default search action
IACR Cryptology ePrint Archive, Volume 2014
Volume 2014, 2014
- Yalin Chen, Jue-Sam Chou:
Comments on: EIBAS - an efficient identity broadcast authentication scheme in wireless sensor networks. 1 - Kuan Cheng:
Pseudorandom Generator Based on Hard Lattice Problem. 2 - Xi Xiong, Haining Fan:
GF(2n) Bit-Parallel Squarer Using Generalized Polynomial Basis For a New Class of Irreducible Pentanomials. 3 - Igor A. Semaev:
MaxMinMax problem and sparse equations over finite fields. 4 - (Withdrawn) The analysis of the Keccak with the new method called parity. 5
- Prastudy Fauzi, Helger Lipmaa, Bingsheng Zhang:
Efficient Non-Interactive Zero Knowledge Arguments for Set Operations. 6 - Ethan Heilman:
One Weird Trick to Stop Selfish Miners: Fresh Bitcoins, A Solution for the Honest Miner. 7 - Annelie Heuser, Sylvain Guilley, Olivier Rioul:
A Theoretical Study of Kolmogorov-Smirnov Distinguishers: Side-Channel Analysis vs. Differential Cryptanalysis. 8 - Nilanjan Datta, Mridul Nandi:
Characterization of EME with Linear Mixing. 9 - Ali Mahmoodi, Javad Mohajeri, Mahmoud Salmasizadeh:
A Certificate-Based Proxy Signature with Message Recovery without Bilinear Pairing. 10 - Yanis Linge, Cécile Dumas, Sophie Lambert-Lacroix:
Maximal Information Coefficient Analysis. 12 - (Withdrawn) A Novel Modular Adder for One Thousand Bits and More Using Fast Carry Chains of Modern FPGAs. 13
- Felix Günther, Bertram Poettering:
Linkable Message Tagging: Solving the key distribution problem of signature schemes. 14 - Jooyoung Lee:
Tight Security Bounds for Triple Encryption. 15 - Bart Mennink, Bart Preneel:
Triple and Quadruple Encryption: Bridging the Gaps. 16 - (Withdrawn) Two-round password-only authenticated key exchange in the three-party setting. 17
- Yehuda Lindell, Eran Omri, Hila Zarosim:
Completeness for Symmetric Two-Party Functionalities - Revisited. 18 - Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret:
Lazy Modulus Switching for the BKW Algorithm on LWE. 19 - Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, Daniele Venturi:
(De-)Constructing TLS. 20 - Susan Hohenberger, Brent Waters:
Online/Offline Attribute-Based Encryption. 21 - Sourav Das:
Ultra-lightweight 8-bit Multiplicative Inverse Based S-box Using LFSR. 22 - Gengran Hu, Yanbin Pan, Feng Zhang:
Solving Random Subset Sum Problem by lp-norm SVP Oracle. 23 - Ivan Damgård, Jesper Buus Nielsen:
An Efficient Pseudo-Random Generator with Applications to Public-Key Encryption and Constant-Round Multiparty Computation. 24 - Amir Moradi:
Side-Channel Leakage through Static Power - Should We Care about in Practice? -. 25 - Maël Berthier, Yves Bocktaels, Julien Bringer, Hervé Chabanne, Taoufik Chouta, Jean-Luc Danger, Mélanie Favre, Tarik Graba:
Studying Potential Side Channel Leakages on an Embedded Biometric Comparison System. 26 - Mike Hamburg:
Twisting Edwards curves with isogenies. 27 - Colin O'Flynn, Zhizhang (David) Chen:
Channel Equalization for Side Channel Attacks. 28 - Frederik Armknecht, Tommaso Gagliardoni, Stefan Katzenbeisser, Andreas Peter:
General Impossibility of Group Homomorphic Encryption in the Quantum World. 29 - Leonardo C. Almeida, Ewerton R. Andrade, Paulo S. L. M. Barreto, Marcos A. Simplício Jr.:
Lyra: Password-Based Key Derivation with Tunable Memory and Processing Costs. 30 - Yongge Wang:
On the Design of LIL Tests for (Pseudo) Random Generators and Some Experimental Results. 31 - Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:
Scale-Invariant Fully Homomorphic Encryption over the Integers. 32 - Adeline Langlois, San Ling, Khoa Nguyen, Huaxiong Wang:
Lattice-based Group Signature Scheme with Verifier-local Revocation. 33 - Chase Manny:
Authenticated Encryption with SPECK. 34 - Abderrahmane Nitaj, Mohamed Ould Douh:
A new attack on RSA with a composed decryption exponent. 35 - Gary Belvin:
A Secure Text Messaging Protocol. 36 - Yong Li, Sven Schäge, Zheng Yang, Florian Kohlar, Jörg Schwenk:
On the Security of the Pre-Shared Key Ciphersuites of TLS. 37 - Ralf Küsters, Enrico Scapin, Tomasz Truderung, Juergen Graf:
Extending and Applying a Framework for the Cryptographic Verification of Java Programs. 38 - Yarkin Doröz, Yin Hu, Berk Sunar:
Homomorphic AES Evaluation using NTRU. 39 - Zhengjun Cao, Ruizhong Wei, Xiaodong Lin:
A Fast Modular Reduction Method. 40 - Boaz Tsaban:
Practical polynomial time solutions of several major problems in noncommutative-algebraic cryptography. 41 - Jintai Ding, Chengdong Tao:
A New Algorithm for Solving the Approximate Common Divisor Problem and Cryptanalysis of the FHE based on GACD. 42 - Mehdi Tibouchi:
Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings. 43 - Lichun Li, Michael Militzer, Anwitaman Datta:
rPIR: Ramp Secret Sharing based Communication Efficient Private Information Retrieval. 44 - Mohsen Alimomeni, Reihaneh Safavi-Naini:
Human Assisted Randomness Generation Using Video Games. 45 - Yalin Chen, Jue-Sam Chou:
Crypto-analyses on "user efficient recoverable off-line e-cashs scheme with fast anonymity revoking". 46 - Vivien Dubois:
Down the Rabbit Hole: Revisiting the Shrinking Method. 47 - Longjiang Qu, Shaojing Fu, Qingping Dai, Chao Li:
When a Boolean Function can be Expressed as the Sum of two Bent Functions. 48 - Neha Tirthani, Ganesan:
Data Security in Cloud Architecture Based on Diffie Hellman and Elliptical Curve Cryptography. 49 - Daniel R. L. Brown:
Some Theoretical Conditions for Menezes-Qu-Vanstone Key Agreement to Provide Implicit Key Authentication. 50 - Elena Dubrova:
An Equivalence-Preserving Transformation of Shift Registers. 51 - Li Xi:
DAA-related APIs in TPM2.0 Revisited. 52 - Sonia Belaïd, Vincent Grosso, François-Xavier Standaert:
Masking and Leakage-Resilient Primitives: One, the Other(s) or Both? 53 - Sugata Gangopadhyay, Pantelimon Stanica:
The Fourier Entropy-Influence conjecture holds for a log-density 1 class of cryptographic Boolean functions. 54 - Younsung Choi:
Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme using Smart Card and Biometrics. 55 - Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang:
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128. 56 - Gora Adj, Alfred Menezes, Thomaz Oliveira, Francisco Rodríguez-Henríquez:
Computing Discrete Logarithms in F36*137 using Magma. 57 - Itai Dinur, Jérémy Jean:
Cryptanalysis of FIDES. 58 - John Tromp:
Cuckoo Cycle: a memory-hard proof-of-work system. 59 - Peeter Laud, Alisa Pankova:
Verifiable Computation in Multiparty Protocols with Honest Majority. 60 - Stefano Tessaro, David A. Wilson:
Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts. 61 - Tancrède Lepoint, Michael Naehrig:
A Comparison of the Homomorphic Encryption Schemes FV and YASHE. 62 - Yalin Chen, Jue-Sam Chou:
Cryptanalysis on "Secure untraceable off-line electronic cash system". 63 - Alain Couvreur, Irene Marquez Corbella, Ruud Pellikaan:
A Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems. 64 - Palash Sarkar, Shashank Singh:
Fine Tuning the Function Field Sieve Algorithm for the Medium Prime Case. 65 - Hassan Jameel Asghar, Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld:
A Subexponential Construction of Graph Coloring for Multiparty Computation. 66 - Julien Bringer, Hervé Chabanne, Roch Lescuyer, Alain Patey:
Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents. 67 - Franca Marinelli, Riccardo Aragona, Chiara Marcolla, Massimiliano Sala:
Some security bounds for the DGHV scheme. 68 - Manoj Ranjan Mishra, Jayaprakash Kar, Banshidhar Majhi:
One-Pass Authenticated Key Establishment Protocol on Bilinear Pairings for Wireless Sensor Networks. 69 - Chris Peikert:
Lattice Cryptography for the Internet. 70 - Zhaohui Cheng:
Implementing Pairing-Based Cryptosystems in USB Tokens. 71 - Nikolaos P. Karvelas, Andreas Peter, Stefan Katzenbeisser, Sebastian Biedermann:
Efficient Privacy-Preserving Big Data Processing through Proxy-Assisted ORAM. 72 - Joël Alwen, Martin Hirt, Ueli Maurer, Arpita Patra, Pavel Raykov:
Anonymous Authentication with Shared Secrets. 73 - Abhishek Banerjee, Chris Peikert:
New and Improved Key-Homomorphic Pseudorandom Functions. 74 - Carsten Baum, Ivan Damgård, Claudio Orlandi:
Publicly Auditable Secure Multi-Party Computation. 75 - Giuseppe Ateniese, Antonio Faonio, Bernardo Magri, Breno de Medeiros:
Certified Bitcoins. 76 - Joseph Bonneau, Arvind Narayanan, Andrew Miller, Jeremy Clark, Joshua A. Kroll, Edward W. Felten:
Mixcoin: Anonymity for Bitcoin with accountable mixes. 77 - Ahmad Boorghany, Rasool Jalili:
Implementation and Comparison of Lattice-based Identification Protocols on Smart Cards and Microcontrollers. 78 - Alexandre Duc, Stefan Dziembowski, Sebastian Faust:
Unifying Leakage Models: from Probing Attacks to Noisy Leakage. 79 - Daniel Kraschewski, Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai:
A Full Characterization of Completeness for Two-party Randomized Function Evaluation. 80 - Sanjam Garg, Divya Gupta:
Efficient Round Optimal Blind Signatures. 81 - Craig Gentry, Shai Halevi, Mariana Raykova, Daniel Wichs:
Garbled RAM Revisited, Part I. 82 - Steve Lu, Rafail Ostrovsky:
Garbled RAM Revisited, Part II. 83 - Wentao Zhang, Zhenzhen Bao, Dongdai Lin, Vincent Rijmen, Bohan Yang, Ingrid Verbauwhede:
RECTANGLE: A Bit-slice Ultra-Lightweight Block Cipher Suitable for Multiple Platforms. 84 - Aleksandra Mileva:
Multipermutations in Crypto World: Different Faces of the Perfect Diffusion Layer. 85 - Wei Jiang, Dan Lin, Feng Li, Elisa Bertino:
Randomized and Efficient Authentication in Mobile Environments. 86 - Michael Backes, Aniket Kate, Praveen Manoharan, Sebastian Meiser, Esfandiar Mohammadi:
AnoA: A Framework For Analyzing Anonymous Communication Protocols. 87 - Himanshu Tyagi, Shun Watanabe:
A Bound For Multiparty Secret Key Agreement And Implications For A Problem Of Secure Computing. 88 - Anne Canteaut, Thomas Fuhr, Henri Gilbert, María Naya-Plasencia, Jean-René Reinhard:
Multiple Di fferential Cryptanalysis of Round-Reduced PRINCE (Full version). 89 - Virginie Lallemand, María Naya-Plasencia:
Cryptanalysis of KLEIN (Full version). 90 - Masao Kasahara:
A new class of system oriented PKC, K(I)SOPKC. 92 - Manuel Barbosa, Pooya Farshim:
The Related-Key Analysis of Feistel Constructions. 93 - Jacob Alperin-Sheriff, Chris Peikert:
Faster Bootstrapping with Polynomial Error. 94 - Masayuki Abe, Jens Groth, Miyako Ohkubo, Mehdi Tibouchi:
Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures. 95 - Yuanxi Dai, John P. Steinberger:
Tight security bounds for multiple encryption. 96 - Koji Nuida:
A Simple Framework for Noise-Free Construction of Fully Homomorphic Encryption from a Special Class of Non-Commutative Groups. 97 - Gilad Asharov:
Towards Characterizing Complete Fairness in Secure Two-Party Computation. 98 - Christina Brzuska, Pooya Farshim, Arno Mittelbach:
Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources. 99 - Guo-qiang Liu, Chen-Hui Jin, Chuan-Da Qi:
Improved Slender-set Linear Cryptanalysis. 100 - Enrique Larraia, Emmanuela Orsini, Nigel P. Smart:
Dishonest Majority Multi-Party Computation for Binary Circuits. 101 - Payman Mohassel, Seyed Saeed Sadeghian, Nigel P. Smart:
Actively Secure Private Function Evaluation. 102 - Xiali Hei, Binheng Song:
SHipher: Families of Block Ciphers based on SubSet-Sum Problem. 103 - Kevin Atighehchi:
Space-efficient, byte-wise incremental and perfectly private encryption schemes. 104 - Ashish Choudhury, Arpita Patra, Nigel P. Smart:
Reducing the Overhead of Cloud MPC. 105 - Shai Halevi, Victor Shoup:
Algorithms in HElib. 106 - Joël Alwen, Martin Hirt, Ueli Maurer, Arpita Patra, Pavel Raykov:
Key-Indistinguishable Message Authentication Codes. 107 - Jooyoung Lee, Martijn Stam:
MJH: A Faster Alternative to MDC-2. 108 - Mitsuru Shiozaki, Ryohei Hori, Takeshi Fujino:
Diffusion Programmable Device : The device to prevent reverse engineering. 109 - Sourav Das:
Halka: A Lightweight, Software Friendly Block Cipher Using Ultra-lightweight 8-bit S-box. 110 - Gordon Procter:
A Note on the CLRW2 Tweakable Block Cipher Construction. 111 - Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich:
Polynomial Time Attack on Wild McEliece Over Quadratic Extensions. 112 - James Kelley, Roberto Tamassia:
Secure Compression: Theory \& Practice. 113 - Sébastien Gambs, Cristina Onete, Jean-Marc Robert:
Prover Anonymous and Deniable Distance-Bounding Authentication. 114 - Jia-Lun Tsai:
Comments on a novel user authentication and key agreement scheme. 115 - Ronald Cramer, Carles Padró, Chaoping Xing:
Optimal Algebraic Manipulation Detection Codes. 116 - Björn Grohmann:
An Applicable Public-Key-Cryptosystem Based on NP-Complete Problems. 117 - Dominique Unruh:
Quantum position verification in the random oracle model. 118 - Robert Granger, Thorsten Kleinjung, Jens Zumbrägel:
Breaking '128-bit Secure' Supersingular Binary Curves (or how to solve discrete logarithms in 𝔽24·1223 and 𝔽212·367). 119 - Weijin Wang, Yu Qin, Dengguo Feng:
Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model (full version). 120 - Koki Hamada, Dai Ikarashi, Koji Chida, Katsumi Takahashi:
Oblivious Radix Sort: An Efficient Sorting Algorithm for Practical Secure Multi-party Computation. 121 - Wangyong:
New Way to Construct Cryptographic Hash Function. 122 - Mohammad Sadeq Dousti, Rasool Jalili:
FORSAKES: A Forward-Secure Authenticated Key Exchange Protocol Based on Symmetric Key-Evolving Schemes. 123 - Oriol Farràs, Torben Brandt Hansen, Tarik Kaced, Carles Padró:
Optimal Non-Perfect Uniform Secret Sharing Schemes. 124 - Michel Abdalla, Fabrice Benhamouda, David Pointcheval:
Removing Erasures with Explainable Hash Proof Systems. 125 - (Withdrawn) Public-Key Encryption Resilient Against Linear Related-Key Attacks Revisited. 126
- Seung Geol Choi, Jonathan Katz, Alex J. Malozemoff, Vassilis Zikas:
Efficient Three-Party Computation from Cut-and-Choose. 128 - Iddo Bentov, Ranjit Kumaresan:
How to Use Bitcoin to Design Fair Protocols. 129 - Joppe W. Bos, Craig Costello, Patrick Longa, Michael Naehrig:
Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis. 130 - Janaka Alawatugoda, Douglas Stebila, Colin Boyd:
Modelling After-the-fact Leakage for Key Exchange. 131 - Kwangsu Lee, Dong Hoon Lee, Jong Hwan Park:
Efficient Revocable Identity-Based Encryption via Subset Difference Methods. 132 - Yihua Zhang, Marina Blanton:
Efficient Secure and Verifiable Outsourcing of Matrix Multiplications. 133 - Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Peter Schwabe:
Kummer strikes back: new DH speed records. 134