


default search action
IACR Cryptology ePrint Archive, Volume 2011, 2011
- Bing Zeng, Xueming Tang, Peng Xu, Jiandu Jing:

Practical Frameworks For h-Out-Of-n Oblivious Transfer With Security Against Covert and Malicious Adversaries. 1 - Gunnar Kreitz:

A Zero-One Law for Secure Multi-Party Computation with Ternary Outputs (full version). 2 - Daniel J. Bernstein, Tanja Lange, Peter Schwabe:

On the correct use of the negation map in the Pollard rho method. 3 - Gaetan Bisson, Andrew V. Sutherland:

A low-memory algorithm for finding short product representations in finite groups. 4 - David Xiao:

Is privacy compatible with truthfulness? 5 - Hemanta K. Maji, Pichayoot Ouppaphan, Manoj Prabhakaran, Mike Rosulek:

Exploring the Limits of Common Coins Using Frontier Analysis of Protocols. 6 - Greg Rose:

KISS: A Bit Too Simple. 7 - Ping Wang, Fangguo Zhang:

Computing Elliptic Curve Discrete Logarithms with the Negation Map. 8 - Helger Lipmaa:

Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments. 9 - Melissa Chase, Seny Kamara:

Structured Encryption and Controlled Disclosure. 10 - Shai Halevi, Huijia Lin:

After-the-Fact Leakage in Public-Key Encryption. 11 - Jens Groth:

Minimizing Non-interactive Zero-Knowledge Proofs Using Fully Homomorphic Encryption. 12 - Shashank Agrawal, Abhinav Mehta, Kannan Srinathan:

Secure Message Transmission In Asynchronous Directed Networks. 13 - Shashank Agrawal, Abhinav Mehta, Kannan Srinathan:

Unconditionally Reliable Message Transmission in Directed Neighbour Networks. 14 - (Withdrawn) Exponential attacks on 6-round Luby-Rackoff and on 5-round Lai-Massey. 15

- Melissa Chase, Kristin E. Lauter:

An Anonymous Health Care System. 16 - Jiazhe Chen, Keting Jia, Hongbo Yu, Xiaoyun Wang:

New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256. 17 - Dan Boneh, David Mandell Freeman:

Homomorphic Signatures for Polynomial Functions. 18 - Jooyoung Lee, Deukjo Hong:

Collision Resistance of the JH Hash Function. 19 - Antoine Joux, Vanessa Vitse:

Cover and Decomposition Index Calculus on Elliptic Curves made practical. Application to a seemingly secure curve over Fp6. 20 - Jae Hong Seo, Jung Hee Cheon:

Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts. 21 - Farzaneh Abazari, Babak Sadeghian:

Cryptanalysis with Ternary Difference: Applied to Block Cipher PRESENT. 22 - Ming Duan, Xuejia Lai:

Improved zero-sum distinguisher for full round Keccak-f permutation. 23 - Alexander Rostovtsev, Alexey Bogdanov, Mikhail Mikhaylov:

Secure evaluation of polynomial using privacy ring homomorphisms. 24 - Mihaela Ion, Giovanni Russello, Bruno Crispo:

Supporting Publication and Subscription Confidentiality in Pub/Sub Networks. 25 - Emiliano De Cristofaro, Mark Manulis, Bertram Poettering:

Private Discovery of Common Social Contacts. 26 - Ashish Choudhury, Kaoru Kurosawa, Arpita Patra:

Simple and Efficient Single Round Almost Perfectly Secure Message Transmission Tolerating Generalized Adversary. 27 - Elena Andreeva, Bart Mennink, Bart Preneel:

The Parazoa Family: Generalizing the Sponge Hash Functions. 28 - Benjamin Gittins:

Outline of a proposal responding to E.U. and U.S. calls for trustworthy global-scale IdM and CKM designs. 29 - Vorapong Suppakitpaisarn, Masato Edahiro, Hiroshi Imai:

Fast Elliptic Curve Cryptography Using Optimal Double-Base Chains. 30 - Ashish Choudhury, Arpita Patra:

Statistical Asynchronous Weak Commitment Scheme: A New Primitive to Design Statistical Asynchronous Verifiable Secret Sharing Scheme. 31 - Piotr Mroczkowski, Janusz Szmidt:

Corrigendum to: The Cube Attack on Stream Cipher Trivium and Quadraticity Tests. 32 - Jean Marc Couveignes, Jean-Gabriel Kammerer:

The Geometry of Flex Tangents to a Cubic Curve and its Parameterizations. 33 - Niek J. Bouman, Serge Fehr:

Secure Authentication from a Weak Key, Without Leaking Information. 34 - Andrew C. Yao, Yunlei Zhao:

A New Family of Practical Non-Malleable Protocols. 35 - (Withdrawn) The Complexity Analysis of the MutantXL Family. 36

- Mario Lamberger, Florian Mendel:

Higher-Order Differential Attack on Reduced SHA-256. 37 - Martin R. Albrecht, Carlos Cid:

Cold Boot Key Recovery by Solving Polynomial Systems with Noise. 38 - Duc-Phong Le:

Fast Quadrupling of a Point in Elliptic Curve Cryptography. 39 - Hoon Hong, Eunjeong Lee, Hyang-Sook Lee, Cheol-Min Park:

Simple and Exact Formula for Minimum Loop Length in Atei Pairing based on Brezing-Weng Curves. 40 - Emiliano De Cristofaro, Anthony Durussel, Imad Aad:

Reclaiming Privacy for Smartphone Applications. 41 - Gaetan Bisson:

Computing endomorphism rings of elliptic curves under the GRH. 42 - Jayaprakash Kar:

Proxy Blind Multi-signature Scheme using ECC for handheld devices. 43 - G. N. Purohit, Asmita Singh Rawat:

Fast Scalar Multiplication in ECC using The Multi base Number System. 44 - Farshid Farhat, Somayeh Salimi, Ahmad Salahi:

Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup. 45 - Rikke Bendlin, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi:

Lower and Upper Bounds for Deniable Public-Key Encryption. 46 - Yuyin Yu, Mingsheng Wang, Yongqiang Li:

Constructing differential 4-uniform permutations from know ones. 47 - Srinath Baba, Srinivas Kotyad, Raghu Teja:

A non-Abelian factorization problem and an associated cryptosystem. 48 - Allison B. Lewko, Brent Waters:

Unbounded HIBE and Attribute-Based Encryption. 49 - (Withdrawn) Authenticated Key Exchange with Synchronized States. 50

- (Withdrawn) Towards Strong Adaptive Corruption Security of Authenticated Key Exchange. 51

- Alex Escala, Javier Herranz, Paz Morillo:

Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model. 52 - Dario Catalano, Dario Fiore, Bogdan Warinschi:

Adaptive Pseudo-Free Groups and Applications. 53 - (Withdrawn) Non-Applicability of Pseudobasis for Designing Perfectly Secure Message Transmission Protocols Against Non-Threshold Adversary. 54

- Dongdai Lin, Jean-Charles Faugère, Ludovic Perret, Tianze Wang:

On Enumeration of Polynomial Equivalence Classes and Their Application to MPKC. 55 - Amine Dehbaoui, Sébastien Tiran, Philippe Maurine, François-Xavier Standaert, Nicolas Veyrat-Charvillon:

Spectral Coherence Analysis - First Experimental Results -. 56 - Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi:

Another Look at RSA Signatures With Affine Padding. 57 - Jean-Sébastien Coron, Aline Gouget, Thomas Icart, Pascal Paillier:

Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping. 58 - Martin Stanek:

Extending Baby-step Giant-step algorithm for FACTOR problem. 59 - S. Dov Gordon, Jonathan Katz, Vinod Vaikuntanathan:

A Group Signature Scheme from Lattice Assumptions. 60 - Masoumeh Safkhani, Majid Naderi, Nasour Bagheri, Somitra Kumar Sanadhya:

Cryptanalysis of Some Protocols for RFID Systems. 61 - Swapnoneel Roy, Amlan K. Das, Yu Li:

Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme using Smart Cards, and a Key Agreement Scheme for Two-Party Communication. 62 - Hadi Ahmadi, Reihaneh Safavi-Naini:

Secret Keys from Channel Noise. 63 - Felix Günther, Mark Manulis, Thorsten Strufe:

Cryptographic Treatment of Private User Profiles. 64 - Carolin Lunemann, Jesper Buus Nielsen:

Fully Simulatable Quantum-Secure Coin-Flipping and Applications. 65 - Markus Dürmuth, David Mandell Freeman:

Deniable Encryption with Negligible Detection Probability: An Interactive Construction. 66 - Simon R. Blackburn, Alina Ostafe, Igor E. Shparlinski:

On the Distribution of the Subset Sum Pseudorandom Number Generator on Elliptic Curves. 67 - William K. Moses Jr., C. Pandu Rangan:

Rational Secret Sharing with Honest Players over an Asynchronous Channel. 68 - Chao Ning, Qiuliang Xu:

Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect Security. 69 - Long Hoang Nguyen:

Rational authentication protocols. 70 - Gilles Barthe, Boris Köpf:

Information-theoretic Bounds for Differentially Private Mechanisms. 71 - Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, Axel Poschmann:

AES Variants Secure Against Related-Key Differential and Boomerang Attacks. 72 - Simon R. Blackburn, Carlos Cid, Ciaran Mullan:

Cryptanalysis of three matrix-based key establishment protocols. 73 - Daniel J. Bernstein, Tanja Lange, Christiane Peters, Peter Schwabe:

Really fast syndrome-based hashing. 74 - (Withdrawn) A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions. 75

- Maura B. Paterson, Douglas R. Stinson:

A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks. 76 - Ming Tang, Xiaorong Wang, Zhenlong Qiu, Si Gao, Huanguo Zhang, Qianhong Wu:

DPA Leakage Evaluation and Countermeasure Plug-in. 77 - Jean-Luc Beuchat, Eiji Okamoto, Teppei Yamazaki:

A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function ECHO. 78 - Debiao He, Jianhua Chen, Jin Hu:

Identity-based Digital Signature Scheme Without Bilinear Pairings. 79 - Xiao Ma:

Turbo Codes Can Be Asymptotically Information-Theoretically Secure. 80 - Tomas Toft:

Secure Datastructures based on Multiparty Computation. 81 - (Withdrawn) Does Pseudo-basis Extend to General Adversary? 82

- Natalia N. Tokareva:

On the number of bent functions: lower bounds and hypotheses. 83 - Xingwen Zhao, Fangguo Zhang:

Traitor Tracing against Public Collaboration (Full Version). 84 - (Withdrawn) Co-induction and Computational Semantics for Public-key Encryption with Key Cycles. 85

- Xin-jie Zhao, Tao Wang, Shize Guo:

Fault-propagation Pattern Based DFA on SPN Structure Block Ciphers using Bitwise Permutation, with Application to PRESENT and PRINTcipher. 86 - Yevgeniy Dodis, Iftach Haitner, Aris Tentes:

On the (In)Security of RSA Signatures. 87 - Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, François-Xavier Standaert, Yu Yu:

Leftover Hash Lemma, Revisited. 88 - Pantelimon Stanica, Thor Martinsen:

Octal Bent Generalized Boolean Functions. 89 - Yu Chen, Liqun Chen, Zhong Chen:

Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes. 90 - Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, Sai Sheshank Burra:

A New Approach to Practical Active-Secure Two-Party Computation. 91 - Akinori Kawachi, Christopher Portmann, Keisuke Tanaka:

Characterization of the relations between information-theoretic non-malleability, secrecy, and authenticity. 92 - Miia Hermelin, Kaisa Nyberg:

Linear Cryptanalysis Using Multiple Linear Approximations. 93 - Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik Raub:

Graceful Degradation in Multi-Party Computation. 94 - Orr Dunkelman, Nathan Keller, Adi Shamir:

ALRED Blues: New Attacks on AES-Based MAC's. 95 - Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters:

Computing on Authenticated Data. 96 - Shi Pu, Pu Duan, Jyh-Charn Liu:

Fastplay-A Parallelization Model and Implementation of SMC on CUDA based GPU Cluster Architecture. 97 - Mark Velichka, Michael J. Jacobson Jr., Andreas Stein:

Computing Discrete Logarithms in the Jacobian of High-Genus Hyperelliptic Curves over Even Characteristic Finite Fields. 98 - Antoine Amarilli, Sascha Müller, David Naccache, Daniel Page, Pablo Rauzy, Michael Tunstall:

Can Code Polymorphism Limit Information Leakage? 99 - Guangdong Yang, Shaohua Tang, Li Yang:

A Novel Group Signature Scheme Based on MPKC. 100 - Liqun Chen, Kurt Dietrich, Hans Löhr

, Ahmad-Reza Sadeghi, Christian Wachsmann, Johannes Winter:
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices. 101 - Charalampos Papamanthou, Roberto Tamassia:

Cryptography for Efficiency: Authenticated Data Structures Based on Lattices and Parallel Online Memory Checking. 102 - István Vajda:

Cryptographically Sound Security Proof for On-Demand Source Routing Protocol EndairA. 103 - Colleen Swanson, Douglas R. Stinson:

Unconditionally Secure Signature Schemes Revisited. 104 - Stefan Erickson, Michael J. Jacobson Jr., Andreas Stein:

Explicit Formulas for Real Hyperelliptic Curves of Genus 2 in Affine Representation. 105 - Hadi Ahmadi, Reihaneh Safavi-Naini:

Common Randomness and Secret Key Capacities of Two-way Channels. 106 - Martin Stanek:

Threshold Encryption into Multiple Ciphertexts. 107 - Jannik Dreier, Florian Kerschbaum:

Practical Secure and Efficient Multiparty Linear Programming Based on Problem Transformation. 108 - Matthew Green:

Secure Blind Decryption. 109 - (Withdrawn) Fully Homomorphic Encryption over the Binary Polynomials. 110

- Natalia N. Tokareva:

Generalizations of Bent Functions. A Survey. 111 - Debiao He, Jin Hu:

An efficient certificateless two-party authenticated key agreement scheme from pairings. 112 - Emiliano De Cristofaro, Yanbin Lu, Gene Tsudik:

Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information. 113 - Chunsheng Gu:

Fully Homomorphic Encryption, Approximate Lattice Problem and LWE. 114 - Céline Blondeau, Benoît Gérard:

Multiple Differential Cryptanalysis: Theory and Practice (Corrected). 115 - Long Hoang Nguyen, Andrew William Roscoe:

On the construction of digest functions for manual authentication protocols. 116 - Lei Wei, Scott E. Coull, Michael K. Reiter:

Bounded Vector Signatures and their Applications. 117 - Chunsheng Gu:

New Fully Homomorphic Encryption over the Integers. 118 - (Withdrawn) Multiplicative Learning with Errors and Cryptosystems. 119

- Daniel J. Bernstein, Tanja Lange, Christiane Peters, Peter Schwabe:

Faster 2-regular information-set decoding. 120 - Chunsheng Gu:

More Practical Fully Homomorphic Encryption. 121 - Kristján Valur Jónsson, Gunnar Kreitz, Misbah Uddin:

Secure Multi-Party Sorting and Applications. 122 - Andrey Bogdanov, Vincent Rijmen:

Zero-Correlation Linear Cryptanalysis of Block Ciphers. 123 - Masao Kasahara:

A New Class of Biometrics on the Basis of Forgotten Secret Recovering Scheme, KSS(I). 124 - Masao Kasahara:

A Construction of A New Class of Knapsack-Type Public Key Cryptosystem, K(III)Sigma PKC. 125 - Daniel W. Engels, Markku-Juhani O. Saarinen, Peter Schweitzer, Eric M. Smith:

The Hummingbird-2 Lightweight Authenticated Encryption Algorithm. 126 - Gideon Samid:

Integer Arithmetic without Arithmetic Addition. 127 - (Withdrawn) The Ligo Block Cipher. 128

- Cas Cremers, Kasper Bonne Rasmussen, Srdjan Capkun:

Distance Hijacking Attacks on Distance Bounding Protocols. 129 - Dongdai Lin, Tao Shi, Zifeng Yang:

Ergodic Theory Over F2[[T]]. 130 - Virendra Sule:

Trapdoor oneway functions associated with exponentiation. 131 - Siavosh Benabbas, Rosario Gennaro, Yevgeniy Vahlis:

Verifiable Delegation of Computation over Large Datasets. 132 - Nigel P. Smart, Frederik Vercauteren:

Fully Homomorphic SIMD Operations. 133 - George Danezis, Markulf Kohlweiss, Alfredo Rial:

Differentially Private Billing with Rebates. 134 - Omran Ahmadi, Robert Granger:

On isogeny classes of Edwards curves over finite fields. 135 - Gilad Asharov, Yehuda Lindell:

A Full Proof of the BGW Protocol for Perfectly-Secure Multiparty Computation. 136 - Gilad Asharov, Ran Canetti, Carmit Hazay:

Towards a Game Theoretic View of Secure Computation. 137 - Jeongdae Hong, Jung Woo Kim, Jihye Kim, Kunsoo Park, Jung Hee Cheon:

Constant-Round Privacy Preserving Multiset Union. 138 - Mingjie Liu, Xiaoyun Wang, Guangwu Xu, Xuexin Zheng:

Shortest Lattice Vectors in the Presence of Gaps. 139 - Martin Ågren:

Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64. 140 - Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik:

Fast and Private Computation of Set Intersection Cardinality. 141 - (Withdrawn) A Parallel Hardware Architecture for the Solution of Linear Equation Systems Implemented over GF(2n). 142

- Romain Cosset, Damien Robert:

Computing (l, l)-isogenies in polynomial time on Jacobians of genus 2 curves. 143 - (Withdrawn) Deniable Encryption from the McEliece Assumptions. 144

- (Withdrawn) Linear Diophantine Equation Discrete Log Problem, Matrix Decomposition Problem and the AA-beta-cryptosystem. 145

- Lei Xu, Dongdai Lin, Jing Zou:

ECDLP on GPU. 146 - Chunming Tang, Shuhong Gao, Chengli Zhang:

The Optimal Linear Secret Sharing Scheme for Any Given Access Structure. 147 - Hongbo Yu, Jiazhe Chen, Keting Jia, Xiaoyun Wang:

Near-Collision Attack on the Step-Reduced Compression Function of Skein-256. 148 - Nicolas Veyrat-Charvillon, François-Xavier Standaert:

Generic Side-Channel Distinguishers: Improvements and Limitations. 149 - Jue-Sam Chou, Cheng-Lun Wu, Yalin Chen:

A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing. 150 - Ghulam Murtaza, Nassar Ikram:

Direct Exponent and Scalar Multiplication Classes of an MDS Matrix. 151 - Yehuda Lindell, Eran Omri:

A Practical Application of Differential Privacy to Personalized Online Advertising. 152 - Jingguo Bi, Qi Cheng:

Lower bounds of shortest vector lengths in random knapsack lattices and random NTRU lattices. 153 - (Withdrawn) The Block Cipher Vuna. 154

- (Withdrawn) High-speed Hardware Implementation of Rainbow Signatures on FPGAs. 155

- Madeline González Muñiz, Peeter Laud:

Strong Forward Security in Identity-Based Signcryption. 156 - Shai Halevi, Yehuda Lindell, Benny Pinkas:

Secure Computation on the Web: Computing without Simultaneous Interaction. 157 - Yanbin Lu, Gene Tsudik:

Enhancing Data Privacy in the Cloud. 158 - (Withdrawn) The Block Cipher Thuca. 159

- Mohamed Ahmed Abdelraheem, Céline Blondeau, María Naya-Plasencia, Marion Videau, Erik Zenner:

Cryptanalysis of ARMADILLO2. 160 - Debrup Chakraborty, Cuauhtemoc Mancillas-López, Francisco Rodríguez-Henríquez, Palash Sarkar:

Efficient Hardware Implementations of BRW Polynomials and Tweakable Enciphering Schemes. 161 - Amir Moradi, Oliver Mischke, Christof Paar:

Collision Timing Attack when Breaking 42 AES ASIC Cores. 162 - (Withdrawn) Improved Integral Attacks on Reduced Round Camellia. 163

- Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Ludovic Perret:

On the Relation Between the Mutant Strategy and the Normal Selection Strategy in Gröbner Basis Algorithms. 164 - Xin-jie Zhao, Tao Wang, Shize Guo:

Improved Side Channel Cube Attacks on PRESENT. 165 - Jeremy Clark, Urs Hengartner:

Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance. 166 - Yalin Chen, Jue-Sam Chou, Cheng-Lun Wu, Chi-Fong Lin:

Identifying Large-Scale RFID Tags Using Non-Cryptographic Approach. 167 - Douglas Wikström:

A Commitment-Consistent Proof of a Shuffle. 168 - Hongwei Li, Yuanshun Dai, Bo Yang:

Identity-Based Cryptography for Cloud Security. 169 - Jonathan Taverne, Armando Faz-Hernández, Diego F. Aranha, Francisco Rodríguez-Henríquez, Darrel Hankerson, Julio López:

Software implementation of binary elliptic curves: impact of the carry-less multiplier on scalar multiplication. 170 - Manish Garg, Sugata Gangopadhyay:

On lower bounds on second-order nonliearities of bent functions obtained by using Niho power functions. 171 - T. V. Laptyeva, Sergej Flach, K. Kladko:

The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs. 172 - (Withdrawn) An efficient certificateless short signature scheme from pairings. 173

- László Csirmaz, Gábor Tardos:

On-line secret sharing. 174 - Marine Minier, María Naya-Plasencia, Thomas Peyrin:

Analysis of reduced-SHAvite-3-256 v2. 175 - Sylvain Duquesne, Nicolas Guillermin:

A FPGA pairing implementation using the Residue Number System. 176 - Muhammad Yasir Malik, Jong-Seon No:

Dynamic MDS Matrices for Substantial Cryptographic Strength. 177 - Chong Hee Kim:

Differential Fault Analysis of AES: Toward Reducing Number of Faults. 178 - Edoardo Persichetti:

Compact McEliece keys based on Quasi-Dyadic Srivastava codes. 179 - Yehuda Lindell:

Highly-Efficient Universally-Composable Commitments based on the DDH Assumption. 180 - Santosh Ghosh, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury:

Security of Prime Field Pairing Cryptoprocessor Against Differential Power Attack. 181 - Guilin Wang, Fubiao Xia, Yunlei Zhao:

Designated Confirmer Signatures With Unified Verification. 182 - (Withdrawn) Elliptic Curve Point Multiplication Using MBNR and Point Halving. 183

- Ghulam Murtaza, Azhar Ali Khan, Syed Wasi Alam, Aqeel Farooqi:

Fortification of AES with Dynamic Mix-Column Transformation. 184 - Zhibin Zhou, Dijiang Huang:

Efficient and Secure Data Storage Operations for Mobile Cloud Computing. 185 - (Withdrawn) Some aspects of multi-variable secret sharing. 186

- Hyung Tae Lee, Jung Hee Cheon, Jin Hong:

Analysis of Discrete Logarithm Algorithm using Pre-computation. 187 - Ulrich Rührmair:

Physical Turing Machines and the Formalization of Physical Cryptography. 188 - Ulrich Rührmair:

SIMPL Systems as a Keyless Cryptographic and Security Primitive. 189 - Peng Xu, Hai Jin:

SHS: Secure Hybrid Search by Combining Dynamic and Static Indexes in PEKS. 190 - Johannes Buchmann, Erik Dahmen, Sarah Ereth, Andreas Hülsing, Markus Rückert:

On the Security of the Winternitz One-Time Signature Scheme. 191 - Joseph K. Liu, Feng Bao, Jianying Zhou:

Short and Efficient Certificate-Based Signature. 192 - Nasour Bagheri, Masoumeh Safkhani, Majid Naderi, Somitra Kumar Sanadhya:

Security Analysis of LMAP++, an RFID Authentication Protocol. 193 - Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:

Cryptanalysis of Chen et al.'s RFID Access Control Protocol. 194 - (Withdrawn) An ID-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. 195

- Ye Zhang, Chun Jason Xue, Duncan S. Wong, Nikos Mamoulis, Siu-Ming Yiu:

Acceleration of Composite Order Bilinear Pairing on Graphics Hardware. 196 - Puwen Wei, Yuliang Zheng, Xiaoyun Wang:

Public Key Encryption for the Forgetful. 197 - Guillaume Hanrot, Xavier Pujol, Damien Stehlé:

Terminating BKZ. 198 - Omran Ahmadi, Robert Granger:

An efficient deterministic test for Kloosterman sum zeros. 199 - Georg Neugebauer, Ulrike Meyer, Susanne Wetzel:

Fair and Privacy-Preserving Multi-Party Protocols for Reconciling Ordered Input Sets (Extended version). 200 - Lei Wei, Christian Rechberger, Jian Guo, Hongjun Wu, Huaxiong Wang, San Ling:

Improved Meet-in-the-Middle Cryptanalysis of KTANTAN. 201 - Markku-Juhani O. Saarinen:

GCM, GHASH and Weak Keys. 202 - Juha Partala:

Key agreement based on homomorphisms of algebraic structures. 203 - Nir Bitansky, Ran Canetti, Shai Halevi:

Leakage Tolerant Interactive Protocols. 204 - Chunbo Ma, Jun Ao:

Group-oriented ring signature. 205 - Reza Rezaeian Farashahi, Dustin Moody, Hongfeng Wu:

Isomorphism classes of Edwards curves over finite fields. 206 - Shai Halevi, Danny Harnik, Benny Pinkas, Alexandra Shulman-Peleg:

Proofs of Ownership in Remote Storage Systems. 207 - Jian Weng, Yunlei Zhao:

Direct Constructions of Bidirectional Proxy Re-Encryption with Alleviated Trust in Proxy. 208 - Zvika Brakerski, Gil Segev:

Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting. 209 - Jooyoung Lee, Martijn Stam, John P. Steinberger:

The preimage security of double-block-length compression functions. 210 - Nicolas T. Courtois:

Security Evaluation of GOST 28147-89 In View Of International Standardisation. 211 - Nicholas Kolokotronis, Konstantinos Limniotis:

Maiorana-McFarland Functions with High Second-Order Nonlinearity. 212 - Martin R. Albrecht, Pooya Farshim, Kenneth G. Paterson, Gaven J. Watson:

On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model. 213 - Charles Rackoff:

On "identities", "names", "NAMES", "ROLES" and Security: A Manifesto. 214 - Manuel Barbosa, Pooya Farshim:

Delegatable Homomorphic Encryption with Applications to Secure Outsourcing of Computation. 215 - Shaohua Tang, Jintai Ding, Zhiming Yang:

Secure Group Key Management Approach Based upon N-dimensional Hyper-sphere. 216 - S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:

Identity Based Deterministic Signature Scheme Without Forking-Lemma. 217 - Markku-Juhani O. Saarinen:

Cryptographic Analysis of All 4 x 4 - Bit S-Boxes. 218 - Tibor Jager, Florian Kohlar, Sven Schäge, Jörg Schwenk:

A Standard-Model Security Analysis of TLS-DHE. 219 - István Vajda:

Framework for Security Proofs for On-demand Routing Protocols in Multi-Hop Wireless Networks. 220 - Leo Dorrendorf:

Protecting Drive Encryption Systems Against Memory Attacks. 221 - Kyle Brogle, Sharon Goldberg, Leonid Reyzin:

Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations. 222 - Bing Zeng, Liang Chen, Xueming Tang:

A Perfectly Binding Commitment Scheme Against Quantum Attacks. 223 - Xu An Wang, Liqiang Wu, Xiaoyuan Yang, Huaqun Wang:

Cryptanalysis and Improvement of an Efficient CCA Secure PKE Scheme. 224 - Shaohua Tang, Jintai Ding, Yujun Liang:

A Simple and Efficient New Group Key Management Approach Based on Linear Geometry. 225 - Eric Miles, Emanuele Viola:

The Advanced Encryption Standard, Candidate Pseudorandom Functions, and Natural Proofs. 226 - Alexander Barg, Grigory Kabatiansky:

Robust parent-identifying codes and combinatorial arrays. 227 - Jan Camenisch, Stephan Krenn, Victor Shoup:

A Framework for Practical Universally Composable Zero-Knowledge Protocols. 228 - Md. Golam Kaosar:

Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network. 229 - Dennis Hofheinz:

All-But-Many Lossy Trapdoor Functions. 230 - Marc Fischlin, Anja Lehmann, Dominique Schröder:

History-Free Sequential Aggregate Signatures. 231 - Billy Bob Brumley, Nicola Tuveri:

Remote Timing Attacks are Still Practical. 232 - Vipul Goyal, Adam O'Neill, Vanishree Rao:

Correlated-Input Secure Hash Functions. 233 - Debiao He:

Comments on a secure dynamic ID-based remote user authentication scheme for multi-server environment using smart cards. 234 - Simon Kramer, Rajeev Goré, Eiji Okamoto:

Computer-Aided Decision-Making for Formal Relations and Domains of Trust, Distrust, and Mistrust with Cryptographic Applications. 235 - Neil Hanley, Michael Tunstall, William P. Marnane:

Using Templates to Distinguish Multiplications from Squaring Operations. 236 - Alice Nguyenova-Stepanikova, Tran Ngoc Duong:

The block cipher NSABC (public domain). 237 - Yiyuan Luo, Xuejia Lai:

Attacks On a Double Length Blockcipher-based Hash Proposal. 238 - Shay Gueron:

Efficient Software Implementations of Modular Exponentiation. 239 - Mike Rosulek:

Universal Composability from Essentially Any Trusted Setup. 240 - Xiuqun Wang:

A Novel Adaptive Proactive Secret Sharing without a Trusted Party. 241 - Idan Sheetrit, Avishai Wool:

Cryptanalysis of KeeLoq code-hopping using a Single FPGA. 242 - Tolga Acar, Kristin E. Lauter, Michael Naehrig, Daniel Shumow:

Affine Pairings on ARM. 243 - Erik-Oliver Blass, Roberto Di Pietro, Refik Molva, Melek Önen:

PRISM - Privacy-Preserving Search in MapReduce. 244 - Jean-Pierre Flori, Hugues Randriam:

On the Number of Carries Occuring in an Addition mod 2k-1. 245 - Bernardo Machado David, Anderson C. A. Nascimento, Rafael Tonicelli:

A Framework for Secure Single Sign-On. 246 - Qi Chai, Xinxin Fan, Guang Gong:

An Ultra-Efficient Key Recovery Attack on the Lightweight Stream Cipher A2U2. 247 - Fanbao Liu, Yi Liu, Tao Xie, Yumeng Feng:

Fast Password Recovery Attack: Application to APOP. 248 - (Withdrawn) Breaking a certificateless key agreement protocol withour bilinear pairing. 249

- Zvika Brakerski, Yael Tauman Kalai:

A Parallel Repetition Theorem for Leakage Resilience. 250 - Sanjam Garg

, Vipul Goyal, Abhishek Jain
, Amit Sahai:
Concurrently Secure Computation in Constant Rounds. 251 - Mihir Bellare, David Cash, Rachel Miller:

Cryptography Secure Against Related-Key Attacks and Tampering. 252 - Mingqiang Wang, Xiaoyun Wang, Tao Zhan:

Attack Cryptosystems Based on HCDLP. 253 - Thorsten Kleinjung, Arjen K. Lenstra, Dan Page, Nigel P. Smart:

Using the Cloud to Determine Key Strengths. 254 - Sascha Müller, Stefan Katzenbeisser:

Hiding the Policy in Cryptographic Access Control. 255 - (Withdrawn) Leakage Resilient Secure Two-Party Computation. 256

- Seung Geol Choi, Kyung-Wook Hwang, Jonathan Katz, Tal Malkin, Dan Rubenstein:

Secure Multi-Party Computation of Boolean Circuits with Applications to Privacy in On-Line Marketplaces. 257 - Gavin Xiaoxu Yao, Junfeng Fan, Ray C. C. Cheung, Ingrid Verbauwhede:

A High Speed Pairing Coprocessor Using RNS and Lazy Reduction. 258 - Douglas R. Stinson:

Comments on a sensor network key redistribution technique of Cichon, Golebiewski and Kutylowski. 259 - Cristina Onete

, Daniele Venturi:
Security & Indistinguishability in the Presence of Traffic Analysis. 260 - Danilo Gligoroski, Rune Steinsmo Ødegård, Rune Erlend Jensen:

OBSERVATION: An explicit form for a class of second preimages for any message M for the SHA-3 candidate Keccak. 261 - Mohamed Ahmed Abdelraheem, Julia Borghoff, Erik Zenner:

Cryptanalysis of the Light-Weight Cipher A2U2 - Reduced draft version. 262 - Fangguo Zhang:

The Computational Square-Root Exponent Problem- Revisited. 263 - Dominique Schröder, Dominique Unruh:

Round Optimal Blind Signatures. 264 - Qiushi Yang, Yvo Desmedt:

Efficient 2-Round General Perfectly Secure Message Transmission: A Minor Correction to Yang and Desmedt's Protocol. 265 - Daniel R. L. Brown:

Identity-Based Decryption. 266 - Myungsun Kim, Hyung Tae Lee, Jung Hee Cheon:

Mutual Private Set Intersection with Linear Complexity. 267 - Raja Zeshan Haider:

Birthday Forgery Attack on 128-EIA3 Version 1.5. 268 - Mihir Bellare, Sriram Keelveedhi:

Authenticated and Misuse-Resistant Encryption of Key-Dependent Data. 269 - Dennis Hofheinz, Eike Kiltz:

Programmable Hash Functions and Their Applications. 270 - Charles Bouillaguet, Pierre-Alain Fouque, Gilles Macario-Rat:

Practical Key-recovery For All Possible Parameters of SFLASH. 271 - Seny Kamara, Payman Mohassel, Mariana Raykova:

Outsourcing Multi-Party Computation. 272 - Kai-Min Chung, Yael Tauman Kalai, Feng-Hao Liu, Ran Raz:

Memory Delegation. 273 - (Withdrawn) A Splice-and-Cut Cryptanalysis of the AES. 274

- Jintai Ding:

Inverting the Square systems is exponential. 275 - Stephen C. Williams:

Analysis of the SSH Key Exchange Protocol. 276 - Zvika Brakerski, Craig Gentry, Vinod Vaikuntanathan:

Fully Homomorphic Encryption without Bootstrapping. 277 - Can Zhang:

Comparing Different Definitions of Secure Session. 278 - Craig Gentry, Shai Halevi:

Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits. 279 - Ronald Cramer, Ivan Damgård, Eike Kiltz, Sarah Zakarias, Angela Zottarel:

DDH-like Assumptions Based on Extension Rings. 280 - Michael Backes, Aniket Kate, Arpita Patra:

Computational Verifiable Secret Sharing Revisited. 281 - Itai Dinur, Tim Güneysu, Christof Paar, Adi Shamir, Ralf Zimmermann:

An Experimentally Verified Attack on Full Grain-128 Using Dedicated Reconfigurable Hardware. 282 - Mingqiang Wang, Xiaoyun Wang, Tao Zhan:

The Fault Attack ECDLP Revisited. 283 - (Withdrawn) On the Security of PPPoE Network. 284

- Andrea Röck, Kaisa Nyberg:

Exploiting Linear Hull in Matsui's Algorithm 1 (extended version). 285 - Dmitry Khovratovich, Christian Rechberger, Alexandra Savelieva:

Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family. 286 - Stanislav Bulygin:

Algebraic cryptanalysis of the round-reduced and side channel analysis of the full PRINTCipher-48. 287 - Ashish Choudhury, Arpita Patra:

On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks. 288 - Martin R. Albrecht, Pooya Farshim, Jean-Charles Faugère, Ludovic Perret:

Polly Cracker, Revisited. 289 - Pantelimon Stanica, Sugata Gangopadhyay, Brajesh Kumar Singh:

Some Results Concerning Generalized Bent Functions. 290 - Elette Boyle, Shafi Goldwasser, Yael Tauman Kalai:

Leakage-Resilient Coin Tossing. 291 - Namhun Koo, Gooc Hwa Jo, Soonhak Kwon:

On Nonlinear Polynomial Selection and Geometric Progression (mod N) for Number Field Sieve. 292 - (Withdrawn) Weakness of a Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography. 293

- Albrecht Petzoldt, Enrico Thomae, Stanislav Bulygin, Christopher Wolf:

Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems. 294 - Pierrick Gaudry, David R. Kohel, Benjamin A. Smith:

Counting Points on Genus 2 Curves with Real Multiplication. 295 - Dennis Hofheinz, Tibor Jager, Eike Kiltz:

Short Signatures From Weaker Assumptions. 296 - Igor A. Semaev, Mehdi M. Hassanzadeh:

New Statistical Box-Test and its Power. 297 - Igor A. Semaev:

Local limit theorem for large deviations and statistical box-tests. 298 - Palash Sarkar:

On Authenticated Encryption Using Stream Ciphers Supporting an Initialisation Vector. 299 - Cas Cremers, Michèle Feltz:

One-round Strongly Secure Key Exchange with Perfect Forward Secrecy and Deniability. 300 - Ronald Cramer, Ivan Damgård, Valerio Pastro:

On the Amortized Complexity of Zero Knowledge Protocols for Multiplicative Relations. 301 - Julien Doget, Emmanuel Prouff, Matthieu Rivain, François-Xavier Standaert:

Univariate Side Channel Attacks and Leakage Modeling. 302 - Dennis Hofheinz, Victor Shoup:

GNUC: A New Universal Composability Framework. 303 - Jia Xu:

Auditing the Auditor: Secure Delegation of Auditing Operation over Cloud Storage. 304 - Seyyed Amir Mortazavi:

A new attack on Jakobsson Hybrid Mix-Net. 305 - Craig Costello, Kristin E. Lauter:

Group Law Computations on Jacobians of Hyperelliptic Curves. 306 - ZiJie Xu, Ke Xu:

Ways to restrict the differential path. 307 - Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi:

Provably Secure and Practical Onion Routing. 308 - Frederik Armknecht, Daniel Augot, Ludovic Perret, Ahmad-Reza Sadeghi:

On Constructing Homomorphic Encryption Schemes from Coding Theory. 309 - Jonathan Katz, Ueli Maurer, Björn Tackmann, Vassilis Zikas:

Universally Composable Synchronous Computation. 310 - Dan Boneh, Gil Segev, Brent Waters:

Targeted Malleability: Homomorphic Encryption for Restricted Computations. 311 - Nicolas T. Courtois, Michal Misztal:

Differential Cryptanalysis of GOST. 312 - Arpita Patra:

Error-free Multi-valued Broadcast and Byzantine Agreement with Optimal Communication Complexity. 313 - Sebastian Faust, Krzysztof Pietrzak, Daniele Venturi:

Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience. 314 - Zhi Hu, Patrick Longa, Maozhi Xu:

Implementing 4-Dimensional GLV Method on GLS Elliptic Curves with j-Invariant 0. 315 - Dominique Schröder, Dominique Unruh:

Security of Blind Signatures Revisited. 316 - Helger Lipmaa:

Two Simple Code-Verification Voting Protocols. 317 - Sujoy Sinha Roy, Chester Rebeiro, Debdeep Mukhopadhyay, Junko Takahashi, Toshinori Fukunaga:

Scalar Multiplication on Koblitz Curves using tau2-NAF. 318 - Jan Camenisch, Kristiyan Haralambiev, Markulf Kohlweiss, Jorn Lapon, Vincent Naessens:

Structure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties. 319 - Manan Nayak, Shashank Agrawal, Kannan Srinathan:

Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks. 320 - Ulrich Dürholz, Marc Fischlin, Michael Kasper, Cristina Onete

:
A Formal Approach to Distance-Bounding RFID Protocols. 321 - Carolyn Whitnall, Elisabeth Oswald:

A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework. 322 - Shusheng Liu, Libin Wang, Zheng Gong:

Improved Related-Key Boomerang Distinguishing Attack of Threefish-256. 323 - Samuel Ranellucci, Alain Tapp, Severin Winkler, Jürg Wullschleger:

On the Efficiency of Bit Commitment Reductions. 324 - Aram Jivanyan, Gurgen Khachatryan:

New Receipt-Free E-Voting Scheme and Self-Proving Mix Net as New Paradigm. 325 - Markku-Juhani O. Saarinen:

SGCM: The Sophie Germain Counter Mode. 326 - Eyal Kushilevitz, Steve Lu, Rafail Ostrovsky:

On the (In)security of Hash-based Oblivious RAM and a New Balancing Scheme. 327 - Chunsheng Gu:

Cryptanalysis of the Smart-Vercauteren and Gentry-Halevi's Fully Homomorphic Encryption. 328 - Alexandre Duc, Dimitar Jetchev:

Hardness of Computing Individual Bits for Pairing-based One-way Functions. 329 - Ashish Choudhury:

Simple and Asymptotically Optimal t-Cheater Identifiable Secret Sharing Scheme. 330 - Masoumeh Safkhani, Pedro Peris-Lopez, Julio César Hernández Castro, Nasour Bagheri, Majid Naderi:

Cryptanalysis of Cho et al.'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems. 331 - Joan Boyar, René Peralta:

A depth-16 circuit for the AES S-box. 332 - Debiao He:

Cryptanalysis of a key agreement protocol based on chaotic Hash. 333 - Michael Scott:

On the Efficient Implementation of Pairing-Based Protocols. 334 - István Vajda:

New look at impossibility result on Dolev-Yao models with hashes. 335 - (Withdrawn) Weakness in an ECC-based AKA Protocol for Wireless Mobile Communications. 336

- Nishanth Chandran, Melissa Chase, Vinod Vaikuntanathan:

Collusion Resistant Obfuscation and Functional Re-encryption. 337 - Matthieu Rivain:

Fast and Regular Algorithms for Scalar Multiplication over Elliptic Curves. 338 - Thomas Ristenpart, Hovav Shacham, Thomas Shrimpton:

Careful with Composition: Limitations of Indifferentiability and Universal Composability. 339 - Feng Liu, Peng Li, Chuan Kun Wu:

Encrypting More Information in Visual Cryptography Scheme. 340 - (Withdrawn) An Improved Internet Voting Protocol. 341

- Melissa Chase, Markulf Kohlweiss:

A Domain Transformation for Structure-Preserving Signatures on Group Elements. 342 - Neal Koblitz, Alfred Menezes:

Another Look at Security Definitions. 343 - Zvika Brakerski, Vinod Vaikuntanathan:

Efficient Fully Homomorphic Encryption from (Standard) LWE. 344 - Wenling Wu, Lei Zhang:

LBlock: A Lightweight Block Cipher. 345 - Hai Huang:

Strongly Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security. 346 - (Withdrawn) An efficient certificateless authenticated key agreement protocol without bilinear pairings. 347

- Marcel Medwed, François-Xavier Standaert:

Extractors Against Side-Channel Attacks: Weak or Strong? 348 - Chong Hee Kim:

Efficient Methods for Exploiting Faults Induced at AES Middle Rounds. 349 - Carl Bosley, Kristiyan Haralambiev, Antonio Nicolosi:

HBN: An HB-like protocol secure against man-in-the-middle attacks. 350 - (Withdrawn) Cryptanalysis of the AAbeta Cryptosystem based on Linear Diophantine Equation Discrete Log Problem. 351

- Adam O'Neill, Chris Peikert, Brent Waters:

Bi-Deniable Public-Key Encryption. 352 - Masahito Gotaishi, Shigeo Tsujii:

Hidden Pair of Bijection Signature Scheme. 353 - Nicolas Guillermin:

A coprocessor for secure and high speed modular arithmetic. 354 - Oana Ciobotaru:

Comparing UC Security Variants. 355 - Ayoub Otmani, Jean-Pierre Tillich:

An Efficient Attack on All Concrete KKS Proposals. 356 - Gilbert Baumslag, Nelly Fazio, Antonio Nicolosi, Vladimir Shpilrain, William E. Skeith III:

Generalized Learning Problems and Applications to Non-Commutative Cryptography. 357 - Zhiqiang Lin, Dingyi Pei:

Constructing a Diversified FCSR with a Given Connection Integer. 358 - Nathaniel Wesley Filardo, Giuseppe Ateniese:

High-Entropy Visual Identification for Touch Screen Devices. 359 - Ziba Eslami, Nasrollah Pakniat:

Certificateless Aggregate Signcryption Schemes. 360 - S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan:

Compact CCA-Secure Encryption with Ciphertext Verifiability. 361 - Jia Xu, Ee-Chien Chang:

Practically Efficient Proof of Retrievability in Cloud Storage. 362 - (Withdrawn) Dynamic Group Blind Signatures. 363

- Jean-Pierre Flori, Sihem Mesnager, Gérard D. Cohen:

The Value 4 of Binary Kloosterman Sums. 364 - Debiao He:

Security flaws in a biometrics-based multi-server authentication with key agreement scheme. 365 - Deng Tang, Claude Carlet, Xiaohu Tang:

Highly Nonlinear Boolean Functions with Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks. 366 - Nicolas Sendrier:

Decoding One Out of Many. 367 - Daniel J. Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, Bo-Yin Yang:

High-speed high-security signatures. 368 - Yevgeniy Dodis, Allison B. Lewko, Brent Waters, Daniel Wichs:

Storing Secrets on Continually Leaky Devices. 369 - Mehrdad Nojoumian:

Socio-Rational Secret Sharing as a New Direction in Both Rational Cryptography and Game Theory. 370 - Paulo S. L. M. Barreto, Richard Lindner, Rafael Misoczki:

Monoidic Codes in Cryptography. 371 - Prashant Kushwah, Sunder Lal:

Identity based signcryption schemes without random oracles. 372 - Jean-Pierre Flori, Sihem Mesnager:

An efficient characterization of a family of hyperbent functions with multiple trace terms. 373 - Ethan Heilman:

Restoring the Differential Resistance of MD6. 374 - László Csirmaz:

Complexity of universal access structures. 375 - Julien Bringer, Alain Patey:

Backward Unlinkability for a VLR Group Signature Scheme with Efficient Revocation Check. 376 - Paul Kirchner:

Improved Generalized Birthday Attack. 377 - Amadou Tall:

A generalization of the Lucas addition chains. 378 - (Withdrawn) Cryptanalysis and improvement of a certificateless multi-proxy signature scheme. 379

- Carolyn Whitnall, Elisabeth Oswald, Luke Mather:

An Exploration of the Kolmogorov-Smirnov Test as Competitor to Mutual Information Analysis. 380 - Yalin Chen, Jue-Sam Chou, Chi-Fong Lin, Cheng-Lun Wu:

A Novel RFID Authentication Protocol based on Elliptic Curve Cryptosystem. 381 - Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:

Generic Fully Simulatable Adaptive Oblivious Transfer. 382 - Stefan Maubach:

A representation of the p-sylow subgroup of Perm(Fpn) and a cryptographic application. 383 - Steve Lu, Rafail Ostrovsky:

Multi-Server Oblivious RAM. 384 - Azhar Ali Khan, Ghulam Murtaza:

Efficient Implementation of Grand Cru with TI C6x+ Processor. 385 - László Csirmaz:

How to share secrets simultaneously. 386 - Jin Hong, Ga Won Lee, Daegun Ma:

Analysis of the Parallel Distinguished Point Tradeoff. 387 - Eric Brier, David Naccache, Phong Q. Nguyen, Mehdi Tibouchi:

Modulus Fault Attacks Against RSA-CRT Signatures. 388 - Mike Hamburg:

Spatial Encryption. 389 - Amir Moradi, Alessandro Barenghi, Timo Kasper, Christof Paar:

On the Vulnerability of FPGA Bitstream Encryption against Power Analysis Attacks - Extracting Keys from Xilinx Virtex-II FPGAs. 390 - Amir Moradi, Markus Kasper, Christof Paar:

On the Portability of Side-Channel Attacks - An Analysis of the Xilinx Virtex 4 and Virtex 5 Bitstream Encryption Mechanism. 391 - Yun Zhang, Christophe Tartary, Huaxiong Wang:

An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem (Revised Version). 392 - (Withdrawn) Analysis and Improvement of Thing's Time-Memory Trade-Off Attack. 393

- Helger Lipmaa, Bingsheng Zhang:

A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument. 394 - Michael Beye, Thijs Veugen:

Improved Anonymity for Key-Trees. 395 - Adam Groce, Jonathan Katz:

Fair Computation with Rational Players. 396 - Liqun Chen, Yu Chen:

The n-Diffie-Hellman Problem and its Applications. 397 - Nelly Fazio, Kevin Iga, Antonio Nicolosi, Ludovic Perret, William E. Skeith III:

Random Self-Reducibility Properties of Learning Problems over Burnside Groups of Exponent 3. 398 - Luk Bettale, Jean-Charles Faugère, Ludovic Perret:

Cryptanalysis of HFE, Multi-HFE and Variants for Odd and Even Characteristic. 399 - Gérard D. Cohen, Jean-Pierre Flori:

On a generalized combinatorial conjecture involving addition mod 2k-1. 400 - Abhishek Banerjee, Chris Peikert, Alon Rosen:

Pseudorandom Functions and Lattices. 401 - Essam Ghadafi:

Formalizing Group Blind Signatures and Practical Constructions without Random Oracles. 402 - Carolyn Whitnall, Elisabeth Oswald:

A Fair Evaluation Framework for Comparing Side-Channel Distinguishers. 403 - Seiko Arita:

A constant-round resettably-sound resettable zero-knowledge argument in the BPK model. 404 - Kristin E. Lauter, Michael Naehrig, Vinod Vaikuntanathan:

Can Homomorphic Encryption be Practical? 405 - Ralf Küsters, Max Tuengerthal:

Composition Theorems Without Pre-Established Session Identifiers. 406 - Elaine Shi, T.-H. Hubert Chan, Emil Stefanov, Mingfei Li:

Oblivious RAM with O((log N)3) Worst-Case Cost. 407 - Yi Deng, Dengguo Feng, Vipul Goyal, Dongdai Lin, Amit Sahai, Moti Yung:

Resettable Cryptography in Constant Rounds - the Case of Zero Knowledge. 408 - (Withdrawn) Efficient Predicate Encryption Supporting Construction of Fine-Grained Searchable Encryption. 409

- Shweta Agrawal, David Mandell Freeman, Vinod Vaikuntanathan:

Functional Encryption for Inner Product Predicates from Learning with Errors. 410 - Debiao He:

Comments on a password authentication and update scheme based on elliptic curve cryptography. 411 - Andrew Moss, Elisabeth Oswald, Dan Page, Michael Tunstall:

Automatic Insertion of DPA Countermeasures. 412 - Emmanuel Prouff, Thomas Roche:

Higher-Order Glitches Free Implementation of the AES using Secure Multi-Party Computation. 413 - Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris, Hoeteck Wee:

Fuzzy Identity Based Encryption from Lattices. 414 - Lei Li, Siman Yang:

On the Access Structures of Hyperelliptic Secret Sharing. 415 - Ilya Popovyan:

Efficient Parallelization of Lanczos Type Algorithms. 416 - Eli Biham, Orr Dunkelman, Nathan Keller, Adi Shamir:

New Data-Efficient Attacks on Reduced-Round IDEA. 417 - Jue-Sam Chou, Yalin Chen, Cheng-Lun Wu, Chi-Fong Lin:

An efficient RFID mutual authentication scheme based on ECC. 418 - (Withdrawn) On the security of a certificateless short signature scheme. 419

- Alexandre Duc, Jian Guo, Thomas Peyrin, Lei Wei:

Unaligned Rebound Attack - Application to Keccak. 420 - Ivan Damgård, Jakob Funder, Jesper Buus Nielsen, Louis Salvail:

Superposition Attacks on Cryptographic Protocols}. 421 - Jérémy Jean, María Naya-Plasencia, Martin Schläffer:

Improved Analysis of ECHO-256. 422 - Martin Ågren, Thomas Johansson:

Linear Cryptanalysis of PRINTcipher - Trails and Samples Everywhere. 423 - Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:

Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol. 424 - Laurie Genelle, Emmanuel Prouff, Michaël Quisquater:

Thwarting Higher-Order Side Channel Analysis with Additive and Multiplicative Maskings. 425 - Masoumeh Safkhani, Nasour Bagheri, Somitra Kumar Sanadhya, Majid Naderi:

Cryptanalysis of improved Yeh et al.'s authentication Protocol: An EPC Class-1 Generation-2 standard compliant protocol. 426 - Abderrahmane Nitaj:

A new attack on the KMOVcryptosystem. 427 - Tatsuya Takehisa, Hiroki Nogawa, Masakatu Morii:

AES Flow Interception: Key Snooping Method on Virtual Machine - Exception Handling Attack for AES-NI -. 428 - Sven Laur, Jan Willemson

, Bingsheng Zhang:
Round-efficient Oblivious Database Manipulation. 429 - Dustin Moody, Daniel Shumow:

Analogues of Velu's formulas for Isogenies on Alternate Models of Elliptic Curves. 430 - Enrico Thomae, Christopher Wolf:

Roots of Square: Cryptanalysis of Double-Layer Square and Square+. 431 - Mihir Bellare, David Cash, Sriram Keelveedhi:

Ciphers that Securely Encipher their own Keys. 432 - Joël Alwen, Jonathan Katz, Ueli Maurer, Vassilis Zikas:

Collusion-Preserving Computation. 433 - Payman Mohassel, Salman Niksefat, Seyed Saeed Sadeghian, Babak Sadeghiyan:

A New Protocol for Oblivious DFA Evaluation and Applications. 434 - Yehuda Lindell, Benny Pinkas, Eli Oxman:

The IPS Compiler: Optimizations, Variants and Concrete Efficiency. 435 - Yuanmi Chen, Phong Q. Nguyen:

Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the Integers. 436 - Henry Cohn, Nadia Heninger:

Approximate common divisors via lattices. 437 - Philippe Camacho, Alejandro Hevia:

Short Transitive Signatures for Directed Trees. 438 - Philippe Camacho:

Optimal Data Authentication from Directed Transitive Signatures. 439 - Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi:

Optimization of Fully Homomorphic Encryption. 440 - Jean-Sébastien Coron, Avradip Mandal, David Naccache, Mehdi Tibouchi:

Fully Homomorphic Encryption over the Integers with Shorter Public Keys. 441 - Sanjit Chatterjee, Alfred Menezes, Palash Sarkar:

Another Look at Tightness. 442 - Nir Bitansky, Ran Canetti, Alessandro Chiesa, Eran Tromer:

From Extractable Collision Resistance to Succinct Non-Interactive Arguments of Knowledge, and Back Again. 443 - Robert Granger, Andrew Moss:

Generalised Mersenne Numbers Revisited. 444 - (Withdrawn) Privacy-Preserving Friend Search over Online Social Networks. 445

- (Withdrawn) Private Information Extraction over Online Social Networks. 446

- Ayad F. Barsoum, M. Anwar Hasan:

On Verifying Dynamic Multiple Data Copies over Cloud Servers. 447 - Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul, Santanu Sarkar:

RC4: (Non-)Random Words from (Non-)Random Permutations. 448 - Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger:

Biclique Cryptanalysis of the Full AES. 449 - (Withdrawn) R-hash : Hash Function Using Random Quadratic Polynomials Over GF(2). 450

- Hakhyun Kim, Woongryul Jeon, Yunho Lee, Dongho Won:

Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme. 451 - Manish Garg, Sugata Gangopadhyay:

The Good lower bound of Second-order nonlinearity of a class of Boolean function. 452 - Michael Tunstall:

Practical Complexity Differential Cryptanalysis and Fault Analysis of AES. 453 - Steven A. Myers, Mona Sergi, Abhi Shelat:

Threshold Fully Homomorphic Encryption and Secure Computation. 454 - Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang:

The Relation and Transformation between Hierarchical Inner Product Encryption and Spatial Encryption. 455 - Shafi Goldwasser, Huijia Lin, Aviad Rubinstein:

Delegation of Computation without Rejection Problem from Designated Verifier CS-Proofs. 456 - Sanjam Garg

, Rafail Ostrovsky, Ivan Visconti, Akshay Wadia:
Resettable Statistical Zero Knowledge. 457 - Michael Schneider:

Sieving for Shortest Vectors in Ideal Lattices. 458 - Joan Daemen, Tony Dusenge, Gilles Van Assche:

Sufficient conditions for sound hashing using a truncated permutation. 459 - Zijian Zhang, Liehuang Zhu, Lejian Liao:

Computationally Sound Symbolic Security Reduction Analysis of Group Key Exchange Protocol using Bilinear Pairings. 460 - Fangguo Zhang, Ping Wang:

Speeding Up Elliptic Curve Discrete Logarithm Computations with Point Halving. 461 - Marina Blanton

, Mehrdad Aliasgari:
Secure Outsourced Computation of Iris Matching. 462 - Duong Hieu Phan, David Pointcheval, Mario Strefler:

Adaptively Secure Broadcast Encryption with Forward Secrecy. 463 - Marina Blanton

, Everaldo Aguiar:
Private and Oblivious Set and Multiset Operations. 464 - Craig Costello, Kristin E. Lauter, Michael Naehrig:

Attractive Subfamilies of BLS Curves for Implementing High-Security Pairings. 465 - Keting Jia, Hongbo Yu, Xiaoyun Wang:

A Meet-in-the-Middle Attack on the Full KASUMI. 466 - Muhammad Rezal Kamel Ariffin, M. A. Asbullah, Nor Azman Abu:

Security Features of an Asymmetric Cryptosystem based on the Diophantine Equation Discrete Log Problem. 467 - Hongfeng Wu, Changan Zhao:

Faster Scalar Multiplication on Ordinary Weierstrass Elliptic Curves over Fields of Characteristic Three. 468 - ChangKyun Kim, Eun-Gu Jung, Dong Hoon Lee, Chang-Ho Jung, Daewan Han:

Cryptanalysis of INCrypt32 in HID's iCLASS Systems. 469 - István Vajda:

Non-malleable public key encryption in BRSIM/UC. 470 - Peter Scholl, Nigel P. Smart:

Improved Key Generation For Gentry's Fully Homomorphic Encryption Scheme. 471 - Joseph K. Liu, Tsz Hon Yuen, Jianying Zhou:

Forward Secure Ring Signature without Random Oracles. 472 - Jia Xu:

Practically Efficient Verifiable Delegation of Polynomial and its Applications. 473 - Anja Becker, Jean-Sébastien Coron, Antoine Joux:

Improved Generic Algorithms for Hard Knapsacks. 474 - Nicolas T. Courtois, Daniel Hulme, Theodosis Mourouzis:

Solving Circuit Optimisation Problems in Cryptography and Cryptanalysis. 475 - Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia:

Anonymous Broadcast Encryption. 476 - Abderrahmane Nitaj:

Cryptanalysis of NTRU with two public keys. 477 - Debiao He, Sahadeo Padhye:

A Pairing-free Certificateless Authenticated Key Agreement Protocol in the eCK Model. 478 - Mihir Bellare, Eike Kiltz, Chris Peikert, Brent Waters:

Identity-Based (Lossy) Trapdoor Functions and Applications. 479 - Sanjay Bhattacherjee, Palash Sarkar:

Complete Tree Subset Difference Broadcast Encryption Scheme and its Analysis. 480 - Pierre-Alain Fouque, Mehdi Tibouchi:

Close to Uniform Prime Number Generation With Fewer Random Bits. 481 - S. Dov Gordon, Jonathan Katz, Vladimir Kolesnikov, Tal Malkin, Mariana Raykova, Yevgeniy Vahlis:

Secure Computation with Sublinear Amortized Work. 482 - Mario Romsy:

Adaption of Pollard's kangaroo algorithm to the FACTOR problem. 483 - Johannes Buchmann, Erik Dahmen, Andreas Hülsing:

XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions. 484 - Neal Koblitz:

Another Look at Automated Theorem-Proving. II. 485 - Kenneth G. Paterson, Jacob C. N. Schuldt, Martijn Stam, Susan Thomson:

On the Joint Security of Encryption and Signature, Revisited. 486 - Raghav Bhaskar, Abhishek Bhowmick, Vipul Goyal, Srivatsan Laxman, Abhradeep Thakurta:

Noiseless Database Privacy. 487 - Kai-Yuen Cheong:

A Survey of Cryptography Based on Physically Unclonable Objects. 488 - A. N. Alekseychuk, L. V. Kovalchuk:

Towards a Theory of Security Evaluation for GOST-like Ciphers against Differential and Linear Cryptanalysis. 489 - Allison B. Lewko:

Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting. 490 - (Withdrawn) Cryptanalysis of a Privacy-Preserving Communication Architecture for V2G Networks in Smart Grid. 491

- Long Hoang Nguyen:

Rational distance-bounding protocols over noisy channels. 492 - Nir Bitansky, Omer Paneth:

From Point Obfuscation To 3-round Zero-Knowledge. 493 - Carmit Hazay, Gert Læssøe Mikkelsen, Tal Rabin, Tomas Toft:

Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting. 494 - Dario Catalano, Dario Fiore:

Concise Vector Commitments and their Applications to Zero-Knowledge Elementary Databases. 495 - Avradip Mandal, Jacques Patarin, Yannick Seurin:

On the Public Indifferentiability and Correlation Intractability of the 6-Round Feistel Construction. 496 - Antoine Amarilli, David Naccache, Pablo Rauzy, Emil Simion:

Can a Program Reverse-Engineer Itself? 497 - Jue-Sam Chou, Shih-Che Hung, Yalin Chen:

An Efficient Secure Anonymous Proxy Signature Scheme. 498 - Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche:

Duplexing the sponge: single-pass authenticated encryption and other applications. 499 - Hamid Mala:

Biclique Cryptanalysis of the Block Cipher SQUARE. 500 - Daniele Micciancio, Chris Peikert:

Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller. 501 - Daniel J. Bernstein, Tanja Lange, Christiane Peters:

Wild McEliece Incognito. 502 - Christina Boura, Anne Canteaut:

On the influence of the algebraic degree of F-1 on the algebraic degree of G circ F. 503 - Iftach Haitner, Itay Berman:

From Non-Adaptive to Adaptive Pseudorandom Functions. 504 - Julien Doget, Guillaume Dabosville, Emmanuel Prouff:

Defeat Masking With a (Very) Few Knowledge About the Leakage. 505 - David Jao, Luca De Feo:

Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. 506 - Charanjit S. Jutla, Arnab Roy:

Relatively-Sound NIZKs and Password-Based Key-Exchange. 507 - Ivan Damgård, Sebastian Faust, Carmit Hazay:

Secure Two-Party Computation with Low Communication. 508 - Emil Stefanov, Elaine Shi, Dawn Song:

Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies. 509 - Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Hong-Sheng Zhou:

On the Security of the Free-XOR Technique. 510 - Matthias Krause, Matthias Hamann:

The Cryptographic Power of Random Selection. 511 - Benny Applebaum, Andrej Bogdanov, Alon Rosen:

A Dichotomy for Local Small-Bias Generators. 512 - Abhishek Jain

, Omkant Pandey:
Non-Malleable Zero Knowledge: Black-Box Constructions and Definitional Relationships. 513 - Mohammad Sadeq Dousti, Rasool Jalili:

Milder Definitions of Computational Approximability: The Case of Zero-Knowledge Protocols. 514 - Qingfang Jin, Zhuojun Liu, Baofeng Wu, Xiaoming Zhang:

A general conjecture similar to T-D conjecture and its applications in constructing Boolean functions with optimal algebraic immunity. 515 - Louis Goubin, Ange Martinelli:

Protecting AES with Shamir's Secret Sharing Scheme. 516 - Ralf Küsters, Tomasz Truderung, Andreas Vogt:

Verifiability, Privacy, and Coercion-Resistance: New Insights from a Case Study. 517 - Ran Canetti, Ben Riva, Guy N. Rothblum:

Two 1-Round Protocols for Delegation of Computation. 518 - Stefan Dziembowski

, Sebastian Faust:
Leakage-Resilient Cryptography From the Inner-Product Extractor. 519 - Houssem Maghrebi, Sylvain Guilley, Claude Carlet, Jean-Luc Danger:

Classification of High-Order Boolean Masking Schemes and Improvements of their Efficiency. 520 - Daniele Micciancio, Petros Mol:

Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions. 521 - Imran Abbasi, Mehreen Afzal:

A Compact S-Box Design for SMS4 Block Cipher. 522 - (Withdrawn) Security analysis of a fuzzy identity-based encryption scheme. 523

- Leibo Li, Jiazhe Chen, Xiaoyun Wang:

Multiplied Conditional Impossible Differential Attack on Reduced-Round Camellia. 524 - Yanbin Pan, Feng Zhang:

A Note on the Density of the Multiple Subset Sum Problems. 525 - Suresh Chari, Charanjit S. Jutla, Arnab Roy:

Universally Composable Security Analysis of OAuth v2.0. 526 - (Withdrawn) Security Weaknesses of password-only authenticated key establishment protocol without public key cryptography. 527

- Jian-Zhu Lu, Hong-Qing Ren, Jipeng Zhou:

Efficient Delegation-Based Authentication Protocol with Strong Mobile Privacy. 528 - Qingji Zheng, Shouhuai Xu:

Secure and Efficient Proof of Storage with Deduplication. 529 - Stefan Dziembowski, Tomasz Kazana, Daniel Wichs:

Key-Evolution Schemes Resilient to Space-Bounded Leakage. 530 - Philippe Loubet-Moundi, David Vigilant, Francis Olivier:

Static Fault Attacks on Hardware DES Registers. 531 - Bart Mennink, Bart Preneel:

Hash Functions Based on Three Permutations: A Generic Security Analysis. 532 - Abhi Shelat, Chih-Hao Shen:

Two-Output Secure Computation with Malicious Adversaries. 533 - Maxime Nassar, Sylvain Guilley, Jean-Luc Danger:

Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks. 534 - Ivan Damgård, Valerio Pastro, Nigel P. Smart, Sarah Zakarias:

Multiparty Computation from Somewhat Homomorphic Encryption. 535 - Rafail Ostrovsky, Vanishree Rao, Alessandra Scafuro, Ivan Visconti:

Revisiting Lower and Upper Bounds for Selective Decommitments. 536 - Vadim Lyubashevsky:

Lattice Signatures Without Trapdoors. 537 - Jia Xu:

Secure Cloud Storage with Encrypted Data using File-Based Authentication. 538 - Ching-Hua Yu:

Sign Modules in Secure Arithmetic Circuits. 539 - Yosuke Katoh, Yun-Ju Huang, Chen-Mou Cheng, Tsuyoshi Takagi:

Efficient Implementation of the etaT Pairing on GPU. 540 - Orr Dunkelman, Nathan Keller, Adi Shamir:

Minimalism in Cryptography: The Even-Mansour Scheme Revisited. 541 - Yang Lu, Jiguo Li:

Certificate-Based Signcryption: Security Model and Efficient Construction. 542 - Tatsuaki Okamoto, Katsuyuki Takashima:

Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption. 543 - Andres Molina-Markham, George Danezis, Kevin Fu, Prashant J. Shenoy, David E. Irwin:

Designing Privacy-preserving Smart Meters with Low-cost Microcontrollers. 544 - Masao Kasahara:

Public Key Cryptosystems Constructed Based on Random Pseudo Cyclic Codes, K(IX)SE(1)PKC, Realizing Coding Rate of Exactly 1.0. 545 - Angelo De Caro, Vincenzo Iovino, Giuseppe Persiano:

Hidden Vector Encryption Fully Secure Against Unrestricted Queries. 546 - Zhaopeng Dai, Zhuojun Liu:

The Single Cycle T-functions. 547 - Vladimir O. Drelikhov, Grigory B. Marshalko, Alexey V. Pokrovskiy:

On the security of MQ_DRBG. 548 - Qingfang Jin, Zhuojun Liu, Baofeng Wu:

1-Resilient Boolean Function with Optimal Algebraic Immunity. 549 - Javad Alizadeh, Abdolrasoul Mirghadri:

A New Distinguisher for CubeHash-8/b and CubeHash-15/b Compression Functions. 550 - Shengbao Wu, Mingsheng Wang:

Security Evaluation against Differential Cryptanalysis for Block Cipher Structures. 551 - Stefan Katzenbeisser, Ünal Koçabas, Vincent van der Leest, Ahmad-Reza Sadeghi, Geert Jan Schrijen, Heike Schröder, Christian Wachsmann:

Recyclable PUFs: Logically Reconfigurable PUFs. 552 - Mohammad Mahmoody, Tal Moran, Salil P. Vadhan:

Non-Interactive Time-Stamping and Proofs of Work in the Random Oracle Model. 553 - Yu-Chi Chen, Gwoboa Horng:

On the security models for certificateless signature schemes achieving level 3 security. 554 - Michelle Kendall, Keith M. Martin:

On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks. 555 - Yongjia Wang, Haining Fan:

GF(2n) redundant representation using matrix embedding. 556 - Cai-Sen Chen, Tao Wang, Xiaocen Chen, Ping Zhou:

An Improved Trace Driven Instruction Cache Timing Attack on RSA. 557 - Itai Dinur, Orr Dunkelman, Adi Shamir:

Improved Attacks on Full GOST. 558 - Eike Kiltz, Adam O'Neill, Adam D. Smith:

Instantiability of RSA-OAEP under Chosen-Plaintext Attack. 559 - Ching-Hua Yu, Bo-Yin Yang:

Randomized Secure Two-Party Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation. 560 - Alex Bain, John C. Mitchell, Rahul Sharma, Deian Stefan, Joe Zimmerman:

A Domain-Specific Language for Computing on Encrypted Data. 561 - Annalisa De Bonis, Giovanni Di Crescenzo:

A Group Testing Approach to Improved Corruption Localizing Hashing. 562 - Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:

On the Security of RFID Anti Cloning Security Protocol(ACSP). 563 - Naveed Ahmed, Christian Damsgaard Jensen, Erik Zenner:

Private-key Symbolic Encryption. 564 - Saif Al-Kuwari, James H. Davenport, Russell J. Bradford:

Cryptographic Hash Functions: Recent Design Trends and Security Notions. 565 - Craig Gentry, Shai Halevi, Nigel P. Smart:

Fully Homomorphic Encryption with Polylog Overhead. 566 - Moon Sung Lee:

On the sparse subset sum problem from Gentry-Halevi's implementation of fully homomorphic encryption. 567 - Aleksander Essex, Christian Henrich, Urs Hengartner:

Single Layer Optical-scan Voting with Fully Distributed Trust. 568 - Ming Li, Ali Miri, Daming Zhu:

Analysis of the Hamming Weight of the Extended wmbNAF. 569 - Jintai Ding, Thorsten Kleinjung:

Degree of regularity for HFE-. 570 - (Withdrawn) Lower Bound on Covering Radius of Reed-Muller Codes in Set of Balanced Functions. 571

- Ayan Mahalanobis:

The ElGamal cryptosystem over circulant matrices. 572 - Masao Kasahara:

A New Class of Multivariate Public Key Cryptosystems Constructed Based on Random Pseudo Cyclic Codes, K(XIII)SE(2)PKC, Realizing Coding Rate of Exactly 1.0. 573 - Jia Xu, Ee-Chien Chang:

Towards Efficient Provable Data Possession. 574 - Jing Liu, Changji Wang:

Exclusive Key-Based Group Rekeying. 575 - Jing Liu, Qiong Huang, Bo Yang:

Efficient Multicast Key Distribution Using HOWF-based Access Control Structures. 576 - Ou Ruan, Cai Fu, Guohua Cui:

An Efficient Protocol for the Commit-Prove-Fair-Open functionality. 577 - Balasingham Balamohan:

ACCELERATING THE SCALAR MULTIPLICATION ON GENUS 2 HYPERELLIPTIC CURVE CRYPTOSYSTEMS. 578 - Yang Li, Daisuke Nakatsu, Qi Li, Kazuo Ohta, Kazuo Sakiyama:

Clockwise Collision Analysis - Overlooked Side-Channel Leakage Inside Your Measurements. 579 - Abdoul Aziz Ciss, Djiby Sow:

On a new generalization of Huff curves. 580 - Mihir Bellare, Rafael Dowsley, Brent Waters, Scott Yilek:

Standard Security Does Not Imply Security Against Selective-Opening. 581 - Abdoul Aziz Ciss, Djiby Sow:

Randomness Extraction in finite fields Fpn. 582 - Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang, Khoa Nguyen:

Revocable Identity-Based Encryption from Lattices. 583 - Teruo Saito:

A Single-Key Attack on 6-Round KASUMI. 584 - Emil Stefanov, Marten van Dijk, Alina Oprea, Ari Juels:

Iris: A Scalable Cloud File System with Efficient Integrity Checks. 585 - Mainack Mondal, Avik Chakraborti, Nilanjan Datta, Debdeep Mukhopadhyay:

TweLEX: A Tweaked Version of the LEX Stream Cipher. 586 - Charalampos Papamanthou, Elaine Shi, Roberto Tamassia:

Publicly Verifiable Delegation of Computation. 587 - Arpita Maitra, Goutam Paul:

A Note on Four-State BB84 Protocol. 588 - Chen Su, Haining Fan:

Impact of Intel's New Instruction Sets on Software Implementation of GF(2)[x] Multiplication. 589 - Jianwei Li, Yanbin Pan, Mingjie Liu, Guizhen Zhu:

An Efficient Broadcast Attack against NTRU. 590 - Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu:

A Unified Framework for Small Secret Exponent Attack on RSA. 591 - Laila El Aimani:

Generic Constructions for Verifiable Signcryption. 592 - Yu Chen, Liqun Chen, Zongyang Zhang:

CCA Secure IB-KEM from the Computational Bilinear Diffie-Hellman Assumption in the Standard Model. 593 - Dalia Khader, Peter Y. A. Ryan:

Receipt Freeness of Prêt à Voter Provably Secure. 594 - (Withdrawn) Efficient Multi-Query CPIR from Ring-LWE. 595

- Seny Kamara, Mariana Raykova:

Parallel Homomorphic Encryption. 596 - Bryan Parno, Mariana Raykova, Vinod Vaikuntanathan:

How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption. 597 - Jean-Charles Faugère, Ludovic Perret, Christophe Petit, Guénaël Renault:

New Subexponential Algorithms for Factoring in SL(2, fq). 598 - (Withdrawn) Efficient Password-Based Authenticated Key Exchange from Lattices. 599

- Baocheng Wang, Chunming Tang, Yanfeng Qi, Yixian Yang, Maozhi Xu:

A New Class of Hyper-bent Boolean Functions with Multiple Trace Terms. 600 - Caixue Zhou:

A Multi-Receiver ID-Based Generalized Signcryption Scheme. 601 - Vipul Goyal:

Positive Results for Concurrently Secure Computation in the Plain Model. 602 - (Withdrawn) Advanced Zero-Sum Distinguishers for the Permutations of the PHOTON Family. 603

- Aurore Guillevic, Damien Vergnaud:

Genus 2 Hyperelliptic Curve Families with Explicit Jacobian Order Evaluation and Pairing-Friendly Constructions. 604 - Payman Mohassel:

Efficient and Secure Delegation of Linear Algebra. 605 - (Withdrawn) GF(2n) Subquadratic Polynomial Basis Multipliers for Some Irreducible Trinomials. 606

- Carlos Aguilar Melchor, Slim Bettaieb, Philippe Gaborit, Javier Herranz:

Improving Additive and Multiplicative Homomorphic Encryption Schemes Based on Worst-Case Hardness Assumptions}. 607 - Peter Birkner, Patrick Longa, Francesco Sica:

Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication. 608 - Jian Guo, Thomas Peyrin, Axel Poschmann:

The PHOTON Family of Lightweight Hash Functions. 609 - Nicolas Veyrat-Charvillon, Benoît Gérard, Mathieu Renauld, François-Xavier Standaert:

An optimal Key Enumeration Algorithm and its Application to Side-Channel Attacks. 610 - Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Muthuramakrishnan Venkitasubramaniam:

Adaptive and Concurrent Secure Computation from New Notions of Non-Malleability. 611 - Vladimir Kolesnikov, Ganapathy S. Sundaram:

IBAKE: Identity-Based Authenticated Key Exchange Protocol. 612 - Gilad Asharov, Abhishek Jain

, Daniel Wichs:
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE. 613 - Keke Chen:

On Security of the Utility Preserving RASP Encryption. 614 - Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart, Mario Strefler:

On the Joint Security of Encryption and Signature in EMV. 615 - Jiazhe Chen, Meiqin Wang, Bart Preneel:

Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT. 616 - Joseph A. Akinyele, Matthew Green, Aviel D. Rubin:

Charm: A framework for Rapidly Prototyping Cryptosystems. 617 - Lishoy Francis, Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis:

Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones. 618 - Bo Zhu, Guang Gong:

Guess-then-Meet-in-the-Middle Attacks on the KTANTAN Family of Block Ciphers. 619 - Elena Andreeva, Atul Luykx, Bart Mennink:

Provable Security of BLAKE with Non-Ideal Compression Function. 620 - Zhenfu Cao, Zongyang Zhang, Yunlei Zhao:

Adaptive Security of Concurrent Non-Malleable Zero-Knowledge. 621 - Andrej Bogdanov, Chin Ho Lee:

Homomorphic encryption from codes. 622 - Donghoon Chang, Mridul Nandi, Moti Yung:

Indifferentiability of the Hash Algorithm BLAKE. 623 - Itai Dinur, Orr Dunkelman, Adi Shamir:

New attacks on Keccak-224 and Keccak-256. 624 - (Withdrawn) Two RFID Privacy Models in Front of a Court. 625

- Nicolas T. Courtois:

Algebraic Complexity Reduction and Cryptanalysis of GOST. 626 - Sihem Mesnager:

A note on semi-bent functions with multiple trace terms and hyperelliptic curves. 627 - Kaoru Kurosawa, Le Trieu Phong:

Maximum Leakage Resilient IBE and IPE. 628 - Eli Ben-Sasson, Serge Fehr, Rafail Ostrovsky:

Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority. 629 - Dustin Moody, Souradyuti Paul, Daniel Smith-Tone:

Indifferentiability Security of the Fast Widepipe Hash: Breaking the Birthday Barrier. 630 - Yu-Chi Chen, Du-shiau Tsai, Gwoboa Horng:

On the Security of a Cheating Immune Visual Secret Sharing Scheme. 631 - Elena Dubrova:

A Scalable Method for Constructing Galois NLFSRs with Period 2n-1 using Cross-Join Pairs. 632 - Billy Bob Brumley, Manuel Barbosa, Dan Page, Frederik Vercauteren:

Practical realisation and elimination of an ECC-related software bug attack. 633 - Mohammad Sabzinejad Farash, Mahmoud Ahmadian-Attari, Majid Bayat:

Security of Multiple-Key Agreement Protocols and Propose an Enhanced Protocol. 634 - Marcin Rogawski, Kris Gaj:

Groestl Tweaks and their Effect on FPGA Results. 635 - (Withdrawn) Untangling RFID Privacy Models. 636

- Laszlo Hars:

Random Number Generation Based on Oscillatory Metastability in Ring Circuits. 637 - Christophe Petit, Jean-Jacques Quisquater:

Rubik's for cryptographers. 638 - Jiejun Kong, Dapeng Wu, Xiaoyan Hong, Mario Gerla:

Towards a Probabilistic Complexity-theoretic Modeling of Biological Cyanide Poisoning as Service Attack in Self-organizing Networks. 639 - Emiliano De Cristofaro, Claudio Soriente, Gene Tsudik, Andrew Williams:

Hummingbird: Privacy at the time of Twitter. 640 - Evgeny A. Grechnikov, Andrew V. Adinetz:

Collision for 75-step SHA-1: Intensive Parallelization with GPU. 641 - Yongqiang Li, Mingsheng Wang:

Constructing differentially 4-uniform permutations over 22m from quadratic APN permutations over 22m+1. 642 - Alexey A. Chilikov, Evgeny K. Alekseev:

Some Words About Cryptographic Key Recognition In Data Streams. 643 - Ewan Fleischmann, Christian Forler, Stefan Lucks, Jakob Wenzel:

McOE: A Foolproof On-Line Authenticated Encryption Scheme. 644 - Chunsheng Gu:

New Fully Homomorphic Encryption without Bootstrapping. 645 - Daniel J. Bernstein, Tanja Lange, Peter Schwabe:

The security impact of a new cryptographic library. 646 - Fanbao Liu, Tao Xie, Changxiang Shen:

Breaking H2-MAC Using Birthday Paradox. 647 - Tatsuaki Okamoto, Katsuyuki Takashima:

Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption. 648 - Fanbao Liu, Changxiang Shen, Tao Xie, Dengguo Feng:

On the Security of NMAC and Its Variants. 649 - Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang:

Fully Secure Spatial Encryption under Simple Assumptions with Constant-Size Ciphertexts. 650 - Kaoutar Elkhiyaoui, Erik-Oliver Blass, Refik Molva:

CHECKER: On-site checking in RFID-based supply chains. 651 - Shay Gueron, Michael E. Kounavis:

Security Enhancement of the Vortex Family of Hash Functions. 652 - (Withdrawn) An Improved Certificateless Authenticated Key Agreement Protocol. 653

- Laurie Haustenne, Quentin De Neyer, Olivier Pereira:

Elliptic Curve Cryptography in JavaScript. 654 - T.-H. Hubert Chan, Elaine Shi, Dawn Song:

Privacy-Preserving Stream Aggregation with Fault Tolerance. 655 - ZiJie Xu, Ke Xu:

Use Data-depend Function Build Message Expansion Function. 656 - Abhranil Maiti, Vikash Gunreddy, Patrick Schaumont

:
A Systematic Method to Evaluate and Compare the Performance of Physical Unclonable Functions. 657 - David Bernhard, Georg Fuchsbauer, Essam Ghadafi, Nigel P. Smart, Bogdan Warinschi:

Anonymous attestation with user-controlled linkability. 658 - Daniel R. L. Brown:

Formally Assessing Cryptographic Entropy. 659 - Nir Bitansky, Ran Canetti, Shafi Goldwasser, Shai Halevi, Yael Tauman Kalai, Guy N. Rothblum:

Program Obfuscation with Leaky Hardware. 660 - Dongxia Bai, Leibo Li:

New Impossible Differential Attacks on Camellia. 661 - Dan Bogdanov, Riivo Talviste, Jan Willemson

:
Deploying secure multi-party computation for financial data analysis. 662 - Adriana López-Alt, Eran Tromer, Vinod Vaikuntanathan:

Cloud-Assisted Multiparty Computation from Fully Homomorphic Encryption. 663 - S. Sharmila Deva Selvi, S. Sree Vivek, Dhinakaran Vinayagamurthy, C. Pandu Rangan:

On the Security of ID Based Signcryption Schemes. 664 - Jothi Rangasamy, Douglas Stebila, Lakshmi Kuppusamy, Colin Boyd, Juan Manuel González Nieto:

Efficient Modular Exponentiation-based Puzzles for Denial-of-Service Protection. 665 - Eyal Z. Goren, Kristin E. Lauter:

A Gross-Zagier formula for quaternion algebras over totally real fields. 666 - (Withdrawn) An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer. 667

- Piotr K. Tysowski, M. Anwarul Hasan:

Re-Encryption-Based Key Management Towards Secure and Scalable Mobile Applications in Clouds. 668 - Christopher Wolf, Enrico Thomae:

Small Linearization: Memory Friendly Solving of Non-Linear Equations over Finite Fields. 669 - Peter Schwabe, Bo-Yin Yang, Shang-Yi Yang:

SHA-3 on ARM11 processors. 670 - Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li, Ying Man:

Improved Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-192/256. 671 - Falko Strenzke:

Fast and Secure Root-Finding for Code-based Cryptosystems. 672 - Nils Fleischhacker, Felix Günther, Franziskus Kiefer, Mark Manulis, Bertram Poettering:

Pseudorandom Signatures. 673 - Colleen Swanson, Douglas R. Stinson:

Extended Combinatorial Constructions for Peer-to-peer User-Private Information Retrieval. 674 - Nico Döttling, Thilo Mie, Jörn Müller-Quade, Tobias Nilges:

Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions. 675 - Jian-Zhu Lu, Shaoyuan Zhang, Shijie Qie:

Enhanced Biometrics-based Remote User Authentication Scheme Using Smart Cards. 676 - Jeremy Clark, Aleksander Essex:

CommitCoin: Carbon Dating Commitments with Bitcoin. 677 - Florian Böhl, Dennis Hofheinz, Daniel Kraschewski:

On definitions of selective opening security. 678 - Junaid Jameel Ahmad, Shujun Li, Ahmad-Reza Sadeghi, Thomas Schneider:

CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm. 679 - Craig Gentry, Shai Halevi, Nigel P. Smart:

Better Bootstrapping in Fully Homomorphic Encryption. 680 - Christina Brzuska, Marc Fischlin, Heike Schröder, Stefan Katzenbeisser:

Physically Uncloneable Functions in the Universal Composition Framework. 681 - István Vajda:

UC framework for anonymous communication. 682 - Falko Strenzke:

Timing Attacks against the Syndrome Inversionin Code-based Cryptosystems. 683 - Rkia Aouinatou, Mostafa Belkasmi:

Identification Based Encryption with RSA-OAEP. Using SEM and Without. 684 - Roman Oliynykov:

Cryptanalysis of Symmetric Block Ciphers Based on the Feistel Network with Non-bijective S-boxes in the Round Function. 685 - Rodolphe Lampe, Jacques Patarin:

Analysis of some natural variants of the PKP Algorithm. 686 - Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld:

Cryptanalysis of WG-7 (A Lightweight Stream Cipher for RFID Encryption). 687 - Guomin Yang, Shanshan Duan, Duncan S. Wong, Chik How Tan, Huaxiong Wang:

Authenticated Key Exchange under Bad Randomness. 688 - (Withdrawn) (Efficient) Universally Composable Two-Party Computation Using a Minimal Number of Stateless Tokens. 689

- Masao Kasahara:

A New Class of Multivariate Public Key Cryptosystem Constructed on the Basis of Message-Dependent Transformation. 690 - Gildas Avoine, Xavier Carpent:

Yet Another Ultralightweight Authentication Protocol that is Broken. 691 - Cheng Chen, Zhenfeng Zhang, Dengguo Feng:

Fully Secure (Doubly-)Spatial Encryption under Simpler Assumptions. 692 - Bin Wang, Qing Zhao, Ke Dai:

A non-interactive deniable authentication scheme in the standard model. 693 - Jiye Liu, Yongbin Zhou, Shuguo Yang, Dengguo Feng:

Generic Side-channel Distinguisher Based on Kolmogorov-Smirnov Test: Explicit Construction and Practical Evaluation. 694 - S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:

Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures. 695 - Dario Catalano, Dario Fiore, Bogdan Warinschi:

Efficient Network Coding Signatures in the Standard Model. 696 - Andrey Bogdanov, Miroslav Knezevic, Gregor Leander, Deniz Toz, Kerem Varici, Ingrid Verbauwhede:

SPONGENT: The Design Space of Lightweight Cryptographic Hashing. 697 - Baocheng Wang, Chunming Tang, Yanfeng Qi, Yixian Yang:

A generalization of the class of hyper-bent Boolean functions in binomial forms. 698 - (Withdrawn) Public-Key Encryption with Cluster-Chain-based Keyword Search. 699

- Tatsuaki Okamoto, Katsuyuki Takashima:

Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model. 700 - Tatsuaki Okamoto, Katsuyuki Takashima:

Decentralized Attribute-Based Signatures. 701 - Yitao Chen:

Comments of an efficient and secure multi-server authentication scheme with key agreement. 702 - Dennis Hofheinz, Tibor Jager:

Waters Signatures with Optimal Security Reduction. 703 - Masoumeh Safkhani, Nasour Bagheri, Majid Naderi:

Security Analysis of a PUF based RFID Authentication Protocol. 704 - Valérie Nachef, Emmanuel Volte, Jacques Patarin:

Differential Attacks on Generalized Feistel Schemes. 705 - Johannes Blömer, Peter Günther, Gennadij Liske:

Improved Side Channel Attacks on Pairing Based Cryptography. 706 - Alex Biryukov, Ilya Kizhvatov, Bin Zhang:

Cryptanalysis of The Atmel Cipher in SecureMemory, CryptoMemory and CryptoRF. 707 - Dana Dachman-Soled, Rosario Gennaro, Hugo Krawczyk, Tal Malkin:

Computational Extractors and Pseudorandomness. 708 - Nadia El Mrabet:

Fault Attack against Miller's algorithm. 709 - Alex Biryukov, Johann Großschädl:

Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware. 710 - Meltem Sönmez Turan:

Evolutionary Construction of de Bruijn Sequences. 711 - Johann Großschädl, Dan Page:

Efficient Java Implementation of Elliptic Curve Cryptography for J2ME-Enabled Mobile Devices. 712 - Bin Wang, Qing Zhao:

A server-aided verification signature scheme without random oracles. 713 - Huajun Zhang, Zongyang Zhang, Zhenfu Cao:

Position-Verification in Multi-Channel Models. 714

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














