, author = {Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Lisa Kohl and Peter Rindal and Peter Scholl}, title = {Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2019/1159}, year = {2019}, url = {https://eprint.iacr.org/2019/1159}, } @misc{cryptoeprint:2019:115, author = {Nir Bitansky and Iftach Haiter and Ilan Komargodski and Eylon Yogev}, title = {Distributional Collision Resistance Beyond One-Way Functions}, howpublished = {Cryptology ePrint Archive, Report 2019/115}, year = {2019}, url = {https://eprint.iacr.org/2019/115}, } @misc{cryptoeprint:2019:1160, author = {Morten Øygarden and Patrick Felke and Håvard Raddum and Carlos Cid}, title = {Cryptanalysis of the Multivariate Encryption Scheme EFLASH}, howpublished = {Cryptology ePrint Archive, Report 2019/1160}, year = {2019}, url = {https://eprint.iacr.org/2019/1160}, } @misc{cryptoeprint:2019:1161, author = {Martin R. Albrecht and Vlad Gheorghiu and Eamonn W. Postlethwaite and John M. Schanck}, title = {Quantum speedups for lattice sieves are tenuous at best}, howpublished = {Cryptology ePrint Archive, Report 2019/1161}, year = {2019}, url = {https://eprint.iacr.org/2019/1161}, } @misc{cryptoeprint:2019:1162, author = {Karim Baghery}, title = {Subversion-Resistant Simulation (Knowledge) Sound NIZKs}, howpublished = {Cryptology ePrint Archive, Report 2019/1162}, year = {2019}, url = {https://eprint.iacr.org/2019/1162}, } @misc{cryptoeprint:2019:1163, author = {Marc Fyrbiak and Sebastian Wallat and Jonathan Déchelotte and Nils Albartus and Sinan Böcker and Russell Tessier and Christof Paar}, title = {On the Difficulty of FSM-based Hardware Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2019/1163}, year = {2019}, url = {https://eprint.iacr.org/2019/1163}, } @misc{cryptoeprint:2019:1164, author = {Chao Liu and Zhongxiang Zheng and Keting Jia and Limin Tao}, title = {Identity-Concealed Authenticated Encryption from Ring Learning With Errors (Full version)}, howpublished = {Cryptology ePrint Archive, Report 2019/1164}, year = {2019}, url = {https://eprint.iacr.org/2019/1164}, } @misc{cryptoeprint:2019:1165, author = {Nicolas Bordes and Pierre Karpman}, title = {High-order private multiplication in characteristic two revisited}, howpublished = {Cryptology ePrint Archive, Report 2019/1165}, year = {2019}, url = {https://eprint.iacr.org/2019/1165}, } @misc{cryptoeprint:2019:1166, author = {Peter Schwabe and Daan Sprenkels}, title = {The complete cost of cofactor h=1}, howpublished = {Cryptology ePrint Archive, Report 2019/1166}, year = {2019}, url = {https://eprint.iacr.org/2019/1166}, } @misc{cryptoeprint:2019:1167, author = {Nabil Alkeilani Alkadri and Rachid El Bansarkhani and Johannes Buchmann}, title = {$\mathsf{BLAZE}$: Practical Lattice-Based Blind Signatures for Privacy-Preserving Applications}, howpublished = {Cryptology ePrint Archive, Report 2019/1167}, year = {2019}, url = {https://eprint.iacr.org/2019/1167}, } @misc{cryptoeprint:2019:1168, author = {Chun Guo and Jonathan Katz and Xiao Wang and Chenkai Weng and Yu Yu}, title = {Better Concrete Security for Half-Gates Garbling (in the Multi-Instance Setting)}, howpublished = {Cryptology ePrint Archive, Report 2019/1168}, year = {2019}, url = {https://eprint.iacr.org/2019/1168}, } @misc{cryptoeprint:2019:1169, author = {Antonio Campello and Cong Ling and Jean-Claude Belfiore}, title = {Semantically Secure Lattice Codes for Compound MIMO Channels}, howpublished = {Cryptology ePrint Archive, Report 2019/1169}, year = {2019}, url = {https://eprint.iacr.org/2019/1169}, } @misc{cryptoeprint:2019:116, author = {Hao Chen and Ilaria Chillotti and Yongsoo Song}, title = {Multi-Key Homomophic Encryption from TFHE}, howpublished = {Cryptology ePrint Archive, Report 2019/116}, year = {2019}, url = {https://eprint.iacr.org/2019/116}, } @misc{cryptoeprint:2019:1170, author = {Iggy van Hoof}, title = {Space-efficient quantum multiplication of polynomials for binary finite fields with sub-quadratic Toffoli gate count}, howpublished = {Cryptology ePrint Archive, Report 2019/1170}, year = {2019}, url = {https://eprint.iacr.org/2019/1170}, } @misc{cryptoeprint:2019:1171, author = {Laura Luzzi and Roope Vehkalahti and Cong Ling}, title = {Almost universal codes for MIMO wiretap channels}, howpublished = {Cryptology ePrint Archive, Report 2019/1171}, year = {2019}, url = {https://eprint.iacr.org/2019/1171}, } @misc{cryptoeprint:2019:1172, author = {Mingming Wang and Qianhong Wu}, title = {Lever: Breaking the Shackles of Scalable On-chain Validation}, howpublished = {Cryptology ePrint Archive, Report 2019/1172}, year = {2019}, url = {https://eprint.iacr.org/2019/1172}, } @misc{cryptoeprint:2019:1173, author = {Giuseppe Ateniese and Danilo Francati and Bernardo Magri and Daniele Venturi}, title = {Immunization against Complete Subversion without Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2019/1173}, year = {2019}, url = {https://eprint.iacr.org/2019/1173}, } @misc{cryptoeprint:2019:1174, author = {Borja Gómez}, title = {Hidden Irreducible Polynomials : A cryptosystem based on Multivariate Public Key Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2019/1174}, year = {2019}, url = {https://eprint.iacr.org/2019/1174}, } @misc{cryptoeprint:2019:1175, author = {Laura Blackstone and Seny Kamara and Tarik Moataz}, title = {Revisiting Leakage Abuse Attacks}, howpublished = {Cryptology ePrint Archive, Report 2019/1175}, year = {2019}, url = {https://eprint.iacr.org/2019/1175}, } @misc{cryptoeprint:2019:1176, author = {Eric Brier and David Naccache}, title = {The Thirteenth Power Residue Symbol}, howpublished = {Cryptology ePrint Archive, Report 2019/1176}, year = {2019}, url = {https://eprint.iacr.org/2019/1176}, } @misc{cryptoeprint:2019:1177, author = {Mary Maller and Noah Vesely}, title = {Aggregatable Signatures from an Inner Pairing Product Argument}, howpublished = {Cryptology ePrint Archive, Report 2019/1177}, year = {2019}, url = {https://eprint.iacr.org/2019/1177}, } @misc{cryptoeprint:2019:1178, author = {Gang Wang and Zhijie Jerry Shi and Mark Nixon and Song Han}, title = {SoK: Sharding on Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2019/1178}, year = {2019}, url = {https://eprint.iacr.org/2019/1178}, } @misc{cryptoeprint:2019:1179, author = {Ron Steinfeld and Amin Sakzad and Raymond K. Zhao}, title = {Practical MP-LWE-based encryption balancing security-risk vs. efficiency}, howpublished = {Cryptology ePrint Archive, Report 2019/1179}, year = {2019}, url = {https://eprint.iacr.org/2019/1179}, } @misc{cryptoeprint:2019:117, author = {Geoffroy Couteau and Michael Reichle}, title = {Non-Interactive Keyed-Verification Anonymous Credentials}, howpublished = {Cryptology ePrint Archive, Report 2019/117}, year = {2019}, url = {https://eprint.iacr.org/2019/117}, } @misc{cryptoeprint:2019:1180, author = {Pierre-Alain Fouque and Paul Kirchner and Mehdi Tibouchi and Alexandre Wallet and Yang Yu}, title = {Uprooting the Falcon Tree?}, howpublished = {Cryptology ePrint Archive, Report 2019/1180}, year = {2019}, url = {https://eprint.iacr.org/2019/1180}, } @misc{cryptoeprint:2019:1181, author = {Myrto Arapinis and Mahshid Delavar and Mina Doosti and Elham Kashefi}, title = {Quantum Physical Unclonable Functions: Possibilities and Impossibilities}, howpublished = {Cryptology ePrint Archive, Report 2019/1181}, year = {2019}, url = {https://eprint.iacr.org/2019/1181}, } @misc{cryptoeprint:2019:1182, author = {Serge Fehr and Chen Yuan}, title = {Robust Secret Sharing with Optimal Share Size and Security Against Rushing Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2019/1182}, year = {2019}, url = {https://eprint.iacr.org/2019/1182}, } @misc{cryptoeprint:2019:1183, author = {Ran Cohen and Juan Garay and Vassilis Zikas}, title = {Broadcast-Optimal Two-Round MPC}, howpublished = {Cryptology ePrint Archive, Report 2019/1183}, year = {2019}, url = {https://eprint.iacr.org/2019/1183}, } @misc{cryptoeprint:2019:1184, author = {Andrey Jivsov}, title = {A concrete instantiation of Bulletproof zero-knowledge proof}, howpublished = {Cryptology ePrint Archive, Report 2019/1184}, year = {2019}, url = {https://eprint.iacr.org/2019/1184}, } @misc{cryptoeprint:2019:1185, author = {David Butler and Andreas Lochbihler and David Aspinall and Adria Gascon}, title = {Formalising $\Sigma$-Protocols and Commitment Schemes using CryptHOL}, howpublished = {Cryptology ePrint Archive, Report 2019/1185}, year = {2019}, url = {https://eprint.iacr.org/2019/1185}, } @misc{cryptoeprint:2019:1186, author = {Mahabir Prasad Jhanwar and Pratyush Ranjan Tiwari}, title = {Trading Accumulation Size for Witness Size: A Merkle Tree Based Universal Accumulator Via Subset Differences}, howpublished = {Cryptology ePrint Archive, Report 2019/1186}, year = {2019}, url = {https://eprint.iacr.org/2019/1186}, } @misc{cryptoeprint:2019:1187, author = {Orr Dunkelman and Léo Perrin}, title = {Adapting Rigidity to Symmetric Cryptography: Towards "Unswerving" Designs}, howpublished = {Cryptology ePrint Archive, Report 2019/1187}, year = {2019}, url = {https://eprint.iacr.org/2019/1187}, } @misc{cryptoeprint:2019:1188, author = {Dario Pasquini and Ankit Gangwal and Giuseppe Ateniese and Massimo Bernaschi and Mauro Conti}, title = {Improving Password Guessing via Representation Learning}, howpublished = {Cryptology ePrint Archive, Report 2019/1188}, year = {2019}, url = {https://eprint.iacr.org/2019/1188}, } @misc{cryptoeprint:2019:1189, author = {Joël Alwen and Sandro Coretti and Yevgeniy Dodis and Yiannis Tselekounis}, title = {Security Analysis and Improvements for the IETF MLS Standard for Group Messaging}, howpublished = {Cryptology ePrint Archive, Report 2019/1189}, year = {2019}, url = {https://eprint.iacr.org/2019/1189}, } @misc{cryptoeprint:2019:118, author = {Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E Gunnells}, title = {Defeating the Hart, Kim, Micheli, Pascuel-Perez, Petit, Quek Attack on WalnutDSA(TM)}, howpublished = {Cryptology ePrint Archive, Report 2019/118}, year = {2019}, url = {https://eprint.iacr.org/2019/118}, } @misc{cryptoeprint:2019:1190, author = {Fulei Ji and Wentao Zhang and Tianyou Ding}, title = {Improving Matsui's Search Algorithm for the Best Differential/Linear Trails and its Applications for DES, DESL and GIFT}, howpublished = {Cryptology ePrint Archive, Report 2019/1190}, year = {2019}, url = {https://eprint.iacr.org/2019/1190}, } @misc{cryptoeprint:2019:1191, author = {Maura B. Paterson and Douglas R. Stinson}, title = {On the equivalence of authentication codes and robust (2,2)-threshold schemes}, howpublished = {Cryptology ePrint Archive, Report 2019/1191}, year = {2019}, url = {https://eprint.iacr.org/2019/1191}, } @misc{cryptoeprint:2019:1192, author = {Daniel Berend and Dor Bitan and Shlomi Dolev}, title = {Polynomials Whose Secret Shares Multiplication Preserves Degree for 2-CNF Circuits Over a Dynamic Set of Secrets}, howpublished = {Cryptology ePrint Archive, Report 2019/1192}, year = {2019}, url = {https://eprint.iacr.org/2019/1192}, } @misc{cryptoeprint:2019:1193, author = {Panagiotis Grontas and Aris Pagourtzis and Alexandros Zacharakis}, title = {Security models for everlasting privacy}, howpublished = {Cryptology ePrint Archive, Report 2019/1193}, year = {2019}, url = {https://eprint.iacr.org/2019/1193}, } @misc{cryptoeprint:2019:1194, author = {Michel Abdalla and Manuel Barbosa}, title = {Perfect Forward Security of SPAKE2}, howpublished = {Cryptology ePrint Archive, Report 2019/1194}, year = {2019}, url = {https://eprint.iacr.org/2019/1194}, } @misc{cryptoeprint:2019:1195, author = {Vipul Goyal and Silas Richelson}, title = {Non-Malleable Commitments Using Goldreich-Levin List Decoding}, howpublished = {Cryptology ePrint Archive, Report 2019/1195}, year = {2019}, url = {https://eprint.iacr.org/2019/1195}, } @misc{cryptoeprint:2019:1196, author = {Marc Joye}, title = {Evaluating Octic Residue Symbols}, howpublished = {Cryptology ePrint Archive, Report 2019/1196}, year = {2019}, url = {https://eprint.iacr.org/2019/1196}, } @misc{cryptoeprint:2019:1197, author = {Laszlo Csirmaz}, title = {Secret sharing and duality}, howpublished = {Cryptology ePrint Archive, Report 2019/1197}, year = {2019}, url = {https://eprint.iacr.org/2019/1197}, } @misc{cryptoeprint:2019:1198, author = {Zichen Gui and Oliver Johnson and Bogdan Warinschi}, title = {Encrypted Databases: New Volume Attacks against Range Queries}, howpublished = {Cryptology ePrint Archive, Report 2019/1198}, year = {2019}, url = {https://eprint.iacr.org/2019/1198}, } @misc{cryptoeprint:2019:1199, author = {Max Hoffmann and Michael Klooß and Markus Raiber and Andy Rupp}, title = {Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices}, howpublished = {Cryptology ePrint Archive, Report 2019/1199}, year = {2019}, url = {https://eprint.iacr.org/2019/1199}, } @misc{cryptoeprint:2019:119, author = {Ariel Gabizon}, title = {On the security of the BCTV Pinocchio zk-SNARK variant}, howpublished = {Cryptology ePrint Archive, Report 2019/119}, year = {2019}, url = {https://eprint.iacr.org/2019/119}, } @misc{cryptoeprint:2019:1200, author = {Thomas Attema and Ronald Cramer and Chaoping Xing}, title = {A note on short invertible ring elements and applications to cyclotomic and trinomials number fields}, howpublished = {Cryptology ePrint Archive, Report 2019/1200}, year = {2019}, url = {https://eprint.iacr.org/2019/1200}, } @misc{cryptoeprint:2019:1201, author = {Olivier Sanders}, title = {Efficient Redactable Signature and Application to Anonymous Credentials}, howpublished = {Cryptology ePrint Archive, Report 2019/1201}, year = {2019}, url = {https://eprint.iacr.org/2019/1201}, } @misc{cryptoeprint:2019:1202, author = {Wouter Castryck and Lorenz Panny and Frederik Vercauteren}, title = {Rational isogenies from irrational endomorphisms}, howpublished = {Cryptology ePrint Archive, Report 2019/1202}, year = {2019}, url = {https://eprint.iacr.org/2019/1202}, } @misc{cryptoeprint:2019:1203, author = {Cyprien Delpech de Saint Guilhem and Marc Fischlin and Bogdan Warinschi}, title = {Authentication in Key-Exchange: Definitions, Relations and Composition}, howpublished = {Cryptology ePrint Archive, Report 2019/1203}, year = {2019}, url = {https://eprint.iacr.org/2019/1203}, } @misc{cryptoeprint:2019:1204, author = {Gorjan Alagic and Christian Majenz and Alexander Russell}, title = {Efficient simulation of random states and random unitaries}, howpublished = {Cryptology ePrint Archive, Report 2019/1204}, year = {2019}, url = {https://eprint.iacr.org/2019/1204}, } @misc{cryptoeprint:2019:1205, author = {Yfke Dulek and Alex Grilo and Stacey Jeffery and Christian Majenz and Christian Schaffner}, title = {Secure Multi-party Quantum Computation with a Dishonest Majority}, howpublished = {Cryptology ePrint Archive, Report 2019/1205}, year = {2019}, url = {https://eprint.iacr.org/2019/1205}, } @misc{cryptoeprint:2019:1206, author = {Jing Tian; Zhe Liu; Jun Lin; Zhongfeng Wang; Binjing Li}, title = {High-Speed Modular Multipliers for Isogeny-Based Post-Quantum Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2019/1206}, year = {2019}, url = {https://eprint.iacr.org/2019/1206}, } @misc{cryptoeprint:2019:1207, author = {Borja Gómez}, title = {Behind multiple trapdoors: A cryptographic commitment scheme for establishing secure communications}, howpublished = {Cryptology ePrint Archive, Report 2019/1207}, year = {2019}, url = {https://eprint.iacr.org/2019/1207}, } @misc{cryptoeprint:2019:1208, author = {Xenia Bogomolec and John Gregory Underhill and Stiepan Aurélien Kovac}, title = {Towards Post-Quantum Secure Symmetric Cryptography: A Mathematical Perspective}, howpublished = {Cryptology ePrint Archive, Report 2019/1208}, year = {2019}, url = {https://eprint.iacr.org/2019/1208}, } @misc{cryptoeprint:2019:1209, author = {Hiroshi Onuki and Tsuyoshi Takagi}, title = {On collisions related to an ideal class of order 3 in CSIDH}, howpublished = {Cryptology ePrint Archive, Report 2019/1209}, year = {2019}, url = {https://eprint.iacr.org/2019/1209}, } @misc{cryptoeprint:2019:120, author = {Keita Xagawa}, title = {Cryptanalysis of a New Code-based Signature Scheme with Shorter Public Key in PKC 2019}, howpublished = {Cryptology ePrint Archive, Report 2019/120}, year = {2019}, url = {https://eprint.iacr.org/2019/120}, } @misc{cryptoeprint:2019:1210, author = {Zahra Jafargholi and Sabine Oechsner}, title = {Adaptive Security of Practical Garbling Schemes}, howpublished = {Cryptology ePrint Archive, Report 2019/1210}, year = {2019}, url = {https://eprint.iacr.org/2019/1210}, } @misc{cryptoeprint:2019:1211, author = {Rio LaVigne and Chen-Da Liu-Zhang and Ueli Maurer and Tal Moran and Marta Mularczyk and Daniel Tschudi}, title = {Topology-Hiding Computation for Networks with Unknown Delays}, howpublished = {Cryptology ePrint Archive, Report 2019/1211}, year = {2019}, url = {https://eprint.iacr.org/2019/1211}, } @misc{cryptoeprint:2019:1212, author = {Subhadeep Banik and Fatih Balli and Francesco Regazzoni and Serge Vaudenay}, title = {Swap and Rotate: Lightweight linear layers for SPN-based blockciphers}, howpublished = {Cryptology ePrint Archive, Report 2019/1212}, year = {2019}, url = {https://eprint.iacr.org/2019/1212}, } @misc{cryptoeprint:2019:1213, author = {Fatih Balli and Subhadeep Banik}, title = {Exploring Lightweight Efficiency of ForkAES}, howpublished = {Cryptology ePrint Archive, Report 2019/1213}, year = {2019}, url = {https://eprint.iacr.org/2019/1213}, } @misc{cryptoeprint:2019:1214, author = {Farokhlagha Moazami and Masoumeh Safkhani}, title = {A New Secure and Efficient Ownership Transfer Protocol based on Quadric Residue and Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/1214}, year = {2019}, url = {https://eprint.iacr.org/2019/1214}, } @misc{cryptoeprint:2019:1215, author = {Sanaz Taheri Boshrooyeh and Alptekin Küpçü and Öznur Özkasap}, title = {Anonyma: Anonymous Invitation-Only Registration in Malicious Adversarial Model}, howpublished = {Cryptology ePrint Archive, Report 2019/1215}, year = {2019}, url = {https://eprint.iacr.org/2019/1215}, } @misc{cryptoeprint:2019:1216, author = {Wei-Zhu Yeoh and Je Sen Teh and Jiageng Chen}, title = {GPU-Accelerated Branch-and-Bound Algorithm for Differential Cluster Search of Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2019/1216}, year = {2019}, url = {https://eprint.iacr.org/2019/1216}, } @misc{cryptoeprint:2019:1217, author = {Ashutosh Dhar Dwivedi}, title = {A Scalable Blockchain Based Digital Rights Management System}, howpublished = {Cryptology ePrint Archive, Report 2019/1217}, year = {2019}, url = {https://eprint.iacr.org/2019/1217}, } @misc{cryptoeprint:2019:1218, author = {Abdur Rehman Raza and Khawir Mahmood and Muhammad Faisal Amjad and Haider Abbas and Mehreen Afzal}, title = {On the Efficiency of Software Implementations of Lightweight Block Ciphers from the Perspective of Programming Languages}, howpublished = {Cryptology ePrint Archive, Report 2019/1218}, year = {2019}, url = {https://eprint.iacr.org/2019/1218}, } @misc{cryptoeprint:2019:1219, author = {Nugier Cyrius and Adelin Remi and Migliore Vincent and Alata Eric}, title = {Multi-Locking and Perfect Argument Order: Two Major Improvements of Attribute-Based Encryption~(Long Paper)}, howpublished = {Cryptology ePrint Archive, Report 2019/1219}, year = {2019}, url = {https://eprint.iacr.org/2019/1219}, } @misc{cryptoeprint:2019:121, author = {Santosh Ghosh and Andrew H. Reinders and Rafael Misoczki and Manoj R. Sastry}, title = {Anonymous Attestation for IoT}, howpublished = {Cryptology ePrint Archive, Report 2019/121}, year = {2019}, url = {https://eprint.iacr.org/2019/121}, } @misc{cryptoeprint:2019:1220, author = {Thomas Roche and Laurent Imbert and Victor Lomné}, title = {Side-channel Attacks on Blinded Scalar Multiplications Revisited}, howpublished = {Cryptology ePrint Archive, Report 2019/1220}, year = {2019}, url = {https://eprint.iacr.org/2019/1220}, } @misc{cryptoeprint:2019:1221, author = {David Clayton and Christopher Patton and Thomas Shrimpton}, title = {Probabilistic Data Structures in Adversarial Environments}, howpublished = {Cryptology ePrint Archive, Report 2019/1221}, year = {2019}, url = {https://eprint.iacr.org/2019/1221}, } @misc{cryptoeprint:2019:1222, author = {M. Sadegh Riazi and Beidi Chen and Anshumali Shrivastava and Dan Wallach and Farinaz Koushanfar}, title = {Sub-Linear Privacy-Preserving Near-Neighbor Search}, howpublished = {Cryptology ePrint Archive, Report 2019/1222}, year = {2019}, url = {https://eprint.iacr.org/2019/1222}, } @misc{cryptoeprint:2019:1223, author = {Sanaz Taheri Boshrooyeh and Alptekin Küpçü and Öznur Özkasap}, title = {Integrita: Protecting View-Consistency in Online Social Network with Federated Servers}, howpublished = {Cryptology ePrint Archive, Report 2019/1223}, year = {2019}, url = {https://eprint.iacr.org/2019/1223}, } @misc{cryptoeprint:2019:1224, author = {Stephanie Wang and Rishabh Poddar and Jianan Lu and Raluca Ada Popa}, title = {Practical Volume-Based Attacks on Encrypted Databases}, howpublished = {Cryptology ePrint Archive, Report 2019/1224}, year = {2019}, url = {https://eprint.iacr.org/2019/1224}, } @misc{cryptoeprint:2019:1225, author = {Jianyu Niu and Chen Feng and Hoang Dau and Yu-Chih Huang and Jingge Zhu}, title = {Analysis of Nakamoto Consensus, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2019/1225}, year = {2019}, url = {https://eprint.iacr.org/2019/1225}, } @misc{cryptoeprint:2019:1226, author = {Jingchun Yang and Meicheng Liu and Dongdai Lin}, title = {Cube Cryptanalysis of Round-Reduced ACORN}, howpublished = {Cryptology ePrint Archive, Report 2019/1226}, year = {2019}, url = {https://eprint.iacr.org/2019/1226}, } @misc{cryptoeprint:2019:1227, author = {Ioannis Demertzis and Javad Ghareh Chamani and Dimitrios Papadopoulos and Charalampos Papamanthou}, title = {Dynamic Searchable Encryption with Small Client Storage}, howpublished = {Cryptology ePrint Archive, Report 2019/1227}, year = {2019}, url = {https://eprint.iacr.org/2019/1227}, } @misc{cryptoeprint:2019:1228, author = {Lorenz Panny}, title = {Guess what?! On the impossibility of unconditionally secure public-key encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/1228}, year = {2019}, url = {https://eprint.iacr.org/2019/1228}, } @misc{cryptoeprint:2019:1229, author = {Benedikt Bünz and Ben Fisch and Alan Szepieniec}, title = {Transparent SNARKs from DARK Compilers}, howpublished = {Cryptology ePrint Archive, Report 2019/1229}, year = {2019}, url = {https://eprint.iacr.org/2019/1229}, } @misc{cryptoeprint:2019:122, author = {Santosh Ghosh and Rafael Misoczki and Manoj R. Sastry}, title = {Lightweight Post-Quantum-Secure Digital Signature Approach for IoT Motes}, howpublished = {Cryptology ePrint Archive, Report 2019/122}, year = {2019}, url = {https://eprint.iacr.org/2019/122}, } @misc{cryptoeprint:2019:1230, author = {Eli Ben-Sasson and Alessandro Chiesa and Lior Goldberg and Tom Gur and Michael Riabzev and Nicholas Spooner}, title = {Linear-Size Constant-Query IOPs for Delegating Computation}, howpublished = {Cryptology ePrint Archive, Report 2019/1230}, year = {2019}, url = {https://eprint.iacr.org/2019/1230}, } @misc{cryptoeprint:2019:1231, author = {Zhao Chunhuan and Zheng Zhongxiang and Wang Xiaoyun and Xu Guangwu}, title = {Distinguishing LWE Instances Using Fourier Transform: A Refined Framework and its Applications}, howpublished = {Cryptology ePrint Archive, Report 2019/1231}, year = {2019}, url = {https://eprint.iacr.org/2019/1231}, } @misc{cryptoeprint:2019:1232, author = {Meenakshi Kansal and Ratna Dutta and Sourav Mukhopadhyay}, title = {Efficient Construction of Nominative Signature Secure under Symmetric Key Primitives and Standard Assumptions on Lattice}, howpublished = {Cryptology ePrint Archive, Report 2019/1232}, year = {2019}, url = {https://eprint.iacr.org/2019/1232}, } @misc{cryptoeprint:2019:1233, author = {Koji Nuida and Satsuya Ohata and Shigeo Mitsunari and Nuttapong Attrapadung}, title = {Arbitrary Univariate Function Evaluation and Re-Encryption Protocols over Lifted-ElGamal Type Ciphertexts}, howpublished = {Cryptology ePrint Archive, Report 2019/1233}, year = {2019}, url = {https://eprint.iacr.org/2019/1233}, } @misc{cryptoeprint:2019:1234, author = {Jung Hee Cheon and Dongwoo Kim and Duhyeong Kim}, title = {Efficient Homomorphic Comparison Methods with Optimal Complexity}, howpublished = {Cryptology ePrint Archive, Report 2019/1234}, year = {2019}, url = {https://eprint.iacr.org/2019/1234}, } @misc{cryptoeprint:2019:1235, author = {Mariana Costiuc and Diana Maimut and George Teseleanu}, title = {Physical Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2019/1235}, year = {2019}, url = {https://eprint.iacr.org/2019/1235}, } @misc{cryptoeprint:2019:1236, author = {Bo-Yeon Sim and Dong-Guk Han}, title = {Single-Trace Vulnerability of Countermeasures against Instruction-related Timing Attack}, howpublished = {Cryptology ePrint Archive, Report 2019/1236}, year = {2019}, url = {https://eprint.iacr.org/2019/1236}, } @misc{cryptoeprint:2019:1237, author = {Alexandru Cojocaru and Léo Colisson and Elham Kashefi and Petros Wallden}, title = {QFactory: classically-instructed remote secret qubits preparation}, howpublished = {Cryptology ePrint Archive, Report 2019/1237}, year = {2019}, url = {https://eprint.iacr.org/2019/1237}, } @misc{cryptoeprint:2019:1238, author = {Adi Akavia and Hayim Shaul and Mor Weiss and Zohar Yakhini}, title = {Linear-Regression on Packed Encrypted Data in the Two-Server Model}, howpublished = {Cryptology ePrint Archive, Report 2019/1238}, year = {2019}, url = {https://eprint.iacr.org/2019/1238}, } @misc{cryptoeprint:2019:1239, author = {Britta Hale}, title = {Computationally Modeling User-Mediated Authentication Protocols}, howpublished = {Cryptology ePrint Archive, Report 2019/1239}, year = {2019}, url = {https://eprint.iacr.org/2019/1239}, } @misc{cryptoeprint:2019:123, author = {Liliya Akhmetzyanova and Evgeny Alekseev and Grigory Karpunin and Vladislav Nozdrunov}, title = {Security of Multilinear Galois Mode (MGM)}, howpublished = {Cryptology ePrint Archive, Report 2019/123}, year = {2019}, url = {https://eprint.iacr.org/2019/123}, } @misc{cryptoeprint:2019:1240, author = {Cong Zuo and Shi-Feng Sun and Joseph K. Liu and Jun Shao and Josef Pieprzyk and Lei Xu}, title = {Forward and Backward Private DSSE for Range Queries}, howpublished = {Cryptology ePrint Archive, Report 2019/1240}, year = {2019}, url = {https://eprint.iacr.org/2019/1240}, } @misc{cryptoeprint:2019:1241, author = {Jeonghyuk Lee and Jungyeon Hwang and Jaekyung Choi and Hyunok Oh and Jihye Kim}, title = {SIMS : Self Sovereign Identity Management System with Preserving Privacy in Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2019/1241}, year = {2019}, url = {https://eprint.iacr.org/2019/1241}, } @misc{cryptoeprint:2019:1242, author = {Yoo-Seung Won and Jong-Yeon Park}, title = {Non-Profiled Side Channel Attack based on Deep learning using Picture Trace}, howpublished = {Cryptology ePrint Archive, Report 2019/1242}, year = {2019}, url = {https://eprint.iacr.org/2019/1242}, } @misc{cryptoeprint:2019:1243, author = {Roberto Avanzi and Yvo Desmedt}, title = {On The Distinguishability of Ideal Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2019/1243}, year = {2019}, url = {https://eprint.iacr.org/2019/1243}, } @misc{cryptoeprint:2019:1244, author = {Samuel Dobson and Trey Li and Lukas Zobernig}, title = {A Note on a Static SIDH Protocol}, howpublished = {Cryptology ePrint Archive, Report 2019/1244}, year = {2019}, url = {https://eprint.iacr.org/2019/1244}, } @misc{cryptoeprint:2019:1245, author = {Jian Zou and Yongyang Liu and Chen Dong and Wenling Wu and Le Dong}, title = {Observations on the Quantum Circuit of the SBox of AES}, howpublished = {Cryptology ePrint Archive, Report 2019/1245}, year = {2019}, url = {https://eprint.iacr.org/2019/1245}, } @misc{cryptoeprint:2019:1246, author = {Marcel Keller and Ke Sun}, title = {A Note on Our Submission to Track 4 of iDASH 2019}, howpublished = {Cryptology ePrint Archive, Report 2019/1246}, year = {2019}, url = {https://eprint.iacr.org/2019/1246}, } @misc{cryptoeprint:2019:1247, author = {Lauren De Meyer and Felix Wegener and Amir Moradi}, title = {A Note on Masking Generic Boolean Functions}, howpublished = {Cryptology ePrint Archive, Report 2019/1247}, year = {2019}, url = {https://eprint.iacr.org/2019/1247}, } @misc{cryptoeprint:2019:1248, author = {Bastian Richter and David Knichel and Amir Moradi}, title = {A Comparison of Chi^2-Test and Mutual Information as Distinguisher for Side-Channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2019/1248}, year = {2019}, url = {https://eprint.iacr.org/2019/1248}, } @misc{cryptoeprint:2019:1249, author = {Vitaly Kiryukhin}, title = {Related-key Attack on 5-Round Kuznyechik}, howpublished = {Cryptology ePrint Archive, Report 2019/1249}, year = {2019}, url = {https://eprint.iacr.org/2019/1249}, } @misc{cryptoeprint:2019:124, author = {Douglas Wikström}, title = {Anomalous Look at Provable Security}, howpublished = {Cryptology ePrint Archive, Report 2019/124}, year = {2019}, url = {https://eprint.iacr.org/2019/124}, } @misc{cryptoeprint:2019:1250, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam and Mor Weiss}, title = {The Price of Active Security in Cryptographic Protocols}, howpublished = {Cryptology ePrint Archive, Report 2019/1250}, year = {2019}, url = {https://eprint.iacr.org/2019/1250}, } @misc{cryptoeprint:2019:1251, author = {Anca Nitulescu}, title = {Lattice-based Zero-knowledge SNARGs for Arithmetic Circuits}, howpublished = {Cryptology ePrint Archive, Report 2019/1251}, year = {2019}, url = {https://eprint.iacr.org/2019/1251}, } @misc{cryptoeprint:2019:1252, author = {Aayush Jain and Huijia Lin and Amit Sahai}, title = {Simplifying Constructions and Assumptions for $i\mathcal{O}$}, howpublished = {Cryptology ePrint Archive, Report 2019/1252}, year = {2019}, url = {https://eprint.iacr.org/2019/1252}, } @misc{cryptoeprint:2019:1253, author = {Victoria Vysotskaya}, title = {Probabilistic Properties of Modular Addition \\ (Extended abstract)}, howpublished = {Cryptology ePrint Archive, Report 2019/1253}, year = {2019}, url = {https://eprint.iacr.org/2019/1253}, } @misc{cryptoeprint:2019:1254, author = {Jiseung Kim and Changmin Lee}, title = {Cryptanalysis of FRS Obfuscation based on the CLT13 Multilinear Map}, howpublished = {Cryptology ePrint Archive, Report 2019/1254}, year = {2019}, url = {https://eprint.iacr.org/2019/1254}, } @misc{cryptoeprint:2019:1255, author = {Daniel Benarroch and Matteo Campanelli and Dario Fiore and Dimitris Kolonelos}, title = {Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular}, howpublished = {Cryptology ePrint Archive, Report 2019/1255}, year = {2019}, url = {https://eprint.iacr.org/2019/1255}, } @misc{cryptoeprint:2019:1256, author = {Elette Boyle and Justin Holmgren and Mor Weiss}, title = {Permuted Puzzles and Cryptographic Hardness}, howpublished = {Cryptology ePrint Archive, Report 2019/1256}, year = {2019}, url = {https://eprint.iacr.org/2019/1256}, } @misc{cryptoeprint:2019:1257, author = {Dhaval Khandla and Het Shahy and Manish Kumar Bz and Alwyn Roshan Pais and Nishant Raj}, title = {Expressive CP-ABE Scheme Satisfying Constant-Size Keys and Ciphertexts}, howpublished = {Cryptology ePrint Archive, Report 2019/1257}, year = {2019}, url = {https://eprint.iacr.org/2019/1257}, } @misc{cryptoeprint:2019:1258, author = {Shogo Ochiai and Keiichi Iwamura and Ahmad Akmal Aminuddin Mohd Kamal}, title = {Secure Pairwise Key Sharing using Geometric Group Key Sharing Method (Full Paper)}, howpublished = {Cryptology ePrint Archive, Report 2019/1258}, year = {2019}, url = {https://eprint.iacr.org/2019/1258}, } @misc{cryptoeprint:2019:1259, author = {Kaushik Nath and Palash Sarkar}, title = {“Nice” Curves}, howpublished = {Cryptology ePrint Archive, Report 2019/1259}, year = {2019}, url = {https://eprint.iacr.org/2019/1259}, } @misc{cryptoeprint:2019:125, author = {Maheswara Rao Valluri}, title = {Combinatorial Primality Test }, howpublished = {Cryptology ePrint Archive, Report 2019/125}, year = {2019}, url = {https://eprint.iacr.org/2019/125}, } @misc{cryptoeprint:2019:1260, author = {Anita Aghaie and Amir Moradi}, title = {TI-PUF: Toward Side-Channel Resistant Physical Unclonable Functions}, howpublished = {Cryptology ePrint Archive, Report 2019/1260}, year = {2019}, url = {https://eprint.iacr.org/2019/1260}, } @misc{cryptoeprint:2019:1261, author = {Justin Holmgren}, title = {On Round-By-Round Soundness and State Restoration Attacks}, howpublished = {Cryptology ePrint Archive, Report 2019/1261}, year = {2019}, url = {https://eprint.iacr.org/2019/1261}, } @misc{cryptoeprint:2019:1262, author = {Shweta Agrawal and Rachit Garg and Nishant Kumar and Manoj Prabhakaran}, title = {A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing}, howpublished = {Cryptology ePrint Archive, Report 2019/1262}, year = {2019}, url = {https://eprint.iacr.org/2019/1262}, } @misc{cryptoeprint:2019:1263, author = {Anna Johnston}, title = {Comments on Cryptographic Entropy Measurement}, howpublished = {Cryptology ePrint Archive, Report 2019/1263}, year = {2019}, url = {https://eprint.iacr.org/2019/1263}, } @misc{cryptoeprint:2019:1264, author = {Juan Garay and Aggelos Kiayias and Rafail Ostrovsky and Giorgos Panagiotakos and Vassilis Zikas}, title = {Resource-Restricted Cryptography: Honest-Majority MPC from a CRS (and No Broadcast)}, howpublished = {Cryptology ePrint Archive, Report 2019/1264}, year = {2019}, url = {https://eprint.iacr.org/2019/1264}, } @misc{cryptoeprint:2019:1265, author = {Jiajun Xin and Pei Huang and Lei Chen and Xin Lai and Xiao Zhang and Wulu Li and Yongcan Wang}, title = {WaterCarver: Anonymous Confidential Blockchain System based on Account Model}, howpublished = {Cryptology ePrint Archive, Report 2019/1265}, year = {2019}, url = {https://eprint.iacr.org/2019/1265}, } @misc{cryptoeprint:2019:1266, author = {Jean Claude Bajard and Julien Eynard and Paulo Martins and Leonel Sousa and Vincent Zucca}, title = {Note on the noise growth of the RNS variants of the BFV scheme}, howpublished = {Cryptology ePrint Archive, Report 2019/1266}, year = {2019}, url = {https://eprint.iacr.org/2019/1266}, } @misc{cryptoeprint:2019:1267, author = {Hao Lin and Mingqiang Wang}, title = {Repudiable Ring Signatures: Stronger Definitions and Logarithmic-Size}, howpublished = {Cryptology ePrint Archive, Report 2019/1267}, year = {2019}, url = {https://eprint.iacr.org/2019/1267}, } @misc{cryptoeprint:2019:1268, author = {Saqib A. Kakvi}, title = {On the Security of RSA-PSS in the Wild}, howpublished = {Cryptology ePrint Archive, Report 2019/1268}, year = {2019}, url = {https://eprint.iacr.org/2019/1268}, } @misc{cryptoeprint:2019:1269, author = {Hao Lin and Mingqiang Wang}, title = {Repudiable Ring Signature: Stronger Security and Logarithmic-Size}, howpublished = {Cryptology ePrint Archive, Report 2019/1269}, year = {2019}, url = {https://eprint.iacr.org/2019/1269}, } @misc{cryptoeprint:2019:126, author = {AmirHossein E. Moghaddam and Zahra Ahmadian}, title = {New Automatic search method for Truncated-differential characteristics: Application to Midori and SKINNY}, howpublished = {Cryptology ePrint Archive, Report 2019/126}, year = {2019}, url = {https://eprint.iacr.org/2019/126}, } @misc{cryptoeprint:2019:1270, author = {Jiwon Lee and Jaekyoung Choi and Jihye Kim and Hyunok Oh}, title = {SAVER: Snark-friendly, Additively-homomorphic, and Verifiable Encryption and decryption with Rerandomization}, howpublished = {Cryptology ePrint Archive, Report 2019/1270}, year = {2019}, url = {https://eprint.iacr.org/2019/1270}, } @misc{cryptoeprint:2019:1271, author = {Martin R. Albrecht and Alex Davidson and Amit Deo and Nigel P. Smart}, title = {Round-optimal Verifiable Oblivious Pseudorandom Functions From Ideal Lattices}, howpublished = {Cryptology ePrint Archive, Report 2019/1271}, year = {2019}, url = {https://eprint.iacr.org/2019/1271}, } @misc{cryptoeprint:2019:1272, author = {Upendra Kapshikar and Ayan Mahalanobis}, title = {The Niederreiter cryptosystem and Quasi-Cyclic codes}, howpublished = {Cryptology ePrint Archive, Report 2019/1272}, year = {2019}, url = {https://eprint.iacr.org/2019/1272}, } @misc{cryptoeprint:2019:1273, author = {Jens-Peter Kaps and William Diehl and Michael Tempelmeier and Farnoud Farahmand and Ekawat Homsirikamol and Kris Gaj}, title = {A Comprehensive Framework for Fair and Efficient Benchmarking of Hardware Implementations of Lightweight Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2019/1273}, year = {2019}, url = {https://eprint.iacr.org/2019/1273}, } @misc{cryptoeprint:2019:1274, author = {Ameirah al Abdouli and Emanuele Bellini and Florian Caullery and Marc Manzano and Victor Mateu}, title = {Rank-metric Encryption on Arm-Cortex M0}, howpublished = {Cryptology ePrint Archive, Report 2019/1274}, year = {2019}, url = {https://eprint.iacr.org/2019/1274}, } @misc{cryptoeprint:2019:1275, author = {Stanislaw Jarecki and Hugo Krawczyk and Jason Resch}, title = {Updatable Oblivious Key Management for Storage Systems}, howpublished = {Cryptology ePrint Archive, Report 2019/1275}, year = {2019}, url = {https://eprint.iacr.org/2019/1275}, } @misc{cryptoeprint:2019:1276, author = {Panos Kampanakis and Dimitrios Sikeridis}, title = {Two PQ Signature Use-cases: Non-issues, challenges and potential solutions. }, howpublished = {Cryptology ePrint Archive, Report 2019/1276}, year = {2019}, url = {https://eprint.iacr.org/2019/1276}, } @misc{cryptoeprint:2019:1277, author = {Maran van Heesch and Niels van Adrichem and Thomas Attema and Thijs Veugen}, title = {Towards Quantum-Safe VPNs and Internet}, howpublished = {Cryptology ePrint Archive, Report 2019/1277}, year = {2019}, url = {https://eprint.iacr.org/2019/1277}, } @misc{cryptoeprint:2019:1278, author = {Hamad Al Shehhi and Emanuele Bellini and Filipe Borba and Florian Caullery and Marc Manzano and Victor Mateu}, title = {An IND-CCA-Secure Code-Based EncryptionScheme Using Rank Metric}, howpublished = {Cryptology ePrint Archive, Report 2019/1278}, year = {2019}, url = {https://eprint.iacr.org/2019/1278}, } @misc{cryptoeprint:2019:1279, author = {Nir Bitansky and Omri Shmueli}, title = {Postquantum Zero Knowledge in Constant Rounds}, howpublished = {Cryptology ePrint Archive, Report 2019/1279}, year = {2019}, url = {https://eprint.iacr.org/2019/1279}, } @misc{cryptoeprint:2019:127, author = {Avijit Dutta and Mridul Nandi and Suprita Talnikar}, title = {Beyond Birthday Bound Secure MAC in Faulty Nonce Model}, howpublished = {Cryptology ePrint Archive, Report 2019/127}, year = {2019}, url = {https://eprint.iacr.org/2019/127}, } @misc{cryptoeprint:2019:1280, author = {Keiichi Iwamura and Ahmad Akmal Aminuddin Mohd Kamal}, title = {Fast Secrecy Computation with Multiplication Under the Setting of k≤N<2k-1 using Secret Sharing Scheme}, howpublished = {Cryptology ePrint Archive, Report 2019/1280}, year = {2019}, url = {https://eprint.iacr.org/2019/1280}, } @misc{cryptoeprint:2019:1281, author = {Geoffroy Couteau and Bill Roscoe and Peter Ryan}, title = {Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2019/1281}, year = {2019}, url = {https://eprint.iacr.org/2019/1281}, } @misc{cryptoeprint:2019:1282, author = {Adi Akavia and Max Leibovich and Yehezkel S. Resheff and Roey Ron and Moni Shahar and Margarita Vald}, title = {Privacy-Preserving Decision Tree Training and Prediction against Malicious Server}, howpublished = {Cryptology ePrint Archive, Report 2019/1282}, year = {2019}, url = {https://eprint.iacr.org/2019/1282}, } @misc{cryptoeprint:2019:1283, author = {Christian Eder}, title = {Breaking the Hidden Irreducible Polynomials Scheme}, howpublished = {Cryptology ePrint Archive, Report 2019/1283}, year = {2019}, url = {https://eprint.iacr.org/2019/1283}, } @misc{cryptoeprint:2019:1284, author = {Masayuki Abe and Charanjit S. Jutla and Miyako Ohkubo and Jiaxin Pan and Arnab Roy and Yuyu Wang}, title = {Shorter QA-NIZK and SPS with Tighter Security}, howpublished = {Cryptology ePrint Archive, Report 2019/1284}, year = {2019}, url = {https://eprint.iacr.org/2019/1284}, } @misc{cryptoeprint:2019:1285, author = {Manoj Kumar}, title = {Full-Round Differential Attack on DoT Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2019/1285}, year = {2019}, url = {https://eprint.iacr.org/2019/1285}, } @misc{cryptoeprint:2019:1286, author = {Ambili K N and Jimmy Jose}, title = {Comparison of proof-of-work based blockchains against federated consensus and proof-of-validation based blockchains}, howpublished = {Cryptology ePrint Archive, Report 2019/1286}, year = {2019}, url = {https://eprint.iacr.org/2019/1286}, } @misc{cryptoeprint:2019:1287, author = {Muhammed F. Esgin and Raymond K. Zhao and Ron Steinfeld and Joseph K. Liu and Dongxi Liu}, title = {MatRiCT: Efficient, Scalable and Post-Quantum Blockchain Confidential Transactions Protocol}, howpublished = {Cryptology ePrint Archive, Report 2019/1287}, year = {2019}, url = {https://eprint.iacr.org/2019/1287}, } @misc{cryptoeprint:2019:1288, author = {Luca De Feo and Michael Meyer}, title = {Threshold Schemes from Isogeny Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2019/1288}, year = {2019}, url = {https://eprint.iacr.org/2019/1288}, } @misc{cryptoeprint:2019:1289, author = {Nir Drucker and Shay Gueron and Dusan Kostic}, title = {On constant-time QC-MDPC decoding with negligible failure rate}, howpublished = {Cryptology ePrint Archive, Report 2019/1289}, year = {2019}, url = {https://eprint.iacr.org/2019/1289}, } @misc{cryptoeprint:2019:128, author = {Junichi Tomida}, title = {Tightly Secure Inner Product Functional Encryption: Multi-Input and Function-Hiding Constructions}, howpublished = {Cryptology ePrint Archive, Report 2019/128}, year = {2019}, url = {https://eprint.iacr.org/2019/128}, } @misc{cryptoeprint:2019:1290, author = {Péter Kutas and Christophe Petit and Javier Silva}, title = {Trapdoor DDH groups from pairings and isogenies}, howpublished = {Cryptology ePrint Archive, Report 2019/1290}, year = {2019}, url = {https://eprint.iacr.org/2019/1290}, } @misc{cryptoeprint:2019:1291, author = {Cyprien Delpech de Saint Guilhem and Péter Kutas and Christophe Petit and Javier Silva}, title = {SÉTA: Supersingular Encryption from Torsion Attacks}, howpublished = {Cryptology ePrint Archive, Report 2019/1291}, year = {2019}, url = {https://eprint.iacr.org/2019/1291}, } @misc{cryptoeprint:2019:1292, author = {Sarvar Patel and Giuseppe Persiano and Kevin Yeo and Moti Yung}, title = {Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing}, howpublished = {Cryptology ePrint Archive, Report 2019/1292}, year = {2019}, url = {https://eprint.iacr.org/2019/1292}, } @misc{cryptoeprint:2019:1293, author = {Chi-Gon Jung and JongHyeok Lee and Youngjin Ju and Yong-Been Kwon and Seong-Woo Kim and Yunheung Paek}, title = {LizarMong: Excellent Key Encapsulation Mechanism based on RLWE and RLWR}, howpublished = {Cryptology ePrint Archive, Report 2019/1293}, year = {2019}, url = {https://eprint.iacr.org/2019/1293}, } @misc{cryptoeprint:2019:1294, author = {Dmitrii Koshelev}, title = {Finite field mapping to elliptic curves of $j$-invariant $1728$}, howpublished = {Cryptology ePrint Archive, Report 2019/1294}, year = {2019}, url = {https://eprint.iacr.org/2019/1294}, } @misc{cryptoeprint:2019:1295, author = {Borja Gómez}, title = {A trip between creation and destruction of non-commutative public key exchange protocols}, howpublished = {Cryptology ePrint Archive, Report 2019/1295}, year = {2019}, url = {https://eprint.iacr.org/2019/1295}, } @misc{cryptoeprint:2019:1296, author = {Mathias Hall-Andersen}, title = {FastSwap: Concretely Efficient Contingent Payments for Complex Predicates}, howpublished = {Cryptology ePrint Archive, Report 2019/1296}, year = {2019}, url = {https://eprint.iacr.org/2019/1296}, } @misc{cryptoeprint:2019:1297, author = {Hamid Nejatollahi and Sina Shahhosseini and Rosario Cammarota and Nikil Dutt}, title = {Exploring Energy Efficient Quantum-resistant Signal Processing Using Array Processors}, howpublished = {Cryptology ePrint Archive, Report 2019/1297}, year = {2019}, url = {https://eprint.iacr.org/2019/1297}, } @misc{cryptoeprint:2019:1298, author = {Mark Abspoel and Anders Dalskov and Daniel Escudero and Ariel Nof}, title = {An Efficient Passive-to-Active Compiler for Honest-Majority MPC over Rings}, howpublished = {Cryptology ePrint Archive, Report 2019/1298}, year = {2019}, url = {https://eprint.iacr.org/2019/1298}, } @misc{cryptoeprint:2019:1299, author = {Divesh Aggarwal and Maciej Obremski}, title = {A constant-rate non-malleable code in the split-state model. }, howpublished = {Cryptology ePrint Archive, Report 2019/1299}, year = {2019}, url = {https://eprint.iacr.org/2019/1299}, } @misc{cryptoeprint:2019:129, author = {Elette Boyle and Lisa Kohl and Peter Scholl}, title = {Homomorphic Secret Sharing from Lattices Without FHE}, howpublished = {Cryptology ePrint Archive, Report 2019/129}, year = {2019}, url = {https://eprint.iacr.org/2019/129}, } @misc{cryptoeprint:2019:1300, author = {Dragos Rotaru and Nigel P. Smart and Titouan Tanguy and Frederik Vercauteren and Tim Wood}, title = {Actively Secure Setup for SPDZ}, howpublished = {Cryptology ePrint Archive, Report 2019/1300}, year = {2019}, url = {https://eprint.iacr.org/2019/1300}, } @misc{cryptoeprint:2019:1301, author = {Dipayan Das and Jeffrey Hoffstein and Jill Pipher and William Whyte and Zhenfei Zhang}, title = {Modular lattice signatures, revisit}, howpublished = {Cryptology ePrint Archive, Report 2019/1301}, year = {2019}, url = {https://eprint.iacr.org/2019/1301}, } @misc{cryptoeprint:2019:1302, author = {Máté Horváth and Levente Buttyán and Gábor Székely and Dóra Neubrandt}, title = {There Is Always an Exception: Controlling Partial Information Leakage in Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2019/1302}, year = {2019}, url = {https://eprint.iacr.org/2019/1302}, } @misc{cryptoeprint:2019:1303, author = {Wulu Li and Lei Chen and Xin Lai and Xiao Zhang and Jiajun Xin}, title = {A simpler construction of traceable and linkable ring signature scheme}, howpublished = {Cryptology ePrint Archive, Report 2019/1303}, year = {2019}, url = {https://eprint.iacr.org/2019/1303}, } @misc{cryptoeprint:2019:1304, author = {Kaushik Nath and Palash Sarkar}, title = {Reduction Modulo \bm{$2^{448}-2^{224}-1$}}, howpublished = {Cryptology ePrint Archive, Report 2019/1304}, year = {2019}, url = {https://eprint.iacr.org/2019/1304}, } @misc{cryptoeprint:2019:1305, author = {Jinming Cui and Huaping Li and Meng Yang}, title = {Privacy-Preserving Computation over Genetic Data: HLA Matching and so on}, howpublished = {Cryptology ePrint Archive, Report 2019/1305}, year = {2019}, url = {https://eprint.iacr.org/2019/1305}, } @misc{cryptoeprint:2019:1306, author = {Taotao li and Dequan li}, title = {A Valid Blockchain-based Data Trading Ecosystem}, howpublished = {Cryptology ePrint Archive, Report 2019/1306}, year = {2019}, url = {https://eprint.iacr.org/2019/1306}, } @misc{cryptoeprint:2019:1307, author = {Liang Zhang and Haibin Kan and Zening Chen and Ziqi Mao and Jinjie Gao}, title = {ABERand: Effective Distributed Randomness on Ciphertext-Policy Attribute-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/1307}, year = {2019}, url = {https://eprint.iacr.org/2019/1307}, } @misc{cryptoeprint:2019:1308, author = {Qian Guo and Thomas Johansson and Jing Yang}, title = {A Novel CCA Attack using Decryption Errors against LAC}, howpublished = {Cryptology ePrint Archive, Report 2019/1308}, year = {2019}, url = {https://eprint.iacr.org/2019/1308}, } @misc{cryptoeprint:2019:1309, author = {Sujoy Sinha Roy}, title = {SaberX4: High-throughput Software Implementationof Saber Key Encapsulation Mechanism}, howpublished = {Cryptology ePrint Archive, Report 2019/1309}, year = {2019}, url = {https://eprint.iacr.org/2019/1309}, } @misc{cryptoeprint:2019:130, author = {Greg Zaverucha and Dan Shumow}, title = {Are Certificate Thumbprints Unique?}, howpublished = {Cryptology ePrint Archive, Report 2019/130}, year = {2019}, url = {https://eprint.iacr.org/2019/130}, } @misc{cryptoeprint:2019:1310, author = {Shun Li and Siwei Sun and Danping Shi and Chaoyun Li and Lei Hu}, title = {Lightweight Iterative MDS Matrices: How Small Can We Go?}, howpublished = {Cryptology ePrint Archive, Report 2019/1310}, year = {2019}, url = {https://eprint.iacr.org/2019/1310}, } @misc{cryptoeprint:2019:1311, author = {Jiwon Lee and Jihye Kim and Hyunok Oh}, title = {BESTIE: Broadcast Encryption Scheme for Tiny IoT Equipments}, howpublished = {Cryptology ePrint Archive, Report 2019/1311}, year = {2019}, url = {https://eprint.iacr.org/2019/1311}, } @misc{cryptoeprint:2019:1312, author = {Victor Arribas and Felix Wegener and Amir Moradi and Svetla Nikova}, title = {Cryptographic Fault Diagnosis using VerFI}, howpublished = {Cryptology ePrint Archive, Report 2019/1312}, year = {2019}, url = {https://eprint.iacr.org/2019/1312}, } @misc{cryptoeprint:2019:1313, author = {Nir Bitansky and Nathan Geier}, title = {On Oblivious Amplification of Coin-Tossing Protocols}, howpublished = {Cryptology ePrint Archive, Report 2019/1313}, year = {2019}, url = {https://eprint.iacr.org/2019/1313}, } @misc{cryptoeprint:2019:1314, author = {Zhidan Li and Wenmin Li and Fei Gao and Wei Yin and Hua Zhang and Qiaoyan Wen and Kaitai Liang}, title = {Towards Privacy-Preserving and Efficient Attribute-Based Multi-Keyword Search}, howpublished = {Cryptology ePrint Archive, Report 2019/1314}, year = {2019}, url = {https://eprint.iacr.org/2019/1314}, } @misc{cryptoeprint:2019:1315, author = {Rahul Rachuri and Ajith Suresh}, title = {Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning}, howpublished = {Cryptology ePrint Archive, Report 2019/1315}, year = {2019}, url = {https://eprint.iacr.org/2019/1315}, } @misc{cryptoeprint:2019:1316, author = {Sabyasachi Karati}, title = {Binary Kummer Line}, howpublished = {Cryptology ePrint Archive, Report 2019/1316}, year = {2019}, url = {https://eprint.iacr.org/2019/1316}, } @misc{cryptoeprint:2019:1317, author = {Suvradip Chakraborty and Stefan Dziembowski and Jesper Buus Nielsen}, title = {Reverse Firewalls for Actively Secure MPCs}, howpublished = {Cryptology ePrint Archive, Report 2019/1317}, year = {2019}, url = {https://eprint.iacr.org/2019/1317}, } @misc{cryptoeprint:2019:1318, author = {Mingjiang Huang and Liming Wang}, title = {Automatic Tool for Searching for Differential Characteristics in ARX Ciphers and Applications}, howpublished = {Cryptology ePrint Archive, Report 2019/1318}, year = {2019}, url = {https://eprint.iacr.org/2019/1318}, } @misc{cryptoeprint:2019:1319, author = {Mingjiang Huang and Liming Wang}, title = {Automatic Search for the Linear (hull) Characteristics of ARX Ciphers: Applied to SPECK, SPARX, Chaskey and CHAM-64}, howpublished = {Cryptology ePrint Archive, Report 2019/1319}, year = {2019}, url = {https://eprint.iacr.org/2019/1319}, } @misc{cryptoeprint:2019:131, author = {Assi Barak and Daniel Escudero and Anders Dalskov and Marcel Keller}, title = {Secure Evaluation of Quantized Neural Networks}, howpublished = {Cryptology ePrint Archive, Report 2019/131}, year = {2019}, url = {https://eprint.iacr.org/2019/131}, } @misc{cryptoeprint:2019:1320, author = {Alisa Cherniaeva and Ilia Shirobokov and Omer Shlomovits}, title = {Homomorphic Encryption Random Beacon}, howpublished = {Cryptology ePrint Archive, Report 2019/1320}, year = {2019}, url = {https://eprint.iacr.org/2019/1320}, } @misc{cryptoeprint:2019:1321, author = {Craig Costello}, title = {Supersingular isogeny key exchange for beginners}, howpublished = {Cryptology ePrint Archive, Report 2019/1321}, year = {2019}, url = {https://eprint.iacr.org/2019/1321}, } @misc{cryptoeprint:2019:1322, author = {Hisham S. Galal and Muhammad ElSheikh and Amr M. Youssef}, title = {An Efficient Micropayment Channel on Ethereum}, howpublished = {Cryptology ePrint Archive, Report 2019/1322}, year = {2019}, url = {https://eprint.iacr.org/2019/1322}, } @misc{cryptoeprint:2019:1323, author = {Prabhanjan Ananth and Rolando L. La Placa}, title = {Secure Quantum Extraction Protocols}, howpublished = {Cryptology ePrint Archive, Report 2019/1323}, year = {2019}, url = {https://eprint.iacr.org/2019/1323}, } @misc{cryptoeprint:2019:1324, author = {Avijit Dutta and Mridul Nandi}, title = {Tweakable HCTR: A BBB Secure Tweakable Enciphering Scheme}, howpublished = {Cryptology ePrint Archive, Report 2019/1324}, year = {2019}, url = {https://eprint.iacr.org/2019/1324}, } @misc{cryptoeprint:2019:1325, author = {Arinjita Paul and S. Sharmila Deva Selvi and C. Pandu Rangan}, title = {Attribute-based Proxy Re-Encryption with Constant Size Ciphertexts}, howpublished = {Cryptology ePrint Archive, Report 2019/1325}, year = {2019}, url = {https://eprint.iacr.org/2019/1325}, } @misc{cryptoeprint:2019:1326, author = {Donghoon Chang and Nilanjan Datta and Avijit Dutta and Bart Mennink and Mridul Nandi and Somitra Sanadhya and Ferdinand Sibleyras}, title = {Release of Unverified Plaintext: Tight Unified Model and Application to ANYDAE}, howpublished = {Cryptology ePrint Archive, Report 2019/1326}, year = {2019}, url = {https://eprint.iacr.org/2019/1326}, } @misc{cryptoeprint:2019:1327, author = {Donghoon Chang and Munawar Hasan and Pranav Jain}, title = {Spy Based Analysis of Selfish Mining Attack on Multi-Stage Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2019/1327}, year = {2019}, url = {https://eprint.iacr.org/2019/1327}, } @misc{cryptoeprint:2019:1328, author = {Yashvanth Kondi and Bernardo Magri and Claudio Orlandi and Omer Shlomovits}, title = {Refresh When You Wake Up: Proactive Threshold Wallets with Offline Devices}, howpublished = {Cryptology ePrint Archive, Report 2019/1328}, year = {2019}, url = {https://eprint.iacr.org/2019/1328}, } @misc{cryptoeprint:2019:1329, author = {Antoine Joux and Anand Kumar Narayanan}, title = {Drinfeld modules are not for isogeny based cryptography}, howpublished = {Cryptology ePrint Archive, Report 2019/1329}, year = {2019}, url = {https://eprint.iacr.org/2019/1329}, } @misc{cryptoeprint:2019:132, author = {Olivier Bronchain and Julien M. Hendrickx and Clément Massart and Alex Olshevsky and François-Xavier Standaert}, title = {Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations}, howpublished = {Cryptology ePrint Archive, Report 2019/132}, year = {2019}, url = {https://eprint.iacr.org/2019/132}, } @misc{cryptoeprint:2019:1330, author = {Lisa Eckey and Sebastian Faust and Benjamin Schlosser}, title = {OptiSwap: Fast Optimistic Fair Exchange}, howpublished = {Cryptology ePrint Archive, Report 2019/1330}, year = {2019}, url = {https://eprint.iacr.org/2019/1330}, } @misc{cryptoeprint:2019:1331, author = {Melissa Azouaoui and Romain Poussier and François-Xavier Standaert and Vincent Verneuil}, title = {Key Enumeration from the Adversarial Viewpoint: When to Stop Measuring and Start Enumerating?}, howpublished = {Cryptology ePrint Archive, Report 2019/1331}, year = {2019}, url = {https://eprint.iacr.org/2019/1331}, } @misc{cryptoeprint:2019:1332, author = {Samiran Bag and Feng Hao and Siamak F. Shahandashti and Indranil G. Ray}, title = {SEAL: Sealed-Bid Auction Without Auctioneers}, howpublished = {Cryptology ePrint Archive, Report 2019/1332}, year = {2019}, url = {https://eprint.iacr.org/2019/1332}, } @misc{cryptoeprint:2019:1333, author = {Paul Bottinelli and Victoria de Quehen and Chris Leonardi and Anton Mosunov and Filip Pawlega and Milap Sheth}, title = {The Dark SIDH of Isogenies}, howpublished = {Cryptology ePrint Archive, Report 2019/1333}, year = {2019}, url = {https://eprint.iacr.org/2019/1333}, } @misc{cryptoeprint:2019:1334, author = {Ye Dong and Xiaojun Chen and Liyan Shen}, title = {Privacy-Preserving Distributed Machine Learning based on Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2019/1334}, year = {2019}, url = {https://eprint.iacr.org/2019/1334}, } @misc{cryptoeprint:2019:1335, author = {Tibor Jager and David Niehues}, title = {On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions}, howpublished = {Cryptology ePrint Archive, Report 2019/1335}, year = {2019}, url = {https://eprint.iacr.org/2019/1335}, } @misc{cryptoeprint:2019:1336, author = {Neal Koblitz and Alfred Menezes}, title = {Critical Perspectives on Provable Security: Fifteen Years of "Another Look" Papers}, howpublished = {Cryptology ePrint Archive, Report 2019/1336}, year = {2019}, url = {https://eprint.iacr.org/2019/1336}, } @misc{cryptoeprint:2019:1337, author = {Peter Chvojka and Tibor Jager and Saqib A. Kakvi}, title = {Offline Witness Encryption with Semi-Adaptive Security}, howpublished = {Cryptology ePrint Archive, Report 2019/1337}, year = {2019}, url = {https://eprint.iacr.org/2019/1337}, } @misc{cryptoeprint:2019:1338, author = {Phi Hung Le and Samuel Ranellucci and S. Dov Gordon}, title = {Two-party Private Set Intersection with an Untrusted Third Party}, howpublished = {Cryptology ePrint Archive, Report 2019/1338}, year = {2019}, url = {https://eprint.iacr.org/2019/1338}, } @misc{cryptoeprint:2019:1339, author = {Yevgeniy Dodis and Vinod Vaikuntanathan and Daniel Wichs}, title = {Extracting Randomness from Extractor-Dependent Sources}, howpublished = {Cryptology ePrint Archive, Report 2019/1339}, year = {2019}, url = {https://eprint.iacr.org/2019/1339}, } @misc{cryptoeprint:2019:133, author = {Vasyl Ustimenko}, title = {On semigroups of multiplicative Cremona transformations and new solutions of Post Quantum Cryptography.}, howpublished = {Cryptology ePrint Archive, Report 2019/133}, year = {2019}, url = {https://eprint.iacr.org/2019/133}, } @misc{cryptoeprint:2019:1340, author = {Melissa Chase and Esha Ghosh and Oxana Poburinnaya}, title = {Secret Shared Shuffle}, howpublished = {Cryptology ePrint Archive, Report 2019/1340}, year = {2019}, url = {https://eprint.iacr.org/2019/1340}, } @misc{cryptoeprint:2019:1341, author = {Andrew Morgan and Rafael Pass and Antigoni Polychroniadou}, title = {Succinct Non-Interactive Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2019/1341}, year = {2019}, url = {https://eprint.iacr.org/2019/1341}, } @misc{cryptoeprint:2019:1342, author = {Jihye Kim and Seunghwa Lee and Jiwon Lee and Hyunok Oh}, title = {Scalable Wildcarded Identity-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/1342}, year = {2019}, url = {https://eprint.iacr.org/2019/1342}, } @misc{cryptoeprint:2019:1343, author = {Yue Qin and Chi Cheng and Jintai Ding}, title = {An Efficient Key Mismatch Attack on the NIST Second Round Candidate Kyber}, howpublished = {Cryptology ePrint Archive, Report 2019/1343}, year = {2019}, url = {https://eprint.iacr.org/2019/1343}, } @misc{cryptoeprint:2019:1344, author = {Ran Cohen and Iftach Haitner and Eran Omri and Lior Rotem}, title = {From Fairness to Full Security in Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2019/1344}, year = {2019}, url = {https://eprint.iacr.org/2019/1344}, } @misc{cryptoeprint:2019:1345, author = {Danilo Francati and Giuseppe Ateniese and Abdoulaye Faye and Andrea Maria Milazzo and Angelo Massimo Perillo and Luca Schiatti and Giuseppe Giordano}, title = {Audita: A Blockchain-based Auditing Framework for Off-chain Storage}, howpublished = {Cryptology ePrint Archive, Report 2019/1345}, year = {2019}, url = {https://eprint.iacr.org/2019/1345}, } @misc{cryptoeprint:2019:1346, author = {Bowen Liu and Qiang Tang}, title = {Privacy-Preserving Decentralised Singular Value Decomposition}, howpublished = {Cryptology ePrint Archive, Report 2019/1346}, year = {2019}, url = {https://eprint.iacr.org/2019/1346}, } @misc{cryptoeprint:2019:1347, author = {Sebati Ghosh and Palash Sarkar}, title = {Variable Tag Length Message Authentication Code Schemes}, howpublished = {Cryptology ePrint Archive, Report 2019/1347}, year = {2019}, url = {https://eprint.iacr.org/2019/1347}, } @misc{cryptoeprint:2019:1348, author = {Handan Kılınç Alper}, title = {Consensus on Clock in Universally Composable Timing Model}, howpublished = {Cryptology ePrint Archive, Report 2019/1348}, year = {2019}, url = {https://eprint.iacr.org/2019/1348}, } @misc{cryptoeprint:2019:1349, author = {Mridula Singh and Patrick Leu and AbdelRahman Abdou and Srdjan Capkun}, title = {UWB-ED: Distance Enlargement Attack Detection in Ultra-Wideband}, howpublished = {Cryptology ePrint Archive, Report 2019/1349}, year = {2019}, url = {https://eprint.iacr.org/2019/1349}, } @misc{cryptoeprint:2019:134, author = {Haodong Jiang and Zhenfeng Zhang and Zhi Ma}, title = {Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model}, howpublished = {Cryptology ePrint Archive, Report 2019/134}, year = {2019}, url = {https://eprint.iacr.org/2019/134}, } @misc{cryptoeprint:2019:1350, author = {Patrick Leu and Mridula Singh and Marc Roeschlin and Kenneth G. Paterson and Srdjan Capkun}, title = {Message Time of Arrival Codes: A Fundamental Primitive for Secure Distance Measurement}, howpublished = {Cryptology ePrint Archive, Report 2019/1350}, year = {2019}, url = {https://eprint.iacr.org/2019/1350}, } @misc{cryptoeprint:2019:1351, author = {Diana Maimut and Alexandru Stefan Mega}, title = {Speeding Up OMD Instantiations in Hardware}, howpublished = {Cryptology ePrint Archive, Report 2019/1351}, year = {2019}, url = {https://eprint.iacr.org/2019/1351}, } @misc{cryptoeprint:2019:1352, author = {Jing Yang and Thomas Johansson and Alexander Maximov}, title = {Spectral analysis of ZUC-256}, howpublished = {Cryptology ePrint Archive, Report 2019/1352}, year = {2019}, url = {https://eprint.iacr.org/2019/1352}, } @misc{cryptoeprint:2019:1353, author = {Nico Döttling and Sanjam Garg and Vipul Goyal and Giulio Malavolta}, title = {Laconic Conditional Disclosure of Secrets and Applications}, howpublished = {Cryptology ePrint Archive, Report 2019/1353}, year = {2019}, url = {https://eprint.iacr.org/2019/1353}, } @misc{cryptoeprint:2019:1354, author = {Zhangshuang Guan and Zhiguo Wan and Yang Yang and Yan Zhou and Butian Huang}, title = {BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs}, howpublished = {Cryptology ePrint Archive, Report 2019/1354}, year = {2019}, url = {https://eprint.iacr.org/2019/1354}, } @misc{cryptoeprint:2019:1355, author = {Daniel Smith-Tone and Cristina Tone}, title = {A Nonlinear Multivariate Cryptosystem Based on a Random Linear Code}, howpublished = {Cryptology ePrint Archive, Report 2019/1355}, year = {2019}, url = {https://eprint.iacr.org/2019/1355}, } @misc{cryptoeprint:2019:1356, author = {Jacqueline Brendel and Marc Fischlin and Felix Günther and Christian Janson and Douglas Stebila}, title = {Challenges in Proving Post-Quantum Key Exchanges Based on Key Encapsulation Mechanisms}, howpublished = {Cryptology ePrint Archive, Report 2019/1356}, year = {2019}, url = {https://eprint.iacr.org/2019/1356}, } @misc{cryptoeprint:2019:1357, author = {Ward Beullens and Tim Beyne and Aleksei Udovenko and Giuseppe Vitto}, title = {Cryptanalysis of the Legendre PRF and generalizations}, howpublished = {Cryptology ePrint Archive, Report 2019/1357}, year = {2019}, url = {https://eprint.iacr.org/2019/1357}, } @misc{cryptoeprint:2019:1358, author = {Xuan Thanh Do and Duong Hieu Phan and David Pointcheval}, title = {Traceable Inner Product Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/1358}, year = {2019}, url = {https://eprint.iacr.org/2019/1358}, } @misc{cryptoeprint:2019:1359, author = {Yanbin Li and Gaëtan Leurent and Meiqin Wang and Wei Wang and Guoyan Zhang and Yu Liu}, title = {Universal Forgery Attack against GCM-RUP}, howpublished = {Cryptology ePrint Archive, Report 2019/1359}, year = {2019}, url = {https://eprint.iacr.org/2019/1359}, } @misc{cryptoeprint:2019:135, author = {Sunoo Park and Adam Sealfon}, title = {It wasn't me! Repudiability and Unclaimability of Ring Signatures}, howpublished = {Cryptology ePrint Archive, Report 2019/135}, year = {2019}, url = {https://eprint.iacr.org/2019/135}, } @misc{cryptoeprint:2019:1360, author = {Daniele Cozzo and Nigel P. smart}, title = {Sashimi: Cutting up CSI-FiSh secret keys to produce an actively secure distributed signing protocol}, howpublished = {Cryptology ePrint Archive, Report 2019/1360}, year = {2019}, url = {https://eprint.iacr.org/2019/1360}, } @misc{cryptoeprint:2019:1361, author = {Kaushik Nath and Palash Sarkar}, title = {Efficient Elliptic Curve Diffie-Hellman Computation at the 256-bit Security Level}, howpublished = {Cryptology ePrint Archive, Report 2019/1361}, year = {2019}, url = {https://eprint.iacr.org/2019/1361}, } @misc{cryptoeprint:2019:1362, author = {Colin Boyd and Kai Gellert}, title = {A Modern View on Forward Security}, howpublished = {Cryptology ePrint Archive, Report 2019/1362}, year = {2019}, url = {https://eprint.iacr.org/2019/1362}, } @misc{cryptoeprint:2019:1363, author = {Sébastien Campion and Julien Devigne and Céline Duguey and Pierre-Alain Fouque}, title = {Multi-Device for Signal}, howpublished = {Cryptology ePrint Archive, Report 2019/1363}, year = {2019}, url = {https://eprint.iacr.org/2019/1363}, } @misc{cryptoeprint:2019:1364, author = {Cagdas Calik and Meltem Sonmez Turan and Rene Peralta}, title = {Boolean Functions with Multiplicative Complexity 3 and 4}, howpublished = {Cryptology ePrint Archive, Report 2019/1364}, year = {2019}, url = {https://eprint.iacr.org/2019/1364}, } @misc{cryptoeprint:2019:1365, author = {Megha Byali and Harsh Chaudhari and Arpita Patra and Ajith Suresh}, title = {FLASH: Fast and Robust Framework for Privacy-preserving Machine Learning}, howpublished = {Cryptology ePrint Archive, Report 2019/1365}, year = {2019}, url = {https://eprint.iacr.org/2019/1365}, } @misc{cryptoeprint:2019:1366, author = {Nada EL Kassem and Luis Fiolhais and Paulo Martins and Liqun Chen and Leonel Sousa}, title = {A Lattice-based Enhanced Privacy ID}, howpublished = {Cryptology ePrint Archive, Report 2019/1366}, year = {2019}, url = {https://eprint.iacr.org/2019/1366}, } @misc{cryptoeprint:2019:1367, author = {Keitaro Hashimoto and Wakaha Ogata and Toi Tomita}, title = {Tight reduction for generic construction of certificateless signature and tightly-secure scheme without pairing}, howpublished = {Cryptology ePrint Archive, Report 2019/1367}, year = {2019}, url = {https://eprint.iacr.org/2019/1367}, } @misc{cryptoeprint:2019:1368, author = {Daniel Kales and Sebastian Ramacher and Christian Rechberger and Roman Walch and Mario Werner}, title = {Efficient FPGA Implementations of LowMC and Picnic}, howpublished = {Cryptology ePrint Archive, Report 2019/1368}, year = {2019}, url = {https://eprint.iacr.org/2019/1368}, } @misc{cryptoeprint:2019:1369, author = {Aein Rezaei Shahmirzadi and Shahram Rasoolzadeh and Amir Moradi}, title = {Impeccable Circuits II}, howpublished = {Cryptology ePrint Archive, Report 2019/1369}, year = {2019}, url = {https://eprint.iacr.org/2019/1369}, } @misc{cryptoeprint:2019:136, author = {Florian Bourse and Olivier Sanders}, title = {Divisible E-Cash from Constrained Pseudo-Random Functions}, howpublished = {Cryptology ePrint Archive, Report 2019/136}, year = {2019}, url = {https://eprint.iacr.org/2019/136}, } @misc{cryptoeprint:2019:1370, author = {Priyanka Joshi and Bodhisatwa Mazumdar}, title = {A Subset Fault Analysis of ASCON}, howpublished = {Cryptology ePrint Archive, Report 2019/1370}, year = {2019}, url = {https://eprint.iacr.org/2019/1370}, } @misc{cryptoeprint:2019:1371, author = {Aurore Guillevic}, title = {A short-list of STNFS-secure pairing-friendly curves at the 128-bit security level}, howpublished = {Cryptology ePrint Archive, Report 2019/1371}, year = {2019}, url = {https://eprint.iacr.org/2019/1371}, } @misc{cryptoeprint:2019:1372, author = {Maria Eichlseder and Marcel Nageler and Robert Primas}, title = {Analyzing the Linear Keystream Biases in AEGIS}, howpublished = {Cryptology ePrint Archive, Report 2019/1372}, year = {2019}, url = {https://eprint.iacr.org/2019/1372}, } @misc{cryptoeprint:2019:1373, author = {Daniel Cervantes-Vázquez and Francisco Rodríguez-Henríquez}, title = {A note on the cost of computing odd degree isogenies}, howpublished = {Cryptology ePrint Archive, Report 2019/1373}, year = {2019}, url = {https://eprint.iacr.org/2019/1373}, } @misc{cryptoeprint:2019:1374, author = {Teik Guan Tan and Jianying Zhou}, title = {A Survey of Digital Signing in the Post Quantum Era}, howpublished = {Cryptology ePrint Archive, Report 2019/1374}, year = {2019}, url = {https://eprint.iacr.org/2019/1374}, } @misc{cryptoeprint:2019:1375, author = {Gérald Gavin and Sandrine Tainturier}, title = {New ideas to build noise-free homomorphic cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2019/1375}, year = {2019}, url = {https://eprint.iacr.org/2019/1375}, } @misc{cryptoeprint:2019:1376, author = {Xuecheng Ma and Dongdai Lin}, title = {Generic Constructions of RIBE via Subset Difference Method}, howpublished = {Cryptology ePrint Archive, Report 2019/1376}, year = {2019}, url = {https://eprint.iacr.org/2019/1376}, } @misc{cryptoeprint:2019:1377, author = {Masoumeh Shafieinejad and Navid Nasr Esfahani and Reihaneh Safavi-Naini}, title = {A Scalable Post-quantum Hash-Based Group Signature}, howpublished = {Cryptology ePrint Archive, Report 2019/1377}, year = {2019}, url = {https://eprint.iacr.org/2019/1377}, } @misc{cryptoeprint:2019:1378, author = {Christof Beierle and Alex Biryukov and Luan Cardoso dos Santos and Johann Großschädl and Leo Perrin and Aleksei Udovenko and Vesselin Velichkov and Qingju Wang}, title = {Alzette: A 64-bit ARX-box}, howpublished = {Cryptology ePrint Archive, Report 2019/1378}, year = {2019}, url = {https://eprint.iacr.org/2019/1378}, } @misc{cryptoeprint:2019:1379, author = {Christophe Clavier and Léo Reynaud}, title = {Systematic and Random Searches for Compact 4-Bit and 8-Bit Cryptographic S-Boxes}, howpublished = {Cryptology ePrint Archive, Report 2019/1379}, year = {2019}, url = {https://eprint.iacr.org/2019/1379}, } @misc{cryptoeprint:2019:137, author = {Francesco Berti and Chun Guo and Olivier Pereira and Thomas Peters and François-Xavier Standaert}, title = {TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications}, howpublished = {Cryptology ePrint Archive, Report 2019/137}, year = {2019}, url = {https://eprint.iacr.org/2019/137}, } @misc{cryptoeprint:2019:1380, author = {Elif Bilge Kavun and Nele Mentens and Jo Vliegen and Tolga Yalcin}, title = {Efficient Utilization of DSPs and BRAMs Revisited: New AES-GCM Recipes on FPGAs}, howpublished = {Cryptology ePrint Archive, Report 2019/1380}, year = {2019}, url = {https://eprint.iacr.org/2019/1380}, } @misc{cryptoeprint:2019:1381, author = {Kaisa Nyberg}, title = {The Extended Autocorrelation and Boomerang Tables and Links Between Nonlinearity Properties of Vectorial Boolean Functions}, howpublished = {Cryptology ePrint Archive, Report 2019/1381}, year = {2019}, url = {https://eprint.iacr.org/2019/1381}, } @misc{cryptoeprint:2019:1382, author = {Badih Ghazi and Noah Golowich and Ravi Kumar and Rasmus Pagh and Ameya Velingker}, title = {On the Power of Multiple Anonymous Messages}, howpublished = {Cryptology ePrint Archive, Report 2019/1382}, year = {2019}, url = {https://eprint.iacr.org/2019/1382}, } @misc{cryptoeprint:2019:1383, author = {Karim Eldefrawy and Tancrède Lepoint and Antonin Leroux}, title = {Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities}, howpublished = {Cryptology ePrint Archive, Report 2019/1383}, year = {2019}, url = {https://eprint.iacr.org/2019/1383}, } @misc{cryptoeprint:2019:1384, author = {Keita Emura and Shuichi Katsumata and Yohei Watanabe}, title = {Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiations}, howpublished = {Cryptology ePrint Archive, Report 2019/1384}, year = {2019}, url = {https://eprint.iacr.org/2019/1384}, } @misc{cryptoeprint:2019:1385, author = {Gijs van Dam and Rabiah Abdul Kadir and Puteri N.E. Nohuddin and Halimah Badioze Zaman}, title = {Improvements of the Balance Discovery Attack on Lightning Network Payment Channels}, howpublished = {Cryptology ePrint Archive, Report 2019/1385}, year = {2019}, url = {https://eprint.iacr.org/2019/1385}, } @misc{cryptoeprint:2019:1386, author = {Chao Liu and Zhongxiang Zheng and Keting Jia and Qidi You}, title = {Provably Secure Three-party Password-based Authenticated Key Exchange from RLWE (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2019/1386}, year = {2019}, url = {https://eprint.iacr.org/2019/1386}, } @misc{cryptoeprint:2019:1387, author = {Craig Costello and Benjamin Smith}, title = {The supersingular isogeny problem in genus 2 and beyond}, howpublished = {Cryptology ePrint Archive, Report 2019/1387}, year = {2019}, url = {https://eprint.iacr.org/2019/1387}, } @misc{cryptoeprint:2019:1388, author = {Jayashree Dey and Ratna Dutta}, title = {Secure Key Encapsulation Mechanism with Compact Ciphertext and Public Key from Generalized Srivastava code}, howpublished = {Cryptology ePrint Archive, Report 2019/1388}, year = {2019}, url = {https://eprint.iacr.org/2019/1388}, } @misc{cryptoeprint:2019:1389, author = {Ferdinand Sibleyras}, title = {Generic Attack on Iterated Tweakable FX Constructions}, howpublished = {Cryptology ePrint Archive, Report 2019/1389}, year = {2019}, url = {https://eprint.iacr.org/2019/1389}, } @misc{cryptoeprint:2019:138, author = {Dahmun Goudarzi and Ange Martinelli and Alain Passelègue and Thomas Prest }, title = {Unifying Leakage Models on a Rényi Day}, howpublished = {Cryptology ePrint Archive, Report 2019/138}, year = {2019}, url = {https://eprint.iacr.org/2019/138}, } @misc{cryptoeprint:2019:1390, author = {Elette Boyle and Niv Gilboa and Yuval Ishai and Ariel Nof}, title = {Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs}, howpublished = {Cryptology ePrint Archive, Report 2019/1390}, year = {2019}, url = {https://eprint.iacr.org/2019/1390}, } @misc{cryptoeprint:2019:1391, author = {Susan Hohenberger and Satyanarayana Vusirikala}, title = {Are These Pairing Elements Correct? Automated Verification and Applications}, howpublished = {Cryptology ePrint Archive, Report 2019/1391}, year = {2019}, url = {https://eprint.iacr.org/2019/1391}, } @misc{cryptoeprint:2019:1392, author = {Nina Bindel and John M. Schanck}, title = {Decryption failure is more likely after success}, howpublished = {Cryptology ePrint Archive, Report 2019/1392}, year = {2019}, url = {https://eprint.iacr.org/2019/1392}, } @misc{cryptoeprint:2019:1393, author = {Manuel Barbosa and Gilles Barthe and Karthik Bhargavan and Bruno Blanchet and Cas Cremers and Kevin Liao and Bryan Parno}, title = {SoK: Computer-Aided Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2019/1393}, year = {2019}, url = {https://eprint.iacr.org/2019/1393}, } @misc{cryptoeprint:2019:1394, author = {Dennis R. E. Gnad and Cong Dang Khoa Nguyen and Syed Hashim Gillani and Mehdi B. Tahoori}, title = {Voltage-based Covert Channels in Multi-Tenant FPGAs}, howpublished = {Cryptology ePrint Archive, Report 2019/1394}, year = {2019}, url = {https://eprint.iacr.org/2019/1394}, } @misc{cryptoeprint:2019:1395, author = {Daniel J. Bernstein and Tanja Lange}, title = {McTiny: fast high-confidence post-quantum key erasure for tiny network servers}, howpublished = {Cryptology ePrint Archive, Report 2019/1395}, year = {2019}, url = {https://eprint.iacr.org/2019/1395}, } @misc{cryptoeprint:2019:1396, author = {Yasufumi Hashimoto}, title = {A note on the multivariate cryptosystem based on a linear code}, howpublished = {Cryptology ePrint Archive, Report 2019/1396}, year = {2019}, url = {https://eprint.iacr.org/2019/1396}, } @misc{cryptoeprint:2019:1397, author = {Gaëlle Candel and Rémi Géraud-Stewart and David Naccache}, title = {How to compartment secrets}, howpublished = {Cryptology ePrint Archive, Report 2019/1397}, year = {2019}, url = {https://eprint.iacr.org/2019/1397}, } @misc{cryptoeprint:2019:1398, author = {Xiaoxia Jiang and Youliang Tian}, title = {How to Construct Rational Protocols with Nash Equilibrium Consistency in the UC framework}, howpublished = {Cryptology ePrint Archive, Report 2019/1398}, year = {2019}, url = {https://eprint.iacr.org/2019/1398}, } @misc{cryptoeprint:2019:1399, author = {Jan-Pieter D'Anvers and Mélissa Rossi and Fernando Virdia}, title = {(One) failure is not an option: Bootstrapping the search for failures in lattice-based encryption schemes}, howpublished = {Cryptology ePrint Archive, Report 2019/1399}, year = {2019}, url = {https://eprint.iacr.org/2019/1399}, } @misc{cryptoeprint:2019:139, author = {Hai Zhou and Yuanqi Shen and Amin Rezaei}, title = {Vulnerability and Remedy of Stripped Function Logic Locking}, howpublished = {Cryptology ePrint Archive, Report 2019/139}, year = {2019}, url = {https://eprint.iacr.org/2019/139}, } @misc{cryptoeprint:2019:1400, author = {Assimakis Kattis and Konstantin Panarin and Alexander Vlasov}, title = {RedShift: Transparent SNARKs from List Polynomial Commitment IOPs}, howpublished = {Cryptology ePrint Archive, Report 2019/1400}, year = {2019}, url = {https://eprint.iacr.org/2019/1400}, } @misc{cryptoeprint:2019:1401, author = {Gang Wang and Zhijie Jerry Shi and Mark Nixon and Song Han}, title = {SMChain: A Scalable Blockchain Protocol for Secure Metering Systems in Distributed Industrial Plants}, howpublished = {Cryptology ePrint Archive, Report 2019/1401}, year = {2019}, url = {https://eprint.iacr.org/2019/1401}, } @misc{cryptoeprint:2019:1402, author = {Vincent HERBERT}, title = {Automatize parameter tuning in Ring-Learning-With-Errors-based leveled homomorphic cryptosystem implementations}, howpublished = {Cryptology ePrint Archive, Report 2019/1402}, year = {2019}, url = {https://eprint.iacr.org/2019/1402}, } @misc{cryptoeprint:2019:1403, author = {Ingo Braun and Fabio Campos and Steffen Reith and Marc Stöttinger}, title = {No RISC, no Fun: Comparison of Hardware Accelerated Hash Functions for XMSS}, howpublished = {Cryptology ePrint Archive, Report 2019/1403}, year = {2019}, url = {https://eprint.iacr.org/2019/1403}, } @misc{cryptoeprint:2019:1404, author = {Wouter Castryck and Thomas Decru}, title = {CSIDH on the surface}, howpublished = {Cryptology ePrint Archive, Report 2019/1404}, year = {2019}, url = {https://eprint.iacr.org/2019/1404}, } @misc{cryptoeprint:2019:1405, author = {Houssem Maghrebi and Davide Alessio}, title = {Revisiting Higher-Order Computational Attacks against White-Box Implementations}, howpublished = {Cryptology ePrint Archive, Report 2019/1405}, year = {2019}, url = {https://eprint.iacr.org/2019/1405}, } @misc{cryptoeprint:2019:1406, author = {Tassos Dimtiriou}, title = {Efficient, Coercion-free and Universally Verifiable Blockchain-based Voting}, howpublished = {Cryptology ePrint Archive, Report 2019/1406}, year = {2019}, url = {https://eprint.iacr.org/2019/1406}, } @misc{cryptoeprint:2019:1407, author = {Moni Naor and Omer Paneth and Guy N. Rothblum}, title = {Incrementally Verifiable Computation via Incremental PCPs}, howpublished = {Cryptology ePrint Archive, Report 2019/1407}, year = {2019}, url = {https://eprint.iacr.org/2019/1407}, } @misc{cryptoeprint:2019:1408, author = {Aleksandr Kutsenko}, title = {The group of automorphisms of the set of self-dual bent functions}, howpublished = {Cryptology ePrint Archive, Report 2019/1408}, year = {2019}, url = {https://eprint.iacr.org/2019/1408}, } @misc{cryptoeprint:2019:1409, author = {Gareth T. Davies and Herman Galteland and Kristian Gjøsteen and Yao Jiang}, title = {Cloud-assisted Asynchronous Key Transport with Post-Quantum Security}, howpublished = {Cryptology ePrint Archive, Report 2019/1409}, year = {2019}, url = {https://eprint.iacr.org/2019/1409}, } @misc{cryptoeprint:2019:140, author = {Jinhyun So and Basak Guler and A. Salman Avestimehr and Payman Mohassel}, title = {CodedPrivateML: A Fast and Privacy-Preserving Framework for Distributed Machine Learning}, howpublished = {Cryptology ePrint Archive, Report 2019/140}, year = {2019}, url = {https://eprint.iacr.org/2019/140}, } @misc{cryptoeprint:2019:1410, author = {Kaushik Nath and Palash Sarkar}, title = {Efficient Constant Time Conditional Branching in the Montgomery Ladder}, howpublished = {Cryptology ePrint Archive, Report 2019/1410}, year = {2019}, url = {https://eprint.iacr.org/2019/1410}, } @misc{cryptoeprint:2019:1411, author = {James Howe and Thomas Prest and Thomas Ricosset and Mélissa Rossi}, title = {Isochronous Gaussian Sampling: From Inception to Implementation}, howpublished = {Cryptology ePrint Archive, Report 2019/1411}, year = {2019}, url = {https://eprint.iacr.org/2019/1411}, } @misc{cryptoeprint:2019:1412, author = {Augustin P. Sarr}, title = {Cryptanalysis and Improvement of the Smart-ID Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2019/1412}, year = {2019}, url = {https://eprint.iacr.org/2019/1412}, } @misc{cryptoeprint:2019:1413, author = {Francesco Berti and Chun Guo and Olivier Pereira and Thomas Peters and François-Xavier Standaert}, title = {Strong Authenticity with Leakage under Weak and Falsifiable Physical Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2019/1413}, year = {2019}, url = {https://eprint.iacr.org/2019/1413}, } @misc{cryptoeprint:2019:1414, author = {Muhammad Rezal Kamel Ariffin}, title = {A New Encryption Scheme Based On Subset Identifying Problem}, howpublished = {Cryptology ePrint Archive, Report 2019/1414}, year = {2019}, url = {https://eprint.iacr.org/2019/1414}, } @misc{cryptoeprint:2019:1415, author = {Hossein Arabnezhad-Khanoki and Babak Sadeghiyan}, title = {Toward A More Efficient Gr\"obner-based Algebraic Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2019/1415}, year = {2019}, url = {https://eprint.iacr.org/2019/1415}, } @misc{cryptoeprint:2019:1416, author = {Melissa Chase and Trevor Perrin and Greg Zaverucha}, title = {The Signal Private Group System and Anonymous Credentials Supporting Efficient Verifiable Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/1416}, year = {2019}, url = {https://eprint.iacr.org/2019/1416}, } @misc{cryptoeprint:2019:1417, author = {Xuejun Fan and Song Tian and Bao Li and Xiu Xu}, title = {CSIDH on Other Form of Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2019/1417}, year = {2019}, url = {https://eprint.iacr.org/2019/1417}, } @misc{cryptoeprint:2019:1418, author = {Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso}, title = {Quantum-resistant Designated-ciphertext Searchable Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/1418}, year = {2019}, url = {https://eprint.iacr.org/2019/1418}, } @misc{cryptoeprint:2019:1419, author = {Ahmet Turan Erozan and Michael Hefenbrock and Michael Beigl and Jasmin Aghassi-Hagmann and Mehdi B. Tahoori}, title = {Image PUF: A Physical Unclonable Function for Printed Electronics based on Optical Variation of Printed Inks}, howpublished = {Cryptology ePrint Archive, Report 2019/1419}, year = {2019}, url = {https://eprint.iacr.org/2019/1419}, } @misc{cryptoeprint:2019:141, author = {Christina Boura and Anne Canteaut and Daniel Coggia}, title = {A General Proof Framework for Recent AES Distinguishers}, howpublished = {Cryptology ePrint Archive, Report 2019/141}, year = {2019}, url = {https://eprint.iacr.org/2019/141}, } @misc{cryptoeprint:2019:1420, author = {Antonis Aggelakis and Prastudy Fauzi and Georgios Korfiatis and Panos Louridas and Foteinos Mergoupis-Anagnou and Janno Siim and Michal Zajac}, title = {A Non-Interactive Shuffle Argument With Low Trust Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2019/1420}, year = {2019}, url = {https://eprint.iacr.org/2019/1420}, } @misc{cryptoeprint:2019:1421, author = {Nicky Mouha and Christopher Celi}, title = {Extending NIST's CAVP Testing of Cryptographic Hash Function Implementations}, howpublished = {Cryptology ePrint Archive, Report 2019/1421}, year = {2019}, url = {https://eprint.iacr.org/2019/1421}, } @misc{cryptoeprint:2019:1422, author = {Xiong Fan and Joshua Gancher and Greg Morrisett and Elaine Shi and Kristina Sojakova}, title = {IPDL: A Probabilistic Dataflow Logic for Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2019/1422}, year = {2019}, url = {https://eprint.iacr.org/2019/1422}, } @misc{cryptoeprint:2019:1423, author = {Nir Drucker and Shay Gueron and Dusan Kostic}, title = {QC-MDPC decoders with several shades of gray}, howpublished = {Cryptology ePrint Archive, Report 2019/1423}, year = {2019}, url = {https://eprint.iacr.org/2019/1423}, } @misc{cryptoeprint:2019:1424, author = {Chun Guo and François-Xavier Standaert and Weijia Wang and Yu Yu}, title = {Efficient Side-Channel Secure Message Authentication with Better Bounds}, howpublished = {Cryptology ePrint Archive, Report 2019/1424}, year = {2019}, url = {https://eprint.iacr.org/2019/1424}, } @misc{cryptoeprint:2019:1425, author = {Zhiguo Wan and Wei Liu and Hui Cui}, title = {HIBEChain: A Hierarchical Identity-based Blockchain System for Large-Scale IoT}, howpublished = {Cryptology ePrint Archive, Report 2019/1425}, year = {2019}, url = {https://eprint.iacr.org/2019/1425}, } @misc{cryptoeprint:2019:1426, author = {Boris Ryabko}, title = {On asymptotically optimal tests for random number generators}, howpublished = {Cryptology ePrint Archive, Report 2019/1426}, year = {2019}, url = {https://eprint.iacr.org/2019/1426}, } @misc{cryptoeprint:2019:1427, author = {Sumanta Sarkar and Kalikinkar Mandal and Dhiman Saha}, title = {On the Relationship between Resilient Boolean Functions and Linear Branch Number of S-boxes}, howpublished = {Cryptology ePrint Archive, Report 2019/1427}, year = {2019}, url = {https://eprint.iacr.org/2019/1427}, } @misc{cryptoeprint:2019:1428, author = {Shion Samadder Chaudhury and Sabyasachi Dutta and Kouichi Sakurai}, title = {$AC^0$ Constructions for Evolving Secret Sharing Schemes and Redistribution of Secret Shares}, howpublished = {Cryptology ePrint Archive, Report 2019/1428}, year = {2019}, url = {https://eprint.iacr.org/2019/1428}, } @misc{cryptoeprint:2019:1429, author = {Shion Samadder Chaudhury and Sabyasachi Dutta and Kouichi Sakurai}, title = {Secret Sharing Schemes : A Fine Grained Analysis}, howpublished = {Cryptology ePrint Archive, Report 2019/1429}, year = {2019}, url = {https://eprint.iacr.org/2019/1429}, } @misc{cryptoeprint:2019:142, author = {Matteo Campanelli and Dario Fiore and Anaïs Querol}, title = {LegoSNARK: Modular Design and Composition of Succinct Zero-Knowledge Proofs}, howpublished = {Cryptology ePrint Archive, Report 2019/142}, year = {2019}, url = {https://eprint.iacr.org/2019/142}, } @misc{cryptoeprint:2019:1430, author = {Alessandro Chiesa and Siqi Liu}, title = {On the Impossibility of Probabilistic Proofs in Relativized Worlds}, howpublished = {Cryptology ePrint Archive, Report 2019/1430}, year = {2019}, url = {https://eprint.iacr.org/2019/1430}, } @misc{cryptoeprint:2019:1431, author = {Arasu Arun and C. Pandu Rangan}, title = {Cross-Chain Communication Using Receipts}, howpublished = {Cryptology ePrint Archive, Report 2019/1431}, year = {2019}, url = {https://eprint.iacr.org/2019/1431}, } @misc{cryptoeprint:2019:1432, author = {Diana Maimut and George Teseleanu}, title = {A Generic View on the Unified Zero-Knowledge Protocol and its Applications}, howpublished = {Cryptology ePrint Archive, Report 2019/1432}, year = {2019}, url = {https://eprint.iacr.org/2019/1432}, } @misc{cryptoeprint:2019:1433, author = {Sebastian Lauer and Kai Gellert and Robert Merget and Tobias Handirk and Jörg Schwenk}, title = {T0RTT: Non-Interactive Immediate Forward-Secret Single-Pass Circuit Construction}, howpublished = {Cryptology ePrint Archive, Report 2019/1433}, year = {2019}, url = {https://eprint.iacr.org/2019/1433}, } @misc{cryptoeprint:2019:1434, author = {Nicolas Sendrier and Valentin Vasseur}, title = {About Low DFR for QC-MDPC Decoding}, howpublished = {Cryptology ePrint Archive, Report 2019/1434}, year = {2019}, url = {https://eprint.iacr.org/2019/1434}, } @misc{cryptoeprint:2019:1435, author = {Zheng Yi and Howard Ye and Patrick Dai and Sun Tongcheng and Vladislav Gelfer}, title = {Confidential Assets on MimbleWimble}, howpublished = {Cryptology ePrint Archive, Report 2019/1435}, year = {2019}, url = {https://eprint.iacr.org/2019/1435}, } @misc{cryptoeprint:2019:1436, author = {Paul Kirchner and Thomas Espitau and Pierre-Alain Fouque}, title = {Algebraic and Euclidean Lattices: Optimal Lattice Reduction and Beyond}, howpublished = {Cryptology ePrint Archive, Report 2019/1436}, year = {2019}, url = {https://eprint.iacr.org/2019/1436}, } @misc{cryptoeprint:2019:1437, author = {Fei Meng and Mingqiang Wang}, title = {Reverse Outsource: Reduce the Cloud's Workload in Outsourced Attribute-Based Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2019/1437}, year = {2019}, url = {https://eprint.iacr.org/2019/1437}, } @misc{cryptoeprint:2019:1438, author = {Zhengbin Liu and Yongqiang Li and Lin Jiao and Mingsheng Wang}, title = {A new method for Searching Optimal Differential and Linear Trails in ARX Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2019/1438}, year = {2019}, url = {https://eprint.iacr.org/2019/1438}, } @misc{cryptoeprint:2019:1439, author = {S. Sharmila Deva Selvi and Irene Miriam Isaac and C. Pandu Rangan}, title = {Cryptanalysis of a pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds}, howpublished = {Cryptology ePrint Archive, Report 2019/1439}, year = {2019}, url = {https://eprint.iacr.org/2019/1439}, } @misc{cryptoeprint:2019:143, author = {Benjamin Hettwer and Stefan Gehrer and Tim Güneysu}, title = {Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery}, howpublished = {Cryptology ePrint Archive, Report 2019/143}, year = {2019}, url = {https://eprint.iacr.org/2019/143}, } @misc{cryptoeprint:2019:1440, author = {Sarah Azouvi and George Danezis and Valeria Nikolaenko}, title = {Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems}, howpublished = {Cryptology ePrint Archive, Report 2019/1440}, year = {2019}, url = {https://eprint.iacr.org/2019/1440}, } @misc{cryptoeprint:2019:1441, author = {Paolo Santini and Alessandro Barenghi and Gerardo Pelosi and Marco Baldi and Franco Chiaraluce}, title = {A Code-specific Conservative Model for the Failure Rate of Bit-flipping Decoding of LDPC Codes with Cryptographic Applications}, howpublished = {Cryptology ePrint Archive, Report 2019/1441}, year = {2019}, url = {https://eprint.iacr.org/2019/1441}, } @misc{cryptoeprint:2019:1442, author = {Fei Meng }, title = {Server-Aided Revocable Identity-Based Encryption Revisited}, howpublished = {Cryptology ePrint Archive, Report 2019/1442}, year = {2019}, url = {https://eprint.iacr.org/2019/1442}, } @misc{cryptoeprint:2019:1443, author = {Abhrajit Sengupta and Ozgur Sinanoglu}, title = {CAS-Unlock: Unlocking CAS-Lock without Access to a Reverse-Engineered Netlist}, howpublished = {Cryptology ePrint Archive, Report 2019/1443}, year = {2019}, url = {https://eprint.iacr.org/2019/1443}, } @misc{cryptoeprint:2019:1444, author = {Kostis Karantias and Aggelos Kiayias and Nikos Leonardos and Dionysis Zindros}, title = {Compact Storage of Superblocks for NIPoPoW Applications}, howpublished = {Cryptology ePrint Archive, Report 2019/1444}, year = {2019}, url = {https://eprint.iacr.org/2019/1444}, } @misc{cryptoeprint:2019:1445, author = {Madura A Shelton and Niels Samwel and Lejla Batina and Francesco Regazzoni and Markus Wagner and Yuval Yarom}, title = {Rosita: Towards Automatic Elimination of Power-Analysis Leakage in Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2019/1445}, year = {2019}, url = {https://eprint.iacr.org/2019/1445}, } @misc{cryptoeprint:2019:1446, author = {Claude Carlet and Pierrick Méaux}, title = {Boolean functions for homomorphic-friendly stream ciphers}, howpublished = {Cryptology ePrint Archive, Report 2019/1446}, year = {2019}, url = {https://eprint.iacr.org/2019/1446}, } @misc{cryptoeprint:2019:1447, author = {Christian Paquin and Douglas Stebila and Goutam Tamvada}, title = {Benchmarking Post-Quantum Cryptography in TLS}, howpublished = {Cryptology ePrint Archive, Report 2019/1447}, year = {2019}, url = {https://eprint.iacr.org/2019/1447}, } @misc{cryptoeprint:2019:1448, author = {Johann Heyszl and Katja Miller and Florian Unterstein and Marc Schink and Alexander Wagner and Horst Gieser and Sven Freud and Tobias Damm and Dominik Klein and Dennis Kügler}, title = {Investigating Profiled Side-Channel Attacks Against the DES Key Schedule}, howpublished = {Cryptology ePrint Archive, Report 2019/1448}, year = {2019}, url = {https://eprint.iacr.org/2019/1448}, } @misc{cryptoeprint:2019:1449, author = {David Butler and David Aspinall and Adria Gascon}, title = {Formalising Oblivious Transfer in the Semi-Honest and Malicious Model in CryptHOL}, howpublished = {Cryptology ePrint Archive, Report 2019/1449}, year = {2019}, url = {https://eprint.iacr.org/2019/1449}, } @misc{cryptoeprint:2019:144, author = {Rajat Sadhukhan and Nilanjan Datta and Debdeep Mukhopadhyay}, title = {Modeling Power Efficiency of S-boxes Using Machine Learning}, howpublished = {Cryptology ePrint Archive, Report 2019/144}, year = {2019}, url = {https://eprint.iacr.org/2019/144}, } @misc{cryptoeprint:2019:1450, author = {Eshan Chattopadhyay and Jesse Goodman and Vipul Goyal and Xin Li}, title = {Extractors for Adversarial Sources via Extremal Hypergraphs}, howpublished = {Cryptology ePrint Archive, Report 2019/1450}, year = {2019}, url = {https://eprint.iacr.org/2019/1450}, } @misc{cryptoeprint:2019:1451, author = {Thomas Plantard and Arnaud Sipasseuth and Willy Susilo and Vincent Zucca}, title = {Tight bound on NewHope failure probability}, howpublished = {Cryptology ePrint Archive, Report 2019/1451}, year = {2019}, url = {https://eprint.iacr.org/2019/1451}, } @misc{cryptoeprint:2019:1452, author = {D. Papachristoudis and D. Hristu-Varsakelis and F. Baldimtsi and G. Stephanides}, title = {Leakage-Resilient Lattice-Based Partially Blind Signatures}, howpublished = {Cryptology ePrint Archive, Report 2019/1452}, year = {2019}, url = {https://eprint.iacr.org/2019/1452}, } @misc{cryptoeprint:2019:1453, author = {Bin Wang and Xiaozhuo Gu and Yingshan Yang}, title = {Saber on ESP32}, howpublished = {Cryptology ePrint Archive, Report 2019/1453}, year = {2019}, url = {https://eprint.iacr.org/2019/1453}, } @misc{cryptoeprint:2019:1454, author = {Claude Crépeau and Arnaud Massenet and Louis Salvail and Lucas Stinchcombe and Nan Yang}, title = {Practical Relativistic Zero-Knowledge for NP}, howpublished = {Cryptology ePrint Archive, Report 2019/1454}, year = {2019}, url = {https://eprint.iacr.org/2019/1454}, } @misc{cryptoeprint:2019:1455, author = {Yanyan Liu and Yiru Sun}, title = {Generic Construction of Server-Aided Revocable Hierarchical Identity-Based Encryption with Decryption Key Exposure Resistance}, howpublished = {Cryptology ePrint Archive, Report 2019/1455}, year = {2019}, url = {https://eprint.iacr.org/2019/1455}, } @misc{cryptoeprint:2019:1456, author = {Chitchanok Chuengsatiansup and Thomas Prest and Damien Stehlé and Alexandre Wallet and Keita Xagawa}, title = {ModFalcon: compact signatures based on module NTRU lattices}, howpublished = {Cryptology ePrint Archive, Report 2019/1456}, year = {2019}, url = {https://eprint.iacr.org/2019/1456}, } @misc{cryptoeprint:2019:1457, author = {Colin Boyd and Gareth T. Davies and Kristian Gjøsteen and Yao Jiang}, title = {RISE and SHINE: Fast and Secure Updatable Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/1457}, year = {2019}, url = {https://eprint.iacr.org/2019/1457}, } @misc{cryptoeprint:2019:1458, author = {Moni Naor and Lior Rotem and Gil Segev}, title = {Out-of-Band Authenticated Group Key Exchange: From Strong Authentication to Immediate Key Delivery}, howpublished = {Cryptology ePrint Archive, Report 2019/1458}, year = {2019}, url = {https://eprint.iacr.org/2019/1458}, } @misc{cryptoeprint:2019:1459, author = {Norman Lahr and Ruben Niederhagen and Richard Petri and Simona Samardjiska}, title = {Side Channel Information Set Decoding}, howpublished = {Cryptology ePrint Archive, Report 2019/1459}, year = {2019}, url = {https://eprint.iacr.org/2019/1459}, } @misc{cryptoeprint:2019:145, author = {Jun Jie Sim and Fook Mun Chan and Shibin Chen and Benjamin Hong Meng Tan and Khin Mi Mi Aung}, title = {Achieving GWAS with Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/145}, year = {2019}, url = {https://eprint.iacr.org/2019/145}, } @misc{cryptoeprint:2019:1460, author = {Yongge Wang}, title = {Byzantine Fault Tolerance in Partially Connected Asynchronous Networks}, howpublished = {Cryptology ePrint Archive, Report 2019/1460}, year = {2019}, url = {https://eprint.iacr.org/2019/1460}, } @misc{cryptoeprint:2019:1461, author = {Morteza Adeli and Nasour Bagheri}, title = {Cryptanalysis of two recently proposed PUF based authentication protocols for IoT: PHEMAP and Salted PHEMAP}, howpublished = {Cryptology ePrint Archive, Report 2019/1461}, year = {2019}, url = {https://eprint.iacr.org/2019/1461}, } @misc{cryptoeprint:2019:1462, author = {Sigurd Eskeland}, title = {Privacy-preserving greater-than integer comparison without binary decomposition}, howpublished = {Cryptology ePrint Archive, Report 2019/1462}, year = {2019}, url = {https://eprint.iacr.org/2019/1462}, } @misc{cryptoeprint:2019:1463, author = {Amin Rezaei and Yuanqi Shen and Hai Zhou}, title = {Rescuing Logic Encryption in Post-SAT Era by Locking & Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2019/1463}, year = {2019}, url = {https://eprint.iacr.org/2019/1463}, } @misc{cryptoeprint:2019:1464, author = {Marshall Ball and Dana Dachman-Soled and Mukul Kulkarni}, title = {New Techniques for Zero-Knowledge: Leveraging Inefficient Provers to Reduce Assumptions and Interaction}, howpublished = {Cryptology ePrint Archive, Report 2019/1464}, year = {2019}, url = {https://eprint.iacr.org/2019/1464}, } @misc{cryptoeprint:2019:1465, author = {Daniel R. L. Brown}, title = {An optimist's Poisson model of cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2019/1465}, year = {2019}, url = {https://eprint.iacr.org/2019/1465}, } @misc{cryptoeprint:2019:1466, author = {Edward Eaton and Fang Song}, title = {A Note on the Instantiability of the Quantum Random Oracle}, howpublished = {Cryptology ePrint Archive, Report 2019/1466}, year = {2019}, url = {https://eprint.iacr.org/2019/1466}, } @misc{cryptoeprint:2019:1467, author = {Andrew M. K. Nassief}, title = {Distributed Web Systems Leading to Hardware Oriented Cryptography and Post-Quantum Cryptologic Methodologies}, howpublished = {Cryptology ePrint Archive, Report 2019/1467}, year = {2019}, url = {https://eprint.iacr.org/2019/1467}, } @misc{cryptoeprint:2019:1468, author = {Jung Hee Cheon and Duhyeong Kim and Taechan Kim and Yongha Son}, title = {A New Trapdoor over Module-NTRU Lattice and its Application to ID-based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/1468}, year = {2019}, url = {https://eprint.iacr.org/2019/1468}, } @misc{cryptoeprint:2019:1469, author = {Georg Maringer and Tim Fritzmann and Johanna Sepúlveda}, title = {The Influence of LWE/RLWE Parameters on the Stochastic Dependence of Decryption Failures}, howpublished = {Cryptology ePrint Archive, Report 2019/1469}, year = {2019}, url = {https://eprint.iacr.org/2019/1469}, } @misc{cryptoeprint:2019:146, author = {Ling Song and Xianrui Qin and Lei Hu}, title = {Boomerang Connectivity Table Revisited}, howpublished = {Cryptology ePrint Archive, Report 2019/146}, year = {2019}, url = {https://eprint.iacr.org/2019/146}, } @misc{cryptoeprint:2019:1470, author = {Carsten Baum and Tore K. Frederiksen and Julia Hesse and Anja Lehmann and Avishay Yanai}, title = {Proactively Secure Distributed Single Sign-On, or How to Trust a Hacked Server}, howpublished = {Cryptology ePrint Archive, Report 2019/1470}, year = {2019}, url = {https://eprint.iacr.org/2019/1470}, } @misc{cryptoeprint:2019:1471, author = {Lukas Malina and Gautam Srivastava and Petr Dzurenda and Jan Hajny and Sara Ricci}, title = {A Privacy-Enhancing Framework for Internet of Things Services}, howpublished = {Cryptology ePrint Archive, Report 2019/1471}, year = {2019}, url = {https://eprint.iacr.org/2019/1471}, } @misc{cryptoeprint:2019:1472, author = {Jan Camenisch and Maria Dubovitskaya and Patrick Towa}, title = {Efficient Fully Secure Leakage-Deterring Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/1472}, year = {2019}, url = {https://eprint.iacr.org/2019/1472}, } @misc{cryptoeprint:2019:1473, author = {Nils Wisiol and Christopher Mühl and Niklas Pirnay and Phuong Ha Nguyen and Marian Margraf and Jean-Pierre Seifert and Marten van Dijk and Ulrich Rührmair}, title = {Splitting the Interpose PUF: A Novel Modeling Attack Strategy}, howpublished = {Cryptology ePrint Archive, Report 2019/1473}, year = {2019}, url = {https://eprint.iacr.org/2019/1473}, } @misc{cryptoeprint:2019:1474, author = {Lichao Wu and Stjepan Picek}, title = {Remove Some Noise: On Pre-processing of Side-channel Measurements with Autoencoders}, howpublished = {Cryptology ePrint Archive, Report 2019/1474}, year = {2019}, url = {https://eprint.iacr.org/2019/1474}, } @misc{cryptoeprint:2019:1475, author = {Bishwajit Chakraborty and Ashwin Jha and Mridul Nandi}, title = {On the Security of Sponge-type Authenticated Encryption Modes}, howpublished = {Cryptology ePrint Archive, Report 2019/1475}, year = {2019}, url = {https://eprint.iacr.org/2019/1475}, } @misc{cryptoeprint:2019:1476, author = {Leo Weissbart and Stjepan Picek and Lejla Batina}, title = {On the Performance of Multilayer Perceptron in Profiling Side-channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2019/1476}, year = {2019}, url = {https://eprint.iacr.org/2019/1476}, } @misc{cryptoeprint:2019:1477, author = {Daan van der Valk and Stjepan Picek and Shivam Bhasin}, title = {Kilroy was here: The First Step Towards Explainability of Neural Networks in Profiled Side-channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2019/1477}, year = {2019}, url = {https://eprint.iacr.org/2019/1477}, } @misc{cryptoeprint:2019:1478, author = {Xinping Zhou and Kexin Qiao and Changhai Ou}, title = {Leakage Detection with Kolmogorov-Smirnov Test}, howpublished = {Cryptology ePrint Archive, Report 2019/1478}, year = {2019}, url = {https://eprint.iacr.org/2019/1478}, } @misc{cryptoeprint:2019:1479, author = {Jongkil Kim and Willy Susilo and Fuchun Guo and Joonsang Baek and Nan Li}, title = {A New Encoding Framework for Predicate Encryption with Non-Linear Structures in Prime Order Groups}, howpublished = {Cryptology ePrint Archive, Report 2019/1479}, year = {2019}, url = {https://eprint.iacr.org/2019/1479}, } @misc{cryptoeprint:2019:147, author = {Jian Guo and Guohong Liao and Guozhen Liu and Meicheng Liu and Kexin Qiao and Ling Song}, title = {Practical Collision Attacks against Round-Reduced SHA-3}, howpublished = {Cryptology ePrint Archive, Report 2019/147}, year = {2019}, url = {https://eprint.iacr.org/2019/147}, } @misc{cryptoeprint:2019:1480, author = {Fouazou Lontouo Perez Broon and Emmanuel Fouotsa}, title = {Analogue of V\'{e}lu's Formulas for Computing Isogenies over Hessian Model of Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2019/1480}, year = {2019}, url = {https://eprint.iacr.org/2019/1480}, } @misc{cryptoeprint:2019:1481, author = {Alexey Oblaukhov}, title = {On metric regularity of Reed-Muller codes}, howpublished = {Cryptology ePrint Archive, Report 2019/1481}, year = {2019}, url = {https://eprint.iacr.org/2019/1481}, } @misc{cryptoeprint:2019:1482, author = {Jiaheng Zhang and Tiancheng Xie and Yupeng Zhang and Dawn Song}, title = {Transparent Polynomial Delegation and Its Applications to Zero Knowledge Proof}, howpublished = {Cryptology ePrint Archive, Report 2019/1482}, year = {2019}, url = {https://eprint.iacr.org/2019/1482}, } @misc{cryptoeprint:2019:1483, author = {Asra Ali and Tancrède Lepoint and Sarvar Patel and Mariana Raykova and Phillipp Schoppmann and Karn Seth and Kevin Yeo}, title = {Communication--Computation Trade-offs in PIR}, howpublished = {Cryptology ePrint Archive, Report 2019/1483}, year = {2019}, url = {https://eprint.iacr.org/2019/1483}, } @misc{cryptoeprint:2019:1484, author = {Atsuki Momose}, title = {Force-Locking Attack on Sync Hotstuff}, howpublished = {Cryptology ePrint Archive, Report 2019/1484}, year = {2019}, url = {https://eprint.iacr.org/2019/1484}, } @misc{cryptoeprint:2019:1485, author = {Hiroshi Okano and Keita Emura and Takuya Ishibashi and Toshihiro Ohigashi and Tatsuya Suzuki}, title = {Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 Pairings}, howpublished = {Cryptology ePrint Archive, Report 2019/1485}, year = {2019}, url = {https://eprint.iacr.org/2019/1485}, } @misc{cryptoeprint:2019:1486, author = {Ramiro Martínez and Paz Morillo}, title = {RLWE-based Zero-Knowledge Proofs for linear and multiplicative relations}, howpublished = {Cryptology ePrint Archive, Report 2019/1486}, year = {2019}, url = {https://eprint.iacr.org/2019/1486}, } @misc{cryptoeprint:2019:1487, author = {Changhai Ou and Degang Sun and Siew-Kei Lam and Xinping Zhou and Kexin Qiao and Qu Wang}, title = {SNR-Centric Power Trace Extractors for Side-Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2019/1487}, year = {2019}, url = {https://eprint.iacr.org/2019/1487}, } @misc{cryptoeprint:2019:1488, author = {Shohei Egashira and Yuyu Wang and Keisuke Tanaka}, title = {Fine-Grained Cryptography Revisited}, howpublished = {Cryptology ePrint Archive, Report 2019/1488}, year = {2019}, url = {https://eprint.iacr.org/2019/1488}, } @misc{cryptoeprint:2019:1489, author = {Joel Alwen and Margarita Capretto and Miguel Cueto and Chethan Kamath and Karen Klein and Guillermo Pascual-Perez and Krzysztof Pietrzak and Michael Walter}, title = {Keep the Dirt: Tainted TreeKEM, an Efficient and Provably Secure Continuous Group Key Agreement Protocol}, howpublished = {Cryptology ePrint Archive, Report 2019/1489}, year = {2019}, url = {https://eprint.iacr.org/2019/1489}, } @misc{cryptoeprint:2019:148, author = {Ariel Gabizon}, title = {On the efficiency of pairing-based proofs under the d-PKE}, howpublished = {Cryptology ePrint Archive, Report 2019/148}, year = {2019}, url = {https://eprint.iacr.org/2019/148}, } @misc{cryptoeprint:2019:1490, author = {Jintai Ding and Joshua Deaton and Kurt Schmidt and Vishakha and Zheng Zhang}, title = {Cryptanalysis of The Lifted Unbalanced Oil Vinegar Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2019/1490}, year = {2019}, url = {https://eprint.iacr.org/2019/1490}, } @misc{cryptoeprint:2019:1491, author = {Yuyin Yu and Nikolay Kaleyski and Lilya Budaghyan and Yongqiang Li}, title = {Classification of quadratic APN functions with coefficients in GF(2) for dimensions up to 9}, howpublished = {Cryptology ePrint Archive, Report 2019/1491}, year = {2019}, url = {https://eprint.iacr.org/2019/1491}, } @misc{cryptoeprint:2019:1492, author = {Jean-Philippe Aumasson}, title = {Too much crypto}, howpublished = {Cryptology ePrint Archive, Report 2019/1492}, year = {2019}, url = {https://eprint.iacr.org/2019/1492}, } @misc{cryptoeprint:2019:1493, author = {Kwang Ho Kim and Junyop Choe and Sihem Mesnager}, title = {Solving $X^{q+1}+X+a=0$ over Finite Fields}, howpublished = {Cryptology ePrint Archive, Report 2019/1493}, year = {2019}, url = {https://eprint.iacr.org/2019/1493}, } @misc{cryptoeprint:2019:1494, author = {Alex Ozdemir and Riad S. Wahby and Dan Boneh}, title = {Scaling Verifiable Computation Using Efficient Set Accumulators}, howpublished = {Cryptology ePrint Archive, Report 2019/1494}, year = {2019}, url = {https://eprint.iacr.org/2019/1494}, } @misc{cryptoeprint:2019:1495, author = {Ashwin Jha and Mridul Nandi}, title = {Tight Security of Cascaded LRW2}, howpublished = {Cryptology ePrint Archive, Report 2019/1495}, year = {2019}, url = {https://eprint.iacr.org/2019/1495}, } @misc{cryptoeprint:2019:1496, author = {Chang-Bin Wang and Shu-Mei Hsu and Hsiang Chang and Jue-Sam Chou}, title = {Improved on Identity-based quantum signature based on Bell states}, howpublished = {Cryptology ePrint Archive, Report 2019/1496}, year = {2019}, url = {https://eprint.iacr.org/2019/1496}, } @misc{cryptoeprint:2019:1497, author = {Joon-Woo Lee and Young-Sik Kim and Jong-Seon No}, title = {Analysis of Modified Shell Sort for Fully Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/1497}, year = {2019}, url = {https://eprint.iacr.org/2019/1497}, } @misc{cryptoeprint:2019:1498, author = {Rajeev Anand Sahu and Agnese Gini and Ankan Pal}, title = {Supersingular Isogeny-Based Designated Verifier Blind Signature}, howpublished = {Cryptology ePrint Archive, Report 2019/1498}, year = {2019}, url = {https://eprint.iacr.org/2019/1498}, } @misc{cryptoeprint:2019:1499, author = {Marc Beunardeau and Fatima-Ezzhara El Orche and Diana Maimut and David Naccache and Peter B. Roenne and Peter Y.A. Ryan}, title = {Authenticated Key Distribution: When the Coupon Collector is Your Enemy}, howpublished = {Cryptology ePrint Archive, Report 2019/1499}, year = {2019}, url = {https://eprint.iacr.org/2019/1499}, } @misc{cryptoeprint:2019:149, author = {Jiang Zhang and Yu Yu and Shuqin Fan and Zhenfeng Zhang}, title = {Improved Lattice-based CCA2-Secure PKE in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2019/149}, year = {2019}, url = {https://eprint.iacr.org/2019/149}, } @misc{cryptoeprint:2019:150, author = {Tung Chou}, title = {QcBits: Constant-Time Small-Key Code-Based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2019/150}, year = {2019}, url = {https://eprint.iacr.org/2019/150}, } @misc{cryptoeprint:2019:151, author = {Peter Schwabe and Bas Westerbaan}, title = {Solving binary MQ with Grover's algorithm}, howpublished = {Cryptology ePrint Archive, Report 2019/151}, year = {2019}, url = {https://eprint.iacr.org/2019/151}, } @misc{cryptoeprint:2019:152, author = {Duhyeong Kim and Yongha Son and Dongwoo Kim and Andrey Kim and Seungwan Hong and Jung Hee Cheon}, title = {Privacy-preserving Approximate GWAS computation based on Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/152}, year = {2019}, url = {https://eprint.iacr.org/2019/152}, } @misc{cryptoeprint:2019:153, author = {Emmanuela Orsini and Nigel P. Smart and Frederik Vercauteren}, title = {Overdrive2k: Efficient Secure MPC over $Z_{2^k}$ from Somewhat Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/153}, year = {2019}, url = {https://eprint.iacr.org/2019/153}, } @misc{cryptoeprint:2019:154, author = {Poulami Das and Lisa Eckey and Tommaso Frassetto and David Gens and Kristina Hostáková and Patrick Jauernig and Sebastian Faust and Ahmad-Reza Sadeghi}, title = {FastKitten: Practical Smart Contracts on Bitcoin}, howpublished = {Cryptology ePrint Archive, Report 2019/154}, year = {2019}, url = {https://eprint.iacr.org/2019/154}, } @misc{cryptoeprint:2019:155, author = {Matthew Walters and Sujoy Sinha Roy}, title = {Constant-time BCH Error-Correcting Code}, howpublished = {Cryptology ePrint Archive, Report 2019/155}, year = {2019}, url = {https://eprint.iacr.org/2019/155}, } @misc{cryptoeprint:2019:156, author = {Siddhartha Jayanti and Srinivasan Raghuraman and Nikhil Vyas}, title = {Efficient Constructions for Almost-everywhere Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2019/156}, year = {2019}, url = {https://eprint.iacr.org/2019/156}, } @misc{cryptoeprint:2019:157, author = {Paulo S. L. M. Barreto and Marcos A. Simplicio Jr. and Jefferson E. Ricardini and Harsh Kupwade Patil}, title = {Schnorr-based implicit certification: improving the security and efficiency of V2X communications}, howpublished = {Cryptology ePrint Archive, Report 2019/157}, year = {2019}, url = {https://eprint.iacr.org/2019/157}, } @misc{cryptoeprint:2019:158, author = {Chris Peikert and Sina Shiehian}, title = {Noninteractive Zero Knowledge for NP from (Plain) Learning With Errors}, howpublished = {Cryptology ePrint Archive, Report 2019/158}, year = {2019}, url = {https://eprint.iacr.org/2019/158}, } @misc{cryptoeprint:2019:159, author = {Chen-Da Liu-Zhang and Julian Loss and Ueli Maurer and Tal Moran and Daniel Tschudi}, title = {Robust MPC: Asynchronous Responsiveness yet Synchronous Security}, howpublished = {Cryptology ePrint Archive, Report 2019/159}, year = {2019}, url = {https://eprint.iacr.org/2019/159}, } @misc{cryptoeprint:2019:160, author = {Sujoy Sinha Roy and Furkan Turan and Kimmo Jarvinen and Frederik Vercauteren and Ingrid Verbauwhede}, title = {FPGA-based High-Performance Parallel Architecture for Homomorphic Computing on Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2019/160}, year = {2019}, url = {https://eprint.iacr.org/2019/160}, } @misc{cryptoeprint:2019:161, author = {Andrea Francesco Iuorio and Andrea Visconti}, title = {Understanding Optimizations and Measuring Performances of PBKDF2}, howpublished = {Cryptology ePrint Archive, Report 2019/161}, year = {2019}, url = {https://eprint.iacr.org/2019/161}, } @misc{cryptoeprint:2019:162, author = {Palash Sarkar}, title = {Multi-Stage Proof-of-Work Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2019/162}, year = {2019}, url = {https://eprint.iacr.org/2019/162}, } @misc{cryptoeprint:2019:163, author = {Melissa Azouaoui and Romain Poussier and François-Xavier Standaert}, title = {Fast Side-Channel Security Evaluation of ECC Implementations: Shortcut Formulas for Horizontal Side-channel Attacks against ECSM with the Montgomery ladder}, howpublished = {Cryptology ePrint Archive, Report 2019/163}, year = {2019}, url = {https://eprint.iacr.org/2019/163}, } @misc{cryptoeprint:2019:164, author = {Hendrik Eerikson and Claudio Orlandi and Pille Pullonen and Joonas Puura and Mark Simkin}, title = {Use your Brain! Arithmetic 3PC For Any Modulus with Active Security}, howpublished = {Cryptology ePrint Archive, Report 2019/164}, year = {2019}, url = {https://eprint.iacr.org/2019/164}, } @misc{cryptoeprint:2019:165, author = {Martin R. Albrecht and Torben Brandt Hansen and Kenneth G. Paterson}, title = {libInterMAC: Beyond Confidentiality and Integrity in Practice}, howpublished = {Cryptology ePrint Archive, Report 2019/165}, year = {2019}, url = {https://eprint.iacr.org/2019/165}, } @misc{cryptoeprint:2019:166, author = {Luca De Feo and Simon Masson and Christophe Petit and Antonio Sanso}, title = {Verifiable Delay Functions from Supersingular Isogenies and Pairings}, howpublished = {Cryptology ePrint Archive, Report 2019/166}, year = {2019}, url = {https://eprint.iacr.org/2019/166}, } @misc{cryptoeprint:2019:167, author = {Shuwen Deng and Wenjie Xiong and Jakub Szefer}, title = {Analysis of Secure Caches and Timing-Based Side-Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2019/167}, year = {2019}, url = {https://eprint.iacr.org/2019/167}, } @misc{cryptoeprint:2019:168, author = {Stjepan Picek and Annelie Heuser and Sylvain Guilley}, title = {Profiling Side-channel Analysis in the Restricted Attacker Framework}, howpublished = {Cryptology ePrint Archive, Report 2019/168}, year = {2019}, url = {https://eprint.iacr.org/2019/168}, } @misc{cryptoeprint:2019:169, author = {Johannes Blömer and Jan Bobolz and Denis Diemert and Fabian Eidens}, title = {Updatable Anonymous Credentials and Applications to Incentive Systems}, howpublished = {Cryptology ePrint Archive, Report 2019/169}, year = {2019}, url = {https://eprint.iacr.org/2019/169}, } @misc{cryptoeprint:2019:170, author = {Lingyue Qin and Xiaoyang Dong and Keting Jia and Rui Zong}, title = {Key-dependent cube attack on reduced Frit permutation in Duplex-AE modes}, howpublished = {Cryptology ePrint Archive, Report 2019/170}, year = {2019}, url = {https://eprint.iacr.org/2019/170}, } @misc{cryptoeprint:2019:171, author = {M. Sadegh Riazi and Mohammad Samragh and Hao Chen and Kim Laine and Kristin Lauter and Farinaz Koushanfar}, title = {XONN: XNOR-based Oblivious Deep Neural Network Inference}, howpublished = {Cryptology ePrint Archive, Report 2019/171}, year = {2019}, url = {https://eprint.iacr.org/2019/171}, } @misc{cryptoeprint:2019:172, author = {Danping Shi and Siwei Sun and Yu Sasaki and Chaoyun Li and Lei Hu}, title = {Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS}, howpublished = {Cryptology ePrint Archive, Report 2019/172}, year = {2019}, url = {https://eprint.iacr.org/2019/172}, } @misc{cryptoeprint:2019:173, author = {Vanesa Daza and Alonso González and Zaira Pindado and Carla Ràfols and Javier Silva}, title = {Shorter Quadratic QA-NIZK Proofs}, howpublished = {Cryptology ePrint Archive, Report 2019/173}, year = {2019}, url = {https://eprint.iacr.org/2019/173}, } @misc{cryptoeprint:2019:174, author = {Kasper Green Larsen and Mark Simkin}, title = {Exponential Lower Bounds for Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2019/174}, year = {2019}, url = {https://eprint.iacr.org/2019/174}, } @misc{cryptoeprint:2019:175, author = {Satrajit Ghosh and Mark Simkin}, title = {The Communication Complexity of Threshold Private Set Intersection}, howpublished = {Cryptology ePrint Archive, Report 2019/175}, year = {2019}, url = {https://eprint.iacr.org/2019/175}, } @misc{cryptoeprint:2019:176, author = {Nicholas Genise and Craig Gentry and Shai Halevi and Baiyu Li and Daniele Micciancio}, title = {Homomorphic Encryption for Finite Automata}, howpublished = {Cryptology ePrint Archive, Report 2019/176}, year = {2019}, url = {https://eprint.iacr.org/2019/176}, } @misc{cryptoeprint:2019:177, author = {E.V. Flynn and Yan Bo Ti}, title = {Genus Two Isogeny Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2019/177}, year = {2019}, url = {https://eprint.iacr.org/2019/177}, } @misc{cryptoeprint:2019:178, author = {Rohit Sinha and Sivanarayana Gaddam and Ranjit Kumaresan}, title = {LucidiTEE: Policy-based Fair Computing at Scale}, howpublished = {Cryptology ePrint Archive, Report 2019/178}, year = {2019}, url = {https://eprint.iacr.org/2019/178}, } @misc{cryptoeprint:2019:179, author = {Yue Guo and Rafael Pass and Elaine Shi}, title = {Synchronous, with a Chance of Partition Tolerance}, howpublished = {Cryptology ePrint Archive, Report 2019/179}, year = {2019}, url = {https://eprint.iacr.org/2019/179}, } @misc{cryptoeprint:2019:180, author = {David Wong}, title = {Disco: Modern Session Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/180}, year = {2019}, url = {https://eprint.iacr.org/2019/180}, } @misc{cryptoeprint:2019:181, author = {Jesper Buus Nielsen and Mark Simkin}, title = {Lower Bounds for Leakage-Resilient Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2019/181}, year = {2019}, url = {https://eprint.iacr.org/2019/181}, } @misc{cryptoeprint:2019:182, author = {Prasanna Ravi and Sourav Sen Gupta and Anupam Chattopadhyay and Mustafa Khairallah and Zakaria Najm and Shivam Bhasin }, title = {Security is an Architectural Design Constraint}, howpublished = {Cryptology ePrint Archive, Report 2019/182}, year = {2019}, url = {https://eprint.iacr.org/2019/182}, } @misc{cryptoeprint:2019:183, author = {Katherine E. Stange}, title = {Algebraic aspects of solving Ring-LWE, including ring-based improvements in the Blum-Kalai-Wasserman algorithm}, howpublished = {Cryptology ePrint Archive, Report 2019/183}, year = {2019}, url = {https://eprint.iacr.org/2019/183}, } @misc{cryptoeprint:2019:184, author = {William Diehl and Farnoud Farahmand and Abubakr Abdulgadir and Jens-Peter Kaps and Kris Gaj}, title = {Face-off between the CAESAR Lightweight Finalists: ACORN vs. Ascon}, howpublished = {Cryptology ePrint Archive, Report 2019/184}, year = {2019}, url = {https://eprint.iacr.org/2019/184}, } @misc{cryptoeprint:2019:185, author = {Ralph Ankele and Christoph Dobraunig and Jian Guo and Eran Lambooij and Gregor Leander and Yosuke Todo}, title = {Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion}, howpublished = {Cryptology ePrint Archive, Report 2019/185}, year = {2019}, url = {https://eprint.iacr.org/2019/185}, } @misc{cryptoeprint:2019:186, author = {Jiangshan Yu and Man Ho Allen Au and Paulo Esteves-Verissimo}, title = {Re-thinking untraceability in the CryptoNote-style blockchain}, howpublished = {Cryptology ePrint Archive, Report 2019/186}, year = {2019}, url = {https://eprint.iacr.org/2019/186}, } @misc{cryptoeprint:2019:187, author = {Antoine Joux}, title = {Fully homomorphic encryption modulo Fermat numbers}, howpublished = {Cryptology ePrint Archive, Report 2019/187}, year = {2019}, url = {https://eprint.iacr.org/2019/187}, } @misc{cryptoeprint:2019:188, author = {Dan Boneh and Elette Boyle and Henry Corrigan-Gibbs and Niv Gilboa and Yuval Ishai}, title = {How to Prove a Secret: Zero-Knowledge Proofs on Distributed Data via Fully Linear PCPs}, howpublished = {Cryptology ePrint Archive, Report 2019/188}, year = {2019}, url = {https://eprint.iacr.org/2019/188}, } @misc{cryptoeprint:2019:189, author = {Yaoling Ding and An Wang and Siu Ming YIU}, title = {An Intelligent Multiple Sieve Method Based on Genetic Algorithm and Correlation Power Analysis}, howpublished = {Cryptology ePrint Archive, Report 2019/189}, year = {2019}, url = {https://eprint.iacr.org/2019/189}, } @misc{cryptoeprint:2019:190, author = {Jelle Don and Serge Fehr and Christian Majenz and Christian Schaffner}, title = {Security of the Fiat-Shamir Transformation in the Quantum Random-Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2019/190}, year = {2019}, url = {https://eprint.iacr.org/2019/190}, } @misc{cryptoeprint:2019:191, author = {Benedikt Bünz and Shashank Agrawal and Mahdi Zamani and Dan Boneh}, title = {Zether: Towards Privacy in a Smart Contract World}, howpublished = {Cryptology ePrint Archive, Report 2019/191}, year = {2019}, url = {https://eprint.iacr.org/2019/191}, } @misc{cryptoeprint:2019:192, author = {Francisco Corella and Karen Lewison}, title = {An Omission-Tolerant Cryptographic Checksum}, howpublished = {Cryptology ePrint Archive, Report 2019/192}, year = {2019}, url = {https://eprint.iacr.org/2019/192}, } @misc{cryptoeprint:2019:193, author = {Chun Guo and Olivier Pereira and Thomas Peters and François-Xavier Standaert}, title = {Towards Lightweight Side-Channel Security and the Leakage-Resilience of the Duplex Sponge}, howpublished = {Cryptology ePrint Archive, Report 2019/193}, year = {2019}, url = {https://eprint.iacr.org/2019/193}, } @misc{cryptoeprint:2019:194, author = {Thomas Vidick and Tina Zhang}, title = {Classical zero-knowledge arguments for quantum computations}, howpublished = {Cryptology ePrint Archive, Report 2019/194}, year = {2019}, url = {https://eprint.iacr.org/2019/194}, } @misc{cryptoeprint:2019:195, author = {Jung Hee Cheon and Wonhee Cho and Minki Hhan and Minsik Kang and Jiseung Kim and Changmin Lee}, title = {Algorithms for CRT-variant of Approximate Greatest Common Divisor Problem}, howpublished = {Cryptology ePrint Archive, Report 2019/195}, year = {2019}, url = {https://eprint.iacr.org/2019/195}, } @misc{cryptoeprint:2019:196, author = {Michael Backes and Nico Döttling and Lucjan Hanzlik and Kamil Kluczniak and Jonas Schneider}, title = {Ring Signatures: Logarithmic-Size, No Setup --- from Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2019/196}, year = {2019}, url = {https://eprint.iacr.org/2019/196}, } @misc{cryptoeprint:2019:197, author = {Esteban Landerreche and Marc Stevens and Christian Schaffner}, title = {Non-interactive Cryptographic Timestamping based on Verifiable Delay Functions}, howpublished = {Cryptology ePrint Archive, Report 2019/197}, year = {2019}, url = {https://eprint.iacr.org/2019/197}, } @misc{cryptoeprint:2019:198, author = {Sandro Coretti and Yevgeniy Dodis and Harish Karthikeyan and Stefano Tessaro}, title = {Seedless Fruit is the Sweetest: Random Number Generation, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2019/198}, year = {2019}, url = {https://eprint.iacr.org/2019/198}, } @misc{cryptoeprint:2019:199, author = {Tatiana Bradley and Jan Camenisch and Stanislaw Jarecki and Anja Lehmann and Gregory Neven and Jiayu Xu}, title = {Password-Authenticated Public-Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/199}, year = {2019}, url = {https://eprint.iacr.org/2019/199}, } @misc{cryptoeprint:2019:200, author = {Benny Applebaum and Zvika Brakerski and Rotem Tsabary}, title = {Degree 2 is Complete for the Round-Complexity of Malicious MPC}, howpublished = {Cryptology ePrint Archive, Report 2019/200}, year = {2019}, url = {https://eprint.iacr.org/2019/200}, } @misc{cryptoeprint:2019:201, author = {Behzad Abdolmaleki and Karim Baghery and Helger Lipmaa and Janno Siim and Michał Zając}, title = {DL-Extractable UC-Commitment Schemes}, howpublished = {Cryptology ePrint Archive, Report 2019/201}, year = {2019}, url = {https://eprint.iacr.org/2019/201}, } @misc{cryptoeprint:2019:202, author = {James Bartusek and Fermi Ma and Mark Zhandry}, title = {The Distinction Between Fixed and Random Generators in Group-Based Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2019/202}, year = {2019}, url = {https://eprint.iacr.org/2019/202}, } @misc{cryptoeprint:2019:203, author = {Osman Bicer and Alptekin Kupcu}, title = {Versatile ABS: Usage Limited, Revocable, Threshold Traceable, Authority Hiding, Decentralized Attribute Based Signatures}, howpublished = {Cryptology ePrint Archive, Report 2019/203}, year = {2019}, url = {https://eprint.iacr.org/2019/203}, } @misc{cryptoeprint:2019:204, author = {Barak Shani}, title = {The Security of All Private-key Bits in Isogeny-based Schemes}, howpublished = {Cryptology ePrint Archive, Report 2019/204}, year = {2019}, url = {https://eprint.iacr.org/2019/204}, } @misc{cryptoeprint:2019:205, author = {Barak Shani}, title = {A note on isogeny-based hybrid verifiable delay functions}, howpublished = {Cryptology ePrint Archive, Report 2019/205}, year = {2019}, url = {https://eprint.iacr.org/2019/205}, } @misc{cryptoeprint:2019:206, author = {James Howe and Ayesha Khalid and Marco Martinoli and Francesco Regazzoni and Elisabeth Oswald}, title = {Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2019/206}, year = {2019}, url = {https://eprint.iacr.org/2019/206}, } @misc{cryptoeprint:2019:207, author = {Dragos Rotaru and Tim Wood}, title = {MArBled Circuits: Mixing Arithmetic and Boolean Circuits with Active Security}, howpublished = {Cryptology ePrint Archive, Report 2019/207}, year = {2019}, url = {https://eprint.iacr.org/2019/207}, } @misc{cryptoeprint:2019:208, author = {Muzhou Li and Kai Hu and Meiqin Wang}, title = {Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA}, howpublished = {Cryptology ePrint Archive, Report 2019/208}, year = {2019}, url = {https://eprint.iacr.org/2019/208}, } @misc{cryptoeprint:2019:209, author = {Zhenzhen Bao and Jian Guo and San Ling and Yu Sasaki}, title = {SoK: Peigen -- a Platform for Evaluation, Implementation, and Generation of S-boxes}, howpublished = {Cryptology ePrint Archive, Report 2019/209}, year = {2019}, url = {https://eprint.iacr.org/2019/209}, } @misc{cryptoeprint:2019:210, author = {Christof Beierle and Gregor Leander and Amir Moradi and Shahram Rasoolzadeh}, title = {CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks}, howpublished = {Cryptology ePrint Archive, Report 2019/210}, year = {2019}, url = {https://eprint.iacr.org/2019/210}, } @misc{cryptoeprint:2019:211, author = {Dario Catalano and Mario Di Raimondo and Dario Fiore and Irene Giacomelli}, title = {Mon$\mathbb{Z}_{2^k}$a: Fast Maliciously Secure Two Party Computation on $\mathbb{Z}_{2^k}$}, howpublished = {Cryptology ePrint Archive, Report 2019/211}, year = {2019}, url = {https://eprint.iacr.org/2019/211}, } @misc{cryptoeprint:2019:212, author = {Hossein Oraei and Massoud Hadian Dehkordi}, title = {A New Variant of the Winternitz One Time Signature Scheme Based on Graded Encoding Schemes}, howpublished = {Cryptology ePrint Archive, Report 2019/212}, year = {2019}, url = {https://eprint.iacr.org/2019/212}, } @misc{cryptoeprint:2019:213, author = {Mark Zhandry}, title = {On ELFs, Deterministic Encryption, and Correlated-Input Security}, howpublished = {Cryptology ePrint Archive, Report 2019/213}, year = {2019}, url = {https://eprint.iacr.org/2019/213}, } @misc{cryptoeprint:2019:214, author = {Michele Ciampi and Rafail Ostrovsky}, title = {Four-Round Secure Multiparty Computation from General Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2019/214}, year = {2019}, url = {https://eprint.iacr.org/2019/214}, } @misc{cryptoeprint:2019:215, author = {Alice Pellet-Mary and Guillaume Hanrot and Damien Stehlé}, title = {Approx-SVP in Ideal Lattices with Pre-processing}, howpublished = {Cryptology ePrint Archive, Report 2019/215}, year = {2019}, url = {https://eprint.iacr.org/2019/215}, } @misc{cryptoeprint:2019:216, author = {Arka Rai Choudhuri and Vipul Goyal and Abhishek Jain}, title = {On Round Optimal Secure Multiparty Computation from Minimal Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2019/216}, year = {2019}, url = {https://eprint.iacr.org/2019/216}, } @misc{cryptoeprint:2019:217, author = {Guillermo Sosa Gómez and Octavio Paez Osuna}, title = {A family of boolean functions with good cryptographic properties}, howpublished = {Cryptology ePrint Archive, Report 2019/217}, year = {2019}, url = {https://eprint.iacr.org/2019/217}, } @misc{cryptoeprint:2019:218, author = {Akshay Degwekar and Vinod Vaikuntanathan}, title = {Computational Limitations in Robust Classification and Win-Win Results}, howpublished = {Cryptology ePrint Archive, Report 2019/218}, year = {2019}, url = {https://eprint.iacr.org/2019/218}, } @misc{cryptoeprint:2019:219, author = {Tom Close}, title = {Nitro Protocol}, howpublished = {Cryptology ePrint Archive, Report 2019/219}, year = {2019}, url = {https://eprint.iacr.org/2019/219}, } @misc{cryptoeprint:2019:220, author = {Ivan Damgård and Kasper Green Larsen and Jesper Buus Nielsen}, title = {Communication Lower Bounds for Statistically Secure MPC, with or without Preprocessing}, howpublished = {Cryptology ePrint Archive, Report 2019/220}, year = {2019}, url = {https://eprint.iacr.org/2019/220}, } @misc{cryptoeprint:2019:221, author = {Shuichi Katsumata and Shota Yamada}, title = {Group Signatures without NIZK: From Lattices in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2019/221}, year = {2019}, url = {https://eprint.iacr.org/2019/221}, } @misc{cryptoeprint:2019:222, author = {Michael Klooß and Anja Lehmann and Andy Rupp }, title = {(R)CCA Secure Updatable Encryption with Integrity Protection}, howpublished = {Cryptology ePrint Archive, Report 2019/222}, year = {2019}, url = {https://eprint.iacr.org/2019/222}, } @misc{cryptoeprint:2019:223, author = {Marcelo Blatt and Alexander Gusev and Yuriy Polyakov and Kurt Rohloff and Vinod Vaikuntanathan}, title = {Optimized Homomorphic Encryption Solution for Secure Genome-Wide Association Studies}, howpublished = {Cryptology ePrint Archive, Report 2019/223}, year = {2019}, url = {https://eprint.iacr.org/2019/223}, } @misc{cryptoeprint:2019:224, author = {Lucas Kowalczyk and Hoeteck Wee}, title = {Compact Adaptively Secure ABE for NC1 from k-Lin}, howpublished = {Cryptology ePrint Archive, Report 2019/224}, year = {2019}, url = {https://eprint.iacr.org/2019/224}, } @misc{cryptoeprint:2019:225, author = {Christoph Dobraunig and Bart Mennink}, title = {Leakage Resilience of the Duplex Construction}, howpublished = {Cryptology ePrint Archive, Report 2019/225}, year = {2019}, url = {https://eprint.iacr.org/2019/225}, } @misc{cryptoeprint:2019:226, author = {Benedikt Bünz and Lucianna Kiffer and Loi Luu and Mahdi Zamani}, title = {Flyclient: Super-Light Clients for Cryptocurrencies}, howpublished = {Cryptology ePrint Archive, Report 2019/226}, year = {2019}, url = {https://eprint.iacr.org/2019/226}, } @misc{cryptoeprint:2019:227, author = {Kevin Lewi and Wonho Kim and Ilya Maykov and Stephen Weis}, title = {Securing Update Propagation with Homomorphic Hashing}, howpublished = {Cryptology ePrint Archive, Report 2019/227}, year = {2019}, url = {https://eprint.iacr.org/2019/227}, } @misc{cryptoeprint:2019:228, author = {Nimrod Aviram and Kai Gellert and Tibor Jager}, title = {Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT}, howpublished = {Cryptology ePrint Archive, Report 2019/228}, year = {2019}, url = {https://eprint.iacr.org/2019/228}, } @misc{cryptoeprint:2019:229, author = {Lukas Kölsch}, title = {XOR-counts and lightweight multiplication with fixed elements in binary finite fields}, howpublished = {Cryptology ePrint Archive, Report 2019/229}, year = {2019}, url = {https://eprint.iacr.org/2019/229}, } @misc{cryptoeprint:2019:230, author = {Christos Andrikos and Lejla Batina and Lukasz Chmielewski and Liran Lerman and Vasilios Mavroudis and Kostas Papagiannopoulos and Guilherme Perin and Giorgos Rassias and Alberto Sonnino}, title = {Location, location, location: Revisiting modeling and exploitation for location-based side channel leakages}, howpublished = {Cryptology ePrint Archive, Report 2019/230}, year = {2019}, url = {https://eprint.iacr.org/2019/230}, } @misc{cryptoeprint:2019:231, author = {Benny Applebaum and Amos Beimel and Oriol Farràs and Oded Nir and Naty Peter}, title = {Secret-Sharing Schemes for General and Uniform Access Structures}, howpublished = {Cryptology ePrint Archive, Report 2019/231}, year = {2019}, url = {https://eprint.iacr.org/2019/231}, } @misc{cryptoeprint:2019:232, author = {Dorit Aharonov and Zvika Brakerski and Kai-Min Chung and Ayal Green and Ching-Yi Lai and Or Sattath}, title = {Logarithmic Quantum Single-Server PIR is Sometimes Possible}, howpublished = {Cryptology ePrint Archive, Report 2019/232}, year = {2019}, url = {https://eprint.iacr.org/2019/232}, } @misc{cryptoeprint:2019:233, author = {Nuttapong Attrapadung}, title = {Unbounded Dynamic Predicate Compositions in Attribute-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/233}, year = {2019}, url = {https://eprint.iacr.org/2019/233}, } @misc{cryptoeprint:2019:234, author = {Léo Ducas and Maxime Plançon and Benjamin Wesolowski}, title = {On the Shortness of Vectors to be found by the Ideal-SVP Quantum Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2019/234}, year = {2019}, url = {https://eprint.iacr.org/2019/234}, } @misc{cryptoeprint:2019:235, author = {Willy Quach and Ron D. Rothblum and Daniel Wichs}, title = {Reusable Designated-Verifier NIZKs for all NP from CDH}, howpublished = {Cryptology ePrint Archive, Report 2019/235}, year = {2019}, url = {https://eprint.iacr.org/2019/235}, } @misc{cryptoeprint:2019:236, author = {Geoffroy Couteau and Dennis Hofheinz}, title = {Designated-verifier pseudorandom generators, and their applications}, howpublished = {Cryptology ePrint Archive, Report 2019/236}, year = {2019}, url = {https://eprint.iacr.org/2019/236}, } @misc{cryptoeprint:2019:237, author = {Zahra Jafargholi and Kasper Green Larsen and Mark Simkin}, title = {Optimal Oblivious Priority Queues and Offline Oblivious RAM}, howpublished = {Cryptology ePrint Archive, Report 2019/237}, year = {2019}, url = {https://eprint.iacr.org/2019/237}, } @misc{cryptoeprint:2019:238, author = {Rémi Géraud and David Naccache and Răzvan Roşie}, title = {Robust Encryption, Extended}, howpublished = {Cryptology ePrint Archive, Report 2019/238}, year = {2019}, url = {https://eprint.iacr.org/2019/238}, } @misc{cryptoeprint:2019:239, author = {Adam Groce and Peter Rindal and Mike Rosulek}, title = {Cheaper Private Set Intersection via Differentially Private Leakage}, howpublished = {Cryptology ePrint Archive, Report 2019/239}, year = {2019}, url = {https://eprint.iacr.org/2019/239}, } @misc{cryptoeprint:2019:240, author = {Vipul Goyal and Yifan Song}, title = {Correlated-Source Extractors and Cryptography with Correlated-Random Tapes}, howpublished = {Cryptology ePrint Archive, Report 2019/240}, year = {2019}, url = {https://eprint.iacr.org/2019/240}, } @misc{cryptoeprint:2019:241, author = {Benny Pinkas and Thomas Schneider and Oleksandr Tkachenko and Avishay Yanai}, title = {Efficient Circuit-based PSI with Linear Communication}, howpublished = {Cryptology ePrint Archive, Report 2019/241}, year = {2019}, url = {https://eprint.iacr.org/2019/241}, } @misc{cryptoeprint:2019:242, author = {Alex Lombardi and Willy Quach and Ron D. Rothblum and Daniel Wichs and David J. Wu}, title = {New Constructions of Reusable Designated-Verifier NIZKs}, howpublished = {Cryptology ePrint Archive, Report 2019/242}, year = {2019}, url = {https://eprint.iacr.org/2019/242}, } @misc{cryptoeprint:2019:243, author = {Akinori Hosoyamada and Tetsu Iwata}, title = {Tight Quantum Security Bound of the 4-Round Luby-Rackoff Construction}, howpublished = {Cryptology ePrint Archive, Report 2019/243}, year = {2019}, url = {https://eprint.iacr.org/2019/243}, } @misc{cryptoeprint:2019:244, author = {Viet Tung Hoang and David Miller and Ni Trieu}, title = {Attacks Only Get Better: How to Break FF3 on Large Domains}, howpublished = {Cryptology ePrint Archive, Report 2019/244}, year = {2019}, url = {https://eprint.iacr.org/2019/244}, } @misc{cryptoeprint:2019:245, author = {Albert Cheu and Adam Smith and Jonathan Ullman and David Zeber and Maxim Zhilyaev}, title = {Distributed Differential Privacy via Shuffling}, howpublished = {Cryptology ePrint Archive, Report 2019/245}, year = {2019}, url = {https://eprint.iacr.org/2019/245}, } @misc{cryptoeprint:2019:246, author = {Serge Fehr and Chen Yuan}, title = {Towards optimal robust secret sharing with security against a rushing adversary}, howpublished = {Cryptology ePrint Archive, Report 2019/246}, year = {2019}, url = {https://eprint.iacr.org/2019/246}, } @misc{cryptoeprint:2019:247, author = {Andrea Coladangelo and Alex B. Grilo and Stacey Jeffery and Thomas Vidick}, title = {Verifier-on-a-Leash: new schemes for verifiable delegated quantum computation, with quasilinear resources}, howpublished = {Cryptology ePrint Archive, Report 2019/247}, year = {2019}, url = {https://eprint.iacr.org/2019/247}, } @misc{cryptoeprint:2019:248, author = {Ting Li and Yao Sun}, title = {Preimage Attacks on Round-reduced Keccak-224/256 via an Allocating Approach}, howpublished = {Cryptology ePrint Archive, Report 2019/248}, year = {2019}, url = {https://eprint.iacr.org/2019/248}, } @misc{cryptoeprint:2019:249, author = {Srimanta Bhattacharya and Mridul Nandi}, title = {Revisiting Variable Output Length XOR Pseudorandom Function}, howpublished = {Cryptology ePrint Archive, Report 2019/249}, year = {2019}, url = {https://eprint.iacr.org/2019/249}, } @misc{cryptoeprint:2019:250, author = {Lucas Schabhüser and Denis Butin and Johannes Buchmann}, title = {Function-Dependent Commitments from Homomorphic Authenticators}, howpublished = {Cryptology ePrint Archive, Report 2019/250}, year = {2019}, url = {https://eprint.iacr.org/2019/250}, } @misc{cryptoeprint:2019:251, author = {T-H. Hubert Chan and Rafael Pass and Elaine Shi}, title = {Consensus through Herding}, howpublished = {Cryptology ePrint Archive, Report 2019/251}, year = {2019}, url = {https://eprint.iacr.org/2019/251}, } @misc{cryptoeprint:2019:252, author = {Hamza Abusalah and Chethan Kamath and Karen Klein and Krzysztof Pietrzak and Michael Walter}, title = {Reversible Proofs of Sequential Work}, howpublished = {Cryptology ePrint Archive, Report 2019/252}, year = {2019}, url = {https://eprint.iacr.org/2019/252}, } @misc{cryptoeprint:2019:253, author = {Arka Rai Choudhuri and Vipul Goyal and Abhishek Jain}, title = {Founding Secure Computation on Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2019/253}, year = {2019}, url = {https://eprint.iacr.org/2019/253}, } @misc{cryptoeprint:2019:254, author = {Divesh Aggarwal and Kai-Min Chung and Han-Hsuan Lin and Thomas Vidick}, title = {A Quantum-Proof Non-Malleable Extractor With Application to Privacy Amplification against Active Quantum Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2019/254}, year = {2019}, url = {https://eprint.iacr.org/2019/254}, } @misc{cryptoeprint:2019:255, author = {Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, title = {Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2019/255}, year = {2019}, url = {https://eprint.iacr.org/2019/255}, } @misc{cryptoeprint:2019:256, author = {Achiya Bar-On and Orr Dunkelman and Nathan Keller and Ariel Weizman}, title = {DLCT: A New Tool for Differential-Linear Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2019/256}, year = {2019}, url = {https://eprint.iacr.org/2019/256}, } @misc{cryptoeprint:2019:257, author = {Anne Broadbent and Sébastien Lord}, title = {Uncloneable Quantum Encryption via Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2019/257}, year = {2019}, url = {https://eprint.iacr.org/2019/257}, } @misc{cryptoeprint:2019:258, author = {Joseph Jaeger and Stefano Tessaro}, title = {Tight Time-Memory Trade-offs for Symmetric Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/258}, year = {2019}, url = {https://eprint.iacr.org/2019/258}, } @misc{cryptoeprint:2019:259, author = {SenPeng Wang and Bin Hu and Jie Guan and Kai Zhang and TaiRong Shi}, title = {A Practical Method to Recover Exact Superpoly in Cube Attack}, howpublished = {Cryptology ePrint Archive, Report 2019/259}, year = {2019}, url = {https://eprint.iacr.org/2019/259}, } @misc{cryptoeprint:2019:260, author = {Eduard Hauck and Eike Kiltz and Julian Loss}, title = {A Modular Treatment of Blind Signatures from Identification Schemes}, howpublished = {Cryptology ePrint Archive, Report 2019/260}, year = {2019}, url = {https://eprint.iacr.org/2019/260}, } @misc{cryptoeprint:2019:261, author = {Manu Drijvers and Gregory Neven}, title = {Forward-Secure Multi-Signatures}, howpublished = {Cryptology ePrint Archive, Report 2019/261}, year = {2019}, url = {https://eprint.iacr.org/2019/261}, } @misc{cryptoeprint:2019:262, author = {Qipeng Liu and Mark Zhandry}, title = {Revisiting Post-Quantum Fiat-Shamir}, howpublished = {Cryptology ePrint Archive, Report 2019/262}, year = {2019}, url = {https://eprint.iacr.org/2019/262}, } @misc{cryptoeprint:2019:263, author = {Jiaping Wang and Hao Wang}, title = {Monoxide: Scale Out Blockchain with Asynchronous Consensus Zones}, howpublished = {Cryptology ePrint Archive, Report 2019/263}, year = {2019}, url = {https://eprint.iacr.org/2019/263}, } @misc{cryptoeprint:2019:264, author = {Rohit Agrawal and Yi-Hsiu Chen and Thibaut Horel and Salil Vadhan}, title = {Unifying computational entropies via Kullback-Leibler divergence}, howpublished = {Cryptology ePrint Archive, Report 2019/264}, year = {2019}, url = {https://eprint.iacr.org/2019/264}, } @misc{cryptoeprint:2019:265, author = {Rami Khalil and Arthur Gervais and Guillaume Felley}, title = {TEX - A Securely Scalable Trustless Exchange}, howpublished = {Cryptology ePrint Archive, Report 2019/265}, year = {2019}, url = {https://eprint.iacr.org/2019/265}, } @misc{cryptoeprint:2019:266, author = {Daniel J. Bernstein and Bo-Yin Yang}, title = {Fast constant-time gcd computation and modular inversion}, howpublished = {Cryptology ePrint Archive, Report 2019/266}, year = {2019}, url = {https://eprint.iacr.org/2019/266}, } @misc{cryptoeprint:2019:267, author = {Angshuman Karmakar and Sujoy Sinha Roy and Frederik Vercauteren and Ingrid Verbauwhede }, title = {Pushing the speed limit of constant-time discrete Gaussian sampling. A case study on Falcon.}, howpublished = {Cryptology ePrint Archive, Report 2019/267}, year = {2019}, url = {https://eprint.iacr.org/2019/267}, } @misc{cryptoeprint:2019:268, author = {Sergei Bauer and Martin Brunner and Peter Schartner}, title = {Lightweight Authentication for Low-End Control Units with Hardware Based Individual Keys*}, howpublished = {Cryptology ePrint Archive, Report 2019/268}, year = {2019}, url = {https://eprint.iacr.org/2019/268}, } @misc{cryptoeprint:2019:269, author = {Sergey Gorbunov and Hoeteck Wee}, title = {Digital Signatures for Consensus}, howpublished = {Cryptology ePrint Archive, Report 2019/269}, year = {2019}, url = {https://eprint.iacr.org/2019/269}, } @misc{cryptoeprint:2019:270, author = {Ittai Abraham and Dahlia Malkhi and Kartik Nayak and Ling Ren and Maofan Yin}, title = {Sync HotStuff: Synchronous SMR with 2∆ Latency and Optimistic Responsiveness}, howpublished = {Cryptology ePrint Archive, Report 2019/270}, year = {2019}, url = {https://eprint.iacr.org/2019/270}, } @misc{cryptoeprint:2019:271, author = {Jintai Ding and Chi Cheng and Yue Qin}, title = {A Simple Key Reuse Attack on LWE and Ring LWE Encryption Schemes as Key Encapsulation Mechanisms (KEMs)}, howpublished = {Cryptology ePrint Archive, Report 2019/271}, year = {2019}, url = {https://eprint.iacr.org/2019/271}, } @misc{cryptoeprint:2019:272, author = {Xavier Bonnetain and María Naya-Plasencia and André Schrottenloher}, title = {Quantum Security Analysis of AES}, howpublished = {Cryptology ePrint Archive, Report 2019/272}, year = {2019}, url = {https://eprint.iacr.org/2019/272}, } @misc{cryptoeprint:2019:273, author = {Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai}, title = {Compressing Vector OLE}, howpublished = {Cryptology ePrint Archive, Report 2019/273}, year = {2019}, url = {https://eprint.iacr.org/2019/273}, } @misc{cryptoeprint:2019:274, author = {Elaine Shi}, title = {Path Oblivious Heap}, howpublished = {Cryptology ePrint Archive, Report 2019/274}, year = {2019}, url = {https://eprint.iacr.org/2019/274}, } @misc{cryptoeprint:2019:275, author = {M. Sadegh Riazi and Mojan Javaheripi and Siam U. Hussain and Farinaz Koushanfar}, title = {MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2019/275}, year = {2019}, url = {https://eprint.iacr.org/2019/275}, } @misc{cryptoeprint:2019:276, author = {Erik-Oliver Blass and Florian Kerschbaum}, title = {Secure Computation of the $k^\text{th}$-ranked Integer on Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2019/276}, year = {2019}, url = {https://eprint.iacr.org/2019/276}, } @misc{cryptoeprint:2019:277, author = {Sihem Mesnager and Chunming Tang and Maosheng Xiong}, title = {On the boomerang uniformity of quadratic permutations over $\mathbb{F}_{2^n}$}, howpublished = {Cryptology ePrint Archive, Report 2019/277}, year = {2019}, url = {https://eprint.iacr.org/2019/277}, } @misc{cryptoeprint:2019:278, author = {Navneet Agarwal and Sanat Anand and Manoj Prabhakaran}, title = {Uncovering Algebraic Structures in the MPC Landscape}, howpublished = {Cryptology ePrint Archive, Report 2019/278}, year = {2019}, url = {https://eprint.iacr.org/2019/278}, } @misc{cryptoeprint:2019:279, author = {Alex Lombardi and Luke Schaeffer}, title = {A Note on Key Agreement and Non-Interactive Commitments}, howpublished = {Cryptology ePrint Archive, Report 2019/279}, year = {2019}, url = {https://eprint.iacr.org/2019/279}, } @misc{cryptoeprint:2019:280, author = {Sam Kim}, title = {Multi-Authority Attribute-Based Encryption from LWE in the OT Model}, howpublished = {Cryptology ePrint Archive, Report 2019/280}, year = {2019}, url = {https://eprint.iacr.org/2019/280}, } @misc{cryptoeprint:2019:281, author = {Phillipp Schoppmann and Adria Gascon and Mariana Raykova and Benny Pinkas}, title = {Make Some ROOM for the Zeros: Data Sparsity in Secure Distributed Machine Learning}, howpublished = {Cryptology ePrint Archive, Report 2019/281}, year = {2019}, url = {https://eprint.iacr.org/2019/281}, } @misc{cryptoeprint:2019:282, author = {Carl Bootland and Wouter Castryck and Alan Szepieniec and Frederik Vercauteren}, title = {A Framework for Cryptographic Problems from Linear Algebra}, howpublished = {Cryptology ePrint Archive, Report 2019/282}, year = {2019}, url = {https://eprint.iacr.org/2019/282}, } @misc{cryptoeprint:2019:283, author = {Dimitrios Poulakis}, title = {An Attack on Small Private Keys of RSA Based on Euclidean Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2019/283}, year = {2019}, url = {https://eprint.iacr.org/2019/283}, } @misc{cryptoeprint:2019:284, author = {Ai Ishida and Yusuke Sakai and Keita Emura and Goichiro Hanaoka and Keisuke Tanaka}, title = {Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2}, howpublished = {Cryptology ePrint Archive, Report 2019/284}, year = {2019}, url = {https://eprint.iacr.org/2019/284}, } @misc{cryptoeprint:2019:285, author = {Gideon Samid}, title = {SpaceFlip : Unbound Geometry Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2019/285}, year = {2019}, url = {https://eprint.iacr.org/2019/285}, } @misc{cryptoeprint:2019:286, author = {Yindong Chen and Fei Guo and Liu Zhang}, title = {Fast Algebraic Immunity of $2^m+2$ & $2^m+3$ variables Majority Function}, howpublished = {Cryptology ePrint Archive, Report 2019/286}, year = {2019}, url = {https://eprint.iacr.org/2019/286}, } @misc{cryptoeprint:2019:287, author = {A. N. Alekseychuk and S. M. Koniushok and M. V. Poremskyi}, title = {Security Evaluation for Snow 2.0-like Stream Ciphers Against Correlation Attacks over Extension Fields}, howpublished = {Cryptology ePrint Archive, Report 2019/287}, year = {2019}, url = {https://eprint.iacr.org/2019/287}, } @misc{cryptoeprint:2019:288, author = {Alejandro Freyre-Echevarría and Ismel Martínez-Díaz}, title = {On the construction of S-boxes using the leaders and followers metaheuristic}, howpublished = {Cryptology ePrint Archive, Report 2019/288}, year = {2019}, url = {https://eprint.iacr.org/2019/288}, } @misc{cryptoeprint:2019:289, author = {Subhadeep Banik and Jannis Bossert and Amit Jana and Eik List and Stefan Lucks and Willi Meier and Mostafizar Rahman and Dhiman Saha and Yu Sasaki}, title = {Cryptanalysis of ForkAES}, howpublished = {Cryptology ePrint Archive, Report 2019/289}, year = {2019}, url = {https://eprint.iacr.org/2019/289}, } @misc{cryptoeprint:2019:290, author = {Philippe Loubet Moundi}, title = {Cost effective techniques for chip delayering and in-situ depackaging}, howpublished = {Cryptology ePrint Archive, Report 2019/290}, year = {2019}, url = {https://eprint.iacr.org/2019/290}, } @misc{cryptoeprint:2019:291, author = {Fuyuki Kitagawa and Takahiro Matsuda and Keisuke Tanaka}, title = {CCA Security and Trapdoor Functions via Key-Dependent-Message Security}, howpublished = {Cryptology ePrint Archive, Report 2019/291}, year = {2019}, url = {https://eprint.iacr.org/2019/291}, } @misc{cryptoeprint:2019:292, author = {Jan-Pieter D'Anvers and Marcel Tiepelt and Frederik Vercauteren and Ingrid Verbauwhede}, title = {Timing attacks on Error Correcting Codes in Post-Quantum Secure Schemes}, howpublished = {Cryptology ePrint Archive, Report 2019/292}, year = {2019}, url = {https://eprint.iacr.org/2019/292}, } @misc{cryptoeprint:2019:293, author = {Cody Freitag and Ilan Komargodski and Rafael Pass}, title = {Impossibility of Strong KDM Security with Auxiliary Input}, howpublished = {Cryptology ePrint Archive, Report 2019/293}, year = {2019}, url = {https://eprint.iacr.org/2019/293}, } @misc{cryptoeprint:2019:294, author = {Miran Kim and Yongsoo Song and Baiyu Li and Daniele Micciancio}, title = {Semi-parallel Logistic Regression for GWAS on Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2019/294}, year = {2019}, url = {https://eprint.iacr.org/2019/294}, } @misc{cryptoeprint:2019:295, author = {Kimia Tajik and Akshith Gunasekaran and Rhea Dutta and Brandon Ellis and Rakesh B. Bobba and Mike Rosulek and Charles V. Wright and Wu-chi Feng}, title = {Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/295}, year = {2019}, url = {https://eprint.iacr.org/2019/295}, } @misc{cryptoeprint:2019:296, author = {Wouter Castryck and Thomas Decru and Benjamin Smith}, title = {Hash functions from superspecial genus-2 curves using Richelot isogenies}, howpublished = {Cryptology ePrint Archive, Report 2019/296}, year = {2019}, url = {https://eprint.iacr.org/2019/296}, } @misc{cryptoeprint:2019:297, author = {Amir Jalali and Reza Azarderakhsh and Mehran Mozaffari Kermani and David Jao}, title = {Towards Optimized and Constant-Time CSIDH on Embedded Devices}, howpublished = {Cryptology ePrint Archive, Report 2019/297}, year = {2019}, url = {https://eprint.iacr.org/2019/297}, } @misc{cryptoeprint:2019:298, author = {Craig Costello and Patrick Longa and Michael Naehrig and Joost Renes and Fernando Virdia}, title = {Improved Classical Cryptanalysis of the Computational Supersingular Isogeny Problem}, howpublished = {Cryptology ePrint Archive, Report 2019/298}, year = {2019}, url = {https://eprint.iacr.org/2019/298}, } @misc{cryptoeprint:2019:299, author = {Xuecheng Ma and Dongdai Lin}, title = {A Generic Construction of Revocable Identity-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/299}, year = {2019}, url = {https://eprint.iacr.org/2019/299}, } @misc{cryptoeprint:2019:300, author = {Ugo Mureddu and Brice Colombier and Nathalie Bochard and Lilian Bossuet and Viktor Fischer}, title = {Transient Effect Ring Oscillators Leak Too}, howpublished = {Cryptology ePrint Archive, Report 2019/300}, year = {2019}, url = {https://eprint.iacr.org/2019/300}, } @misc{cryptoeprint:2019:301, author = {Peter T. Breuer and Simon Pickin}, title = {Safe Compilation for Encrypted Computing}, howpublished = {Cryptology ePrint Archive, Report 2019/301}, year = {2019}, url = {https://eprint.iacr.org/2019/301}, } @misc{cryptoeprint:2019:302, author = {Yael Tauman Kalai and Leonid Reyzin}, title = {A Survey of Leakage-Resilient Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2019/302}, year = {2019}, url = {https://eprint.iacr.org/2019/302}, } @misc{cryptoeprint:2019:303, author = {Terry Shue Chien Lau and Chik How Tan and Theo Fanuela Prabowo}, title = {Analysis of TPL Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2019/303}, year = {2019}, url = {https://eprint.iacr.org/2019/303}, } @misc{cryptoeprint:2019:304, author = {Rémi Bricout and André Chailloux and Thomas Debris-Alazard and Matthieu Lequesne}, title = {Ternary Syndrome Decoding with Large Weight}, howpublished = {Cryptology ePrint Archive, Report 2019/304}, year = {2019}, url = {https://eprint.iacr.org/2019/304}, } @misc{cryptoeprint:2019:305, author = {Alexandre Adomnicai and Laurent Masson and Jacques J.A. Fournier}, title = {Practical Algebraic Side-Channel Attacks Against ACORN}, howpublished = {Cryptology ePrint Archive, Report 2019/305}, year = {2019}, url = {https://eprint.iacr.org/2019/305}, } @misc{cryptoeprint:2019:306, author = {Madhurima Mukhopadhyay and Palash Sarkar}, title = {Faster Initial Splitting for Small Characteristic Composite Extension Degree Fields}, howpublished = {Cryptology ePrint Archive, Report 2019/306}, year = {2019}, url = {https://eprint.iacr.org/2019/306}, } @misc{cryptoeprint:2019:307, author = {Kwang Ho Kim and Sihem Mesnager}, title = {Solving $x^{2^k+1}+x+a=0$ in $\mathbb{F}_{2^n}$ with $\gcd(n,k)=1$}, howpublished = {Cryptology ePrint Archive, Report 2019/307}, year = {2019}, url = {https://eprint.iacr.org/2019/307}, } @misc{cryptoeprint:2019:308, author = {Yuan Kang and Chengyu Lin and Tal Malkin and Mariana Raykova}, title = {Obfuscation from Polynomial Hardness: Beyond Decomposable Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2019/308}, year = {2019}, url = {https://eprint.iacr.org/2019/308}, } @misc{cryptoeprint:2019:309, author = {Jean-Sebastien Coron and Luca Notarnicola}, title = {Cryptanalysis of CLT13 Multilinear Maps with Independent Slots}, howpublished = {Cryptology ePrint Archive, Report 2019/309}, year = {2019}, url = {https://eprint.iacr.org/2019/309}, } @misc{cryptoeprint:2019:310, author = {Kevin Cheang and Cameron Rasmussen and Sanjit Seshia and Pramod Subramanyan}, title = {A Formal Approach to Secure Speculation}, howpublished = {Cryptology ePrint Archive, Report 2019/310}, year = {2019}, url = {https://eprint.iacr.org/2019/310}, } @misc{cryptoeprint:2019:311, author = {Akiko Inoue and Tetsu Iwata and Kazuhiko Minematsu and Bertram Poettering}, title = {Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality}, howpublished = {Cryptology ePrint Archive, Report 2019/311}, year = {2019}, url = {https://eprint.iacr.org/2019/311}, } @misc{cryptoeprint:2019:312, author = {Lars Tebelmann and Michael Pehl and Vincent Immler}, title = {Side-Channel Analysis of the TERO PUF}, howpublished = {Cryptology ePrint Archive, Report 2019/312}, year = {2019}, url = {https://eprint.iacr.org/2019/312}, } @misc{cryptoeprint:2019:313, author = {Monika Trimoska and Sorina Ionica and Gilles Dequen}, title = {A SAT-based approach for index calculus on binary elliptic curves}, howpublished = {Cryptology ePrint Archive, Report 2019/313}, year = {2019}, url = {https://eprint.iacr.org/2019/313}, } @misc{cryptoeprint:2019:314, author = {Prabhanjan Ananth and Vinod Vaikuntanathan}, title = {Optimal Bounded-Collusion Secure Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/314}, year = {2019}, url = {https://eprint.iacr.org/2019/314}, } @misc{cryptoeprint:2019:315, author = {Juan A. Garay and Aggelos Kiayias and Giorgos Panagiotakos}, title = {Iterated Search Problems and Blockchain Security under Falsifiable Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2019/315}, year = {2019}, url = {https://eprint.iacr.org/2019/315}, } @misc{cryptoeprint:2019:316, author = {Marcus Brinkmann}, title = {Extended Affine and CCZ Equivalence up to Dimension 4}, howpublished = {Cryptology ePrint Archive, Report 2019/316}, year = {2019}, url = {https://eprint.iacr.org/2019/316}, } @misc{cryptoeprint:2019:317, author = {Tiancheng Xie and Jiaheng Zhang and Yupeng Zhang and Charalampos Papamanthou and Dawn Song}, title = {Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation}, howpublished = {Cryptology ePrint Archive, Report 2019/317}, year = {2019}, url = {https://eprint.iacr.org/2019/317}, } @misc{cryptoeprint:2019:318, author = {Boyu Ni and Xiaoyang Dong}, title = {Improved quantum attack on Type-1 Generalized Feistel Schemes and Its application to CAST-256}, howpublished = {Cryptology ePrint Archive, Report 2019/318}, year = {2019}, url = {https://eprint.iacr.org/2019/318}, } @misc{cryptoeprint:2019:319, author = {Yu Chen and Xuecheng Ma}, title = {PGC: Pretty Good Confidential Transaction System with Accountability}, howpublished = {Cryptology ePrint Archive, Report 2019/319}, year = {2019}, url = {https://eprint.iacr.org/2019/319}, } @misc{cryptoeprint:2019:320, author = {Léo Ducas and Steven Galbraith and Thomas Prest and Yang Yu}, title = {Integral Matrix Gram Root and Lattice Gaussian Sampling without Floats}, howpublished = {Cryptology ePrint Archive, Report 2019/320}, year = {2019}, url = {https://eprint.iacr.org/2019/320}, } @misc{cryptoeprint:2019:321, author = {Aurélie Bauer and Eliane Jaulmes and Emmanuel Prouff and Jean-René Reinhard and Justine Wild}, title = {Horizontal Collision Correlation Attack on Elliptic Curves }, howpublished = {Cryptology ePrint Archive, Report 2019/321}, year = {2019}, url = {https://eprint.iacr.org/2019/321}, } @misc{cryptoeprint:2019:322, author = {Farnoud Farahmand and Malik Umar Sharif and Kevin Briggs and Kris Gaj}, title = {A High-Speed Constant-Time Hardware Implementation of NTRUEncrypt SVES}, howpublished = {Cryptology ePrint Archive, Report 2019/322}, year = {2019}, url = {https://eprint.iacr.org/2019/322}, } @misc{cryptoeprint:2019:323, author = {Sabyasachi Dutta and Kouichi Sakurai}, title = {Theory and application of computationally independent one-way functions: Interactive proof of ability - Revisited}, howpublished = {Cryptology ePrint Archive, Report 2019/323}, year = {2019}, url = {https://eprint.iacr.org/2019/323}, } @misc{cryptoeprint:2019:324, author = {Pedro Branco and Paulo Mateus}, title = {A Traceable Ring Signature Scheme based on Coding Theory}, howpublished = {Cryptology ePrint Archive, Report 2019/324}, year = {2019}, url = {https://eprint.iacr.org/2019/324}, } @misc{cryptoeprint:2019:325, author = {Hiroki Sudo and Koji Nuida and Kana Shimizu}, title = {An Efficient Private Evaluation of a Decision Graph}, howpublished = {Cryptology ePrint Archive, Report 2019/325}, year = {2019}, url = {https://eprint.iacr.org/2019/325}, } @misc{cryptoeprint:2019:326, author = {Alonso González and Carla Ràfols}, title = {Sublinear Pairing-based Arguments with Updatable CRS and Weaker Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2019/326}, year = {2019}, url = {https://eprint.iacr.org/2019/326}, } @misc{cryptoeprint:2019:327, author = {Gembu Ito and Tetsu Iwata}, title = {Quantum Distinguishing Attacks against Type-1 Generalized Feistel Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2019/327}, year = {2019}, url = {https://eprint.iacr.org/2019/327}, } @misc{cryptoeprint:2019:328, author = {Jordi Herrera-Joancomartí and Guillermo Navarro-Arribas and Alejandro Ranchal-Pedrosa and Joaquín Garcia-Alfaro and Cristina Pérez-Solà}, title = {On the Difficulty of Hiding the Balance of Lightning Network Channels}, howpublished = {Cryptology ePrint Archive, Report 2019/328}, year = {2019}, url = {https://eprint.iacr.org/2019/328}, } @misc{cryptoeprint:2019:329, author = {Estuardo Alpirez Bock and Alessandro Amadori and Joppe W. Bos and Chris Brzuska and Wil Michiels}, title = {Doubly half-injective PRGs for incompressible white-box cryptography}, howpublished = {Cryptology ePrint Archive, Report 2019/329}, year = {2019}, url = {https://eprint.iacr.org/2019/329}, } @misc{cryptoeprint:2019:330, author = {Reza Azarderakhsh and Amir Jalali and David Jao and Vladimir Soukharev}, title = {Practical Supersingular Isogeny Group Key Agreement}, howpublished = {Cryptology ePrint Archive, Report 2019/330}, year = {2019}, url = {https://eprint.iacr.org/2019/330}, } @misc{cryptoeprint:2019:331, author = {Amir Jalali and Reza Azarderakhsh and Mehran Mozaffari Kermani and Matthew Campagna and David Jao}, title = {Optimized Supersingular Isogeny Key Encapsulation on ARMv8 Processors}, howpublished = {Cryptology ePrint Archive, Report 2019/331}, year = {2019}, url = {https://eprint.iacr.org/2019/331}, } @misc{cryptoeprint:2019:332, author = {Benjamin Hong Meng Tan and Hyung Tae Lee and Huaxiong Wang and Shu Qin Ren and Khin Mi Mi Aung}, title = {Efficient Private Comparison Queries over Encrypted Databases using Fully Homomorphic Encryption with Finite Fields}, howpublished = {Cryptology ePrint Archive, Report 2019/332}, year = {2019}, url = {https://eprint.iacr.org/2019/332}, } @misc{cryptoeprint:2019:333, author = {Helger Lipmaa}, title = {Key-and-Argument-Updatable QA-NIZKs}, howpublished = {Cryptology ePrint Archive, Report 2019/333}, year = {2019}, url = {https://eprint.iacr.org/2019/333}, } @misc{cryptoeprint:2019:334, author = {Abdelrahaman Aly and Aysajan Abidin and Svetla Nikova }, title = {Practically Efficient Secure Distributed Exponentiation without Bit-Decomposition}, howpublished = {Cryptology ePrint Archive, Report 2019/334}, year = {2019}, url = {https://eprint.iacr.org/2019/334}, } @misc{cryptoeprint:2019:335, author = {Yan Yan and Elisabeth Oswald}, title = {Examining the Practical Side Channel Resilience of ARX-boxes}, howpublished = {Cryptology ePrint Archive, Report 2019/335}, year = {2019}, url = {https://eprint.iacr.org/2019/335}, } @misc{cryptoeprint:2019:336, author = {Eli Ben-Sasson and Lior Goldberg and Swastik Kopparty and Shubhangi Saraf}, title = {DEEP-FRI: Sampling Outside the Box Improves Soundness}, howpublished = {Cryptology ePrint Archive, Report 2019/336}, year = {2019}, url = {https://eprint.iacr.org/2019/336}, } @misc{cryptoeprint:2019:337, author = {Łukasz Krzywiecki and Mirosław Kutyłowski and Jakub Pezda and Marcin Słowik}, title = {Anonymous Deniable Identification in Ephemeral Setup & Leakage Scenarios}, howpublished = {Cryptology ePrint Archive, Report 2019/337}, year = {2019}, url = {https://eprint.iacr.org/2019/337}, } @misc{cryptoeprint:2019:338, author = {Marshall Ball and Brent Carmer and Tal Malkin and Mike Rosulek and Nichole Schimanski}, title = {Garbled Neural Networks are Practical}, howpublished = {Cryptology ePrint Archive, Report 2019/338}, year = {2019}, url = {https://eprint.iacr.org/2019/338}, } @misc{cryptoeprint:2019:339, author = {Yusuke Naito and Takeshi Sugawara}, title = {Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2019/339}, year = {2019}, url = {https://eprint.iacr.org/2019/339}, } @misc{cryptoeprint:2019:340, author = {Antoine Wurcker}, title = {Ease of Side-Channel Attacks on AES-192/256 by Targeting Extreme Keys}, howpublished = {Cryptology ePrint Archive, Report 2019/340}, year = {2019}, url = {https://eprint.iacr.org/2019/340}, } @misc{cryptoeprint:2019:341, author = {István András Seres and Dániel A. Nagy and Chris Buckland and Péter Burcsi}, title = {MixEth: efficient, trustless coin mixing service for Ethereum}, howpublished = {Cryptology ePrint Archive, Report 2019/341}, year = {2019}, url = {https://eprint.iacr.org/2019/341}, } @misc{cryptoeprint:2019:342, author = {Yahya Hassanzadeh-Nazarabadi and Alptekin Küpçü and Öznur Özkasap}, title = {LightChain: A DHT-based Blockchain for Resource Constrained Environments}, howpublished = {Cryptology ePrint Archive, Report 2019/342}, year = {2019}, url = {https://eprint.iacr.org/2019/342}, } @misc{cryptoeprint:2019:343, author = {Aurelien Vasselle and Antoine Wurcker}, title = {Optimizations of Side-Channel Attack on AES MixColumns Using Chosen Input}, howpublished = {Cryptology ePrint Archive, Report 2019/343}, year = {2019}, url = {https://eprint.iacr.org/2019/343}, } @misc{cryptoeprint:2019:344, author = {Ethan Heilman and Neha Narula and Garrett Tanzer and James Lovejoy and Michael Colavita and Madars Virza and Tadge Dryja}, title = {Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency}, howpublished = {Cryptology ePrint Archive, Report 2019/344}, year = {2019}, url = {https://eprint.iacr.org/2019/344}, } @misc{cryptoeprint:2019:345, author = {Hugues Thiebeauld and Aurélien Vasselle and Antoine Wurcker}, title = {Second-order Scatter Attack}, howpublished = {Cryptology ePrint Archive, Report 2019/345}, year = {2019}, url = {https://eprint.iacr.org/2019/345}, } @misc{cryptoeprint:2019:346, author = {Christophe Clavier and Leo Reynaud and Antoine Wurcker}, title = {Yet Another Side Channel Cryptanalysis on SM3 Hash Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2019/346}, year = {2019}, url = {https://eprint.iacr.org/2019/346}, } @misc{cryptoeprint:2019:347, author = {Nir Drucker and Shay Gueron}, title = {Selfie: reflections on TLS 1.3 with PSK}, howpublished = {Cryptology ePrint Archive, Report 2019/347}, year = {2019}, url = {https://eprint.iacr.org/2019/347}, } @misc{cryptoeprint:2019:348, author = {Masaud Y. Alhassan and Daniel Günther and Ágnes Kiss and Thomas Schneider}, title = {Efficient and Scalable Universal Circuits}, howpublished = {Cryptology ePrint Archive, Report 2019/348}, year = {2019}, url = {https://eprint.iacr.org/2019/348}, } @misc{cryptoeprint:2019:349, author = {Felix Wegener and Lauren De Meyer and Amir Moradi}, title = {Spin Me Right Round: Rotational Symmetry for FPGA-specific AES}, howpublished = {Cryptology ePrint Archive, Report 2019/349}, year = {2019}, url = {https://eprint.iacr.org/2019/349}, } @misc{cryptoeprint:2019:350, author = {Fabian Boemer and Yixing Lao and Rosario Cammarota and Casimir Wierzynski}, title = {nGraph-HE: A Graph Compiler for Deep Learning on Homomorphically Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2019/350}, year = {2019}, url = {https://eprint.iacr.org/2019/350}, } @misc{cryptoeprint:2019:351, author = {Jose Becerra and Dimiter Ostrev and Marjan Skrobot}, title = {Forward Secrecy of SPAKE2}, howpublished = {Cryptology ePrint Archive, Report 2019/351}, year = {2019}, url = {https://eprint.iacr.org/2019/351}, } @misc{cryptoeprint:2019:352, author = {Maxim Jourenko and Kanta Kurazumi and Mario Larangeira and Keisuke Tanaka}, title = {SoK: A Taxonomy for Layer-2 Scalability Related Protocols for Cryptocurrencies}, howpublished = {Cryptology ePrint Archive, Report 2019/352}, year = {2019}, url = {https://eprint.iacr.org/2019/352}, } @misc{cryptoeprint:2019:353, author = {Hiroshi Onuki and Yusuke Aikawa and Tsutomu Yamazaki and Tsuyoshi Takagi}, title = {A Faster Constant-time Algorithm of CSIDH keeping Two Torsion Points}, howpublished = {Cryptology ePrint Archive, Report 2019/353}, year = {2019}, url = {https://eprint.iacr.org/2019/353}, } @misc{cryptoeprint:2019:354, author = {Abdelrahaman Aly and Nigel P. Smart}, title = {Benchmarking Privacy Preserving Scientific Operations}, howpublished = {Cryptology ePrint Archive, Report 2019/354}, year = {2019}, url = {https://eprint.iacr.org/2019/354}, } @misc{cryptoeprint:2019:355, author = {Anubhab Baksi and Dhiman Saha and Sumanta Sarkar}, title = {To Infect Or Not To Infect: A Critical Analysis Of Infective Countermeasures In Fault Attacks}, howpublished = {Cryptology ePrint Archive, Report 2019/355}, year = {2019}, url = {https://eprint.iacr.org/2019/355}, } @misc{cryptoeprint:2019:356, author = {Shweta Agrawal and Michael Clear and Ophir Frieder and Sanjam Garg and Adam O’Neill and Justin Thaler}, title = {Ad Hoc Multi-Input Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/356}, year = {2019}, url = {https://eprint.iacr.org/2019/356}, } @misc{cryptoeprint:2019:357, author = {Núria Costa and Ramiro Martínez and Paz Morillo}, title = {Lattice-based proof of a shuffle}, howpublished = {Cryptology ePrint Archive, Report 2019/357}, year = {2019}, url = {https://eprint.iacr.org/2019/357}, } @misc{cryptoeprint:2019:358, author = {Leo Weissbart and Stjepan Picek and Lejla Batina}, title = {One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA}, howpublished = {Cryptology ePrint Archive, Report 2019/358}, year = {2019}, url = {https://eprint.iacr.org/2019/358}, } @misc{cryptoeprint:2019:359, author = {Hao Chen and Ilaria Chillotti and Yihe Dong and Oxana Poburinnaya and Ilya Razenshteyn and M. Sadegh Riazi}, title = {SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search}, howpublished = {Cryptology ePrint Archive, Report 2019/359}, year = {2019}, url = {https://eprint.iacr.org/2019/359}, } @misc{cryptoeprint:2019:360, author = {Lewis Gudgeon and Pedro Moreno-Sanchez and Stefanie Roos and Patrick McCorry and Arthur Gervais}, title = {SoK: Off The Chain Transactions}, howpublished = {Cryptology ePrint Archive, Report 2019/360}, year = {2019}, url = {https://eprint.iacr.org/2019/360}, } @misc{cryptoeprint:2019:361, author = {Anat Paskin-Chernivasky and Artiom Radune}, title = {On polynomial secret sharing schemes}, howpublished = {Cryptology ePrint Archive, Report 2019/361}, year = {2019}, url = {https://eprint.iacr.org/2019/361}, } @misc{cryptoeprint:2019:362, author = {Alisa Chernyaeva and Ilya Shirobokov and Alexander Davydov}, title = {Game Channels: State Channels for the Gambling Industry with Built-In PRNG}, howpublished = {Cryptology ePrint Archive, Report 2019/362}, year = {2019}, url = {https://eprint.iacr.org/2019/362}, } @misc{cryptoeprint:2019:363, author = {Pratish Datta and Tatsuaki Okamoto and Katsuyuki Takashima}, title = {Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs}, howpublished = {Cryptology ePrint Archive, Report 2019/363}, year = {2019}, url = {https://eprint.iacr.org/2019/363}, } @misc{cryptoeprint:2019:364, author = {Benedikt Auerbach and Federico Giacon and Eike Kiltz}, title = {Everybody's a Target: Scalability in Public-Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/364}, year = {2019}, url = {https://eprint.iacr.org/2019/364}, } @misc{cryptoeprint:2019:365, author = {Rotem Tsabary}, title = {Fully Secure Attribute-Based Encryption for $t$-CNF from LWE}, howpublished = {Cryptology ePrint Archive, Report 2019/365}, year = {2019}, url = {https://eprint.iacr.org/2019/365}, } @misc{cryptoeprint:2019:366, author = {Iaroslav Gridin and Cesar Pereida García and Nicola Tuveri and Billy Bob Brumley}, title = {Triggerflow: Regression Testing by Advanced Execution Path Inspection}, howpublished = {Cryptology ePrint Archive, Report 2019/366}, year = {2019}, url = {https://eprint.iacr.org/2019/366}, } @misc{cryptoeprint:2019:367, author = {Olivier Blazy and Angèle Bossuat and Xavier Bultel and Pierre-Alain Fouque and Cristina Onete and Elena Pagnin}, title = {SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting}, howpublished = {Cryptology ePrint Archive, Report 2019/367}, year = {2019}, url = {https://eprint.iacr.org/2019/367}, } @misc{cryptoeprint:2019:368, author = {Alex Davidson and Amit Deo and Ela Lee and Keith Martin}, title = {Strong Post-Compromise Secure Proxy Re-Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/368}, year = {2019}, url = {https://eprint.iacr.org/2019/368}, } @misc{cryptoeprint:2019:369, author = {Marco Calderini}, title = {On the EA-classes of known APN functions in small dimensions}, howpublished = {Cryptology ePrint Archive, Report 2019/369}, year = {2019}, url = {https://eprint.iacr.org/2019/369}, } @misc{cryptoeprint:2019:370, author = {Mark Zhandry and Cong Zhang}, title = {Indifferentiability for Public Key Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2019/370}, year = {2019}, url = {https://eprint.iacr.org/2019/370}, } @misc{cryptoeprint:2019:371, author = {Xueli Wang and Yu Chen and Xuecheng Ma}, title = {Generic Construction of Linkable Ring Signature}, howpublished = {Cryptology ePrint Archive, Report 2019/371}, year = {2019}, url = {https://eprint.iacr.org/2019/371}, } @misc{cryptoeprint:2019:372, author = {Sanaz Taheri Boshrooyeh and Alptekin Küpçü and Öznur Özkasap}, title = {Privado: Privacy-Preserving Group-based Advertising using Multiple Independent Social Network Providers}, howpublished = {Cryptology ePrint Archive, Report 2019/372}, year = {2019}, url = {https://eprint.iacr.org/2019/372}, } @misc{cryptoeprint:2019:373, author = {Aram Jivanyan}, title = {Lelantus: Towards Confidentiality and Anonymity of Blockchain Transactions from Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2019/373}, year = {2019}, url = {https://eprint.iacr.org/2019/373}, } @misc{cryptoeprint:2019:374, author = {Léo Perrin}, title = {Probability 1 Iterated Differential in the SNEIK Permutation}, howpublished = {Cryptology ePrint Archive, Report 2019/374}, year = {2019}, url = {https://eprint.iacr.org/2019/374}, } @misc{cryptoeprint:2019:375, author = {Xavier Bultel and Pascal Lafourcade}, title = {Secure Trick-Taking Game Protocols: How to Play Online Spades with Cheaters}, howpublished = {Cryptology ePrint Archive, Report 2019/375}, year = {2019}, url = {https://eprint.iacr.org/2019/375}, } @misc{cryptoeprint:2019:376, author = {Amir Jalali and Neil Davenport}, title = {SELL v1.0: Searchable Encrypted Logging Library}, howpublished = {Cryptology ePrint Archive, Report 2019/376}, year = {2019}, url = {https://eprint.iacr.org/2019/376}, } @misc{cryptoeprint:2019:377, author = {Kasper Green Larsen and Tal Malkin and Omri Weinstein and Kevin Yeo}, title = {Lower Bounds for Oblivious Near-Neighbor Search}, howpublished = {Cryptology ePrint Archive, Report 2019/377}, year = {2019}, url = {https://eprint.iacr.org/2019/377}, } @misc{cryptoeprint:2019:378, author = {Jia Liu and Mark Manulis}, title = {pRate: Anonymous Star Rating with Rating Secrecy}, howpublished = {Cryptology ePrint Archive, Report 2019/378}, year = {2019}, url = {https://eprint.iacr.org/2019/378}, } @misc{cryptoeprint:2019:379, author = {Marshall Ball and Siyao Guo and Daniel Wichs}, title = {Non-Malleable Codes for Decision Trees}, howpublished = {Cryptology ePrint Archive, Report 2019/379}, year = {2019}, url = {https://eprint.iacr.org/2019/379}, } @misc{cryptoeprint:2019:380, author = {Kazumasa Shinagawa and Koji Nuida}, title = {A Single Shuffle Is Enough for Secure Card-Based Computation of Any Circuit}, howpublished = {Cryptology ePrint Archive, Report 2019/380}, year = {2019}, url = {https://eprint.iacr.org/2019/380}, } @misc{cryptoeprint:2019:381, author = {Chen-Dong Ye and Tian Tian}, title = {Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks?}, howpublished = {Cryptology ePrint Archive, Report 2019/381}, year = {2019}, url = {https://eprint.iacr.org/2019/381}, } @misc{cryptoeprint:2019:382, author = {Daniel Gardham and Mark Manulis}, title = {Hierarchical Attribute-based Signatures: Short Keys and Optimal Signature Length}, howpublished = {Cryptology ePrint Archive, Report 2019/382}, year = {2019}, url = {https://eprint.iacr.org/2019/382}, } @misc{cryptoeprint:2019:383, author = {Mathy Vanhoef and Eyal Ronen }, title = {Dragonblood: A Security Analysis of WPA3's SAE Handshake}, howpublished = {Cryptology ePrint Archive, Report 2019/383}, year = {2019}, url = {https://eprint.iacr.org/2019/383}, } @misc{cryptoeprint:2019:384, author = {Sarvar Patel and Giuseppe Persiano and Kevin Yeo}, title = {What Storage Access Privacy is Achievable with Small Overhead?}, howpublished = {Cryptology ePrint Archive, Report 2019/384}, year = {2019}, url = {https://eprint.iacr.org/2019/384}, } @misc{cryptoeprint:2019:385, author = {Takakazu Satoh}, title = {Miller Inversion is Easy for the Reduced Tate Pairing on Trace Zero Supersingular Curves}, howpublished = {Cryptology ePrint Archive, Report 2019/385}, year = {2019}, url = {https://eprint.iacr.org/2019/385}, } @misc{cryptoeprint:2019:386, author = {Ryo Kikuchi and Nuttapong Attrapadung and Koki Hamada and Dai Ikarashi and Ai Ishida and Takahiro Matsuda and Yusuke Sakai and Jacob C. N. Schuldt}, title = {Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2019/386}, year = {2019}, url = {https://eprint.iacr.org/2019/386}, } @misc{cryptoeprint:2019:387, author = {Mustafa Khairallah and Xiaolu Hou and Zakaria Najm and Jakub Breier and Shivam Bhasin and Thomas Peyrin}, title = {SoK : On DFA Vulnerabilities of Substitution-Permutation Networks}, howpublished = {Cryptology ePrint Archive, Report 2019/387}, year = {2019}, url = {https://eprint.iacr.org/2019/387}, } @misc{cryptoeprint:2019:388, author = {Ulrich Rührmair}, title = {Towards Secret-Free Security}, howpublished = {Cryptology ePrint Archive, Report 2019/388}, year = {2019}, url = {https://eprint.iacr.org/2019/388}, } @misc{cryptoeprint:2019:389, author = {Sauvik Bhattacharya and Oscar Garcia-Morchon and Rachel Player and Ludo Tolhuizen}, title = {Achieving secure and efficient lattice-based public-key encryption: the impact of the secret-key distribution}, howpublished = {Cryptology ePrint Archive, Report 2019/389}, year = {2019}, url = {https://eprint.iacr.org/2019/389}, } @misc{cryptoeprint:2019:390, author = {Michael Specter and Sunoo Park and Matthew Green}, title = {KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures}, howpublished = {Cryptology ePrint Archive, Report 2019/390}, year = {2019}, url = {https://eprint.iacr.org/2019/390}, } @misc{cryptoeprint:2019:391, author = {Biswabandan Panda}, title = {Fooling the Sense of Cross-core Last-level Cache Eviction based Attacker by Prefetching Common Sense}, howpublished = {Cryptology ePrint Archive, Report 2019/391}, year = {2019}, url = {https://eprint.iacr.org/2019/391}, } @misc{cryptoeprint:2019:392, author = {Zheng Li and Xiaoyang Dong and Wenquan Bi and Keting Jia and Xiaoyun Wang and Willi Meier}, title = {New Conditional Cube Attack on Keccak Keyed Modes}, howpublished = {Cryptology ePrint Archive, Report 2019/392}, year = {2019}, url = {https://eprint.iacr.org/2019/392}, } @misc{cryptoeprint:2019:393, author = {Itay Berman and Iftach Haitner and Eliad Tsfadia}, title = {A Tight Parallel-Repetition Theorem for Random-Terminating Interactive Arguments}, howpublished = {Cryptology ePrint Archive, Report 2019/393}, year = {2019}, url = {https://eprint.iacr.org/2019/393}, } @misc{cryptoeprint:2019:394, author = {Vincent Migliore and Benoı̂t Gérard and Mehdi Tibouchi and Pierre-Alain Fouque}, title = {Masking Dilithium: Efficient Implementation and Side-Channel Evaluation}, howpublished = {Cryptology ePrint Archive, Report 2019/394}, year = {2019}, url = {https://eprint.iacr.org/2019/394}, } @misc{cryptoeprint:2019:395, author = {Evangelia Anna Markatou and Roberto Tamassia}, title = {Full Database Reconstruction with Access and Search Pattern Leakage}, howpublished = {Cryptology ePrint Archive, Report 2019/395}, year = {2019}, url = {https://eprint.iacr.org/2019/395}, } @misc{cryptoeprint:2019:396, author = {Evangelia Anna Markatou and Roberto Tamassia}, title = {Mitigation Techniques for Attacks on 1-Dimensional Databases that Support Range Queries}, howpublished = {Cryptology ePrint Archive, Report 2019/396}, year = {2019}, url = {https://eprint.iacr.org/2019/396}, } @misc{cryptoeprint:2019:397, author = {Martin R. Albrecht and Lorenzo Grassi and Léo Perrin and Sebastian Ramacher and Christian Rechberger and Dragos Rotaru and Arnab Roy and Markus Schofnegger}, title = {Feistel Structures for MPC, and More }, howpublished = {Cryptology ePrint Archive, Report 2019/397}, year = {2019}, url = {https://eprint.iacr.org/2019/397}, } @misc{cryptoeprint:2019:398, author = {Daniel Apon and Dana Dachman-Soled and Huijing Gong and Jonathan Katz}, title = {Constant-Round Group Key Exchange from the Ring-LWE Assumption}, howpublished = {Cryptology ePrint Archive, Report 2019/398}, year = {2019}, url = {https://eprint.iacr.org/2019/398}, } @misc{cryptoeprint:2019:399, author = {Divesh Aggarwal and Maciej Obremski}, title = {Inception makes non-malleable codes shorter as well!}, howpublished = {Cryptology ePrint Archive, Report 2019/399}, year = {2019}, url = {https://eprint.iacr.org/2019/399}, } @misc{cryptoeprint:2019:400, author = {Akira Takahashi and Mehdi Tibouchi}, title = {Degenerate Fault Attacks on Elliptic Curve Parameters in OpenSSL}, howpublished = {Cryptology ePrint Archive, Report 2019/400}, year = {2019}, url = {https://eprint.iacr.org/2019/400}, } @misc{cryptoeprint:2019:401, author = {Manuel San Pedro and Victor Servant and Charles Guillemet}, title = {Side-Channel assessment of Open Source Hardware Wallets}, howpublished = {Cryptology ePrint Archive, Report 2019/401}, year = {2019}, url = {https://eprint.iacr.org/2019/401}, } @misc{cryptoeprint:2019:402, author = {Kevin Liao and Matthew A. Hammer and Andrew Miller}, title = {ILC: A Calculus for Composable, Computational Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2019/402}, year = {2019}, url = {https://eprint.iacr.org/2019/402}, } @misc{cryptoeprint:2019:403, author = {Riad S. Wahby and Dan Boneh}, title = {Fast and simple constant-time hashing to the BLS12-381 elliptic curve}, howpublished = {Cryptology ePrint Archive, Report 2019/403}, year = {2019}, url = {https://eprint.iacr.org/2019/403}, } @misc{cryptoeprint:2019:404, author = {Kazuhiko Minematsu}, title = {Efficient Message Authentication Codes with Combinatorial Group Testing}, howpublished = {Cryptology ePrint Archive, Report 2019/404}, year = {2019}, url = {https://eprint.iacr.org/2019/404}, } @misc{cryptoeprint:2019:405, author = {Jo Vliegen and Md Masoom Rabbani and Mauro Conti and Nele Mentens}, title = {A Novel FPGA Architecture and Protocol for the Self-attestation of Configurable Hardware}, howpublished = {Cryptology ePrint Archive, Report 2019/405}, year = {2019}, url = {https://eprint.iacr.org/2019/405}, } @misc{cryptoeprint:2019:406, author = {David Derler and Kai Samelin and Daniel Slamanig and Christoph Striecks}, title = {Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based}, howpublished = {Cryptology ePrint Archive, Report 2019/406}, year = {2019}, url = {https://eprint.iacr.org/2019/406}, } @misc{cryptoeprint:2019:407, author = {Binanda Sengupta and Yingjiu Li and Kai Bu and Robert H. Deng}, title = {Privacy-Preserving Network Path Validation}, howpublished = {Cryptology ePrint Archive, Report 2019/407}, year = {2019}, url = {https://eprint.iacr.org/2019/407}, } @misc{cryptoeprint:2019:408, author = {Mustafa Khairallah}, title = {Forgery Attack on SNEIKEN}, howpublished = {Cryptology ePrint Archive, Report 2019/408}, year = {2019}, url = {https://eprint.iacr.org/2019/408}, } @misc{cryptoeprint:2019:409, author = {Houda Ferradi and Keita Xagawa}, title = {Post-Quantum Provably-Secure Authentication and MAC from Mersenne Primes}, howpublished = {Cryptology ePrint Archive, Report 2019/409}, year = {2019}, url = {https://eprint.iacr.org/2019/409}, } @misc{cryptoeprint:2019:410, author = {Kai Samelin and Daniel Slamanig}, title = {Policy-Based Sanitizable Signatures}, howpublished = {Cryptology ePrint Archive, Report 2019/410}, year = {2019}, url = {https://eprint.iacr.org/2019/410}, } @misc{cryptoeprint:2019:411, author = {Tong Cao and Jiangshan Yu and Jérémie Decouchant and Xiapu Luo and Paulo Verissimo}, title = {Exploring the Monero Peer-to-Peer Network}, howpublished = {Cryptology ePrint Archive, Report 2019/411}, year = {2019}, url = {https://eprint.iacr.org/2019/411}, } @misc{cryptoeprint:2019:412, author = {Eliane KOUSSA and Gilles MACARIO-RAT and Jacques PATARIN}, title = {On the complexity of the Permuted Kernel Problem}, howpublished = {Cryptology ePrint Archive, Report 2019/412}, year = {2019}, url = {https://eprint.iacr.org/2019/412}, } @misc{cryptoeprint:2019:413, author = {Itai Dinur}, title = {On the Streaming Indistinguishability of a Random Permutation and a Random Function}, howpublished = {Cryptology ePrint Archive, Report 2019/413}, year = {2019}, url = {https://eprint.iacr.org/2019/413}, } @misc{cryptoeprint:2019:414, author = {Nico Dottling and Sanjam Garg and Mohammad Hajiabadi and Daniel Masny and Daniel Wichs}, title = {Two-Round Oblivious Transfer from CDH or LPN}, howpublished = {Cryptology ePrint Archive, Report 2019/414}, year = {2019}, url = {https://eprint.iacr.org/2019/414}, } @misc{cryptoeprint:2019:415, author = {Ryuya Nakamura and Takayuki Jimba and Dominik Harz}, title = {Refinement and Verification of CBC Casper}, howpublished = {Cryptology ePrint Archive, Report 2019/415}, year = {2019}, url = {https://eprint.iacr.org/2019/415}, } @misc{cryptoeprint:2019:416, author = {Evangelos Georgiadis}, title = {How many transactions per second can bitcoin really handle ? Theoretically.}, howpublished = {Cryptology ePrint Archive, Report 2019/416}, year = {2019}, url = {https://eprint.iacr.org/2019/416}, } @misc{cryptoeprint:2019:417, author = {Jung Hee Cheon and Dongwoo Kim and Duhyeong Kim and Hun Hee Lee and Keewoo Lee}, title = {Numerical Methods for Comparison on Homomorphically Encrypted Numbers}, howpublished = {Cryptology ePrint Archive, Report 2019/417}, year = {2019}, url = {https://eprint.iacr.org/2019/417}, } @misc{cryptoeprint:2019:418, author = {S. Sharmila Deva Selvi and Arinjita Paul and Siva Dirisala and Saswata Basu and C. Pandu Rangan}, title = {Sharing of Encrypted files in Blockchain Made Simpler}, howpublished = {Cryptology ePrint Archive, Report 2019/418}, year = {2019}, url = {https://eprint.iacr.org/2019/418}, } @misc{cryptoeprint:2019:419, author = {Martin R. Albrecht and Carlos Cid and Lorenzo Grassi and Dmitry Khovratovich and Reinhard Lüftenegger and Christian Rechberger and Markus Schofnegger}, title = {Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC}, howpublished = {Cryptology ePrint Archive, Report 2019/419}, year = {2019}, url = {https://eprint.iacr.org/2019/419}, } @misc{cryptoeprint:2019:420, author = {Prasanna Ravi and Sourav Sen Gupta and Anupam Chattopadhyay and Shivam Bhasin}, title = {Improving Speed of Dilithium’s Signing Procedure}, howpublished = {Cryptology ePrint Archive, Report 2019/420}, year = {2019}, url = {https://eprint.iacr.org/2019/420}, } @misc{cryptoeprint:2019:421, author = {Liliya Akhmetzyanova and Evgeny Alekseev and Ekaterina Smyshlyaeva and Alexandr Sokolov}, title = {Continuing to reflect on TLS 1.3 with external PSK}, howpublished = {Cryptology ePrint Archive, Report 2019/421}, year = {2019}, url = {https://eprint.iacr.org/2019/421}, } @misc{cryptoeprint:2019:422, author = {Alexander Moch and Eik List}, title = {Parallelizable MACs Based on the Sum of PRPs with Security Beyond the Birthday Bound}, howpublished = {Cryptology ePrint Archive, Report 2019/422}, year = {2019}, url = {https://eprint.iacr.org/2019/422}, } @misc{cryptoeprint:2019:423, author = {Peter T. Breuer}, title = {Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name}, howpublished = {Cryptology ePrint Archive, Report 2019/423}, year = {2019}, url = {https://eprint.iacr.org/2019/423}, } @misc{cryptoeprint:2019:424, author = {Raghvendra Rohit}, title = {Preimage Security of KNOT-Hash}, howpublished = {Cryptology ePrint Archive, Report 2019/424}, year = {2019}, url = {https://eprint.iacr.org/2019/424}, } @misc{cryptoeprint:2019:425, author = {Flavio Bergamaschi and Shai Halevi and Tzipora T. Halevi and Hamish Hunt}, title = {Homomorphic Training of 30,000 Logistic Regression Models}, howpublished = {Cryptology ePrint Archive, Report 2019/425}, year = {2019}, url = {https://eprint.iacr.org/2019/425}, } @misc{cryptoeprint:2019:426, author = {Abdelrahaman Aly and Tomer Ashur and Eli Ben-Sasson and Siemen Dhooghe and Alan Szepieniec}, title = {Efficient Symmetric Primitives for Advanced Cryptographic Protocols (A Marvellous Contribution)}, howpublished = {Cryptology ePrint Archive, Report 2019/426}, year = {2019}, url = {https://eprint.iacr.org/2019/426}, } @misc{cryptoeprint:2019:427, author = {Florian Bourse and Olivier Sanders and Jacques Traoré}, title = {Improved Secure Integer Comparison via Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/427}, year = {2019}, url = {https://eprint.iacr.org/2019/427}, } @misc{cryptoeprint:2019:428, author = {Jan Czajkowski and Christian Majenz and Christian Schaffner and Sebastian Zur}, title = {Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability}, howpublished = {Cryptology ePrint Archive, Report 2019/428}, year = {2019}, url = {https://eprint.iacr.org/2019/428}, } @misc{cryptoeprint:2019:429, author = {Harsh Chaudhari and Arpita Patra and Ajith Suresh}, title = {ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction}, howpublished = {Cryptology ePrint Archive, Report 2019/429}, year = {2019}, url = {https://eprint.iacr.org/2019/429}, } @misc{cryptoeprint:2019:430, author = {Guangpu Gao and Dongdai Lin and Wenfen Liu and Yongjuan Wang}, title = {Composition of Boolean Functions: An Application to the Secondary Constructions of Bent Functions}, howpublished = {Cryptology ePrint Archive, Report 2019/430}, year = {2019}, url = {https://eprint.iacr.org/2019/430}, } @misc{cryptoeprint:2019:431, author = {Aurore Guillevic and Simon Masson and Emmanuel Thomé}, title = {Cocks-Pinch curves of embedding degrees five to eight and optimal ate pairing computation}, howpublished = {Cryptology ePrint Archive, Report 2019/431}, year = {2019}, url = {https://eprint.iacr.org/2019/431}, } @misc{cryptoeprint:2019:432, author = {Julien Lavauzelle and Julian Renner}, title = {Cryptanalysis of a System Based on Twisted Reed–Solomon Codes}, howpublished = {Cryptology ePrint Archive, Report 2019/432}, year = {2019}, url = {https://eprint.iacr.org/2019/432}, } @misc{cryptoeprint:2019:433, author = {Shan Chen and Samuel Jero and Matthew Jagielski and Alexandra Boldyreva and Cristina Nita-Rotaru}, title = {Secure Communication Channel Establishment: TLS 1.3 (over TCP Fast Open) vs. QUIC}, howpublished = {Cryptology ePrint Archive, Report 2019/433}, year = {2019}, url = {https://eprint.iacr.org/2019/433}, } @misc{cryptoeprint:2019:434, author = {Alexandra Boldyreva and Tianxin Tang and Bogdan Warinschi}, title = {Masking Fuzzy-Searchable Public Databases}, howpublished = {Cryptology ePrint Archive, Report 2019/434}, year = {2019}, url = {https://eprint.iacr.org/2019/434}, } @misc{cryptoeprint:2019:435, author = {Yue Qin and Chi Cheng and Jintai Ding}, title = {A Complete and Optimized Key Mismatch Attack on NIST Candidate NewHope}, howpublished = {Cryptology ePrint Archive, Report 2019/435}, year = {2019}, url = {https://eprint.iacr.org/2019/435}, } @misc{cryptoeprint:2019:436, author = {Benjamin Dowling and Paul Rösler and Jörg Schwenk}, title = {Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework}, howpublished = {Cryptology ePrint Archive, Report 2019/436}, year = {2019}, url = {https://eprint.iacr.org/2019/436}, } @misc{cryptoeprint:2019:437, author = {Thijs Veugen}, title = {Efficient coding for secure computing with additively-homomorphic encrypted data}, howpublished = {Cryptology ePrint Archive, Report 2019/437}, year = {2019}, url = {https://eprint.iacr.org/2019/437}, } @misc{cryptoeprint:2019:438, author = {Jan Camenisch and Angelo De Caro and Esha Ghosh and Alessandro Sorniotti}, title = {Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2019/438}, year = {2019}, url = {https://eprint.iacr.org/2019/438}, } @misc{cryptoeprint:2019:439, author = {Loïc Masure and Cécile Dumas and Emmanuel Prouff}, title = {A Comprehensive Study of Deep Learning for Side-Channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2019/439}, year = {2019}, url = {https://eprint.iacr.org/2019/439}, } @misc{cryptoeprint:2019:440, author = {Avik Chakraborti and Nilanjan Datta and Ashwin Jha and Cuauhtemoc Mancillas Lopez and Mridul Nandi and Yu Sasaki}, title = {Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2019/440}, year = {2019}, url = {https://eprint.iacr.org/2019/440}, } @misc{cryptoeprint:2019:441, author = {Evgenios M. Kornaropoulos and Charalampos Papamanthou and Roberto Tamassia}, title = {The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution}, howpublished = {Cryptology ePrint Archive, Report 2019/441}, year = {2019}, url = {https://eprint.iacr.org/2019/441}, } @misc{cryptoeprint:2019:442, author = {Sabyasachi Karati and Reihaneh Safavi-Naini}, title = {K2SN-MSS: An Efficient Post-Quantum Signature (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2019/442}, year = {2019}, url = {https://eprint.iacr.org/2019/442}, } @misc{cryptoeprint:2019:443, author = {Sergiu Bursuc and Steve Kremer}, title = {Contingent payments on a public ledger: models and reductions for automated verification}, howpublished = {Cryptology ePrint Archive, Report 2019/443}, year = {2019}, url = {https://eprint.iacr.org/2019/443}, } @misc{cryptoeprint:2019:444, author = {Gildas Avoine and Sébastien Canard and Loïc Ferreira}, title = {Symmetric-key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy}, howpublished = {Cryptology ePrint Archive, Report 2019/444}, year = {2019}, url = {https://eprint.iacr.org/2019/444}, } @misc{cryptoeprint:2019:445, author = {Muhammed F. Esgin and Ron Steinfeld and Joseph K. Liu and Dongxi Liu}, title = {Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications}, howpublished = {Cryptology ePrint Archive, Report 2019/445}, year = {2019}, url = {https://eprint.iacr.org/2019/445}, } @misc{cryptoeprint:2019:446, author = {Sanjit Chatterjee and Shravan Kumar Parshuram Puria and Akash Shah}, title = {Backward Private DSSE: Alternative Formulations of Information Leakage and Efficient Constructions}, howpublished = {Cryptology ePrint Archive, Report 2019/446}, year = {2019}, url = {https://eprint.iacr.org/2019/446}, } @misc{cryptoeprint:2019:447, author = {Haibo Zhou and Zheng Li and Xiaoyang Dong and Willi Meier}, title = {Practical Key-recovery Attacks on Round-Reduced Ketje Jr, Xoodoo-AE and Xoodyak}, howpublished = {Cryptology ePrint Archive, Report 2019/447}, year = {2019}, url = {https://eprint.iacr.org/2019/447}, } @misc{cryptoeprint:2019:448, author = {Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Lisa Kohl and Peter Scholl}, title = {Efficient Pseudorandom Correlation Generators: Silent OT Extension and More}, howpublished = {Cryptology ePrint Archive, Report 2019/448}, year = {2019}, url = {https://eprint.iacr.org/2019/448}, } @misc{cryptoeprint:2019:449, author = {Marshall Ball and Dana Dachman-Soled and Mukul Kulkarni and Tal Malkin}, title = {Limits to Non-Malleability}, howpublished = {Cryptology ePrint Archive, Report 2019/449}, year = {2019}, url = {https://eprint.iacr.org/2019/449}, } @misc{cryptoeprint:2019:450, author = {Chenglu Jin and Zheng Yang and Sridhar Adepu and Jianying Zhou}, title = {HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data}, howpublished = {Cryptology ePrint Archive, Report 2019/450}, year = {2019}, url = {https://eprint.iacr.org/2019/450}, } @misc{cryptoeprint:2019:451, author = {Francesco Berti and Olivier Pereira and François-Xavier Standaert}, title = {Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2019/451}, year = {2019}, url = {https://eprint.iacr.org/2019/451}, } @misc{cryptoeprint:2019:452, author = {Sean Murphy and Rachel Player}, title = {A Central Limit Framework for Ring-LWE Decryption}, howpublished = {Cryptology ePrint Archive, Report 2019/452}, year = {2019}, url = {https://eprint.iacr.org/2019/452}, } @misc{cryptoeprint:2019:453, author = {Lydia Garms and Elizabeth A. Quaglia}, title = {A New Approach to Modelling Centralised Reputation Systems}, howpublished = {Cryptology ePrint Archive, Report 2019/453}, year = {2019}, url = {https://eprint.iacr.org/2019/453}, } @misc{cryptoeprint:2019:454, author = {Ryan Karl and Timothy Burchfield and Jonathan Takeshita and Taeho Jung}, title = {Non-Interactive MPC with Trusted Hardware Secure Against Residual Function Attacks}, howpublished = {Cryptology ePrint Archive, Report 2019/454}, year = {2019}, url = {https://eprint.iacr.org/2019/454}, } @misc{cryptoeprint:2019:455, author = {João Otávio Massari Chervinski and Diego Kreutz and Jiangshan Yu}, title = {FloodXMR: Low-cost transaction flooding attack with Monero’s bulletproof protocol}, howpublished = {Cryptology ePrint Archive, Report 2019/455}, year = {2019}, url = {https://eprint.iacr.org/2019/455}, } @misc{cryptoeprint:2019:456, author = {Peifang Ni and Hongda Li and Xianning Meng and Dongxue Pan}, title = {UniqueChain: A Fast, Provably Secure Proof-of-Stake Based Blockchain Protocol in the Open Setting}, howpublished = {Cryptology ePrint Archive, Report 2019/456}, year = {2019}, url = {https://eprint.iacr.org/2019/456}, } @misc{cryptoeprint:2019:457, author = {Mustafa Khairallah}, title = {Forgery Attack on mixFeed in the Nonce-Misuse Scenario}, howpublished = {Cryptology ePrint Archive, Report 2019/457}, year = {2019}, url = {https://eprint.iacr.org/2019/457}, } @misc{cryptoeprint:2019:458, author = {Lorenzo Grassi and Daniel Kales and Dmitry Khovratovich and Arnab Roy and Christian Rechberger and Markus Schofnegger}, title = {Starkad and Poseidon: New Hash Functions for Zero Knowledge Proof Systems}, howpublished = {Cryptology ePrint Archive, Report 2019/458}, year = {2019}, url = {https://eprint.iacr.org/2019/458}, } @misc{cryptoeprint:2019:459, author = {Gaëtan Leurent and Thomas Peyrin}, title = {From Collisions to Chosen-Prefix Collisions - Application to Full SHA-1}, howpublished = {Cryptology ePrint Archive, Report 2019/459}, year = {2019}, url = {https://eprint.iacr.org/2019/459}, } @misc{cryptoeprint:2019:460, author = {Jan Camenisch and Manu Drijvers and Petr Dzurenda and Jan Hajny}, title = {Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards}, howpublished = {Cryptology ePrint Archive, Report 2019/460}, year = {2019}, url = {https://eprint.iacr.org/2019/460}, } @misc{cryptoeprint:2019:461, author = {Xiaolu Hou and Jakub Breier and Dirmanto Jap and Lei Ma and Shivam Bhasin and Yang Liu}, title = {Experimental Evaluation of Deep Neural Network Resistance Against Fault Injection Attacks}, howpublished = {Cryptology ePrint Archive, Report 2019/461}, year = {2019}, url = {https://eprint.iacr.org/2019/461}, } @misc{cryptoeprint:2019:462, author = {Alexander Dax and Robert Künnemann and Sven Tangermann and Michael Backes}, title = {How to wrap it up - A formally verified proposal for the use of authenticated wrapping in PKCS\#11}, howpublished = {Cryptology ePrint Archive, Report 2019/462}, year = {2019}, url = {https://eprint.iacr.org/2019/462}, } @misc{cryptoeprint:2019:463, author = {Allison Bishop and Lucas Kowalczyk and Tal Malkin and Valerio Pastro and Mariana Raykova and Kevin Shi }, title = {In Pursuit of Clarity In Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2019/463}, year = {2019}, url = {https://eprint.iacr.org/2019/463}, } @misc{cryptoeprint:2019:464, author = {Alessio Caminata and Elisa Gorla}, title = {The complexity of MinRank}, howpublished = {Cryptology ePrint Archive, Report 2019/464}, year = {2019}, url = {https://eprint.iacr.org/2019/464}, } @misc{cryptoeprint:2019:465, author = {Jung Hee Cheon and Duhyeong Kim and Jai Hyun Park}, title = {Towards a Practical Clustering Analysis over Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2019/465}, year = {2019}, url = {https://eprint.iacr.org/2019/465}, } @misc{cryptoeprint:2019:466, author = {Jung Hee Cheon and Jinhyuck Jeong and Dohyeong Ki and Jiseung Kim and Joohee Lee and Seok Won Lee}, title = {Privacy-Preserving K-means Clustering with Multiple Data Owners}, howpublished = {Cryptology ePrint Archive, Report 2019/466}, year = {2019}, url = {https://eprint.iacr.org/2019/466}, } @misc{cryptoeprint:2019:467, author = {Clément Massart and François-Xavier Standaert}, title = {Revisiting Location Privacy from a Side-Channel Analysis Viewpoint (Extended Version)}, howpublished = {Cryptology ePrint Archive, Report 2019/467}, year = {2019}, url = {https://eprint.iacr.org/2019/467}, } @misc{cryptoeprint:2019:468, author = {Alessandro Budroni and Andrea Tenti}, title = {The Mersenne Low Hamming Combination Search Problem can be reduced to an ILP Problem}, howpublished = {Cryptology ePrint Archive, Report 2019/468}, year = {2019}, url = {https://eprint.iacr.org/2019/468}, } @misc{cryptoeprint:2019:469, author = {Rui Qiao and Qinglong Wang* and Zongtao Duan and Na Fan}, title = {Security Analysis of Efficient Anonymous Authentication With Conditional Privacy Preserving Scheme for Vehicular Ad Hoc Networks}, howpublished = {Cryptology ePrint Archive, Report 2019/469}, year = {2019}, url = {https://eprint.iacr.org/2019/469}, } @misc{cryptoeprint:2019:470, author = {Niek J. Bouman and Niels de Vreede}, title = {A Practical Approach to the Secure Computation of the Moore-Penrose Pseudoinverse over the Rationals}, howpublished = {Cryptology ePrint Archive, Report 2019/470}, year = {2019}, url = {https://eprint.iacr.org/2019/470}, } @misc{cryptoeprint:2019:471, author = {Behzad Abdolmaleki and Karim Baghery and Helger Lipmaa and Janno Siim and Michal Zajac}, title = {UC-Secure CRS Generation for SNARKs}, howpublished = {Cryptology ePrint Archive, Report 2019/471}, year = {2019}, url = {https://eprint.iacr.org/2019/471}, } @misc{cryptoeprint:2019:472, author = {Iris Anshel and Derek Atkins and Dorian Goldfeld and Paul E Gunnells}, title = {Defeating the Hart et al, Beullens-Blackburn, Kotov-Menshov-Ushakov, and Merz-Petit Attacks on WalnutDSA(TM)}, howpublished = {Cryptology ePrint Archive, Report 2019/472}, year = {2019}, url = {https://eprint.iacr.org/2019/472}, } @misc{cryptoeprint:2019:473, author = {Chengdong Tao}, title = {A Method to Reduce the Key Size of UOV Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2019/473}, year = {2019}, url = {https://eprint.iacr.org/2019/473}, } @misc{cryptoeprint:2019:474, author = {John Matthew Macnaghten and James Luke Menzies and Mark Munro}, title = {A Note on SIMON-$32/64$ Security}, howpublished = {Cryptology ePrint Archive, Report 2019/474}, year = {2019}, url = {https://eprint.iacr.org/2019/474}, } @misc{cryptoeprint:2019:475, author = {Dennis Hofheinz and Bogdan Ursu}, title = {Dual-Mode NIZKs from Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2019/475}, year = {2019}, url = {https://eprint.iacr.org/2019/475}, } @misc{cryptoeprint:2019:476, author = {Muhammad ElSheikh and Ahmed Abdelkhalek and Amr M. Youssef}, title = {On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T}, howpublished = {Cryptology ePrint Archive, Report 2019/476}, year = {2019}, url = {https://eprint.iacr.org/2019/476}, } @misc{cryptoeprint:2019:477, author = {Cas Cremers and Britta Hale and Konrad Kohbrok}, title = {Revisiting Post-Compromise Security Guarantees in Group Messaging}, howpublished = {Cryptology ePrint Archive, Report 2019/477}, year = {2019}, url = {https://eprint.iacr.org/2019/477}, } @misc{cryptoeprint:2019:478, author = {Sarah McCarthy and James Howe and Neil Smyth and Seamus Brannigan and Máire O’Neill}, title = {BEARZ Attack FALCON: Implementation Attacks with Countermeasures on the FALCON signature scheme}, howpublished = {Cryptology ePrint Archive, Report 2019/478}, year = {2019}, url = {https://eprint.iacr.org/2019/478}, } @misc{cryptoeprint:2019:479, author = {Sébastien Canard and Loïc Ferreira}, title = {Extended 3-Party ACCE and Application to LoRaWAN 1.1}, howpublished = {Cryptology ePrint Archive, Report 2019/479}, year = {2019}, url = {https://eprint.iacr.org/2019/479}, } @misc{cryptoeprint:2019:480, author = {Karim Baghery}, title = {On the Efficiency of Privacy-Preserving Smart Contract Systems}, howpublished = {Cryptology ePrint Archive, Report 2019/480}, year = {2019}, url = {https://eprint.iacr.org/2019/480}, } @misc{cryptoeprint:2019:481, author = {Prasanna Raghaw Mishra and Bhartendu Nandan and Navneet Gaba}, title = {An Efficient and Compact Reformulation of NIST Collision Estimate Test}, howpublished = {Cryptology ePrint Archive, Report 2019/481}, year = {2019}, url = {https://eprint.iacr.org/2019/481}, } @misc{cryptoeprint:2019:482, author = {Jacob Appelbaum and Chloe Martindale and Peter Wu}, title = {Tiny WireGuard Tweak}, howpublished = {Cryptology ePrint Archive, Report 2019/482}, year = {2019}, url = {https://eprint.iacr.org/2019/482}, } @misc{cryptoeprint:2019:483, author = {Pierrick Méaux and Claude Carlet and Anthony Journault and François-Xavier Standaert}, title = {Improved Filter Permutators: Combining Symmetric Encryption Design, Boolean Functions, Low Complexity Cryptography, and Homomorphic Encryption, for Private Delegation of Computations}, howpublished = {Cryptology ePrint Archive, Report 2019/483}, year = {2019}, url = {https://eprint.iacr.org/2019/483}, } @misc{cryptoeprint:2019:484, author = {Eric Brier and Houda Ferradi and Marc Joye and David Naccache}, title = {New Number-Theoretic Cryptographic Primitives}, howpublished = {Cryptology ePrint Archive, Report 2019/484}, year = {2019}, url = {https://eprint.iacr.org/2019/484}, } @misc{cryptoeprint:2019:485, author = {Razvan Barbulescu and Nadia El Mrabet and Loubna Ghammam}, title = {A taxonomy of pairings, their security, their complexity}, howpublished = {Cryptology ePrint Archive, Report 2019/485}, year = {2019}, url = {https://eprint.iacr.org/2019/485}, } @misc{cryptoeprint:2019:486, author = {Suhyeon Lee and Seungjoo Kim}, title = {Detective Mining: Selfish Mining Becomes Unrealistic under Mining Pool Environment}, howpublished = {Cryptology ePrint Archive, Report 2019/486}, year = {2019}, url = {https://eprint.iacr.org/2019/486}, } @misc{cryptoeprint:2019:487, author = {Michel Abdalla and Fabrice Benhamouda and Romain Gay}, title = {From Single-Input to Multi-Client Inner-Product Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/487}, year = {2019}, url = {https://eprint.iacr.org/2019/487}, } @misc{cryptoeprint:2019:488, author = {Alan Kaminsky}, title = {Enigma 2000: An Authenticated Encryption Algorithm For Human-to-Human Communication}, howpublished = {Cryptology ePrint Archive, Report 2019/488}, year = {2019}, url = {https://eprint.iacr.org/2019/488}, } @misc{cryptoeprint:2019:489, author = {Leon Botros and Matthias J. Kannwischer and Peter Schwabe}, title = {Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4}, howpublished = {Cryptology ePrint Archive, Report 2019/489}, year = {2019}, url = {https://eprint.iacr.org/2019/489}, } @misc{cryptoeprint:2019:490, author = {Ward Beullens}, title = {On sigma protocols with helper for MQ and PKP, fishy signature schemes and more}, howpublished = {Cryptology ePrint Archive, Report 2019/490}, year = {2019}, url = {https://eprint.iacr.org/2019/490}, } @misc{cryptoeprint:2019:491, author = {Eloi de Cherisey and Sylvain Guilley and Olivier Rioul and Pablo Piantanida}, title = {Best Information is Most Successful}, howpublished = {Cryptology ePrint Archive, Report 2019/491}, year = {2019}, url = {https://eprint.iacr.org/2019/491}, } @misc{cryptoeprint:2019:492, author = {Daniel J. Bernstein and Andreas Hülsing}, title = {Decisional second-preimage resistance: When does SPR imply PRE?}, howpublished = {Cryptology ePrint Archive, Report 2019/492}, year = {2019}, url = {https://eprint.iacr.org/2019/492}, } @misc{cryptoeprint:2019:493, author = {Anamaria Costache and Kim Laine and Rachel Player}, title = {Homomorphic noise growth in practice: comparing BGV and FV}, howpublished = {Cryptology ePrint Archive, Report 2019/493}, year = {2019}, url = {https://eprint.iacr.org/2019/493}, } @misc{cryptoeprint:2019:494, author = {Haodong Jiang and Zhenfeng Zhang and Zhi Ma}, title = {On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model}, howpublished = {Cryptology ePrint Archive, Report 2019/494}, year = {2019}, url = {https://eprint.iacr.org/2019/494}, } @misc{cryptoeprint:2019:495, author = {Marc Joye}, title = {Protecting ECC Against Fault Attacks: The Ring Extension Method Revisited}, howpublished = {Cryptology ePrint Archive, Report 2019/495}, year = {2019}, url = {https://eprint.iacr.org/2019/495}, } @misc{cryptoeprint:2019:496, author = {Christian Majenz and Christian Schaffner and Jeroen van Wier}, title = {Non-malleability for quantum public-key encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/496}, year = {2019}, url = {https://eprint.iacr.org/2019/496}, } @misc{cryptoeprint:2019:497, author = {Jiafan Wang and Sherman S. M. Chow}, title = {Forward and Backward-Secure Range-Searchable Symmetric Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/497}, year = {2019}, url = {https://eprint.iacr.org/2019/497}, } @misc{cryptoeprint:2019:498, author = {Ward Beullens and Thorsten Kleinjung and Frederik Vercauteren}, title = {CSI-FiSh: Efficient Isogeny based Signatures through Class Group Computations}, howpublished = {Cryptology ePrint Archive, Report 2019/498}, year = {2019}, url = {https://eprint.iacr.org/2019/498}, } @misc{cryptoeprint:2019:499, author = {Michael Naehrig and Joost Renes}, title = {Dual Isogenies and Their Application to Public-key Compression for Isogeny-based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2019/499}, year = {2019}, url = {https://eprint.iacr.org/2019/499}, } @misc{cryptoeprint:2019:500, author = {Jean-Claude Bajard and Julien Eynard and Paulo Martins and Leonel Sousa and Vincent Zucca}, title = {An HPR variant of the FV scheme: Computationally Cheaper, Asymptotically Faster}, howpublished = {Cryptology ePrint Archive, Report 2019/500}, year = {2019}, url = {https://eprint.iacr.org/2019/500}, } @misc{cryptoeprint:2019:501, author = {María Naya-Plasencia and André Schrottenloher}, title = {Optimal Merging in Quantum k-xor and k-sum Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2019/501}, year = {2019}, url = {https://eprint.iacr.org/2019/501}, } @misc{cryptoeprint:2019:502, author = {Shi Bai and Shaun Miller and Weiqiang Wen}, title = {A refined analysis of the cost for solving LWE via uSVP }, howpublished = {Cryptology ePrint Archive, Report 2019/502}, year = {2019}, url = {https://eprint.iacr.org/2019/502}, } @misc{cryptoeprint:2019:503, author = {Guilhem Castagnos and Dario Catalano and Fabien Laguillaumie and Federico Savasta and Ida Tucker}, title = {Two-Party ECDSA from Hash Proof Systems and Efficient Instantiations}, howpublished = {Cryptology ePrint Archive, Report 2019/503}, year = {2019}, url = {https://eprint.iacr.org/2019/503}, } @misc{cryptoeprint:2019:504, author = {Bernardo Magri and Christian Matt and Jesper Buus Nielsen and Daniel Tschudi}, title = {Afgjort -- A Semi-Synchronous Finality Layer for Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2019/504}, year = {2019}, url = {https://eprint.iacr.org/2019/504}, } @misc{cryptoeprint:2019:505, author = {Felix Wegener and Thorben Moos and Amir Moradi}, title = {DL-LA: Deep Learning Leakage Assessment: A modern roadmap for SCA evaluations}, howpublished = {Cryptology ePrint Archive, Report 2019/505}, year = {2019}, url = {https://eprint.iacr.org/2019/505}, } @misc{cryptoeprint:2019:506, author = {Erik-Oliver Blass and Guevara Noubir}, title = {Forward Integrity and Crash Recovery for Secure Logs}, howpublished = {Cryptology ePrint Archive, Report 2019/506}, year = {2019}, url = {https://eprint.iacr.org/2019/506}, } @misc{cryptoeprint:2019:507, author = {Jiaxin Guan and Mark Zhandry}, title = {Simple Schemes in the Bounded Storage Model}, howpublished = {Cryptology ePrint Archive, Report 2019/507}, year = {2019}, url = {https://eprint.iacr.org/2019/507}, } @misc{cryptoeprint:2019:508, author = {Tsz Hon Yuen and Shi-feng Sun and Joseph K. Liu and Man Ho Au and Muhammed F. Esgin and Qingzhao Zhang and Dawu Gu}, title = {RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security}, howpublished = {Cryptology ePrint Archive, Report 2019/508}, year = {2019}, url = {https://eprint.iacr.org/2019/508}, } @misc{cryptoeprint:2019:509, author = {Orr Dunkelman and Nathan Keller and Noam Lasry and Adi Shamir}, title = {New Slide Attacks on Almost Self-Similar Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2019/509}, year = {2019}, url = {https://eprint.iacr.org/2019/509}, } @misc{cryptoeprint:2019:510, author = {Jiang Zhang and Yu Yu and Shuqin Fan and Zhenfeng Zhang and Kang Yang}, title = {Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes}, howpublished = {Cryptology ePrint Archive, Report 2019/510}, year = {2019}, url = {https://eprint.iacr.org/2019/510}, } @misc{cryptoeprint:2019:511, author = {Gilles Barthe and Sonia Belaïd and Thomas Espitau and Pierre-Alain Fouque and Mélissa Rossi and Mehdi Tibouchi}, title = {GALACTICS: Gaussian Sampling for Lattice-Based Constant-Time Implementation of Cryptographic Signatures, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2019/511}, year = {2019}, url = {https://eprint.iacr.org/2019/511}, } @misc{cryptoeprint:2019:512, author = {Shuai Han and Shengli Liu and Lin Lyu and Dawu Gu}, title = {Tight Leakage-Resilient CCA-Security from Quasi-Adaptive Hash Proof System}, howpublished = {Cryptology ePrint Archive, Report 2019/512}, year = {2019}, url = {https://eprint.iacr.org/2019/512}, } @misc{cryptoeprint:2019:513, author = {Khoa Nguyen and Hanh Tang and Huaxiong Wang and Neng Zeng}, title = {New Code-Based Privacy-Preserving Cryptographic Constructions}, howpublished = {Cryptology ePrint Archive, Report 2019/513}, year = {2019}, url = {https://eprint.iacr.org/2019/513}, } @misc{cryptoeprint:2019:514, author = {Manu Drijvers and Sergey Gorbunov and Gregory Neven and Hoeteck Wee}, title = {Pixel: Multi-signatures for Consensus}, howpublished = {Cryptology ePrint Archive, Report 2019/514}, year = {2019}, url = {https://eprint.iacr.org/2019/514}, } @misc{cryptoeprint:2019:515, author = {Jakub Breier and Mustafa Khairallah and Xiaolu Hou and Yang Liu}, title = {A Countermeasure Against Statistical Ineffective Fault Analysis}, howpublished = {Cryptology ePrint Archive, Report 2019/515}, year = {2019}, url = {https://eprint.iacr.org/2019/515}, } @misc{cryptoeprint:2019:516, author = {Anasuya Acharya and Manoj Prabhakaran and Akash Trehan}, title = {CellTree: A New Paradigm for Distributed Data Repositories}, howpublished = {Cryptology ePrint Archive, Report 2019/516}, year = {2019}, url = {https://eprint.iacr.org/2019/516}, } @misc{cryptoeprint:2019:517, author = {Daniel Kales and Christian Rechberger and Matthias Senker and Thomas Schneider and Christian Weinert}, title = {Mobile Private Contact Discovery at Scale}, howpublished = {Cryptology ePrint Archive, Report 2019/517}, year = {2019}, url = {https://eprint.iacr.org/2019/517}, } @misc{cryptoeprint:2019:518, author = {Payman Mohassel and Peter Rindal and Mike Rosulek}, title = {Fast Database Joins for Secret Shared Data}, howpublished = {Cryptology ePrint Archive, Report 2019/518}, year = {2019}, url = {https://eprint.iacr.org/2019/518}, } @misc{cryptoeprint:2019:519, author = {Christopher Patton and Thomas Shrimpton}, title = {Security in the Presence of Key Reuse: Context-Separable Interfaces and their Applications}, howpublished = {Cryptology ePrint Archive, Report 2019/519}, year = {2019}, url = {https://eprint.iacr.org/2019/519}, } @misc{cryptoeprint:2019:520, author = {Benjamin M. Case and Colin Gallagher and Shuhong Gao}, title = {A Note on Sub-Gaussian Random Variables}, howpublished = {Cryptology ePrint Archive, Report 2019/520}, year = {2019}, url = {https://eprint.iacr.org/2019/520}, } @misc{cryptoeprint:2019:521, author = {Benjamin M. Case and Shuhong Gao and Gengran Hu and Qiuxia Xu}, title = {Fully Homomorphic Encryption with k-bit Arithmetic Operations}, howpublished = {Cryptology ePrint Archive, Report 2019/521}, year = {2019}, url = {https://eprint.iacr.org/2019/521}, } @misc{cryptoeprint:2019:522, author = {Amos Beimel and Naty Peter}, title = {Secret-Sharing from Robust Conditional Disclosure of Secrets}, howpublished = {Cryptology ePrint Archive, Report 2019/522}, year = {2019}, url = {https://eprint.iacr.org/2019/522}, } @misc{cryptoeprint:2019:523, author = {Jack Doerner and Yashvanth Kondi and Eysa Lee and abhi shelat}, title = {Threshold ECDSA from ECDSA Assumptions: The Multiparty Case}, howpublished = {Cryptology ePrint Archive, Report 2019/523}, year = {2019}, url = {https://eprint.iacr.org/2019/523}, } @misc{cryptoeprint:2019:524, author = {Hao Chen and Wei Dai and Miran Kim and Yongsoo Song}, title = {Efficient Multi-Key Homomorphic Encryption with Packed Ciphertexts with Application to Oblivious Neural Network Inference}, howpublished = {Cryptology ePrint Archive, Report 2019/524}, year = {2019}, url = {https://eprint.iacr.org/2019/524}, } @misc{cryptoeprint:2019:525, author = {Ciprian Băetu and F. Betül Durak and Loïs Huguenin-Dumittan and Abdullah Talayhan and Serge Vaudenay}, title = {Misuse Attacks on Post-Quantum Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2019/525}, year = {2019}, url = {https://eprint.iacr.org/2019/525}, } @misc{cryptoeprint:2019:526, author = {Cas Cremers and Dennis Jackson}, title = {Prime, Order Please! Revisiting Small Subgroup and Invalid Curve Attacks on Protocols using Diffie-Hellman}, howpublished = {Cryptology ePrint Archive, Report 2019/526}, year = {2019}, url = {https://eprint.iacr.org/2019/526}, } @misc{cryptoeprint:2019:527, author = {Olamide Omolola and Paul Plessing}, title = {Revisiting Privacy-aware Blockchain Public Key Infrastructure}, howpublished = {Cryptology ePrint Archive, Report 2019/527}, year = {2019}, url = {https://eprint.iacr.org/2019/527}, } @misc{cryptoeprint:2019:528, author = {Xavier Bonnetain and Léo Perrin and Shizhu Tian}, title = {Anomalies and Vector Space Search: Tools for S-Box Reverse-Engineering}, howpublished = {Cryptology ePrint Archive, Report 2019/528}, year = {2019}, url = {https://eprint.iacr.org/2019/528}, } @misc{cryptoeprint:2019:529, author = {Pedro Branco and Manuel Goulão and Paulo Mateus}, title = {UC-Commitment Schemes with Phase-Adaptive Security from Trapdoor Functions}, howpublished = {Cryptology ePrint Archive, Report 2019/529}, year = {2019}, url = {https://eprint.iacr.org/2019/529}, } @misc{cryptoeprint:2019:530, author = {Robert Nguyen and Adrien Facon and Sylvain Guilley and Guillaume Gautier and Safwan El Assad}, title = {Speed-up of SCA attacks on 32-bit multiplications}, howpublished = {Cryptology ePrint Archive, Report 2019/530}, year = {2019}, url = {https://eprint.iacr.org/2019/530}, } @misc{cryptoeprint:2019:531, author = {Kaoru Kurosawa}, title = {How to Correct Errors in Multi-Server PIR}, howpublished = {Cryptology ePrint Archive, Report 2019/531}, year = {2019}, url = {https://eprint.iacr.org/2019/531}, } @misc{cryptoeprint:2019:532, author = {Carsten Baum and Ariel Nof}, title = {Concretely-Efficient Zero-Knowledge Arguments for Arithmetic Circuits and Their Application to Lattice-Based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2019/532}, year = {2019}, url = {https://eprint.iacr.org/2019/532}, } @misc{cryptoeprint:2019:533, author = {Percy Deift and Stephen D. Miller and Thomas Trogdon}, title = {Stopping time signatures for some algorithms in cryptography}, howpublished = {Cryptology ePrint Archive, Report 2019/533}, year = {2019}, url = {https://eprint.iacr.org/2019/533}, } @misc{cryptoeprint:2019:534, author = {Fatemeh Ganji and Shahin Tajik and Pascal Stauss and Jean-Pierre Seifert and Domenic Forte and Mark Tehranipoor}, title = {Theoretical and Practical Approaches for Hardness Amplification of PUFs}, howpublished = {Cryptology ePrint Archive, Report 2019/534}, year = {2019}, url = {https://eprint.iacr.org/2019/534}, } @misc{cryptoeprint:2019:535, author = {Hwajeong soe and Amir Jalali and Reza Azarderakhsh}, title = {SIKE Round 2 Speed Record on ARM Cortex-M4}, howpublished = {Cryptology ePrint Archive, Report 2019/535}, year = {2019}, url = {https://eprint.iacr.org/2019/535}, } @misc{cryptoeprint:2019:536, author = {Joan Daemen and Christoph Dobraunig and Maria Eichlseder and Hannes Gross and Florian Mendel and Robert Primas}, title = {Protecting against Statistical Ineffective Fault Attacks}, howpublished = {Cryptology ePrint Archive, Report 2019/536}, year = {2019}, url = {https://eprint.iacr.org/2019/536}, } @misc{cryptoeprint:2019:537, author = {Patrick Derbez and Pierre-Alain Fouque and Baptiste Lambin and Victor Mollimard}, title = {Efficient Search for Optimal Diffusion Layers of Generalized Feistel Networks}, howpublished = {Cryptology ePrint Archive, Report 2019/537}, year = {2019}, url = {https://eprint.iacr.org/2019/537}, } @misc{cryptoeprint:2019:538, author = {Nikolay Shenets}, title = {On Perfect Endomorphic Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2019/538}, year = {2019}, url = {https://eprint.iacr.org/2019/538}, } @misc{cryptoeprint:2019:539, author = {Mostafizar Rahman and Dhiman Saha and Goutam Paul}, title = {Iterated Truncated Differential for Internal Keyed Permutation of FlexAEAD}, howpublished = {Cryptology ePrint Archive, Report 2019/539}, year = {2019}, url = {https://eprint.iacr.org/2019/539}, } @misc{cryptoeprint:2019:540, author = {Markku-Juhani O. Saarinen}, title = {A chosen key attack against the secret S-boxes of GOST}, howpublished = {Cryptology ePrint Archive, Report 2019/540}, year = {2019}, url = {https://eprint.iacr.org/2019/540}, } @misc{cryptoeprint:2019:541, author = {James Shook and Scott Simon and Peter Mell}, title = {A Smart Contract Refereed Data Retrieval Protocol with a Provably Low Collateral Requirement}, howpublished = {Cryptology ePrint Archive, Report 2019/541}, year = {2019}, url = {https://eprint.iacr.org/2019/541}, } @misc{cryptoeprint:2019:542, author = {Jonathan Protzenko and Benjamin Beurdouche and Denis Merigoux and Karthikeyan Bhargavan}, title = {Formally Verified Cryptographic Web Applications in WebAssembly}, howpublished = {Cryptology ePrint Archive, Report 2019/542}, year = {2019}, url = {https://eprint.iacr.org/2019/542}, } @misc{cryptoeprint:2019:543, author = {John Kelsey and Dana Dachman-Soled and Sweta Mishra and Meltem Sonmez Turan}, title = {TMPS: Ticket-Mediated Password Strengthening}, howpublished = {Cryptology ePrint Archive, Report 2019/543}, year = {2019}, url = {https://eprint.iacr.org/2019/543}, } @misc{cryptoeprint:2019:544, author = {Partha Sarathi Roy and Kirill Morozov and Kazuhide Fukushima and Shinsaku Kiyomoto}, title = {Evaluation of Code-based Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2019/544}, year = {2019}, url = {https://eprint.iacr.org/2019/544}, } @misc{cryptoeprint:2019:545, author = {Sayandeep Saha and Dirmanto Jap and Debapriya Basu Roy and Avik Chakraborti and Shivam Bhasin and Debdeep Mukhopadhyay}, title = {Transform-and-Encode: A Countermeasure Framework for Statistical Ineffective Fault Attacks on Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2019/545}, year = {2019}, url = {https://eprint.iacr.org/2019/545}, } @misc{cryptoeprint:2019:546, author = {David Cerezo Sánchez}, title = {Zero-Knowledge Proof-of-Identity: Sybil-Resistant, Anonymous Authentication on Permissionless Blockchains and Incentive Compatible, Strictly Dominant Cryptocurrencies}, howpublished = {Cryptology ePrint Archive, Report 2019/546}, year = {2019}, url = {https://eprint.iacr.org/2019/546}, } @misc{cryptoeprint:2019:547, author = {Chloé Hébant and Duong Hieu Phan and David Pointcheval}, title = {Linearly-Homomorphic Signatures and Scalable Mix-Nets}, howpublished = {Cryptology ePrint Archive, Report 2019/547}, year = {2019}, url = {https://eprint.iacr.org/2019/547}, } @misc{cryptoeprint:2019:548, author = {Thomas Debris-Alazard and Nicolas Sendrier and Jean-Pierre Tillich}, title = {About Wave Implementation and its Leakage Immunity}, howpublished = {Cryptology ePrint Archive, Report 2019/548}, year = {2019}, url = {https://eprint.iacr.org/2019/548}, } @misc{cryptoeprint:2019:549, author = {Arka Rai Choudhuri and Pavel Hubacek and Chethan Kamath and Krzysztof Pietrzak and Alon Rosen and Guy N. Rothblum}, title = {Finding a Nash Equilibrium Is No Easier Than Breaking Fiat-Shamir}, howpublished = {Cryptology ePrint Archive, Report 2019/549}, year = {2019}, url = {https://eprint.iacr.org/2019/549}, } @misc{cryptoeprint:2019:550, author = {Srinath Setty}, title = {Spartan: Efficient and general-purpose zkSNARKs without trusted setup}, howpublished = {Cryptology ePrint Archive, Report 2019/550}, year = {2019}, url = {https://eprint.iacr.org/2019/550}, } @misc{cryptoeprint:2019:551, author = {Emil Simion and Paul Burciu}, title = {A note on the correlations between NIST cryptographic statistical tests suite}, howpublished = {Cryptology ePrint Archive, Report 2019/551}, year = {2019}, url = {https://eprint.iacr.org/2019/551}, } @misc{cryptoeprint:2019:552, author = {Binyi Chen and Yilei Chen and Kristina Hostáková and Pratyay Mukherjee}, title = {Continuous Space-Bounded Non-Malleable Codes from Stronger Proofs-of-Space}, howpublished = {Cryptology ePrint Archive, Report 2019/552}, year = {2019}, url = {https://eprint.iacr.org/2019/552}, } @misc{cryptoeprint:2019:553, author = {John Gregory Underhill and Stiepan Aurélien Kovac and Xenia Bogomolec}, title = {Towards post-quantum symmetric cryptography}, howpublished = {Cryptology ePrint Archive, Report 2019/553}, year = {2019}, url = {https://eprint.iacr.org/2019/553}, } @misc{cryptoeprint:2019:554, author = {Yu Long Chen and Eran Lambooij and Bart Mennink}, title = {How to Build Pseudorandom Functions From Public Random Permutations}, howpublished = {Cryptology ePrint Archive, Report 2019/554}, year = {2019}, url = {https://eprint.iacr.org/2019/554}, } @misc{cryptoeprint:2019:555, author = {Georgios Fotiadis and Chloe Martindale}, title = {Optimal TNFS-secure pairings on elliptic curves with composite embedding degree}, howpublished = {Cryptology ePrint Archive, Report 2019/555}, year = {2019}, url = {https://eprint.iacr.org/2019/555}, } @misc{cryptoeprint:2019:556, author = {Gideon Samid}, title = {When Encryption is Not Enough -- Effective Concealment of Communication Pattern, even Existence (BitGrey, BitLoop)}, howpublished = {Cryptology ePrint Archive, Report 2019/556}, year = {2019}, url = {https://eprint.iacr.org/2019/556}, } @misc{cryptoeprint:2019:557, author = {Xiaopeng Zhao and Jinwen Zheng and Nanyuan Cao and Zhenfu Cao and Xiaolei Dong}, title = {Identity-Based Encryption from $e$-th Power Residue Symbols}, howpublished = {Cryptology ePrint Archive, Report 2019/557}, year = {2019}, url = {https://eprint.iacr.org/2019/557}, } @misc{cryptoeprint:2019:558, author = {Chloe Martindale and Lorenz Panny}, title = {How to not break SIDH}, howpublished = {Cryptology ePrint Archive, Report 2019/558}, year = {2019}, url = {https://eprint.iacr.org/2019/558}, } @misc{cryptoeprint:2019:559, author = {Evgeny K. Alekseev and Lyudmila A. Kushchinskaya}, title = {Weights on affine subspaces and some other cryptographic characteristics of Boolean functions of 5 variables}, howpublished = {Cryptology ePrint Archive, Report 2019/559}, year = {2019}, url = {https://eprint.iacr.org/2019/559}, } @misc{cryptoeprint:2019:560, author = {Kwang Ho Kim and Jong Hyok Choe and Dok Nam Lee and Dae Song Go and Sihem Mesnager}, title = {Solutions of $x^{q^k}+\cdots+x^{q}+x=a$ in $GF(2^n)$}, howpublished = {Cryptology ePrint Archive, Report 2019/560}, year = {2019}, url = {https://eprint.iacr.org/2019/560}, } @misc{cryptoeprint:2019:561, author = {Zhizhu Lian and Yupu Hu and Hu Chen and Baocang Wang}, title = {Faster Bootstrapping of FHE over the integers with large prime message space}, howpublished = {Cryptology ePrint Archive, Report 2019/561}, year = {2019}, url = {https://eprint.iacr.org/2019/561}, } @misc{cryptoeprint:2019:562, author = {Shahram Khazaei and Mojtaba Rafiee}, title = {Multi-Adjustable Join Scheme}, howpublished = {Cryptology ePrint Archive, Report 2019/562}, year = {2019}, url = {https://eprint.iacr.org/2019/562}, } @misc{cryptoeprint:2019:563, author = {Omer Shlomovits and István András Seres}, title = {ShareLock: Mixing for Cryptocurrencies from Multiparty ECDSA}, howpublished = {Cryptology ePrint Archive, Report 2019/563}, year = {2019}, url = {https://eprint.iacr.org/2019/563}, } @misc{cryptoeprint:2019:564, author = {Sujit Kumar Muduli and Pramod Subramanyan and Sayak Ray}, title = {Verification of Authenticated Firmware Load}, howpublished = {Cryptology ePrint Archive, Report 2019/564}, year = {2019}, url = {https://eprint.iacr.org/2019/564}, } @misc{cryptoeprint:2019:565, author = {Nirvan Tyagi and Paul Grubbs and Julia Len and Ian Miers and Thomas Ristenpart}, title = {Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/565}, year = {2019}, url = {https://eprint.iacr.org/2019/565}, } @misc{cryptoeprint:2019:566, author = {Pranesh Santikellur and Aritra Bhattacharyay and Rajat Subhra Chakraborty}, title = {Deep Learning based Model Building Attacks on Arbiter PUF Compositions}, howpublished = {Cryptology ePrint Archive, Report 2019/566}, year = {2019}, url = {https://eprint.iacr.org/2019/566}, } @misc{cryptoeprint:2019:567, author = {Xingye Lu and Man Ho Au and Zhenfei Zhang}, title = {(Linkable) Ring Signature from Hash-Then-One-Way Signature}, howpublished = {Cryptology ePrint Archive, Report 2019/567}, year = {2019}, url = {https://eprint.iacr.org/2019/567}, } @misc{cryptoeprint:2019:568, author = {Debapriya Basu Roy and Debdeep Mukhopadhyay}, title = {Post Quantum ECC on FPGA Platform}, howpublished = {Cryptology ePrint Archive, Report 2019/568}, year = {2019}, url = {https://eprint.iacr.org/2019/568}, } @misc{cryptoeprint:2019:569, author = {Wilson Alberto Torres and Veronika Kuchta and Ron Steinfeld and Amin Sakzad and Joseph K. Liu and Jacob Cheng}, title = {Lattice RingCT v2.0 with Multiple Input and Output Wallets}, howpublished = {Cryptology ePrint Archive, Report 2019/569}, year = {2019}, url = {https://eprint.iacr.org/2019/569}, } @misc{cryptoeprint:2019:570, author = {Daan van der Valk and Stjepan Picek}, title = {Bias-variance Decomposition in Machine Learning-based Side-channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2019/570}, year = {2019}, url = {https://eprint.iacr.org/2019/570}, } @misc{cryptoeprint:2019:571, author = {Stefan Dziembowski and Lisa Eckey and Sebastian Faust and Julia Hesse and Kristina Hostáková}, title = {Multi-Party Virtual State Channels}, howpublished = {Cryptology ePrint Archive, Report 2019/571}, year = {2019}, url = {https://eprint.iacr.org/2019/571}, } @misc{cryptoeprint:2019:572, author = {Claude Crépeau and Rafael Dowsley and Anderson C. A. Nascimento}, title = {On the Commitment Capacity of Unfair Noisy Channels}, howpublished = {Cryptology ePrint Archive, Report 2019/572}, year = {2019}, url = {https://eprint.iacr.org/2019/572}, } @misc{cryptoeprint:2019:573, author = {Christoph Dobraunig and Bart Mennink}, title = {Security of the Suffix Keyed Sponge}, howpublished = {Cryptology ePrint Archive, Report 2019/573}, year = {2019}, url = {https://eprint.iacr.org/2019/573}, } @misc{cryptoeprint:2019:574, author = {Herman Galteland and Kristian Gjøsteen}, title = {Subliminal channels in post-quantum digital signature schemes}, howpublished = {Cryptology ePrint Archive, Report 2019/574}, year = {2019}, url = {https://eprint.iacr.org/2019/574}, } @misc{cryptoeprint:2019:575, author = {Amir Jafari and Shahram Khazaei}, title = {On Abelian Secret Sharing: duality and separation}, howpublished = {Cryptology ePrint Archive, Report 2019/575}, year = {2019}, url = {https://eprint.iacr.org/2019/575}, } @misc{cryptoeprint:2019:576, author = {Reza Kaboli and Shahram Khazaei and Maghsoud Parviz}, title = {Group-homomorphic Secret Sharing Schemes Are Group-characterizable with Normal Subgroups}, howpublished = {Cryptology ePrint Archive, Report 2019/576}, year = {2019}, url = {https://eprint.iacr.org/2019/576}, } @misc{cryptoeprint:2019:577, author = {Deevashwer Rathee and Thomas Schneider and K. K. Shukla}, title = {Improved Multiplication Triple Generation over Rings via SHE}, howpublished = {Cryptology ePrint Archive, Report 2019/577}, year = {2019}, url = {https://eprint.iacr.org/2019/577}, } @misc{cryptoeprint:2019:578, author = {Houssem Maghrebi}, title = {Deep Learning based Side Channel Attacks in Practice}, howpublished = {Cryptology ePrint Archive, Report 2019/578}, year = {2019}, url = {https://eprint.iacr.org/2019/578}, } @misc{cryptoeprint:2019:579, author = {Dominic Letz}, title = {BlockQuick: Super-Light Client Protocol for Blockchain Validation on Constrained Devices}, howpublished = {Cryptology ePrint Archive, Report 2019/579}, year = {2019}, url = {https://eprint.iacr.org/2019/579}, } @misc{cryptoeprint:2019:580, author = {Russell W. F. Lai and Viktoria Ronge and Tim Ruffing and Dominique Schröder and Sri Aravinda Krishnan Thyagarajan and Jiafan Wang}, title = {Omniring: Scaling Up Private Payments Without Trusted Setup - Formal Foundations and Constructions of Ring Confidential Transactions with Log-size Proofs}, howpublished = {Cryptology ePrint Archive, Report 2019/580}, year = {2019}, url = {https://eprint.iacr.org/2019/580}, } @misc{cryptoeprint:2019:581, author = {Amir Jafari and Shahram Khazaei}, title = {On relaxed security notions for secret sharing}, howpublished = {Cryptology ePrint Archive, Report 2019/581}, year = {2019}, url = {https://eprint.iacr.org/2019/581}, } @misc{cryptoeprint:2019:582, author = {Ran Canetti and Alley Stoughton and Mayank Varia}, title = {EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security}, howpublished = {Cryptology ePrint Archive, Report 2019/582}, year = {2019}, url = {https://eprint.iacr.org/2019/582}, } @misc{cryptoeprint:2019:583, author = {Christoph Egger and Pedro Moreno-Sanchez and Matteo Maffei}, title = {Atomic Multi-Channel Updates with Constant Collateral in Bitcoin-Compatible Payment-Channel Networks}, howpublished = {Cryptology ePrint Archive, Report 2019/583}, year = {2019}, url = {https://eprint.iacr.org/2019/583}, } @misc{cryptoeprint:2019:584, author = {Lintao Liu and Xuehu Yan and Yuliang Lu and Huaixi Wang}, title = {2-threshold Ideal Secret Sharing Schemes Can Be Uniquely Modeled by Latin Squares}, howpublished = {Cryptology ePrint Archive, Report 2019/584}, year = {2019}, url = {https://eprint.iacr.org/2019/584}, } @misc{cryptoeprint:2019:585, author = {Mustafa Khairallah and Shivam Bhasin and Anupam Chattopadhyay}, title = {On Misuse of Nonce-Misuse Resistance: Adapting Differential Fault Attacks on (few) CAESAR Winners}, howpublished = {Cryptology ePrint Archive, Report 2019/585}, year = {2019}, url = {https://eprint.iacr.org/2019/585}, } @misc{cryptoeprint:2019:586, author = {Jihye Kim and Jiwon Lee and Hyunok Oh}, title = {QAP-based Simulation-Extractable SNARK with a Single Verification}, howpublished = {Cryptology ePrint Archive, Report 2019/586}, year = {2019}, url = {https://eprint.iacr.org/2019/586}, } @misc{cryptoeprint:2019:587, author = {Pierre Civit and Seth Gilbert and Vincent Gramoli}, title = {Polygraph: Accountable Byzantine Agreement}, howpublished = {Cryptology ePrint Archive, Report 2019/587}, year = {2019}, url = {https://eprint.iacr.org/2019/587}, } @misc{cryptoeprint:2019:588, author = {Jakub Klemsa and Ivana Trummová}, title = {Formal Notions of Security for Verifiable Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/588}, year = {2019}, url = {https://eprint.iacr.org/2019/588}, } @misc{cryptoeprint:2019:589, author = {Erkan Tairi and Pedro Moreno-Sanchez and Matteo Maffei}, title = {A${^2}$L: Anonymous Atomic Locks for Scalability and Interoperability in Payment Channel Hubs}, howpublished = {Cryptology ePrint Archive, Report 2019/589}, year = {2019}, url = {https://eprint.iacr.org/2019/589}, } @misc{cryptoeprint:2019:590, author = {Nina Bindel and Mike Hamburg and Andreas Hülsing and Edoardo Persichetti}, title = {Tighter proofs of CCA security in the quantum random oracle model}, howpublished = {Cryptology ePrint Archive, Report 2019/590}, year = {2019}, url = {https://eprint.iacr.org/2019/590}, } @misc{cryptoeprint:2019:591, author = {Christina Boura and Nicolas Gama and Mariya Georgieva and Dimitar Jetchev}, title = {Simulating Homomorphic Evaluation of Deep Learning Predictions}, howpublished = {Cryptology ePrint Archive, Report 2019/591}, year = {2019}, url = {https://eprint.iacr.org/2019/591}, } @misc{cryptoeprint:2019:592, author = {Andrei Mogage and Emil Simion}, title = {Statistical Analysis and Anonymity of TOR's Path Selection}, howpublished = {Cryptology ePrint Archive, Report 2019/592}, year = {2019}, url = {https://eprint.iacr.org/2019/592}, } @misc{cryptoeprint:2019:593, author = {V. Ustimenko and M. Klisowski}, title = {On Noncommutative Cryptography and homomorphism of stable cubical multivariate transformation groups of infinite dimensional affine spaces}, howpublished = {Cryptology ePrint Archive, Report 2019/593}, year = {2019}, url = {https://eprint.iacr.org/2019/593}, } @misc{cryptoeprint:2019:594, author = {Mugurel Barcau and Vicentiu Pasol}, title = {Cryptanalysis of Ring Homomorphic Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2019/594}, year = {2019}, url = {https://eprint.iacr.org/2019/594}, } @misc{cryptoeprint:2019:595, author = {Pedro Moreno-Sanchez and Randomrun and Duc V. Le and Sarang Noether and Brandon Goodell and Aniket Kate}, title = {DLSAG: Non-Interactive Refund Transactions For Interoperable Payment Channels in Monero}, howpublished = {Cryptology ePrint Archive, Report 2019/595}, year = {2019}, url = {https://eprint.iacr.org/2019/595}, } @misc{cryptoeprint:2019:596, author = {Sean Murphy and Rachel Player}, title = {Discretisation and Product Distributions in Ring-LWE}, howpublished = {Cryptology ePrint Archive, Report 2019/596}, year = {2019}, url = {https://eprint.iacr.org/2019/596}, } @misc{cryptoeprint:2019:597, author = {Shahram Khazaei}, title = {A Candidate Access Structure for Super-polynomial Lower Bound on Information Ratio}, howpublished = {Cryptology ePrint Archive, Report 2019/597}, year = {2019}, url = {https://eprint.iacr.org/2019/597}, } @misc{cryptoeprint:2019:598, author = {Amir Jafari and Reza Kaboli and Shahram Khazaei}, title = {Partial Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2019/598}, year = {2019}, url = {https://eprint.iacr.org/2019/598}, } @misc{cryptoeprint:2019:599, author = {Ivan Damgård and Daniel Escudero and Tore Frederiksen and Marcel Keller and Peter Scholl and Nikolaj Volgushev}, title = {New Primitives for Actively-Secure MPC over Rings with Applications to Private Machine Learning}, howpublished = {Cryptology ePrint Archive, Report 2019/599}, year = {2019}, url = {https://eprint.iacr.org/2019/599}, } @misc{cryptoeprint:2019:600, author = {Zhenzhen Bao and Jian Guo and Tetsu Iwata and Kazuhiko Minematsu}, title = {ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption}, howpublished = {Cryptology ePrint Archive, Report 2019/600}, year = {2019}, url = {https://eprint.iacr.org/2019/600}, } @misc{cryptoeprint:2019:601, author = {Ariel Gabizon}, title = {Improved prover efficiency and SRS size in a Sonic-like system}, howpublished = {Cryptology ePrint Archive, Report 2019/601}, year = {2019}, url = {https://eprint.iacr.org/2019/601}, } @misc{cryptoeprint:2019:602, author = {Gianluca Brian and Antonio Faonio and Daniele Venturi}, title = {Continuously Non-Malleable Secret Sharing for General Access Structures}, howpublished = {Cryptology ePrint Archive, Report 2019/602}, year = {2019}, url = {https://eprint.iacr.org/2019/602}, } @misc{cryptoeprint:2019:603, author = {Yael Kalai and Omer Paneth and Lisa Yang }, title = {How to Delegate Computations Publicly}, howpublished = {Cryptology ePrint Archive, Report 2019/603}, year = {2019}, url = {https://eprint.iacr.org/2019/603}, } @misc{cryptoeprint:2019:604, author = {Jun Xu and Santanu Sarkar and , Lei Hu and Huaxiong Wang and Yanbin Pan}, title = {New Results on Modular Inversion Hidden Number Problem and Inversive Congruential Generator}, howpublished = {Cryptology ePrint Archive, Report 2019/604}, year = {2019}, url = {https://eprint.iacr.org/2019/604}, } @misc{cryptoeprint:2019:605, author = {Mihail Anghel and Andrei Racautanu}, title = {A note on different types of ransomware attacks}, howpublished = {Cryptology ePrint Archive, Report 2019/605}, year = {2019}, url = {https://eprint.iacr.org/2019/605}, } @misc{cryptoeprint:2019:606, author = {François Gérard and Mélissa Rossi}, title = {An Efficient and Provable Masked Implementation of qTESLA}, howpublished = {Cryptology ePrint Archive, Report 2019/606}, year = {2019}, url = {https://eprint.iacr.org/2019/606}, } @misc{cryptoeprint:2019:607, author = {Zhenzhen Bao and Lin Ding and Jian Guo and Haoyang Wang and Wenying Zhang}, title = {Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes}, howpublished = {Cryptology ePrint Archive, Report 2019/607}, year = {2019}, url = {https://eprint.iacr.org/2019/607}, } @misc{cryptoeprint:2019:608, author = {Navid Alamati and Hart Montgomery and Sikhar Patranabis}, title = {Symmetric Primitives with Structured Secrets}, howpublished = {Cryptology ePrint Archive, Report 2019/608}, year = {2019}, url = {https://eprint.iacr.org/2019/608}, } @misc{cryptoeprint:2019:609, author = {Fuyuki Kitagawa and Takahiro Matsuda}, title = {CPA-to-CCA Transformation for KDM Security}, howpublished = {Cryptology ePrint Archive, Report 2019/609}, year = {2019}, url = {https://eprint.iacr.org/2019/609}, } @misc{cryptoeprint:2019:610, author = {Jean-Sebastien Coron and Agnese Gini}, title = {Improved Cryptanalysis of the AJPS Mersenne Based Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2019/610}, year = {2019}, url = {https://eprint.iacr.org/2019/610}, } @misc{cryptoeprint:2019:611, author = {Thaddeus Dryja}, title = {Utreexo: A dynamic hash-based accumulator optimized for the Bitcoin UTXO set}, howpublished = {Cryptology ePrint Archive, Report 2019/611}, year = {2019}, url = {https://eprint.iacr.org/2019/611}, } @misc{cryptoeprint:2019:612, author = {Helger Lipmaa}, title = {Simple Yet Efficient Knowledge-Sound and Non-Black-Box Any-Simulation-Extractable ZK-SNARKs}, howpublished = {Cryptology ePrint Archive, Report 2019/612}, year = {2019}, url = {https://eprint.iacr.org/2019/612}, } @misc{cryptoeprint:2019:613, author = {Taha Atahan Akyildiz and Can Berk Guzgeren and Cemal Yilmaz and Erkay Savas}, title = {MeltdownDetector: A Runtime Approach for Detecting Meltdown Attacks}, howpublished = {Cryptology ePrint Archive, Report 2019/613}, year = {2019}, url = {https://eprint.iacr.org/2019/613}, } @misc{cryptoeprint:2019:614, author = {Xavier Bonnetain and Akinori Hosoyamada and María Naya-Plasencia and Yu Sasaki and André Schrottenloher}, title = {Quantum Attacks without Superposition Queries: the Offline Simon Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2019/614}, year = {2019}, url = {https://eprint.iacr.org/2019/614}, } @misc{cryptoeprint:2019:615, author = {Siemen Dhooghe and Svetla Nikova}, title = {My Gadget Just Cares For Me - How NINA Can Prove Security Against Combined Attacks}, howpublished = {Cryptology ePrint Archive, Report 2019/615}, year = {2019}, url = {https://eprint.iacr.org/2019/615}, } @misc{cryptoeprint:2019:616, author = {Iftach Haitner and Noam Mazor and Ronen Shaltiel and Jad Silbak}, title = {Channels of Small Log-Ratio Leakage and Characterization of Two-Party Differentially Private Computation}, howpublished = {Cryptology ePrint Archive, Report 2019/616}, year = {2019}, url = {https://eprint.iacr.org/2019/616}, } @misc{cryptoeprint:2019:617, author = {Sebastian Gajek and Marco Lewandowsky}, title = {Trustless, Censorship-Resilient and Scalable Votings in the Permission-based Blockchain Model}, howpublished = {Cryptology ePrint Archive, Report 2019/617}, year = {2019}, url = {https://eprint.iacr.org/2019/617}, } @misc{cryptoeprint:2019:618, author = {Fukang Liu and Takanori Isobe}, title = {Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods}, howpublished = {Cryptology ePrint Archive, Report 2019/618}, year = {2019}, url = {https://eprint.iacr.org/2019/618}, } @misc{cryptoeprint:2019:619, author = {Naomi Ephraim and Cody Freitag and Ilan Komargodski and Rafael Pass}, title = {Continuous Verifiable Delay Functions}, howpublished = {Cryptology ePrint Archive, Report 2019/619}, year = {2019}, url = {https://eprint.iacr.org/2019/619}, } @misc{cryptoeprint:2019:620, author = {Steven D. Galbraith and Lukas Zobernig}, title = {Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product Problems}, howpublished = {Cryptology ePrint Archive, Report 2019/620}, year = {2019}, url = {https://eprint.iacr.org/2019/620}, } @misc{cryptoeprint:2019:621, author = {Bruce Kallick}, title = {A Modified Simple Substitution Cipher With Unbounded Unicity Distance}, howpublished = {Cryptology ePrint Archive, Report 2019/621}, year = {2019}, url = {https://eprint.iacr.org/2019/621}, } @misc{cryptoeprint:2019:622, author = {Zhenzhen Bao and Jian Guo and Eik List}, title = {Extended Expectation Cryptanalysis on Round-reduced AES}, howpublished = {Cryptology ePrint Archive, Report 2019/622}, year = {2019}, url = {https://eprint.iacr.org/2019/622}, } @misc{cryptoeprint:2019:623, author = {Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, title = {Exploring Constructions of Compact NIZKs from Various Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2019/623}, year = {2019}, url = {https://eprint.iacr.org/2019/623}, } @misc{cryptoeprint:2019:624, author = {Mihir Bellare and Ruth Ng and Björn Tackmann}, title = {Nonces are Noticed: AEAD Revisited}, howpublished = {Cryptology ePrint Archive, Report 2019/624}, year = {2019}, url = {https://eprint.iacr.org/2019/624}, } @misc{cryptoeprint:2019:625, author = {Rio Lavigne and Andrea Lincoln and Virginia Vassilevska Williams}, title = {Public-Key Cryptography in the Fine-Grained Setting}, howpublished = {Cryptology ePrint Archive, Report 2019/625}, year = {2019}, url = {https://eprint.iacr.org/2019/625}, } @misc{cryptoeprint:2019:626, author = {Vipul Goyal and Aayush Jain and Amit Sahai}, title = {Simultaneous Amplification: The Case of Non-Interactive Zero-Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2019/626}, year = {2019}, url = {https://eprint.iacr.org/2019/626}, } @misc{cryptoeprint:2019:627, author = {Andrej Bogdanov and Yuval Ishai and Akshayaram Srinivasan}, title = {Unconditionally Secure Computation Against Low-Complexity Leakage}, howpublished = {Cryptology ePrint Archive, Report 2019/627}, year = {2019}, url = {https://eprint.iacr.org/2019/627}, } @misc{cryptoeprint:2019:628, author = {Rishab Goyal and Sam Kim and Nathan Manohar and Brent Waters and David J. Wu}, title = {Watermarking Public-Key Cryptographic Primitives}, howpublished = {Cryptology ePrint Archive, Report 2019/628}, year = {2019}, url = {https://eprint.iacr.org/2019/628}, } @misc{cryptoeprint:2019:629, author = {Shweta Agrawal and Monosij Maitra and Shota Yamada}, title = {Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE}, howpublished = {Cryptology ePrint Archive, Report 2019/629}, year = {2019}, url = {https://eprint.iacr.org/2019/629}, } @misc{cryptoeprint:2019:630, author = {Junqing Gong and Brent Waters and Hoeteck Wee}, title = {ABE for DFA from k-Lin}, howpublished = {Cryptology ePrint Archive, Report 2019/630}, year = {2019}, url = {https://eprint.iacr.org/2019/630}, } @misc{cryptoeprint:2019:631, author = {Cody Freitag and Ilan Komargodski and Rafael Pass}, title = {Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2019/631}, year = {2019}, url = {https://eprint.iacr.org/2019/631}, } @misc{cryptoeprint:2019:632, author = {Ariel Hamlin and Justin Holmgren and Mor Weiss and Daniel Wichs}, title = {On the Plausibility of Fully Homomorphic Encryption for RAMs}, howpublished = {Cryptology ePrint Archive, Report 2019/632}, year = {2019}, url = {https://eprint.iacr.org/2019/632}, } @misc{cryptoeprint:2019:633, author = {Igor Semaev}, title = {New non-linearity parameters of Boolean functions}, howpublished = {Cryptology ePrint Archive, Report 2019/633}, year = {2019}, url = {https://eprint.iacr.org/2019/633}, } @misc{cryptoeprint:2019:634, author = {Benny Pinkas and Mike Rosulek and Ni Trieu and Avishay Yanai}, title = {SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension}, howpublished = {Cryptology ePrint Archive, Report 2019/634}, year = {2019}, url = {https://eprint.iacr.org/2019/634}, } @misc{cryptoeprint:2019:635, author = {Giulio Malavolta and Sri Aravinda Krishnan Thyagarajan}, title = {Homomorphic Time-Lock Puzzles and Applications}, howpublished = {Cryptology ePrint Archive, Report 2019/635}, year = {2019}, url = {https://eprint.iacr.org/2019/635}, } @misc{cryptoeprint:2019:636, author = {Rishab Goyal and Willy Quach and Brent Waters and Daniel Wichs}, title = {Broadcast and Trace with N^epsilon Ciphertext Size from Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2019/636}, year = {2019}, url = {https://eprint.iacr.org/2019/636}, } @misc{cryptoeprint:2019:637, author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai}, title = {Cryptographic Sensing}, howpublished = {Cryptology ePrint Archive, Report 2019/637}, year = {2019}, url = {https://eprint.iacr.org/2019/637}, } @misc{cryptoeprint:2019:638, author = {F.L. Tiplea and S. Iftene and G. Teseleanu and A.-M. Nica}, title = {On the Distribution of Quadratic Residues and Non-residues Modulo Composite Integers and Applications to Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2019/638}, year = {2019}, url = {https://eprint.iacr.org/2019/638}, } @misc{cryptoeprint:2019:639, author = {Nico Döttling and Sanjam Garg and Yuval Ishai and Giulio Malavolta and Tamer Mour and Rafail Ostrovsky}, title = {Trapdoor Hash Functions and Their Applications}, howpublished = {Cryptology ePrint Archive, Report 2019/639}, year = {2019}, url = {https://eprint.iacr.org/2019/639}, } @misc{cryptoeprint:2019:640, author = {Nir Bitansky and Omer Paneth}, title = {On Round Optimal Statistical Zero Knowledge Arguments}, howpublished = {Cryptology ePrint Archive, Report 2019/640}, year = {2019}, url = {https://eprint.iacr.org/2019/640}, } @misc{cryptoeprint:2019:641, author = {Shahla Atapoor and Karim Baghery}, title = {Simulation Extractability in Groth's zk-SNARK}, howpublished = {Cryptology ePrint Archive, Report 2019/641}, year = {2019}, url = {https://eprint.iacr.org/2019/641}, } @misc{cryptoeprint:2019:642, author = {Jonathan Bootle and Vadim Lyubashevsky and Gregor Seiler}, title = {Algebraic Techniques for Short(er) Exact Lattice-Based Zero-Knowledge Proofs}, howpublished = {Cryptology ePrint Archive, Report 2019/642}, year = {2019}, url = {https://eprint.iacr.org/2019/642}, } @misc{cryptoeprint:2019:643, author = {Prabhanjan Ananth and Aayush Jain and Huijia Lin and Christian Matt and Amit Sahai}, title = {Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification}, howpublished = {Cryptology ePrint Archive, Report 2019/643}, year = {2019}, url = {https://eprint.iacr.org/2019/643}, } @misc{cryptoeprint:2019:644, author = {Aydin Abadi and Michele Ciampi and Aggelos Kiayias and Vassilis Zikas}, title = {Timed Signatures and Zero-Knowledge Proofs -Timestamping in the Blockchain Era-}, howpublished = {Cryptology ePrint Archive, Report 2019/644}, year = {2019}, url = {https://eprint.iacr.org/2019/644}, } @misc{cryptoeprint:2019:645, author = {Shweta Agrawal and Monosij Maitra and Shota Yamada}, title = {Attribute Based Encryption for Deterministic Finite Automata from DLIN}, howpublished = {Cryptology ePrint Archive, Report 2019/645}, year = {2019}, url = {https://eprint.iacr.org/2019/645}, } @misc{cryptoeprint:2019:646, author = {Vipul Goyal and Yanyi Liu and Yifan Song}, title = {Communication-Efficient Unconditional MPC with Guaranteed Output Delivery}, howpublished = {Cryptology ePrint Archive, Report 2019/646}, year = {2019}, url = {https://eprint.iacr.org/2019/646}, } @misc{cryptoeprint:2019:647, author = {Tatiana Bradley and Stanislaw Jarecki and Jiayu Xu}, title = {Strong Asymmetric PAKE based on Trapdoor CKEM}, howpublished = {Cryptology ePrint Archive, Report 2019/647}, year = {2019}, url = {https://eprint.iacr.org/2019/647}, } @misc{cryptoeprint:2019:648, author = {Xavier Bultel and Pascal Lafourcade and Russell W. F. Lai and Giulio Malavolta and Dominique Schröder and Sri Aravinda Krishnan Thyagarajan}, title = {Efficient Invisible and Unlinkable Sanitizable Signatures}, howpublished = {Cryptology ePrint Archive, Report 2019/648}, year = {2019}, url = {https://eprint.iacr.org/2019/648}, } @misc{cryptoeprint:2019:649, author = {Donghui Ding and Xin Jiang and Jiaping Wang and Hao Wang and Xiaobing Zhang and Yi Sun}, title = {Txilm: Lossy Block Compression with Salted Short Hashing}, howpublished = {Cryptology ePrint Archive, Report 2019/649}, year = {2019}, url = {https://eprint.iacr.org/2019/649}, } @misc{cryptoeprint:2019:650, author = {Nico Döttling and Russell W. F. Lai and Giulio Malavolta}, title = {Incremental Proofs of Sequential Work}, howpublished = {Cryptology ePrint Archive, Report 2019/650}, year = {2019}, url = {https://eprint.iacr.org/2019/650}, } @misc{cryptoeprint:2019:651, author = {Muhammad Ishaq and Ana Milanova and Vassilis Zikas}, title = {Efficient MPC via Program Analysis: A Framework for Efficient Optimal Mixing}, howpublished = {Cryptology ePrint Archive, Report 2019/651}, year = {2019}, url = {https://eprint.iacr.org/2019/651}, } @misc{cryptoeprint:2019:652, author = {Navid Ghaedi Bardeh and Sondre Rønjom}, title = {The Exchange Attack: How to Distinguish 6 Rounds of AES with $2^{88.2}$ chosen plaintexts}, howpublished = {Cryptology ePrint Archive, Report 2019/652}, year = {2019}, url = {https://eprint.iacr.org/2019/652}, } @misc{cryptoeprint:2019:653, author = {Fabrice Benhamouda and Akshay Degwekar and Yuval Ishai and Tal Rabin}, title = {On the Local Leakage Resilience of Linear Secret Sharing Schemes}, howpublished = {Cryptology ePrint Archive, Report 2019/653}, year = {2019}, url = {https://eprint.iacr.org/2019/653}, } @misc{cryptoeprint:2019:654, author = {Brandon Goodell and Sarang Noether and RandomRun}, title = {Compact linkable ring signatures and applications}, howpublished = {Cryptology ePrint Archive, Report 2019/654}, year = {2019}, url = {https://eprint.iacr.org/2019/654}, } @misc{cryptoeprint:2019:655, author = {Daniel J. Bernstein}, title = {Visualizing size-security tradeoffs for lattice-based encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/655}, year = {2019}, url = {https://eprint.iacr.org/2019/655}, } @misc{cryptoeprint:2019:656, author = {Seetal Potluri and Akash Kumar and Aydin Aysu}, title = {SeqL: SAT-attack Resilient Sequential Locking }, howpublished = {Cryptology ePrint Archive, Report 2019/656}, year = {2019}, url = {https://eprint.iacr.org/2019/656}, } @misc{cryptoeprint:2019:657, author = {Leonard Assouline and Tianren Liu}, title = {Multi-Party PSM, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2019/657}, year = {2019}, url = {https://eprint.iacr.org/2019/657}, } @misc{cryptoeprint:2019:658, author = {Jun Furukawa and Yehuda Lindell}, title = {Two-Thirds Honest-Majority MPC for Malicious Adversaries at Almost the Cost of Semi-Honest}, howpublished = {Cryptology ePrint Archive, Report 2019/658}, year = {2019}, url = {https://eprint.iacr.org/2019/658}, } @misc{cryptoeprint:2019:659, author = {Nico Döttling and Sanjam Garg and Giulio Malavolta and Prashant Nalini Vasudevan }, title = {Tight Verifiable Delay Functions}, howpublished = {Cryptology ePrint Archive, Report 2019/659}, year = {2019}, url = {https://eprint.iacr.org/2019/659}, } @misc{cryptoeprint:2019:660, author = {Zheng Wang and Cong Ling}, title = {Lattice Gaussian Sampling by Markov Chain Monte Carlo: Bounded Distance Decoding and Trapdoor Sampling}, howpublished = {Cryptology ePrint Archive, Report 2019/660}, year = {2019}, url = {https://eprint.iacr.org/2019/660}, } @misc{cryptoeprint:2019:661, author = {Shivam Bhasin and Anupam Chattopadhyay and Annelie Heuser and Dirmanto Jap and Stjepan Picek and Ritu Ranjan Shrivastwa}, title = {Mind the Portability: A Warriors Guide through Realistic Profiled Side-channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2019/661}, year = {2019}, url = {https://eprint.iacr.org/2019/661}, } @misc{cryptoeprint:2019:662, author = {Christian Badertscher and Daniel Jost and Ueli Maurer}, title = {Agree-and-Prove: Generalized Proofs Of Knowledge and Applications}, howpublished = {Cryptology ePrint Archive, Report 2019/662}, year = {2019}, url = {https://eprint.iacr.org/2019/662}, } @misc{cryptoeprint:2019:663, author = {Mohammad Mahmoody and Caleb Smith and David J. Wu}, title = {A Note on the (Im)possibility of Verifiable Delay Functions in the Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2019/663}, year = {2019}, url = {https://eprint.iacr.org/2019/663}, } @misc{cryptoeprint:2019:664, author = {Huanyu Wang and Martin Brisfors and Sebastian Forsmark and Elena Dubrova}, title = {How Diversity Affects Deep-Learning Side-Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2019/664}, year = {2019}, url = {https://eprint.iacr.org/2019/664}, } @misc{cryptoeprint:2019:665, author = {Jintai Ding and Pedro Branco and Kevin Schmitt}, title = {Key Exchange and Authenticated Key Exchange with Reusable Keys Based on RLWE Assumption}, howpublished = {Cryptology ePrint Archive, Report 2019/665}, year = {2019}, url = {https://eprint.iacr.org/2019/665}, } @misc{cryptoeprint:2019:666, author = {Zheng Wang and Cong Ling}, title = {On the Geometric Ergodicity of Metropolis-Hastings Algorithms for Lattice Gaussian Sampling}, howpublished = {Cryptology ePrint Archive, Report 2019/666}, year = {2019}, url = {https://eprint.iacr.org/2019/666}, } @misc{cryptoeprint:2019:667, author = {Arka Rai Choudhuri and Pavel Hubacek and Chethan Kamath and Krzysztof Pietrzak and Alon Rosen and Guy N. Rothblum}, title = {PPAD-Hardness via Iterated Squaring Modulo a Composite}, howpublished = {Cryptology ePrint Archive, Report 2019/667}, year = {2019}, url = {https://eprint.iacr.org/2019/667}, } @misc{cryptoeprint:2019:668, author = {Fukang Liu and Christoph Dobraunig and Florian Mendel and Takanori Isobe and Gaoli Wang and Zhenfu Cao}, title = {New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160}, howpublished = {Cryptology ePrint Archive, Report 2019/668}, year = {2019}, url = {https://eprint.iacr.org/2019/668}, } @misc{cryptoeprint:2019:669, author = {Yunwen Liu and Yu Sasaki}, title = {Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect}, howpublished = {Cryptology ePrint Archive, Report 2019/669}, year = {2019}, url = {https://eprint.iacr.org/2019/669}, } @misc{cryptoeprint:2019:670, author = {Vahid Amin Ghafari and Honggang Hu and Fujiang Lin }, title = {On designing secure small-state stream ciphers against time-memory-data tradeoff attacks}, howpublished = {Cryptology ePrint Archive, Report 2019/670}, year = {2019}, url = {https://eprint.iacr.org/2019/670}, } @misc{cryptoeprint:2019:671, author = {Ahto Buldas and Risto Laanoja and Ahto Truu}, title = {A Server-Assisted Hash-Based Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2019/671}, year = {2019}, url = {https://eprint.iacr.org/2019/671}, } @misc{cryptoeprint:2019:672, author = {Ahto Buldas and Risto Laanoja and Ahto Truu}, title = {A Blockchain-Assisted Hash-Based Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2019/672}, year = {2019}, url = {https://eprint.iacr.org/2019/672}, } @misc{cryptoeprint:2019:673, author = {Ahto Buldas and Denis Firsov and Risto Laanoja and Henri Lakk and Ahto Truu}, title = {A New Approach to Constructing Digital Signature Schemes (Extended Paper)}, howpublished = {Cryptology ePrint Archive, Report 2019/673}, year = {2019}, url = {https://eprint.iacr.org/2019/673}, } @misc{cryptoeprint:2019:674, author = {Jiabo Wang and Cong Ling}, title = {Polar Sampler: Discrete Gaussian Sampling over the Integers Using Polar Codes}, howpublished = {Cryptology ePrint Archive, Report 2019/674}, year = {2019}, url = {https://eprint.iacr.org/2019/674}, } @misc{cryptoeprint:2019:675, author = {Dominik Harz and Lewis Gudgeon and Arthur Gervais and William J. Knottenbelt}, title = {Balance : Dynamic Adjustment of Cryptocurrency Deposits}, howpublished = {Cryptology ePrint Archive, Report 2019/675}, year = {2019}, url = {https://eprint.iacr.org/2019/675}, } @misc{cryptoeprint:2019:676, author = {Eleftherios Kokoris-Kogias}, title = {Robust and Scalable Consensus for Sharded Distributed Ledgers}, howpublished = {Cryptology ePrint Archive, Report 2019/676}, year = {2019}, url = {https://eprint.iacr.org/2019/676}, } @misc{cryptoeprint:2019:677, author = {Mingjia Huo and Kewen Wu and Qi Ye}, title = {A Note on Lower Digits Extraction Polynomial for Bootstrapping}, howpublished = {Cryptology ePrint Archive, Report 2019/677}, year = {2019}, url = {https://eprint.iacr.org/2019/677}, } @misc{cryptoeprint:2019:678, author = {Yongwoo Lee and Wijik Lee and Young-Sik Kim and Jong-Seon No }, title = {A Modified pqsigRM: RM Code-Based Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2019/678}, year = {2019}, url = {https://eprint.iacr.org/2019/678}, } @misc{cryptoeprint:2019:679, author = {Maria Eichlseder and Daniel Kales and Markus Schofnegger}, title = {Forgery Attacks on FlexAE and FlexAEAD}, howpublished = {Cryptology ePrint Archive, Report 2019/679}, year = {2019}, url = {https://eprint.iacr.org/2019/679}, } @misc{cryptoeprint:2019:680, author = {Charles Grover and Cong Ling}, title = {Structured Module Learning With Errors From Cyclic Algebras}, howpublished = {Cryptology ePrint Archive, Report 2019/680}, year = {2019}, url = {https://eprint.iacr.org/2019/680}, } @misc{cryptoeprint:2019:681, author = {Ayesha Khalid and Sarah McCarthy and Weiqiang Liu and Maire O’Neill}, title = {Lattice-based Cryptography for IoT in A Quantum World: Are We Ready?}, howpublished = {Cryptology ePrint Archive, Report 2019/681}, year = {2019}, url = {https://eprint.iacr.org/2019/681}, } @misc{cryptoeprint:2019:682, author = {Alexandros Bakas and Antonis Michalas}, title = {Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX}, howpublished = {Cryptology ePrint Archive, Report 2019/682}, year = {2019}, url = {https://eprint.iacr.org/2019/682}, } @misc{cryptoeprint:2019:683, author = {Huizhong Li and Yongbin Zhou and Jingdian Ming and Guang Yang and Chengbin Jin}, title = {The Notion of Transparency Order, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2019/683}, year = {2019}, url = {https://eprint.iacr.org/2019/683}, } @misc{cryptoeprint:2019:684, author = {Arijit Dutta and Saravanan Vijayakumaran}, title = {Revelio: A MimbleWimble Proof of Reserves Protocol}, howpublished = {Cryptology ePrint Archive, Report 2019/684}, year = {2019}, url = {https://eprint.iacr.org/2019/684}, } @misc{cryptoeprint:2019:685, author = {Markku-Juhani O. Saarinen}, title = {Exploring NIST LWC/PQC Synergy with R5Sneik: How SNEIK 1.1 Algorithms were Designed to Support Round5}, howpublished = {Cryptology ePrint Archive, Report 2019/685}, year = {2019}, url = {https://eprint.iacr.org/2019/685}, } @misc{cryptoeprint:2019:686, author = {Nir Bitansky and Akshay Degwekar}, title = {On the Complexity of Collision Resistant Hash Functions: New and Old Black-Box Separations}, howpublished = {Cryptology ePrint Archive, Report 2019/686}, year = {2019}, url = {https://eprint.iacr.org/2019/686}, } @misc{cryptoeprint:2019:687, author = {Zhengfeng Ji and Youming Qiao and Fang Song and Aaram Yun}, title = {General Linear Group Action on Tensors: A Candidate for Post-Quantum Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2019/687}, year = {2019}, url = {https://eprint.iacr.org/2019/687}, } @misc{cryptoeprint:2019:688, author = {Kyoohyung Han and Dohyeong Ki}, title = {Better Bootstrapping for Approximate Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/688}, year = {2019}, url = {https://eprint.iacr.org/2019/688}, } @misc{cryptoeprint:2019:689, author = {Colin O'Flynn and Alex Dewar}, title = {On-Device Power Analysis Across Hardware Security Domains}, howpublished = {Cryptology ePrint Archive, Report 2019/689}, year = {2019}, url = {https://eprint.iacr.org/2019/689}, } @misc{cryptoeprint:2019:690, author = {Changhai Ou and Siew-Kei Lam and Guiyuan Jiang}, title = {The Art of Guessing in Combined Side-Channel Collision Attacks}, howpublished = {Cryptology ePrint Archive, Report 2019/690}, year = {2019}, url = {https://eprint.iacr.org/2019/690}, } @misc{cryptoeprint:2019:691, author = {Daniel J. Bernstein}, title = {Comparing proofs of security for lattice-based encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/691}, year = {2019}, url = {https://eprint.iacr.org/2019/691}, } @misc{cryptoeprint:2019:692, author = {Erica Blum and Jonathan Katz and Julian Loss}, title = {Synchronous Consensus with Optimal Asynchronous Fallback Guarantees}, howpublished = {Cryptology ePrint Archive, Report 2019/692}, year = {2019}, url = {https://eprint.iacr.org/2019/692}, } @misc{cryptoeprint:2019:693, author = {Raphael Bost and Pierre-Alain Fouque}, title = {Security-Efficiency Tradeoffs in Searchable Encryption -- Lower Bounds and Optimal Constructions}, howpublished = {Cryptology ePrint Archive, Report 2019/693}, year = {2019}, url = {https://eprint.iacr.org/2019/693}, } @misc{cryptoeprint:2019:694, author = {Daniel Jost and Ueli Maurer and Marta Mularczyk}, title = {A Unified and Composable Take on Ratcheting}, howpublished = {Cryptology ePrint Archive, Report 2019/694}, year = {2019}, url = {https://eprint.iacr.org/2019/694}, } @misc{cryptoeprint:2019:695, author = {Koji Chida and Koki Hamada and Dai Ikarashi and Ryo Kikuchi and Naoto Kiribuchi and Benny Pinkas}, title = {An Efficient Secure Three-Party Sorting Protocol with an Honest Majority}, howpublished = {Cryptology ePrint Archive, Report 2019/695}, year = {2019}, url = {https://eprint.iacr.org/2019/695}, } @misc{cryptoeprint:2019:696, author = {Masayuki Abe and Miguel Ambrona and Miyako Ohkubo}, title = {Black-Box Language Extension of Non-Interactive Zero-Knowledge Arguments}, howpublished = {Cryptology ePrint Archive, Report 2019/696}, year = {2019}, url = {https://eprint.iacr.org/2019/696}, } @misc{cryptoeprint:2019:697, author = {Elena Dubrova}, title = {Breaking ACORN with a Single Fault}, howpublished = {Cryptology ePrint Archive, Report 2019/697}, year = {2019}, url = {https://eprint.iacr.org/2019/697}, } @misc{cryptoeprint:2019:698, author = {Poulami Das and Sebastian Faust and Julian Loss}, title = {A Formal Treatment of Deterministic Wallets}, howpublished = {Cryptology ePrint Archive, Report 2019/698}, year = {2019}, url = {https://eprint.iacr.org/2019/698}, } @misc{cryptoeprint:2019:699, author = {André Chailloux}, title = {Quantum security of the Fiat-Shamir transform of commit and open protocols}, howpublished = {Cryptology ePrint Archive, Report 2019/699}, year = {2019}, url = {https://eprint.iacr.org/2019/699}, } @misc{cryptoeprint:2019:700, author = {Yusuke Naito and Mitsuru Matsui and Takeshi Sugawara and Daisuke Suzuki}, title = {SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation}, howpublished = {Cryptology ePrint Archive, Report 2019/700}, year = {2019}, url = {https://eprint.iacr.org/2019/700}, } @misc{cryptoeprint:2019:701, author = {Hiroaki Anada}, title = {Decentralized Multi-authority Anonymous Authentication for Global Identities with Non-interactive Proofs}, howpublished = {Cryptology ePrint Archive, Report 2019/701}, year = {2019}, url = {https://eprint.iacr.org/2019/701}, } @misc{cryptoeprint:2019:702, author = {Subhadeep Banik and Khashayar Barooti and Takanori Isobe}, title = {Cryptanalysis of Plantlet}, howpublished = {Cryptology ePrint Archive, Report 2019/702}, year = {2019}, url = {https://eprint.iacr.org/2019/702}, } @misc{cryptoeprint:2019:703, author = {Carolyn Whitnall and Elisabeth Oswald}, title = {A Cautionary Note Regarding the Usage of Leakage Detection Tests in Security Evaluation}, howpublished = {Cryptology ePrint Archive, Report 2019/703}, year = {2019}, url = {https://eprint.iacr.org/2019/703}, } @misc{cryptoeprint:2019:704, author = {Adriano Di Luzio and Danilo Francati and Giuseppe Ateniese}, title = {Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2019/704}, year = {2019}, url = {https://eprint.iacr.org/2019/704}, } @misc{cryptoeprint:2019:705, author = {Ivan Damgård and Helene Haagh and Michael Nielsen and Claudio Orlandi}, title = {Commodity-Based 2PC for Arithmetic Circuits}, howpublished = {Cryptology ePrint Archive, Report 2019/705}, year = {2019}, url = {https://eprint.iacr.org/2019/705}, } @misc{cryptoeprint:2019:706, author = {Daniel Masny and Peter Rindal}, title = {Endemic Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2019/706}, year = {2019}, url = {https://eprint.iacr.org/2019/706}, } @misc{cryptoeprint:2019:707, author = {Olivier Blazy and Céline Chevalier and Quoc Huy Vu}, title = {Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions}, howpublished = {Cryptology ePrint Archive, Report 2019/707}, year = {2019}, url = {https://eprint.iacr.org/2019/707}, } @misc{cryptoeprint:2019:708, author = {Luís T. A. N. Brandão and Çağdaş Çalık and Meltem Sönmez Turan and René Peralta}, title = {Upper Bounds on the Multiplicative Complexity of Symmetric Boolean Functions}, howpublished = {Cryptology ePrint Archive, Report 2019/708}, year = {2019}, url = {https://eprint.iacr.org/2019/708}, } @misc{cryptoeprint:2019:709, author = {Davood Rezaeipour}, title = {Secure Computation for Cloud data Storage}, howpublished = {Cryptology ePrint Archive, Report 2019/709}, year = {2019}, url = {https://eprint.iacr.org/2019/709}, } @misc{cryptoeprint:2019:710, author = {Qianying Zhang and Shijun Zhao and Zhiping Shi and Yong Guan and Guohui Wang}, title = {A Comprehensive Formal Security Analysis and Revision of the Two-phase Key Exchange Primitive of TPM 2.0}, howpublished = {Cryptology ePrint Archive, Report 2019/710}, year = {2019}, url = {https://eprint.iacr.org/2019/710}, } @misc{cryptoeprint:2019:711, author = {Brian Koziel and A-Bon Ackie and Rami El Khatib and Reza Azarderakhsh and Mehran Mozaffari-Kermani}, title = {SIKE'd Up: Fast and Secure Hardware Architectures for Supersingular Isogeny Key Encapsulation}, howpublished = {Cryptology ePrint Archive, Report 2019/711}, year = {2019}, url = {https://eprint.iacr.org/2019/711}, } @misc{cryptoeprint:2019:712, author = {Shay Gueron and Yehuda Lindell}, title = {SimpleENC and SimpleENCsmall -- an Authenticated Encryption Mode for the Lightweight Setting}, howpublished = {Cryptology ePrint Archive, Report 2019/712}, year = {2019}, url = {https://eprint.iacr.org/2019/712}, } @misc{cryptoeprint:2019:713, author = {Riccardo Longo and Massimiliano Sala}, title = {Public Ledger for Sensitive Data}, howpublished = {Cryptology ePrint Archive, Report 2019/713}, year = {2019}, url = {https://eprint.iacr.org/2019/713}, } @misc{cryptoeprint:2019:714, author = {Boxin Zhao and Xiaoyang Dong and Willi Meier and Keting Jia and Gaoli Wang}, title = {Generalized Related-Key Rectangle Attacks on Block Ciphers with Linear Key Schedule}, howpublished = {Cryptology ePrint Archive, Report 2019/714}, year = {2019}, url = {https://eprint.iacr.org/2019/714}, } @misc{cryptoeprint:2019:715, author = {Yuejun Liu and Yongbin Zhou and Shuo Sun and Tianyu Wang and Rui Zhang}, title = {On Security of Fiat-Shamir Signatures over Lattice in the Presence of Randomness Leakage}, howpublished = {Cryptology ePrint Archive, Report 2019/715}, year = {2019}, url = {https://eprint.iacr.org/2019/715}, } @misc{cryptoeprint:2019:716, author = {Koen de Boer and Léo Ducas and Serge Fehr}, title = {On the Quantum Complexity of the Continuous Hidden Subgroup Problem}, howpublished = {Cryptology ePrint Archive, Report 2019/716}, year = {2019}, url = {https://eprint.iacr.org/2019/716}, } @misc{cryptoeprint:2019:717, author = {Christopher Leonardi and Luis Ruiz-Lopez}, title = {Homomorphism learning problems and its applications to public-key cryptography}, howpublished = {Cryptology ePrint Archive, Report 2019/717}, year = {2019}, url = {https://eprint.iacr.org/2019/717}, } @misc{cryptoeprint:2019:718, author = {Marina Blanton and Ahreum Kang and Chen Yuan}, title = {Improved Building Blocks for Secure Multi-Party Computation based on Secret Sharing with Honest Majority}, howpublished = {Cryptology ePrint Archive, Report 2019/718}, year = {2019}, url = {https://eprint.iacr.org/2019/718}, } @misc{cryptoeprint:2019:719, author = {Mir Tanjidur Rahman and Shahin Tajik and M. Sazadur Rahman and Mark Tehranipoor and Navid Asadizanjani}, title = {The Key is Left under the Mat: On the Inappropriate Security Assumption of Logic Locking Schemes}, howpublished = {Cryptology ePrint Archive, Report 2019/719}, year = {2019}, url = {https://eprint.iacr.org/2019/719}, } @misc{cryptoeprint:2019:720, author = {Zvika Brakerski and Nico Döttling and Sanjam Garg and Giulio Malavolta }, title = {Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles}, howpublished = {Cryptology ePrint Archive, Report 2019/720}, year = {2019}, url = {https://eprint.iacr.org/2019/720}, } @misc{cryptoeprint:2019:721, author = {Hwajeong Seo and Amir Jalali and Reza Azarderakhsh}, title = {Optimized SIKE Round 2 on 64-bit ARM}, howpublished = {Cryptology ePrint Archive, Report 2019/721}, year = {2019}, url = {https://eprint.iacr.org/2019/721}, } @misc{cryptoeprint:2019:722, author = {Guilherme Perin and Baris Ege and Lukasz Chmielewski}, title = {Neural Network Model Assessment for Side-Channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2019/722}, year = {2019}, url = {https://eprint.iacr.org/2019/722}, } @misc{cryptoeprint:2019:723, author = {Mihaela Ion and Ben Kreuter and Ahmet Erhan Nergiz and Sarvar Patel and Mariana Raykova and Shobhit Saxena and Karn Seth and David Shanahan and Moti Yung}, title = {On Deploying Secure Computing Commercially: Private Intersection-Sum Protocols and their Business Applications}, howpublished = {Cryptology ePrint Archive, Report 2019/723}, year = {2019}, url = {https://eprint.iacr.org/2019/723}, } @misc{cryptoeprint:2019:724, author = {Sebati Ghosh and Palash Sarkar}, title = {Breaking Tweakable Enciphering Schemes using Simon's Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2019/724}, year = {2019}, url = {https://eprint.iacr.org/2019/724}, } @misc{cryptoeprint:2019:725, author = {Chris Peikert}, title = {He Gives C-Sieves on the CSIDH}, howpublished = {Cryptology ePrint Archive, Report 2019/725}, year = {2019}, url = {https://eprint.iacr.org/2019/725}, } @misc{cryptoeprint:2019:726, author = {Pedro Branco and Jintai Ding and Manuel Goulão and Paulo Mateus}, title = {A Framework for Universally Composable Oblivious Transfer from One-Round Key-Exchange}, howpublished = {Cryptology ePrint Archive, Report 2019/726}, year = {2019}, url = {https://eprint.iacr.org/2019/726}, } @misc{cryptoeprint:2019:727, author = {Fukang Liu and Takanori Isobe}, title = {Iterative Differential Characteristic of TRIFLE-BC}, howpublished = {Cryptology ePrint Archive, Report 2019/727}, year = {2019}, url = {https://eprint.iacr.org/2019/727}, } @misc{cryptoeprint:2019:728, author = {Palash Sarkar and Subhadip Singha}, title = {Verifying Solutions to LWE with Implications for Concrete Security}, howpublished = {Cryptology ePrint Archive, Report 2019/728}, year = {2019}, url = {https://eprint.iacr.org/2019/728}, } @misc{cryptoeprint:2019:729, author = {Jingwei Zhang and Shuhong Gao and Chang-An Zhao}, title = {Linear Complexity of A Family of Binary pq2 -periodic Sequences From Euler Quotients}, howpublished = {Cryptology ePrint Archive, Report 2019/729}, year = {2019}, url = {https://eprint.iacr.org/2019/729}, } @misc{cryptoeprint:2019:730, author = {Vladimir Soukharev and Basil Hess}, title = {PQDH: A Quantum-Safe Replacement for Diffie-Hellman based on SIDH}, howpublished = {Cryptology ePrint Archive, Report 2019/730}, year = {2019}, url = {https://eprint.iacr.org/2019/730}, } @misc{cryptoeprint:2019:731, author = {Javier Verbel and John Baena and Daniel Cabarcas and Ray Perlner and Daniel Smith-Tone}, title = {On the Complexity of ``Superdetermined'' Minrank Instances}, howpublished = {Cryptology ePrint Archive, Report 2019/731}, year = {2019}, url = {https://eprint.iacr.org/2019/731}, } @misc{cryptoeprint:2019:732, author = {Prabhanjan Ananth and Apoorvaa Deshpande and Yael Tauman Kalai and Anna Lysyanskaya}, title = {Fully Homomorphic NIZK and NIWI Proofs}, howpublished = {Cryptology ePrint Archive, Report 2019/732}, year = {2019}, url = {https://eprint.iacr.org/2019/732}, } @misc{cryptoeprint:2019:733, author = {Craig Gentry and Shai Halevi}, title = {Compressible FHE with Applications to PIR}, howpublished = {Cryptology ePrint Archive, Report 2019/733}, year = {2019}, url = {https://eprint.iacr.org/2019/733}, } @misc{cryptoeprint:2019:734, author = {Lucy Qin and Andrei Lapets and Frederick Jansen and Peter Flockhart and Kinan Dak Albab and Ira Globus-Harris and Shannon Roberts and Mayank Varia}, title = {From Usability to Secure Computing and Back Again}, howpublished = {Cryptology ePrint Archive, Report 2019/734}, year = {2019}, url = {https://eprint.iacr.org/2019/734}, } @misc{cryptoeprint:2019:735, author = {Mayank Raikwar and Danilo Gligoroski and Katina Kralevska}, title = {SoK of Used Cryptography in Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2019/735}, year = {2019}, url = {https://eprint.iacr.org/2019/735}, } @misc{cryptoeprint:2019:736, author = {Hao Chen and Ilaria Chillotti and Ling Ren}, title = {Onion Ring ORAM: Efficient Constant Bandwidth Oblivious RAM from (Leveled) TFHE}, howpublished = {Cryptology ePrint Archive, Report 2019/736}, year = {2019}, url = {https://eprint.iacr.org/2019/736}, } @misc{cryptoeprint:2019:737, author = {Katriel Cohn-Gordon and Cas Cremers and Kristian Gjøsteen and Håkon Jacobsen and Tibor Jager }, title = {Highly Efficient Key Exchange Protocols with Optimal Tightness -- Enabling real-world deployments with theoretically sound parameters}, howpublished = {Cryptology ePrint Archive, Report 2019/737}, year = {2019}, url = {https://eprint.iacr.org/2019/737}, } @misc{cryptoeprint:2019:738, author = {Zihao Wei and Siwei Sun and Lei Hu and Man Wei and Joan Boyar and Rene Peralta}, title = {Scrutinizing the Tower Field Implementation of the $\mathbb{F}_{2^8}$ Inverter -- with Applications to AES, Camellia, and SM4}, howpublished = {Cryptology ePrint Archive, Report 2019/738}, year = {2019}, url = {https://eprint.iacr.org/2019/738}, } @misc{cryptoeprint:2019:739, author = {Elif Bilge Kavun and Hristina Mihajloska and Tolga Yalcin}, title = {A Survey on Authenticated Encryption -- ASIC Designer's Perspective}, howpublished = {Cryptology ePrint Archive, Report 2019/739}, year = {2019}, url = {https://eprint.iacr.org/2019/739}, } @misc{cryptoeprint:2019:740, author = {Lukas Malina and Gautam Srivastava and Petr Dzurenda and Jan Hajny and Radek Fujdiak}, title = {A Secure Publish/Subscribe Protocol for Internet of Things}, howpublished = {Cryptology ePrint Archive, Report 2019/740}, year = {2019}, url = {https://eprint.iacr.org/2019/740}, } @misc{cryptoeprint:2019:741, author = {Hosein Hadipour and Sadegh Sadeghi and Majid M. Niknam and Nasour Bagheri}, title = {Comprehensive security analysis of CRAFT}, howpublished = {Cryptology ePrint Archive, Report 2019/741}, year = {2019}, url = {https://eprint.iacr.org/2019/741}, } @misc{cryptoeprint:2019:742, author = {William Diehl and Abubakr Abdulgadir and Jens-Peter Kaps}, title = {Vulnerability Analysis of a Soft Core Processor through Fine-grain Power Profiling}, howpublished = {Cryptology ePrint Archive, Report 2019/742}, year = {2019}, url = {https://eprint.iacr.org/2019/742}, } @misc{cryptoeprint:2019:743, author = {Yangguang Tian and Yingjiu Li and Robert. H Deng and Binanda Sengupta and Guomin Yang}, title = {Lattice-Based Remote User Authentication from Reusable Fuzzy Signature}, howpublished = {Cryptology ePrint Archive, Report 2019/743}, year = {2019}, url = {https://eprint.iacr.org/2019/743}, } @misc{cryptoeprint:2019:744, author = {Martine De Cock and Rafael Dowsley and Anderson C. A. Nascimento and Devin Reich and Ariel Todoki}, title = {Privacy-Preserving Classification of Personal Text Messages with Secure Multi-Party Computation: An Application to Hate-Speech Detection}, howpublished = {Cryptology ePrint Archive, Report 2019/744}, year = {2019}, url = {https://eprint.iacr.org/2019/744}, } @misc{cryptoeprint:2019:745, author = {Vincenzo Iovino}, title = {Efficient Perfectly Sound One-message Zero-Knowledge Proofs via Oracle-aided Simulation}, howpublished = {Cryptology ePrint Archive, Report 2019/745}, year = {2019}, url = {https://eprint.iacr.org/2019/745}, } @misc{cryptoeprint:2019:746, author = {James Bartusek and Brent Carmer and Abhishek Jain and Zhengzhong Jin and Tancrède Lepoint and Fermi Ma and Tal Malkin and Alex J. Malozemoff and Mariana Raykova}, title = {Public-Key Function-Private Hidden Vector Encryption (and More)}, howpublished = {Cryptology ePrint Archive, Report 2019/746}, year = {2019}, url = {https://eprint.iacr.org/2019/746}, } @misc{cryptoeprint:2019:747, author = {Rupeng Yang and Man Ho Au and Zhenfei Zhang and Qiuliang Xu and Zuoxia Yu and William Whyte}, title = {Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications}, howpublished = {Cryptology ePrint Archive, Report 2019/747}, year = {2019}, url = {https://eprint.iacr.org/2019/747}, } @misc{cryptoeprint:2019:748, author = {Fredrik Winzer and Benjamin Herd and Sebastian Faust}, title = {Temporary Censorship Attacks in the Presence of Rational Miners}, howpublished = {Cryptology ePrint Archive, Report 2019/748}, year = {2019}, url = {https://eprint.iacr.org/2019/748}, } @misc{cryptoeprint:2019:749, author = {Ghada Arfaoui and Xavier Bultel and Pierre-Alain Fouque and Adina Nedelcu and Cristina Onete}, title = {The privacy of the TLS 1.3 protocol}, howpublished = {Cryptology ePrint Archive, Report 2019/749}, year = {2019}, url = {https://eprint.iacr.org/2019/749}, } @misc{cryptoeprint:2019:750, author = {Sondre Rønjom}, title = {A Short Note on a Weight Probability Distribution Related to SPNs}, howpublished = {Cryptology ePrint Archive, Report 2019/750}, year = {2019}, url = {https://eprint.iacr.org/2019/750}, } @misc{cryptoeprint:2019:751, author = {Thorsten Kleinjung and Benjamin Wesolowski}, title = {Discrete logarithms in quasi-polynomial time in finite fields of fixed characteristic}, howpublished = {Cryptology ePrint Archive, Report 2019/751}, year = {2019}, url = {https://eprint.iacr.org/2019/751}, } @misc{cryptoeprint:2019:752, author = {Runchao Han and Zhimei Sui and Jiangshan Yu and Joseph Liu and Shiping Chen}, title = {Sucker punch makes you richer: The threat of rational miners}, howpublished = {Cryptology ePrint Archive, Report 2019/752}, year = {2019}, url = {https://eprint.iacr.org/2019/752}, } @misc{cryptoeprint:2019:753, author = {Subhra Mazumdar and Sushmita Ruj}, title = {Design of Anonymous Endorsement System in Hyperledger Fabric}, howpublished = {Cryptology ePrint Archive, Report 2019/753}, year = {2019}, url = {https://eprint.iacr.org/2019/753}, } @misc{cryptoeprint:2019:754, author = {Rafael Pass and Muthuramakrishnan Venkitasubramaniam}, title = {A Round-Collapse Theorem for Computationally-Sound Protocols; or, TFNP is Hard (on Average) in Pessiland}, howpublished = {Cryptology ePrint Archive, Report 2019/754}, year = {2019}, url = {https://eprint.iacr.org/2019/754}, } @misc{cryptoeprint:2019:755, author = {Zhenzhen Bao and Itai Dinur and Jian Guo and Gaëtan Leurent and Lei Wang}, title = {Generic Attacks on Hash Combiners}, howpublished = {Cryptology ePrint Archive, Report 2019/755}, year = {2019}, url = {https://eprint.iacr.org/2019/755}, } @misc{cryptoeprint:2019:756, author = {Pantea Kiaei and Darius Mercadier and Pierre-Evariste Dagand and Karine Heydemann and Patrick Schaumont}, title = {SKIVA: Flexible and Modular Side-channel and Fault Countermeasures}, howpublished = {Cryptology ePrint Archive, Report 2019/756}, year = {2019}, url = {https://eprint.iacr.org/2019/756}, } @misc{cryptoeprint:2019:757, author = {Jonathan Protzenko and Bryan Parno and Aymeric Fromherz and Chris Hawblitzel and Marina Polubelova and Karthikeyan Bhargavan and Benjamin Beurdouche and Joonwon Choi and Antoine Delignat-Lavaud and Cedric Fournet and Tahina Ramananandro and Aseem Rastogi and Nikhil Swamy and Christoph Wintersteiger and Santiago Zanella-Beguelin}, title = {EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider}, howpublished = {Cryptology ePrint Archive, Report 2019/757}, year = {2019}, url = {https://eprint.iacr.org/2019/757}, } @misc{cryptoeprint:2019:758, author = {Ramsès Fernàndez-València}, title = {Genus 2 Supersingular Isogeny Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2019/758}, year = {2019}, url = {https://eprint.iacr.org/2019/758}, } @misc{cryptoeprint:2019:759, author = {Onur Günlü and Onurcan Iscan and Vladimir Sidorenko and Gerhard Kramer}, title = {Code Constructions for Physical Unclonable Functions and Biometric Secrecy Systems}, howpublished = {Cryptology ePrint Archive, Report 2019/759}, year = {2019}, url = {https://eprint.iacr.org/2019/759}, } @misc{cryptoeprint:2019:760, author = {Amit Jana and Dhiman Saha and Goutam Paul}, title = {Differential Fault Analysis of NORX}, howpublished = {Cryptology ePrint Archive, Report 2019/760}, year = {2019}, url = {https://eprint.iacr.org/2019/760}, } @misc{cryptoeprint:2019:761, author = {Ben Smyth}, title = {Athena: A verifiable, coercion-resistant voting system with linear complexity}, howpublished = {Cryptology ePrint Archive, Report 2019/761}, year = {2019}, url = {https://eprint.iacr.org/2019/761}, } @misc{cryptoeprint:2019:762, author = {Shuo Chen and Jung Hee Cheon and Dongwoo Kim and Daejun Park}, title = {Verifiable Computing for Approximate Computation}, howpublished = {Cryptology ePrint Archive, Report 2019/762}, year = {2019}, url = {https://eprint.iacr.org/2019/762}, } @misc{cryptoeprint:2019:763, author = {Shichang Wang and Meicheng Liu and Dongdai Lin and Li Ma}, title = {Fast Correlation Attacks on Grain-like Small State Stream Ciphers and Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80}, howpublished = {Cryptology ePrint Archive, Report 2019/763}, year = {2019}, url = {https://eprint.iacr.org/2019/763}, } @misc{cryptoeprint:2019:764, author = {Omri Ben-Eliezer and Eylon Yogev}, title = {The Adversarial Robustness of Sampling}, howpublished = {Cryptology ePrint Archive, Report 2019/764}, year = {2019}, url = {https://eprint.iacr.org/2019/764}, } @misc{cryptoeprint:2019:765, author = {Arpan Jati and Naina Gupta and Anupam Chattopadhyay and Somitra Kumar Sanadhya}, title = {SPQCop: Side-channel protected Post-Quantum Cryptoprocessor}, howpublished = {Cryptology ePrint Archive, Report 2019/765}, year = {2019}, url = {https://eprint.iacr.org/2019/765}, } @misc{cryptoeprint:2019:766, author = {Maciej Obremski and Maciej Skorski}, title = {Complexity of Estimating Renyi Entropy of Markov Chains}, howpublished = {Cryptology ePrint Archive, Report 2019/766}, year = {2019}, url = {https://eprint.iacr.org/2019/766}, } @misc{cryptoeprint:2019:767, author = {Jaeseong Jeong and Chang Heon Kim and Namhun Koo and Soonhak Kwon and Sumin Lee}, title = {On cryptographic parameters of permutation polynomials of the form $x^rh(x^{(q-1)/d})$}, howpublished = {Cryptology ePrint Archive, Report 2019/767}, year = {2019}, url = {https://eprint.iacr.org/2019/767}, } @misc{cryptoeprint:2019:768, author = {Nigel P. Smart and Younes Talibi Alaoui}, title = {Distributing any Elliptic Curve Based Protocol: With an Application to MixNets}, howpublished = {Cryptology ePrint Archive, Report 2019/768}, year = {2019}, url = {https://eprint.iacr.org/2019/768}, } @misc{cryptoeprint:2019:769, author = {Prasanna Ravi and Mahabir Prasad Jhanwar and James Howe and Anupam Chattopadhyay and Shivam Bhasin}, title = {Exploiting Determinism in Lattice-based Signatures - Practical Fault Attacks on pqm4 Implementations of NIST candidates}, howpublished = {Cryptology ePrint Archive, Report 2019/769}, year = {2019}, url = {https://eprint.iacr.org/2019/769}, } @misc{cryptoeprint:2019:770, author = {Navid Ghaedi Bardeh and Sondre Rønjom}, title = {Practical Attacks on Reduced-Round AES}, howpublished = {Cryptology ePrint Archive, Report 2019/770}, year = {2019}, url = {https://eprint.iacr.org/2019/770}, } @misc{cryptoeprint:2019:771, author = {Duc-Phong Le and Guomin Yang and Ali Ghorbani}, title = {DDH-based Multisignatures with Public Key Aggregation}, howpublished = {Cryptology ePrint Archive, Report 2019/771}, year = {2019}, url = {https://eprint.iacr.org/2019/771}, } @misc{cryptoeprint:2019:772, author = {Lorenzo Grassi and Markus Schofnegger}, title = {Mixture Integral Attacks on Reduced-Round AES with a Known/Secret S-Box}, howpublished = {Cryptology ePrint Archive, Report 2019/772}, year = {2019}, url = {https://eprint.iacr.org/2019/772}, } @misc{cryptoeprint:2019:773, author = {Frank Blom and Niek J. Bouman and Berry Schoenmakers and Niels de Vreede}, title = {Efficient Secure Ridge Regression from Randomized Gaussian Elimination}, howpublished = {Cryptology ePrint Archive, Report 2019/773}, year = {2019}, url = {https://eprint.iacr.org/2019/773}, } @misc{cryptoeprint:2019:774, author = {Hamidreza Amini Khorasgani and Hemanta Maji and Tamalika Mukherjee }, title = {Estimating Gaps in Martingales and Applications to Coin-Tossing: Constructions and Hardness}, howpublished = {Cryptology ePrint Archive, Report 2019/774}, year = {2019}, url = {https://eprint.iacr.org/2019/774}, } @misc{cryptoeprint:2019:775, author = {Aljosha Judmayer and Nicholas Stifter and Alexei Zamyatin and Itay Tsabary and Ittay Eyal and Peter Gazi and Sarah Meiklejohn and Edgar Weippl}, title = {Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies}, howpublished = {Cryptology ePrint Archive, Report 2019/775}, year = {2019}, url = {https://eprint.iacr.org/2019/775}, } @misc{cryptoeprint:2019:776, author = {Vladimir Kolesnikov and Mike Rosulek and Ni Trieu and Xiao Wang}, title = {Scalable Private Set Union from Symmetric-Key Techniques }, howpublished = {Cryptology ePrint Archive, Report 2019/776}, year = {2019}, url = {https://eprint.iacr.org/2019/776}, } @misc{cryptoeprint:2019:777, author = {Jörg Schwenk and Douglas Stebila}, title = {A Reduction-Based Proof for Authentication and Session Key Security in 3-Party Kerberos}, howpublished = {Cryptology ePrint Archive, Report 2019/777}, year = {2019}, url = {https://eprint.iacr.org/2019/777}, } @misc{cryptoeprint:2019:778, author = {Aggelos Kiayias and Orfeas Stefanos Thyfronitis Litos}, title = {A Composable Security Treatment of the Lightning Network}, howpublished = {Cryptology ePrint Archive, Report 2019/778}, year = {2019}, url = {https://eprint.iacr.org/2019/778}, } @misc{cryptoeprint:2019:779, author = {Dennis Jackson and Cas Cremers and Katriel Cohn-Gordon and Ralf Sasse}, title = {Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures}, howpublished = {Cryptology ePrint Archive, Report 2019/779}, year = {2019}, url = {https://eprint.iacr.org/2019/779}, } @misc{cryptoeprint:2019:780, author = {Saikrishna Badrinarayan and Rex Fernando and Aayush Jain and Dakshita Khurana and Amit Sahai}, title = {Statistical ZAP Arguments}, howpublished = {Cryptology ePrint Archive, Report 2019/780}, year = {2019}, url = {https://eprint.iacr.org/2019/780}, } @misc{cryptoeprint:2019:781, author = {Cyprien Delpech de Saint Guilhem and Lauren De Meyer and Emmanuela Orsini and Nigel P. Smart}, title = {BBQ: Using AES in Picnic Signatures}, howpublished = {Cryptology ePrint Archive, Report 2019/781}, year = {2019}, url = {https://eprint.iacr.org/2019/781}, } @misc{cryptoeprint:2019:782, author = {Antoine Joux and Cecile Pierrot}, title = {Algorithmic aspects of elliptic bases in finite field discrete logarithm algorithms}, howpublished = {Cryptology ePrint Archive, Report 2019/782}, year = {2019}, url = {https://eprint.iacr.org/2019/782}, } @misc{cryptoeprint:2019:783, author = {Tobias Damm and Sven Freud and Dominik Klein}, title = {Dissecting the CHES 2018 AES Challenge}, howpublished = {Cryptology ePrint Archive, Report 2019/783}, year = {2019}, url = {https://eprint.iacr.org/2019/783}, } @misc{cryptoeprint:2019:784, author = {Priyadarshi Singh and Abdul Basit and N Chaitanya Kumar and V. Ch. Venkaiah}, title = {Towards a Hybrid Public Key Infrastructure (PKI): A Review}, howpublished = {Cryptology ePrint Archive, Report 2019/784}, year = {2019}, url = {https://eprint.iacr.org/2019/784}, } @misc{cryptoeprint:2019:785, author = {Yalin Chen and Jue-Sam Chou and Liang-Chun Wang and Yu-Yuan Chou}, title = {A publicly verifiable quantum blind signature scheme without entanglement based on asymmetric cryptography}, howpublished = {Cryptology ePrint Archive, Report 2019/785}, year = {2019}, url = {https://eprint.iacr.org/2019/785}, } @misc{cryptoeprint:2019:786, author = {Rebecca Schwerdt and Matthias Nagel and Valerie Fetzer and Tobias Gräf and Andy Rupp}, title = {P6V2G: A Privacy-Preserving V2G Scheme for Two-Way Payments and Reputation}, howpublished = {Cryptology ePrint Archive, Report 2019/786}, year = {2019}, url = {https://eprint.iacr.org/2019/786}, } @misc{cryptoeprint:2019:787, author = {Jérôme Lablanche and Lina Mortajine and Othman Benchaalal and Pierre-Louis Cayrel and Nadia El Mrabet}, title = {Optimized implementation of the NIST PQC submission ROLLO on microcontroller}, howpublished = {Cryptology ePrint Archive, Report 2019/787}, year = {2019}, url = {https://eprint.iacr.org/2019/787}, } @misc{cryptoeprint:2019:788, author = {Aanchal Malhotra and Willem Toorop and Benno Overeinder and Ralph Dolmans and Sharon Goldberg}, title = {The Impact of Time on DNS Security}, howpublished = {Cryptology ePrint Archive, Report 2019/788}, year = {2019}, url = {https://eprint.iacr.org/2019/788}, } @misc{cryptoeprint:2019:789, author = {Diana Davidova and Lilya Budaghyan and Claude Carlet and Tor Helleseth and Ferdinand Ihringer and Tim Penttila}, title = {Relation between o-equivalence and EA-equivalence for Niho bent functions}, howpublished = {Cryptology ePrint Archive, Report 2019/789}, year = {2019}, url = {https://eprint.iacr.org/2019/789}, } @misc{cryptoeprint:2019:790, author = {Wei Jiang and Adam Bowers and Dan Lin}, title = {Simple and Efficient Approach for Achieving End-to-End Anonymous Communication}, howpublished = {Cryptology ePrint Archive, Report 2019/790}, year = {2019}, url = {https://eprint.iacr.org/2019/790}, } @misc{cryptoeprint:2019:791, author = {Hao Chen}, title = {Solving Ring-LWE over Algebraic Integer Rings}, howpublished = {Cryptology ePrint Archive, Report 2019/791}, year = {2019}, url = {https://eprint.iacr.org/2019/791}, } @misc{cryptoeprint:2019:792, author = {Wei Zhang and Jiangshan Yu and Qingqiang He and Nan Guan }, title = {TICK: Tiny Client for Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2019/792}, year = {2019}, url = {https://eprint.iacr.org/2019/792}, } @misc{cryptoeprint:2019:793, author = {Lylia Budaghyan and Marco Calderini and Irene Villa}, title = {On equivalence between known families of quadratic APN functions}, howpublished = {Cryptology ePrint Archive, Report 2019/793}, year = {2019}, url = {https://eprint.iacr.org/2019/793}, } @misc{cryptoeprint:2019:794, author = {Ko Stoffelen}, title = {Efficient Cryptography on the RISC-V Architecture}, howpublished = {Cryptology ePrint Archive, Report 2019/794}, year = {2019}, url = {https://eprint.iacr.org/2019/794}, } @misc{cryptoeprint:2019:795, author = {Peter Pessl and Robert Primas}, title = {More Practical Single-Trace Attacks on the Number Theoretic Transform}, howpublished = {Cryptology ePrint Archive, Report 2019/795}, year = {2019}, url = {https://eprint.iacr.org/2019/795}, } @misc{cryptoeprint:2019:796, author = {Susanne Engels and Max Hoffmann and Christof Paar}, title = {The End of Logic Locking? A Critical View on the Security of Logic Locking}, howpublished = {Cryptology ePrint Archive, Report 2019/796}, year = {2019}, url = {https://eprint.iacr.org/2019/796}, } @misc{cryptoeprint:2019:797, author = {Douglas Martins and Gustavo Banegas and Ricardo Custodio}, title = {Don't forget your roots: constant-time root finding over $\mathbb{F}_{2^m}$}, howpublished = {Cryptology ePrint Archive, Report 2019/797}, year = {2019}, url = {https://eprint.iacr.org/2019/797}, } @misc{cryptoeprint:2019:798, author = {Kwangsu Lee}, title = {A Generic Construction for Revocable Identity-Based Encryption with Subset Difference Methods}, howpublished = {Cryptology ePrint Archive, Report 2019/798}, year = {2019}, url = {https://eprint.iacr.org/2019/798}, } @misc{cryptoeprint:2019:799, author = {Nils Wisiol and Georg T. Becker and Marian Margraf and Tudor A. A. Soroceanu and Johannes Tobisch and Benjamin Zengin}, title = {Breaking the Lightweight Secure PUF: Understanding the Relation of Input Transformations and Machine Learning Resistance}, howpublished = {Cryptology ePrint Archive, Report 2019/799}, year = {2019}, url = {https://eprint.iacr.org/2019/799}, } @misc{cryptoeprint:2019:800, author = {Claire Delaplace and Alexander May}, title = {Can we Beat the Square Root Bound for ECDLP over $\mathbb{F}_{p^2}$ via Representations?}, howpublished = {Cryptology ePrint Archive, Report 2019/800}, year = {2019}, url = {https://eprint.iacr.org/2019/800}, } @misc{cryptoeprint:2019:801, author = {Sheng Sun}, title = {A Chosen Random Value Attack on WPA3 SAE authentication protocol}, howpublished = {Cryptology ePrint Archive, Report 2019/801}, year = {2019}, url = {https://eprint.iacr.org/2019/801}, } @misc{cryptoeprint:2019:802, author = {Alexander Maximov and Patrik Ekdahl}, title = {New Circuit Minimization Techniques for Smaller and Faster AES SBoxes}, howpublished = {Cryptology ePrint Archive, Report 2019/802}, year = {2019}, url = {https://eprint.iacr.org/2019/802}, } @misc{cryptoeprint:2019:803, author = {Gabriel Zaid and Lilian Bossuet and Amaury Habrard and Alexandre Venelli}, title = {Methodology for Efficient CNN Architectures in Profiling Attacks}, howpublished = {Cryptology ePrint Archive, Report 2019/803}, year = {2019}, url = {https://eprint.iacr.org/2019/803}, } @misc{cryptoeprint:2019:804, author = {Claire Delaplace and Andre Esser and Alexander May}, title = {Improved Low-Memory Subset Sum and LPN Algorithms via Multiple Collisions}, howpublished = {Cryptology ePrint Archive, Report 2019/804}, year = {2019}, url = {https://eprint.iacr.org/2019/804}, } @misc{cryptoeprint:2019:805, author = {Saskia Nuñez von Voigt and Florian Tschorsch}, title = {RRTxFM: Probabilistic Counting for Differentially Private Statistics}, howpublished = {Cryptology ePrint Archive, Report 2019/805}, year = {2019}, url = {https://eprint.iacr.org/2019/805}, } @misc{cryptoeprint:2019:806, author = {Eugene Pilyankevich and Dmytro Kornieiev and Artem Storozhuk}, title = {Proxy-Mediated Searchable Encryption in SQL Databases Using Blind Indexes}, howpublished = {Cryptology ePrint Archive, Report 2019/806}, year = {2019}, url = {https://eprint.iacr.org/2019/806}, } @misc{cryptoeprint:2019:807, author = {Hemi Leibowitz and Amir Herzberg and Ewa Syta}, title = {Provable Security for PKI Schemes}, howpublished = {Cryptology ePrint Archive, Report 2019/807}, year = {2019}, url = {https://eprint.iacr.org/2019/807}, } @misc{cryptoeprint:2019:808, author = {Alex Lombardi and Vinod Vaikuntanathan and Daniel Wichs}, title = {2-Message Publicly Verifiable WI from (Subexponential) LWE}, howpublished = {Cryptology ePrint Archive, Report 2019/808}, year = {2019}, url = {https://eprint.iacr.org/2019/808}, } @misc{cryptoeprint:2019:809, author = {Yosuke Todo and Willi Meier and Kazumaro Aoki}, title = {On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet}, howpublished = {Cryptology ePrint Archive, Report 2019/809}, year = {2019}, url = {https://eprint.iacr.org/2019/809}, } @misc{cryptoeprint:2019:810, author = {Jeroen Delvaux}, title = {Refutation and Redesign of a Physical Model of TERO-based TRNGs and PUFs}, howpublished = {Cryptology ePrint Archive, Report 2019/810}, year = {2019}, url = {https://eprint.iacr.org/2019/810}, } @misc{cryptoeprint:2019:811, author = {Ioannis Demertzis and Dimitrios Papadopoulos and Charalampos Papamanthou and Saurabh Shintre}, title = {SEAL: Attack Mitigation for Encrypted Databases via Adjustable Leakage}, howpublished = {Cryptology ePrint Archive, Report 2019/811}, year = {2019}, url = {https://eprint.iacr.org/2019/811}, } @misc{cryptoeprint:2019:812, author = {Chaoyun Li and Bart Preneel}, title = {Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree}, howpublished = {Cryptology ePrint Archive, Report 2019/812}, year = {2019}, url = {https://eprint.iacr.org/2019/812}, } @misc{cryptoeprint:2019:813, author = {Alexandros Bakas and Antonis Michalas}, title = {Multi-Client Symmetric Searchable Encryption with Forward Privacy}, howpublished = {Cryptology ePrint Archive, Report 2019/813}, year = {2019}, url = {https://eprint.iacr.org/2019/813}, } @misc{cryptoeprint:2019:814, author = {Sean Bowe}, title = {Faster Subgroup Checks for BLS12-381}, howpublished = {Cryptology ePrint Archive, Report 2019/814}, year = {2019}, url = {https://eprint.iacr.org/2019/814}, } @misc{cryptoeprint:2019:815, author = {Selçuk Kayacan}, title = {A Note on the Static-Static Key Agreement Protocol from Supersingular Isogenies}, howpublished = {Cryptology ePrint Archive, Report 2019/815}, year = {2019}, url = {https://eprint.iacr.org/2019/815}, } @misc{cryptoeprint:2019:816, author = {Mirco Richter}, title = {Crisis: Probabilistically Self Organizing Total Order in Unstructured P2P Networks}, howpublished = {Cryptology ePrint Archive, Report 2019/816}, year = {2019}, url = {https://eprint.iacr.org/2019/816}, } @misc{cryptoeprint:2019:817, author = {Tapas Pal and Ratna Dutta}, title = {Non-zero Inner Product Encryptions: Strong Security under Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2019/817}, year = {2019}, url = {https://eprint.iacr.org/2019/817}, } @misc{cryptoeprint:2019:818, author = {Debayan Das and Anupam Golder and Josef Danial and Santosh Ghosh and Arijit Raychowdhury and Shreyas Sen}, title = {X-DeepSCA: Cross-Device Deep Learning Side Channel Attack}, howpublished = {Cryptology ePrint Archive, Report 2019/818}, year = {2019}, url = {https://eprint.iacr.org/2019/818}, } @misc{cryptoeprint:2019:819, author = {Asma Aloufi and Peizhao Hu and Harry W. H. Wong and Sherman S. M. Chow}, title = {Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/819}, year = {2019}, url = {https://eprint.iacr.org/2019/819}, } @misc{cryptoeprint:2019:820, author = {Asma Aloufi and Peizhao Hu and Hang Liu and Sherman S. M. Chow}, title = {Universal Location Referencing and Homomorphic Evaluation of Geospatial Query}, howpublished = {Cryptology ePrint Archive, Report 2019/820}, year = {2019}, url = {https://eprint.iacr.org/2019/820}, } @misc{cryptoeprint:2019:821, author = {Eman Salem Alashwali and Pawel Szalachowski and Andrew Martin}, title = {Towards Forward Secure Internet Traffic}, howpublished = {Cryptology ePrint Archive, Report 2019/821}, year = {2019}, url = {https://eprint.iacr.org/2019/821}, } @misc{cryptoeprint:2019:822, author = {Ben Smyth}, title = {Surveying definitions of coercion resistance}, howpublished = {Cryptology ePrint Archive, Report 2019/822}, year = {2019}, url = {https://eprint.iacr.org/2019/822}, } @misc{cryptoeprint:2019:823, author = {Jeffrey Champion and abhi shelat and Jonathan Ullman}, title = {Securely Sampling Biased Coins with Applications to Differential Privacy}, howpublished = {Cryptology ePrint Archive, Report 2019/823}, year = {2019}, url = {https://eprint.iacr.org/2019/823}, } @misc{cryptoeprint:2019:824, author = {Behnaz Rezvani and William Diehl}, title = {Hardware Implementations of NIST Lightweight Cryptographic Candidates: A First Look}, howpublished = {Cryptology ePrint Archive, Report 2019/824}, year = {2019}, url = {https://eprint.iacr.org/2019/824}, } @misc{cryptoeprint:2019:825, author = {Takanori Isobe and Kazuhiko Minematsu}, title = {Plaintext Recovery Attacks against XTS Beyond Collisions}, howpublished = {Cryptology ePrint Archive, Report 2019/825}, year = {2019}, url = {https://eprint.iacr.org/2019/825}, } @misc{cryptoeprint:2019:826, author = {Erdinç Öztürk}, title = {Modular Multiplication Algorithm Suitable For Low-Latency Circuit Implementations}, howpublished = {Cryptology ePrint Archive, Report 2019/826}, year = {2019}, url = {https://eprint.iacr.org/2019/826}, } @misc{cryptoeprint:2019:827, author = {Zvi Schreiber}, title = {k-root-n: An efficient O(√n) algorithm for avoiding short term double spending in Distributed Ledger Technologies such as Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2019/827}, year = {2019}, url = {https://eprint.iacr.org/2019/827}, } @misc{cryptoeprint:2019:828, author = {Cezary Glowacz and Vincent Grosso}, title = {Optimal Collision Side-Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2019/828}, year = {2019}, url = {https://eprint.iacr.org/2019/828}, } @misc{cryptoeprint:2019:829, author = {Billy Bob Brumley and Sohaib ul Hassan and Alex Shaindlin and Nicola Tuveri and Kide Vuojärvi}, title = {Batch Binary Weierstrass}, howpublished = {Cryptology ePrint Archive, Report 2019/829}, year = {2019}, url = {https://eprint.iacr.org/2019/829}, } @misc{cryptoeprint:2019:830, author = {Diego F. Aranha and Elena Pagnin}, title = {The Simplest Multi-key Linearly Homomorphic Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2019/830}, year = {2019}, url = {https://eprint.iacr.org/2019/830}, } @misc{cryptoeprint:2019:831, author = {Cristian Hristea and Ferucio Laurentiu Tiplea}, title = {Privacy of Stateful RFID Systems with Constant Tag Identifiers}, howpublished = {Cryptology ePrint Archive, Report 2019/831}, year = {2019}, url = {https://eprint.iacr.org/2019/831}, } @misc{cryptoeprint:2019:832, author = {Ronald Cramer and Matthieu Rambaud and Chaoping Xing}, title = {Asymptotically-Good Arithmetic Secret Sharing over Z/(p^\ell Z) with Strong Multiplication and Its Applications to Efficient MPC}, howpublished = {Cryptology ePrint Archive, Report 2019/832}, year = {2019}, url = {https://eprint.iacr.org/2019/832}, } @misc{cryptoeprint:2019:833, author = {Alexander Maximov}, title = {AES MixColumn with 94 XOR gates}, howpublished = {Cryptology ePrint Archive, Report 2019/833}, year = {2019}, url = {https://eprint.iacr.org/2019/833}, } @misc{cryptoeprint:2019:834, author = {Alessandro Chiesa and Peter Manohar and Nicholas Spooner}, title = {Succinct Arguments in the Quantum Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2019/834}, year = {2019}, url = {https://eprint.iacr.org/2019/834}, } @misc{cryptoeprint:2019:835, author = {Karl Wüst and Sinisa Matetic and Silvan Egli and Kari Kostiainen and Srdjan Capkun}, title = {ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts}, howpublished = {Cryptology ePrint Archive, Report 2019/835}, year = {2019}, url = {https://eprint.iacr.org/2019/835}, } @misc{cryptoeprint:2019:836, author = {Markus Brandt and Claudio Orlandi and Kris Shrishak and Haya Shulman}, title = {Optimizing Transport Layer for Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2019/836}, year = {2019}, url = {https://eprint.iacr.org/2019/836}, } @misc{cryptoeprint:2019:837, author = {Daniel Cervantes-Vázquez and Mathilde Chenu and Jesús-Javier Chi-Domínguez and Luca De Feo and Francisco Rodríguez-Henríquez and Benjamin Smith}, title = {Stronger and Faster Side-Channel Protections for CSIDH}, howpublished = {Cryptology ePrint Archive, Report 2019/837}, year = {2019}, url = {https://eprint.iacr.org/2019/837}, } @misc{cryptoeprint:2019:838, author = {Christian Badertscher and Peter Gaži and Aggelos Kiayias and Alexander Russell and Vassilis Zikas}, title = {Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake}, howpublished = {Cryptology ePrint Archive, Report 2019/838}, year = {2019}, url = {https://eprint.iacr.org/2019/838}, } @misc{cryptoeprint:2019:839, author = {Abhishek Jain and Zhengzhong Jin}, title = {Statistical Zap Arguments from Quasi-Polynomial LWE}, howpublished = {Cryptology ePrint Archive, Report 2019/839}, year = {2019}, url = {https://eprint.iacr.org/2019/839}, } @misc{cryptoeprint:2019:840, author = {Yuhei Watanabe and Hideki Yamamoto and Hirotaka Yoshida}, title = {A Study on the Applicability of the Lesamnta-LW Lightweight Hash Function to TPMS}, howpublished = {Cryptology ePrint Archive, Report 2019/840}, year = {2019}, url = {https://eprint.iacr.org/2019/840}, } @misc{cryptoeprint:2019:841, author = {Daniel Smith-Tone}, title = {Practical Cryptanalysis of k-ary C*}, howpublished = {Cryptology ePrint Archive, Report 2019/841}, year = {2019}, url = {https://eprint.iacr.org/2019/841}, } @misc{cryptoeprint:2019:842, author = {Sreyosi Bhattacharyya and Palash Sarkar}, title = {Improved SIMD Implementation of Poly1305}, howpublished = {Cryptology ePrint Archive, Report 2019/842}, year = {2019}, url = {https://eprint.iacr.org/2019/842}, } @misc{cryptoeprint:2019:843, author = {Tomoki Moriya and Hiroshi Onuki and Tsuyoshi Takagi}, title = {How to Construct CSIDH on Edwards Curves}, howpublished = {Cryptology ePrint Archive, Report 2019/843}, year = {2019}, url = {https://eprint.iacr.org/2019/843}, } @misc{cryptoeprint:2019:844, author = {Matthias J. Kannwischer and Joost Rijneveld and Peter Schwabe and Ko Stoffelen}, title = {pqm4: Testing and Benchmarking NIST PQC on ARM Cortex-M4}, howpublished = {Cryptology ePrint Archive, Report 2019/844}, year = {2019}, url = {https://eprint.iacr.org/2019/844}, } @misc{cryptoeprint:2019:845, author = {Simona Samardjiska and Paolo Santini and Edoardo Persichetti and Gustavo Banegas }, title = {A Reaction Attack against Cryptosystems based on LRPC Codes}, howpublished = {Cryptology ePrint Archive, Report 2019/845}, year = {2019}, url = {https://eprint.iacr.org/2019/845}, } @misc{cryptoeprint:2019:846, author = {Yuechen Chen and Linru Zhang and Siu-Ming Yiu}, title = {Practical Attribute Based Inner Product Functional Encryption from Simple Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2019/846}, year = {2019}, url = {https://eprint.iacr.org/2019/846}, } @misc{cryptoeprint:2019:847, author = {Quan Quan Tan and Thomas Peyrin}, title = {Improved Heuristics for Short Linear Programs}, howpublished = {Cryptology ePrint Archive, Report 2019/847}, year = {2019}, url = {https://eprint.iacr.org/2019/847}, } @misc{cryptoeprint:2019:848, author = {Anne Canteaut and Lukas Kölsch and Friedrich Wiemer}, title = {Observations on the DLCT and Absolute Indicators}, howpublished = {Cryptology ePrint Archive, Report 2019/848}, year = {2019}, url = {https://eprint.iacr.org/2019/848}, } @misc{cryptoeprint:2019:849, author = {Ambili K N and Jimmy Jose}, title = {Trust based IDS for insider attacks in IoT}, howpublished = {Cryptology ePrint Archive, Report 2019/849}, year = {2019}, url = {https://eprint.iacr.org/2019/849}, } @misc{cryptoeprint:2019:850, author = {Morteza Adeli and Nasour Bagheri}, title = {Cryptanalysis of an Ultra lightweight Authentication Scheme based on Permutation Matrix Encryption for Internet of Vehicles}, howpublished = {Cryptology ePrint Archive, Report 2019/850}, year = {2019}, url = {https://eprint.iacr.org/2019/850}, } @misc{cryptoeprint:2019:851, author = {Masoumeh Safkhani and Ygal Bendavid and Samad Rostampour and Nasour Bagheri}, title = {On Designing Lightweight RFID Protocols for Medical IoT}, howpublished = {Cryptology ePrint Archive, Report 2019/851}, year = {2019}, url = {https://eprint.iacr.org/2019/851}, } @misc{cryptoeprint:2019:852, author = {Lorenzo Grassi and Gregor Leander and Christian Rechberger and Cihangir Tezcan and Friedrich Wiemer}, title = {Weak-Key Subspace Trails and Applications to AES}, howpublished = {Cryptology ePrint Archive, Report 2019/852}, year = {2019}, url = {https://eprint.iacr.org/2019/852}, } @misc{cryptoeprint:2019:853, author = {Ashley Fraser and Elizabeth A. Quaglia and Ben Smyth}, title = {A critique of game-based definitions of receipt-freeness for voting}, howpublished = {Cryptology ePrint Archive, Report 2019/853}, year = {2019}, url = {https://eprint.iacr.org/2019/853}, } @misc{cryptoeprint:2019:854, author = {Brandon Langenberg and Hai Pham and Rainer Steinwandt}, title = {Reducing the Cost of Implementing AES as a Quantum Circuit}, howpublished = {Cryptology ePrint Archive, Report 2019/854}, year = {2019}, url = {https://eprint.iacr.org/2019/854}, } @misc{cryptoeprint:2019:855, author = {Dominic Dams and Jeff Lataille and John Wade}, title = {WIDESEAS: A lattice-based PIR scheme implemented in EncryptedQuery}, howpublished = {Cryptology ePrint Archive, Report 2019/855}, year = {2019}, url = {https://eprint.iacr.org/2019/855}, } @misc{cryptoeprint:2019:856, author = {Subhadeep Banik and Yuki Funabiki and Takanori Isobe}, title = {More results on Shortest Linear Programs}, howpublished = {Cryptology ePrint Archive, Report 2019/856}, year = {2019}, url = {https://eprint.iacr.org/2019/856}, } @misc{cryptoeprint:2019:857, author = {Karl Wüst and Loris Diana and Kari Kostiainen and Ghassan Karame and Sinisa Matetic and Srdjan Capkun}, title = {Bitcontracts: Adding Expressive Smart Contracts to Legacy Cryptocurrencies}, howpublished = {Cryptology ePrint Archive, Report 2019/857}, year = {2019}, url = {https://eprint.iacr.org/2019/857}, } @misc{cryptoeprint:2019:858, author = {Eric Crockett and Christian Paquin and Douglas Stebila}, title = {Prototyping post-quantum and hybrid key exchange and authentication in TLS and SSH}, howpublished = {Cryptology ePrint Archive, Report 2019/858}, year = {2019}, url = {https://eprint.iacr.org/2019/858}, } @misc{cryptoeprint:2019:859, author = {Kyosuke Yamashita and Mehdi Tibouchi and Masayuki Abe}, title = {A Coin-Free Oracle-Based Augmented Black Box Framework}, howpublished = {Cryptology ePrint Archive, Report 2019/859}, year = {2019}, url = {https://eprint.iacr.org/2019/859}, } @misc{cryptoeprint:2019:860, author = {Yongbo Hu and Yeyang Zheng and Pengwei Feng and Lirui Liu and Chen Zhang and Aron Gohr and Sven Jacob and Werner Schindler and Ileana Buhan and Karim Tobich}, title = {Machine learning and side channel analysis in a CTF competition}, howpublished = {Cryptology ePrint Archive, Report 2019/860}, year = {2019}, url = {https://eprint.iacr.org/2019/860}, } @misc{cryptoeprint:2019:861, author = {Gabrielle De Micheli and Rémi Piau and Cécile Pierrot}, title = {A Tale of Three Signatures: practical attack of ECDSA with wNAF}, howpublished = {Cryptology ePrint Archive, Report 2019/861}, year = {2019}, url = {https://eprint.iacr.org/2019/861}, } @misc{cryptoeprint:2019:862, author = {Dmitry Khovratovich}, title = {Key recovery attacks on the Legendre PRFs within the birthday bound}, howpublished = {Cryptology ePrint Archive, Report 2019/862}, year = {2019}, url = {https://eprint.iacr.org/2019/862}, } @misc{cryptoeprint:2019:863, author = {Megha Byali and Carmit Hazay and Arpita Patra and Swati Singla}, title = {Fast Actively Secure Five-Party Computation with Security Beyond Abort}, howpublished = {Cryptology ePrint Archive, Report 2019/863}, year = {2019}, url = {https://eprint.iacr.org/2019/863}, } @misc{cryptoeprint:2019:864, author = {Yongge Wang}, title = {Another Look at Byzantine Fault Tolerance}, howpublished = {Cryptology ePrint Archive, Report 2019/864}, year = {2019}, url = {https://eprint.iacr.org/2019/864}, } @misc{cryptoeprint:2019:865, author = {Le He and Hongbo Yu}, title = {Cryptanalysis of Reduced-Round SipHash}, howpublished = {Cryptology ePrint Archive, Report 2019/865}, year = {2019}, url = {https://eprint.iacr.org/2019/865}, } @misc{cryptoeprint:2019:866, author = {Lichao Wu and Gerard Ribera and Stjepan Picek}, title = {A Fast Characterization Method for Optical Fault Injection}, howpublished = {Cryptology ePrint Archive, Report 2019/866}, year = {2019}, url = {https://eprint.iacr.org/2019/866}, } @misc{cryptoeprint:2019:867, author = {Orr Dunkelman and Nathan Keller and Eran Lambooij and Yu Sasaki}, title = {A Practical Forgery Attack on Lilliput-AE}, howpublished = {Cryptology ePrint Archive, Report 2019/867}, year = {2019}, url = {https://eprint.iacr.org/2019/867}, } @misc{cryptoeprint:2019:868, author = {Ran Cohen and Iftach Haitner and Nikolaos Makriyannis and Matan Orland and Alex Samorodnitsky}, title = {On the Round Complexity of Randomized Byzantine Agreement}, howpublished = {Cryptology ePrint Archive, Report 2019/868}, year = {2019}, url = {https://eprint.iacr.org/2019/868}, } @misc{cryptoeprint:2019:869, author = {Aritra Dhar and Enis Ulqinaku and Kari Kostiainen and Srdjan Capkun}, title = {ProtectIOn: Root-of-Trust for IO in Compromised Platforms}, howpublished = {Cryptology ePrint Archive, Report 2019/869}, year = {2019}, url = {https://eprint.iacr.org/2019/869}, } @misc{cryptoeprint:2019:870, author = {Marc Joye and Oleksandra Lapiha and Ky Nguyen and David Naccache}, title = {The Eleventh Power Residue Symbol}, howpublished = {Cryptology ePrint Archive, Report 2019/870}, year = {2019}, url = {https://eprint.iacr.org/2019/870}, } @misc{cryptoeprint:2019:871, author = {Claude Crépeau and Nan Yang}, title = {Non-Locality and Zero-Knowledge MIPs}, howpublished = {Cryptology ePrint Archive, Report 2019/871}, year = {2019}, url = {https://eprint.iacr.org/2019/871}, } @misc{cryptoeprint:2019:872, author = {Mark Abspoel and Ronald Cramer and Ivan Damgård and Daniel Escudero and Chen Yuan}, title = {Efficient Information-Theoretic Secure Multiparty Computation over $\mathbb{Z}/p^k \mathbb{Z}$ via Galois Rings}, howpublished = {Cryptology ePrint Archive, Report 2019/872}, year = {2019}, url = {https://eprint.iacr.org/2019/872}, } @misc{cryptoeprint:2019:873, author = {Shashi Kant Pandey and P.R. Mishra}, title = {Count of rotational symmetric bent Boolean functions}, howpublished = {Cryptology ePrint Archive, Report 2019/873}, year = {2019}, url = {https://eprint.iacr.org/2019/873}, } @misc{cryptoeprint:2019:874, author = {Fei Meng and Mingqiang Wang}, title = {ABFKS: Attribute-Based Encryption with Functional Keyword Search in Fog Computing}, howpublished = {Cryptology ePrint Archive, Report 2019/874}, year = {2019}, url = {https://eprint.iacr.org/2019/874}, } @misc{cryptoeprint:2019:875, author = {Daan Leermakers and Boris Skoric}, title = {Quantum Alice and Silent Bob: Qubit-based Quantum Key Recycling with almost no classical communication}, howpublished = {Cryptology ePrint Archive, Report 2019/875}, year = {2019}, url = {https://eprint.iacr.org/2019/875}, } @misc{cryptoeprint:2019:876, author = {Elias Rohrer and Florian Tschorsch}, title = {Kadcast: A Structured Approach to Broadcast in Blockchain Networks}, howpublished = {Cryptology ePrint Archive, Report 2019/876}, year = {2019}, url = {https://eprint.iacr.org/2019/876}, } @misc{cryptoeprint:2019:877, author = {Georg Fuchsbauer and Antoine Plouviez and Yannick Seurin}, title = {Blind Schnorr Signatures in the Algebraic Group Model}, howpublished = {Cryptology ePrint Archive, Report 2019/877}, year = {2019}, url = {https://eprint.iacr.org/2019/877}, } @misc{cryptoeprint:2019:878, author = {Chris Peikert and Zachary Pepin}, title = {Algebraically Structured LWE, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2019/878}, year = {2019}, url = {https://eprint.iacr.org/2019/878}, } @misc{cryptoeprint:2019:879, author = {Fukang Liu and Takanori Isobe and Willi Meier}, title = {Cryptanalysis of Subterranean-SAE}, howpublished = {Cryptology ePrint Archive, Report 2019/879}, year = {2019}, url = {https://eprint.iacr.org/2019/879}, } @misc{cryptoeprint:2019:880, author = {Yuyang Zhou and Yuanfeng Guan and Zhiwei Zhang and Fagen Li}, title = {A Blockchain-Based Access Control Scheme for Smart Grids}, howpublished = {Cryptology ePrint Archive, Report 2019/880}, year = {2019}, url = {https://eprint.iacr.org/2019/880}, } @misc{cryptoeprint:2019:881, author = {Marco Calderini and Irene Villa}, title = {On the Boomerang Uniformity of some Permutation Polynomials}, howpublished = {Cryptology ePrint Archive, Report 2019/881}, year = {2019}, url = {https://eprint.iacr.org/2019/881}, } @misc{cryptoeprint:2019:882, author = {Any Muanalifah and Serge˘ı Sergeev}, title = {Modifying The Tropical Version of Stickel’s Key Exchange Protocol}, howpublished = {Cryptology ePrint Archive, Report 2019/882}, year = {2019}, url = {https://eprint.iacr.org/2019/882}, } @misc{cryptoeprint:2019:883, author = {Donghang Lu and Thomas Yurek and Samarth Kulshreshtha and Rahul Govind and Rahul Mahadev and Aniket Kate and Andrew Miller}, title = {HoneyBadgerMPC and AsynchroMix: Practical AsynchronousMPC and its Application to Anonymous Communication}, howpublished = {Cryptology ePrint Archive, Report 2019/883}, year = {2019}, url = {https://eprint.iacr.org/2019/883}, } @misc{cryptoeprint:2019:884, author = {Mahesh Sreekumar Rajasree}, title = {Cryptanalysis of Round-Reduced KECCAK using Non-Linear Structures}, howpublished = {Cryptology ePrint Archive, Report 2019/884}, year = {2019}, url = {https://eprint.iacr.org/2019/884}, } @misc{cryptoeprint:2019:885, author = {Aurore Guillevic and Shashank Singh}, title = {On the alpha value of polynomials in the tower number field sieve algorithm}, howpublished = {Cryptology ePrint Archive, Report 2019/885}, year = {2019}, url = {https://eprint.iacr.org/2019/885}, } @misc{cryptoeprint:2019:886, author = {T-H. Hubert Chan and Rafael Pass and Elaine Shi}, title = {Round Complexity of Byzantine Agreement, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2019/886}, year = {2019}, url = {https://eprint.iacr.org/2019/886}, } @misc{cryptoeprint:2019:887, author = {Paul Bottinelli and Robert Lambert}, title = {Accelerating V2X Cryptography through Batch Operations}, howpublished = {Cryptology ePrint Archive, Report 2019/887}, year = {2019}, url = {https://eprint.iacr.org/2019/887}, } @misc{cryptoeprint:2019:888, author = {Mustafa Khairallah}, title = {Weak Keys in the Rekeying Paradigm: Attacks on COMET-128 and mixFeed}, howpublished = {Cryptology ePrint Archive, Report 2019/888}, year = {2019}, url = {https://eprint.iacr.org/2019/888}, } @misc{cryptoeprint:2019:889, author = {Anders Dalskov and Marcel Keller and Claudio Orlandi and Kris Shrishak and Haya Shulman}, title = {Securing DNSSEC Keys via Threshold ECDSA From Generic MPC}, howpublished = {Cryptology ePrint Archive, Report 2019/889}, year = {2019}, url = {https://eprint.iacr.org/2019/889}, } @misc{cryptoeprint:2019:890, author = {Samuel Dobson and Steven D. Galbraith and Jason LeGrow and Yan Bo Ti and Lukas Zobernig}, title = {Extending the Adaptive Attack to 2-SIDH}, howpublished = {Cryptology ePrint Archive, Report 2019/890}, year = {2019}, url = {https://eprint.iacr.org/2019/890}, } @misc{cryptoeprint:2019:891, author = {Vincenzo Botta and Daniele Friolo and Daniele Venturi and Ivan Visconti}, title = {The Rush Dilemma: Attacking and Repairing Smart Contracts on Forking Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2019/891}, year = {2019}, url = {https://eprint.iacr.org/2019/891}, } @misc{cryptoeprint:2019:892, author = {Patrick Kresmer and Alexander Zeh}, title = {CCM-SIV: Single-PRF Nonce-Misuse-Resistant Authenticated Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/892}, year = {2019}, url = {https://eprint.iacr.org/2019/892}, } @misc{cryptoeprint:2019:893, author = {Thomas Pornin}, title = {New Efficient, Constant-Time Implementations of Falcon}, howpublished = {Cryptology ePrint Archive, Report 2019/893}, year = {2019}, url = {https://eprint.iacr.org/2019/893}, } @misc{cryptoeprint:2019:894, author = {Fatih Balli and F. Betül Durak and Serge Vaudenay}, title = {BioID: a Privacy-Friendly Identity Document}, howpublished = {Cryptology ePrint Archive, Report 2019/894}, year = {2019}, url = {https://eprint.iacr.org/2019/894}, } @misc{cryptoeprint:2019:895, author = {Jintai Ding and Zheng Zhang and Joshua Deaton and Vishakha}, title = {The Singularity Attack to the Multivariate Signature Scheme Himq-3}, howpublished = {Cryptology ePrint Archive, Report 2019/895}, year = {2019}, url = {https://eprint.iacr.org/2019/895}, } @misc{cryptoeprint:2019:896, author = {Runchao Han and Haoyu Lin and Jiangshan Yu}, title = {On the optionality and fairness of Atomic Swaps}, howpublished = {Cryptology ePrint Archive, Report 2019/896}, year = {2019}, url = {https://eprint.iacr.org/2019/896}, } @misc{cryptoeprint:2019:897, author = {Vasyl Ustimenko }, title = {On inverse protocols of Post Quantum Cryptography based on pairs of noncommutative multivariate platforms used in tandem}, howpublished = {Cryptology ePrint Archive, Report 2019/897}, year = {2019}, url = {https://eprint.iacr.org/2019/897}, } @misc{cryptoeprint:2019:898, author = {Mehdi Tibouchi and Alexandre Wallet}, title = {One Bit is All It Takes: A Devastating Timing Attack on BLISS’s Non-Constant Time Sign Flips}, howpublished = {Cryptology ePrint Archive, Report 2019/898}, year = {2019}, url = {https://eprint.iacr.org/2019/898}, } @misc{cryptoeprint:2019:899, author = {Michael Yonli}, title = {A Comparison of Single-Bit and Multi-Bit DPA for Attacking AES128 on an ATmega328P}, howpublished = {Cryptology ePrint Archive, Report 2019/899}, year = {2019}, url = {https://eprint.iacr.org/2019/899}, } @misc{cryptoeprint:2019:900, author = {Kai Chen; Zhongrui Lin; Jian Wan; Lei Xu; Chungen Xu.}, title = {Multi-client Secure Encrypted Search Using Searching Adversarial Networks}, howpublished = {Cryptology ePrint Archive, Report 2019/900}, year = {2019}, url = {https://eprint.iacr.org/2019/900}, } @misc{cryptoeprint:2019:901, author = {Thomas Haines and Clementine Gritti}, title = {Improvements in Everlasting Privacy: Efficient and Secure Zero Knowledge Proofs}, howpublished = {Cryptology ePrint Archive, Report 2019/901}, year = {2019}, url = {https://eprint.iacr.org/2019/901}, } @misc{cryptoeprint:2019:902, author = {Gérald Gavin and Stéphane Bonnevay}, title = {Fractional LWE: a nonlinear variant of LWE}, howpublished = {Cryptology ePrint Archive, Report 2019/902}, year = {2019}, url = {https://eprint.iacr.org/2019/902}, } @misc{cryptoeprint:2019:903, author = {Igor Semaev and Andrea Tenti}, title = {Probabilistic analysis on Macaulay matrices over finite fields and complexity of constructing Gröbner bases}, howpublished = {Cryptology ePrint Archive, Report 2019/903}, year = {2019}, url = {https://eprint.iacr.org/2019/903}, } @misc{cryptoeprint:2019:904, author = {Gwangbae Choi and Serge Vaudenay}, title = {Timed-Release Encryption With Master Time Bound Key (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2019/904}, year = {2019}, url = {https://eprint.iacr.org/2019/904}, } @misc{cryptoeprint:2019:905, author = {Paul Burciu and Emil Simion}, title = {The Power of NIST Cryptographic Statistical Tests Suite}, howpublished = {Cryptology ePrint Archive, Report 2019/905}, year = {2019}, url = {https://eprint.iacr.org/2019/905}, } @misc{cryptoeprint:2019:906, author = {Rafael J. Cruz and Antonio Guimarães and Diego F. Aranha}, title = {Efficient and secure software implementations of Fantomas}, howpublished = {Cryptology ePrint Archive, Report 2019/906}, year = {2019}, url = {https://eprint.iacr.org/2019/906}, } @misc{cryptoeprint:2019:907, author = {Raghvendra Rohit and Guang Gong}, title = {Practical Forgery Attacks on Limdolen and HERN}, howpublished = {Cryptology ePrint Archive, Report 2019/907}, year = {2019}, url = {https://eprint.iacr.org/2019/907}, } @misc{cryptoeprint:2019:908, author = {Benoît Libert and Khoa Nguyen and Alain Passelègue and Radu Titiu}, title = {Simulation-Sound Proofs for LWE and Applications to KDM-CCA2 Security}, howpublished = {Cryptology ePrint Archive, Report 2019/908}, year = {2019}, url = {https://eprint.iacr.org/2019/908}, } @misc{cryptoeprint:2019:909, author = {Guillaume Wafo-Tapa and Slim Bettaieb and Loic Bidoux and Philippe Gaborit}, title = {A Practicable Timing Attack Against HQC and its Countermeasure}, howpublished = {Cryptology ePrint Archive, Report 2019/909}, year = {2019}, url = {https://eprint.iacr.org/2019/909}, } @misc{cryptoeprint:2019:910, author = {Tobias Schneider and Clara Paglialonga and Tobias Oder and Tim Güneysu}, title = {Efficiently Masking Binomial Sampling at Arbitrary Orders for Lattice-Based Crypto}, howpublished = {Cryptology ePrint Archive, Report 2019/910}, year = {2019}, url = {https://eprint.iacr.org/2019/910}, } @misc{cryptoeprint:2019:911, author = {Gildas Avoine and Sébastien Canard and Loïc Ferreira}, title = {IoT-Friendly AKE: Forward Secrecy and Session Resumption Meet Symmetric-Key Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2019/911}, year = {2019}, url = {https://eprint.iacr.org/2019/911}, } @misc{cryptoeprint:2019:912, author = {David Derler and Sebastian Ramacher and Daniel Slamanig and Christoph Striecks}, title = {I Want to Forget: Fine-Grained Encryption with Full Forward Secrecy in the Distributed Setting}, howpublished = {Cryptology ePrint Archive, Report 2019/912}, year = {2019}, url = {https://eprint.iacr.org/2019/912}, } @misc{cryptoeprint:2019:913, author = {Wen-Ran Zhang}, title = {Information Conservational Security with “Black Hole” Keypad Compression and Scalable One-Time Pad — A Quantum Intelligence Approach to Pre- and Post-Quantum Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2019/913}, year = {2019}, url = {https://eprint.iacr.org/2019/913}, } @misc{cryptoeprint:2019:914, author = {Fabio Banfi and Ueli Maurer and Christopher Portmann and Jiamin Zh}, title = {Composable and Finite Computational Security of Quantum Message Transmission}, howpublished = {Cryptology ePrint Archive, Report 2019/914}, year = {2019}, url = {https://eprint.iacr.org/2019/914}, } @misc{cryptoeprint:2019:915, author = {Lynn Margaret Batten and Hugh Cowie Williams}, title = {Unique Rabin-Williams Signature Scheme Decryption}, howpublished = {Cryptology ePrint Archive, Report 2019/915}, year = {2019}, url = {https://eprint.iacr.org/2019/915}, } @misc{cryptoeprint:2019:916, author = {Kai Chen; Zhongrui Lin; Jian Wan; Lei Xu; Chungen Xu.}, title = {Multi-owner Secure Encrypted Search Using Searching Adversarial Networks}, howpublished = {Cryptology ePrint Archive, Report 2019/916}, year = {2019}, url = {https://eprint.iacr.org/2019/916}, } @misc{cryptoeprint:2019:917, author = {Shixiong Wang and Juanyang Zhang and Jingnan He and Huaxiong Wang and Chao Li}, title = {Simplified Revocable Hierarchical Identity-Based Encryption from Lattices}, howpublished = {Cryptology ePrint Archive, Report 2019/917}, year = {2019}, url = {https://eprint.iacr.org/2019/917}, } @misc{cryptoeprint:2019:918, author = {Hai Zhou and Amin Rezaei and Yuanqi Shen}, title = {Resolving the Trilemma in Logic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/918}, year = {2019}, url = {https://eprint.iacr.org/2019/918}, } @misc{cryptoeprint:2019:919, author = {Wei Cheng and Claude Carlet and Kouassi Goli and Sylvain Guilley and Jean-Luc Danger}, title = {Detecting Faults in Inner Product Masking Scheme - IPM-FD: IPM with Fault Detection}, howpublished = {Cryptology ePrint Archive, Report 2019/919}, year = {2019}, url = {https://eprint.iacr.org/2019/919}, } @misc{cryptoeprint:2019:920, author = {Raluca Posteuca}, title = {Related-Key Differential Slide Attack Against Fountain V1}, howpublished = {Cryptology ePrint Archive, Report 2019/920}, year = {2019}, url = {https://eprint.iacr.org/2019/920}, } @misc{cryptoeprint:2019:921, author = {Pavol Zajac}, title = {Tree authenticated ephemeral keys}, howpublished = {Cryptology ePrint Archive, Report 2019/921}, year = {2019}, url = {https://eprint.iacr.org/2019/921}, } @misc{cryptoeprint:2019:922, author = {Karim Eldefrawy and Vitor Pereira}, title = {A High-Assurance, Automatically-Synthesized, Evaluator for Machine-Checked (Proactively) Secure Multi-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2019/922}, year = {2019}, url = {https://eprint.iacr.org/2019/922}, } @misc{cryptoeprint:2019:923, author = {Bastian Richter and Alexander Wild and Amir Moradi}, title = {Automated Probe Repositioning for On-Die EM Measurements}, howpublished = {Cryptology ePrint Archive, Report 2019/923}, year = {2019}, url = {https://eprint.iacr.org/2019/923}, } @misc{cryptoeprint:2019:924, author = {Dirk Achenbach and Roland Gröll and Timon Hackenjos and Alexander Koch and Bernhard Löwe and Jeremias Mechler and Jörn Müller-Quade and Jochen Rill}, title = {Your Money or Your Life---Modeling and Analyzing the Security of Electronic Payment in the UC Framework}, howpublished = {Cryptology ePrint Archive, Report 2019/924}, year = {2019}, url = {https://eprint.iacr.org/2019/924}, } @misc{cryptoeprint:2019:925, author = {Wulu Li and Lei Chen and Xin Lai and Xiao Zhang and Jiajun Xin}, title = {Traceable and linkable ring signatures, traceable range proofs and applications on regulatable privacy-preserving blockchains}, howpublished = {Cryptology ePrint Archive, Report 2019/925}, year = {2019}, url = {https://eprint.iacr.org/2019/925}, } @misc{cryptoeprint:2019:926, author = {Gilles Barthe and Sandrine Blazy and Benjamin Grégoire and Rémi Hutin and Vincent Laporte and David Pichardie and Alix Trieu}, title = {Formal Verification of a Constant-Time Preserving C Compiler}, howpublished = {Cryptology ePrint Archive, Report 2019/926}, year = {2019}, url = {https://eprint.iacr.org/2019/926}, } @misc{cryptoeprint:2019:927, author = {Lorenz Panny}, title = {Isogeny-based hashing despite known endomorphisms}, howpublished = {Cryptology ePrint Archive, Report 2019/927}, year = {2019}, url = {https://eprint.iacr.org/2019/927}, } @misc{cryptoeprint:2019:928, author = {Fatemeh Ganji and Shahin Tajik and Domenic Forte and Jean-Pierre Seifert}, title = {Blockchain-enabled Cryptographically-secure Hardware Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2019/928}, year = {2019}, url = {https://eprint.iacr.org/2019/928}, } @misc{cryptoeprint:2019:929, author = {Samuel Dobson and Steven D. Galbraith}, title = {On the Degree-Insensitive SI-GDH problem and assumption}, howpublished = {Cryptology ePrint Archive, Report 2019/929}, year = {2019}, url = {https://eprint.iacr.org/2019/929}, } @misc{cryptoeprint:2019:930, author = {Yang Wang and Mingqiang Wang}, title = {Module-LWE versus Ring-LWE, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2019/930}, year = {2019}, url = {https://eprint.iacr.org/2019/930}, } @misc{cryptoeprint:2019:931, author = {Andre Esser and Alexander May}, title = {Low Weight Discrete Logarithms and Subset Sum in $2^{0.65n}$ with Polynomial Memory}, howpublished = {Cryptology ePrint Archive, Report 2019/931}, year = {2019}, url = {https://eprint.iacr.org/2019/931}, } @misc{cryptoeprint:2019:932, author = {Muhammad ElSheikh and Amr M. Youssef}, title = {Related-key Differential Cryptanalysis of Full Round CRAFT}, howpublished = {Cryptology ePrint Archive, Report 2019/932}, year = {2019}, url = {https://eprint.iacr.org/2019/932}, } @misc{cryptoeprint:2019:933, author = {Daniele Antonioli and Nils Ole Tippenhauer and Kasper Rasmussen}, title = {Low Entropy Key Negotiation Attacks on Bluetooth and Bluetooth Low Energy}, howpublished = {Cryptology ePrint Archive, Report 2019/933}, year = {2019}, url = {https://eprint.iacr.org/2019/933}, } @misc{cryptoeprint:2019:934, author = {Mohsin Khan and Kaisa Nyberg}, title = {Linear Approximations of Random Functions and Permutations}, howpublished = {Cryptology ePrint Archive, Report 2019/934}, year = {2019}, url = {https://eprint.iacr.org/2019/934}, } @misc{cryptoeprint:2019:935, author = {Kai Chen; Zhongrui Lin; Jian Wan; Chungen Xu.}, title = {Interpretable Encrypted Searchable Neural Networks}, howpublished = {Cryptology ePrint Archive, Report 2019/935}, year = {2019}, url = {https://eprint.iacr.org/2019/935}, } @misc{cryptoeprint:2019:936, author = {Markku-Juhani O. Saarinen}, title = {SNEIK on Microcontrollers: AVR, ARMv7-M, and RISC-V with Custom Instructions}, howpublished = {Cryptology ePrint Archive, Report 2019/936}, year = {2019}, url = {https://eprint.iacr.org/2019/936}, } @misc{cryptoeprint:2019:937, author = {Sayandeep Saha and Debapriya Basu Roy and Arnab Bag and Sikhar Patranabis and Debdeep Mukhopadhyay}, title = {Breach the Gate: Exploiting Observability for Fault Template Attacks on Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2019/937}, year = {2019}, url = {https://eprint.iacr.org/2019/937}, } @misc{cryptoeprint:2019:938, author = {Gaëtan Leurent and Ferdinand Sibleyras}, title = {Low-Memory Attacks against Two-Round Even-Mansour using the 3-XOR Problem}, howpublished = {Cryptology ePrint Archive, Report 2019/938}, year = {2019}, url = {https://eprint.iacr.org/2019/938}, } @misc{cryptoeprint:2019:939, author = {Martin Albrecht and Melissa Chase and Hao Chen and Jintai Ding and Shafi Goldwasser and Sergey Gorbunov and Shai Halevi and Jeffrey Hoffstein and Kim Laine and Kristin Lauter and Satya Lokam and Daniele Micciancio and Dustin Moody and Travis Morrison and Amit Sahai and Vinod Vaikuntanathan }, title = {Homomorphic Encryption Standard}, howpublished = {Cryptology ePrint Archive, Report 2019/939}, year = {2019}, url = {https://eprint.iacr.org/2019/939}, } @misc{cryptoeprint:2019:940, author = {Nasrollah Pakniat}, title = {Security analysis of two lightweight certi ficateless signature schemes}, howpublished = {Cryptology ePrint Archive, Report 2019/940}, year = {2019}, url = {https://eprint.iacr.org/2019/940}, } @misc{cryptoeprint:2019:941, author = {Eman Salem Alashwali and Pawel Szalachowski and Andrew Martin}, title = {Does "www." Mean Better Transport Layer Security?}, howpublished = {Cryptology ePrint Archive, Report 2019/941}, year = {2019}, url = {https://eprint.iacr.org/2019/941}, } @misc{cryptoeprint:2019:942, author = {Handan Kılınç Alper}, title = {Ouroboros Clepsydra: Ouroboros Praos in the Universally Composable Relative Time Model}, howpublished = {Cryptology ePrint Archive, Report 2019/942}, year = {2019}, url = {https://eprint.iacr.org/2019/942}, } @misc{cryptoeprint:2019:943, author = {Ling Ren}, title = {Analysis of Nakamoto Consensus}, howpublished = {Cryptology ePrint Archive, Report 2019/943}, year = {2019}, url = {https://eprint.iacr.org/2019/943}, } @misc{cryptoeprint:2019:944, author = {Max Hoffmann and Michael Klooß and Andy Rupp}, title = {Efficient zero-knowledge arguments in the discrete log setting, revisited}, howpublished = {Cryptology ePrint Archive, Report 2019/944}, year = {2019}, url = {https://eprint.iacr.org/2019/944}, } @misc{cryptoeprint:2019:945, author = {Navid Ghaedi Bardeh}, title = {A Key-Independent Distinguisher for 6-round AES in an Adaptive Setting}, howpublished = {Cryptology ePrint Archive, Report 2019/945}, year = {2019}, url = {https://eprint.iacr.org/2019/945}, } @misc{cryptoeprint:2019:946, author = {M Sazadur Rahman and Adib Nahiyan and Sarah Amir and Fahim Rahman and Farimah Farahmandi and Domenic Forte and Mark Tehranipoor}, title = {Dynamically Obfuscated Scan Chain To Resist Oracle-Guided Attacks On Logic Locked Design}, howpublished = {Cryptology ePrint Archive, Report 2019/946}, year = {2019}, url = {https://eprint.iacr.org/2019/946}, } @misc{cryptoeprint:2019:947, author = {Fabian Boemer and Anamaria Costache and Rosario Cammarota and Casimir Wierzynski }, title = {nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2019/947}, year = {2019}, url = {https://eprint.iacr.org/2019/947}, } @misc{cryptoeprint:2019:948, author = {Prasanna Ravi and Sujoy Sinha Roy and Anupam Chattopadhyay and Shivam Bhasin}, title = {Generic Side-channel attacks on CCA-secure lattice-based PKE and KEM schemes}, howpublished = {Cryptology ePrint Archive, Report 2019/948}, year = {2019}, url = {https://eprint.iacr.org/2019/948}, } @misc{cryptoeprint:2019:949, author = {Yongha Son}, title = {A Note on Parameter Choices of Round5}, howpublished = {Cryptology ePrint Archive, Report 2019/949}, year = {2019}, url = {https://eprint.iacr.org/2019/949}, } @misc{cryptoeprint:2019:950, author = {Simon-Philipp Merz and Romy Minko and Christophe Petit}, title = {Another look at some isogeny hardness assumptions}, howpublished = {Cryptology ePrint Archive, Report 2019/950}, year = {2019}, url = {https://eprint.iacr.org/2019/950}, } @misc{cryptoeprint:2019:951, author = {Xavier Bonnetain}, title = {Collisions on Feistel-MiMC and univariate GMiMC}, howpublished = {Cryptology ePrint Archive, Report 2019/951}, year = {2019}, url = {https://eprint.iacr.org/2019/951}, } @misc{cryptoeprint:2019:952, author = {Vincenzo Iovino and Ivan Visconti}, title = {Non-Interactive Zero Knowledge Proofs in the Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2019/952}, year = {2019}, url = {https://eprint.iacr.org/2019/952}, } @misc{cryptoeprint:2019:953, author = {Ariel Gabizon and Zachary J. Williamson and Oana Ciobotaru}, title = {PLONK: Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2019/953}, year = {2019}, url = {https://eprint.iacr.org/2019/953}, } @misc{cryptoeprint:2019:954, author = {Mohsen Jahanbani and Zeinolabedin Norouzi and Nasour Bagheri}, title = {CPA on Hardware Implementation of COLM Authenticated Cipher and Protect it with DOM Masking Scheme}, howpublished = {Cryptology ePrint Archive, Report 2019/954}, year = {2019}, url = {https://eprint.iacr.org/2019/954}, } @misc{cryptoeprint:2019:955, author = {Antonio Faonio and Dario Fiore and Javier Herranz and Carla Ràfols}, title = {Structure-Preserving and Re-randomizable RCCA-secure Public Key Encryption and its Applications}, howpublished = {Cryptology ePrint Archive, Report 2019/955}, year = {2019}, url = {https://eprint.iacr.org/2019/955}, } @misc{cryptoeprint:2019:956, author = {Diego F. Aranha and Claudio Orlandi and Akira Takahashi and Greg Zaverucha}, title = {Security of Hedged Fiat-Shamir Signatures under Fault Attacks}, howpublished = {Cryptology ePrint Archive, Report 2019/956}, year = {2019}, url = {https://eprint.iacr.org/2019/956}, } @misc{cryptoeprint:2019:957, author = {Nigel P. Smart and Titouan Tanguy}, title = {TaaS: Commodity MPC via Triples-as-a-Service}, howpublished = {Cryptology ePrint Archive, Report 2019/957}, year = {2019}, url = {https://eprint.iacr.org/2019/957}, } @misc{cryptoeprint:2019:958, author = {Gabrielle Beck and Maximilian Zinkus and Matthew Green}, title = {Using SMT Solvers to Automate Chosen Ciphertext Attacks}, howpublished = {Cryptology ePrint Archive, Report 2019/958}, year = {2019}, url = {https://eprint.iacr.org/2019/958}, } @misc{cryptoeprint:2019:959, author = {Seungkwang Lee and Myungchul Kim}, title = {Table Redundancy Method for Protecting against Differential Fault Analysis in the White-box Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2019/959}, year = {2019}, url = {https://eprint.iacr.org/2019/959}, } @misc{cryptoeprint:2019:960, author = {Subhabrata Samajder and Palash Sarkar}, title = {Another Look at Key Randomisation Hypotheses}, howpublished = {Cryptology ePrint Archive, Report 2019/960}, year = {2019}, url = {https://eprint.iacr.org/2019/960}, } @misc{cryptoeprint:2019:961, author = {Christian Mouchet and Juan Troncoso-Pastoriza and Jean-Pierre Hubaux}, title = {Computing across Trust Boundaries using Distributed Homomorphic Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2019/961}, year = {2019}, url = {https://eprint.iacr.org/2019/961}, } @misc{cryptoeprint:2019:962, author = {Rishab Goyal and Satyanarayana Vusirikala and Brent Waters}, title = {New Constructions of Hinting PRGs, OWFs with Encryption, and more}, howpublished = {Cryptology ePrint Archive, Report 2019/962}, year = {2019}, url = {https://eprint.iacr.org/2019/962}, } @misc{cryptoeprint:2019:963, author = {Pascal Aubry and Sergiu Carpov and Renaud Sirdey}, title = {Faster homomorphic encryption is not enough: improved heuristic for multiplicative depth minimization of Boolean circuits}, howpublished = {Cryptology ePrint Archive, Report 2019/963}, year = {2019}, url = {https://eprint.iacr.org/2019/963}, } @misc{cryptoeprint:2019:964, author = {Georg Fuchsbauer}, title = {WI Is Not Enough: Zero-Knowledge Contingent (Service) Payments Revisited}, howpublished = {Cryptology ePrint Archive, Report 2019/964}, year = {2019}, url = {https://eprint.iacr.org/2019/964}, } @misc{cryptoeprint:2019:965, author = {Andrea Caforio and F Betül Durak and Serge Vaudenay}, title = {On-Demand Ratcheting with Security Awareness}, howpublished = {Cryptology ePrint Archive, Report 2019/965}, year = {2019}, url = {https://eprint.iacr.org/2019/965}, } @misc{cryptoeprint:2019:966, author = {Junichi Tomida and Yuto Kawahara and Ryo Nishimaki}, title = {Fast, Compact, and Expressive Attribute-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/966}, year = {2019}, url = {https://eprint.iacr.org/2019/966}, } @misc{cryptoeprint:2019:967, author = {Prasanna Raghaw Mishra and Bhartendu Nandan and Navneet Gaba}, title = {On NIST's Compression Estimate Test}, howpublished = {Cryptology ePrint Archive, Report 2019/967}, year = {2019}, url = {https://eprint.iacr.org/2019/967}, } @misc{cryptoeprint:2019:968, author = {William Black and Ryan Henry}, title = {There Are 10 Types of Vectors (and Polynomials): Efficient Zero-Knowledge Proofs of "One-Hotness" via Polynomials with One Zero}, howpublished = {Cryptology ePrint Archive, Report 2019/968}, year = {2019}, url = {https://eprint.iacr.org/2019/968}, } @misc{cryptoeprint:2019:969, author = {Russell W. F. Lai and Giulio Malavolta and Viktoria Ronge}, title = {Succinct Arguments for Bilinear Group Arithmetic: Practical Structure-Preserving Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2019/969}, year = {2019}, url = {https://eprint.iacr.org/2019/969}, } @misc{cryptoeprint:2019:970, author = {Xinyu Li and Jing Xu and Xiong Fan and Yuchen Wang and Zhenfeng Zhang}, title = {Puncturable Signatures and Applications in Proof-of-Stake Blockchain Protocol}, howpublished = {Cryptology ePrint Archive, Report 2019/970}, year = {2019}, url = {https://eprint.iacr.org/2019/970}, } @misc{cryptoeprint:2019:971, author = {Nadim Kobeissi}, title = {Verifpal: Cryptographic Protocol Analysis for Students and Engineers}, howpublished = {Cryptology ePrint Archive, Report 2019/971}, year = {2019}, url = {https://eprint.iacr.org/2019/971}, } @misc{cryptoeprint:2019:972, author = {Wenping MA}, title = {Noninteractive Zero Knowledge Proof System for NP from Ring LWE}, howpublished = {Cryptology ePrint Archive, Report 2019/972}, year = {2019}, url = {https://eprint.iacr.org/2019/972}, } @misc{cryptoeprint:2019:973, author = {Ngoc Khanh Nguyen}, title = {On the Non-Existence of Short Vectors in Random Module Lattices}, howpublished = {Cryptology ePrint Archive, Report 2019/973}, year = {2019}, url = {https://eprint.iacr.org/2019/973}, } @misc{cryptoeprint:2019:974, author = {Abdelrahaman Aly and Emmanuela Orsini and Drago Rotaru and Nigel P. Smart and Tim Wood}, title = {Zaphod: Efficiently Combing LSSS and Garbled Circuits in SCALE}, howpublished = {Cryptology ePrint Archive, Report 2019/974}, year = {2019}, url = {https://eprint.iacr.org/2019/974}, } @misc{cryptoeprint:2019:975, author = {Akashdeep Saha and Sayandeep Saha and Debdeep Mukhopadhyay and Bhargab Bikram Bhattacharya}, title = {Ci-Lock: Cipher Induced Logic Locking Resistant Against SAT Attacks}, howpublished = {Cryptology ePrint Archive, Report 2019/975}, year = {2019}, url = {https://eprint.iacr.org/2019/975}, } @misc{cryptoeprint:2019:976, author = {Martin Zuber and Sergiu Carpov and Renaud Sirdey}, title = {Towards real-time hidden speaker recognition by means of fully homomorphic encryption}, howpublished = {Cryptology ePrint Archive, Report 2019/976}, year = {2019}, url = {https://eprint.iacr.org/2019/976}, } @misc{cryptoeprint:2019:977, author = {Zhenbin Yan and Yi Deng}, title = {Non-malleable Zero-Knowledge Arguments with Lower Round Complexity}, howpublished = {Cryptology ePrint Archive, Report 2019/977}, year = {2019}, url = {https://eprint.iacr.org/2019/977}, } @misc{cryptoeprint:2019:978, author = {Guilherme Perin}, title = {Deep Learning Model Generalization in Side-Channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2019/978}, year = {2019}, url = {https://eprint.iacr.org/2019/978}, } @misc{cryptoeprint:2019:979, author = {Kalikinkar Mandal and Guang Gong}, title = {PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks}, howpublished = {Cryptology ePrint Archive, Report 2019/979}, year = {2019}, url = {https://eprint.iacr.org/2019/979}, } @misc{cryptoeprint:2019:980, author = {Rishab Goyal and Venkata Koppula and Brent Waters}, title = {New Approaches to Traitor Tracing with Embedded Identities}, howpublished = {Cryptology ePrint Archive, Report 2019/980}, year = {2019}, url = {https://eprint.iacr.org/2019/980}, } @misc{cryptoeprint:2019:981, author = {Nirvan Tyagi and Ian Miers and Thomas Ristenpart}, title = {Traceback for End-to-End Encrypted Messaging}, howpublished = {Cryptology ePrint Archive, Report 2019/981}, year = {2019}, url = {https://eprint.iacr.org/2019/981}, } @misc{cryptoeprint:2019:982, author = {Toi Tomita and Wakaha Ogata adn Kaoru Kurosawa and Ryo Kuwayama}, title = {CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (not $\mathtt{q}$-type) Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2019/982}, year = {2019}, url = {https://eprint.iacr.org/2019/982}, } @misc{cryptoeprint:2019:983, author = {Marc Fyrbiak and Sebastian Wallat and Sascha Reinhard and Nicolai Bissantz and Christof Paar}, title = {Graph Similarity and Its Applications to Hardware Security}, howpublished = {Cryptology ePrint Archive, Report 2019/983}, year = {2019}, url = {https://eprint.iacr.org/2019/983}, } @misc{cryptoeprint:2019:984, author = {Sam Kim and David J. Wu}, title = {Collusion Resistant Trace-and-Revoke for Arbitrary Identities from Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2019/984}, year = {2019}, url = {https://eprint.iacr.org/2019/984}, } @misc{cryptoeprint:2019:985, author = {Philipp Schindler and Aljosha Judmayer and Nicholas Stifter and Edgar Weippl}, title = {ETHDKG: Distributed Key Generation with Ethereum Smart Contracts}, howpublished = {Cryptology ePrint Archive, Report 2019/985}, year = {2019}, url = {https://eprint.iacr.org/2019/985}, } @misc{cryptoeprint:2019:986, author = {Majid Khabbazian and Tejaswi Nadahalli and Roger Wattenhofer }, title = {Outpost: A Responsive Lightweight Watchtower}, howpublished = {Cryptology ePrint Archive, Report 2019/986}, year = {2019}, url = {https://eprint.iacr.org/2019/986}, } @misc{cryptoeprint:2019:987, author = {Marcel Armour and Bertram Poettering}, title = {Subverting Decryption in AEAD }, howpublished = {Cryptology ePrint Archive, Report 2019/987}, year = {2019}, url = {https://eprint.iacr.org/2019/987}, } @misc{cryptoeprint:2019:988, author = {David W. Archer and Jose Manuel Calderon Trilla and Jason Dagit and Alex J. Malozemoff and Yuriy Polyakov and Kurt Rohloff and Gerard Ryan}, title = {RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications}, howpublished = {Cryptology ePrint Archive, Report 2019/988}, year = {2019}, url = {https://eprint.iacr.org/2019/988}, } @misc{cryptoeprint:2019:989, author = {Marcel Armour and Bertram Poettering}, title = {Substitution Attacks against Message Authentication}, howpublished = {Cryptology ePrint Archive, Report 2019/989}, year = {2019}, url = {https://eprint.iacr.org/2019/989}, } @misc{cryptoeprint:2019:990, author = {Sanjam Garg and Mohammad Hajiabadi and Rafail Ostrovsky}, title = {Efficient Range-Trapdoor Functions and Applications: Rate-1 OT and More}, howpublished = {Cryptology ePrint Archive, Report 2019/990}, year = {2019}, url = {https://eprint.iacr.org/2019/990}, } @misc{cryptoeprint:2019:991, author = {Jing Yang and Thomas Johansson and Alexander Maximov}, title = {Vectorized linear approximations for attacks on SNOW 3G}, howpublished = {Cryptology ePrint Archive, Report 2019/991}, year = {2019}, url = {https://eprint.iacr.org/2019/991}, } @misc{cryptoeprint:2019:992, author = {Tetsu Iwata and Mustafa Khairallah and Kazuhiko Minematsu and Thomas Peyrin}, title = {Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2019/992}, year = {2019}, url = {https://eprint.iacr.org/2019/992}, } @misc{cryptoeprint:2019:993, author = {Louis Tajan and Dirk Westhoff and Frederik Armknecht}, title = {Private Set Relations with Bloom Filters for Outsourced SLA Validation}, howpublished = {Cryptology ePrint Archive, Report 2019/993}, year = {2019}, url = {https://eprint.iacr.org/2019/993}, } @misc{cryptoeprint:2019:994, author = {Lilya Budaghyan and Tor Helleseth and Nikolay Kaleyski}, title = {A new family of APN quadrinomials}, howpublished = {Cryptology ePrint Archive, Report 2019/994}, year = {2019}, url = {https://eprint.iacr.org/2019/994}, } @misc{cryptoeprint:2019:995, author = {Douglas Wikström}, title = {Blackbox Constructions from Mix-Nets}, howpublished = {Cryptology ePrint Archive, Report 2019/995}, year = {2019}, url = {https://eprint.iacr.org/2019/995}, } @misc{cryptoeprint:2019:996, author = {Shaanan Cohney and Andrew Kwong and Shachar Paz and Daniel Genkin and Nadia Heninger and Eyal Ronen and Yuval Yarom}, title = {Pseudorandom Black Swans: Cache Attacks on CTR_DRBG}, howpublished = {Cryptology ePrint Archive, Report 2019/996}, year = {2019}, url = {https://eprint.iacr.org/2019/996}, } @misc{cryptoeprint:2019:997, author = {James Bartusek and Liron Bronfman and Justin Holmgren and Fermi Ma and Ron Rothblum}, title = {On the (In)security of Kilian-Based SNARGs}, howpublished = {Cryptology ePrint Archive, Report 2019/997}, year = {2019}, url = {https://eprint.iacr.org/2019/997}, } @misc{cryptoeprint:2019:998, author = {Arpita Patra and Divya Ravi}, title = {Beyond Honest Majority: The Round Complexity of Fair and Robust Multi-party Computation}, howpublished = {Cryptology ePrint Archive, Report 2019/998}, year = {2019}, url = {https://eprint.iacr.org/2019/998}, } @misc{cryptoeprint:2019:999, author = {Pierrick Méaux}, title = {On the Fast Algebraic Immunity of Majority Functions}, howpublished = {Cryptology ePrint Archive, Report 2019/999}, year = {2019}, url = {https://eprint.iacr.org/2019/999}, } @misc{cryptoeprint:2020:001, author = {Manoj Gyawali and Daniele Di Tullio}, title = {Elliptic Curves of Nearly Prime Order}, howpublished = {Cryptology ePrint Archive, Report 2020/001}, year = {2020}, url = {https://eprint.iacr.org/2020/001}, } @misc{cryptoeprint:2020:002, author = {Qichun Wang}, title = {On a Conjecture of O'Donnell}, howpublished = {Cryptology ePrint Archive, Report 2020/002}, year = {2020}, url = {https://eprint.iacr.org/2020/002}, } @misc{cryptoeprint:2020:003, author = {Wulu Li and Lei Chen and Xin Lai and Xiao Zhang and Jiajun Xin}, title = {New Constructions of Traceable Range Proofs: Towards Multiple Regulation and Joint Regulation}, howpublished = {Cryptology ePrint Archive, Report 2020/003}, year = {2020}, url = {https://eprint.iacr.org/2020/003}, } @misc{cryptoeprint:2020:004, author = {Wulu Li and Lei Chen and Xin Lai and Xiao Zhang and Jiajun Xin}, title = {BPCEX: Towards Blockchain-based Privacy-preserving Currency Exchange}, howpublished = {Cryptology ePrint Archive, Report 2020/004}, year = {2020}, url = {https://eprint.iacr.org/2020/004}, } @misc{cryptoeprint:2020:005, author = {M. R. Mirzaee Shamsabad and S. M. Dehnavi}, title = {Lai-Massey Scheme Revisited}, howpublished = {Cryptology ePrint Archive, Report 2020/005}, year = {2020}, url = {https://eprint.iacr.org/2020/005}, } @misc{cryptoeprint:2020:006, author = {André Chailloux and Thomas Debris-Alazard}, title = {Tight and Optimal Reductions for Signatures based on Average Trapdoor Preimage Sampleable Functions and Applications to Code-Based Signatures}, howpublished = {Cryptology ePrint Archive, Report 2020/006}, year = {2020}, url = {https://eprint.iacr.org/2020/006}, } @misc{cryptoeprint:2020:007, author = {Nabil Alkeilani Alkadri and Rachid El Bansarkhani and Johannes Buchmann}, title = {On Lattice-Based Interactive Protocols with Aborts}, howpublished = {Cryptology ePrint Archive, Report 2020/007}, year = {2020}, url = {https://eprint.iacr.org/2020/007}, } @misc{cryptoeprint:2020:008, author = {Oriol Farràs}, title = {Secret Sharing Schemes for Ports of Matroids of Rank 3}, howpublished = {Cryptology ePrint Archive, Report 2020/008}, year = {2020}, url = {https://eprint.iacr.org/2020/008}, } @misc{cryptoeprint:2020:009, author = {Thomas Pornin}, title = {Efficient Elliptic Curve Operations On Microcontrollers With Finite Field Extensions}, howpublished = {Cryptology ePrint Archive, Report 2020/009}, year = {2020}, url = {https://eprint.iacr.org/2020/009}, } @misc{cryptoeprint:2020:010, author = {Dmitrii Koshelev}, title = {Double point compression for elliptic curves of $j$-invariant $0$}, howpublished = {Cryptology ePrint Archive, Report 2020/010}, year = {2020}, url = {https://eprint.iacr.org/2020/010}, } @misc{cryptoeprint:2020:011, author = {Ming Li,Jian Weng, Jia-Nan Liu, Xiaodong Lin, Charlie Obimbo}, title = {BB-VDF: Enabling Accountability and Fine-grained Access Control for Vehicular Digital Forensics through Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2020/011}, year = {2020}, url = {https://eprint.iacr.org/2020/011}, } @misc{cryptoeprint:2020:012, author = {Erdem Alkim and Yusuf Alper Bilgin and Murat Cenk and François Gérard}, title = {Cortex-M4 Optimizations for \{R,M\}LWE Schemes}, howpublished = {Cryptology ePrint Archive, Report 2020/012}, year = {2020}, url = {https://eprint.iacr.org/2020/012}, } @misc{cryptoeprint:2020:013, author = {Nir Bitansky and Idan Gerichter}, title = {On the Cryptographic Hardness of Local Search}, howpublished = {Cryptology ePrint Archive, Report 2020/013}, year = {2020}, url = {https://eprint.iacr.org/2020/013}, } @misc{cryptoeprint:2020:014, author = {Gaëtan Leurent and Thomas Peyrin}, title = {SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust}, howpublished = {Cryptology ePrint Archive, Report 2020/014}, year = {2020}, url = {https://eprint.iacr.org/2020/014}, } @misc{cryptoeprint:2020:015, author = {Hao Chen and Wei Dai and Miran Kim and Yongsoo Song}, title = {Efficient Homomorphic Conversion Between (Ring) LWE Ciphertexts}, howpublished = {Cryptology ePrint Archive, Report 2020/015}, year = {2020}, url = {https://eprint.iacr.org/2020/015}, } @misc{cryptoeprint:2020:016, author = {Jan Camenisch and Manu Drijvers and Anja Lehmann and Gregory Neven and Patrick Towa}, title = {Short Threshold Dynamic Group Signatures}, howpublished = {Cryptology ePrint Archive, Report 2020/016}, year = {2020}, url = {https://eprint.iacr.org/2020/016}, } @misc{cryptoeprint:2020:017, author = {Daniel Gardham and Mark Manulis and Constantin Cătălin Drăgan}, title = {Biometric-Authenticated Searchable Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/017}, year = {2020}, url = {https://eprint.iacr.org/2020/017}, } @misc{cryptoeprint:2020:018, author = {Sarang Noether and Brandon Goodell}, title = {Triptych: logarithmic-sized linkable ring signatures with applications}, howpublished = {Cryptology ePrint Archive, Report 2020/018}, year = {2020}, url = {https://eprint.iacr.org/2020/018}, } @misc{cryptoeprint:2020:019, author = {Suhyeon Lee and Seungjoo Kim}, title = {Short Selling Attack: A Self-Destructive But Profitable 51% Attack On PoS Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2020/019}, year = {2020}, url = {https://eprint.iacr.org/2020/019}, } @misc{cryptoeprint:2020:020, author = {Shangqi Lai and Xingliang Yuan and Shi-Feng Sun and Joseph K. Liu and Ron Steinfeld and Amin Sakzad and Dongxi Liu}, title = {Towards Practical Encrypted Network Traffic Pattern Matching for Secure Middleboxes}, howpublished = {Cryptology ePrint Archive, Report 2020/020}, year = {2020}, url = {https://eprint.iacr.org/2020/020}, } @misc{cryptoeprint:2020:021, author = {Daniel Cervantes-Vázquez and Eduardo Ochoa-Jiménez and Francisco Rodríguez-Henríquez}, title = {eSIDH: the revenge of the SIDH}, howpublished = {Cryptology ePrint Archive, Report 2020/021}, year = {2020}, url = {https://eprint.iacr.org/2020/021}, } @misc{cryptoeprint:2020:022, author = {Kenneth Koon-Ho Wong and Harry Bartlett and Leonie Simpson and Ed Dawson}, title = {Differential Random Fault Attacks on certain CAESAR Stream Ciphers (Supplementary Material)}, howpublished = {Cryptology ePrint Archive, Report 2020/022}, year = {2020}, url = {https://eprint.iacr.org/2020/022}, } @misc{cryptoeprint:2020:023, author = {Riccardo Longo and Alessio Meneghetti and Massimiliano Sala}, title = {Threshold Multi-Signature with an Offline Recovery Party}, howpublished = {Cryptology ePrint Archive, Report 2020/023}, year = {2020}, url = {https://eprint.iacr.org/2020/023}, } @misc{cryptoeprint:2020:024, author = {Ethan Heilman and Sebastien Lipmann and Sharon Goldberg}, title = {The Arwen Trading Protocols (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2020/024}, year = {2020}, url = {https://eprint.iacr.org/2020/024}, } @misc{cryptoeprint:2020:025, author = {Dan Boneh and Saba Eskandarian and Lucjan Hanzlik and Nicola Greco}, title = {Single Secret Leader Election}, howpublished = {Cryptology ePrint Archive, Report 2020/025}, year = {2020}, url = {https://eprint.iacr.org/2020/025}, } @misc{cryptoeprint:2020:026, author = {Wen Wang and Marc Stöttinger}, title = {Post-Quantum Secure Architectures for Automotive Hardware Secure Modules}, howpublished = {Cryptology ePrint Archive, Report 2020/026}, year = {2020}, url = {https://eprint.iacr.org/2020/026}, } @misc{cryptoeprint:2020:027, author = {Alexander Maximov}, title = {On Roots Factorization for PQC Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2020/027}, year = {2020}, url = {https://eprint.iacr.org/2020/027}, } @misc{cryptoeprint:2020:028, author = {Denis Firsov and Ahto Buldas and Ahto Truu and Risto Laanoja}, title = {Verified Security of BLT Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2020/028}, year = {2020}, url = {https://eprint.iacr.org/2020/028}, } @misc{cryptoeprint:2020:029, author = {Seung Geol Choi and Dana Dachman-Soled and Mukul Kulkarni and Arkady Yerukhimovich}, title = {Differentially-Private Multi-Party Sketching for Large-Scale Statistics}, howpublished = {Cryptology ePrint Archive, Report 2020/029}, year = {2020}, url = {https://eprint.iacr.org/2020/029}, } @misc{cryptoeprint:2020:030, author = {Michael Kounavis and Sergej Deutsch and Santosh Ghosh and David Durham}, title = {Κ-Cipher: A Low Latency, Bit Length Parameterizable Cipher}, howpublished = {Cryptology ePrint Archive, Report 2020/030}, year = {2020}, url = {https://eprint.iacr.org/2020/030}, } @misc{cryptoeprint:2020:031, author = {Kuan Cheng and Xin Li and Yu Zheng}, title = {Locally Decodable Codes with Randomized Encoding}, howpublished = {Cryptology ePrint Archive, Report 2020/031}, year = {2020}, url = {https://eprint.iacr.org/2020/031}, } @misc{cryptoeprint:2020:032, author = {Mahdi Sajadieh and Mohsen Mousavi}, title = {A New Approach for the Implementation of Binary Matrices Using SLP Applications}, howpublished = {Cryptology ePrint Archive, Report 2020/032}, year = {2020}, url = {https://eprint.iacr.org/2020/032}, } @misc{cryptoeprint:2020:033, author = {Mohamed Seifelnasr and Hisham S. Galal and Amr M. Youssef}, title = {Scalable Open-Vote Network on Ethereum}, howpublished = {Cryptology ePrint Archive, Report 2020/033}, year = {2020}, url = {https://eprint.iacr.org/2020/033}, } @misc{cryptoeprint:2020:034, author = {Tianjun Ma and Haixia Xu and Peili Li}, title = {SkyEye: A Traceable Scheme for Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2020/034}, year = {2020}, url = {https://eprint.iacr.org/2020/034}, } @misc{cryptoeprint:2020:035, author = {Rakyong Choi and Dongyeon Hong and Kwangjo Kim}, title = {Constant-round Dynamic Group Key Exchange from RLWE Assumption}, howpublished = {Cryptology ePrint Archive, Report 2020/035}, year = {2020}, url = {https://eprint.iacr.org/2020/035}, } @misc{cryptoeprint:2020:036, author = {Yupu Hu and Siyue Dong and Xingting Dong}, title = {Analysis on Aigis-Enc: asymmetrical and symmetrical}, howpublished = {Cryptology ePrint Archive, Report 2020/036}, year = {2020}, url = {https://eprint.iacr.org/2020/036}, } @misc{cryptoeprint:2020:037, author = {Matthias Fitzi and Peter Gaži and Aggelos Kiayias and Alexander Russell}, title = {Proof-of-Stake Blockchain Protocols with Near-Optimal Throughput}, howpublished = {Cryptology ePrint Archive, Report 2020/037}, year = {2020}, url = {https://eprint.iacr.org/2020/037}, } @misc{cryptoeprint:2020:038, author = {Michail Moraitis and Elena Dubrova}, title = {Bitstream Modification Attack on SNOW 3G}, howpublished = {Cryptology ePrint Archive, Report 2020/038}, year = {2020}, url = {https://eprint.iacr.org/2020/038}, } @misc{cryptoeprint:2020:039, author = {Damien Robissout and Gabriel Zaid and Brice Colombier and Lilian Bossuet and Amaury Habrard}, title = {Online Performance Evaluation of Deep Learning Networks for Side-Channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2020/039}, year = {2020}, url = {https://eprint.iacr.org/2020/039}, } @misc{cryptoeprint:2020:040, author = {Pedro Maat C. Massolino and Patrick Longa and Joost Renes and Lejla Batina}, title = {A Compact and Scalable Hardware/Software Co-design of SIKE}, howpublished = {Cryptology ePrint Archive, Report 2020/040}, year = {2020}, url = {https://eprint.iacr.org/2020/040}, } @misc{cryptoeprint:2020:041, author = {Aggelos Kiayias and Saad Quader and Alexander Russell}, title = {Consistency in Proof-of-Stake Blockchains with Concurrent Honest Slot Leaders}, howpublished = {Cryptology ePrint Archive, Report 2020/041}, year = {2020}, url = {https://eprint.iacr.org/2020/041}, } @misc{cryptoeprint:2020:042, author = {Arpita Patra and Ajith Suresh}, title = {BLAZE: Blazing Fast Privacy-Preserving Machine Learning}, howpublished = {Cryptology ePrint Archive, Report 2020/042}, year = {2020}, url = {https://eprint.iacr.org/2020/042}, } @misc{cryptoeprint:2020:043, author = {Jan Camenisch and Manu Drijvers and Anja Lehmann and Gregory Neven and Patrick Towa}, title = {Zone Encryption with Anonymous Authentication for V2V Communication}, howpublished = {Cryptology ePrint Archive, Report 2020/043}, year = {2020}, url = {https://eprint.iacr.org/2020/043}, } @misc{cryptoeprint:2020:044, author = {Alexander Chepurnoy and Amitabh Saxena}, title = {Bypassing Non-Outsourceable Proof-of-Work Schemes Using Collateralized Smart Contracts}, howpublished = {Cryptology ePrint Archive, Report 2020/044}, year = {2020}, url = {https://eprint.iacr.org/2020/044}, } @misc{cryptoeprint:2020:045, author = {Haibat Khan and Benjamin Dowling and Keith M. Martin}, title = {Pragmatic Authenticated Key Agreement for IEEE Std 802.15.6}, howpublished = {Cryptology ePrint Archive, Report 2020/045}, year = {2020}, url = {https://eprint.iacr.org/2020/045}, } @misc{cryptoeprint:2020:046, author = {Orhun Kara and Muhammed F. Esgin}, title = {On Analysis of Lightweight Stream Ciphers with Keyed Update}, howpublished = {Cryptology ePrint Archive, Report 2020/046}, year = {2020}, url = {https://eprint.iacr.org/2020/046}, } @misc{cryptoeprint:2020:047, author = {Tianshuo Cong and Ximing Fu and Xuting Zhou and Yuli Zou and Haining Fan}, title = {New Subquadratic Algorithms for Constructing Lightweight Hadamard MDS Matrices}, howpublished = {Cryptology ePrint Archive, Report 2020/047}, year = {2020}, url = {https://eprint.iacr.org/2020/047}, } @misc{cryptoeprint:2020:048, author = {Changshe Ma and Yiping Gu and Hongfei Li}, title = {Practical Searchable Symmetric Encryption Supporting Conjunctive Queries without Keyword Pair Result Pattern Leakage}, howpublished = {Cryptology ePrint Archive, Report 2020/048}, year = {2020}, url = {https://eprint.iacr.org/2020/048}, } @misc{cryptoeprint:2020:049, author = {Erdem Alkim and Hülya Evkan and Norman Lahr and Ruben Niederhagen and Richard Petri}, title = {ISA Extensions for Finite Field Arithmetic - Accelerating Kyber and NewHope on RISC-V}, howpublished = {Cryptology ePrint Archive, Report 2020/049}, year = {2020}, url = {https://eprint.iacr.org/2020/049}, } @misc{cryptoeprint:2020:050, author = {Pratyush Mishra and Ryan Lehmkuhl and Akshayaram Srinivasan and Wenting Zheng and Raluca Ada Popa}, title = {Delphi: A Cryptographic Inference Service for Neural Networks}, howpublished = {Cryptology ePrint Archive, Report 2020/050}, year = {2020}, url = {https://eprint.iacr.org/2020/050}, } @misc{cryptoeprint:2020:051, author = {Pascal Sasdrich and Begül Bilgin and Michael Hutter and Mark Marson}, title = {Low-Latency Hardware Masking with Application to AES}, howpublished = {Cryptology ePrint Archive, Report 2020/051}, year = {2020}, url = {https://eprint.iacr.org/2020/051}, } @misc{cryptoeprint:2020:052, author = {Mohamed Tolba and Muhammad ElSheikh and Amr M. Youssef}, title = {Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE}, howpublished = {Cryptology ePrint Archive, Report 2020/052}, year = {2020}, url = {https://eprint.iacr.org/2020/052}, } @misc{cryptoeprint:2020:053, author = {Yasuhiko Ikematsu and Shuhei Nakamura }, title = {Security Analysis Against "A New Encryption Scheme for Multivariate Quadratic Systems" }, howpublished = {Cryptology ePrint Archive, Report 2020/053}, year = {2020}, url = {https://eprint.iacr.org/2020/053}, } @misc{cryptoeprint:2020:054, author = {Wen Wang and Shanquan Tian and Bernhard Jungk and Nina Bindel and Patrick Longa and Jakub Szefer}, title = {Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA}, howpublished = {Cryptology ePrint Archive, Report 2020/054}, year = {2020}, url = {https://eprint.iacr.org/2020/054}, } @misc{cryptoeprint:2020:055, author = {Alejandro Cabrera Aldaya and Billy Bob Brumley}, title = {When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA}, howpublished = {Cryptology ePrint Archive, Report 2020/055}, year = {2020}, url = {https://eprint.iacr.org/2020/055}, } @misc{cryptoeprint:2020:056, author = {Zhengzhong JIn and Yunlei Zhao}, title = {AKCN-E8: Compact and Flexible KEM from Ideal Lattice}, howpublished = {Cryptology ePrint Archive, Report 2020/056}, year = {2020}, url = {https://eprint.iacr.org/2020/056}, } @misc{cryptoeprint:2020:057, author = {Elena Kirshanova and Huyen Nguyen and Damien Stehlé and Alexandre Wallet }, title = {On the smoothing parameter and last minimum of random orthogonal lattices}, howpublished = {Cryptology ePrint Archive, Report 2020/057}, year = {2020}, url = {https://eprint.iacr.org/2020/057}, } @misc{cryptoeprint:2020:058, author = {Guilherme Perin and Ileana Buhan and Stjepan Picek}, title = {Learning when to stop: a mutual information approach to fight overfitting in profiled side-channel analysis}, howpublished = {Cryptology ePrint Archive, Report 2020/058}, year = {2020}, url = {https://eprint.iacr.org/2020/058}, } @misc{cryptoeprint:2020:059, author = {Satō Shinichi}, title = {ARX-KW, a family of key wrapping constructions using SipHash and ChaCha}, howpublished = {Cryptology ePrint Archive, Report 2020/059}, year = {2020}, url = {https://eprint.iacr.org/2020/059}, } @misc{cryptoeprint:2020:060, author = {Antonio Faonio and Maria Isabel Gonzalez Vasco and Claudio Soriente and Hien Thi Thu Truong}, title = {Auditable Asymmetric Password Authenticated Public Key Establishment}, howpublished = {Cryptology ePrint Archive, Report 2020/060}, year = {2020}, url = {https://eprint.iacr.org/2020/060}, } @misc{cryptoeprint:2020:061, author = {Gary Yu}, title = {Simple Schnorr Signature with Pedersen Commitment as Key}, howpublished = {Cryptology ePrint Archive, Report 2020/061}, year = {2020}, url = {https://eprint.iacr.org/2020/061}, } @misc{cryptoeprint:2020:062, author = {Bezhad Abdolmaleki and Sebastian Ramacher and Daniel Slamanig}, title = {Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically}, howpublished = {Cryptology ePrint Archive, Report 2020/062}, year = {2020}, url = {https://eprint.iacr.org/2020/062}, } @misc{cryptoeprint:2020:063, author = {Aurelien Greuet and Simon Montoya and Guenael Renault}, title = {Attack on LAC Key Exchange in Misuse Situation}, howpublished = {Cryptology ePrint Archive, Report 2020/063}, year = {2020}, url = {https://eprint.iacr.org/2020/063}, } @misc{cryptoeprint:2020:064, author = {Geng Wang and Ming Wan and Zhen Liu and Dawu Gu}, title = {Dual System in Lattice: Fully Secure ABE from LWE Assumption}, howpublished = {Cryptology ePrint Archive, Report 2020/064}, year = {2020}, url = {https://eprint.iacr.org/2020/064}, } @misc{cryptoeprint:2020:065, author = {Jake Massimo and Kenneth G. Paterson}, title = {A Performant, Misuse-Resistant API for Primality Testing}, howpublished = {Cryptology ePrint Archive, Report 2020/065}, year = {2020}, url = {https://eprint.iacr.org/2020/065}, } @misc{cryptoeprint:2020:066, author = {Raymond Cheng and William Scott and Elisaweta Masserova and Irene Zhang and Vipul Goyal and Thomas Anderson and Arvind Krishnamurthy and Bryan Parno}, title = {Talek: Private Group Messaging with Hidden Access Patterns}, howpublished = {Cryptology ePrint Archive, Report 2020/066}, year = {2020}, url = {https://eprint.iacr.org/2020/066}, } @misc{cryptoeprint:2020:067, author = {Taylor R Campbell}, title = {Daence: Salsa20 and ChaCha in Deterministic Authenticated Encryption with no noNCEnse}, howpublished = {Cryptology ePrint Archive, Report 2020/067}, year = {2020}, url = {https://eprint.iacr.org/2020/067}, } @misc{cryptoeprint:2020:068, author = {Pranab Chakraborty and Subhamoy Maitra}, title = {Further Clarification on Mantin's Digraph Repetition Bias in RC4}, howpublished = {Cryptology ePrint Archive, Report 2020/068}, year = {2020}, url = {https://eprint.iacr.org/2020/068}, } @misc{cryptoeprint:2020:069, author = {Dima Grigoriev and Vladimir Shpilrain}, title = {RSA and redactable blockchains}, howpublished = {Cryptology ePrint Archive, Report 2020/069}, year = {2020}, url = {https://eprint.iacr.org/2020/069}, } @misc{cryptoeprint:2020:070, author = {Thomas Agrikola and Dennis Hofheinz and Julia Kastner}, title = {On Instantiating the Algebraic Group Model from Falsifiable Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2020/070}, year = {2020}, url = {https://eprint.iacr.org/2020/070}, } @misc{cryptoeprint:2020:071, author = {Dimitrios Sikeridis and Panos Kampanakis and Michael Devetsikiotis}, title = {Post-Quantum Authentication in TLS 1.3: A Performance Study}, howpublished = {Cryptology ePrint Archive, Report 2020/071}, year = {2020}, url = {https://eprint.iacr.org/2020/071}, } @misc{cryptoeprint:2020:072, author = {Ben Kreuter and Tancrede Lepoint and Michele Orru and Mariana Raykova}, title = {Anonymous Tokens with Private Metadata Bit}, howpublished = {Cryptology ePrint Archive, Report 2020/072}, year = {2020}, url = {https://eprint.iacr.org/2020/072}, } @misc{cryptoeprint:2020:073, author = {Fabio Banfi and Ueli Maurer}, title = {Anonymous Symmetric-Key Communication}, howpublished = {Cryptology ePrint Archive, Report 2020/073}, year = {2020}, url = {https://eprint.iacr.org/2020/073}, } @misc{cryptoeprint:2020:074, author = {Daniel R. L. Brown}, title = {Rolling up sleeves when subversion's in a field?}, howpublished = {Cryptology ePrint Archive, Report 2020/074}, year = {2020}, url = {https://eprint.iacr.org/2020/074}, } @misc{cryptoeprint:2020:075, author = {Rishiraj Bhattacharyya}, title = {Memory-Tight Reductions for Practical Key Encapsulation Mechanisms}, howpublished = {Cryptology ePrint Archive, Report 2020/075}, year = {2020}, url = {https://eprint.iacr.org/2020/075}, } @misc{cryptoeprint:2020:076, author = {Charbel Saliba and Laura Luzzi and Cong Ling}, title = {Wyner-Ziv reconciliation for key exchange based on Ring-LWE}, howpublished = {Cryptology ePrint Archive, Report 2020/076}, year = {2020}, url = {https://eprint.iacr.org/2020/076}, } @misc{cryptoeprint:2020:077, author = {Thomas Häner and Samuel Jaques and Michael Naehrig and Martin Roetteler and Mathias Soeken}, title = {Improved Quantum Circuits for Elliptic Curve Discrete Logarithms}, howpublished = {Cryptology ePrint Archive, Report 2020/077}, year = {2020}, url = {https://eprint.iacr.org/2020/077}, } @misc{cryptoeprint:2020:078, author = {Kentaro Tamura and Yutaka Shikano}, title = {Quantum Random Number Generation with the Superconducting Quantum Computer IBM 20Q Tokyo}, howpublished = {Cryptology ePrint Archive, Report 2020/078}, year = {2020}, url = {https://eprint.iacr.org/2020/078}, } @misc{cryptoeprint:2020:079, author = {Eman Salem Alashwali and Pawel Szalachowski and Andrew Martin}, title = {Exploring HTTPS Security Inconsistencies: A Cross-Regional Perspective}, howpublished = {Cryptology ePrint Archive, Report 2020/079}, year = {2020}, url = {https://eprint.iacr.org/2020/079}, } @misc{cryptoeprint:2020:080, author = {Benny Applebaum and Amos Beimel and Oded Nir and Naty Peter}, title = {Better Secret-Sharing via Robust Conditional Disclosure of Secrets}, howpublished = {Cryptology ePrint Archive, Report 2020/080}, year = {2020}, url = {https://eprint.iacr.org/2020/080}, } @misc{cryptoeprint:2020:081, author = {Justin Drake and Ariel Gabizon}, title = {Efficient polynomial commitment schemes for multiple points and polynomials}, howpublished = {Cryptology ePrint Archive, Report 2020/081}, year = {2020}, url = {https://eprint.iacr.org/2020/081}, } @misc{cryptoeprint:2020:082, author = {Anand Aiyer and Xiao Liang and Nilu Nalini and Omkant Pandey}, title = {Random Walks and Concurrent Zero-Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2020/082}, year = {2020}, url = {https://eprint.iacr.org/2020/082}, } @misc{cryptoeprint:2020:083, author = {Weikeng Chen and Raluca Ada Popa}, title = {Metal: A Metadata-Hiding File-Sharing System}, howpublished = {Cryptology ePrint Archive, Report 2020/083}, year = {2020}, url = {https://eprint.iacr.org/2020/083}, } @misc{cryptoeprint:2020:084, author = {Guilhem Castagnos and Dario Catalano and Fabien Laguillaumie and Federico Savasta and Ida Tucker}, title = {Bandwidth-efficient threshold EC-DSA}, howpublished = {Cryptology ePrint Archive, Report 2020/084}, year = {2020}, url = {https://eprint.iacr.org/2020/084}, } @misc{cryptoeprint:2020:085, author = {Ben Nassi and Dudi Nassi and Raz Ben-Netanel and Yisroel Mirsky and Oleg Drokin and Yuval Elovici}, title = {Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems}, howpublished = {Cryptology ePrint Archive, Report 2020/085}, year = {2020}, url = {https://eprint.iacr.org/2020/085}, } @misc{cryptoeprint:2020:086, author = {Daniele Micciancio and Yuriy Polyakov}, title = {Bootstrapping in FHEW-like Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2020/086}, year = {2020}, url = {https://eprint.iacr.org/2020/086}, } @misc{cryptoeprint:2020:087, author = {Elaine Shi}, title = {Streamlined Blockchains: A Simple and Elegant Approach (A Tutorial and Survey)}, howpublished = {Cryptology ePrint Archive, Report 2020/087}, year = {2020}, url = {https://eprint.iacr.org/2020/087}, } @misc{cryptoeprint:2020:088, author = {Benjamin Y Chan and Elaine Shi}, title = {Streamlet: Textbook Streamlined Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2020/088}, year = {2020}, url = {https://eprint.iacr.org/2020/088}, } @misc{cryptoeprint:2020:089, author = {Chen-Dong Ye and Tian Tian and Fan-Yang Zeng}, title = {The MILP-Aided Conditional Differential Attack and Its Application to Trivium}, howpublished = {Cryptology ePrint Archive, Report 2020/089}, year = {2020}, url = {https://eprint.iacr.org/2020/089}, } @misc{cryptoeprint:2020:090, author = {Suvradip Chakraborty and Manoj Prabhakaran and Daniel Wichs}, title = {Witness Maps and Applications}, howpublished = {Cryptology ePrint Archive, Report 2020/090}, year = {2020}, url = {https://eprint.iacr.org/2020/090}, } @misc{cryptoeprint:2020:091, author = {Jonathan Takeshita and Matthew Schoenbauer and Ryan Karl and Taeho Jung}, title = {Enabling Faster Operations for Deeper Circuits in Full RNS Variants of FV-like Somewhat Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/091}, year = {2020}, url = {https://eprint.iacr.org/2020/091}, } @misc{cryptoeprint:2020:092, author = {Daniel Jost and Ueli Maurer}, title = {Overcoming Impossibility Results in Composable Security using Interval-Wise Guarantees}, howpublished = {Cryptology ePrint Archive, Report 2020/092}, year = {2020}, url = {https://eprint.iacr.org/2020/092}, } @misc{cryptoeprint:2020:093, author = {Romain Gay}, title = {A New Paradigm for Public-Key Functional Encryption for Degree-2 Polynomials}, howpublished = {Cryptology ePrint Archive, Report 2020/093}, year = {2020}, url = {https://eprint.iacr.org/2020/093}, } @misc{cryptoeprint:2020:094, author = {Michael Davidson and Tyler Diamond}, title = {On the Profitability of Selfish Mining Against Multiple Difficulty Adjustment Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2020/094}, year = {2020}, url = {https://eprint.iacr.org/2020/094}, } @misc{cryptoeprint:2020:095, author = {Zhongxiang Zheng and Anyu Wang and Haining Fan and Chunhuan Zhao and Chao Liu and Xue Zhang}, title = {SCloud: Public Key Encryption and Key Encapsulation Mechanism Based on Learning with Errors}, howpublished = {Cryptology ePrint Archive, Report 2020/095}, year = {2020}, url = {https://eprint.iacr.org/2020/095}, } @misc{cryptoeprint:2020:096, author = {David Galindo and Jia Liu and Mihai Ordean and Jin-Mann Wong}, title = {Fully Distributed Verifiable Random Functions and their Application to Decentralised Random Beacons}, howpublished = {Cryptology ePrint Archive, Report 2020/096}, year = {2020}, url = {https://eprint.iacr.org/2020/096}, } @misc{cryptoeprint:2020:097, author = {Stanislav S. Malakhov}, title = {Research on OpenSSL Elliptic Curves for Compliance with the Russian National Digital Signature Standard}, howpublished = {Cryptology ePrint Archive, Report 2020/097}, year = {2020}, url = {https://eprint.iacr.org/2020/097}, } @misc{cryptoeprint:2020:098, author = {Novak Kaluđerović and Thorsten Kleinjung and Dušan Kostić}, title = {Improved key recovery on the Legendre PRF}, howpublished = {Cryptology ePrint Archive, Report 2020/098}, year = {2020}, url = {https://eprint.iacr.org/2020/098}, } @misc{cryptoeprint:2020:099, author = {Benjamin Dowling and Torben Brandt Hansen and Kenneth G. Paterson}, title = {Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2020/099}, year = {2020}, url = {https://eprint.iacr.org/2020/099}, } @misc{cryptoeprint:2020:1000, author = {Ioana Boureanu and Constantin Catalin Dragan and François Dupressoir and David Gerault and Pascal Lafourcade }, title = {Precise and Mechanised Models and Proofs for Distance-Bounding and an Application to Contactless Payments}, howpublished = {Cryptology ePrint Archive, Report 2020/1000}, year = {2020}, url = {https://eprint.iacr.org/2020/1000}, } @misc{cryptoeprint:2020:1001, author = {Xunhua Wang and Ben Huson}, title = {Robust distributed symmetric-key encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/1001}, year = {2020}, url = {https://eprint.iacr.org/2020/1001}, } @misc{cryptoeprint:2020:1002, author = {Deevashwer Rathee and Mayank Rathee and Nishant Kumar and Nishanth Chandran and Divya Gupta and Aseem Rastogi and Rahul Sharma}, title = {CrypTFlow2: Practical 2-Party Secure Inference}, howpublished = {Cryptology ePrint Archive, Report 2020/1002}, year = {2020}, url = {https://eprint.iacr.org/2020/1002}, } @misc{cryptoeprint:2020:1003, author = {Aayush Jain and Huijia Lin and Amit Sahai}, title = {Indistinguishability Obfuscation from Well-Founded Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2020/1003}, year = {2020}, url = {https://eprint.iacr.org/2020/1003}, } @misc{cryptoeprint:2020:1004, author = {Nick Frymann and Daniel Gardham and Franziskus Kiefer and Emil Lundberg and Mark Manulis and Dain Nilsson}, title = {Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for W3C WebAuthn}, howpublished = {Cryptology ePrint Archive, Report 2020/1004}, year = {2020}, url = {https://eprint.iacr.org/2020/1004}, } @misc{cryptoeprint:2020:1005, author = {Fabio Campos and Matthias J. Kannwischer and Michael Meyer and Hiroshi Onuki and Marc Stöttinger}, title = {Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations against Fault Injection Attacks}, howpublished = {Cryptology ePrint Archive, Report 2020/1005}, year = {2020}, url = {https://eprint.iacr.org/2020/1005}, } @misc{cryptoeprint:2020:1006, author = {Jason LeGrow and Aaron Hutchinson}, title = {An Analysis of Fault Attacks on CSIDH}, howpublished = {Cryptology ePrint Archive, Report 2020/1006}, year = {2020}, url = {https://eprint.iacr.org/2020/1006}, } @misc{cryptoeprint:2020:1007, author = {Alessandro Budroni and Benjamin Chetioui and Ermes Franch}, title = {Attacks on Integer-RLWE}, howpublished = {Cryptology ePrint Archive, Report 2020/1007}, year = {2020}, url = {https://eprint.iacr.org/2020/1007}, } @misc{cryptoeprint:2020:1008, author = {Leah Lathrop }, title = {Differential Power Analysis Attacks on Different Implementations of AES with the ChipWhisperer Nano}, howpublished = {Cryptology ePrint Archive, Report 2020/1008}, year = {2020}, url = {https://eprint.iacr.org/2020/1008}, } @misc{cryptoeprint:2020:1009, author = {Steven D. Galbraith and Lukas Zobernig}, title = {Obfuscating Finite Automata}, howpublished = {Cryptology ePrint Archive, Report 2020/1009}, year = {2020}, url = {https://eprint.iacr.org/2020/1009}, } @misc{cryptoeprint:2020:100, author = {Claude Carlet and Kwang Ho Kim and Sihem Mesnager}, title = {A direct proof of APN-ness of the Kasami functions}, howpublished = {Cryptology ePrint Archive, Report 2020/100}, year = {2020}, url = {https://eprint.iacr.org/2020/100}, } @misc{cryptoeprint:2020:1010, author = {Romain Gay and Rafael Pass}, title = {Indistinguishability Obfuscation from Circular Security}, howpublished = {Cryptology ePrint Archive, Report 2020/1010}, year = {2020}, url = {https://eprint.iacr.org/2020/1010}, } @misc{cryptoeprint:2020:1011, author = {Tancrède Lepoint and Sarvar Patel and Mariana Raykova and Karn Seth and Ni Trieu}, title = {Private Join and Compute from PIR with Default}, howpublished = {Cryptology ePrint Archive, Report 2020/1011}, year = {2020}, url = {https://eprint.iacr.org/2020/1011}, } @misc{cryptoeprint:2020:1012, author = {Yi-Fu Lai and Steven D. Galbraith and Cyprien Delpech de Saint Guilhem}, title = {Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2020/1012}, year = {2020}, url = {https://eprint.iacr.org/2020/1012}, } @misc{cryptoeprint:2020:1013, author = {Shou-Ching Hsiao and Zi-Yuan Liu and Raylin Tso}, title = {A Study on Privacy-Preserving GRU Inference Framework}, howpublished = {Cryptology ePrint Archive, Report 2020/1013}, year = {2020}, url = {https://eprint.iacr.org/2020/1013}, } @misc{cryptoeprint:2020:1014, author = {Yuntao Liu and Ankur Srivastava}, title = {GANRED: GAN-based Reverse Engineering of DNNs via Cache Side-Channel}, howpublished = {Cryptology ePrint Archive, Report 2020/1014}, year = {2020}, url = {https://eprint.iacr.org/2020/1014}, } @misc{cryptoeprint:2020:1015, author = {Vasyl Ustimenko }, title = {On Multivariate Algorithms of Digital Signatures of Linear Degree and Low Density.}, howpublished = {Cryptology ePrint Archive, Report 2020/1015}, year = {2020}, url = {https://eprint.iacr.org/2020/1015}, } @misc{cryptoeprint:2020:1016, author = {Abhishek Chakraborty and Ankit Mondal and Ankur Srivastava}, title = {Hardware-Assisted Intellectual Property Protection of Deep Learning Models}, howpublished = {Cryptology ePrint Archive, Report 2020/1016}, year = {2020}, url = {https://eprint.iacr.org/2020/1016}, } @misc{cryptoeprint:2020:1017, author = {Andrey Sobol and Anastasiia Kondaurova}, title = {Governance framework for Quipuswap - automated decentralized exchange}, howpublished = {Cryptology ePrint Archive, Report 2020/1017}, year = {2020}, url = {https://eprint.iacr.org/2020/1017}, } @misc{cryptoeprint:2020:1018, author = {Steven D. Galbraith and Trey Li}, title = {Big Subset and Small Superset Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2020/1018}, year = {2020}, url = {https://eprint.iacr.org/2020/1018}, } @misc{cryptoeprint:2020:1019, author = {Viet Tung Hoang and Yaobin Shen}, title = {Security of Streaming Encryption in Google's Tink Library}, howpublished = {Cryptology ePrint Archive, Report 2020/1019}, year = {2020}, url = {https://eprint.iacr.org/2020/1019}, } @misc{cryptoeprint:2020:101, author = {Haibat Khan and Keith M. Martin}, title = {A Survey of Subscription Privacy on the 5G Radio Interface - The Past, Present and Future}, howpublished = {Cryptology ePrint Archive, Report 2020/101}, year = {2020}, url = {https://eprint.iacr.org/2020/101}, } @misc{cryptoeprint:2020:1020, author = {Katharina Boudgoust and Corentin Jeudy and Adeline Roux-Langlois and Weiqiang Wen}, title = {Towards Classical Hardness of Module-LWE: The Linear Rank Case}, howpublished = {Cryptology ePrint Archive, Report 2020/1020}, year = {2020}, url = {https://eprint.iacr.org/2020/1020}, } @misc{cryptoeprint:2020:1021, author = {Christian Badertscher and Peter Gaži and Aggelos Kiayias and Alexander Russell and Vassilis Zikas}, title = {Consensus Redux: Distributed Ledgers in the Face of Adversarial Supremacy}, howpublished = {Cryptology ePrint Archive, Report 2020/1021}, year = {2020}, url = {https://eprint.iacr.org/2020/1021}, } @misc{cryptoeprint:2020:1022, author = {Alan Szepieniec}, title = {Polynomial IOPs for Linear Algebra Relations}, howpublished = {Cryptology ePrint Archive, Report 2020/1022}, year = {2020}, url = {https://eprint.iacr.org/2020/1022}, } @misc{cryptoeprint:2020:1023, author = {Jintai Ding and Doug Emery and Johannes Mueller and Peter Y. A. Ryan and Vonn Kee Wong}, title = {Post-Quantum Anonymous Veto Networks}, howpublished = {Cryptology ePrint Archive, Report 2020/1023}, year = {2020}, url = {https://eprint.iacr.org/2020/1023}, } @misc{cryptoeprint:2020:1024, author = {Zvika Brakerski and Nico Döttling and Sanjam Garg and Giulio Malavolta}, title = {Factoring and Pairings are not Necessary for iO: Circular-Secure LWE Suffices}, howpublished = {Cryptology ePrint Archive, Report 2020/1024}, year = {2020}, url = {https://eprint.iacr.org/2020/1024}, } @misc{cryptoeprint:2020:1025, author = {Seyyed Arash Azimi and Adrián Ranea and Mahmoud Salmasizadeh and Javad Mohajeri and Mohammad Reza Aref and Vincent Rijmen}, title = {A Bit-Vector Differential Model for the Modular Addition by a Constant}, howpublished = {Cryptology ePrint Archive, Report 2020/1025}, year = {2020}, url = {https://eprint.iacr.org/2020/1025}, } @misc{cryptoeprint:2020:1026, author = {Junqing Gong and Haifeng Qian}, title = {Simple and Efficient FE for Quadratic Functions}, howpublished = {Cryptology ePrint Archive, Report 2020/1026}, year = {2020}, url = {https://eprint.iacr.org/2020/1026}, } @misc{cryptoeprint:2020:1027, author = {Hu Xiong and Yingzhe Hou and Xin Huang and Saru Kumari}, title = {Certificate-Based Parallel Key-Insulated Aggregate Signature Against Fully Chosen-Key Attacks for Industrial Internet of Things}, howpublished = {Cryptology ePrint Archive, Report 2020/1027}, year = {2020}, url = {https://eprint.iacr.org/2020/1027}, } @misc{cryptoeprint:2020:1028, author = {Craig Gotsman and Kai Hormann}, title = {Secure Data Hiding for Contact Tracing}, howpublished = {Cryptology ePrint Archive, Report 2020/1028}, year = {2020}, url = {https://eprint.iacr.org/2020/1028}, } @misc{cryptoeprint:2020:1029, author = {Hannah Davis and Felix Günther}, title = {Tighter Proofs for the SIGMA and TLS 1.3 Key Exchange Protocols}, howpublished = {Cryptology ePrint Archive, Report 2020/1029}, year = {2020}, url = {https://eprint.iacr.org/2020/1029}, } @misc{cryptoeprint:2020:102, author = {Boxin Zhao and Xiaoyang Dong and Keting Jia}, title = {New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect}, howpublished = {Cryptology ePrint Archive, Report 2020/102}, year = {2020}, url = {https://eprint.iacr.org/2020/102}, } @misc{cryptoeprint:2020:1030, author = {Xiaoyang Dong and Siwei Sun and Danping Shi and Fei Gao and Xiaoyun Wang and Lei Hu}, title = {Quantum Collision Attacks on AES-like Hashing with Low Quantum Random Access Memories}, howpublished = {Cryptology ePrint Archive, Report 2020/1030}, year = {2020}, url = {https://eprint.iacr.org/2020/1030}, } @misc{cryptoeprint:2020:1031, author = {Yang Yu and Michail Moraitis and Elena Dubrova}, title = {Profiled Deep Learning Side-Channel Attack on a Protected Arbiter PUF Combined with Bitstream Modification}, howpublished = {Cryptology ePrint Archive, Report 2020/1031}, year = {2020}, url = {https://eprint.iacr.org/2020/1031}, } @misc{cryptoeprint:2020:1032, author = {Tim Beyne and Chaoyun Li}, title = {Cryptanalysis of the MALICIOUS Framework}, howpublished = {Cryptology ePrint Archive, Report 2020/1032}, year = {2020}, url = {https://eprint.iacr.org/2020/1032}, } @misc{cryptoeprint:2020:1033, author = {Runchao Han and Jiangshan Yu and Haoyu Lin}, title = {RandChain: Decentralised Randomness Beacon from Sequential Proof-of-Work}, howpublished = {Cryptology ePrint Archive, Report 2020/1033}, year = {2020}, url = {https://eprint.iacr.org/2020/1033}, } @misc{cryptoeprint:2020:1034, author = {Fukang Liu and Takanori Isobe and Willi Meier}, title = {Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques}, howpublished = {Cryptology ePrint Archive, Report 2020/1034}, year = {2020}, url = {https://eprint.iacr.org/2020/1034}, } @misc{cryptoeprint:2020:1035, author = {Jyotirmoy Pramanik and Avishek Adhikari}, title = {Evolving Secret Sharing with Essential Participants}, howpublished = {Cryptology ePrint Archive, Report 2020/1035}, year = {2020}, url = {https://eprint.iacr.org/2020/1035}, } @misc{cryptoeprint:2020:1036, author = {Arthur Van Der Merwe and David Paul and Jelena Schmalz and Timothy M. Schaerf}, title = {Security in banking}, howpublished = {Cryptology ePrint Archive, Report 2020/1036}, year = {2020}, url = {https://eprint.iacr.org/2020/1036}, } @misc{cryptoeprint:2020:1037, author = {Yihong Zhu and Min Zhu and Bohan Yang and Wenping Zhu and Chenchen Deng and Chen Chen and Shaojun Wei and Leibo Liu}, title = {A High-performance Hardware Implementation of Saber Based on Karatsuba Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2020/1037}, year = {2020}, url = {https://eprint.iacr.org/2020/1037}, } @misc{cryptoeprint:2020:1038, author = {Prasanna Ravi and Romain Poussier and Shivam Bhasin and Anupam Chattopadhyay}, title = {On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT - A Performance Evaluation Study over Kyber and Dilithium on the ARM Cortex-M4}, howpublished = {Cryptology ePrint Archive, Report 2020/1038}, year = {2020}, url = {https://eprint.iacr.org/2020/1038}, } @misc{cryptoeprint:2020:1039, author = {Mohammad Sadeq Dousti and Alptekin Küpçü}, title = {Moderated Redactable Blockchains: A Definitional Framework with an Efficient Construct}, howpublished = {Cryptology ePrint Archive, Report 2020/1039}, year = {2020}, url = {https://eprint.iacr.org/2020/1039}, } @misc{cryptoeprint:2020:103, author = {Boxin Zhao and Xiaoyang Dong and Keting Jia and Willi Meier}, title = {Improved Related-Tweakey Rectangle Attacks on Reduced-round Deoxys-BC-384 and Deoxys-I-256-128}, howpublished = {Cryptology ePrint Archive, Report 2020/103}, year = {2020}, url = {https://eprint.iacr.org/2020/103}, } @misc{cryptoeprint:2020:1040, author = {Hemi Leibowitz and Amir Herzberg and Ewa Syta and Sara Wrótniak}, title = {The Modular Specifications Security Framework}, howpublished = {Cryptology ePrint Archive, Report 2020/1040}, year = {2020}, url = {https://eprint.iacr.org/2020/1040}, } @misc{cryptoeprint:2020:1041, author = {Abraham Westerbaan and Bas Westerbaan}, title = {Sign in finite fields}, howpublished = {Cryptology ePrint Archive, Report 2020/1041}, year = {2020}, url = {https://eprint.iacr.org/2020/1041}, } @misc{cryptoeprint:2020:1042, author = {Hoeteck Wee and Daniel Wichs}, title = {Candidate Obfuscation via Oblivious LWE Sampling}, howpublished = {Cryptology ePrint Archive, Report 2020/1042}, year = {2020}, url = {https://eprint.iacr.org/2020/1042}, } @misc{cryptoeprint:2020:1043, author = {Ian McQuoid and Mike Rosulek and Lawrence Roy}, title = {Minimal Symmetric PAKE and 1-out-of-N OT from Programmable-Once Public Functions}, howpublished = {Cryptology ePrint Archive, Report 2020/1043}, year = {2020}, url = {https://eprint.iacr.org/2020/1043}, } @misc{cryptoeprint:2020:1044, author = {Benjamin Dowling and Marc Fischlin and Felix Günther and Douglas Stebila}, title = {A Cryptographic Analysis of the TLS 1.3 Handshake Protocol}, howpublished = {Cryptology ePrint Archive, Report 2020/1044}, year = {2020}, url = {https://eprint.iacr.org/2020/1044}, } @misc{cryptoeprint:2020:1045, author = {Dhiman Saha and Yu Sasaki and Danping Shi and Ferdinand Sibleyras and Siwei Sun and Yingjie Zhang}, title = {On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2020/1045}, year = {2020}, url = {https://eprint.iacr.org/2020/1045}, } @misc{cryptoeprint:2020:1046, author = {ZUC Design Team }, title = {On the Linear Distinguishing Attack against ZUC-256 Stream Cipher}, howpublished = {Cryptology ePrint Archive, Report 2020/1046}, year = {2020}, url = {https://eprint.iacr.org/2020/1046}, } @misc{cryptoeprint:2020:1047, author = {Yiwen Gao and Yongbin Zhou}, title = {Side-channel Attacks with Multi-thread Mixed Leakage}, howpublished = {Cryptology ePrint Archive, Report 2020/1047}, year = {2020}, url = {https://eprint.iacr.org/2020/1047}, } @misc{cryptoeprint:2020:1048, author = {Kai Hu and Siwei Sun and Meiqin Wang and Qingju Wang}, title = {An Algebraic Formulation of the Division Property: Revisiting Degree Evaluations, Cube Attacks, and Key-Independent Sums}, howpublished = {Cryptology ePrint Archive, Report 2020/1048}, year = {2020}, url = {https://eprint.iacr.org/2020/1048}, } @misc{cryptoeprint:2020:1049, author = {Stefano Barbero and Emanuele Bellini and Rusydi Makarim}, title = {Rotational analysis of ChaCha permutation}, howpublished = {Cryptology ePrint Archive, Report 2020/1049}, year = {2020}, url = {https://eprint.iacr.org/2020/1049}, } @misc{cryptoeprint:2020:104, author = {Estuardo Alpirez Bock and Alessandro Amadori and Chris Brzuska and Wil Michiels}, title = {On the Security Goals of White-Box Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2020/104}, year = {2020}, url = {https://eprint.iacr.org/2020/104}, } @misc{cryptoeprint:2020:1050, author = {Arpita Patra and Divya Ravi and Swati Singla}, title = {On the Exact Round Complexity of Best-of-both-Worlds Multi-party Computation}, howpublished = {Cryptology ePrint Archive, Report 2020/1050}, year = {2020}, url = {https://eprint.iacr.org/2020/1050}, } @misc{cryptoeprint:2020:1051, author = {Phil Hebborn and Baptiste Lambin and Gregor Leander and Yosuke Todo}, title = {Lower Bounds on the Degree of Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2020/1051}, year = {2020}, url = {https://eprint.iacr.org/2020/1051}, } @misc{cryptoeprint:2020:1052, author = {Jean-Philippe Aumasson and Omer Shlomovits}, title = {Attacking Threshold Wallets}, howpublished = {Cryptology ePrint Archive, Report 2020/1052}, year = {2020}, url = {https://eprint.iacr.org/2020/1052}, } @misc{cryptoeprint:2020:1053, author = {Anders Dalskov and Eysa Lee and Eduardo Soria-Vazquez }, title = {Circuit Amortization Friendly Encodings and their Application to Statistically Secure Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2020/1053}, year = {2020}, url = {https://eprint.iacr.org/2020/1053}, } @misc{cryptoeprint:2020:1054, author = {Ben Smyth}, title = {Mind the Gap: Individual- and universal-verifiability plus cast-as-intended don't yield verifiable voting systems}, howpublished = {Cryptology ePrint Archive, Report 2020/1054}, year = {2020}, url = {https://eprint.iacr.org/2020/1054}, } @misc{cryptoeprint:2020:1055, author = {Santi J. Vives}, title = {Synced Hash-Based Signatures: Post-Quantum Authentication in a Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2020/1055}, year = {2020}, url = {https://eprint.iacr.org/2020/1055}, } @misc{cryptoeprint:2020:1056, author = {Wei-Zhu Yeoh and Je Sen Teh and Jiageng Chen}, title = {Optimized GPU Framework for Block Cipher Differential Search}, howpublished = {Cryptology ePrint Archive, Report 2020/1056}, year = {2020}, url = {https://eprint.iacr.org/2020/1056}, } @misc{cryptoeprint:2020:1057, author = {Jonas Nick and Tim Ruffing and Yannick Seurin and Pieter Wuille}, title = {MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces}, howpublished = {Cryptology ePrint Archive, Report 2020/1057}, year = {2020}, url = {https://eprint.iacr.org/2020/1057}, } @misc{cryptoeprint:2020:1058, author = {João Diogo Duarte}, title = {On the Complexity of the Crossbred Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2020/1058}, year = {2020}, url = {https://eprint.iacr.org/2020/1058}, } @misc{cryptoeprint:2020:1059, author = {Daniel Shumow}, title = {Incorrectly Generated RSA Keys: A study of a potentially catastrophic cryptographic}, howpublished = {Cryptology ePrint Archive, Report 2020/1059}, year = {2020}, url = {https://eprint.iacr.org/2020/1059}, } @misc{cryptoeprint:2020:105, author = {Frank Schuhmacher}, title = {MCU intrinsic group features for component authentication}, howpublished = {Cryptology ePrint Archive, Report 2020/105}, year = {2020}, url = {https://eprint.iacr.org/2020/105}, } @misc{cryptoeprint:2020:1060, author = {Fuyuki Kitagawa and Takahiro Matsuda}, title = {Circular Security Is Complete for KDM Security}, howpublished = {Cryptology ePrint Archive, Report 2020/1060}, year = {2020}, url = {https://eprint.iacr.org/2020/1060}, } @misc{cryptoeprint:2020:1061, author = {Vahid Amin Ghafari and Fujiang Lin}, title = {A new idea in response to fast correlation attacks on small-state stream ciphers}, howpublished = {Cryptology ePrint Archive, Report 2020/1061}, year = {2020}, url = {https://eprint.iacr.org/2020/1061}, } @misc{cryptoeprint:2020:1062, author = {Sergi Ramos-Calderer and Emanuele Bellini and José I. Latorre and Marc Manzano and Victor Mateu}, title = {Quantum Search for Scaled Hash Function Preimages}, howpublished = {Cryptology ePrint Archive, Report 2020/1062}, year = {2020}, url = {https://eprint.iacr.org/2020/1062}, } @misc{cryptoeprint:2020:1063, author = {Karim Baghery and Alonso González and Zaira Pindado and Carla Ràfols}, title = {Signatures of Knowledge for Boolean Circuits under Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2020/1063}, year = {2020}, url = {https://eprint.iacr.org/2020/1063}, } @misc{cryptoeprint:2020:1064, author = {Gary Yu}, title = {Mimblewimble Non-Interactive Transaction Scheme}, howpublished = {Cryptology ePrint Archive, Report 2020/1064}, year = {2020}, url = {https://eprint.iacr.org/2020/1064}, } @misc{cryptoeprint:2020:1065, author = {Naila Mukhtar and Louiza Papachristodoulou and Apostolos P. Fournaris and Lejla Batina and Yinan Kong}, title = {Machine-Learning assisted Side-Channel Attacks on RNS-based Elliptic Curve Implementations using Hybrid Feature Engineering}, howpublished = {Cryptology ePrint Archive, Report 2020/1065}, year = {2020}, url = {https://eprint.iacr.org/2020/1065}, } @misc{cryptoeprint:2020:1066, author = {Carlos Aguilar-Melchor and Nicolas Aragon and Emanuele Bellini and Florian Caullery and Rusydi H. Makarim and Chiara Marcolla}, title = {Constant time algorithms for ROLLO-I-128}, howpublished = {Cryptology ePrint Archive, Report 2020/1066}, year = {2020}, url = {https://eprint.iacr.org/2020/1066}, } @misc{cryptoeprint:2020:1067, author = {Adrian Marotzke}, title = {A Constant Time Full Hardware Implementation of Streamlined NTRU Prime}, howpublished = {Cryptology ePrint Archive, Report 2020/1067}, year = {2020}, url = {https://eprint.iacr.org/2020/1067}, } @misc{cryptoeprint:2020:1068, author = {Radhakrishna Bhat and N R Sunitha}, title = {An Efficient Transformation Capabilities of Single Database Private Block Retrieval}, howpublished = {Cryptology ePrint Archive, Report 2020/1068}, year = {2020}, url = {https://eprint.iacr.org/2020/1068}, } @misc{cryptoeprint:2020:1069, author = {Matteo Campanelli and Antonio Faonio and Dario Fiore and Anaïs Querol and Hadrián Rodríguez}, title = {Lunar: a Toolbox for More Efficient Universal and Updatable zkSNARKs and Commit-and-Prove Extensions}, howpublished = {Cryptology ePrint Archive, Report 2020/1069}, year = {2020}, url = {https://eprint.iacr.org/2020/1069}, } @misc{cryptoeprint:2020:106, author = {Frank Schuhmacher}, title = {Relaxed freshness in component authentication}, howpublished = {Cryptology ePrint Archive, Report 2020/106}, year = {2020}, url = {https://eprint.iacr.org/2020/106}, } @misc{cryptoeprint:2020:1070, author = {Dmitrii Koshelev}, title = {Hashing to elliptic curves $y^2 = x^3 + b$ provided that $b$ is a quadratic residue}, howpublished = {Cryptology ePrint Archive, Report 2020/1070}, year = {2020}, url = {https://eprint.iacr.org/2020/1070}, } @misc{cryptoeprint:2020:1071, author = {Julia Kastner and Julian Loss and Michael Rosenberg and Jiayu Xu}, title = {On the Security of Pairing-Free Blind Signature Schemes in the Algebraic Group Model}, howpublished = {Cryptology ePrint Archive, Report 2020/1071}, year = {2020}, url = {https://eprint.iacr.org/2020/1071}, } @misc{cryptoeprint:2020:1072, author = {Liliya Kraleva and Raluca Posteuca and Vincent Rijmen }, title = {Cryptanalysis of the permutation based algorithm SpoC}, howpublished = {Cryptology ePrint Archive, Report 2020/1072}, year = {2020}, url = {https://eprint.iacr.org/2020/1072}, } @misc{cryptoeprint:2020:1073, author = {Yusai Wu and Liqing Yu and Zhenfu Cao and Xiaolei Dong}, title = {Tight Security Analysis of 3-Round Key-Alternating Cipher with A Single Permutation}, howpublished = {Cryptology ePrint Archive, Report 2020/1073}, year = {2020}, url = {https://eprint.iacr.org/2020/1073}, } @misc{cryptoeprint:2020:1074, author = {Mihai-Zicu Mina and Emil Simion}, title = {A Scalable Simulation of the BB84 Protocol Involving Eavesdropping}, howpublished = {Cryptology ePrint Archive, Report 2020/1074}, year = {2020}, url = {https://eprint.iacr.org/2020/1074}, } @misc{cryptoeprint:2020:1075, author = {Pratik Soni and Stefano Tessaro}, title = {On the Query Complexity of Constructing PRFs from Non-adaptive PRFs}, howpublished = {Cryptology ePrint Archive, Report 2020/1075}, year = {2020}, url = {https://eprint.iacr.org/2020/1075}, } @misc{cryptoeprint:2020:1076, author = {Avijit Dutta}, title = {Minimizing the Two-Round Tweakable Even-Mansour Cipher}, howpublished = {Cryptology ePrint Archive, Report 2020/1076}, year = {2020}, url = {https://eprint.iacr.org/2020/1076}, } @misc{cryptoeprint:2020:1077, author = {Ming-Xing Luo and Xiaojun Wang}, title = {Unconditionally secure quantum bit commitment: Revised}, howpublished = {Cryptology ePrint Archive, Report 2020/1077}, year = {2020}, url = {https://eprint.iacr.org/2020/1077}, } @misc{cryptoeprint:2020:1078, author = {Jodie Knapp and Elizabeth A. Quaglia}, title = {Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles}, howpublished = {Cryptology ePrint Archive, Report 2020/1078}, year = {2020}, url = {https://eprint.iacr.org/2020/1078}, } @misc{cryptoeprint:2020:1079, author = {Rongmao Chen and Xinyi Huang and Moti Yung}, title = {Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/1079}, year = {2020}, url = {https://eprint.iacr.org/2020/1079}, } @misc{cryptoeprint:2020:107, author = {Ryan Amos and Marios Georgiou and Aggelos Kiayias and Mark Zhandry}, title = {One-shot Signatures and Applications to Hybrid Quantum/Classical Authentication}, howpublished = {Cryptology ePrint Archive, Report 2020/107}, year = {2020}, url = {https://eprint.iacr.org/2020/107}, } @misc{cryptoeprint:2020:1080, author = {Rupeng Yang and Junzuo Lai and Zhengan Huang and Man Ho Au and Qiuliang Xu and Willy Susilo}, title = {Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting}, howpublished = {Cryptology ePrint Archive, Report 2020/1080}, year = {2020}, url = {https://eprint.iacr.org/2020/1080}, } @misc{cryptoeprint:2020:1081, author = {Olivier Bernard and Adeline Roux-Langlois}, title = {Twisted-PHS: Using the Product Formula to Solve Approx-SVP in Ideal Lattices}, howpublished = {Cryptology ePrint Archive, Report 2020/1081}, year = {2020}, url = {https://eprint.iacr.org/2020/1081}, } @misc{cryptoeprint:2020:1082, author = {Bart Mennink}, title = {Beyond Birthday Bound Secure Fresh Rekeying: Application to Authenticated Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/1082}, year = {2020}, url = {https://eprint.iacr.org/2020/1082}, } @misc{cryptoeprint:2020:1083, author = {Stefan Steinegger and Robert Primas}, title = {A Fast and Compact Accelerator for Ascon and Friends}, howpublished = {Cryptology ePrint Archive, Report 2020/1083}, year = {2020}, url = {https://eprint.iacr.org/2020/1083}, } @misc{cryptoeprint:2020:1084, author = {David Derler and Stephan Krenn and Kai Samelin and Daniel Slamanig}, title = {Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-Quantum Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2020/1084}, year = {2020}, url = {https://eprint.iacr.org/2020/1084}, } @misc{cryptoeprint:2020:1085, author = {Tapas Pal and Ratna Dutta}, title = {Chosen-Ciphertext Secure Attribute-Hiding Non-Zero Inner Product Encryptions and Its Applications}, howpublished = {Cryptology ePrint Archive, Report 2020/1085}, year = {2020}, url = {https://eprint.iacr.org/2020/1085}, } @misc{cryptoeprint:2020:1086, author = {Daniel Apon and Dustin Moody and Ray Perlner and Daniel Smith-Tone and Javier Verbel}, title = {Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2020/1086}, year = {2020}, url = {https://eprint.iacr.org/2020/1086}, } @misc{cryptoeprint:2020:1087, author = {Keita Emura and Atsushi Takayasu and Yohei Watanabe}, title = {Efficient Identity-Based Encryption with Hierarchical Key-Insulation from HIBE}, howpublished = {Cryptology ePrint Archive, Report 2020/1087}, year = {2020}, url = {https://eprint.iacr.org/2020/1087}, } @misc{cryptoeprint:2020:1088, author = {Xiangyu Liu; Shengli Liu; Dawu Gu; Jian Weng}, title = {Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security}, howpublished = {Cryptology ePrint Archive, Report 2020/1088}, year = {2020}, url = {https://eprint.iacr.org/2020/1088}, } @misc{cryptoeprint:2020:1089, author = {Akinori Hosoyamada and María Naya-Plasencia and Yu Sasaki}, title = {Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers}, howpublished = {Cryptology ePrint Archive, Report 2020/1089}, year = {2020}, url = {https://eprint.iacr.org/2020/1089}, } @misc{cryptoeprint:2020:108, author = {Christoph Dobraunig and Florian Mendel and Bart Mennink}, title = {Practical Forgeries for ORANGE}, howpublished = {Cryptology ePrint Archive, Report 2020/108}, year = {2020}, url = {https://eprint.iacr.org/2020/108}, } @misc{cryptoeprint:2020:1090, author = {Andrew Morgan and Rafael Pass and Elaine Shi}, title = {On the Adaptive Security of MACs and PRFs}, howpublished = {Cryptology ePrint Archive, Report 2020/1090}, year = {2020}, url = {https://eprint.iacr.org/2020/1090}, } @misc{cryptoeprint:2020:1091, author = {Joachim Neu and Ertem Nusret Tas and David Tse}, title = {Ebb-and-Flow Protocols: A Resolution of the Availability-Finality Dilemma}, howpublished = {Cryptology ePrint Archive, Report 2020/1091}, year = {2020}, url = {https://eprint.iacr.org/2020/1091}, } @misc{cryptoeprint:2020:1092, author = {Arka Rai Choudhuri and Vipul Goyal and Abhishek Jain}, title = {The Round Complexity of Secure Computation Against Covert Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2020/1092}, year = {2020}, url = {https://eprint.iacr.org/2020/1092}, } @misc{cryptoeprint:2020:1093, author = {Xichao Hu and Yongqiang Li and Lin Jiao and Shizhu Tian and Mingsheng Wang}, title = {Mind the Propagation of States New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2020/1093}, year = {2020}, url = {https://eprint.iacr.org/2020/1093}, } @misc{cryptoeprint:2020:1094, author = {Ambili K N and Jimmy Jose}, title = {TN-IDS for Network Layer Attacks in RPL based IoT Systems}, howpublished = {Cryptology ePrint Archive, Report 2020/1094}, year = {2020}, url = {https://eprint.iacr.org/2020/1094}, } @misc{cryptoeprint:2020:1095, author = {Yongzhuang Wei and Rene Rodriguez and Enes Pasalic}, title = {Cycle structure of generalized and closed loop invariants}, howpublished = {Cryptology ePrint Archive, Report 2020/1095}, year = {2020}, url = {https://eprint.iacr.org/2020/1095}, } @misc{cryptoeprint:2020:1096, author = {Ruize Wang and Huanyu Wang and Elena Dubrova}, title = {Far Field EM Side-Channel Attack on AES Using Deep Learning}, howpublished = {Cryptology ePrint Archive, Report 2020/1096}, year = {2020}, url = {https://eprint.iacr.org/2020/1096}, } @misc{cryptoeprint:2020:1097, author = {Benoît Cogliati and Ashwin Jha and Mridul Nandi}, title = {How to Build Optimally Secure PRFs Using Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2020/1097}, year = {2020}, url = {https://eprint.iacr.org/2020/1097}, } @misc{cryptoeprint:2020:1098, author = {Junming Ke and Pawel Szalachowski and Jianying Zhou and Qiuliang Xu}, title = {Formalizing Bitcoin Crashes with Universally Composable Security}, howpublished = {Cryptology ePrint Archive, Report 2020/1098}, year = {2020}, url = {https://eprint.iacr.org/2020/1098}, } @misc{cryptoeprint:2020:1099, author = {Roman Langrehr and Jiaxin Pan}, title = {Unbounded HIBE with Tight Security}, howpublished = {Cryptology ePrint Archive, Report 2020/1099}, year = {2020}, url = {https://eprint.iacr.org/2020/1099}, } @misc{cryptoeprint:2020:109, author = {Lucca Hirschi and Lara Schmid and David Basin}, title = {Fixing the Achilles Heel of E-Voting: The Bulletin Board}, howpublished = {Cryptology ePrint Archive, Report 2020/109}, year = {2020}, url = {https://eprint.iacr.org/2020/109}, } @misc{cryptoeprint:2020:1100, author = {Prabhanjan Ananth and Arka Rai Choudhuri and Aarushi Goel and Abhishek Jain}, title = {Towards Efficiency-Preserving Round Compression in MPC: Do fewer rounds mean more computation?}, howpublished = {Cryptology ePrint Archive, Report 2020/1100}, year = {2020}, url = {https://eprint.iacr.org/2020/1100}, } @misc{cryptoeprint:2020:1101, author = {Ren Zhang and Dingwei Zhang and Quake Wang and Jan Xie and Bart Preneel}, title = {NC-Max: Breaking the Throughput Limit of Nakamoto Consensus}, howpublished = {Cryptology ePrint Archive, Report 2020/1101}, year = {2020}, url = {https://eprint.iacr.org/2020/1101}, } @misc{cryptoeprint:2020:1102, author = {Pedro Hecht}, title = {PQC: R-Propping of Public-Key Cryptosystems Using Polynomials over Non-commutative Algebraic Extension Rings }, howpublished = {Cryptology ePrint Archive, Report 2020/1102}, year = {2020}, url = {https://eprint.iacr.org/2020/1102}, } @misc{cryptoeprint:2020:1103, author = {Weijia Wang; Chun Guo; François-Xavier Standaert; Yu Yu; Gaëtan Cassiers}, title = {Packed Multiplication: How to Amortize the Cost of Side-channel Masking ?}, howpublished = {Cryptology ePrint Archive, Report 2020/1103}, year = {2020}, url = {https://eprint.iacr.org/2020/1103}, } @misc{cryptoeprint:2020:1104, author = {Gilles Barthe and Sunjay Cauligi and Benjamin Gregoire and Adrien Koutsos and Kevin Liao and Tiago Oliveira and Swarn Priya and Tamara Rezk and Peter Schwabe}, title = {High-Assurance Cryptography Software in the Spectre Era}, howpublished = {Cryptology ePrint Archive, Report 2020/1104}, year = {2020}, url = {https://eprint.iacr.org/2020/1104}, } @misc{cryptoeprint:2020:1105, author = {Thai Duong and Duong Hieu Phan and Ni Trieu}, title = {Catalic: Delegated PSI Cardinality with Applications to Contact Tracing}, howpublished = {Cryptology ePrint Archive, Report 2020/1105}, year = {2020}, url = {https://eprint.iacr.org/2020/1105}, } @misc{cryptoeprint:2020:1106, author = {Gili Schul-Ganz and Gil Segev}, title = {Accumulators in (and Beyond) Generic Groups: Non-Trivial Batch Verification Requires Interaction}, howpublished = {Cryptology ePrint Archive, Report 2020/1106}, year = {2020}, url = {https://eprint.iacr.org/2020/1106}, } @misc{cryptoeprint:2020:1107, author = {Shuichi Katsumata and Kris Kwiatkowski and Federico Pintore and Thomas Prest}, title = {Scalable Ciphertext Compression Techniques for Post-Quantum KEMs and their Applications}, howpublished = {Cryptology ePrint Archive, Report 2020/1107}, year = {2020}, url = {https://eprint.iacr.org/2020/1107}, } @misc{cryptoeprint:2020:1108, author = {Wouter Castryck and Thomas Decru and Frederik Vercauteren}, title = {Radical isogenies}, howpublished = {Cryptology ePrint Archive, Report 2020/1108}, year = {2020}, url = {https://eprint.iacr.org/2020/1108}, } @misc{cryptoeprint:2020:1109, author = {Gora Adj and Jesús-Javier Chi-Domínguez and Francisco Rodríguez-Henríquez}, title = {On the $\sqrt{\vphantom{^2}}$\'elu's formulae and its applications to CSIDH and B-SIDH constant-time implementations}, howpublished = {Cryptology ePrint Archive, Report 2020/1109}, year = {2020}, url = {https://eprint.iacr.org/2020/1109}, } @misc{cryptoeprint:2020:110, author = {Ran Canetti and Pratik Sarkar and Xiao Wang}, title = {Blazing Fast OT for Three-Round UC OT Extension}, howpublished = {Cryptology ePrint Archive, Report 2020/110}, year = {2020}, url = {https://eprint.iacr.org/2020/110}, } @misc{cryptoeprint:2020:1110, author = {Ivan Damgård and Claudio Orlandi and Akira Takahashi and Mehdi Tibouchi}, title = {Two-round $n$-out-of-$n$ and Multi-Signatures and Trapdoor Commitment from Lattices}, howpublished = {Cryptology ePrint Archive, Report 2020/1110}, year = {2020}, url = {https://eprint.iacr.org/2020/1110}, } @misc{cryptoeprint:2020:1111, author = {Abhraneel Dutta and Aaron Hutchinson and Koray Karabina}, title = {Extending the Signed Non-zero Bit and Sign-Aligned Columns Methods to General Bases for Use in Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2020/1111}, year = {2020}, url = {https://eprint.iacr.org/2020/1111}, } @misc{cryptoeprint:2020:1112, author = {Muhammad ElSheikh and Amr M. Youssef}, title = {A cautionary note on the use of Gurobi for cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2020/1112}, year = {2020}, url = {https://eprint.iacr.org/2020/1112}, } @misc{cryptoeprint:2020:1113, author = {Konstantin Kalgin and Valeriya Idrisova}, title = {On combinatorial approaches to search for quadratic APN functions}, howpublished = {Cryptology ePrint Archive, Report 2020/1113}, year = {2020}, url = {https://eprint.iacr.org/2020/1113}, } @misc{cryptoeprint:2020:1114, author = {Thomas Haines and Rajeev Gore and Bhavesh Sharma}, title = {Did you mix me? Formally Verifying Verifiable Mix Nets in Electronic Voting}, howpublished = {Cryptology ePrint Archive, Report 2020/1114}, year = {2020}, url = {https://eprint.iacr.org/2020/1114}, } @misc{cryptoeprint:2020:1115, author = {Karim M. Abdellatif and Olivier Hériveaux}, title = {SiliconToaster: A Cheap and Programmable EM Injector for Extracting Secrets}, howpublished = {Cryptology ePrint Archive, Report 2020/1115}, year = {2020}, url = {https://eprint.iacr.org/2020/1115}, } @misc{cryptoeprint:2020:1116, author = {V. Ustimenko }, title = {On Multivariate Algorithms of Digital Signatures Based on Maps of Unbounded Degree Acting on Secure El Gamal Type Mode.}, howpublished = {Cryptology ePrint Archive, Report 2020/1116}, year = {2020}, url = {https://eprint.iacr.org/2020/1116}, } @misc{cryptoeprint:2020:1117, author = {Jia Kan}, title = {Economic Proof of Work}, howpublished = {Cryptology ePrint Archive, Report 2020/1117}, year = {2020}, url = {https://eprint.iacr.org/2020/1117}, } @misc{cryptoeprint:2020:1118, author = {Andrey Kim and Antonis Papadimitriou and Yuriy Polyakov}, title = {Approximate Homomorphic Encryption with Reduced Approximation Error}, howpublished = {Cryptology ePrint Archive, Report 2020/1118}, year = {2020}, url = {https://eprint.iacr.org/2020/1118}, } @misc{cryptoeprint:2020:1119, author = {Christoph Hagen and Christian Weinert and Christoph Sendner and Alexandra Dmitrienko and Thomas Schneider}, title = {All the Numbers are US: Large-scale Abuse of Contact Discovery in Mobile Messengers}, howpublished = {Cryptology ePrint Archive, Report 2020/1119}, year = {2020}, url = {https://eprint.iacr.org/2020/1119}, } @misc{cryptoeprint:2020:111, author = {Alex Davidson and Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, title = {Adaptively Secure Constrained Pseudorandom Functions in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2020/111}, year = {2020}, url = {https://eprint.iacr.org/2020/111}, } @misc{cryptoeprint:2020:1120, author = {Yasufumi Hashimoto}, title = {On the security of Diene-Thabet-Yusuf's cubic multivariate signature scheme}, howpublished = {Cryptology ePrint Archive, Report 2020/1120}, year = {2020}, url = {https://eprint.iacr.org/2020/1120}, } @misc{cryptoeprint:2020:1121, author = {Wilson Alberto Torres and Ron Steinfeld and Amin Sakzad and Veronika Kuchta}, title = {Post-Quantum Linkable Ring Signature Enabling Distributed Authorised Ring Confidential Transactions in Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2020/1121}, year = {2020}, url = {https://eprint.iacr.org/2020/1121}, } @misc{cryptoeprint:2020:1122, author = {Aggelos Kiayias and Andrianna Polydouri and Dionysis Zindros}, title = {The Velvet Path to Superlight Blockchain Clients}, howpublished = {Cryptology ePrint Archive, Report 2020/1122}, year = {2020}, url = {https://eprint.iacr.org/2020/1122}, } @misc{cryptoeprint:2020:1123, author = {Alexandre Adomnicai and Thomas Peyrin}, title = {Fixslicing AES-like Ciphers: New bitsliced AES speed records on ARM-Cortex M and RISC-V}, howpublished = {Cryptology ePrint Archive, Report 2020/1123}, year = {2020}, url = {https://eprint.iacr.org/2020/1123}, } @misc{cryptoeprint:2020:1124, author = {Artur Mariano, Filipe Cabeleira, Gabriel Falcao, Luís Paulo Santos}, title = {Optimized Voronoi-based algorithms for parallel shortest vector computations}, howpublished = {Cryptology ePrint Archive, Report 2020/1124}, year = {2020}, url = {https://eprint.iacr.org/2020/1124}, } @misc{cryptoeprint:2020:1125, author = {Jing Tian and Bo Wu and Zhongfeng Wang}, title = {High-Speed FPGA Implementation of the SIKE Based on An Ultra-Low-Latency Modular Multiplier}, howpublished = {Cryptology ePrint Archive, Report 2020/1125}, year = {2020}, url = {https://eprint.iacr.org/2020/1125}, } @misc{cryptoeprint:2020:1126, author = {Joël Gugger}, title = {Bitcoin--Monero Cross-chain Atomic Swap}, howpublished = {Cryptology ePrint Archive, Report 2020/1126}, year = {2020}, url = {https://eprint.iacr.org/2020/1126}, } @misc{cryptoeprint:2020:1127, author = {Joseph Gravellier and Jean-Max Dutertre and Yannick Teglia and Philippe Loubet Moundi}, title = {SideLine: How Delay-Lines (May) Leak Secrets from your SoC}, howpublished = {Cryptology ePrint Archive, Report 2020/1127}, year = {2020}, url = {https://eprint.iacr.org/2020/1127}, } @misc{cryptoeprint:2020:1128, author = {Jingchun Yang and Dongdai Lin}, title = {Searching Cubes in Division Property Based Cube Attack: Applications to Round-Reduced ACORN}, howpublished = {Cryptology ePrint Archive, Report 2020/1128}, year = {2020}, url = {https://eprint.iacr.org/2020/1128}, } @misc{cryptoeprint:2020:1129, author = {Ambili K N and Jimmy Jose}, title = {A Secure Software Defined Networking based Framework for IoT Networks}, howpublished = {Cryptology ePrint Archive, Report 2020/1129}, year = {2020}, url = {https://eprint.iacr.org/2020/1129}, } @misc{cryptoeprint:2020:112, author = {Patrick Karl and Michael Tempelmeier}, title = {A Detailed Report on the Overhead of Hardware APIs for Lightweight Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2020/112}, year = {2020}, url = {https://eprint.iacr.org/2020/112}, } @misc{cryptoeprint:2020:1130, author = {Mark Abspoel and Daniel Escudero and Nikolaj Volgushev}, title = {Secure training of decision trees with continuous attributes}, howpublished = {Cryptology ePrint Archive, Report 2020/1130}, year = {2020}, url = {https://eprint.iacr.org/2020/1130}, } @misc{cryptoeprint:2020:1131, author = {Enes Pasalic and René Rodríguez and Fengrong Zhang and Yongzhuang Wei}, title = {Several classes of minimal binary linear codes violating the Aschikhmin-Barg's bound}, howpublished = {Cryptology ePrint Archive, Report 2020/1131}, year = {2020}, url = {https://eprint.iacr.org/2020/1131}, } @misc{cryptoeprint:2020:1132, author = {Ilan Komargodski and Wei-Kai Lin}, title = {Lower Bound for Oblivious RAM with Large Cells}, howpublished = {Cryptology ePrint Archive, Report 2020/1132}, year = {2020}, url = {https://eprint.iacr.org/2020/1132}, } @misc{cryptoeprint:2020:1133, author = {Ling Song and Yi Tu and Danping Shi and Lei Hu}, title = {Security Analysis of Subterranean 2.0}, howpublished = {Cryptology ePrint Archive, Report 2020/1133}, year = {2020}, url = {https://eprint.iacr.org/2020/1133}, } @misc{cryptoeprint:2020:1134, author = {Yoo-Seung Won and Xiaolu Hou and Dirmanto Jap and Jakub Breier and Shivam Bhasin}, title = {Back To The Basics: Seamless Integration of Side-Channel Pre-processing in Deep Neural Networks}, howpublished = {Cryptology ePrint Archive, Report 2020/1134}, year = {2020}, url = {https://eprint.iacr.org/2020/1134}, } @misc{cryptoeprint:2020:1135, author = {Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, title = {Adaptively Secure Inner Product Encryption from LWE}, howpublished = {Cryptology ePrint Archive, Report 2020/1135}, year = {2020}, url = {https://eprint.iacr.org/2020/1135}, } @misc{cryptoeprint:2020:1136, author = {Han Wu and Guangwu Xu}, title = {On the Family of Elliptic Curves $y^2=x^3+b/\mathbb{F}_p$}, howpublished = {Cryptology ePrint Archive, Report 2020/1136}, year = {2020}, url = {https://eprint.iacr.org/2020/1136}, } @misc{cryptoeprint:2020:1137, author = {Lennart Braun and Daniel Demmler and Thomas Schneider and Oleksandr Tkachenko}, title = {MOTION - A Framework for Mixed-Protocol Multi-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2020/1137}, year = {2020}, url = {https://eprint.iacr.org/2020/1137}, } @misc{cryptoeprint:2020:1138, author = {Andreas Hülsing and Florian Weber }, title = {Epochal Signatures for Deniable Group Chats}, howpublished = {Cryptology ePrint Archive, Report 2020/1138}, year = {2020}, url = {https://eprint.iacr.org/2020/1138}, } @misc{cryptoeprint:2020:1139, author = {Huijia Lin and Ji Luo}, title = {Succinct and Adaptively Secure ABE for Arithmetic Branching Programs from k-Lin}, howpublished = {Cryptology ePrint Archive, Report 2020/1139}, year = {2020}, url = {https://eprint.iacr.org/2020/1139}, } @misc{cryptoeprint:2020:113, author = {Madhurima Mukhopadhyay and Palash Sarkar and Shashank Singh and Emmanuel Thome}, title = {New Discrete Logarithm Computation for the Medium Prime Case Using the Function Field Sieve}, howpublished = {Cryptology ePrint Archive, Report 2020/113}, year = {2020}, url = {https://eprint.iacr.org/2020/113}, } @misc{cryptoeprint:2020:1140, author = {Yongjune Kim and Cyril Guyot and Young-Sik Kim}, title = {On the Efficient Estimation of Min-Entropy}, howpublished = {Cryptology ePrint Archive, Report 2020/1140}, year = {2020}, url = {https://eprint.iacr.org/2020/1140}, } @misc{cryptoeprint:2020:1141, author = {Daniele Di Tullio and Manoj Gyawali}, title = {A post-quantum signature scheme from the secant variety of the Grassmannian}, howpublished = {Cryptology ePrint Archive, Report 2020/1141}, year = {2020}, url = {https://eprint.iacr.org/2020/1141}, } @misc{cryptoeprint:2020:1142, author = {Zhengjun Cao and Lihua Liu}, title = {Factoring Algorithm Based on Parameterized Newton Method}, howpublished = {Cryptology ePrint Archive, Report 2020/1142}, year = {2020}, url = {https://eprint.iacr.org/2020/1142}, } @misc{cryptoeprint:2020:1143, author = {Alan Szepieniec and Tomer Ashur and Siemen Dhooghe}, title = {Rescue-Prime: a Standard Specification (SoK)}, howpublished = {Cryptology ePrint Archive, Report 2020/1143}, year = {2020}, url = {https://eprint.iacr.org/2020/1143}, } @misc{cryptoeprint:2020:1144, author = {Lior Rotem and Gil Segev}, title = {Algebraic Distinguishers: From Discrete Logarithms to Decisional Uber Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2020/1144}, year = {2020}, url = {https://eprint.iacr.org/2020/1144}, } @misc{cryptoeprint:2020:1145, author = {Wonseok Choi and Byeonghak Lee and Yeongmin Lee and Jooyoung Lee }, title = {Improved Security Analysis for Nonce-based Enhanced Hash-then-Mask MACs}, howpublished = {Cryptology ePrint Archive, Report 2020/1145}, year = {2020}, url = {https://eprint.iacr.org/2020/1145}, } @misc{cryptoeprint:2020:1146, author = {Siemen Dhooghe and Svetla Nikova}, title = {Let's Tessellate: Tiling for Security Against Advanced Probe and Fault Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2020/1146}, year = {2020}, url = {https://eprint.iacr.org/2020/1146}, } @misc{cryptoeprint:2020:1147, author = {Hui Zhu and Christian Gehrmann}, title = {Lic-Sec: an enhanced AppArmor Docker security profile generator}, howpublished = {Cryptology ePrint Archive, Report 2020/1147}, year = {2020}, url = {https://eprint.iacr.org/2020/1147}, } @misc{cryptoeprint:2020:1148, author = {Malik Imran and Samuel Pagliarini and Muhammad Rashid}, title = {An Area Aware Accelerator for Elliptic Curve Point Multiplication}, howpublished = {Cryptology ePrint Archive, Report 2020/1148}, year = {2020}, url = {https://eprint.iacr.org/2020/1148}, } @misc{cryptoeprint:2020:1149, author = {Nabil Alkeilani Alkadri and Poulami Das and Andreas Erwig and Sebastian Faust and Juliane Krämer and Siavash Riahi and Patrick Struck}, title = {Deterministic Wallets in a Quantum World}, howpublished = {Cryptology ePrint Archive, Report 2020/1149}, year = {2020}, url = {https://eprint.iacr.org/2020/1149}, } @misc{cryptoeprint:2020:114, author = {Antoine Delignat-Lavaud and Cédric Fournet and Bryan Parno and Jonathan Protzenko and Tahina Ramananandro and Jay Bosamiya and Joseph Lallemand and Itsaka Rakotonirina and Yi Zhou}, title = {A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer}, howpublished = {Cryptology ePrint Archive, Report 2020/114}, year = {2020}, url = {https://eprint.iacr.org/2020/114}, } @misc{cryptoeprint:2020:1150, author = {Gennaro Avitabile and Daniele Friolo and Ivan Visconti}, title = {TEnK-U: Terrorist Attacks for Fake Exposure Notifications in Contact Tracing Systems}, howpublished = {Cryptology ePrint Archive, Report 2020/1150}, year = {2020}, url = {https://eprint.iacr.org/2020/1150}, } @misc{cryptoeprint:2020:1151, author = {Robert Merget and Marcus Brinkmann and Nimrod Aviram and Juraj Somorovsky and Johannes Mittmann and Jörg Schwenk}, title = {Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)}, howpublished = {Cryptology ePrint Archive, Report 2020/1151}, year = {2020}, url = {https://eprint.iacr.org/2020/1151}, } @misc{cryptoeprint:2020:1152, author = {Tianyou Ding and Wentao Zhang and Chunning Zhou and Fulei Ji}, title = {An Automatic Search Tool for Iterative Trails and its Application to estimation of differentials and linear hulls}, howpublished = {Cryptology ePrint Archive, Report 2020/1152}, year = {2020}, url = {https://eprint.iacr.org/2020/1152}, } @misc{cryptoeprint:2020:1153, author = {Shay Gueron}, title = {Key Committing AEADs}, howpublished = {Cryptology ePrint Archive, Report 2020/1153}, year = {2020}, url = {https://eprint.iacr.org/2020/1153}, } @misc{cryptoeprint:2020:1154, author = {Kwangsu Lee and Minhye Seo}, title = {Functional Encryption for Set Intersection in the Multi-Client Setting}, howpublished = {Cryptology ePrint Archive, Report 2020/1154}, year = {2020}, url = {https://eprint.iacr.org/2020/1154}, } @misc{cryptoeprint:2020:1155, author = {Dimitris Mouris and Nektarios Georgios Tsoutsos}, title = {Zilch: A Framework for Deploying Transparent Zero-Knowledge Proofs}, howpublished = {Cryptology ePrint Archive, Report 2020/1155}, year = {2020}, url = {https://eprint.iacr.org/2020/1155}, } @misc{cryptoeprint:2020:1156, author = {Anna Lisa Ferrara and Chiara Ricciardi}, title = {Verifiable Hierarchical Key Assignment Schemes}, howpublished = {Cryptology ePrint Archive, Report 2020/1156}, year = {2020}, url = {https://eprint.iacr.org/2020/1156}, } @misc{cryptoeprint:2020:1157, author = {Rex Fernando and Ilan Komargodski and Yanyi Liu and Elaine Shi}, title = {Secure Massively Parallel Computation for Dishonest Majority}, howpublished = {Cryptology ePrint Archive, Report 2020/1157}, year = {2020}, url = {https://eprint.iacr.org/2020/1157}, } @misc{cryptoeprint:2020:1158, author = {Daan Sprenkels and Bas Westerbaan}, title = {Don't throw your nonces out with the bathwater}, howpublished = {Cryptology ePrint Archive, Report 2020/1158}, year = {2020}, url = {https://eprint.iacr.org/2020/1158}, } @misc{cryptoeprint:2020:1159, author = {Rintaro Fujita and Takanori Isobe and Kazuhiko Minematsu}, title = {ACE in Chains : How Risky is CBC Encryption of Binary Executable Files ?}, howpublished = {Cryptology ePrint Archive, Report 2020/1159}, year = {2020}, url = {https://eprint.iacr.org/2020/1159}, } @misc{cryptoeprint:2020:115, author = {Xavier Boyen and Thomas Haines and Johannes Mueller}, title = {A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing}, howpublished = {Cryptology ePrint Archive, Report 2020/115}, year = {2020}, url = {https://eprint.iacr.org/2020/115}, } @misc{cryptoeprint:2020:1160, author = {Nir Bitansky and Arka Rai Choudhuri}, title = {Characterizing Deterministic-Prover Zero Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2020/1160}, year = {2020}, url = {https://eprint.iacr.org/2020/1160}, } @misc{cryptoeprint:2020:1161, author = {Shashank Agrawal and Srinivasan Raghuraman}, title = {KVaC: Key-Value Commitments for Blockchains and Beyond}, howpublished = {Cryptology ePrint Archive, Report 2020/1161}, year = {2020}, url = {https://eprint.iacr.org/2020/1161}, } @misc{cryptoeprint:2020:1162, author = {Pavel Hubáček and Chethan Kamath and Karel Král and Veronika Slívová}, title = {On Average-Case Hardness in TFNP from One-Way Functions}, howpublished = {Cryptology ePrint Archive, Report 2020/1162}, year = {2020}, url = {https://eprint.iacr.org/2020/1162}, } @misc{cryptoeprint:2020:1163, author = {Guoqiang Deng and Yongzhuang Wei and Xuefeng Duan and Enes Pasalic and Samir Hodzic}, title = {Specifying cycles of minimal length for commonly used linear layers in block ciphers}, howpublished = {Cryptology ePrint Archive, Report 2020/1163}, year = {2020}, url = {https://eprint.iacr.org/2020/1163}, } @misc{cryptoeprint:2020:1164, author = {Min Yang and Qingshu Meng and An Wang and Xin Liu}, title = {Template Attacks Based on the Multivariate Joint Distribution}, howpublished = {Cryptology ePrint Archive, Report 2020/1164}, year = {2020}, url = {https://eprint.iacr.org/2020/1164}, } @misc{cryptoeprint:2020:1165, author = {Bor de Kock and Kristian Gjøsteen and Mattia Veroni}, title = {Practical Isogeny-Based Key-exchange with Optimal Tightness}, howpublished = {Cryptology ePrint Archive, Report 2020/1165}, year = {2020}, url = {https://eprint.iacr.org/2020/1165}, } @misc{cryptoeprint:2020:1166, author = {Jorge Nakahara Jr}, title = {A Differential and Linear Analysis of the Inversion Mapping in Odd-Characteristic Finite Fields}, howpublished = {Cryptology ePrint Archive, Report 2020/1166}, year = {2020}, url = {https://eprint.iacr.org/2020/1166}, } @misc{cryptoeprint:2020:1167, author = {Inbar Kaslasi and Guy N. Rothblum and Ron D. Rothblum and Adam Sealfon and Prashant Nalini Vasudevan}, title = {Batch Verification for Statistical Zero Knowledge Proofs}, howpublished = {Cryptology ePrint Archive, Report 2020/1167}, year = {2020}, url = {https://eprint.iacr.org/2020/1167}, } @misc{cryptoeprint:2020:1168, author = {Zvika Brakerski and Sanjam Garg and Rotem Tsabary}, title = {FHE-Based Bootstrapping of Designated-Prover NIZK}, howpublished = {Cryptology ePrint Archive, Report 2020/1168}, year = {2020}, url = {https://eprint.iacr.org/2020/1168}, } @misc{cryptoeprint:2020:1169, author = {Sigurd Eskeland}, title = {Privacy-preserving greater-than integer comparison without binary decomposition in the malicious model}, howpublished = {Cryptology ePrint Archive, Report 2020/1169}, year = {2020}, url = {https://eprint.iacr.org/2020/1169}, } @misc{cryptoeprint:2020:116, author = {Benny Applebaum and Zvika Brakerski and Sanjam Garg and Yuval Ishai and Akshayaram Srinivasan}, title = {Separating Two-Round Secure Computation from Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2020/116}, year = {2020}, url = {https://eprint.iacr.org/2020/116}, } @misc{cryptoeprint:2020:1170, author = {Bar Alon and Ran Cohen and Eran Omri and Tom Suad}, title = {On the Power of an Honest Majority in Three-Party Computation Without Broadcast}, howpublished = {Cryptology ePrint Archive, Report 2020/1170}, year = {2020}, url = {https://eprint.iacr.org/2020/1170}, } @misc{cryptoeprint:2020:1171, author = {Alexander Bienstock and Yevgeniy Dodis and Paul Rösler}, title = {On the Price of Concurrency in Group Ratcheting Protocols}, howpublished = {Cryptology ePrint Archive, Report 2020/1171}, year = {2020}, url = {https://eprint.iacr.org/2020/1171}, } @misc{cryptoeprint:2020:1172, author = {Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso}, title = {Cryptanalysis of a round optimal lattice-based multisignature scheme}, howpublished = {Cryptology ePrint Archive, Report 2020/1172}, year = {2020}, url = {https://eprint.iacr.org/2020/1172}, } @misc{cryptoeprint:2020:1173, author = {Ryo Nishimaki}, title = {Equipping Public-Key Cryptographic Primitives with Watermarking (or: A Hole Is to Watermark)}, howpublished = {Cryptology ePrint Archive, Report 2020/1173}, year = {2020}, url = {https://eprint.iacr.org/2020/1173}, } @misc{cryptoeprint:2020:1174, author = {Chloe Cachet and Luke Demarest and Benjamin Fuller and Ariel Hamlin}, title = {Proximity Searchable Encryption for Biometrics}, howpublished = {Cryptology ePrint Archive, Report 2020/1174}, year = {2020}, url = {https://eprint.iacr.org/2020/1174}, } @misc{cryptoeprint:2020:1175, author = {David Heath and Vladimir Kolesnikov and Stanislav Peceny}, title = {MOTIF: (Almost) Free Branching in GMW via Vector-Scalar Multiplication}, howpublished = {Cryptology ePrint Archive, Report 2020/1175}, year = {2020}, url = {https://eprint.iacr.org/2020/1175}, } @misc{cryptoeprint:2020:1176, author = {Rami Khalil and Naranker Dulay}, title = {Short Paper: PoSH Proof of Staked Hardware Consensus}, howpublished = {Cryptology ePrint Archive, Report 2020/1176}, year = {2020}, url = {https://eprint.iacr.org/2020/1176}, } @misc{cryptoeprint:2020:1177, author = {Hao Guo and Siwei Sun and Danping Shi and Ling Sun and Yao Sun and Lei Hu and Meiqin Wang}, title = {Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions}, howpublished = {Cryptology ePrint Archive, Report 2020/1177}, year = {2020}, url = {https://eprint.iacr.org/2020/1177}, } @misc{cryptoeprint:2020:1178, author = {Tomoki Kawashima and Katsuyuki Takashima and Yusuke Aikawa and Tsuyoshi Takagi}, title = {An Efficient Authenticated Key Exchange from Random Self-Reducibility on CSIDH}, howpublished = {Cryptology ePrint Archive, Report 2020/1178}, year = {2020}, url = {https://eprint.iacr.org/2020/1178}, } @misc{cryptoeprint:2020:1179, author = {Shweta Agrawal and Daniel Wichs and Shota Yamada}, title = {Optimal Broadcast Encryption from LWE and Pairings in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2020/1179}, year = {2020}, url = {https://eprint.iacr.org/2020/1179}, } @misc{cryptoeprint:2020:117, author = {Andrew Reinders and Rafael Misoczki and Santosh Ghosh and Manoj Sastry}, title = {Efficient BIKE Hardware Design with Constant-Time Decoder}, howpublished = {Cryptology ePrint Archive, Report 2020/117}, year = {2020}, url = {https://eprint.iacr.org/2020/117}, } @misc{cryptoeprint:2020:1180, author = {Ricardo Moura and David R. Matos and Miguel Pardal and Miguel Correia}, title = {MultiTLS: Secure communication channels with cipher suite diversity}, howpublished = {Cryptology ePrint Archive, Report 2020/1180}, year = {2020}, url = {https://eprint.iacr.org/2020/1180}, } @misc{cryptoeprint:2020:1181, author = {Siam Hussain and Baiyu Li and Farinaz Koushanfar and Rosario Cammarota}, title = {TinyGarble2: Smart, Efficient, and Scalable Yao’s Garble Circuit}, howpublished = {Cryptology ePrint Archive, Report 2020/1181}, year = {2020}, url = {https://eprint.iacr.org/2020/1181}, } @misc{cryptoeprint:2020:1182, author = {Amos Beimel and Iftach Haitner and Kobbi Nissim and Uri Stemmer}, title = {On the Round Complexity of the Shuffle Model}, howpublished = {Cryptology ePrint Archive, Report 2020/1182}, year = {2020}, url = {https://eprint.iacr.org/2020/1182}, } @misc{cryptoeprint:2020:1183, author = {Vadim Lyubashevsky and Ngoc Khanh Nguyen and Gregor Seiler}, title = {Practical Lattice-Based Zero-Knowledge Proofs for Integer Relations }, howpublished = {Cryptology ePrint Archive, Report 2020/1183}, year = {2020}, url = {https://eprint.iacr.org/2020/1183}, } @misc{cryptoeprint:2020:1184, author = {Robert Ransom}, title = {Constant-time verification for cut-and-choose-based signatures}, howpublished = {Cryptology ePrint Archive, Report 2020/1184}, year = {2020}, url = {https://eprint.iacr.org/2020/1184}, } @misc{cryptoeprint:2020:1185, author = {Zvika Brakerski and Nico Döttling}, title = {Lossiness and Entropic Hardness for Ring-LWE}, howpublished = {Cryptology ePrint Archive, Report 2020/1185}, year = {2020}, url = {https://eprint.iacr.org/2020/1185}, } @misc{cryptoeprint:2020:1186, author = {Zvika Brakerski and Pedro Branco and Nico Döttling and Sanjam Garg and Giulio Malavolta}, title = {Constant Ciphertext-Rate Non-Committing Encryption from Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2020/1186}, year = {2020}, url = {https://eprint.iacr.org/2020/1186}, } @misc{cryptoeprint:2020:1187, author = {David Lanzenberger and Ueli Maurer}, title = {Coupling of Random Systems}, howpublished = {Cryptology ePrint Archive, Report 2020/1187}, year = {2020}, url = {https://eprint.iacr.org/2020/1187}, } @misc{cryptoeprint:2020:1188, author = {Navid Alamati and Luca De Feo and Hart Montgomery and Sikhar Patranabis}, title = {Cryptographic Group Actions and Applications}, howpublished = {Cryptology ePrint Archive, Report 2020/1188}, year = {2020}, url = {https://eprint.iacr.org/2020/1188}, } @misc{cryptoeprint:2020:1189, author = {Karim Baghery and Alonso González and Zaira Pindado and Carla Ràfols}, title = {Signatures of Knowledge for Boolean Circuits under Standard Assumptions (Full version)}, howpublished = {Cryptology ePrint Archive, Report 2020/1189}, year = {2020}, url = {https://eprint.iacr.org/2020/1189}, } @misc{cryptoeprint:2020:118, author = {Saeid Sahraei and Salman Avestimehr}, title = {InfoCommit: Information-Theoretic Polynomial Commitment and Verification}, howpublished = {Cryptology ePrint Archive, Report 2020/118}, year = {2020}, url = {https://eprint.iacr.org/2020/118}, } @misc{cryptoeprint:2020:1190, author = {Cecilia Boschini and Jan Camenisch and Max Ovsiankin and Nicholas Spooner}, title = {Efficient Post-Quantum SNARKs for RSIS and RLWE and their Applications to Privacy}, howpublished = {Cryptology ePrint Archive, Report 2020/1190}, year = {2020}, url = {https://eprint.iacr.org/2020/1190}, } @misc{cryptoeprint:2020:1191, author = {Mark Zhandry}, title = {Schr{\"o}dinger's Pirate: How To Trace a Quantum Decoder}, howpublished = {Cryptology ePrint Archive, Report 2020/1191}, year = {2020}, url = {https://eprint.iacr.org/2020/1191}, } @misc{cryptoeprint:2020:1192, author = {Yuan Yao and Tarun Kathuria and Baris Ege and Patrick Schaumont}, title = {Architecture Correlation Analysis (ACA): Identifying the Source of Side-channel Leakage at Gate-level}, howpublished = {Cryptology ePrint Archive, Report 2020/1192}, year = {2020}, url = {https://eprint.iacr.org/2020/1192}, } @misc{cryptoeprint:2020:1193, author = {Shoei Nashimoto and Daisuke Suzuki and Rei Ueno and Naofumi Homma}, title = {Bypassing Isolated Execution on RISC-V with Fault Injection}, howpublished = {Cryptology ePrint Archive, Report 2020/1193}, year = {2020}, url = {https://eprint.iacr.org/2020/1193}, } @misc{cryptoeprint:2020:1194, author = {Andrea Coladangelo and Christian Majenz and Alexander Poremba}, title = {Quantum copy-protection of compute-and-compare programs in the quantum random oracle model}, howpublished = {Cryptology ePrint Archive, Report 2020/1194}, year = {2020}, url = {https://eprint.iacr.org/2020/1194}, } @misc{cryptoeprint:2020:1195, author = {David Cash and Andrew Drucker and Alexander Hoover}, title = {A Lower Bound for One-Round Oblivious RAM}, howpublished = {Cryptology ePrint Archive, Report 2020/1195}, year = {2020}, url = {https://eprint.iacr.org/2020/1195}, } @misc{cryptoeprint:2020:1196, author = {Arthur Van Der Merwe and David Paul and Jelena Schmalz and Timothy M. Schaerf}, title = {TR-31 and AS 2805 (Non)equivalence report}, howpublished = {Cryptology ePrint Archive, Report 2020/1196}, year = {2020}, url = {https://eprint.iacr.org/2020/1196}, } @misc{cryptoeprint:2020:1197, author = {Rachit Garg and Dakshita Khurana and George Lu and Brent Waters}, title = {Black-Box Non-Interactive Non-Malleable Commitments}, howpublished = {Cryptology ePrint Archive, Report 2020/1197}, year = {2020}, url = {https://eprint.iacr.org/2020/1197}, } @misc{cryptoeprint:2020:1198, author = {Davide Poggi and Philippe Maurine and Thomas Ordas and Alexandre Sara fianos and Jérémy Raoult}, title = {Finding EM leakages at design stage: a simulation methodology}, howpublished = {Cryptology ePrint Archive, Report 2020/1198}, year = {2020}, url = {https://eprint.iacr.org/2020/1198}, } @misc{cryptoeprint:2020:1199, author = {Yevgeniy Dodis and Pooya Farshim and Sogol Mazaheri and Stefano Tessaro}, title = {Towards Defeating Backdoored Random Oracles: Indifferentiability with Bounded Adaptivity}, howpublished = {Cryptology ePrint Archive, Report 2020/1199}, year = {2020}, url = {https://eprint.iacr.org/2020/1199}, } @misc{cryptoeprint:2020:119, author = {Zvika Brakerski and Nico Döttling}, title = {Hardness of LWE on General Entropic Distributions}, howpublished = {Cryptology ePrint Archive, Report 2020/119}, year = {2020}, url = {https://eprint.iacr.org/2020/119}, } @misc{cryptoeprint:2020:1200, author = {Yatao Yang and Ye Zhang and Yuying Zhai and Zheng Yuan and Guangwu Xu}, title = {WBCD: White-box Block Cipher Scheme Based on Dynamic Library}, howpublished = {Cryptology ePrint Archive, Report 2020/1200}, year = {2020}, url = {https://eprint.iacr.org/2020/1200}, } @misc{cryptoeprint:2020:1201, author = {Tingting Cui and Lorenzo Grassi}, title = {Algebraic Key-Recovery Attacks on Reduced-Round Xoofff}, howpublished = {Cryptology ePrint Archive, Report 2020/1201}, year = {2020}, url = {https://eprint.iacr.org/2020/1201}, } @misc{cryptoeprint:2020:1202, author = {Yunsi Fei and Guang Gong and Cheng Gongye and Kalikinkar Mandal and Raghvendra Rohit and Tianhong Xu and Yunjie Yi and Nusa Zidaric}, title = {Correlation Power Analysis and Higher-order Masking Implementation of WAGE}, howpublished = {Cryptology ePrint Archive, Report 2020/1202}, year = {2020}, url = {https://eprint.iacr.org/2020/1202}, } @misc{cryptoeprint:2020:1203, author = {Jean-Philippe Bossuat and Christian Mouchet and Juan Troncoso-Pastoriza and Jean-Pierre Hubaux}, title = {Secure and Efficient Bootstrapping for Approximate Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/1203}, year = {2020}, url = {https://eprint.iacr.org/2020/1203}, } @misc{cryptoeprint:2020:1204, author = {Marc Fischlin and Felix Rohrbach}, title = {Single-to-Multi-Theorem Transformations for Non-Interactive Statistical Zero-Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2020/1204}, year = {2020}, url = {https://eprint.iacr.org/2020/1204}, } @misc{cryptoeprint:2020:1205, author = {Benjamin Kuykendall and Mark Zhandry}, title = {Towards Non-Interactive Witness Hiding}, howpublished = {Cryptology ePrint Archive, Report 2020/1205}, year = {2020}, url = {https://eprint.iacr.org/2020/1205}, } @misc{cryptoeprint:2020:1206, author = {Andrey Sobol}, title = {Frontrunning on Automated Decentralized Exchange in Proof Of Stake Environment}, howpublished = {Cryptology ePrint Archive, Report 2020/1206}, year = {2020}, url = {https://eprint.iacr.org/2020/1206}, } @misc{cryptoeprint:2020:1207, author = {Kamyar Mohajerani and Richard Haeussler and Rishub Nagpal and Farnoud Farahmand and Abubakr Abdulgadir and Jens-Peter Kaps and Kris Gaj}, title = {FPGA Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process: Methodology, Metrics, Tools, and Results}, howpublished = {Cryptology ePrint Archive, Report 2020/1207}, year = {2020}, url = {https://eprint.iacr.org/2020/1207}, } @misc{cryptoeprint:2020:1208, author = {Vitaly Kiryukhin}, title = {An algorithm for bounding non-minimum weight differentials in 2-round LSX-ciphers}, howpublished = {Cryptology ePrint Archive, Report 2020/1208}, year = {2020}, url = {https://eprint.iacr.org/2020/1208}, } @misc{cryptoeprint:2020:1209, author = {Christian Badertscher and Ran Canetti and Julia Hesse and Björn Tackmann and Vassilis Zikas}, title = {Universal Composition with Global Subroutines: Capturing Global Setup within plain UC}, howpublished = {Cryptology ePrint Archive, Report 2020/1209}, year = {2020}, url = {https://eprint.iacr.org/2020/1209}, } @misc{cryptoeprint:2020:120, author = {Léo Ducas and Thijs Laarhoven and Wessel P.J. van Woerden}, title = {The randomized slicer for CVPP: sharper, faster, smaller, batchier}, howpublished = {Cryptology ePrint Archive, Report 2020/120}, year = {2020}, url = {https://eprint.iacr.org/2020/120}, } @misc{cryptoeprint:2020:1210, author = {Yusuke Yoshida and Fuyuki Kitagawa and Keita Xagawa and Keisuke Tanaka}, title = {Non-Committing Encryption with Constant Ciphertext Expansion from Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2020/1210}, year = {2020}, url = {https://eprint.iacr.org/2020/1210}, } @misc{cryptoeprint:2020:1211, author = {Xiao Chen}, title = {Public-key Authenticate Encryption with Keyword Search Revised:\\ Probabilistic TrapGen algorithm}, howpublished = {Cryptology ePrint Archive, Report 2020/1211}, year = {2020}, url = {https://eprint.iacr.org/2020/1211}, } @misc{cryptoeprint:2020:1212, author = {Ran Canetti and Pratik Sarkar and Xiao Wang}, title = {Triply Adaptive UC NIZK}, howpublished = {Cryptology ePrint Archive, Report 2020/1212}, year = {2020}, url = {https://eprint.iacr.org/2020/1212}, } @misc{cryptoeprint:2020:1213, author = {Joseph Jaeger and Stefano Tessaro}, title = {Expected-Time Cryptography: Generic Techniques and Applications to Concrete Soundness}, howpublished = {Cryptology ePrint Archive, Report 2020/1213}, year = {2020}, url = {https://eprint.iacr.org/2020/1213}, } @misc{cryptoeprint:2020:1214, author = {Majid Mumtaz and Ping Luo}, title = {Cryptanalysis of RSA: A Special Case of Boneh-Durfee’s Attack}, howpublished = {Cryptology ePrint Archive, Report 2020/1214}, year = {2020}, url = {https://eprint.iacr.org/2020/1214}, } @misc{cryptoeprint:2020:1215, author = {Steve Babbage and Alexander Maximov}, title = {Differential analysis of the ZUC-256 initialisation}, howpublished = {Cryptology ePrint Archive, Report 2020/1215}, year = {2020}, url = {https://eprint.iacr.org/2020/1215}, } @misc{cryptoeprint:2020:1216, author = {Erdem Alkim and Dean Yun-Li Cheng and Chi-Ming Marvin Chung and Hülya Evkan and Leo Wei-Lun Huang and Vincent Hwang and Ching-Lin Trista Li and Ruben Niederhagen and Cheng-Jhih Shih and Julian Wälde and Bo-Yin Yang}, title = {Polynomial Multiplication in NTRU Prime: Comparison of Optimization Strategies on Cortex-M4}, howpublished = {Cryptology ePrint Archive, Report 2020/1216}, year = {2020}, url = {https://eprint.iacr.org/2020/1216}, } @misc{cryptoeprint:2020:1217, author = {Pedro Hecht}, title = {R-Propping of HK17: Upgrade for a Detached Proposal of NIST PQC First Round Survey}, howpublished = {Cryptology ePrint Archive, Report 2020/1217}, year = {2020}, url = {https://eprint.iacr.org/2020/1217}, } @misc{cryptoeprint:2020:1218, author = {Shingo Sato and Junji Shikata}, title = {Interactive Aggregate Message Authentication Equipped with Detecting Functionality from Adaptive Group Testing}, howpublished = {Cryptology ePrint Archive, Report 2020/1218}, year = {2020}, url = {https://eprint.iacr.org/2020/1218}, } @misc{cryptoeprint:2020:1219, author = {Shingo Sato and Junji Shikata and Tsutomu Matsumoto}, title = {Aggregate Signature with Detecting Functionality from Group Testing}, howpublished = {Cryptology ePrint Archive, Report 2020/1219}, year = {2020}, url = {https://eprint.iacr.org/2020/1219}, } @misc{cryptoeprint:2020:121, author = {Hao Chen and Ilia Iliashenko and Kim Laine}, title = {When HEAAN Meets FV: a New Somewhat Homomorphic Encryption with Reduced Memory Overhead}, howpublished = {Cryptology ePrint Archive, Report 2020/121}, year = {2020}, url = {https://eprint.iacr.org/2020/121}, } @misc{cryptoeprint:2020:1220, author = {Hassan Jameel Asghar and Slawomir Matelski and Josef Pieprzyk}, title = {The Topographic Signature (TopoSign) Protocol}, howpublished = {Cryptology ePrint Archive, Report 2020/1220}, year = {2020}, url = {https://eprint.iacr.org/2020/1220}, } @misc{cryptoeprint:2020:1221, author = {Tatsuya Suzuki and Keita Emura and Toshihiro Ohigashi and Kazumasa Omote}, title = {Verifiable Functional Encryption using Intel SGX}, howpublished = {Cryptology ePrint Archive, Report 2020/1221}, year = {2020}, url = {https://eprint.iacr.org/2020/1221}, } @misc{cryptoeprint:2020:1222, author = {Muhammed F. Esgin and Veronika Kuchta and Amin Sakzad and Ron Steinfeld and Zhenfei Zhang and Shifeng Sun and Shumo Chu}, title = {Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand}, howpublished = {Cryptology ePrint Archive, Report 2020/1222}, year = {2020}, url = {https://eprint.iacr.org/2020/1222}, } @misc{cryptoeprint:2020:1223, author = {Jonathan Takeshita and Dayane Reis and Ting Gong and Michael Niemier and X. Sharon Hu and Taeho Jung}, title = {Algorithmic Acceleration of B/FV-like Somewhat Homomorphic Encryption for Compute-Enabled RAM}, howpublished = {Cryptology ePrint Archive, Report 2020/1223}, year = {2020}, url = {https://eprint.iacr.org/2020/1223}, } @misc{cryptoeprint:2020:1224, author = {Alexandros Bakas and Antonis Michalas}, title = {Multi-Input Functional Encryption: Efficient Applications From Symmetric Primitives (extended version)}, howpublished = {Cryptology ePrint Archive, Report 2020/1224}, year = {2020}, url = {https://eprint.iacr.org/2020/1224}, } @misc{cryptoeprint:2020:1225, author = {Arpita Patra and Thomas Schneider and Ajith Suresh and Hossein Yalame}, title = {ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2020/1225}, year = {2020}, url = {https://eprint.iacr.org/2020/1225}, } @misc{cryptoeprint:2020:1226, author = {Chen-Da Liu-Zhang and Ueli Maurer}, title = {Synchronous Constructive Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2020/1226}, year = {2020}, url = {https://eprint.iacr.org/2020/1226}, } @misc{cryptoeprint:2020:1227, author = {Muhammad ElSheikh and Amr M. Youssef}, title = {Integral Cryptanalysis of Reduced-Round Tweakable TWINE}, howpublished = {Cryptology ePrint Archive, Report 2020/1227}, year = {2020}, url = {https://eprint.iacr.org/2020/1227}, } @misc{cryptoeprint:2020:1228, author = {Colin O'Flynn}, title = {Low-Cost Body Biasing Injection (BBI) Attacks on WLCSP Devices}, howpublished = {Cryptology ePrint Archive, Report 2020/1228}, year = {2020}, url = {https://eprint.iacr.org/2020/1228}, } @misc{cryptoeprint:2020:1229, author = {Zhaohua Chen and Guang Yang}, title = {Decentralized Custody Scheme with Game-Theoretic Security}, howpublished = {Cryptology ePrint Archive, Report 2020/1229}, year = {2020}, url = {https://eprint.iacr.org/2020/1229}, } @misc{cryptoeprint:2020:122, author = {Najmeh Soroush and Vincenzo Iovino and Alfredo Rial and Peter B. Roenne and Peter Y. A. Ryan}, title = {Verifiable Inner Product Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2020/122}, year = {2020}, url = {https://eprint.iacr.org/2020/122}, } @misc{cryptoeprint:2020:1230, author = {Xiao Chen}, title = {Certificateless Public-key Authenticate Encryption with Keyword Search Revised: MCI and MTP}, howpublished = {Cryptology ePrint Archive, Report 2020/1230}, year = {2020}, url = {https://eprint.iacr.org/2020/1230}, } @misc{cryptoeprint:2020:1231, author = {Richard B. Riddick}, title = {vault1317/signal-dakez: An authenticated key exchange protocol with a public key concealing and a participation deniability designed for secure messaging}, howpublished = {Cryptology ePrint Archive, Report 2020/1231}, year = {2020}, url = {https://eprint.iacr.org/2020/1231}, } @misc{cryptoeprint:2020:1232, author = {Nicolas Sendrier and Valentin Vasseur}, title = {On the Existence of Weak Keys for QC-MDPC Decoding}, howpublished = {Cryptology ePrint Archive, Report 2020/1232}, year = {2020}, url = {https://eprint.iacr.org/2020/1232}, } @misc{cryptoeprint:2020:1233, author = {Farid Javani and Alan T. Sherman}, title = {BVOT: Self-Tallying Boardroom Voting with Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2020/1233}, year = {2020}, url = {https://eprint.iacr.org/2020/1233}, } @misc{cryptoeprint:2020:1234, author = {Masayuki Fukumitsu and Shingo Hasegawa}, title = {Impossibility on the Schnorr Signature from the One-more DL Assumption in the Non-programmable Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2020/1234}, year = {2020}, url = {https://eprint.iacr.org/2020/1234}, } @misc{cryptoeprint:2020:1235, author = {Ting Rong Lee and Je Sen Teh and Jasy Liew Suet Yan and Norziana Jamil and Jiageng Chen}, title = {Assessing Block Cipher Security using Linear and Nonlinear Machine Learning Models}, howpublished = {Cryptology ePrint Archive, Report 2020/1235}, year = {2020}, url = {https://eprint.iacr.org/2020/1235}, } @misc{cryptoeprint:2020:1236, author = {Jun Wan and Hanshen Xiao and Srinivas Devadas and Elaine Shi }, title = {Round-Efficient Byzantine Broadcast under Strongly Adaptive and Majority Corruptions}, howpublished = {Cryptology ePrint Archive, Report 2020/1236}, year = {2020}, url = {https://eprint.iacr.org/2020/1236}, } @misc{cryptoeprint:2020:1237, author = {Jianwei Li and Phong Q. Nguyen}, title = {A Complete Analysis of the BKZ Lattice Reduction Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2020/1237}, year = {2020}, url = {https://eprint.iacr.org/2020/1237}, } @misc{cryptoeprint:2020:1238, author = {Hao Lin and Yang Wang and Mingqiang Wang}, title = {Hardness of Module-LWE and Ring-LWE on General Entropic Distributions}, howpublished = {Cryptology ePrint Archive, Report 2020/1238}, year = {2020}, url = {https://eprint.iacr.org/2020/1238}, } @misc{cryptoeprint:2020:1239, author = {Alin Tomescu and Yu Xia and Zachary Newman}, title = {Authenticated Dictionaries with Cross-Incremental Proof (Dis)aggregation}, howpublished = {Cryptology ePrint Archive, Report 2020/1239}, year = {2020}, url = {https://eprint.iacr.org/2020/1239}, } @misc{cryptoeprint:2020:123, author = {Alberto Garoffolo and Dmytro Kaidalov and Roman Oliynykov}, title = {Zendoo: a zk-SNARK Verifiable Cross-Chain Transfer Protocol Enabling Decoupled and Decentralized Sidechains}, howpublished = {Cryptology ePrint Archive, Report 2020/123}, year = {2020}, url = {https://eprint.iacr.org/2020/123}, } @misc{cryptoeprint:2020:1240, author = {Luca De Feo and David Kohel and Antonin Leroux and Christophe Petit and Benjamin Wesolowski}, title = {SQISign: compact post-quantum signatures from quaternions and isogenies}, howpublished = {Cryptology ePrint Archive, Report 2020/1240}, year = {2020}, url = {https://eprint.iacr.org/2020/1240}, } @misc{cryptoeprint:2020:1241, author = {Siang Meng Sim and Dirmanto Jap and Shivam Bhasin}, title = {DAPA: Differential Analysis aided Power Attack on (Non-)Linear Feedback Shift Registers (Extended version)}, howpublished = {Cryptology ePrint Archive, Report 2020/1241}, year = {2020}, url = {https://eprint.iacr.org/2020/1241}, } @misc{cryptoeprint:2020:1242, author = {Fulei Ji and Wentao Zhang and Chunning Zhou and Tianyou Ding}, title = {Improved (Related-key) Differential Cryptanalysis on GIFT}, howpublished = {Cryptology ePrint Archive, Report 2020/1242}, year = {2020}, url = {https://eprint.iacr.org/2020/1242}, } @misc{cryptoeprint:2020:1243, author = {Hiroki Furue and Yasuhiko Ikematsu and Yutaro Kiyomura and Tsuyoshi Takagi}, title = {A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV}, howpublished = {Cryptology ePrint Archive, Report 2020/1243}, year = {2020}, url = {https://eprint.iacr.org/2020/1243}, } @misc{cryptoeprint:2020:1244, author = {Konstantinos Chalkias and François Garillot and Valeria Nikolaenko}, title = {Taming the many EdDSAs}, howpublished = {Cryptology ePrint Archive, Report 2020/1244}, year = {2020}, url = {https://eprint.iacr.org/2020/1244}, } @misc{cryptoeprint:2020:1245, author = {Handan Kilinc Alper and Jeffrey Burdges}, title = {Two-round trip Schnorr multi-signatures via delinearized witnesses}, howpublished = {Cryptology ePrint Archive, Report 2020/1245}, year = {2020}, url = {https://eprint.iacr.org/2020/1245}, } @misc{cryptoeprint:2020:1246, author = {Gianluca Brian and Antonio Faonio and Maciej Obremski and João Ribeiro and Mark Simkin and Maciej Skórski and Daniele Venturi}, title = {The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free}, howpublished = {Cryptology ePrint Archive, Report 2020/1246}, year = {2020}, url = {https://eprint.iacr.org/2020/1246}, } @misc{cryptoeprint:2020:1247, author = {Jiaheng Zhang and Weijie Wang and Yinuo Zhang and Yupeng Zhang}, title = {Doubly Efficient Interactive Proofs for General Arithmetic Circuits with Linear Prover Time}, howpublished = {Cryptology ePrint Archive, Report 2020/1247}, year = {2020}, url = {https://eprint.iacr.org/2020/1247}, } @misc{cryptoeprint:2020:1248, author = {Craig Gentry and Shai Halevi and Bernardo Magri and Jesper Buus Nielsen and Sophia Yakoubov}, title = {Random-index PIR with Applications to Large-Scale Secure MPC}, howpublished = {Cryptology ePrint Archive, Report 2020/1248}, year = {2020}, url = {https://eprint.iacr.org/2020/1248}, } @misc{cryptoeprint:2020:1249, author = {Marilyn George and Seny Kamara}, title = {Adversarial Level Agreements for Two-Party Protocols}, howpublished = {Cryptology ePrint Archive, Report 2020/1249}, year = {2020}, url = {https://eprint.iacr.org/2020/1249}, } @misc{cryptoeprint:2020:124, author = {Ali El Kaafarani and Shuichi Katsumata and Federico Pintore}, title = {Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512}, howpublished = {Cryptology ePrint Archive, Report 2020/124}, year = {2020}, url = {https://eprint.iacr.org/2020/124}, } @misc{cryptoeprint:2020:1250, author = {Zhe Li and Chaoping Xing and Sze Ling Yeo}, title = {A New Code Based Signature Scheme without Trapdoors}, howpublished = {Cryptology ePrint Archive, Report 2020/1250}, year = {2020}, url = {https://eprint.iacr.org/2020/1250}, } @misc{cryptoeprint:2020:1251, author = {Dong-Hoon Lee and Young-Sik Kim and Jong-Seon No}, title = {Bit Security Estimation Using Various Information-Theoretic Measures}, howpublished = {Cryptology ePrint Archive, Report 2020/1251}, year = {2020}, url = {https://eprint.iacr.org/2020/1251}, } @misc{cryptoeprint:2020:1252, author = {Nishanth Chandran and Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar}, title = {Constant Rate (Non-malleable) Secret Sharing Schemes Tolerating Joint Adaptive Leakage}, howpublished = {Cryptology ePrint Archive, Report 2020/1252}, year = {2020}, url = {https://eprint.iacr.org/2020/1252}, } @misc{cryptoeprint:2020:1253, author = {Gaëtan Leurent and Clara Pernot}, title = {New Representations of the AES Key Schedule}, howpublished = {Cryptology ePrint Archive, Report 2020/1253}, year = {2020}, url = {https://eprint.iacr.org/2020/1253}, } @misc{cryptoeprint:2020:1254, author = {Ivan Damgård and Bernardo Magri and Luisa Siniscalchi and Sophia Yakoubov}, title = {Broadcast-Optimal Two Round MPC with an Honest Majority}, howpublished = {Cryptology ePrint Archive, Report 2020/1254}, year = {2020}, url = {https://eprint.iacr.org/2020/1254}, } @misc{cryptoeprint:2020:1255, author = {Sean Murphy and Maura Paterson and Christine Swart}, title = {Boolean Ring Cryptographic Equation Solving}, howpublished = {Cryptology ePrint Archive, Report 2020/1255}, year = {2020}, url = {https://eprint.iacr.org/2020/1255}, } @misc{cryptoeprint:2020:1256, author = {Mark Abspoel and Ronald Cramer and Ivan Damgård Daniel Escudero and Matthieu Rambaud and Chaoping Xing and Chen Yuan}, title = {Asymptotically Good Multiplicative LSSS over Galois Rings and Applications to MPC over Z/p^k Z}, howpublished = {Cryptology ePrint Archive, Report 2020/1256}, year = {2020}, url = {https://eprint.iacr.org/2020/1256}, } @misc{cryptoeprint:2020:1257, author = {ZaHyun Koo and Jong-Seon No and Young-Sik Kim}, title = {Improved Reduction Between SIS Problems over Structured Lattices}, howpublished = {Cryptology ePrint Archive, Report 2020/1257}, year = {2020}, url = {https://eprint.iacr.org/2020/1257}, } @misc{cryptoeprint:2020:1258, author = {Dhruv Thapar and Manaar Alam and Debdeep Mukhopadhyay}, title = {TranSCA: Cross-Family Profiled Side-Channel Attacks using Transfer Learning on Deep Neural Networks}, howpublished = {Cryptology ePrint Archive, Report 2020/1258}, year = {2020}, url = {https://eprint.iacr.org/2020/1258}, } @misc{cryptoeprint:2020:1259, author = {Yibiao Lu and Bingsheng Zhang and Weiran Liu and Lei Zhang}, title = {Silent Two-party Computation Assisted by Semi-trusted Hardware}, howpublished = {Cryptology ePrint Archive, Report 2020/1259}, year = {2020}, url = {https://eprint.iacr.org/2020/1259}, } @misc{cryptoeprint:2020:125, author = {Gilad Asharov and Ilan Komargodski and Wei-Kai Lin and Enoch Peserico and Elaine Shi}, title = {Oblivious Parallel Tight Compaction}, howpublished = {Cryptology ePrint Archive, Report 2020/125}, year = {2020}, url = {https://eprint.iacr.org/2020/125}, } @misc{cryptoeprint:2020:1260, author = {Martin R. Albrecht and Shi Bai and Jianwei Li and Joe Rowell}, title = {Lattice Reduction with Approximate Enumeration Oracles: Practical Algorithms and Concrete Performance}, howpublished = {Cryptology ePrint Archive, Report 2020/1260}, year = {2020}, url = {https://eprint.iacr.org/2020/1260}, } @misc{cryptoeprint:2020:1261, author = {Jonas Nick and Tim Ruffing and Yannick Seurin}, title = {MuSig2: Simple Two-Round Schnorr Multi-Signatures}, howpublished = {Cryptology ePrint Archive, Report 2020/1261}, year = {2020}, url = {https://eprint.iacr.org/2020/1261}, } @misc{cryptoeprint:2020:1262, author = {Paolo D'Arco and Francesco Mogavero}, title = {On (multi-stage) Proof-of-Work blockchain protocols}, howpublished = {Cryptology ePrint Archive, Report 2020/1262}, year = {2020}, url = {https://eprint.iacr.org/2020/1262}, } @misc{cryptoeprint:2020:1263, author = {Duc-Phong Le and Rongxing Lu and Ali A. Ghorbani}, title = {Improved Fault Analysis on SIMECK Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2020/1263}, year = {2020}, url = {https://eprint.iacr.org/2020/1263}, } @misc{cryptoeprint:2020:1264, author = {Slawomir Matelski}, title = {The i-Chip as One-Time Password (OTP) & digital signature generator}, howpublished = {Cryptology ePrint Archive, Report 2020/1264}, year = {2020}, url = {https://eprint.iacr.org/2020/1264}, } @misc{cryptoeprint:2020:1265, author = {Jonas Wloka and Jan Richter-Brockmann and Colin Stahlke and Thorsten Kleinjung and Christine Priplata and Tim Güneysu}, title = {Revisiting ECM on GPUs}, howpublished = {Cryptology ePrint Archive, Report 2020/1265}, year = {2020}, url = {https://eprint.iacr.org/2020/1265}, } @misc{cryptoeprint:2020:1266, author = {Shweta Agrawal and Rishab Goyal and Fabrice Mouhartem}, title = {Multi-Party Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/1266}, year = {2020}, url = {https://eprint.iacr.org/2020/1266}, } @misc{cryptoeprint:2020:1267, author = {Anubhab Baksi and Shivam Bhasin and Jakub Breier and Dirmanto Jap and Dhiman Saha}, title = {Fault Attacks In Symmetric Key Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2020/1267}, year = {2020}, url = {https://eprint.iacr.org/2020/1267}, } @misc{cryptoeprint:2020:1268, author = {Anubhab Baksi and Vinay B. Y. Kumar and Banashri Karmakar and Shivam Bhasin and Dhiman Saha and Anupam Chattopadhyay}, title = {A Novel Duplication Based Countermeasure To Statistical Ineffective Fault Analysis}, howpublished = {Cryptology ePrint Archive, Report 2020/1268}, year = {2020}, url = {https://eprint.iacr.org/2020/1268}, } @misc{cryptoeprint:2020:1269, author = {Dušan Božilov and Maria Eichlseder and Miroslav Kneževic and Baptiste Lambin and Gregor Leander and Thorben Moos and Ventzislav Nikov and Shahram Rasoolzadeh and Yosuke Todo and Friedrich Wiemer}, title = {PRINCEv2 - More Security for (Almost) No Overhead}, howpublished = {Cryptology ePrint Archive, Report 2020/1269}, year = {2020}, url = {https://eprint.iacr.org/2020/1269}, } @misc{cryptoeprint:2020:126, author = {Shi-Feng Sun and Amin Sakzad and Ron Steinfeld and Joseph Liu and Dawu Gu}, title = {Public-Key Puncturable Encryption: Modular and Compact Constructions}, howpublished = {Cryptology ePrint Archive, Report 2020/126}, year = {2020}, url = {https://eprint.iacr.org/2020/126}, } @misc{cryptoeprint:2020:1270, author = {Takashi Yamakawa and Mark Zhandry}, title = {Classical vs Quantum Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2020/1270}, year = {2020}, url = {https://eprint.iacr.org/2020/1270}, } @misc{cryptoeprint:2020:1271, author = {Alexandros Bakas and Antonis Michalas}, title = {(F)unctional Sifting: A Privacy-Preserving Reputation System Through Multi-Input Functional Encryption (extended version)}, howpublished = {Cryptology ePrint Archive, Report 2020/1271}, year = {2020}, url = {https://eprint.iacr.org/2020/1271}, } @misc{cryptoeprint:2020:1272, author = {Maximilien Gadouleau and Luca Mariot and Stjepan Picek}, title = {Bent Functions from Cellular Automata}, howpublished = {Cryptology ePrint Archive, Report 2020/1272}, year = {2020}, url = {https://eprint.iacr.org/2020/1272}, } @misc{cryptoeprint:2020:1273, author = {Nai-Hui Chia and Kai-Min Chung and Takashi Yamakawa}, title = {Classical Verification of Quantum Computations with Efficient Verifier}, howpublished = {Cryptology ePrint Archive, Report 2020/1273}, year = {2020}, url = {https://eprint.iacr.org/2020/1273}, } @misc{cryptoeprint:2020:1274, author = {Jonathan Lee}, title = {Dory: Efficient, Transparent arguments for Generalised Inner Products and Polynomial Commitments}, howpublished = {Cryptology ePrint Archive, Report 2020/1274}, year = {2020}, url = {https://eprint.iacr.org/2020/1274}, } @misc{cryptoeprint:2020:1275, author = {Srinath Setty and Jonathan Lee}, title = {Quarks: Quadruple-efficient transparent zkSNARKs}, howpublished = {Cryptology ePrint Archive, Report 2020/1275}, year = {2020}, url = {https://eprint.iacr.org/2020/1275}, } @misc{cryptoeprint:2020:1276, author = {Prasanna Ravi and James Howe and Anupam Chattopadhyay and Shivam Bhasin}, title = {Lattice-based Key Sharing Schemes - A Survey}, howpublished = {Cryptology ePrint Archive, Report 2020/1276}, year = {2020}, url = {https://eprint.iacr.org/2020/1276}, } @misc{cryptoeprint:2020:1277, author = {J. Toulemont and N. Ouldei-Tebina and J. M. Galliere and P. Nouet and E. Bourbao and P. Maurine}, title = {A Simple Protocol to Compare EMFI Platforms}, howpublished = {Cryptology ePrint Archive, Report 2020/1277}, year = {2020}, url = {https://eprint.iacr.org/2020/1277}, } @misc{cryptoeprint:2020:1278, author = {Denisa O. C. Greconici and Matthias J. Kannwischer and Daan Sprenkels}, title = {Compact Dilithium Implementations on Cortex-M3 and Cortex-M4}, howpublished = {Cryptology ePrint Archive, Report 2020/1278}, year = {2020}, url = {https://eprint.iacr.org/2020/1278}, } @misc{cryptoeprint:2020:1279, author = {Tibor Jager and Eike Kiltz and Doreen Riepel and Sven Schäge}, title = {Tightly-Secure Authenticated Key Exchange, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2020/1279}, year = {2020}, url = {https://eprint.iacr.org/2020/1279}, } @misc{cryptoeprint:2020:127, author = {Véronique Cortier and Joseph Lallemand and Bogdan Warinschi}, title = {Fifty Shades of Ballot Privacy: Privacy against a Malicious Board}, howpublished = {Cryptology ePrint Archive, Report 2020/127}, year = {2020}, url = {https://eprint.iacr.org/2020/127}, } @misc{cryptoeprint:2020:1280, author = {Emma Dauterman and Eric Feng and Ellen Luo and Raluca Ada Popa and Ion Stoica}, title = {DORY: An Encrypted Search System with Distributed Trust}, howpublished = {Cryptology ePrint Archive, Report 2020/1280}, year = {2020}, url = {https://eprint.iacr.org/2020/1280}, } @misc{cryptoeprint:2020:1281, author = {Matthew Weidner and Martin Kleppmann and Daniel Hugenroth and Alastair R. Beresford}, title = {Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees}, howpublished = {Cryptology ePrint Archive, Report 2020/1281}, year = {2020}, url = {https://eprint.iacr.org/2020/1281}, } @misc{cryptoeprint:2020:1282, author = {Haiyang Xue and Ho Man Au and Rupeng Yang and Bei Liang and Haodong Jiang}, title = {Compact Authenticated Key Exchange in the Quantum Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2020/1282}, year = {2020}, url = {https://eprint.iacr.org/2020/1282}, } @misc{cryptoeprint:2020:1283, author = {Craig Costello and Michael Meyer and Michael Naehrig}, title = {Sieving for twin smooth integers with solutions to the Prouhet-Tarry-Escott problem}, howpublished = {Cryptology ePrint Archive, Report 2020/1283}, year = {2020}, url = {https://eprint.iacr.org/2020/1283}, } @misc{cryptoeprint:2020:1284, author = {Mitsuru Shiozaki and Yohei Hori and Takeshi Fujino}, title = {Entropy Estimation of Physically Unclonable Functions}, howpublished = {Cryptology ePrint Archive, Report 2020/1284}, year = {2020}, url = {https://eprint.iacr.org/2020/1284}, } @misc{cryptoeprint:2020:1285, author = {Junichi Tomida}, title = {Multi-Input Quadratic Functional Encryption from Pairings}, howpublished = {Cryptology ePrint Archive, Report 2020/1285}, year = {2020}, url = {https://eprint.iacr.org/2020/1285}, } @misc{cryptoeprint:2020:1286, author = {Michele Ciampi and Alexandru Cojocaru and Elham Kashefi and Atul Mantri}, title = {Secure Quantum Two-Party Computation: Impossibility and Constructions}, howpublished = {Cryptology ePrint Archive, Report 2020/1286}, year = {2020}, url = {https://eprint.iacr.org/2020/1286}, } @misc{cryptoeprint:2020:1287, author = {Borja Gómez}, title = {Multivariate Cryptographic Primitive based on the product of the roots of a polynomial over a field}, howpublished = {Cryptology ePrint Archive, Report 2020/1287}, year = {2020}, url = {https://eprint.iacr.org/2020/1287}, } @misc{cryptoeprint:2020:1288, author = {Nina Bindel and Douglas Stebila and Shannon Veitch}, title = {Improved attacks against key reuse in learning with errors key exchange}, howpublished = {Cryptology ePrint Archive, Report 2020/1288}, year = {2020}, url = {https://eprint.iacr.org/2020/1288}, } @misc{cryptoeprint:2020:1289, author = {Farid Elwailly}, title = {Sword: An Opaque Blockchain Protocol}, howpublished = {Cryptology ePrint Archive, Report 2020/1289}, year = {2020}, url = {https://eprint.iacr.org/2020/1289}, } @misc{cryptoeprint:2020:128, author = {Ward Beullens and Cyprien Delpech de Saint Guilhem}, title = {LegRoast: Efficient post-quantum signatures from the Legendre PRF}, howpublished = {Cryptology ePrint Archive, Report 2020/128}, year = {2020}, url = {https://eprint.iacr.org/2020/128}, } @misc{cryptoeprint:2020:1290, author = {Osman Biçer and Alptekin Küpçü}, title = {FORTIS: FORgeable TImeStamps Thwart Selfish Mining}, howpublished = {Cryptology ePrint Archive, Report 2020/1290}, year = {2020}, url = {https://eprint.iacr.org/2020/1290}, } @misc{cryptoeprint:2020:1291, author = {Bernardo David and Rafael Dowsley}, title = {Efficient Composable Oblivious Transfer from CDH in the Global Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2020/1291}, year = {2020}, url = {https://eprint.iacr.org/2020/1291}, } @misc{cryptoeprint:2020:1292, author = {Gilad Asharov and Ilan Komargodski and Wei-Kai Lin and Enoch Peserico and Elaine Shi}, title = {Optimal Oblivious Parallel RAM}, howpublished = {Cryptology ePrint Archive, Report 2020/1292}, year = {2020}, url = {https://eprint.iacr.org/2020/1292}, } @misc{cryptoeprint:2020:1293, author = {Lichao Wu and Guilherme Perin and Stjepan Picek}, title = {I Choose You: Automated Hyperparameter Tuning for Deep Learning-based Side-channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2020/1293}, year = {2020}, url = {https://eprint.iacr.org/2020/1293}, } @misc{cryptoeprint:2020:1294, author = {Barbara Gigerl and Vedad Hadzic and Robert Primas and Stefan Mangard and Roderick Bloem}, title = {Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs}, howpublished = {Cryptology ePrint Archive, Report 2020/1294}, year = {2020}, url = {https://eprint.iacr.org/2020/1294}, } @misc{cryptoeprint:2020:1295, author = {Arne Deprez and Elena Andreeva and Jose Maria Bermudo Mera and Angshuman Karmakar and Antoon Purnal}, title = {Optimized Software Implementations for theLightweight Encryption Scheme ForkAE}, howpublished = {Cryptology ePrint Archive, Report 2020/1295}, year = {2020}, url = {https://eprint.iacr.org/2020/1295}, } @misc{cryptoeprint:2020:1296, author = {Gustavo Banegas and Daniel J. Bernstein and Iggy van Hoof and Tanja Lange}, title = {Concrete quantum cryptanalysis of binary elliptic curves}, howpublished = {Cryptology ePrint Archive, Report 2020/1296}, year = {2020}, url = {https://eprint.iacr.org/2020/1296}, } @misc{cryptoeprint:2020:1297, author = {Lauren De Meyer and Elke De Mulder and Michael Tunstall}, title = {On the Effect of the (Micro)Architecture on the Development of Side-Channel Resistant Software}, howpublished = {Cryptology ePrint Archive, Report 2020/1297}, year = {2020}, url = {https://eprint.iacr.org/2020/1297}, } @misc{cryptoeprint:2020:1298, author = {Enis Ulqinaku and Hala Assal and AbdelRahman Abdou and Sonia Chiasson and Srdjan Čapkun}, title = {Is Real-time Phishing Eliminated with FIDO? Social Engineering Downgrade Attacks against FIDO Protocols}, howpublished = {Cryptology ePrint Archive, Report 2020/1298}, year = {2020}, url = {https://eprint.iacr.org/2020/1298}, } @misc{cryptoeprint:2020:1299, author = {Yunxiu Ye and Zhenfu Cao and Jiachen Shen}, title = {Unbounded Key-Policy Attribute-based Encryption with Black-Box Traceability}, howpublished = {Cryptology ePrint Archive, Report 2020/1299}, year = {2020}, url = {https://eprint.iacr.org/2020/1299}, } @misc{cryptoeprint:2020:129, author = {Juliane Krämer and Patrick Struck}, title = {Encryption Schemes using Random Oracles: from Classical to Post-Quantum Security}, howpublished = {Cryptology ePrint Archive, Report 2020/129}, year = {2020}, url = {https://eprint.iacr.org/2020/129}, } @misc{cryptoeprint:2020:1300, author = {Yunhao Zhang and Srinath Setty and Qi Chen and Lidong Zhou and Lorenzo Alvisi}, title = {Byzantine Ordered Consensus without Byzantine Oligarchy}, howpublished = {Cryptology ePrint Archive, Report 2020/1300}, year = {2020}, url = {https://eprint.iacr.org/2020/1300}, } @misc{cryptoeprint:2020:1301, author = {Nils Fleischhacker and Mark Simkin}, title = {Robust Property-Preserving Hash Functions for Hamming Distance and More}, howpublished = {Cryptology ePrint Archive, Report 2020/1301}, year = {2020}, url = {https://eprint.iacr.org/2020/1301}, } @misc{cryptoeprint:2020:1302, author = {İrem Keskinkurt Paksoy and Murat Cenk}, title = {TMVP-based Multiplication for Polynomial Quotient Rings and Application to Saber on ARM Cortex-M4}, howpublished = {Cryptology ePrint Archive, Report 2020/1302}, year = {2020}, url = {https://eprint.iacr.org/2020/1302}, } @misc{cryptoeprint:2020:1303, author = {Joppe W. Bos and Joost Renes and Christine van Vredendaal}, title = {Polynomial Multiplication with Contemporary Co-Processors: Beyond Kronecker, Schönhage-Strassen & Nussbaumer}, howpublished = {Cryptology ePrint Archive, Report 2020/1303}, year = {2020}, url = {https://eprint.iacr.org/2020/1303}, } @misc{cryptoeprint:2020:1304, author = {Ritam Bhaumik and Xavier Bonnetain and André Chailloux and Gaëtan Leurent and María Naya-Plasencia and André Schrottenloher and Yannick Seurin}, title = {QCB: Efficient Quantum-secure Authenticated Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/1304}, year = {2020}, url = {https://eprint.iacr.org/2020/1304}, } @misc{cryptoeprint:2020:1305, author = {Kai-Min Chung and Serge Fehr and Yu-Hsuan Huang and Tai-Ning Liao}, title = {On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work}, howpublished = {Cryptology ePrint Archive, Report 2020/1305}, year = {2020}, url = {https://eprint.iacr.org/2020/1305}, } @misc{cryptoeprint:2020:1306, author = {Karim Baghery and Zaira Pindado and Carla Ràfols}, title = {Simulation Extractable Versions of Groth’s zk-SNARK Revisited}, howpublished = {Cryptology ePrint Archive, Report 2020/1306}, year = {2020}, url = {https://eprint.iacr.org/2020/1306}, } @misc{cryptoeprint:2020:1307, author = {Pedro Branco and Nico Döttling and Sihang Pu}, title = {Multiparty Cardinality Testing for Threshold Private Set Intersection}, howpublished = {Cryptology ePrint Archive, Report 2020/1307}, year = {2020}, url = {https://eprint.iacr.org/2020/1307}, } @misc{cryptoeprint:2020:1308, author = {Eamonn W. Postlethwaite and Fernando Virdia}, title = {On the Success Probability of Solving Unique SVP via BKZ}, howpublished = {Cryptology ePrint Archive, Report 2020/1308}, year = {2020}, url = {https://eprint.iacr.org/2020/1308}, } @misc{cryptoeprint:2020:1309, author = {Noel Danz and Oliver Derwisch and Anja Lehmann and Wenzel Puenter and Marvin Stolle and Joshua Ziemann}, title = {Security and Privacy of Decentralized Cryptographic Contact Tracing}, howpublished = {Cryptology ePrint Archive, Report 2020/1309}, year = {2020}, url = {https://eprint.iacr.org/2020/1309}, } @misc{cryptoeprint:2020:130, author = {Elette Boyle and Ran Cohen and Aarushi Goel}, title = {Succinctly Reconstructed Distributed Signatures and Balanced Byzantine Agreement}, howpublished = {Cryptology ePrint Archive, Report 2020/130}, year = {2020}, url = {https://eprint.iacr.org/2020/130}, } @misc{cryptoeprint:2020:1310, author = {Karim Belabas and Thorsten Kleinjung and Antonio Sanso and Benjamin Wesolowski}, title = {A note on the low order assumption in class group of an imaginary quadratic number fields}, howpublished = {Cryptology ePrint Archive, Report 2020/1310}, year = {2020}, url = {https://eprint.iacr.org/2020/1310}, } @misc{cryptoeprint:2020:1311, author = {Orr Dunkelman and Abhishek Kumar and Eran Lambooij and Somitra Kumar Sanadhya}, title = {Cryptanalysis of Feistel-Based Format-Preserving Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/1311}, year = {2020}, url = {https://eprint.iacr.org/2020/1311}, } @misc{cryptoeprint:2020:1312, author = {Yi Deng}, title = {Individual Simulations}, howpublished = {Cryptology ePrint Archive, Report 2020/1312}, year = {2020}, url = {https://eprint.iacr.org/2020/1312}, } @misc{cryptoeprint:2020:1313, author = {Maxim Jourenko and Mario Larangeira and Keisuke Tanaka}, title = {Payment Trees: Low Collateral Payments for Payment Channel Networks}, howpublished = {Cryptology ePrint Archive, Report 2020/1313}, year = {2020}, url = {https://eprint.iacr.org/2020/1313}, } @misc{cryptoeprint:2020:1314, author = {Fuyuki Kitagawa and Ryo Nishimaki and Takashi Yamakawa}, title = {Secure Software Leasing from Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2020/1314}, year = {2020}, url = {https://eprint.iacr.org/2020/1314}, } @misc{cryptoeprint:2020:1315, author = {Steven D. Galbraith and Robert Granger and Simon-Philipp Merz and Christophe Petit}, title = {On Index Calculus Algorithms for Subfield Curves}, howpublished = {Cryptology ePrint Archive, Report 2020/1315}, year = {2020}, url = {https://eprint.iacr.org/2020/1315}, } @misc{cryptoeprint:2020:1316, author = {Juliane Krämer and Patrick Struck}, title = {Security of Public Key Encryption against Resetting Attacks}, howpublished = {Cryptology ePrint Archive, Report 2020/1316}, year = {2020}, url = {https://eprint.iacr.org/2020/1316}, } @misc{cryptoeprint:2020:1317, author = {Hosein Hadipour and Nasour Bagheri and Ling Song}, title = {Improved Rectangle Attacks on SKINNY and CRAFT}, howpublished = {Cryptology ePrint Archive, Report 2020/1317}, year = {2020}, url = {https://eprint.iacr.org/2020/1317}, } @misc{cryptoeprint:2020:1318, author = {Abhiram Kothapalli and Elisaweta Masserova and Bryan Parno}, title = {A Direct Construction for Asymptotically Optimal zkSNARKs}, howpublished = {Cryptology ePrint Archive, Report 2020/1318}, year = {2020}, url = {https://eprint.iacr.org/2020/1318}, } @misc{cryptoeprint:2020:1319, author = {Ohad Barta and Yuval Ishai and Rafail Ostrovsky and David J. Wu}, title = {On Succinct Arguments and Witness Encryption from Groups}, howpublished = {Cryptology ePrint Archive, Report 2020/1319}, year = {2020}, url = {https://eprint.iacr.org/2020/1319}, } @misc{cryptoeprint:2020:131, author = {Hamidreza Amini Khorasgani and Hemanta K. Maji and Mingyuan Wang}, title = {Coin Tossing with Lazy Defense: Hardness of Computation Results}, howpublished = {Cryptology ePrint Archive, Report 2020/131}, year = {2020}, url = {https://eprint.iacr.org/2020/131}, } @misc{cryptoeprint:2020:1320, author = {Subhadeep Banik and Zhenzhen Bao and Takanori Isobe and Hiroyasu Kubo and Fukang Liu and Kazuhiko Minematsu and Kosei Sakamoto and Nao Shibata and Maki Shigeri}, title = {WARP : Revisiting GFN for Lightweight 128-bit Block Cipher}, howpublished = {Cryptology ePrint Archive, Report 2020/1320}, year = {2020}, url = {https://eprint.iacr.org/2020/1320}, } @misc{cryptoeprint:2020:1321, author = {Akinori Hosoyamada and Tetsu Iwata}, title = {Provably Quantum-Secure Tweakable Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2020/1321}, year = {2020}, url = {https://eprint.iacr.org/2020/1321}, } @misc{cryptoeprint:2020:1322, author = {Sebastian Paul and Patrik Scheible}, title = {Towards Post-Quantum Security for Cyber-Physical Systems: Integrating PQC into Industrial M2M Communication}, howpublished = {Cryptology ePrint Archive, Report 2020/1322}, year = {2020}, url = {https://eprint.iacr.org/2020/1322}, } @misc{cryptoeprint:2020:1323, author = {Ward Beullens and Lucas Disson and Robi Pedersen and Frederik Vercauteren}, title = {CSI-RAShi: Distributed key generation for CSIDH}, howpublished = {Cryptology ePrint Archive, Report 2020/1323}, year = {2020}, url = {https://eprint.iacr.org/2020/1323}, } @misc{cryptoeprint:2020:1324, author = {Aniruddha Biswas and Palash Sarkar}, title = {Separation Results for Boolean Function Classes}, howpublished = {Cryptology ePrint Archive, Report 2020/1324}, year = {2020}, url = {https://eprint.iacr.org/2020/1324}, } @misc{cryptoeprint:2020:1325, author = {Adrián Ranea and Bart Preneel}, title = {On Self-Equivalence Encodings in White-Box Implementations}, howpublished = {Cryptology ePrint Archive, Report 2020/1325}, year = {2020}, url = {https://eprint.iacr.org/2020/1325}, } @misc{cryptoeprint:2020:1326, author = {Chris Brzuska and Geoffroy Couteau}, title = {Towards Fine-Grained One-Way Functions from Strong Average-Case Hardness}, howpublished = {Cryptology ePrint Archive, Report 2020/1326}, year = {2020}, url = {https://eprint.iacr.org/2020/1326}, } @misc{cryptoeprint:2020:1327, author = {Joël Alwen and Daniel Jost and Marta Mularczyk}, title = {On The Insider Security of MLS}, howpublished = {Cryptology ePrint Archive, Report 2020/1327}, year = {2020}, url = {https://eprint.iacr.org/2020/1327}, } @misc{cryptoeprint:2020:1328, author = {Zichen Gui and Kenneth G. Paterson and Sikhar Patranabis and Bogdan Warinschi}, title = {SWiSSSE: System-Wide Security for Searchable Symmetric Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/1328}, year = {2020}, url = {https://eprint.iacr.org/2020/1328}, } @misc{cryptoeprint:2020:1329, author = {Pratyay Mukherjee}, title = {Adaptively secure Threshold Symmetric-key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/1329}, year = {2020}, url = {https://eprint.iacr.org/2020/1329}, } @misc{cryptoeprint:2020:132, author = {Dario Fiore and Anca Nitulescu and David Pointcheval}, title = {Boosting Verifiable Computation on Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2020/132}, year = {2020}, url = {https://eprint.iacr.org/2020/132}, } @misc{cryptoeprint:2020:1330, author = {Anders Dalskov and Daniel Escudero and Marcel Keller}, title = {Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious Security}, howpublished = {Cryptology ePrint Archive, Report 2020/1330}, year = {2020}, url = {https://eprint.iacr.org/2020/1330}, } @misc{cryptoeprint:2020:1331, author = {Kristian Gjøsteen and Thomas Haines and Morten Rotvold Solberg}, title = {Efficient mixing of arbitrary ballots with everlasting privacy: How to verifiably mix the PPATC scheme}, howpublished = {Cryptology ePrint Archive, Report 2020/1331}, year = {2020}, url = {https://eprint.iacr.org/2020/1331}, } @misc{cryptoeprint:2020:1332, author = {Ashley Fraser and Elizabeth A. Quaglia}, title = {Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting}, howpublished = {Cryptology ePrint Archive, Report 2020/1332}, year = {2020}, url = {https://eprint.iacr.org/2020/1332}, } @misc{cryptoeprint:2020:1333, author = {Vanesa Daza and Carla Ràfols and Alexandros Zacharakis}, title = {Updateable Inner Product Argument with Logarithmic Verifier and Applications}, howpublished = {Cryptology ePrint Archive, Report 2020/1333}, year = {2020}, url = {https://eprint.iacr.org/2020/1333}, } @misc{cryptoeprint:2020:1334, author = {Benoît Libert and Khoa Nguyen and Thomas Peters and Moti Yung}, title = {Compact Simulation-Sound NIZK Arguments of Composite Residuosity and Applications to Logarithmic-Size Ring Signatures}, howpublished = {Cryptology ePrint Archive, Report 2020/1334}, year = {2020}, url = {https://eprint.iacr.org/2020/1334}, } @misc{cryptoeprint:2020:1335, author = {Jihoon Cho and Jincheol Ha and Seongkwang Kim and Joohee Lee and Jooyoung Lee and Dukjae Moon and Hyojin Yoon}, title = {Hybrid Framework for Approximate Computation over Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2020/1335}, year = {2020}, url = {https://eprint.iacr.org/2020/1335}, } @misc{cryptoeprint:2020:1336, author = {Esra Yeniaras and Murat Cenk}, title = {Faster Characteristic Three Polynomial Multiplication and Its Application to NTRU Prime Decapsulation}, howpublished = {Cryptology ePrint Archive, Report 2020/1336}, year = {2020}, url = {https://eprint.iacr.org/2020/1336}, } @misc{cryptoeprint:2020:1337, author = {Achintya Desai and Shubham Raj and Kannan Srinathan}, title = {Multiplicative Depth Independent & Efficient MPC in the Presence of Mixed Adversary}, howpublished = {Cryptology ePrint Archive, Report 2020/1337}, year = {2020}, url = {https://eprint.iacr.org/2020/1337}, } @misc{cryptoeprint:2020:1338, author = {Mojtaba Bisheh Niasar and Reza Azarderakhsh and Mehran Mozaffari Kermani}, title = {Optimized Architectures for Elliptic Curve Cryptography over Curve448}, howpublished = {Cryptology ePrint Archive, Report 2020/1338}, year = {2020}, url = {https://eprint.iacr.org/2020/1338}, } @misc{cryptoeprint:2020:1339, author = {Scott Aaronson and Jiahui Liu and Qipeng Liu Mark Zhandry and RuizheZhang}, title = {New Approaches for Quantum Copy-Protection}, howpublished = {Cryptology ePrint Archive, Report 2020/1339}, year = {2020}, url = {https://eprint.iacr.org/2020/1339}, } @misc{cryptoeprint:2020:133, author = {Souradyuti Paul and Ananya Shrivastava}, title = {Efficient and Fair Multiparty Protocols using Blockchain and Trusted Hardware}, howpublished = {Cryptology ePrint Archive, Report 2020/133}, year = {2020}, url = {https://eprint.iacr.org/2020/133}, } @misc{cryptoeprint:2020:1340, author = {Yu Xue}, title = {Homomorphic Evaluation of the SM4}, howpublished = {Cryptology ePrint Archive, Report 2020/1340}, year = {2020}, url = {https://eprint.iacr.org/2020/1340}, } @misc{cryptoeprint:2020:1341, author = {Varun Narayanan and Manoj Prabhakaran and Vinod M. Prabhakaran}, title = {Zero-Communication Reductions}, howpublished = {Cryptology ePrint Archive, Report 2020/1341}, year = {2020}, url = {https://eprint.iacr.org/2020/1341}, } @misc{cryptoeprint:2020:1342, author = {Sikhar Patranabis and Debdeep Mukhopadhyay}, title = {Forward and Backward Private Conjunctive Searchable Symmetric Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/1342}, year = {2020}, url = {https://eprint.iacr.org/2020/1342}, } @misc{cryptoeprint:2020:1343, author = {Ward Beullens}, title = {Improved Cryptanalysis of UOV and Rainbow}, howpublished = {Cryptology ePrint Archive, Report 2020/1343}, year = {2020}, url = {https://eprint.iacr.org/2020/1343}, } @misc{cryptoeprint:2020:1344, author = {Akinori Hosoyamada and Tetsu Iwata}, title = {Indifferentiability of SKINNY-HASH Internal Functions}, howpublished = {Cryptology ePrint Archive, Report 2020/1344}, year = {2020}, url = {https://eprint.iacr.org/2020/1344}, } @misc{cryptoeprint:2020:1345, author = {Erkan Tairi and Pedro Moreno-Sanchez and Matteo Maffei}, title = {Post-Quantum Adaptor Signature for Privacy-Preserving Off-Chain Payments}, howpublished = {Cryptology ePrint Archive, Report 2020/1345}, year = {2020}, url = {https://eprint.iacr.org/2020/1345}, } @misc{cryptoeprint:2020:1346, author = {Shlomi Dolev and Ziyu Wang}, title = {SodsMPC: FSM based Anonymous and Private Quantum-safe Smart Contracts}, howpublished = {Cryptology ePrint Archive, Report 2020/1346}, year = {2020}, url = {https://eprint.iacr.org/2020/1346}, } @misc{cryptoeprint:2020:1347, author = {Melissa Azouaoui and Davide Bellizia and Ileana Buhan and Nicolas Debande and Sebastien Duval and Christophe Giraud and Eliane Jaulmes and Francois Koeune and Elisabeth Oswald and Francois-Xavier Standaert and Carolyn Whitnall}, title = {A Systematic Appraisal of Side Channel Evaluation Strategies}, howpublished = {Cryptology ePrint Archive, Report 2020/1347}, year = {2020}, url = {https://eprint.iacr.org/2020/1347}, } @misc{cryptoeprint:2020:1348, author = {Martha Norberg Hovd and Martijn Stam}, title = {Vetted Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/1348}, year = {2020}, url = {https://eprint.iacr.org/2020/1348}, } @misc{cryptoeprint:2020:1349, author = {Howard M. Heys}, title = {Key Dependency of Differentials: Experiments in the Differential Cryptanalysis of Block Ciphers Using Small S-boxes}, howpublished = {Cryptology ePrint Archive, Report 2020/1349}, year = {2020}, url = {https://eprint.iacr.org/2020/1349}, } @misc{cryptoeprint:2020:134, author = {Vipul Goyal and Yifan Song}, title = {Malicious Security Comes Free in Honest-Majority MPC}, howpublished = {Cryptology ePrint Archive, Report 2020/134}, year = {2020}, url = {https://eprint.iacr.org/2020/134}, } @misc{cryptoeprint:2020:1350, author = {Rishabh Poddar and Sukrit Kalra and Avishay Yanai and Ryan Deng and Raluca Ada Popa and Joseph M. Hellerstein}, title = {Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics}, howpublished = {Cryptology ePrint Archive, Report 2020/1350}, year = {2020}, url = {https://eprint.iacr.org/2020/1350}, } @misc{cryptoeprint:2020:1351, author = {Ashrujit Ghoshal and Stefano Tessaro}, title = {Tight State-Restoration Soundness in the Algebraic Group Model}, howpublished = {Cryptology ePrint Archive, Report 2020/1351}, year = {2020}, url = {https://eprint.iacr.org/2020/1351}, } @misc{cryptoeprint:2020:1352, author = {Linda Chen and Jun Wan}, title = {Reducing Round Complexity of Byzantine Broadcast}, howpublished = {Cryptology ePrint Archive, Report 2020/1352}, year = {2020}, url = {https://eprint.iacr.org/2020/1352}, } @misc{cryptoeprint:2020:1353, author = {Linru Zhang and Xiangning Wang and Yuechen Chen and Siu-Ming Yiu}, title = {Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience}, howpublished = {Cryptology ePrint Archive, Report 2020/1353}, year = {2020}, url = {https://eprint.iacr.org/2020/1353}, } @misc{cryptoeprint:2020:1354, author = {Nicholas Genise and Baiyu Li}, title = {Gadget-Based iNTRU Lattice Trapdoors}, howpublished = {Cryptology ePrint Archive, Report 2020/1354}, year = {2020}, url = {https://eprint.iacr.org/2020/1354}, } @misc{cryptoeprint:2020:1355, author = {Charanjit S. Jutla and Nathan Manohar}, title = {Modular Lagrange Interpolation of the Mod Function for Bootstrapping for Approximate HE}, howpublished = {Cryptology ePrint Archive, Report 2020/1355}, year = {2020}, url = {https://eprint.iacr.org/2020/1355}, } @misc{cryptoeprint:2020:1356, author = {Maria Eichlseder and Gregor Leander and Shahram Rasoolzadeh}, title = {Computing Expected Differential Probability of (Truncated) Differentials and Expected Linear Potential of (Multidimensional) Linear Hulls in SPN Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2020/1356}, year = {2020}, url = {https://eprint.iacr.org/2020/1356}, } @misc{cryptoeprint:2020:1357, author = {Cong Zuo and Shi-Feng Sun and Joseph K. Liu and Jun Shao and Josef Pieprzyk and Guiyi Wei}, title = {Forward and Backward Private Dynamic Searchable Symmetric Encryption for Conjunctive Queries}, howpublished = {Cryptology ePrint Archive, Report 2020/1357}, year = {2020}, url = {https://eprint.iacr.org/2020/1357}, } @misc{cryptoeprint:2020:1358, author = {Hagar Dolev and Shlomi Dolev}, title = {Toward Provable One Way Functions}, howpublished = {Cryptology ePrint Archive, Report 2020/1358}, year = {2020}, url = {https://eprint.iacr.org/2020/1358}, } @misc{cryptoeprint:2020:1359, author = {Lilya Budaghyan and Marco Calderini and Claude Carlet and Diana Davidova and Nikolay Kaleyski}, title = {On two fundamental problems on APN power functions}, howpublished = {Cryptology ePrint Archive, Report 2020/1359}, year = {2020}, url = {https://eprint.iacr.org/2020/1359}, } @misc{cryptoeprint:2020:135, author = {Abida Haque and Alessandra Scafuro}, title = {Threshold Ring Signatures: New Definitions and Post-Quantum Security}, howpublished = {Cryptology ePrint Archive, Report 2020/135}, year = {2020}, url = {https://eprint.iacr.org/2020/135}, } @misc{cryptoeprint:2020:1360, author = {Vivek Arte and Mihir Bellare and Louiza Khati}, title = {Incremental Cryptography Revisited: PRFs, Nonces and Modular Design}, howpublished = {Cryptology ePrint Archive, Report 2020/1360}, year = {2020}, url = {https://eprint.iacr.org/2020/1360}, } @misc{cryptoeprint:2020:1361, author = {Alex B. Grilo and Kathrin Hövelmann and Andreas Hülsing and Christian Majenz}, title = {Tight adaptive reprogramming in the QROM}, howpublished = {Cryptology ePrint Archive, Report 2020/1361}, year = {2020}, url = {https://eprint.iacr.org/2020/1361}, } @misc{cryptoeprint:2020:1362, author = {Rouzbeh Behnia and Eamonn W. Postlethwaite and Muslum Ozgur Ozmen and Attila Altay Yavuz}, title = {Lattice-Based Proof-of-Work for Post-Quantum Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2020/1362}, year = {2020}, url = {https://eprint.iacr.org/2020/1362}, } @misc{cryptoeprint:2020:1363, author = {Shashank Agrawal and Saikrishna Badrinarayanan and Pratyay Mukherjee and Peter Rindal}, title = {Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching}, howpublished = {Cryptology ePrint Archive, Report 2020/1363}, year = {2020}, url = {https://eprint.iacr.org/2020/1363}, } @misc{cryptoeprint:2020:1364, author = {Matthew Campagna and Adam Petcher}, title = {Security of Hybrid Key Encapsulation}, howpublished = {Cryptology ePrint Archive, Report 2020/1364}, year = {2020}, url = {https://eprint.iacr.org/2020/1364}, } @misc{cryptoeprint:2020:1365, author = {Zhengjun Cao and Lihua Liu and Leming Hong}, title = {Evaluation Methods for Chebyshev Polynomials}, howpublished = {Cryptology ePrint Archive, Report 2020/1365}, year = {2020}, url = {https://eprint.iacr.org/2020/1365}, } @misc{cryptoeprint:2020:1366, author = {Ioana Boureanu and Daniel Migault and Stere Preda and Hyame Assem Alamedine and Sanjay Mishra and Frederic Fieau and Mohammad Mannan}, title = {LURK: Server-Controlled TLS Delegation}, howpublished = {Cryptology ePrint Archive, Report 2020/1366}, year = {2020}, url = {https://eprint.iacr.org/2020/1366}, } @misc{cryptoeprint:2020:1367, author = {Loïc Etienne}, title = {Costs of an Attack Against Proof-of-Work}, howpublished = {Cryptology ePrint Archive, Report 2020/1367}, year = {2020}, url = {https://eprint.iacr.org/2020/1367}, } @misc{cryptoeprint:2020:1368, author = {Melissa Azouaoui and François Durvaux and Romain Poussier and François-Xavier Standaert and Kostas Papagiannopoulos and Vincent Verneuil}, title = {On the Worst-Case Side-Channel Security of ECC Point Randomization in Embedded Devices}, howpublished = {Cryptology ePrint Archive, Report 2020/1368}, year = {2020}, url = {https://eprint.iacr.org/2020/1368}, } @misc{cryptoeprint:2020:1369, author = {Arthur Lavice and Nadia El Mrabet and Alexandre Berzati and Jean-Baptiste Rigaud}, title = {Multiplication over Extension Fields for Pairing-based Cryptography: an Hardware Point of View}, howpublished = {Cryptology ePrint Archive, Report 2020/1369}, year = {2020}, url = {https://eprint.iacr.org/2020/1369}, } @misc{cryptoeprint:2020:136, author = {David Heath and Vladimir Kolesnikov}, title = {Stacked Garbling for Disjunctive Zero-Knowledge Proofs}, howpublished = {Cryptology ePrint Archive, Report 2020/136}, year = {2020}, url = {https://eprint.iacr.org/2020/136}, } @misc{cryptoeprint:2020:1370, author = {Daniel J. Bernstein}, title = {A discretization attack}, howpublished = {Cryptology ePrint Archive, Report 2020/1370}, year = {2020}, url = {https://eprint.iacr.org/2020/1370}, } @misc{cryptoeprint:2020:1371, author = {Divesh Aggarwal and Maciej Obremski and João Ribeiro and Mark Simkin and Luisa Siniscalchi}, title = {Two-Source Non-Malleable Extractors and Applications to Privacy Amplification with Tamperable Memory}, howpublished = {Cryptology ePrint Archive, Report 2020/1371}, year = {2020}, url = {https://eprint.iacr.org/2020/1371}, } @misc{cryptoeprint:2020:1372, author = {Chan Fan and Xiaolei Dong and Zhenfu Cao and Jiachen Shen}, title = {VCKSCF: Efficient Verifiable Conjunctive Keyword Search Based on Cuckoo Filter for Cloud Storage}, howpublished = {Cryptology ePrint Archive, Report 2020/1372}, year = {2020}, url = {https://eprint.iacr.org/2020/1372}, } @misc{cryptoeprint:2020:1373, author = {Clément Hoffmann and Pierrick Méaux and Thomas Ricosset}, title = {Transciphering, using FiLIP and TFHE for an efficient delegation of computation}, howpublished = {Cryptology ePrint Archive, Report 2020/1373}, year = {2020}, url = {https://eprint.iacr.org/2020/1373}, } @misc{cryptoeprint:2020:1374, author = {Akiko Inoue and Kazuhiko Minematsu and Maya Oda and Rei Ueno and Naofumi Homma}, title = {ELM : A Low-Latency and Scalable Memory Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2020/1374}, year = {2020}, url = {https://eprint.iacr.org/2020/1374}, } @misc{cryptoeprint:2020:1375, author = {M. Bigdeli and E. De Negri and M. M. Dizdarevic and E. Gorla and R. Minko and S. Tsakou}, title = {Semi-regular sequences and other random systems of equations}, howpublished = {Cryptology ePrint Archive, Report 2020/1375}, year = {2020}, url = {https://eprint.iacr.org/2020/1375}, } @misc{cryptoeprint:2020:1376, author = {Elisa Gorla and Daniela Mueller and Christophe Petit}, title = {Stronger bounds on the cost of computing Groebner bases for HFE systems}, howpublished = {Cryptology ePrint Archive, Report 2020/1376}, year = {2020}, url = {https://eprint.iacr.org/2020/1376}, } @misc{cryptoeprint:2020:1377, author = {Bas Westerbaan}, title = {When to Barrett reduce in the inverse NTT}, howpublished = {Cryptology ePrint Archive, Report 2020/1377}, year = {2020}, url = {https://eprint.iacr.org/2020/1377}, } @misc{cryptoeprint:2020:1378, author = {Alex Lombardi and Vinod Vaikuntanathan}, title = {Multi-Input Correlation-Intractable Hash Functions via Shift-Hiding}, howpublished = {Cryptology ePrint Archive, Report 2020/1378}, year = {2020}, url = {https://eprint.iacr.org/2020/1378}, } @misc{cryptoeprint:2020:1379, author = {Aaqib Bashir Dar and Asif Iqbal Baba and Auqib Hamid Lone and Roohie Naaz and Fan Wu}, title = {Blockchain Driven Access Control Mechanisms, Models and Frameworks: A State of the Art Review}, howpublished = {Cryptology ePrint Archive, Report 2020/1379}, year = {2020}, url = {https://eprint.iacr.org/2020/1379}, } @misc{cryptoeprint:2020:137, author = {Christian Badertscher and Aggelos Kiayias and Markulf Kohlweiss and Hendrik Waldner}, title = {Consistency for Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/137}, year = {2020}, url = {https://eprint.iacr.org/2020/137}, } @misc{cryptoeprint:2020:1380, author = {Borja Gómez}, title = {Fast Computing of Quadratic Forms of HFE Polynomials over fields of characteristic two}, howpublished = {Cryptology ePrint Archive, Report 2020/1380}, year = {2020}, url = {https://eprint.iacr.org/2020/1380}, } @misc{cryptoeprint:2020:1381, author = {Jia-Chng Loh and Geong-Sen Poh and Jason H. M. Ying and Jia Xu and Hoon Wei Lim and Jonathan Pan and Weiyang Wong}, title = {PBio: Enabling Cross-organizational Biometric Authentication Service through Secure Sharing of Biometric Templates}, howpublished = {Cryptology ePrint Archive, Report 2020/1381}, year = {2020}, url = {https://eprint.iacr.org/2020/1381}, } @misc{cryptoeprint:2020:1382, author = {Tapas Pal and Ratna Dutta}, title = {Chosen-Ciphertext Secure Multi-Identity and Multi-Attribute Pure FHE}, howpublished = {Cryptology ePrint Archive, Report 2020/1382}, year = {2020}, url = {https://eprint.iacr.org/2020/1382}, } @misc{cryptoeprint:2020:1383, author = {Il-Ju Kim and Tae-Ho Lee and Jaeseung Han and Bo-Yeon Sim and Dong-Guk Han}, title = {Novel Single-Trace ML Profiling Attacks on NIST 3 Round candidate Dilithium}, howpublished = {Cryptology ePrint Archive, Report 2020/1383}, year = {2020}, url = {https://eprint.iacr.org/2020/1383}, } @misc{cryptoeprint:2020:1384, author = {Nai-Hui Chia and Kai-Min Chung and Takashi Yamakawa}, title = {A Black-Box Approach to Post-Quantum Zero-Knowledge in Constant Rounds}, howpublished = {Cryptology ePrint Archive, Report 2020/1384}, year = {2020}, url = {https://eprint.iacr.org/2020/1384}, } @misc{cryptoeprint:2020:1385, author = {Cyril Bouvier and Laurent Imbert}, title = {An Alternative Approach for SIDH Arithmetic}, howpublished = {Cryptology ePrint Archive, Report 2020/1385}, year = {2020}, url = {https://eprint.iacr.org/2020/1385}, } @misc{cryptoeprint:2020:1386, author = {Pratish Datta and Ilan Komargodski and Brent Waters}, title = {Decentralized Multi-Authority ABE for DNFs from LWE}, howpublished = {Cryptology ePrint Archive, Report 2020/1386}, year = {2020}, url = {https://eprint.iacr.org/2020/1386}, } @misc{cryptoeprint:2020:1387, author = {Zhiqiang Wu and Kenli Li and Jin Wang and Naixue Xiong}, title = {FB-Tree: Highly Efficient Tree-Based Index for Encrypted Boolean Queries in Smart Cities}, howpublished = {Cryptology ePrint Archive, Report 2020/1387}, year = {2020}, url = {https://eprint.iacr.org/2020/1387}, } @misc{cryptoeprint:2020:1388, author = {Sanjit Chatterjee and Tapas Pandit and Shravan Kumar Parshuram Puria and Akash Shah}, title = {Signcryption in a Quantum World}, howpublished = {Cryptology ePrint Archive, Report 2020/1388}, year = {2020}, url = {https://eprint.iacr.org/2020/1388}, } @misc{cryptoeprint:2020:1389, author = {Jan Vacek and Jan Václavek}, title = {Key Mismatch Attack on NewHope Revisited}, howpublished = {Cryptology ePrint Archive, Report 2020/1389}, year = {2020}, url = {https://eprint.iacr.org/2020/1389}, } @misc{cryptoeprint:2020:138, author = {Kostis Karantias and Aggelos Kiayias and Dionysis Zindros}, title = {Smart Contract Derivatives}, howpublished = {Cryptology ePrint Archive, Report 2020/138}, year = {2020}, url = {https://eprint.iacr.org/2020/138}, } @misc{cryptoeprint:2020:1390, author = {Jean-Philippe Aumasson and Adrian Hamelink and Omer Shlomovits}, title = {A Survey of ECDSA Threshold Signing}, howpublished = {Cryptology ePrint Archive, Report 2020/1390}, year = {2020}, url = {https://eprint.iacr.org/2020/1390}, } @misc{cryptoeprint:2020:1391, author = {Jiang Zhang and Yu Yu and Dengguo Feng and Shuqin Fan and Zhenfeng Zhang and Kang Yang}, title = {Interactive Proofs for Quantum Black-Box Computations}, howpublished = {Cryptology ePrint Archive, Report 2020/1391}, year = {2020}, url = {https://eprint.iacr.org/2020/1391}, } @misc{cryptoeprint:2020:1392, author = {Elette Boyle and Nishanth Chandran and Niv Gilboa and Divya Gupta and Yuval Ishai and Nishant Kumar and Mayank Rathee}, title = {Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2020/1392}, year = {2020}, url = {https://eprint.iacr.org/2020/1392}, } @misc{cryptoeprint:2020:1393, author = {Vincenzo Iovino and Serge Vaudenay and Martin Vuagnoux}, title = {On the Effectiveness of Time Travel to Inject COVID-19 Alerts}, howpublished = {Cryptology ePrint Archive, Report 2020/1393}, year = {2020}, url = {https://eprint.iacr.org/2020/1393}, } @misc{cryptoeprint:2020:1394, author = {Zhihao Zheng and Jiachen Shen and Zhenfu Cao}, title = {Practical and Secure Circular Range Search on Private Spatial Data}, howpublished = {Cryptology ePrint Archive, Report 2020/1394}, year = {2020}, url = {https://eprint.iacr.org/2020/1394}, } @misc{cryptoeprint:2020:1395, author = {Amit Agarwal and James Bartusek and Vipul Goyal and Dakshita Khurana and Giulio Malavolta}, title = {Post-Quantum Multi-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2020/1395}, year = {2020}, url = {https://eprint.iacr.org/2020/1395}, } @misc{cryptoeprint:2020:1396, author = {Kyoohyung Han and Jinhyuck Jeong and Jung Hoon Sohn and Yongha Son}, title = {Efficient Privacy Preserving Logistic Regression Inference and Training}, howpublished = {Cryptology ePrint Archive, Report 2020/1396}, year = {2020}, url = {https://eprint.iacr.org/2020/1396}, } @misc{cryptoeprint:2020:1397, author = {Chi-Ming Marvin Chung and Vincent Hwang and Matthias J. Kannwischer and Gregor Seiler and Cheng-Jhih Shih and Bo-Yin Yang}, title = {NTT Multiplication for NTT-unfriendly Rings}, howpublished = {Cryptology ePrint Archive, Report 2020/1397}, year = {2020}, url = {https://eprint.iacr.org/2020/1397}, } @misc{cryptoeprint:2020:1398, author = {Fengrong Zhang and Enes Pasalic and René Rodríguez and Yongzhuang Wei}, title = {A huge class of infinite sequences of minimal binary linear codes with or without crossing the Ashikhmin-Barg’s bound}, howpublished = {Cryptology ePrint Archive, Report 2020/1398}, year = {2020}, url = {https://eprint.iacr.org/2020/1398}, } @misc{cryptoeprint:2020:1399, author = {Diana Maimut and George Teseleanu}, title = {A New Generalisation of the Goldwasser-Micali Cryptosystem Based on the Gap $2^k$-Residuosity Assumption}, howpublished = {Cryptology ePrint Archive, Report 2020/1399}, year = {2020}, url = {https://eprint.iacr.org/2020/1399}, } @misc{cryptoeprint:2020:139, author = {Carmit Hazay and abhi shelat and Muthuramakrishnan Venkitasubramaniam}, title = {Going Beyond Dual Execution: MPC for Functions with Efficient Verification}, howpublished = {Cryptology ePrint Archive, Report 2020/139}, year = {2020}, url = {https://eprint.iacr.org/2020/139}, } @misc{cryptoeprint:2020:1400, author = {Balthazar Bauer and Georg Fuchsbauer and Chen Qian}, title = {Transferable E-cash: A Cleaner Model and the First Practical Instantiation}, howpublished = {Cryptology ePrint Archive, Report 2020/1400}, year = {2020}, url = {https://eprint.iacr.org/2020/1400}, } @misc{cryptoeprint:2020:1401, author = {Zvika Brakerski and Henry Yuen}, title = {Quantum Garbled Circuits}, howpublished = {Cryptology ePrint Archive, Report 2020/1401}, year = {2020}, url = {https://eprint.iacr.org/2020/1401}, } @misc{cryptoeprint:2020:1402, author = {Stéphanie Delaune and Patrick Derbez and Paul Huynh and Marine Minier and Victor Mollimard and Charles Prud'homme}, title = {SKINNY with Scalpel - Comparing Tools for Differential Analysis}, howpublished = {Cryptology ePrint Archive, Report 2020/1402}, year = {2020}, url = {https://eprint.iacr.org/2020/1402}, } @misc{cryptoeprint:2020:1403, author = {Syh-Yuan Tan and Thomas Gross}, title = {A q-SDH-based Graph Signature Scheme on Full-Domain Messages with Efficient Protocols}, howpublished = {Cryptology ePrint Archive, Report 2020/1403}, year = {2020}, url = {https://eprint.iacr.org/2020/1403}, } @misc{cryptoeprint:2020:1404, author = {Chen-Dong Ye and Tian Tian}, title = {A Practical Key-Recovery Attack on 805-Round Trivium}, howpublished = {Cryptology ePrint Archive, Report 2020/1404}, year = {2020}, url = {https://eprint.iacr.org/2020/1404}, } @misc{cryptoeprint:2020:1405, author = {Kyoungbae Jang and Hyunjun Kim and Siwoo Eum and Hwajeong Seo}, title = {Grover on GIFT}, howpublished = {Cryptology ePrint Archive, Report 2020/1405}, year = {2020}, url = {https://eprint.iacr.org/2020/1405}, } @misc{cryptoeprint:2020:1406, author = {Johannes Mueller}, title = {How not to VoteAgain: Pitfalls of Scalable Coercion-Resistant E-Voting}, howpublished = {Cryptology ePrint Archive, Report 2020/1406}, year = {2020}, url = {https://eprint.iacr.org/2020/1406}, } @misc{cryptoeprint:2020:1407, author = {Palash Sarkar}, title = {Computing Square Roots Faster than the Tonelli-Shanks/Bernstein Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2020/1407}, year = {2020}, url = {https://eprint.iacr.org/2020/1407}, } @misc{cryptoeprint:2020:1408, author = {Chen-Da Liu-Zhang and Varun Maram and Ueli Maurer}, title = {On Broadcast in Generalized Network and Adversarial Models}, howpublished = {Cryptology ePrint Archive, Report 2020/1408}, year = {2020}, url = {https://eprint.iacr.org/2020/1408}, } @misc{cryptoeprint:2020:1409, author = {Michael Walter}, title = {The Convergence of Slide-type Reductions}, howpublished = {Cryptology ePrint Archive, Report 2020/1409}, year = {2020}, url = {https://eprint.iacr.org/2020/1409}, } @misc{cryptoeprint:2020:140, author = {Shaoquan Jiang and Guang Gong and Jingnan He and Khoa Nguyen and Huaxiong Wang}, title = {PAKEs: New Framework, New Techniques and More Efficient Lattice-Based Constructions in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2020/140}, year = {2020}, url = {https://eprint.iacr.org/2020/140}, } @misc{cryptoeprint:2020:1410, author = {Carsten Baum and Alex J. Malozemoff and Marc Rosen and Peter Scholl}, title = {Mac'n'Cheese: Zero-Knowledge Proofs for Arithmetic Circuits with Nested Disjunctions}, howpublished = {Cryptology ePrint Archive, Report 2020/1410}, year = {2020}, url = {https://eprint.iacr.org/2020/1410}, } @misc{cryptoeprint:2020:1411, author = {Ofer Grossman and Justin Holmgren and Eylon Yogev}, title = {Transparent Error Correcting in a Computationally Bounded World}, howpublished = {Cryptology ePrint Archive, Report 2020/1411}, year = {2020}, url = {https://eprint.iacr.org/2020/1411}, } @misc{cryptoeprint:2020:1412, author = {Antigoni Polychroniadou and Yifan Song}, title = {Constant-Overhead Unconditionally Secure Multiparty Computation over Binary Fields}, howpublished = {Cryptology ePrint Archive, Report 2020/1412}, year = {2020}, url = {https://eprint.iacr.org/2020/1412}, } @misc{cryptoeprint:2020:1413, author = {Daniele Micciancio and Jessica Sorrell}, title = {Simpler Statistically Sender Private Oblivious Transfer from Ideals of Cyclotomic Integers}, howpublished = {Cryptology ePrint Archive, Report 2020/1413}, year = {2020}, url = {https://eprint.iacr.org/2020/1413}, } @misc{cryptoeprint:2020:1414, author = {Anubhab Baksi}, title = {New Insights On Differential And Linear Bounds Using Mixed Integer Linear Programming (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2020/1414}, year = {2020}, url = {https://eprint.iacr.org/2020/1414}, } @misc{cryptoeprint:2020:1415, author = {Jamie Cui and Chaochao Chen and Li Wang}, title = {Highly-Scalable Protected Graph Database Search with Oblivious Filter}, howpublished = {Cryptology ePrint Archive, Report 2020/1415}, year = {2020}, url = {https://eprint.iacr.org/2020/1415}, } @misc{cryptoeprint:2020:1416, author = {Congwei Zhou and Bin Hu and Jie Guan}, title = {Further on the Construction of Feedback Shift Registers with Maximum Strong Linear Complexity}, howpublished = {Cryptology ePrint Archive, Report 2020/1416}, year = {2020}, url = {https://eprint.iacr.org/2020/1416}, } @misc{cryptoeprint:2020:1417, author = {Elette Boyle and Geoffroy Couteau and Niv Gilboa and Yuval Ishai and Lisa Kohl and Peter Scholl}, title = {Correlated Pseudorandom Functions from Variable-Density LPN}, howpublished = {Cryptology ePrint Archive, Report 2020/1417}, year = {2020}, url = {https://eprint.iacr.org/2020/1417}, } @misc{cryptoeprint:2020:1418, author = {Xavier Bonnetain and Samuel Jaques}, title = {Quantum Period Finding against Symmetric Primitives in Practice}, howpublished = {Cryptology ePrint Archive, Report 2020/1418}, year = {2020}, url = {https://eprint.iacr.org/2020/1418}, } @misc{cryptoeprint:2020:1419, author = {Benny Applebaum and Eliran Kachlon and Arpita Patra}, title = {The Resiliency of MPC with Low Interaction: The Benefit of Making Errors}, howpublished = {Cryptology ePrint Archive, Report 2020/1419}, year = {2020}, url = {https://eprint.iacr.org/2020/1419}, } @misc{cryptoeprint:2020:141, author = {Hila Dahari and Yehuda Lindell}, title = {Deterministic-Prover Zero-Knowledge Proofs}, howpublished = {Cryptology ePrint Archive, Report 2020/141}, year = {2020}, url = {https://eprint.iacr.org/2020/141}, } @misc{cryptoeprint:2020:1420, author = {Hoeteck Wee}, title = {Functional Encryption for Quadratic Functions from k-Lin, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2020/1420}, year = {2020}, url = {https://eprint.iacr.org/2020/1420}, } @misc{cryptoeprint:2020:1421, author = {Nir Bitansky and Noa Eizenstadt and Omer Paneth}, title = {Weakly Extractable One-Way Functions}, howpublished = {Cryptology ePrint Archive, Report 2020/1421}, year = {2020}, url = {https://eprint.iacr.org/2020/1421}, } @misc{cryptoeprint:2020:1422, author = {Gorjan Alagic and Andrew M. Childs and Alex B. Grilo and Shih-Han Hung}, title = {Non-interactive classical verification of quantum computation}, howpublished = {Cryptology ePrint Archive, Report 2020/1422}, year = {2020}, url = {https://eprint.iacr.org/2020/1422}, } @misc{cryptoeprint:2020:1423, author = {Anne Broadbent and Rabib Islam}, title = {Quantum encryption with certified deletion}, howpublished = {Cryptology ePrint Archive, Report 2020/1423}, year = {2020}, url = {https://eprint.iacr.org/2020/1423}, } @misc{cryptoeprint:2020:1424, author = {Chengdong Tao Albrecht Petzoldt Jintai Ding}, title = {Improved Key Recovery of the HFEv- Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2020/1424}, year = {2020}, url = {https://eprint.iacr.org/2020/1424}, } @misc{cryptoeprint:2020:1425, author = {Alexander R. Block and Justin Holmgren and Alon Rosen and Ron D. Rothblum and Pratik Soni}, title = {Public-Coin Zero-Knowledge Arguments with (almost) Minimal Time and Space Overheads}, howpublished = {Cryptology ePrint Archive, Report 2020/1425}, year = {2020}, url = {https://eprint.iacr.org/2020/1425}, } @misc{cryptoeprint:2020:1426, author = {Jonathan Bootle and Alessandro Chiesa and Jens Groth}, title = {Linear-Time Arguments with Sublinear Verification from Tensor Codes}, howpublished = {Cryptology ePrint Archive, Report 2020/1426}, year = {2020}, url = {https://eprint.iacr.org/2020/1426}, } @misc{cryptoeprint:2020:1427, author = {Alessandro Chiesa and Eylon Yogev}, title = {Barriers for Succinct Arguments in the Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2020/1427}, year = {2020}, url = {https://eprint.iacr.org/2020/1427}, } @misc{cryptoeprint:2020:1428, author = {Dakshita Khurana and Muhammad Haris Mughees}, title = {On Statistical Security in Two-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2020/1428}, year = {2020}, url = {https://eprint.iacr.org/2020/1428}, } @misc{cryptoeprint:2020:1429, author = {Matthew M. Hong and Yuval Ishai and Victor I. Kolobov and Russell W. F. Lai}, title = {On Computational Shortcuts for Information-Theoretic PIR}, howpublished = {Cryptology ePrint Archive, Report 2020/1429}, year = {2020}, url = {https://eprint.iacr.org/2020/1429}, } @misc{cryptoeprint:2020:142, author = {Erica Blum and Jonathan Katz and Julian Loss}, title = {Network-Agnostic State Machine Replication}, howpublished = {Cryptology ePrint Archive, Report 2020/142}, year = {2020}, url = {https://eprint.iacr.org/2020/142}, } @misc{cryptoeprint:2020:1430, author = {Dana Dachman-Soled}, title = {Revisiting Fairness in MPC: Polynomial Number of Parties and General Adversarial Structures}, howpublished = {Cryptology ePrint Archive, Report 2020/1430}, year = {2020}, url = {https://eprint.iacr.org/2020/1430}, } @misc{cryptoeprint:2020:1431, author = {Huijia Lin and Tianren Liu and Hoeteck Wee}, title = {Information-Theoretic 2-Round MPC without Round Collapsing: Adaptive Security, and More}, howpublished = {Cryptology ePrint Archive, Report 2020/1431}, year = {2020}, url = {https://eprint.iacr.org/2020/1431}, } @misc{cryptoeprint:2020:1432, author = {Shweta Agrawal and Shota Yamada}, title = {CP-ABE for Circuits (and more) in the Symmetric Key Setting}, howpublished = {Cryptology ePrint Archive, Report 2020/1432}, year = {2020}, url = {https://eprint.iacr.org/2020/1432}, } @misc{cryptoeprint:2020:1433, author = {Liran Katzir and Clara Shikhelman and Eylon Yogev}, title = {Interactive Proofs for Social Graphs}, howpublished = {Cryptology ePrint Archive, Report 2020/1433}, year = {2020}, url = {https://eprint.iacr.org/2020/1433}, } @misc{cryptoeprint:2020:1434, author = {Ran Canetti and Oxana Poburinnaya}, title = {Towards Multiparty Computation Withstanding Coercion of All Parties}, howpublished = {Cryptology ePrint Archive, Report 2020/1434}, year = {2020}, url = {https://eprint.iacr.org/2020/1434}, } @misc{cryptoeprint:2020:1435, author = {Alessandra Scafuro and Luisa Siniscalchi and Ivan Visconti}, title = {Publicly Verifiable Zero Knowledge from (Collapsing) Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2020/1435}, year = {2020}, url = {https://eprint.iacr.org/2020/1435}, } @misc{cryptoeprint:2020:1436, author = {Michael John Jacobson Jr. and Prabhat Kushwaha}, title = {Removable Weak Keys for Discrete Logarithm Based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2020/1436}, year = {2020}, url = {https://eprint.iacr.org/2020/1436}, } @misc{cryptoeprint:2020:1437, author = {Michele Ciampi and Rafail Ostrovsky and Hendrik Waldner and Vassilis Zikas}, title = {Round-Optimal and Communication-Efficient Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2020/1437}, year = {2020}, url = {https://eprint.iacr.org/2020/1437}, } @misc{cryptoeprint:2020:1438, author = {Ravi Anand and Subhamoy Maitra and Arpita Maitra and Chandra Sekhar Mukherjee and Sourav Mukhopadhyay}, title = {Resource Estimation of Grovers-kind Quantum Cryptanalysis against FSR based Symmetric Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2020/1438}, year = {2020}, url = {https://eprint.iacr.org/2020/1438}, } @misc{cryptoeprint:2020:1439, author = {Kevin "Kenny" Niehage}, title = {Cryptographic Vulnerabilities and Other Shortcomings of the Nextcloud Server Side Encryption as implemented by the Default Encryption Module}, howpublished = {Cryptology ePrint Archive, Report 2020/1439}, year = {2020}, url = {https://eprint.iacr.org/2020/1439}, } @misc{cryptoeprint:2020:143, author = {Hailong Yao and Caifen Wang* and Xingbing Fu and Chao Liu and Bin Wu and Fagen Li}, title = {Impersonation Attacks on Lightweight Anonymous Authenticated Key Exchange Scheme for IoT}, howpublished = {Cryptology ePrint Archive, Report 2020/143}, year = {2020}, url = {https://eprint.iacr.org/2020/143}, } @misc{cryptoeprint:2020:1440, author = {Ralph Ankele and Kai Nahrgang and Branka Stojanovic and Atta Badii}, title = {SoK: Cyber-Attack Taxonomy of Distributed Ledger- and Legacy Systems-based Financial Infrastructures}, howpublished = {Cryptology ePrint Archive, Report 2020/1440}, year = {2020}, url = {https://eprint.iacr.org/2020/1440}, } @misc{cryptoeprint:2020:1441, author = {Sri Aravinda Krishnan Thyagarajan and Giulio Malavolta and Fritz Schmidt and Dominique Schröder }, title = {PayMo: Payment Channels For Monero}, howpublished = {Cryptology ePrint Archive, Report 2020/1441}, year = {2020}, url = {https://eprint.iacr.org/2020/1441}, } @misc{cryptoeprint:2020:1442, author = {Morten Øygarden and Patrick Felke and Håvard Raddum}, title = {Analysis of Multivariate Encryption Schemes: Application to Dob}, howpublished = {Cryptology ePrint Archive, Report 2020/1442}, year = {2020}, url = {https://eprint.iacr.org/2020/1442}, } @misc{cryptoeprint:2020:1443, author = {Poulami Das and Julia Hesse and Anja Lehmann}, title = {DPaSE: Distributed Password-Authenticated Symmetric Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/1443}, year = {2020}, url = {https://eprint.iacr.org/2020/1443}, } @misc{cryptoeprint:2020:1444, author = {Marco Calderini and Lilya Budaghyan and Claude Carlet}, title = {On known constructions of APN and AB functions and their relation to each other}, howpublished = {Cryptology ePrint Archive, Report 2020/1444}, year = {2020}, url = {https://eprint.iacr.org/2020/1444}, } @misc{cryptoeprint:2020:1445, author = {Daniel J. Bernstein and Henri Gilbert and Meltem Sonmez Turan}, title = {Observations on COMET}, howpublished = {Cryptology ePrint Archive, Report 2020/1445}, year = {2020}, url = {https://eprint.iacr.org/2020/1445}, } @misc{cryptoeprint:2020:1446, author = {Samuel Dittmer and Yuval Ishai and Rafail Ostrovsky}, title = {Line-Point Zero Knowledge and Its Applications}, howpublished = {Cryptology ePrint Archive, Report 2020/1446}, year = {2020}, url = {https://eprint.iacr.org/2020/1446}, } @misc{cryptoeprint:2020:1447, author = {Thomas Attema and Ronald Cramer and Matthieu Rambaud}, title = {Compressed Sigma-Protocols for Bilinear Circuits and Applications to Logarithmic-Sized Transparent Threshold Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2020/1447}, year = {2020}, url = {https://eprint.iacr.org/2020/1447}, } @misc{cryptoeprint:2020:1448, author = {Vadim Lyubashevsky and Ngoc Khanh Nguyen and Gregor Seiler}, title = {Shorter Lattice-Based Zero-Knowledge Proofs via One-Time Commitments}, howpublished = {Cryptology ePrint Archive, Report 2020/1448}, year = {2020}, url = {https://eprint.iacr.org/2020/1448}, } @misc{cryptoeprint:2020:1449, author = {Jonathan Bootle and Vadim Lyubashevsky and Ngoc Khanh Nguyen and Gregor Seiler}, title = {More Efficient Amortization of Exact Zero-Knowledge Proofs for LWE}, howpublished = {Cryptology ePrint Archive, Report 2020/1449}, year = {2020}, url = {https://eprint.iacr.org/2020/1449}, } @misc{cryptoeprint:2020:144, author = {Wei Yu and Saud Al Musa and Bao Li}, title = {Double-Base Chains for Scalar Multiplications on Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2020/144}, year = {2020}, url = {https://eprint.iacr.org/2020/144}, } @misc{cryptoeprint:2020:1450, author = {Antonio Faonio and Dario Fiore and Luca Nizzardo and Claudio Soriente}, title = {Subversion-Resilient Enhanced Privacy ID}, howpublished = {Cryptology ePrint Archive, Report 2020/1450}, year = {2020}, url = {https://eprint.iacr.org/2020/1450}, } @misc{cryptoeprint:2020:1451, author = {Elette Boyle and Niv Gilboa and Yuval Ishai and Ariel Nof}, title = {Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs}, howpublished = {Cryptology ePrint Archive, Report 2020/1451}, year = {2020}, url = {https://eprint.iacr.org/2020/1451}, } @misc{cryptoeprint:2020:1452, author = {Sebastian Berndt and Jan Wichelmann and Claudius Pott and Tim-Henrik Traving and Thomas Eisenbarth}, title = {ASAP: Algorithm Substitution Attacks on Cryptographic Protocols}, howpublished = {Cryptology ePrint Archive, Report 2020/1452}, year = {2020}, url = {https://eprint.iacr.org/2020/1452}, } @misc{cryptoeprint:2020:1453, author = {Jing Yang and Fang-Wei Fu}, title = {New (k,l,m)-verifiable multi-secret sharing schemes based on XTR public key system}, howpublished = {Cryptology ePrint Archive, Report 2020/1453}, year = {2020}, url = {https://eprint.iacr.org/2020/1453}, } @misc{cryptoeprint:2020:1454, author = {Giulio Malavolta}, title = {Circuit Privacy for Quantum Fully Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/1454}, year = {2020}, url = {https://eprint.iacr.org/2020/1454}, } @misc{cryptoeprint:2020:1455, author = {Yan Yan and Elisabeth Oswald and Srinivas Vivek}, title = {An Analytic Attack Against ARX Addition Exploiting Standard Side-Channel Leakage}, howpublished = {Cryptology ePrint Archive, Report 2020/1455}, year = {2020}, url = {https://eprint.iacr.org/2020/1455}, } @misc{cryptoeprint:2020:1456, author = {Ange Albertini and Thai Duong and Shay Gueron and Stefan Kölbl and Atul Luykx and Sophie Schmieg}, title = {How to Abuse and Fix Authenticated Encryption Without Key Commitment}, howpublished = {Cryptology ePrint Archive, Report 2020/1456}, year = {2020}, url = {https://eprint.iacr.org/2020/1456}, } @misc{cryptoeprint:2020:1457, author = {Patrick Longa and Wen Wang and Jakub Szefer}, title = {The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3}, howpublished = {Cryptology ePrint Archive, Report 2020/1457}, year = {2020}, url = {https://eprint.iacr.org/2020/1457}, } @misc{cryptoeprint:2020:1458, author = {Cihangir Tezcan}, title = {Analysis of Ascon, DryGASCON, and Shamash Permutations}, howpublished = {Cryptology ePrint Archive, Report 2020/1458}, year = {2020}, url = {https://eprint.iacr.org/2020/1458}, } @misc{cryptoeprint:2020:1459, author = {Mustafa Khairallah and Thomas Peyrin and Anupam Chattopadhyay}, title = {Preliminary Hardware Benchmarking of a Group of Round 2 NIST Lightweight AEAD Candidates}, howpublished = {Cryptology ePrint Archive, Report 2020/1459}, year = {2020}, url = {https://eprint.iacr.org/2020/1459}, } @misc{cryptoeprint:2020:145, author = {Lars Tebelmann and Jean-Luc Danger and Michael Pehl}, title = {Self-Secured PUF: Protecting the Loop PUF by Masking}, howpublished = {Cryptology ePrint Archive, Report 2020/145}, year = {2020}, url = {https://eprint.iacr.org/2020/145}, } @misc{cryptoeprint:2020:1460, author = {Michael Kounavis and David Durham and Sergej Deutsch and Krystian Matusiewicz and David Wheeler}, title = {The MAGIC Mode for Simultaneously Supporting Encryption, Message Authentication and Error Correction}, howpublished = {Cryptology ePrint Archive, Report 2020/1460}, year = {2020}, url = {https://eprint.iacr.org/2020/1460}, } @misc{cryptoeprint:2020:1461, author = {Benjamin Wesolowski and Ryan Williams}, title = {Lower bounds for the depth of modular squaring}, howpublished = {Cryptology ePrint Archive, Report 2020/1461}, year = {2020}, url = {https://eprint.iacr.org/2020/1461}, } @misc{cryptoeprint:2020:1462, author = {Leonie Reichert and Samuel Brack and Björn Scheuermann}, title = {Ovid: Message-based Automatic Contact Tracing}, howpublished = {Cryptology ePrint Archive, Report 2020/1462}, year = {2020}, url = {https://eprint.iacr.org/2020/1462}, } @misc{cryptoeprint:2020:1463, author = {Mustafa Khairallah}, title = {Observations on the Tightness of the Security Bounds of GIFT-COFB and HyENA}, howpublished = {Cryptology ePrint Archive, Report 2020/1463}, year = {2020}, url = {https://eprint.iacr.org/2020/1463}, } @misc{cryptoeprint:2020:1464, author = {Bar Alon and Hao Chung and Kai-Min Chung and Mi-Ying Huang and Yi Lee and Yu-Ching Shen}, title = {Round Efficient Secure Multiparty Quantum Computation with Identifiable Abort}, howpublished = {Cryptology ePrint Archive, Report 2020/1464}, year = {2020}, url = {https://eprint.iacr.org/2020/1464}, } @misc{cryptoeprint:2020:1465, author = {Mohammad Amin Rakeei and Farokhlagha Moazami}, title = {Cryptanalysis of an Anonymous Authentication and Key Agreement Protocol for Secure Wireless Body Area Network}, howpublished = {Cryptology ePrint Archive, Report 2020/1465}, year = {2020}, url = {https://eprint.iacr.org/2020/1465}, } @misc{cryptoeprint:2020:1466, author = {Naoya Okanami and Ryuya Nakamura and Takashi Nishide}, title = {Load Balancing for Sharded Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2020/1466}, year = {2020}, url = {https://eprint.iacr.org/2020/1466}, } @misc{cryptoeprint:2020:1467, author = {Alessandro Budroni and Qian Guo and Thomas Johansson and Erik Mårtensson and Paul Stankovski Wagner}, title = {Making the BKW Algorithm Practical for LWE}, howpublished = {Cryptology ePrint Archive, Report 2020/1467}, year = {2020}, url = {https://eprint.iacr.org/2020/1467}, } @misc{cryptoeprint:2020:1468, author = {Jun Shen and Fuchun Guo and Xiaofeng Chen and Willy Susilo}, title = {Secure Cloud Auditing with Efficient Ownership Transfer (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2020/1468}, year = {2020}, url = {https://eprint.iacr.org/2020/1468}, } @misc{cryptoeprint:2020:1469, author = {Jiayu Zhang}, title = {Succinct Blind Quantum Computation Using a Random Oracle}, howpublished = {Cryptology ePrint Archive, Report 2020/1469}, year = {2020}, url = {https://eprint.iacr.org/2020/1469}, } @misc{cryptoeprint:2020:146, author = {Roman Langrehr and Jiaxin Pan}, title = {Hierarchical Identity-Based Encryption with Tight Multi-Challenge Security}, howpublished = {Cryptology ePrint Archive, Report 2020/146}, year = {2020}, url = {https://eprint.iacr.org/2020/146}, } @misc{cryptoeprint:2020:1470, author = {Songze Li and David Tse}, title = {TaiJi: Longest Chain Availability with BFT Fast Confirmation}, howpublished = {Cryptology ePrint Archive, Report 2020/1470}, year = {2020}, url = {https://eprint.iacr.org/2020/1470}, } @misc{cryptoeprint:2020:1471, author = {James Bartusek and Andrea Coladangelo and Dakshita Khurana and Fermi Ma}, title = {On The Round Complexity of Two-Party Quantum Computation}, howpublished = {Cryptology ePrint Archive, Report 2020/1471}, year = {2020}, url = {https://eprint.iacr.org/2020/1471}, } @misc{cryptoeprint:2020:1472, author = {Emanuele Bellini and Philippe Gaborit and Alexandros Hasikos and Victor Mateu}, title = {Enhancing Code Based Zero-knowledge Proofs using Rank Metric}, howpublished = {Cryptology ePrint Archive, Report 2020/1472}, year = {2020}, url = {https://eprint.iacr.org/2020/1472}, } @misc{cryptoeprint:2020:1473, author = {Leonie Reichert and Samuel Brack and Björn Scheuermann}, title = {Lighthouses: A Warning System for Super-Spreader Events}, howpublished = {Cryptology ePrint Archive, Report 2020/1473}, year = {2020}, url = {https://eprint.iacr.org/2020/1473}, } @misc{cryptoeprint:2020:1474, author = {A. M. Mironov}, title = {New method of verifying cryptographic protocols based on the process model }, howpublished = {Cryptology ePrint Archive, Report 2020/1474}, year = {2020}, url = {https://eprint.iacr.org/2020/1474}, } @misc{cryptoeprint:2020:1475, author = {Kwangsu Lee}, title = {Delegate and Verify the Update Keys of Revocable Identity-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/1475}, year = {2020}, url = {https://eprint.iacr.org/2020/1475}, } @misc{cryptoeprint:2020:1476, author = {Andreas Richardson and Jiahua Xu}, title = {Carbon Trading with Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2020/1476}, year = {2020}, url = {https://eprint.iacr.org/2020/1476}, } @misc{cryptoeprint:2020:1477, author = {Thomas Haines and Rajeev Gore and Jack Stodart}, title = {Machine-checking the universal verifiability of ElectionGuard}, howpublished = {Cryptology ePrint Archive, Report 2020/1477}, year = {2020}, url = {https://eprint.iacr.org/2020/1477}, } @misc{cryptoeprint:2020:1478, author = {David Galindo and Jia Liu}, title = {Robust Subgroup Multi-Signatures for Consensus}, howpublished = {Cryptology ePrint Archive, Report 2020/1478}, year = {2020}, url = {https://eprint.iacr.org/2020/1478}, } @misc{cryptoeprint:2020:1479, author = {Anupam Pattanayak and Subhasish Dhal and Sourav Kanti Addya}, title = {Automatic Privacy-Preserving Contact Tracing of Novel Coronavirus Infection by Cloud-Enabled WBAN using Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2020/1479}, year = {2020}, url = {https://eprint.iacr.org/2020/1479}, } @misc{cryptoeprint:2020:147, author = {Marshall Ball and Eshan Chattopadhyay and Jyun-Jie Liao and Tal Malkin and Li-Yang Tan}, title = {Non-Malleability against Polynomial Tampering}, howpublished = {Cryptology ePrint Archive, Report 2020/147}, year = {2020}, url = {https://eprint.iacr.org/2020/147}, } @misc{cryptoeprint:2020:1480, author = {Matthieu Rambaud}, title = {Malicious Security Comes for Free in Consensus with Leaders}, howpublished = {Cryptology ePrint Archive, Report 2020/1480}, year = {2020}, url = {https://eprint.iacr.org/2020/1480}, } @misc{cryptoeprint:2020:1481, author = {Shai Halevi and Victor Shoup}, title = {Design and implementation of HElib: a homomorphic encryption library}, howpublished = {Cryptology ePrint Archive, Report 2020/1481}, year = {2020}, url = {https://eprint.iacr.org/2020/1481}, } @misc{cryptoeprint:2020:1482, author = {Andrea Basso and Sujoy Sinha Roy}, title = {Optimized Polynomial Multiplier Architectures for Post-Quantum KEM Saber}, howpublished = {Cryptology ePrint Archive, Report 2020/1482}, year = {2020}, url = {https://eprint.iacr.org/2020/1482}, } @misc{cryptoeprint:2020:1483, author = {Eric Crockett}, title = {A Low-Depth Homomorphic Circuit for Logistic Regression Model Training}, howpublished = {Cryptology ePrint Archive, Report 2020/1483}, year = {2020}, url = {https://eprint.iacr.org/2020/1483}, } @misc{cryptoeprint:2020:1484, author = {Kaoru Takemure and Yusuke Sakai and Bagus Santoso and Goichiro Hanaoka and Kazuo Ohta }, title = {Cryptanalysis of Aggregate $\Gamma$ Signature with Sub-Exponential Complexity}, howpublished = {Cryptology ePrint Archive, Report 2020/1484}, year = {2020}, url = {https://eprint.iacr.org/2020/1484}, } @misc{cryptoeprint:2020:1485, author = {Subodh Bijwe and Amit Kumar Chauhan and Somitra Kumar Sanadhya }, title = {Quantum Search for Lightweight Block Ciphers: GIFT, SKINNY, SATURNIN}, howpublished = {Cryptology ePrint Archive, Report 2020/1485}, year = {2020}, url = {https://eprint.iacr.org/2020/1485}, } @misc{cryptoeprint:2020:1486, author = {Andreas Erwig and Sebastian Faust and Siavash Riahi and Tobias Stöckert}, title = {CommiTEE: An Efficient and Secure Commit-Chain Protocol using TEEs}, howpublished = {Cryptology ePrint Archive, Report 2020/1486}, year = {2020}, url = {https://eprint.iacr.org/2020/1486}, } @misc{cryptoeprint:2020:1487, author = {James Bartusek and Andrea Coladangelo and Dakshita Khurana and Fermi Ma}, title = {One-Way Functions Imply Secure Computation in a Quantum World}, howpublished = {Cryptology ePrint Archive, Report 2020/1487}, year = {2020}, url = {https://eprint.iacr.org/2020/1487}, } @misc{cryptoeprint:2020:1488, author = {Jun Yan}, title = {General Properties of Quantum Bit Commitment}, howpublished = {Cryptology ePrint Archive, Report 2020/1488}, year = {2020}, url = {https://eprint.iacr.org/2020/1488}, } @misc{cryptoeprint:2020:1489, author = {Christian Badertscher and Julia Hesse and Vassilis Zikas}, title = {On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger}, howpublished = {Cryptology ePrint Archive, Report 2020/1489}, year = {2020}, url = {https://eprint.iacr.org/2020/1489}, } @misc{cryptoeprint:2020:148, author = {Fatih Balli and Paul Rösler and Serge Vaudenay}, title = {Determining the Core Primitive for Optimally Secure Ratcheting}, howpublished = {Cryptology ePrint Archive, Report 2020/148}, year = {2020}, url = {https://eprint.iacr.org/2020/148}, } @misc{cryptoeprint:2020:1490, author = {Angèle Bossuat and Xavier Bultel}, title = {Unlinkable and Invisible γ-Sanitizable Signatures}, howpublished = {Cryptology ePrint Archive, Report 2020/1490}, year = {2020}, url = {https://eprint.iacr.org/2020/1490}, } @misc{cryptoeprint:2020:1491, author = {Julia Len and Paul Grubbs and Thomas Ristenpart }, title = {Partitioning Oracle Attacks}, howpublished = {Cryptology ePrint Archive, Report 2020/1491}, year = {2020}, url = {https://eprint.iacr.org/2020/1491}, } @misc{cryptoeprint:2020:1492, author = {Thomas Kaeding}, title = {Automated ciphertext-only attack on the Wheatstone Cryptograph and related devices}, howpublished = {Cryptology ePrint Archive, Report 2020/1492}, year = {2020}, url = {https://eprint.iacr.org/2020/1492}, } @misc{cryptoeprint:2020:1493, author = {Daniel J. Bernstein}, title = {Verified fast formulas for control bits for permutation networks}, howpublished = {Cryptology ePrint Archive, Report 2020/1493}, year = {2020}, url = {https://eprint.iacr.org/2020/1493}, } @misc{cryptoeprint:2020:1494, author = {Seyedeh Sharareh Mirzargar and Gaiëtan Renault and Andrea Guerrieri and Mirjana Stojilović}, title = {Nonintrusive and Adaptive Monitoring for Locating Voltage Attacks in Virtualized FPGAs}, howpublished = {Cryptology ePrint Archive, Report 2020/1494}, year = {2020}, url = {https://eprint.iacr.org/2020/1494}, } @misc{cryptoeprint:2020:1495, author = {Seyedeh Sharareh Mirzargar and Gaiëtan Renault and Andrea Guerrieri and Mirjana Stojilović}, title = {CloudMoles: Surveillance of Power-Wasting Activities by Infiltrating Undercover Sensors}, howpublished = {Cryptology ePrint Archive, Report 2020/1495}, year = {2020}, url = {https://eprint.iacr.org/2020/1495}, } @misc{cryptoeprint:2020:1496, author = {Mikhail Anokhin}, title = {Pseudo-Free Families and Cryptographic Primitives}, howpublished = {Cryptology ePrint Archive, Report 2020/1496}, year = {2020}, url = {https://eprint.iacr.org/2020/1496}, } @misc{cryptoeprint:2020:1497, author = {Michael Scott}, title = {A note on the calculation of some functions in finite fields: Tricks of the Trade}, howpublished = {Cryptology ePrint Archive, Report 2020/1497}, year = {2020}, url = {https://eprint.iacr.org/2020/1497}, } @misc{cryptoeprint:2020:1498, author = {Olivier Sanders and Jacques Traoré}, title = {EPID with Malicious Revocation}, howpublished = {Cryptology ePrint Archive, Report 2020/1498}, year = {2020}, url = {https://eprint.iacr.org/2020/1498}, } @misc{cryptoeprint:2020:1499, author = {Joël Alwen and Bruno Blanchet and Eduard Hauck and Eike Kiltz and Benjamin Lipp and Doreen Riepel}, title = {Analysing the HPKE Standard}, howpublished = {Cryptology ePrint Archive, Report 2020/1499}, year = {2020}, url = {https://eprint.iacr.org/2020/1499}, } @misc{cryptoeprint:2020:149, author = {Matteo Campanelli and Dario Fiore and Nicola Greco and Dimitris Kolonelos and Luca Nizzardo}, title = {Vector Commitment Techniques and Applications to Verifiable Decentralized Storage}, howpublished = {Cryptology ePrint Archive, Report 2020/149}, year = {2020}, url = {https://eprint.iacr.org/2020/149}, } @misc{cryptoeprint:2020:1500, author = {Alex B. Grilo and Huijia Lin and Fang Song and Vinod Vaikuntanathan}, title = {Oblivious Transfer is in MiniQCrypt}, howpublished = {Cryptology ePrint Archive, Report 2020/1500}, year = {2020}, url = {https://eprint.iacr.org/2020/1500}, } @misc{cryptoeprint:2020:1501, author = {Paul Grubbs and Anurag Khandelwal and Marie-Sarah Lacharité and Lloyd Brown and Lucy Li and Rachit Agarwal and Thomas Ristenpart}, title = {PANCAKE: Frequency Smoothing for Encrypted Data Stores}, howpublished = {Cryptology ePrint Archive, Report 2020/1501}, year = {2020}, url = {https://eprint.iacr.org/2020/1501}, } @misc{cryptoeprint:2020:1502, author = {Kamil Kluczniak}, title = {Witness Encryption from Garbled Circuit and Multikey Fully Homomorphic Encryption Techniques}, howpublished = {Cryptology ePrint Archive, Report 2020/1502}, year = {2020}, url = {https://eprint.iacr.org/2020/1502}, } @misc{cryptoeprint:2020:1503, author = {Satoshi Okada and Yuntao Wang}, title = {Key Recovery Attack on Bob's Secrets in CRYSTALS-KYBER and SABER}, howpublished = {Cryptology ePrint Archive, Report 2020/1503}, year = {2020}, url = {https://eprint.iacr.org/2020/1503}, } @misc{cryptoeprint:2020:1504, author = {Ben Nassi and Lior Rokach and Yuval Elovici}, title = {The Age of Testifying Wearable Devices: The Case of Intoxication Detection}, howpublished = {Cryptology ePrint Archive, Report 2020/1504}, year = {2020}, url = {https://eprint.iacr.org/2020/1504}, } @misc{cryptoeprint:2020:1505, author = {Mariusz Jurkiewicz}, title = {Binary Tree Based Forward Secure Signature Scheme in the Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2020/1505}, year = {2020}, url = {https://eprint.iacr.org/2020/1505}, } @misc{cryptoeprint:2020:1506, author = {Gabrielle De Micheli and Nadia Heninger}, title = {Recovering cryptographic keys from partial information, by example}, howpublished = {Cryptology ePrint Archive, Report 2020/1506}, year = {2020}, url = {https://eprint.iacr.org/2020/1506}, } @misc{cryptoeprint:2020:1507, author = {Mike Hamburg and Mike Tunstall and Qinglai Xiao}, title = {Improvements to RSA key generation and CRT on embedded devices}, howpublished = {Cryptology ePrint Archive, Report 2020/1507}, year = {2020}, url = {https://eprint.iacr.org/2020/1507}, } @misc{cryptoeprint:2020:1508, author = {Nico Döttling and Giulio Malavolta and Sihang Pu}, title = {A Combinatorial Approach to Quantum Random Functions}, howpublished = {Cryptology ePrint Archive, Report 2020/1508}, year = {2020}, url = {https://eprint.iacr.org/2020/1508}, } @misc{cryptoeprint:2020:1509, author = {Kevin Lewi and Payman Mohassel and Arnab Roy}, title = {Single-Message Credential-Hiding Login}, howpublished = {Cryptology ePrint Archive, Report 2020/1509}, year = {2020}, url = {https://eprint.iacr.org/2020/1509}, } @misc{cryptoeprint:2020:150, author = {Varun Maram}, title = {On the Security of NTS-KEM in the Quantum Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2020/150}, year = {2020}, url = {https://eprint.iacr.org/2020/150}, } @misc{cryptoeprint:2020:1510, author = {Jun Yan}, title = {Quantum Computationally Predicate-Binding Commitment with Application in Quantum Zero-Knowledge Argument for NP}, howpublished = {Cryptology ePrint Archive, Report 2020/1510}, year = {2020}, url = {https://eprint.iacr.org/2020/1510}, } @misc{cryptoeprint:2020:1511, author = {Ivan Damgård and Chaya Ganesh and Hamidreza Khoshakhlagh and Claudio Orlandi and Luisa Siniscalchi}, title = {Balancing Privacy and Accountability in Blockchain Transactions}, howpublished = {Cryptology ePrint Archive, Report 2020/1511}, year = {2020}, url = {https://eprint.iacr.org/2020/1511}, } @misc{cryptoeprint:2020:1512, author = {Jan Pennekamp and Patrick Sapel and Ina Berenice Fink and Simon Wagner and Sebastian Reuter and Christian Hopmann and Klaus Wehrle and Martin Henze}, title = {Revisiting the Privacy Needs of Real-World Applicable Company Benchmarking}, howpublished = {Cryptology ePrint Archive, Report 2020/1512}, year = {2020}, url = {https://eprint.iacr.org/2020/1512}, } @misc{cryptoeprint:2020:1513, author = {Mike Hamburg}, title = {Indifferentiable hashing from Elligator 2}, howpublished = {Cryptology ePrint Archive, Report 2020/1513}, year = {2020}, url = {https://eprint.iacr.org/2020/1513}, } @misc{cryptoeprint:2020:1514, author = {Tabitha Ogilvie and Rachel Player and Joe Rowell}, title = {Improved privacy-preserving training using fixed-Hessian minimisation}, howpublished = {Cryptology ePrint Archive, Report 2020/1514}, year = {2020}, url = {https://eprint.iacr.org/2020/1514}, } @misc{cryptoeprint:2020:1515, author = {Konstantin Kalgin and Valeriya Idrisova}, title = {The classification of quadratic APN functions in 7 variables}, howpublished = {Cryptology ePrint Archive, Report 2020/1515}, year = {2020}, url = {https://eprint.iacr.org/2020/1515}, } @misc{cryptoeprint:2020:1516, author = {Alin Tomescu}, title = {How to compute all Pointproofs}, howpublished = {Cryptology ePrint Archive, Report 2020/1516}, year = {2020}, url = {https://eprint.iacr.org/2020/1516}, } @misc{cryptoeprint:2020:1517, author = {Hemanta Maji and Anat Paskin-Cherniavsky and Tom Suad and Mingyaun Wang}, title = {On Leakage-Resilient Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2020/1517}, year = {2020}, url = {https://eprint.iacr.org/2020/1517}, } @misc{cryptoeprint:2020:1518, author = {Ben Nassi and Yair Meidan and Dudi Nassi and Asaf Shabtai and Yuval Elovici}, title = {Botnet IND: About Botnets of Botless IoT Devices}, howpublished = {Cryptology ePrint Archive, Report 2020/1518}, year = {2020}, url = {https://eprint.iacr.org/2020/1518}, } @misc{cryptoeprint:2020:1519, author = {Sven Schäge and Jörg Schwenk and Sebastian Lauer}, title = {Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2}, howpublished = {Cryptology ePrint Archive, Report 2020/1519}, year = {2020}, url = {https://eprint.iacr.org/2020/1519}, } @misc{cryptoeprint:2020:151, author = {Wouter Castryck and Jana Sotáková and Frederik Vercauteren}, title = {Breaking the decisional Diffie-Hellman problem for class group actions using genus theory}, howpublished = {Cryptology ePrint Archive, Report 2020/151}, year = {2020}, url = {https://eprint.iacr.org/2020/151}, } @misc{cryptoeprint:2020:1520, author = {Jorge Chávez-Saab and Jesús-Javier Chi-Domínguez and Samuel Jaques and Francisco Rodríguez-Henríquez}, title = {The SQALE of CSIDH: Square-root v\'elu Quantum-resistant isogeny Action with Low Exponents}, howpublished = {Cryptology ePrint Archive, Report 2020/1520}, year = {2020}, url = {https://eprint.iacr.org/2020/1520}, } @misc{cryptoeprint:2020:1521, author = {Rui Morais and Paul Crocker and Simao Melo de Sousa}, title = {Delegated RingCT: faster anonymous transactions}, howpublished = {Cryptology ePrint Archive, Report 2020/1521}, year = {2020}, url = {https://eprint.iacr.org/2020/1521}, } @misc{cryptoeprint:2020:1522, author = {Weikeng Chen and Alessandro Chiesa and Emma Dauterman and Nicholas P. Ward}, title = {Reducing Participation Costs via Incremental Verification for Ledger Systems}, howpublished = {Cryptology ePrint Archive, Report 2020/1522}, year = {2020}, url = {https://eprint.iacr.org/2020/1522}, } @misc{cryptoeprint:2020:1523, author = {Yaobin Shen; Lei Wang; Jian Weng}, title = {Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-User Setting}, howpublished = {Cryptology ePrint Archive, Report 2020/1523}, year = {2020}, url = {https://eprint.iacr.org/2020/1523}, } @misc{cryptoeprint:2020:1524, author = {Elena Andreeva and Amit Singh Bhati and Damian Vizar}, title = {Nonce-Misuse Security of the SAEF Authenticated Encryption mode}, howpublished = {Cryptology ePrint Archive, Report 2020/1524}, year = {2020}, url = {https://eprint.iacr.org/2020/1524}, } @misc{cryptoeprint:2020:1525, author = {Cas Cremers and Samed Düzlü and Rune Fiedler and Marc Fischlin and Christian Janson}, title = {BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures}, howpublished = {Cryptology ePrint Archive, Report 2020/1525}, year = {2020}, url = {https://eprint.iacr.org/2020/1525}, } @misc{cryptoeprint:2020:1526, author = {Alexandre Bois and Ignacio Cascudo and Dario Fiore and Dongwoo Kim}, title = {Flexible and Efficient Verifiable Computation on Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2020/1526}, year = {2020}, url = {https://eprint.iacr.org/2020/1526}, } @misc{cryptoeprint:2020:1527, author = {Jonathan Bootle and Alessandro Chiesa and Siqi Liu}, title = {Zero-Knowledge Succinct Arguments with a Linear-Time Prover}, howpublished = {Cryptology ePrint Archive, Report 2020/1527}, year = {2020}, url = {https://eprint.iacr.org/2020/1527}, } @misc{cryptoeprint:2020:1528, author = {Prabhanjan Ananth and Kai-Min Chung and Rolando L. La Placa}, title = {On the Concurrent Composition of Quantum Zero-Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2020/1528}, year = {2020}, url = {https://eprint.iacr.org/2020/1528}, } @misc{cryptoeprint:2020:1529, author = {Claude Carlet}, title = {On the image set size of differentially uniform functions and related bounds on their nonlinearity and their distance to affine functions}, howpublished = {Cryptology ePrint Archive, Report 2020/1529}, year = {2020}, url = {https://eprint.iacr.org/2020/1529}, } @misc{cryptoeprint:2020:152, author = {Thomas Attema and Ronald Cramer}, title = {Compressed $\Sigma$-Protocol Theory and Practical Application to Plug & Play Secure Algorithmics}, howpublished = {Cryptology ePrint Archive, Report 2020/152}, year = {2020}, url = {https://eprint.iacr.org/2020/152}, } @misc{cryptoeprint:2020:1530, author = {Arian Arabnouri and Reza Ebrahimi Atani and Shiva Azizzadeh}, title = {Security Analysis of Public Key Searchable Encryption Schemes against Injection Attacks}, howpublished = {Cryptology ePrint Archive, Report 2020/1530}, year = {2020}, url = {https://eprint.iacr.org/2020/1530}, } @misc{cryptoeprint:2020:1531, author = {Francesca Falzon and Evangelia Anna Markatou and William Schor and Roberto Tamassia}, title = {Reconstructing with Less: Leakage Abuse Attacks in Two-Dimensions}, howpublished = {Cryptology ePrint Archive, Report 2020/1531}, year = {2020}, url = {https://eprint.iacr.org/2020/1531}, } @misc{cryptoeprint:2020:1532, author = {Dan Boneh and Dmitry Kogan and Katharine Woo}, title = {Oblivious Pseudorandom Functions from Isogenies}, howpublished = {Cryptology ePrint Archive, Report 2020/1532}, year = {2020}, url = {https://eprint.iacr.org/2020/1532}, } @misc{cryptoeprint:2020:1533, author = {Baiyu Li and Daniele Micciancio}, title = {On the Security of Homomorphic Encryption on Approximate Numbers}, howpublished = {Cryptology ePrint Archive, Report 2020/1533}, year = {2020}, url = {https://eprint.iacr.org/2020/1533}, } @misc{cryptoeprint:2020:1534, author = {SeongHyuck Lim and JongHyeok Lee and Dong-Guk Han}, title = {Improved Differential Fault Attack on LEA by Algebraic Representation of Modular Addition}, howpublished = {Cryptology ePrint Archive, Report 2020/1534}, year = {2020}, url = {https://eprint.iacr.org/2020/1534}, } @misc{cryptoeprint:2020:1535, author = {Anna M. Johnston}, title = {Designer Primes}, howpublished = {Cryptology ePrint Archive, Report 2020/1535}, year = {2020}, url = {https://eprint.iacr.org/2020/1535}, } @misc{cryptoeprint:2020:1536, author = {Dan Boneh and Justin Drake and Ben Fisch and Ariel Gabizon}, title = {Halo Infinite: Recursive zk-SNARKs from any Additive Polynomial Commitment Scheme}, howpublished = {Cryptology ePrint Archive, Report 2020/1536}, year = {2020}, url = {https://eprint.iacr.org/2020/1536}, } @misc{cryptoeprint:2020:1537, author = {Nizamud Din and Abdul Waheed and Nasir Saeed}, title = {Comments on “ Multi Recipient Aggregate Signcryption Scheme Based on Elliptic Curve”}, howpublished = {Cryptology ePrint Archive, Report 2020/1537}, year = {2020}, url = {https://eprint.iacr.org/2020/1537}, } @misc{cryptoeprint:2020:1538, author = {Timothy J. Hodges and Sergio Molina}, title = {Homological Characterization of bounded $F_2$-regularity}, howpublished = {Cryptology ePrint Archive, Report 2020/1538}, year = {2020}, url = {https://eprint.iacr.org/2020/1538}, } @misc{cryptoeprint:2020:1539, author = {Marc Fischlin and Felix Günther and Philipp Muth}, title = {Information-Theoretic Security of Cryptographic Channels}, howpublished = {Cryptology ePrint Archive, Report 2020/1539}, year = {2020}, url = {https://eprint.iacr.org/2020/1539}, } @misc{cryptoeprint:2020:153, author = {Nicholas-Philip Brandt and Sven Maier and Tobias Müller and Jörn Müller-Quade}, title = {Constructing Secure Multi-Party Computation with Identifiable Abort}, howpublished = {Cryptology ePrint Archive, Report 2020/153}, year = {2020}, url = {https://eprint.iacr.org/2020/153}, } @misc{cryptoeprint:2020:1540, author = {Martin R. Albrecht and Nadia Heninger}, title = {On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem}, howpublished = {Cryptology ePrint Archive, Report 2020/1540}, year = {2020}, url = {https://eprint.iacr.org/2020/1540}, } @misc{cryptoeprint:2020:1541, author = {Ziyuan Liang and Weiran Liu and Fan Zhang and Bingsheng Zhang and Jian Liu and Lei Zhang and Kui Ren}, title = {A Framework of Private Set Intersection Protocols.}, howpublished = {Cryptology ePrint Archive, Report 2020/1541}, year = {2020}, url = {https://eprint.iacr.org/2020/1541}, } @misc{cryptoeprint:2020:1542, author = {Anubhab Baksi and Shivam Bhasin and Jakub Breier and Anupam Chattopadhyay and Vinay B. Y. Kumar}, title = {Feeding Three Birds With One Scone: A Generic Duplication Based Countermeasure To Fault Attacks (Extended Version)}, howpublished = {Cryptology ePrint Archive, Report 2020/1542}, year = {2020}, url = {https://eprint.iacr.org/2020/1542}, } @misc{cryptoeprint:2020:1543, author = {Deepraj Pandey and Nandini Agrawal and Mahabir Prasad Jhanwar}, title = {CovidBloc: A Blockchain Powered Exposure Database for Contact Tracing}, howpublished = {Cryptology ePrint Archive, Report 2020/1543}, year = {2020}, url = {https://eprint.iacr.org/2020/1543}, } @misc{cryptoeprint:2020:1544, author = {Rachit Rawat and Mahabir Prasad Jhanwar}, title = {PAS-TA-U: PASsword-based Threshold Authentication with PASsword Update}, howpublished = {Cryptology ePrint Archive, Report 2020/1544}, year = {2020}, url = {https://eprint.iacr.org/2020/1544}, } @misc{cryptoeprint:2020:1545, author = {Howard M. Heys}, title = {A Tutorial on the Implementation of Block Ciphers: Software and Hardware Applications}, howpublished = {Cryptology ePrint Archive, Report 2020/1545}, year = {2020}, url = {https://eprint.iacr.org/2020/1545}, } @misc{cryptoeprint:2020:1546, author = {Marco Holz and Benjamin Judkewitz and Helen Möllering and Benny Pinkas and Thomas Schneider}, title = {PEM: Privacy-preserving Epidemiological Modeling}, howpublished = {Cryptology ePrint Archive, Report 2020/1546}, year = {2020}, url = {https://eprint.iacr.org/2020/1546}, } @misc{cryptoeprint:2020:1547, author = {Ariel Hamlin and Mayank Varia }, title = {Two-server Distributed ORAM with Sublinear Computation and Constant Rounds}, howpublished = {Cryptology ePrint Archive, Report 2020/1547}, year = {2020}, url = {https://eprint.iacr.org/2020/1547}, } @misc{cryptoeprint:2020:1548, author = {Valerio Cini and Sebastian Ramacher and Daniel Slamanig and Christoph Striecks}, title = {CCA-Secure (Puncturable) KEMs from Encryption With Non-Negligible Decryption Errors}, howpublished = {Cryptology ePrint Archive, Report 2020/1548}, year = {2020}, url = {https://eprint.iacr.org/2020/1548}, } @misc{cryptoeprint:2020:1549, author = {Yongwoo Lee and Joonwoo Lee and Young-Sik Kim and HyungChul Kang and Jong-Seon No }, title = {High-Precision Approximate Homomorphic Encryption by Error Variance Minimization}, howpublished = {Cryptology ePrint Archive, Report 2020/1549}, year = {2020}, url = {https://eprint.iacr.org/2020/1549}, } @misc{cryptoeprint:2020:154, author = {Aayush Jain and Nathan Manohar and Amit Sahai}, title = {Combiners for Functional Encryption, Unconditionally}, howpublished = {Cryptology ePrint Archive, Report 2020/154}, year = {2020}, url = {https://eprint.iacr.org/2020/154}, } @misc{cryptoeprint:2020:1550, author = {Viktoria Ronge and Christoph Egger and Russell W. F. Lai and Dominique Schröder and Hoover H. F. Yin}, title = {Foundations of Ring Sampling}, howpublished = {Cryptology ePrint Archive, Report 2020/1550}, year = {2020}, url = {https://eprint.iacr.org/2020/1550}, } @misc{cryptoeprint:2020:1551, author = {Sherman S. M. Chow and Katharina Fech and Russell W. F. Lai and Giulio Malavolta}, title = {Multi-Client Oblivious RAM with Poly-Logarithmic Communication}, howpublished = {Cryptology ePrint Archive, Report 2020/1551}, year = {2020}, url = {https://eprint.iacr.org/2020/1551}, } @misc{cryptoeprint:2020:1552, author = {Julian Brost and Christoph Egger and Russell W. F. Lai and Fritz Schmid and Dominique Schröder and Markus Zoppelt}, title = {Threshold Password-Hardened Encryption Services}, howpublished = {Cryptology ePrint Archive, Report 2020/1552}, year = {2020}, url = {https://eprint.iacr.org/2020/1552}, } @misc{cryptoeprint:2020:1553, author = {Arian Arabnouri and Reza Ebrahimi Atani and Shiva Azizzadeh}, title = {A Novel Asymmetric Searchable Encryption Scheme with Granting search capability}, howpublished = {Cryptology ePrint Archive, Report 2020/1553}, year = {2020}, url = {https://eprint.iacr.org/2020/1553}, } @misc{cryptoeprint:2020:1554, author = {Xiaolu Hou and Jakub Breier and Shivam Bhasin}, title = {DNFA: Differential No-Fault Analysis of Bit Permutation Based Ciphers Assisted by Side-Channel}, howpublished = {Cryptology ePrint Archive, Report 2020/1554}, year = {2020}, url = {https://eprint.iacr.org/2020/1554}, } @misc{cryptoeprint:2020:1555, author = {Siyao Guo and Pritish Kamath and Alon Rosen and Katerina Sotiraki}, title = {Limits on the Efficiency of (Ring) LWE based Non-Interactive Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2020/1555}, year = {2020}, url = {https://eprint.iacr.org/2020/1555}, } @misc{cryptoeprint:2020:1556, author = {Daniel Escudero and Anders Dalskov}, title = {Honest Majority MPC with Abort with Minimal Online Communication}, howpublished = {Cryptology ePrint Archive, Report 2020/1556}, year = {2020}, url = {https://eprint.iacr.org/2020/1556}, } @misc{cryptoeprint:2020:1557, author = {Javad Doliskani}, title = {Efficient Quantum Public-Key Encryption From Learning With Errors}, howpublished = {Cryptology ePrint Archive, Report 2020/1557}, year = {2020}, url = {https://eprint.iacr.org/2020/1557}, } @misc{cryptoeprint:2020:1558, author = {Thomas Pornin}, title = {Double-Odd Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2020/1558}, year = {2020}, url = {https://eprint.iacr.org/2020/1558}, } @misc{cryptoeprint:2020:1559, author = {Prasanna Ravi and Shivam Bhasin and Sujoy Sinha Roy and Anupam Chattopadhyay}, title = {On Exploiting Message Leakage in (few) NIST PQC Candidates for Practical Message Recovery and Key Recovery Attacks}, howpublished = {Cryptology ePrint Archive, Report 2020/1559}, year = {2020}, url = {https://eprint.iacr.org/2020/1559}, } @misc{cryptoeprint:2020:155, author = {Yifan Tian and Laurent Njilla and Jiawei Yuan and Shucheng Yu}, title = {Low Latency Privacy-preserving Outsourcing of Deep Neural Network Inference}, howpublished = {Cryptology ePrint Archive, Report 2020/155}, year = {2020}, url = {https://eprint.iacr.org/2020/155}, } @misc{cryptoeprint:2020:1560, author = {Mahdi Esfahani and Hadi Soleimany and Mohammad Reza Aref}, title = {Modified Cache Template Attack on AES}, howpublished = {Cryptology ePrint Archive, Report 2020/1560}, year = {2020}, url = {https://eprint.iacr.org/2020/1560}, } @misc{cryptoeprint:2020:1561, author = {Ryan Karl and Jonathan Takeshita and Taeho Jung}, title = {Cryptonite: A Framework for Flexible Time-Series Secure Aggregation with Online Fault Tolerance}, howpublished = {Cryptology ePrint Archive, Report 2020/1561}, year = {2020}, url = {https://eprint.iacr.org/2020/1561}, } @misc{cryptoeprint:2020:1562, author = {Claude Carlet and Pierrick Méaux}, title = {A complete study of two classes of Boolean functions for homomorphic-friendly stream ciphers}, howpublished = {Cryptology ePrint Archive, Report 2020/1562}, year = {2020}, url = {https://eprint.iacr.org/2020/1562}, } @misc{cryptoeprint:2020:1563, author = {Sri Aravinda KrishnanThyagarajan and Adithya Bhat and Giulio Malavolta and Nico Döttling and Aniket Kate and Dominique Schröder}, title = {Verifiable Timed Signatures Made Practical}, howpublished = {Cryptology ePrint Archive, Report 2020/1563}, year = {2020}, url = {https://eprint.iacr.org/2020/1563}, } @misc{cryptoeprint:2020:1564, author = {Anna M. Johnston and Rathna Ramesh}, title = {Prime Proof Protocol}, howpublished = {Cryptology ePrint Archive, Report 2020/1564}, year = {2020}, url = {https://eprint.iacr.org/2020/1564}, } @misc{cryptoeprint:2020:1565, author = {Amira Barki and Aline Gouget}, title = {Achieving privacy and accountability in traceable digital currency}, howpublished = {Cryptology ePrint Archive, Report 2020/1565}, year = {2020}, url = {https://eprint.iacr.org/2020/1565}, } @misc{cryptoeprint:2020:1566, author = {Mohammad Amin Rakeei and Farokhlagha Moazami}, title = {An efficient and provably secure authenticated key agreement scheme for mobile edge computing}, howpublished = {Cryptology ePrint Archive, Report 2020/1566}, year = {2020}, url = {https://eprint.iacr.org/2020/1566}, } @misc{cryptoeprint:2020:1567, author = {Yadi Ye and Leyou Zhang and Yi Mu}, title = {Secure Decentralized Access Control Policy for Data Sharing in Smart Grid}, howpublished = {Cryptology ePrint Archive, Report 2020/1567}, year = {2020}, url = {https://eprint.iacr.org/2020/1567}, } @misc{cryptoeprint:2020:1568, author = {Silvio Micali and Leonid Reyzin and Georgios Vlachos and Riad S. Wahby and Nickolai Zeldovich}, title = {Compact Certificates of Collective Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2020/1568}, year = {2020}, url = {https://eprint.iacr.org/2020/1568}, } @misc{cryptoeprint:2020:1569, author = {Atsuki Momose and Ling Ren}, title = {Optimal Communication Complexity of Byzantine Agreement, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2020/1569}, year = {2020}, url = {https://eprint.iacr.org/2020/1569}, } @misc{cryptoeprint:2020:156, author = {Xing Li and Yi Zheng and Kunxian Xia and Tongcheng Sun and John Beyler}, title = {An Efficient Privacy Protocol Using zk-SNARKs Based on Smart Contracts}, howpublished = {Cryptology ePrint Archive, Report 2020/156}, year = {2020}, url = {https://eprint.iacr.org/2020/156}, } @misc{cryptoeprint:2020:1570, author = {Onur Gunlu and Rafael F. Schaefer}, title = {Secret Key Agreement with Physical Unclonable Functions: An Optimality Summary}, howpublished = {Cryptology ePrint Archive, Report 2020/1570}, year = {2020}, url = {https://eprint.iacr.org/2020/1570}, } @misc{cryptoeprint:2020:1571, author = {Olivier Blazy and Laura Brouilhet and Celine Chevalier and Patrick Towa and Ida Tucker and Damien Vergnaud}, title = {Hardware Security without Secure Hardware: How to Decrypt with a Password and a Server}, howpublished = {Cryptology ePrint Archive, Report 2020/1571}, year = {2020}, url = {https://eprint.iacr.org/2020/1571}, } @misc{cryptoeprint:2020:1572, author = {Yang Tan}, title = {Achieve Fully Decentralized End to End encryption meeting via Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2020/1572}, year = {2020}, url = {https://eprint.iacr.org/2020/1572}, } @misc{cryptoeprint:2020:1573, author = {Lira Wang}, title = {Halo 0.9: An Halo Protocol with Fully-Succinctness}, howpublished = {Cryptology ePrint Archive, Report 2020/1573}, year = {2020}, url = {https://eprint.iacr.org/2020/1573}, } @misc{cryptoeprint:2020:1574, author = {Shange Fu and Jiangshan Yu and Rafael Dowsley and Joseph Liu}, title = {Analysing Mining Machine Shutdown Price}, howpublished = {Cryptology ePrint Archive, Report 2020/1574}, year = {2020}, url = {https://eprint.iacr.org/2020/1574}, } @misc{cryptoeprint:2020:1575, author = {Loïc Ferreira}, title = {(In)security of the Radio Interface in Sigfox}, howpublished = {Cryptology ePrint Archive, Report 2020/1575}, year = {2020}, url = {https://eprint.iacr.org/2020/1575}, } @misc{cryptoeprint:2020:1576, author = {Changhui Hu and Jin Li and Zheli Liu and Xiaojie Guo and Yu Wei and Xuan Guang and Grigorios Loukides and Changyu Dong}, title = {How to Make Private Distributed Cardinality Estimation Practical, and Get Differential Privacy for Free}, howpublished = {Cryptology ePrint Archive, Report 2020/1576}, year = {2020}, url = {https://eprint.iacr.org/2020/1576}, } @misc{cryptoeprint:2020:1577, author = {Alessandro Baccarini and Marina Blanton and Chen Yuan}, title = {Multi-Party Replicated Secret Sharing over a Ring with Applications to Privacy-Preserving Machine Learning}, howpublished = {Cryptology ePrint Archive, Report 2020/1577}, year = {2020}, url = {https://eprint.iacr.org/2020/1577}, } @misc{cryptoeprint:2020:1578, author = {Tung Chou}, title = {An IND-CCA2 Attack Against the 1st- and 2nd-round Versions of NTS-KEM}, howpublished = {Cryptology ePrint Archive, Report 2020/1578}, year = {2020}, url = {https://eprint.iacr.org/2020/1578}, } @misc{cryptoeprint:2020:1579, author = {Hankyung Ko and Ingeun Lee and Seunghwa Lee and Jihye Kim and Hyunok Oh}, title = {Efficient Verifiable Image Redacting based on zk-SNARKs}, howpublished = {Cryptology ePrint Archive, Report 2020/1579}, year = {2020}, url = {https://eprint.iacr.org/2020/1579}, } @misc{cryptoeprint:2020:157, author = {Vipul Goyal and Akshayaram Srinivasan and Chenzhi Zhu}, title = {Multi-Source Non-Malleable Extractors and Applications}, howpublished = {Cryptology ePrint Archive, Report 2020/157}, year = {2020}, url = {https://eprint.iacr.org/2020/157}, } @misc{cryptoeprint:2020:1580, author = {Conor McMenamin and Vanesa Daza and Matteo Pontecorvi}, title = {Achieving State Machine Replication without Honesty Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2020/1580}, year = {2020}, url = {https://eprint.iacr.org/2020/1580}, } @misc{cryptoeprint:2020:1581, author = {Jung Hee Cheon and Seungwan Hong and Duhyeong Kim}, title = {Remark on the Security of CKKS Scheme in Practice}, howpublished = {Cryptology ePrint Archive, Report 2020/1581}, year = {2020}, url = {https://eprint.iacr.org/2020/1581}, } @misc{cryptoeprint:2020:1582, author = {Hangi Kim and Yongjin Jeon and Giyoon Kim and Jongsung Kim and Bo-Yeon Sim and Dong-Guk Han and Hwajeong Seo and Seonggyeom Kim and Seokhie Hong and Jaechul Sung and Deukjo Hong}, title = {A New Method for Designing Lightweight S-boxes with High Differential and Linear Branch Numbers, and Its Application}, howpublished = {Cryptology ePrint Archive, Report 2020/1582}, year = {2020}, url = {https://eprint.iacr.org/2020/1582}, } @misc{cryptoeprint:2020:1583, author = {Iraklis Symeonidis and Dragos Rotaru and Mustafa A. Mustafa and Bart Mennink and Panos Papadimitratos}, title = {HERMES: Scalable, Secure, and Privacy-Enhancing Vehicle Access System}, howpublished = {Cryptology ePrint Archive, Report 2020/1583}, year = {2020}, url = {https://eprint.iacr.org/2020/1583}, } @misc{cryptoeprint:2020:1584, author = {Panos Kampanakis and Peter Panburana and Michael Curcio and Chirag Shroff}, title = {Post-Quantum Hash-Based Signatures for Secure Boot}, howpublished = {Cryptology ePrint Archive, Report 2020/1584}, year = {2020}, url = {https://eprint.iacr.org/2020/1584}, } @misc{cryptoeprint:2020:1585, author = {Timothy J. Hodges and Hari R. Iyer}, title = {Semi-Regularity of Pairs of Boolean Polynomials}, howpublished = {Cryptology ePrint Archive, Report 2020/1585}, year = {2020}, url = {https://eprint.iacr.org/2020/1585}, } @misc{cryptoeprint:2020:1586, author = {Alex Ozdemir and Fraser Brown and Riad S. Wahby}, title = {Unifying Compilers for SNARKs, SMT, and More}, howpublished = {Cryptology ePrint Archive, Report 2020/1586}, year = {2020}, url = {https://eprint.iacr.org/2020/1586}, } @misc{cryptoeprint:2020:1587, author = {Claude Carlet}, title = {On the properties of the Boolean functions associated to the differential spectrum of general APN functions and their consequences}, howpublished = {Cryptology ePrint Archive, Report 2020/1587}, year = {2020}, url = {https://eprint.iacr.org/2020/1587}, } @misc{cryptoeprint:2020:1588, author = {Shweta Agrawal and Shafi Goldwasser and Saleet Mossel}, title = {Deniable Fully Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/1588}, year = {2020}, url = {https://eprint.iacr.org/2020/1588}, } @misc{cryptoeprint:2020:1589, author = {Siyao Guo and Qian Li and Qipeng Liu and Jiapeng Zhang}, title = {Unifying Presampling via Concentration Bounds}, howpublished = {Cryptology ePrint Archive, Report 2020/1589}, year = {2020}, url = {https://eprint.iacr.org/2020/1589}, } @misc{cryptoeprint:2020:158, author = {Ali Hadipour and Seyed Mahdi Sajadieh and Raheleh Afifi}, title = {Jump index in T-functions for designing a new basic structure of stream ciphers}, howpublished = {Cryptology ePrint Archive, Report 2020/158}, year = {2020}, url = {https://eprint.iacr.org/2020/158}, } @misc{cryptoeprint:2020:1590, author = {Adithya Bhat and Nibesh Shreshta and Aniket Kate and Kartik Nayak}, title = {RandPiper -- Reconfiguration-Friendly Random Beacons with Quadratic Communication}, howpublished = {Cryptology ePrint Archive, Report 2020/1590}, year = {2020}, url = {https://eprint.iacr.org/2020/1590}, } @misc{cryptoeprint:2020:1591, author = {Kai-Min Chung and T-H. Hubert Chan and Ting Wen and Elaine Shi (random author ordering)}, title = {Game-Theoretically Fair Leader Election in O(log log n) Rounds under Majority Coalitions}, howpublished = {Cryptology ePrint Archive, Report 2020/1591}, year = {2020}, url = {https://eprint.iacr.org/2020/1591}, } @misc{cryptoeprint:2020:1592, author = {Elaine Shi and Waqar Aqeel and Balakrishnan Chandrasekaran and Bruce Maggs}, title = {Puncturable Pseudorandom Sets and Private Information Retrieval with Polylogarithmic Bandwidth and Sublinear Time}, howpublished = {Cryptology ePrint Archive, Report 2020/1592}, year = {2020}, url = {https://eprint.iacr.org/2020/1592}, } @misc{cryptoeprint:2020:1593, author = {Edward Eaton and David Jao and and Chelsea Komlo}, title = {Towards Post-Quantum Updatable Public-Key Encryption via Supersingular Isogenies}, howpublished = {Cryptology ePrint Archive, Report 2020/1593}, year = {2020}, url = {https://eprint.iacr.org/2020/1593}, } @misc{cryptoeprint:2020:1594, author = {HyungChul Kang and Joon-Woo Lee and Yongwoo Lee and Young-Sik Kim and Jong-Seon No}, title = {Bootstrapping on SEAL}, howpublished = {Cryptology ePrint Archive, Report 2020/1594}, year = {2020}, url = {https://eprint.iacr.org/2020/1594}, } @misc{cryptoeprint:2020:1595, author = {Tingting Guo and Peng Wang and Lei Hu and Dingfeng Ye}, title = {Attack Beyond-Birthday-Bound MACs in Quantum Setting}, howpublished = {Cryptology ePrint Archive, Report 2020/1595}, year = {2020}, url = {https://eprint.iacr.org/2020/1595}, } @misc{cryptoeprint:2020:1596, author = {Kinan Dak Albab and Rawane Issa and Mayank Varia and Kalman Graffi}, title = {Batched Differentially Private Information Retrieval}, howpublished = {Cryptology ePrint Archive, Report 2020/1596}, year = {2020}, url = {https://eprint.iacr.org/2020/1596}, } @misc{cryptoeprint:2020:1597, author = {Abderrahmane Nitaj and Willy Susilo and Joseph Tonien}, title = {A New Improved AES S-box With Enhanced Properties}, howpublished = {Cryptology ePrint Archive, Report 2020/1597}, year = {2020}, url = {https://eprint.iacr.org/2020/1597}, } @misc{cryptoeprint:2020:1598, author = {Manoj Kumar and Tarun Yadav}, title = {MILP Based Differential Attack on Round Reduced WARP}, howpublished = {Cryptology ePrint Archive, Report 2020/1598}, year = {2020}, url = {https://eprint.iacr.org/2020/1598}, } @misc{cryptoeprint:2020:1599, author = {Samuel Dittmer and Yuval Ishai and Steve Lu and Rafail Ostrovsky and Mohamed Elsabagh and Nikolaos Kiourtis and Brian Schulte and Angelos Stavrou }, title = {Function Secret Sharing for PSI-CA: With Applications to Private Contact Tracing}, howpublished = {Cryptology ePrint Archive, Report 2020/1599}, year = {2020}, url = {https://eprint.iacr.org/2020/1599}, } @misc{cryptoeprint:2020:159, author = {Cheng Hong and Zhicong Huang and Wen-jie Lu and Hunter Qu and Li Ma and Morten Dahl and Jason Mancuso}, title = {Privacy-preserving collaborative machine learning on genomic data using TensorFlow}, howpublished = {Cryptology ePrint Archive, Report 2020/159}, year = {2020}, url = {https://eprint.iacr.org/2020/159}, } @misc{cryptoeprint:2020:1600, author = {Unai Rioja and Lejla Batina and Jose Luis Flores and Igor Armendariz}, title = {Auto-tune POIs: Estimation of distribution algorithms for efficient side-channel analysis}, howpublished = {Cryptology ePrint Archive, Report 2020/1600}, year = {2020}, url = {https://eprint.iacr.org/2020/1600}, } @misc{cryptoeprint:2020:1601, author = {Rami Khalil and Naranker Dulay}, title = {Adaptive layer-two dispute periods in blockchains}, howpublished = {Cryptology ePrint Archive, Report 2020/1601}, year = {2020}, url = {https://eprint.iacr.org/2020/1601}, } @misc{cryptoeprint:2020:1602, author = {Aurélien Greuet and Simon Montoya and Guénaël Renault}, title = {Speeding-up Ideal Lattice-Based Key Exchange Using a RSA/ECC Coprocessor}, howpublished = {Cryptology ePrint Archive, Report 2020/1602}, year = {2020}, url = {https://eprint.iacr.org/2020/1602}, } @misc{cryptoeprint:2020:1603, author = {Takashi Nishide}, title = {One-Time Delegation of Unlinkable Signing Rights and Its Application}, howpublished = {Cryptology ePrint Archive, Report 2020/1603}, year = {2020}, url = {https://eprint.iacr.org/2020/1603}, } @misc{cryptoeprint:2020:1604, author = {Andrei Lapets and Wyatt Howe and Ben Getchell and Frederick Jansen}, title = {An Embedded Domain-Specific Language for Logical Circuit Descriptions with Applications to Garbled Circuits}, howpublished = {Cryptology ePrint Archive, Report 2020/1604}, year = {2020}, url = {https://eprint.iacr.org/2020/1604}, } @misc{cryptoeprint:2020:1605, author = {Alexander R. Block and Simina Branzei and Hemanta K. Maji and Himanshi Mehta and Tamalika Mukherjee and Hai H. Nguyen}, title = {$P_4$-free Partition and Cover Numbers}, howpublished = {Cryptology ePrint Archive, Report 2020/1605}, year = {2020}, url = {https://eprint.iacr.org/2020/1605}, } @misc{cryptoeprint:2020:1606, author = {Wen-jie Lu and Zhicong Huang and Cheng Hong and Yiping Ma and Hunter Qu}, title = {PEGASUS: Bridging Polynomial and Non-polynomial Evaluations in Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/1606}, year = {2020}, url = {https://eprint.iacr.org/2020/1606}, } @misc{cryptoeprint:2020:1607, author = {Shumo Chu and Qiudong Xia and Zhenfei Zhang}, title = {Manta: Privacy Preserving Decentralized Exchange}, howpublished = {Cryptology ePrint Archive, Report 2020/1607}, year = {2020}, url = {https://eprint.iacr.org/2020/1607}, } @misc{cryptoeprint:2020:1608, author = {Daniel J. Bernstein}, title = {Cryptographic competitions}, howpublished = {Cryptology ePrint Archive, Report 2020/1608}, year = {2020}, url = {https://eprint.iacr.org/2020/1608}, } @misc{cryptoeprint:2020:1609, author = {Amar Bapić and Enes Pasalic}, title = {A new method for secondary constructions of vectorial bent functions}, howpublished = {Cryptology ePrint Archive, Report 2020/1609}, year = {2020}, url = {https://eprint.iacr.org/2020/1609}, } @misc{cryptoeprint:2020:160, author = {Sihem Mesnager and Kwang Ho Kim and Jong Hyok Choe and Dok Nam Lee}, title = {Solving Some Affine Equations over Finite Fields}, howpublished = {Cryptology ePrint Archive, Report 2020/160}, year = {2020}, url = {https://eprint.iacr.org/2020/160}, } @misc{cryptoeprint:2020:1610, author = {Mihai-Andrei Costandache and Marian-Stefan Mihalache and Emil Simion}, title = {New directions in the ransomware phenomenon}, howpublished = {Cryptology ePrint Archive, Report 2020/1610}, year = {2020}, url = {https://eprint.iacr.org/2020/1610}, } @misc{cryptoeprint:2020:1611, author = {Jonathan Takeshita and Ryan Karl and Ting Gong and Taeho Jung}, title = {SLAP: Simple Lattice-Based Private Stream Aggregation Protocol}, howpublished = {Cryptology ePrint Archive, Report 2020/1611}, year = {2020}, url = {https://eprint.iacr.org/2020/1611}, } @misc{cryptoeprint:2020:1612, author = {Jiangtao Yuan and Jing Yang and Guoai Xu and Xingxing Jia and Chennyu Wang}, title = {A New Efficient Hierarchical Multi-secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations}, howpublished = {Cryptology ePrint Archive, Report 2020/1612}, year = {2020}, url = {https://eprint.iacr.org/2020/1612}, } @misc{cryptoeprint:2020:1613, author = {Sri Aravinda Krishnan Thyagarajan and Giulio Malavolta }, title = {Lockable Signatures for Blockchains: Scriptless Scripts for All Signatures}, howpublished = {Cryptology ePrint Archive, Report 2020/1613}, year = {2020}, url = {https://eprint.iacr.org/2020/1613}, } @misc{cryptoeprint:2020:1614, author = {Aljosha Judmayer and Nicholas Stifter and Alexei Zamyatin and Itay Tsabary and Ittay Eyal and Peter Gaži and Sarah Meiklejohn and Edgar Weippl}, title = {SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies}, howpublished = {Cryptology ePrint Archive, Report 2020/1614}, year = {2020}, url = {https://eprint.iacr.org/2020/1614}, } @misc{cryptoeprint:2020:1615, author = {Guoai Xu and Jiangtao Yuan and Guosheng Xu}, title = {An Ideal Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations}, howpublished = {Cryptology ePrint Archive, Report 2020/1615}, year = {2020}, url = {https://eprint.iacr.org/2020/1615}, } @misc{cryptoeprint:2020:1616, author = {Fan Peng and Hao Chen and Chang-An Zhao}, title = {Algebraic Geometric Secret Sharing Schemes over Large Fields Are Asymptotically Threshold}, howpublished = {Cryptology ePrint Archive, Report 2020/1616}, year = {2020}, url = {https://eprint.iacr.org/2020/1616}, } @misc{cryptoeprint:2020:1617, author = {Steve Thakur}, title = {Arguments of Knowledge via hidden order groups}, howpublished = {Cryptology ePrint Archive, Report 2020/1617}, year = {2020}, url = {https://eprint.iacr.org/2020/1617}, } @misc{cryptoeprint:2020:1618, author = {Benedikt Bünz and Alessandro Chiesa and William Lin and Pratyush Mishra and Nicholas Spooner}, title = {Proof-Carrying Data without Succinct Arguments}, howpublished = {Cryptology ePrint Archive, Report 2020/1618}, year = {2020}, url = {https://eprint.iacr.org/2020/1618}, } @misc{cryptoeprint:2020:1619, author = {Paul Kirchner and Pierre-Alain Fouque}, title = {Getting Rid of Linear Algebra in Number Theory Problems}, howpublished = {Cryptology ePrint Archive, Report 2020/1619}, year = {2020}, url = {https://eprint.iacr.org/2020/1619}, } @misc{cryptoeprint:2020:161, author = {Hanlin Liu and Yu Yu and Shuoyao Zhao and Jiang Zhang and Wenling Liu}, title = {Pushing the Limits of Valiant's Universal Circuits: Simpler, Tighter and More Compact}, howpublished = {Cryptology ePrint Archive, Report 2020/161}, year = {2020}, url = {https://eprint.iacr.org/2020/161}, } @misc{cryptoeprint:2020:1620, author = {Yi Chen and Hongbo Yu}, title = {Neural Aided Statistical Attack for Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2020/1620}, year = {2020}, url = {https://eprint.iacr.org/2020/1620}, } @misc{cryptoeprint:2020:162, author = {Ignacio Cascudo and Jaron Skovsted Gundersen}, title = {A Secret-Sharing Based MPC Protocol for Boolean Circuits with Good Amortized Complexity}, howpublished = {Cryptology ePrint Archive, Report 2020/162}, year = {2020}, url = {https://eprint.iacr.org/2020/162}, } @misc{cryptoeprint:2020:163, author = {Akin Ünal}, title = {Impossibility Results for Lattice-Based Functional Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2020/163}, year = {2020}, url = {https://eprint.iacr.org/2020/163}, } @misc{cryptoeprint:2020:164, author = {Alex Bienstock and Allison Bishop and Eli Goldin and Garrison Grogan and Victor Lecomte}, title = {From discrete-log to lattices: maybe the real lessons were our broken schemes along the way?}, howpublished = {Cryptology ePrint Archive, Report 2020/164}, year = {2020}, url = {https://eprint.iacr.org/2020/164}, } @misc{cryptoeprint:2020:165, author = {Aron Gohr and Sven Jacob and Werner Schindler}, title = {Efficient Solutions of the CHES 2018 AES Challenge Using Deep Residual Neural Networks and Knowledge Distillation on Adversarial Examples}, howpublished = {Cryptology ePrint Archive, Report 2020/165}, year = {2020}, url = {https://eprint.iacr.org/2020/165}, } @misc{cryptoeprint:2020:166, author = {Stefan Dziembowski and Paweł Kędzior}, title = {Ethna: Channel Network with Dynamic Internal Payment Splitting}, howpublished = {Cryptology ePrint Archive, Report 2020/166}, year = {2020}, url = {https://eprint.iacr.org/2020/166}, } @misc{cryptoeprint:2020:167, author = {Jinhyun So and Basak Guler and A. Salman Avestimehr}, title = {Turbo-Aggregate: Breaking the Quadratic Aggregation Barrier in Secure Federated Learning}, howpublished = {Cryptology ePrint Archive, Report 2020/167}, year = {2020}, url = {https://eprint.iacr.org/2020/167}, } @misc{cryptoeprint:2020:168, author = {Xavier Bonnetain and Rémi Bricout and André Schrottenloher and Yixin Shen}, title = {Improved Classical and Quantum Algorithms for Subset-Sum}, howpublished = {Cryptology ePrint Archive, Report 2020/168}, year = {2020}, url = {https://eprint.iacr.org/2020/168}, } @misc{cryptoeprint:2020:169, author = {Prabhanjan Ananth and Abhishek Jain and Zhengzhong Jin}, title = {Multiparty Homomorphic Encryption (or: On Removing Setup in Multi-Key FHE)}, howpublished = {Cryptology ePrint Archive, Report 2020/169}, year = {2020}, url = {https://eprint.iacr.org/2020/169}, } @misc{cryptoeprint:2020:170, author = {Saikrishna Badrinarayanan and James Bartusek and Sanjam Garg and Daniel Masny and Pratyay Muhkerjee}, title = {Reusable Two-Round MPC from DDH}, howpublished = {Cryptology ePrint Archive, Report 2020/170}, year = {2020}, url = {https://eprint.iacr.org/2020/170}, } @misc{cryptoeprint:2020:171, author = {Martine De Cock and Rafael Dowsley and Anderson C. A. Nascimento and Davis Railsback and Jianwei Shen and Ariel Todoki}, title = {High Performance Logistic Regression for Privacy-Preserving Genome Analysis}, howpublished = {Cryptology ePrint Archive, Report 2020/171}, year = {2020}, url = {https://eprint.iacr.org/2020/171}, } @misc{cryptoeprint:2020:172, author = {Daan Leermakers and Boris Skoric}, title = {Qubit-based Unclonable Encryption with Key Recycling}, howpublished = {Cryptology ePrint Archive, Report 2020/172}, year = {2020}, url = {https://eprint.iacr.org/2020/172}, } @misc{cryptoeprint:2020:173, author = {Dimitris Karakostas and Aggelos Kiayias}, title = {Securing Proof-of-Work Ledgers via Checkpointing}, howpublished = {Cryptology ePrint Archive, Report 2020/173}, year = {2020}, url = {https://eprint.iacr.org/2020/173}, } @misc{cryptoeprint:2020:174, author = {Mohammad Zaheri and Adam O'Neill}, title = {On Selective-Opening Security of Deterministic Primitives}, howpublished = {Cryptology ePrint Archive, Report 2020/174}, year = {2020}, url = {https://eprint.iacr.org/2020/174}, } @misc{cryptoeprint:2020:175, author = {Stefan Dziembowski and Grzegorz Fabiański and Sebastian Faust and Siavash Riahi}, title = {Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma}, howpublished = {Cryptology ePrint Archive, Report 2020/175}, year = {2020}, url = {https://eprint.iacr.org/2020/175}, } @misc{cryptoeprint:2020:176, author = {Eugene Frimpong and Alexandros Bakas and Hai-Van Dang and Antonis Michalas}, title = {Do not tell me what I cannot do! (The constrained device shouted under the cover of the fog): Implementing Symmetric Searchable Encryption on Constrained Devices (Extended Version)}, howpublished = {Cryptology ePrint Archive, Report 2020/176}, year = {2020}, url = {https://eprint.iacr.org/2020/176}, } @misc{cryptoeprint:2020:177, author = {Christian Badertscher and Ueli Maurer and Christopher Portmann and Guilherme Rito}, title = {Revisiting (R)CCA Security and Replay Protection}, howpublished = {Cryptology ePrint Archive, Report 2020/177}, year = {2020}, url = {https://eprint.iacr.org/2020/177}, } @misc{cryptoeprint:2020:178, author = {Santosh Ghosh and Luis S Kida and Soham Jayesh Desai and Reshma Lal}, title = {A >100 Gbps Inline AES-GCM Hardware Engine and Protected DMA Transfers between SGX Enclave and FPGA Accelerator Device}, howpublished = {Cryptology ePrint Archive, Report 2020/178}, year = {2020}, url = {https://eprint.iacr.org/2020/178}, } @misc{cryptoeprint:2020:179, author = {Nathan Keller and Asaf Rosemarin}, title = {Mind the Middle Layer: The HADES Design Strategy Revisited}, howpublished = {Cryptology ePrint Archive, Report 2020/179}, year = {2020}, url = {https://eprint.iacr.org/2020/179}, } @misc{cryptoeprint:2020:180, author = {Prabhanjan Ananth and Abhishek Jain and ZhengZhong Jin and Giulio Malavolta}, title = {Multikey FHE in the Plain Model}, howpublished = {Cryptology ePrint Archive, Report 2020/180}, year = {2020}, url = {https://eprint.iacr.org/2020/180}, } @misc{cryptoeprint:2020:181, author = {Kohei Nakagawa and Hiroshi Onuki and Atsushi Takayasu and Tsuyoshi Takagi}, title = {$L_1$-Norm Ball for CSIDH: Optimal Strategy for Choosing the Secret Key Space}, howpublished = {Cryptology ePrint Archive, Report 2020/181}, year = {2020}, url = {https://eprint.iacr.org/2020/181}, } @misc{cryptoeprint:2020:182, author = {Maria Eichlseder and Lorenzo Grassi and Reinhard Lüftenegger and Morten Øygarden and Christian Rechberger and Markus Schofnegger and Qingju Wang}, title = {An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC}, howpublished = {Cryptology ePrint Archive, Report 2020/182}, year = {2020}, url = {https://eprint.iacr.org/2020/182}, } @misc{cryptoeprint:2020:183, author = {Ignacio Cascudo and Reto Schnyder}, title = {A Note on Secure Multiparty Computation via Higher Residue Symbol Techniques}, howpublished = {Cryptology ePrint Archive, Report 2020/183}, year = {2020}, url = {https://eprint.iacr.org/2020/183}, } @misc{cryptoeprint:2020:184, author = {Ariel Futoransky and Carlos Sarraute and Daniel Fernandez and Matias Travizano and Ariel Waissbein}, title = {Fair and Decentralized Exchange of Digital Goods}, howpublished = {Cryptology ePrint Archive, Report 2020/184}, year = {2020}, url = {https://eprint.iacr.org/2020/184}, } @misc{cryptoeprint:2020:185, author = {Gaëtan Cassiers and Benjamin Grégoire and Itamar Levi and François-Xavier Standaert}, title = {Hardware Private Circuits: From Trivial Composition to Full Verification}, howpublished = {Cryptology ePrint Archive, Report 2020/185}, year = {2020}, url = {https://eprint.iacr.org/2020/185}, } @misc{cryptoeprint:2020:186, author = {Dragos Ioan Ilie and Kostis Karantias and William J. Knottenbelt}, title = {Bitcoin Crypto–Bounties for Quantum Capable Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2020/186}, year = {2020}, url = {https://eprint.iacr.org/2020/186}, } @misc{cryptoeprint:2020:187, author = {Dragos Ioan Ilie and William J. Knottenbelt and Iain Stewart}, title = {Committing to Quantum Resistance, Better: A Speed–and–Risk–Configurable Defence for Bitcoin against a Fast Quantum Computing Attack}, howpublished = {Cryptology ePrint Archive, Report 2020/187}, year = {2020}, url = {https://eprint.iacr.org/2020/187}, } @misc{cryptoeprint:2020:188, author = {Tim Beyne and Anne Canteaut and Itai Dinur and Maria Eichlseder and Gregor Leander and Gaëtan Leurent and María Naya-Plasencia and Léo Perrin and Yu Sasaki and Yosuke Todo and Friedrich Wiemer}, title = {Out of Oddity -- New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems}, howpublished = {Cryptology ePrint Archive, Report 2020/188}, year = {2020}, url = {https://eprint.iacr.org/2020/188}, } @misc{cryptoeprint:2020:189, author = {Vipul Goyal and Yifan Song and Chenzhi Zhu}, title = {Guaranteed Output Delivery Comes Free in Honest Majority MPC}, howpublished = {Cryptology ePrint Archive, Report 2020/189}, year = {2020}, url = {https://eprint.iacr.org/2020/189}, } @misc{cryptoeprint:2020:190, author = {Assimakis Kattis and Joseph Bonneau}, title = {Proof of Necessary Work: Succinct State Verification with Fairness Guarantees}, howpublished = {Cryptology ePrint Archive, Report 2020/190}, year = {2020}, url = {https://eprint.iacr.org/2020/190}, } @misc{cryptoeprint:2020:191, author = {Zvika Brakerski and Vinod Vaikuntanathan}, title = {Lattice-Inspired Broadcast Encryption and Succinct Ciphertext-Policy ABE}, howpublished = {Cryptology ePrint Archive, Report 2020/191}, year = {2020}, url = {https://eprint.iacr.org/2020/191}, } @misc{cryptoeprint:2020:192, author = {Jinyong Chang and Bilin Shao and Yanyan Ji and Genqing Bian}, title = {Certificateless Homomorphic Signature Scheme for Network Coding}, howpublished = {Cryptology ePrint Archive, Report 2020/192}, year = {2020}, url = {https://eprint.iacr.org/2020/192}, } @misc{cryptoeprint:2020:193, author = {Benny Pinkas and Mike Rosulek and Ni Trieu and Avishay Yanai}, title = {PSI from PaXoS: Fast, Malicious Private Set Intersection}, howpublished = {Cryptology ePrint Archive, Report 2020/193}, year = {2020}, url = {https://eprint.iacr.org/2020/193}, } @misc{cryptoeprint:2020:194, author = {Junqing Gong and Hoeteck Wee}, title = {Adaptively Secure ABE for DFA from k-Lin and More}, howpublished = {Cryptology ePrint Archive, Report 2020/194}, year = {2020}, url = {https://eprint.iacr.org/2020/194}, } @misc{cryptoeprint:2020:195, author = {Jonathan Lee and Kirill Nikitin and Srinath Setty}, title = {Replicated state machines without replicated execution}, howpublished = {Cryptology ePrint Archive, Report 2020/195}, year = {2020}, url = {https://eprint.iacr.org/2020/195}, } @misc{cryptoeprint:2020:196, author = {Samuel Dobson and Steven D. Galbraith}, title = {Trustless Groups of Unknown Order with Hyperelliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2020/196}, year = {2020}, url = {https://eprint.iacr.org/2020/196}, } @misc{cryptoeprint:2020:197, author = {Jérémy Chotard and Edouard Dufour-Sans and Romain Gay and Duong Hieu Phan and David Pointcheval}, title = {Dynamic Decentralized Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/197}, year = {2020}, url = {https://eprint.iacr.org/2020/197}, } @misc{cryptoeprint:2020:198, author = {Shi Bai and Dipayan Das and Ryo Hiromasa and Miruna Rosca and Amin Sakzad and Damien Stehlé and Ron Steinfeld and Zhenfei Zhang}, title = {MPSign: A Signature from Small-Secret Middle-Product Learning with Errors}, howpublished = {Cryptology ePrint Archive, Report 2020/198}, year = {2020}, url = {https://eprint.iacr.org/2020/198}, } @misc{cryptoeprint:2020:199, author = {Seungkwang Lee and Myungchul Kim}, title = {Improvement on a Masked White-box Cryptographic Implementation}, howpublished = {Cryptology ePrint Archive, Report 2020/199}, year = {2020}, url = {https://eprint.iacr.org/2020/199}, } @misc{cryptoeprint:2020:200, author = {Christoph Dobraunig and Bart Mennink and Robert Primas}, title = {Exploring the Golden Mean Between Leakage and Fault Resilience and Practice}, howpublished = {Cryptology ePrint Archive, Report 2020/200}, year = {2020}, url = {https://eprint.iacr.org/2020/200}, } @misc{cryptoeprint:2020:201, author = {Yuntao Liu and Ankit Mondal and Abhishek Chakraborty and Michael Zuzak and Nina Jacobsen and Daniel Xing and Ankur Srivastava}, title = {A Survey on Neural Trojans}, howpublished = {Cryptology ePrint Archive, Report 2020/201}, year = {2020}, url = {https://eprint.iacr.org/2020/201}, } @misc{cryptoeprint:2020:202, author = {Yuntao Liu and Michael Zuzak and Yang Xie and Abhishek Chakraborty and Ankur Srivastava}, title = {Strong Anti-SAT: Secure and Effective Logic Locking}, howpublished = {Cryptology ePrint Archive, Report 2020/202}, year = {2020}, url = {https://eprint.iacr.org/2020/202}, } @misc{cryptoeprint:2020:203, author = {Thang Hoang and Jorge Guajardo and Attila A. Yavuz}, title = {MACAO: A Maliciously-Secure and Client-Efficient Active ORAM Framework}, howpublished = {Cryptology ePrint Archive, Report 2020/203}, year = {2020}, url = {https://eprint.iacr.org/2020/203}, } @misc{cryptoeprint:2020:204, author = {Chaya Ganesh and Bernardo Magri and Daniele Venturi}, title = {Cryptographic Reverse Firewalls for Interactive Proof Systems---or---Interactive Proofs on Untrusted Machines}, howpublished = {Cryptology ePrint Archive, Report 2020/204}, year = {2020}, url = {https://eprint.iacr.org/2020/204}, } @misc{cryptoeprint:2020:205, author = {Shlomi Dolev and Ziyu Wang}, title = {SodsBC: Stream of Distributed Secrets for Quantum-safe Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2020/205}, year = {2020}, url = {https://eprint.iacr.org/2020/205}, } @misc{cryptoeprint:2020:206, author = {Jean-Francois Biasse and Giacomo Micheli and Edoardo Persichetti and Paolo Santini}, title = {A Post-Quantum Non-Interactive Key-Exchange Protocol from Coding Theory}, howpublished = {Cryptology ePrint Archive, Report 2020/206}, year = {2020}, url = {https://eprint.iacr.org/2020/206}, } @misc{cryptoeprint:2020:207, author = {Carsten Baum and Bernardo David and Rafael Dowsley}, title = {A Framework for Universally Composable Publicly Verifiable Cryptographic Protocols}, howpublished = {Cryptology ePrint Archive, Report 2020/207}, year = {2020}, url = {https://eprint.iacr.org/2020/207}, } @misc{cryptoeprint:2020:208, author = {Gengran Hu and Lin You and Liqin Hu and Hui Wang}, title = {Random Integer Lattice Generation via HNF}, howpublished = {Cryptology ePrint Archive, Report 2020/208}, year = {2020}, url = {https://eprint.iacr.org/2020/208}, } @misc{cryptoeprint:2020:209, author = {Shweta Agrawal and Benoît Libert and Monosij Maitra and Radu Titiu}, title = {Adaptive Simulation Security for Inner Product Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/209}, year = {2020}, url = {https://eprint.iacr.org/2020/209}, } @misc{cryptoeprint:2020:210, author = {Shivam Bhasin and Jakub Breier and Xiaolu Hou and Dirmanto Jap and Romain Poussier and Siang Meng Sim}, title = {SITM: See-In-The-Middle--Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2020/210}, year = {2020}, url = {https://eprint.iacr.org/2020/210}, } @misc{cryptoeprint:2020:211, author = {Davide Bellizia and Olivier Bronchain and Gaëtan Cassiers and Vincent Grosso and Chun Guo and Charles Momin and Olivier Pereira and Thomas Peters and François-Xavier Standaert}, title = {Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography: A Practical Guide Through the Leakage-Resistance Jungle}, howpublished = {Cryptology ePrint Archive, Report 2020/211}, year = {2020}, url = {https://eprint.iacr.org/2020/211}, } @misc{cryptoeprint:2020:212, author = {Steve Thakur}, title = {Isogenies of certain abelian varieties over finite fields with p-ranks zero}, howpublished = {Cryptology ePrint Archive, Report 2020/212}, year = {2020}, url = {https://eprint.iacr.org/2020/212}, } @misc{cryptoeprint:2020:213, author = {Akinori Hosoyamada and Yu Sasaki}, title = {Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probability than Birthday Bound}, howpublished = {Cryptology ePrint Archive, Report 2020/213}, year = {2020}, url = {https://eprint.iacr.org/2020/213}, } @misc{cryptoeprint:2020:214, author = {Charlotte Bonte and Nigel P. Smart and Titouan Tanguy}, title = {Thresholdizing HashEdDSA: MPC to the Rescue}, howpublished = {Cryptology ePrint Archive, Report 2020/214}, year = {2020}, url = {https://eprint.iacr.org/2020/214}, } @misc{cryptoeprint:2020:215, author = {Megumi Ando and Anna Lysyanskaya}, title = {Cryptographic Shallots: A Formal Treatment of Repliable Onion Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/215}, year = {2020}, url = {https://eprint.iacr.org/2020/215}, } @misc{cryptoeprint:2020:216, author = {Sanjam Garg and Xiao Liang and Omkant Pandey and Ivan Visconti}, title = {Black-Box Constructions of Bounded-Concurrent Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2020/216}, year = {2020}, url = {https://eprint.iacr.org/2020/216}, } @misc{cryptoeprint:2020:217, author = {M. Sadegh Riazi and Seyed M. Chavoshian and Farinaz Koushanfar}, title = {SynFi: Automatic Synthetic Fingerprint Generation}, howpublished = {Cryptology ePrint Archive, Report 2020/217}, year = {2020}, url = {https://eprint.iacr.org/2020/217}, } @misc{cryptoeprint:2020:218, author = {Ehsan Aerabi and Milad Bohlouli and MohammadHasan Ahmadi Livany and Mahdi Fazeli and Athanasios Papadimitriou and David Hely}, title = {Design Space Exploration for Ultra-Low Energy and Secure IoT MCUs}, howpublished = {Cryptology ePrint Archive, Report 2020/218}, year = {2020}, url = {https://eprint.iacr.org/2020/218}, } @misc{cryptoeprint:2020:219, author = {Michele Ciampi and Luisa Siniscalchi and Hendrik Waldner}, title = {Multi-Client Functional Encryption for Separable Functions}, howpublished = {Cryptology ePrint Archive, Report 2020/219}, year = {2020}, url = {https://eprint.iacr.org/2020/219}, } @misc{cryptoeprint:2020:220, author = {Florian Tramèr and Dan Boneh and Kenneth G. Paterson}, title = {Remote Side-Channel Attacks on Anonymous Transactions}, howpublished = {Cryptology ePrint Archive, Report 2020/220}, year = {2020}, url = {https://eprint.iacr.org/2020/220}, } @misc{cryptoeprint:2020:221, author = {Fabrice Benhamouda and Huijia Lin}, title = {Multiparty Reusable Non-Interactive Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2020/221}, year = {2020}, url = {https://eprint.iacr.org/2020/221}, } @misc{cryptoeprint:2020:222, author = {Dan Boneh and Saba Eskandarian and Sam Kim and Maurice Shih}, title = {Improving Speed and Security in Updatable Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2020/222}, year = {2020}, url = {https://eprint.iacr.org/2020/222}, } @misc{cryptoeprint:2020:223, author = {Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, title = {Compact NIZKs from Standard Assumptions on Bilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2020/223}, year = {2020}, url = {https://eprint.iacr.org/2020/223}, } @misc{cryptoeprint:2020:224, author = {Mihir Bellare and Igors Stepanovs}, title = {Security under Message-Derived Keys: Signcryption in iMessage}, howpublished = {Cryptology ePrint Archive, Report 2020/224}, year = {2020}, url = {https://eprint.iacr.org/2020/224}, } @misc{cryptoeprint:2020:225, author = {Lior Rotem and Gil Segev and Ido Shahaf}, title = {Generic-Group Delay Functions Require Hidden-Order Groups}, howpublished = {Cryptology ePrint Archive, Report 2020/225}, year = {2020}, url = {https://eprint.iacr.org/2020/225}, } @misc{cryptoeprint:2020:226, author = {Meher Krishna Duggirala . and . Ravi Duggirala . and . Krishna Subba Rao Pulugurtha}, title = {Multivariate Polynomial and Exponential Mappings based Password Authentication Protocol}, howpublished = {Cryptology ePrint Archive, Report 2020/226}, year = {2020}, url = {https://eprint.iacr.org/2020/226}, } @misc{cryptoeprint:2020:227, author = {Yindong Chen, Limin Lin, Chuliang Wei}, title = {About the Tu-Deng Conjecture for $\w(t)$ Less Than or Equal to 10}, howpublished = {Cryptology ePrint Archive, Report 2020/227}, year = {2020}, url = {https://eprint.iacr.org/2020/227}, } @misc{cryptoeprint:2020:228, author = {Shweta Agrawal and Shota Yamada}, title = {Optimal Broadcast Encryption from Pairings and LWE}, howpublished = {Cryptology ePrint Archive, Report 2020/228}, year = {2020}, url = {https://eprint.iacr.org/2020/228}, } @misc{cryptoeprint:2020:229, author = {Itai Dinur}, title = {Tight Time-Space Lower Bounds for Finding Multiple Collision Pairs and Their Applications}, howpublished = {Cryptology ePrint Archive, Report 2020/229}, year = {2020}, url = {https://eprint.iacr.org/2020/229}, } @misc{cryptoeprint:2020:230, author = {Changmin Lee and Alexandre Wallet}, title = {Lattice analysis on MiNTRU problem}, howpublished = {Cryptology ePrint Archive, Report 2020/230}, year = {2020}, url = {https://eprint.iacr.org/2020/230}, } @misc{cryptoeprint:2020:231, author = {Junichi Tomida and Nuttapong Attrapadung}, title = {Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2020/231}, year = {2020}, url = {https://eprint.iacr.org/2020/231}, } @misc{cryptoeprint:2020:232, author = {Bertram Poettering and Paul Rösler}, title = {Combiners for AEAD}, howpublished = {Cryptology ePrint Archive, Report 2020/232}, year = {2020}, url = {https://eprint.iacr.org/2020/232}, } @misc{cryptoeprint:2020:233, author = {Sam Kim}, title = {Key-Homomorphic Pseudorandom Functions from LWE with a Small Modulus}, howpublished = {Cryptology ePrint Archive, Report 2020/233}, year = {2020}, url = {https://eprint.iacr.org/2020/233}, } @misc{cryptoeprint:2020:234, author = {Ruslan V. Skuratovskii and A. Р. Onufrieva and Aled Williams}, title = {Application of commutator subgroups of Sylow 2-subgroups of alternating group and Miller-Moreno groups to Key Exchange Protocol}, howpublished = {Cryptology ePrint Archive, Report 2020/234}, year = {2020}, url = {https://eprint.iacr.org/2020/234}, } @misc{cryptoeprint:2020:235, author = {Vipul Goyal and Abhishek Jain and Zhengzhong Jin and and Giulio Malavolta}, title = {Statistical Zaps and New Oblivious Transfer Protocols}, howpublished = {Cryptology ePrint Archive, Report 2020/235}, year = {2020}, url = {https://eprint.iacr.org/2020/235}, } @misc{cryptoeprint:2020:236, author = {Mridul Nandi}, title = {Mind the Composition: Birthday Bound Attacks on EWCDMD and SoKAC21}, howpublished = {Cryptology ePrint Archive, Report 2020/236}, year = {2020}, url = {https://eprint.iacr.org/2020/236}, } @misc{cryptoeprint:2020:237, author = {Céline Chevalier and Ehsan Ebrahimi and Quoc-Huy Vu}, title = {On the Security Notions for Encryption in a Quantum World}, howpublished = {Cryptology ePrint Archive, Report 2020/237}, year = {2020}, url = {https://eprint.iacr.org/2020/237}, } @misc{cryptoeprint:2020:238, author = {Andrew Hone}, title = {Efficient ECM factorization in parallel with the Lyness map}, howpublished = {Cryptology ePrint Archive, Report 2020/238}, year = {2020}, url = {https://eprint.iacr.org/2020/238}, } @misc{cryptoeprint:2020:239, author = {Edimar Veríssimo}, title = {Viktoria: A new Paradigm for Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2020/239}, year = {2020}, url = {https://eprint.iacr.org/2020/239}, } @misc{cryptoeprint:2020:240, author = {T-H. Hubert Chan and Kai-Min Chung and Wei-Kai Lin and Elaine Shi}, title = {MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture}, howpublished = {Cryptology ePrint Archive, Report 2020/240}, year = {2020}, url = {https://eprint.iacr.org/2020/240}, } @misc{cryptoeprint:2020:241, author = {Mihir Bellare and Hannah Davis and Felix Günther}, title = {Separate Your Domains: NIST PQC KEMs, Oracle Cloning and Read-Only Indifferentiability}, howpublished = {Cryptology ePrint Archive, Report 2020/241}, year = {2020}, url = {https://eprint.iacr.org/2020/241}, } @misc{cryptoeprint:2020:242, author = {Zhihao Zheng and Jiachen Shen and Zhenfu Cao}, title = {Practical and Secure Circular Range Search on Private Spatial Data}, howpublished = {Cryptology ePrint Archive, Report 2020/242}, year = {2020}, url = {https://eprint.iacr.org/2020/242}, } @misc{cryptoeprint:2020:243, author = {Benjamin Lipp}, title = {An Analysis of Hybrid Public Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/243}, year = {2020}, url = {https://eprint.iacr.org/2020/243}, } @misc{cryptoeprint:2020:244, author = {Andrea Basso and Péter Kutas and Simon-Philipp Merz and Christophe Petit and Charlotte Weitkämper}, title = {On Adaptive Attacks against Jao-Urbanik’s Isogeny-Based Protocol}, howpublished = {Cryptology ePrint Archive, Report 2020/244}, year = {2020}, url = {https://eprint.iacr.org/2020/244}, } @misc{cryptoeprint:2020:245, author = {Xiaopeng Zhao and Zhenfu Cao and Xiaolei Dong and Jun Shao and Zhusen Liu}, title = {New Assumptions and Efficient Cryptosystems from Higher-power Residue Symbols}, howpublished = {Cryptology ePrint Archive, Report 2020/245}, year = {2020}, url = {https://eprint.iacr.org/2020/245}, } @misc{cryptoeprint:2020:246, author = {Jing Tian and Jun Lin and Zhongfeng Wang}, title = {Ultra-Fast Modular Multiplication Implementation for Isogeny-Based Post-Quantum Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2020/246}, year = {2020}, url = {https://eprint.iacr.org/2020/246}, } @misc{cryptoeprint:2020:247, author = {Rishiraj Bhattacharyya and Mridul Nandi and Anik Raychaudhuri}, title = {Crooked Indifferentiability Revisited}, howpublished = {Cryptology ePrint Archive, Report 2020/247}, year = {2020}, url = {https://eprint.iacr.org/2020/247}, } @misc{cryptoeprint:2020:248, author = {Ittai Abraham and Benny Pinkas and Avishay Yanai}, title = {Blinder: MPC Based Scalable and Robust Anonymous Committed Broadcast}, howpublished = {Cryptology ePrint Archive, Report 2020/248}, year = {2020}, url = {https://eprint.iacr.org/2020/248}, } @misc{cryptoeprint:2020:249, author = {Ehsan Aerabi and Cyril Bresch and David Hély and Athanasios Papadimitriou and Mahdi Fazeli }, title = {CONFISCA : an SIMD-based CONcurrent FI and SCA countermeasure with switchable performance and security modes}, howpublished = {Cryptology ePrint Archive, Report 2020/249}, year = {2020}, url = {https://eprint.iacr.org/2020/249}, } @misc{cryptoeprint:2020:250, author = {Ehsan Aerabi and Athanasios Papadimitriou and David Hely }, title = {On a Side Channel and Fault Attack Concurrent Countermeasure Methodology for MCU-based Byte-sliced Cipher Implementations }, howpublished = {Cryptology ePrint Archive, Report 2020/250}, year = {2020}, url = {https://eprint.iacr.org/2020/250}, } @misc{cryptoeprint:2020:251, author = {Ivan Damgård and Nikolaj I. Schwartzbach}, title = {Communication Lower Bounds for Perfect Maliciously Secure MPC}, howpublished = {Cryptology ePrint Archive, Report 2020/251}, year = {2020}, url = {https://eprint.iacr.org/2020/251}, } @misc{cryptoeprint:2020:252, author = {Hamidreza Amini Khorasgani and Hemanta K. Maji and Hai H. Nguyen}, title = {Secure Non-interactive Simulation: Hardness & Feasibility}, howpublished = {Cryptology ePrint Archive, Report 2020/252}, year = {2020}, url = {https://eprint.iacr.org/2020/252}, } @misc{cryptoeprint:2020:253, author = {Hemanta K. Maji and Mingyuan Wang}, title = {Black-box use of One-way Functions is Useless for Optimal Fair Coin-Tossing}, howpublished = {Cryptology ePrint Archive, Report 2020/253}, year = {2020}, url = {https://eprint.iacr.org/2020/253}, } @misc{cryptoeprint:2020:254, author = {Sanjam Garg and Shafi Goldwasser and Prashant Nalini Vasudevan}, title = {Formalizing Data Deletion in the Context of the Right to be Forgotten}, howpublished = {Cryptology ePrint Archive, Report 2020/254}, year = {2020}, url = {https://eprint.iacr.org/2020/254}, } @misc{cryptoeprint:2020:255, author = {Takanori Machida and Dai Yamamoto and Yuki Unno and Hisashi Kojima}, title = {Novel Deception Techniques for Malware Detection on Industrial Control Systems}, howpublished = {Cryptology ePrint Archive, Report 2020/255}, year = {2020}, url = {https://eprint.iacr.org/2020/255}, } @misc{cryptoeprint:2020:256, author = {Alex Lombardi and Vinod Vaikuntanathan and Daniel Wichs}, title = {Statistical ZAPR Arguments from Bilinear Maps}, howpublished = {Cryptology ePrint Archive, Report 2020/256}, year = {2020}, url = {https://eprint.iacr.org/2020/256}, } @misc{cryptoeprint:2020:257, author = {Onur Gunlu and Rafael F. Schaefer and H. Vincent Poor}, title = {Biometric and Physical Identifiers with Correlated Noise for Controllable Private Authentication}, howpublished = {Cryptology ePrint Archive, Report 2020/257}, year = {2020}, url = {https://eprint.iacr.org/2020/257}, } @misc{cryptoeprint:2020:258, author = {Zvika Brakerski and Venkata Koppula and Tamer Mour}, title = {NIZK from LPN and Trapdoor Hash via Correlation Intractability for Approximable Relations}, howpublished = {Cryptology ePrint Archive, Report 2020/258}, year = {2020}, url = {https://eprint.iacr.org/2020/258}, } @misc{cryptoeprint:2020:259, author = {Divesh Aggarwal and Maciej Obremski and João Ribeiro and Mark Simkin and Luisa Siniscalchi}, title = {Computational and Information-Theoretic Two-Source (Non-Malleable) Extractors}, howpublished = {Cryptology ePrint Archive, Report 2020/259}, year = {2020}, url = {https://eprint.iacr.org/2020/259}, } @misc{cryptoeprint:2020:260, author = {Samuel Bouaziz-Ermann and Sébastien Canard and Gautier Eberhart and Guillaume Kaim and Adeline Roux-Langlois and Jacques Traoré}, title = {Lattice-based (Partially) Blind Signature without Restart}, howpublished = {Cryptology ePrint Archive, Report 2020/260}, year = {2020}, url = {https://eprint.iacr.org/2020/260}, } @misc{cryptoeprint:2020:261, author = {Matthieu Monteiro and Kumara Kahatapitiya and Hassan Jameel Asghar and Kanchana Thilakarathna and Thierry Rakotoarivelo and Dali Kaafar and Shujun Li and Ron Steinfeld and Josef Pieprzyk}, title = {Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices}, howpublished = {Cryptology ePrint Archive, Report 2020/261}, year = {2020}, url = {https://eprint.iacr.org/2020/261}, } @misc{cryptoeprint:2020:262, author = {Christopher Leonardi}, title = {A Note on the Ending Elliptic Curve in SIDH}, howpublished = {Cryptology ePrint Archive, Report 2020/262}, year = {2020}, url = {https://eprint.iacr.org/2020/262}, } @misc{cryptoeprint:2020:263, author = {Jihoon Kwon and Byeonghak Lee and Jooyoung Lee and and Dukjae Moon}, title = {FPL: White-Box Secure Block Cipher Using Parallel Table Look-Ups}, howpublished = {Cryptology ePrint Archive, Report 2020/263}, year = {2020}, url = {https://eprint.iacr.org/2020/263}, } @misc{cryptoeprint:2020:264, author = {Nicholas Mainardi and Alessandro Barenghi and Gerardo Pelosi}, title = {Plaintext Recovery Attacks against Linearly Decryptable Fully Homomorphic Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2020/264}, year = {2020}, url = {https://eprint.iacr.org/2020/264}, } @misc{cryptoeprint:2020:265, author = {Benoît Libert and Alain Passelègue and Hoeteck Wee and David J. Wu}, title = {New Constructions of Statistical NIZKs: Dual-Mode DV-NIZKs and More}, howpublished = {Cryptology ePrint Archive, Report 2020/265}, year = {2020}, url = {https://eprint.iacr.org/2020/265}, } @misc{cryptoeprint:2020:266, author = {Tommaso Gagliardoni and Juliane Krämer and Patrick Struck}, title = {Make Quantum Indistinguishability Great Again}, howpublished = {Cryptology ePrint Archive, Report 2020/266}, year = {2020}, url = {https://eprint.iacr.org/2020/266}, } @misc{cryptoeprint:2020:267, author = {Tim Gellersen and Okan Seker and Thomas Eisenbarth}, title = {Differential Power Analysis of the Picnic Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2020/267}, year = {2020}, url = {https://eprint.iacr.org/2020/267}, } @misc{cryptoeprint:2020:268, author = {Jose Maria Bermudo Mera and Angshuman Karmakar and Ingrid Verbauwhede}, title = {Time-memory trade-off in Toom-Cook multiplication: an application to module-lattice based cryptography}, howpublished = {Cryptology ePrint Archive, Report 2020/268}, year = {2020}, url = {https://eprint.iacr.org/2020/268}, } @misc{cryptoeprint:2020:269, author = {Mahimna Kelkar and Fan Zhang and Steven Goldfeder and Ari Juels}, title = {Order-Fairness for Byzantine Consensus}, howpublished = {Cryptology ePrint Archive, Report 2020/269}, year = {2020}, url = {https://eprint.iacr.org/2020/269}, } @misc{cryptoeprint:2020:270, author = {Yi-Fan Tseng and Zi-Yuan Liu and Raylin Tso}, title = {Practical Predicate Encryption for Inner Product}, howpublished = {Cryptology ePrint Archive, Report 2020/270}, year = {2020}, url = {https://eprint.iacr.org/2020/270}, } @misc{cryptoeprint:2020:271, author = {Marc Fischlin and Patrick Harasser and Christian Janson}, title = {Signatures from Sequential-OR Proofs}, howpublished = {Cryptology ePrint Archive, Report 2020/271}, year = {2020}, url = {https://eprint.iacr.org/2020/271}, } @misc{cryptoeprint:2020:272, author = {Keita Arimitsu and Kazuki Otsuka}, title = {Privacy-Preserving Fast and Exact Linear Equations Solver with Fully Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/272}, year = {2020}, url = {https://eprint.iacr.org/2020/272}, } @misc{cryptoeprint:2020:273, author = {Pierrick Méaux}, title = {On the Fast Algebraic Immunity of Threshold Functions}, howpublished = {Cryptology ePrint Archive, Report 2020/273}, year = {2020}, url = {https://eprint.iacr.org/2020/273}, } @misc{cryptoeprint:2020:274, author = {Seny Kamara and Tarik Moataz and Stan Zdonik and Zheguang Zhao}, title = {An Optimal Relational Database Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2020/274}, year = {2020}, url = {https://eprint.iacr.org/2020/274}, } @misc{cryptoeprint:2020:275, author = {Jannis Bossert and Eik List and Stefan Lucks and Sebastian Schmitz}, title = {Pholkos -- Efficient Large-state Tweakable Block Ciphers from the AES Round Function}, howpublished = {Cryptology ePrint Archive, Report 2020/275}, year = {2020}, url = {https://eprint.iacr.org/2020/275}, } @misc{cryptoeprint:2020:276, author = {Hamid Nejatollahi and Saransh Gupta and Mohsen Imani and Tajana Simunic Rosing and Rosario Cammarota and Nikil Dutt}, title = {CryptoPIM: In-memory Acceleration for Lattice-based Cryptographic Hardware}, howpublished = {Cryptology ePrint Archive, Report 2020/276}, year = {2020}, url = {https://eprint.iacr.org/2020/276}, } @misc{cryptoeprint:2020:277, author = {Juan Garay and Aggelos Kiayias and Nikos Leonardos}, title = {Full Analysis of Nakamoto Consensus in Bounded-Delay Networks}, howpublished = {Cryptology ePrint Archive, Report 2020/277}, year = {2020}, url = {https://eprint.iacr.org/2020/277}, } @misc{cryptoeprint:2020:278, author = {Ahmed Kosba and Dimitrios Papadopoulos and Charalampos Papamanthou and Dawn Song}, title = {MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs}, howpublished = {Cryptology ePrint Archive, Report 2020/278}, year = {2020}, url = {https://eprint.iacr.org/2020/278}, } @misc{cryptoeprint:2020:279, author = {Shashank Raghuraman and Leyla Nazhandali}, title = {Impact of System-on-Chip Integration of AEAD Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2020/279}, year = {2020}, url = {https://eprint.iacr.org/2020/279}, } @misc{cryptoeprint:2020:280, author = {Juliane Krämer and Patrick Struck}, title = {Leakage-Resilient Authenticated Encryption from Leakage-Resilient Pseudorandom Functions}, howpublished = {Cryptology ePrint Archive, Report 2020/280}, year = {2020}, url = {https://eprint.iacr.org/2020/280}, } @misc{cryptoeprint:2020:281, author = {Dusan Klinec Vashek Matyas}, title = {Privacy-friendly Monero transaction signing on a hardware wallet, extended version}, howpublished = {Cryptology ePrint Archive, Report 2020/281}, year = {2020}, url = {https://eprint.iacr.org/2020/281}, } @misc{cryptoeprint:2020:282, author = {Jelle Don and Serge Fehr and Christian Majenz}, title = {The Measure-and-Reprogram Technique 2.0: Multi-Round Fiat-Shamir and More}, howpublished = {Cryptology ePrint Archive, Report 2020/282}, year = {2020}, url = {https://eprint.iacr.org/2020/282}, } @misc{cryptoeprint:2020:283, author = {István András Seres and Omer Shlomovits and Pratyush Ranjan Tiwari}, title = {CryptoWills: How to Bequeath Cryptoassets}, howpublished = {Cryptology ePrint Archive, Report 2020/283}, year = {2020}, url = {https://eprint.iacr.org/2020/283}, } @misc{cryptoeprint:2020:284, author = {Evangelia Anna Markatou and Roberto Tamassia}, title = {Database Reconstruction Attacks in Two Dimensions}, howpublished = {Cryptology ePrint Archive, Report 2020/284}, year = {2020}, url = {https://eprint.iacr.org/2020/284}, } @misc{cryptoeprint:2020:285, author = {Yaobin Shen and Chun Guo and Lei Wang}, title = {Improved Security Bounds for Generalized Feistel Networks}, howpublished = {Cryptology ePrint Archive, Report 2020/285}, year = {2020}, url = {https://eprint.iacr.org/2020/285}, } @misc{cryptoeprint:2020:286, author = {Geoffroy Couteau and Dominik Hartmann}, title = {Shorter Non-Interactive Zero-Knowledge Arguments and ZAPs for Algebraic Languages}, howpublished = {Cryptology ePrint Archive, Report 2020/286}, year = {2020}, url = {https://eprint.iacr.org/2020/286}, } @misc{cryptoeprint:2020:287, author = {Sebastian Angel and Sampath Kannan and Zachary Ratliff}, title = {Private resource allocators and their applications}, howpublished = {Cryptology ePrint Archive, Report 2020/287}, year = {2020}, url = {https://eprint.iacr.org/2020/287}, } @misc{cryptoeprint:2020:288, author = {Yaobin Shen and Hailun Yan and Lei Wang and Xuejia Lai}, title = {Secure Key-Alternating Feistel Ciphers Without Key Schedule}, howpublished = {Cryptology ePrint Archive, Report 2020/288}, year = {2020}, url = {https://eprint.iacr.org/2020/288}, } @misc{cryptoeprint:2020:289, author = {Jonathan Lee}, title = {The security of Groups of Unknown Order based on Jacobians of Hyperelliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2020/289}, year = {2020}, url = {https://eprint.iacr.org/2020/289}, } @misc{cryptoeprint:2020:290, author = {Reham Almukhlifi and Poorvi Vora}, title = {Linear Cryptanalysis of Reduced-Round SIMON Using Super Rounds}, howpublished = {Cryptology ePrint Archive, Report 2020/290}, year = {2020}, url = {https://eprint.iacr.org/2020/290}, } @misc{cryptoeprint:2020:291, author = {Myrto Arapinis and Mahshid Delavar and Mina Doosti and Elham Kashefi}, title = {Unforgeability in the quantum world}, howpublished = {Cryptology ePrint Archive, Report 2020/291}, year = {2020}, url = {https://eprint.iacr.org/2020/291}, } @misc{cryptoeprint:2020:292, author = {Dana Dachman-Soled and Léo Ducas and Huijing Gong and Mélissa Rossi}, title = {LWE with Side Information: Attacks and Concrete Security Estimation}, howpublished = {Cryptology ePrint Archive, Report 2020/292}, year = {2020}, url = {https://eprint.iacr.org/2020/292}, } @misc{cryptoeprint:2020:293, author = {Benjamin E. Diamond}, title = {"Many-out-of-Many" Proofs with Applications to Anonymous Zether}, howpublished = {Cryptology ePrint Archive, Report 2020/293}, year = {2020}, url = {https://eprint.iacr.org/2020/293}, } @misc{cryptoeprint:2020:294, author = {Olivier Blazy and Patrick Towa and Damien Vergnaud}, title = {Public-Key Generation with Verifiable Randomness}, howpublished = {Cryptology ePrint Archive, Report 2020/294}, year = {2020}, url = {https://eprint.iacr.org/2020/294}, } @misc{cryptoeprint:2020:295, author = {Lilya Budaghyan and Marco Calderini and Claude Carlet and Robert Coulter and Irene Villa}, title = {Generalized Isotopic Shift Construction for APN Functions}, howpublished = {Cryptology ePrint Archive, Report 2020/295}, year = {2020}, url = {https://eprint.iacr.org/2020/295}, } @misc{cryptoeprint:2020:296, author = {Akshima and David Cash and Francesca Falzon and Adam Rivkin and Jesse Stern}, title = {Multidimensional Database Reconstruction from Range Query Access Patterns}, howpublished = {Cryptology ePrint Archive, Report 2020/296}, year = {2020}, url = {https://eprint.iacr.org/2020/296}, } @misc{cryptoeprint:2020:297, author = {Koen de Boer and Léo Ducas and Alice Pellet-Mary and Benjamin Wesolowski}, title = {Random Self-reducibility of Ideal-SVP via Arakelov Random Walks}, howpublished = {Cryptology ePrint Archive, Report 2020/297}, year = {2020}, url = {https://eprint.iacr.org/2020/297}, } @misc{cryptoeprint:2020:298, author = {Nir Drucker and Shay Gueron and Dusan Kostic}, title = {Fast polynomial inversion for post quantum QC-MDPC cryptography}, howpublished = {Cryptology ePrint Archive, Report 2020/298}, year = {2020}, url = {https://eprint.iacr.org/2020/298}, } @misc{cryptoeprint:2020:299, author = {Manuel M. T. Chakravarty and Sandro Coretti and Matthias Fitzi and Peter Gazi and Philipp Kant and Aggelos Kiayias and Alexander Russell}, title = {Hydra: Fast Isomorphic State Channels}, howpublished = {Cryptology ePrint Archive, Report 2020/299}, year = {2020}, url = {https://eprint.iacr.org/2020/299}, } @misc{cryptoeprint:2020:300, author = {Yehuda Lindell}, title = {Secure Multiparty Computation (MPC)}, howpublished = {Cryptology ePrint Archive, Report 2020/300}, year = {2020}, url = {https://eprint.iacr.org/2020/300}, } @misc{cryptoeprint:2020:301, author = {Thomas Kaeding}, title = {MadHatter: A toy cipher that conceals two plaintexts in the same ciphertext}, howpublished = {Cryptology ePrint Archive, Report 2020/301}, year = {2020}, url = {https://eprint.iacr.org/2020/301}, } @misc{cryptoeprint:2020:302, author = {Thomas Kaeding}, title = {Slippery hill-climbing technique for ciphertext-only cryptanalysis of periodic polyalphabetic substitution ciphers}, howpublished = {Cryptology ePrint Archive, Report 2020/302}, year = {2020}, url = {https://eprint.iacr.org/2020/302}, } @misc{cryptoeprint:2020:303, author = {Sergei Tikhomirov and Pedro Moreno-Sanchez and Matteo Maffei}, title = {A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network}, howpublished = {Cryptology ePrint Archive, Report 2020/303}, year = {2020}, url = {https://eprint.iacr.org/2020/303}, } @misc{cryptoeprint:2020:304, author = {Christian Mouchet and Juan Troncoso-Pastoriza and Jean-Pierre Hubaux}, title = {Multiparty Homomorphic Encryption: From Theory to Practice}, howpublished = {Cryptology ePrint Archive, Report 2020/304}, year = {2020}, url = {https://eprint.iacr.org/2020/304}, } @misc{cryptoeprint:2020:305, author = {Shigeo Tsujii and Toshiaki Saisho and Masao Yamasawa and Masahito Gotaishi and Kou Shikata and Koji Sasaki and Nobuharu Suzuki and Masaki Hashiyada}, title = {3-Layer Public Key Cryptosystem with Short Tandem Repeat DNA}, howpublished = {Cryptology ePrint Archive, Report 2020/305}, year = {2020}, url = {https://eprint.iacr.org/2020/305}, } @misc{cryptoeprint:2020:306, author = {Sayandeep Saha and Manaar Alam and Arnab Bag and Debdeep Mukhopadhyay and Pallab Dasgupta}, title = {Leakage Assessment in Fault Attacks: A Deep Learning Perspective}, howpublished = {Cryptology ePrint Archive, Report 2020/306}, year = {2020}, url = {https://eprint.iacr.org/2020/306}, } @misc{cryptoeprint:2020:307, author = {Claude Carlet}, title = {Handling vectorial functions by means of their graph indicators}, howpublished = {Cryptology ePrint Archive, Report 2020/307}, year = {2020}, url = {https://eprint.iacr.org/2020/307}, } @misc{cryptoeprint:2020:308, author = {Kevin Bürstinghaus-Steinbach and Christoph Krauß and Ruben Niederhagen and Michael Schneider}, title = {Post-Quantum TLS on Embedded Systems}, howpublished = {Cryptology ePrint Archive, Report 2020/308}, year = {2020}, url = {https://eprint.iacr.org/2020/308}, } @misc{cryptoeprint:2020:309, author = {Patrick Derbez and Paul Huynh and Virginie Lallemand and María Naya-Plasencia and Léo Perrin and André Schrottenloher}, title = {Cryptanalysis Results on Spook}, howpublished = {Cryptology ePrint Archive, Report 2020/309}, year = {2020}, url = {https://eprint.iacr.org/2020/309}, } @misc{cryptoeprint:2020:310, author = {Gabriel Destouet and Cécile Dumas and Anne Frassati and Valérie Perrier}, title = {Wavelet Scattering Transform and Ensemble Methods for Side-Channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2020/310}, year = {2020}, url = {https://eprint.iacr.org/2020/310}, } @misc{cryptoeprint:2020:311, author = {Tianjun Ma and Haixia Xu and Peili Li}, title = {A Blockchain Traceable Scheme with Oversight Function}, howpublished = {Cryptology ePrint Archive, Report 2020/311}, year = {2020}, url = {https://eprint.iacr.org/2020/311}, } @misc{cryptoeprint:2020:312, author = {Sarang Noether}, title = {Triptych-2: efficient proofs for confidential transactions}, howpublished = {Cryptology ePrint Archive, Report 2020/312}, year = {2020}, url = {https://eprint.iacr.org/2020/312}, } @misc{cryptoeprint:2020:313, author = {Victor Shoup}, title = {Security analysis of SPAKE2+}, howpublished = {Cryptology ePrint Archive, Report 2020/313}, year = {2020}, url = {https://eprint.iacr.org/2020/313}, } @misc{cryptoeprint:2020:314, author = {Shigeo Tsujii and Ryo Fujita and Masahito Gotaishi}, title = {Proposal of Multivariate Public Key Cryptosystem Based on Modulus of Numerous Prime Numbers and CRT with Security of IND-CPA}, howpublished = {Cryptology ePrint Archive, Report 2020/314}, year = {2020}, url = {https://eprint.iacr.org/2020/314}, } @misc{cryptoeprint:2020:315, author = {Ariel Gabizon and Zachary J. Williamson}, title = {A simplified polynomial protocol for lookup tables}, howpublished = {Cryptology ePrint Archive, Report 2020/315}, year = {2020}, url = {https://eprint.iacr.org/2020/315}, } @misc{cryptoeprint:2020:316, author = {Rishab Goyal and Sam Kim and Brent Waters and David J. Wu}, title = {Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions}, howpublished = {Cryptology ePrint Archive, Report 2020/316}, year = {2020}, url = {https://eprint.iacr.org/2020/316}, } @misc{cryptoeprint:2020:317, author = {Archisman Ghosh and Debayan Das and Shreyas Sen}, title = {Physical Time-Varying Transfer Functions as Generic Low-Overhead Power-SCA Countermeasure}, howpublished = {Cryptology ePrint Archive, Report 2020/317}, year = {2020}, url = {https://eprint.iacr.org/2020/317}, } @misc{cryptoeprint:2020:318, author = {Huijia Lin and Ji Luo}, title = {Compact Adaptively Secure ABE from k-Lin: Beyond NC1 and towards NL}, howpublished = {Cryptology ePrint Archive, Report 2020/318}, year = {2020}, url = {https://eprint.iacr.org/2020/318}, } @misc{cryptoeprint:2020:319, author = {Hayim Shaul and Dan Feldman and Daniela Rus}, title = {Secure k-ish nearest neighbors classifier}, howpublished = {Cryptology ePrint Archive, Report 2020/319}, year = {2020}, url = {https://eprint.iacr.org/2020/319}, } @misc{cryptoeprint:2020:320, author = {Michel Abdalla and Manuel Barbosa and Tatiana Bradley and Stanislaw Jarecki and Jonathan Katz and Jiayu Xu }, title = {Universally Composable Relaxed Password Authenticated Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2020/320}, year = {2020}, url = {https://eprint.iacr.org/2020/320}, } @misc{cryptoeprint:2020:321, author = {Jose Maria Bermudo Mera and Furkan Turan and Angshuman Karmakar and Sujoy Sinha Roy and Ingrid Verbauwhede}, title = {Compact domain-specific co-processor for accelerating module lattice-based key encapsulation mechanism}, howpublished = {Cryptology ePrint Archive, Report 2020/321}, year = {2020}, url = {https://eprint.iacr.org/2020/321}, } @misc{cryptoeprint:2020:322, author = {Andrew Loveless and Ronald Dreslinski and Baris Kasikci}, title = {Optimal and Error-Free Multi-Valued Byzantine Consensus Through Parallel Execution}, howpublished = {Cryptology ePrint Archive, Report 2020/322}, year = {2020}, url = {https://eprint.iacr.org/2020/322}, } @misc{cryptoeprint:2020:323, author = {Yibin Xu and Yangyu Huang and Jianhua Shao and George Theodorakopoulos}, title = {A Flexible n/2 Adversary Node Resistant and Halting Recoverable Blockchain Sharding Protocol}, howpublished = {Cryptology ePrint Archive, Report 2020/323}, year = {2020}, url = {https://eprint.iacr.org/2020/323}, } @misc{cryptoeprint:2020:324, author = {Bicky Shakya and Xiaolin Xu and Mark Tehranipoor and Domenic Forte}, title = {Defeating CAS-Unlock}, howpublished = {Cryptology ePrint Archive, Report 2020/324}, year = {2020}, url = {https://eprint.iacr.org/2020/324}, } @misc{cryptoeprint:2020:325, author = {Robert Muth and Florian Tschorsch}, title = {SmartDHX: Diffie-Hellman Key Exchange with Smart Contracts}, howpublished = {Cryptology ePrint Archive, Report 2020/325}, year = {2020}, url = {https://eprint.iacr.org/2020/325}, } @misc{cryptoeprint:2020:326, author = {John M. Schanck}, title = {An upper bound on the decryption failure rate of static-key NewHope}, howpublished = {Cryptology ePrint Archive, Report 2020/326}, year = {2020}, url = {https://eprint.iacr.org/2020/326}, } @misc{cryptoeprint:2020:327, author = {Anita John and Rohit Lakra and Jimmy Jose}, title = {On the design of stream ciphers with Cellular Automata having radius = 2}, howpublished = {Cryptology ePrint Archive, Report 2020/327}, year = {2020}, url = {https://eprint.iacr.org/2020/327}, } @misc{cryptoeprint:2020:328, author = {Simon Holmgaard Kamp and Bernardo Magri and Christian Matt and Jesper Buus Nielsen and Søren Eller Thomsen and Daniel Tschudi}, title = {Leveraging Weight Functions for Optimistic Responsiveness in Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2020/328}, year = {2020}, url = {https://eprint.iacr.org/2020/328}, } @misc{cryptoeprint:2020:329, author = {Gabrielle De Micheli and Pierrick Gaudry and Cécile Pierrot}, title = {Asymptotic complexities of discrete logarithm algorithms in pairing-relevant finite fields}, howpublished = {Cryptology ePrint Archive, Report 2020/329}, year = {2020}, url = {https://eprint.iacr.org/2020/329}, } @misc{cryptoeprint:2020:330, author = {Gil Segev and Ido Shahaf}, title = {Hardness vs. (Very Little) Structure in Cryptography: A Multi-Prover Interactive Proofs Perspective}, howpublished = {Cryptology ePrint Archive, Report 2020/330}, year = {2020}, url = {https://eprint.iacr.org/2020/330}, } @misc{cryptoeprint:2020:331, author = {Sergey Agievich}, title = {The CTR mode with encrypted nonces and its extension to AE}, howpublished = {Cryptology ePrint Archive, Report 2020/331}, year = {2020}, url = {https://eprint.iacr.org/2020/331}, } @misc{cryptoeprint:2020:332, author = {Vidal Attias and Luigi Vigneri and Vassil Dimitrov}, title = {Implementation Study of Two Verifiable DelayFunctions}, howpublished = {Cryptology ePrint Archive, Report 2020/332}, year = {2020}, url = {https://eprint.iacr.org/2020/332}, } @misc{cryptoeprint:2020:333, author = {Wulu Li and Yongcan Wang and Lei Chen and Xin Lai and Xiao Zhang and Jiajun Xin}, title = {A Simpler and Modular Construction of Linkable Ring Signature}, howpublished = {Cryptology ePrint Archive, Report 2020/333}, year = {2020}, url = {https://eprint.iacr.org/2020/333}, } @misc{cryptoeprint:2020:334, author = {Christof Beierle and Gregor Leander}, title = {4-Uniform Permutations with Null Nonlinearity}, howpublished = {Cryptology ePrint Archive, Report 2020/334}, year = {2020}, url = {https://eprint.iacr.org/2020/334}, } @misc{cryptoeprint:2020:335, author = {Yibin Xu and Yangyu Huang}, title = {An n/2 byzantine node tolerated blockchain sharding approach}, howpublished = {Cryptology ePrint Archive, Report 2020/335}, year = {2020}, url = {https://eprint.iacr.org/2020/335}, } @misc{cryptoeprint:2020:336, author = {Santosh Ghosh and Michael Kounavis and Sergej Deutsch}, title = {Gimli Encryption in 715.9 psec}, howpublished = {Cryptology ePrint Archive, Report 2020/336}, year = {2020}, url = {https://eprint.iacr.org/2020/336}, } @misc{cryptoeprint:2020:337, author = {Nicholas Genise and Daniele Micciancio and Chris Peikert and Michael Walter}, title = {Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2020/337}, year = {2020}, url = {https://eprint.iacr.org/2020/337}, } @misc{cryptoeprint:2020:338, author = {Daniel Escudero and Satrajit Ghosh and Marcel Keller and Rahul Rachuri and Peter Scholl}, title = {Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits}, howpublished = {Cryptology ePrint Archive, Report 2020/338}, year = {2020}, url = {https://eprint.iacr.org/2020/338}, } @misc{cryptoeprint:2020:339, author = {George Teseleanu}, title = {Cracking Matrix Modes of Operation with Goodness-of-Fit Statistics}, howpublished = {Cryptology ePrint Archive, Report 2020/339}, year = {2020}, url = {https://eprint.iacr.org/2020/339}, } @misc{cryptoeprint:2020:340, author = {Onur Gunlu and Efe Bozkir and Wolfgang Fuhl and Rafael F. Schaefer and Enkelejda Kasneci}, title = {Differential Privacy for Eye Tracking with Temporal Correlations}, howpublished = {Cryptology ePrint Archive, Report 2020/340}, year = {2020}, url = {https://eprint.iacr.org/2020/340}, } @misc{cryptoeprint:2020:341, author = {Daniel J. Bernstein and Luca De Feo and Antonin Leroux and Benjamin Smith}, title = {Faster computation of isogenies of large prime degree}, howpublished = {Cryptology ePrint Archive, Report 2020/341}, year = {2020}, url = {https://eprint.iacr.org/2020/341}, } @misc{cryptoeprint:2020:342, author = {Estuardo Alpirez Bock and Alexander Treff}, title = {Security Assessment of White-Box Design Submissions of the CHES 2017 CTF Challenge}, howpublished = {Cryptology ePrint Archive, Report 2020/342}, year = {2020}, url = {https://eprint.iacr.org/2020/342}, } @misc{cryptoeprint:2020:343, author = {Hiro Midas}, title = {BSC: A Bitcoin Smart Contract Implementation}, howpublished = {Cryptology ePrint Archive, Report 2020/343}, year = {2020}, url = {https://eprint.iacr.org/2020/343}, } @misc{cryptoeprint:2020:344, author = {Yibin Xu and Yangyu Huang and Jianhua Shao}, title = {Anchoring the Value of Cryptocurrency }, howpublished = {Cryptology ePrint Archive, Report 2020/344}, year = {2020}, url = {https://eprint.iacr.org/2020/344}, } @misc{cryptoeprint:2020:345, author = {Fengrong Zhangand Nastja Cepak and Enes Pasalicand Yongzhuang Wei}, title = {Bent functions stemming from Maiorana-McFarland class being provably outside its completed version}, howpublished = {Cryptology ePrint Archive, Report 2020/345}, year = {2020}, url = {https://eprint.iacr.org/2020/345}, } @misc{cryptoeprint:2020:346, author = {Fukang Liu and Takanori Isobe and Willi Meier and Zhonghao Yang}, title = {Algebraic Attacks on Round-Reduced Keccak/Xoodoo}, howpublished = {Cryptology ePrint Archive, Report 2020/346}, year = {2020}, url = {https://eprint.iacr.org/2020/346}, } @misc{cryptoeprint:2020:347, author = {Hongda Li and Peifang Ni and Dongxue Pan}, title = {Some Low Round Zero Knowledge Protocols}, howpublished = {Cryptology ePrint Archive, Report 2020/347}, year = {2020}, url = {https://eprint.iacr.org/2020/347}, } @misc{cryptoeprint:2020:348, author = {Steve Thakur}, title = {Constructing hidden order groups using genus three Jacobians}, howpublished = {Cryptology ePrint Archive, Report 2020/348}, year = {2020}, url = {https://eprint.iacr.org/2020/348}, } @misc{cryptoeprint:2020:349, author = {Siang Meng Sim}, title = {Differential Power Analysis on (Non)-Linear Feedback Shift Registers}, howpublished = {Cryptology ePrint Archive, Report 2020/349}, year = {2020}, url = {https://eprint.iacr.org/2020/349}, } @misc{cryptoeprint:2020:350, author = {Murilo Coutinho and T. C. Souza Neto}, title = {New Multi-bit Differentials to Improve Attacks Against ChaCha}, howpublished = {Cryptology ePrint Archive, Report 2020/350}, year = {2020}, url = {https://eprint.iacr.org/2020/350}, } @misc{cryptoeprint:2020:351, author = {Youssef El Housni and Aurore Guillevic}, title = {Optimized and secure pairing-friendly elliptic curves suitable for one layer proof composition}, howpublished = {Cryptology ePrint Archive, Report 2020/351}, year = {2020}, url = {https://eprint.iacr.org/2020/351}, } @misc{cryptoeprint:2020:352, author = {Joseph Bonneau and Izaak Meckler and Vanishree Rao and Evan Shapiro}, title = {Coda: Decentralized Cryptocurrency at Scale}, howpublished = {Cryptology ePrint Archive, Report 2020/352}, year = {2020}, url = {https://eprint.iacr.org/2020/352}, } @misc{cryptoeprint:2020:353, author = {Robert A. Threlfall}, title = {A Probabilistic Public Key Encryption Scheme Based on Quartic Reciprocity (Draft V1.1)}, howpublished = {Cryptology ePrint Archive, Report 2020/353}, year = {2020}, url = {https://eprint.iacr.org/2020/353}, } @misc{cryptoeprint:2020:354, author = {Rajitha Ranasinghe and Pabasara Athukorala}, title = {A Generalization of the ElGamal public-key cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2020/354}, year = {2020}, url = {https://eprint.iacr.org/2020/354}, } @misc{cryptoeprint:2020:355, author = {Benjamin Terner}, title = {Permissionless Consensus in the Resource Model}, howpublished = {Cryptology ePrint Archive, Report 2020/355}, year = {2020}, url = {https://eprint.iacr.org/2020/355}, } @misc{cryptoeprint:2020:356, author = {Martin Hirt and Marta Mularczyk}, title = {Efficient MPC with a Mixed Adversary}, howpublished = {Cryptology ePrint Archive, Report 2020/356}, year = {2020}, url = {https://eprint.iacr.org/2020/356}, } @misc{cryptoeprint:2020:357, author = {George Teseleanu}, title = {Quasigroups and Substitution Permutation Networks: A Failed Experiment}, howpublished = {Cryptology ePrint Archive, Report 2020/357}, year = {2020}, url = {https://eprint.iacr.org/2020/357}, } @misc{cryptoeprint:2020:358, author = {Sankhanil Dey and Amlan Chakrabarti and Ranjan Ghosh}, title = {Division Algorithm to search for monic irreducible polynomials over extended Galois Field GF(p^q).}, howpublished = {Cryptology ePrint Archive, Report 2020/358}, year = {2020}, url = {https://eprint.iacr.org/2020/358}, } @misc{cryptoeprint:2020:359, author = {Sankhanil Dey and Amlan Chakrabarti and Ranjan Ghosh}, title = {4-bit Boolean functions in generation and cryptanalysis of secure 4-bit crypto S-boxes.}, howpublished = {Cryptology ePrint Archive, Report 2020/359}, year = {2020}, url = {https://eprint.iacr.org/2020/359}, } @misc{cryptoeprint:2020:360, author = {Sankhanil Dey and Amlan Chakrabarti and Ranjan Ghosh}, title = {Composite Algorithm The New Algorithm to Search for Monic Irreducible Polynomials over Extended Galois Fields}, howpublished = {Cryptology ePrint Archive, Report 2020/360}, year = {2020}, url = {https://eprint.iacr.org/2020/360}, } @misc{cryptoeprint:2020:361, author = {Reza Azarderakhsh and David Jao and Brian Koziel and Jason T. LeGrow and Vladimir Soukharev and Oleg Taraskin}, title = {How Not to Create an Isogeny-Based PAKE}, howpublished = {Cryptology ePrint Archive, Report 2020/361}, year = {2020}, url = {https://eprint.iacr.org/2020/361}, } @misc{cryptoeprint:2020:362, author = {Yongge Wang}, title = {Another Look at CBC Casper Consensus Protocol}, howpublished = {Cryptology ePrint Archive, Report 2020/362}, year = {2020}, url = {https://eprint.iacr.org/2020/362}, } @misc{cryptoeprint:2020:363, author = {Qianhong Wan and Longjiang Qu and Chao Li}, title = {On equivalence between known polynomial APN functions and power APN functions}, howpublished = {Cryptology ePrint Archive, Report 2020/363}, year = {2020}, url = {https://eprint.iacr.org/2020/363}, } @misc{cryptoeprint:2020:364, author = {Behzad Abdolmaleki and Daniel Slamanig}, title = {Unbounded Simulation-Sound Subversion Resistant Quasi-Adaptive NIZK Proofs and Applications to Modular zk-SNARKs}, howpublished = {Cryptology ePrint Archive, Report 2020/364}, year = {2020}, url = {https://eprint.iacr.org/2020/364}, } @misc{cryptoeprint:2020:365, author = {Sankhanil Dey and Amlan Chakrabarti and Ranjan Ghosh}, title = {A New Algorithm to Find Monic Irreducible Polynomials over Extended Galois field GF prime p and extension q using Positional Arithmetic}, howpublished = {Cryptology ePrint Archive, Report 2020/365}, year = {2020}, url = {https://eprint.iacr.org/2020/365}, } @misc{cryptoeprint:2020:366, author = {Hangwei Lu and Dhwani Mehta and Olivia Paradis and Navid Asadizanjani and Mark Tehranipoor and Damon L. Woodard}, title = {FICS-PCB: A Multi-Modal Image Dataset for Automated Printed Circuit Board Visual Inspection}, howpublished = {Cryptology ePrint Archive, Report 2020/366}, year = {2020}, url = {https://eprint.iacr.org/2020/366}, } @misc{cryptoeprint:2020:367, author = {Marcel Tiepelt and Jan-Pieter D'Anvers}, title = {Exploiting Decryption Failures in Mersenne Number Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2020/367}, year = {2020}, url = {https://eprint.iacr.org/2020/367}, } @misc{cryptoeprint:2020:368, author = {Dorian Amiet and Andreas Curiger and Lukas Leuenberger and Paul Zbinden}, title = {Defeating NewHope with a Single Trace}, howpublished = {Cryptology ePrint Archive, Report 2020/368}, year = {2020}, url = {https://eprint.iacr.org/2020/368}, } @misc{cryptoeprint:2020:369, author = {David Knichel and Thorben Moos and Amir Moradi}, title = {The Risk of Outsourcing: Hidden SCA Trojans in Third-Party IP-Cores Threaten Cryptographic ICs}, howpublished = {Cryptology ePrint Archive, Report 2020/369}, year = {2020}, url = {https://eprint.iacr.org/2020/369}, } @misc{cryptoeprint:2020:370, author = {Megan Chen and Ran Cohen and Jack Doerner and Yashvanth Kondi and Eysa Lee and Schuyler Rosefield and abhi shelat}, title = {Multiparty Generation of an RSA Modulus}, howpublished = {Cryptology ePrint Archive, Report 2020/370}, year = {2020}, url = {https://eprint.iacr.org/2020/370}, } @misc{cryptoeprint:2020:371, author = {Matthias J. Kannwischer and Peter Pessl and Robert Primas}, title = {Single-Trace Attacks on Keccak}, howpublished = {Cryptology ePrint Archive, Report 2020/371}, year = {2020}, url = {https://eprint.iacr.org/2020/371}, } @misc{cryptoeprint:2020:372, author = {Claude Carlet}, title = {Graph indicators of vectorial functions and bounds on the algebraic degree of composite functions}, howpublished = {Cryptology ePrint Archive, Report 2020/372}, year = {2020}, url = {https://eprint.iacr.org/2020/372}, } @misc{cryptoeprint:2020:373, author = {Huanyu Wang and Elena Dubrova}, title = {Tandem Deep Learning Side-Channel Attack Against FPGA Implementation of AES}, howpublished = {Cryptology ePrint Archive, Report 2020/373}, year = {2020}, url = {https://eprint.iacr.org/2020/373}, } @misc{cryptoeprint:2020:374, author = {Megan Chen and Carmit Hazay and Yuval Ishai and Yuriy Kashnikov and Daniele Micciancio and Tarik Riviere and abhi shelat and Muthu Venkitasubramaniam and Ruihan Wang}, title = {Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority}, howpublished = {Cryptology ePrint Archive, Report 2020/374}, year = {2020}, url = {https://eprint.iacr.org/2020/374}, } @misc{cryptoeprint:2020:375, author = {Leonie Reichert and Samuel Brack and Björn Scheuermann}, title = {Privacy-Preserving Contact Tracing of COVID-19 Patients}, howpublished = {Cryptology ePrint Archive, Report 2020/375}, year = {2020}, url = {https://eprint.iacr.org/2020/375}, } @misc{cryptoeprint:2020:376, author = {Sarah Bordage and Julien Lavauzelle}, title = {On the privacy of a code-based single-server computational PIR scheme}, howpublished = {Cryptology ePrint Archive, Report 2020/376}, year = {2020}, url = {https://eprint.iacr.org/2020/376}, } @misc{cryptoeprint:2020:377, author = {Samuel Dittmer and Rafail Ostrovsky}, title = {Oblivious tight compaction in O(n) time with smaller constant}, howpublished = {Cryptology ePrint Archive, Report 2020/377}, year = {2020}, url = {https://eprint.iacr.org/2020/377}, } @misc{cryptoeprint:2020:378, author = {Kaushik Nath and Palash Sarkar}, title = {Efficient 4-way Vectorizations of the Montgomery Ladder}, howpublished = {Cryptology ePrint Archive, Report 2020/378}, year = {2020}, url = {https://eprint.iacr.org/2020/378}, } @misc{cryptoeprint:2020:379, author = {Andreas Hülsing and Kai-Chun Ning and Peter Schwabe and Florian Weber and Philip R. Zimmermann}, title = {Post-quantum WireGuard}, howpublished = {Cryptology ePrint Archive, Report 2020/379}, year = {2020}, url = {https://eprint.iacr.org/2020/379}, } @misc{cryptoeprint:2020:380, author = {Anirban Chakraborty and Sarani Bhattacharya and Sayandeep Saha and Debdeep Mukhopdhyay}, title = {Rowhammer Induced Intermittent Fault Attack on ECC-hardened memory}, howpublished = {Cryptology ePrint Archive, Report 2020/380}, year = {2020}, url = {https://eprint.iacr.org/2020/380}, } @misc{cryptoeprint:2020:381, author = {Leonard Kleinrock and Rafail Ostrovsky and Vassilis Zikas}, title = {A PoR/PoS-Hybrid Blockchain: Proof of Reputation with Nakamoto Fallback}, howpublished = {Cryptology ePrint Archive, Report 2020/381}, year = {2020}, url = {https://eprint.iacr.org/2020/381}, } @misc{cryptoeprint:2020:382, author = {Jan Bobolz and Fabian Eidens and Stephan Krenn and Daniel Slamanig and Christoph Striecks}, title = {Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection}, howpublished = {Cryptology ePrint Archive, Report 2020/382}, year = {2020}, url = {https://eprint.iacr.org/2020/382}, } @misc{cryptoeprint:2020:383, author = {Daniel Cervantes-Vázquez and Eduardo Ochoa-Jiménez and Francisco Rodríguez-Henríquez }, title = {Parallel strategies for SIDH: Towards computing SIDH twice as fast}, howpublished = {Cryptology ePrint Archive, Report 2020/383}, year = {2020}, url = {https://eprint.iacr.org/2020/383}, } @misc{cryptoeprint:2020:384, author = {Nguyen Thoi Minh Quan}, title = {A ”Final” Security Bug}, howpublished = {Cryptology ePrint Archive, Report 2020/384}, year = {2020}, url = {https://eprint.iacr.org/2020/384}, } @misc{cryptoeprint:2020:385, author = {Peihan Miao and Sarvar Patel and Mariana Raykova and Karn Seth and Moti Yung}, title = {Two-Sided Malicious Security for Private Intersection-Sum with Cardinality}, howpublished = {Cryptology ePrint Archive, Report 2020/385}, year = {2020}, url = {https://eprint.iacr.org/2020/385}, } @misc{cryptoeprint:2020:386, author = {Ralf Kuesters and Daniel Rausch and Mike Simon}, title = {Accountability in a Permissioned Blockchain: Formal Analysis of Hyperledger Fabric}, howpublished = {Cryptology ePrint Archive, Report 2020/386}, year = {2020}, url = {https://eprint.iacr.org/2020/386}, } @misc{cryptoeprint:2020:387, author = {Onur Gunlu and Rafael F. Schaefer}, title = {Low-complexity and Reliable Transforms for Physical Unclonable Functions}, howpublished = {Cryptology ePrint Archive, Report 2020/387}, year = {2020}, url = {https://eprint.iacr.org/2020/387}, } @misc{cryptoeprint:2020:388, author = {Huseyin Hisil and Berkan Egrice and Mert Yassi}, title = {Fast 4 way vectorized ladder for the complete set of Montgomery curves}, howpublished = {Cryptology ePrint Archive, Report 2020/388}, year = {2020}, url = {https://eprint.iacr.org/2020/388}, } @misc{cryptoeprint:2020:389, author = {Gideon Samid}, title = {One Round of Transposition Ensures Target Security}, howpublished = {Cryptology ePrint Archive, Report 2020/389}, year = {2020}, url = {https://eprint.iacr.org/2020/389}, } @misc{cryptoeprint:2020:390, author = {Rémi Géraud-Stewart and David Naccache}, title = {A French cipher from the late 19th century}, howpublished = {Cryptology ePrint Archive, Report 2020/390}, year = {2020}, url = {https://eprint.iacr.org/2020/390}, } @misc{cryptoeprint:2020:391, author = {Donghoe Heo and Suhri Kim and Kisoon Yoon and Young-Ho Park and Seokhie Hong}, title = {Optimized CSIDH Implementation Using a 2-torsion Point}, howpublished = {Cryptology ePrint Archive, Report 2020/391}, year = {2020}, url = {https://eprint.iacr.org/2020/391}, } @misc{cryptoeprint:2020:392, author = {Sadegh Sadeghi and Nasour Bagheri}, title = {An argument on the security of LRBC, a recently proposed lightweight block cipher}, howpublished = {Cryptology ePrint Archive, Report 2020/392}, year = {2020}, url = {https://eprint.iacr.org/2020/392}, } @misc{cryptoeprint:2020:393, author = {Carmit Hazay and Yuval Ishai and Antonio Marcedone and Muthuramakrishnan Venkitasubramaniam}, title = {LevioSA: Lightweight Secure Arithmetic Computation}, howpublished = {Cryptology ePrint Archive, Report 2020/393}, year = {2020}, url = {https://eprint.iacr.org/2020/393}, } @misc{cryptoeprint:2020:394, author = {Zvika Brakerski and Nico Döttling and Sanjam Garg and Giulio Malavolta}, title = {Candidate iO from Homomorphic Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2020/394}, year = {2020}, url = {https://eprint.iacr.org/2020/394}, } @misc{cryptoeprint:2020:395, author = {Marshall Ball and Elette Boyle and Akshay Degwekar and Apoorvaa Deshpande and Alon Rosen and Vinod Vaikuntanathan and Prashant Nalini Vasudevan}, title = {Cryptography from Information Loss}, howpublished = {Cryptology ePrint Archive, Report 2020/395}, year = {2020}, url = {https://eprint.iacr.org/2020/395}, } @misc{cryptoeprint:2020:396, author = {Donggeun Kwon and HeeSeok Kim and Seokhie Hong}, title = {Improving Non-Profiled Side-Channel Attacks using Autoencoder based Preprocessing}, howpublished = {Cryptology ePrint Archive, Report 2020/396}, year = {2020}, url = {https://eprint.iacr.org/2020/396}, } @misc{cryptoeprint:2020:397, author = {Seonggyeom Kim and Deukjo Hong and Jaechul Sung and Seokhie Hong}, title = {Classification of 4-bit S-boxes for BOGI-permutation}, howpublished = {Cryptology ePrint Archive, Report 2020/397}, year = {2020}, url = {https://eprint.iacr.org/2020/397}, } @misc{cryptoeprint:2020:398, author = {Samuel Brack and Leonie Reichert and Björn Scheuermann}, title = {Decentralized Contact Tracing Using a DHT and Blind Signatures}, howpublished = {Cryptology ePrint Archive, Report 2020/398}, year = {2020}, url = {https://eprint.iacr.org/2020/398}, } @misc{cryptoeprint:2020:399, author = {Serge Vaudenay}, title = {Analysis of DP3T}, howpublished = {Cryptology ePrint Archive, Report 2020/399}, year = {2020}, url = {https://eprint.iacr.org/2020/399}, } @misc{cryptoeprint:2020:400, author = {Jeroen Delvaux}, title = {Threshold Implementations Are Not Provably Secure Against Fault Sensitivity Analysis}, howpublished = {Cryptology ePrint Archive, Report 2020/400}, year = {2020}, url = {https://eprint.iacr.org/2020/400}, } @misc{cryptoeprint:2020:401, author = {Thomas Kerber and Aggelos Kiayias and Markulf Kohlweiss}, title = {Mining for Privacy: How to Bootstrap a Snarky Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2020/401}, year = {2020}, url = {https://eprint.iacr.org/2020/401}, } @misc{cryptoeprint:2020:402, author = {István András Seres and Péter Burcsi}, title = {A Note on Low Order Assumptions in RSA groups}, howpublished = {Cryptology ePrint Archive, Report 2020/402}, year = {2020}, url = {https://eprint.iacr.org/2020/402}, } @misc{cryptoeprint:2020:403, author = {David Derler and Kai Samelin and Daniel Slamanig}, title = {Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes}, howpublished = {Cryptology ePrint Archive, Report 2020/403}, year = {2020}, url = {https://eprint.iacr.org/2020/403}, } @misc{cryptoeprint:2020:404, author = {Tassos Dimitriou}, title = {From Zebras to Tigers: Incentivizing participation in Crowd-sensing applications through fair and private Bitcoin rewards}, howpublished = {Cryptology ePrint Archive, Report 2020/404}, year = {2020}, url = {https://eprint.iacr.org/2020/404}, } @misc{cryptoeprint:2020:405, author = {Ralf Kuesters and Julian Liedtke and Johannes Mueller and Daniel Rausch and Andreas Vogt}, title = {Ordinos: A Verifiable Tally-Hiding E-Voting System}, howpublished = {Cryptology ePrint Archive, Report 2020/405}, year = {2020}, url = {https://eprint.iacr.org/2020/405}, } @misc{cryptoeprint:2020:406, author = {Atsuki Momose and Jason Paul Cruz and Yuichi Kaji}, title = {Hybrid-BFT: Optimistically Responsive Synchronous Consensus with Optimal Latency or Resilience}, howpublished = {Cryptology ePrint Archive, Report 2020/406}, year = {2020}, url = {https://eprint.iacr.org/2020/406}, } @misc{cryptoeprint:2020:407, author = {Aydin Abadi and Sotirios Terzis and Changyu Dong}, title = {Feather: Lightweight Multi-party Updatable Delegated Private Set Intersection}, howpublished = {Cryptology ePrint Archive, Report 2020/407}, year = {2020}, url = {https://eprint.iacr.org/2020/407}, } @misc{cryptoeprint:2020:408, author = {Nir Drucker and Shay Gueron}, title = {Speed up over the Rainbow}, howpublished = {Cryptology ePrint Archive, Report 2020/408}, year = {2020}, url = {https://eprint.iacr.org/2020/408}, } @misc{cryptoeprint:2020:409, author = {Loïs Huguenin-Dumittan and Serge Vaudenay}, title = {Classical Misuse Attacks on NIST Round 2 PQC: The Power of Rank-Based Schemes}, howpublished = {Cryptology ePrint Archive, Report 2020/409}, year = {2020}, url = {https://eprint.iacr.org/2020/409}, } @misc{cryptoeprint:2020:410, author = {Hwajeong Seo and Mila Anastasova and Amir Jalali and Reza Azarderakhsh}, title = {Lightweight Implementation of SIKE Round 2 on ARM Cortex-M4}, howpublished = {Cryptology ePrint Archive, Report 2020/410}, year = {2020}, url = {https://eprint.iacr.org/2020/410}, } @misc{cryptoeprint:2020:411, author = {Niklas Büscher and Daniel Demmler and Nikolaos P. Karvelas and Stefan Katzenbeisser and Juliane Krämer and Deevashwer Rathee and Thomas Schneider and Patrick Struck}, title = {Secure Two-Party Computation in a Quantum World}, howpublished = {Cryptology ePrint Archive, Report 2020/411}, year = {2020}, url = {https://eprint.iacr.org/2020/411}, } @misc{cryptoeprint:2020:412, author = {Alexandre Adomnicai and Zakaria Najm and Thomas Peyrin}, title = {Fixslicing: A New GIFT Representation}, howpublished = {Cryptology ePrint Archive, Report 2020/412}, year = {2020}, url = {https://eprint.iacr.org/2020/412}, } @misc{cryptoeprint:2020:413, author = {Louis Goubin and Matthieu Rivain and Junwei Wang}, title = {Defeating State-of-the-Art White-Box Countermeasures with Advanced Gray-Box Attacks}, howpublished = {Cryptology ePrint Archive, Report 2020/413}, year = {2020}, url = {https://eprint.iacr.org/2020/413}, } @misc{cryptoeprint:2020:414, author = {Roy Radian and Or Sattath}, title = {Semi-Quantum Money}, howpublished = {Cryptology ePrint Archive, Report 2020/414}, year = {2020}, url = {https://eprint.iacr.org/2020/414}, } @misc{cryptoeprint:2020:415, author = {Shweta Agrawal and Alice Pellet-Mary}, title = {Indistinguishability Obfuscation Without Maps: Attacks and Fixes for Noisy Linear FE}, howpublished = {Cryptology ePrint Archive, Report 2020/415}, year = {2020}, url = {https://eprint.iacr.org/2020/415}, } @misc{cryptoeprint:2020:416, author = {Mihir Bellare and Wei Dai}, title = {The Multi-Base Discrete Logarithm Problem: Concrete Security Improvements for Schnorr Identification, Signatures and Multi-Signatures}, howpublished = {Cryptology ePrint Archive, Report 2020/416}, year = {2020}, url = {https://eprint.iacr.org/2020/416}, } @misc{cryptoeprint:2020:417, author = {Jesús-Javier Chi-Domínguez and Francisco Rodríguez-Henríquez}, title = {Optimal strategies for CSIDH}, howpublished = {Cryptology ePrint Archive, Report 2020/417}, year = {2020}, url = {https://eprint.iacr.org/2020/417}, } @misc{cryptoeprint:2020:418, author = {Krzysztof Pietrzak}, title = {Delayed Authentication: Replay and Relay Attacks on DP-3T}, howpublished = {Cryptology ePrint Archive, Report 2020/418}, year = {2020}, url = {https://eprint.iacr.org/2020/418}, } @misc{cryptoeprint:2020:419, author = {Sergey Gorbunov and Leonid Reyzin and Hoeteck Wee and Zhenfei Zhang}, title = {Pointproofs: Aggregating Proofs for Multiple Vector Commitments}, howpublished = {Cryptology ePrint Archive, Report 2020/419}, year = {2020}, url = {https://eprint.iacr.org/2020/419}, } @misc{cryptoeprint:2020:420, author = {Kenji Yasunaga}, title = {Practical Card-Based Protocol for Three-Input Majority}, howpublished = {Cryptology ePrint Archive, Report 2020/420}, year = {2020}, url = {https://eprint.iacr.org/2020/420}, } @misc{cryptoeprint:2020:421, author = {Yibin Xu and Yangyu Huang and Jianhua Shao and George Theodorakopoulos}, title = {Multichain-MWPoW: A $p/2$ Adversary Power Resistant Blockchain Sharding Approach to a Decentralised Autonomous Organisation Architecture}, howpublished = {Cryptology ePrint Archive, Report 2020/421}, year = {2020}, url = {https://eprint.iacr.org/2020/421}, } @misc{cryptoeprint:2020:422, author = {Anis Bkakria and Nora Cuppens and Frédéric Cuppens}, title = {Privacy-Preserving Pattern Matching on Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2020/422}, year = {2020}, url = {https://eprint.iacr.org/2020/422}, } @misc{cryptoeprint:2020:423, author = {Yanyi Liu and Rafael Pass}, title = {On One-way Functions and Kolmogorov Complexity}, howpublished = {Cryptology ePrint Archive, Report 2020/423}, year = {2020}, url = {https://eprint.iacr.org/2020/423}, } @misc{cryptoeprint:2020:424, author = {Samuel Jaques and André Schrottenloher}, title = {Low-gate Quantum Golden Collision Finding}, howpublished = {Cryptology ePrint Archive, Report 2020/424}, year = {2020}, url = {https://eprint.iacr.org/2020/424}, } @misc{cryptoeprint:2020:425, author = {Thierry Simon and Lejla Batina and Joan Daemen and Vincent Grosso and Pedro Maat Costa Massolino and Kostas Papagiannopoulos and Francesco Regazzoni and Niels Samwel}, title = {Friet: An Authenticated Encryption Scheme with Built-in Fault Detection}, howpublished = {Cryptology ePrint Archive, Report 2020/425}, year = {2020}, url = {https://eprint.iacr.org/2020/425}, } @misc{cryptoeprint:2020:426, author = {Qiang Tang}, title = {Privacy-Preserving Contact Tracing: current solutions and open questions}, howpublished = {Cryptology ePrint Archive, Report 2020/426}, year = {2020}, url = {https://eprint.iacr.org/2020/426}, } @misc{cryptoeprint:2020:427, author = {Daniel Kales and Greg Zaverucha}, title = {Improving the Performance of the Picnic Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2020/427}, year = {2020}, url = {https://eprint.iacr.org/2020/427}, } @misc{cryptoeprint:2020:428, author = {Yaron Gvili}, title = {Security Analysis of the COVID-19 Contact Tracing Specifications by Apple Inc. and Google Inc.}, howpublished = {Cryptology ePrint Archive, Report 2020/428}, year = {2020}, url = {https://eprint.iacr.org/2020/428}, } @misc{cryptoeprint:2020:429, author = {Alice Silverberg}, title = {Mathematics and Cryptography: A Marriage of Convenience?}, howpublished = {Cryptology ePrint Archive, Report 2020/429}, year = {2020}, url = {https://eprint.iacr.org/2020/429}, } @misc{cryptoeprint:2020:430, author = {Aram Jivanyan and Tigran Mamikonyan}, title = {Hierarchical One-out-of-Many Proofs With Applications to Blockchain Privacy and Ring Signatures}, howpublished = {Cryptology ePrint Archive, Report 2020/430}, year = {2020}, url = {https://eprint.iacr.org/2020/430}, } @misc{cryptoeprint:2020:431, author = {Geovandro C. C. F. Pereira and Javad Doliskani and David Jao}, title = {x-only point addition formula and faster torsion basis generation in compressed SIKE}, howpublished = {Cryptology ePrint Archive, Report 2020/431}, year = {2020}, url = {https://eprint.iacr.org/2020/431}, } @misc{cryptoeprint:2020:432, author = {Alejandro Cabrera Aldaya and Cesar Pereida García and Billy Bob Brumley}, title = {From A to Z: Projective coordinates leakage in the wild}, howpublished = {Cryptology ePrint Archive, Report 2020/432}, year = {2020}, url = {https://eprint.iacr.org/2020/432}, } @misc{cryptoeprint:2020:433, author = {Martin Westerkamp and Jacob Eberhardt}, title = {zkRelay: Facilitating Sidechains using zkSNARK-based Chain-Relays}, howpublished = {Cryptology ePrint Archive, Report 2020/433}, year = {2020}, url = {https://eprint.iacr.org/2020/433}, } @misc{cryptoeprint:2020:434, author = {Sujoy Sinha Roy and Andrea Basso}, title = {High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation Mechanism: Saber in Hardware}, howpublished = {Cryptology ePrint Archive, Report 2020/434}, year = {2020}, url = {https://eprint.iacr.org/2020/434}, } @misc{cryptoeprint:2020:435, author = {Riham AlTawy and Guang Gong and Kalikinkar Mandal and Raghvendra Rohit }, title = {WAGE: An Authenticated Encryption with a Twist}, howpublished = {Cryptology ePrint Archive, Report 2020/435}, year = {2020}, url = {https://eprint.iacr.org/2020/435}, } @misc{cryptoeprint:2020:436, author = {Houssem Maghrebi}, title = {Deep Learning based Side-Channel Attack: a New Profiling Methodology based on Multi-Label Classification}, howpublished = {Cryptology ePrint Archive, Report 2020/436}, year = {2020}, url = {https://eprint.iacr.org/2020/436}, } @misc{cryptoeprint:2020:437, author = {Mike Hamburg}, title = {Faster Montgomery and double-add ladders for short Weierstrass curves}, howpublished = {Cryptology ePrint Archive, Report 2020/437}, year = {2020}, url = {https://eprint.iacr.org/2020/437}, } @misc{cryptoeprint:2020:438, author = {Yin Li and Yu Zhang and Wei He}, title = {Fast hybrid Karatsuba multiplier for Type II pentanomials}, howpublished = {Cryptology ePrint Archive, Report 2020/438}, year = {2020}, url = {https://eprint.iacr.org/2020/438}, } @misc{cryptoeprint:2020:439, author = {Hiroshi Onuki and Yusuke Aikawa and Tsuyoshi Takagi}, title = {The Existence of Cycles in the Supersingular Isogeny Graphs Used in SIKE}, howpublished = {Cryptology ePrint Archive, Report 2020/439}, year = {2020}, url = {https://eprint.iacr.org/2020/439}, } @misc{cryptoeprint:2020:440, author = {Hao Chen}, title = {Sublattice Attacks on Ring-LWE with Wide Error Distributions I}, howpublished = {Cryptology ePrint Archive, Report 2020/440}, year = {2020}, url = {https://eprint.iacr.org/2020/440}, } @misc{cryptoeprint:2020:441, author = {Yonglin Hao and Gregor Leander and Willi Meier and Yosuke Todo and Qingju Wang}, title = {Modeling for Three-Subset Division Property without Unknown Subset}, howpublished = {Cryptology ePrint Archive, Report 2020/441}, year = {2020}, url = {https://eprint.iacr.org/2020/441}, } @misc{cryptoeprint:2020:442, author = {Alon Rosen}, title = {Fine-Grained Cryptography: A New Frontier?}, howpublished = {Cryptology ePrint Archive, Report 2020/442}, year = {2020}, url = {https://eprint.iacr.org/2020/442}, } @misc{cryptoeprint:2020:443, author = {Okan Seker and Thomas Eisenbarth and Maciej Liskiewicz}, title = {A White-Box Masking Scheme Resisting Computational and Algebraic Attacks}, howpublished = {Cryptology ePrint Archive, Report 2020/443}, year = {2020}, url = {https://eprint.iacr.org/2020/443}, } @misc{cryptoeprint:2020:444, author = {Satō Shinichi}, title = {A modern signature scheme with message recovery: Abe--Okamoto signatures with EdDSA elements}, howpublished = {Cryptology ePrint Archive, Report 2020/444}, year = {2020}, url = {https://eprint.iacr.org/2020/444}, } @misc{cryptoeprint:2020:445, author = {Thomas Agrikola and Geoffroy Couteau and Yuval Ishai and Stanislaw Jarecki and Amit Sahai}, title = {On Pseudorandom Encodings}, howpublished = {Cryptology ePrint Archive, Report 2020/445}, year = {2020}, url = {https://eprint.iacr.org/2020/445}, } @misc{cryptoeprint:2020:446, author = {Tim Fritzmann and Georg Sigl and Johanna Sepúlveda}, title = {RISQ-V: Tightly Coupled RISC-V Accelerators for Post-Quantum Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2020/446}, year = {2020}, url = {https://eprint.iacr.org/2020/446}, } @misc{cryptoeprint:2020:447, author = {Asma Aloufi and Peizhao Hu and Yongsoo Song and and Kristin Lauter}, title = {Computing Blindfolded on Data Homomorphically Encrypted under Multiple Keys: An Extended Survey}, howpublished = {Cryptology ePrint Archive, Report 2020/447}, year = {2020}, url = {https://eprint.iacr.org/2020/447}, } @misc{cryptoeprint:2020:448, author = {Amir Jafari and Shahram Khazaei}, title = {Partial Secret Sharing Schemes}, howpublished = {Cryptology ePrint Archive, Report 2020/448}, year = {2020}, url = {https://eprint.iacr.org/2020/448}, } @misc{cryptoeprint:2020:449, author = {Kristian L. McDonald}, title = {Switched Threshold Signatures from K-Private PolyShamir Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2020/449}, year = {2020}, url = {https://eprint.iacr.org/2020/449}, } @misc{cryptoeprint:2020:450, author = {Kristian L. McDonald}, title = {The Landscape of Pointcheval-Sanders Signatures: Mapping to Polynomial-Based Signatures and Beyond}, howpublished = {Cryptology ePrint Archive, Report 2020/450}, year = {2020}, url = {https://eprint.iacr.org/2020/450}, } @misc{cryptoeprint:2020:451, author = {Hao Chen and Miran Kim and Ilya Razenshteyn and Dragos Rotaru and Yongsoo Song and Sameer Wagh}, title = {Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning}, howpublished = {Cryptology ePrint Archive, Report 2020/451}, year = {2020}, url = {https://eprint.iacr.org/2020/451}, } @misc{cryptoeprint:2020:452, author = {Amit Behera and Or Sattath}, title = {Almost Public Coins}, howpublished = {Cryptology ePrint Archive, Report 2020/452}, year = {2020}, url = {https://eprint.iacr.org/2020/452}, } @misc{cryptoeprint:2020:453, author = {F. Betül Durak and Loïs Huguenin-Dumittan and Serge Vaudenay}, title = {BioLocker: A Practical Biometric Authentication Mechanism based on 3D Fingervein}, howpublished = {Cryptology ePrint Archive, Report 2020/453}, year = {2020}, url = {https://eprint.iacr.org/2020/453}, } @misc{cryptoeprint:2020:454, author = {Thomas Pornin}, title = {Optimized Lattice Basis Reduction In Dimension 2, and Fast Schnorr and EdDSA Signature Verification}, howpublished = {Cryptology ePrint Archive, Report 2020/454}, year = {2020}, url = {https://eprint.iacr.org/2020/454}, } @misc{cryptoeprint:2020:455, author = {Daniel Apon and Ray Perlner and Angela Robinson and Paolo Santini}, title = {Cryptanalysis of LEDAcrypt}, howpublished = {Cryptology ePrint Archive, Report 2020/455}, year = {2020}, url = {https://eprint.iacr.org/2020/455}, } @misc{cryptoeprint:2020:456, author = {Zhichun Lu and Runchao Han and Jiangshan Yu}, title = {Bank run Payment Channel Networks}, howpublished = {Cryptology ePrint Archive, Report 2020/456}, year = {2020}, url = {https://eprint.iacr.org/2020/456}, } @misc{cryptoeprint:2020:457, author = {Ahmad Almorabea}, title = {Cryptographic Scheme for analyzing protected files on Sandboxes and share them privately}, howpublished = {Cryptology ePrint Archive, Report 2020/457}, year = {2020}, url = {https://eprint.iacr.org/2020/457}, } @misc{cryptoeprint:2020:458, author = {Ittai Abraham and Kartik Nayak and Ling Ren and Nibesh Shrestha}, title = {On the Optimality of Optimistic Responsiveness}, howpublished = {Cryptology ePrint Archive, Report 2020/458}, year = {2020}, url = {https://eprint.iacr.org/2020/458}, } @misc{cryptoeprint:2020:459, author = {Debdeep Mukhopadhyay}, title = {Improved Fault Templates of Boolean Circuits in Cryptosystems can Break Threshold Implementations}, howpublished = {Cryptology ePrint Archive, Report 2020/459}, year = {2020}, url = {https://eprint.iacr.org/2020/459}, } @misc{cryptoeprint:2020:460, author = {Marloes Venema and Greg Alpár}, title = {A Bunch of Broken Schemes: A Simple yet Powerful Linear Approach to Analyzing Security of Attribute-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/460}, year = {2020}, url = {https://eprint.iacr.org/2020/460}, } @misc{cryptoeprint:2020:461, author = {Jean-Sébastien Coron and Agnese Gini}, title = {A Polynomial-Time Algorithm for Solving the Hidden Subset Sum Problem}, howpublished = {Cryptology ePrint Archive, Report 2020/461}, year = {2020}, url = {https://eprint.iacr.org/2020/461}, } @misc{cryptoeprint:2020:462, author = {Ido Shahaf and Or Ordentlich and Gil Segev}, title = {An Information-Theoretic Proof of the Streaming Switching Lemma for Symmetric Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/462}, year = {2020}, url = {https://eprint.iacr.org/2020/462}, } @misc{cryptoeprint:2020:463, author = {Xiaoning Liu and Bang Wu and Xingliang Yuan and Xun Yi}, title = {Leia: A Lightweight Cryptographic Neural Network Inference System at the Edge}, howpublished = {Cryptology ePrint Archive, Report 2020/463}, year = {2020}, url = {https://eprint.iacr.org/2020/463}, } @misc{cryptoeprint:2020:464, author = {Fabrice Benhamouda and Craig Gentry and Sergey Gorbunov and Shai Halevi and Hugo Krawczyk and Chengyu Lin and Tal Rabin and Leonid Reyzin}, title = {Can a Blockchain Keep a Secret?}, howpublished = {Cryptology ePrint Archive, Report 2020/464}, year = {2020}, url = {https://eprint.iacr.org/2020/464}, } @misc{cryptoeprint:2020:465, author = {Pantea Kiaei and Patrick Schaumont}, title = {Domain-Oriented Masked Instruction Set Architecture for RISC-V}, howpublished = {Cryptology ePrint Archive, Report 2020/465}, year = {2020}, url = {https://eprint.iacr.org/2020/465}, } @misc{cryptoeprint:2020:466, author = {Pantea Kiaei and Darius Mercadier and Pierre-Evariste Dagand and Karine Heydemann and Patrick Schaumont}, title = {Custom Instruction Support for Modular Defense against Side-channel and Fault Attacks}, howpublished = {Cryptology ePrint Archive, Report 2020/466}, year = {2020}, url = {https://eprint.iacr.org/2020/466}, } @misc{cryptoeprint:2020:467, author = {Zhenzhen Bao and Xiaoyang Dong and Jian Guo and Zheng Li and Danping Shi and Siwei Sun and Xiaoyun Wang}, title = {Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing}, howpublished = {Cryptology ePrint Archive, Report 2020/467}, year = {2020}, url = {https://eprint.iacr.org/2020/467}, } @misc{cryptoeprint:2020:468, author = {Konstantinos Chalkias and Kevin Lewi and Payman Mohassel and Valeria Nikolaenko}, title = {Distributed Auditing Proofs of Liabilities}, howpublished = {Cryptology ePrint Archive, Report 2020/468}, year = {2020}, url = {https://eprint.iacr.org/2020/468}, } @misc{cryptoeprint:2020:469, author = {Kari Kostiainen and Aritra Dhar and Srdjan Capkun}, title = {Dedicated Security Chips in the Age of Secure Enclaves}, howpublished = {Cryptology ePrint Archive, Report 2020/469}, year = {2020}, url = {https://eprint.iacr.org/2020/469}, } @misc{cryptoeprint:2020:470, author = {Fabio Campos and Tim Kohlstadt and Steffen Reith and Marc Stoettinger}, title = {LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4}, howpublished = {Cryptology ePrint Archive, Report 2020/470}, year = {2020}, url = {https://eprint.iacr.org/2020/470}, } @misc{cryptoeprint:2020:471, author = {Durba Chatterjee and Debdeep Mukhopadhyay and Aritra Hazra}, title = {Interpose PUF can be PAC Learned}, howpublished = {Cryptology ePrint Archive, Report 2020/471}, year = {2020}, url = {https://eprint.iacr.org/2020/471}, } @misc{cryptoeprint:2020:472, author = {Shuyang Tang and Qingzhao Zhang and Zhengfeng Gao and Jilai Zheng and Dawu Gu}, title = {Bracing A Transaction DAG with A Backbone Chain}, howpublished = {Cryptology ePrint Archive, Report 2020/472}, year = {2020}, url = {https://eprint.iacr.org/2020/472}, } @misc{cryptoeprint:2020:473, author = {Ashutosh Kumar and Raghu Meka and David Zuckerman}, title = {Bounded Collusion Protocols, Cylinder-Intersection Extractors and Leakage-Resilient Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2020/473}, year = {2020}, url = {https://eprint.iacr.org/2020/473}, } @misc{cryptoeprint:2020:474, author = {Karim Baghery and Mahdi Sedaghat}, title = {Tiramisu: Black-Box Simulation Extractable NIZKs in the Updatable CRS Model}, howpublished = {Cryptology ePrint Archive, Report 2020/474}, year = {2020}, url = {https://eprint.iacr.org/2020/474}, } @misc{cryptoeprint:2020:475, author = {Zachary Zaccagni and Ram Dantu}, title = {Proof of Review (PoR): A New Consensus Protocol for Deriving Trustworthiness of Reputation Through Reviews}, howpublished = {Cryptology ePrint Archive, Report 2020/475}, year = {2020}, url = {https://eprint.iacr.org/2020/475}, } @misc{cryptoeprint:2020:476, author = {Lukas Aumayr and Oguzhan Ersoy and Andreas Erwig and Sebastian Faust and Kristina Hostakova and Matteo Maffei and Pedro Moreno-Sanchez and Siavash Riahi}, title = {Generalized Bitcoin-Compatible Channels}, howpublished = {Cryptology ePrint Archive, Report 2020/476}, year = {2020}, url = {https://eprint.iacr.org/2020/476}, } @misc{cryptoeprint:2020:477, author = {Essam Ghadafi}, title = {Partially Structure-Preserving Signatures: Lower Bounds, Constructions and More}, howpublished = {Cryptology ePrint Archive, Report 2020/477}, year = {2020}, url = {https://eprint.iacr.org/2020/477}, } @misc{cryptoeprint:2020:478, author = {Eshan Chattopadhyay and Jesse Goodman and Vipul Goyal and Xin Li}, title = {Leakage-Resilient Extractors and Secret-Sharing against Bounded Collusion Protocols}, howpublished = {Cryptology ePrint Archive, Report 2020/478}, year = {2020}, url = {https://eprint.iacr.org/2020/478}, } @misc{cryptoeprint:2020:479, author = {Tapas Pal and Ratna Dutta}, title = {Puncturable Witness Pseudorandom Functions and its Applications on Witness Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/479}, year = {2020}, url = {https://eprint.iacr.org/2020/479}, } @misc{cryptoeprint:2020:480, author = {Ahmet Can Mert and Erdinc Ozturk and Erkay Savas}, title = {Low-Latency ASIC Algorithms of Modular Squaring of Large Integers for VDF Applications}, howpublished = {Cryptology ePrint Archive, Report 2020/480}, year = {2020}, url = {https://eprint.iacr.org/2020/480}, } @misc{cryptoeprint:2020:481, author = {James You and Qi Zhang and Curtis D'Alves and Bill O'Farrell and Christopher K. Anand}, title = {Using z14 Fused-Multiply-Add Instructions to Accelerate Elliptic Curve Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2020/481}, year = {2020}, url = {https://eprint.iacr.org/2020/481}, } @misc{cryptoeprint:2020:482, author = {Haining Fan}, title = {A Trace Based $GF(2^n)$ Inversion Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2020/482}, year = {2020}, url = {https://eprint.iacr.org/2020/482}, } @misc{cryptoeprint:2020:483, author = {Reza Kaboli and Shahram Khazaei and Maghsoud Parviz}, title = {On Ideal and Weakly-Ideal Access Structures}, howpublished = {Cryptology ePrint Archive, Report 2020/483}, year = {2020}, url = {https://eprint.iacr.org/2020/483}, } @misc{cryptoeprint:2020:484, author = {Aaqib Bashir Dar and Auqib Hamid Lone and Saniya Zahoor and Afshan Amin Khan and Roohie Naaz}, title = {Applicability of Mobile Contact Tracing in Fighting Pandemic (COVID-19): Issues, Challenges and Solutions}, howpublished = {Cryptology ePrint Archive, Report 2020/484}, year = {2020}, url = {https://eprint.iacr.org/2020/484}, } @misc{cryptoeprint:2020:485, author = {Ruslan V. Skuratovskii}, title = {Edwards curve points counting method and supersingular Edwards and Montgomery curves}, howpublished = {Cryptology ePrint Archive, Report 2020/485}, year = {2020}, url = {https://eprint.iacr.org/2020/485}, } @misc{cryptoeprint:2020:486, author = {Jinyu Lu and Yunwen Liu and Tomer Ashur and Bing Sun and Chao Li}, title = {Rotational-XOR Cryptanalysis of Simon-like Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2020/486}, year = {2020}, url = {https://eprint.iacr.org/2020/486}, } @misc{cryptoeprint:2020:487, author = {Emmanouil Doulgerakis and Thijs Laarhoven and Benne de Weger}, title = {Sieve, Enumerate, Slice, and Lift: Hybrid Lattice Algorithms for SVP via CVPP}, howpublished = {Cryptology ePrint Archive, Report 2020/487}, year = {2020}, url = {https://eprint.iacr.org/2020/487}, } @misc{cryptoeprint:2020:488, author = {Yongwoo Lee and Joonwoo Lee and Young-Sik Kim and Jong-Seon No }, title = {Near-optimal Polynomial for Modulus Reduction Using L2-norm for Approximate Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/488}, year = {2020}, url = {https://eprint.iacr.org/2020/488}, } @misc{cryptoeprint:2020:489, author = {Fraunhofer AISEC}, title = {Pandemic Contact Tracing Apps: DP-3T, PEPP-PT NTK, and ROBERT from a Privacy Perspective}, howpublished = {Cryptology ePrint Archive, Report 2020/489}, year = {2020}, url = {https://eprint.iacr.org/2020/489}, } @misc{cryptoeprint:2020:490, author = {Thomas Haines and Johannes Mueller}, title = {SoK: Techniques for Verifiable Mix Nets}, howpublished = {Cryptology ePrint Archive, Report 2020/490}, year = {2020}, url = {https://eprint.iacr.org/2020/490}, } @misc{cryptoeprint:2020:491, author = {Hilder Vitor Lima Pereira}, title = {Efficient AGCD-based homomorphic encryption for matrix and vector arithmetic}, howpublished = {Cryptology ePrint Archive, Report 2020/491}, year = {2020}, url = {https://eprint.iacr.org/2020/491}, } @misc{cryptoeprint:2020:492, author = {Ran Canetti and Nikolaos Makriyannis and Udi Peled}, title = {UC Non-Interactive, Proactive, Threshold ECDSA}, howpublished = {Cryptology ePrint Archive, Report 2020/492}, year = {2020}, url = {https://eprint.iacr.org/2020/492}, } @misc{cryptoeprint:2020:493, author = {Gennaro Avitabile and Vincenzo Botta and Vincenzo Iovino and Ivan Visconti}, title = {Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-C2 Fully Decentralized Automatic Contact Tracing System}, howpublished = {Cryptology ePrint Archive, Report 2020/493}, year = {2020}, url = {https://eprint.iacr.org/2020/493}, } @misc{cryptoeprint:2020:494, author = {Rohit Chatterjee and Xiao Liang and Omkant Pandey}, title = {Improved Black-Box Constructions of Composable Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2020/494}, year = {2020}, url = {https://eprint.iacr.org/2020/494}, } @misc{cryptoeprint:2020:495, author = {Kim Yong-Jin and Yon Yong-Ho and Jong Yu-Jin and Li Ok-Chol}, title = {Disperse rotation operator DRT and use in some stream ciphers}, howpublished = {Cryptology ePrint Archive, Report 2020/495}, year = {2020}, url = {https://eprint.iacr.org/2020/495}, } @misc{cryptoeprint:2020:496, author = {Demba Sow and Léo Robert and Pascal Lafourcade}, title = {Linear Generalized ElGamal Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2020/496}, year = {2020}, url = {https://eprint.iacr.org/2020/496}, } @misc{cryptoeprint:2020:497, author = {Michele Ciampi and Yun Lu and Vassilis Zikas}, title = {Collusion-Preserving Computation without a Mediator}, howpublished = {Cryptology ePrint Archive, Report 2020/497}, year = {2020}, url = {https://eprint.iacr.org/2020/497}, } @misc{cryptoeprint:2020:498, author = {Adam Gągol and Damian Straszak}, title = {Threshold ECDSA for Decentralized Asset Custody}, howpublished = {Cryptology ePrint Archive, Report 2020/498}, year = {2020}, url = {https://eprint.iacr.org/2020/498}, } @misc{cryptoeprint:2020:499, author = {Benedikt Bünz and Alessandro Chiesa and Pratyush Mishra and Nicholas Spooner}, title = {Proof-Carrying Data from Accumulation Schemes}, howpublished = {Cryptology ePrint Archive, Report 2020/499}, year = {2020}, url = {https://eprint.iacr.org/2020/499}, } @misc{cryptoeprint:2020:500, author = {Lorenzo Grassi and Christian Rechberger and Markus Schofnegger}, title = {Weak Linear Layers in Word-Oriented Partial SPN and HADES-Like Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2020/500}, year = {2020}, url = {https://eprint.iacr.org/2020/500}, } @misc{cryptoeprint:2020:501, author = {Ivan Damgård and Thomas Pelle Jakobsen and Jesper Buus Nielsen and Jakob Illeborg Pagter and Michael Bæksvang Østergård}, title = {Fast Threshold ECDSA with Honest Majority}, howpublished = {Cryptology ePrint Archive, Report 2020/501}, year = {2020}, url = {https://eprint.iacr.org/2020/501}, } @misc{cryptoeprint:2020:502, author = {Sijia Zhao and Donal O’Mahony}, title = {Applying Blockchain Layer2 Technology to Mass E-Commerce}, howpublished = {Cryptology ePrint Archive, Report 2020/502}, year = {2020}, url = {https://eprint.iacr.org/2020/502}, } @misc{cryptoeprint:2020:503, author = {Aaron Hutchinson and Koray Karabina}, title = {A New Encoding Algorithm for a Multidimensional Version of the Montgomery Ladder}, howpublished = {Cryptology ePrint Archive, Report 2020/503}, year = {2020}, url = {https://eprint.iacr.org/2020/503}, } @misc{cryptoeprint:2020:504, author = {Vipul Goyal and Abhiram Kothapalli and Elisaweta Masserova and Bryan Parno and Yifan Song}, title = {Storing and Retrieving Secrets on a Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2020/504}, year = {2020}, url = {https://eprint.iacr.org/2020/504}, } @misc{cryptoeprint:2020:505, author = {Wasilij Beskorovajnov and Felix Dörre and Gunnar Hartung and Alexander Koch and Jörn Müller-Quade and Thorsten Strufe}, title = {ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy}, howpublished = {Cryptology ePrint Archive, Report 2020/505}, year = {2020}, url = {https://eprint.iacr.org/2020/505}, } @misc{cryptoeprint:2020:506, author = {Sonia Belaïd and Pierre-Evariste Dagand and Darius Mercadier and Matthieu Rivain and Raphaël Wintersdorff}, title = {Tornado: Automatic Generation of Probing-Secure Masked Bitsliced Implementations}, howpublished = {Cryptology ePrint Archive, Report 2020/506}, year = {2020}, url = {https://eprint.iacr.org/2020/506}, } @misc{cryptoeprint:2020:507, author = {Victoria Vysotskaya}, title = {Characteristics of Hadamard square of Reed--Muller subcodes of special type (Extended abstract)}, howpublished = {Cryptology ePrint Archive, Report 2020/507}, year = {2020}, url = {https://eprint.iacr.org/2020/507}, } @misc{cryptoeprint:2020:508, author = {Yuan Yao and Michael Tunstall and Elke De Mulder and Anton Kochepasov and Patrick Schaumont}, title = {Augmenting Leakage Detection using Bootstrapping}, howpublished = {Cryptology ePrint Archive, Report 2020/508}, year = {2020}, url = {https://eprint.iacr.org/2020/508}, } @misc{cryptoeprint:2020:509, author = {Avijit Dutta and Mridul Nandi}, title = {BBB Secure Nonce Based MAC Using Public Permutations}, howpublished = {Cryptology ePrint Archive, Report 2020/509}, year = {2020}, url = {https://eprint.iacr.org/2020/509}, } @misc{cryptoeprint:2020:510, author = {Nir Drucker and Shay Gueron and Dusan Kostic and Edoardo Persichetti}, title = {On the Applicability of the Fujisaki-Okamoto Transformation to the BIKE KEM}, howpublished = {Cryptology ePrint Archive, Report 2020/510}, year = {2020}, url = {https://eprint.iacr.org/2020/510}, } @misc{cryptoeprint:2020:511, author = {Iurii Shyshatsky and Vinod Manoharan and Taras Emelyanenko and Lucas Leger}, title = {JaxNet: Scalable Blockchain Network}, howpublished = {Cryptology ePrint Archive, Report 2020/511}, year = {2020}, url = {https://eprint.iacr.org/2020/511}, } @misc{cryptoeprint:2020:512, author = {Chandratop Chakraborty and Pranab Chakraborty and Subhamoy Maitra}, title = {Glimpses are Forever in RC4 amidst the Spectre of Biases}, howpublished = {Cryptology ePrint Archive, Report 2020/512}, year = {2020}, url = {https://eprint.iacr.org/2020/512}, } @misc{cryptoeprint:2020:513, author = {Myrto Arapinis and Nikolaos Lamprou and Lenka Marekova and Thomas Zacharias}, title = {E-cclesia: Universally Composable Self-Tallying Elections}, howpublished = {Cryptology ePrint Archive, Report 2020/513}, year = {2020}, url = {https://eprint.iacr.org/2020/513}, } @misc{cryptoeprint:2020:514, author = {Michael Scott}, title = {On the Deployment of curve based cryptography for the Internet of Things}, howpublished = {Cryptology ePrint Archive, Report 2020/514}, year = {2020}, url = {https://eprint.iacr.org/2020/514}, } @misc{cryptoeprint:2020:515, author = {Thomas Espitau and Antoine Joux and Natalia Kharchenko}, title = {On a hybrid approach to solve binary-LWE}, howpublished = {Cryptology ePrint Archive, Report 2020/515}, year = {2020}, url = {https://eprint.iacr.org/2020/515}, } @misc{cryptoeprint:2020:516, author = {Mordechai Guri}, title = {POWER-SUPPLaY: Leaking Data from Air-Gapped Systems by Turning the Power-Supplies Into Speakers}, howpublished = {Cryptology ePrint Archive, Report 2020/516}, year = {2020}, url = {https://eprint.iacr.org/2020/516}, } @misc{cryptoeprint:2020:517, author = {Thomas Attema and Vadim Lyubashevsky and Gregor Seiler}, title = {Practical Product Proofs for Lattice Commitments}, howpublished = {Cryptology ePrint Archive, Report 2020/517}, year = {2020}, url = {https://eprint.iacr.org/2020/517}, } @misc{cryptoeprint:2020:518, author = {Muhammed F. Esgin and Ngoc Khanh Nguyen and Gregor Seiler}, title = {Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings}, howpublished = {Cryptology ePrint Archive, Report 2020/518}, year = {2020}, url = {https://eprint.iacr.org/2020/518}, } @misc{cryptoeprint:2020:519, author = {Hamidreza Amini Khorasgani and Hemanta K. Maji and Mingyuan Wang}, title = {Design & Analysis of Optimal Coin-tossing: New Techniques}, howpublished = {Cryptology ePrint Archive, Report 2020/519}, year = {2020}, url = {https://eprint.iacr.org/2020/519}, } @misc{cryptoeprint:2020:520, author = {Yarkın Doröz and Jeffrey Hoffstein and Joseph H. Silverman and Berk Sunar}, title = {MMSAT: A Scheme for Multimessage Multiuser Signature Aggregation}, howpublished = {Cryptology ePrint Archive, Report 2020/520}, year = {2020}, url = {https://eprint.iacr.org/2020/520}, } @misc{cryptoeprint:2020:521, author = {Marcel Keller}, title = {MP-SPDZ: A Versatile Framework for Multi-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2020/521}, year = {2020}, url = {https://eprint.iacr.org/2020/521}, } @misc{cryptoeprint:2020:522, author = {Lukas Helminger and Daniel Kales and Christian Rechberger and Roman Walch}, title = {Aggregated Private Information Retrieval: A First Practical Implementation to Support Large-Scale Disease Analytics}, howpublished = {Cryptology ePrint Archive, Report 2020/522}, year = {2020}, url = {https://eprint.iacr.org/2020/522}, } @misc{cryptoeprint:2020:523, author = {Tomer Ashur and Raluca Posteuca and Danilo Šijačić and Stef D’haeseleer}, title = {The Strictly Zero-Correlation Attack with Application to the Full DES}, howpublished = {Cryptology ePrint Archive, Report 2020/523}, year = {2020}, url = {https://eprint.iacr.org/2020/523}, } @misc{cryptoeprint:2020:524, author = {Balthazar Bauer and Georg Fuchsbauer}, title = {Efficient Signatures on Randomizable Ciphertexts}, howpublished = {Cryptology ePrint Archive, Report 2020/524}, year = {2020}, url = {https://eprint.iacr.org/2020/524}, } @misc{cryptoeprint:2020:525, author = {Dimitris Karakostas and Aggelos Kiayias and Mario Larangeira}, title = {Account Management in Proof of Stake Ledgers}, howpublished = {Cryptology ePrint Archive, Report 2020/525}, year = {2020}, url = {https://eprint.iacr.org/2020/525}, } @misc{cryptoeprint:2020:526, author = {Robert Dryło and Tomasz Kijko and Michał Wroński}, title = {Efficient Montgomery-like formulas for general Huff's and Huff's elliptic curves and their applications to the isogeny-based cryptography}, howpublished = {Cryptology ePrint Archive, Report 2020/526}, year = {2020}, url = {https://eprint.iacr.org/2020/526}, } @misc{cryptoeprint:2020:527, author = {Alin Tomescu and Ittai Abraham and Vitalik Buterin and Justin Drake and Dankrad Feist and Dmitry Khovratovich}, title = {Aggregatable Subvector Commitments for Stateless Cryptocurrencies}, howpublished = {Cryptology ePrint Archive, Report 2020/527}, year = {2020}, url = {https://eprint.iacr.org/2020/527}, } @misc{cryptoeprint:2020:528, author = {Joseph K. Liu and Man Ho Au and Tsz Hon Yuen and Cong Zuo and Jiawei Wang and Amin Sakzad and Xiapu Luo and Li Li}, title = {Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach}, howpublished = {Cryptology ePrint Archive, Report 2020/528}, year = {2020}, url = {https://eprint.iacr.org/2020/528}, } @misc{cryptoeprint:2020:529, author = {Moni Naor and Shahar Paz and Eyal Ronen}, title = {CRISP: Compromise Resilient Identity-based Symmetric PAKE}, howpublished = {Cryptology ePrint Archive, Report 2020/529}, year = {2020}, url = {https://eprint.iacr.org/2020/529}, } @misc{cryptoeprint:2020:530, author = {Mathias Soeken}, title = {Determining the Multiplicative Complexity of Boolean Functions using SAT}, howpublished = {Cryptology ePrint Archive, Report 2020/530}, year = {2020}, url = {https://eprint.iacr.org/2020/530}, } @misc{cryptoeprint:2020:531, author = {Serge Vaudenay}, title = {Centralized or Decentralized? The Contact Tracing Dilemma}, howpublished = {Cryptology ePrint Archive, Report 2020/531}, year = {2020}, url = {https://eprint.iacr.org/2020/531}, } @misc{cryptoeprint:2020:532, author = {Dominik Harz and Lewis Gudgeon and Rami Khalil and Alexei Zamyatin}, title = {Promise: Leveraging Future Gains for Collateral Reduction}, howpublished = {Cryptology ePrint Archive, Report 2020/532}, year = {2020}, url = {https://eprint.iacr.org/2020/532}, } @misc{cryptoeprint:2020:533, author = {Foteini Baldimtsi and Varun Madathil and Alessandra Scafuro and Linfeng Zhou}, title = {Anonymous Lottery in the Proof-of-Stake Setting}, howpublished = {Cryptology ePrint Archive, Report 2020/533}, year = {2020}, url = {https://eprint.iacr.org/2020/533}, } @misc{cryptoeprint:2020:534, author = {Peter Schwabe and Douglas Stebila and Thom Wiggers}, title = {Post-quantum TLS without handshake signatures}, howpublished = {Cryptology ePrint Archive, Report 2020/534}, year = {2020}, url = {https://eprint.iacr.org/2020/534}, } @misc{cryptoeprint:2020:535, author = {Geoffroy Couteau and Shuichi Katsumata and Bogdan Ursu}, title = {Non-Interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2020/535}, year = {2020}, url = {https://eprint.iacr.org/2020/535}, } @misc{cryptoeprint:2020:536, author = {Carlos Cid and Lorenzo Grassi and Reinhard Lüftenegger and Christian Rechberger and Markus Schofnegger}, title = {Higher-Order Differentials of Ciphers with Low-Degree S-Boxes}, howpublished = {Cryptology ePrint Archive, Report 2020/536}, year = {2020}, url = {https://eprint.iacr.org/2020/536}, } @misc{cryptoeprint:2020:537, author = {Carsten Baum and Bernardo David and Rafael Dowsley and Jesper Buus Nielsen and Sabine Oechsner}, title = {TARDIS: Time And Relative Delays In Simulation}, howpublished = {Cryptology ePrint Archive, Report 2020/537}, year = {2020}, url = {https://eprint.iacr.org/2020/537}, } @misc{cryptoeprint:2020:538, author = {Liliya Kraleva and Tomer Ashur and Vincent Rijmen }, title = {Rotational Cryptanalysis on MAC Algorithm Chaskey}, howpublished = {Cryptology ePrint Archive, Report 2020/538}, year = {2020}, url = {https://eprint.iacr.org/2020/538}, } @misc{cryptoeprint:2020:539, author = {Hao Chen and Lynn Chua and Kristin Lauter and Yongsoo Song}, title = {On the Concrete Security of LWE with Small Secret}, howpublished = {Cryptology ePrint Archive, Report 2020/539}, year = {2020}, url = {https://eprint.iacr.org/2020/539}, } @misc{cryptoeprint:2020:540, author = {Rosario Gennaro and Steven Goldfeder}, title = {One Round Threshold ECDSA with Identifiable Abort}, howpublished = {Cryptology ePrint Archive, Report 2020/540}, year = {2020}, url = {https://eprint.iacr.org/2020/540}, } @misc{cryptoeprint:2020:541, author = {Benjamin Dowling and Britta Hale}, title = {There Can Be No Compromise: The Necessity of Ratcheted Authentication in Secure Messaging}, howpublished = {Cryptology ePrint Archive, Report 2020/541}, year = {2020}, url = {https://eprint.iacr.org/2020/541}, } @misc{cryptoeprint:2020:542, author = {Yusuke Naito and Yu Sasaki and Takeshi Sugawara}, title = {Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation}, howpublished = {Cryptology ePrint Archive, Report 2020/542}, year = {2020}, url = {https://eprint.iacr.org/2020/542}, } @misc{cryptoeprint:2020:543, author = {Thomas Kerber and Aggelos Kiayias and Markulf Kohlweiss}, title = {Kachina - Foundations of Private Smart Contracts}, howpublished = {Cryptology ePrint Archive, Report 2020/543}, year = {2020}, url = {https://eprint.iacr.org/2020/543}, } @misc{cryptoeprint:2020:544, author = {Okan Seker and Sebastian Berndt and Thomas Eisenbarth}, title = {SNI-in-the-head: Protecting MPC-in-the-head Protocols against Side-channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2020/544}, year = {2020}, url = {https://eprint.iacr.org/2020/544}, } @misc{cryptoeprint:2020:545, author = {Ran Canetti and Pratik Sarkar and Xiao Wang}, title = {Efficient and Round-Optimal Oblivious Transfer and Commitment with Adaptive Security}, howpublished = {Cryptology ePrint Archive, Report 2020/545}, year = {2020}, url = {https://eprint.iacr.org/2020/545}, } @misc{cryptoeprint:2020:546, author = {Xin An and Kai Hu and Meiqin Wang}, title = {MixColumns Coefficient Property and Security of the AES with A Secret S-Box}, howpublished = {Cryptology ePrint Archive, Report 2020/546}, year = {2020}, url = {https://eprint.iacr.org/2020/546}, } @misc{cryptoeprint:2020:547, author = {Kai Hu and Qingju Wang and Meiqin Wang}, title = {Finding Bit-Based Division Property for Ciphers with Complex Linear Layer}, howpublished = {Cryptology ePrint Archive, Report 2020/547}, year = {2020}, url = {https://eprint.iacr.org/2020/547}, } @misc{cryptoeprint:2020:548, author = {Gary Yu}, title = {Blockchain Stealth Address Schemes}, howpublished = {Cryptology ePrint Archive, Report 2020/548}, year = {2020}, url = {https://eprint.iacr.org/2020/548}, } @misc{cryptoeprint:2020:549, author = {Prasanna Ravi and Shivam Bhasin and Sujoy Sinha Roy and Anupam Chattopadhyay}, title = {Drop by Drop you break the rock - Exploiting generic vulnerabilities in Lattice-based PKE/KEMs using EM-based Physical Attacks}, howpublished = {Cryptology ePrint Archive, Report 2020/549}, year = {2020}, url = {https://eprint.iacr.org/2020/549}, } @misc{cryptoeprint:2020:550, author = {Ruiyu Zhu and Changchang Ding and Yan Huang}, title = {Practical MPC+FHE with Applications in Secure Multi-PartyNeural Network Evaluation}, howpublished = {Cryptology ePrint Archive, Report 2020/550}, year = {2020}, url = {https://eprint.iacr.org/2020/550}, } @misc{cryptoeprint:2020:551, author = {Naoki Shibayama and Yasutaka Igarashi and Toshinobu Kaneko}, title = {Higher Order Differential Attack against Full-Round BIG}, howpublished = {Cryptology ePrint Archive, Report 2020/551}, year = {2020}, url = {https://eprint.iacr.org/2020/551}, } @misc{cryptoeprint:2020:552, author = {Joon-Woo Lee and Eunsang Lee and Yongwoo Lee and Young-Sik Kim and Jong-Seon No}, title = {Optimal Minimax Polynomial Approximation of Modular Reduction for Bootstrapping of Approximate Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/552}, year = {2020}, url = {https://eprint.iacr.org/2020/552}, } @misc{cryptoeprint:2020:553, author = {Hu Xiong and Jinhao Chen and Minghao Yang and Xin Huang}, title = {Revocable Attribute-based Encryption Scheme with Arithmetic Span Program for Cloud-Assisted IoT}, howpublished = {Cryptology ePrint Archive, Report 2020/553}, year = {2020}, url = {https://eprint.iacr.org/2020/553}, } @misc{cryptoeprint:2020:554, author = {Lukas Aumayr and Oguzhan Ersoy and Andreas Erwig and Sebastian Faust and Kristina Hostáková and Matteo Maffei and Pedro Moreno-Sanchez and Siavash Riahi}, title = {Bitcoin-Compatible Virtual Channels}, howpublished = {Cryptology ePrint Archive, Report 2020/554}, year = {2020}, url = {https://eprint.iacr.org/2020/554}, } @misc{cryptoeprint:2020:555, author = {Lisa Eckey and Sebastian Faust and Kristina Hostáková and Stefanie Roos}, title = {Splitting Payments Locally While Routing Interdimensionally}, howpublished = {Cryptology ePrint Archive, Report 2020/555}, year = {2020}, url = {https://eprint.iacr.org/2020/555}, } @misc{cryptoeprint:2020:556, author = {Jean-Claude Caraco and Rémi Géraud-Stewart and David Naccache}, title = {Kerckhoffs' Legacy}, howpublished = {Cryptology ePrint Archive, Report 2020/556}, year = {2020}, url = {https://eprint.iacr.org/2020/556}, } @misc{cryptoeprint:2020:557, author = {Lilya Budaghyan and Nikolay Kaleyski and Constanza Riera and Pantelimon Stanica}, title = {On the sensitivity of some APN permutations to swapping points}, howpublished = {Cryptology ePrint Archive, Report 2020/557}, year = {2020}, url = {https://eprint.iacr.org/2020/557}, } @misc{cryptoeprint:2020:558, author = {Bijan Fadaeinia and Thorben Moos and Amir Moradi}, title = {BSPL: Balanced Static Power Logic}, howpublished = {Cryptology ePrint Archive, Report 2020/558}, year = {2020}, url = {https://eprint.iacr.org/2020/558}, } @misc{cryptoeprint:2020:559, author = {Giuseppe Garofalo and Tim Van hamme and Davy Preuveneers and Wouter Joosen and Aysajan Abidin and Mustafa A. Mustafa}, title = {Striking the Balance: Effective yet Privacy Friendly Contact Tracing}, howpublished = {Cryptology ePrint Archive, Report 2020/559}, year = {2020}, url = {https://eprint.iacr.org/2020/559}, } @misc{cryptoeprint:2020:560, author = {Alexander Chepurnoy and Amitabh Saxena}, title = {ZeroJoin: Combining ZeroCoin and CoinJoin}, howpublished = {Cryptology ePrint Archive, Report 2020/560}, year = {2020}, url = {https://eprint.iacr.org/2020/560}, } @misc{cryptoeprint:2020:561, author = {Fukang Liu and Takanori Isobe and Willi Meier}, title = {Exploiting Weak Diffusion of Gimli: A Full-Round Distinguisher and Reduced-Round Preimage Attacks}, howpublished = {Cryptology ePrint Archive, Report 2020/561}, year = {2020}, url = {https://eprint.iacr.org/2020/561}, } @misc{cryptoeprint:2020:562, author = {Hocheol Shin and Juhwan Noh and Dohyun Kim and Yongdae Kim}, title = {The System That Cried Wolf: Sensor Security Analysis of Wide-area Smoke Detectors for Critical Infrastructure}, howpublished = {Cryptology ePrint Archive, Report 2020/562}, year = {2020}, url = {https://eprint.iacr.org/2020/562}, } @misc{cryptoeprint:2020:563, author = {Marcelo Blatt and Alexander Gusev and Yuriy Polyakov and Shafi Goldwasser}, title = {Secure large-scale genome-wide association studies using homomorphic encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/563}, year = {2020}, url = {https://eprint.iacr.org/2020/563}, } @misc{cryptoeprint:2020:564, author = {Mahmoud Yehia and Riham AlTawy and T. Aaron Gulliver}, title = {Hash-based Signatures Revisited: A Dynamic FORS with Adaptive Chosen Message Security}, howpublished = {Cryptology ePrint Archive, Report 2020/564}, year = {2020}, url = {https://eprint.iacr.org/2020/564}, } @misc{cryptoeprint:2020:565, author = {Jinkyu Cho and Young-Sik Kim and Jong-Seon No}, title = {Homomorphic Computation in Reed-Muller Codes}, howpublished = {Cryptology ePrint Archive, Report 2020/565}, year = {2020}, url = {https://eprint.iacr.org/2020/565}, } @misc{cryptoeprint:2020:566, author = {Auqib Hamid Lone and Roohie Naaz}, title = {Reputation Driven Dynamic Access Control Framework for IoT atop PoA Ethereum Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2020/566}, year = {2020}, url = {https://eprint.iacr.org/2020/566}, } @misc{cryptoeprint:2020:567, author = {Yi Liu and Qi Wang and Siu-Ming Yiu}, title = {An Improvement of Multi-Exponentiation with Encrypted Bases Argument: Smaller and Faster}, howpublished = {Cryptology ePrint Archive, Report 2020/567}, year = {2020}, url = {https://eprint.iacr.org/2020/567}, } @misc{cryptoeprint:2020:568, author = {Tomer Ashur and Siemen Dhooghe}, title = {Prelude to Marvellous (With the Designers' Commentary, Two Bonus Tracks, and a Foretold Prophecy)}, howpublished = {Cryptology ePrint Archive, Report 2020/568}, year = {2020}, url = {https://eprint.iacr.org/2020/568}, } @misc{cryptoeprint:2020:569, author = {Carla Ràfols and Javier Silva}, title = {QA-NIZK Arguments of Same Opening for Bilateral Commitments}, howpublished = {Cryptology ePrint Archive, Report 2020/569}, year = {2020}, url = {https://eprint.iacr.org/2020/569}, } @misc{cryptoeprint:2020:570, author = {Dušan Božilov}, title = {On Optimality of d + 1 TI Shared Functions of 8 Bits or Less}, howpublished = {Cryptology ePrint Archive, Report 2020/570}, year = {2020}, url = {https://eprint.iacr.org/2020/570}, } @misc{cryptoeprint:2020:571, author = {Anubhab Baksi and Jakub Breier and Xiaoyang Dong and Chen Yi}, title = {Machine Learning Assisted Differential Distinguishers For Lightweight Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2020/571}, year = {2020}, url = {https://eprint.iacr.org/2020/571}, } @misc{cryptoeprint:2020:572, author = {Marina Polubelova and Karthikeyan Bhargavan and Jonathan Protzenko and Benjamin Beurdouche and Aymeric Fromherz and Natalia Kulatova and Santiago Zanella-Béguelin}, title = {HACL×N: Verified Generic SIMD Crypto (for all your favorite platforms)}, howpublished = {Cryptology ePrint Archive, Report 2020/572}, year = {2020}, url = {https://eprint.iacr.org/2020/572}, } @misc{cryptoeprint:2020:573, author = {Christopher Patton and Thomas Shrimpton}, title = {Quantifying the Security Cost of Migrating Protocols to Practice}, howpublished = {Cryptology ePrint Archive, Report 2020/573}, year = {2020}, url = {https://eprint.iacr.org/2020/573}, } @misc{cryptoeprint:2020:574, author = {Ming Li, Anjia Yang, Xinkai Chen}, title = {Towards Interpreting Smart Contract against Contract Fraud: A Practical and Automatic Realization}, howpublished = {Cryptology ePrint Archive, Report 2020/574}, year = {2020}, url = {https://eprint.iacr.org/2020/574}, } @misc{cryptoeprint:2020:575, author = {Sanjit Chatterjee and R. Kabaleeshwaran}, title = {From Rerandomizability to Sequential Aggregation: Efficient Signature Schemes Based on SXDH Assumption}, howpublished = {Cryptology ePrint Archive, Report 2020/575}, year = {2020}, url = {https://eprint.iacr.org/2020/575}, } @misc{cryptoeprint:2020:576, author = {Yuval Ishai}, title = {How Low Can We Go?}, howpublished = {Cryptology ePrint Archive, Report 2020/576}, year = {2020}, url = {https://eprint.iacr.org/2020/576}, } @misc{cryptoeprint:2020:577, author = {Michel Abdalla and Dario Catalano and Romain Gay and Bogdan Ursu}, title = {Inner-Product Functional Encryption with Fine-Grained Access Control}, howpublished = {Cryptology ePrint Archive, Report 2020/577}, year = {2020}, url = {https://eprint.iacr.org/2020/577}, } @misc{cryptoeprint:2020:578, author = {Zhuotao Liu and Yangxi Xiang and Jian Shi and Peng Gao and Haoyu Wang and Xusheng Xiao and Bihan Wen and Yih-Chun Hu}, title = {HyperService: Interoperability and Programmability Across Heterogeneous Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2020/578}, year = {2020}, url = {https://eprint.iacr.org/2020/578}, } @misc{cryptoeprint:2020:579, author = {Darrow R Hartman}, title = {BitFund: A Benevolent Blockchain Funding Network }, howpublished = {Cryptology ePrint Archive, Report 2020/579}, year = {2020}, url = {https://eprint.iacr.org/2020/579}, } @misc{cryptoeprint:2020:580, author = {Alexei Zamyatin and Zeta Avarikioti and Daniel Perez and William J. Knottenbelt}, title = {TxChain: Efficient Cryptocurrency Light Clients via Contingent Transaction Aggregation}, howpublished = {Cryptology ePrint Archive, Report 2020/580}, year = {2020}, url = {https://eprint.iacr.org/2020/580}, } @misc{cryptoeprint:2020:581, author = {Benny Applebaum and Eliran Kachlon and Arpita Patra}, title = {The Round Complexity of Perfect MPC with Active Security and Optimal Resiliency}, howpublished = {Cryptology ePrint Archive, Report 2020/581}, year = {2020}, url = {https://eprint.iacr.org/2020/581}, } @misc{cryptoeprint:2020:582, author = {Archanaa S. Krishnan and Yaling Yang and Patrick Schaumont}, title = {Risk and Architecture factors in Digital Exposure Notification}, howpublished = {Cryptology ePrint Archive, Report 2020/582}, year = {2020}, url = {https://eprint.iacr.org/2020/582}, } @misc{cryptoeprint:2020:583, author = {Xie Zhijie and Zhang Min and Yin Anqi and Li Zhenhan}, title = {A New Targeted Password Guessing Model}, howpublished = {Cryptology ePrint Archive, Report 2020/583}, year = {2020}, url = {https://eprint.iacr.org/2020/583}, } @misc{cryptoeprint:2020:584, author = {Seunghwa Lee and Hankyung Ko and Jihye Kim and Hyunok Oh}, title = {vCNN: Verifiable Convolutional Neural Network}, howpublished = {Cryptology ePrint Archive, Report 2020/584}, year = {2020}, url = {https://eprint.iacr.org/2020/584}, } @misc{cryptoeprint:2020:585, author = {Satoshi Okada and Yuntao Wang and Tsuyoshi Takagi}, title = {Improving Key Mismatch Attack on NewHope with Fewer Queries}, howpublished = {Cryptology ePrint Archive, Report 2020/585}, year = {2020}, url = {https://eprint.iacr.org/2020/585}, } @misc{cryptoeprint:2020:586, author = {Ellie Daw}, title = {Component-Based Comparison of Privacy-First Exposure Notification Protocols}, howpublished = {Cryptology ePrint Archive, Report 2020/586}, year = {2020}, url = {https://eprint.iacr.org/2020/586}, } @misc{cryptoeprint:2020:587, author = {Syh-Yuan Tan and Thomas Gross}, title = {MoniPoly---An Expressive $q$-SDH-Based Anonymous Attribute-Based Credential System}, howpublished = {Cryptology ePrint Archive, Report 2020/587}, year = {2020}, url = {https://eprint.iacr.org/2020/587}, } @misc{cryptoeprint:2020:588, author = {ZaHyun Koo and Jong-Seon No and Young-Sik Kim}, title = {Reduction from Module-SIS to Ring-SIS Under Norm Constraint of Ring-SIS}, howpublished = {Cryptology ePrint Archive, Report 2020/588}, year = {2020}, url = {https://eprint.iacr.org/2020/588}, } @misc{cryptoeprint:2020:589, author = {Mykhailo Kasianchuk and Mikolaj Karpinski and Roman Kochan and Volodymyr Karpinskyi and Grzegorz Litawa and Inna Shylinska and Igor Yakymenko}, title = {Developing Symmetric Encryption Methods Based On Residue Number System And Investigating Their Cryptosecurity}, howpublished = {Cryptology ePrint Archive, Report 2020/589}, year = {2020}, url = {https://eprint.iacr.org/2020/589}, } @misc{cryptoeprint:2020:590, author = {Jun Wan and Hanshen Xiao and Elaine Shi and Srinivas Devadas}, title = {Expected Constant Round Byzantine Broadcast under Dishonest Majority}, howpublished = {Cryptology ePrint Archive, Report 2020/590}, year = {2020}, url = {https://eprint.iacr.org/2020/590}, } @misc{cryptoeprint:2020:591, author = {Fukang Liu and Takanori Isobe and Willi Meier}, title = {Automatic Verification of Differential Characteristics: Application to Reduced Gimli}, howpublished = {Cryptology ePrint Archive, Report 2020/591}, year = {2020}, url = {https://eprint.iacr.org/2020/591}, } @misc{cryptoeprint:2020:592, author = {Nishat Koti and Mahak Pancholi and Arpita Patra and Ajith Suresh}, title = {SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning}, howpublished = {Cryptology ePrint Archive, Report 2020/592}, year = {2020}, url = {https://eprint.iacr.org/2020/592}, } @misc{cryptoeprint:2020:593, author = {Claire Ye and Chinedu Ojukwu and Anthony Hsu and Ruiqi Hu}, title = {Alt-Coin Traceability}, howpublished = {Cryptology ePrint Archive, Report 2020/593}, year = {2020}, url = {https://eprint.iacr.org/2020/593}, } @misc{cryptoeprint:2020:594, author = {Jean-Francois Biasse and Giacomo Micheli and Edoardo Persichetti and Paolo Santini}, title = {LESS is More: Code-Based Signatures without Syndromes}, howpublished = {Cryptology ePrint Archive, Report 2020/594}, year = {2020}, url = {https://eprint.iacr.org/2020/594}, } @misc{cryptoeprint:2020:595, author = {Masahito Ishizaka and Shinsaku Kiyomoto}, title = {Time-Specific Encryption with Constant-Size Secret-Keys Secure under Standard Assumption}, howpublished = {Cryptology ePrint Archive, Report 2020/595}, year = {2020}, url = {https://eprint.iacr.org/2020/595}, } @misc{cryptoeprint:2020:596, author = {Tore Vincent Carstens and Ehsan Ebrahimi and Gelo Tabia and and Dominique Unruh}, title = {On quantum indistinguishability under chosen plaintext attack}, howpublished = {Cryptology ePrint Archive, Report 2020/596}, year = {2020}, url = {https://eprint.iacr.org/2020/596}, } @misc{cryptoeprint:2020:597, author = {Kalle Ngo and Elena Dubrova and Michail Moraitis}, title = {Bitstream Modification of Trivium}, howpublished = {Cryptology ePrint Archive, Report 2020/597}, year = {2020}, url = {https://eprint.iacr.org/2020/597}, } @misc{cryptoeprint:2020:598, author = {Alex Biryukov and Aleksei Udovenko and Giuseppe Vitto}, title = {Cryptanalysis of Au et al. Dynamic Universal Accumulator}, howpublished = {Cryptology ePrint Archive, Report 2020/598}, year = {2020}, url = {https://eprint.iacr.org/2020/598}, } @misc{cryptoeprint:2020:599, author = {Prasad Buddhavarapu and Andrew Knox and Payman Mohassel and Shubho Sengupta and Erik Taubeneck and Vlad Vlaskin }, title = {Private Matching for Compute}, howpublished = {Cryptology ePrint Archive, Report 2020/599}, year = {2020}, url = {https://eprint.iacr.org/2020/599}, } @misc{cryptoeprint:2020:600, author = {Saikrishna Badrinarayanan and Peihan Miao and Peter Rindal}, title = {Multi-Party Threshold Private Set Intersection with Sublinear Communication}, howpublished = {Cryptology ePrint Archive, Report 2020/600}, year = {2020}, url = {https://eprint.iacr.org/2020/600}, } @misc{cryptoeprint:2020:601, author = {Amir Dembo and Sreeram Kannan and Ertem Nusret Tas and David Tse and Pramod Viswanath and Xuechao Wang and Ofer Zeitouni}, title = {Everything is a Race and Nakamoto Always Wins}, howpublished = {Cryptology ePrint Archive, Report 2020/601}, year = {2020}, url = {https://eprint.iacr.org/2020/601}, } @misc{cryptoeprint:2020:602, author = {Arghya Bhattarcharjee and Avijit Dutta and Eik List and Mridul Nandi}, title = {CENCPP - Beyond-birthday-secure Encryption from Public Permutations}, howpublished = {Cryptology ePrint Archive, Report 2020/602}, year = {2020}, url = {https://eprint.iacr.org/2020/602}, } @misc{cryptoeprint:2020:603, author = {Gilles Barthe and Marc Gourjon and Benjamin Gregoire and Maximilian Orlt and Clara Paglialonga and Lars Porth}, title = {Masking in Fine-Grained Leakage Models: Construction, Implementation and Verification}, howpublished = {Cryptology ePrint Archive, Report 2020/603}, year = {2020}, url = {https://eprint.iacr.org/2020/603}, } @misc{cryptoeprint:2020:604, author = {T-H. Hubert Chan and Wei-Kai Lin and Kartik Nayak and Elaine Shi}, title = {Perfectly Secure Oblivious Parallel RAM with $O(\log^3 N/ \log \log N)$ Overhead}, howpublished = {Cryptology ePrint Archive, Report 2020/604}, year = {2020}, url = {https://eprint.iacr.org/2020/604}, } @misc{cryptoeprint:2020:605, author = {Artur Mariano}, title = {LUSA: the HPC library for lattice-based cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2020/605}, year = {2020}, url = {https://eprint.iacr.org/2020/605}, } @misc{cryptoeprint:2020:606, author = {Navid Alamati and Hart Montgomery and Sikhar Patranabis}, title = {Ring Key-Homomorphic Weak PRFs and Applications}, howpublished = {Cryptology ePrint Archive, Report 2020/606}, year = {2020}, url = {https://eprint.iacr.org/2020/606}, } @misc{cryptoeprint:2020:607, author = {Andrea Caforio and Fatih Balli and Subhadeep Banik}, title = {Energy Analysis of Lightweight AEAD Circuits}, howpublished = {Cryptology ePrint Archive, Report 2020/607}, year = {2020}, url = {https://eprint.iacr.org/2020/607}, } @misc{cryptoeprint:2020:608, author = {Fatih Balli and Andrea Caforio and Subhadeep Banik}, title = {Low-latency Meets Low-area: An Improved Bit-Sliding Technique for AES, SKINNY and GIFT}, howpublished = {Cryptology ePrint Archive, Report 2020/608}, year = {2020}, url = {https://eprint.iacr.org/2020/608}, } @misc{cryptoeprint:2020:609, author = {Behnaz Rezvani and Thomas Conroy and Luke Beckwith and Matthew Bozzay and Trevor Laffoon and David McFeeters and Yijia Shi and Minh Vu and William Diehl}, title = {Efficient Simultaneous Deployment of Multiple Lightweight Authenticated Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2020/609}, year = {2020}, url = {https://eprint.iacr.org/2020/609}, } @misc{cryptoeprint:2020:610, author = {Navid Alamati and Hart Montgomery and Sikhar Patranabis}, title = {Stronger Multilinear Maps from Indistinguishability Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2020/610}, year = {2020}, url = {https://eprint.iacr.org/2020/610}, } @misc{cryptoeprint:2020:611, author = {Rami Elkhatib and Reza Azarderakhsh and Mehran Mozaffari-Kermani}, title = {Efficient and Fast Hardware Architectures for SIKE Round 2 on FPGA}, howpublished = {Cryptology ePrint Archive, Report 2020/611}, year = {2020}, url = {https://eprint.iacr.org/2020/611}, } @misc{cryptoeprint:2020:612, author = {Jeroen Pijnenburg and Bertram Poettering}, title = {Key Assignment Schemes with Authenticated Encryption, revisited}, howpublished = {Cryptology ePrint Archive, Report 2020/612}, year = {2020}, url = {https://eprint.iacr.org/2020/612}, } @misc{cryptoeprint:2020:613, author = {Tomoki Moriya and Hiroshi Onuki and Tsuyoshi Takagi}, title = {SiGamal: A supersingular isogeny-based PKE and its application to a PRF}, howpublished = {Cryptology ePrint Archive, Report 2020/613}, year = {2020}, url = {https://eprint.iacr.org/2020/613}, } @misc{cryptoeprint:2020:614, author = {Amit Deo and Benoit Libert and Khoa Nguyen and Olivier Sanders}, title = {Lattice-Based E-Cash, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2020/614}, year = {2020}, url = {https://eprint.iacr.org/2020/614}, } @misc{cryptoeprint:2020:615, author = {Diego F. Aranha and Felipe Rodrigues Novaes and Akira Takahashi and Mehdi Tibouchi and Yuval Yarom}, title = {LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage}, howpublished = {Cryptology ePrint Archive, Report 2020/615}, year = {2020}, url = {https://eprint.iacr.org/2020/615}, } @misc{cryptoeprint:2020:616, author = {Sanjam Garg and Romain Gay and Mohammad Hajiabadi}, title = {Master-Key KDM-Secure IBE from Pairings}, howpublished = {Cryptology ePrint Archive, Report 2020/616}, year = {2020}, url = {https://eprint.iacr.org/2020/616}, } @misc{cryptoeprint:2020:617, author = {Rachit Garg and George Lu and Brent Waters}, title = {New Techniques in Replica Encodings with Client Setup}, howpublished = {Cryptology ePrint Archive, Report 2020/617}, year = {2020}, url = {https://eprint.iacr.org/2020/617}, } @misc{cryptoeprint:2020:618, author = {Ivan Damgård and Sophia Yakoubov}, title = {Bounds on Ad Hoc Threshold Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/618}, year = {2020}, url = {https://eprint.iacr.org/2020/618}, } @misc{cryptoeprint:2020:619, author = {Viet Tung Hoang and Yaobin Shen}, title = {Security Analysis of NIST CTR-DRBG}, howpublished = {Cryptology ePrint Archive, Report 2020/619}, year = {2020}, url = {https://eprint.iacr.org/2020/619}, } @misc{cryptoeprint:2020:620, author = {Ben Kreuter and Sarvar Patel and Ben Terner}, title = {Private Identity Agreement for Private Set Functionalities}, howpublished = {Cryptology ePrint Archive, Report 2020/620}, year = {2020}, url = {https://eprint.iacr.org/2020/620}, } @misc{cryptoeprint:2020:621, author = {Junbin Fang and Dominique Unruh and Jian Weng and Jun Yan and Dehua Zhou}, title = {How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment?}, howpublished = {Cryptology ePrint Archive, Report 2020/621}, year = {2020}, url = {https://eprint.iacr.org/2020/621}, } @misc{cryptoeprint:2020:622, author = {Yao Jiang}, title = {The Direction of Updatable Encryption does not Matter Much}, howpublished = {Cryptology ePrint Archive, Report 2020/622}, year = {2020}, url = {https://eprint.iacr.org/2020/622}, } @misc{cryptoeprint:2020:623, author = {Jason H. M. Ying and Shuwei Cao and Geong Sen Poh and Jia Xu and Hoon Wei Lim}, title = {PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions}, howpublished = {Cryptology ePrint Archive, Report 2020/623}, year = {2020}, url = {https://eprint.iacr.org/2020/623}, } @misc{cryptoeprint:2020:624, author = {Marek Wójtowicz}, title = {RSA for poor men: a cryptosystem based on probable primes to base 2 numbers}, howpublished = {Cryptology ePrint Archive, Report 2020/624}, year = {2020}, url = {https://eprint.iacr.org/2020/624}, } @misc{cryptoeprint:2020:625, author = {Mariya Bessonov and Dima Grigoriev and Vladimir Shpilrain}, title = {Probability theory and public-key cryptography}, howpublished = {Cryptology ePrint Archive, Report 2020/625}, year = {2020}, url = {https://eprint.iacr.org/2020/625}, } @misc{cryptoeprint:2020:626, author = {Paolo Zappalà and Marianna Belotti and Maria Potop-Butucaru and Stefano Secci}, title = {Game theoretical framework for analyzing Blockchains Robustness}, howpublished = {Cryptology ePrint Archive, Report 2020/626}, year = {2020}, url = {https://eprint.iacr.org/2020/626}, } @misc{cryptoeprint:2020:627, author = {Duke Leto and The Hush Developers}, title = {Attacking Zcash For Fun And Profit}, howpublished = {Cryptology ePrint Archive, Report 2020/627}, year = {2020}, url = {https://eprint.iacr.org/2020/627}, } @misc{cryptoeprint:2020:628, author = {Daniele Di Tullio and Manoj Gyawali}, title = {A post-quantum key exchange protocol from the intersection of quadric surfaces}, howpublished = {Cryptology ePrint Archive, Report 2020/628}, year = {2020}, url = {https://eprint.iacr.org/2020/628}, } @misc{cryptoeprint:2020:629, author = {Vivek Arte and Mihir Bellare}, title = {Dual-Mode NIZKs: Possibility and Impossibility Results for Property Transfer}, howpublished = {Cryptology ePrint Archive, Report 2020/629}, year = {2020}, url = {https://eprint.iacr.org/2020/629}, } @misc{cryptoeprint:2020:630, author = {Zhiguo Wan and Xiaotong Liu}, title = {ContactChaser: A Simple yet Effective Contact Tracing Scheme with Strong Privacy}, howpublished = {Cryptology ePrint Archive, Report 2020/630}, year = {2020}, url = {https://eprint.iacr.org/2020/630}, } @misc{cryptoeprint:2020:631, author = {Jean-Sébastien Coron and Luca Notarnicola and Gabor Wiese}, title = {Simultaneous Diagonalization of Incomplete Matrices and Applications}, howpublished = {Cryptology ePrint Archive, Report 2020/631}, year = {2020}, url = {https://eprint.iacr.org/2020/631}, } @misc{cryptoeprint:2020:632, author = {Sadegh Sadeghi and Vincent Rijmen and Nasour Bagheri}, title = {Proposing an MILP-based Method for the Experimental Verification of Difference Trails}, howpublished = {Cryptology ePrint Archive, Report 2020/632}, year = {2020}, url = {https://eprint.iacr.org/2020/632}, } @misc{cryptoeprint:2020:633, author = {Péter Kutas and Chloe Martindale and Lorenz Panny and Christophe Petit and Katherine E. Stange}, title = {Weak instances of SIDH variants under improved torsion-point attacks}, howpublished = {Cryptology ePrint Archive, Report 2020/633}, year = {2020}, url = {https://eprint.iacr.org/2020/633}, } @misc{cryptoeprint:2020:634, author = {David Knichel and Pascal Sasdrich and Amir Moradi}, title = {SILVER - Statistical Independence and Leakage Verification}, howpublished = {Cryptology ePrint Archive, Report 2020/634}, year = {2020}, url = {https://eprint.iacr.org/2020/634}, } @misc{cryptoeprint:2020:635, author = {Pedro Branco and Nico Döttling and Paulo Mateus }, title = {Two-Round Oblivious Linear Evaluation from Learning with Errors}, howpublished = {Cryptology ePrint Archive, Report 2020/635}, year = {2020}, url = {https://eprint.iacr.org/2020/635}, } @misc{cryptoeprint:2020:636, author = {Erik-Oliver Blass and Florian Kerschbaum}, title = {Mixed-Technique, Maliciously-Secure, and Composed Multi-Party Computations}, howpublished = {Cryptology ePrint Archive, Report 2020/636}, year = {2020}, url = {https://eprint.iacr.org/2020/636}, } @misc{cryptoeprint:2020:637, author = {Anish Saxena and Biswabandan Panda}, title = {DABANGG: Time for Fearless Flush based Cache Attacks}, howpublished = {Cryptology ePrint Archive, Report 2020/637}, year = {2020}, url = {https://eprint.iacr.org/2020/637}, } @misc{cryptoeprint:2020:638, author = {Jeffrey Burdges and Luca De Feo}, title = {Delay Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/638}, year = {2020}, url = {https://eprint.iacr.org/2020/638}, } @misc{cryptoeprint:2020:639, author = {Anne Broadbent and Raza Ali Kazmi}, title = {Indistinguishability obfuscation for quantum circuits of low T-count}, howpublished = {Cryptology ePrint Archive, Report 2020/639}, year = {2020}, url = {https://eprint.iacr.org/2020/639}, } @misc{cryptoeprint:2020:640, author = {Kyungbae Jang and Seungjoo Choi and Hyeokdong Kwon and Hwajeong Seo}, title = {Grover on SPECK: Quantum Resource Estimates}, howpublished = {Cryptology ePrint Archive, Report 2020/640}, year = {2020}, url = {https://eprint.iacr.org/2020/640}, } @misc{cryptoeprint:2020:641, author = {Jeff Burdges and Alfonso Cevallos and Peter Czaban and Rob Habermeier and Syed Hosseini and Fabio Lama and Handan Kilinc Alper and Ximin Luo and Fatemeh Shirazi and Alistair Stewart and Gavin Wood}, title = {Overview of Polkadot and its Design Considerations}, howpublished = {Cryptology ePrint Archive, Report 2020/641}, year = {2020}, url = {https://eprint.iacr.org/2020/641}, } @misc{cryptoeprint:2020:642, author = {Henri Aare and Peter Vitols}, title = {The Ritva Blockchain: Enabling Confidential Transactions at Scale}, howpublished = {Cryptology ePrint Archive, Report 2020/642}, year = {2020}, url = {https://eprint.iacr.org/2020/642}, } @misc{cryptoeprint:2020:643, author = {Pascal Lafourcade and Marius Lombard-Platet}, title = {About Blockchain Interoperability}, howpublished = {Cryptology ePrint Archive, Report 2020/643}, year = {2020}, url = {https://eprint.iacr.org/2020/643}, } @misc{cryptoeprint:2020:644, author = {Ignacio Cascudo and Bernardo David}, title = {ALBATROSS: publicly AttestabLe BATched Randomness based On Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2020/644}, year = {2020}, url = {https://eprint.iacr.org/2020/644}, } @misc{cryptoeprint:2020:645, author = {Liliya Kraleva and Nikolai L. Manev and Vincent Rijmen }, title = {Correlation distribution analysis of a two-round key-alternating block cipher}, howpublished = {Cryptology ePrint Archive, Report 2020/645}, year = {2020}, url = {https://eprint.iacr.org/2020/645}, } @misc{cryptoeprint:2020:646, author = {Ward Beullens and Shuichi Katsumata and Federico Pintore}, title = {Calamari and Falafl: Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices}, howpublished = {Cryptology ePrint Archive, Report 2020/646}, year = {2020}, url = {https://eprint.iacr.org/2020/646}, } @misc{cryptoeprint:2020:647, author = {Saeid Esmaeilzade and Ziba Eslami and Nasrollah Pakniat}, title = {A simple generic construction to build oblivious transfer protocols from homomorphic encryption schemes}, howpublished = {Cryptology ePrint Archive, Report 2020/647}, year = {2020}, url = {https://eprint.iacr.org/2020/647}, } @misc{cryptoeprint:2020:648, author = {Yuncong Hu and Sam Kumar and Raluca Ada Popa}, title = {Ghostor: Toward a Secure Data-Sharing System from Decentralized Trust}, howpublished = {Cryptology ePrint Archive, Report 2020/648}, year = {2020}, url = {https://eprint.iacr.org/2020/648}, } @misc{cryptoeprint:2020:649, author = {Fuyuki Kitagawa and Takahiro Matsuda and Takashi Yamakawa}, title = {NIZK from SNARG}, howpublished = {Cryptology ePrint Archive, Report 2020/649}, year = {2020}, url = {https://eprint.iacr.org/2020/649}, } @misc{cryptoeprint:2020:650, author = {Feng Hao and Shen Wang and Samiran Bag and Rob Procter and Siamak Shahandashti and Maryam Mehrnezhad and Ehsan Toreini and Roberto Metere and Lana Liu}, title = {End-to-End Verifiable E-Voting Trial for Polling Station Voting at Gateshead}, howpublished = {Cryptology ePrint Archive, Report 2020/650}, year = {2020}, url = {https://eprint.iacr.org/2020/650}, } @misc{cryptoeprint:2020:651, author = {Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso}, title = {Cryptanalysis of ``FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things''}, howpublished = {Cryptology ePrint Archive, Report 2020/651}, year = {2020}, url = {https://eprint.iacr.org/2020/651}, } @misc{cryptoeprint:2020:652, author = {Prastudy Fauzi and Helger Lipmaa and Zaira Pindado and Janno Siim}, title = {Somewhere Statistically Binding Commitment Schemes with Applications}, howpublished = {Cryptology ePrint Archive, Report 2020/652}, year = {2020}, url = {https://eprint.iacr.org/2020/652}, } @misc{cryptoeprint:2020:653, author = {Zhen Hang Jiang and Yunsi Fei and Aidong Adam Ding and Thomas Wahl}, title = {MemPoline: Mitigating Memory-based Side-Channel Attacks through Memory Access Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2020/653}, year = {2020}, url = {https://eprint.iacr.org/2020/653}, } @misc{cryptoeprint:2020:654, author = {Eli Ben-Sasson and Dan Carmon and Yuval Ishai and Swastik Kopparty and Shubhangi Saraf}, title = {Proximity Gaps for Reed-Solomon Codes}, howpublished = {Cryptology ePrint Archive, Report 2020/654}, year = {2020}, url = {https://eprint.iacr.org/2020/654}, } @misc{cryptoeprint:2020:655, author = {Yoo-Seung Won and Dirmanto Jap and Shivam Bhasin}, title = {Push For More: On Comparison of Data Augmentation and SMOTE With Optimised Deep Learning Architecture For Side-Channel}, howpublished = {Cryptology ePrint Archive, Report 2020/655}, year = {2020}, url = {https://eprint.iacr.org/2020/655}, } @misc{cryptoeprint:2020:656, author = {Bishwajit Chakraborty and Soumya Chattopadhyay and Ashwin Jha and Mridul Nandi}, title = {On Length Independent Security Bounds for the PMAC Family}, howpublished = {Cryptology ePrint Archive, Report 2020/656}, year = {2020}, url = {https://eprint.iacr.org/2020/656}, } @misc{cryptoeprint:2020:657, author = {Chloé Hébant and David Pointcheval}, title = {Traceable Attribute-Based Anonymous Credentials}, howpublished = {Cryptology ePrint Archive, Report 2020/657}, year = {2020}, url = {https://eprint.iacr.org/2020/657}, } @misc{cryptoeprint:2020:658, author = {Masahito Ishizaka and Shinsaku Kiyomoto}, title = {Time-Specific Signatures}, howpublished = {Cryptology ePrint Archive, Report 2020/658}, year = {2020}, url = {https://eprint.iacr.org/2020/658}, } @misc{cryptoeprint:2020:659, author = {Alexander Maximov and Martin Hell}, title = {Software Evaluation of Grain-128AEAD for Embedded Platforms}, howpublished = {Cryptology ePrint Archive, Report 2020/659}, year = {2020}, url = {https://eprint.iacr.org/2020/659}, } @misc{cryptoeprint:2020:660, author = {Jing Tian and Piaoyang Wang and Zhe Liu and Jun Lin and Zhongfeng Wang and Johann Großschädl}, title = {Faster Software Implementation of the SIKE Protocol Based on A New Data Representation}, howpublished = {Cryptology ePrint Archive, Report 2020/660}, year = {2020}, url = {https://eprint.iacr.org/2020/660}, } @misc{cryptoeprint:2020:661, author = {Peter Gaži and Aggelos Kiayias and Alexander Russell}, title = {Tight Consistency Bounds for Bitcoin}, howpublished = {Cryptology ePrint Archive, Report 2020/661}, year = {2020}, url = {https://eprint.iacr.org/2020/661}, } @misc{cryptoeprint:2020:662, author = {John Cartlidge and Nigel P. Smart and Younes Talibi Alaoui}, title = {Multi-Party Computation Mechanism for Anonymous Equity Block Trading: A Secure Implementation of Turquoise Plato Uncross}, howpublished = {Cryptology ePrint Archive, Report 2020/662}, year = {2020}, url = {https://eprint.iacr.org/2020/662}, } @misc{cryptoeprint:2020:663, author = {Wei Dai and Stefano Tessaro and Xihu Zhang}, title = {Super-Linear Time-Memory Trade-Offs for Symmetric Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/663}, year = {2020}, url = {https://eprint.iacr.org/2020/663}, } @misc{cryptoeprint:2020:664, author = {Amos Beimel and Oriol Farràs}, title = {The Share Size of Secret-Sharing Schemes for Almost All Access Structures and Graphs}, howpublished = {Cryptology ePrint Archive, Report 2020/664}, year = {2020}, url = {https://eprint.iacr.org/2020/664}, } @misc{cryptoeprint:2020:665, author = {Jean Claude Bajard and Sylvain Duquesne}, title = {Montgomery-friendly primes and applications to cryptography}, howpublished = {Cryptology ePrint Archive, Report 2020/665}, year = {2020}, url = {https://eprint.iacr.org/2020/665}, } @misc{cryptoeprint:2020:666, author = {Chao Sun, Mehdi Tibouchi and Masayuki Abe}, title = {Revisiting the Hardness of Binary Error LWE}, howpublished = {Cryptology ePrint Archive, Report 2020/666}, year = {2020}, url = {https://eprint.iacr.org/2020/666}, } @misc{cryptoeprint:2020:667, author = {Sahiba Suryawanshi and Dhiman Saha and Satyam Sachan}, title = {New Results on the SymSum Distinguisher on Round-Reduced SHA3}, howpublished = {Cryptology ePrint Archive, Report 2020/667}, year = {2020}, url = {https://eprint.iacr.org/2020/667}, } @misc{cryptoeprint:2020:668, author = {Behzad Abdolmaleki and Helger Lipmaa and Janno Siim and Michał Zając}, title = {On Subversion-Resistant SNARKs}, howpublished = {Cryptology ePrint Archive, Report 2020/668}, year = {2020}, url = {https://eprint.iacr.org/2020/668}, } @misc{cryptoeprint:2020:669, author = {Avijit Dutta and Mridul Nandi and Abishanka Saha}, title = {Proof of Mirror Theory for $\xi_{\max}=2$}, howpublished = {Cryptology ePrint Archive, Report 2020/669}, year = {2020}, url = {https://eprint.iacr.org/2020/669}, } @misc{cryptoeprint:2020:670, author = {Crypto Group at IST Austria}, title = {Inverse-Sybil Attacks in Automated Contact Tracing}, howpublished = {Cryptology ePrint Archive, Report 2020/670}, year = {2020}, url = {https://eprint.iacr.org/2020/670}, } @misc{cryptoeprint:2020:671, author = {Sebastien Carre and Sylvain Guilley and Olivier Rioul}, title = {Persistent Fault Analysis With Few Encryptions}, howpublished = {Cryptology ePrint Archive, Report 2020/671}, year = {2020}, url = {https://eprint.iacr.org/2020/671}, } @misc{cryptoeprint:2020:672, author = {Leonie Reichert and Samuel Brack and Björn Scheuermann}, title = {A Survey of Automatic Contact Tracing Approaches}, howpublished = {Cryptology ePrint Archive, Report 2020/672}, year = {2020}, url = {https://eprint.iacr.org/2020/672}, } @misc{cryptoeprint:2020:673, author = {Wenbo MAO and Wenxiang WANG}, title = {LotMint: Blockchain Returning to Decentralization with Decentralized Clock}, howpublished = {Cryptology ePrint Archive, Report 2020/673}, year = {2020}, url = {https://eprint.iacr.org/2020/673}, } @misc{cryptoeprint:2020:674, author = {Chiara Spadafora and Riccardo Longo and Massimiliano Sala}, title = {Coercion-Resistant Blockchain-Based E-Voting Protocol}, howpublished = {Cryptology ePrint Archive, Report 2020/674}, year = {2020}, url = {https://eprint.iacr.org/2020/674}, } @misc{cryptoeprint:2020:675, author = {Matthias Fitzi and Peter Gazi and Aggelos Kiayias and Alexander Russell}, title = {Ledger Combiners for Fast Settlement}, howpublished = {Cryptology ePrint Archive, Report 2020/675}, year = {2020}, url = {https://eprint.iacr.org/2020/675}, } @misc{cryptoeprint:2020:676, author = {Riad S. Wahby and Dan Boneh and Christopher Jeffrey and Joseph Poon}, title = {An airdrop that preserves recipient privacy}, howpublished = {Cryptology ePrint Archive, Report 2020/676}, year = {2020}, url = {https://eprint.iacr.org/2020/676}, } @misc{cryptoeprint:2020:677, author = {T-H. Hubert Chan and Naomi Ephraim and Antonio Marcedone and Andrew Morgan and Rafael Pass and Elaine Shi}, title = {Blockchain with Varying Number of Players}, howpublished = {Cryptology ePrint Archive, Report 2020/677}, year = {2020}, url = {https://eprint.iacr.org/2020/677}, } @misc{cryptoeprint:2020:678, author = {Alexander Munch-Hansen and Claudio Orlandi and Sophia Yakoubov}, title = {Stronger Notions and a More Efficient Construction of Threshold Ring Signatures}, howpublished = {Cryptology ePrint Archive, Report 2020/678}, year = {2020}, url = {https://eprint.iacr.org/2020/678}, } @misc{cryptoeprint:2020:679, author = {Shashank Agrawal and Saikrishna Badrinarayanan and Payman Mohassel and Pratyay Mukherjee and Sikhar Patranabis}, title = {BETA: Biometric Enabled Threshold Authentication}, howpublished = {Cryptology ePrint Archive, Report 2020/679}, year = {2020}, url = {https://eprint.iacr.org/2020/679}, } @misc{cryptoeprint:2020:680, author = {Sumanta Sarkar and Yu Sasaki and Siang Meng Sim}, title = {On the design of Bit Permutation Based Ciphers - The Interplay Among S-box, Bit Permutation and Key-addition}, howpublished = {Cryptology ePrint Archive, Report 2020/680}, year = {2020}, url = {https://eprint.iacr.org/2020/680}, } @misc{cryptoeprint:2020:681, author = {Vittorio Zaccaria}, title = {An F-algebra for analysing information leaks in the presence of glitches}, howpublished = {Cryptology ePrint Archive, Report 2020/681}, year = {2020}, url = {https://eprint.iacr.org/2020/681}, } @misc{cryptoeprint:2020:682, author = {Patrick Towa and Damien Vergnaud}, title = {Succinct Diophantine-Satisfiability Arguments}, howpublished = {Cryptology ePrint Archive, Report 2020/682}, year = {2020}, url = {https://eprint.iacr.org/2020/682}, } @misc{cryptoeprint:2020:683, author = {Abida Haque and Stephan Krenn and Daniel Slamanig and Christoph Striecks}, title = {Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model}, howpublished = {Cryptology ePrint Archive, Report 2020/683}, year = {2020}, url = {https://eprint.iacr.org/2020/683}, } @misc{cryptoeprint:2020:684, author = {Ghada Arfaoui and Olivier Blazy and Xavier Bultel and Pierre-Alain Fouque and Adina Nedelcu and Cristina Onete}, title = {Legally keeping secrets from mobile operators: Lawful Interception Key Exchange (LIKE)}, howpublished = {Cryptology ePrint Archive, Report 2020/684}, year = {2020}, url = {https://eprint.iacr.org/2020/684}, } @misc{cryptoeprint:2020:685, author = {Leo de Castro and Chiraag Juvekar and Vinod Vaikuntanathan}, title = {Fast Vector Oblivious Linear Evaluation from Ring Learning with Errors}, howpublished = {Cryptology ePrint Archive, Report 2020/685}, year = {2020}, url = {https://eprint.iacr.org/2020/685}, } @misc{cryptoeprint:2020:686, author = {Chintan Patel and Nishant Doshi}, title = {A Level Dependent Authentication for IoT Paradigm}, howpublished = {Cryptology ePrint Archive, Report 2020/686}, year = {2020}, url = {https://eprint.iacr.org/2020/686}, } @misc{cryptoeprint:2020:687, author = {Dror Chawin and Iftach Haitner and Noam Mazor}, title = {Lower Bounds on the Time/Memory Tradeoff of Function Inversion}, howpublished = {Cryptology ePrint Archive, Report 2020/687}, year = {2020}, url = {https://eprint.iacr.org/2020/687}, } @misc{cryptoeprint:2020:688, author = {Anton A. Sokolov}, title = {Lin2-Xor Lemma and Log-size Linkable Ring Signature}, howpublished = {Cryptology ePrint Archive, Report 2020/688}, year = {2020}, url = {https://eprint.iacr.org/2020/688}, } @misc{cryptoeprint:2020:689, author = {Orr Dunkelman and Senyang Huang and Eran Lambooij and Stav Perle}, title = {Single Tweakey Cryptanalysis of Reduced-Round SKINNY-64}, howpublished = {Cryptology ePrint Archive, Report 2020/689}, year = {2020}, url = {https://eprint.iacr.org/2020/689}, } @misc{cryptoeprint:2020:690, author = {Johannes Buchmann and Ghada Dessouky and Tommaso Frassetto and Ágnes Kiss and Ahmad-Reza Sadeghi and Thomas Schneider and Giulia Traverso and Shaza Zeitouni}, title = {SAFE: A Secure and Efficient Long-Term Distributed Storage System}, howpublished = {Cryptology ePrint Archive, Report 2020/690}, year = {2020}, url = {https://eprint.iacr.org/2020/690}, } @misc{cryptoeprint:2020:691, author = {Diego Aranha and Anders Dalskov and Daniel Escudero and Claudio Orlandi}, title = {LSS Homomorphisms and Applications to Secure Signatures, Proactive Secret Sharing and Input Certification}, howpublished = {Cryptology ePrint Archive, Report 2020/691}, year = {2020}, url = {https://eprint.iacr.org/2020/691}, } @misc{cryptoeprint:2020:692, author = {Wei Cheng and Sylvain Guilley and Claude Carlet and Sihem Mesnager and Jean-Luc Danger}, title = {Optimizing Inner Product Masking Scheme by A Coding Theory Approach}, howpublished = {Cryptology ePrint Archive, Report 2020/692}, year = {2020}, url = {https://eprint.iacr.org/2020/692}, } @misc{cryptoeprint:2020:693, author = {Kai-Min Chung and Siyao Guo and Qipeng Liu and Luowen Qian}, title = {Tight Quantum Time-Space Tradeoffs for Function Inversion}, howpublished = {Cryptology ePrint Archive, Report 2020/693}, year = {2020}, url = {https://eprint.iacr.org/2020/693}, } @misc{cryptoeprint:2020:694, author = {Thomas Espitau and Paul Kirchner}, title = {The nearest-colattice algorithm }, howpublished = {Cryptology ePrint Archive, Report 2020/694}, year = {2020}, url = {https://eprint.iacr.org/2020/694}, } @misc{cryptoeprint:2020:695, author = {Rupeng Yang and Man Ho Au and Zuoxia Yu and Qiuliang Xu}, title = {Collusion Resistant Watermarkable PRFs from Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2020/695}, year = {2020}, url = {https://eprint.iacr.org/2020/695}, } @misc{cryptoeprint:2020:696, author = {Yin Li and Yu Zhang}, title = {An Efficient CRT-based Bit-parallel Multiplier for Special Pentanomials}, howpublished = {Cryptology ePrint Archive, Report 2020/696}, year = {2020}, url = {https://eprint.iacr.org/2020/696}, } @misc{cryptoeprint:2020:697, author = {F. Boudot and P. Gaudry and A. Guillevic and N. Heninger and E. Thomé and P. Zimmermann}, title = {Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment}, howpublished = {Cryptology ePrint Archive, Report 2020/697}, year = {2020}, url = {https://eprint.iacr.org/2020/697}, } @misc{cryptoeprint:2020:698, author = {Zhe CEN and Xiutao FENG and Zhangyi Wang and Chunping CAO}, title = {Forgery attack on the authentication encryption GIFT-COFB}, howpublished = {Cryptology ePrint Archive, Report 2020/698}, year = {2020}, url = {https://eprint.iacr.org/2020/698}, } @misc{cryptoeprint:2020:699, author = {Lauren De Meyer}, title = {Looking at the NIST Lightweight Candidates from a Masking Point-of-View}, howpublished = {Cryptology ePrint Archive, Report 2020/699}, year = {2020}, url = {https://eprint.iacr.org/2020/699}, } @misc{cryptoeprint:2020:700, author = {Vladimir Belsky and Ilia Gerasimov and Kirill Tsaregorodtsev and Ivan Chizhov}, title = {Personal data exchange protocol: X}, howpublished = {Cryptology ePrint Archive, Report 2020/700}, year = {2020}, url = {https://eprint.iacr.org/2020/700}, } @misc{cryptoeprint:2020:701, author = {Bar Alon and Eran Omri and Anat Paskin-Cherniavsky}, title = {MPC with Friends and Foes}, howpublished = {Cryptology ePrint Archive, Report 2020/701}, year = {2020}, url = {https://eprint.iacr.org/2020/701}, } @misc{cryptoeprint:2020:702, author = {Ray Perlner and Daniel Smith-Tone}, title = {Rainbow Band Separation is Better than we Thought}, howpublished = {Cryptology ePrint Archive, Report 2020/702}, year = {2020}, url = {https://eprint.iacr.org/2020/702}, } @misc{cryptoeprint:2020:703, author = {Shuhei Nakamura and Yasuhiko Ikematsu and Yacheng Wang and Jintai Ding and Tsuyoshi Takagi}, title = {New Complexity Estimation on the Rainbow-Band-Separation Attack}, howpublished = {Cryptology ePrint Archive, Report 2020/703}, year = {2020}, url = {https://eprint.iacr.org/2020/703}, } @misc{cryptoeprint:2020:704, author = {James Bell and K. A. Bonawitz and Adrià Gascón and Tancrède Lepoint and Mariana Raykova}, title = {Secure Single-Server Aggregation with (Poly)Logarithmic Overhead}, howpublished = {Cryptology ePrint Archive, Report 2020/704}, year = {2020}, url = {https://eprint.iacr.org/2020/704}, } @misc{cryptoeprint:2020:705, author = {Ingo Czerwinski}, title = {On the minimal value set size of APN functions}, howpublished = {Cryptology ePrint Archive, Report 2020/705}, year = {2020}, url = {https://eprint.iacr.org/2020/705}, } @misc{cryptoeprint:2020:706, author = {Eleonora Testa and Mathias Soeken and Heinz Riener and Luca Amaru and Giovanni De Micheli}, title = {A Logic Synthesis Toolbox for Reducing the Multiplicative Complexity in Logic Networks}, howpublished = {Cryptology ePrint Archive, Report 2020/706}, year = {2020}, url = {https://eprint.iacr.org/2020/706}, } @misc{cryptoeprint:2020:707, author = {Martin R. Albrecht and Shi Bai and Pierre-Alain Fouque and Paul Kirchner and Damien Stehlé and Weiqiang Wen}, title = {Faster Enumeration-based Lattice Reduction: Root Hermite Factor k^(1/(2k)) in Time k^(k/8 + o(k))}, howpublished = {Cryptology ePrint Archive, Report 2020/707}, year = {2020}, url = {https://eprint.iacr.org/2020/707}, } @misc{cryptoeprint:2020:708, author = {Ben Nassi and Yaron Pirutin and Adi Shamir and Yuval Elovici and Boris Zadov}, title = {Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations}, howpublished = {Cryptology ePrint Archive, Report 2020/708}, year = {2020}, url = {https://eprint.iacr.org/2020/708}, } @misc{cryptoeprint:2020:709, author = {Elizabeth C. Crites and Mary Maller and Sarah Meiklejohn and Rebekah Mercer}, title = {Reputable List Curation from Decentralized Voting}, howpublished = {Cryptology ePrint Archive, Report 2020/709}, year = {2020}, url = {https://eprint.iacr.org/2020/709}, } @misc{cryptoeprint:2020:710, author = {Yackolley Amoussou-Guenou and Bruno Biais and Maria Potop-Butucaru and Sara Tucci-Piergiovanni}, title = {Rational Behavior in Committee-Based Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2020/710}, year = {2020}, url = {https://eprint.iacr.org/2020/710}, } @misc{cryptoeprint:2020:711, author = {Foteini Baldimtsi and Aggelos Kiayias and Thomas Zacharias and Bingsheng Zhang}, title = {Crowd Verifiable Zero-Knowledge and End-to-end Verifiable Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2020/711}, year = {2020}, url = {https://eprint.iacr.org/2020/711}, } @misc{cryptoeprint:2020:712, author = {Xiaopeng Zhao and Zhenfu Cao and Xiaolei Dong and Jinwen Zheng}, title = {Anonymous IBE From Quadratic Residue With Fast Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/712}, year = {2020}, url = {https://eprint.iacr.org/2020/712}, } @misc{cryptoeprint:2020:713, author = {Yi-Fan Tseng and Zi-Yuan Liu and Raylin Tso}, title = {A Generic Construction of Predicate Proxy Key Re-encapsulation Mechanism}, howpublished = {Cryptology ePrint Archive, Report 2020/713}, year = {2020}, url = {https://eprint.iacr.org/2020/713}, } @misc{cryptoeprint:2020:714, author = {Naty Peter and Rotem Tsabary and Hoeteck Wee}, title = {One-One Constrained Pseudorandom Functions}, howpublished = {Cryptology ePrint Archive, Report 2020/714}, year = {2020}, url = {https://eprint.iacr.org/2020/714}, } @misc{cryptoeprint:2020:715, author = {Sergij V. Goncharov}, title = {On (impracticality of) transfinite symmetric encryption with keys smaller than messages under GCH}, howpublished = {Cryptology ePrint Archive, Report 2020/715}, year = {2020}, url = {https://eprint.iacr.org/2020/715}, } @misc{cryptoeprint:2020:716, author = {Takeshi Sugawara and Tatsuya Onuma and Yang Li}, title = {Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function}, howpublished = {Cryptology ePrint Archive, Report 2020/716}, year = {2020}, url = {https://eprint.iacr.org/2020/716}, } @misc{cryptoeprint:2020:717, author = {Anubhab Baksi and Santanu Sarkar and Akhilesh Siddhanti and Ravi Anand and Anupam Chattopadhyay}, title = {Fault Location Identification By Machine Learning}, howpublished = {Cryptology ePrint Archive, Report 2020/717}, year = {2020}, url = {https://eprint.iacr.org/2020/717}, } @misc{cryptoeprint:2020:718, author = {Marc Fischlin and Felix Günther and Christian Janson}, title = {Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3}, howpublished = {Cryptology ePrint Archive, Report 2020/718}, year = {2020}, url = {https://eprint.iacr.org/2020/718}, } @misc{cryptoeprint:2020:719, author = {Shion Samadder Chaudhury and Sabyasachi Dutta and Kouichi Sakurai}, title = {Hypercube and Cascading-based Algorithms for Secret Sharing Schemes}, howpublished = {Cryptology ePrint Archive, Report 2020/719}, year = {2020}, url = {https://eprint.iacr.org/2020/719}, } @misc{cryptoeprint:2020:720, author = {Sihem Mesnager and Chunming Tang}, title = {Fast algebraic immunity of Boolean functions and LCD codes}, howpublished = {Cryptology ePrint Archive, Report 2020/720}, year = {2020}, url = {https://eprint.iacr.org/2020/720}, } @misc{cryptoeprint:2020:721, author = {Fabian Boemer and Rosario Cammarota and Daniel Demmler and Thomas Schneider and Hossein Yalame}, title = {MP2ML: A Mixed-Protocol Machine Learning Framework for Private Inference}, howpublished = {Cryptology ePrint Archive, Report 2020/721}, year = {2020}, url = {https://eprint.iacr.org/2020/721}, } @misc{cryptoeprint:2020:722, author = {Yehuda Afek and Anat Bremler-Barr and Lior Shafir}, title = {NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities}, howpublished = {Cryptology ePrint Archive, Report 2020/722}, year = {2020}, url = {https://eprint.iacr.org/2020/722}, } @misc{cryptoeprint:2020:723, author = {Suyash Bagad and Saravanan Vijayakumaran}, title = {On the Confidentiality of Amounts in Grin}, howpublished = {Cryptology ePrint Archive, Report 2020/723}, year = {2020}, url = {https://eprint.iacr.org/2020/723}, } @misc{cryptoeprint:2020:724, author = {Lukas Helminger and Daniel Kales and Sebastian Ramacher and Roman Walch}, title = {Multi-Party Revocation in Sovrin: Performance through Distributed Trust}, howpublished = {Cryptology ePrint Archive, Report 2020/724}, year = {2020}, url = {https://eprint.iacr.org/2020/724}, } @misc{cryptoeprint:2020:725, author = {Gianluca Brian and Antonio Faonio and Maciej Obremski and Mark Simkin and Daniele Venturi}, title = {Non-Malleable Secret Sharing against Bounded Joint-Tampering Attacks in the Plain Model}, howpublished = {Cryptology ePrint Archive, Report 2020/725}, year = {2020}, url = {https://eprint.iacr.org/2020/725}, } @misc{cryptoeprint:2020:726, author = {Denis Diemert and Tibor Jager}, title = {On the Tight Security of TLS 1.3: Theoretically-Sound Cryptographic Parameters for Real-World Deployments}, howpublished = {Cryptology ePrint Archive, Report 2020/726}, year = {2020}, url = {https://eprint.iacr.org/2020/726}, } @misc{cryptoeprint:2020:727, author = {Adrian Ranea and Yunwen Liu and Tomer Ashur}, title = {An Easy-to-Use Tool for Rotational-XOR Cryptanalysis of ARX Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2020/727}, year = {2020}, url = {https://eprint.iacr.org/2020/727}, } @misc{cryptoeprint:2020:728, author = {Jan Jancar and Vladimir Sedlacek and Petr Svenda and Marek Sys}, title = {Minerva: The curse of ECDSA nonces}, howpublished = {Cryptology ePrint Archive, Report 2020/728}, year = {2020}, url = {https://eprint.iacr.org/2020/728}, } @misc{cryptoeprint:2020:729, author = {Melissa Chase and Peihan Miao}, title = {Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF}, howpublished = {Cryptology ePrint Archive, Report 2020/729}, year = {2020}, url = {https://eprint.iacr.org/2020/729}, } @misc{cryptoeprint:2020:730, author = {Jonathan Katz and Julian Loss and Jiayu Xu}, title = {On the Security of Time-Locked Puzzles and Timed Commitments}, howpublished = {Cryptology ePrint Archive, Report 2020/730}, year = {2020}, url = {https://eprint.iacr.org/2020/730}, } @misc{cryptoeprint:2020:731, author = {Yusuke Naito}, title = {The Exact Security of PMAC with Three Powering-Up Masks}, howpublished = {Cryptology ePrint Archive, Report 2020/731}, year = {2020}, url = {https://eprint.iacr.org/2020/731}, } @misc{cryptoeprint:2020:732, author = {Mojtaba Rafiee and Shahram Khazaei}, title = {Security of Multi-Adjustable Join Schemes: Separations and Implications}, howpublished = {Cryptology ePrint Archive, Report 2020/732}, year = {2020}, url = {https://eprint.iacr.org/2020/732}, } @misc{cryptoeprint:2020:733, author = {Michiel Van Beirendonck and Jan-Pieter D'Anvers and Angshuman Karmakar and Josep Balasch and Ingrid Verbauwhede}, title = {A Side-Channel Resistant Implementation of SABER}, howpublished = {Cryptology ePrint Archive, Report 2020/733}, year = {2020}, url = {https://eprint.iacr.org/2020/733}, } @misc{cryptoeprint:2020:734, author = {Benoît Cogliati and Jacques Patarin}, title = {Mirror Theory: A simple proof of the Pi+Pj Theorem with xi_max=2}, howpublished = {Cryptology ePrint Archive, Report 2020/734}, year = {2020}, url = {https://eprint.iacr.org/2020/734}, } @misc{cryptoeprint:2020:735, author = {Heewon Chung and Kyoohyung Han and Chanyang Ju and Myungsun Kim and Jae Hong Seo}, title = {Bulletproofs+: Shorter Proofs for Privacy-Enhanced Distributed Ledger}, howpublished = {Cryptology ePrint Archive, Report 2020/735}, year = {2020}, url = {https://eprint.iacr.org/2020/735}, } @misc{cryptoeprint:2020:736, author = {Suvradip Chakraborty and Harish Karthikeyan and Adam O'Neill and C. Pandu Rangan}, title = {Forward-Security Under Continual Leakage with Deterministic Key Updates}, howpublished = {Cryptology ePrint Archive, Report 2020/736}, year = {2020}, url = {https://eprint.iacr.org/2020/736}, } @misc{cryptoeprint:2020:737, author = {Jonathan Bootle and Vadim Lyubashevsky and Ngoc Khanh Nguyen and Gregor Seiler}, title = {A non-PCP Approach to Succinct Quantum-Safe Zero-Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2020/737}, year = {2020}, url = {https://eprint.iacr.org/2020/737}, } @misc{cryptoeprint:2020:738, author = {Subhadeep Banik and Avik Chakraborti and Tetsu Iwata and Kazuhiko Minematsu and Mridul Nandi and Thomas Peyrin and Yu Sasaki and Siang Meng Sim and Yosuke Todo}, title = {GIFT-COFB}, howpublished = {Cryptology ePrint Archive, Report 2020/738}, year = {2020}, url = {https://eprint.iacr.org/2020/738}, } @misc{cryptoeprint:2020:739, author = {Peter Chvojka and Tibor Jager and Daniel Slamanig and Christoph Striecks}, title = {Generic Constructions of Incremental and Homomorphic Timed-Release Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/739}, year = {2020}, url = {https://eprint.iacr.org/2020/739}, } @misc{cryptoeprint:2020:740, author = {Erica Blum and Chen-Da Liu-Zhang and Julian Loss}, title = {Always Have a Backup Plan: Fully Secure Synchronous MPC with Asynchronous Fallback}, howpublished = {Cryptology ePrint Archive, Report 2020/740}, year = {2020}, url = {https://eprint.iacr.org/2020/740}, } @misc{cryptoeprint:2020:741, author = {Saba Eskandarian}, title = {Fast Privacy-Preserving Punch Cards}, howpublished = {Cryptology ePrint Archive, Report 2020/741}, year = {2020}, url = {https://eprint.iacr.org/2020/741}, } @misc{cryptoeprint:2020:742, author = {Jan Richter-Brockmann and Tim Güneysu}, title = {Improved Side-Channel Resistance by Dynamic Fault-Injection Countermeasures}, howpublished = {Cryptology ePrint Archive, Report 2020/742}, year = {2020}, url = {https://eprint.iacr.org/2020/742}, } @misc{cryptoeprint:2020:743, author = {Qian Guo and Thomas Johansson and Alexander Nilsson}, title = {A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformation and its application on FrodoKEM}, howpublished = {Cryptology ePrint Archive, Report 2020/743}, year = {2020}, url = {https://eprint.iacr.org/2020/743}, } @misc{cryptoeprint:2020:744, author = {Antonio Flórez Gutiérrez and Gaëtan Leurent and María Naya-Plasencia and Léo Perrin and André Schrottenloher and Ferdinand Sibleyras}, title = {New results on Gimli: full-permutation distinguishers and improved collisions}, howpublished = {Cryptology ePrint Archive, Report 2020/744}, year = {2020}, url = {https://eprint.iacr.org/2020/744}, } @misc{cryptoeprint:2020:745, author = {Siddaramappa V and Ramesh K B}, title = {True Random Number Generation Based on DNA molecule Genetic Information (DNA-TRNG)}, howpublished = {Cryptology ePrint Archive, Report 2020/745}, year = {2020}, url = {https://eprint.iacr.org/2020/745}, } @misc{cryptoeprint:2020:746, author = {Latif AKÇAY and Berna ÖRS}, title = {Comparison of RISC-V and transport triggered architectures for a post-quantum cryptography application}, howpublished = {Cryptology ePrint Archive, Report 2020/746}, year = {2020}, url = {https://eprint.iacr.org/2020/746}, } @misc{cryptoeprint:2020:747, author = {Karim Eldefrawy and Seoyeon Hwang and Rafail Ostrovsky and Moti Yung}, title = {Communication-Efficient (Proactive) Secure Computation for Dynamic General Adversary Structures and Dynamic Groups}, howpublished = {Cryptology ePrint Archive, Report 2020/747}, year = {2020}, url = {https://eprint.iacr.org/2020/747}, } @misc{cryptoeprint:2020:748, author = {Tatsuo Mitani and Akira Otsuka}, title = {Anonymous probabilistic payment in payment hub}, howpublished = {Cryptology ePrint Archive, Report 2020/748}, year = {2020}, url = {https://eprint.iacr.org/2020/748}, } @misc{cryptoeprint:2020:749, author = {Hyung Tae Lee and San Ling and Jae Hong Seo and Huaxiong Wang}, title = {Insecurity of the Public Key Encryption with Filtered Equality Test Proposed by Huang et al.}, howpublished = {Cryptology ePrint Archive, Report 2020/749}, year = {2020}, url = {https://eprint.iacr.org/2020/749}, } @misc{cryptoeprint:2020:750, author = {Max Hoffmann and Christof Paar}, title = {Doppelganger Obfuscation - Exploring the Defensive and Offensive Aspects of Hardware Camouflaging}, howpublished = {Cryptology ePrint Archive, Report 2020/750}, year = {2020}, url = {https://eprint.iacr.org/2020/750}, } @misc{cryptoeprint:2020:751, author = {Nils Albartus and Max Hoffmann and Sebastian Temme and Leonid Azriel and Christof Paar}, title = {DANA - Universal Dataflow Analysis for Gate-Level Netlist Reverse Engineering}, howpublished = {Cryptology ePrint Archive, Report 2020/751}, year = {2020}, url = {https://eprint.iacr.org/2020/751}, } @misc{cryptoeprint:2020:752, author = {Joël Alwen and Sandro Coretti and Daniel Jost and Marta Mularczyk}, title = {Continuous Group Key Agreement with Active Security}, howpublished = {Cryptology ePrint Archive, Report 2020/752}, year = {2020}, url = {https://eprint.iacr.org/2020/752}, } @misc{cryptoeprint:2020:753, author = {Thomas Attema and Ronald Cramer and Serge Fehr}, title = {Compressing Proofs of $k$-Out-Of-$n$ Partial Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2020/753}, year = {2020}, url = {https://eprint.iacr.org/2020/753}, } @misc{cryptoeprint:2020:754, author = {Arka Rai Choudhuri and Aarushi Goel and Matthew Green and Abhishek Jain and Gabriel Kaptchuk}, title = {Fluid MPC: Secure Multiparty Computation with Dynamic Participants}, howpublished = {Cryptology ePrint Archive, Report 2020/754}, year = {2020}, url = {https://eprint.iacr.org/2020/754}, } @misc{cryptoeprint:2020:755, author = {Samuel Jaques and Hart Montgomery and Arnab Roy}, title = {Time-release Cryptography from Minimal Circuit Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2020/755}, year = {2020}, url = {https://eprint.iacr.org/2020/755}, } @misc{cryptoeprint:2020:756, author = {Shan Chen and Manuel Barbosa and Alexandra Boldyreva and Bogdan Warinschi}, title = {Provable Security Analysis of FIDO2}, howpublished = {Cryptology ePrint Archive, Report 2020/756}, year = {2020}, url = {https://eprint.iacr.org/2020/756}, } @misc{cryptoeprint:2020:757, author = {Gabriel Zaid and Lilian Bossuet and Amaury Habrard and Alexandre Venelli}, title = {Understanding Methodology for Efficient CNN Architectures in Profiling Attacks}, howpublished = {Cryptology ePrint Archive, Report 2020/757}, year = {2020}, url = {https://eprint.iacr.org/2020/757}, } @misc{cryptoeprint:2020:758, author = {Srinath Setty and Sebastian Angel and Jonathan Lee}, title = {Verifiable state machines: Proofs that untrusted services operate correctly}, howpublished = {Cryptology ePrint Archive, Report 2020/758}, year = {2020}, url = {https://eprint.iacr.org/2020/758}, } @misc{cryptoeprint:2020:759, author = {Susan Hohenberger and Venkata Koppula and Brent Waters}, title = {Chosen Ciphertext Security from Injective Trapdoor Functions}, howpublished = {Cryptology ePrint Archive, Report 2020/759}, year = {2020}, url = {https://eprint.iacr.org/2020/759}, } @misc{cryptoeprint:2020:760, author = {Rémi Clarisse and Sylvain Duquesne and Olivier Sanders}, title = {Curves with fast computations in the first pairing group}, howpublished = {Cryptology ePrint Archive, Report 2020/760}, year = {2020}, url = {https://eprint.iacr.org/2020/760}, } @misc{cryptoeprint:2020:761, author = {Tassos Dimitriou}, title = {Decentralized reputation}, howpublished = {Cryptology ePrint Archive, Report 2020/761}, year = {2020}, url = {https://eprint.iacr.org/2020/761}, } @misc{cryptoeprint:2020:762, author = {Michel Abdalla and Junqing Gong and Hoeteck Wee}, title = {Functional Encryption for Attribute-Weighted Sums from $k$-Lin}, howpublished = {Cryptology ePrint Archive, Report 2020/762}, year = {2020}, url = {https://eprint.iacr.org/2020/762}, } @misc{cryptoeprint:2020:763, author = {Jia Xu and Yiwen Gao and Hoonwei Lim}, title = {Practical Quantum-Safe Stateful Hybrid Key Exchange Protocol}, howpublished = {Cryptology ePrint Archive, Report 2020/763}, year = {2020}, url = {https://eprint.iacr.org/2020/763}, } @misc{cryptoeprint:2020:764, author = {Romain Gay and Aayush Jain and Huijia Lin and Amit Sahai}, title = {Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification}, howpublished = {Cryptology ePrint Archive, Report 2020/764}, year = {2020}, url = {https://eprint.iacr.org/2020/764}, } @misc{cryptoeprint:2020:765, author = {Joseph Jaeger and Nirvan Tyagi}, title = {Handling Adaptive Compromise for Practical Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2020/765}, year = {2020}, url = {https://eprint.iacr.org/2020/765}, } @misc{cryptoeprint:2020:766, author = {Unai Rioja and Servio Paguada and Lejla Batina and Igor Armendariz}, title = {The uncertainty of Side-Channel Analysis: A way to leverage from heuristics}, howpublished = {Cryptology ePrint Archive, Report 2020/766}, year = {2020}, url = {https://eprint.iacr.org/2020/766}, } @misc{cryptoeprint:2020:767, author = {Carsten Baum and Emmanuela Orsini and Peter Scholl and Eduardo Soria-Vazquez}, title = {Efficient Constant-Round MPC with Identifiable Abort and Public Verifiability}, howpublished = {Cryptology ePrint Archive, Report 2020/767}, year = {2020}, url = {https://eprint.iacr.org/2020/767}, } @misc{cryptoeprint:2020:768, author = {Peter Dixon and Sutanu Gayen and A. Pavan and N. V. Vinodchandran}, title = {Perfect Zero Knowledge: New Upperbounds and Relativized Separations}, howpublished = {Cryptology ePrint Archive, Report 2020/768}, year = {2020}, url = {https://eprint.iacr.org/2020/768}, } @misc{cryptoeprint:2020:769, author = {Eduard Hauck and Eike Kiltz and Julian Loss and Ngoc Khanh Nguyen}, title = {Lattice-Based Blind Signatures, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2020/769}, year = {2020}, url = {https://eprint.iacr.org/2020/769}, } @misc{cryptoeprint:2020:770, author = {Akshima and David Cash and Andrew Drucker and Hoeteck Wee}, title = {Time-Space Tradeoffs and Short Collisions in Merkle-Damgård Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2020/770}, year = {2020}, url = {https://eprint.iacr.org/2020/770}, } @misc{cryptoeprint:2020:771, author = {Xin Li and Fermi Ma and Willy Quach and Daniel Wichs}, title = {Leakage-Resilient Key Exchange and Two-Seed Extractors}, howpublished = {Cryptology ePrint Archive, Report 2020/771}, year = {2020}, url = {https://eprint.iacr.org/2020/771}, } @misc{cryptoeprint:2020:772, author = {Alex Lombardi and Vinod Vaikuntanathan}, title = {Fiat-Shamir for Repeated Squaring with Applications to PPAD-Hardness and VDFs}, howpublished = {Cryptology ePrint Archive, Report 2020/772}, year = {2020}, url = {https://eprint.iacr.org/2020/772}, } @misc{cryptoeprint:2020:773, author = {Johann Großschädl and Ben Marshall and Dan Page and Thinh Pham and Francesco Regazzoni}, title = {An Instruction Set Extension to Support Software-Based Masking}, howpublished = {Cryptology ePrint Archive, Report 2020/773}, year = {2020}, url = {https://eprint.iacr.org/2020/773}, } @misc{cryptoeprint:2020:774, author = {Majid Khabbazian and Tejaswi Nadahalli and Roger Wattenhofer}, title = {Timelocked Bribes}, howpublished = {Cryptology ePrint Archive, Report 2020/774}, year = {2020}, url = {https://eprint.iacr.org/2020/774}, } @misc{cryptoeprint:2020:775, author = {Christof Beierle and Gregor Leander and Yosuke Todo}, title = {Improved Differential-Linear Attacks with Applications to ARX Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2020/775}, year = {2020}, url = {https://eprint.iacr.org/2020/775}, } @misc{cryptoeprint:2020:776, author = {Dana Dachman-Soled and Ilan Komargodski and Rafael Pass}, title = {Non-Malleable Codes for Bounded Polynomial Depth Tampering}, howpublished = {Cryptology ePrint Archive, Report 2020/776}, year = {2020}, url = {https://eprint.iacr.org/2020/776}, } @misc{cryptoeprint:2020:777, author = {Giuseppe Vitto and Alex Biryukov}, title = {Dynamic Universal Accumulator with Batch Update over Bilinear Groups}, howpublished = {Cryptology ePrint Archive, Report 2020/777}, year = {2020}, url = {https://eprint.iacr.org/2020/777}, } @misc{cryptoeprint:2020:778, author = {Seyed Farhad Aghili and Amirhossein Adavoudi Jolfaei and Aysajan Abidin}, title = {SAKE+: Strengthened Symmetric-Key Authenticated Key Exchange with Perfect Forward Secrecy for IoT}, howpublished = {Cryptology ePrint Archive, Report 2020/778}, year = {2020}, url = {https://eprint.iacr.org/2020/778}, } @misc{cryptoeprint:2020:779, author = {Naomi Ephraim and Cody Freitag and Ilan Komargodski and Rafael Pass}, title = {Non-Malleable Time-Lock Puzzles and Applications}, howpublished = {Cryptology ePrint Archive, Report 2020/779}, year = {2020}, url = {https://eprint.iacr.org/2020/779}, } @misc{cryptoeprint:2020:780, author = {Daniel De Almeida Braga and Pierre-Alain Fouque and Mohamed Sabt}, title = {The Long and Winding Path to Secure Implementation of GlobalPlatform SCP10}, howpublished = {Cryptology ePrint Archive, Report 2020/780}, year = {2020}, url = {https://eprint.iacr.org/2020/780}, } @misc{cryptoeprint:2020:781, author = {Haibo Zhou and Rui Zong and Xiaoyang Dong and Keting Jia and Willi Meier}, title = {Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff}, howpublished = {Cryptology ePrint Archive, Report 2020/781}, year = {2020}, url = {https://eprint.iacr.org/2020/781}, } @misc{cryptoeprint:2020:782, author = {George Teseleanu}, title = {A Love Affair Between Bias Amplifiers and Broken Noise Sources}, howpublished = {Cryptology ePrint Archive, Report 2020/782}, year = {2020}, url = {https://eprint.iacr.org/2020/782}, } @misc{cryptoeprint:2020:783, author = {Jung Hee Cheon and Wonhee Cho and Jeong Han Kim and Jiseung Kim}, title = {Adventures in Crypto Dark Matter: Attacks, Fixes and Analysis for Weak Pseudorandom Function Candidates}, howpublished = {Cryptology ePrint Archive, Report 2020/783}, year = {2020}, url = {https://eprint.iacr.org/2020/783}, } @misc{cryptoeprint:2020:784, author = {Carsten Baum and Bernardo David and Rafael Dowsley and Jesper Buus Nielsen and Sabine Oechsner}, title = {CRAFT: Composable Randomness and Almost Fairness from Time}, howpublished = {Cryptology ePrint Archive, Report 2020/784}, year = {2020}, url = {https://eprint.iacr.org/2020/784}, } @misc{cryptoeprint:2020:785, author = {Ashrujit Ghoshal and Joseph Jaeger and Stefano Tessaro}, title = {The Memory-Tightness of Authenticated Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/785}, year = {2020}, url = {https://eprint.iacr.org/2020/785}, } @misc{cryptoeprint:2020:786, author = {Sonia Belaïd and Jean-Sébastien Coron and Emmanuel Prouff and Matthieu Rivain and Abdul Rahman Taleb}, title = {Random Probing Security: Verification, Composition, Expansion and New Constructions}, howpublished = {Cryptology ePrint Archive, Report 2020/786}, year = {2020}, url = {https://eprint.iacr.org/2020/786}, } @misc{cryptoeprint:2020:787, author = {Takashi Yamakawa and Mark Zhandry}, title = {A Note on Separating Classical and Quantum Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2020/787}, year = {2020}, url = {https://eprint.iacr.org/2020/787}, } @misc{cryptoeprint:2020:788, author = {Michel Abdalla and Florian Bourse and Hugo Marival and David Pointcheval and Azam Soleimanian and Hendrik Waldner}, title = {Multi-Client Inner-Product Functional Encryption in the Random-Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2020/788}, year = {2020}, url = {https://eprint.iacr.org/2020/788}, } @misc{cryptoeprint:2020:789, author = {Dario Catalano and Georg Fuchsbauer and Azam Soleimanian}, title = {Double-Authentication-Preventing Signatures in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2020/789}, year = {2020}, url = {https://eprint.iacr.org/2020/789}, } @misc{cryptoeprint:2020:790, author = {Lydia Garms and Siaw-Lynn Ng and Elizabeth A. Quaglia and Giulia Traverso}, title = {Anonymity and Rewards in Peer Rating Systems}, howpublished = {Cryptology ePrint Archive, Report 2020/790}, year = {2020}, url = {https://eprint.iacr.org/2020/790}, } @misc{cryptoeprint:2020:791, author = {Chaya Ganesh and Claudio Orlandi and Daniel Tschudi and Aviv Zohar}, title = {Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies}, howpublished = {Cryptology ePrint Archive, Report 2020/791}, year = {2020}, url = {https://eprint.iacr.org/2020/791}, } @misc{cryptoeprint:2020:792, author = {Jean-François Biasse and Sriram Chelleppan and Sherzod Kariev and Noyem Khan and Lynette Menezes and Efe Seyitoglu and Charurut Somboonwit and Attila Yavuz}, title = {Trace-$\Sigma$: a privacy-preserving contact tracing app}, howpublished = {Cryptology ePrint Archive, Report 2020/792}, year = {2020}, url = {https://eprint.iacr.org/2020/792}, } @misc{cryptoeprint:2020:793, author = {Mahabir Prasad Jhanwar and Sumanta Sarkar}, title = {PHyCT : Privacy preserving Hybrid Contact Tracing}, howpublished = {Cryptology ePrint Archive, Report 2020/793}, year = {2020}, url = {https://eprint.iacr.org/2020/793}, } @misc{cryptoeprint:2020:794, author = {Catherine Meadows}, title = {Symbolic and Computational Reasoning About Cryptographic Modes of Operation}, howpublished = {Cryptology ePrint Archive, Report 2020/794}, year = {2020}, url = {https://eprint.iacr.org/2020/794}, } @misc{cryptoeprint:2020:795, author = {Viet Ba Dang and Farnoud Farahmand and Michal Andrzejczak and Kamyar Mohajerani and Duc Tri Nguyen and Kris Gaj}, title = {Implementation and Benchmarking of Round 2 Candidates in the NIST Post-Quantum Cryptography Standardization Process Using Hardware and Software/Hardware Co-design Approaches}, howpublished = {Cryptology ePrint Archive, Report 2020/795}, year = {2020}, url = {https://eprint.iacr.org/2020/795}, } @misc{cryptoeprint:2020:796, author = {Ying Guo and Zhenfu Cao and Xiaolei Dong}, title = {A Generalization of Paillier's Public-Key System With Fast Decryption}, howpublished = {Cryptology ePrint Archive, Report 2020/796}, year = {2020}, url = {https://eprint.iacr.org/2020/796}, } @misc{cryptoeprint:2020:797, author = {Mojtaba Bisheh Niasar and Rami El Khatib and Reza Azarderakhsh and Mehran Mozaffari-Kermani}, title = {Fast, Small, and Area-Time Efficient Architectures for Key-Exchange on Curve25519}, howpublished = {Cryptology ePrint Archive, Report 2020/797}, year = {2020}, url = {https://eprint.iacr.org/2020/797}, } @misc{cryptoeprint:2020:798, author = {Ehsan Ebrahimi and Céline Chevalier and Marc Kaplan and Michele Minelli}, title = {Superposition Attack on OT Protocols}, howpublished = {Cryptology ePrint Archive, Report 2020/798}, year = {2020}, url = {https://eprint.iacr.org/2020/798}, } @misc{cryptoeprint:2020:799, author = {Daniel E. Lucani and Lars Nielsen and Claudio Orlandi and Elena Pagnin and Rasmus Vestergaard}, title = {Secure Generalized Deduplication via Multi-Key Revealing Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/799}, year = {2020}, url = {https://eprint.iacr.org/2020/799}, } @misc{cryptoeprint:2020:800, author = {Mihir Bellare and Wei Dai and Phillip Rogaway}, title = {Reimagining Secret Sharing: Creating a Safer and More Versatile Primitive by Adding Authenticity, Correcting Errors, and Reducing Randomness Requirements}, howpublished = {Cryptology ePrint Archive, Report 2020/800}, year = {2020}, url = {https://eprint.iacr.org/2020/800}, } @misc{cryptoeprint:2020:801, author = {Ward Beullens}, title = {Not enough LESS: An improved algorithm for solving Code Equivalence Problems over $\mathbb{F}_q$}, howpublished = {Cryptology ePrint Archive, Report 2020/801}, year = {2020}, url = {https://eprint.iacr.org/2020/801}, } @misc{cryptoeprint:2020:802, author = {Mostafizar Rahman and Goutam Paul}, title = {Quantum Attacks on HCTR and its Variants}, howpublished = {Cryptology ePrint Archive, Report 2020/802}, year = {2020}, url = {https://eprint.iacr.org/2020/802}, } @misc{cryptoeprint:2020:803, author = {Weiqiong Cao and Hongsong Shi and Hua Chen and Wei Xi and Haoyuan Li and Limin Fan and Wenling Wu}, title = {Lattice-based Fault Attacks against Deterministic Signatures ECDSA and EdDSA}, howpublished = {Cryptology ePrint Archive, Report 2020/803}, year = {2020}, url = {https://eprint.iacr.org/2020/803}, } @misc{cryptoeprint:2020:804, author = {Bastian Richter and Amir Moradi}, title = {Lightweight Ciphers on a 65 nm ASIC - A Comparative Study on Energy Consumption}, howpublished = {Cryptology ePrint Archive, Report 2020/804}, year = {2020}, url = {https://eprint.iacr.org/2020/804}, } @misc{cryptoeprint:2020:805, author = {Furkan Turan and Ingrid Verbauwhede}, title = {Proxy Re-Encryption for Accelerator Confidentiality in FPGA-Accelerated Cloud}, howpublished = {Cryptology ePrint Archive, Report 2020/805}, year = {2020}, url = {https://eprint.iacr.org/2020/805}, } @misc{cryptoeprint:2020:806, author = {Daxin Huang and Qingqing Gan and Xiaoming Wang and Chengpeng Huang and Yijian Lin}, title = {Toward Comparable Homomorphic Encryption for Crowd-sensing Network}, howpublished = {Cryptology ePrint Archive, Report 2020/806}, year = {2020}, url = {https://eprint.iacr.org/2020/806}, } @misc{cryptoeprint:2020:807, author = {Brett Hemenway Falk and Rafail Ostrovsky}, title = {Secure merge with $O(n \log \log n)$ secure operation}, howpublished = {Cryptology ePrint Archive, Report 2020/807}, year = {2020}, url = {https://eprint.iacr.org/2020/807}, } @misc{cryptoeprint:2020:808, author = {Michel Abdalla}, title = {Security Analysis of Olvid's SAS-based Trust Establishment Protocol}, howpublished = {Cryptology ePrint Archive, Report 2020/808}, year = {2020}, url = {https://eprint.iacr.org/2020/808}, } @misc{cryptoeprint:2020:809, author = {Michael Klooß}, title = {On (expected polynomial) runtime in cryptography}, howpublished = {Cryptology ePrint Archive, Report 2020/809}, year = {2020}, url = {https://eprint.iacr.org/2020/809}, } @misc{cryptoeprint:2020:810, author = {Shuyang Tang}, title = {A Few Explanations for <Fast-to-Finalize Nakamoto-Like Consensus>}, howpublished = {Cryptology ePrint Archive, Report 2020/810}, year = {2020}, url = {https://eprint.iacr.org/2020/810}, } @misc{cryptoeprint:2020:811, author = {Mikhail Volkhov and Markulf Kohlweiss}, title = {Groth16 SNARKs are Randomizable and (Weakly) Simulation Extractable}, howpublished = {Cryptology ePrint Archive, Report 2020/811}, year = {2020}, url = {https://eprint.iacr.org/2020/811}, } @misc{cryptoeprint:2020:812, author = {Lior Rotem and Gil Segev}, title = {Generically Speeding-Up Repeated Squaring is Equivalent to Factoring: Sharp Thresholds for All Generic-Ring Delay Functions}, howpublished = {Cryptology ePrint Archive, Report 2020/812}, year = {2020}, url = {https://eprint.iacr.org/2020/812}, } @misc{cryptoeprint:2020:813, author = {Luca Frittoli and Matteo Bocchi and Silvia Mella and Diego Carrera and Beatrice Rossi and Pasqualina Fragneto and Ruggero Susella and Giacomo Boracchi}, title = {Strengthening Sequential Side-Channel Attacks Through Change Detection}, howpublished = {Cryptology ePrint Archive, Report 2020/813}, year = {2020}, url = {https://eprint.iacr.org/2020/813}, } @misc{cryptoeprint:2020:814, author = {Tal Moran and Daniel Wichs}, title = {Incompressible Encodings}, howpublished = {Cryptology ePrint Archive, Report 2020/814}, year = {2020}, url = {https://eprint.iacr.org/2020/814}, } @misc{cryptoeprint:2020:815, author = {Marc Abboud and Thomas Prest}, title = {Cryptographic Divergences: New Techniques and New Applications}, howpublished = {Cryptology ePrint Archive, Report 2020/815}, year = {2020}, url = {https://eprint.iacr.org/2020/815}, } @misc{cryptoeprint:2020:816, author = {Luka Music and Céline Chevalier and Elham Kashefi}, title = {Dispelling Myths on Superposition Attacks: Formal Security Model and Attack Analyses}, howpublished = {Cryptology ePrint Archive, Report 2020/816}, year = {2020}, url = {https://eprint.iacr.org/2020/816}, } @misc{cryptoeprint:2020:817, author = {Osman Biçer and Alptekin Küpçü}, title = {Anonymous, Attribute Based, Decentralized, Secure, and Fair e-Donation}, howpublished = {Cryptology ePrint Archive, Report 2020/817}, year = {2020}, url = {https://eprint.iacr.org/2020/817}, } @misc{cryptoeprint:2020:818, author = {Christian Badertscher and Alexandru Cojocaru and Léo Colisson and Elham Kashefi and Dominik Leichtle and Atul Mantri and Petros Wallden}, title = {Security Limitations of Classical-Client Delegated Quantum Computing}, howpublished = {Cryptology ePrint Archive, Report 2020/818}, year = {2020}, url = {https://eprint.iacr.org/2020/818}, } @misc{cryptoeprint:2020:819, author = {Willy Quach}, title = {UC-Secure OT from LWE, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2020/819}, year = {2020}, url = {https://eprint.iacr.org/2020/819}, } @misc{cryptoeprint:2020:820, author = {Tim Beyne and Anne Canteaut and Gregor Leander and María Naya-Plasencia and Léo Perrin and Friedrich Wiemer}, title = {On the security of the Rescue hash function}, howpublished = {Cryptology ePrint Archive, Report 2020/820}, year = {2020}, url = {https://eprint.iacr.org/2020/820}, } @misc{cryptoeprint:2020:821, author = {Michail Moraitis and Elena Dubrova}, title = {Interconnect-Aware Bitstream Modification}, howpublished = {Cryptology ePrint Archive, Report 2020/821}, year = {2020}, url = {https://eprint.iacr.org/2020/821}, } @misc{cryptoeprint:2020:822, author = {Kwangsu Lee}, title = {Efficient Multi-Client Functional Encryption for Conjunctive Equality and Range Queries}, howpublished = {Cryptology ePrint Archive, Report 2020/822}, year = {2020}, url = {https://eprint.iacr.org/2020/822}, } @misc{cryptoeprint:2020:823, author = {Jacqueline Brendel and Cas Cremers and Dennis Jackson and Mang Zhao}, title = {The Provable Security of Ed25519: Theory and Practice}, howpublished = {Cryptology ePrint Archive, Report 2020/823}, year = {2020}, url = {https://eprint.iacr.org/2020/823}, } @misc{cryptoeprint:2020:824, author = {Fynn Dallmeier and Jan P. Drees and Kai Gellert and Tobias Handirk and Tibor Jager and Jonas Klauke and Simon Nachtigall and Timo Renzelmann and Rudi Wolf}, title = {Forward-Secure 0-RTT Goes Live: Implementation and Performance Analysis in QUIC}, howpublished = {Cryptology ePrint Archive, Report 2020/824}, year = {2020}, url = {https://eprint.iacr.org/2020/824}, } @misc{cryptoeprint:2020:825, author = {Jiayu Qiang and Yi Deng}, title = {Private Set Intersection from TFHE for Cloud Computing Scenarios}, howpublished = {Cryptology ePrint Archive, Report 2020/825}, year = {2020}, url = {https://eprint.iacr.org/2020/825}, } @misc{cryptoeprint:2020:826, author = {Xuan Thanh Do and Duong Hieu Phan and Moti Yung }, title = {A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes}, howpublished = {Cryptology ePrint Archive, Report 2020/826}, year = {2020}, url = {https://eprint.iacr.org/2020/826}, } @misc{cryptoeprint:2020:827, author = {Daniel Adkins and Archita Agarwal and Seny Kamara and Tarik Moataz}, title = {Encrypted Blockchain Databases}, howpublished = {Cryptology ePrint Archive, Report 2020/827}, year = {2020}, url = {https://eprint.iacr.org/2020/827}, } @misc{cryptoeprint:2020:828, author = {Ashoka SB and Lakshmikanth D}, title = {Modified Secure Hashing algorithm(MSHA-512)}, howpublished = {Cryptology ePrint Archive, Report 2020/828}, year = {2020}, url = {https://eprint.iacr.org/2020/828}, } @misc{cryptoeprint:2020:829, author = {Aude Le Gluher and Pierre-Jean Spaenlehauer and Emmanuel Thomé}, title = {Refined Analysis of the Asymptotic Complexity of the Number Field Sieve}, howpublished = {Cryptology ePrint Archive, Report 2020/829}, year = {2020}, url = {https://eprint.iacr.org/2020/829}, } @misc{cryptoeprint:2020:830, author = {Arnold G. Reinhold}, title = {Terakey - An Encryption Method Whose Security Can Be Analyzed from First Principles}, howpublished = {Cryptology ePrint Archive, Report 2020/830}, year = {2020}, url = {https://eprint.iacr.org/2020/830}, } @misc{cryptoeprint:2020:831, author = {Michele Ciampi and Roberto Parisella and Daniele Venturi}, title = {On Adaptive Security of Delayed-Input Sigma Protocols and Fiat-Shamir NIZKs}, howpublished = {Cryptology ePrint Archive, Report 2020/831}, year = {2020}, url = {https://eprint.iacr.org/2020/831}, } @misc{cryptoeprint:2020:832, author = {Susumu Kiyoshima}, title = {Round-optimal Black-box Commit-and-prove with Succinct Communication}, howpublished = {Cryptology ePrint Archive, Report 2020/832}, year = {2020}, url = {https://eprint.iacr.org/2020/832}, } @misc{cryptoeprint:2020:833, author = {Florian Unterstein and Tolga Sel and Thomas Zeschg and Nisha Jacob and Michael Tempelmeier and Michael Pehl and Fabrizio De Santis}, title = {Secure Update of FPGA-based Secure Elements using Partial Reconfiguration}, howpublished = {Cryptology ePrint Archive, Report 2020/833}, year = {2020}, url = {https://eprint.iacr.org/2020/833}, } @misc{cryptoeprint:2020:834, author = {Eunsang Lee and Joon-Woo Lee and Jong-Seon No and Young-Sik Kim}, title = {Minimax Approximation of Sign Function by Composite Polynomial for Homomorphic Comparison}, howpublished = {Cryptology ePrint Archive, Report 2020/834}, year = {2020}, url = {https://eprint.iacr.org/2020/834}, } @misc{cryptoeprint:2020:835, author = {Congwei Zhou and Bin Hu and Jie Guan}, title = {On the Maximum Nonlinearity of De Bruijn Sequence Feedback Function}, howpublished = {Cryptology ePrint Archive, Report 2020/835}, year = {2020}, url = {https://eprint.iacr.org/2020/835}, } @misc{cryptoeprint:2020:836, author = {Fabio Campos and Lars Jellema and Mauk Lemmen and Lars Müller and Daan Sprenkels and Benoit Viguier}, title = {Assembly or Optimized C for Lightweight Cryptography on RISC-V?}, howpublished = {Cryptology ePrint Archive, Report 2020/836}, year = {2020}, url = {https://eprint.iacr.org/2020/836}, } @misc{cryptoeprint:2020:837, author = {Daniel Kales and Greg Zaverucha}, title = {An Attack on Some Signature Schemes Constructed From Five-Pass Identification Schemes}, howpublished = {Cryptology ePrint Archive, Report 2020/837}, year = {2020}, url = {https://eprint.iacr.org/2020/837}, } @misc{cryptoeprint:2020:838, author = {David A August and Anne C Smith}, title = {PudgyTurtle: variable-length, keystream-dependent encoding to resist time-memory tradeoff attacks}, howpublished = {Cryptology ePrint Archive, Report 2020/838}, year = {2020}, url = {https://eprint.iacr.org/2020/838}, } @misc{cryptoeprint:2020:839, author = {Loïc Ferreira}, title = {Cryptanalysis of a ``Strengthened'' Key Exchange Protocol for IoT}, howpublished = {Cryptology ePrint Archive, Report 2020/839}, year = {2020}, url = {https://eprint.iacr.org/2020/839}, } @misc{cryptoeprint:2020:840, author = {Giuseppe Ateniese and Long Chen and Mohammad Etemad and Qiang Tang}, title = {Proof of Storage-Time: Efficiently Checking Continuous Data Availability}, howpublished = {Cryptology ePrint Archive, Report 2020/840}, year = {2020}, url = {https://eprint.iacr.org/2020/840}, } @misc{cryptoeprint:2020:841, author = {Bingyong Guo and Zhenliang Lu and Qiang Tang and Jing Xu and Zhenfeng Zhang}, title = {Dumbo: Faster Asynchronous BFT Protocols}, howpublished = {Cryptology ePrint Archive, Report 2020/841}, year = {2020}, url = {https://eprint.iacr.org/2020/841}, } @misc{cryptoeprint:2020:842, author = {Yuan Lu and Zhenliang Lu and Qiang Tang and Guiling Wang}, title = {Dumbo-MVBA: Optimal Multi-valued Validated Asynchronous Byzantine Agreement, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2020/842}, year = {2020}, url = {https://eprint.iacr.org/2020/842}, } @misc{cryptoeprint:2020:843, author = {Yuan Lu and Qiang Tang and Guiling Wang}, title = {Dragoon: Private Decentralized HITs Made Practical}, howpublished = {Cryptology ePrint Archive, Report 2020/843}, year = {2020}, url = {https://eprint.iacr.org/2020/843}, } @misc{cryptoeprint:2020:844, author = {Yuan Lu and Qiang Tang and Guiling Wang}, title = {Generic Superlight Client for Permissionless Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2020/844}, year = {2020}, url = {https://eprint.iacr.org/2020/844}, } @misc{cryptoeprint:2020:845, author = {Muhammed F. Esgin and Oguzhan Ersoy and Zekeriya Erkin}, title = {Post-Quantum Adaptor Signatures and Payment Channel Networks}, howpublished = {Cryptology ePrint Archive, Report 2020/845}, year = {2020}, url = {https://eprint.iacr.org/2020/845}, } @misc{cryptoeprint:2020:846, author = {Aayush Jain and Varun Kohli and Girish Mishra}, title = {Deep Learning based Differential Distinguisher for Lightweight Cipher PRESENT}, howpublished = {Cryptology ePrint Archive, Report 2020/846}, year = {2020}, url = {https://eprint.iacr.org/2020/846}, } @misc{cryptoeprint:2020:847, author = {Jeroen Pijnenburg and Bertram Poettering}, title = {Encrypt-to-self: Securely Outsourcing Storage}, howpublished = {Cryptology ePrint Archive, Report 2020/847}, year = {2020}, url = {https://eprint.iacr.org/2020/847}, } @misc{cryptoeprint:2020:848, author = {Marjan Škrobot and Jean Lancrenon}, title = {On Composability of Game-based Password Authenticated Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2020/848}, year = {2020}, url = {https://eprint.iacr.org/2020/848}, } @misc{cryptoeprint:2020:849, author = {Ben Smyth}, title = {Surveying global verifiability}, howpublished = {Cryptology ePrint Archive, Report 2020/849}, year = {2020}, url = {https://eprint.iacr.org/2020/849}, } @misc{cryptoeprint:2020:850, author = {Sergey Agievich}, title = {On the Guaranteed Number of Activations in XS-circuits}, howpublished = {Cryptology ePrint Archive, Report 2020/850}, year = {2020}, url = {https://eprint.iacr.org/2020/850}, } @misc{cryptoeprint:2020:851, author = {Erica Blum and Jonathan Katz and Chen-Da Liu-Zhang and Julian Loss}, title = {Asynchronous Byzantine Agreement with Subquadratic Communication}, howpublished = {Cryptology ePrint Archive, Report 2020/851}, year = {2020}, url = {https://eprint.iacr.org/2020/851}, } @misc{cryptoeprint:2020:852, author = {Chelsea Komlo and Ian Goldberg}, title = {FROST: Flexible Round-Optimized Schnorr Threshold Signatures}, howpublished = {Cryptology ePrint Archive, Report 2020/852}, year = {2020}, url = {https://eprint.iacr.org/2020/852}, } @misc{cryptoeprint:2020:853, author = {Marco Holz and Ágnes Kiss and Deevashwer Rathee and Thomas Schneider}, title = {Linear-Complexity Private Function Evaluation is Practical}, howpublished = {Cryptology ePrint Archive, Report 2020/853}, year = {2020}, url = {https://eprint.iacr.org/2020/853}, } @misc{cryptoeprint:2020:854, author = {Angèle Bossuat and Xavier Bultel and Pierre-Alain Fouque and Cristina Onete and Thyla van der Merwe}, title = {Designing Reverse Firewalls for the Real World}, howpublished = {Cryptology ePrint Archive, Report 2020/854}, year = {2020}, url = {https://eprint.iacr.org/2020/854}, } @misc{cryptoeprint:2020:855, author = {Vladimir Sedlacek and Jan Jancar and Petr Svenda}, title = {Fooling primality tests on smartcards}, howpublished = {Cryptology ePrint Archive, Report 2020/855}, year = {2020}, url = {https://eprint.iacr.org/2020/855}, } @misc{cryptoeprint:2020:856, author = {Olivier Sanders}, title = {Improving Revocation for Group Signature with Redactable Signature}, howpublished = {Cryptology ePrint Archive, Report 2020/856}, year = {2020}, url = {https://eprint.iacr.org/2020/856}, } @misc{cryptoeprint:2020:857, author = {Ivan Oleynikov and Elena Pagnin and Andrei Sabelfeld}, title = {Where are you Bob? Privacy-Preserving Proximity Testing with a Napping Party}, howpublished = {Cryptology ePrint Archive, Report 2020/857}, year = {2020}, url = {https://eprint.iacr.org/2020/857}, } @misc{cryptoeprint:2020:858, author = {Gareth T. Davies and Christian Janson and Daniel P. Martin}, title = {Client-oblivious OPRAM}, howpublished = {Cryptology ePrint Archive, Report 2020/858}, year = {2020}, url = {https://eprint.iacr.org/2020/858}, } @misc{cryptoeprint:2020:859, author = {Balthazar Bauer and Georg Fuchsbauer and Julian Loss}, title = {A Classification of Computational Assumptions in the Algebraic Group Model}, howpublished = {Cryptology ePrint Archive, Report 2020/859}, year = {2020}, url = {https://eprint.iacr.org/2020/859}, } @misc{cryptoeprint:2020:860, author = {Yael Tauman Kalai and Rachel Zhang}, title = {SNARGs for Bounded Depth Computations from Sub-Exponential LWE}, howpublished = {Cryptology ePrint Archive, Report 2020/860}, year = {2020}, url = {https://eprint.iacr.org/2020/860}, } @misc{cryptoeprint:2020:861, author = {Pedro Geraldo M. R. Alves and Jheyne N. Ortiz and Diego F. Aranha}, title = {Faster Homomorphic Encryption over GPGPUs via hierarchical DGT}, howpublished = {Cryptology ePrint Archive, Report 2020/861}, year = {2020}, url = {https://eprint.iacr.org/2020/861}, } @misc{cryptoeprint:2020:862, author = {Sarah Scheffler and Mayank Varia}, title = {Protecting Cryptography Against Compelled Self-Incrimination}, howpublished = {Cryptology ePrint Archive, Report 2020/862}, year = {2020}, url = {https://eprint.iacr.org/2020/862}, } @misc{cryptoeprint:2020:863, author = {Ran Canetti and Yael Tauman Kalai and Anna Lysyanskaya and Ronald L. Rivest and Adi Shamir and Emily Shen and Ari Trachtenberg and Mayank Varia and Daniel J. Weitzner}, title = {Privacy-Preserving Automated Exposure Notification}, howpublished = {Cryptology ePrint Archive, Report 2020/863}, year = {2020}, url = {https://eprint.iacr.org/2020/863}, } @misc{cryptoeprint:2020:864, author = {Ferhat Karakoç and Alptekin Küpçü}, title = {Linear Complexity Private Set Intersection for Secure Two-Party Protocols}, howpublished = {Cryptology ePrint Archive, Report 2020/864}, year = {2020}, url = {https://eprint.iacr.org/2020/864}, } @misc{cryptoeprint:2020:865, author = {Vlasis Koutsos and Dimitrios Papadopoulos and Dimitris Chatzopoulos and Sasu Tarkoma and Pan Hui}, title = {Agora: A Privacy-Aware Data Marketplace}, howpublished = {Cryptology ePrint Archive, Report 2020/865}, year = {2020}, url = {https://eprint.iacr.org/2020/865}, } @misc{cryptoeprint:2020:866, author = {Markku-Juhani O. Saarinen and G. Richard Newell and Ben Marshall}, title = {Building a Modern TRNG: An Entropy Source Interface for RISC-V}, howpublished = {Cryptology ePrint Archive, Report 2020/866}, year = {2020}, url = {https://eprint.iacr.org/2020/866}, } @misc{cryptoeprint:2020:867, author = {Ping Wang and Ping Chen and Zhimin Luo and Gaofeng Dong and Mengce Zheng and Nenghai Yu and Honggang Hu}, title = {Enhancing the Performance of Practical Profiling Side-Channel Attacks Using Conditional Generative Adversarial Networks}, howpublished = {Cryptology ePrint Archive, Report 2020/867}, year = {2020}, url = {https://eprint.iacr.org/2020/867}, } @misc{cryptoeprint:2020:868, author = {Kostis Karantias}, title = {SoK: A Taxonomy of Cryptocurrency Wallets}, howpublished = {Cryptology ePrint Archive, Report 2020/868}, year = {2020}, url = {https://eprint.iacr.org/2020/868}, } @misc{cryptoeprint:2020:869, author = {Thomas Debris-Alazard and Léo Ducas and Wessel P.J. van Woerden}, title = {An Algorithmic Reduction Theory for Binary Codes: LLL and more}, howpublished = {Cryptology ePrint Archive, Report 2020/869}, year = {2020}, url = {https://eprint.iacr.org/2020/869}, } @misc{cryptoeprint:2020:870, author = {Yu Yu and Jiang Zhang}, title = {Smoothing Out Binary Linear Codes and Worst-case Sub-exponential Hardness for LPN}, howpublished = {Cryptology ePrint Archive, Report 2020/870}, year = {2020}, url = {https://eprint.iacr.org/2020/870}, } @misc{cryptoeprint:2020:871, author = {Qipeng Liu and Amit Sahai and Mark Zhandry}, title = {Quantum Immune One-Time Memories}, howpublished = {Cryptology ePrint Archive, Report 2020/871}, year = {2020}, url = {https://eprint.iacr.org/2020/871}, } @misc{cryptoeprint:2020:872, author = {Gabriel Zaid and Lilian Bossuet and François Dassance and Amaury Habrard and Alexandre Venelli}, title = {Ranking Loss: Maximizing the Success Rate in Deep Learning Side-Channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2020/872}, year = {2020}, url = {https://eprint.iacr.org/2020/872}, } @misc{cryptoeprint:2020:873, author = {Julia Bobrysheva and Sergey Zapechnikov}, title = {Post-Quantum Group Key Agreement Scheme}, howpublished = {Cryptology ePrint Archive, Report 2020/873}, year = {2020}, url = {https://eprint.iacr.org/2020/873}, } @misc{cryptoeprint:2020:874, author = {Susan Hohenberger and Brent Waters}, title = {New Methods and Abstractions for RSA-Based Forward Secure Signatures}, howpublished = {Cryptology ePrint Archive, Report 2020/874}, year = {2020}, url = {https://eprint.iacr.org/2020/874}, } @misc{cryptoeprint:2020:875, author = {Daiki Hayashida and Kenichiro Hayasaka and Tadanori Teruya}, title = {Efficient Final Exponentiation via Cyclotomic Structure for Pairings over Families of Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2020/875}, year = {2020}, url = {https://eprint.iacr.org/2020/875}, } @misc{cryptoeprint:2020:876, author = {Claude Carlet and Sylvain Guilley and Sihem Mesnager}, title = {Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks}, howpublished = {Cryptology ePrint Archive, Report 2020/876}, year = {2020}, url = {https://eprint.iacr.org/2020/876}, } @misc{cryptoeprint:2020:877, author = {Marios Georgiou and Mark Zhandry}, title = {Unclonable Decryption Keys}, howpublished = {Cryptology ePrint Archive, Report 2020/877}, year = {2020}, url = {https://eprint.iacr.org/2020/877}, } @misc{cryptoeprint:2020:878, author = {Sankhanil De and Ranjan Ghosh}, title = {Bent Boolean functions A better procedure to generate non-crypto 4-bit S-boxes}, howpublished = {Cryptology ePrint Archive, Report 2020/878}, year = {2020}, url = {https://eprint.iacr.org/2020/878}, } @misc{cryptoeprint:2020:879, author = {Annapurna Valiveti and Srinivas Vivek}, title = {Second-Order Masked Lookup Table Compression Scheme}, howpublished = {Cryptology ePrint Archive, Report 2020/879}, year = {2020}, url = {https://eprint.iacr.org/2020/879}, } @misc{cryptoeprint:2020:880, author = {Palash Sarkar and Subhadip Singha}, title = {Classical Reduction of SVP to LWE: A Concrete Security Analysis}, howpublished = {Cryptology ePrint Archive, Report 2020/880}, year = {2020}, url = {https://eprint.iacr.org/2020/880}, } @misc{cryptoeprint:2020:881, author = {Loïc Masure and Nicolas Belleville and Eleonora Cagli and Marie-Angela Cornelie and Damien Couroussé and Cécile Dumas and Laurent Maingault}, title = {Deep Learning Side-Channel Analysis on Large-Scale Traces - A Case Study on a Polymorphic AES}, howpublished = {Cryptology ePrint Archive, Report 2020/881}, year = {2020}, url = {https://eprint.iacr.org/2020/881}, } @misc{cryptoeprint:2020:882, author = {Willy Susilo and Dung Hoang Duong and Huy Quoc Le and Josef Pieprzyk}, title = {Puncturable Encryption: A Generic Construction from Delegatable Fully Key-Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/882}, year = {2020}, url = {https://eprint.iacr.org/2020/882}, } @misc{cryptoeprint:2020:883, author = {Jeroen Delvaux}, title = {On The Deployment of Tweak-in-Plaintext Protection Against Differential Fault Analysis}, howpublished = {Cryptology ePrint Archive, Report 2020/883}, year = {2020}, url = {https://eprint.iacr.org/2020/883}, } @misc{cryptoeprint:2020:884, author = {Linru Zhang and Xiangning Wang and Yuechen Chen and Siu-Ming Yiu}, title = {Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model}, howpublished = {Cryptology ePrint Archive, Report 2020/884}, year = {2020}, url = {https://eprint.iacr.org/2020/884}, } @misc{cryptoeprint:2020:885, author = {Klaus Kursawe}, title = {Wendy, the Good Little Fairness Widget}, howpublished = {Cryptology ePrint Archive, Report 2020/885}, year = {2020}, url = {https://eprint.iacr.org/2020/885}, } @misc{cryptoeprint:2020:886, author = {Keita Emura and Atsushi Takayasu and Yohei Watanabe}, title = {Adaptively Secure Revocable Hierarchical IBE from $k$-linear Assumption}, howpublished = {Cryptology ePrint Archive, Report 2020/886}, year = {2020}, url = {https://eprint.iacr.org/2020/886}, } @misc{cryptoeprint:2020:887, author = {Michele Ciampi and Nikos Karayannidis and Aggelos Kiayias and Dionysis Zindros}, title = {Updatable Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2020/887}, year = {2020}, url = {https://eprint.iacr.org/2020/887}, } @misc{cryptoeprint:2020:888, author = {Emanuele Strieder and Christoph Frisch and Michael Pehl}, title = {Machine Learning of Physical Unclonable Functions using Helper Data, Revealing a Pitfall in the Fuzzy Commitment Scheme}, howpublished = {Cryptology ePrint Archive, Report 2020/888}, year = {2020}, url = {https://eprint.iacr.org/2020/888}, } @misc{cryptoeprint:2020:889, author = {James Bartusek and Yuval Ishai and Aayush Jain and Fermi Ma and Amit Sahai and Mark Zhandry}, title = {Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/889}, year = {2020}, url = {https://eprint.iacr.org/2020/889}, } @misc{cryptoeprint:2020:890, author = {Aein Rezaei Shahmirzadi and Amir Moradi}, title = {Re-Consolidating First-Order Masking Schemes - Nullifying Fresh Randomness}, howpublished = {Cryptology ePrint Archive, Report 2020/890}, year = {2020}, url = {https://eprint.iacr.org/2020/890}, } @misc{cryptoeprint:2020:891, author = {Guilherme Perin and Lukasz Chmielewski and Lejla Batina and Stjepan Picek}, title = {Keep it Unsupervised: Horizontal Attacks Meet Deep Learning}, howpublished = {Cryptology ePrint Archive, Report 2020/891}, year = {2020}, url = {https://eprint.iacr.org/2020/891}, } @misc{cryptoeprint:2020:892, author = {Sayandeep Saha and Arnab Bag and and Debdeep Mukhopadhyay}, title = {Pushing the Limits of Fault Template Attacks: The Role of Side-Channels}, howpublished = {Cryptology ePrint Archive, Report 2020/892}, year = {2020}, url = {https://eprint.iacr.org/2020/892}, } @misc{cryptoeprint:2020:893, author = {Lucas Barthelemy}, title = {Toward an Asymmetric White-Box Proposal}, howpublished = {Cryptology ePrint Archive, Report 2020/893}, year = {2020}, url = {https://eprint.iacr.org/2020/893}, } @misc{cryptoeprint:2020:894, author = {Georgios Tsimos and Julian Loss and Charalampos Papamanthou}, title = {Nearly Quadratic Broadcast Without Trusted Setup Under Dishonest Majority}, howpublished = {Cryptology ePrint Archive, Report 2020/894}, year = {2020}, url = {https://eprint.iacr.org/2020/894}, } @misc{cryptoeprint:2020:895, author = {Joachim Zahnentferner}, title = {Multi-Currency Ledgers}, howpublished = {Cryptology ePrint Archive, Report 2020/895}, year = {2020}, url = {https://eprint.iacr.org/2020/895}, } @misc{cryptoeprint:2020:896, author = {Albert Spruyt and Alyssa Milburn and Lukasz Chmielewski}, title = {Fault Injection as an Oscilloscope: Fault Correlation Analysis}, howpublished = {Cryptology ePrint Archive, Report 2020/896}, year = {2020}, url = {https://eprint.iacr.org/2020/896}, } @misc{cryptoeprint:2020:897, author = {Jan Richter-Brockmann and Tim Güneysu}, title = {Folding BIKE: Scalable Hardware Implementation for Reconfigurable Devices}, howpublished = {Cryptology ePrint Archive, Report 2020/897}, year = {2020}, url = {https://eprint.iacr.org/2020/897}, } @misc{cryptoeprint:2020:898, author = {Joppe W. Bos and Andreas Hülsing and Joost Renes and Christine van Vredendaal}, title = {Rapidly Verifiable XMSS Signatures}, howpublished = {Cryptology ePrint Archive, Report 2020/898}, year = {2020}, url = {https://eprint.iacr.org/2020/898}, } @misc{cryptoeprint:2020:899, author = {Lichao Wu and Leo Weissbart and Marina Krcek and Huimin Li and Guilherme Perin and Lejla Batina and Stjepan Picek}, title = {Everything is Connected: From Model Learnability to Guessing Entropy}, howpublished = {Cryptology ePrint Archive, Report 2020/899}, year = {2020}, url = {https://eprint.iacr.org/2020/899}, } @misc{cryptoeprint:2020:900, author = {Pierre-Louis Cayrel and Brice Colombier and Vlad-Florin Dragoi and Alexandre Menu and Lilian Bossuet}, title = {Message-recovery Laser Fault Injection Attack on Code-based Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2020/900}, year = {2020}, url = {https://eprint.iacr.org/2020/900}, } @misc{cryptoeprint:2020:901, author = {Hongrui Cui and Yu Yu}, title = {A Not-So-Trival Replay Attack Against DH-PSI}, howpublished = {Cryptology ePrint Archive, Report 2020/901}, year = {2020}, url = {https://eprint.iacr.org/2020/901}, } @misc{cryptoeprint:2020:902, author = {Huanyu Wang and Elena Dubrova}, title = {Federated Learning in Side-Channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2020/902}, year = {2020}, url = {https://eprint.iacr.org/2020/902}, } @misc{cryptoeprint:2020:903, author = {Zejun Xiang and Xiangyong Zeng and Da Lin and Zhenzhen Bao and Shasha Zhang}, title = {Optimizing Implementations of Linear Layers}, howpublished = {Cryptology ePrint Archive, Report 2020/903}, year = {2020}, url = {https://eprint.iacr.org/2020/903}, } @misc{cryptoeprint:2020:904, author = {Huimin Li and Marina Krček and Guilherme Perin}, title = {A Comparison of Weight Initializers in Deep Learning-based Side-channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2020/904}, year = {2020}, url = {https://eprint.iacr.org/2020/904}, } @misc{cryptoeprint:2020:905, author = {Marco Baldi and Karan Khathuria and Edoardo Persichetti and Paolo Santini}, title = {Cryptanalysis of a Code-Based Signature Scheme Based on the Lyubashevsky Framework}, howpublished = {Cryptology ePrint Archive, Report 2020/905}, year = {2020}, url = {https://eprint.iacr.org/2020/905}, } @misc{cryptoeprint:2020:906, author = {Ashish Choudhury}, title = {Optimally-resilient Unconditionally-secure Asynchronous Multi-party Computation Revisited}, howpublished = {Cryptology ePrint Archive, Report 2020/906}, year = {2020}, url = {https://eprint.iacr.org/2020/906}, } @misc{cryptoeprint:2020:907, author = {Milad Seddigh and Hadi Soleimany}, title = {Enhanced Flush+Reload Attack on AES}, howpublished = {Cryptology ePrint Archive, Report 2020/907}, year = {2020}, url = {https://eprint.iacr.org/2020/907}, } @misc{cryptoeprint:2020:908, author = {Shuhei Nakamura and Yacheng Wang and Yasuhiko Ikematsu}, title = {Analysis on the MinRank Attack using Kipnis-Shamir Method Against Rainbow}, howpublished = {Cryptology ePrint Archive, Report 2020/908}, year = {2020}, url = {https://eprint.iacr.org/2020/908}, } @misc{cryptoeprint:2020:909, author = {Eleanor McMurtry and Olivier Pereira and Vanessa Teague}, title = {When is a test not a proof?}, howpublished = {Cryptology ePrint Archive, Report 2020/909}, year = {2020}, url = {https://eprint.iacr.org/2020/909}, } @misc{cryptoeprint:2020:910, author = {Thomas Schamberger and Julian Renner and Georg Sigl and Antonia Wachter-Zeh}, title = {A Power Side-Channel Attack on the CCA2-Secure HQC KEM}, howpublished = {Cryptology ePrint Archive, Report 2020/910}, year = {2020}, url = {https://eprint.iacr.org/2020/910}, } @misc{cryptoeprint:2020:911, author = {Ruta Jawale and Dakshita Khurana}, title = {Lossy Correlation Intractability and PPAD Hardness from Sub-exponential LWE}, howpublished = {Cryptology ePrint Archive, Report 2020/911}, year = {2020}, url = {https://eprint.iacr.org/2020/911}, } @misc{cryptoeprint:2020:912, author = {Zhuang Xu and Owen Pemberton and Sujoy Sinha Roy and David Oswald}, title = {Magnifying Side-Channel Leakage of Lattice-Based Cryptosystems with Chosen Ciphertexts: The Case Study of Kyber}, howpublished = {Cryptology ePrint Archive, Report 2020/912}, year = {2020}, url = {https://eprint.iacr.org/2020/912}, } @misc{cryptoeprint:2020:913, author = {Tarun Yadav and Manoj Kumar}, title = {Differential-ML Distinguisher: Machine Learning based Generic Extension for Differential Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2020/913}, year = {2020}, url = {https://eprint.iacr.org/2020/913}, } @misc{cryptoeprint:2020:914, author = {Jacques Patarin and Gilles Macario-Rat and Maxime Bros and Eliane Koussa }, title = {Ultra-Short Multivariate Public Key Signatures}, howpublished = {Cryptology ePrint Archive, Report 2020/914}, year = {2020}, url = {https://eprint.iacr.org/2020/914}, } @misc{cryptoeprint:2020:915, author = {Yilei Chen and Alex Lombardi and Fermi Ma and Willy Quach}, title = {Does Fiat-Shamir Require a Cryptographic Hash Function?}, howpublished = {Cryptology ePrint Archive, Report 2020/915}, year = {2020}, url = {https://eprint.iacr.org/2020/915}, } @misc{cryptoeprint:2020:916, author = {Ivan Damgård and Claudio Orlandi and Mark Simkin}, title = {Black-Box Transformations from Passive to Covert Security with Public Verifiability}, howpublished = {Cryptology ePrint Archive, Report 2020/916}, year = {2020}, url = {https://eprint.iacr.org/2020/916}, } @misc{cryptoeprint:2020:917, author = {Søren Eller Thomsen and Bas Spitters}, title = {Formalizing Nakamoto-Style Proof of Stake}, howpublished = {Cryptology ePrint Archive, Report 2020/917}, year = {2020}, url = {https://eprint.iacr.org/2020/917}, } @misc{cryptoeprint:2020:918, author = {Basker Palaniswamy}, title = {An Efficient Certificateless Authentication Protocol for the SAE J1939}, howpublished = {Cryptology ePrint Archive, Report 2020/918}, year = {2020}, url = {https://eprint.iacr.org/2020/918}, } @misc{cryptoeprint:2020:919, author = {Xavier Bonnetain}, title = {Tight Bounds for Simon's Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2020/919}, year = {2020}, url = {https://eprint.iacr.org/2020/919}, } @misc{cryptoeprint:2020:920, author = {Deng Tang and Bimal Mandal and Subhamoy Maitra}, title = {Further Cryptographic Properties of the Multiplicative Inverse Function}, howpublished = {Cryptology ePrint Archive, Report 2020/920}, year = {2020}, url = {https://eprint.iacr.org/2020/920}, } @misc{cryptoeprint:2020:921, author = {Hyoseung Kim and Youngkyung Lee and Michel Abdalla and Jong Hwan Park}, title = {Practical Dynamic Group Signature with Efficient Concurrent Joins and Batch Verifications}, howpublished = {Cryptology ePrint Archive, Report 2020/921}, year = {2020}, url = {https://eprint.iacr.org/2020/921}, } @misc{cryptoeprint:2020:922, author = {Soumyadyuti Ghosh and Urbi Chatterjee and Durba Chatterjee and Rumia Masburah and Debdeep Mukhopadhyay and Soumyajit Dey}, title = {Security Challenges in Smart Grid and Suitable Countermeasures}, howpublished = {Cryptology ePrint Archive, Report 2020/922}, year = {2020}, url = {https://eprint.iacr.org/2020/922}, } @misc{cryptoeprint:2020:923, author = {Nicolas Aragon and Jean-Christophe Deneuville and Philippe Gaborit}, title = {Another code-based adaptation of Lyubashevsky’s signature cryptanalysed}, howpublished = {Cryptology ePrint Archive, Report 2020/923}, year = {2020}, url = {https://eprint.iacr.org/2020/923}, } @misc{cryptoeprint:2020:924, author = {Kang Yang and Chenkai Weng and Xiao Lan and Jiang Zhang and Xiao Wang}, title = {Ferret: Fast Extension for coRRElated oT with small communication}, howpublished = {Cryptology ePrint Archive, Report 2020/924}, year = {2020}, url = {https://eprint.iacr.org/2020/924}, } @misc{cryptoeprint:2020:925, author = {Chenkai Weng and Kang Yang and Jonathan Katz and Xiao Wang}, title = {Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits}, howpublished = {Cryptology ePrint Archive, Report 2020/925}, year = {2020}, url = {https://eprint.iacr.org/2020/925}, } @misc{cryptoeprint:2020:926, author = {Brett Hemenway Falk and Daniel Noble}, title = {Secure Computation over Lattices and Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2020/926}, year = {2020}, url = {https://eprint.iacr.org/2020/926}, } @misc{cryptoeprint:2020:927, author = {Stelios Daveas and Kostis Karantias and Aggelos Kiayias and Dionysis Zindros}, title = {A Gas-Efficient Superlight Bitcoin Client in Solidity}, howpublished = {Cryptology ePrint Archive, Report 2020/927}, year = {2020}, url = {https://eprint.iacr.org/2020/927}, } @misc{cryptoeprint:2020:928, author = {Omri Shmueli}, title = {Multi-theorem (Malicious) Designated-Verifier NIZK for QMA}, howpublished = {Cryptology ePrint Archive, Report 2020/928}, year = {2020}, url = {https://eprint.iacr.org/2020/928}, } @misc{cryptoeprint:2020:929, author = {Hai Lin and Christopher Lynch}, title = {Local XOR Unification: Definitions, Algorithms and Application to Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2020/929}, year = {2020}, url = {https://eprint.iacr.org/2020/929}, } @misc{cryptoeprint:2020:930, author = {Ben Marshall and G. Richard Newell and Dan Page and Markku-Juhani O. Saarinen and Claire Wolf}, title = {The design of scalar AES Instruction Set Extensions for RISC-V}, howpublished = {Cryptology ePrint Archive, Report 2020/930}, year = {2020}, url = {https://eprint.iacr.org/2020/930}, } @misc{cryptoeprint:2020:931, author = {Charlotte Bonte and Ilia Iliashenko}, title = {Homomorphic string search with constant multiplicative depth}, howpublished = {Cryptology ePrint Archive, Report 2020/931}, year = {2020}, url = {https://eprint.iacr.org/2020/931}, } @misc{cryptoeprint:2020:932, author = {Atul Chaturvedi Varun Shukla Manoj K.Misra }, title = {A Note on Authenticated Group Key Agreement Protocol Based on Twist Conjugacy Problem in Near – Rings}, howpublished = {Cryptology ePrint Archive, Report 2020/932}, year = {2020}, url = {https://eprint.iacr.org/2020/932}, } @misc{cryptoeprint:2020:933, author = {Mohammad Zaheri}, title = {Instantiation of RO Model Transforms via Extractable Functions}, howpublished = {Cryptology ePrint Archive, Report 2020/933}, year = {2020}, url = {https://eprint.iacr.org/2020/933}, } @misc{cryptoeprint:2020:934, author = {Deepak Maram and Harjasleen Malvai and Fan Zhang and Nerla Jean-Louis and Alexander Frolov and Tyler Kell and Tyrone Lobban and Christine Moy and Ari Juels and Andrew Miller}, title = {CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability}, howpublished = {Cryptology ePrint Archive, Report 2020/934}, year = {2020}, url = {https://eprint.iacr.org/2020/934}, } @misc{cryptoeprint:2020:935, author = {Davide Andreoletti and Omran Ayoub and Silvia Giordano and Massimo Tornatore and Giacomo Verticale}, title = {Privacy-Preserving Multi-Operator Contact Tracing for Early Detection of Covid19 Contagions}, howpublished = {Cryptology ePrint Archive, Report 2020/935}, year = {2020}, url = {https://eprint.iacr.org/2020/935}, } @misc{cryptoeprint:2020:936, author = {Mahender Kumar}, title = {Cryptanalysis and Improvement of Anonymous Authentication for Wireless Body Area Networks with Provable Security}, howpublished = {Cryptology ePrint Archive, Report 2020/936}, year = {2020}, url = {https://eprint.iacr.org/2020/936}, } @misc{cryptoeprint:2020:937, author = {Colin O'Flynn}, title = {BAM BAM!! On Reliability of EMFI for in-situ Automotive ECU Attacks}, howpublished = {Cryptology ePrint Archive, Report 2020/937}, year = {2020}, url = {https://eprint.iacr.org/2020/937}, } @misc{cryptoeprint:2020:938, author = {Suyash Bagad and Saravanan Vijayakumaran}, title = {Performance Trade-offs in Design of MimbleWimble Proofs of Reserves}, howpublished = {Cryptology ePrint Archive, Report 2020/938}, year = {2020}, url = {https://eprint.iacr.org/2020/938}, } @misc{cryptoeprint:2020:939, author = {JongHyeok Lee and Dong-Guk Han}, title = {DLDDO: Deep Learning to Detect Dummy Operations}, howpublished = {Cryptology ePrint Archive, Report 2020/939}, year = {2020}, url = {https://eprint.iacr.org/2020/939}, } @misc{cryptoeprint:2020:940, author = {Fei Meng}, title = {Directly revocable ciphertext-policy attribute-based encryption from lattices}, howpublished = {Cryptology ePrint Archive, Report 2020/940}, year = {2020}, url = {https://eprint.iacr.org/2020/940}, } @misc{cryptoeprint:2020:941, author = {Doyoung Chung and Jooyoung Lee and Seungkwang Lee and Dooho choi}, title = {Towards Optimizing Quantum Implementation of AES S-box}, howpublished = {Cryptology ePrint Archive, Report 2020/941}, year = {2020}, url = {https://eprint.iacr.org/2020/941}, } @misc{cryptoeprint:2020:942, author = {Philipp Schindler and Aljosha Judmayer and Markus Hittmeir and Nicholas Stifter and Edgar Weippl}, title = {RandRunner: Distributed Randomness from Trapdoor VDFs with Strong Uniqueness}, howpublished = {Cryptology ePrint Archive, Report 2020/942}, year = {2020}, url = {https://eprint.iacr.org/2020/942}, } @misc{cryptoeprint:2020:943, author = {Runchao Han and Jiangshan Yu and Ren Zhang}, title = {Analysing and Improving Shard Allocation Protocols for Sharded Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2020/943}, year = {2020}, url = {https://eprint.iacr.org/2020/943}, } @misc{cryptoeprint:2020:944, author = {Manuel Barbosa and Bernardo Ferreira and João Marques and Bernardo Portela and Nuno Preguiça}, title = {Secure Conflict-free Replicated Data Types}, howpublished = {Cryptology ePrint Archive, Report 2020/944}, year = {2020}, url = {https://eprint.iacr.org/2020/944}, } @misc{cryptoeprint:2020:945, author = {Fabrice Benhamouda and Tancrède Lepoint and Michele Orrù and Mariana Raykova}, title = {On the (in)security of ROS}, howpublished = {Cryptology ePrint Archive, Report 2020/945}, year = {2020}, url = {https://eprint.iacr.org/2020/945}, } @misc{cryptoeprint:2020:946, author = {Johannes Mittmann and Werner Schindler}, title = {Timing attacks and local timing attacks against Barrett’s modular multiplication algorithm}, howpublished = {Cryptology ePrint Archive, Report 2020/946}, year = {2020}, url = {https://eprint.iacr.org/2020/946}, } @misc{cryptoeprint:2020:947, author = {Vijaya Ramachandran and Elaine Shi}, title = {Data Oblivious Algorithms for Multicores}, howpublished = {Cryptology ePrint Archive, Report 2020/947}, year = {2020}, url = {https://eprint.iacr.org/2020/947}, } @misc{cryptoeprint:2020:948, author = {Eli Ben-Sasson and Lior Goldberg and David Levit}, title = {STARK Friendly Hash -- Survey and Recommendation}, howpublished = {Cryptology ePrint Archive, Report 2020/948}, year = {2020}, url = {https://eprint.iacr.org/2020/948}, } @misc{cryptoeprint:2020:949, author = {Nathan Manohar and Peter Manohar and Rajit Manohar}, title = {HABIT: Hardware-Assisted Bluetooth-based Infection Tracking}, howpublished = {Cryptology ePrint Archive, Report 2020/949}, year = {2020}, url = {https://eprint.iacr.org/2020/949}, } @misc{cryptoeprint:2020:950, author = {Nathan Manohar and Abhishek Jain and Amit Sahai}, title = {Self-Processing Private Sensor Data via Garbled Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/950}, year = {2020}, url = {https://eprint.iacr.org/2020/950}, } @misc{cryptoeprint:2020:951, author = {Aayush Jain and Alexis Korb and Nathan Manohar and Amit Sahai}, title = {Amplifying the Security of Functional Encryption, Unconditionally}, howpublished = {Cryptology ePrint Archive, Report 2020/951}, year = {2020}, url = {https://eprint.iacr.org/2020/951}, } @misc{cryptoeprint:2020:952, author = {Christophe Genevey-Metat and Benoît Gérard and Annelie Heuser}, title = {On What to Learn: Train or Adapt a Deeply Learned Profile?}, howpublished = {Cryptology ePrint Archive, Report 2020/952}, year = {2020}, url = {https://eprint.iacr.org/2020/952}, } @misc{cryptoeprint:2020:953, author = {Emanuele Bellini and Matteo Rossi}, title = {Performance comparison between deep learning-based and conventional cryptographic distinguishers}, howpublished = {Cryptology ePrint Archive, Report 2020/953}, year = {2020}, url = {https://eprint.iacr.org/2020/953}, } @misc{cryptoeprint:2020:954, author = {Mark Zhandry}, title = {New Techniques for Traitor Tracing: Size $N^{1/3}$ and More from Pairings}, howpublished = {Cryptology ePrint Archive, Report 2020/954}, year = {2020}, url = {https://eprint.iacr.org/2020/954}, } @misc{cryptoeprint:2020:955, author = {Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso and Masahiro Mambo}, title = {Quantum-resistant Public-key Authenticated Encryption with Keyword Search for Industrial Internet of Things}, howpublished = {Cryptology ePrint Archive, Report 2020/955}, year = {2020}, url = {https://eprint.iacr.org/2020/955}, } @misc{cryptoeprint:2020:956, author = {Kaushik Nath and Palash Sarkar}, title = {Constant Time Montgomery Ladder}, howpublished = {Cryptology ePrint Archive, Report 2020/956}, year = {2020}, url = {https://eprint.iacr.org/2020/956}, } @misc{cryptoeprint:2020:957, author = {Johannes Tobisch and Anita Aghaie and Georg T. Becker}, title = {Combining Optimization Objectives: New Machine-Learning Attacks on Strong PUFs}, howpublished = {Cryptology ePrint Archive, Report 2020/957}, year = {2020}, url = {https://eprint.iacr.org/2020/957}, } @misc{cryptoeprint:2020:958, author = {Martin Hirt and Ard Kastrati and Chen-Da Liu-Zhang}, title = {Multi-Threshold Asynchronous Reliable Broadcast and Consensus}, howpublished = {Cryptology ePrint Archive, Report 2020/958}, year = {2020}, url = {https://eprint.iacr.org/2020/958}, } @misc{cryptoeprint:2020:959, author = {Carlos Cid and Akinori Hosoyamada and Yunwen Liu and Siang Meng Sim}, title = {Quantum Cryptanalysis on Contracting Feistel Structures and Observation on Related-key settings}, howpublished = {Cryptology ePrint Archive, Report 2020/959}, year = {2020}, url = {https://eprint.iacr.org/2020/959}, } @misc{cryptoeprint:2020:960, author = {Florian Unterstein and Marc Schink and Thomas Schamberger and Lars Tebelmann and Manuel Ilg and Johann Heyszl}, title = {Retrofitting Leakage Resilient Authenticated Encryption to Microcontrollers}, howpublished = {Cryptology ePrint Archive, Report 2020/960}, year = {2020}, url = {https://eprint.iacr.org/2020/960}, } @misc{cryptoeprint:2020:961, author = {Qizheng Wang and Wenping Ma and Jie Li and Ge Liu}, title = {Enable Dynamic Parameters Combination to Boost Linear Convolutional Neural Network for Sensitive Data Inference}, howpublished = {Cryptology ePrint Archive, Report 2020/961}, year = {2020}, url = {https://eprint.iacr.org/2020/961}, } @misc{cryptoeprint:2020:962, author = {Dominique Unruh}, title = {Post-Quantum Verification of Fujisaki-Okamoto}, howpublished = {Cryptology ePrint Archive, Report 2020/962}, year = {2020}, url = {https://eprint.iacr.org/2020/962}, } @misc{cryptoeprint:2020:963, author = {Diana Ghinea and Martin Hirt and Chen-Da Liu-Zhang}, title = {From Partial to Global Asynchronous Reliable Broadcast}, howpublished = {Cryptology ePrint Archive, Report 2020/963}, year = {2020}, url = {https://eprint.iacr.org/2020/963}, } @misc{cryptoeprint:2020:964, author = {Hamish Hunt and Jack Crawford and Oliver Masters and Enrico Steffinlongo and Flavio Bergamaschi}, title = {Configurable Private Querying: Lookup and Partial Matching under Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/964}, year = {2020}, url = {https://eprint.iacr.org/2020/964}, } @misc{cryptoeprint:2020:965, author = {Robert Granger and Thorsten Kleinjung and Arjen K. Lenstra and Benjamin Wesolowski and Jens Zumbragel}, title = {Computation of a 30750-Bit Binary Field Discrete Logarithm}, howpublished = {Cryptology ePrint Archive, Report 2020/965}, year = {2020}, url = {https://eprint.iacr.org/2020/965}, } @misc{cryptoeprint:2020:966, author = {Rick Boivie and Charanjit S. Jutla and Daniel Friedman and Ghavam Shahidi}, title = {EM-Side-Channel Resistant Symmetric-Key Authentication Mechanism for Small Devices}, howpublished = {Cryptology ePrint Archive, Report 2020/966}, year = {2020}, url = {https://eprint.iacr.org/2020/966}, } @misc{cryptoeprint:2020:967, author = {Jintai Ding and Joshua Deaton and Vishakha and Bo-Yin Yang}, title = {The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes}, howpublished = {Cryptology ePrint Archive, Report 2020/967}, year = {2020}, url = {https://eprint.iacr.org/2020/967}, } @misc{cryptoeprint:2020:968, author = {Gideon Samid}, title = {Feeding Cryptographic Protocols with Rich and Reliable Supply of Quantum-Grade Randomness }, howpublished = {Cryptology ePrint Archive, Report 2020/968}, year = {2020}, url = {https://eprint.iacr.org/2020/968}, } @misc{cryptoeprint:2020:969, author = {Dmitrii Koshelev}, title = {Efficient constant-time hashing to some elliptic curves of $j$-invariant $0$}, howpublished = {Cryptology ePrint Archive, Report 2020/969}, year = {2020}, url = {https://eprint.iacr.org/2020/969}, } @misc{cryptoeprint:2020:970, author = {Carsten Baum and Daniel Escudero and Alberto Pedrouzo-Ulloa and Peter Scholl and Juan Ramón Troncoso-Pastoriza}, title = {Efficient Protocols for Oblivious Linear Function Evaluation from Ring-LWE}, howpublished = {Cryptology ePrint Archive, Report 2020/970}, year = {2020}, url = {https://eprint.iacr.org/2020/970}, } @misc{cryptoeprint:2020:971, author = {Koksal Mus and Saad Islam and Berk Sunar}, title = {QuantumHammer: A Practical Hybrid Attack on the LUOV Signature Scheme}, howpublished = {Cryptology ePrint Archive, Report 2020/971}, year = {2020}, url = {https://eprint.iacr.org/2020/971}, } @misc{cryptoeprint:2020:972, author = {Thomas Pornin}, title = {Optimized Binary GCD for Modular Inversion}, howpublished = {Cryptology ePrint Archive, Report 2020/972}, year = {2020}, url = {https://eprint.iacr.org/2020/972}, } @misc{cryptoeprint:2020:973, author = {David Heath and Vladimir Kolesnikov}, title = {Stacked Garbling: Garbled Circuit Proportional to Longest Execution Path}, howpublished = {Cryptology ePrint Archive, Report 2020/973}, year = {2020}, url = {https://eprint.iacr.org/2020/973}, } @misc{cryptoeprint:2020:974, author = {Dongxi Liu and Surya Nepal}, title = {Compact-LWE-MQ^{H}: Public Key Encryption without Hardness Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2020/974}, year = {2020}, url = {https://eprint.iacr.org/2020/974}, } @misc{cryptoeprint:2020:975, author = {Derek Leung and Yossi Gilad and Sergey Gorbunov and Leonid Reyzin and Nickolai Zeldovich}, title = {Aardvark: A Concurrent Authenticated Dictionary with Short Proofs}, howpublished = {Cryptology ePrint Archive, Report 2020/975}, year = {2020}, url = {https://eprint.iacr.org/2020/975}, } @misc{cryptoeprint:2020:976, author = {Ranjit Kumaresan and Srinivasan Raghuraman and Adam Sealfon}, title = {Synchronizable Exchange}, howpublished = {Cryptology ePrint Archive, Report 2020/976}, year = {2020}, url = {https://eprint.iacr.org/2020/976}, } @misc{cryptoeprint:2020:977, author = {Guilherme Perin and Stjepan Picek}, title = {On the Influence of Optimizers in Deep Learning-based Side-channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2020/977}, year = {2020}, url = {https://eprint.iacr.org/2020/977}, } @misc{cryptoeprint:2020:978, author = {Sarah Alzakari and Poorvi Vora}, title = {Linear and Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPARX Cipher}, howpublished = {Cryptology ePrint Archive, Report 2020/978}, year = {2020}, url = {https://eprint.iacr.org/2020/978}, } @misc{cryptoeprint:2020:979, author = {Elizabeth C. Crites and Anna Lysyanskaya}, title = {Mercurial Signatures for Variable-Length Messages}, howpublished = {Cryptology ePrint Archive, Report 2020/979}, year = {2020}, url = {https://eprint.iacr.org/2020/979}, } @misc{cryptoeprint:2020:980, author = {Ruta Jawale and Yael Tauman Kalai and Dakshita Khurana and Rachel Zhang}, title = {SNARGs for Bounded Depth Computations and PPAD Hardness from Sub-Exponential LWE}, howpublished = {Cryptology ePrint Archive, Report 2020/980}, year = {2020}, url = {https://eprint.iacr.org/2020/980}, } @misc{cryptoeprint:2020:981, author = {Manan Pareek and Dr. Girish Mishra and Varun Kohli}, title = {Deep Learning based analysis of Key Scheduling Algorithm of PRESENT cipher}, howpublished = {Cryptology ePrint Archive, Report 2020/981}, year = {2020}, url = {https://eprint.iacr.org/2020/981}, } @misc{cryptoeprint:2020:982, author = {Sevdenur Baloglu and Sergiu Bursuc and Sjouke Mauw and Jun Pang}, title = {Election Verifiability Revisited: Automated Security Proofs and Attacks on Helios and Belenios}, howpublished = {Cryptology ePrint Archive, Report 2020/982}, year = {2020}, url = {https://eprint.iacr.org/2020/982}, } @misc{cryptoeprint:2020:983, author = {Michael Stay}, title = {A Differential Meet-in-the-Middle Attack on the Zip cipher}, howpublished = {Cryptology ePrint Archive, Report 2020/983}, year = {2020}, url = {https://eprint.iacr.org/2020/983}, } @misc{cryptoeprint:2020:984, author = {Vasyl Ustimenko }, title = {On Multivariate Algorithms of Digital Signatures on Secure El Gamal Type Mode.}, howpublished = {Cryptology ePrint Archive, Report 2020/984}, year = {2020}, url = {https://eprint.iacr.org/2020/984}, } @misc{cryptoeprint:2020:985, author = {Leonardo Colò and David Kohel}, title = {Orienting supersingular isogeny graphs}, howpublished = {Cryptology ePrint Archive, Report 2020/985}, year = {2020}, url = {https://eprint.iacr.org/2020/985}, } @misc{cryptoeprint:2020:986, author = {Thomas Peyrin and Haoyang Wang}, title = {The MALICIOUS Framework: Embedding Backdoors into Tweakable Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2020/986}, year = {2020}, url = {https://eprint.iacr.org/2020/986}, } @misc{cryptoeprint:2020:987, author = {Andreas Erwig and Julia Hesse and Maximilian Orlt and Siavash Riahi}, title = {Fuzzy Asymmetric Password-Authenticated Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2020/987}, year = {2020}, url = {https://eprint.iacr.org/2020/987}, } @misc{cryptoeprint:2020:988, author = {Anupam Golder and Baogeng Ma and Debayan Das and Josef Danial and Shreyas Sen and Arijit Raychowdhury}, title = {120.147 Efficient Electromagnetic Side Channel Analysis by Probe Positioning using Multi-Layer Perceptron}, howpublished = {Cryptology ePrint Archive, Report 2020/988}, year = {2020}, url = {https://eprint.iacr.org/2020/988}, } @misc{cryptoeprint:2020:989, author = {Igor Semaev}, title = {Algorithm for SIS and MultiSIS problems}, howpublished = {Cryptology ePrint Archive, Report 2020/989}, year = {2020}, url = {https://eprint.iacr.org/2020/989}, } @misc{cryptoeprint:2020:990, author = {Junting Xiao and Tadahiko Ito}, title = {Constructing the Cryptographic Boundaries for Lattice-based Cryptography on Hardware Security Module}, howpublished = {Cryptology ePrint Archive, Report 2020/990}, year = {2020}, url = {https://eprint.iacr.org/2020/990}, } @misc{cryptoeprint:2020:991, author = {Anita John and Alan Reji and Ajay P Manoj and Atul Premachandran and Basil Zachariah and Jimmy Jose}, title = {A Novel Hash Function Design based on Hybrid Cellular Automata and Sponge Functions}, howpublished = {Cryptology ePrint Archive, Report 2020/991}, year = {2020}, url = {https://eprint.iacr.org/2020/991}, } @misc{cryptoeprint:2020:992, author = {Bo-Yeon Sim and Jihoon Kwon and Joohee Lee and Il-Ju Kim and Taeho Lee and Jaeseung Han and Hyojin Yoon and Jihoon Cho and Dong-Guk Han}, title = {Single-Trace Attacks on the Message Encoding of Lattice-Based KEMs}, howpublished = {Cryptology ePrint Archive, Report 2020/992}, year = {2020}, url = {https://eprint.iacr.org/2020/992}, } @misc{cryptoeprint:2020:993, author = {Tim Beyne and Siemen Dhooghe and Zhenda Zhang}, title = {Cryptanalysis of Masked Ciphers: A not so Random Idea}, howpublished = {Cryptology ePrint Archive, Report 2020/993}, year = {2020}, url = {https://eprint.iacr.org/2020/993}, } @misc{cryptoeprint:2020:994, author = {Naomi Ephraim and Cody Freitag and Ilan Komargodski and Rafael Pass}, title = {SPARKs: Succinct Parallelizable Arguments of Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2020/994}, year = {2020}, url = {https://eprint.iacr.org/2020/994}, } @misc{cryptoeprint:2020:995, author = {Hilder Vitor Lima Pereira}, title = {Bootstrapping fully homomorphic encryption over the integers in less than one second}, howpublished = {Cryptology ePrint Archive, Report 2020/995}, year = {2020}, url = {https://eprint.iacr.org/2020/995}, } @misc{cryptoeprint:2020:996, author = {Ueli Maurer and Christopher Portmann and Jiamin Zhu}, title = {Unifying Generic Group Models}, howpublished = {Cryptology ePrint Archive, Report 2020/996}, year = {2020}, url = {https://eprint.iacr.org/2020/996}, } @misc{cryptoeprint:2020:997, author = {Brett Hemenway Falk and Daniel Noble and Rafail Ostrovsky}, title = {Alibi: A Flaw in Cuckoo-Hashing based Hierarchical ORAM Schemes and a Solution}, howpublished = {Cryptology ePrint Archive, Report 2020/997}, year = {2020}, url = {https://eprint.iacr.org/2020/997}, } @misc{cryptoeprint:2020:998, author = {Maxim Jourenko and Mario Larangeira and Keisuke Tanaka}, title = {Lightweight Virtual Payment Channels}, howpublished = {Cryptology ePrint Archive, Report 2020/998}, year = {2020}, url = {https://eprint.iacr.org/2020/998}, } @misc{cryptoeprint:2020:999, author = {Hai-Van Dang and Amjad Ullah and Alexandros Bakas and Antonis Michalas}, title = {Attribute-Based Symmetric Searchable Encryption}, howpublished = {Cryptology ePrint Archive, Report 2020/999}, year = {2020}, url = {https://eprint.iacr.org/2020/999}, } @misc{cryptoeprint:2021:001, author = {Michel Abdalla and David Pointcheval and Azam Soleimanian}, title = {2-Step Multi-Client Quadratic Functional Encryption from Decentralized Function-Hiding Inner-Product}, howpublished = {Cryptology ePrint Archive, Report 2021/001}, year = {2021}, url = {https://eprint.iacr.org/2021/001}, } @misc{cryptoeprint:2021:002, author = {Dingfeng Ye}, title = {Can Lattice Signature be as Efficient as Lattice Encryption?}, howpublished = {Cryptology ePrint Archive, Report 2021/002}, year = {2021}, url = {https://eprint.iacr.org/2021/002}, } @misc{cryptoeprint:2021:003, author = {Mahdi Mahdavi Oliaee and Zahra Ahmadian}, title = {Ciphertext Policy Attribute Based Encryption for Arithmetic circuits}, howpublished = {Cryptology ePrint Archive, Report 2021/003}, year = {2021}, url = {https://eprint.iacr.org/2021/003}, } @misc{cryptoeprint:2021:004, author = {Ismail San}, title = {LLMonPro: Low-Latency Montgomery Modular Multiplication Suitable for Verifiable Delay Functions}, howpublished = {Cryptology ePrint Archive, Report 2021/004}, year = {2021}, url = {https://eprint.iacr.org/2021/004}, } @misc{cryptoeprint:2021:005, author = {Kobi Gurkan and Philipp Jovanovic and Mary Maller and Sarah Meiklejohn and Gilad Stern and Alin Tomescu}, title = {Aggregatable Distributed Key Generation}, howpublished = {Cryptology ePrint Archive, Report 2021/005}, year = {2021}, url = {https://eprint.iacr.org/2021/005}, } @misc{cryptoeprint:2021:006, author = {Wyatt Howe and Andrei Lapets}, title = {Privacy-Preserving Privacy Profile Proposal Protocol}, howpublished = {Cryptology ePrint Archive, Report 2021/006}, year = {2021}, url = {https://eprint.iacr.org/2021/006}, } @misc{cryptoeprint:2021:007, author = {Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso and Cheng-Yi Lee}, title = {Notes on a lattice-based proxy-oriented identity-based encryption with keyword search}, howpublished = {Cryptology ePrint Archive, Report 2021/007}, year = {2021}, url = {https://eprint.iacr.org/2021/007}, } @misc{cryptoeprint:2021:008, author = {M. R. Mirzaee Shamsabad and S. M. Dehnavi}, title = {A Family of Nonlinear MDS Diffusion Layers over $\mathbb{F}_{2^{4n}}$}, howpublished = {Cryptology ePrint Archive, Report 2021/008}, year = {2021}, url = {https://eprint.iacr.org/2021/008}, } @misc{cryptoeprint:2021:009, author = {Julia Khamis and Ori Rottenstreich}, title = {Demand-aware Channel Topologies for Off-chain Blockchain Payments}, howpublished = {Cryptology ePrint Archive, Report 2021/009}, year = {2021}, url = {https://eprint.iacr.org/2021/009}, } @misc{cryptoeprint:2021:010, author = {Seyit Camtepe and Jarek Duda and Arash Mahboubi and Pawel Morawiecki and Surya Nepal and Marcin Pawlowski and Josef Pieprzyk}, title = {Compcrypt -- Lightweight ANS-based Compression and Encryption}, howpublished = {Cryptology ePrint Archive, Report 2021/010}, year = {2021}, url = {https://eprint.iacr.org/2021/010}, } @misc{cryptoeprint:2021:011, author = {Kwang Ho Kim and Jong Hyok Choe and Sihem Mesnager}, title = {Complete solution over $\GF{p^n}$ of the equation $X^{p^k+1}+X+a=0$}, howpublished = {Cryptology ePrint Archive, Report 2021/011}, year = {2021}, url = {https://eprint.iacr.org/2021/011}, } @misc{cryptoeprint:2021:012, author = {Enric Florit and Benjamin Smith}, title = {Automorphisms and isogeny graphs of abelian varieties, with applications to the superspecial Richelot isogeny graph}, howpublished = {Cryptology ePrint Archive, Report 2021/012}, year = {2021}, url = {https://eprint.iacr.org/2021/012}, } @misc{cryptoeprint:2021:013, author = {Enric Florit and Benjamin Smith}, title = {An atlas of the Richelot isogeny graph}, howpublished = {Cryptology ePrint Archive, Report 2021/013}, year = {2021}, url = {https://eprint.iacr.org/2021/013}, } @misc{cryptoeprint:2021:014, author = {Majid Salimi}, title = {Efficient Multilinear Map from Graded Encoding Scheme}, howpublished = {Cryptology ePrint Archive, Report 2021/014}, year = {2021}, url = {https://eprint.iacr.org/2021/014}, } @misc{cryptoeprint:2021:015, author = {Macarena Martínez-Rodríguez and Ignacio M. Delgado-Lozano and Billy Bob Brumley}, title = {SoK: Remote Power Analysis}, howpublished = {Cryptology ePrint Archive, Report 2021/015}, year = {2021}, url = {https://eprint.iacr.org/2021/015}, } @misc{cryptoeprint:2021:016, author = {Geoffroy Couteau and Pooya Farshim and Mohammad Mahmoody}, title = {Black-Box Uselessness: Composing Separations in Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2021/016}, year = {2021}, url = {https://eprint.iacr.org/2021/016}, } @misc{cryptoeprint:2021:017, author = {Dan Boneh and Elette Boyle and Henry Corrigan-Gibbs and Niv Gilboa and Yuval Ishai}, title = {Lightweight Techniques for Private Heavy Hitters}, howpublished = {Cryptology ePrint Archive, Report 2021/017}, year = {2021}, url = {https://eprint.iacr.org/2021/017}, } @misc{cryptoeprint:2021:018, author = {Yuhao Yang and Xiujie Huang}, title = {Comments on ``On the Design of Conditional Privacy Preserving Batch Verification-Based Authentication Scheme for Internet of Vehicles Deployment''}, howpublished = {Cryptology ePrint Archive, Report 2021/018}, year = {2021}, url = {https://eprint.iacr.org/2021/018}, } @misc{cryptoeprint:2021:019, author = {Kaushik Nath and Palash Sarkar}, title = {Kummer versus Montgomery Face-off \\over Prime Order Fields}, howpublished = {Cryptology ePrint Archive, Report 2021/019}, year = {2021}, url = {https://eprint.iacr.org/2021/019}, } @misc{cryptoeprint:2021:020, author = {Stéphanie Delaune and Patrick Derbez and Mathieu Vavrille}, title = {Catching the Fastest Boomerangs - Application to SKINNY }, howpublished = {Cryptology ePrint Archive, Report 2021/020}, year = {2021}, url = {https://eprint.iacr.org/2021/020}, } @misc{cryptoeprint:2021:021, author = {Patrick Derbez and Pierre-Alain Fouque and Victor Mollimard}, title = {Fake Near Collisions Attacks}, howpublished = {Cryptology ePrint Archive, Report 2021/021}, year = {2021}, url = {https://eprint.iacr.org/2021/021}, } @misc{cryptoeprint:2021:022, author = {Patrick Derbez and Pierre-Alain Fouque}, title = {Increasing Precision of Division Property }, howpublished = {Cryptology ePrint Archive, Report 2021/022}, year = {2021}, url = {https://eprint.iacr.org/2021/022}, } @misc{cryptoeprint:2021:023, author = {Nicholas Stifter and Aljosha Judmayer and Philipp Schindler and Andreas Kern and Walid Fdhila}, title = {What is Meant by Permissionless Blockchains?}, howpublished = {Cryptology ePrint Archive, Report 2021/023}, year = {2021}, url = {https://eprint.iacr.org/2021/023}, } @misc{cryptoeprint:2021:024, author = {Pedro Hecht}, title = {PQC: R-Propping of Burmester-Desmedt Conference Key Distribution System}, howpublished = {Cryptology ePrint Archive, Report 2021/024}, year = {2021}, url = {https://eprint.iacr.org/2021/024}, } @misc{cryptoeprint:2021:025, author = {Thien Duc Nguyen and Phillip Rieger and Hossein Yalame and Helen Möllering and Hossein Fereidooni and Samuel Marchal and Markus Miettinen and Azalia Mirhoseini and Ahmad-Reza Sadeghi and Thomas Schneider and Shaza Zeitouni}, title = {FLGUARD: Secure and Private Federated Learning}, howpublished = {Cryptology ePrint Archive, Report 2021/025}, year = {2021}, url = {https://eprint.iacr.org/2021/025}, } @misc{cryptoeprint:2021:026, author = {Slim Bettaieb and Loïc Bidoux and Olivier Blazy and Yann Connan and Philippe Gaborit}, title = {A Gapless Code-Based Hash Proof System based on RQC and its Applications}, howpublished = {Cryptology ePrint Archive, Report 2021/026}, year = {2021}, url = {https://eprint.iacr.org/2021/026}, } @misc{cryptoeprint:2021:027, author = {Sfirnaciuc Emilia and Vasilescu Miruna-Elena and Simion Emil}, title = {E-voting protocols in context of COVID19}, howpublished = {Cryptology ePrint Archive, Report 2021/027}, year = {2021}, url = {https://eprint.iacr.org/2021/027}, } @misc{cryptoeprint:2021:028, author = {Victor LOMNE and Thomas ROCHE}, title = {A Side Journey to Titan}, howpublished = {Cryptology ePrint Archive, Report 2021/028}, year = {2021}, url = {https://eprint.iacr.org/2021/028}, } @misc{cryptoeprint:2021:029, author = {Thomas Schneider and Oleksandr Tkachenko}, title = {EPISODE: Efficient Privacy-PreservIng Similar Sequence Queries on Outsourced Genomic DatabasEs}, howpublished = {Cryptology ePrint Archive, Report 2021/029}, year = {2021}, url = {https://eprint.iacr.org/2021/029}, } @misc{cryptoeprint:2021:030, author = {Jonathan Lee and Srinath Setty and Justin Thaler and Riad Wahby}, title = {Linear-time zero-knowledge SNARKs for R1CS}, howpublished = {Cryptology ePrint Archive, Report 2021/030}, year = {2021}, url = {https://eprint.iacr.org/2021/030}, } @misc{cryptoeprint:2021:031, author = {Alexandru-Ștefan Gheorghieș and Darius-Marian Lăzăroi and Emil Simion}, title = {A Comparative Study of Cryptographic Key Distribution Protocols}, howpublished = {Cryptology ePrint Archive, Report 2021/031}, year = {2021}, url = {https://eprint.iacr.org/2021/031}, } @misc{cryptoeprint:2021:032, author = {Pouriya Alikhani and Nicolas Brunner and Claude Crépeau and Sébastien Designolle and Raphaël Houlmann and Weixu Shi and Hugo Zbinden}, title = {Experimental relativistic zero-knowledge proofs}, howpublished = {Cryptology ePrint Archive, Report 2021/032}, year = {2021}, url = {https://eprint.iacr.org/2021/032}, } @misc{cryptoeprint:2021:033, author = {Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso and Masahiro Mambo and Yu-Chi Chen}, title = {Quantum-resistant Anonymous IBE with Traceable Identities}, howpublished = {Cryptology ePrint Archive, Report 2021/033}, year = {2021}, url = {https://eprint.iacr.org/2021/033}, } @misc{cryptoeprint:2021:034, author = {Nishanth Chandran and Divya Gupta and Akash Shah}, title = {Circuit-PSI with Linear Complexity via Relaxed Batch OPPRF}, howpublished = {Cryptology ePrint Archive, Report 2021/034}, year = {2021}, url = {https://eprint.iacr.org/2021/034}, } @misc{cryptoeprint:2021:035, author = {Ori Rottenstreich}, title = {Sketches for Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2021/035}, year = {2021}, url = {https://eprint.iacr.org/2021/035}, } @misc{cryptoeprint:2021:036, author = {Niluka Amarasinghe and Xavier Boyen and Matthew McKague}, title = {The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration}, howpublished = {Cryptology ePrint Archive, Report 2021/036}, year = {2021}, url = {https://eprint.iacr.org/2021/036}, } @misc{cryptoeprint:2021:037, author = {Aein Rezaei Shahmirzadi and Dušan Božilov and Amir Moradi}, title = {New First-Order Secure AES Performance Records}, howpublished = {Cryptology ePrint Archive, Report 2021/037}, year = {2021}, url = {https://eprint.iacr.org/2021/037}, } @misc{cryptoeprint:2021:038, author = {Luke Champine}, title = {Streaming Merkle Proofs within Binary Numeral Trees}, howpublished = {Cryptology ePrint Archive, Report 2021/038}, year = {2021}, url = {https://eprint.iacr.org/2021/038}, } @misc{cryptoeprint:2021:039, author = {Jung Hee Cheon and Yongha Son and Donggeon Yhee}, title = {Practical FHE parameters against lattice attacks}, howpublished = {Cryptology ePrint Archive, Report 2021/039}, year = {2021}, url = {https://eprint.iacr.org/2021/039}, } @misc{cryptoeprint:2021:040, author = {Any Muanalifah and Serge˘ı Sergeev}, title = {On the tropical discrete logarithm problem and security of a protocol based on tropical semidirect product}, howpublished = {Cryptology ePrint Archive, Report 2021/040}, year = {2021}, url = {https://eprint.iacr.org/2021/040}, } @misc{cryptoeprint:2021:041, author = {Panos Kampanakis and Peter Panburana and Michael Curcio and Chirag Shroff and Md Mahbub Alam}, title = {Post-Quantum LMS and SPHINCS+ Hash-Based Signatures for UEFI Secure Boot}, howpublished = {Cryptology ePrint Archive, Report 2021/041}, year = {2021}, url = {https://eprint.iacr.org/2021/041}, } @misc{cryptoeprint:2021:042, author = {Alexander Russell and Qiang Tang and Moti Yung and Hong-Sheng Zhou and Jiadong Zhu}, title = {Correcting Subverted Random Oracles}, howpublished = {Cryptology ePrint Archive, Report 2021/042}, year = {2021}, url = {https://eprint.iacr.org/2021/042}, } @misc{cryptoeprint:2021:043, author = {Madhurima Mukhopadhyay and Palash Sarkar}, title = {Combining Montgomery Multiplication with Tag Tracing for the Pollard's Rho Algorithm in Prime Order Fields}, howpublished = {Cryptology ePrint Archive, Report 2021/043}, year = {2021}, url = {https://eprint.iacr.org/2021/043}, } @misc{cryptoeprint:2021:044, author = {Ishtiyaque Ahmad and Yuntian Yang and Divyakant Agrawal and Amr El Abbadi and Trinabh Gupta}, title = {Aloha: Metadata-private voice communication over fully untrusted infrastructure}, howpublished = {Cryptology ePrint Archive, Report 2021/044}, year = {2021}, url = {https://eprint.iacr.org/2021/044}, } @misc{cryptoeprint:2021:045, author = {Alberto Ibarrondo and Hervé Chabanne and Melek Önen}, title = {Banners: Binarized Neural Networks with Replicated Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2021/045}, year = {2021}, url = {https://eprint.iacr.org/2021/045}, } @misc{cryptoeprint:2021:046, author = {Jose Maria Bermudo Mera and Angshuman Karmakar and Tilen Marc and Azam Soleimanian}, title = {Efficient Lattice-Based Inner-Product Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2021/046}, year = {2021}, url = {https://eprint.iacr.org/2021/046}, } @misc{cryptoeprint:2021:047, author = {Misni Harjo Suwito and Yoshifumi Ueshige and Kouichi Sakurai}, title = {Evolution of Bulletin Board & its application to E-Voting – A Survey}, howpublished = {Cryptology ePrint Archive, Report 2021/047}, year = {2021}, url = {https://eprint.iacr.org/2021/047}, } @misc{cryptoeprint:2021:048, author = {Sohyun Jeon and Hyang-Sook Lee and Jeongeun Park}, title = {Efficient Lattice Gadget Decomposition Algorithm with Bounded Uniform Distribution}, howpublished = {Cryptology ePrint Archive, Report 2021/048}, year = {2021}, url = {https://eprint.iacr.org/2021/048}, } @misc{cryptoeprint:2021:049, author = {Mark D. Aagaard and Nusa Zidaric}, title = {ASIC Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process: (Preliminary Results)}, howpublished = {Cryptology ePrint Archive, Report 2021/049}, year = {2021}, url = {https://eprint.iacr.org/2021/049}, } @misc{cryptoeprint:2021:050, author = {Joshua Deaton and Jintai Ding}, title = {The Distinguishing Attack on HFE}, howpublished = {Cryptology ePrint Archive, Report 2021/050}, year = {2021}, url = {https://eprint.iacr.org/2021/050}, } @misc{cryptoeprint:2021:051, author = {Jintai Ding and Zheng Zhang and Joshua Deaton}, title = {How Much can F5 Really Do}, howpublished = {Cryptology ePrint Archive, Report 2021/051}, year = {2021}, url = {https://eprint.iacr.org/2021/051}, } @misc{cryptoeprint:2021:052, author = {Rémi Géraud-Stewart and David Naccache}, title = {Elementary Attestation of Cryptographically Useful Composite Moduli}, howpublished = {Cryptology ePrint Archive, Report 2021/052}, year = {2021}, url = {https://eprint.iacr.org/2021/052}, } @misc{cryptoeprint:2021:053, author = {Madalina Bolboceanu and Zvika Brakerski and Devika Sharma}, title = {On Algebraic Embedding for Unstructured Lattices}, howpublished = {Cryptology ePrint Archive, Report 2021/053}, year = {2021}, url = {https://eprint.iacr.org/2021/053}, } @misc{cryptoeprint:2021:054, author = {David W. Archer and Shahla Atapoor and Nigel P. Smart}, title = {The Cost of IEEE Arithmetic in Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2021/054}, year = {2021}, url = {https://eprint.iacr.org/2021/054}, } @misc{cryptoeprint:2021:055, author = {Jan Sebastian Götte and Björn Scheuermann}, title = {Tech Report: Inerial HSMs Thwart Advanced Physical Attacks}, howpublished = {Cryptology ePrint Archive, Report 2021/055}, year = {2021}, url = {https://eprint.iacr.org/2021/055}, } @misc{cryptoeprint:2021:056, author = {Zhongfeng Niu}, title = {The Study of Modulo $2^n$}, howpublished = {Cryptology ePrint Archive, Report 2021/056}, year = {2021}, url = {https://eprint.iacr.org/2021/056}, } @misc{cryptoeprint:2021:057, author = {Tamer Mour}, title = {Correlation Intractability vs. One-wayness}, howpublished = {Cryptology ePrint Archive, Report 2021/057}, year = {2021}, url = {https://eprint.iacr.org/2021/057}, } @misc{cryptoeprint:2021:058, author = {Peter Kietzmann and Lena Boeckmann and Leandro Lanzieri and Thomas C. Schmidt and Matthias Wählisch}, title = {A Performance Study of Crypto-Hardware in the Low-end IoT}, howpublished = {Cryptology ePrint Archive, Report 2021/058}, year = {2021}, url = {https://eprint.iacr.org/2021/058}, } @misc{cryptoeprint:2021:059, author = {Chethan Kamath and Karen Klein and Krzysztof Pietrzak and Michael Walter}, title = {On the Cost of Adaptivity in Graph-Based Games}, howpublished = {Cryptology ePrint Archive, Report 2021/059}, year = {2021}, url = {https://eprint.iacr.org/2021/059}, } @misc{cryptoeprint:2021:060, author = {Ran Canetti and Rosario Gennaro and Steven Goldfeder and Nikolaos Makriyannis and Udi Peled}, title = {UC Non-Interactive, Proactive, Threshold ECDSA with Identifiable Aborts}, howpublished = {Cryptology ePrint Archive, Report 2021/060}, year = {2021}, url = {https://eprint.iacr.org/2021/060}, } @misc{cryptoeprint:2021:061, author = {Ştefan Maftei and Marius Supuran and Emil Simion}, title = {A Note on IBE Performance of a Practical Application}, howpublished = {Cryptology ePrint Archive, Report 2021/061}, year = {2021}, url = {https://eprint.iacr.org/2021/061}, } @misc{cryptoeprint:2021:062, author = {Dominique Unruh}, title = {Compressed Permutation Oracles (And the Collision-Resistance of Sponge/SHA3)}, howpublished = {Cryptology ePrint Archive, Report 2021/062}, year = {2021}, url = {https://eprint.iacr.org/2021/062}, } @misc{cryptoeprint:2021:063, author = {Monir Azraoui and Solenn Brunet and Sébastien Canard and Aïda Diop and Lélia Eveillard and Alicia Filipiak and Adel Hamdi and Flavie Misarsky and Donald Nokam Kuate and Marie Paindavoine and Quentin Santos and Bastien Vialla}, title = {CYBERCRYPT: Learn Basic Cryptographic Concepts while Playing}, howpublished = {Cryptology ePrint Archive, Report 2021/063}, year = {2021}, url = {https://eprint.iacr.org/2021/063}, } @misc{cryptoeprint:2021:064, author = {Peter Pessl and Lukas Prokop}, title = {Fault Attacks on CCA-secure Lattice KEMs}, howpublished = {Cryptology ePrint Archive, Report 2021/064}, year = {2021}, url = {https://eprint.iacr.org/2021/064}, } @misc{cryptoeprint:2021:065, author = {Dorin-Marian Ionita and Emil Simion}, title = {FPGA Offloading for Diffie-Hellman Key Exchangeusing Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2021/065}, year = {2021}, url = {https://eprint.iacr.org/2021/065}, } @misc{cryptoeprint:2021:066, author = {Mohamed Fadl Idris and Je Sen Teh and Jasy Liew Suet Yan and Wei-Zhu Yeoh}, title = {A Deep Learning Approach for Active S-box Prediction of Lightweight Block Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2021/066}, year = {2021}, url = {https://eprint.iacr.org/2021/066}, } @misc{cryptoeprint:2021:067, author = {Michiel Van Beirendonck and Jan-Pieter D’Anvers and Ingrid Verbauwhede}, title = {Analysis and Comparison of Table-based Arithmetic to Boolean Masking}, howpublished = {Cryptology ePrint Archive, Report 2021/067}, year = {2021}, url = {https://eprint.iacr.org/2021/067}, } @misc{cryptoeprint:2021:068, author = {Carsten Baum and Cyprien Delpech de Saint Guilhem and Daniel Kales and Emmanuela Orsini and Peter Scholl and Greg Zaverucha}, title = {Banquet: Short and Fast Signatures from AES}, howpublished = {Cryptology ePrint Archive, Report 2021/068}, year = {2021}, url = {https://eprint.iacr.org/2021/068}, } @misc{cryptoeprint:2021:069, author = {Amanda Resende and Davis Railsback and Rafael Dowsley and Anderson C. A. Nascimento and Diego F. Aranha}, title = {Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2021/069}, year = {2021}, url = {https://eprint.iacr.org/2021/069}, } @misc{cryptoeprint:2021:070, author = {Aysajan Abidin and Mohieddine El Soussi and Jac Romme and Pepijn Boer and Dave Singelée and Christian Bachmann}, title = {Secure, Accurate, and Practical Narrow-Band Ranging System}, howpublished = {Cryptology ePrint Archive, Report 2021/070}, year = {2021}, url = {https://eprint.iacr.org/2021/070}, } @misc{cryptoeprint:2021:071, author = {Jorai Rijsdijk and Lichao Wu and Guilherme Perin and Stjepan Picek}, title = {Reinforcement Learning for Hyperparameter Tuning in Deep Learning-based Side-channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2021/071}, year = {2021}, url = {https://eprint.iacr.org/2021/071}, } @misc{cryptoeprint:2021:072, author = {Servio Paguada and Lejla Batina and Igor Armendariz}, title = {Toward Practical Autoencoder-based Side-Channel Analysis Evaluations}, howpublished = {Cryptology ePrint Archive, Report 2021/072}, year = {2021}, url = {https://eprint.iacr.org/2021/072}, } @misc{cryptoeprint:2021:073, author = {Michał Wroński}, title = {Application of Velusqrt algorithm to Huff's and general Huff's curves}, howpublished = {Cryptology ePrint Archive, Report 2021/073}, year = {2021}, url = {https://eprint.iacr.org/2021/073}, } @misc{cryptoeprint:2021:074, author = {Mahdi Sedaghat and Bart Preneel}, title = {Cross-Domain Attribute-Based Access Control Encryption}, howpublished = {Cryptology ePrint Archive, Report 2021/074}, year = {2021}, url = {https://eprint.iacr.org/2021/074}, } @misc{cryptoeprint:2021:075, author = {Kamil Otal}, title = {A Generalization of the Subfield Construction}, howpublished = {Cryptology ePrint Archive, Report 2021/075}, year = {2021}, url = {https://eprint.iacr.org/2021/075}, } @misc{cryptoeprint:2021:076, author = {Kang Yang and Pratik Sarkar and Chenkai Weng and Xiao Wang}, title = {QuickSilver: Efficient and Affordable Zero-Knowledge Proofs for Circuits and Polynomials over Any Field}, howpublished = {Cryptology ePrint Archive, Report 2021/076}, year = {2021}, url = {https://eprint.iacr.org/2021/076}, } @misc{cryptoeprint:2021:077, author = {Rémi Géraud-Stewart and David Naccache}, title = {Magnetic RSA}, howpublished = {Cryptology ePrint Archive, Report 2021/077}, year = {2021}, url = {https://eprint.iacr.org/2021/077}, } @misc{cryptoeprint:2021:078, author = {Nikolaj I. Schwartzbach}, title = {An Incentive-Compatible Smart Contract for Decentralized Commerce}, howpublished = {Cryptology ePrint Archive, Report 2021/078}, year = {2021}, url = {https://eprint.iacr.org/2021/078}, } @misc{cryptoeprint:2021:079, author = {Kalle Ngo and Elena Dubrova and Qian Guo and Thomas Johansson}, title = {A Side-Channel Attack on a Masked IND-CCA Secure Saber KEM}, howpublished = {Cryptology ePrint Archive, Report 2021/079}, year = {2021}, url = {https://eprint.iacr.org/2021/079}, } @misc{cryptoeprint:2021:080, author = {Jan-Pieter D'Anvers and Emmanuela Orsini and Frederik Vercauteren}, title = {Error Term Checking: Towards Chosen Ciphertext Security without Re-encryption}, howpublished = {Cryptology ePrint Archive, Report 2021/080}, year = {2021}, url = {https://eprint.iacr.org/2021/080}, } @misc{cryptoeprint:2021:081, author = {Hendrik Waldner and Tilen Marc and Miha Stopar and Michel Abdalla}, title = {Private Stream Aggregation from Labeled Secret Sharing Schemes}, howpublished = {Cryptology ePrint Archive, Report 2021/081}, year = {2021}, url = {https://eprint.iacr.org/2021/081}, } @misc{cryptoeprint:2021:082, author = {Jaskaran V. Singh and Nicholas J. Hopper}, title = {Grades of Trust in Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2021/082}, year = {2021}, url = {https://eprint.iacr.org/2021/082}, } @misc{cryptoeprint:2021:083, author = {Michael Troncoso and Britta Hale}, title = {The Bluetooth CYBORG: Analysis of the Full Human-Machine Passkey Entry AKE Protocol}, howpublished = {Cryptology ePrint Archive, Report 2021/083}, year = {2021}, url = {https://eprint.iacr.org/2021/083}, } @misc{cryptoeprint:2021:084, author = {Gilles Macario-Rat and Jacques Patarin}, title = {Ariadne Thread and Salt: New Multivariate Cryptographic Schemes with Public Keys in Degree 3}, howpublished = {Cryptology ePrint Archive, Report 2021/084}, year = {2021}, url = {https://eprint.iacr.org/2021/084}, } @misc{cryptoeprint:2021:085, author = {Suhri Kim}, title = {Complete Analysis of Implementing Isogeny-based Cryptography using Huff Form of Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2021/085}, year = {2021}, url = {https://eprint.iacr.org/2021/085}, } @misc{cryptoeprint:2021:086, author = {Mic Bowman and Debajyoti Das and Avradip Mandal and Hart Montgomery}, title = {On Elapsed Time Consensus Protocols}, howpublished = {Cryptology ePrint Archive, Report 2021/086}, year = {2021}, url = {https://eprint.iacr.org/2021/086}, } @misc{cryptoeprint:2021:087, author = {Boyuan Feng and Lianke Qin and Zhenfei Zhang and Yufei Ding and Shumo Chu}, title = {ZEN: Efficient Zero-Knowledge Proofs for Neural Networks}, howpublished = {Cryptology ePrint Archive, Report 2021/087}, year = {2021}, url = {https://eprint.iacr.org/2021/087}, } @misc{cryptoeprint:2021:088, author = {Marc Fischlin and Arno Mittelbach}, title = {An Overview of the Hybrid Argument}, howpublished = {Cryptology ePrint Archive, Report 2021/088}, year = {2021}, url = {https://eprint.iacr.org/2021/088}, } @misc{cryptoeprint:2021:089, author = {Gabrielle Beck and Julia Len and Ian Miers and Matthew Green}, title = {Fuzzy Message Detection}, howpublished = {Cryptology ePrint Archive, Report 2021/089}, year = {2021}, url = {https://eprint.iacr.org/2021/089}, } @misc{cryptoeprint:2021:090, author = {Bei Wang; Yi Ouyang; Honggang Hu ; Songsong Li}, title = {A New Twofold Cornacchia-Type Algorithm for 4-GLV Decompositions and Its Applications}, howpublished = {Cryptology ePrint Archive, Report 2021/090}, year = {2021}, url = {https://eprint.iacr.org/2021/090}, } @misc{cryptoeprint:2021:091, author = {Ilaria Chillotti and Marc Joye and Pascal Paillier}, title = {Programmable Bootstrapping Enables Efficient Homomorphic Inference of Deep Neural Networks}, howpublished = {Cryptology ePrint Archive, Report 2021/091}, year = {2021}, url = {https://eprint.iacr.org/2021/091}, } @misc{cryptoeprint:2021:092, author = {Dieaa I. Nassr and M. Anwar and Hatem M. Bahig }, title = {New Public Key Cryptosystem (First Version)}, howpublished = {Cryptology ePrint Archive, Report 2021/092}, year = {2021}, url = {https://eprint.iacr.org/2021/092}, } @misc{cryptoeprint:2021:093, author = {Evgenios M. Kornaropoulos and Charalampos Papamanthou and Roberto Tamassia}, title = {Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks}, howpublished = {Cryptology ePrint Archive, Report 2021/093}, year = {2021}, url = {https://eprint.iacr.org/2021/093}, } @misc{cryptoeprint:2021:094, author = {Sivanarayana Gaddam and Atul Luykx and Rohit Sinha and Gaven Watson}, title = {Reducing HSM Reliance in Payments through Proxy Re-Encryption}, howpublished = {Cryptology ePrint Archive, Report 2021/094}, year = {2021}, url = {https://eprint.iacr.org/2021/094}, } @misc{cryptoeprint:2021:095, author = {Easwar Vivek Mangipudi and Donghang Lu and Aniket Kate}, title = {Collusion-Deterrent Threshold Information Escrow}, howpublished = {Cryptology ePrint Archive, Report 2021/095}, year = {2021}, url = {https://eprint.iacr.org/2021/095}, } @misc{cryptoeprint:2021:096, author = {Kelong Cong and Daniele Cozzo and Varun Maram and Nigel P. Smart}, title = {Gladius: LWR based efficient hybrid public key encryption with distributed decryption}, howpublished = {Cryptology ePrint Archive, Report 2021/096}, year = {2021}, url = {https://eprint.iacr.org/2021/096}, } @misc{cryptoeprint:2021:097, author = {Mridul Nandi}, title = {A New and Improved Reduction Proof of Cascade PRF}, howpublished = {Cryptology ePrint Archive, Report 2021/097}, year = {2021}, url = {https://eprint.iacr.org/2021/097}, } @misc{cryptoeprint:2021:098, author = {Lukas Kölsch and Björn Kriepke and Gohar Kyureghyan}, title = {Image sets of perfectly nonlinear maps}, howpublished = {Cryptology ePrint Archive, Report 2021/098}, year = {2021}, url = {https://eprint.iacr.org/2021/098}, } @misc{cryptoeprint:2021:099, author = {Melissa Chase and Esha Ghosh and Saeed Mahloujifar}, title = {Property Inference from Poisoning}, howpublished = {Cryptology ePrint Archive, Report 2021/099}, year = {2021}, url = {https://eprint.iacr.org/2021/099}, } @misc{cryptoeprint:2021:100, author = {Sourav Das and Vinith Krishnan and Irene Miriam Isaac and Ling Ren}, title = {SPURT: Scalable Distributed Randomness Beacon with Transparent Setup}, howpublished = {Cryptology ePrint Archive, Report 2021/100}, year = {2021}, url = {https://eprint.iacr.org/2021/100}, } @misc{cryptoeprint:2021:101, author = {Daniel Heinz and Thomas Pöppelmann}, title = {Combined Fault and DPA Protection for Lattice-Based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2021/101}, year = {2021}, url = {https://eprint.iacr.org/2021/101}, } @misc{cryptoeprint:2021:102, author = {Madalina Chirita and Alexandru-Mihai Stroie and Andrei-Daniel Safta and Emil Simion}, title = {A Note on Advanced Encryption Standard with Galois/Counter Mode Algorithm Improvements and S-Box Customization}, howpublished = {Cryptology ePrint Archive, Report 2021/102}, year = {2021}, url = {https://eprint.iacr.org/2021/102}, } @misc{cryptoeprint:2021:103, author = {Elena Andreeva and Amit Singh Bhati and Damian Vizar}, title = {RUP Security of the SAEF Authenticated Encryption mode}, howpublished = {Cryptology ePrint Archive, Report 2021/103}, year = {2021}, url = {https://eprint.iacr.org/2021/103}, } @misc{cryptoeprint:2021:104, author = {Shivam Bhasin and Jan-Pieter D'Anvers and Daniel Heinz and Thomas Pöppelmann and Michiel Van Beirendonck}, title = {Attacking and Defending Masked Polynomial Comparison for Lattice-Based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2021/104}, year = {2021}, url = {https://eprint.iacr.org/2021/104}, } @misc{cryptoeprint:2021:105, author = {Majid Salimi}, title = {A New Efficient Identity-Based Encryption Without Pairing}, howpublished = {Cryptology ePrint Archive, Report 2021/105}, year = {2021}, url = {https://eprint.iacr.org/2021/105}, } @misc{cryptoeprint:2021:106, author = {Aram Jivanyan and Jesse Lancaster and Arash Afshar and Parnian Alimi}, title = {MERCAT: Mediated, Encrypted, Reversible, SeCure Asset Transfers}, howpublished = {Cryptology ePrint Archive, Report 2021/106}, year = {2021}, url = {https://eprint.iacr.org/2021/106}, } @misc{cryptoeprint:2021:107, author = {Seny Kamara and Tarik Moataz and Andrew Park and Lucy Qin}, title = {A Decentralized and Encrypted National Gun Registry}, howpublished = {Cryptology ePrint Archive, Report 2021/107}, year = {2021}, url = {https://eprint.iacr.org/2021/107}, } @misc{cryptoeprint:2021:108, author = {Sara Ricci and Lukas Malina and Petr Jedlicka and David Smekal and Jan Hajny and Petr Cibik and Patrik Dobias}, title = {Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs}, howpublished = {Cryptology ePrint Archive, Report 2021/108}, year = {2021}, url = {https://eprint.iacr.org/2021/108}, } @misc{cryptoeprint:2021:109, author = {Amin Rezaei and Hai Zhou}, title = {Sequential Logic Encryption Against Model Checking Attack}, howpublished = {Cryptology ePrint Archive, Report 2021/109}, year = {2021}, url = {https://eprint.iacr.org/2021/109}, } @misc{cryptoeprint:2021:110, author = {Kenji Yasunaga}, title = {Replacing Probability Distributions in Security Games via Hellinger Distance}, howpublished = {Cryptology ePrint Archive, Report 2021/110}, year = {2021}, url = {https://eprint.iacr.org/2021/110}, } @misc{cryptoeprint:2021:111, author = {Kelesidis Evgnosia-Alexandra}, title = {A note on Post Quantum Onion Routing}, howpublished = {Cryptology ePrint Archive, Report 2021/111}, year = {2021}, url = {https://eprint.iacr.org/2021/111}, } @misc{cryptoeprint:2021:112, author = {Majid Salimi and Hamid Mala and Honorio Martin and Pedro Peris-Lopez}, title = {Full-Resilient Memory-Optimum Multi-Party Non-Interactive Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2021/112}, year = {2021}, url = {https://eprint.iacr.org/2021/112}, } @misc{cryptoeprint:2021:113, author = {Ahmad Akmal Aminuddin Mohd Kamal and Keiichi Iwamura}, title = {Improvement of Secure Multi-Party Multiplication of (k,n) Threshold Secret Sharing Using Only N=k Servers (Revised Version)}, howpublished = {Cryptology ePrint Archive, Report 2021/113}, year = {2021}, url = {https://eprint.iacr.org/2021/113}, } @misc{cryptoeprint:2021:114, author = {Michel Abdalla and Björn Haase and Julia Hesse}, title = {Security Analysis of CPace}, howpublished = {Cryptology ePrint Archive, Report 2021/114}, year = {2021}, url = {https://eprint.iacr.org/2021/114}, } @misc{cryptoeprint:2021:115, author = {Mila Anastasova and Reza Azarderakhsh and Mehran Mozaffari Kermani}, title = {Fast Strategies for the Implementation of SIKE Round 3 on ARM Cortex-M4}, howpublished = {Cryptology ePrint Archive, Report 2021/115}, year = {2021}, url = {https://eprint.iacr.org/2021/115}, } @misc{cryptoeprint:2021:116, author = {Nael Rahman and Vladimir Shpilrain}, title = {MAKE: a Matrix Action Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2021/116}, year = {2021}, url = {https://eprint.iacr.org/2021/116}, } @misc{cryptoeprint:2021:117, author = {Arash Mirzaei and Amin Sakzad and Jiangshan Yu and Ron Steinfeld}, title = {FPPW: A Fair and Privacy Preserving Watchtower For Bitcoin}, howpublished = {Cryptology ePrint Archive, Report 2021/117}, year = {2021}, url = {https://eprint.iacr.org/2021/117}, } @misc{cryptoeprint:2021:118, author = {Nicolas Alhaddad and Mayank Varia and Haibin Zhang }, title = {High-Threshold AVSS with Optimal Communication Complexity}, howpublished = {Cryptology ePrint Archive, Report 2021/118}, year = {2021}, url = {https://eprint.iacr.org/2021/118}, } @misc{cryptoeprint:2021:119, author = {Eleftheria Makri and Dragos Rotaru and Frederik Vercauteren and Sameer Wagh}, title = {Rabbit: Efficient Comparison for Secure Multi-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2021/119}, year = {2021}, url = {https://eprint.iacr.org/2021/119}, } @misc{cryptoeprint:2021:120, author = {Aner Ben-Efraim and Kelong Cong and Eran Omri and Emmanuela Orsini and Nigel P. Smart and Eduardo Soria-Vazquez}, title = {Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits}, howpublished = {Cryptology ePrint Archive, Report 2021/120}, year = {2021}, url = {https://eprint.iacr.org/2021/120}, } @misc{cryptoeprint:2021:121, author = {Yaron Gvili and Sarah Scheffler and Mayank Varia}, title = {BooLigero: Improved Sublinear Zero Knowledge Proofs for Boolean Circuits}, howpublished = {Cryptology ePrint Archive, Report 2021/121}, year = {2021}, url = {https://eprint.iacr.org/2021/121}, } @misc{cryptoeprint:2021:122, author = {Aner Ben Efraim and Olga Nissenbaum and Eran Omri and Anat Paskin-Cherniavsky}, title = {PSImple: Practical Multiparty Maliciously-Secure Private Set Intersection}, howpublished = {Cryptology ePrint Archive, Report 2021/122}, year = {2021}, url = {https://eprint.iacr.org/2021/122}, } @misc{cryptoeprint:2021:123, author = {Yue Qin and Chi Cheng and Xiaohan Zhang and Yanbin Pan and Lei Hu and Jintai Ding}, title = {A Systematic Approach and Analysis of Key Mismatch Attacks on CPA-Secure Lattice-Based NIST Candidate KEMs}, howpublished = {Cryptology ePrint Archive, Report 2021/123}, year = {2021}, url = {https://eprint.iacr.org/2021/123}, } @misc{cryptoeprint:2021:124, author = {Ozgun Ozerk and Can Elgezen and Ahmet Can Mert and Erdinc Ozturk and Erkay Savas}, title = {Efficient Number Theoretic Transform Implementation on GPU for Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2021/124}, year = {2021}, url = {https://eprint.iacr.org/2021/124}, } @misc{cryptoeprint:2021:125, author = {Kris Shrishak and Haya Shulman}, title = {Privacy Preserving and Resilient RPKI}, howpublished = {Cryptology ePrint Archive, Report 2021/125}, year = {2021}, url = {https://eprint.iacr.org/2021/125}, } @misc{cryptoeprint:2021:126, author = {Ramachandran Anantharaman and Virendra Sule}, title = {Observability attack on stream generators}, howpublished = {Cryptology ePrint Archive, Report 2021/126}, year = {2021}, url = {https://eprint.iacr.org/2021/126}, } @misc{cryptoeprint:2021:127, author = {Cong Deng and Xianghong Tang and Lin You and Gengran Hu}, title = {Cuproof: A Novel Range Proof with Constant Size}, howpublished = {Cryptology ePrint Archive, Report 2021/127}, year = {2021}, url = {https://eprint.iacr.org/2021/127}, } @misc{cryptoeprint:2021:128, author = {Debrup Chakraborty and Avijit Dutta and Samir Kundu}, title = {Designing Tweakable Enciphering Schemes Using Public Permutations}, howpublished = {Cryptology ePrint Archive, Report 2021/128}, year = {2021}, url = {https://eprint.iacr.org/2021/128}, } @misc{cryptoeprint:2021:129, author = {Weiqiong Cao and Hongsong Shi and Hua Chen and Wei Wei}, title = {Lattice-based weak curve fault attack on ECDSA}, howpublished = {Cryptology ePrint Archive, Report 2021/129}, year = {2021}, url = {https://eprint.iacr.org/2021/129}, } @misc{cryptoeprint:2021:130, author = {Bei Wang; Songsong Li; Yi Ouyang; Honggang Hu }, title = {Ready-Made Short Basis for GLV+GLS on High Degree Twisted Curves}, howpublished = {Cryptology ePrint Archive, Report 2021/130}, year = {2021}, url = {https://eprint.iacr.org/2021/130}, } @misc{cryptoeprint:2021:131, author = {Sikha Pentyala and Rafael Dowsley and Martine De Cock}, title = {Privacy-Preserving Video Classification with Convolutional Neural Networks}, howpublished = {Cryptology ePrint Archive, Report 2021/131}, year = {2021}, url = {https://eprint.iacr.org/2021/131}, } @misc{cryptoeprint:2021:132, author = {Xiling Li and Rafael Dowsley and Martine De Cock}, title = {Privacy-Preserving Feature Selection with Secure Multiparty Computation}, howpublished = {Cryptology ePrint Archive, Report 2021/132}, year = {2021}, url = {https://eprint.iacr.org/2021/132}, } @misc{cryptoeprint:2021:133, author = {Ravital Solomon and Ghada Almashaqbeh}, title = {smartFHE: Privacy-Preserving Smart Contracts from Fully Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2021/133}, year = {2021}, url = {https://eprint.iacr.org/2021/133}, } @misc{cryptoeprint:2021:134, author = {Marco Baldi and Jean-Christophe Deneuville and Edoardo Persichetti and Paolo Santini}, title = {Cryptanalysis of a code-based signature scheme without trapdoors}, howpublished = {Cryptology ePrint Archive, Report 2021/134}, year = {2021}, url = {https://eprint.iacr.org/2021/134}, } @misc{cryptoeprint:2021:135, author = {Masayuki Abe and Miguel Ambrona and Andrej Bogdanov and Miyako Ohkubo and Alon Rosen}, title = {Acyclicity Programming for Sigma-Protocols}, howpublished = {Cryptology ePrint Archive, Report 2021/135}, year = {2021}, url = {https://eprint.iacr.org/2021/135}, } @misc{cryptoeprint:2021:136, author = {Dmitry Schelkunov}, title = {An approach for designing fast public key encryption systems using white-box cryptography techniques}, howpublished = {Cryptology ePrint Archive, Report 2021/136}, year = {2021}, url = {https://eprint.iacr.org/2021/136}, } @misc{cryptoeprint:2021:137, author = {Chris Brzuska and Eric Cornelissen and Konrad Kohbrok}, title = {Cryptographic Security of the MLS RFC, Draft 11}, howpublished = {Cryptology ePrint Archive, Report 2021/137}, year = {2021}, url = {https://eprint.iacr.org/2021/137}, } @misc{cryptoeprint:2021:138, author = {Johannes Roth and Evangelos Karatsiolis and Juliane Krämer}, title = {Classic McEliece Implementation with Low Memory Footprint}, howpublished = {Cryptology ePrint Archive, Report 2021/138}, year = {2021}, url = {https://eprint.iacr.org/2021/138}, } @misc{cryptoeprint:2021:139, author = {Mahimna Kelkar and Soubhik Deb and Sreeram Kannan}, title = {Order-Fair Consensus in the Permissionless Setting}, howpublished = {Cryptology ePrint Archive, Report 2021/139}, year = {2021}, url = {https://eprint.iacr.org/2021/139}, } @misc{cryptoeprint:2021:140, author = {Clémentine Gritti and Emanuel Regnath and Sebastian Steinhorst}, title = {Practical and Scalable Access Control Mechanism for the Internet of Things}, howpublished = {Cryptology ePrint Archive, Report 2021/140}, year = {2021}, url = {https://eprint.iacr.org/2021/140}, } @misc{cryptoeprint:2021:141, author = {Léo Ducas and Marc Stevens and Wessel van Woerden}, title = {Advanced Lattice Sieving on GPUs, with Tensor Cores}, howpublished = {Cryptology ePrint Archive, Report 2021/141}, year = {2021}, url = {https://eprint.iacr.org/2021/141}, } @misc{cryptoeprint:2021:142, author = {Muah Kim and Onur Gunlu and Rafael F. Schaefer}, title = {Federated Learning with Local Differential Privacy: Trade-offs between Privacy, Utility, and Communication}, howpublished = {Cryptology ePrint Archive, Report 2021/142}, year = {2021}, url = {https://eprint.iacr.org/2021/142}, } @misc{cryptoeprint:2021:143, author = {Juan Garay and Yu Shen}, title = {The Bitcoin Cash Backbone Protocol}, howpublished = {Cryptology ePrint Archive, Report 2021/143}, year = {2021}, url = {https://eprint.iacr.org/2021/143}, } @misc{cryptoeprint:2021:144, author = {Morteza Adeli and Nasour Bagheri and Sadegh Sadeghi and Saru Kumari}, title = {\(\chi\)perbp: a Cloud-based Lightweight Mutual Authentication Protocol}, howpublished = {Cryptology ePrint Archive, Report 2021/144}, year = {2021}, url = {https://eprint.iacr.org/2021/144}, } @misc{cryptoeprint:2021:145, author = {Christoph Egger and Mike Graf and Ralf Kuesters and Daniel Rausch and Viktoria Ronge and and Dominique Schröder}, title = {A Security Framework for Distributed Ledgers}, howpublished = {Cryptology ePrint Archive, Report 2021/145}, year = {2021}, url = {https://eprint.iacr.org/2021/145}, } @misc{cryptoeprint:2021:146, author = {Benjamin E. Diamond}, title = {Boolean Functions from Affine Functionals}, howpublished = {Cryptology ePrint Archive, Report 2021/146}, year = {2021}, url = {https://eprint.iacr.org/2021/146}, } @misc{cryptoeprint:2021:147, author = {Greg Morrisett and Elaine Shi and Kristina Sojakova and Xiong Fan and Joshua Gancher}, title = {IPDL: A Simple Framework for Formally Verifying Distributed Cryptographic Protocols}, howpublished = {Cryptology ePrint Archive, Report 2021/147}, year = {2021}, url = {https://eprint.iacr.org/2021/147}, } @misc{cryptoeprint:2021:148, author = {Liliya Akhmetzyanova and Evgeny Alekseev and Alexandra Babueva and Stanislav Smyshlyaev}, title = {On methods of shortening ElGamal-type signatures}, howpublished = {Cryptology ePrint Archive, Report 2021/148}, year = {2021}, url = {https://eprint.iacr.org/2021/148}, } @misc{cryptoeprint:2021:149, author = {Paul Frixons and André Schrottenloher}, title = {Quantum Security of the Legendre PRF}, howpublished = {Cryptology ePrint Archive, Report 2021/149}, year = {2021}, url = {https://eprint.iacr.org/2021/149}, } @misc{cryptoeprint:2021:150, author = {Andreas Erwig and Sebastian Faust and Kristina Hostáková and Monosij Maitra and Siavash Riahi}, title = {Two-Party Adaptor Signatures From Identification Schemes}, howpublished = {Cryptology ePrint Archive, Report 2021/150}, year = {2021}, url = {https://eprint.iacr.org/2021/150}, } @misc{cryptoeprint:2021:151, author = {Mark Simkin and Luisa Siniscalchi and and Sophia Yakoubov}, title = {On Sufficient Oracles for Secure Computation with Identifiable Abort}, howpublished = {Cryptology ePrint Archive, Report 2021/151}, year = {2021}, url = {https://eprint.iacr.org/2021/151}, } @misc{cryptoeprint:2021:152, author = {Lei Bi and Xianhui Lu and Junjie Luo and Kunpeng Wang and Zhenfei Zhang}, title = {Hybrid Dual Attack on LWE with Arbitrary Secrets}, howpublished = {Cryptology ePrint Archive, Report 2021/152}, year = {2021}, url = {https://eprint.iacr.org/2021/152}, } @misc{cryptoeprint:2021:153, author = {Boris Fouotsa Tako and Péter Kutas and Simon-Philipp Merz}, title = {On the Isogeny Problem with Torsion Point Information}, howpublished = {Cryptology ePrint Archive, Report 2021/153}, year = {2021}, url = {https://eprint.iacr.org/2021/153}, } @misc{cryptoeprint:2021:154, author = {Tamar Lichter Blanks and Stephen D. Miller}, title = {Generating cryptographically-strong random lattice bases and recognizing rotations of $\mathbb{Z}^n$}, howpublished = {Cryptology ePrint Archive, Report 2021/154}, year = {2021}, url = {https://eprint.iacr.org/2021/154}, } @misc{cryptoeprint:2021:155, author = {James Howe and Marco Martinoli and Elisabeth Oswald and Francesco Regazzoni}, title = {Exploring Parallelism to Improve the Performance of FrodoKEM in Hardware}, howpublished = {Cryptology ePrint Archive, Report 2021/155}, year = {2021}, url = {https://eprint.iacr.org/2021/155}, } @misc{cryptoeprint:2021:156, author = {Manuel Barbosa and Gilles Barthe and Benjamin Grégoire and Adrien Koutsos and Pierre-Yves Strub }, title = {Mechanized Proofs of Adversarial Complexity and Application to Universal Composability}, howpublished = {Cryptology ePrint Archive, Report 2021/156}, year = {2021}, url = {https://eprint.iacr.org/2021/156}, } @misc{cryptoeprint:2021:157, author = {Kalikinkar Mandal and Dhiman Saha and Sumanta Sarkar and Yosuke Todo}, title = {Sycon: A New Milestone in Designing ASCON-like Permutations}, howpublished = {Cryptology ePrint Archive, Report 2021/157}, year = {2021}, url = {https://eprint.iacr.org/2021/157}, } @misc{cryptoeprint:2021:158, author = {Nicolas Resch and Chen Yuan}, title = {Two-Round Perfectly Secure Message Transmission with Optimal Transmission Rate}, howpublished = {Cryptology ePrint Archive, Report 2021/158}, year = {2021}, url = {https://eprint.iacr.org/2021/158}, } @misc{cryptoeprint:2021:159, author = {Thomas Yurek and Licheng Luo and Jaiden Fairoze and Aniket Kate and Andrew Miller}, title = {hbACSS: How to Robustly Share Many Secrets}, howpublished = {Cryptology ePrint Archive, Report 2021/159}, year = {2021}, url = {https://eprint.iacr.org/2021/159}, } @misc{cryptoeprint:2021:160, author = {Tibor Jager and Rafael Kurek and David Niehues}, title = {Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance}, howpublished = {Cryptology ePrint Archive, Report 2021/160}, year = {2021}, url = {https://eprint.iacr.org/2021/160}, } @misc{cryptoeprint:2021:161, author = {Xianrui Qin and Handong Cui and John Yuen}, title = {Generic Adaptor Signature}, howpublished = {Cryptology ePrint Archive, Report 2021/161}, year = {2021}, url = {https://eprint.iacr.org/2021/161}, } @misc{cryptoeprint:2021:162, author = {Giuseppe Ateniese and Long Chen and Danilo Francati and Dimitrios Papadopoulos and Qiang Tang}, title = {Verifiable Capacity-bound Functions: A New Primitive from Kolmogorov Complexity}, howpublished = {Cryptology ePrint Archive, Report 2021/162}, year = {2021}, url = {https://eprint.iacr.org/2021/162}, } @misc{cryptoeprint:2021:163, author = {Paul Bunn and Eyal Kushilevitz and Rafail Ostrovsky}, title = {CNF-FSS and its Applications}, howpublished = {Cryptology ePrint Archive, Report 2021/163}, year = {2021}, url = {https://eprint.iacr.org/2021/163}, } @misc{cryptoeprint:2021:164, author = {Shohei Satake and Yujie Gu and Kouichi Sakurai}, title = {Graph-Based Construction for Non-Malleable Codes}, howpublished = {Cryptology ePrint Archive, Report 2021/164}, year = {2021}, url = {https://eprint.iacr.org/2021/164}, } @misc{cryptoeprint:2021:165, author = {Thomas Kerber and Aggelos Kiayias and Markulf Kohlweiss}, title = {Composition with Knowledge Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2021/165}, year = {2021}, url = {https://eprint.iacr.org/2021/165}, } @misc{cryptoeprint:2021:166, author = {Matthias Lohr and Benjamin Schlosser and Jan Jürjens and Steffen Staab}, title = {Cost Fairness for Blockchain-Based Two-Party Exchange Protocols}, howpublished = {Cryptology ePrint Archive, Report 2021/166}, year = {2021}, url = {https://eprint.iacr.org/2021/166}, } @misc{cryptoeprint:2021:167, author = {Seetal Potluri and Aydin Aysu}, title = {Stealing Neural Network Models through the Scan Chain: A New Threat for ML Hardware}, howpublished = {Cryptology ePrint Archive, Report 2021/167}, year = {2021}, url = {https://eprint.iacr.org/2021/167}, } @misc{cryptoeprint:2021:168, author = {Xiaohan Zhang and Chi Cheng and Yue Qin and Ruoyu Ding}, title = {Small Leaks Sink a Great Ship: An Evaluation of Key Reuse Resilience of PQC Third Round Finalist NTRU-HRSS}, howpublished = {Cryptology ePrint Archive, Report 2021/168}, year = {2021}, url = {https://eprint.iacr.org/2021/168}, } @misc{cryptoeprint:2021:169, author = {Yasuhiko Ikematsu and Shuhei Nakamura and Bagus Santoso and Takanori Yasuda}, title = {Security Analysis on an El-Gamal-like Multivariate Encryption Scheme Based on Isomorphism of Polynomials}, howpublished = {Cryptology ePrint Archive, Report 2021/169}, year = {2021}, url = {https://eprint.iacr.org/2021/169}, } @misc{cryptoeprint:2021:170, author = {Ai Kitagawa and Yusuke Sakai and Keita Emura and Goichiro Hanaoka and Keisuke Tanaka}, title = {Fully Anonymous Group Signature with Verifier-Local Revocation}, howpublished = {Cryptology ePrint Archive, Report 2021/170}, year = {2021}, url = {https://eprint.iacr.org/2021/170}, } @misc{cryptoeprint:2021:171, author = {Wei Yu and Guangwu Xu }, title = {Pre-Computation Scheme of Window $\tau$NAF for Koblitz Curves Revisited}, howpublished = {Cryptology ePrint Archive, Report 2021/171}, year = {2021}, url = {https://eprint.iacr.org/2021/171}, } @misc{cryptoeprint:2021:172, author = {Nishanth Chandran and Nishka Dasgupta and Divya Gupta and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar and Akash Shah}, title = {Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum PSI}, howpublished = {Cryptology ePrint Archive, Report 2021/172}, year = {2021}, url = {https://eprint.iacr.org/2021/172}, } @misc{cryptoeprint:2021:173, author = {Wai-Kong Lee and Hwajeong Seo and Zhenfei Zhang and Seongoun Hwang}, title = {TensorCrypto}, howpublished = {Cryptology ePrint Archive, Report 2021/173}, year = {2021}, url = {https://eprint.iacr.org/2021/173}, } @misc{cryptoeprint:2021:174, author = {Alptekin Küpçü and Reihaneh Safavi-Naini}, title = {Smart Contracts for Incentivized Outsourcing of Computation}, howpublished = {Cryptology ePrint Archive, Report 2021/174}, year = {2021}, url = {https://eprint.iacr.org/2021/174}, } @misc{cryptoeprint:2021:175, author = {Siwei Chen and Zejun Xiang and Xiangyong Zeng and Shasha Zhang}, title = {On the Relationships between Different Methods for Degree Evaluation (Full Version)}, howpublished = {Cryptology ePrint Archive, Report 2021/175}, year = {2021}, url = {https://eprint.iacr.org/2021/175}, } @misc{cryptoeprint:2021:176, author = {Lukas Aumayr and Pedro Moreno-Sanchez and Aniket Kate and Matteo Maffei}, title = {Blitz: Secure Multi-Hop Payments Without Two-Phase Commits}, howpublished = {Cryptology ePrint Archive, Report 2021/176}, year = {2021}, url = {https://eprint.iacr.org/2021/176}, } @misc{cryptoeprint:2021:177, author = {Miguel Ambrona}, title = {Generic Negation of Pair Encodings}, howpublished = {Cryptology ePrint Archive, Report 2021/177}, year = {2021}, url = {https://eprint.iacr.org/2021/177}, } @misc{cryptoeprint:2021:178, author = {Tapas Pal and Ratna Dutta}, title = {Attribute-Based Access Control for Inner Product Functional Encryption from LWE}, howpublished = {Cryptology ePrint Archive, Report 2021/178}, year = {2021}, url = {https://eprint.iacr.org/2021/178}, } @misc{cryptoeprint:2021:179, author = {An Wang and Yuan Li and Yaoling Ding and Liehuang Zhu and Yongjuan Wang}, title = {Efficient Framework for Genetic-Algorithm-Based Correlation Power Analysis}, howpublished = {Cryptology ePrint Archive, Report 2021/179}, year = {2021}, url = {https://eprint.iacr.org/2021/179}, } @misc{cryptoeprint:2021:180, author = {Adithya Bhat and Akhil Bandarupalli and Saurabh Bagchi and Aniket Kate and Michael Reiter}, title = {Apollo -- Optimistically Linear and Responsive SMR}, howpublished = {Cryptology ePrint Archive, Report 2021/180}, year = {2021}, url = {https://eprint.iacr.org/2021/180}, } @misc{cryptoeprint:2021:181, author = {Jesus Diaz and Anja Lehmann}, title = {Group Signatures with User-Controlled and Sequential Linkability}, howpublished = {Cryptology ePrint Archive, Report 2021/181}, year = {2021}, url = {https://eprint.iacr.org/2021/181}, } @misc{cryptoeprint:2021:182, author = {István András Seres and Máté Horváth and Péter Burcsi}, title = {The Legendre Pseudorandom Function as a Multivariate Quadratic Cryptosystem: Security and Applications}, howpublished = {Cryptology ePrint Archive, Report 2021/182}, year = {2021}, url = {https://eprint.iacr.org/2021/182}, } @misc{cryptoeprint:2021:183, author = {Dimitris Karakostas and Nikos Karayannidis and Aggelos Kiayias}, title = {Efficient State Management in Distributed Ledgers}, howpublished = {Cryptology ePrint Archive, Report 2021/183}, year = {2021}, url = {https://eprint.iacr.org/2021/183}, } @misc{cryptoeprint:2021:184, author = {Sravya Yandamuri and Ittai Abraham and Kartik Nayak and Michael K. Reiter}, title = {Communication-Efficient BFT Protocols Using Small Trusted Hardware to Tolerate Minority Corruption}, howpublished = {Cryptology ePrint Archive, Report 2021/184}, year = {2021}, url = {https://eprint.iacr.org/2021/184}, } @misc{cryptoeprint:2021:185, author = {Hwajeong Seo and Pakize Sanal and Wai-Kong Lee and Reza Azarderakhsh}, title = {No Silver Bullet: Optimized Montgomery Multiplication on Various 64-bit ARM Platforms}, howpublished = {Cryptology ePrint Archive, Report 2021/185}, year = {2021}, url = {https://eprint.iacr.org/2021/185}, } @misc{cryptoeprint:2021:186, author = {Hemanta K. Maji and Hai H. Nguyen and Anat Paskin-Cherniavsky and Tom Suad and Mingyuan Wang}, title = {Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages}, howpublished = {Cryptology ePrint Archive, Report 2021/186}, year = {2021}, url = {https://eprint.iacr.org/2021/186}, } @misc{cryptoeprint:2021:187, author = {Fukang Liu and Takanori Isobe and Willi Meier and Kosei Sakamoto}, title = {Weak Keys in Reduced AEGIS and Tiaoxin}, howpublished = {Cryptology ePrint Archive, Report 2021/187}, year = {2021}, url = {https://eprint.iacr.org/2021/187}, } @misc{cryptoeprint:2021:188, author = {Alessandro Chiesa and Eylon Yogev}, title = {Tight Security Bounds for Micali’s SNARGs}, howpublished = {Cryptology ePrint Archive, Report 2021/188}, year = {2021}, url = {https://eprint.iacr.org/2021/188}, } @misc{cryptoeprint:2021:189, author = {Yunwen Liu and Siwei Sun and Chao Li}, title = {Rotational Cryptanalysis From a Differential-linear Perspective Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette}, howpublished = {Cryptology ePrint Archive, Report 2021/189}, year = {2021}, url = {https://eprint.iacr.org/2021/189}, } @misc{cryptoeprint:2021:190, author = {Hamidreza Amini Khorasgani and Hemanta K. Maji and Hai H. Nguyen}, title = {Decidability of Secure Non-interactive Simulation of Doubly Symmetric Binary Source}, howpublished = {Cryptology ePrint Archive, Report 2021/190}, year = {2021}, url = {https://eprint.iacr.org/2021/190}, } @misc{cryptoeprint:2021:191, author = {Yaroslav Balytskyi and Manohar Raavi and Anatoliy Pinchuk and Sang-Yoon Chang}, title = {PT-Symmetric Quantum State Discrimination for Attack on BB84 Quantum Key Distribution}, howpublished = {Cryptology ePrint Archive, Report 2021/191}, year = {2021}, url = {https://eprint.iacr.org/2021/191}, } @misc{cryptoeprint:2021:192, author = {Jan Czajkowski}, title = {Quantum Indifferentiability of SHA-3}, howpublished = {Cryptology ePrint Archive, Report 2021/192}, year = {2021}, url = {https://eprint.iacr.org/2021/192}, } @misc{cryptoeprint:2021:193, author = {Jan-Pieter D'Anvers and Senne Batsleer}, title = {Multitarget decryption failure attacks and their application to Saber and Kyber}, howpublished = {Cryptology ePrint Archive, Report 2021/193}, year = {2021}, url = {https://eprint.iacr.org/2021/193}, } @misc{cryptoeprint:2021:194, author = {Raghvendra Rohit and Kai Hu and Sumanta Sarkar and Siwei Sun}, title = {Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon}, howpublished = {Cryptology ePrint Archive, Report 2021/194}, year = {2021}, url = {https://eprint.iacr.org/2021/194}, } @misc{cryptoeprint:2021:195, author = {Karim Baghery and Cyprien Delpech de Saint Guilhem and Emmanuela Orsini and Nigel P. Smart and Titouan Tanguy}, title = {Compilation of Function Representations for Secure Computing Paradigms}, howpublished = {Cryptology ePrint Archive, Report 2021/195}, year = {2021}, url = {https://eprint.iacr.org/2021/195}, } @misc{cryptoeprint:2021:196, author = {Xu Liu and Mingqiang Wang}, title = {QCCA-Secure Generic Key Encapsulation Mechanism with Tighter Security in the Quantum Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2021/196}, year = {2021}, url = {https://eprint.iacr.org/2021/196}, } @misc{cryptoeprint:2021:197, author = {Guilherme Perin and Lichao Wu and Stjepan Picek}, title = {Gambling for Success: The Lottery Ticket Hypothesis in Deep Learning-based SCA}, howpublished = {Cryptology ePrint Archive, Report 2021/197}, year = {2021}, url = {https://eprint.iacr.org/2021/197}, } @misc{cryptoeprint:2021:198, author = {Tatsuki Ono and Song Bian and Takashi Sato}, title = {Automatic Parallelism Tuning for Module Learning with Errors Based Post-Quantum Key Exchanges on GPUs}, howpublished = {Cryptology ePrint Archive, Report 2021/198}, year = {2021}, url = {https://eprint.iacr.org/2021/198}, } @misc{cryptoeprint:2021:199, author = {Shuo Sun and Yongbin Zhou and Yunfeng Ji and Rui Zhang and Yang Tao}, title = {Generic, Efficient and Isochronous Gaussian Sampling over the Integers}, howpublished = {Cryptology ePrint Archive, Report 2021/199}, year = {2021}, url = {https://eprint.iacr.org/2021/199}, } @misc{cryptoeprint:2021:200, author = {Sergiu Carpov and Kevin Deforth and Nicolas Gama and Mariya Georgieva and Dimitar Jetchev and Jonathan Katz and Iraklis Leontiadis and M. Mohammadi and Abson Sae-Tang and Marius Vuille}, title = {Manticore: Efficient Framework for Scalable Secure Multiparty Computation Protocols}, howpublished = {Cryptology ePrint Archive, Report 2021/200}, year = {2021}, url = {https://eprint.iacr.org/2021/200}, } @misc{cryptoeprint:2021:201, author = {Hanshen Xiao and Srinivas Devadas}, title = {DAUnTLeSS: Data Augmentation and Uniform Transformation for Learning with Scalability and Security}, howpublished = {Cryptology ePrint Archive, Report 2021/201}, year = {2021}, url = {https://eprint.iacr.org/2021/201}, } @misc{cryptoeprint:2021:202, author = {Martin R. Albrecht and Russell W. F. Lai}, title = {Subtractive Sets over Cyclotomic Rings: Limits of Schnorr-like Arguments over Lattices}, howpublished = {Cryptology ePrint Archive, Report 2021/202}, year = {2021}, url = {https://eprint.iacr.org/2021/202}, } @misc{cryptoeprint:2021:203, author = {Tjerand Silde and Martin Strand}, title = {Anonymous Tokens with Public Metadata and Applications to Private Contact Tracing}, howpublished = {Cryptology ePrint Archive, Report 2021/203}, year = {2021}, url = {https://eprint.iacr.org/2021/203}, } @misc{cryptoeprint:2021:204, author = {Andrey Kim and Yuriy Polyakov and Vincent Zucca}, title = {Revisiting Homomorphic Encryption Schemes for Finite Fields}, howpublished = {Cryptology ePrint Archive, Report 2021/204}, year = {2021}, url = {https://eprint.iacr.org/2021/204}, } @misc{cryptoeprint:2021:205, author = {Tsz Hon Yuen and Handong Cui and Xiang Xie}, title = {Compact Zero-Knowledge Proofs for Threshold ECDSA with Trustless Setup}, howpublished = {Cryptology ePrint Archive, Report 2021/205}, year = {2021}, url = {https://eprint.iacr.org/2021/205}, } @misc{cryptoeprint:2021:206, author = {Ádám Ficsór and Yuval Kogman and Lucas Ontivero and István András Seres}, title = {WabiSabi: Centrally Coordinated CoinJoins with Variable Amounts}, howpublished = {Cryptology ePrint Archive, Report 2021/206}, year = {2021}, url = {https://eprint.iacr.org/2021/206}, } @misc{cryptoeprint:2021:207, author = {Daniele Cozzo and Nigel P. Smart and Younes Talibi Alaoui}, title = {Secure Fast Evaluation of Iterative Methods: With an Application to Secure PageRank}, howpublished = {Cryptology ePrint Archive, Report 2021/207}, year = {2021}, url = {https://eprint.iacr.org/2021/207}, } @misc{cryptoeprint:2021:208, author = {Mahimna Kelkar and Phi Hung Le and Mariana Raykova and Karn Seth}, title = {Secure Poisson Regression}, howpublished = {Cryptology ePrint Archive, Report 2021/208}, year = {2021}, url = {https://eprint.iacr.org/2021/208}, } @misc{cryptoeprint:2021:209, author = {George Marinakis}, title = {Sampling methods for cryptographic tests }, howpublished = {Cryptology ePrint Archive, Report 2021/209}, year = {2021}, url = {https://eprint.iacr.org/2021/209}, } @misc{cryptoeprint:2021:210, author = {Craig Gentry and Shai Halevi and Hugo Krawczyk and Bernardo Magri and Jesper Buus Nielsen and Tal Rabin and Sophia Yakoubov}, title = {YOSO: You Only Speak Once / Secure MPC with Stateless Ephemeral Roles}, howpublished = {Cryptology ePrint Archive, Report 2021/210}, year = {2021}, url = {https://eprint.iacr.org/2021/210}, } @misc{cryptoeprint:2021:211, author = {Bernardo David and Bernardo Magri and Christian Matt and Jesper Buus Nielsen and Daniel Tschudi}, title = {GearBox: An Efficient UC Sharded Ledger Leveraging the Safety-Liveness Dichotomy}, howpublished = {Cryptology ePrint Archive, Report 2021/211}, year = {2021}, url = {https://eprint.iacr.org/2021/211}, } @misc{cryptoeprint:2021:212, author = {Ryoma Ito and Rentaro Shiba and Kosei Sakamoto and Fukang Liu and Takanori Isobe}, title = {Bit-wise Cryptanalysis on AND-RX Permutation Friet-PC}, howpublished = {Cryptology ePrint Archive, Report 2021/212}, year = {2021}, url = {https://eprint.iacr.org/2021/212}, } @misc{cryptoeprint:2021:213, author = {Ling Sun and Wei Wang and Meiqin Wang}, title = {Accelerating the Search of Differential and Linear Characteristics with the SAT Method}, howpublished = {Cryptology ePrint Archive, Report 2021/213}, year = {2021}, url = {https://eprint.iacr.org/2021/213}, } @misc{cryptoeprint:2021:214, author = {Martin R. Albrecht and Jorge Blasco and Rikke Bjerg Jensen and Lenka Mareková}, title = {Mesh Messaging in Large-scale Protests: Breaking Bridgefy}, howpublished = {Cryptology ePrint Archive, Report 2021/214}, year = {2021}, url = {https://eprint.iacr.org/2021/214}, } @misc{cryptoeprint:2021:215, author = {Cyprien Delpech de Saint Guilhem and Emmanuela Orsini and Titouan Tanguy}, title = {Limbo: Efficient Zero-knowledge MPCitH-based Arguments}, howpublished = {Cryptology ePrint Archive, Report 2021/215}, year = {2021}, url = {https://eprint.iacr.org/2021/215}, } @misc{cryptoeprint:2021:216, author = {Alexander May}, title = {How to Meet Ternary LWE Keys}, howpublished = {Cryptology ePrint Archive, Report 2021/216}, year = {2021}, url = {https://eprint.iacr.org/2021/216}, } @misc{cryptoeprint:2021:217, author = {David Niehues}, title = {Verifiable Random Functions with Optimal Tightness}, howpublished = {Cryptology ePrint Archive, Report 2021/217}, year = {2021}, url = {https://eprint.iacr.org/2021/217}, } @misc{cryptoeprint:2021:218, author = {Tako Boris Fouotsa and Christophe Petit}, title = {InSIDH: a Simplification of SiGamal}, howpublished = {Cryptology ePrint Archive, Report 2021/218}, year = {2021}, url = {https://eprint.iacr.org/2021/218}, } @misc{cryptoeprint:2021:219, author = {Markulf Kohlweiss and Mary Maller and Janno Siim and Mikhail Volkhov}, title = {Snarky Ceremonies}, howpublished = {Cryptology ePrint Archive, Report 2021/219}, year = {2021}, url = {https://eprint.iacr.org/2021/219}, } @misc{cryptoeprint:2021:220, author = {Bei Wang; Yi Ouyang; Songsong Li; Honggang Hu}, title = {A New Twofold Cornacchia-Type Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2021/220}, year = {2021}, url = {https://eprint.iacr.org/2021/220}, } @misc{cryptoeprint:2021:221, author = {Ryo Nishimaki}, title = {The Direction of Updatable Encryption Does Matter}, howpublished = {Cryptology ePrint Archive, Report 2021/221}, year = {2021}, url = {https://eprint.iacr.org/2021/221}, } @misc{cryptoeprint:2021:222, author = {Raymond K. Zhao and Sarah McCarthy and Ron Steinfeld and Amin Sakzad and Máire O’Neill}, title = {Quantum-safe HIBE: does it cost a Latte?}, howpublished = {Cryptology ePrint Archive, Report 2021/222}, year = {2021}, url = {https://eprint.iacr.org/2021/222}, } @misc{cryptoeprint:2021:223, author = {Jing Xu and Xinyu Li and Lingyuan Yin and Yuan Lu and Qiang Tang and Zhenfeng Zhang }, title = {Redactable Blockchain Protocol with Instant Redaction}, howpublished = {Cryptology ePrint Archive, Report 2021/223}, year = {2021}, url = {https://eprint.iacr.org/2021/223}, } @misc{cryptoeprint:2021:224, author = {Murilo Coutinho and T. C. Souza Neto}, title = {Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha}, howpublished = {Cryptology ePrint Archive, Report 2021/224}, year = {2021}, url = {https://eprint.iacr.org/2021/224}, } @misc{cryptoeprint:2021:225, author = {Anne Canteaut and Alain Couvreur and Léo Perrin}, title = {Recovering or Testing Extended-Affine Equivalence}, howpublished = {Cryptology ePrint Archive, Report 2021/225}, year = {2021}, url = {https://eprint.iacr.org/2021/225}, } @misc{cryptoeprint:2021:226, author = {Khoa Nguyen and Reihaneh Safavi-Naini and Willy Susilo and Huaxiong Wang and Yanhong Xu and Neng Zeng}, title = {Group Encryption: Full Dynamicity, Message Filtering and Code-Based Instantiation}, howpublished = {Cryptology ePrint Archive, Report 2021/226}, year = {2021}, url = {https://eprint.iacr.org/2021/226}, } @misc{cryptoeprint:2021:227, author = {Qiqi Lai and Feng-Hao Liu and Zhedong Wang}, title = {Rate-1 Key-Dependent Message Security via Reusable Homomorphic Extractor against Correlated-Source Attacks}, howpublished = {Cryptology ePrint Archive, Report 2021/227}, year = {2021}, url = {https://eprint.iacr.org/2021/227}, } @misc{cryptoeprint:2021:228, author = {Nils Fleischhacker and Mark Simkin}, title = {On Publicly-Accountable Zero-Knowledge and Small Shuffle Arguments}, howpublished = {Cryptology ePrint Archive, Report 2021/228}, year = {2021}, url = {https://eprint.iacr.org/2021/228}, } @misc{cryptoeprint:2021:229, author = {Zhiqiang Wu and Kenli Li and Keqin Li and Jin Wang}, title = {Fast Boolean Queries with Minimized Leakage for Encrypted Databases in Cloud Computing}, howpublished = {Cryptology ePrint Archive, Report 2021/229}, year = {2021}, url = {https://eprint.iacr.org/2021/229}, } @misc{cryptoeprint:2021:230, author = {Pascal Bemmann and Rongmao Chen and Tibor Jager}, title = {Subversion-Resilient Public Key Encryption with Practical Watchdogs}, howpublished = {Cryptology ePrint Archive, Report 2021/230}, year = {2021}, url = {https://eprint.iacr.org/2021/230}, } @misc{cryptoeprint:2021:231, author = {Zhiqiang Wu and Xiaoyong Tang and Jin Wang and Tan Deng}, title = {LL-ORAM: A Forward and Backward Private Oblivious RAM}, howpublished = {Cryptology ePrint Archive, Report 2021/231}, year = {2021}, url = {https://eprint.iacr.org/2021/231}, } @misc{cryptoeprint:2021:232, author = {Claus Peter Schnorr}, title = {Fast Factoring Integers by SVP Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2021/232}, year = {2021}, url = {https://eprint.iacr.org/2021/232}, } @misc{cryptoeprint:2021:233, author = {Inbar Kaslasi and Ron D. Rothblum and Prashant Nalini Vasudevan}, title = {Public-Coin Statistical Zero-Knowledge Batch Verification against Malicious Verifiers}, howpublished = {Cryptology ePrint Archive, Report 2021/233}, year = {2021}, url = {https://eprint.iacr.org/2021/233}, } @misc{cryptoeprint:2021:234, author = {Alessandro Budroni and Igor Semaev}, title = {New Public-Key Crypto-System EHT}, howpublished = {Cryptology ePrint Archive, Report 2021/234}, year = {2021}, url = {https://eprint.iacr.org/2021/234}, } @misc{cryptoeprint:2021:235, author = {Denis Diemert and Kai Gellert and Tibor Jager and Lin Lyu}, title = {More Efficient Digital Signatures with Tight Multi-User Security}, howpublished = {Cryptology ePrint Archive, Report 2021/235}, year = {2021}, url = {https://eprint.iacr.org/2021/235}, } @misc{cryptoeprint:2021:236, author = {Patrik Ekdahl and Thomas Johansson and Alexander Maximov and Jing Yang}, title = {SNOW-Vi: an extreme performance variant of SNOW-V for low-end CPUs}, howpublished = {Cryptology ePrint Archive, Report 2021/236}, year = {2021}, url = {https://eprint.iacr.org/2021/236}, } @misc{cryptoeprint:2021:237, author = {Ehsan Ebrahimi}, title = {Post-quantum Security of OAEP Transform}, howpublished = {Cryptology ePrint Archive, Report 2021/237}, year = {2021}, url = {https://eprint.iacr.org/2021/237}, } @misc{cryptoeprint:2021:238, author = {Gregor Leander and Shahram Rasoolzadeh}, title = {Two Sides of The Same Coin: Weak-Keys and More Efficient Variants of CRAFT}, howpublished = {Cryptology ePrint Archive, Report 2021/238}, year = {2021}, url = {https://eprint.iacr.org/2021/238}, } @misc{cryptoeprint:2021:239, author = {Panagiotis Chatzigiannis and Foteini Baldimtsi and Konstantinos Chalkias}, title = {SoK: Auditability and Accountability in Distributed Payment Systems}, howpublished = {Cryptology ePrint Archive, Report 2021/239}, year = {2021}, url = {https://eprint.iacr.org/2021/239}, } @misc{cryptoeprint:2021:240, author = {Mark Zhandry and Cong Zhang}, title = {The Relationship Between Idealized Models Under Computationally Bounded Adversaries}, howpublished = {Cryptology ePrint Archive, Report 2021/240}, year = {2021}, url = {https://eprint.iacr.org/2021/240}, } @misc{cryptoeprint:2021:241, author = {Saikrishna Badrinarayanan and Peihan Miao and Pratyay Mukherjee and Divya Ravi}, title = {On the Round Complexity of Fully Secure Solitary MPC with Honest Majority}, howpublished = {Cryptology ePrint Archive, Report 2021/241}, year = {2021}, url = {https://eprint.iacr.org/2021/241}, } @misc{cryptoeprint:2021:242, author = {Ju-Hwan Kim and Ji-Eun Woo and Soo-Jin Kim and So-Yeon Park and Dong-Guk Han}, title = {GAP: Born to Break Hiding}, howpublished = {Cryptology ePrint Archive, Report 2021/242}, year = {2021}, url = {https://eprint.iacr.org/2021/242}, } @misc{cryptoeprint:2021:243, author = {Gayathri Garimella and Payman Mohassel and Mike Rosulek and Saeed Sadeghian and Jaspal Singh}, title = {Private Set Operations from Oblivious Switching}, howpublished = {Cryptology ePrint Archive, Report 2021/243}, year = {2021}, url = {https://eprint.iacr.org/2021/243}, } @misc{cryptoeprint:2021:244, author = {Alexander Bienstock and Yevgeniy Dodis and Kevin Yeo}, title = {Forward Secret Encrypted RAM: Lower Bounds and Applications}, howpublished = {Cryptology ePrint Archive, Report 2021/244}, year = {2021}, url = {https://eprint.iacr.org/2021/244}, } @misc{cryptoeprint:2021:245, author = {Yanbin Pan and Jun Xu and Nick Wadleigh and Qi Cheng}, title = {On the Ideal Shortest Vector Problem over Random Rational Primes}, howpublished = {Cryptology ePrint Archive, Report 2021/245}, year = {2021}, url = {https://eprint.iacr.org/2021/245}, } @misc{cryptoeprint:2021:246, author = {Shengyuan Feng and Junqing Gong and Jie Chen}, title = {Master-Key KDM-Secure ABE via Predicate Encoding}, howpublished = {Cryptology ePrint Archive, Report 2021/246}, year = {2021}, url = {https://eprint.iacr.org/2021/246}, } @misc{cryptoeprint:2021:247, author = {David Knichel and Pascal Sasdrich and Amir Moradi}, title = {Generic Hardware Private Circuits - Towards Automated Generation of Composable Secure Gadgets}, howpublished = {Cryptology ePrint Archive, Report 2021/247}, year = {2021}, url = {https://eprint.iacr.org/2021/247}, } @misc{cryptoeprint:2021:248, author = {Bernardo Magri and Giulio Malavolta and Dominique Schröder and Dominique Unruh}, title = {Everlasting UC Commitments from Fully Malicious PUFs}, howpublished = {Cryptology ePrint Archive, Report 2021/248}, year = {2021}, url = {https://eprint.iacr.org/2021/248}, } @misc{cryptoeprint:2021:249, author = {Karlo Knezevic and Juraj Fulir and Domagoj Jakobovic and Stjepan Picek}, title = {NeuroSCA: Evolving Activation Functions for Side-channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2021/249}, year = {2021}, url = {https://eprint.iacr.org/2021/249}, } @misc{cryptoeprint:2021:250, author = {Onur Gunlu}, title = {Key Agreement with Physical Unclonable Functions and Biometric Identifiers}, howpublished = {Cryptology ePrint Archive, Report 2021/250}, year = {2021}, url = {https://eprint.iacr.org/2021/250}, } @misc{cryptoeprint:2021:251, author = {Sebastian Faust and Carmit Hazay and David Kretzler and Benjamin Schlosser}, title = {Generic Compiler for Publicly Verifiable Covert Multi-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2021/251}, year = {2021}, url = {https://eprint.iacr.org/2021/251}, } @misc{cryptoeprint:2021:252, author = {Michael Zuzak and Yuntao Liu and Ankur Srivastava}, title = {A Resource Binding Approach to Logic Obfuscation}, howpublished = {Cryptology ePrint Archive, Report 2021/252}, year = {2021}, url = {https://eprint.iacr.org/2021/252}, } @misc{cryptoeprint:2021:253, author = {Mark Abspoel and Ronald Cramer and Daniel Escudero and Ivan Damgård and Chaoping Xing}, title = {Improved single-round secure multiplication using regenerating codes}, howpublished = {Cryptology ePrint Archive, Report 2021/253}, year = {2021}, url = {https://eprint.iacr.org/2021/253}, } @misc{cryptoeprint:2021:254, author = {Netanel Raviv and Ben Langton and Itzhak Tamo}, title = {Multivariate Public Key Cryptosystem from Sidon Spaces}, howpublished = {Cryptology ePrint Archive, Report 2021/254}, year = {2021}, url = {https://eprint.iacr.org/2021/254}, } @misc{cryptoeprint:2021:255, author = {Fukang Liu and Takanori Isobe and Willi Meier}, title = {A Simple Algebraic Attack on 3-Round LowMC}, howpublished = {Cryptology ePrint Archive, Report 2021/255}, year = {2021}, url = {https://eprint.iacr.org/2021/255}, } @misc{cryptoeprint:2021:256, author = {Ghada Almashaqbeh and Fabrice Benhamouda and Seungwook Han and Daniel Jaroslawicz and Tal Malkin and Alex Nicita and Tal Rabin and Abhishek Shah and Eran Tromer}, title = {Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC}, howpublished = {Cryptology ePrint Archive, Report 2021/256}, year = {2021}, url = {https://eprint.iacr.org/2021/256}, } @misc{cryptoeprint:2021:257, author = {Shoichi Kamada}, title = {Cryptanalysis of the quantum public-key cryptosystem OTU under heuristics from Szemer\'{e}di-type statements}, howpublished = {Cryptology ePrint Archive, Report 2021/257}, year = {2021}, url = {https://eprint.iacr.org/2021/257}, } @misc{cryptoeprint:2021:258, author = {Jean-Sebastien Coron and Lorenzo Spignoli}, title = {Secure Shuffling in the Probing Model}, howpublished = {Cryptology ePrint Archive, Report 2021/258}, year = {2021}, url = {https://eprint.iacr.org/2021/258}, } @misc{cryptoeprint:2021:259, author = {Jesús-Javier Chi-Domínguez and Krijn Reijnders}, title = {Don't forget the constant-time in CSURF}, howpublished = {Cryptology ePrint Archive, Report 2021/259}, year = {2021}, url = {https://eprint.iacr.org/2021/259}, } @misc{cryptoeprint:2021:260, author = {Yuval Ishai and Russell W. F. Lai and Giulio Malavolta}, title = {A Geometric Approach to Homomorphic Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2021/260}, year = {2021}, url = {https://eprint.iacr.org/2021/260}, } @misc{cryptoeprint:2021:261, author = {Ben Marshall and Dan Page and James Webb}, title = {MIRACLE: MIcRo-ArChitectural Leakage Evaluation}, howpublished = {Cryptology ePrint Archive, Report 2021/261}, year = {2021}, url = {https://eprint.iacr.org/2021/261}, } @misc{cryptoeprint:2021:262, author = {Claudio Orlandi and Peter Scholl and Sophia Yakoubov}, title = {The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT}, howpublished = {Cryptology ePrint Archive, Report 2021/262}, year = {2021}, url = {https://eprint.iacr.org/2021/262}, } @misc{cryptoeprint:2021:263, author = {Katharina Boudgoust and Adeline Roux-Langlois}, title = {Compressed Linear Aggregate Signatures Based on Module Lattices}, howpublished = {Cryptology ePrint Archive, Report 2021/263}, year = {2021}, url = {https://eprint.iacr.org/2021/263}, } @misc{cryptoeprint:2021:264, author = {Bernardo David and Lorenzo Gentile and Mohsen Pourpouneh}, title = {FAST: Fair Auctions via Secret Transactions}, howpublished = {Cryptology ePrint Archive, Report 2021/264}, year = {2021}, url = {https://eprint.iacr.org/2021/264}, } @misc{cryptoeprint:2021:265, author = {Katharina Boudgoust and Corentin Jeudy and Adeline Roux-Langlois and Weiqiang Wen}, title = {On the Hardness of Module-LWE with Binary Secret}, howpublished = {Cryptology ePrint Archive, Report 2021/265}, year = {2021}, url = {https://eprint.iacr.org/2021/265}, } @misc{cryptoeprint:2021:266, author = {Peter Rindal and Phillipp Schoppmann}, title = {VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE}, howpublished = {Cryptology ePrint Archive, Report 2021/266}, year = {2021}, url = {https://eprint.iacr.org/2021/266}, } @misc{cryptoeprint:2021:267, author = {Christoph Dobraunig and Lorenzo Grassi and Anna Guinet and Daniël Kuijsters}, title = {Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields}, howpublished = {Cryptology ePrint Archive, Report 2021/267}, year = {2021}, url = {https://eprint.iacr.org/2021/267}, } @misc{cryptoeprint:2021:268, author = {Daniel Slamanig and Christoph Striecks}, title = {Puncture 'Em All: Stronger Updatable Encryption with No-Directional Key Updates}, howpublished = {Cryptology ePrint Archive, Report 2021/268}, year = {2021}, url = {https://eprint.iacr.org/2021/268}, } @misc{cryptoeprint:2021:269, author = {Pramod Bhatotia and Markulf Kohlweiss and Lorenzo Martinico and Yiannis Tselekounis}, title = {Steel: Composable Hardware-based Stateful and Randomised Functional Encryption}, howpublished = {Cryptology ePrint Archive, Report 2021/269}, year = {2021}, url = {https://eprint.iacr.org/2021/269}, } @misc{cryptoeprint:2021:270, author = {Pedro Hecht}, title = {PQC: R-Propping of a New Group-Based Digital Signature}, howpublished = {Cryptology ePrint Archive, Report 2021/270}, year = {2021}, url = {https://eprint.iacr.org/2021/270}, } @misc{cryptoeprint:2021:271, author = {Dakshita Khurana and Brent Waters}, title = {On the CCA Compatibility of Public-Key Infrastructure}, howpublished = {Cryptology ePrint Archive, Report 2021/271}, year = {2021}, url = {https://eprint.iacr.org/2021/271}, } @misc{cryptoeprint:2021:272, author = {Geovandro C. C. F. Pereira and Paulo S. L. M. Barreto}, title = {Isogeny-based key compression without pairings}, howpublished = {Cryptology ePrint Archive, Report 2021/272}, year = {2021}, url = {https://eprint.iacr.org/2021/272}, } @misc{cryptoeprint:2021:273, author = {Stanislaw Jarecki and Hugo Krawczyk and Jiayu Xu}, title = {On the (In)Security of the Diffie-Hellman Oblivious PRF with Multiplicative Blinding}, howpublished = {Cryptology ePrint Archive, Report 2021/273}, year = {2021}, url = {https://eprint.iacr.org/2021/273}, } @misc{cryptoeprint:2021:274, author = {Lawrence Roy and Jaspal Singh}, title = {Large Message Homomorphic Secret Sharing from DCR and Applications}, howpublished = {Cryptology ePrint Archive, Report 2021/274}, year = {2021}, url = {https://eprint.iacr.org/2021/274}, } @misc{cryptoeprint:2021:275, author = {Zhengyuan Shi and Gangqiang Yang and Hailiang Xiong and Fudong Li and Honggang Hu }, title = {Design Space Exploration of Galois and Fibonacci Configuration based on Espresso Stream Cipher}, howpublished = {Cryptology ePrint Archive, Report 2021/275}, year = {2021}, url = {https://eprint.iacr.org/2021/275}, } @misc{cryptoeprint:2021:276, author = {Amril Syalim and Takashi Nishide and Kouichi Sakurai}, title = {Improved Proxy Re-encryption Scheme for Symmetric Key Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2021/276}, year = {2021}, url = {https://eprint.iacr.org/2021/276}, } @misc{cryptoeprint:2021:277, author = {Julien Devevey and Amin Sakzad and Damien Stehlé and Ron Steinfeld}, title = {On the Integer Polynomial Learning with Errors Problem}, howpublished = {Cryptology ePrint Archive, Report 2021/277}, year = {2021}, url = {https://eprint.iacr.org/2021/277}, } @misc{cryptoeprint:2021:278, author = {Ivan Damgård and Boyang Li and Nikolaj I. Schwartzbach}, title = {More Communication Lower Bounds for Information-Theoretic MPC}, howpublished = {Cryptology ePrint Archive, Report 2021/278}, year = {2021}, url = {https://eprint.iacr.org/2021/278}, } @misc{cryptoeprint:2021:279, author = {Anna-Lena Horlemann and Sven Puchinger and Julian Renner and Thomas Schamberger and Antonia Wachter-Zeh}, title = {Information-Set Decoding with Hints}, howpublished = {Cryptology ePrint Archive, Report 2021/279}, year = {2021}, url = {https://eprint.iacr.org/2021/279}, } @misc{cryptoeprint:2021:280, author = {Jelle Don and Serge Fehr and Christian Majenz and Christian Schaffner}, title = {Online-Extractability in the Quantum Random-Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2021/280}, year = {2021}, url = {https://eprint.iacr.org/2021/280}, } @misc{cryptoeprint:2021:281, author = {Alessandro Chiesa and Eylon Yogev}, title = {Subquadratic SNARGs in the Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2021/281}, year = {2021}, url = {https://eprint.iacr.org/2021/281}, } @misc{cryptoeprint:2021:282, author = {Péter Kutas and Simon-Philipp Merz and Christophe Petit and Charlotte Weitkämper}, title = {One-way functions and malleability oracles: Hidden shift attacks on isogeny-based protocols}, howpublished = {Cryptology ePrint Archive, Report 2021/282}, year = {2021}, url = {https://eprint.iacr.org/2021/282}, } @misc{cryptoeprint:2021:283, author = {Carsten Baum and Bernardo David and Tore Frederiksen}, title = {P2DEX: Privacy-Preserving Decentralized Cryptocurrency Exchange}, howpublished = {Cryptology ePrint Archive, Report 2021/283}, year = {2021}, url = {https://eprint.iacr.org/2021/283}, } @misc{cryptoeprint:2021:284, author = {Christof Ferreira Torres and Antonio Ken Iannillo and Arthur Gervais and Radu State}, title = {The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts}, howpublished = {Cryptology ePrint Archive, Report 2021/284}, year = {2021}, url = {https://eprint.iacr.org/2021/284}, } @misc{cryptoeprint:2021:285, author = {Amos Beimel and Hussien Othman and Naty Peter}, title = {Degree-2 Secret Sharing and Conditional Disclosure of Secrets}, howpublished = {Cryptology ePrint Archive, Report 2021/285}, year = {2021}, url = {https://eprint.iacr.org/2021/285}, } @misc{cryptoeprint:2021:286, author = {Justin Holmgren and Alex Lombardi and Ron D. Rothblum}, title = {Fiat-Shamir via List-Recoverable Codes (or: Parallel Repetition of GMW is not Zero-Knowledge)}, howpublished = {Cryptology ePrint Archive, Report 2021/286}, year = {2021}, url = {https://eprint.iacr.org/2021/286}, } @misc{cryptoeprint:2021:287, author = {Adrien Benamira and David Gerault and Thomas Peyrin and Quan Quan Tan}, title = {A Deeper Look at Machine Learning-Based Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2021/287}, year = {2021}, url = {https://eprint.iacr.org/2021/287}, } @misc{cryptoeprint:2021:288, author = {Mark Zhandry}, title = {Redeeming Reset Indifferentiability and Post-Quantum Groups}, howpublished = {Cryptology ePrint Archive, Report 2021/288}, year = {2021}, url = {https://eprint.iacr.org/2021/288}, } @misc{cryptoeprint:2021:289, author = {Sam Blackshear and Konstantinos Chalkias and Panagiotis Chatzigiannis and Riyaz Faizullabhoy and Irakliy Khaburzaniya and Eleftherios Kokoris Kogias and Joshua Lind and David Wong and Tim Zakian}, title = {Reactive Key-Loss Protection in Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2021/289}, year = {2021}, url = {https://eprint.iacr.org/2021/289}, } @misc{cryptoeprint:2021:290, author = {Alex Biryukov and Aleksei Udovenko}, title = {Dummy Shuffling against Algebraic Attacks in White-box Implementations}, howpublished = {Cryptology ePrint Archive, Report 2021/290}, year = {2021}, url = {https://eprint.iacr.org/2021/290}, } @misc{cryptoeprint:2021:291, author = {Guilhem Castagnos and Dario Catalano and Fabien Laguillaumie and Federico Savasta and Ida Tucker}, title = {Bandwidth-efficient threshold EC-DSA revisited: Online/Offline Extensions, Identifiable Aborts, Proactivity and Adaptive Security}, howpublished = {Cryptology ePrint Archive, Report 2021/291}, year = {2021}, url = {https://eprint.iacr.org/2021/291}, } @misc{cryptoeprint:2021:292, author = {Akinori Hosoyamada and Yu Sasaki}, title = {Quantum Collision Attacks on Reduced SHA-256 and SHA-512}, howpublished = {Cryptology ePrint Archive, Report 2021/292}, year = {2021}, url = {https://eprint.iacr.org/2021/292}, } @misc{cryptoeprint:2021:293, author = {Nicolas Bordes and Joan Daemen and Daniël Kuijsters and Gilles Van Assche}, title = {Thinking Outside the Superbox}, howpublished = {Cryptology ePrint Archive, Report 2021/293}, year = {2021}, url = {https://eprint.iacr.org/2021/293}, } @misc{cryptoeprint:2021:294, author = {Marco Baldi and Franco Chiaraluce and Paolo Santini}, title = {Code-based signatures without trapdoors through restricted vectors}, howpublished = {Cryptology ePrint Archive, Report 2021/294}, year = {2021}, url = {https://eprint.iacr.org/2021/294}, } @misc{cryptoeprint:2021:295, author = {Michael Zuzak and Ankur Srivastava}, title = {Enhancing Processor Design Obfuscation Through Security-Aware On-Chip Memory and Data Path Design}, howpublished = {Cryptology ePrint Archive, Report 2021/295}, year = {2021}, url = {https://eprint.iacr.org/2021/295}, } @misc{cryptoeprint:2021:296, author = {Jan Richter-Brockmann and Pascal Sasdrich and Tim Güneysu}, title = {Revisiting Fault Adversary Models - Hardware Faults in Theory and Practice}, howpublished = {Cryptology ePrint Archive, Report 2021/296}, year = {2021}, url = {https://eprint.iacr.org/2021/296}, } @misc{cryptoeprint:2021:297, author = {Konstantinos Chalkias and Shir Cohen and Kevin Lewi and Fredric Moezinia and Yolan Romailler}, title = {HashWires: Hyperefficient Credential-Based Range Proofs}, howpublished = {Cryptology ePrint Archive, Report 2021/297}, year = {2021}, url = {https://eprint.iacr.org/2021/297}, } @misc{cryptoeprint:2021:298, author = {Bhupendra Singh and G. Athithan and Rajesh Pillai}, title = {On extensions of the one-time-pad}, howpublished = {Cryptology ePrint Archive, Report 2021/298}, year = {2021}, url = {https://eprint.iacr.org/2021/298}, } @misc{cryptoeprint:2021:299, author = {Muhammad Saad and Afsah Anwar and Srivatsan Ravi and David Mohaisen}, title = {HashSplit: Exploiting Bitcoin Asynchrony to Violate Common Prefix and Chain Quality}, howpublished = {Cryptology ePrint Archive, Report 2021/299}, year = {2021}, url = {https://eprint.iacr.org/2021/299}, } @misc{cryptoeprint:2021:300, author = {Nikolay Kaleyski}, title = {Invariants for EA- and CCZ-equivalence of APN and AB functions}, howpublished = {Cryptology ePrint Archive, Report 2021/300}, year = {2021}, url = {https://eprint.iacr.org/2021/300}, } @misc{cryptoeprint:2021:301, author = {Dmitrii Koshelev}, title = {Indifferentiable hashing to ordinary elliptic $\mathbb{F}_{\!q}$-curves of $j=0$ with the cost of one exponentiation in $\mathbb{F}_{\!q}$}, howpublished = {Cryptology ePrint Archive, Report 2021/301}, year = {2021}, url = {https://eprint.iacr.org/2021/301}, } @misc{cryptoeprint:2021:302, author = {Maxime Buser and Rafael Dowsley and Muhammed F. Esgin and Shabnam Kasra Kermanshahi and Veronika Kuchta and Joseph K. Liu and Raphael Phan and Zhenfei Zhang}, title = {Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2021/302}, year = {2021}, url = {https://eprint.iacr.org/2021/302}, } @misc{cryptoeprint:2021:303, author = {S. Dov Gordon and Daniel Starin and Arkady Yerukhimovich}, title = {The More The Merrier: Reducing the Cost of Large Scale MPC}, howpublished = {Cryptology ePrint Archive, Report 2021/303}, year = {2021}, url = {https://eprint.iacr.org/2021/303}, } @misc{cryptoeprint:2021:304, author = {Xavier Boyen and Thomas Haines and Johannes Mueller}, title = {Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting}, howpublished = {Cryptology ePrint Archive, Report 2021/304}, year = {2021}, url = {https://eprint.iacr.org/2021/304}, } @misc{cryptoeprint:2021:305, author = {Bertram Poettering and Paul Rösler and Jörg Schwenk and Douglas Stebila}, title = {SoK: Game-based Security Models for Group Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2021/305}, year = {2021}, url = {https://eprint.iacr.org/2021/305}, } @misc{cryptoeprint:2021:306, author = {Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, title = {Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2021/306}, year = {2021}, url = {https://eprint.iacr.org/2021/306}, } @misc{cryptoeprint:2021:307, author = {Thomas Attema and Ronald Cramer and Lisa Kohl}, title = {A Compressed $\Sigma$-Protocol Theory for Lattices}, howpublished = {Cryptology ePrint Archive, Report 2021/307}, year = {2021}, url = {https://eprint.iacr.org/2021/307}, } @misc{cryptoeprint:2021:308, author = {Michele Ciampi and Vipul Goyal and Rafail Ostrovsky}, title = {Threshold Garbled Circuits and Ad Hoc Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2021/308}, year = {2021}, url = {https://eprint.iacr.org/2021/308}, } @misc{cryptoeprint:2021:309, author = {Xingyu Meng and Kshitij Raj and Atul Prasad Deb Nath and Kanad Basu and Sandip Ray}, title = {SoCCAR: Detecting System-on-Chip Security Violations Under Asynchronous Resets}, howpublished = {Cryptology ePrint Archive, Report 2021/309}, year = {2021}, url = {https://eprint.iacr.org/2021/309}, } @misc{cryptoeprint:2021:310, author = {Yi Chen and Hongbo Yu}, title = {A New Neural Distinguisher Model Considering Derived Features from Multiple Ciphertext Pairs }, howpublished = {Cryptology ePrint Archive, Report 2021/310}, year = {2021}, url = {https://eprint.iacr.org/2021/310}, } @misc{cryptoeprint:2021:311, author = {Yi Chen and Hongbo Yu}, title = {Improved Neural Aided Statistical Attack for Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2021/311}, year = {2021}, url = {https://eprint.iacr.org/2021/311}, } @misc{cryptoeprint:2021:312, author = {Zhimin Luo and Mengce Zheng and Ping Wang and Minhui Jin and Jiajia Zhang and Honggang Hu and Nenghai Yu}, title = {Towards Strengthening Deep Learning-based Side Channel Attacks with Mixup}, howpublished = {Cryptology ePrint Archive, Report 2021/312}, year = {2021}, url = {https://eprint.iacr.org/2021/312}, } @misc{cryptoeprint:2021:313, author = {Liron David and Avishai Wool}, title = {Rank Estimation with Bounded Error via Exponential Sampling}, howpublished = {Cryptology ePrint Archive, Report 2021/313}, year = {2021}, url = {https://eprint.iacr.org/2021/313}, } @misc{cryptoeprint:2021:314, author = {Navid Nasr Esfahani and Douglas R. Stinson}, title = {On Security Properties of All-or-nothing Transforms}, howpublished = {Cryptology ePrint Archive, Report 2021/314}, year = {2021}, url = {https://eprint.iacr.org/2021/314}, } @misc{cryptoeprint:2021:315, author = {Ilia Iliashenko and Vincent Zucca}, title = {Faster homomorphic comparison operations for BGV and BFV}, howpublished = {Cryptology ePrint Archive, Report 2021/315}, year = {2021}, url = {https://eprint.iacr.org/2021/315}, } @misc{cryptoeprint:2021:316, author = {James Bartusek and Sanjam Garg and Akshayaram Srinivasan and Yinuo Zhang}, title = {Reusable Two-Round MPC from LPN}, howpublished = {Cryptology ePrint Archive, Report 2021/316}, year = {2021}, url = {https://eprint.iacr.org/2021/316}, } @misc{cryptoeprint:2021:317, author = {Duong Tung Nguyen and Ni Trieu}, title = {MPCCache: Privacy-Preserving Multi-Party Cooperative Cache Sharing at the Edge}, howpublished = {Cryptology ePrint Archive, Report 2021/317}, year = {2021}, url = {https://eprint.iacr.org/2021/317}, } @misc{cryptoeprint:2021:318, author = {Damiano Abram and Ivan Damgård and Peter Scholl and Sven Trieflinger}, title = {Oblivious TLS via Multi-Party Computation}, howpublished = {Cryptology ePrint Archive, Report 2021/318}, year = {2021}, url = {https://eprint.iacr.org/2021/318}, } @misc{cryptoeprint:2021:319, author = {Orhun Kara}, title = {Tradeoff attacks on symmetric ciphers}, howpublished = {Cryptology ePrint Archive, Report 2021/319}, year = {2021}, url = {https://eprint.iacr.org/2021/319}, } @misc{cryptoeprint:2021:320, author = {Nir Drucker and Shay Gueron and Dusan Kostic}, title = {Binding BIKE errors to a key pair}, howpublished = {Cryptology ePrint Archive, Report 2021/320}, year = {2021}, url = {https://eprint.iacr.org/2021/320}, } @misc{cryptoeprint:2021:321, author = {Matthew Green and Gabriel Kaptchuk and Gijs Van Laer}, title = {Abuse Resistant Law Enforcement Access Systems}, howpublished = {Cryptology ePrint Archive, Report 2021/321}, year = {2021}, url = {https://eprint.iacr.org/2021/321}, } @misc{cryptoeprint:2021:322, author = {Chaya Ganesh and Anca Nitulescu and Eduardo Soria-Vazquez}, title = {Rinocchio: SNARKs for Ring Arithmetic}, howpublished = {Cryptology ePrint Archive, Report 2021/322}, year = {2021}, url = {https://eprint.iacr.org/2021/322}, } @misc{cryptoeprint:2021:323, author = {Nguyen Thoi Minh Quan}, title = {0}, howpublished = {Cryptology ePrint Archive, Report 2021/323}, year = {2021}, url = {https://eprint.iacr.org/2021/323}, } @misc{cryptoeprint:2021:324, author = {Kristin E. Lauter}, title = {Private AI: Machine Learning on Encrypted Data}, howpublished = {Cryptology ePrint Archive, Report 2021/324}, year = {2021}, url = {https://eprint.iacr.org/2021/324}, } @misc{cryptoeprint:2021:325, author = {Zachary Newman and Sacha Servan-Schreiber and Srinivas Devadas}, title = {Spectrum: High-Bandwidth Anonymous Broadcast with Malicious Security}, howpublished = {Cryptology ePrint Archive, Report 2021/325}, year = {2021}, url = {https://eprint.iacr.org/2021/325}, } @misc{cryptoeprint:2021:326, author = {François Dupressoir and Konrad Kohbrok and Sabine Oechsner}, title = {Bringing State-Separating Proofs to EasyCrypt - A Security Proof for Cryptobox}, howpublished = {Cryptology ePrint Archive, Report 2021/326}, year = {2021}, url = {https://eprint.iacr.org/2021/326}, } @misc{cryptoeprint:2021:327, author = {Matteo Campanelli and Mathias Hall-Andersen}, title = {Veksel: Simple, Efficient, Anonymous Payments with Large Anonymity Sets from Well-Studied Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2021/327}, year = {2021}, url = {https://eprint.iacr.org/2021/327}, } @misc{cryptoeprint:2021:328, author = {Karim M. Abdellatif}, title = {Mixup Data Augmentation for Deep Learning Side-Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2021/328}, year = {2021}, url = {https://eprint.iacr.org/2021/328}, } @misc{cryptoeprint:2021:329, author = {Min Yang and Changtong Xu and Zhe Xia and Li Wang and Qingshu Meng}, title = {Two Efficient Regulatory Confi dential Transaction Schemes}, howpublished = {Cryptology ePrint Archive, Report 2021/329}, year = {2021}, url = {https://eprint.iacr.org/2021/329}, } @misc{cryptoeprint:2021:330, author = {Pooya Farshim and Louiza Khati and Yannick Seurin and Damien Vergnaud}, title = {The Key-Dependent Message Security of Key-Alternating Feistel Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2021/330}, year = {2021}, url = {https://eprint.iacr.org/2021/330}, } @misc{cryptoeprint:2021:331, author = {Radhakrishna Bhat and N R Sunitha and S S Iyengar}, title = {A Probabilistic Public Key Encryption Switching Protocol for Secure Cloud Storage Applications}, howpublished = {Cryptology ePrint Archive, Report 2021/331}, year = {2021}, url = {https://eprint.iacr.org/2021/331}, } @misc{cryptoeprint:2021:332, author = {Yuri Borissov and Miroslav Markov}, title = {An $O(\log^2 p)$ Approach to Point-Counting on Elliptic Curves From a Prominent Family Over the Prime Field $\mathbb{F}_p$}, howpublished = {Cryptology ePrint Archive, Report 2021/332}, year = {2021}, url = {https://eprint.iacr.org/2021/332}, } @misc{cryptoeprint:2021:333, author = {Jonathan Bootle and Alessandro Chiesa and Katerina Sotiraki}, title = {Sumcheck Arguments and their Applications}, howpublished = {Cryptology ePrint Archive, Report 2021/333}, year = {2021}, url = {https://eprint.iacr.org/2021/333}, } @misc{cryptoeprint:2021:334, author = {Alessandro Chiesa and Fermi Ma and Nicholas Spooner and Mark Zhandry}, title = {Post-Quantum Succinct Arguments}, howpublished = {Cryptology ePrint Archive, Report 2021/334}, year = {2021}, url = {https://eprint.iacr.org/2021/334}, } @misc{cryptoeprint:2021:335, author = {Ohad Amon and Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir}, title = {Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3}, howpublished = {Cryptology ePrint Archive, Report 2021/335}, year = {2021}, url = {https://eprint.iacr.org/2021/335}, } @misc{cryptoeprint:2021:336, author = {Nicolas T. Courtois and Matteo Abbondati and Hamy Ratoanina and Marek Grajek}, title = {On Closed-Cycle Loops and Applicability of Nonlinear Product Attacks to DES}, howpublished = {Cryptology ePrint Archive, Report 2021/336}, year = {2021}, url = {https://eprint.iacr.org/2021/336}, } @misc{cryptoeprint:2021:337, author = {Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso and Yu-Chi Chen and Masahiro Mambo}, title = {Identity-certifying Authority-aided Identity-based Searchable Encryption Framework in Cloud System}, howpublished = {Cryptology ePrint Archive, Report 2021/337}, year = {2021}, url = {https://eprint.iacr.org/2021/337}, } @misc{cryptoeprint:2021:338, author = {Diego F. Aranha and Carsten Baum and Kristian Gjøsteen and Tjerand Silde and Thor Tunge}, title = {Lattice-Based Proof of Shuffle and Applications to Electronic Voting}, howpublished = {Cryptology ePrint Archive, Report 2021/338}, year = {2021}, url = {https://eprint.iacr.org/2021/338}, } @misc{cryptoeprint:2021:339, author = {Jens Groth}, title = {Non-interactive distributed key generation and key resharing}, howpublished = {Cryptology ePrint Archive, Report 2021/339}, year = {2021}, url = {https://eprint.iacr.org/2021/339}, } @misc{cryptoeprint:2021:340, author = {Bolton Bailey and Suryanarayana Sankagiri}, title = {Merkle Trees Optimized for Stateless Clients in Bitcoin}, howpublished = {Cryptology ePrint Archive, Report 2021/340}, year = {2021}, url = {https://eprint.iacr.org/2021/340}, } @misc{cryptoeprint:2021:341, author = {Takashi Sato and Yuki Tanaka and Song Bian}, title = {Clonable PUF: On the Design of PUFs That Share Equivalent Responses}, howpublished = {Cryptology ePrint Archive, Report 2021/341}, year = {2021}, url = {https://eprint.iacr.org/2021/341}, } @misc{cryptoeprint:2021:342, author = {Weikeng Chen and Ryan Deng and Raluca Ada Popa}, title = {N-for-1 Auth: N-wise Decentralized Authentication via One Authentication}, howpublished = {Cryptology ePrint Archive, Report 2021/342}, year = {2021}, url = {https://eprint.iacr.org/2021/342}, } @misc{cryptoeprint:2021:343, author = {Rishab Goyal and Jiahui Liu and Brent Waters}, title = {Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups}, howpublished = {Cryptology ePrint Archive, Report 2021/343}, year = {2021}, url = {https://eprint.iacr.org/2021/343}, } @misc{cryptoeprint:2021:344, author = {Dario Catalano and Dario Fiore and Emanuele Giunta}, title = {Efficient and Universally Composable Single Secret Leader Election from Pairings}, howpublished = {Cryptology ePrint Archive, Report 2021/344}, year = {2021}, url = {https://eprint.iacr.org/2021/344}, } @misc{cryptoeprint:2021:345, author = {Dmitry Kogan and Henry Corrigan-Gibbs}, title = {Private Blocklist Lookups with Checklist}, howpublished = {Cryptology ePrint Archive, Report 2021/345}, year = {2021}, url = {https://eprint.iacr.org/2021/345}, } @misc{cryptoeprint:2021:346, author = {Benny Applebaum and Eliran Kachlon and Arpita Patra}, title = {Round-optimal Honest-majority MPC in Minicrypt and with Everlasting Security}, howpublished = {Cryptology ePrint Archive, Report 2021/346}, year = {2021}, url = {https://eprint.iacr.org/2021/346}, } @misc{cryptoeprint:2021:347, author = {Marios Adamoudis and Konstantinos A. Draziotis and Dimitrios Poulakis}, title = {Attacking (EC)DSA With Partially Known Multiples of Nonces}, howpublished = {Cryptology ePrint Archive, Report 2021/347}, year = {2021}, url = {https://eprint.iacr.org/2021/347}, } @misc{cryptoeprint:2021:348, author = {Maxime Bombar and Alain Couvreur}, title = {Decoding supercodes of Gabidulin codes and applications to cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2021/348}, year = {2021}, url = {https://eprint.iacr.org/2021/348}, } @misc{cryptoeprint:2021:349, author = {Nir Bitansky and Michael Kellner and Omri Shmueli}, title = {Post-quantum Resettably-Sound Zero Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2021/349}, year = {2021}, url = {https://eprint.iacr.org/2021/349}, } @misc{cryptoeprint:2021:350, author = {Konstantinos Chalkias and Francois Garillot and Yashvanth Kondi and Valeria Nikolaenko}, title = {Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures}, howpublished = {Cryptology ePrint Archive, Report 2021/350}, year = {2021}, url = {https://eprint.iacr.org/2021/350}, } @misc{cryptoeprint:2021:351, author = {Hyoseung Kim and Olivier Sanders and Michel Abdalla and Jong Hwan Park}, title = {Practical Dynamic Group Signatures Without Knowledge Extractors}, howpublished = {Cryptology ePrint Archive, Report 2021/351}, year = {2021}, url = {https://eprint.iacr.org/2021/351}, } @misc{cryptoeprint:2021:352, author = {Jan Philipp Thoma and Tim Güneysu}, title = {A Configurable Hardware Implementation of XMSS}, howpublished = {Cryptology ePrint Archive, Report 2021/352}, year = {2021}, url = {https://eprint.iacr.org/2021/352}, } @misc{cryptoeprint:2021:353, author = {Alonso González and Alexandros Zacharakis}, title = {Succinct Publicly Verifiable Computation}, howpublished = {Cryptology ePrint Archive, Report 2021/353}, year = {2021}, url = {https://eprint.iacr.org/2021/353}, } @misc{cryptoeprint:2021:354, author = {Peeter Laud}, title = {Efficient permutation protocol for MPC in the head}, howpublished = {Cryptology ePrint Archive, Report 2021/354}, year = {2021}, url = {https://eprint.iacr.org/2021/354}, } @misc{cryptoeprint:2021:355, author = {Georg Land and Pascal Sasdrich and Tim Güneysu}, title = {A Hard Crystal - Implementing Dilithium on Reconfigurable Hardware}, howpublished = {Cryptology ePrint Archive, Report 2021/355}, year = {2021}, url = {https://eprint.iacr.org/2021/355}, } @misc{cryptoeprint:2021:356, author = {Anton Tutoveanu}, title = {Active Implementation of End-to-End Post-Quantum Encryption}, howpublished = {Cryptology ePrint Archive, Report 2021/356}, year = {2021}, url = {https://eprint.iacr.org/2021/356}, } @misc{cryptoeprint:2021:357, author = {Guilherme Perin and Lichao Wu and Stjepan Picek}, title = {AISY - Deep Learning-based Framework for Side-channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2021/357}, year = {2021}, url = {https://eprint.iacr.org/2021/357}, } @misc{cryptoeprint:2021:358, author = {Alexander R. Block and Justin Holmgren and Alon Rosen and Ron D. Rothblum and Pratik Soni}, title = {Time- and Space-Efficient Arguments from Groups of Unknown Order}, howpublished = {Cryptology ePrint Archive, Report 2021/358}, year = {2021}, url = {https://eprint.iacr.org/2021/358}, } @misc{cryptoeprint:2021:359, author = {Zi-Yuan Liu and Yi-Fan Tseng and Raylin Tso}, title = {Cryptanalysis on 'An efficient identity-based proxy signcryption using lattice'}, howpublished = {Cryptology ePrint Archive, Report 2021/359}, year = {2021}, url = {https://eprint.iacr.org/2021/359}, } @misc{cryptoeprint:2021:360, author = {Thuat Do}, title = {An Architecture for Blockchain-based Cloud Banking}, howpublished = {Cryptology ePrint Archive, Report 2021/360}, year = {2021}, url = {https://eprint.iacr.org/2021/360}, } @misc{cryptoeprint:2021:361, author = {Jiaxin Wang Fang-Wei Fu}, title = {Some Generic Constructions of Generalized Plateaued Functions}, howpublished = {Cryptology ePrint Archive, Report 2021/361}, year = {2021}, url = {https://eprint.iacr.org/2021/361}, } @misc{cryptoeprint:2021:362, author = {Zezhou Hou and Jiongjiong Ren and Shaozhen Chen}, title = {Cryptanalysis of Round-Reduced SIMON32 Based on Deep Learning}, howpublished = {Cryptology ePrint Archive, Report 2021/362}, year = {2021}, url = {https://eprint.iacr.org/2021/362}, } @misc{cryptoeprint:2021:363, author = {Wei Cheng and Sylvain Guilley and Claude Carlet and Jean-Luc Danger and Sihem Mesnager}, title = {Information Leakages in Code-based Masking: A Unified Quantification Approach}, howpublished = {Cryptology ePrint Archive, Report 2021/363}, year = {2021}, url = {https://eprint.iacr.org/2021/363}, } @misc{cryptoeprint:2021:364, author = {GAURAV BANSOD}, title = {RAGHAV: A new low power S-P network encryption design for resource constrained environment}, howpublished = {Cryptology ePrint Archive, Report 2021/364}, year = {2021}, url = {https://eprint.iacr.org/2021/364}, } @misc{cryptoeprint:2021:365, author = {Valerio Cini and Sebastian Ramacher and Daniel Slamanig and Christoph Striecks and Erkan Tairi}, title = {Updatable Signatures and Message Authentication Codes}, howpublished = {Cryptology ePrint Archive, Report 2021/365}, year = {2021}, url = {https://eprint.iacr.org/2021/365}, } @misc{cryptoeprint:2021:366, author = {Peter Scholl and Mark Simkin and Luisa Siniscalchi}, title = {Multiparty Computation with Covert Security and Public Verifiability}, howpublished = {Cryptology ePrint Archive, Report 2021/366}, year = {2021}, url = {https://eprint.iacr.org/2021/366}, } @misc{cryptoeprint:2021:367, author = {Arnab Roy and Elena Andreeva and Jan Ferdinand Sauer}, title = {Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions}, howpublished = {Cryptology ePrint Archive, Report 2021/367}, year = {2021}, url = {https://eprint.iacr.org/2021/367}, } @misc{cryptoeprint:2021:368, author = {Aaron Hutchinson and Koray Karabina and Geovandro Pereira}, title = {Memory Optimization Techniques for Computing Discrete Logarithms in Compressed SIKE}, howpublished = {Cryptology ePrint Archive, Report 2021/368}, year = {2021}, url = {https://eprint.iacr.org/2021/368}, } @misc{cryptoeprint:2021:369, author = {Shoichi Hirose}, title = {Another Algebraic Decomposition Method for Masked Implementation}, howpublished = {Cryptology ePrint Archive, Report 2021/369}, year = {2021}, url = {https://eprint.iacr.org/2021/369}, } @misc{cryptoeprint:2021:370, author = {Abhiram Kothapalli and Srinath Setty and Ioanna Tzialla}, title = {Nova: Recursive Zero-Knowledge Arguments from Folding Schemes}, howpublished = {Cryptology ePrint Archive, Report 2021/370}, year = {2021}, url = {https://eprint.iacr.org/2021/370}, } @misc{cryptoeprint:2021:371, author = {Ahmet Sinak}, title = {Construction of minimal linear codes with few weights from weakly regular plateaued functions}, howpublished = {Cryptology ePrint Archive, Report 2021/371}, year = {2021}, url = {https://eprint.iacr.org/2021/371}, } @misc{cryptoeprint:2021:372, author = {Laia Amorós and Annamaria Iezzi and Kristin Lauter and Chloe Martindale and Jana Sotáková}, title = {Explicit connections between supersingular isogeny graphs and Bruhat–Tits trees}, howpublished = {Cryptology ePrint Archive, Report 2021/372}, year = {2021}, url = {https://eprint.iacr.org/2021/372}, } @misc{cryptoeprint:2021:373, author = {Yevgeniy Dodis and Dmitry Khovratovich and Nicky Mouha and Mridul Nandi}, title = {T5: Hashing Five Inputs with Three Compression Calls}, howpublished = {Cryptology ePrint Archive, Report 2021/373}, year = {2021}, url = {https://eprint.iacr.org/2021/373}, } @misc{cryptoeprint:2021:374, author = {Akshaya Mani and Ian Goldberg}, title = {ZXAD: Zero-knowledge Exit Abuse Detection for Tor}, howpublished = {Cryptology ePrint Archive, Report 2021/374}, year = {2021}, url = {https://eprint.iacr.org/2021/374}, } @misc{cryptoeprint:2021:375, author = {Rafael Dowsley and Caleb Horst and Anderson C A Nascimento}, title = {Round and Communication Balanced Protocols for Oblivious Evaluation of Finite State Machines}, howpublished = {Cryptology ePrint Archive, Report 2021/375}, year = {2021}, url = {https://eprint.iacr.org/2021/375}, } @misc{cryptoeprint:2021:376, author = {Nai-Hui Chia and Kai-Min Chung and Qipeng Liu and Takashi Yamakawa}, title = {On the Impossibility of Post-Quantum Black-Box Zero-Knowledge in Constant Rounds}, howpublished = {Cryptology ePrint Archive, Report 2021/376}, year = {2021}, url = {https://eprint.iacr.org/2021/376}, } @misc{cryptoeprint:2021:377, author = {Nguyen Thoi Minh Quan}, title = {Attacks and weaknesses of BLS aggregate signatures}, howpublished = {Cryptology ePrint Archive, Report 2021/377}, year = {2021}, url = {https://eprint.iacr.org/2021/377}, } @misc{cryptoeprint:2021:378, author = {Fabrice Benhamouda and Aayush Jain and Ilan Komargodski and Huijia Lin}, title = {Multiparty Reusable Non-Interactive Secure Computation from LWE}, howpublished = {Cryptology ePrint Archive, Report 2021/378}, year = {2021}, url = {https://eprint.iacr.org/2021/378}, } @misc{cryptoeprint:2021:379, author = {Yunwen Liu and Zhongfeng Niu and Siwei Sun and Chao Li and Lei Hu}, title = {A Note on the Bias of Rotational Differential-Linear Distinguishers}, howpublished = {Cryptology ePrint Archive, Report 2021/379}, year = {2021}, url = {https://eprint.iacr.org/2021/379}, } @misc{cryptoeprint:2021:380, author = {Cholun Kim}, title = {Certificateless Designated Verifier Proxy Signature}, howpublished = {Cryptology ePrint Archive, Report 2021/380}, year = {2021}, url = {https://eprint.iacr.org/2021/380}, } @misc{cryptoeprint:2021:381, author = {Shweta Agrawal and Damien Stehle and Anshu Yadav}, title = {Towards Practical and Round-Optimal Lattice-Based Threshold and Blind Signatures}, howpublished = {Cryptology ePrint Archive, Report 2021/381}, year = {2021}, url = {https://eprint.iacr.org/2021/381}, } @misc{cryptoeprint:2021:382, author = {Jiaxin Pan and Magnus Ringerud}, title = {Signatures with Tight Multi-User Security from Search Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2021/382}, year = {2021}, url = {https://eprint.iacr.org/2021/382}, } @misc{cryptoeprint:2021:383, author = {Daniel R. L. Brown}, title = {GLV+HWCD for 2y^2=x^3+x/GF(8^91+5)}, howpublished = {Cryptology ePrint Archive, Report 2021/383}, year = {2021}, url = {https://eprint.iacr.org/2021/383}, } @misc{cryptoeprint:2021:384, author = {Alex Biryukov and Gleb Naumenko and Sergei Tikhomirov}, title = {Analysis and Probing of Parallel Channels in the Lightning Network}, howpublished = {Cryptology ePrint Archive, Report 2021/384}, year = {2021}, url = {https://eprint.iacr.org/2021/384}, } @misc{cryptoeprint:2021:385, author = {Yasufumi Hashimoto}, title = {Solving the problem of Blockwise Isomorphism of Polynomials with Circulant matrices}, howpublished = {Cryptology ePrint Archive, Report 2021/385}, year = {2021}, url = {https://eprint.iacr.org/2021/385}, } @misc{cryptoeprint:2021:386, author = {Hossein Fereidooni and Samuel Marchal and Markus Miettinen and Azalia Mirhoseini and Helen Möllering and Thien Duc Nguyen and Phillip Rieger and Ahmad Reza Sadeghi and Thomas Schneider and Hossein Yalame and Shaza Zeitouni}, title = {SAFELearn: Secure Aggregation for private FEderated Learning}, howpublished = {Cryptology ePrint Archive, Report 2021/386}, year = {2021}, url = {https://eprint.iacr.org/2021/386}, } @misc{cryptoeprint:2021:387, author = {Christian Majenz and Chanelle Matadah Manfouo and Maris Ozols}, title = {Quantum-access security of the Winternitz one-time signature scheme}, howpublished = {Cryptology ePrint Archive, Report 2021/387}, year = {2021}, url = {https://eprint.iacr.org/2021/387}, } @misc{cryptoeprint:2021:388, author = {Marshall Ball and Elette Boyle and Ran Cohen and Lisa Kohl and Tal Malkin and Pierre Meyer and Tal Moran}, title = {Topology-Hiding Communication from Minimal Assumptions.}, howpublished = {Cryptology ePrint Archive, Report 2021/388}, year = {2021}, url = {https://eprint.iacr.org/2021/388}, } @misc{cryptoeprint:2021:389, author = {Durba Chatterjee and Harishma Boyapally and Sikhar Patranabis and Urbi Chatterjee and Debdeep Mukhopadhyay and Aritra Hazra}, title = {Physically Related Functions: A New Paradigm for Light-weight Key-Exchange}, howpublished = {Cryptology ePrint Archive, Report 2021/389}, year = {2021}, url = {https://eprint.iacr.org/2021/389}, } @misc{cryptoeprint:2021:390, author = {Subhadeep Banik and Takanori Isobe and Fukang Liu and Kazuhiko Minematsu and Kosei Sakamoto}, title = {Orthros: A Low-Latency PRF}, howpublished = {Cryptology ePrint Archive, Report 2021/390}, year = {2021}, url = {https://eprint.iacr.org/2021/390}, } @misc{cryptoeprint:2021:391, author = {Thomas Haines and Peter Roenne}, title = {New Standards for E-Voting Systems: Reflections on Source Code Examinations}, howpublished = {Cryptology ePrint Archive, Report 2021/391}, year = {2021}, url = {https://eprint.iacr.org/2021/391}, } @misc{cryptoeprint:2021:392, author = {Ao Liu and Yun Lu and Lirong Xia and Vassilis Zikas}, title = {How Private Are Commonly-Used Voting Rules?}, howpublished = {Cryptology ePrint Archive, Report 2021/392}, year = {2021}, url = {https://eprint.iacr.org/2021/392}, } @misc{cryptoeprint:2021:393, author = {Onur Gunlu}, title = {Key Agreement with Correlated Noise and Multiple Entities or Enrollments}, howpublished = {Cryptology ePrint Archive, Report 2021/393}, year = {2021}, url = {https://eprint.iacr.org/2021/393}, } @misc{cryptoeprint:2021:394, author = {Ryo Nishimaki and Takashi Yamakawa}, title = {Quantum Encryption with Certified Deletion: Public Key and Attribute-Based}, howpublished = {Cryptology ePrint Archive, Report 2021/394}, year = {2021}, url = {https://eprint.iacr.org/2021/394}, } @misc{cryptoeprint:2021:395, author = {Harishma Boyapally and Urbi Chatterjee and Debdeep Mukhopadhyay}, title = {On the Validity of Spoofing Attack Against Safe is the New Smart}, howpublished = {Cryptology ePrint Archive, Report 2021/395}, year = {2021}, url = {https://eprint.iacr.org/2021/395}, } @misc{cryptoeprint:2021:396, author = {Alessandro Barenghi and Jean-Francois Biasse and Edoardo Persichetti and Paolo Santini}, title = {LESS-FM: Fine-tuning Signatures from a Code-based Cryptographic Group Action}, howpublished = {Cryptology ePrint Archive, Report 2021/396}, year = {2021}, url = {https://eprint.iacr.org/2021/396}, } @misc{cryptoeprint:2021:397, author = {Carmine Abate and Philipp G. Haselwarter and Exequiel Rivas and Antoine Van Muylder and Théo Winterhalter and Catalin Hritcu and Kenji Maillard and Bas Spitters}, title = {SSProve: A Foundational Framework for Modular Cryptographic Proofs in Coq}, howpublished = {Cryptology ePrint Archive, Report 2021/397}, year = {2021}, url = {https://eprint.iacr.org/2021/397}, } @misc{cryptoeprint:2021:398, author = {Thales Bandiera Paiva and Routo Terada}, title = {Cryptanalysis of the Binary Permuted Kernel Problem}, howpublished = {Cryptology ePrint Archive, Report 2021/398}, year = {2021}, url = {https://eprint.iacr.org/2021/398}, } @misc{cryptoeprint:2021:399, author = {Alberto Garoffolo and Dmytro Kaidalov and Roman Oliynykov}, title = {Latus Incentive Scheme: Enabling Decentralization in Blockchains based on Recursive SNARKs}, howpublished = {Cryptology ePrint Archive, Report 2021/399}, year = {2021}, url = {https://eprint.iacr.org/2021/399}, } @misc{cryptoeprint:2021:400, author = {Yupu Hu and Xingting Dong and Baocang Wang}, title = {Size of IK00 Branching Program}, howpublished = {Cryptology ePrint Archive, Report 2021/400}, year = {2021}, url = {https://eprint.iacr.org/2021/400}, } @misc{cryptoeprint:2021:401, author = {Hayato Kimura and Keita Emura and Takanori Isobe and Ryoma Ito and Kazuto Ogawa and Toshihiro Ohigashi}, title = {Output Prediction Attacks on SPN Block Ciphers using Deep Learning}, howpublished = {Cryptology ePrint Archive, Report 2021/401}, year = {2021}, url = {https://eprint.iacr.org/2021/401}, } @misc{cryptoeprint:2021:402, author = {Christoph Dobraunig and Bart Mennink}, title = {Leakage Resilient Value Comparison With Application to Message Authentication}, howpublished = {Cryptology ePrint Archive, Report 2021/402}, year = {2021}, url = {https://eprint.iacr.org/2021/402}, } @misc{cryptoeprint:2021:403, author = {Subhadeep Banik and Andrea Caforio and Takanori Isobe and Fukang Liu and Willi Meier and Kosei Sakamoto and Santanu Sarkar}, title = {Atom: A Stream Cipher with Double Key Filter}, howpublished = {Cryptology ePrint Archive, Report 2021/403}, year = {2021}, url = {https://eprint.iacr.org/2021/403}, } @misc{cryptoeprint:2021:404, author = {Mihir Bellare and Wei Dai}, title = {Chain Reductions for Multi-Signatures}, howpublished = {Cryptology ePrint Archive, Report 2021/404}, year = {2021}, url = {https://eprint.iacr.org/2021/404}, } @misc{cryptoeprint:2021:405, author = {Claude Carlet}, title = {Revisiting some results on APN and algebraic immune functions}, howpublished = {Cryptology ePrint Archive, Report 2021/405}, year = {2021}, url = {https://eprint.iacr.org/2021/405}, } @misc{cryptoeprint:2021:406, author = {Jiaxin Guan and Mark Zhandry}, title = {Disappearing Cryptography in the Bounded Storage Model}, howpublished = {Cryptology ePrint Archive, Report 2021/406}, year = {2021}, url = {https://eprint.iacr.org/2021/406}, } @misc{cryptoeprint:2021:407, author = {André Schrottenloher}, title = {Improved Quantum Algorithms for the k-XOR Problem}, howpublished = {Cryptology ePrint Archive, Report 2021/407}, year = {2021}, url = {https://eprint.iacr.org/2021/407}, } @misc{cryptoeprint:2021:408, author = {Christian Majenz and Christian Schaffner and Mehrdad Tahmasbi}, title = {Limitations on Uncloneable Encryption and Simultaneous One-Way-to-Hiding}, howpublished = {Cryptology ePrint Archive, Report 2021/408}, year = {2021}, url = {https://eprint.iacr.org/2021/408}, } @misc{cryptoeprint:2021:409, author = {Markulf Kohlweiss and Varun Madathil and Kartik Nayak and Alessandra Scafuro}, title = {On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols}, howpublished = {Cryptology ePrint Archive, Report 2021/409}, year = {2021}, url = {https://eprint.iacr.org/2021/409}, } @misc{cryptoeprint:2021:410, author = {Shlomi Dolev and Stav Doolman}, title = {Blindly Follow: SITS CRT and FHE for DCLSMPC of DUFSM}, howpublished = {Cryptology ePrint Archive, Report 2021/410}, year = {2021}, url = {https://eprint.iacr.org/2021/410}, } @misc{cryptoeprint:2021:411, author = {Onur Gunlu and Peter Trifonov and Muah Kim and Rafael F. Schaefer and Vladimir Sidorenko}, title = {Privacy, Secrecy, and Storage with Nested Randomized Polar Subcode Constructions}, howpublished = {Cryptology ePrint Archive, Report 2021/411}, year = {2021}, url = {https://eprint.iacr.org/2021/411}, } @misc{cryptoeprint:2021:412, author = {Prabhanjan Ananth and Fatih Kaleoglu}, title = {Uncloneable Encryption, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2021/412}, year = {2021}, url = {https://eprint.iacr.org/2021/412}, } @misc{cryptoeprint:2021:413, author = {Yi Liu and Qi Wang and Siu-Ming Yiu}, title = {Blind Polynomial Evaluation and Data Trading}, howpublished = {Cryptology ePrint Archive, Report 2021/413}, year = {2021}, url = {https://eprint.iacr.org/2021/413}, } @misc{cryptoeprint:2021:414, author = {Sook Yan Hue and Jason Chia and Ji Jian Chin}, title = {Cryptanalysis of an Anonymous Identity-based Identification Scheme in Ad-Hoc Group without Pairings}, howpublished = {Cryptology ePrint Archive, Report 2021/414}, year = {2021}, url = {https://eprint.iacr.org/2021/414}, } @misc{cryptoeprint:2021:415, author = {Marc Schoolderman and Jonathan Moerman and Sjaak Smetsers and Marko van Eekelen}, title = {Efficient Verification of Optimized Code: Correct High-speed X25519}, howpublished = {Cryptology ePrint Archive, Report 2021/415}, year = {2021}, url = {https://eprint.iacr.org/2021/415}, } @misc{cryptoeprint:2021:416, author = {Florian Breuer and Vipul Goyal and Giulio Malavolta}, title = {Cryptocurrencies with Security Policies and Two-Factor Authentication}, howpublished = {Cryptology ePrint Archive, Report 2021/416}, year = {2021}, url = {https://eprint.iacr.org/2021/416}, } @misc{cryptoeprint:2021:417, author = {Shlomi Dolev and Matan Liber}, title = {History Binding Signature}, howpublished = {Cryptology ePrint Archive, Report 2021/417}, year = {2021}, url = {https://eprint.iacr.org/2021/417}, } @misc{cryptoeprint:2021:418, author = {Hao Chen}, title = {Ring-LWE over two-to-power cyclotomics is not hard}, howpublished = {Cryptology ePrint Archive, Report 2021/418}, year = {2021}, url = {https://eprint.iacr.org/2021/418}, } @misc{cryptoeprint:2021:419, author = {Javad Doliskani}, title = {On The Dihedral Coset Problem}, howpublished = {Cryptology ePrint Archive, Report 2021/419}, year = {2021}, url = {https://eprint.iacr.org/2021/419}, } @misc{cryptoeprint:2021:420, author = {Fabian Boemer and Sejun Kim and Gelila Seifu and Fillipe D.M. de Souza and Vinodh Gopal}, title = {Intel HEXL: Accelerating Homomorphic Encryption with Intel AVX512-IFMA52}, howpublished = {Cryptology ePrint Archive, Report 2021/420}, year = {2021}, url = {https://eprint.iacr.org/2021/420}, } @misc{cryptoeprint:2021:421, author = {James Bartusek and Giulio Malavolta}, title = {Candidate Obfuscation of Null Quantum Circuits and Witness Encryption for QMA}, howpublished = {Cryptology ePrint Archive, Report 2021/421}, year = {2021}, url = {https://eprint.iacr.org/2021/421}, } @misc{cryptoeprint:2021:422, author = {Aarushi Goel and Matthew Green and Mathias Hall-Andersen and Gabriel Kaptchuk}, title = {Stacking Sigmas: A Framework to Compose $\Sigma$-Protocols for Disjunctions}, howpublished = {Cryptology ePrint Archive, Report 2021/422}, year = {2021}, url = {https://eprint.iacr.org/2021/422}, } @misc{cryptoeprint:2021:423, author = {Vasyl Ustimenko}, title = {On effective computations in special subsemigroups of polynomial transformations and protocol based multivariate cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2021/423}, year = {2021}, url = {https://eprint.iacr.org/2021/423}, } @misc{cryptoeprint:2021:424, author = {Takanori Isobe and Ryoma Ito and Kazuhiko Minematsu}, title = {Security Analysis of SFrame}, howpublished = {Cryptology ePrint Archive, Report 2021/424}, year = {2021}, url = {https://eprint.iacr.org/2021/424}, } @misc{cryptoeprint:2021:425, author = {Yuqing Zhao and Wenqi Yu and Chun Guo}, title = {Related-Key Analysis of Generalized Feistel Networks with Expanding Round Functions}, howpublished = {Cryptology ePrint Archive, Report 2021/425}, year = {2021}, url = {https://eprint.iacr.org/2021/425}, } @misc{cryptoeprint:2021:426, author = {Olivier Blazy and Xavier Bultel and Pascal Lafourcade and Octavio Perez Kempner}, title = {Generic Plaintext Equality and Inequality Proofs (Extended Version)}, howpublished = {Cryptology ePrint Archive, Report 2021/426}, year = {2021}, url = {https://eprint.iacr.org/2021/426}, } @misc{cryptoeprint:2021:427, author = {Xiaoyang Dong and Jialiang Hua and Siwei Sun and Zheng Li and Xiaoyun Wang and Lei Hu}, title = {Meet-in-the-Middle Attacks Revisited: Focusing on Key-recovery and Collision Attacks}, howpublished = {Cryptology ePrint Archive, Report 2021/427}, year = {2021}, url = {https://eprint.iacr.org/2021/427}, } @misc{cryptoeprint:2021:428, author = {Peter Schwabe and Benoît Viguier and Timmy Weerwag and Freek Wiedijk}, title = {A Coq proof of the correctness of X25519 in TweetNaCl}, howpublished = {Cryptology ePrint Archive, Report 2021/428}, year = {2021}, url = {https://eprint.iacr.org/2021/428}, } @misc{cryptoeprint:2021:429, author = {Daniel Smith-Tone}, title = {New Practical Multivariate Signatures from a Nonlinear Modifier}, howpublished = {Cryptology ePrint Archive, Report 2021/429}, year = {2021}, url = {https://eprint.iacr.org/2021/429}, } @misc{cryptoeprint:2021:430, author = {Simon Pohmann and Marc Stevens and Jens Zumbrägel}, title = {Lattice Enumeration on GPUs for fplll}, howpublished = {Cryptology ePrint Archive, Report 2021/430}, year = {2021}, url = {https://eprint.iacr.org/2021/430}, } @misc{cryptoeprint:2021:431, author = {Prabhanjan Ananth and Abhishek Jain and Zhengzhong Jin and Giulio Malavolta}, title = {Unbounded Multi-Party Computation from Learning with Errors}, howpublished = {Cryptology ePrint Archive, Report 2021/431}, year = {2021}, url = {https://eprint.iacr.org/2021/431}, } @misc{cryptoeprint:2021:432, author = {Kevin Deforth and Marc Desgroseilliers and Nicolas Gama and Mariya Georgieva and Dimitar Jetchev and Marius Vuille}, title = {XORBoost: Tree Boosting in the Multiparty Computation Setting}, howpublished = {Cryptology ePrint Archive, Report 2021/432}, year = {2021}, url = {https://eprint.iacr.org/2021/432}, } @misc{cryptoeprint:2021:433, author = {Aaram Yun}, title = {Formations for the Quantum Random Oracle}, howpublished = {Cryptology ePrint Archive, Report 2021/433}, year = {2021}, url = {https://eprint.iacr.org/2021/433}, } @misc{cryptoeprint:2021:434, author = {Sonia Belaïd and Matthieu Rivain and Abdul Rahman Taleb}, title = {On the Power of Expansion: More Efficient Constructions in the Random Probing Model}, howpublished = {Cryptology ePrint Archive, Report 2021/434}, year = {2021}, url = {https://eprint.iacr.org/2021/434}, } @misc{cryptoeprint:2021:435, author = {Elaine Shi and Ke Wu}, title = {Non-Interactive Anonymous Router}, howpublished = {Cryptology ePrint Archive, Report 2021/435}, year = {2021}, url = {https://eprint.iacr.org/2021/435}, } @misc{cryptoeprint:2021:436, author = {Duc-Phong Le and Sze Ling Yeo and Khoongming Khoo}, title = {Algebraic Differential Fault Analysis on SIMON block cipher}, howpublished = {Cryptology ePrint Archive, Report 2021/436}, year = {2021}, url = {https://eprint.iacr.org/2021/436}, } @misc{cryptoeprint:2021:437, author = {Nikolaj Sidorenco and Sabine Oechsner and Bas Spitters}, title = {Formal security analysis of MPC-in-the-head zero-knowledge protocols}, howpublished = {Cryptology ePrint Archive, Report 2021/437}, year = {2021}, url = {https://eprint.iacr.org/2021/437}, } @misc{cryptoeprint:2021:438, author = {Toomas Krips and Helger Lipmaa}, title = {More Efficient Shuffle Argument from Unique Factorization}, howpublished = {Cryptology ePrint Archive, Report 2021/438}, year = {2021}, url = {https://eprint.iacr.org/2021/438}, } @misc{cryptoeprint:2021:439, author = {Donghoon Chang and Meltem Sonmez Turan}, title = {Recovering the Key from the Internal State of Grain-128AEAD}, howpublished = {Cryptology ePrint Archive, Report 2021/439}, year = {2021}, url = {https://eprint.iacr.org/2021/439}, } @misc{cryptoeprint:2021:440, author = {Wenshuo Guo and Fangwei Fu}, title = {Two modifications for Loidreau's code-based cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2021/440}, year = {2021}, url = {https://eprint.iacr.org/2021/440}, } @misc{cryptoeprint:2021:441, author = {Yukun Wang and Mingqiang Wang}, title = {Watermarking PRFs from Lattices: Public Extract and Collusion Resistant}, howpublished = {Cryptology ePrint Archive, Report 2021/441}, year = {2021}, url = {https://eprint.iacr.org/2021/441}, } @misc{cryptoeprint:2021:442, author = {Raluca Posteuca and Tomer Ashur}, title = {How to Backdoor a Cipher}, howpublished = {Cryptology ePrint Archive, Report 2021/442}, year = {2021}, url = {https://eprint.iacr.org/2021/442}, } @misc{cryptoeprint:2021:443, author = {Cholun Kim}, title = {Constructing a pairing-free certificateless proxy signature scheme from ECDSA}, howpublished = {Cryptology ePrint Archive, Report 2021/443}, year = {2021}, url = {https://eprint.iacr.org/2021/443}, } @misc{cryptoeprint:2021:444, author = {Daniel Nager and "Danny" Niu Jianfang}, title = {Xifrat - Compact Public-Key Cryptosystems based on Quasigroups}, howpublished = {Cryptology ePrint Archive, Report 2021/444}, year = {2021}, url = {https://eprint.iacr.org/2021/444}, } @misc{cryptoeprint:2021:445, author = {Anirudh C and Ashish Choudhury and Arpita Patra}, title = {A Survey on Perfectly-Secure Verifiable Secret-Sharing}, howpublished = {Cryptology ePrint Archive, Report 2021/445}, year = {2021}, url = {https://eprint.iacr.org/2021/445}, } @misc{cryptoeprint:2021:446, author = {Chitchanok Chuengsatiansup and Damien Stehle}, title = {Towards practical GGM-based PRF from (Module-)Learning-with-Rounding}, howpublished = {Cryptology ePrint Archive, Report 2021/446}, year = {2021}, url = {https://eprint.iacr.org/2021/446}, } @misc{cryptoeprint:2021:447, author = {Daniel Noble}, title = {An Intimate Analysis of Cuckoo Hashing with a Stash}, howpublished = {Cryptology ePrint Archive, Report 2021/447}, year = {2021}, url = {https://eprint.iacr.org/2021/447}, } @misc{cryptoeprint:2021:448, author = {Ashrujit Ghoshal and Stefano Tessaro}, title = {On the Memory-Tightness of Hashed ElGamal}, howpublished = {Cryptology ePrint Archive, Report 2021/448}, year = {2021}, url = {https://eprint.iacr.org/2021/448}, } @misc{cryptoeprint:2021:449, author = {Gang Wang and Mark Nixon and Mike Boudreaux}, title = {Towards Cloud-assisted Industrial IoT Platform for Large-scale Continuous Condition Monitoring}, howpublished = {Cryptology ePrint Archive, Report 2021/449}, year = {2021}, url = {https://eprint.iacr.org/2021/449}, } @misc{cryptoeprint:2021:450, author = {Gang Wang and Mark Nixon}, title = {RandChain: Practical Scalable Decentralized Randomness Attested by Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2021/450}, year = {2021}, url = {https://eprint.iacr.org/2021/450}, } @misc{cryptoeprint:2021:451, author = {Gang Wang}, title = {RepShard: Reputation-based Sharding Scheme Achieves Linearly Scaling Efficiency and Security Simultaneously}, howpublished = {Cryptology ePrint Archive, Report 2021/451}, year = {2021}, url = {https://eprint.iacr.org/2021/451}, } @misc{cryptoeprint:2021:452, author = {Zezhou Hou and Jiongjiong Ren and Shaozhen Chen}, title = {SAT-based Method to Improve Neural Distinguisher and Applications to SIMON}, howpublished = {Cryptology ePrint Archive, Report 2021/452}, year = {2021}, url = {https://eprint.iacr.org/2021/452}, } @misc{cryptoeprint:2021:453, author = {Yuncong Hu and Kian Hooshmand and Harika Kalidhindi and Seung Jin Yang and Raluca Ada Popa}, title = {Merkle^2: A Low-Latency Transparency Log System }, howpublished = {Cryptology ePrint Archive, Report 2021/453}, year = {2021}, url = {https://eprint.iacr.org/2021/453}, } @misc{cryptoeprint:2021:454, author = {Veronika Kuchta and Amin Sakzad and Damien Stehle and Ron Steinfeld and Shi-Feng Sun}, title = {Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CCA Security}, howpublished = {Cryptology ePrint Archive, Report 2021/454}, year = {2021}, url = {https://eprint.iacr.org/2021/454}, } @misc{cryptoeprint:2021:455, author = {Chao Sun and Thomas Espitau and Mehdi Tibouchi and Masayuki Abe}, title = {Guessing Bits: Improved Lattice Attacks on (EC)DSA }, howpublished = {Cryptology ePrint Archive, Report 2021/455}, year = {2021}, url = {https://eprint.iacr.org/2021/455}, } @misc{cryptoeprint:2021:456, author = {Animesh Chhotaray and Thomas Shrimpton}, title = {Hardening Circuit-Design IP Against Reverse-Engineering Attacks}, howpublished = {Cryptology ePrint Archive, Report 2021/456}, year = {2021}, url = {https://eprint.iacr.org/2021/456}, } @misc{cryptoeprint:2021:457, author = {Masayuki Abe and Miguel Ambrona and Andrej Bogdanov and Miyako Ohkubo and Alon Rosen}, title = {Non-Interactive Composition of Sigma-Protocols via Share-then-Hash}, howpublished = {Cryptology ePrint Archive, Report 2021/457}, year = {2021}, url = {https://eprint.iacr.org/2021/457}, } @misc{cryptoeprint:2021:458, author = {Gideon Samid}, title = {FAMILY KEY CRYPTOGRAPHY: Interchangeable Symmetric Keys; a Different Cryptographic Paradigm }, howpublished = {Cryptology ePrint Archive, Report 2021/458}, year = {2021}, url = {https://eprint.iacr.org/2021/458}, } @misc{cryptoeprint:2021:459, author = {Deevashwer Rathee and Mayank Rathee and Rahul Kranti Kiran Goli and Divya Gupta and Rahul Sharma and Nishanth Chandran and Aseem Rastogi}, title = {SIRNN: A Math Library for Secure RNN Inference}, howpublished = {Cryptology ePrint Archive, Report 2021/459}, year = {2021}, url = {https://eprint.iacr.org/2021/459}, } @misc{cryptoeprint:2021:460, author = {Oleksiy Lisovets and David Knichel and Thorben Moos and Amir Moradi}, title = {Let’s Take it Offline: Boosting Brute-Force Attacks on iPhone’s User Authentication through SCA}, howpublished = {Cryptology ePrint Archive, Report 2021/460}, year = {2021}, url = {https://eprint.iacr.org/2021/460}, } @misc{cryptoeprint:2021:461, author = {Aein Rezaei Shahmirzadi and Amir Moradi}, title = {Second-Order SCA Security with almost no Fresh Randomness}, howpublished = {Cryptology ePrint Archive, Report 2021/461}, year = {2021}, url = {https://eprint.iacr.org/2021/461}, } @misc{cryptoeprint:2021:462, author = {James Howe and Thomas Prest and Daniel Apon}, title = {SoK: How (not) to Design and Implement Post-Quantum Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2021/462}, year = {2021}, url = {https://eprint.iacr.org/2021/462}, } @misc{cryptoeprint:2021:463, author = {Andreas Wiemers and Johannes Mittmann}, title = {Improving Recent Side-Channel Attacks Against the DES Key Schedule}, howpublished = {Cryptology ePrint Archive, Report 2021/463}, year = {2021}, url = {https://eprint.iacr.org/2021/463}, } @misc{cryptoeprint:2021:464, author = {Gregor Haas and Seetal Potluri and Aydin Aysu}, title = {iTimed: Cache Attacks on the Apple A10 Fusion SoC}, howpublished = {Cryptology ePrint Archive, Report 2021/464}, year = {2021}, url = {https://eprint.iacr.org/2021/464}, } @misc{cryptoeprint:2021:465, author = {Daniel Brown and Neal Koblitz and Jason LeGrow}, title = {Cryptanalysis of `MAKE'}, howpublished = {Cryptology ePrint Archive, Report 2021/465}, year = {2021}, url = {https://eprint.iacr.org/2021/465}, } @misc{cryptoeprint:2021:466, author = {Michele Fabbrini}, title = {A New Key Agreement Scheme Based On A Well-Known Property Of Powers}, howpublished = {Cryptology ePrint Archive, Report 2021/466}, year = {2021}, url = {https://eprint.iacr.org/2021/466}, } @misc{cryptoeprint:2021:467, author = {Chris Brzuska and Antoine Delignat-Lavaud and Christoph Egger and Cédric Fournet and Konrad Kohbrok and Markulf Kohlweiss}, title = {Key-schedule Security for the TLS 1.3 Standard}, howpublished = {Cryptology ePrint Archive, Report 2021/467}, year = {2021}, url = {https://eprint.iacr.org/2021/467}, } @misc{cryptoeprint:2021:468, author = {Coşku Acay and Rolph Recto and Joshua Gancher and Andrew C. Myers and Elaine Shi}, title = {Viaduct: An Extensible, Optimizing Compiler for Secure Distributed Programs (Technical Report)}, howpublished = {Cryptology ePrint Archive, Report 2021/468}, year = {2021}, url = {https://eprint.iacr.org/2021/468}, } @misc{cryptoeprint:2021:469, author = {Danilo Gligoroski}, title = {Entropoid Based Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2021/469}, year = {2021}, url = {https://eprint.iacr.org/2021/469}, } @misc{cryptoeprint:2021:470, author = {Benny Applebaum and Oded Nir}, title = {Upslices, Downslices, and Secret-Sharing with Complexity of $1.5^n$}, howpublished = {Cryptology ePrint Archive, Report 2021/470}, year = {2021}, url = {https://eprint.iacr.org/2021/470}, } @misc{cryptoeprint:2021:471, author = {Cesar Pereida García and Sampo Sovio}, title = {Size, Speed, and Security: An Ed25519 Case Study}, howpublished = {Cryptology ePrint Archive, Report 2021/471}, year = {2021}, url = {https://eprint.iacr.org/2021/471}, } @misc{cryptoeprint:2021:472, author = {Ryan Karl and Jonathan Takeshita and Alamin Mohammed and Aaron Striegel and Taeho Jung}, title = {CryptoGram: Fast Private Calculations of Histograms over Multiple Users’ Inputs}, howpublished = {Cryptology ePrint Archive, Report 2021/472}, year = {2021}, url = {https://eprint.iacr.org/2021/472}, } @misc{cryptoeprint:2021:473, author = {Ryan Karl and Jonathan Takeshita and Alamin Mohammed and Aaron Striegel and and Taeho Jung}, title = {Cryptonomial: A Framework for Private Time-Series Polynomial Calculations}, howpublished = {Cryptology ePrint Archive, Report 2021/473}, year = {2021}, url = {https://eprint.iacr.org/2021/473}, } @misc{cryptoeprint:2021:474, author = {Fukang Liu and Takanori Isobe and Willi Meier}, title = {Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations}, howpublished = {Cryptology ePrint Archive, Report 2021/474}, year = {2021}, url = {https://eprint.iacr.org/2021/474}, } @misc{cryptoeprint:2021:475, author = {Shahla Atapoor and Nigel P. Smart and Younes Talibi Alaoui}, title = {Private Liquidity Matching using MPC}, howpublished = {Cryptology ePrint Archive, Report 2021/475}, year = {2021}, url = {https://eprint.iacr.org/2021/475}, } @misc{cryptoeprint:2021:476, author = {Aaqib Bashir Dar and Mashhood Jeelani Lone and Nuzhat Hussain}, title = {Revisiting Lightweight Block Ciphers: Review, Taxonomy and Future directions}, howpublished = {Cryptology ePrint Archive, Report 2021/476}, year = {2021}, url = {https://eprint.iacr.org/2021/476}, } @misc{cryptoeprint:2021:477, author = {Agathe Cheriere and Lina Mortajine and Tania Richmond and Nadia El Mrabet}, title = {Side-Channel Attack on ROLLO Post-Quantum Cryptographic Scheme}, howpublished = {Cryptology ePrint Archive, Report 2021/477}, year = {2021}, url = {https://eprint.iacr.org/2021/477}, } @misc{cryptoeprint:2021:478, author = {Yaron Gvili and Julie Ha and Sarah Scheffler and Mayank Varia and Ziling Yang and Xinyuan Zhang}, title = {TurboIKOS: Improved Non-interactive Zero Knowledge and Post-Quantum Signatures}, howpublished = {Cryptology ePrint Archive, Report 2021/478}, year = {2021}, url = {https://eprint.iacr.org/2021/478}, } @misc{cryptoeprint:2021:479, author = {Tim Fritzmann and Michiel Van Beirendonck and Debapriya Basu Roy and Patrick Karl and Thomas Schamberger and Ingrid Verbauwhede and Georg Sigl}, title = {Masked Accelerators and Instruction Set Extensions for Post-Quantum Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2021/479}, year = {2021}, url = {https://eprint.iacr.org/2021/479}, } @misc{cryptoeprint:2021:480, author = {Jakub Klemsa}, title = {Fast and Error-Free Negacyclic Integer Convolution using Extended Fourier Transform}, howpublished = {Cryptology ePrint Archive, Report 2021/480}, year = {2021}, url = {https://eprint.iacr.org/2021/480}, } @misc{cryptoeprint:2021:481, author = {Alexander Heinrich and Matthias Hollick and Thomas Schneider and Milan Stute and Christian Weinert}, title = {PrivateDrop: Practical Privacy-Preserving Authentication for Apple AirDrop}, howpublished = {Cryptology ePrint Archive, Report 2021/481}, year = {2021}, url = {https://eprint.iacr.org/2021/481}, } @misc{cryptoeprint:2021:482, author = {Anita Aghaie and Amir Moradi}, title = {Inconsistency of Simulation and Practice in Delay-based Strong PUFs}, howpublished = {Cryptology ePrint Archive, Report 2021/482}, year = {2021}, url = {https://eprint.iacr.org/2021/482}, } @misc{cryptoeprint:2021:483, author = {Joppe W. Bos and Marc Gourjon and Joost Renes and Tobias Schneider and Christine van Vredendaal}, title = {Masking Kyber: First- and Higher-Order Implementations}, howpublished = {Cryptology ePrint Archive, Report 2021/483}, year = {2021}, url = {https://eprint.iacr.org/2021/483}, } @misc{cryptoeprint:2021:484, author = {Alireza Kavousi and Javad Mohajeri and Mahmoud Salmasizadeh}, title = {Efficient Scalable Multi-Party Private Set Intersection Using Oblivious PRF}, howpublished = {Cryptology ePrint Archive, Report 2021/484}, year = {2021}, url = {https://eprint.iacr.org/2021/484}, } @misc{cryptoeprint:2021:485, author = {Ferhat Yaman and Ahmet Can Mert and Erdinç Öztürk and Erkay Savaş}, title = {A Hardware Accelerator for Polynomial Multiplication Operation of CRYSTALS-KYBER PQC Scheme}, howpublished = {Cryptology ePrint Archive, Report 2021/485}, year = {2021}, url = {https://eprint.iacr.org/2021/485}, } @misc{cryptoeprint:2021:486, author = {Takanori Isobe and Ryoma Ito}, title = {Security Analysis of End-to-End Encryption for Zoom Meetings}, howpublished = {Cryptology ePrint Archive, Report 2021/486}, year = {2021}, url = {https://eprint.iacr.org/2021/486}, } @misc{cryptoeprint:2021:487, author = {"Danny" Niu Jianfang}, title = {Xifrat Cryptanalysis - Compute the Mixing Function Without the Key}, howpublished = {Cryptology ePrint Archive, Report 2021/487}, year = {2021}, url = {https://eprint.iacr.org/2021/487}, } @misc{cryptoeprint:2021:488, author = {Javier Herranz and Ramiro Martínez and Manuel Sánchez}, title = {Shorter Lattice-based Zero-Knowledge Proofs for the Correctness of a Shuffle}, howpublished = {Cryptology ePrint Archive, Report 2021/488}, year = {2021}, url = {https://eprint.iacr.org/2021/488}, } @misc{cryptoeprint:2021:489, author = {Peng Xu and Willy Susilo and Wei Wang and Tianyang Chen and Qianhong Wu and Hai Jin}, title = {ROSE: Robust Searchable Encryption with Forward and Backward Security and Practical Performance}, howpublished = {Cryptology ePrint Archive, Report 2021/489}, year = {2021}, url = {https://eprint.iacr.org/2021/489}, } @misc{cryptoeprint:2021:490, author = {Chao Liu and Anyu Wang and Zhongxiang Zheng}, title = {Optimizing Bootstrapping and Evaluating Large FHE Gates in the LWE-based GSW-FHE}, howpublished = {Cryptology ePrint Archive, Report 2021/490}, year = {2021}, url = {https://eprint.iacr.org/2021/490}, } @misc{cryptoeprint:2021:491, author = {Véronique Cortier and Pierrick Gaudry and Quentin Yang}, title = {A toolbox for verifiable tally-hiding e-voting systems}, howpublished = {Cryptology ePrint Archive, Report 2021/491}, year = {2021}, url = {https://eprint.iacr.org/2021/491}, } @misc{cryptoeprint:2021:492, author = {Ming-Shing Chen and Tung Chou}, title = {Classic McEliece on the ARM Cortex-M4}, howpublished = {Cryptology ePrint Archive, Report 2021/492}, year = {2021}, url = {https://eprint.iacr.org/2021/492}, } @misc{cryptoeprint:2021:493, author = {Ming-Shing Chen and Tung Chou and Markus Krausz}, title = {Optimizing BIKE for the Intel Haswell and ARM Cortex-M4}, howpublished = {Cryptology ePrint Archive, Report 2021/493}, year = {2021}, url = {https://eprint.iacr.org/2021/493}, } @misc{cryptoeprint:2021:494, author = {Surbhi Shaw and Ratna Dutta}, title = {Key-Oblivious Encryption from isogenies and its application to Accountable Tracing Signatures.}, howpublished = {Cryptology ePrint Archive, Report 2021/494}, year = {2021}, url = {https://eprint.iacr.org/2021/494}, } @misc{cryptoeprint:2021:495, author = {Mircea Digulescu}, title = {Hiding Data in Plain Sight: Towards Provably Unbreakable Encryption with Short Secret Keys and One-Way Functions}, howpublished = {Cryptology ePrint Archive, Report 2021/495}, year = {2021}, url = {https://eprint.iacr.org/2021/495}, } @misc{cryptoeprint:2021:496, author = {Mircea Digulescu}, title = {Applications of SKREM-like symmetric key ciphers}, howpublished = {Cryptology ePrint Archive, Report 2021/496}, year = {2021}, url = {https://eprint.iacr.org/2021/496}, } @misc{cryptoeprint:2021:497, author = {Ileana Buhan and Lejla Batina and Yuval Yarom and Patrick Schaumont}, title = {SoK: Design Tools for Side-Channel-Aware Implementations}, howpublished = {Cryptology ePrint Archive, Report 2021/497}, year = {2021}, url = {https://eprint.iacr.org/2021/497}, } @misc{cryptoeprint:2021:498, author = {Antonio Dimeo and Felix Gohla and Daniel Goßen and Niko Lockenvitz}, title = {SoK: Multi-Device Secure Instant Messaging}, howpublished = {Cryptology ePrint Archive, Report 2021/498}, year = {2021}, url = {https://eprint.iacr.org/2021/498}, } @misc{cryptoeprint:2021:499, author = {Kelong Cong and Karim Eldefrawy and Nigel P. Smart}, title = {Optimizing Registration Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2021/499}, year = {2021}, url = {https://eprint.iacr.org/2021/499}, } @misc{cryptoeprint:2021:500, author = {Gabrielle Beck and Aarushi Goel and Abhishek Jain and Gabriel Kaptchuk}, title = {Order-C Secure Multiparty Computation for Highly Repetitive Circuits}, howpublished = {Cryptology ePrint Archive, Report 2021/500}, year = {2021}, url = {https://eprint.iacr.org/2021/500}, } @misc{cryptoeprint:2021:501, author = {Aritra Banerjee and Michael Clear and Hitesh Tewari}, title = {zkHawk: Practical Private Smart Contracts from MPC-based Hawk}, howpublished = {Cryptology ePrint Archive, Report 2021/501}, year = {2021}, url = {https://eprint.iacr.org/2021/501}, } @misc{cryptoeprint:2021:502, author = {Kwangsu Lee and Joon Sik Kim}, title = {A Generic Approach to Build Revocable Hierarchical Identity-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2021/502}, year = {2021}, url = {https://eprint.iacr.org/2021/502}, } @misc{cryptoeprint:2021:503, author = {Matthieu Rambaud and Antoine Urban}, title = {Almost-Asynchronous MPC under Honest Majority, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2021/503}, year = {2021}, url = {https://eprint.iacr.org/2021/503}, } @misc{cryptoeprint:2021:504, author = {Xiao-Juan Wang and Tian Tian and Wen-Feng Qi}, title = {A Generic Method for Investigating Nonsingular Galois NFSRs}, howpublished = {Cryptology ePrint Archive, Report 2021/504}, year = {2021}, url = {https://eprint.iacr.org/2021/504}, } @misc{cryptoeprint:2021:505, author = {Shweta Agrawal and Rajarshi Biswas and Ryo Nishimaki and Keita Xagawa and Xiang Xie and Shota Yamada}, title = {Cryptanalysis of Boyen’s Attribute-Based Encryption Scheme in TCC 2013}, howpublished = {Cryptology ePrint Archive, Report 2021/505}, year = {2021}, url = {https://eprint.iacr.org/2021/505}, } @misc{cryptoeprint:2021:506, author = {Robi Pedersen and Osmanbey Uzunkol}, title = {Delegating Supersingular Isogenies over $\mathbb{F}_{p^2}$ with Cryptographic Applications}, howpublished = {Cryptology ePrint Archive, Report 2021/506}, year = {2021}, url = {https://eprint.iacr.org/2021/506}, } @misc{cryptoeprint:2021:507, author = {Tianren Liu and Stefano Tessaro and Vinod Vaikuntanathan}, title = {The t-wise Independence of Substitution-Permutation Networks}, howpublished = {Cryptology ePrint Archive, Report 2021/507}, year = {2021}, url = {https://eprint.iacr.org/2021/507}, } @misc{cryptoeprint:2021:508, author = {Wonkyung Jung and Sangpyo Kim and Jung Ho Ahn and Jung Hee Cheon and Younho Lee}, title = {Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimization with GPUs}, howpublished = {Cryptology ePrint Archive, Report 2021/508}, year = {2021}, url = {https://eprint.iacr.org/2021/508}, } @misc{cryptoeprint:2021:509, author = {Erik Thormarker}, title = {On using the same key pair for Ed25519 and an X25519 based KEM}, howpublished = {Cryptology ePrint Archive, Report 2021/509}, year = {2021}, url = {https://eprint.iacr.org/2021/509}, } @misc{cryptoeprint:2021:510, author = {George Teseleanu }, title = {Signer and Message Ambiguity from a Variety of Keys}, howpublished = {Cryptology ePrint Archive, Report 2021/510}, year = {2021}, url = {https://eprint.iacr.org/2021/510}, } @misc{cryptoeprint:2021:511, author = {Markulf Kohlweiss and Michał Zając}, title = {On (Weak) Simulation-Extractability of Universal zkSNARKs}, howpublished = {Cryptology ePrint Archive, Report 2021/511}, year = {2021}, url = {https://eprint.iacr.org/2021/511}, } @misc{cryptoeprint:2021:512, author = {Tapas Pal and Ratna Dutta}, title = {Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF}, howpublished = {Cryptology ePrint Archive, Report 2021/512}, year = {2021}, url = {https://eprint.iacr.org/2021/512}, } @misc{cryptoeprint:2021:513, author = {Yanyi Liu and Rafael Pass}, title = {On One-way Functions from ${\sf NP}$-Complete Problems}, howpublished = {Cryptology ePrint Archive, Report 2021/513}, year = {2021}, url = {https://eprint.iacr.org/2021/513}, } @misc{cryptoeprint:2021:514, author = {Abhishek Jain and Zhengzhong Jin}, title = {Non-Interactive Zero Knowledge from Sub-exponential DDH}, howpublished = {Cryptology ePrint Archive, Report 2021/514}, year = {2021}, url = {https://eprint.iacr.org/2021/514}, } @misc{cryptoeprint:2021:515, author = {Keita Emura and Atsushi Takayasu and Yohei Watanabe}, title = {Generic Constructions of Revocable Hierarchical Identity-based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2021/515}, year = {2021}, url = {https://eprint.iacr.org/2021/515}, } @misc{cryptoeprint:2021:516, author = {Weiqiong Cao and Hongsong Shi and Hua Chen and Wei Xi and Yuhang Wang}, title = {A new weak curve fault attack on ECIES: embedded point validation is not enough during decryption}, howpublished = {Cryptology ePrint Archive, Report 2021/516}, year = {2021}, url = {https://eprint.iacr.org/2021/516}, } @misc{cryptoeprint:2021:517, author = {Yanyi Liu and Rafael Pass}, title = {Cryptography from Sublinear-Time Average-Case Hardness of Time-Bounded Kolmogorov Complexity}, howpublished = {Cryptology ePrint Archive, Report 2021/517}, year = {2021}, url = {https://eprint.iacr.org/2021/517}, } @misc{cryptoeprint:2021:518, author = {Victor Ermolaev and Gamze Tillem}, title = {How to Share and Own a Secret}, howpublished = {Cryptology ePrint Archive, Report 2021/518}, year = {2021}, url = {https://eprint.iacr.org/2021/518}, } @misc{cryptoeprint:2021:519, author = {Atakan Arslan and Muhammed Ali Bingöl}, title = {Cryptanalysis of Izza et al.'s Protocol: An Enhanced Scalable and Secure RFID Authentication Protocol for WBAN Within An IoT Environment}, howpublished = {Cryptology ePrint Archive, Report 2021/519}, year = {2021}, url = {https://eprint.iacr.org/2021/519}, } @misc{cryptoeprint:2021:520, author = {Thomas Haines and Johannes Mueller}, title = {Optimal Randomized Partial Checking for Decryption Mix Nets}, howpublished = {Cryptology ePrint Archive, Report 2021/520}, year = {2021}, url = {https://eprint.iacr.org/2021/520}, } @misc{cryptoeprint:2021:521, author = {Daniel Demmler and Stefan Katzenbeisser and Thomas Schneider and Tom Schuster and Christian Weinert}, title = {Improved Circuit Compilation for Hybrid MPC via Compiler Intermediate Representation}, howpublished = {Cryptology ePrint Archive, Report 2021/521}, year = {2021}, url = {https://eprint.iacr.org/2021/521}, } @misc{cryptoeprint:2021:522, author = {Yingpu Deng and Lixia Luo and Yanbin Pan and Zhaonan Wang and Guanju Xiao}, title = {Public-key Cryptosystems and Signature Schemes from p-adic Lattices}, howpublished = {Cryptology ePrint Archive, Report 2021/522}, year = {2021}, url = {https://eprint.iacr.org/2021/522}, } @misc{cryptoeprint:2021:523, author = {Yevgeniy Dodis and Siyao Guo and Noah Stephens-Davidowitz and Zhiye Xie}, title = {No Time to Hash: On Superefficient Entropy Accumulation}, howpublished = {Cryptology ePrint Archive, Report 2021/523}, year = {2021}, url = {https://eprint.iacr.org/2021/523}, } @misc{cryptoeprint:2021:524, author = {Kwangsu Lee}, title = {Decentralized Multi-Client Functional Encryption for Set Intersection with Improved Efficiency}, howpublished = {Cryptology ePrint Archive, Report 2021/524}, year = {2021}, url = {https://eprint.iacr.org/2021/524}, } @misc{cryptoeprint:2021:525, author = {Lichao Wu and Guilherme Perin}, title = {On the Importance of Pooling Layer Tuning for Profiling Side-channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2021/525}, year = {2021}, url = {https://eprint.iacr.org/2021/525}, } @misc{cryptoeprint:2021:526, author = {Jorai Rijsdijk and Lichao Wu and Guilherme Perin and Stjepan Picek}, title = {Reinforcement Learning-based Design of Side-channel Countermeasures}, howpublished = {Cryptology ePrint Archive, Report 2021/526}, year = {2021}, url = {https://eprint.iacr.org/2021/526}, } @misc{cryptoeprint:2021:527, author = {Michał Wroński}, title = {Solving discrete logarithm problem over prime fields using quantum annealing and $\frac{n^3}{2}$ logical qubits}, howpublished = {Cryptology ePrint Archive, Report 2021/527}, year = {2021}, url = {https://eprint.iacr.org/2021/527}, } @misc{cryptoeprint:2021:528, author = {Denis Firsov and Henri Lakk and Ahto Truu}, title = {Verified Multiple-Time Signature Scheme from One-Time Signatures and Timestamping}, howpublished = {Cryptology ePrint Archive, Report 2021/528}, year = {2021}, url = {https://eprint.iacr.org/2021/528}, } @misc{cryptoeprint:2021:529, author = {Nicolas Gailly and Mary Maller and Anca Nitulescu}, title = {SNARKpack: Practical SNARK Aggregation}, howpublished = {Cryptology ePrint Archive, Report 2021/529}, year = {2021}, url = {https://eprint.iacr.org/2021/529}, } @misc{cryptoeprint:2021:530, author = {Yuan Yao and Tuna Tufan and Tarun Kathuria and Baris Ege and Ulkuhan Guler and Patrick Schaumont}, title = {Pre-silicon Architecture Correlation Analysis (PACA): Identifying and Mitigating the Source of Side-channel Leakage at Gate-level}, howpublished = {Cryptology ePrint Archive, Report 2021/530}, year = {2021}, url = {https://eprint.iacr.org/2021/530}, } @misc{cryptoeprint:2021:531, author = {David Heath and Vladimir Kolesnikov}, title = {LogStack: Stacked Garbling with $O(b \log b)$ Computation}, howpublished = {Cryptology ePrint Archive, Report 2021/531}, year = {2021}, url = {https://eprint.iacr.org/2021/531}, } @misc{cryptoeprint:2021:532, author = {Tung Chou and Matthias J. Kannwischer and Bo-Yin Yang}, title = {Rainbow on Cortex-M4}, howpublished = {Cryptology ePrint Archive, Report 2021/532}, year = {2021}, url = {https://eprint.iacr.org/2021/532}, } @misc{cryptoeprint:2021:533, author = {Sijun Tan and Brian Knott and Yuan Tian and David J. Wu}, title = {CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU}, howpublished = {Cryptology ePrint Archive, Report 2021/533}, year = {2021}, url = {https://eprint.iacr.org/2021/533}, } @misc{cryptoeprint:2021:534, author = {Maura B. Paterson and Douglas R. Stinson}, title = {Splitting authentication codes with perfect secrecy: new results, constructions and connections with algebraic manipulation detection codes}, howpublished = {Cryptology ePrint Archive, Report 2021/534}, year = {2021}, url = {https://eprint.iacr.org/2021/534}, } @misc{cryptoeprint:2021:535, author = {Yanyi Liu and Rafael Pass}, title = {On the Possibility of Basing Cryptography on $\EXP \neq \BPP$}, howpublished = {Cryptology ePrint Archive, Report 2021/535}, year = {2021}, url = {https://eprint.iacr.org/2021/535}, } @misc{cryptoeprint:2021:536, author = {Latif AKÇAY and Berna ÖRS}, title = {Analyzing the Potential of Transport Triggered Architecture for Lattice-based Cryptography Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2021/536}, year = {2021}, url = {https://eprint.iacr.org/2021/536}, } @misc{cryptoeprint:2021:537, author = {Gang Wang}, title = {SoK: Exploring Blockchains Interoperability}, howpublished = {Cryptology ePrint Archive, Report 2021/537}, year = {2021}, url = {https://eprint.iacr.org/2021/537}, } @misc{cryptoeprint:2021:538, author = {Françoise Levy-dit-Vehel and Maxime Roméas}, title = {A Composable Look at Updatable Encryption}, howpublished = {Cryptology ePrint Archive, Report 2021/538}, year = {2021}, url = {https://eprint.iacr.org/2021/538}, } @misc{cryptoeprint:2021:539, author = {Atsushi Takayasu}, title = {More Efficient Adaptively Secure Revocable Hierarchical Identity-based Encryption with Compact Ciphertexts: Achieving Shorter Keys and Tighter Reductions}, howpublished = {Cryptology ePrint Archive, Report 2021/539}, year = {2021}, url = {https://eprint.iacr.org/2021/539}, } @misc{cryptoeprint:2021:540, author = {Geoffroy Couteau and Michael Klooß and Huang Lin and Michael Reichle}, title = {Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments}, howpublished = {Cryptology ePrint Archive, Report 2021/540}, year = {2021}, url = {https://eprint.iacr.org/2021/540}, } @misc{cryptoeprint:2021:541, author = {Reza Azarderakhsh and Rami El Khatib and Brian Koziel and Brandon Langenberg }, title = {Hardware Deployment of Hybrid PQC}, howpublished = {Cryptology ePrint Archive, Report 2021/541}, year = {2021}, url = {https://eprint.iacr.org/2021/541}, } @misc{cryptoeprint:2021:542, author = {Samir Bouftass.}, title = {Symetric encryption algorithms based on the mathematical structure underlying the three body problem}, howpublished = {Cryptology ePrint Archive, Report 2021/542}, year = {2021}, url = {https://eprint.iacr.org/2021/542}, } @misc{cryptoeprint:2021:543, author = {Craig Costello}, title = {The Case for SIKE: A Decade of the Supersingular Isogeny Problem}, howpublished = {Cryptology ePrint Archive, Report 2021/543}, year = {2021}, url = {https://eprint.iacr.org/2021/543}, } @misc{cryptoeprint:2021:544, author = {Jing Yang and Thomas Johansson and Alexander Maximov}, title = {New improved attacks on SNOW-V}, howpublished = {Cryptology ePrint Archive, Report 2021/544}, year = {2021}, url = {https://eprint.iacr.org/2021/544}, } @misc{cryptoeprint:2021:545, author = {Muhammed F. Esgin and Ron Steinfeld and Raymond K. Zhao}, title = {MatRiCT+: More Efficient Post-Quantum Private Blockchain Payments}, howpublished = {Cryptology ePrint Archive, Report 2021/545}, year = {2021}, url = {https://eprint.iacr.org/2021/545}, } @misc{cryptoeprint:2021:546, author = {Jin Hoki and Takanori Isobe and Ryoma Ito and Fukang Liu and Kosei Sakamoto}, title = {Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V}, howpublished = {Cryptology ePrint Archive, Report 2021/546}, year = {2021}, url = {https://eprint.iacr.org/2021/546}, } @misc{cryptoeprint:2021:547, author = {Yao Sun}, title = {Cube Attack against 843-Round Trivium}, howpublished = {Cryptology ePrint Archive, Report 2021/547}, year = {2021}, url = {https://eprint.iacr.org/2021/547}, } @misc{cryptoeprint:2021:548, author = {Keiichi Iwamura and Ahmad Akmal Aminuddin Mohd Kamal}, title = {Secure Computation by Secret Sharing Using Input Encrypted with Random Number (Full Paper)}, howpublished = {Cryptology ePrint Archive, Report 2021/548}, year = {2021}, url = {https://eprint.iacr.org/2021/548}, } @misc{cryptoeprint:2021:549, author = {Benjamin Salling Hvass and Diego F. Aranha and Bas Spitters}, title = {High-assurance field inversion for curve-based cryptography}, howpublished = {Cryptology ePrint Archive, Report 2021/549}, year = {2021}, url = {https://eprint.iacr.org/2021/549}, } @misc{cryptoeprint:2021:550, author = {Amar Bapić and Samir Hodžić and Enes Pasalic}, title = {Quadratic almost bent functions - their partial characterization and design in the spectral domain}, howpublished = {Cryptology ePrint Archive, Report 2021/550}, year = {2021}, url = {https://eprint.iacr.org/2021/550}, } @misc{cryptoeprint:2021:551, author = {Seungwan Hong and Seunghong Kim and Jiheon Choi and Younho Lee and Jung Hee Cheon}, title = {Efficient Sorting of Homomorphic Encrypted Data with $k$-way Sorting Network}, howpublished = {Cryptology ePrint Archive, Report 2021/551}, year = {2021}, url = {https://eprint.iacr.org/2021/551}, } @misc{cryptoeprint:2021:552, author = {André Chailloux and Thomas Debris-Alazard and Simona Etinski}, title = {Classical and Quantum algorithms for generic Syndrome Decoding problems and applications to the Lee metric}, howpublished = {Cryptology ePrint Archive, Report 2021/552}, year = {2021}, url = {https://eprint.iacr.org/2021/552}, } @misc{cryptoeprint:2021:553, author = {Daniel De Almeida Braga and Pierre-Alain Fouque and Mohamed Sabt}, title = {PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild}, howpublished = {Cryptology ePrint Archive, Report 2021/553}, year = {2021}, url = {https://eprint.iacr.org/2021/553}, } @misc{cryptoeprint:2021:554, author = {Gyeongju Song and Kyungbae Jang and Hyunji Kim and Wai-Kong Lee and Hwajeong Seo}, title = {Grover on Caesar and Vigenère Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2021/554}, year = {2021}, url = {https://eprint.iacr.org/2021/554}, } @misc{cryptoeprint:2021:555, author = {Nils Wisiol and Khalid T. Mursi and Jean-Pierre Seifert and Yu Zhuang}, title = {Neural-Network-Based Modeling Attacks on XOR Arbiter PUFs Revisited}, howpublished = {Cryptology ePrint Archive, Report 2021/555}, year = {2021}, url = {https://eprint.iacr.org/2021/555}, } @misc{cryptoeprint:2021:556, author = {Leo Robert and Daiki Miyahara and Pascal Lafourcade and Takaaki Mizuk}, title = {Interactive Physical ZKP for Connectivity:Applications to Nurikabe and Hitori}, howpublished = {Cryptology ePrint Archive, Report 2021/556}, year = {2021}, url = {https://eprint.iacr.org/2021/556}, } @misc{cryptoeprint:2021:557, author = {Thijs Laarhoven and Michael Walter}, title = {Dual lattice attacks for closest vector problems (with preprocessing)}, howpublished = {Cryptology ePrint Archive, Report 2021/557}, year = {2021}, url = {https://eprint.iacr.org/2021/557}, } @misc{cryptoeprint:2021:558, author = {Kristian Gjøsteen and Thomas Haines and Johannes Müller and Peter Rønne and Tjerand Silde}, title = {Verifiable Decryption in the Head}, howpublished = {Cryptology ePrint Archive, Report 2021/558}, year = {2021}, url = {https://eprint.iacr.org/2021/558}, } @misc{cryptoeprint:2021:559, author = {Andrés Fabrega and Ueli Maurer and Marta Mularczyk}, title = {A Fresh Approach to Updatable Symmetric Encryption}, howpublished = {Cryptology ePrint Archive, Report 2021/559}, year = {2021}, url = {https://eprint.iacr.org/2021/559}, } @misc{cryptoeprint:2021:560, author = {Nael Rahman and Vladimir Shpilrain}, title = {MOBS (Matrices Over Bit Strings) public key exchange}, howpublished = {Cryptology ePrint Archive, Report 2021/560}, year = {2021}, url = {https://eprint.iacr.org/2021/560}, } @misc{cryptoeprint:2021:561, author = {Pakize Sanal and Emrah Karagoz and Hwajeong Seo and Reza Azarderakhsh and Mehran Mozaffari-Kermani}, title = {Kyber on ARM64: Compact Implementations of Kyber on 64-bit ARM Cortex-A Processors}, howpublished = {Cryptology ePrint Archive, Report 2021/561}, year = {2021}, url = {https://eprint.iacr.org/2021/561}, } @misc{cryptoeprint:2021:562, author = {Wouter Castryck and Ann Dooms and Carlo Emerencia and Alexander Lemmens}, title = {A fusion algorithm for solving the hidden shift problem in finite abelian groups}, howpublished = {Cryptology ePrint Archive, Report 2021/562}, year = {2021}, url = {https://eprint.iacr.org/2021/562}, } @misc{cryptoeprint:2021:563, author = {Mojtaba Bisheh-Niasar and Reza Azarderakhsh and Mehran Mozaffari-Kermani}, title = {High-Speed NTT-based Polynomial Multiplication Accelerator for CRYSTALS-Kyber Post-Quantum Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2021/563}, year = {2021}, url = {https://eprint.iacr.org/2021/563}, } @misc{cryptoeprint:2021:564, author = {Vadim Lyubashevsky and Ngoc Khanh Nguyen and Gregor Seiler}, title = {SMILE: Set Membership from Ideal Lattices with Applications to Ring Signatures and Confidential Transactions}, howpublished = {Cryptology ePrint Archive, Report 2021/564}, year = {2021}, url = {https://eprint.iacr.org/2021/564}, } @misc{cryptoeprint:2021:565, author = {Cyprien Delpech de Saint Guilhem and Eleftheria Makri and Dragos Rotaru and Titouan Tanguy}, title = {The return of Eratosthenes: Secure Generation of RSA Moduli using Distributed Sieving}, howpublished = {Cryptology ePrint Archive, Report 2021/565}, year = {2021}, url = {https://eprint.iacr.org/2021/565}, } @misc{cryptoeprint:2021:566, author = {Cong Zhang and Hong-Sheng Zhou}, title = {From Random Oracles to Ideal Signatures, and Back}, howpublished = {Cryptology ePrint Archive, Report 2021/566}, year = {2021}, url = {https://eprint.iacr.org/2021/566}, } @misc{cryptoeprint:2021:567, author = {Jeonghyuk Lee and Jihye Kim and Hyunok Oh}, title = {Forward-secure Aggregate Signatures with Constant Complexities using Recursive zk-SNARKs}, howpublished = {Cryptology ePrint Archive, Report 2021/567}, year = {2021}, url = {https://eprint.iacr.org/2021/567}, } @misc{cryptoeprint:2021:568, author = {Gaurav Panwar and Roopa Vishwanathan and Satyajayant Misra}, title = {ReTRACe: Revocable and Traceable Blockchain Rewrites using Attribute-based Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2021/568}, year = {2021}, url = {https://eprint.iacr.org/2021/568}, } @misc{cryptoeprint:2021:569, author = {David Knichel and Amir Moradi and Nicolai Müller and Pascal Sasdrich}, title = {Automated Generation of Masked Hardware}, howpublished = {Cryptology ePrint Archive, Report 2021/569}, year = {2021}, url = {https://eprint.iacr.org/2021/569}, } @misc{cryptoeprint:2021:570, author = {André Chailloux and Johanna Loyer}, title = {Lattice sieving via quantum random walks}, howpublished = {Cryptology ePrint Archive, Report 2021/570}, year = {2021}, url = {https://eprint.iacr.org/2021/570}, } @misc{cryptoeprint:2021:571, author = {Thomas Attema and Nicole Gervasoni and Michiel Marcus and Gabriele Spini}, title = {Post-Quantum Cryptography: Computational-Hardness Assumptions and Beyond}, howpublished = {Cryptology ePrint Archive, Report 2021/571}, year = {2021}, url = {https://eprint.iacr.org/2021/571}, } @misc{cryptoeprint:2021:572, author = {Charanjit Singh Jutla and Nathan Manohar}, title = {Sine Series Approximation of the Mod Function for Bootstrapping for Approximate HE}, howpublished = {Cryptology ePrint Archive, Report 2021/572}, year = {2021}, url = {https://eprint.iacr.org/2021/572}, } @misc{cryptoeprint:2021:573, author = {Elena Andreeva and Rishiraj Bhattacharyya and Arnab Roy}, title = {Compactness of Hashing Modes and Efficiency beyond Merkle Tree}, howpublished = {Cryptology ePrint Archive, Report 2021/573}, year = {2021}, url = {https://eprint.iacr.org/2021/573}, } @misc{cryptoeprint:2021:574, author = {Yuyin Yu and Leo Perrin}, title = {Constructing More Quadratic APN Functions with the QAM Method}, howpublished = {Cryptology ePrint Archive, Report 2021/574}, year = {2021}, url = {https://eprint.iacr.org/2021/574}, } @misc{cryptoeprint:2021:575, author = {Zhenzhen Bao and Jian Guo and Danping Shi and Yi Tu}, title = {MITM Meets Guess-and-Determine: Further Improved Preimage Attacks against AES-like Hashing}, howpublished = {Cryptology ePrint Archive, Report 2021/575}, year = {2021}, url = {https://eprint.iacr.org/2021/575}, } @misc{cryptoeprint:2021:576, author = {Surya Addanki and Kevin Garbe and Eli Jaffe and Rafail Ostrovsky and Antigoni Polychroniadou}, title = {Prio+: Privacy Preserving Aggregate Statistics via Boolean Shares}, howpublished = {Cryptology ePrint Archive, Report 2021/576}, year = {2021}, url = {https://eprint.iacr.org/2021/576}, } @misc{cryptoeprint:2021:577, author = {Dionysis Zindros}, title = {Soft Power: Upgrading Chain Macroeconomic Policy Through Soft Forks}, howpublished = {Cryptology ePrint Archive, Report 2021/577}, year = {2021}, url = {https://eprint.iacr.org/2021/577}, } @misc{cryptoeprint:2021:578, author = {Itai Dinur}, title = {Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2)}, howpublished = {Cryptology ePrint Archive, Report 2021/578}, year = {2021}, url = {https://eprint.iacr.org/2021/578}, } @misc{cryptoeprint:2021:579, author = {Joseph Jaeger and Fang Song and Stefano Tessaro}, title = {Quantum Key-length Extension}, howpublished = {Cryptology ePrint Archive, Report 2021/579}, year = {2021}, url = {https://eprint.iacr.org/2021/579}, } @misc{cryptoeprint:2021:580, author = {Leo de Castro and Antigoni Polychroniadou}, title = {Lightweight, Verifiable Function Secret Sharing andits Applications}, howpublished = {Cryptology ePrint Archive, Report 2021/580}, year = {2021}, url = {https://eprint.iacr.org/2021/580}, } @misc{cryptoeprint:2021:581, author = {Abhrajit Sengupta and Nimisha Limaye and Ozgur Sinanoglu}, title = {Breaking CAS-Lock and Its Variants by Exploiting Structural Traces}, howpublished = {Cryptology ePrint Archive, Report 2021/581}, year = {2021}, url = {https://eprint.iacr.org/2021/581}, } @misc{cryptoeprint:2021:582, author = {StarkWare}, title = {ethSTARK Documentation}, howpublished = {Cryptology ePrint Archive, Report 2021/582}, year = {2021}, url = {https://eprint.iacr.org/2021/582}, } @misc{cryptoeprint:2021:583, author = {Lorenz Panny}, title = {Entropoid-based cryptography is group exponentiation in disguise}, howpublished = {Cryptology ePrint Archive, Report 2021/583}, year = {2021}, url = {https://eprint.iacr.org/2021/583}, } @misc{cryptoeprint:2021:584, author = {Onur Gunlu and Ueli Maurer and Joao Ribeiro}, title = {Effects of Quantization on the Multiple-Round Secret-Key Capacity}, howpublished = {Cryptology ePrint Archive, Report 2021/584}, year = {2021}, url = {https://eprint.iacr.org/2021/584}, } @misc{cryptoeprint:2021:585, author = {Maxime Plançon and Thomas Prest}, title = {Exact Lattice Sampling from Non-Gaussian Distributions}, howpublished = {Cryptology ePrint Archive, Report 2021/585}, year = {2021}, url = {https://eprint.iacr.org/2021/585}, } @misc{cryptoeprint:2021:586, author = {Laila El Aimani}, title = {A New Approach for finding Low-Weight Polynomial Multiples}, howpublished = {Cryptology ePrint Archive, Report 2021/586}, year = {2021}, url = {https://eprint.iacr.org/2021/586}, } @misc{cryptoeprint:2021:587, author = {David Heath and Vladimir Kolesnikov}, title = {PrORAM: Fast $O(\log n)$ Private Coin ZK ORAM}, howpublished = {Cryptology ePrint Archive, Report 2021/587}, year = {2021}, url = {https://eprint.iacr.org/2021/587}, } @misc{cryptoeprint:2021:588, author = {Thomas Haines and Johannes Mueller}, title = {A Novel Proof of Shuffle: Exponentially Secure Cut-and-Choose}, howpublished = {Cryptology ePrint Archive, Report 2021/588}, year = {2021}, url = {https://eprint.iacr.org/2021/588}, } @misc{cryptoeprint:2021:589, author = {Hidenori Kuwakado and Shoichi Hirose and Masahiro Mambo}, title = {White-Box Encryption Scheme Using a Quantum Memory}, howpublished = {Cryptology ePrint Archive, Report 2021/589}, year = {2021}, url = {https://eprint.iacr.org/2021/589}, } @misc{cryptoeprint:2021:590, author = {Carla Ràfols and Arantxa Zapico}, title = {An Algebraic Framework for Universal and Updatable SNARKs}, howpublished = {Cryptology ePrint Archive, Report 2021/590}, year = {2021}, url = {https://eprint.iacr.org/2021/590}, } @misc{cryptoeprint:2021:591, author = {Jan Peter Drees and Pritha Gupta and Eyke Hüllermeier and Tibor Jager and Alexander Konze and Claudia Priesterjahn and Arunselvan Ramaswamy and Juraj Somorovsky}, title = {Automated Detection of Side Channels in Cryptographic Protocols: DROWN the ROBOTs!}, howpublished = {Cryptology ePrint Archive, Report 2021/591}, year = {2021}, url = {https://eprint.iacr.org/2021/591}, } @misc{cryptoeprint:2021:592, author = {Loïc Masure and Rémi Strullu}, title = {Side Channel Analysis against the ANSSI’s protected AES implementation on ARM}, howpublished = {Cryptology ePrint Archive, Report 2021/592}, year = {2021}, url = {https://eprint.iacr.org/2021/592}, } @misc{cryptoeprint:2021:593, author = {Shumo Chu and Danyang Zhuo and Elaine Shi and T-H. Hubert Chan (randomized author ordering)}, title = {Differentially Oblivious Database Joins: Overcoming the Worst-Case Curse of Fully Oblivious Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2021/593}, year = {2021}, url = {https://eprint.iacr.org/2021/593}, } @misc{cryptoeprint:2021:594, author = {Zhelei Zhou and Xinlei Cao and Jian Liu and Bingsheng Zhang and Kui Ren}, title = {ZK Contingent Payments for Trained Neural Networks}, howpublished = {Cryptology ePrint Archive, Report 2021/594}, year = {2021}, url = {https://eprint.iacr.org/2021/594}, } @misc{cryptoeprint:2021:595, author = {Xuechao Wang and Viswa Virinchi Muppirala and Lei Yang and Sreeram Kannan and Pramod Viswanath}, title = {Securing Parallel-chain Protocols under Variable Mining Power}, howpublished = {Cryptology ePrint Archive, Report 2021/595}, year = {2021}, url = {https://eprint.iacr.org/2021/595}, } @misc{cryptoeprint:2021:596, author = {Vanesa Daza and Abida Haque and Alessandra Scafuro and Alexandros Zacharakis and Arantxa Zapico}, title = {Mutual Accountability Layer: Accountable Anonymity within Accountable Trust}, howpublished = {Cryptology ePrint Archive, Report 2021/596}, year = {2021}, url = {https://eprint.iacr.org/2021/596}, } @misc{cryptoeprint:2021:597, author = {Rami Elkhatib and Reza Azarderakhsh and Mehran Mozaffari-Kermani}, title = {Accelerated RISC-V for Post-Quantum SIKE}, howpublished = {Cryptology ePrint Archive, Report 2021/597}, year = {2021}, url = {https://eprint.iacr.org/2021/597}, } @misc{cryptoeprint:2021:598, author = {Panagiotis Chatzigiannis and Konstantinos Chalkias}, title = {Proof of Assets in the Diem Blockchain}, howpublished = {Cryptology ePrint Archive, Report 2021/598}, year = {2021}, url = {https://eprint.iacr.org/2021/598}, } @misc{cryptoeprint:2021:599, author = {Shravan Srinivasan and Alex Chepurnoy and Charalampos Papamanthou and Alin Tomescu and Yupeng Zhang}, title = {Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments}, howpublished = {Cryptology ePrint Archive, Report 2021/599}, year = {2021}, url = {https://eprint.iacr.org/2021/599}, } @misc{cryptoeprint:2021:600, author = {Christian Porter and Andrew Mendelsohn and Cong Ling}, title = {Subfield Algorithms for Ideal- and Module-SVP Based on the Decomposition Group}, howpublished = {Cryptology ePrint Archive, Report 2021/600}, year = {2021}, url = {https://eprint.iacr.org/2021/600}, } @misc{cryptoeprint:2021:601, author = {Hanshen Xiao and Srinivas Devadas}, title = {The Art of Labeling: Task Augmentation for Private(Collaborative) Learning on Transformed Data}, howpublished = {Cryptology ePrint Archive, Report 2021/601}, year = {2021}, url = {https://eprint.iacr.org/2021/601}, } @misc{cryptoeprint:2021:602, author = {Marten van Dijk and Deniz Gurevin and Chenglu Jin and Omer Khan and Phuong Ha Nguyen}, title = {Autonomous Secure Remote Attestation even when all Used and to be Used Digital Keys Leak}, howpublished = {Cryptology ePrint Archive, Report 2021/602}, year = {2021}, url = {https://eprint.iacr.org/2021/602}, } @misc{cryptoeprint:2021:603, author = {Justin Kim and Vandan Mehta and Kartik Nayak and Nibesh Shrestha}, title = {Making Synchronous BFT Protocols Secure in the Presence of Mobile Sluggish Faults}, howpublished = {Cryptology ePrint Archive, Report 2021/603}, year = {2021}, url = {https://eprint.iacr.org/2021/603}, } @misc{cryptoeprint:2021:604, author = {David Heath and Vladimir Kolesnikov and Stanislav Peceny}, title = {Masked Triples: Amortizing Multiplication Triples across Conditionals}, howpublished = {Cryptology ePrint Archive, Report 2021/604}, year = {2021}, url = {https://eprint.iacr.org/2021/604}, } @misc{cryptoeprint:2021:605, author = {Benny Applebaum and Eyal Golombek}, title = {On the Randomness Complexity of Interactive Proofs and Statistical Zero-Knowledge Proofs}, howpublished = {Cryptology ePrint Archive, Report 2021/605}, year = {2021}, url = {https://eprint.iacr.org/2021/605}, } @misc{cryptoeprint:2021:606, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam and Mor Weiss}, title = {ZK-PCPs from Leakage-Resilient Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2021/606}, year = {2021}, url = {https://eprint.iacr.org/2021/606}, } @misc{cryptoeprint:2021:607, author = {Jiaxin Pan and Chen Qian and Magnus Ringerud}, title = {Signed Diffie-Hellman Key Exchange with Tight Security}, howpublished = {Cryptology ePrint Archive, Report 2021/607}, year = {2021}, url = {https://eprint.iacr.org/2021/607}, } @misc{cryptoeprint:2021:608, author = {Daniel R. L. Brown}, title = {Layering diverse cryptography to lower future secret attack risks: post-quantum estimates}, howpublished = {Cryptology ePrint Archive, Report 2021/608}, year = {2021}, url = {https://eprint.iacr.org/2021/608}, } @misc{cryptoeprint:2021:609, author = {Michele Ciampi and Muhammad Ishaq and Malik Magdon-Ismail and Rafail Ostrovsky and Vassilis Zikas}, title = {FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker}, howpublished = {Cryptology ePrint Archive, Report 2021/609}, year = {2021}, url = {https://eprint.iacr.org/2021/609}, } @misc{cryptoeprint:2021:610, author = {Alexander Nilsson and Irina E. Bocharova and Boris D. Kudryashov and Thomas Johansson}, title = {A Weighted Bit Flipping Decoder for QC-MDPC-based Cryptosystems}, howpublished = {Cryptology ePrint Archive, Report 2021/610}, year = {2021}, url = {https://eprint.iacr.org/2021/610}, } @misc{cryptoeprint:2021:611, author = {Fatih Balli and Andrea Caforio and Subhadeep Banik}, title = {Some Applications of Hamming Weight Correlations}, howpublished = {Cryptology ePrint Archive, Report 2021/611}, year = {2021}, url = {https://eprint.iacr.org/2021/611}, } @misc{cryptoeprint:2021:612, author = {Beyza Bozdemir and Sébastien Canard and Orhan Ermis and Helen Möllering and Melek Önen and Thomas Schneider}, title = {Privacy-preserving Density-based Clustering}, howpublished = {Cryptology ePrint Archive, Report 2021/612}, year = {2021}, url = {https://eprint.iacr.org/2021/612}, } @misc{cryptoeprint:2021:613, author = {Xiaojian Liang and Jian Weng and Anjia Yang and Lisha Yao and Zike Jiang and Zhenghao Wu}, title = {Attribute-Based Conditional Proxy Re-Encryption in the Standard Model under LWE}, howpublished = {Cryptology ePrint Archive, Report 2021/613}, year = {2021}, url = {https://eprint.iacr.org/2021/613}, } @misc{cryptoeprint:2021:614, author = {Rafael Pass}, title = {Unprovability of Leakage-Resilient Cryptography Beyond the Information-Theoretic Limit}, howpublished = {Cryptology ePrint Archive, Report 2021/614}, year = {2021}, url = {https://eprint.iacr.org/2021/614}, } @misc{cryptoeprint:2021:615, author = {Rafael Pass}, title = {A Tutorial on Concurrent Zero Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2021/615}, year = {2021}, url = {https://eprint.iacr.org/2021/615}, } @misc{cryptoeprint:2021:616, author = {Keitaro Hashimoto and Shuichi Katsumata and Kris Kwiatkowski and Thomas Prest}, title = {An Efficient and Generic Construction for Signal's Handshake (X3DH): Post-Quantum, State Leakage Secure, and Deniable}, howpublished = {Cryptology ePrint Archive, Report 2021/616}, year = {2021}, url = {https://eprint.iacr.org/2021/616}, } @misc{cryptoeprint:2021:617, author = {Taiga Hiroka and Tomoyuki Morimae and Ryo Nishimaki and Takashi Yamakawa}, title = {Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication}, howpublished = {Cryptology ePrint Archive, Report 2021/617}, year = {2021}, url = {https://eprint.iacr.org/2021/617}, } @misc{cryptoeprint:2021:618, author = {Sumit Kumar Debnath and Vikas Srivastava and Tapaswini Mohanty and Nibedita Kundu and Kouichi Sakurai}, title = {Quantum Secure Privacy Preserving Technique to Obtain the Intersection of Two Datasets for Contact Tracing}, howpublished = {Cryptology ePrint Archive, Report 2021/618}, year = {2021}, url = {https://eprint.iacr.org/2021/618}, } @misc{cryptoeprint:2021:619, author = {Jiabo Wang and Cong Ling}, title = {Polar Coding for Ring-LWE-Based Public Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2021/619}, year = {2021}, url = {https://eprint.iacr.org/2021/619}, } @misc{cryptoeprint:2021:620, author = {Elżbieta Burek and Michał Misztal and Michał Wroński}, title = {Algebraic attacks on block ciphers using quantum annealing}, howpublished = {Cryptology ePrint Archive, Report 2021/620}, year = {2021}, url = {https://eprint.iacr.org/2021/620}, } @misc{cryptoeprint:2021:621, author = {Léonard Lys and Arthur Micoulet and Maria Potop-Butucaru}, title = {R-SWAP: Relay based atomic cross-chain swap protocol}, howpublished = {Cryptology ePrint Archive, Report 2021/621}, year = {2021}, url = {https://eprint.iacr.org/2021/621}, } @misc{cryptoeprint:2021:622, author = {Ripon Patgiri}, title = {Stealth: A Highly Secured End-to-End Symmetric Communication Protocol}, howpublished = {Cryptology ePrint Archive, Report 2021/622}, year = {2021}, url = {https://eprint.iacr.org/2021/622}, } @misc{cryptoeprint:2021:623, author = {Aggelos Kiayias and Nikos Leonardos and Dionysis Zindros}, title = {Mining in Logarithmic Space}, howpublished = {Cryptology ePrint Archive, Report 2021/623}, year = {2021}, url = {https://eprint.iacr.org/2021/623}, } @misc{cryptoeprint:2021:624, author = {Guru-Vamsi Policharla and Manoj Prabhakaran and Rajeev Raghunath and Parjanya Vyas}, title = {Group Structure in Correlations and its Applications in Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2021/624}, year = {2021}, url = {https://eprint.iacr.org/2021/624}, } @misc{cryptoeprint:2021:625, author = {Daniel R. L. Brown}, title = {Plactic key agreement}, howpublished = {Cryptology ePrint Archive, Report 2021/625}, year = {2021}, url = {https://eprint.iacr.org/2021/625}, } @misc{cryptoeprint:2021:626, author = {Jan Wichelmann and Sebastian Berndt and Claudius Pott and Thomas Eisenbarth}, title = {Help, my Signal has bad Device! Breaking the Signal Messenger’s Post-CompromiseSecurity through a Malicious Device}, howpublished = {Cryptology ePrint Archive, Report 2021/626}, year = {2021}, url = {https://eprint.iacr.org/2021/626}, } @misc{cryptoeprint:2021:627, author = {Nirvan Tyagi and Ben Fisch and Joseph Bonneau and Stefano Tessaro}, title = {Client-Auditable Verifiable Registries}, howpublished = {Cryptology ePrint Archive, Report 2021/627}, year = {2021}, url = {https://eprint.iacr.org/2021/627}, } @misc{cryptoeprint:2021:628, author = {Joachim Neu and Ertem Nusret Tas and David Tse}, title = {The Availability-Accountability Dilemma and its Resolution via Accountability Gadgets}, howpublished = {Cryptology ePrint Archive, Report 2021/628}, year = {2021}, url = {https://eprint.iacr.org/2021/628}, } @misc{cryptoeprint:2021:629, author = {Simin Ghesmati and Walid Fdhila and Edgar Weippl}, title = {Bitcoin Privacy - A Survey on Mixing Techniques}, howpublished = {Cryptology ePrint Archive, Report 2021/629}, year = {2021}, url = {https://eprint.iacr.org/2021/629}, } @misc{cryptoeprint:2021:630, author = {Julien Devevey and Benoît Libert and Khoa Nguyen and Thomas Peters and Moti Yung}, title = {Non-Interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings}, howpublished = {Cryptology ePrint Archive, Report 2021/630}, year = {2021}, url = {https://eprint.iacr.org/2021/630}, } @misc{cryptoeprint:2021:631, author = {Felix Engelmann and Lukas Müller and Andreas Peter and Frank Kargl and Christoph Bösch}, title = {SwapCT: Swap Confidential Transactions for Privacy-Preserving Multi-Token Exchanges}, howpublished = {Cryptology ePrint Archive, Report 2021/631}, year = {2021}, url = {https://eprint.iacr.org/2021/631}, } @misc{cryptoeprint:2021:632, author = {Jan Camenisch and Manu Drijvers and Timo Hanke and Yvonne-Anne Pignolet and Victor Shoup and Dominic Williams}, title = {Internet Computer Consensus}, howpublished = {Cryptology ePrint Archive, Report 2021/632}, year = {2021}, url = {https://eprint.iacr.org/2021/632}, } @misc{cryptoeprint:2021:633, author = {Gustavo Banegas and Daniel J. Bernstein and Fabio Campos and Tung Chou and Tanja Lange and Michael Meyer and Benjamin Smith and Jana Sotáková}, title = {CTIDH: faster constant-time CSIDH}, howpublished = {Cryptology ePrint Archive, Report 2021/633}, year = {2021}, url = {https://eprint.iacr.org/2021/633}, } @misc{cryptoeprint:2021:634, author = {Jakub Klemsa}, title = {Setting Up Efficient TFHE Parameters for Multivalue Plaintexts and Multiple Additions}, howpublished = {Cryptology ePrint Archive, Report 2021/634}, year = {2021}, url = {https://eprint.iacr.org/2021/634}, } @misc{cryptoeprint:2021:635, author = {Ripon Patgiri}, title = {symKrypt: A General-purpose and Lightweight Symmetric-Key Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2021/635}, year = {2021}, url = {https://eprint.iacr.org/2021/635}, } @misc{cryptoeprint:2021:636, author = {Akinori Kawachi and Harumichi Nishimura}, title = {Communication Complexity of Private simultaneous Quantum Messages Protocols}, howpublished = {Cryptology ePrint Archive, Report 2021/636}, year = {2021}, url = {https://eprint.iacr.org/2021/636}, } @misc{cryptoeprint:2021:637, author = {Yevgeniy Dodis and Kevin Yeo}, title = {Doubly-Affine Extractors, and their Applications}, howpublished = {Cryptology ePrint Archive, Report 2021/637}, year = {2021}, url = {https://eprint.iacr.org/2021/637}, } @misc{cryptoeprint:2021:638, author = {Ioanna Karantaidou and Foteini Baldimtsi}, title = {Efficient Constructions of Pairing Based Accumulators}, howpublished = {Cryptology ePrint Archive, Report 2021/638}, year = {2021}, url = {https://eprint.iacr.org/2021/638}, } @misc{cryptoeprint:2021:639, author = {Charalampos Papamanthou and Cong Zhang and Hong-Sheng Zhou}, title = {Indifferentiable Signatures: High Performance and Fallback Security}, howpublished = {Cryptology ePrint Archive, Report 2021/639}, year = {2021}, url = {https://eprint.iacr.org/2021/639}, } @misc{cryptoeprint:2021:640, author = {Marc Schink and Alexander Wagner and Florian Unterstein and Johann Heyszl}, title = {Security and Trust in Open Source Security Tokens}, howpublished = {Cryptology ePrint Archive, Report 2021/640}, year = {2021}, url = {https://eprint.iacr.org/2021/640}, } @misc{cryptoeprint:2021:641, author = {William Zhang and Yu Xia}, title = {Hydra: Succinct Fully Pipelineable Interactive Arguments of Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2021/641}, year = {2021}, url = {https://eprint.iacr.org/2021/641}, } @misc{cryptoeprint:2021:642, author = {Nihal Vatandas and Rosario Gennaro and Bertrand Ithurburn and Hugo Krawczyk}, title = {On the Cryptographic Deniability of the Signal Protocol}, howpublished = {Cryptology ePrint Archive, Report 2021/642}, year = {2021}, url = {https://eprint.iacr.org/2021/642}, } @misc{cryptoeprint:2021:643, author = {Muhammad ElSheikh and Amr M. Youssef}, title = {On MILP-based Automatic Search for Bit-Based Division Property for Ciphers with (large) Linear Layers}, howpublished = {Cryptology ePrint Archive, Report 2021/643}, year = {2021}, url = {https://eprint.iacr.org/2021/643}, } @misc{cryptoeprint:2021:644, author = {Christopher Battarbee and Delaram Kahrobaei and Siamak F. Shahandashti}, title = {Cryptanalysis of Semidirect Product Key Exchange Using Matrices Over Non-Commutative Rings}, howpublished = {Cryptology ePrint Archive, Report 2021/644}, year = {2021}, url = {https://eprint.iacr.org/2021/644}, } @misc{cryptoeprint:2021:645, author = {Alex May and Floyd Zweydinger}, title = {Legendre PRF (Multiple) Key Attacks and the Power of Preprocessing}, howpublished = {Cryptology ePrint Archive, Report 2021/645}, year = {2021}, url = {https://eprint.iacr.org/2021/645}, } @misc{cryptoeprint:2021:646, author = {Cihangir Tezcan}, title = {Optimization of Advanced Encryption Standard on Graphics Processing Units}, howpublished = {Cryptology ePrint Archive, Report 2021/646}, year = {2021}, url = {https://eprint.iacr.org/2021/646}, } @misc{cryptoeprint:2021:647, author = {Ripon Patgiri}, title = {privateDH: An Enhanced Diffie-Hellman Key-Exchange Protocol using RSA and AES Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2021/647}, year = {2021}, url = {https://eprint.iacr.org/2021/647}, } @misc{cryptoeprint:2021:648, author = {Mustafa Khairallah}, title = {Security of COFB against Chosen Ciphertext Attacks}, howpublished = {Cryptology ePrint Archive, Report 2021/648}, year = {2021}, url = {https://eprint.iacr.org/2021/648}, } @misc{cryptoeprint:2021:649, author = {Aurélien Dupin and Pierrick Méaux and Mélissa Rossi}, title = {On the Algebraic Immunity - Resiliency trade-off, implications for Goldreich's Pseudorandom Generator}, howpublished = {Cryptology ePrint Archive, Report 2021/649}, year = {2021}, url = {https://eprint.iacr.org/2021/649}, } @misc{cryptoeprint:2021:650, author = {Gilles Barthe and Benjamin Gregoire and Vincent Laporte and Swarn Priya}, title = {Structured Leakage and Applications to Cryptographic Constant-Time and Cost}, howpublished = {Cryptology ePrint Archive, Report 2021/650}, year = {2021}, url = {https://eprint.iacr.org/2021/650}, } @misc{cryptoeprint:2021:651, author = {Collin Chin and Howard Wu and Raymond Chu and Alessandro Coglio and Eric McCarthy and Eric Smith}, title = {Leo: A Programming Language for Formally Verified, Zero-Knowledge Applications}, howpublished = {Cryptology ePrint Archive, Report 2021/651}, year = {2021}, url = {https://eprint.iacr.org/2021/651}, } @misc{cryptoeprint:2021:652, author = {Arsalan Javeed and Cemal Yilmaz and Erkay Savas}, title = {Detector+: An Approach for Detecting, Isolating, and Preventing Timing Attacks}, howpublished = {Cryptology ePrint Archive, Report 2021/652}, year = {2021}, url = {https://eprint.iacr.org/2021/652}, } @misc{cryptoeprint:2021:653, author = {Behzad Abdolmaleki and Hamidreza Khoshakhlagh and Helger Lipmaa}, title = {Smooth Zero-Knowledge Hash Functions}, howpublished = {Cryptology ePrint Archive, Report 2021/653}, year = {2021}, url = {https://eprint.iacr.org/2021/653}, } @misc{cryptoeprint:2021:654, author = {Carlo Brunetta and Georgia Tsaloli and Bei Liang and Gustavo Banegas and Aikaterini Mitrokotsa}, title = {Non-Interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning}, howpublished = {Cryptology ePrint Archive, Report 2021/654}, year = {2021}, url = {https://eprint.iacr.org/2021/654}, } @misc{cryptoeprint:2021:655, author = {Morten Øygarden and Daniel Smith-Tone and Javier Verbel}, title = {On the Effect of Projection on Rank Attacks in Multivariate Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2021/655}, year = {2021}, url = {https://eprint.iacr.org/2021/655}, } @misc{cryptoeprint:2021:656, author = {Lingyue Qin and Xiaoyang Dong and Xiaoyun Wang and Keting Jia and Yunwen Liu}, title = {Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule: Applications to Boomerangs in SKINNY and ForkSkinny}, howpublished = {Cryptology ePrint Archive, Report 2021/656}, year = {2021}, url = {https://eprint.iacr.org/2021/656}, } @misc{cryptoeprint:2021:657, author = {Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar and Jenit Tomy}, title = {Locally Reconstructable Non-malleable Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2021/657}, year = {2021}, url = {https://eprint.iacr.org/2021/657}, } @misc{cryptoeprint:2021:658, author = {Prastudy Fauzi and Martha Norberg Hovd and Håvard Raddum}, title = {A Practical Adaptive Key Recovery Attack on the LGM (GSW-like) Cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2021/658}, year = {2021}, url = {https://eprint.iacr.org/2021/658}, } @misc{cryptoeprint:2021:659, author = {Mohammed Nabeel and Mohammed Ashraf and Eduardo Chielle and Nektarios G.Tsoutsos and Michail Maniatakos}, title = {Technical report: CoPHEE: Co-processor forPartially Homomorphic Encrypted Execution}, howpublished = {Cryptology ePrint Archive, Report 2021/659}, year = {2021}, url = {https://eprint.iacr.org/2021/659}, } @misc{cryptoeprint:2021:660, author = {Lei Fan and Jonathan Katz and Phuc Thai and Hong-Sheng Zhou}, title = {A Permissionless Proof-of-Stake Blockchain with Best-Possible Unpredictability}, howpublished = {Cryptology ePrint Archive, Report 2021/660}, year = {2021}, url = {https://eprint.iacr.org/2021/660}, } @misc{cryptoeprint:2021:661, author = {Ling Sun and Wei Wang and Meiqin Wang}, title = {Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives}, howpublished = {Cryptology ePrint Archive, Report 2021/661}, year = {2021}, url = {https://eprint.iacr.org/2021/661}, } @misc{cryptoeprint:2021:662, author = {Ruben Gonzalez and Andreas Hülsing and Matthias J. Kannwischer and Juliane Krämer and Tanja Lange and Marc Stöttinger and Elisabeth Waitz and Thom Wiggers and Bo-Yin Yang }, title = {Verifying Post-Quantum Signatures in 8 kB of RAM}, howpublished = {Cryptology ePrint Archive, Report 2021/662}, year = {2021}, url = {https://eprint.iacr.org/2021/662}, } @misc{cryptoeprint:2021:663, author = {Nils Albartus and Clemens Nasenberg and Florian Stolz and Marc Fyrbiak and Christof Paar and Russell Tessier}, title = {On the Design and Misuse of Microcoded (Embedded) Processors — A Cautionary Note}, howpublished = {Cryptology ePrint Archive, Report 2021/663}, year = {2021}, url = {https://eprint.iacr.org/2021/663}, } @misc{cryptoeprint:2021:664, author = {Handong Cui and Tsz Hon Yuen}, title = {A Trustless GQ Multi-Signature Scheme with Identifiable Abort}, howpublished = {Cryptology ePrint Archive, Report 2021/664}, year = {2021}, url = {https://eprint.iacr.org/2021/664}, } @misc{cryptoeprint:2021:665, author = {Pierrick Méaux}, title = {On the algebraic immunity of direct sum constructions}, howpublished = {Cryptology ePrint Archive, Report 2021/665}, year = {2021}, url = {https://eprint.iacr.org/2021/665}, } @misc{cryptoeprint:2021:666, author = {Ahad Niknia and Miguel Correia and Jaber Karimpour}, title = {Secure cloud-of-clouds storage with space-efficient secret sharing}, howpublished = {Cryptology ePrint Archive, Report 2021/666}, year = {2021}, url = {https://eprint.iacr.org/2021/666}, } @misc{cryptoeprint:2021:667, author = {Hyeokdong Kwon and Hyunjun Kim and Eum Si Woo and Minjoo Shim and Wai-Kong Lee and Zhi Hu and Hwajeong Seo}, title = {Optimized Implementation of SM4 on AVR Microcontrollers and ARM Processors}, howpublished = {Cryptology ePrint Archive, Report 2021/667}, year = {2021}, url = {https://eprint.iacr.org/2021/667}, } @misc{cryptoeprint:2021:668, author = {Gyeongju Song and Kyungbae Jang and Hyunji Kim and Wai-Kong Lee and Zhi Hu and Hwajeong Seo}, title = {Grover on SM3}, howpublished = {Cryptology ePrint Archive, Report 2021/668}, year = {2021}, url = {https://eprint.iacr.org/2021/668}, } @misc{cryptoeprint:2021:669, author = {David Cerezo Sánchez}, title = {Pravuil: Global Consensus for a United World}, howpublished = {Cryptology ePrint Archive, Report 2021/669}, year = {2021}, url = {https://eprint.iacr.org/2021/669}, } @misc{cryptoeprint:2021:670, author = {Farid Javani and Alan T. Sherman}, title = {AOT: Anonymization by Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2021/670}, year = {2021}, url = {https://eprint.iacr.org/2021/670}, } @misc{cryptoeprint:2021:671, author = {Atsuki Momose and Ling Ren}, title = {Multi-Threshold Byzantine Fault Tolerance}, howpublished = {Cryptology ePrint Archive, Report 2021/671}, year = {2021}, url = {https://eprint.iacr.org/2021/671}, } @misc{cryptoeprint:2021:672, author = {Pedro Hecht}, title = {PQC: R-Propping a Chaotic Cellular Automata }, howpublished = {Cryptology ePrint Archive, Report 2021/672}, year = {2021}, url = {https://eprint.iacr.org/2021/672}, } @misc{cryptoeprint:2021:673, author = {Tianyi Liu and Xiang Xie and Yupeng Zhang}, title = {zkCNN: Zero Knowledge Proofs for Convolutional Neural Network Predictions and Accuracy}, howpublished = {Cryptology ePrint Archive, Report 2021/673}, year = {2021}, url = {https://eprint.iacr.org/2021/673}, } @misc{cryptoeprint:2021:674, author = {Jinyu Lu and Yunwen Liu and Tomer Ashur and and Chao Li}, title = {On the Effect of the Key-expansion Algorithm in Simon-like Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2021/674}, year = {2021}, url = {https://eprint.iacr.org/2021/674}, } @misc{cryptoeprint:2021:675, author = {Hector B. Hougaard}, title = {3-round Feistel is Not Superpseudorandom Over Any Group}, howpublished = {Cryptology ePrint Archive, Report 2021/675}, year = {2021}, url = {https://eprint.iacr.org/2021/675}, } @misc{cryptoeprint:2021:676, author = {Jesús-Javier Chi-Domínguez and Francisco Rodríguez-Henríquez and Benjamin Smith}, title = {Extending the GLS endomorphism to speed up GHS Weil descent using Magma}, howpublished = {Cryptology ePrint Archive, Report 2021/676}, year = {2021}, url = {https://eprint.iacr.org/2021/676}, } @misc{cryptoeprint:2021:677, author = {Paul Cotan and George Teseleanu}, title = {Generalized Galbraith's Test: Characterization and Applications to Anonymous IBE Schemes}, howpublished = {Cryptology ePrint Archive, Report 2021/677}, year = {2021}, url = {https://eprint.iacr.org/2021/677}, } @misc{cryptoeprint:2021:678, author = {Dmitrii Koshelev}, title = {Faster indifferentiable hashing to elliptic $\mathbb{F}_{\!q^2}$-curves}, howpublished = {Cryptology ePrint Archive, Report 2021/678}, year = {2021}, url = {https://eprint.iacr.org/2021/678}, } @misc{cryptoeprint:2021:679, author = {Avijit Dutta and Mridul Nandi and Suprita Talnikar}, title = {Permutation Based EDM: An Inverse Free BBB Secure PRF}, howpublished = {Cryptology ePrint Archive, Report 2021/679}, year = {2021}, url = {https://eprint.iacr.org/2021/679}, } @misc{cryptoeprint:2021:680, author = {Alexandru Ionita}, title = {Efficient Attribute Based Encryption for Boolean Circuits}, howpublished = {Cryptology ePrint Archive, Report 2021/680}, year = {2021}, url = {https://eprint.iacr.org/2021/680}, } @misc{cryptoeprint:2021:681, author = {Durba Chatterjee and Debdeep Mukhopadhyay and Aritra Hazra}, title = {Learnability of Multiplexer PUF and $S_N$-PUF : A Fourier-based Approach}, howpublished = {Cryptology ePrint Archive, Report 2021/681}, year = {2021}, url = {https://eprint.iacr.org/2021/681}, } @misc{cryptoeprint:2021:682, author = {Ian McQuoid and Mike Rosulek and Lawrence Roy}, title = {Batching Base Oblivious Transfers}, howpublished = {Cryptology ePrint Archive, Report 2021/682}, year = {2021}, url = {https://eprint.iacr.org/2021/682}, } @misc{cryptoeprint:2021:683, author = {Tânia Esteves and Mariana Miranda and João Paulo and Bernardo Portela}, title = {S2Dedup: SGX-enabled Secure Deduplication}, howpublished = {Cryptology ePrint Archive, Report 2021/683}, year = {2021}, url = {https://eprint.iacr.org/2021/683}, } @misc{cryptoeprint:2021:684, author = {Nicholas Brandt}, title = {Tight Setup Bounds for Identifiable Abort}, howpublished = {Cryptology ePrint Archive, Report 2021/684}, year = {2021}, url = {https://eprint.iacr.org/2021/684}, } @misc{cryptoeprint:2021:685, author = {Melissa Azouaoui and Kostas Papagiannopoulos and Dominik Zürner}, title = {Blind Side-Channel SIFA}, howpublished = {Cryptology ePrint Archive, Report 2021/685}, year = {2021}, url = {https://eprint.iacr.org/2021/685}, } @misc{cryptoeprint:2021:686, author = {Gabriel Kaptchuk and Tushar M. Jois and Matthew Green and Aviel Rubin}, title = {Meteor: Cryptographically Secure Steganography for Realistic Distributions}, howpublished = {Cryptology ePrint Archive, Report 2021/686}, year = {2021}, url = {https://eprint.iacr.org/2021/686}, } @misc{cryptoeprint:2021:687, author = {Hanshen Xiao and Srinivas Devadas}, title = {Towards Understanding Practical Randomness Beyond Noise: Differential Privacy and Mixup}, howpublished = {Cryptology ePrint Archive, Report 2021/687}, year = {2021}, url = {https://eprint.iacr.org/2021/687}, } @misc{cryptoeprint:2021:688, author = {Geoffroy Couteau and Shuichi Katsumata and Elahe Sadeghi and Bogdan Ursu}, title = {Statistical ZAPs from Group-Based Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2021/688}, year = {2021}, url = {https://eprint.iacr.org/2021/688}, } @misc{cryptoeprint:2021:689, author = {Ripon Patgiri}, title = {OSHA: A General-purpose One-way Secure Hash Algorithm}, howpublished = {Cryptology ePrint Archive, Report 2021/689}, year = {2021}, url = {https://eprint.iacr.org/2021/689}, } @misc{cryptoeprint:2021:690, author = {Aarushi Goel and Abhishek Jain and Manoj Prabhakaran and Rajeev Raghunath}, title = {On Communication Models and Best-Achievable Security in Two-Round MPC}, howpublished = {Cryptology ePrint Archive, Report 2021/690}, year = {2021}, url = {https://eprint.iacr.org/2021/690}, } @misc{cryptoeprint:2021:691, author = {Andrey Kim and Maxim Deryabin and Jieun Eom and Rakyong Choi and Yongwoo Lee and Whan Ghang and Donghoon Yoo}, title = {General Bootstrapping Approach for RLWE-based Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2021/691}, year = {2021}, url = {https://eprint.iacr.org/2021/691}, } @misc{cryptoeprint:2021:692, author = {Christoph Dobraunig and Daniel Kales and Christian Rechberger and Markus Schofnegger and Greg Zaverucha}, title = {Shorter Signatures Based on Tailor-Made Minimalist Symmetric-Key Crypto}, howpublished = {Cryptology ePrint Archive, Report 2021/692}, year = {2021}, url = {https://eprint.iacr.org/2021/692}, } @misc{cryptoeprint:2021:693, author = {Mark Fischer and Fabian Langer and Johannes Mono and Clemens Nasenberg and Nils Albartus}, title = {Hardware Penetration Testing Knocks Your SoCs Off}, howpublished = {Cryptology ePrint Archive, Report 2021/693}, year = {2021}, url = {https://eprint.iacr.org/2021/693}, } @misc{cryptoeprint:2021:694, author = {Ignacio Cascudo and Emanuele Giunta}, title = {On Interactive Oracle Proofs for Boolean R1CS Statements}, howpublished = {Cryptology ePrint Archive, Report 2021/694}, year = {2021}, url = {https://eprint.iacr.org/2021/694}, } @misc{cryptoeprint:2021:695, author = {Atsushi Takayasu}, title = {Adaptively Secure Lattice-based Revocable IBE in the QROM: Compact Parameters, Tight Security, and Anonymity}, howpublished = {Cryptology ePrint Archive, Report 2021/695}, year = {2021}, url = {https://eprint.iacr.org/2021/695}, } @misc{cryptoeprint:2021:696, author = {Edward Eaton and Douglas Stebila}, title = {The "quantum annoying" property of password-authenticated key exchange protocols}, howpublished = {Cryptology ePrint Archive, Report 2021/696}, year = {2021}, url = {https://eprint.iacr.org/2021/696}, } @misc{cryptoeprint:2021:697, author = {Deepak Maram and Iddo Bentov and Mahimna Kelkar and Ari Juels}, title = {GoAT: File Geolocation via Anchor Timestamping}, howpublished = {Cryptology ePrint Archive, Report 2021/697}, year = {2021}, url = {https://eprint.iacr.org/2021/697}, } @misc{cryptoeprint:2021:698, author = {Masahito Ishizaka and Shinsaku Kiyomoto}, title = {Multi-Dimensional Sub/Super-Range Signatures}, howpublished = {Cryptology ePrint Archive, Report 2021/698}, year = {2021}, url = {https://eprint.iacr.org/2021/698}, } @misc{cryptoeprint:2021:699, author = {Hiroshi Onuki and Tomoki Moriya}, title = {Radical Isogenies on Montgomery Curves}, howpublished = {Cryptology ePrint Archive, Report 2021/699}, year = {2021}, url = {https://eprint.iacr.org/2021/699}, } @misc{cryptoeprint:2021:700, author = {Robi Pedersen}, title = {DeCSIDH: Delegating isogeny computations in the CSIDH setting}, howpublished = {Cryptology ePrint Archive, Report 2021/700}, year = {2021}, url = {https://eprint.iacr.org/2021/700}, } @misc{cryptoeprint:2021:701, author = {Samir Bouftass.}, title = {Multidimentional ModDiv public key cryptosystem.}, howpublished = {Cryptology ePrint Archive, Report 2021/701}, year = {2021}, url = {https://eprint.iacr.org/2021/701}, } @misc{cryptoeprint:2021:702, author = {Colin Boyd and Gareth T. Davies and Bor de Kock and Kai Gellert and Tibor Jager and Lise Millerjord}, title = {Symmetric Key Exchange with Full Forward Security and Robust Synchronization}, howpublished = {Cryptology ePrint Archive, Report 2021/702}, year = {2021}, url = {https://eprint.iacr.org/2021/702}, } @misc{cryptoeprint:2021:703, author = {Zhenzhen Bao and Jian Guo and Shun Li and Phuong Pham}, title = {Quantum Multi-Collision Distinguishers}, howpublished = {Cryptology ePrint Archive, Report 2021/703}, year = {2021}, url = {https://eprint.iacr.org/2021/703}, } @misc{cryptoeprint:2021:704, author = {Elli Androulaki and Ilie Circiumaru and Jesus Diaz Vico and Miguel Prada and Alessandro Sorniotti and Marc Stoecklin and Marko Vukolic and Marie Wallace}, title = {IBM Digital Health Pass Whitepaper: A Privacy-Respectful Platform for Proving Health Status }, howpublished = {Cryptology ePrint Archive, Report 2021/704}, year = {2021}, url = {https://eprint.iacr.org/2021/704}, } @misc{cryptoeprint:2021:705, author = {Yi Chen and Hongbo Yu}, title = {Bridging Machine Learning and Cryptanalysis via EDLCT}, howpublished = {Cryptology ePrint Archive, Report 2021/705}, year = {2021}, url = {https://eprint.iacr.org/2021/705}, } @misc{cryptoeprint:2021:706, author = {Andrea Basso and Péter Kutas and Simon-Philipp Merz and Christophe Petit and Antonio Sanso}, title = {Cryptanalysis of an oblivious PRF from supersingular isogenies}, howpublished = {Cryptology ePrint Archive, Report 2021/706}, year = {2021}, url = {https://eprint.iacr.org/2021/706}, } @misc{cryptoeprint:2021:707, author = {Gabrielle De Micheli and Pierrick Gaudry and Cécile Pierrot}, title = {Lattice Enumeration for Tower NFS: a 521-bit Discrete Logarithm Computation}, howpublished = {Cryptology ePrint Archive, Report 2021/707}, year = {2021}, url = {https://eprint.iacr.org/2021/707}, } @misc{cryptoeprint:2021:708, author = {Paul Grubbs and Varun Maram and Kenneth G. Paterson}, title = {Anonymous, Robust Post-Quantum Public Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2021/708}, year = {2021}, url = {https://eprint.iacr.org/2021/708}, } @misc{cryptoeprint:2021:709, author = {Rishab Goyal and Ridwan Syed and Brent Waters}, title = {Bounded Collusion ABE for TMs from IBE}, howpublished = {Cryptology ePrint Archive, Report 2021/709}, year = {2021}, url = {https://eprint.iacr.org/2021/709}, } @misc{cryptoeprint:2021:710, author = {Yuncong Zhang and Ren Zhang and Geng Wang and Dawu Gu}, title = {VCProof: Constructing Shorter and Faster-to-Verify zkSNARKs with Vector Oracles}, howpublished = {Cryptology ePrint Archive, Report 2021/710}, year = {2021}, url = {https://eprint.iacr.org/2021/710}, } @misc{cryptoeprint:2021:711, author = {Joppe W. Bos and Maximilian Ofner and Joost Renes and Tobias Schneider and Christine van Vredendaal}, title = {The Matrix Reloaded: Multiplication Strategies in FrodoKEM}, howpublished = {Cryptology ePrint Archive, Report 2021/711}, year = {2021}, url = {https://eprint.iacr.org/2021/711}, } @misc{cryptoeprint:2021:712, author = {Anubhab Baksi and Shivam Bhasin and Jakub Breier and Mustafa Khairallah and Thomas Peyrin and Sumanta Sarkar and Siang Meng Sim}, title = {DEFAULT: Cipher Level Resistance Against Differential Fault Attack}, howpublished = {Cryptology ePrint Archive, Report 2021/712}, year = {2021}, url = {https://eprint.iacr.org/2021/712}, } @misc{cryptoeprint:2021:713, author = {Elie Bouscatié and Guilhem Castagnos and Olivier Sanders}, title = {Public Key Encryption with Flexible Pattern Matching}, howpublished = {Cryptology ePrint Archive, Report 2021/713}, year = {2021}, url = {https://eprint.iacr.org/2021/713}, } @misc{cryptoeprint:2021:714, author = {Afifa Ishtiaq and Dr. Muhammad Shafique and Dr. Osman Hassan}, title = {CARiMoL: A Configurable Hardware Accelerator for Ringand Module Lattice-Based Post-Quantum Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2021/714}, year = {2021}, url = {https://eprint.iacr.org/2021/714}, } @misc{cryptoeprint:2021:715, author = {Dionysis Zindros}, title = {Hours of Horus: Keyless Cryptocurrency Wallets}, howpublished = {Cryptology ePrint Archive, Report 2021/715}, year = {2021}, url = {https://eprint.iacr.org/2021/715}, } @misc{cryptoeprint:2021:716, author = {Angèle Bossuat and Raphael Bost and Pierre-Alain Fouque and Brice Minaud and Michael Reichle}, title = {SSE and SSD: Page-Efficient Searchable Symmetric Encryption}, howpublished = {Cryptology ePrint Archive, Report 2021/716}, year = {2021}, url = {https://eprint.iacr.org/2021/716}, } @misc{cryptoeprint:2021:717, author = {Lichao Wu and Yoo-Seung Won and Dirmanto Jap and Guilherme Perin and Shivam Bhasin and Stjepan Picek}, title = {Explain Some Noise: Ablation Analysis for Deep Learning-based Physical Side-channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2021/717}, year = {2021}, url = {https://eprint.iacr.org/2021/717}, } @misc{cryptoeprint:2021:718, author = {Prasanna Ravi and Martianus Frederic Ezerman and Shivam Bhasin and Anupam Chattopadhyay and Sujoy Sinha Roy}, title = {Generic Side-Channel Assisted Chosen-Ciphertext Attacks on Streamlined NTRU Prime}, howpublished = {Cryptology ePrint Archive, Report 2021/718}, year = {2021}, url = {https://eprint.iacr.org/2021/718}, } @misc{cryptoeprint:2021:719, author = {Zhenzhen Bao and Jian Guo and Meicheng Liu and Li Ma and Yi Tu}, title = {Conditional Differential-Neural Cryptanalysis}, howpublished = {Cryptology ePrint Archive, Report 2021/719}, year = {2021}, url = {https://eprint.iacr.org/2021/719}, } @misc{cryptoeprint:2021:720, author = {Łukasz Chmielewski and Léo Weissbart}, title = {On Reverse Engineering Neural Network Implementation on GPU}, howpublished = {Cryptology ePrint Archive, Report 2021/720}, year = {2021}, url = {https://eprint.iacr.org/2021/720}, } @misc{cryptoeprint:2021:721, author = {Sulamithe Tsakou and Sorina Ionica}, title = {Index Calculus Attacks on Hyperelliptic Jacobians with Effective Endomorphisms}, howpublished = {Cryptology ePrint Archive, Report 2021/721}, year = {2021}, url = {https://eprint.iacr.org/2021/721}, } @misc{cryptoeprint:2021:722, author = {Yusaku Maeda and Koji Nuida}, title = {Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2021/722}, year = {2021}, url = {https://eprint.iacr.org/2021/722}, } @misc{cryptoeprint:2021:723, author = {Haopeng Fan; Wenhao Wang; Yongjuan Wang }, title = {Cache attack on MISTY1}, howpublished = {Cryptology ePrint Archive, Report 2021/723}, year = {2021}, url = {https://eprint.iacr.org/2021/723}, } @misc{cryptoeprint:2021:724, author = {Mohammad Sadeq Dousti and Alptekin Küpçü}, title = {Tri-op redactable blockchains with block modification, removal, and insertion}, howpublished = {Cryptology ePrint Archive, Report 2021/724}, year = {2021}, url = {https://eprint.iacr.org/2021/724}, } @misc{cryptoeprint:2021:725, author = {Felix Günther and Patrick Towa}, title = {KEMTLS with Delayed Forward Identity Protection in (Almost) a Single Round Trip}, howpublished = {Cryptology ePrint Archive, Report 2021/725}, year = {2021}, url = {https://eprint.iacr.org/2021/725}, } @misc{cryptoeprint:2021:726, author = {Navid Nasr Esfahani and Douglas R. Stinson}, title = {Asymmetric All-or-nothing Transforms}, howpublished = {Cryptology ePrint Archive, Report 2021/726}, year = {2021}, url = {https://eprint.iacr.org/2021/726}, } @misc{cryptoeprint:2021:727, author = {Ghada Almashaqbeh and Ravital Solomon}, title = {SoK: Privacy-Preserving Computing in the Blockchain Era}, howpublished = {Cryptology ePrint Archive, Report 2021/727}, year = {2021}, url = {https://eprint.iacr.org/2021/727}, } @misc{cryptoeprint:2021:728, author = {Navid Alamati and Pedro Branco and Nico Döttling and Sanjam Garg and Mohammad Hajiabadi and Sihang Pu}, title = {Laconic Private Set Intersection and Applications}, howpublished = {Cryptology ePrint Archive, Report 2021/728}, year = {2021}, url = {https://eprint.iacr.org/2021/728}, } @misc{cryptoeprint:2021:729, author = {Ilaria Chillotti and Damien Ligier and Jean-Baptiste Orfila and Samuel Tap}, title = {Improved Programmable Bootstrapping with Larger Precision and Efficient Arithmetic Circuits for TFHE}, howpublished = {Cryptology ePrint Archive, Report 2021/729}, year = {2021}, url = {https://eprint.iacr.org/2021/729}, } @misc{cryptoeprint:2021:730, author = {Chenkai Weng and Kang Yang and Xiang Xie and Jonathan Katz and Xiao Wang}, title = {Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning}, howpublished = {Cryptology ePrint Archive, Report 2021/730}, year = {2021}, url = {https://eprint.iacr.org/2021/730}, } @misc{cryptoeprint:2021:731, author = {Christoph Dobraunig and Lorenzo Grassi and Lukas Helminger and Christian Rechberger and Markus Schofnegger and Roman Walch}, title = {Pasta: A Case for Hybrid Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2021/731}, year = {2021}, url = {https://eprint.iacr.org/2021/731}, } @misc{cryptoeprint:2021:732, author = {Congming Wei and Chenhao Wu and Ximing Fu and Xiaoyang Dong and Kai He and Jue Hong and Xiaoyun Wang}, title = {Preimage Attacks on 4-round Keccak by Solving Multivariate Quadratic Systems}, howpublished = {Cryptology ePrint Archive, Report 2021/732}, year = {2021}, url = {https://eprint.iacr.org/2021/732}, } @misc{cryptoeprint:2021:733, author = {Sergiu Carpov and Nicolas Gama and Mariya Georgieva and Dimitar Jetchev}, title = {GenoPPML – a framework for genomic privacy-preserving machine learning}, howpublished = {Cryptology ePrint Archive, Report 2021/733}, year = {2021}, url = {https://eprint.iacr.org/2021/733}, } @misc{cryptoeprint:2021:734, author = {Siemen Dhooghe and Svetla Nikova and Vincent Rijmen}, title = {First-Order Hardware Sharings of the AES}, howpublished = {Cryptology ePrint Archive, Report 2021/734}, year = {2021}, url = {https://eprint.iacr.org/2021/734}, } @misc{cryptoeprint:2021:735, author = {Diego F. Aranha and Sebastian Berndt and Thomas Eisenbarth and Okan Seker and Akira Takahashi and Luca Wilke and Greg Zaverucha}, title = {Side-Channel Protections for Picnic Signatures}, howpublished = {Cryptology ePrint Archive, Report 2021/735}, year = {2021}, url = {https://eprint.iacr.org/2021/735}, } @misc{cryptoeprint:2021:736, author = {Nuttapong Attrapadung and Koki Hamada and Dai Ikarashi and Ryo Kikuchi and Takahiro Matsuda and Ibuki Mishina and Hiraku Morita and Jacob C. N. Schuldt}, title = {Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation}, howpublished = {Cryptology ePrint Archive, Report 2021/736}, year = {2021}, url = {https://eprint.iacr.org/2021/736}, } @misc{cryptoeprint:2021:737, author = {Akiko Inoue and Kazuhiko Minematsu}, title = {GIFT-COFB is Tightly Birthday Secure with Encryption Queries}, howpublished = {Cryptology ePrint Archive, Report 2021/737}, year = {2021}, url = {https://eprint.iacr.org/2021/737}, } @misc{cryptoeprint:2021:738, author = {Nico Döttling and Dominik Hartmann and Dennis Hofheinz and Eike Kiltz and Sven Schäge and Bogdan Ursu}, title = {On the Impossibility of Short Algebraic Signatures}, howpublished = {Cryptology ePrint Archive, Report 2021/738}, year = {2021}, url = {https://eprint.iacr.org/2021/738}, } @misc{cryptoeprint:2021:739, author = {Tomer Ashur and Efrat Cohen and Carmit Hazay and Avishay Yanai}, title = {A New Framework for Garbled Circuits}, howpublished = {Cryptology ePrint Archive, Report 2021/739}, year = {2021}, url = {https://eprint.iacr.org/2021/739}, } @misc{cryptoeprint:2021:740, author = {Keita Xagawa}, title = {The Boneh-Katz Transformation, Revisited: Pseudorandom/Obliviously-Samplable PKE from Lattices and Codes and Its Application}, howpublished = {Cryptology ePrint Archive, Report 2021/740}, year = {2021}, url = {https://eprint.iacr.org/2021/740}, } @misc{cryptoeprint:2021:741, author = {Keita Xagawa}, title = {NTRU leads to Anonymous, Robust Public-Key Encryption}, howpublished = {Cryptology ePrint Archive, Report 2021/741}, year = {2021}, url = {https://eprint.iacr.org/2021/741}, } @misc{cryptoeprint:2021:742, author = {Dimitris Karakostas and Aggelos Kiayias and Mario Larangeira}, title = {Conclave: A Collective Stake Pool Protocol}, howpublished = {Cryptology ePrint Archive, Report 2021/742}, year = {2021}, url = {https://eprint.iacr.org/2021/742}, } @misc{cryptoeprint:2021:743, author = {Shumo Chu and Yu Xia and Zhenfei Zhang}, title = {Manta: a Plug and Play Private DeFi Stack}, howpublished = {Cryptology ePrint Archive, Report 2021/743}, year = {2021}, url = {https://eprint.iacr.org/2021/743}, } @misc{cryptoeprint:2021:744, author = {Antonin Leroux}, title = {Proofs of Isogeny Knowledge and Application to Post-quantum One-Time Verifiable Random Function}, howpublished = {Cryptology ePrint Archive, Report 2021/744}, year = {2021}, url = {https://eprint.iacr.org/2021/744}, } @misc{cryptoeprint:2021:745, author = {Gili Schul-Ganz and Gil Segev}, title = {Generic-Group Identity-Based Encryption: A Tight Impossibility Result}, howpublished = {Cryptology ePrint Archive, Report 2021/745}, year = {2021}, url = {https://eprint.iacr.org/2021/745}, } @misc{cryptoeprint:2021:746, author = {Nitin Pundir and Fahim Rahman and Farimah Farahmandi and Mark Tehranipoor}, title = {What is All the FaaS About? - Remote Exploitation of FPGA-as-a-Service Platforms}, howpublished = {Cryptology ePrint Archive, Report 2021/746}, year = {2021}, url = {https://eprint.iacr.org/2021/746}, } @misc{cryptoeprint:2021:747, author = {Aggelos Kiayias and Orfeas Stefanos Thyfronitis Litos}, title = {Elmo: Recursive Virtual Payment Channels for Bitcoin}, howpublished = {Cryptology ePrint Archive, Report 2021/747}, year = {2021}, url = {https://eprint.iacr.org/2021/747}, } @misc{cryptoeprint:2021:748, author = {Ke Wu and Gilad Asharov and Elaine Shi (random author ordering)}, title = {A Complete Characterization of Game-Theoretically Fair, Multi-Party Coin Toss}, howpublished = {Cryptology ePrint Archive, Report 2021/748}, year = {2021}, url = {https://eprint.iacr.org/2021/748}, } @misc{cryptoeprint:2021:749, author = {Mike Rosulek and Lawrence Roy}, title = {Three Halves Make a Whole? Beating the Half-Gates Lower Bound for Garbled Circuits}, howpublished = {Cryptology ePrint Archive, Report 2021/749}, year = {2021}, url = {https://eprint.iacr.org/2021/749}, } @misc{cryptoeprint:2021:750, author = {Carsten Baum and Lennart Braun and Alexander Munch-Hansen and Peter Scholl}, title = {Appenzeller to Brie: Efficient Zero-Knowledge Proofs for Mixed-Mode Arithmetic and $\mathbb{Z}_{2^k}$}, howpublished = {Cryptology ePrint Archive, Report 2021/750}, year = {2021}, url = {https://eprint.iacr.org/2021/750}, } @misc{cryptoeprint:2021:751, author = {Martin Hell and Thomas Johansson and Alexander Maximov and Willi Meier and Hirotaka Yoshida}, title = {Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction}, howpublished = {Cryptology ePrint Archive, Report 2021/751}, year = {2021}, url = {https://eprint.iacr.org/2021/751}, } @misc{cryptoeprint:2021:752, author = {Thomas Debris-Alazard and Maxime Remaud and Jean-Pierre Tillich }, title = {Quantum Reduction of Finding Short Code Vectors to the Decoding Problem}, howpublished = {Cryptology ePrint Archive, Report 2021/752}, year = {2021}, url = {https://eprint.iacr.org/2021/752}, } @misc{cryptoeprint:2021:753, author = {Abida Haque and Varun Madathil and Bradley Reaves and Alessandra Scafuro}, title = {Anonymous Device Authorization for Cellular Networks}, howpublished = {Cryptology ePrint Archive, Report 2021/753}, year = {2021}, url = {https://eprint.iacr.org/2021/753}, } @misc{cryptoeprint:2021:754, author = {Samuel Adams and Chaitali Choudhary and Martine De Cock and Rafael Dowsley and David Melanson and Anderson C. A. Nascimento and Davis Railsback and Jianwei Shen}, title = {Privacy-Preserving Training of Tree Ensembles over Continuous Data}, howpublished = {Cryptology ePrint Archive, Report 2021/754}, year = {2021}, url = {https://eprint.iacr.org/2021/754}, } @misc{cryptoeprint:2021:755, author = {Nishat Koti and Arpita Patra and Rahul Rachuri and Ajith Suresh}, title = {Tetrad: Actively Secure 4PC for Secure Training and Inference}, howpublished = {Cryptology ePrint Archive, Report 2021/755}, year = {2021}, url = {https://eprint.iacr.org/2021/755}, } @misc{cryptoeprint:2021:756, author = {Si Gao and Elisabeth Oswald}, title = {Leakage, leakage, leakage . . . models: How to determine what contributes to leakage}, howpublished = {Cryptology ePrint Archive, Report 2021/756}, year = {2021}, url = {https://eprint.iacr.org/2021/756}, } @misc{cryptoeprint:2021:757, author = {Jiaxin Wang Fang-Wei Fu}, title = {On the Dual of Generalized Bent Functions}, howpublished = {Cryptology ePrint Archive, Report 2021/757}, year = {2021}, url = {https://eprint.iacr.org/2021/757}, } @misc{cryptoeprint:2021:758, author = {Koji Nagata and Renata Wong and Do Ngoc Diep and Tadao Nakamura}, title = {Quantum cryptography based on an algorithm for determining simultaneously all the mappings of a Boolean function}, howpublished = {Cryptology ePrint Archive, Report 2021/758}, year = {2021}, url = {https://eprint.iacr.org/2021/758}, } @misc{cryptoeprint:2021:759, author = {Wenting Zheng and Ryan Deng and Weikeng Chen and Raluca Ada Popa and Aurojit Panda and Ion Stoica}, title = {Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning}, howpublished = {Cryptology ePrint Archive, Report 2021/759}, year = {2021}, url = {https://eprint.iacr.org/2021/759}, } @misc{cryptoeprint:2021:760, author = {Saravanan Vijayakumaran}, title = {Analysis of CryptoNote Transaction Graphs using the Dulmage-Mendelsohn Decomposition}, howpublished = {Cryptology ePrint Archive, Report 2021/760}, year = {2021}, url = {https://eprint.iacr.org/2021/760}, } @misc{cryptoeprint:2021:761, author = {Claude Carlet}, title = {Parameterization of Boolean functions by vectorial functions and associated constructions}, howpublished = {Cryptology ePrint Archive, Report 2021/761}, year = {2021}, url = {https://eprint.iacr.org/2021/761}, } @misc{cryptoeprint:2021:762, author = {Claude Carlet}, title = {A wide class of Boolean functions generalizing the hidden weight bit function}, howpublished = {Cryptology ePrint Archive, Report 2021/762}, year = {2021}, url = {https://eprint.iacr.org/2021/762}, } @misc{cryptoeprint:2021:763, author = {Mathy Vanhoef}, title = {Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation}, howpublished = {Cryptology ePrint Archive, Report 2021/763}, year = {2021}, url = {https://eprint.iacr.org/2021/763}, } @misc{cryptoeprint:2021:764, author = {Ran Canetti and Ari Karchmer}, title = {Covert Learning: How to Learn with an Untrusted Intermediary}, howpublished = {Cryptology ePrint Archive, Report 2021/764}, year = {2021}, url = {https://eprint.iacr.org/2021/764}, } @misc{cryptoeprint:2021:765, author = {Ghous Amjad and Sarvar Patel and Giuseppe Persiano and Kevin Yeo and Moti Yung}, title = {Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption}, howpublished = {Cryptology ePrint Archive, Report 2021/765}, year = {2021}, url = {https://eprint.iacr.org/2021/765}, } @misc{cryptoeprint:2021:766, author = {John Andrews and Michele Ciampi and Vassilis Zikas}, title = {Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum}, howpublished = {Cryptology ePrint Archive, Report 2021/766}, year = {2021}, url = {https://eprint.iacr.org/2021/766}, } @misc{cryptoeprint:2021:767, author = {Shashank Agrawal and Estuardo Alpirez Bock and Yilei Chen and Gaven Watson}, title = {White-box Cryptography with Device Binding from Token-based Obfuscation and more}, howpublished = {Cryptology ePrint Archive, Report 2021/767}, year = {2021}, url = {https://eprint.iacr.org/2021/767}, } @misc{cryptoeprint:2021:768, author = {Adi Akavia and Max Leibovich and Yehezkel S. Resheff and Roey Ron and Moni Shahar and Margarita Vald}, title = {Privacy-Preserving Decision Trees Training and Prediction}, howpublished = {Cryptology ePrint Archive, Report 2021/768}, year = {2021}, url = {https://eprint.iacr.org/2021/768}, } @misc{cryptoeprint:2021:769, author = {Jacquline Brendel and Rune Fiedler and Felix Günther and Christian Janson and Douglas Stebila}, title = {Post-quantum asynchronous deniable key exchange and the Signal handshake}, howpublished = {Cryptology ePrint Archive, Report 2021/769}, year = {2021}, url = {https://eprint.iacr.org/2021/769}, } @misc{cryptoeprint:2021:770, author = {Prasad Buddhavarapu and Benjamin M Case and Logan Gore and Andrew Knox and Payman Mohassel and Shubho Sengupta and Erik Taubeneck and Min Xue }, title = {Multi-key Private Matching for Compute}, howpublished = {Cryptology ePrint Archive, Report 2021/770}, year = {2021}, url = {https://eprint.iacr.org/2021/770}, } @misc{cryptoeprint:2021:771, author = {Jinhyun So and Ramy E. Ali and Basak Guler and Jiantao Jiao and Salman Avestimehr }, title = {Securing Secure Aggregation: Mitigating Multi-Round Privacy Leakage in Federated Learning}, howpublished = {Cryptology ePrint Archive, Report 2021/771}, year = {2021}, url = {https://eprint.iacr.org/2021/771}, } @misc{cryptoeprint:2021:772, author = {Emre Karabulut and Aydin Aysu}, title = {Falcon Down: Breaking Falcon Post-Quantum Signature Scheme through Side-Channel Attacks}, howpublished = {Cryptology ePrint Archive, Report 2021/772}, year = {2021}, url = {https://eprint.iacr.org/2021/772}, } @misc{cryptoeprint:2021:773, author = {Ripon Patgiri}, title = {HEX-BLOOM: An Alternative to the Merkle Tree}, howpublished = {Cryptology ePrint Archive, Report 2021/773}, year = {2021}, url = {https://eprint.iacr.org/2021/773}, } @misc{cryptoeprint:2021:774, author = {Akinori Hosoyamada and Tetsu Iwata}, title = {On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model}, howpublished = {Cryptology ePrint Archive, Report 2021/774}, year = {2021}, url = {https://eprint.iacr.org/2021/774}, } @misc{cryptoeprint:2021:775, author = {Ran Cohen and Juan Garay and Vassilis Zikas}, title = {Adaptively Secure Broadcast in Resource-Restricted Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2021/775}, year = {2021}, url = {https://eprint.iacr.org/2021/775}, } @misc{cryptoeprint:2021:776, author = {Gang Wang}, title = {SoK: Applying Blockchain Technology in Industrial Internet of Things}, howpublished = {Cryptology ePrint Archive, Report 2021/776}, year = {2021}, url = {https://eprint.iacr.org/2021/776}, } @misc{cryptoeprint:2021:777, author = {Sourav Das and Zhuolun Xiang and Ling Ren}, title = {Asynchronous Data Dissemination and its Applications}, howpublished = {Cryptology ePrint Archive, Report 2021/777}, year = {2021}, url = {https://eprint.iacr.org/2021/777}, } @misc{cryptoeprint:2021:778, author = {Xinyuan Qian and Wenyuan Wu}, title = {Efficient secret key reusing attribute-based encryption from lattices}, howpublished = {Cryptology ePrint Archive, Report 2021/778}, year = {2021}, url = {https://eprint.iacr.org/2021/778}, } @misc{cryptoeprint:2021:779, author = {Peter Schwabe and Douglas Stebila and Thom Wiggers}, title = {More efficient post-quantum KEMTLS with pre-distributed public keys}, howpublished = {Cryptology ePrint Archive, Report 2021/779}, year = {2021}, url = {https://eprint.iacr.org/2021/779}, } @misc{cryptoeprint:2021:780, author = {Katie Liszewski and Tim McDonley and Josh Delozier and Andrew Elliott and Dylan Jones and Matt Sutter and Adam Kimura}, title = {Netlist Decompilation Workflow for Recovered Design Verification, Validation, and Assurance}, howpublished = {Cryptology ePrint Archive, Report 2021/780}, year = {2021}, url = {https://eprint.iacr.org/2021/780}, } @misc{cryptoeprint:2021:781, author = {Gustavo Banegas and Koen Zandberg and Adrian Herrmann and Emmanuel Baccelli and Benjamin Smith}, title = {Quantum-Resistant Security for Software Updates on Low-power Networked Embedded Devices}, howpublished = {Cryptology ePrint Archive, Report 2021/781}, year = {2021}, url = {https://eprint.iacr.org/2021/781}, } @misc{cryptoeprint:2021:782, author = {Tristan Nemoz and Alexei Zamyatin}, title = {On the deployment of FlyClient as a velvet fork: chain-sewing attacks and countermeasures}, howpublished = {Cryptology ePrint Archive, Report 2021/782}, year = {2021}, url = {https://eprint.iacr.org/2021/782}, } @misc{cryptoeprint:2021:783, author = {Joon-Woo Lee and HyungChul Kang and Yongwoo Lee and Woosuk Choi and Jieun Eom and Maxim Deryabin and Eunsang Lee and Junghyun Lee and Donghoon Yoo and Young-Sik Kim and Jong-Seon No}, title = {Privacy-Preserving Machine Learning with Fully Homomorphic Encryption for Deep Neural Network}, howpublished = {Cryptology ePrint Archive, Report 2021/783}, year = {2021}, url = {https://eprint.iacr.org/2021/783}, } @misc{cryptoeprint:2021:784, author = {Ignacio Fernández-Hernández and Tomer Ashur and Vincent Rijmen}, title = {Analysis and Recommendations for MAC and Key Lengths in Delayed Disclosure GNSS Authentication Protocols}, howpublished = {Cryptology ePrint Archive, Report 2021/784}, year = {2021}, url = {https://eprint.iacr.org/2021/784}, } @misc{cryptoeprint:2021:785, author = {Elena Kirshanova and Thijs Laarhoven}, title = {Lower bounds on lattice sieving and information set decoding}, howpublished = {Cryptology ePrint Archive, Report 2021/785}, year = {2021}, url = {https://eprint.iacr.org/2021/785}, } @misc{cryptoeprint:2021:786, author = {Yongjun Zhao and Huaxiong Wang and Kwok-Yan Lam}, title = {Volume-Hiding Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy}, howpublished = {Cryptology ePrint Archive, Report 2021/786}, year = {2021}, url = {https://eprint.iacr.org/2021/786}, } @misc{cryptoeprint:2021:787, author = {Sven Heiberg and Kristjan Krips and Jan Willemson}, title = {Mobile Voting -- Still Too Risky?}, howpublished = {Cryptology ePrint Archive, Report 2021/787}, year = {2021}, url = {https://eprint.iacr.org/2021/787}, } @misc{cryptoeprint:2021:788, author = {Yael Tauman Kalai and Vinod Vaikuntanathan and Rachel Yun Zhang}, title = {Somewhere Statistical Soundness, Post-Quantum Security, and SNARGs for P}, howpublished = {Cryptology ePrint Archive, Report 2021/788}, year = {2021}, url = {https://eprint.iacr.org/2021/788}, } @misc{cryptoeprint:2021:789, author = {Jongkil Kim and Seyit Camtepe and Joonsang Baek and Willy Susilo and Josef Pieprzyk and Surya Nepal}, title = {P2DPI: Practical and Privacy-Preserving Deep Packet Inspection}, howpublished = {Cryptology ePrint Archive, Report 2021/789}, year = {2021}, url = {https://eprint.iacr.org/2021/789}, } @misc{cryptoeprint:2021:790, author = {Amund Askeland and Sondre Rønjom}, title = {A Side-Channel Assisted Attack on NTRU}, howpublished = {Cryptology ePrint Archive, Report 2021/790}, year = {2021}, url = {https://eprint.iacr.org/2021/790}, } @misc{cryptoeprint:2021:791, author = {Akashdeep Saha and Urbi Chatterjee and Debdeep Mukhopadhyay and Rajat Subhra Chakraborty}, title = {Open Sesame: A Novel Non-SAT-Attack against CAS-Lock}, howpublished = {Cryptology ePrint Archive, Report 2021/791}, year = {2021}, url = {https://eprint.iacr.org/2021/791}, } @misc{cryptoeprint:2021:792, author = {Madhurima Mukhopadhyay and Palash Sarkar}, title = {Pseudo-Random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group Computation}, howpublished = {Cryptology ePrint Archive, Report 2021/792}, year = {2021}, url = {https://eprint.iacr.org/2021/792}, } @misc{cryptoeprint:2021:793, author = {Nils Fleischhacker and Kasper Green Larsen and Mark Simkin}, title = {Property-Preserving Hash Functions from Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2021/793}, year = {2021}, url = {https://eprint.iacr.org/2021/793}, } @misc{cryptoeprint:2021:794, author = {Si Gao and Elisabeth Oswald and Dan Page}, title = {Reverse Engineering the Micro-Architectural Leakage Features of a Commercial Processor}, howpublished = {Cryptology ePrint Archive, Report 2021/794}, year = {2021}, url = {https://eprint.iacr.org/2021/794}, } @misc{cryptoeprint:2021:795, author = {Wei Jiang}, title = {Transforming Secure Comparison Protocol from Passive to Active Adversary Model}, howpublished = {Cryptology ePrint Archive, Report 2021/795}, year = {2021}, url = {https://eprint.iacr.org/2021/795}, } @misc{cryptoeprint:2021:796, author = {Karim Eldefrawy and Julian Loss and Ben Terner}, title = {How Byzantine is a Send Corruption?}, howpublished = {Cryptology ePrint Archive, Report 2021/796}, year = {2021}, url = {https://eprint.iacr.org/2021/796}, } @misc{cryptoeprint:2021:797, author = {Tim Heldmann and Thomas Schneider and Oleksandr Tkachenko and Christian Weinert and Hossein Yalame}, title = {LLVM-based Circuit Compilation for Practical Secure Computation}, howpublished = {Cryptology ePrint Archive, Report 2021/797}, year = {2021}, url = {https://eprint.iacr.org/2021/797}, } @misc{cryptoeprint:2021:798, author = {Pierre Civit and Maria Potop-Butucaru}, title = {Probabilistic Dynamic Input Output Automata}, howpublished = {Cryptology ePrint Archive, Report 2021/798}, year = {2021}, url = {https://eprint.iacr.org/2021/798}, } @misc{cryptoeprint:2021:799, author = {Martin Albrecht and Léo Ducas}, title = {Lattice Attacks on NTRU and LWE: A History of Refinements}, howpublished = {Cryptology ePrint Archive, Report 2021/799}, year = {2021}, url = {https://eprint.iacr.org/2021/799}, } @misc{cryptoeprint:2021:800, author = {Leemon Baird and Pratyay Mukherjee and Rohit Sinha}, title = {TEMP: Time-locked Encryption Made Practical}, howpublished = {Cryptology ePrint Archive, Report 2021/800}, year = {2021}, url = {https://eprint.iacr.org/2021/800}, } @misc{cryptoeprint:2021:801, author = {Mohammad Hassan Ameri and Alexander R. Block and Jeremiah Blocki}, title = {Memory-Hard Puzzles in the Standard Model with Applications to Memory-Hard Functions and Resource-Bounded Locally Decodable Codes}, howpublished = {Cryptology ePrint Archive, Report 2021/801}, year = {2021}, url = {https://eprint.iacr.org/2021/801}, } @misc{cryptoeprint:2021:802, author = {Divesh Aggarwal and Eldon Chung and Maciej Obremski and Joao Ribeiro}, title = {On Secret Sharing, Randomness, and Random-less Reductions for Secret Sharing}, howpublished = {Cryptology ePrint Archive, Report 2021/802}, year = {2021}, url = {https://eprint.iacr.org/2021/802}, } @misc{cryptoeprint:2021:803, author = {Adi Akavia and Margarita Vald}, title = {On the Privacy of Protocols based on CPA-Secure Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2021/803}, year = {2021}, url = {https://eprint.iacr.org/2021/803}, } @misc{cryptoeprint:2021:804, author = {Timothy Shelton}, title = {A Note on ``Reduction Modulo $2^{448}-2^{224}-1$''}, howpublished = {Cryptology ePrint Archive, Report 2021/804}, year = {2021}, url = {https://eprint.iacr.org/2021/804}, } @misc{cryptoeprint:2021:805, author = {Peter Gaži and Ling Ren and Alexander Russell}, title = {Practical Settlement Bounds for Proof-of-Work Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2021/805}, year = {2021}, url = {https://eprint.iacr.org/2021/805}, } @misc{cryptoeprint:2021:806, author = {Jonathan Katz and Julian Loss and Michael Rosenberg}, title = {Boosting the Security of Blind Signature Schemes}, howpublished = {Cryptology ePrint Archive, Report 2021/806}, year = {2021}, url = {https://eprint.iacr.org/2021/806}, } @misc{cryptoeprint:2021:807, author = {Arka Rai Choudhuri and Abhishek Jain and Zhengzhong Jin}, title = {Non-Interactive Batch Arguments for NP from Standard Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2021/807}, year = {2021}, url = {https://eprint.iacr.org/2021/807}, } @misc{cryptoeprint:2021:808, author = {Arka Rai Choudhuri and Abhishek Jain and Zhengzhong Jin}, title = {SNARGs for $\mathcal{P}$ from LWE}, howpublished = {Cryptology ePrint Archive, Report 2021/808}, year = {2021}, url = {https://eprint.iacr.org/2021/808}, } @misc{cryptoeprint:2021:809, author = {Aditya Hegde and Helen Möllering and Thomas Schneider and Hossein Yalame}, title = {SoK: Efficient Privacy-preserving Clustering}, howpublished = {Cryptology ePrint Archive, Report 2021/809}, year = {2021}, url = {https://eprint.iacr.org/2021/809}, } @misc{cryptoeprint:2021:810, author = {Yingzi Gao and Yuan Lu and Zhenliang Lu and Qiang Tang and Jing Xu and Zhenfeng Zhang}, title = {Efficient Asynchronous Byzantine Agreement without Private Setups}, howpublished = {Cryptology ePrint Archive, Report 2021/810}, year = {2021}, url = {https://eprint.iacr.org/2021/810}, } @misc{cryptoeprint:2021:811, author = {Shruthi Gorantala and Rob Springer and Sean Purser-Haskell and William Lam and Royce Wilson and Asra Ali and Eric P. Astor and Itai Zukerman and Sam Ruth and Christoph Dibak and Phillipp Schoppmann and Sasha Kulankhina and Alain Forget and David Marn and Cameron Tew and Rafael Misoczki and Bernat Guillen and Xinyu Ye and Dennis Kraft and Damien Desfontaines and Aishe Krishnamurthy and Miguel Guevara and Irippuge Milinda Perera and Yurii Sushko and Bryant Gipson}, title = {A General Purpose Transpiler for Fully Homomorphic Encryption}, howpublished = {Cryptology ePrint Archive, Report 2021/811}, year = {2021}, url = {https://eprint.iacr.org/2021/811}, } @misc{cryptoeprint:2021:812, author = {Elena Pagnin and Gunnar Gunnarsson and Pedram Talebi and Claudio Orlandi and Andrei Sabelfeld:}, title = {TOPPool: Time-aware Optimized Privacy-Preserving Ridesharing}, howpublished = {Cryptology ePrint Archive, Report 2021/812}, year = {2021}, url = {https://eprint.iacr.org/2021/812}, } @misc{cryptoeprint:2021:813, author = {Frank Byszio and Dr. Klaus-Dieter Wirth and Dr. Kim Nguyen}, title = {Intelligent Composed Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2021/813}, year = {2021}, url = {https://eprint.iacr.org/2021/813}, } @misc{cryptoeprint:2021:814, author = {Matthias Fitzi and Chen-Da Liu-Zhang and Julian Loss}, title = {A New Way to Achieve Round-Efficient Byzantine Agreement}, howpublished = {Cryptology ePrint Archive, Report 2021/814}, year = {2021}, url = {https://eprint.iacr.org/2021/814}, } @misc{cryptoeprint:2021:815, author = {Tim Beyne}, title = {Linear Cryptanalysis of FF3-1 and FEA}, howpublished = {Cryptology ePrint Archive, Report 2021/815}, year = {2021}, url = {https://eprint.iacr.org/2021/815}, } @misc{cryptoeprint:2021:816, author = {Alexandra Boldyreva and Tianxin Tang}, title = {Privacy-Preserving Approximate k-Nearest-Neighbors Search that Hides Access, Query and Volume Patterns}, howpublished = {Cryptology ePrint Archive, Report 2021/816}, year = {2021}, url = {https://eprint.iacr.org/2021/816}, } @misc{cryptoeprint:2021:817, author = {Olivier Bronchain and Gaëtan Cassiers and François-Xavier Standaert}, title = {Give Me 5 Minutes: Attacking ASCAD with a Single Side-Channel Trace}, howpublished = {Cryptology ePrint Archive, Report 2021/817}, year = {2021}, url = {https://eprint.iacr.org/2021/817}, } @misc{cryptoeprint:2021:818, author = {Hemi Leibowitz and Haitham Ghalwash and Ewa Syta and Amir Herzberg}, title = {CTng: Secure Certificate and Revocation Transparency}, howpublished = {Cryptology ePrint Archive, Report 2021/818}, year = {2021}, url = {https://eprint.iacr.org/2021/818}, } @misc{cryptoeprint:2021:819, author = {Christof Beierle and Patrick Derbez and Gregor Leander and Gaëtan Leurent and Håvard Raddum and Yann Rotella and David Rupprecht and Lukas Stennes}, title = {Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2}, howpublished = {Cryptology ePrint Archive, Report 2021/819}, year = {2021}, url = {https://eprint.iacr.org/2021/819}, } @misc{cryptoeprint:2021:820, author = {Marek Broll and Federico Canale and Nicolas David and Antonio Florez-Gutierrez and Gregor Leander and María Naya-Plasencia and Yosuke Todo}, title = {Further Improving Differential-Linear Attacks: Applications to Chaskey and Serpent}, howpublished = {Cryptology ePrint Archive, Report 2021/820}, year = {2021}, url = {https://eprint.iacr.org/2021/820}, } @misc{cryptoeprint:2021:821, author = {Alice Pellet-Mary and Damien Stehlé}, title = {On the hardness of the NTRU problem}, howpublished = {Cryptology ePrint Archive, Report 2021/821}, year = {2021}, url = {https://eprint.iacr.org/2021/821}, } @misc{cryptoeprint:2021:822, author = {Oriol Farràs and Jordi Ribes-González}, title = {One-out-of-$q$ OT Combiners}, howpublished = {Cryptology ePrint Archive, Report 2021/822}, year = {2021}, url = {https://eprint.iacr.org/2021/822}, } @misc{cryptoeprint:2021:823, author = {Daniel Günther and Maurice Heymann and Benny Pinkas and Thomas Schneider}, title = {GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications}, howpublished = {Cryptology ePrint Archive, Report 2021/823}, year = {2021}, url = {https://eprint.iacr.org/2021/823}, } @misc{cryptoeprint:2021:824, author = {Michel Abdalla and Manuel Barbosa and Peter B. Rønne and Peter Y.A. Ryan and Petra Šala}, title = {Security Characterization of J-PAKE and its Variants}, howpublished = {Cryptology ePrint Archive, Report 2021/824}, year = {2021}, url = {https://eprint.iacr.org/2021/824}, } @misc{cryptoeprint:2021:825, author = {Hannah Keller and Helen Möllering and Thomas Schneider and Hossein Yalame}, title = {Balancing Quality and Efficiency in Private Clustering with Affinity Propagation}, howpublished = {Cryptology ePrint Archive, Report 2021/825}, year = {2021}, url = {https://eprint.iacr.org/2021/825}, } @misc{cryptoeprint:2021:826, author = {Daniel J. Bernstein and Billy Bob Brumley and Ming-Shing Chen and Nicola Tuveri}, title = {OpenSSLNTRU: Faster post-quantum TLS key exchange}, howpublished = {Cryptology ePrint Archive, Report 2021/826}, year = {2021}, url = {https://eprint.iacr.org/2021/826}, } @misc{cryptoeprint:2021:827, author = {Suvadeep Hajra and Sayandeep Saha and Manaar Alam and Debdeep Mukhopadhyay}, title = {TransNet: Shift Invariant Transformer Network for Power Attack}, howpublished = {Cryptology ePrint Archive, Report 2021/827}, year = {2021}, url = {https://eprint.iacr.org/2021/827}, } @misc{cryptoeprint:2021:828, author = {Chitchanok Chuengsatiansup and Eyal Ronen and Gregory G. Rose and Yuval Yarom}, title = {Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung}, howpublished = {Cryptology ePrint Archive, Report 2021/828}, year = {2021}, url = {https://eprint.iacr.org/2021/828}, } @misc{cryptoeprint:2021:829, author = {Christof Beierle and Patrick Felke and Gregor Leander}, title = {To Shift or Not to Shift: Understanding GEA-1}, howpublished = {Cryptology ePrint Archive, Report 2021/829}, year = {2021}, url = {https://eprint.iacr.org/2021/829}, } @misc{cryptoeprint:2021:830, author = {Lars Tebelmann and Ulrich Kühne and Jean-Luc Danger and Michael Pehl}, title = {Analysis and Protection of the Two-metric Helper Data Scheme}, howpublished = {Cryptology ePrint Archive, Report 2021/830}, year = {2021}, url = {https://eprint.iacr.org/2021/830}, } @misc{cryptoeprint:2021:831, author = {Onur Gunlu and Matthieu Bloch and Rafael F. Schaefer}, title = {Private Remote Sources for Secure Multi-Function Computation}, howpublished = {Cryptology ePrint Archive, Report 2021/831}, year = {2021}, url = {https://eprint.iacr.org/2021/831}, } @misc{cryptoeprint:2021:832, author = {Cecilia Boschini and Dario Fiore and Elena Pagnin}, title = {On the Efficiency and Flexibility of Signature Verification}, howpublished = {Cryptology ePrint Archive, Report 2021/832}, year = {2021}, url = {https://eprint.iacr.org/2021/832}, } @misc{cryptoeprint:2021:833, author = {Vipul Goyal and Hanjun Li and Rafail Ostrovsky and Antigoni Polychroniadou and Yifan Song}, title = {ATLAS: Efficient and Scalable MPC in the Honest Majority Setting}, howpublished = {Cryptology ePrint Archive, Report 2021/833}, year = {2021}, url = {https://eprint.iacr.org/2021/833}, } @misc{cryptoeprint:2021:834, author = {Vipul Goyal and Antigoni Polychroniadou and Yifan Song}, title = {Unconditional Communication-Efficient MPC via Hall's Marriage Theorem}, howpublished = {Cryptology ePrint Archive, Report 2021/834}, year = {2021}, url = {https://eprint.iacr.org/2021/834}, } @misc{cryptoeprint:2021:835, author = {Sen Yuan and Milan Shen and Ilya Mironov and Anderson C. A. Nascimento}, title = {Practical, Label Private Deep Learning Trainingbased on Secure Multiparty Computation andDifferential Privacy}, howpublished = {Cryptology ePrint Archive, Report 2021/835}, year = {2021}, url = {https://eprint.iacr.org/2021/835}, } @misc{cryptoeprint:2021:836, author = {Xiao Liang and Omkant Pandey}, title = {Towards a Unified Approach to Black-Box Constructions of Zero-Knowledge Proofs}, howpublished = {Cryptology ePrint Archive, Report 2021/836}, year = {2021}, url = {https://eprint.iacr.org/2021/836}, } @misc{cryptoeprint:2021:837, author = {Luca Mariot and Stjepan Picek and Radinka Yorgova}, title = {On McEliece type cryptosystems using self-dual codes with large minimum weight}, howpublished = {Cryptology ePrint Archive, Report 2021/837}, year = {2021}, url = {https://eprint.iacr.org/2021/837}, } @misc{cryptoeprint:2021:838, author = {Pasan Tennakoon and Supipi Karunathilaka and Rishikeshan Lavakumar and Janaka Alawatugoda}, title = {Anonymous and Distributed Authentication for Peer-to-Peer Networks}, howpublished = {Cryptology ePrint Archive, Report 2021/838}, year = {2021}, url = {https://eprint.iacr.org/2021/838}, } @misc{cryptoeprint:2021:839, author = {Feng Hao}, title = {Prudent Practices in Security Standardization}, howpublished = {Cryptology ePrint Archive, Report 2021/839}, year = {2021}, url = {https://eprint.iacr.org/2021/839}, } @misc{cryptoeprint:2021:840, author = {Keita Xagawa and Akira Ito and Rei Ueno and Junko Takahashi and Naofumi Homma }, title = {Fault-Injection Attacks against NIST's Post-Quantum Cryptography Round 3 KEM Candidates}, howpublished = {Cryptology ePrint Archive, Report 2021/840}, year = {2021}, url = {https://eprint.iacr.org/2021/840}, } @misc{cryptoeprint:2021:841, author = {Robin Jadoul and Nigel P. Smart and Barry Van Leeuwen}, title = {MPC for $Q_2$ Access Structures over Rings and Fields}, howpublished = {Cryptology ePrint Archive, Report 2021/841}, year = {2021}, url = {https://eprint.iacr.org/2021/841}, } @misc{cryptoeprint:2021:842, author = {Liron Bronfman and Ron D. Rothblum}, title = {PCPs and Instance Compression from a Cryptographic Lens}, howpublished = {Cryptology ePrint Archive, Report 2021/842}, year = {2021}, url = {https://eprint.iacr.org/2021/842}, } @misc{cryptoeprint:2021:843, author = {Brandon Broadnax and Jeremias Mechler and Jörn Müller-Quade}, title = {Environmentally Friendly Composable Multi-Party Computation in the Plain Model from Standard (Timed) Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2021/843}, year = {2021}, url = {https://eprint.iacr.org/2021/843}, } @misc{cryptoeprint:2021:844, author = {Loïs Huguenin-Dumittan and Serge Vaudenay}, title = {A note on IND-qCCA security in the ROM and its applications}, howpublished = {Cryptology ePrint Archive, Report 2021/844}, year = {2021}, url = {https://eprint.iacr.org/2021/844}, } @misc{cryptoeprint:2021:845, author = {Roland Booth and Yanhong Xu and Sabyasachi Karati and Reihaneh Safavi-Naini}, title = {An Intermediate Secret-Guessing Attack on Hash-Based Signatures}, howpublished = {Cryptology ePrint Archive, Report 2021/845}, year = {2021}, url = {https://eprint.iacr.org/2021/845}, } @misc{cryptoeprint:2021:846, author = {Bronson Brooks Richard and Gary Waugh}, title = {Ergo Hackathon: Crowdfunded Smart Contract Pools Research and Conceptualization}, howpublished = {Cryptology ePrint Archive, Report 2021/846}, year = {2021}, url = {https://eprint.iacr.org/2021/846}, } @misc{cryptoeprint:2021:847, author = {Rachit Garg and Rishab Goyal and George Lu and Brent Waters}, title = {Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption}, howpublished = {Cryptology ePrint Archive, Report 2021/847}, year = {2021}, url = {https://eprint.iacr.org/2021/847}, } @misc{cryptoeprint:2021:848, author = {Shweta Agrawal and Monosij Maitra and Narasimha Sai Vempati and Shota Yamada}, title = {Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE}, howpublished = {Cryptology ePrint Archive, Report 2021/848}, year = {2021}, url = {https://eprint.iacr.org/2021/848}, } @misc{cryptoeprint:2021:849, author = {Rei Ueno and Keita Xagawa and Yutaro Tanaka and Akira Ito and Junko Takahashi and Naofumi Homma}, title = {Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs}, howpublished = {Cryptology ePrint Archive, Report 2021/849}, year = {2021}, url = {https://eprint.iacr.org/2021/849}, } @misc{cryptoeprint:2021:850, author = {Élise Tasso and Luca De Feo and Nadia El Mrabet and and Simon Pontié}, title = {Resistance of Isogeny-Based Cryptographic Implementations to a Fault Attack}, howpublished = {Cryptology ePrint Archive, Report 2021/850}, year = {2021}, url = {https://eprint.iacr.org/2021/850}, } @misc{cryptoeprint:2021:851, author = {Riccardo Longo and Chiara Spadafora}, title = {Multiple Candidates Coercion-Resistant Blockchain-Based E-Voting Protocol With Receipts}, howpublished = {Cryptology ePrint Archive, Report 2021/851}, year = {2021}, url = {https://eprint.iacr.org/2021/851}, } @misc{cryptoeprint:2021:852, author = {David Cash and Ruth Ng and Adam Rivkin}, title = {Improved Structured Encryption for SQL Databases via Hybrid Indexing}, howpublished = {Cryptology ePrint Archive, Report 2021/852}, year = {2021}, url = {https://eprint.iacr.org/2021/852}, } @misc{cryptoeprint:2021:853, author = {Varun Madathil and Alessandra Scafuro and István András Seres and Omer Shlomovits and Denis Varlakov}, title = {Private Signaling}, howpublished = {Cryptology ePrint Archive, Report 2021/853}, year = {2021}, url = {https://eprint.iacr.org/2021/853}, } @misc{cryptoeprint:2021:854, author = {Pedro Hecht}, title = {PQC: R-Propping of a Simple Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2021/854}, year = {2021}, url = {https://eprint.iacr.org/2021/854}, } @misc{cryptoeprint:2021:855, author = {Lukas Aumayr and Pedro Moreno-Sanchez and Aniket Kate and Matteo Maffei}, title = {Donner: UTXO-Based Virtual Channels Across Multiple Hops}, howpublished = {Cryptology ePrint Archive, Report 2021/855}, year = {2021}, url = {https://eprint.iacr.org/2021/855}, } @misc{cryptoeprint:2021:856, author = {Xiaoyang Dong and Lingyue Qin and Siwei Sun and Xiaoyun Wang}, title = {Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks}, howpublished = {Cryptology ePrint Archive, Report 2021/856}, year = {2021}, url = {https://eprint.iacr.org/2021/856}, } @misc{cryptoeprint:2021:857, author = {Qizhi Zhang and Bingsheng Zhang and Lichun Li and Shan Yin and Juanjuan Sun}, title = {Secure Computation for G-Module and its Applications}, howpublished = {Cryptology ePrint Archive, Report 2021/857}, year = {2021}, url = {https://eprint.iacr.org/2021/857}, } @misc{cryptoeprint:2021:858, author = {Aymeric Genêt and Natacha Linard de Guertechin and Novak Kaluđerović}, title = {Full key recovery side-channel attack against ephemeral SIKE on the Cortex-M4}, howpublished = {Cryptology ePrint Archive, Report 2021/858}, year = {2021}, url = {https://eprint.iacr.org/2021/858}, } @misc{cryptoeprint:2021:859, author = {Vahid Jahandideh}, title = {Concrete Evaluation of the Random Probing Security}, howpublished = {Cryptology ePrint Archive, Report 2021/859}, year = {2021}, url = {https://eprint.iacr.org/2021/859}, } @misc{cryptoeprint:2021:860, author = {Vahid Jahandideh}, title = {Verification of the security in Boolean masked circuits}, howpublished = {Cryptology ePrint Archive, Report 2021/860}, year = {2021}, url = {https://eprint.iacr.org/2021/860}, } @misc{cryptoeprint:2021:861, author = {Janaka Alawatugoda and Tatsuaki Okamoto}, title = {Standard Model Leakage-Resilient Authenticated Key Exchange using Inner-product Extractors}, howpublished = {Cryptology ePrint Archive, Report 2021/861}, year = {2021}, url = {https://eprint.iacr.org/2021/861}, } @misc{cryptoeprint:2021:862, author = {Yi Wang and Rongmao Chen and Guomin Yang and Xinyi Huang and Baosheng Wang and Moti Yung}, title = {Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved}, howpublished = {Cryptology ePrint Archive, Report 2021/862}, year = {2021}, url = {https://eprint.iacr.org/2021/862}, } @misc{cryptoeprint:2021:863, author = {Shuai Han and Tibor Jager and Eike Kiltz and Shengli Liu and Jiaxin Pan and Doreen Riepel and Sven Schäge}, title = {Authenticated Key Exchange and Signatures with Tight Security in the Standard Model}, howpublished = {Cryptology ePrint Archive, Report 2021/863}, year = {2021}, url = {https://eprint.iacr.org/2021/863}, } @misc{cryptoeprint:2021:864, author = {Nirvan Tyagi and Sofı́a Celi and Thomas Ristenpart and Nick Sullivan and Stefano Tessaro and Christopher A. Wood}, title = {A Fast and Simple Partially Oblivious PRF, with Applications}, howpublished = {Cryptology ePrint Archive, Report 2021/864}, year = {2021}, url = {https://eprint.iacr.org/2021/864}, } @misc{cryptoeprint:2021:865, author = {Iggy van Hoof and Elena Kirshanova and Alexander May}, title = {Quantum Key Search for Ternary LWE}, howpublished = {Cryptology ePrint Archive, Report 2021/865}, year = {2021}, url = {https://eprint.iacr.org/2021/865}, } @misc{cryptoeprint:2021:866, author = {Balthazar Bauer and Georg Fuchsbauer and Antoine Plouviez}, title = {The One-More Discrete Logarithm Assumption in the Generic Group Model}, howpublished = {Cryptology ePrint Archive, Report 2021/866}, year = {2021}, url = {https://eprint.iacr.org/2021/866}, } @misc{cryptoeprint:2021:867, author = {Cécile Delerablée and Lénaïck Gouriou and David Pointcheval}, title = {Key-Policy ABE with Delegation of Rights}, howpublished = {Cryptology ePrint Archive, Report 2021/867}, year = {2021}, url = {https://eprint.iacr.org/2021/867}, } @misc{cryptoeprint:2021:868, author = {Nicolai Müller and Thorben Moos and Amir Moradi}, title = {Low-Latency Hardware Masking of PRINCE}, howpublished = {Cryptology ePrint Archive, Report 2021/868}, year = {2021}, url = {https://eprint.iacr.org/2021/868}, } @misc{cryptoeprint:2021:869, author = {Panagiotis Chatzigiannis and Foteini Baldimtsi}, title = {MiniLedger: Compact-sized Anonymous and Auditable Distributed Payments}, howpublished = {Cryptology ePrint Archive, Report 2021/869}, year = {2021}, url = {https://eprint.iacr.org/2021/869}, } @misc{cryptoeprint:2021:870, author = {Jan Ferdinand Sauer and Alan Szepieniec}, title = {SoK: Gröbner Basis Algorithms for Arithmetization Oriented Ciphers}, howpublished = {Cryptology ePrint Archive, Report 2021/870}, year = {2021}, url = {https://eprint.iacr.org/2021/870}, } @misc{cryptoeprint:2021:871, author = {Vipul Goyal and Yifan Song and Akshayaram Srinivasan}, title = {Traceable Secret Sharing and Applications}, howpublished = {Cryptology ePrint Archive, Report 2021/871}, year = {2021}, url = {https://eprint.iacr.org/2021/871}, } @misc{cryptoeprint:2021:872, author = {David Chaum and Mario Larangeira and Mario Yaksetig and William Carter}, title = {W-OTS(+) up my Sleeve! A Hidden Secure Fallback for Cryptocurrency Wallets}, howpublished = {Cryptology ePrint Archive, Report 2021/872}, year = {2021}, url = {https://eprint.iacr.org/2021/872}, } @misc{cryptoeprint:2021:873, author = {Yanqi Gu and Stanislaw Jarecki and Hugo Krawczyk }, title = {KHAPE: Asymmetric PAKE from Key-Hiding Key Exchange}, howpublished = {Cryptology ePrint Archive, Report 2021/873}, year = {2021}, url = {https://eprint.iacr.org/2021/873}, } @misc{cryptoeprint:2021:874, author = {Bo-Yeon Sim and Aesun Park and Dong-Guk Han}, title = {Chosen-ciphertext Clustering Attack on CRYSTALS-KYBER using the Side-channel Leakage of Barrett Reduction}, howpublished = {Cryptology ePrint Archive, Report 2021/874}, year = {2021}, url = {https://eprint.iacr.org/2021/874}, } @misc{cryptoeprint:2021:875, author = {Sara Stadler and Vitor Sakaguti and Harjot Kaur and Anna Lena Fehlhaber}, title = {Hybrid Signal protocol for post-quantum email encryption}, howpublished = {Cryptology ePrint Archive, Report 2021/875}, year = {2021}, url = {https://eprint.iacr.org/2021/875}, } @misc{cryptoeprint:2021:876, author = {Onur Gunlu and Joerg Kliewer and Rafael F. Schaefer and Vladimir Sidorenko}, title = {Code Constructions and Bounds for Identification via Channels}, howpublished = {Cryptology ePrint Archive, Report 2021/876}, year = {2021}, url = {https://eprint.iacr.org/2021/876}, } @misc{cryptoeprint:2021:877, author = {Aritra Banerjee}, title = {A Fully Anonymous e-Voting Protocol Employing Universal zk-SNARKs and Smart Contracts}, howpublished = {Cryptology ePrint Archive, Report 2021/877}, year = {2021}, url = {https://eprint.iacr.org/2021/877}, } @misc{cryptoeprint:2021:878, author = {Yuan Yao and Pantea Kiaei and Richa Singh and Shahin Tajik and Patrick Schaumont}, title = {Programmable RO (PRO): A Multipurpose Countermeasure against Side-channel and Fault Injection Attacks}, howpublished = {Cryptology ePrint Archive, Report 2021/878}, year = {2021}, url = {https://eprint.iacr.org/2021/878}, } @misc{cryptoeprint:2021:879, author = {Zichen Gui and Kenneth G. Paterson and Sikhar Patranabis}, title = {Leakage Perturbation is Not Enough: Breaking Structured Encryption Using Simulated Annealing}, howpublished = {Cryptology ePrint Archive, Report 2021/879}, year = {2021}, url = {https://eprint.iacr.org/2021/879}, } @misc{cryptoeprint:2021:880, author = {Gaëtan Cassiers and Sebastian Faust and Maximilian Orlt and François-Xavier Standaert}, title = {Towards Tight Random Probing Security}, howpublished = {Cryptology ePrint Archive, Report 2021/880}, year = {2021}, url = {https://eprint.iacr.org/2021/880}, } @misc{cryptoeprint:2021:881, author = {Jayashree Dey and Ratna Dutta}, title = {Secure Code-Based Key Encapsulation Mechanism with Short Ciphertext and Secret Key}, howpublished = {Cryptology ePrint Archive, Report 2021/881}, year = {2021}, url = {https://eprint.iacr.org/2021/881}, } @misc{cryptoeprint:2021:882, author = {Hemanta K. Maji and Mingyuan Wang}, title = {Computational Hardness of Optimal FairComputation: Beyond Minicrypt}, howpublished = {Cryptology ePrint Archive, Report 2021/882}, year = {2021}, url = {https://eprint.iacr.org/2021/882}, } @misc{cryptoeprint:2021:883, author = {Gayathri Garimella and Benny Pinkas and Mike Rosulek and Ni Trieu and Avishay Yanai}, title = {Oblivious Key-Value Stores and Amplification for Private Set Intersection}, howpublished = {Cryptology ePrint Archive, Report 2021/883}, year = {2021}, url = {https://eprint.iacr.org/2021/883}, } @misc{cryptoeprint:2021:884, author = {Elias Rohrer and Florian Tschorsch}, title = {Blockchain Layer Zero: Characterizing the Bitcoin Network through Measurements, Models, and Simulations}, howpublished = {Cryptology ePrint Archive, Report 2021/884}, year = {2021}, url = {https://eprint.iacr.org/2021/884}, } @misc{cryptoeprint:2021:885, author = {Itai Dinur and Steven Goldfeder and Tzipora Halevi and Yuval Ishai and Mahimna Kelkar and Vivek Sharma and Greg Zaverucha}, title = {MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications}, howpublished = {Cryptology ePrint Archive, Report 2021/885}, year = {2021}, url = {https://eprint.iacr.org/2021/885}, } @misc{cryptoeprint:2021:886, author = {Mellila Bouam and Charles Bouillaguet and Claire Delaplace and Camille Noûs}, title = {Computational Records with Aging Hardware: Controlling Half the Output of SHA-256}, howpublished = {Cryptology ePrint Archive, Report 2021/886}, year = {2021}, url = {https://eprint.iacr.org/2021/886}, } @misc{cryptoeprint:2021:887, author = {Janaka Alawatugoda and Taechan Kim}, title = {Authenticated Key Exchange Protocol in the Standard Model under Weaker Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2021/887}, year = {2021}, url = {https://eprint.iacr.org/2021/887}, } @misc{cryptoeprint:2021:888, author = {Ngoc Khanh Nguyen and Eftychios Theodorakis and Bogdan Warinschi}, title = {Lifting Standard Model Reductions to Common Setup Assumptions}, howpublished = {Cryptology ePrint Archive, Report 2021/888}, year = {2021}, url = {https://eprint.iacr.org/2021/888}, } @misc{cryptoeprint:2021:889, author = {Sam Hopkins and Aayush Jain and Huijia Lin}, title = {Counterexamples to New Circular Security Assumptions Underlying iO}, howpublished = {Cryptology ePrint Archive, Report 2021/889}, year = {2021}, url = {https://eprint.iacr.org/2021/889}, } @misc{cryptoeprint:2021:890, author = {Yanyi Liu and Rafael Pass}, title = {A Note on One-way Functions and Sparse Languages}, howpublished = {Cryptology ePrint Archive, Report 2021/890}, year = {2021}, url = {https://eprint.iacr.org/2021/890}, } @misc{cryptoeprint:2021:891, author = {Mark Zhandry}, title = {White Box Traitor Tracing}, howpublished = {Cryptology ePrint Archive, Report 2021/891}, year = {2021}, url = {https://eprint.iacr.org/2021/891}, } @misc{cryptoeprint:2021:892, author = {Sara Zarei and Aein Rezaei Shahmirzadi and Hadi Soleimany and Raziye Salarifard and Amir Moradi}, title = {Low-Latency Keccak at any Arbitrary Order}, howpublished = {Cryptology ePrint Archive, Report 2021/892}, year = {2021}, url = {https://eprint.iacr.org/2021/892}, } @misc{cryptoeprint:2021:893, author = {Alexander Heinrich and Matthias Hollick and Thomas Schneider and Milan Stute and and Christian Weinert}, title = {DEMO: AirCollect: Efficiently Recovering Hashed Phone Numbers Leaked via Apple AirDrop}, howpublished = {Cryptology ePrint Archive, Report 2021/893}, year = {2021}, url = {https://eprint.iacr.org/2021/893}, } @misc{cryptoeprint:2021:894, author = {Nigel P. Smart and Emmanuel Thome}, title = {History of Cryptographic Key Sizes}, howpublished = {Cryptology ePrint Archive, Report 2021/894}, year = {2021}, url = {https://eprint.iacr.org/2021/894}, } @misc{cryptoeprint:2021:895, author = {Willy Quach and Brent Waters and Daniel Wichs}, title = {Targeted Lossy Functions and Applications}, howpublished = {Cryptology ePrint Archive, Report 2021/895}, year = {2021}, url = {https://eprint.iacr.org/2021/895}, } @misc{cryptoeprint:2021:896, author = {Danilo Gligoroski}, title = {Rebuttal to claims in Section 2.1 of the ePrint report 2021/583 "Entropoid-based cryptography is group exponentiation in disguise"}, howpublished = {Cryptology ePrint Archive, Report 2021/896}, year = {2021}, url = {https://eprint.iacr.org/2021/896}, } @misc{cryptoeprint:2021:897, author = {Christian Badertscher and Yun Lu and Vassilis Zikas}, title = {A Rational Protocol Treatment of 51% Attacks}, howpublished = {Cryptology ePrint Archive, Report 2021/897}, year = {2021}, url = {https://eprint.iacr.org/2021/897}, } @misc{cryptoeprint:2021:898, author = {Vasyl Ustimenko}, title = {On Extremal Expanding Algebraic Graphs and post-quantum secure delivery of passwords, encryption maps and tools for multivariate digital signatures. }, howpublished = {Cryptology ePrint Archive, Report 2021/898}, year = {2021}, url = {https://eprint.iacr.org/2021/898}, } @misc{cryptoeprint:2021:899, author = {Panagiotis Chatzigiannis and Konstantinos Chalkias and Valeria Nikolaenko}, title = {Homomorphic decryption in blockchains via compressed discrete-log lookup tables}, howpublished = {Cryptology ePrint Archive, Report 2021/899}, year = {2021}, url = {https://eprint.iacr.org/2021/899}, } @misc{cryptoeprint:2021:900, author = {Seyit Camtepe and Jarek Duda and Arash Mahboubi and Pawel Morawiecki and Surya Nepal and Marcin Pawlowski and Josef Pieprzyk}, title = {ANS-based Compression and Encryption with 128-bit Security}, howpublished = {Cryptology ePrint Archive, Report 2021/900}, year = {2021}, url = {https://eprint.iacr.org/2021/900}, } @misc{cryptoeprint:2021:901, author = {Ajeet Kumar and Subhamoy Maitra}, title = {Resolvable Block Designs in Construction of Approximate Real MUBs that are Sparse}, howpublished = {Cryptology ePrint Archive, Report 2021/901}, year = {2021}, url = {https://eprint.iacr.org/2021/901}, } @misc{cryptoeprint:2021:902, author = {Kalle Ngo and Elena Dubrova and Thomas Johansson}, title = {Breaking Masked and Shuffled CCA Secure Saber KEM by Power Analysis}, howpublished = {Cryptology ePrint Archive, Report 2021/902}, year = {2021}, url = {https://eprint.iacr.org/2021/902}, } @misc{cryptoeprint:2021:903, author = {Alexandros Bakas and Antonis Michalas}, title = {Nowhere to Leak: Forward and Backward Private Symmetric Searchable Encryption in the Multi-Client Setting (Extended Version)}, howpublished = {Cryptology ePrint Archive, Report 2021/903}, year = {2021}, url = {https://eprint.iacr.org/2021/903}, } @misc{cryptoeprint:2021:904, author = {Aurélien Vasselle and Hugues Thiebeauld and Philippe Maurine}, title = {Spatial Dependency Analysis to Extract Information from Side-Channel Mixtures}, howpublished = {Cryptology ePrint Archive, Report 2021/904}, year = {2021}, url = {https://eprint.iacr.org/2021/904}, } @misc{cryptoeprint:2021:905, author = {Vipul Arora and Ileana Buhan and Guilherme Perin and Stjepan Picek}, title = {A Tale of Two Boards: On the Influence of Microarchitecture on Side-Channel Leakage}, howpublished = {Cryptology ePrint Archive, Report 2021/905}, year = {2021}, url = {https://eprint.iacr.org/2021/905}, } @misc{cryptoeprint:2021:906, author = {Wenshuo Guo and Fang-Wei Fu}, title = {Expanded Gabidulin Codes and Their Application to Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2021/906}, year = {2021}, url = {https://eprint.iacr.org/2021/906}, } @misc{cryptoeprint:2021:907, author = {Pieter Pauwels}, title = {zkKYC: A solution concept for KYC without knowing your customer, leveraging self-sovereign identity and zero-knowledge proofs}, howpublished = {Cryptology ePrint Archive, Report 2021/907}, year = {2021}, url = {https://eprint.iacr.org/2021/907}, } @misc{cryptoeprint:2021:908, author = {George Marinakis}, title = {Selection of sampling keys for cryptographic tests }, howpublished = {Cryptology ePrint Archive, Report 2021/908}, year = {2021}, url = {https://eprint.iacr.org/2021/908}, } @misc{cryptoeprint:2021:909, author = {Gabriel Zaid and Lilian Bossuet and Amaury Habrard and Alexandre Venelli}, title = {Efficiency through Diversity in Ensemble Models applied to Side-Channel Attacks – A Case Study on Public-Key Algorithms –}, howpublished = {Cryptology ePrint Archive, Report 2021/909}, year = {2021}, url = {https://eprint.iacr.org/2021/909}, } @misc{cryptoeprint:2021:910, author = {Eric Verheul}, title = {SECDSA: Mobile signing and authentication under classical ``sole control''}, howpublished = {Cryptology ePrint Archive, Report 2021/910}, year = {2021}, url = {https://eprint.iacr.org/2021/910}, } @misc{cryptoeprint:2021:911, author = {Gang Wang}, title = {SoK: Understanding BFT Consensus in the Age of Blockchains}, howpublished = {Cryptology ePrint Archive, Report 2021/911}, year = {2021}, url = {https://eprint.iacr.org/2021/911}, } @misc{cryptoeprint:2021:912, author = {Daniel J. Bernstein}, title = {On the looseness of FO derandomization}, howpublished = {Cryptology ePrint Archive, Report 2021/912}, year = {2021}, url = {https://eprint.iacr.org/2021/912}, } @misc{cryptoeprint:2021:913, author = {Stefano Barbero and Emanuele Bellini and Carlo Sanna and Javier Verbel}, title = {Practical complexities of probabilistic algorithms for solving Boolean polynomial systems}, howpublished = {Cryptology ePrint Archive, Report 2021/913}, year = {2021}, url = {https://eprint.iacr.org/2021/913}, } @misc{cryptoeprint:2021:914, author = {Samanvaya Panda}, title = {Principal Component Analysis using CKKS Homomorphic Encryption Scheme}, howpublished = {Cryptology ePrint Archive, Report 2021/914}, year = {2021}, url = {https://eprint.iacr.org/2021/914}, } @misc{cryptoeprint:2021:915, author = {Gal Arnon and Alessandro Chiesa and Eylon Yogev}, title = {A PCP Theorem for Interactive Proofs}, howpublished = {Cryptology ePrint Archive, Report 2021/915}, year = {2021}, url = {https://eprint.iacr.org/2021/915}, } @misc{cryptoeprint:2021:916, author = {Pyrros Chaidos and Aggelos Kiayias}, title = {Mithril: Stake-based Threshold Multisignatures}, howpublished = {Cryptology ePrint Archive, Report 2021/916}, year = {2021}, url = {https://eprint.iacr.org/2021/916}, } @misc{cryptoeprint:2021:917, author = {Rogério Pontes and Bernardo Portela and Manuel Barbosa and Ricardo Vilaça}, title = {CODBS: A cascading oblivious search protocol optimized for real-world relational database indexes}, howpublished = {Cryptology ePrint Archive, Report 2021/917}, year = {2021}, url = {https://eprint.iacr.org/2021/917}, } @misc{cryptoeprint:2021:918, author = {Orestis Chardouvelis and Giulio Malavolta}, title = {The Round Complexity of Quantum Zero-Knowledge}, howpublished = {Cryptology ePrint Archive, Report 2021/918}, year = {2021}, url = {https://eprint.iacr.org/2021/918}, } @misc{cryptoeprint:2021:919, author = {Benjamin Wesolowski}, title = {The supersingular isogeny path and endomorphism ring problems are equivalent}, howpublished = {Cryptology ePrint Archive, Report 2021/919}, year = {2021}, url = {https://eprint.iacr.org/2021/919}, } @misc{cryptoeprint:2021:920, author = {Nir Bitansky and Huijia Lin and Omri Shmueli}, title = {Non-malleable Commitments against Quantum Attacks}, howpublished = {Cryptology ePrint Archive, Report 2021/920}, year = {2021}, url = {https://eprint.iacr.org/2021/920}, } @misc{cryptoeprint:2021:921, author = {Wenshuo Guo and Fang-Wei Fu}, title = {Semilinear transformations in coding theory and their application to cryptography}, howpublished = {Cryptology ePrint Archive, Report 2021/921}, year = {2021}, url = {https://eprint.iacr.org/2021/921}, } @misc{cryptoeprint:2021:922, author = {Kunal Dey and Sumit Kumar Debnath}, title = {Provably Secure Short Signature Scheme from Isogeny between Elliptic Curves}, howpublished = {Cryptology ePrint Archive, Report 2021/922}, year = {2021}, url = {https://eprint.iacr.org/2021/922}, } @misc{cryptoeprint:2021:923, author = {Luca De Feo and Bertram Poettering and Alessandro Sorniotti}, title = {On the (in)security of ElGamal in OpenPGP}, howpublished = {Cryptology ePrint Archive, Report 2021/923}, year = {2021}, url = {https://eprint.iacr.org/2021/923}, } @misc{cryptoeprint:2021:924, author = {Rouzbeh Behnia and Yilei Chen and Daniel Masny}, title = {On Removing Rejection Conditions in Practical Lattice-Based Signatures}, howpublished = {Cryptology ePrint Archive, Report 2021/924}, year = {2021}, url = {https://eprint.iacr.org/2021/924}, } @misc{cryptoeprint:2021:925, author = {Marten van Dijk and Deniz Gurevin and Chenglu Jin and Omer Khan and Phuong Ha Nguyen}, title = {Bilinear Map Based One-Time Signature Scheme with Secret Key Exposure}, howpublished = {Cryptology ePrint Archive, Report 2021/925}, year = {2021}, url = {https://eprint.iacr.org/2021/925}, } @misc{cryptoeprint:2021:926, author = {Chethan Kamath and Karen Klein and Krzysztof Pietrzak}, title = {On Treewidth, Separators and Yao's Garbling}, howpublished = {Cryptology ePrint Archive, Report 2021/926}, year = {2021}, url = {https://eprint.iacr.org/2021/926}, } @misc{cryptoeprint:2021:927, author = {Shuichi Katsumata}, title = {A New Simple Technique to Bootstrap Various Lattice Zero-Knowledge Proofs to QROM Secure NIZKs}, howpublished = {Cryptology ePrint Archive, Report 2021/927}, year = {2021}, url = {https://eprint.iacr.org/2021/927}, } @misc{cryptoeprint:2021:928, author = {Jianghua Zhong and Yingyin Pan and Wenhui Kong and Dongdai Lin}, title = {Necessary and Sufficient Conditions for Galois NFSRs Equivalent to Fibonacci Ones and Their Application to the Stream Cipher Trivium}, howpublished = {Cryptology ePrint Archive, Report 2021/928}, year = {2021}, url = {https://eprint.iacr.org/2021/928}, } @misc{cryptoeprint:2021:929, author = {Pierre Briaud and Jean-Pierre Tillich and Javier Verbel}, title = {A polynomial time key-recovery attack on the Sidon cryptosystem}, howpublished = {Cryptology ePrint Archive, Report 2021/929}, year = {2021}, url = {https://eprint.iacr.org/2021/929}, } @misc{cryptoeprint:2021:930, author = {Ulrich Haböck and Alberto Garoffolo and Daniele Di Benedetto}, title = {Darlin: A proof carrying data scheme based on Marlin}, howpublished = {Cryptology ePrint Archive, Report 2021/930}, year = {2021}, url = {https://eprint.iacr.org/2021/930}, } @misc{cryptoeprint:2021:931, author = {Orr Dunkelman and Maria Eichlseder and Daniel Kales and Nathan Keller and Gaëtan Leurent and Markus Schofnegger}, title = {Practical Key Recovery Attacks on FlexAEAD}, howpublished = {Cryptology ePrint Archive, Report 2021/931}, year = {2021}, url = {https://eprint.iacr.org/2021/931}, } @misc{cryptoeprint:2021:932, author = {Helger Lipmaa and Kateryna Pavlyk}, title = {Succinct Functional Commitment for a Large Class of Arithmetic Circuits}, howpublished = {Cryptology ePrint Archive, Report 2021/932}, year = {2021}, url = {https://eprint.iacr.org/2021/932}, } @misc{cryptoeprint:2021:933, author = {Claus Peter Schnorr}, title = {Fast Factoring Integers by SVP Algorithms, corrected}, howpublished = {Cryptology ePrint Archive, Report 2021/933}, year = {2021}, url = {https://eprint.iacr.org/2021/933}, } @misc{cryptoeprint:2021:934, author = {Diego F. Aranha and Emil Madsen Bennedsen and Matteo Campanelli and Chaya Ganesh and Claudio Orlandi and Akira Takahashi}, title = {ECLIPSE: Enhanced Compiling method for Pedersen-committed zkSNARK Engines}, howpublished = {Cryptology ePrint Archive, Report 2021/934}, year = {2021}, url = {https://eprint.iacr.org/2021/934}, } @misc{cryptoeprint:2021:935, author = {Pedro Branco and Luís Fiolhais and Manuel Goulão and Paulo Martins and Paulo Mateus and Leonel Sousa}, title = {ROTed: Random Oblivious Transfer for embedded devices}, howpublished = {Cryptology ePrint Archive, Report 2021/935}, year = {2021}, url = {https://eprint.iacr.org/2021/935}, } @misc{cryptoeprint:2021:936, author = {Jan Richter-Brockmann and Aein Rezaei Shahmirzadi and Pascal Sasdrich and Amir Moradi and Tim Güneysu}, title = {FIVER -- Robust Verification of Countermeasures against Fault Injections}, howpublished = {Cryptology ePrint Archive, Report 2021/936}, year = {2021}, url = {https://eprint.iacr.org/2021/936}, } @misc{cryptoeprint:2021:937, author = {Artem Los}, title = {Storing data that is updated regularly on a client machine securely}, howpublished = {Cryptology ePrint Archive, Report 2021/937}, year = {2021}, url = {https://eprint.iacr.org/2021/937}, } @misc{cryptoeprint:2021:938, author = {Daniel R. L. Brown}, title = {Plactic signatures}, howpublished = {Cryptology ePrint Archive, Report 2021/938}, year = {2021}, url = {https://eprint.iacr.org/2021/938}, } @misc{cryptoeprint:2021:939, author = {Jiacheng Liang and Wensi Jiang and Songze Li}, title = {OmniLytics: A Blockchain-based Secure Data Market for Decentralized Machine Learning}, howpublished = {Cryptology ePrint Archive, Report 2021/939}, year = {2021}, url = {https://eprint.iacr.org/2021/939}, } @misc{cryptoeprint:2021:940, author = {Ripon Patgiri}, title = {SecretStore: A Secrecy as a Service model to enable the Cloud Storage to store user's secret data}, howpublished = {Cryptology ePrint Archive, Report 2021/940}, year = {2021}, url = {https://eprint.iacr.org/2021/940}, } @misc{cryptoeprint:2021:941, author = {Maamar Ouladj and Sylvain Guilley and Philippe Guillot and Farid Mokrane}, title = {Spectral Approach to Process the (Multivariate) High-Order Template Attack against Any Masking Scheme}, howpublished = {Cryptology ePrint Archive, Report 2021/941}, year = {2021}, url = {https://eprint.iacr.org/2021/941}, } @misc{cryptoeprint:2021:942, author = {Rohit Chatterjee and Sanjam Garg and Mohammad Hajiabadi and Dakshita Khurana and Xiao Liang and Giulio Malavolta and Omkant Pandey and Sina Shiehian}, title = {Compact Ring Signatures from Learning With Errors}, howpublished = {Cryptology ePrint Archive, Report 2021/942}, year = {2021}, url = {https://eprint.iacr.org/2021/942}, } @misc{cryptoeprint:2021:943, author = {Geoffroy Couteau and Pierre Meyer}, title = {Breaking the Circuit-Size Barrier for Secure Computation under Quasi-Polynomial LPN}, howpublished = {Cryptology ePrint Archive, Report 2021/943}, year = {2021}, url = {https://eprint.iacr.org/2021/943}, } @misc{cryptoeprint:2021:944, author = {Léo Weissbart and Łukasz Chmielewski and Stjepan Picek and Lejla Batina}, title = {Systematic Side-channel Analysis of Curve25519 with Machine Learning}, howpublished = {Cryptology ePrint Archive, Report 2021/944}, year = {2021}, url = {https://eprint.iacr.org/2021/944}, } @misc{cryptoeprint:2021:945, author = {Chethan Kamath and Karen Klein and Krzysztof Pietrzak and Daniel Wichs}, title = {Limits on the Adaptive Security of Yao's Garbling}, howpublished = {Cryptology ePrint Archive, Report 2021/945}, year = {2021}, url = {https://eprint.iacr.org/2021/945}, } @misc{cryptoeprint:2021:946, author = {Andrea Coladangelo and Jiahui Liu and Qipeng Liu and Mark Zhandry}, title = {Hidden Cosets and Applications to Unclonable Cryptography}, howpublished = {Cryptology ePrint Archive, Report 2021/946}, year = {2021}, url = {https://eprint.iacr.org/2021/946}, } @misc{cryptoeprint:2021:947, author = {Anne Canteaut and Lukas Kölsch and Chao Li and Chunlei Li and Kangquan Li and Longjiang Qu and Friedrich Wiemer}, title = {Autocorrelations of vectorial Boolean functions}, howpublished = {Cryptology ePrint Archive, Report 2021/947}, year = {2021}, url = {https://eprint.iacr.org/2021/947}, } @misc{cryptoeprint:2021:948, author = {Yohei Watanabe and Takeshi Nakai and Kazuma Ohara and Takuya Nojima and Yexuan Liu and Mitsugu Iwamoto and Kazuo Ohta}, title = {How to Make a Secure Index for Searchable Symmetric Encryption, Revisited}, howpublished = {Cryptology ePrint Archive, Report 2021/948}, year = {2021}, url = {https://eprint.iacr.org/2021/948}, } @misc{cryptoeprint:2021:949, author = {Yifeng Song and Danyang Zhu and Jing Tian and Zhongfeng Wang}, title = {A High-Speed Architecture for the Reduction in VDF Based on a Class Group}, howpublished = {Cryptology ePrint Archive, Report 2021/949}, year = {2021}, url = {https://eprint.iacr.org/2021/949}, } @misc{cryptoeprint:2021:950, author = {Sébastien Duval and Pierrick Méaux and Charles Momin and François-Xavier Standaert}, title = {Exploring Crypto-Physical Dark Matter and Learning with Physical Rounding Towards Secure and Efficient Fresh Re-Keying}, howpublished = {Cryptology ePrint Archive, Report 2021/950}, year = {2021}, url = {https://eprint.iacr.org/2021/950}, } @misc{cryptoeprint:2021:951, author = {Melissa Azouaoui and Olivier Bronchain and Vincent Grosso and Kostas Papagiannopoulos and François-Xavier Standaert}, title = {Bitslice Masking and Improved Shuffling: How and When to Mix Them in Software?}, howpublished = {Cryptology ePrint Archive, Report 2021/951}, year = {2021}, url = {https://eprint.iacr.org/2021/951}, } @misc{cryptoeprint:2021:952, author = {Lichao Wu and Guilherme Perin and Stjepan Picek}, title = {On the Evaluation of Deep Learning-based Side-channel Analysis}, howpublished = {Cryptology ePrint Archive, Report 2021/952}, year = {2021}, url = {https://eprint.iacr.org/2021/952}, } @misc{cryptoeprint:2021:953, author = {Keita Emura and Ryoma Ito and Sachiko Kanamori and Ryo Nojima and Yohei Watanabe}, title = {State-free End-to-End Encrypted Storage and Chat Systems based on Searchable Encryption}, howpublished = {Cryptology ePrint Archive, Report 2021/953}, year = {2021}, url = {https://eprint.iacr.org/2021/953}, } @misc{cryptoeprint:2021:954, author = {Jose Maria Bermudo Mera and Angshuman Karmakar and Suparna Kundu and Ingrid Verbauwhede}, title = {Scabbard: a suite of efficient learning with rounding key-encapsulation mechanisms}, howpublished = {Cryptology ePrint Archive, Report 2021/954}, year = {2021}, url = {https://eprint.iacr.org/2021/954}, } @misc{cryptoeprint:2021:955, author = {Mathilde Chenu and Benjamin Smith}, title = {Higher-degree supersingular group actions}, howpublished = {Cryptology ePrint Archive, Report 2021/955}, year = {2021}, url = {https://eprint.iacr.org/2021/955}, } @misc{cryptoeprint:2021:956, author = {Mike Hamburg and Julius Hermelink and Robert Primas and Simona Samardjiska and Thomas Schamberger and Silvan Streit and Emanuele Strieder and Christine van Vredendaal}, title = {Chosen Ciphertext k-Trace Attacks on Masked CCA2 Secure Kyber}, howpublished = {Cryptology ePrint Archive, Report 2021/956}, year = {2021}, url = {https://eprint.iacr.org/2021/956}, } @misc{cryptoeprint:2021:957, author = {Arpita Patra and Akshayaram Srinivasan}, title = {Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer}, howpublished = {Cryptology ePrint Archive, Report 2021/957}, year = {2021}, url = {https://eprint.iacr.org/2021/957}, } @misc{cryptoeprint:2021:958, author = {Jonas Ruchti and Michael Gruber and Michael Pehl}, title = {When the Decoder Has to Look Twice: Glitching a PUF Error Correction}, howpublished = {Cryptology ePrint Archive, Report 2021/958}, year = {2021}, url = {https://eprint.iacr.org/2021/958}, } @misc{cryptoeprint:2021:959, author = {Lichao Wu and Guilherme Perin and Stjepan Picek}, title = {The Best of Two Worlds: Deep Learning-assisted Template Attack}, howpublished = {Cryptology ePrint Archive, Report 2021/959}, year = {2021}, url = {https://eprint.iacr.org/2021/959}, } @misc{cryptoeprint:2021:960, author = {Gregor Leander and Thorben Moos and Amir Moradi and Shahram Rasoolzadeh}, title = {The SPEEDY Family of Block Ciphers - Engineering an Ultra Low-Latency Cipher from Gate Level for Secure Processor Architectures}, howpublished = {Cryptology ePrint Archive, Report 2021/960}, year = {2021}, url = {https://eprint.iacr.org/2021/960}, } @misc{cryptoeprint:2021:961, author = {Jan Bobolz and Fabian Eidens and Raphael Heitjohann and Jeremy Fell}, title = {Cryptimeleon: A Library for Fast Prototyping of Privacy-Preserving Cryptographic Schemes}, howpublished = {Cryptology ePrint Archive, Report 2021/961}, year = {2021}, url = {https://eprint.iacr.org/2021/961}, } @misc{cryptoeprint:2021:962, author = {Thom Wiggers and Simona Samardjiska}, title = {Practically Solving LPN}, howpublished = {Cryptology ePrint Archive, Report 2021/962}, year = {2021}, url = {https://eprint.iacr.org/2021/962}, } @misc{cryptoeprint:2021:963, author = {Edward Eaton and Douglas Stebila and Roy Stracovsky}, title = {Post-Quantum Key-Blinding for Authentication in Anonymity Networks}, howpublished = {Cryptology ePrint Archive, Report 2021/963}, year = {2021}, url = {https://eprint.iacr.org/2021/963}, } @misc{cryptoeprint:2021:964, author = {James Bartusek}, title = {Secure Quantum Computation with Classical Communication}, howpublished = {Cryptology ePrint Archive, Report 2021/964}, year = {2021}, url = {https://eprint.iacr.org/2021/964}, } @misc{cryptoeprint:2021:965, author = {Shibam Ghosh and Orr Dunkelman}, title = {Automatic Search for Bit-based Division Property}, howpublished = {Cryptology ePrint Archive, Report 2021/965}, year = {2021}, url = {https://eprint.iacr.org/2021/965}, } @misc{cryptoeprint:2021:966, author = {Cláudia Brito and Pedro Ferreira and Bernardo Portela and Rui Oliveira and João Paulo}, title = {Soteria: Privacy-Preserving Machine Learning for Apache Spark}, howpublished = {Cryptology ePrint Archive, Report 2021/966}, year = {2021}, url = {https://eprint.iacr.org/2021/966}, } @misc{cryptoeprint:2021:967, author = {Stephen Holmes and Liqun Chen}, title = {Assessment of Quantum Threat To Bitcoin and Derived Cryptocurrencies}, howpublished = {Cryptology ePrint Archive, Report 2021/967}, year = {2021}, url = {https://eprint.iacr.org/2021/967}, } @misc{cryptoeprint:2021:968, author = {Kemal Bicakci and Kemal Ulker and Yusuf Uzunay}, title = {White-Box Implementations for Hash-Based Signatures and One-Time Passwords}, howpublished = {Cryptology ePrint Archive, Report 2021/968}, year = {2021}, url = {https://eprint.iacr.org/2021/968}, } @misc{cryptoeprint:2021:969, author = {Aniruddha Biswas and Palash Sarkar}, title = {Influence of a Set of Variables on a Boolean Function}, howpublished = {Cryptology ePrint Archive, Report 2021/969}, year = {2021}, url = {https://eprint.iacr.org/2021/969}, } @misc{cryptoeprint:2021:970, author = {Jiaxin Pan and Benedikt Wagner}, title = {Short Identity-Based Signatures with Tight Security from Lattices}, howpublished = {Cryptology ePrint Archive, Report 2021/970}, year = {2021}, url = {https://eprint.iacr.org/2021/970}, } @misc{cryptoeprint:2021:971, author = {Lior Rotem and Gil Segev}, title = {Tighter Security for Schnorr Identification and Signatures: A High-Moment Forking Lemma for $\Sigma$-Protocols}, howpublished = {Cryptology ePrint Archive, Report 2021/971}, year = {2021}, url = {https://eprint.iacr.org/2021/971}, } @misc{cryptoeprint:2021:972, author = {Alexander May and Julian Nowakowski and Santanu Sarkar}, title = {Partial Key Exposure Attack on Short Secret Exponent CRT-RSA}, howpublished = {Cryptology ePrint Archive, Report 2021/972}, year = {2021}, url = {https://eprint.iacr.org/2021/972}, } @misc{cryptoeprint:2021:973, author = {Michał Andrzejczak and Kris Gaj}, title = {A Multiplatform Parallel Approach for Lattice Sieving Algorithms}, howpublished = {Cryptology ePrint Archive, Report 2021/973}, year = {2021}, url = {https://eprint.iacr.org/2021/973}, } @misc{cryptoeprint:2021:974, author = {Yi-Fan Tseng and Chun-I Fan and Zi-Cheng Liu}, title = {Fast Keyword Search over Encrypted Data with Short Ciphertext in Clouds}, howpublished = {Cryptology ePrint Archive, Report 2021/974}, year = {2021}, url = {https://eprint.iacr.org/2021/974}, } @misc{cryptoeprint:2021:975, author = {Mugurel Barcau and Cristian Lupascu and Vicentiu Pasol and George C. Turcas}, title = {Bridges connecting Encryption Schemes}, howpublished = {Cryptology ePrint Archive, Report 2021/975}, year = {2021}, url = {https://eprint.iacr.org/2021/975}, } @misc{cryptoeprint:2021:976, author = {Sayantan Mukherjee and Avishek Majumder}, title = {Reinventing BEDs: Formal Treatment of Broadcast Encryption with Dealership and Practical Constructions}, howpublished = {Cryptology ePrint Archive, Report 2021/976}, year = {2021}, url = {https://eprint.iacr.org/2021/976}, } @misc{cryptoeprint:2021:977, author = {Yuval Ishai and Hang Su and David J. Wu}, title = {Shorter and Faster Post-Quantum Designated-Verifier zkSNARKs from Lattices}, howpublished = {Cryptology ePrint Archive, Report 2021/977}, year = {2021}, url = {https://eprint.iacr.org/2021/977}, } @misc{cryptoeprint:2021:978, author = {Donghang Lu and Albert Yu and Aniket Kate and Hemanta Maji}, title = {Polymath: Low-Latency MPC via Secure Polynomial Evaluations and its Applications}, howpublished = {Cryptology ePrint Archive, Report 2021/978}, year = {2021}, url = {https://eprint.iacr.org/2021/978}, } @misc{cryptoeprint:2021:979, author = {Nicholas Franzese and Jonathan Katz and Steve Lu and Rafail Ostrovsky and Xiao Wang and Chenkai Weng}, title = {Constant-Overhead Zero-Knowledge for RAM Programs}, howpublished = {Cryptology ePrint Archive, Report 2021/979}, year = {2021}, url = {https://eprint.iacr.org/2021/979}, } @misc{cryptoeprint:2021:980, author = {Kyoungbae Jang and Gyeong Ju Song and Hyunji Kim and Hyeokdong Kwon and Wai-Kong Lee and Zhi Hu and Hwajeong Seo}, title = {Binary Field Montgomery Multiplication on Quantum Computers}, howpublished = {Cryptology ePrint Archive, Report 2021/980}, year = {2021}, url = {https://eprint.iacr.org/2021/980}, } @misc{cryptoeprint:2021:981, author = {Sudharshan Swaminathan and Lukasz Chmielewski and Guilherme Perin and Stjepan Picek}, title = {Deep Learning-based Side-channel Analysis against AES Inner Rounds}, howpublished = {Cryptology ePrint Archive, Report 2021/981}, year = {2021}, url = {https://eprint.iacr.org/2021/981}, } @misc{cryptoeprint:2021:982, author = {Anubhab Baksi and Kyungbae Jang and Gyeongju Song and Hwajeong Seo and Zejun Xiang}, title = {Quantum Implementation and Resource Estimates for RECTANGLE and KNOT}, howpublished = {Cryptology ePrint Archive, Report 2021/982}, year = {2021}, url = {https://eprint.iacr.org/2021/982}, } @misc{cryptoeprint:2021:983, author = {Elena Fuchs and Kristin Lauter and Matthew Litman and Austin Tran}, title = {A Cryptographic Hash Function from Markoff Triples}, howpublished = {Cryptology ePrint Archive, Report 2021/983}, year = {2021}, url = {https://eprint.iacr.org/2021/983}, } @misc{cryptoeprint:2021:984, author = {Alan Szepieniec}, title = {On the Use of the Legendre Symbol in Symmetric Cipher Design}, howpublished = {Cryptology ePrint Archive, Report 2021/984}, year = {2021}, url = {https://eprint.iacr.org/2021/984}, } @misc{cryptoeprint:2021:985, author = {Karim Lounis}, title = {PUF Security: Reviewing The Validity of Spoofing Attack Against Safe is the New Smart}, howpublished = {Cryptology ePrint Archive, Report 2021/985}, year = {2021}, url = {https://eprint.iacr.org/2021/985}, } @misc{cryptoeprint:2021:986, author = {Hanno Becker and Vincent Hwang and Matthias J. Kannwischer and Bo-Yin Yang and Shang-Yi Yang}, title = {Neon NTT: Faster Dilithium, Kyber, and Saber on Cortex-A72 and Apple M1}, howpublished = {Cryptology ePrint Archive, Report 2021/986}, year = {2021}, url = {https://eprint.iacr.org/2021/986}, }