


default search action
IACR Cryptology ePrint Archive, Volume 2015
Volume 2015, 2015
- Oscar Reparaz:

A note on the security of Higher-Order Threshold Implementations. 1 - Baodong Qin, Shengli Liu, Tsz Hon Yuen, Robert H. Deng, Kefei Chen:

Continuous Non-Malleable Key Derivation and Its Application to Related-Key Security. 3 - Carmit Hazay:

Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs. 4 - Srinivas Devadas, Marten van Dijk, Christopher W. Fletcher, Ling Ren:

Onion ORAM: A Constant Bandwidth and Constant Client Storage ORAM (without FHE or SWHE). 5 - Jan Camenisch, Robert R. Enderlein, Gregory Neven:

Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions. 6 - Tobias Pulls, Roel Peeters:

Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure. 7 - Satrajit Ghosh, Aniket Kate:

Post-Quantum Secure Onion Routing (Future Anonymity in Today's Budget). 8 - Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya:

Rig: A simple, secure and flexible design for Password Hashing. 9 - Shengli Liu, Kenneth G. Paterson:

Simulation-based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms. 10 - Benjamin Buhrow, Paul Riemer, Mike Shea, Barry K. Gilbert, Erik S. Daniel:

Block Cipher Speed and Energy Efficiency Records on the MSP430: System Design Trade-Offs for 16-bit Embedded Applications. 11 - Tancrède Lepoint, Mehdi Tibouchi:

Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR. 12 - Nico Döttling:

Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification. 13 - San Ling, Khoa Nguyen, Huaxiong Wang:

Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-based. 14 - Florian Bergsma, Tibor Jager, Jörg Schwenk:

One-Round Key Exchange with Strong Security: An Efficient and Generic Construction in the Standard Model. 15 - Yannis Rouselakis, Brent Waters:

Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption. 16 - Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval:

Simple Functional Encryption Schemes for Inner Products. 17 - Jintai Ding, Alexei Miasnikov, Alexander Ushakov:

A Linear Attack on a Key Exchange Protocol Using Extensions of Matrix Semigroups. 18 - Gilles Barthe, Edvard Fagerholm, Dario Fiore, Andre Scedrov, Benedikt Schmidt, Mehdi Tibouchi:

Strongly-Optimal Structure Preserving Signatures from Type II Pairings: Synthesis and Lower Bounds. 19 - Phong Q. Nguyen, Jiang Zhang, Zhenfeng Zhang:

Simpler Efficient Group Signatures from Lattices. 20 - Xin Li:

Non-Malleable Condensers for Arbitrary Min-Entropy, and Almost Optimal Protocols for Privacy Amplification. 21 - Bo Yang, Dengguo Feng, Yu Qin, Yingjun Zhang, Weijin Wang:

TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems. 22 - Chunsheng Gu:

Multilinear Maps Using Ideal Lattices without Encodings of Zero. 23 - Evgeni Begelfor, Stephen D. Miller, Ramarathnam Venkatesan:

Non-Abelian Analogs of Lattice Rounding. 24 - Benny Applebaum, Zvika Brakerski:

Obfuscating Circuits via Composite-Order Graded Encoding. 25 - Adam D. Smith, Ye Zhang:

On the Regularity of Lossy RSA: Improved Bounds and Applications to Padding-Based Encryption. 27 - Jeremy Maitin-Shepard:

Optimal software-implemented Itoh-Tsujii inversion for GF(2m). 28 - Sergey Gorbunov, Vinod Vaikuntanathan, Hoeteck Wee:

Predicate Encryption for Circuits from LWE. 29 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel, Martin Schläffer:

Cryptanalysis of Ascon. 30 - Kai-Min Chung, Rafael Pass:

Tight Parallel Repetition Theorems for Public-Coin Arguments using KL-divergence. 31 - Zvika Brakerski, Vinod Vaikuntanathan:

Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions Or: How to Secretly Embed a Circuit in Your PRF. 32 - Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel:

On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks. 33 - Hannes Groß, Erich Wenger, Christoph Dobraunig, Christoph Ehrenhöfer:

Suit up! Made-to-Measure Hardware Implementations of Ascon. 34 - Elena Dubrova, Mats Näslund, Göran Selander, Fredrik Lindqvist:

Cryptographically Secure CRC for Lightweight Message Authentication. 35 - Billy Bob Brumley:

Faster software for fast endomorphisms. 36 - Da-Zhi Sun, Zahra Ahmadian, Yue-Jiao Wang, Mahmoud Salmasizadeh, Mohammad Reza Aref:

Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol. 37 - Aloni Cohen, Shafi Goldwasser, Vinod Vaikuntanathan:

Aggregatable Pseudorandom Functions and Connections to Learning. 38 - Véronique Cortier, Fabienne Eigner, Steve Kremer, Matteo Maffei, Cyrille Wiedling:

Type-Based Verification of Electronic Voting Protocols. 39 - Zahra Ahmadian, Shahram Rasoolzadeh, Mahmoud Salmasizadeh, Mohammad Reza Aref:

Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN. 40 - Artur Mariano, Thijs Laarhoven, Christian H. Bischof:

Parallel (probable) lock-free HashSieve: a practical sieving algorithm for the SVP. 41 - Rachid El Bansarkhani, Johannes Buchmann:

High Performance Lattice-based CCA-secure Encryption. 42 - Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Keisuke Tanaka:

Group Signature with Deniability: How to Disavow a Signature. 43 - Binanda Sengupta, Abhijit Das:

Use of SIMD-Based Data Parallelism to Speed up Sieving in Integer-Factoring Algorithms. 44 - Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall:

Reliable Information Extraction for Single Trace Attacks. 45 - Martin R. Albrecht, Rachel Player, Sam Scott:

On the concrete hardness of Learning with Errors. 46 - Guilhem Castagnos, Fabien Laguillaumie:

Linearly Homomorphic Encryption from DDH. 47 - Ran Canetti, Yael Tauman Kalai, Omer Paneth:

On Obfuscation with Random Oracles. 48 - Sonia Bogos, Florian Tramèr

, Serge Vaudenay:
On Solving Lpn using BKW and Variants. 49 - Carla Ràfols:

Stretching Groth-Sahai: NIZK Proofs of Partial Satisfiability. 50 - Li Lin, Wenling Wu:

Improved Meet-in-the-Middle Distinguisher on Feistel Schemes. 51 - Mihir Bellare, Sriram Keelveedhi:

Interactive Message-Locked Encryption and Secure Deduplication. 52 - Peter Gazi, Krzysztof Pietrzak, Stefano Tessaro:

Tight Bounds for Keyed Sponges and Truncated CBC. 53 - Brett Hemenway, Rafail Ostrovsky, Alon Rosen:

Non-committing encryption from Φ-hiding. 54 - Vladimir Kolesnikov, Payman Mohassel, Ben Riva, Mike Rosulek:

Richer Efficiency/Security Trade-offs in 2PC. 55 - Alexandre Duc, Florian Tramèr

, Serge Vaudenay:
Better Algorithms for LWE and LWR. 56 - Bertram Poettering, Dale L. Sibborn:

Cold Boot Attacks in the Discrete Logarithm Setting. 57 - Berry Schoenmakers, Meilof Veeningen:

Universally Verifiable Multiparty Computation from Threshold Homomorphic Cryptosystems. 58 - Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam:

Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation. 59 - Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire, Pierre-Yves Strub:

Verified Proofs of Higher-Order Masking. 60 - Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner:

More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries. 61 - Yuval Yarom, Gefei Li, Damith Chinthana Ranasinghe:

Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher. 62 - Ryad Benadjila, Thomas Calderon, Marion Daubignard:

CamlCrush: A PKCS\#11 Filtering Proxy. 63 - Handan Kilinç, Alptekin Küpçü:

Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party Computation. 64 - Andrey Dmukh, Denis Dygin, Grigory B. Marshalko:

A lightweight-friendly modifcation of GOST block cipher. 65 - Tobias Schneider, Amir Moradi, Tim Güneysu:

Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware. 66 - Susumu Kiyoshima:

An Alternative Approach to Non-black-box Simulation in Fully Concurrent Setting. 67 - Gregor Leander, Brice Minaud, Sondre Rønjom:

A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro. 68 - Benoit Cogliati, Yannick Seurin:

On the Provable Security of the Iterated Even-Mansour Cipher against Related-Key and Chosen-Key Attacks. 69 - Gaëtan Leurent, Lei Wang:

The Sum Can Be Weaker Than Each Part. 70 - Jean-Sébastien Coron, Jean-Charles Faugère, Guénaël Renault, Rina Zeitoun:

Factoring N=pr qs for Large r and s. 71 - Olivier Blazy, Céline Chevalier, Damien Vergnaud:

Non-Interactive Zero-Knowledge Proofs of Non-Membership. 72 - Dana Dachman-Soled, Chang Liu, Charalampos Papamanthou, Elaine Shi, Uzi Vishkin:

Oblivious Network RAM. 73 - Gilles Barthe, Juan Manuel Crespo, Yassine Lakhnech, Benedikt Schmidt:

Mind the Gap: Modular Machine-checked Proofs of One-Round Key Exchange Protocols. 74 - Jian Guo, Yu Sasaki, Lei Wang, Meiqin Wang, Long Wen:

Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds. 75 - Masayuki Abe, Markulf Kohlweiss, Miyako Ohkubo, Mehdi Tibouchi:

Fully Structure-Preserving Signatures and Shrinking Commitments. 76 - Yuwei Xu, Chuankun Wu:

On the Existence and Constructions of Vectorial Boolean Bent Functions. 77 - Chun-Xiang Gu, Dan Xin, Yonghui Zheng, Yuanji Kang:

Fully Homomorphic Encryption from Ring-LWE:Identity-Based,Arbitrary Cyclotomic,Tighter Parameters. 78 - Jiqiang Lu:

On the Security of the COPA and Marble Authenticated Encryption Algorithms against (Almost) Universal Forgery Attack. 79 - Feng Hao, Xun Yi, Liqun Chen, Siamak Fayyaz Shahandashti:

The Fairy-Ring Dance: Password Authenticated Key Exchange in a Group. 80 - Yan Huang, Jonathan Katz, Vladimir Kolesnikov, Ranjit Kumaresan, Alex J. Malozemoff:

Amortizing Garbled Circuits. 81 - Ihsan Haluk Akin, Berk Sunar:

On the Difficulty of Securing Web Applications using CryptDB. 82 - Massimo Chenal, Qiang Tang

:
Key Recovery Attack against an NTRU-type Somewhat Homomorphic Encryption Scheme. 83 - Zhengjun Cao, Lihua Liu:

On the Disadvantages of Pairing-based Cryptography. 84 - Anne Canteaut, Joëlle Roué:

On the behaviors of affine equivalent Sboxes regarding differential and linear attacks. 85 - Patrick Märtens:

Practical Compact E-Cash with Arbitrary Wallet Size. 86 - David Derler, Christian Hanser, Daniel Slamanig:

Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives. 87 - Klaus Kursawe, Christiane Peters:

Structural Weaknesses in the Open Smart Grid Protocol. 88 - Thomas Eisenbarth, Aaron Meyerowitz, Rainer Steinwandt:

On the security margin of MAC striping. 89 - Yosuke Todo:

Structural Evaluation by Generalized Integral Property. 90 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel:

Related-Key Forgeries for Prøst-OTR. 91 - Grasha Jacob, A. Murugan, Irine Viola:

Towards the Generation of a Dynamic Key-Dependent S-Box to Enhance Security. 92 - Murat Cenk, M. Anwar Hasan:

Some New Results on Binary Polynomial Multiplication. 94 - Dmitry Khovratovich, Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld:

Rotational Cryptanalysis of ARX Revisited. 95 - Riham AlTawy, Amr M. Youssef:

Meet in the Middle Attacks on Reduced Round Kuznyechik. 96 - Bruce Schneier, Matthew Fredrikson, Tadayoshi Kohno, Thomas Ristenpart:

Surreptitiously Weakening Cryptographic Systems. 97 - Shantian Cheng, Juanyang Zhang:

Adaptive-ID Secure Revocable Identity-Based Encryption from Lattices via Subset Difference Method. 98 - Dirk Achenbach, Jörn Müller-Quade, Jochen Rill:

Universally Composable Firewall Architectures using Trusted Hardware. 99 - Christian Wittke, Zoya Dyka, Peter Langendörfer:

Influence of Electrical Circuits of ECC Designs on Shape of Electromagnetic Traces measured on FPGA. 100 - Nicky Mouha, Atul Luykx:

Multi-Key Security: The Even-Mansour Construction Revisited. 101 - Shay Gueron, Yehuda Lindell:

GCM-SIV: Full Nonce Misuse-Resistant Authenticated Encryption at Under One Cycle per Byte. 102 - Vincenzo Iovino, Karol Zebrowski:

Mergeable Functional Encryption. 103 - Rafael Dowsley, Jörn Müller-Quade, Tobias Nilges:

Weakening the Isolation Assumption of Tamper-proof Hardware Tokens. 104 - Josep Balasch, Sebastian Faust, Benedikt Gierlichs:

Inner Product Masking Revisited. 105 - Yara Elias, Kristin E. Lauter, Ekin Ozman, Katherine E. Stange:

Provably weak instances of Ring-LWE. 106 - Attila Altay Yavuz, Jorge Guajardo:

Dynamic Searchable Symmetric Encryption with Minimal Leakage and Efficient Updates on Commodity Hardware. 107 - Lucjan Hanzlik, Przemyslaw Kubiak, Miroslaw Kutylowski:

Tracing Attacks on U-Prove with Revocation Mechanism. 108 - Shijun Zhao, Qianying Zhang:

sHMQV: An Efficient Key Exchange Protocol for Power-limited Devices. 110 - Steven D. Galbraith, Barak Shani:

The Multivariate Hidden Number Problem. 111 - Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura:

Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption. 112 - Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey:

How to Compress Homomorphic Ciphertexts. 113 - Shai Halevi, William Eric Hall, Charanjit S. Jutla, Arnab Roy:

Weak Ideal Functionalities for Designing Random Oracles with Applications to Fugue. 114 - Muhammad Yasir Malik:

Comprehensive Efficient Implementations of ECC on C54xx Family of Low-cost Digital Signal Processors. 115 - Riadh Brinci, Walid Khmiri, Mefteh Mbarek, Abdellatif Ben Rabaa, Ammar Bouallègue:

Efficient Hardware Design for Computing Pairings Using Few FPGA In-built DSPs. 116 - Maciej Skorski

:
Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to Pseudoentropy. 117 - Takahiro Matsuda, Goichiro Hanaoka:

Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms. 118 - Alexandre Duc, Sebastian Faust, François-Xavier Standaert:

Making Masking Security Proofs Concrete Or How to Evaluate the Security of any Leaking Device. 119 - Debapriya Basu Roy, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger, Debdeep Mukhopadhyay:

Reconfigurable LUT: Boon or Bane for Secure Applications. 120 - Travis Mayberry, Erik-Oliver Blass, Guevara Noubir:

Multi-User Oblivious RAM Secure Against Malicious Servers. 121 - Siwei Sun, Lei Hu, Meiqin Wang, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Danping Shi, Ling Song, Kai Fu:

Constructing Mixed-integer Programming Models whose Feasible Region is Exactly the Set of All Valid Differential Characteristics of SIMON. 122 - Dennis Hofheinz, Jessica Koch, Christoph Striecks

:
Identity-based encryption with (almost) tight security in the multi-instance, multi-ciphertext setting. 123 - Alexander Wild, Amir Moradi, Tim Güneysu:

GliFreD: Glitch-Free Duplication - Towards Power-Equalized Circuits on FPGAs. 124 - Aloni Cohen, Justin Holmgren

:
Multilinear Pseudorandom Functions. 125 - Nir Bitansky, Omer Paneth, Daniel Wichs:

Perfect Structure on the Edge of Chaos. 126 - Ricardo Dahab, Steven D. Galbraith, Eduardo Morais:

Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes. 127 - Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:

Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications. 128 - Nishanth Chandran, Vipul Goyal, Pratyay Mukherjee, Omkant Pandey, Jalaj Upadhyay:

Block-wise Non-Malleable Codes. 129 - Sune K. Jakobsen, Claudio Orlandi:

How to Bootstrap Anonymous Communication. 130 - Frederik Armknecht, Vasily Mikhalev:

On Lightweight Stream Ciphers with Shorter Internal States. 131 - Jung Hee Cheon, Miran Kim, Kristin E. Lauter:

Homomorphic Computation of Edit Distance. 132 - Kristin E. Lauter, Adriana López-Alt, Michael Naehrig:

Private Computation on Encrypted Genomic Data. 133 - Pierre Karpman:

From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions. 134 - Bernardo David, Ryo Nishimaki, Samuel Ranellucci, Alain Tapp:

Generalizing Efficient Multiparty Computation. 135 - Marcos A. Simplício Jr., Leonardo C. Almeida, Ewerton R. Andrade, Paulo C. F. dos Santos, Paulo S. L. M. Barreto:

Lyra2: Password Hashing Scheme with improved security against time-memory trade-offs. 136 - Mikhail Strizhov, Indrajit Ray:

Multi-keyword Similarity Search Over Encrypted Cloud Data. 137 - Vikram Singh:

A Practical Key Exchange for the Internet using Lattice Cryptography. 138 - Donghoon Chang, Arpan Jati, Sweta Mishra, Somitra Kumar Sanadhya:

Performance Analysis of Some Password Hashing Schemes. 139 - Neal Koblitz, Alfred Menezes:

The Random Oracle Model: A Twenty-Year Retrospective. 140 - Céline Blondeau, Marine Minier:

Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks using the Matrix Method. 141 - S. Dov Gordon, Jonathan Katz, Feng-Hao Liu, Elaine Shi, Hong-Sheng Zhou:

Multi-Client Verifiable Computation with Stronger Security Guarantees. 142 - Erich Wenger, Paul Wolfger:

Harder, Better, Faster, Stronger - Elliptic Curve Discrete Logarithm Computations on FPGAs. 143 - Tyge Tiessen, Lars R. Knudsen, Stefan Kölbl, Martin M. Lauridsen:

Security of the AES with a Secret S-box. 144 - Stefan Kölbl, Gregor Leander, Tyge Tiessen:

Observations on the SIMON block cipher family. 145 - Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:

New Attacks on Feistel Structures with Improved Memory Complexities. 146 - Lionel Rivière, Zakaria Najm, Pablo Rauzy, Jean-Luc Danger, Julien Bringer, Laurent Sauvage:

High Precision Fault Injections on the Instruction Cache of ARMv7-M Architectures. 147 - Yossef Oren, Ahmad-Reza Sadeghi, Christian Wachsmann:

On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs. 148 - Jian Guo, Yu Sasaki, Lei Wang, Shuang Wu:

Cryptanalysis of HMAC/NMAC-Whirlpool. 149 - Tobias Pulls, Roel Peeters:

Insynd: Privacy-Preserving Secure One-Way Messaging Using Balloons. 150 - Daniel J. Bernstein, Andreas Hülsing, Tanja Lange, Ruben Niederhagen:

Bad directions in cryptographic hash functions. 151 - Ronan Lashermes, Jacques J. A. Fournier, Louis Goubin:

Inverting the Final exponentiation of Tate pairings on ordinary elliptic curves using faults. 152 - Kai-Min Chung, Jonathan Katz, Hong-Sheng Zhou:

Functional Encryption from (Small) Hardwae Tokens. 153 - Daniel Genkin, Yuval Ishai, Manoj Prabhakaran, Amit Sahai, Eran Tromer:

Circuits Resilient to Additive Attacks with Applications to Secure Computation. 154 - Loi Luu, Ratul Saha, Inian Parameshwaran, Prateek Saxena, Aquinas Hobor:

On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining. 155 - Brett Hemenway, Rafail Ostrovsky:

Building Lossy Trapdoor Functions from Lossy Encryption. 156 - Nuttapong Attrapadung, Shota Yamada:

Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings. 157 - Zvika Brakerski, Ilan Komargodski, Gil Segev:

From Single-Input to Multi-Input Functional Encryption in the Private-Key Setting. 158 - Shengbao Wu, Hongjun Wu, Tao Huang, Mingsheng Wang, Wenling Wu:

Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE. 159 - Tao Huang, Ivan Tjuawinata, Hongjun Wu:

Differential-Linear Cryptanalysis of ICEPOLE. 160 - Valentina Banciu, Elisabeth Oswald, Carolyn Whitnall:

Exploring the Resilience of Some Lightweight Ciphers Against Pro led Single Trace Attacks. 161 - Jean-Sébastien Coron, Tancrède Lepoint, Mehdi Tibouchi:

New Multilinear Maps over the Integers. 162 - Nir Bitansky, Vinod Vaikuntanathan:

Indistinguishability Obfuscation from Functional Encryption. 163 - Priyanka Bose, Dipanjan Das, C. Pandu Rangan:

Constant Size Ring Signature Without Random Oracle. 164 - Benny Applebaum:

The Cryptographic Hardness of Random Local Functions - Survey. 165 - Jeremiah Blocki, Manuel Blum, Anupam Datta:

Naturally Rehearsing Passwords. 166 - Saikrishna Badrinarayanan, Eric Miles, Amit Sahai, Mark Zhandry:

Post-Zeroizing Obfuscation: The case of Evasive Circuits. 167 - Claude Carlet:

More PS and H-like bent functions. 168 - Daniel R. L. Brown:

Short Schnorr signatures require a hash function with more than just random-prefix resistance. 169 - Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer:

Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation. 170 - Benjamin Dowling, Douglas Stebila, Greg Zaverucha

:
Authenticated Network Time Synchronization. 171 - Aria Shahverdi, Mostafa Taha, Thomas Eisenbarth:

Silent Simon: A Threshold Implementation under 100 Slices. 172 - Prabhanjan Ananth, Abhishek Jain

:
Indistinguishability Obfuscation from Compact Functional Encryption. 173 - Chenyang Tu, Neng Gao, Zeyi Liu, Lei Wang, Zongbin Liu, Bingke Ma:

A Practical Chosen Message Power Analysis Method on the Feistel-SP ciphers with Applications to CLEFIA and Camellia. 174 - Tomer Ashur, Bart Mennink:

Trivial Nonce-Misusing Attack on Pure OMD. 175 - Kim Laine, Kristin E. Lauter:

Key Recovery for LWE in Polynomial Time. 176 - B. R. Purushothama, Nishat Koti:

On the Security of an Efficient Group Key Agreement Scheme for MANETs. 177 - Pablo Azar, Shafi Goldwasser, Sunoo Park:

How to Incentivize Data-Driven Collaboration Among Competing Parties. 178 - Palash Sarkar, Shashank Singh:

A Simple Method for Obtaining Relations Among Factor Basis Elements for Special Hyperelliptic Curves. 179 - Abhishek Banerjee, Georg Fuchsbauer, Chris Peikert, Krzysztof Pietrzak, Sophie Stevens:

Key-Homomorphic Constrained Pseudorandom Functions. 180 - Bing Sun, Zhiqiang Liu, Vincent Rijmen, Ruilin Li, Lei Cheng, Qingju Wang, Hoda Alkhzaimi, Chao Li:

Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis. 181 - Rodolphe Lampe, Yannick Seurin:

Tweakable Blockciphers with Asymptotically Optimal Security. 182 - Céline Blondeau, Kaisa Nyberg:

New Links Between Differential and Linear Cryptanalysis. 183 - Céline Blondeau, Kaisa Nyberg:

Links Between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities. 184 - Elena Dubrova, Mats Näslund, Gunnar Carlsson, John Fornehed, Ben J. M. Smeets:

Remotely Managed Logic Built-In Self-Test for Secure M2M Communications. 185 - Sourav Das, Subhamoy Maitra, Willi Meier:

Higher Order Differential Analysis of NORX. 186 - Juan A. Garay, Jonathan Katz, Björn Tackmann, Vassilis Zikas:

How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality. 187 - Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud:

New Techniques for SPHFs and Efficient One-Round PAKE Protocols. 188 - Viet Tung Hoang, Reza Reyhanitabar, Phillip Rogaway, Damian Vizár:

Online Authenticated-Encryption and its Nonce-Reuse Misuse-Resistance. 189 - Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Carlos Cid:

Multi-Client Non-Interactive Verifiable Computation. 190 - Xiao Shaun Wang, Chang Liu, Kartik Nayak, Yan Huang, Elaine Shi:

iDASH Secure Genome Analysis Competition Using ObliVM. 191 - Sylvain Duquesne, Loubna Ghammam:

Memory-saving computation of the pairing fi nal exponentiation on BN curves. 192 - Karim Bigou, Arnaud Tisserand:

Improving Modular Inversion in RNS using the Plus-Minus Method. 193 - Dario Catalano, Dario Fiore:

Practical Homomorphic MACs for Arithmetic Circuits. 194 - Stephanie Bayer, Jens Groth:

Zero-knowledge Argument for Polynomial Evaluation with Application to Blacklists. 195 - Michel Abdalla, Fabrice Benhamouda, David Pointcheval:

Tighter Reductions for Forward-Secure Signature Schemes. 196 - N. Nalla Anandakumar:

SCA Resistance Analysis of MAC-PHOTON. 197 - Pascal Sasdrich, Oliver Mischke, Amir Moradi, Tim Güneysu:

Side-Channel Protection by Randomizing Look-Up Tables on Reconfigurable Hardware - Pitfalls of Memory Primitives. 198 - Amir Moradi, Gesine Hinterwälder:

Side-Channel Security Analysis of Ultra-Low-Power FRAM-based MCUs. 199 - Alexander Wild, Amir Moradi, Tim Güneysu:

Evaluating the Duplication of Dual-Rail Precharge Logics on FPGAs. 200 - Akbar Mahmoodi Rishakani, Seyed Mojtaba Dehnavi, M. R. Mirzaee Shamsabad, Hamidreza Maimani, Einollah Pasha:

Statistical Properties of Multiplication mod 2n. 201 - Shafi Goldwasser, Yael Tauman Kalai, Sunoo Park:

Adaptively Secure Coin-Flipping, Revisited. 202 - Pascal Sasdrich, Amir Moradi, Oliver Mischke, Tim Güneysu:

Achieving Side-Channel Protection with Dynamic Logic Reconfiguration on Modern FPGAs. 203 - Michel Abdalla, Sonia Belaïd, Pierre-Alain Fouque:

Leakage-Resilient Symmetric Encryption via Re-keying. 204 - Jooyoung Lee:

Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption. 205 - Bren Cavallo, Giovanni Di Crescenzo, Delaram Kahrobaei, Vladimir Shpilrain:

Efficient and Secure Delegation of Group Exponentiation to a Single Server. 206 - Tobias Schneider, Amir Moradi:

Leakage Assessment Methodology - a clear roadmap for side-channel evaluations. 207 - Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay:

Towards Secure Distance Bounding. 208 - Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Léo Perrin, Johann Großschädl, Alex Biryukov:

Triathlon of Lightweight Block Ciphers for the Internet of Things. 209 - Chenglu Jin, Marten van Dijk:

Secure and Efficient Initialization and Authentication Protocols for SHIELD. 210 - Thijs Laarhoven, Benne de Weger:

Faster sieving for shortest lattice vectors using spherical locality-sensitive hashing. 211 - Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger:

Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows. 212 - Javier Herranz:

Attribute-Based Versions of Schnorr and ElGamal. 213 - Yuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, Tetsu Iwata:

GCM Security Bounds Reconsidered. 214 - Amadou Moctar Kane:

A revocable anonymity in Tor. 215 - Eike Kiltz, Hoeteck Wee:

Quasi-Adaptive NIZK for Linear Subspaces Revisited. 216 - Subhamoy Maitra, Goutam Paul, Willi Meier:

Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles. 217 - Qinglong Wang:

Efficient k-out-of-n oblivious transfer protocol. 218 - Prakruti C, Sashank Dara, V. N. Muralidhara:

Efficient Format Preserving Encrypted Databases. 219 - Dan Boneh, Kevin Lewi, Hart William Montgomery, Ananth Raghunathan:

Key Homomorphic PRFs and Their Applications. 220 - Daniel J. Bernstein, Tanja Lange, Christine van Vredendaal:

Tighter, faster, simpler side-channel security evaluations beyond computing power. 221 - Elena Andreeva, Andrey Bogdanov, Bart Mennink:

Towards Understanding the Known-Key Security of Block Ciphers. 222 - Anubhab Baksi, Subhamoy Maitra, Santanu Sarkar:

New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers. 223 - Matteo Maffei, Giulio Malavolta, Manuel Reinert, Dominique Schröder:

Privacy and Access Control for Outsourced Personal Records. 224 - Ben Fisch, Daniel Freund, Moni Naor:

Secure Physical Computation using Disposable Circuits. 226 - Alex Biryukov, Dmitry Khovratovich:

Tradeoff Cryptanalysis of Memory-Hard Functions. 227 - Konrad Durnoga, Tomasz Kazana, Michal Zajac, Maciej Zdanowicz:

Leakage-Resilient Cryptography with Key Derived from Sensitive Data. 228 - Reza Hooshmand, Taraneh Eghlidos, Mohammad Reza Aref:

Improving GGH Public Key Scheme Using Low Density Lattice Codes. 229 - Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente, Srdjan Capkun:

W-SPS: Designing a Wide-Area Secure Positioning System. 230 - Yonglin Hao:

A Related-Key Chosen-IV Distinguishing Attack on Full Sprout Stream Cipher. 231 - Virginie Lallemand, María Naya-Plasencia:

Cryptanalysis of Full Sprout. 232 - Ben Smyth, Steven Frink, Michael R. Clarkson:

Computational Election Verifiability: Definitions and an Analysis of Helios and JCJ. 233 - Megha Agrawal, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya:

Collision Attack on 4-branch, Type-2 GFN based Hash Functions using Sliced Biclique Cryptanalysis Technique. 234 - Mashael AlSabah, Ian Goldberg:

Performance and Security Improvements for Tor: A Survey. 235 - Subhamoy Maitra, Santanu Sarkar, Anubhab Baksi, Pramit Dey:

Key Recovery from State Information of Sprout: Application to Cryptanalysis and Fault Attack. 236 - Wouter Lueks, Gergely Alpár, Jaap-Henk Hoepman, Pim Vullers:

Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers. 237 - Konrad Durnoga, Stefan Dziembowski, Tomasz Kazana, Michal Zajac:

One Time Programs with Limited Memory. 238 - Patrick Derbez

, Léo Perrin:
Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE. 239 - Alex Biryukov, Patrick Derbez

, Léo Perrin:
Differential Analysis and Meet-in-the-Middle Attack against Round-Reduced TWINE. 240 - Elena Dubrova, Martin Hell:

Espresso: A Stream Cipher for 5G Wireless Communication Systems. 241 - Benoît Libert, Thomas Peters, Marc Joye, Moti Yung:

Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications. 242 - Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas:

Reliable Message Transmission under Partial Knowledge. 243 - Jérémy Jean, Ivica Nikolic:

Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation. 244 - Pawel Morawiecki:

Practical Attacks on the Round-reduced PRINCE. 245 - Fabrice Benhamouda, Geoffroy Couteau, David Pointcheval, Hoeteck Wee:

Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting. 246 - Paulo S. L. M. Barreto, Craig Costello, Rafael Misoczki, Michael Naehrig, C. C. F. Pereira Geovandro, Gustavo H. M. Zanon:

Subgroup security in pairing-based cryptography. 247 - Ryo Nishimaki, Keita Xagawa:

Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES. 248 - Keita Xagawa:

Improved (Hierarchical) Inner-Product Encryption from Lattices. 249 - Junji Shikata:

Design and Analysis of Information-Theoretically Secure Authentication Codes with Non-Uniformly Random Keys. 250 - Kaoru Kurosawa, Yasuhiro Ohtaki:

How to Construct UC-Secure Searchable Symmetric Encryption Scheme. 251 - Haiyan Wang, Jianghua Zhong, Dongdai Lin:

Linearization of Multi-valued Nonlinear Feedback Shift Registers. 252 - Haiyan Wang, Dongdai Lin:

Stability and Linearization of Multi-valued Nonlinear Feedback Shift Registers. 253 - Pouyan Sepehrdad, Petr Susil, Serge Vaudenay, Martin Vuagnoux:

Tornado Attack on RC4 with Applications to WEP & WPA. 254 - David Bernhard, Véronique Cortier, David Galindo, Olivier Pereira, Bogdan Warinschi:

A comprehensive analysis of game-based ballot privacy definitions. 255 - Yang Lu, Quanling Zhang, Jiguo Li:

Cryptanalysis of Three Certificate-Based Authenticated Key Agreement Protocols and a Secure Construction. 256 - Vadim Lyubashevsky, Thomas Prest:

Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices. 257 - Siang Meng Sim, Khoongming Khoo, Frédérique E. Oggier, Thomas Peyrin:

Lightweight MDS Involution Matrices. 258 - Patrick Derbez

, Pierre-Alain Fouque:
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks against Reduced-Round AES. 259 - Paul Bottinelli, Joppe W. Bos:

Computational Aspects of Correlation Power Analysis. 260 - Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten:

Research Perspectives and Challenges for Bitcoin and Cryptocurrencies. 261 - Hanno Böck:

A look at the PGP ecosystem through the key server data. 262 - Ethan Heilman, Alison Kendler, Aviv Zohar, Sharon Goldberg:

Eclipse Attacks on Bitcoin's Peer-to-Peer Network. 263 - Justine Sherry, Chang Lan, Raluca Ada Popa, Sylvia Ratnasamy:

BlindBox: Deep Packet Inspection over Encrypted Traffic. 264 - George Hatzivasilis, Ioannis Papaefstathiou, Charalampos Manifavas:

Password Hashing Competition - Survey and Benchmark. 265 - Xianrui Meng, Seny Kamara, Kobbi Nissim, George Kollios

:
GRECS: Graph Encryption for Approximate Shortest Distance Queries. 266 - Tung Chou, Claudio Orlandi:

The Simplest Protocol for Oblivious Transfer. 267 - Itai Dinur, Orr Dunkelman, Masha Gutman, Adi Shamir:

Improved Top-Down Techniques in Differential Cryptanalysis. 268 - Chunsheng Gu:

Ideal Multilinear Maps Based on Ideal Lattices. 269 - Markus Dichtl:

Fibonacci Ring Oscillators as True Random Number Generators - A Security Risk. 270 - Mariya Georgieva, Frédéric de Portzamparc:

Toward Secure Implementation of McEliece Decryption. 271 - Baodong Qin, Shengli Liu:

Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing. 272 - Hoeteck Wee:

Dual System Encryption via Predicate Encodings. 273 - Gizem S. Çetin, Yarkin Doröz, Berk Sunar, Erkay Savas:

Low Depth Circuits for Efficient Homomorphic Sorting. 274 - Takanori Yasuda, Xavier Dahan, Yun-Ju Huang, Tsuyoshi Takagi, Kouichi Sakurai:

MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems. 275 - Binglong Chen, Chang-An Zhao:

An Improvment of the Elliptic Net Algorithm. 276 - Marco Tomamichel, Serge Fehr, Jedrzej Kaniewski, Stephanie Wehner:

One-Sided Device-Independent QKD and Position-based Cryptography from Monogamy Games. 277 - Sébastien Canard, David Pointcheval, Olivier Sanders:

Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting. 278 - Jérémy Jean, María Naya-Plasencia, Thomas Peyrin:

Improved Cryptanalysis of AES-like Permutations. 279 - Jonathan Katz, Aishwarya Thiruvengadam, Hong-Sheng Zhou:

Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption. 280 - Vinod Vaikuntanathan, Prashant Nalini Vasudevan:

From Statistical Zero Knowledge to Secret Sharing. 281 - Arash Afshar, Payman Mohassel, Benny Pinkas, Ben Riva:

Non-Interactive Secure Computation Based on Cut-and-Choose. 282 - Esha Ghosh, Michael T. Goodrich, Olga Ohrimenko, Roberto Tamassia:

Fully-Dynamic Verifiable Zero-Knowledge Order Queries for Network Data. 283 - Binglong Chen, Chuangqiang Hu, Chang-An Zhao:

A Note on Scalar Multiplication Using Division Polynomials. 284 - Tomer Ashur:

Improved Linear Trails for the Block Cipher Simon. 285 - Zhan Chen, Ning Wang, Xiaoyun Wang:

Impossible Differential Cryptanalysis of Reduced Round SIMON. 286 - John M. Schanck, William Whyte, Zhenfei Zhang:

A quantum-safe circuit-extension handshake for Tor. 287 - Aydin Aysu, Patrick Schaumont

:
Precomputation Methods for Faster and Greener Post-Quantum Cryptography on Emerging Embedded Platforms. 288 - Muhammed F. Esgin, Orhun Kara:

Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks. 289 - Joseph A. Akinyele, Christina Garman, Susan Hohenberger:

Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes. 290 - Takeshi Sugawara

, Daisuke Suzuki, Minoru Saeki:
Two Operands of Multipliers in Side-Channel Attack. 291 - Shlomi Dolev, Yin Li:

Secret Shared Random Access Machine. 292 - Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:

Fully Secure Unbounded Revocable Attribute-Based Encryption in Prime Order Bilinear Groups via Subset Difference Method. 293 - Erdinç Öztürk, Yarkin Doröz, Berk Sunar, Erkay Savas:

Accelerating Somewhat Homomorphic Evaluation using FPGAs. 294 - Ralf Küsters, Tomasz Truderung:

Security Analysis of Re-Encryption RPC Mix Nets. 295 - Emil Lerner:

The Uniform Distribution of Sequences Generated by Iteration of Polynomials. 296 - Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao:

Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack. 297 - Yongge Wang:

Secure Random Linear Code Based Public Key Encryption Scheme RLCE. 298 - Zhengjun Cao, Lihua Liu:

A Note on the Lindell-Waisbard Private Web Search Scheme. 299 - Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré:

Scalable Divisible E-cash. 300 - Yupu Hu, Huiwen Jia:

Cryptanalysis of GGH Map. 301 - Reza Reyhanitabar, Serge Vaudenay, Damian Vizár:

Boosting OMD for Almost Free Authentication of Associated Data. 302 - Nicky Mouha:

The Design Space of Lightweight Cryptography. 303 - Joshua Baron, Karim El Defrawy, Joshua Lampkins, Rafail Ostrovsky:

Communication-Optimal Proactive Secret Sharing for Dynamic Groups. 304 - Jonas Schneider, Dominique Schröder:

Foundations of Reconfigurable PUFs (Full Version). 305 - Morris Dworkin, Ray A. Perlner:

Analysis of VAES3 (FF2). 306 - Sanjam Garg

, Steve Lu, Rafail Ostrovsky:
Black-Box Garbled RAM. 307 - Patrick McCorry, Siamak Fayyaz Shahandashti, Dylan Clarke, Feng Hao:

Authenticated Key Exchange over Bitcoin. 308 - Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, Roberto Trifiletti:

TinyLEGO: An Interactive Garbling Scheme for Maliciously Secure Two-party Computation. 309 - Igor A. Semaev:

New algorithm for the discrete logarithm problem on elliptic curves. 310 - Masayuki Abe, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo:

Tagged One-Time Signatures: Tight Security and Optimal Tag Size. 311 - Pierre-Alain Fouque, Thomas Vannet:

Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks. 312 - Ronald Cramer, Léo Ducas, Chris Peikert, Oded Regev:

Recovering Short Generators of Principal Ideals in Cyclotomic Rings. 313 - Qihong Yu, Jiguo Li, Yichen Zhang, Wei Wu, Xinyi Huang, Yang Xiang:

Certificate-Based Encryption Resilient to Key Leakage. 314 - Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:

Query-Complexity Amplification for Random Oracles. 315 - Zhengan Huang, Shengli Liu, Xianping Mao, Kefei Chen:

Non-malleability under Selective Opening Attacks: Implication and Separation. 316 - Marcin Andrychowicz, Daniel Masny, Edoardo Persichetti:

Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice. 317 - Patrick Märtens:

Practical Divisible E-Cash. 318 - Koray Karabina:

Point Decomposition Problem in Binary Elliptic Curves. 319 - James Alderman, Christian Janson, Carlos Cid, Jason Crampton:

Hybrid Publicly Verifiable Computation. 320 - (Withdrawn) Size-Hiding in Private Set Intersection: what can be done and how to do it without random oracles. 321

- Peeter Laud, Alisa Pankova:

Transformation-Based Outsourcing of Linear Equation Systems over Real Numbers. 322 - (Withdrawn) Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key Exchange. 323

- Divesh Aggarwal, Alexander Golovnev:

A Note on Lower Bounds for Non-interactive Message Authentication Using Weak Keys. 324 - Yuval Ishai, Rafail Ostrovsky, Vassilis Zikas:

Secure Multi-Party Computation with Identifiable Abort. 325 - Saeideh Kabirirad, Hamideh Hajiabadi:

Cryptanalysis Of An Authenticated Image Encryption Scheme Based On Chaotic Maps And Memory Cellular Automata. 326 - Subhadeep Banik:

Some results on Sprout. 327 - Xiaopeng Yang, Wenping Ma:

Strongly Secure Authenticated Key Exchange from Ideal Lattices. 328 - Dieter Schmidt:

PAGES - A Family of Block Ciiphers. 329 - Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya:

Sponge based CCA2 secure asymmetric encryption for arbitrary length message. 330 - Megha Agrawal, Donghoon Chang, Somitra Kumar Sanadhya:

A New Authenticated Encryption Technique for Handling Long Ciphertexts in Memory Constrained Devices. 331 - Sumit Chakraborty:

Security Intelligence for Broadcast : Threat Analytics. 332 - Johannes Krupp

, Dominique Schröder, Mark Simkin, Dario Fiore, Giuseppe Ateniese, Stefan Nürnberger:
Nearly Optimal Verifiable Data Streaming (Full Version). 333 - Ran Canetti, Yilei Chen, Leonid Reyzin:

On the Correlation Intractability of Obfuscated Pseudorandom Functions. 334 - Janaka Alawatugoda, Colin Boyd, Douglas Stebila:

Continuous After-the-fact Leakage-Resilient eCK-secure Key Exchange. 335 - Benny Applebaum, Jonathan Avron, Christina Brzuska:

Arithmetic Cryptography. 336 - Sujoy Sinha Roy, Kimmo Järvinen, Frederik Vercauteren, Vassil S. Dimitrov, Ingrid Verbauwhede:

Modular Hardware Architecture for Somewhat Homomorphic Function Evaluation. 337 - Amadou Moctar Kane:

Cryptanalysis of a fair anonymity for the tor network. 338 - Berry Schoenmakers, Meilof Veeningen:

Guaranteeing Correctness in Privacy-Friendly Outsourcing by Certificate Validation. 339 - Santanu Sarkar:

A New Distinguisher on Grain v1 for 106 rounds. 340 - Gilad Asharov, Gil Segev:

Limits on the Power of Indistinguishability Obfuscation and Functional Encryption. 341 - Yan Zhu, Xin Wang, Di Ma, Ruiqi Guo:

Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext. 342 - Michael Düll, Björn Haase, Gesine Hinterwälder, Michael Hutter, Christof Paar, Ana Helena Sánchez, Peter Schwabe:

High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers. 343 - Ryo Nishimaki, Daniel Wichs:

Watermarking Cryptographic Programs Against Arbitrary Removal Strategies. 344 - Pratyay Mukherjee, Daniel Wichs:

Two Round MPC from LWE via Multi-Key FHE. 345 - Aggelos Kiayias, Thomas Zacharias, Bingsheng Zhang:

End-to-End Verifiable Elections in the Standard Model∗. 346 - Riham AlTawy, Onur Duman, Amr M. Youssef:

Fault Analysis of Kuznyechik. 347 - Andreas Gornik, Amir Moradi, Jürgen Oehm, Christof Paar:

A Hardware-based Countermeasure to Reduce Side-Channel Leakage - Design, Implementation, and Evaluation. 348 - Chang Liu, Liehuang Zhu, Jinjun Chen:

Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud. 349 - Florian Mendel, Tomislav Nad, Martin Schläffer:

Improving Local Collisions: New Attacks on Reduced SHA-256. 350 - Mohammad Etemad, Alptekin Küpçü:

Database Outsourcing with Hierarchical Authenticated Data Structures. 351 - Pavel Raykov:

Broadcast from Minicast Secure Against General Adversaries. 352 - Paz Morillo, Carla Ràfols, Jorge L. Villar:

Matrix Computational Assumptions in Multilinear Groups. 353 - Jacek Samotyja, Kerstin Lemke-Rust, Markus Ullmann:

SEMA and MESD Leakage of TinyECC 2.0 on a LOTUS Sensor Node. 354 - Tommaso Gagliardoni, Andreas Hülsing, Christian Schaffner:

Semantic Security and Indistinguishability in the Quantum World. 355 - Nir Bitansky, Sanjam Garg

, Huijia Lin, Rafael Pass, Sidharth Telang:
Succinct Randomized Encodings and their Applications. 356 - Ming Li, Yupeng Jiang, Dongdai Lin:

A Group-theory Method to The Cycle Structures of Feedback Shift Registers. 357 - Yun-Ju Huang, Christophe Petit, Naoyuki Shinohara, Tsuyoshi Takagi:

On Generalized First Fall Degree Assumptions. 358 - Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche:

Higher-Order Side Channel Security and Mask Refreshing. 359 - Yanqing Yao, Zhoujun Li

:
Achieving Differential Privacy with Bias-Control Limited Source. 360 - Dominique Unruh:

Computationally binding quantum commitments. 361 - Claude Crépeau, Raza Ali Kazmi:

Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem. 362 - Bart Mennink:

Optimally Secure Tweakable Blockciphers. 363 - Qiang Tang

, Jun Wang:
Privacy-preserving Context-aware Recommender Systems: Analysis and New Solutions. 364 - Masoumeh Safkhani, Nasour Bagheri, Mehdi Hosseinzadeh, Mojtaba Eslamnezhad Namin, Samad Rostampour:

On the (im)possibility of receiving security beyond 2l using an l-bit PRNG: the case of Wang et. al. protocol. 365 - Arjen K. Lenstra, Benjamin Wesolowski:

A random zoo: sloth, unicorn, and trx. 366 - Achiya Bar-On:

Improved Higher-Order Differential Attacks on MISTY1. 367 - Evgeny Sidorov:

Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library. 368 - Nir Bitansky, Omer Paneth:

On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation. 369 - Sumit Chakraborty:

Financial Cryptography: Discriminatory Pricing Mechanism. 370 - S. Dov Gordon, Feng-Hao Liu, Elaine Shi:

Constant-Round MPC with Fairness and Guarantee of Output Delivery. 371 - Jérémy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang, Shuang Wu:

Security Analysis of PRINCE. 372 - Aloni Cohen, Justin Holmgren

, Vinod Vaikuntanathan:
Publicly Verifiable Software Watermarking. 373 - Christoph Bader, Tibor Jager, Yong Li, Sven Schäge:

On the Impossibility of Tight Cryptographic Reductions. 374 - Daniel R. L. Brown:

Bounds on surmising remixed keys. 375 - Raza Ali Kazmi:

Cryptography from Post-Quantum Assumptions. 376 - Alessandro Chiesa, Eran Tromer, Madars Virza:

Cluster Computing in Zero Knowledge. 377 - Fatemeh Ganji, Shahin Tajik, Jean-Pierre Seifert:

PAC Learning of Arbiter PUFs. 378 - Jingwei Li, Anna Cinzia Squicciarini, Dan Lin, Smitha Sundareswaran, Chunfu Jia:

MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection. 379 - Céline Blondeau, Aslí Bay, Serge Vaudenay:

Protecting against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation. 380 - Sumit Chakraborty:

Financial Cryptography: Algorithmic Mechanisms for a Hedonic Game. 381 - Thomas Pöppelmann, Tobias Oder, Tim Güneysu:

Speed Records for Ideal Lattice-Based Cryptography on AVR. 382 - Rafael Pass, Abhi Shelat:

Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings. 383 - Maciej Skorski

, Alexander Golovnev, Krzysztof Pietrzak:
Condensed Unpredictability. 384 - Serge Fehr, Jonathan Katz, Fang Song, Hong-Sheng Zhou, Vassilis Zikas:

Feasibility and Completeness of Cryptographic Tasks in the Quantum World. 385 - David J. Wu, Tony Feng, Michael Naehrig, Kristin E. Lauter:

Privately Evaluating Decision Trees and Random Forests. 386 - Scott Contini:

Method to Protect Passwords in Databases for Web Applications. 387 - Ran Canetti, Justin Holmgren

:
Fully Succinct Garbled RAM. 388 - Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche:

Keccak. 389 - Nuttapong Attrapadung:

Dual System Encryption Framework in Prime-Order Groups. 390 - Deepesh Data, Manoj Prabhakaran, Vinod M. Prabhakaran:

On the Communication Complexity of Secure Computation. 391 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel:

Forgery Attacks on round-reduced ICEPOLE-128. 392 - Mohammad Hossein Faghihi Sereshgi, Mohammad Dakhilalian, Mohsen Shakiba:

Biclique cryptanalysis of MIBS-80 and PRESENT-80. 393 - Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, Björn Tackmann:

Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer. 394 - Nils Fleischhacker, Johannes Krupp

, Giulio Malavolta, Jonas Schneider, Dominique Schröder, Mark Simkin:
Efficient Unlinkable Sanitizable Signatures from Signatures with Rerandomizable Keys. 395 - Dario Catalano, Dario Fiore, Rosario Gennaro, Luca Nizzardo:

Generalizing Homomorphic MACs for Arithmetic Circuits. 396 - Peter Gazi, Jooyoung Lee, Yannick Seurin, John P. Steinberger, Stefano Tessaro:

Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes. 397 - Abderrahmane Nitaj, Tajjeeddine Rachidi:

Factoring RSA moduli with weak prime factors. 398 - Abderrahmane Nitaj, Tajjeeddine Rachidi:

New attacks on RSA with Moduli N=prq. 399 - Stephen R. Tate, Roopa Vishwanathan:

Expiration and Revocation of Keys for Attribute-based Signatures. 400 - Eike Kiltz, Daniel Masny, Krzysztof Pietrzak:

Simple Chosen-Ciphertext Security from Low-Noise LPN. 401 - Adrian Thillard, Emmanuel Prouff, Thomas Roche:

Success through confidence: Evaluating the effectiveness of a side-channel attack. 402 - Mehrdad Nojoumian, Douglas R. Stinson:

Sequential Secret Sharing as a New Hierarchical Access Structure. 403 - Esha Ghosh, Olga Ohrimenko, Dimitrios Papadopoulos, Roberto Tamassia, Nikos Triandopoulos:

Zero-Knowledge Accumulators and Set Operations. 404 - Dana Dachman-Soled, Nils Fleischhacker, Jonathan Katz, Anna Lysyanskaya, Dominique Schröder:

Feasibility and Infeasibility of Secure Computation with Malicious PUFs. 405 - Yu-Chi Chen, Sherman S. M. Chow, Kai-Min Chung, Russell W. F. Lai, Wei-Kai Lin, Hong-Sheng Zhou:

Computation-Trace Indistinguishability Obfuscation and its Applications. 406 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel:

Higher-order cryptanalysis of LowMC. 407 - Franck Rondepierre:

Revisiting Atomic Patterns for Scalar Multiplications on Elliptic Curves. 408 - Jie Chen, Romain Gay, Hoeteck Wee:

Improved Dual System ABE in Prime-Order Groups via Predicate Encodings. 409 - Zhe Liu, Hwajeong Seo, Sujoy Sinha Roy, Johann Großschädl, Howon Kim, Ingrid Verbauwhede:

Efficient Ring-LWE Encryption on 8-bit AVR Processors. 410 - Pei Luo, Yunsi Fei, Xin Fang, A. Adam Ding, David R. Kaeli, Miriam Leeser:

Side-Channel Analysis of MAC-Keccak Hardware Implementations. 411 - Máté Horváth:

Survey on Cryptographic Obfuscation. 412 - Shashank Agrawal, Melissa Chase:

A study of Pair Encodings: Predicate Encryption in prime order groups. 413 - Mridul Nandi:

On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes. 414 - Markku-Juhani O. Saarinen:

STRIBOB / WHIRLBOB Security Analysis Addendum. 415 - Mayank Varia, Sophia Yakoubov, Yang Yang:

HETest: A Homomorphic Encryption Testing Framework. 416 - Mark Bun, Mark Zhandry:

Order-Revealing Encryption and the Hardness of Private Learning. 417 - Itai Dinur, Yunwen Liu, Willi Meier, Qingju Wang:

Optimized Interpolation Attacks on LowMC. 418 - Yasser Shoukry, Paul D. Martin, Paulo Tabuada, Mani B. Srivastava:

Non-invasive Spoofing Attacks for Anti-lock Braking Systems. 419 - Vipul Goyal, Divya Gupta, Abhishek Jain

:
What Information is Leaked under Concurrent Composition? 420 - Zhe Liu, Husen Wang, Johann Großschädl, Zhi Hu, Ingrid Verbauwhede:

VLSI Implementation of Double-Base Scalar Multiplication on a Twisted Edwards Curve with an Efficiently Computable Endomorphism. 421 - Marina Blanton

, Fattaneh Bayatbabolghani:
Efficient Server-Aided Secure Two-Party Function Evaluation with Applications to Genomic Computation. 422 - Santosh Ghosh, Amit Kumar, Amitabh Das, Ingrid Verbauwhede:

On the Implementation of Unified Arithmetic on Binary Huff Curves. 423 - Begül Bilgin

, Andrey Bogdanov, Miroslav Knezevic, Florian Mendel, Qingju Wang:
FIDES: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware. 424 - Stefan Heyse, Ingo von Maurich, Tim Güneysu:

Smaller Keys for Code-Based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices. 425 - Alex Biryukov, Ivica Nikolic:

Complementing Feistel Ciphers. 426 - Mudit Bhargava, Ken Mai:

A High Reliability PUF Using Hot Carrier Injection Based Response Reinforcement. 427 - Philipp Jovanovic, Samuel Neves:

Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol. 428 - Ivica Nikolic, Lei Wang, Shuang Wu:

Cryptanalysis of Round-Reduced LED. 429 - Alex Biryukov, Daniel Dinu, Dmitry Khovratovich:

Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing. 430 - Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka:

Conversions among Several Classes of Predicate Encryption and Their Applications. 431 - (Withdrawn) Non-Repudiable Provable Data Possession in Cloud Storage. 432

- Wentao Zhang, Zhenzhen Bao, Vincent Rijmen, Meicheng Liu:

A New Classification of 4-bit Optimal S-boxes and its Application to PRESENT, RECTANGLE and SPONGENT. 433 - Pascale Charpin, Sihem Mesnager, Sumanta Sarkar:

Dickson Polynomials that are Involutions. 434 - Yusong Du, Baodian Wei, Fangguo Zhang, Huang Zhang:

On the (Fast) Algebraic Immunity of Boolean Power Functions. 435 - Yusong Du, Baodian Wei, Fangguo Zhang, Huang Zhang:

On the Resistance of Prime-variable Rotation Symmetric Boolean Functions against Fast Algebraic Attacks. 436 - Bryan Parno:

A Note on the Unsoundness of vnTinyRAM's SNARK. 437 - Ralf Küsters, Tomasz Truderung, Bernhard Beckert, Daniel Bruns, Michael Kirsten, Martin Mohr:

A Hybrid Approach for Proving Noninterference of Java Programs. 438 - Vipul Goyal, Abhishek Jain

:
On Concurrently Secure Computation in the Multiple Ideal Query Model. 439 - Martín Abadi, Dan Boneh, Ilya Mironov, Ananth Raghunathan, Gil Segev:

Message-Locked Encryption for Lock-Dependent Messages. 440 - Devu Manikantan Shila, Vivek Venugopalan, Cameron D. Patterson:

Enhancing Trust in Reconfigurable Based Hardware Systems with Tags and Monitors. 441 - Zoya Dyka, Thomas Basmer, Christian Wittke, Peter Langendörfer:

Individualizing Electrical Circuits of Cryptographic Devices as a Means to Hinder Tampering Attacks. 442 - Xiaolin Xu, Ulrich Rührmair, Daniel E. Holcomb, Wayne P. Burleson:

Security Evaluation and Enhancement of Bistable Ring PUFs. 443 - Mridul Nandi:

Revisiting Security Claims of XLS and COPA. 444 - Mridul Nandi:

XLS is not a Strong Pseudorandom Permutation. 445 - Ronald Cramer, Ivan Damgård, Marcel Keller:

On the Amortized Complexity of Zero-knowledge Protocols. 446 - Zhenqi Li, Bin Zhang, Junfeng Fan, Ingrid Verbauwhede:

A New Model for Error-Tolerant Side-Channel Cube Attacks. 447 - Yupu Hu, Huiwen Jia:

A Comment on Gu Map-1. 448 - Ruoxin Zhao, Rui Zhang, Yongqiang Li, Baofeng Wu:

On Constructions of a Sort of MDS Block Diffusion Matrices for Block Ciphers and Hash Functions. 449 - Carmit Hazay, Yehuda Lindell, Arpita Patra:

Adaptively Secure Computation with Partial Erasures. 450 - Sihong Su, Xiaohu Tang:

On the Systematic Constructions of Rotation Symmetric Bent Functions with Any Possible Algebraic Degrees. 451 - Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Olivier Rioul:

Masks will Fall Off - Higher-Order Optimal Distinguishers. 452 - Yupu Hu, Huiwen Jia:

An Optimization of Gu Map-1. 453 - Oscar García Morchon, Ronald Rietman, Sahil Sharma, Ludo Tolhuizen, Jose Luis Torre-Arce:

A comprehensive and lightweight security architecture to secure the IoT throughout the lifecycle of a device based on HIMMO. 454 - Jian Liu, N. Asokan, Benny Pinkas:

Secure Deduplication of Encrypted Data without Additional Independent Servers. 455 - Iraklis Symeonidis, Filipe Beato, Pagona Tsormpatzoudi, Bart Preneel:

Collateral damage of Facebook Apps: an enhanced privacy scoring model. 456 - Mridul Nandi, Tapas Pandit:

Generic Conversions from CPA to CCA secure Functional Encryption. 457 - Sheena Sathyan, Ramaswamy Swarnammal Shaji:

A Hybrid Approach for the Secure Transmission of H.264/AVC Video Streams. 458 - Bing Sun, Xin Hai, Wenyu Zhang, Lei Cheng, Zhichao Yang:

New Observation on Division Property. 459 - Kevin Delmolino, Mitchell Arnett, Ahmed E. Kosba, Andrew Miller, Elaine Shi:

Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab. 460 - Jung Hee Cheon, Changmin Lee:

Cryptanalysis of the multilinear map on the ideal lattices. 461 - Wei Dai, Yarkin Doröz, Berk Sunar:

Accelerating SWHE based PIRs using GPUs. 462 - (Withdrawn) Multilinear Maps Using Random Matrix. 463

- Florian Tschorsch, Björn Scheuermann:

Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies. 464 - Hwajeong Seo, Zhe Liu, Johann Großschädl, Howon Kim:

Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation. 465 - Tanping Zhou, Xiaoyuan Yang, Wei Zhang, Liqiang Wu:

Efficient Fully Homomorphic Encryption with Circularly Secure Key Switching Process. 466 - Marcel Keller:

The Oblivious Machine - or: How to Put the C into MPC. 467 - Dongxi Liu:

Practical Fully Homomorphic Encryption without Noise Reduction. 468 - Andrew Miller, Rob Jansen:

Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-threaded Applications. 469 - Vincenzo Iovino, Qiang Tang

, Karol Zebrowski:
On the Power of Public-key Functional Encryption with Function Privacy. 470 - Yansong Gao, Damith Chinthana Ranasinghe, Gefei Li, Said F. Al-Sarawi, Omid Kavehei, Derek Abbott:

A Challenge Obfuscation Method for Thwarting Model Building Attacks on PUFs. 471 - Sai Sheshank Burra, Enrique Larraia, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, Emmanuela Orsini, Peter Scholl, Nigel P. Smart:

High Performance Multi-Party Computation for Binary Circuits Based on Oblivious Transfer. 472 - Mehak Khurana, Meena Kumari:

VARIANTS OF DIFFERENTIAL AND LINEAR CRYPTANALYSIS. 473 - Masahiro Yagisawa:

Fully Homomorphic Encryption without bootstrapping. 474 - Eleonora Guerrini, Laurent Imbert, Théo Winterhalter:

Randomizing Scalar Multiplication Using Exact Covering Systems of Congruences. 475 - Bart Mennink:

XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees. 476 - John Preuß Mattsson:

Authentication Key Recovery in Galois/Counter Mode (GCM). 477 - (Withdrawn) How to Build Time-Lock Encryption. 478

- Martianus Frederic Ezerman, Hyung Tae Lee, San Ling, Khoa Nguyen, Huaxiong Wang:

A Provably Secure Group Signature Scheme from Code-Based Assumptions. 479 - Berry Schoenmakers, Meilof Veeningen, Niels de Vreede:

Trinocchio: Privacy-Friendly Outsourcing by Distributed Verifiable Computation. 480 - Theodosis Mourouzis, Guangyan Song, Nicolas T. Courtois, Michalis Christofi:

Advanced Differential Cryptanalysis of Reduced-Round SIMON64/128 Using Large-Round Statistical Distinguishers. 481 - Jia Liu, Saqib A. Kakvi, Bogdan Warinschi:

Extractable Witness Encryption and Timed-Release Encryption from Bitcoin. 482 - Shi Bai, Adeline Langlois, Tancrède Lepoint, Damien Stehlé, Ron Steinfeld:

Improved security proofs in lattice-based cryptography: using the Rényi divergence rather than the statistical distance. 483 - Jian Guo, Jérémy Jean, Nicky Mouha, Ivica Nikolic:

More Rounds, Less Security? 484 - Elena Andreeva, Guy Barwell, Dan Page, Martijn Stam:

Turning Online Ciphers Off. 485 - Jiangshan Yu, Mark Ryan, Cas Cremers:

How to detect unauthorised usage of a key. 486 - Mihir Bellare, Igors Stepanovs, Stefano Tessaro:

Contention in Cryptoland: Obfuscation, Leakage and UCE. 487 - Carmit Hazay, Muthuramakrishnan Venkitasubramaniam:

On Black-Box Complexity of Universally Composable Security in the CRS model. 488 - Trinabh Gupta, Natacha Crooks, Srinath T. V. Setty, Lorenzo Alvisi, Michael Walfish:

Scalable and private media consumption with Popcorn. 489 - Sonam Devgan Kaul, Amit K. Awasthi:

Cryptanalysis Of Dynamic ID Based Remote User Authentication Scheme With Key Agreement. 490 - Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, Keita Xagawa:

Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices. 491 - Vincent Grosso, François-Xavier Standaert, Sebastian Faust:

Masking vs. Multiparty Computation: How Large is the Gap for AES? 492 - Sikhar Patranabis, Abhishek Chakraborty, Debdeep Mukhopadhyay:

Fault Tolerant Infective Countermeasure for AES. 493 - (Withdrawn) Cryptanalysis of the LSH and SHA-V Hash Functions. 494

- Sondre Rønjom:

Powers of Subfield Polynomials and Algebraic Attacks on Word-Based Stream Ciphers. 495 - Arthur Gervais, Hubert Ritzdorf, Mario Lucic, Srdjan Capkun:

Quantifying Location Privacy Leakage from Transaction Prices. 496 - Zhangxiang Hu, Payman Mohassel, Mike Rosulek:

Efficient Zero-Knowledge Proofs of Non-Algebraic Statements with Sublinear Amortized Cost. 497 - Jiajun Zhang, Haining Fan:

Low Space Complexity CRT-based Bit-Parallel GF(2n) Polynomial Basis Multipliers for Irreducible Trinomials. 498 - Dennis Hofheinz:

Algebraic partitioning: Fully compact and (almost) tightly secure cryptography. 499 - Alberto Battistello, Christophe Giraud:

Fault Cryptanalysis of CHES 2014 Symmetric Infective Countermeasure. 500 - Serge Fehr, Max Fillinger:

Multi-Prover Commitments Against Non-Signaling Attacks. 501 - George Danezis, Sarah Meiklejohn:

Centrally Banked Cryptocurrencies. 502 - Kristian Gjøsteen, Anders Smedstuen Lund:

The Norwegian Internet Voting Protocol: A new Instantiation. 503 - Brice Minaud, Yannick Seurin:

The Iterated Random Permutation Problem with Applications to Cascade Encryption. 504 - Razvan Barbulescu, Pierrick Gaudry, Thorsten Kleinjung:

The Tower Number Field Sieve. 505 - Gilles Barthe, Sonia Belaïd, François Dupressoir, Pierre-Alain Fouque, Benjamin Grégoire:

Compositional Verification of Higher-Order Masking: Application to a Verifying Masking Compiler. 506 - Itai Dinur, Orr Dunkelman, Thorsten Kranz, Gregor Leander:

Decomposing the ASASA Block Cipher Construction. 507 - Santanu Sarkar, Prakash Dey, Avishek Adhikari, Subhamoy Maitra:

Probabilistic Signature Based Framework for Differential Fault Analysis of Stream Ciphers. 508 - Daniel R. L. Brown:

A flaw in a theorem about Schnorr signatures. 509 - Gideon Samid:

Equivoe-T: Transposition Equivocation Cryptography. 510 - Baris Ege, Thomas Eisenbarth, Lejla Batina:

Near Collision Side Channel Attacks. 511 - Sami Saab, Andrew Leiserson, Michael Tunstall:

Efficient Key Extraction from the Primary Side of a Switched-Mode Power Supply. 512 - Aurore Guillevic:

Computing Individual Discrete Logarithms Faster in GF(pn). 513 - Nir Bitansky, Shafi Goldwasser, Abhishek Jain

, Omer Paneth, Vinod Vaikuntanathan, Brent Waters:
Time-Lock Puzzles from Randomized Encodings. 514 - Thomas Espitau, Pierre-Alain Fouque, Pierre Karpman:

Higher-Order Differential Meet-in-The-Middle Preimage Attacks on SHA-1 and BLAKE. 515 - Brice Minaud, Patrick Derbez

, Pierre-Alain Fouque, Pierre Karpman:
Key-Recovery Attacks on ASASA. 516 - Giuseppe Ateniese, Bernardo Magri, Daniele Venturi:

Subversion-Resilient Signature Schemes. 517 - Ren Zhang:

Broadcasting Intermediate Blocks as a Defense Mechanism Against Selfish-Mine in Bitcoin. 518 - Yongge Wang:

Notes on Two Fully Homomorphic Encryption Schemes Without Bootstrapping. 519 - Suvradip Chakraborty, Srinivasan Raghuraman, C. Pandu Rangan:

Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key Exchange. 520 - Sergey Gorbunov, Silvio Micali:

Democoin: A Publicly Verifiable and Jointly Serviced Cryptocurrency. 521 - Anja Becker, Nicolas Gama, Antoine Joux:

Speeding-up lattice sieving without increasing the memory, using sub-quadratic nearest neighbor search. 522 - Yehuda Lindell, Benny Pinkas, Nigel P. Smart, Avishay Yanai:

Efficient Constant Round Multi-Party Computation Combining BMR and SPDZ. 523 - Yansong Gao:

Secure Key Exchange Protocol based on Virtual Proof of Reality. 524 - David Pointcheval, Olivier Sanders:

Short Randomizable Signatures. 525 - Takanori Isobe, Kyoji Shibutani:

Generic Key Recovery Attack on Feistel Scheme. 526 - Carolyn Whitnall, Elisabeth Oswald:

Robust Profiling for DPA-Style Attacks. 527 - Sunoo Park, Krzysztof Pietrzak, Albert Kwon, Joël Alwen, Georg Fuchsbauer, Peter Gazi:

Spacemint: A Cryptocurrency Based on Proofs of Space. 528 - Colin O'Flynn, Zhizhang Chen:

Power Analysis Attacks against IEEE 802.15.4 Nodes. 529 - Pierre Karpman, Thomas Peyrin, Marc Stevens:

Practical Free-Start Collision Attacks on 76-step SHA-1. 530 - Mohammad Hajiabadi, Bruce M. Kapron:

Reproducible Circularly-Secure Bit Encryption: Applications and Realizations. 531 - Xiaoshuang Ma, Kexin Qiao:

Related-Key Rectangle Attack on Round-reduced Khudra Block Cipher. 533 - Sergey Agievich, Anastasiya Gorodilova, Nikolay Kolomeec, Svetla Nikova, Bart Preneel, Vincent Rijmen, George Shushuev, Natalia N. Tokareva, Valeriya Vitkup:

Problems, solutions and experience of the first international student's Olympiad in cryptography. 534 - Vincent Grosso, François-Xavier Standaert:

ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When? 535 - François Durvaux, François-Xavier Standaert:

From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces. 536 - François Durvaux, François-Xavier Standaert:

Towards Easy Leakage Certification. 537 - Sarita Agrawal, Jay Patel, Manik Lal Das:

Pairing Based Mutual Healing in Wireless Sensor Networks. 538 - Benoit Cogliati, Rodolphe Lampe, Yannick Seurin:

Tweaking Even-Mansour Ciphers. 539 - (Withdrawn) PICO: An Ultra lightweight and Low power encryption design for pervasive computing. 540

- Bart Mennink, Reza Reyhanitabar, Damian Vizár:

Security of Full-State Keyed and Duplex Sponge: Applications to Authenticated Encryption. 541 - Sonia Belaïd, Jean-Sébastien Coron, Pierre-Alain Fouque, Benoît Gérard, Jean-Gabriel Kammerer, Emmanuel Prouff:

Improved Side-Channel Analysis of Finite-Field Multiplication. 542 - Moni Naor, Eylon Yogev:

Bloom Filters in Adversarial Environments. 543 - Daniel R. L. Brown:

Alternative cubics' rules with an algebraic appeal. 544 - Qinglong Zhang, Zongbin Liu, Cunqing Ma, Changting Li, Jiwu Jing:

FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs. 545 - Marcel Keller, Emmanuela Orsini, Peter Scholl:

Actively Secure OT Extension with Optimal Overhead. 546 - Xiao Wang, S. Dov Gordon, Allen McIntosh, Jonathan Katz:

Secure Computation of MIPS Machine Code. 547 - Yevgeniy Dodis, Ilya Mironov, Noah Stephens-Davidowitz:

Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines. 548 - Amir Hassani Karbasi, Reza Ebrahimi Atani:

ILTRU: An NTRU-Like Public Key Cryptosystem Over Ideal Lattices. 549 - Charanjit S. Jutla:

Upending Stock Market Structure Using Secure Multi-Party Computation. 550 - Anne Broadbent, Stacey Jeffery:

Quantum homomorphic encryption for circuits of low T-gate complexity. 551 - Paul Kirchner, Pierre-Alain Fouque:

An Improved BKW Algorithm for LWE with Applications to Cryptography and Lattices. 552 - Rafail Ostrovsky, Silas Richelson, Alessandra Scafuro:

Round-Optimal Black-Box Two-Party Computation. 553 - Michel Abdalla, Fabrice Benhamouda, Alain Passelègue:

An Algebraic Framework for Pseudorandom Functions and Applications to Related-Key Security. 554 - Tapas Pandit, Sumit Kumar Pandey, Rana Barua:

Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack. 555 - Sujoy Sinha Roy, Kimmo Järvinen, Ingrid Verbauwhede:

Lightweight Coprocessor for Koblitz Curves: 283-bit ECC Including Scalar Conversion with only 4300 Gates. 556 - Takanori Isobe, Kyoji Shibutani:

Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers. 557 - Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto E. Koenig, Philémon von Bergen:

Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting. 558 - Ran Canetti, Vipul Goyal, Abhishek Jain

:
Concurrent Secure Computation with Optimal Query Complexity. 559 - Olivier Blazy, Céline Chevalier:

Generic Construction of UC-Secure Oblivious Transfer. 560 - Jake Longo, Elke De Mulder, Daniel Page, Michael Tunstall:

SoC it to EM: electromagnetic side-channel attacks on a complex system-on-chip. 561 - Iraklis Leontiadis, Kaoutar Elkhiyaoui, Melek Önen, Refik Molva:

PUDA - Privacy and Unforgeability for Data Aggregation. 562 - Muhammad Naveed, Erman Ayday, Ellen Wright Clayton, Jacques Fellay, Carl A. Gunter, Jean-Pierre Hubaux, Bradley A. Malin, XiaoFeng Wang:

Privacy in the Genomic Era. 563 - Victor Costan, Ilia A. Lebedev, Srinivas Devadas:

Sanctum: Minimal RISC Extensions for Isolated Execution. 564 - Craig Costello, Patrick Longa:

FourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime. 565 - Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada:

A Framework for Identity-Based Encryption with Almost Tight Security. 566 - Henri Gilbert, Jérôme Plût, Joana Treger:

Key-Recovery Attack on the ASASA Cryptosystem with Expanding S-boxes. 567 - Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li:

Cryptanalysis of Reduced-Round Whirlwind (Full Version). 568 - Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li:

Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version). 569 - Tarik Moataz, Travis Mayberry, Erik-Oliver Blass:

Constant Communication Oblivious RAM. 570 - Tobias Schneider, Amir Moradi, Tim Güneysu:

Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order. 571 - Eli Ben-Sasson, Iddo Bentov, Ivan Damgård, Yuval Ishai, Noga Ron-Zewi:

On Public Key Encryption from Noisy Codewords. 572 - Ming-Deh A. Huang, Michiel Kosters, Sze Ling Yeo:

Last fall degree, HFE, and Weil descent attacks on ECDLP. 573 - Aggelos Kiayias, Hong-Sheng Zhou, Vassilis Zikas:

Fair and Robust Multi-Party Computation using a Global Transaction Ledger. 574 - Céline Blondeau, Thomas Peyrin, Lei Wang:

Known-key Distinguisher on Full PRESENT. 575 - Michael Scott, Brian Spector:

The Carnac protocol - or how to read the contents of a sealed envelope. 576 - Manfred Lochter, Andreas Wiemers:

Twist Insecurity. 577 - Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun:

Tampering with the Delivery of Blocks and Transactions in Bitcoin. 578 - Mridul Nandi:

A Simple Proof of a Distinguishing Bound of Iterated Uniform Random Permutation. 579 - Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev, Markulf Kohlweiss:

Composable & Modular Anonymous Credentials: Definitions and Practical Constructions. 580 - Christina Brzuska, Arno Mittelbach:

Universal Computational Extractors and the Superfluous Padding Assumption for Indistinguishability Obfuscation. 581 - Robert Lychev, Samuel Jero, Alexandra Boldyreva, Cristina Nita-Rotaru:

How Secure and Quick is QUIC? Provable Security and Performance Analyses. 582 - Roel Maes, Vincent van der Leest, Erik van der Sluis, Frans M. J. Willems:

Secure Key Generation from Biased PUFs. 583 - Denise Demirel, Jean Lancrenon:

How to Securely Prolong the Computational Bindingness of Pedersen Commitments. 584 - Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers:

SIMON and SPECK: Block Ciphers for the Internet of Things. 585 - (Withdrawn) SCLPV: Secure Certificateless Public Verification for Cloud Storage in Cyber-physical-social System. 586

- Trupil Limbasiya, Nishant Doshi:

AN ENHANCED BIOMETRIC BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD. 587 - Bimal Mandal, Pantelimon Stanica, Sugata Gangopadhyay, Enes Pasalic:

An analysis of the C class of bent functions. 588 - Anastasia-Maria Leventi-Peetz, J.-V. Peetz:

Generating S-Box Multivariate Quadratic Equation Systems And Estimating Algebraic Attack Resistance Aided By SageMath. 589 - Avik Chakraborti, Anupam Chattopadhyay, Muhammad Hassan, Mridul Nandi:

TriviA: A Fast and Secure Authenticated Encryption Scheme. 590 - Maciej Skorski

:
How much randomness can be extracted from memoryless Shannon entropy sources? 591 - Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwan Asghar, Michael Backes, Ninja Marnau, Peter Druschel:

Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information. 592 - Patrick Haddad, Viktor Fischer, Florent Bernard, Jean Nicolai:

A Physical Approach for Stochastic Modeling of TERO-based TRNG. 593 - Debrup Chakraborty, Cuauhtemoc Mancillas-López, Palash Sarkar:

Disk Encryption: Do We Need to Preserve Length? 594 - (Withdrawn) Differential Fault Intensity Analysis. 595

- Jean-Sébastien Coron, Craig Gentry, Shai Halevi, Tancrède Lepoint, Hemanta K. Maji, Eric Miles, Mariana Raykova, Amit Sahai, Mehdi Tibouchi:

Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations. 596 - Amir Moradi, Alexander Wild:

Assessment of Hiding the Higher-Order Leakages in Hardware - what are the achievements versus overheads? 597 - Martin Pettai, Peeter Laud:

Combining Differential Privacy and Secure Multiparty Computation. 598 - Krzysztof Pietrzak, Maciej Skorski

:
The Chain Rule for HILL Pseudoentropy, Revisited. 599 - John Kelsey, Kerry A. McKay, Meltem Sönmez Turan:

Predictive Models for Min-Entropy Estimation. 600 - Mei Wang, Zheng Yuan, Xiao Feng:

A Secure Oblivious Transfer Protocol from Indistinguishing Obfuscation. 601 - Abhishek Chakraborty, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay:

Combined Side-Channel and Fault Analysis Attack on Protected Grain Family of Stream Ciphers. 602 - Claude Carlet, Sylvain Guilley:

Complementary Dual Codes for Counter-measures to Side-Channel Attacks. 603 - Eike Kiltz, Jiaxin Pan, Hoeteck Wee:

Structure-Preserving Signatures from Standard Assumptions, Revisited. 604 - Steven D. Galbraith, Ping Wang, Fangguo Zhang:

Computing Elliptic Curve Discrete Logarithms with Improved Baby-step Giant-step Algorithm. 605 - Kyu Young Choi, Jihoon Cho, Jung Yeon Hwang, Taekyoung Kwon:

Constructing Efficient PAKE Protocols from Identity-Based KEM/DEM. 606 - Hitesh Tewari, Eamonn O. Nuallain:

Netcoin - A Traceable P2P Electronic Cash System. 607 - Benoît Libert, Damien Stehlé:

Fully Secure Functional Encryption for Inner Products, from Standard Assumptions. 608 - Igor A. Semaev:

Experimental Study of DIGIPASS GO3 and the Security of Authentication. 609 - Daniel J. Bernstein, Tung Chou, Peter Schwabe:

McBits: fast constant-time code-based cryptography. 610 - (Withdrawn) A Unified Security Analysis of Two-phase Key Exchange Protocols in TPM 2.0. 611

- Gangqiang Yang, Bo Zhu, Valentin Suder, Mark D. Aagaard, Guang Gong:

The Simeck Family of Lightweight Block Ciphers. 612 - Jianting Ning, Xiaolei Dong, Zhenfu Cao, Lifei Wei:

Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud. 613 - Fangguo Zhang:

Bit Security of the Hyperelliptic Curves Diffie-Hellman Problem. 614 - Nasour Bagheri, Masoumeh Safkhani, Hoda Jannati:

Security Analysis of Niu et al. Authentication and Ownership Management Protocol. 615 - Lukasz Olejnik, Gunes Acar, Claude Castelluccia, Claudia Díaz:

The leaking battery: A privacy analysis of the HTML5 Battery Status API. 616 - Boris Skoric, Wouter de Groot:

Generalised tally-based decoders for traitor tracing and group testing. 617 - Juan Carlos Ku-Cauich, Guillermo Morales-Luna, Horacio Tapia-Recillas:

An Authentication Code over Galois Rings with Optimal Impersonation and Substitution Probabilities. 618 - Seher Tutdere, Osmanbey Uzunkol:

Construction of Arithmetic Secret Sharing Schemes by Using Torsion Limits. 619 - Susumu Kiyoshima:

Statistical Concurrent Non-malleable Zero-knowledge from One-way Functions. 620 - Sarani Bhattacharya, Debdeep Mukhopadhyay:

Who watches the watchmen? : Utilizing Performance Monitors for Compromising keys of RSA on Intel Platforms. 621 - Nicolas Méloni, M. Anwar Hasan:

Random Digit Representation of Integers. 622 - (Withdrawn) Design, Evaluation and Optimization of Physical Unclonable Functions based on Transient Effect Ring Oscillators. 623

- Viet Tung Hoang, Jonathan Katz, Alex J. Malozemoff:

Automated Analysis and Synthesis of Authenticated Encryption Schemes. 624 - Mike Hamburg:

Ed448-Goldilocks, a new elliptic curve. 625 - Georg Fuchsbauer, Christian Hanser, Daniel Slamanig:

Practical Round-Optimal Blind Signatures in the Standard Model. 626 - Justin Holmgren

:
On Necessary Padding with IO. 627 - Daniel Cabarcas, Denise Demirel, Florian Göpfert, Jean Lancrenon, Thomas Wunderer:

An Unconditionally Hiding and Long-Term Binding Post-Quantum Commitment Scheme. 628 - Véronique Cortier, Georg Fuchsbauer, David Galindo:

BeleniosRF: A Strongly Receipt-Free Electronic Voting Scheme. 629 - Ivan Damgård, Jesper Buus Nielsen:

Unconditionally Secure Computation with Reduced Interaction. 630 - Thomas Pöppelmann, Michael Naehrig, Andrew Putnam, Adrián Macías:

Accelerating Homomorphic Evaluation on Reconfigurable Hardware. 631 - Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji:

More on Impossibility of Virtual Black-Box Obfuscation in Idealized Models. 632 - Mehmet Sabir Kiraz, Isa Sertkaya, Osmanbey Uzunkol:

An Efficient ID-Based Message Recoverable Privacy-Preserving Auditing Scheme. 633 - Benny Pinkas, Thomas Schneider, Gil Segev, Michael Zohner:

Phasing: Private Set Intersection using Permutation-based Hashing. 634 - Chris Pavlovski, Colin Boyd:

Microcash: Efficient Off-Line Small Payments. 635 - Matthias Krause:

Analyzing Constructions for key-alternating Pseudorandom Functions with Applications to Stream Cipher Operation Modes. 636 - Fenghua Li, Yanchao Wang, Rongna Xie, Jinbo Xiong, Fangfang Shan:

A Novel Cyberspace-Oriented Access Control Model. 637 - Marco Indaco, Fabio Lauri, Andrea Miele, Pascal Trotta:

An Efficient Many-Core Architecture for Elliptic Curve Cryptography Security Assessment. 638 - (Withdrawn) Polynomial time reduction from approximate shortest vector problem to the principle ideal porblem for lattices in cyclotomic rings. 639

- Luís T. A. N. Brandão:

Very-efficient simulatable flipping of many coins into a well. 640 - Jing Li, Licheng Wang:

Noise-free Symmetric Fully Homomorphic Encryption based on noncommutative rings. 641 - Muhammed F. Esgin, Mehmet S. Kiraz, Osmanbey Uzunkol:

A New Partial Key Exposure Attack on Multi-power RSA. 642 - Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth, Christophe Petit:

Short Accountable Ring Signatures Based on DDH. 643 - Adam Everspaugh, Rahul Chatterjee, Samuel Scott, Ari Juels, Thomas Ristenpart:

The Pythia PRF Service. 644 - (Withdrawn) Improvements on Efficient Dynamic Provable Data Possession scheme with Public Verifiability and Data Privacy. 645

- Alex Biryukov, Dmitry Khovratovich:

Decomposition attack on SASASASAS. 646 - Andrea Miele, Arjen K. Lenstra:

Efficient ephemeral elliptic curve cryptographic keys. 647 - David Bernhard, Marc Fischlin, Bogdan Warinschi:

Adaptive Proofs of Knowledge in the Random Oracle Model. 648 - David Bernhard, Marc Fischlin, Bogdan Warinschi:

On the Hardness of Proving CCA-security of Signed ElGamal. 649 - Roman Oliynykov, Ivan Gorbenko, Oleksandr Kazymyrov, Victor Ruzhentsev, Oleksandr Kuznetsov, Yurii Gorbenko, Oleksandr Dyrda, Viktor Dolgov, Andrii Pushkaryov, Ruslan Mordvinov, Dmytro Kaidalov:

A New Encryption Standard of Ukraine: The Kalyna Block Cipher. 650 - Stephan Kleber, Florian Unterstein, Matthias Matousek, Frank Kargl, Frank Slomka, Matthias Hiller:

Secure Execution Architecture based on PUF-driven Instruction Level Code Encryption. 651 - Benjamin Dowling, Douglas Stebila:

Modelling ciphersuite and version negotiation in the TLS protocol. 652 - (Withdrawn) Homomorphic Signature Schemes - A survey. 653

- Bo Yang, Kang Yang, Yu Qin, Zhenfeng Zhang, Dengguo Feng:

DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone. 654 - Nizamud Din, Arif Iqbal Umar, Abdul Waheed, Noor Ul Amin:

An Efficient Multi-Message Multi-Receiver Signcryption Scheme with Forward Secrecy on Elliptic Curves. 655 - Ruhul Amin, G. P. Biswas:

Cryptanalysis of a Markov Chain Based User Authentication Scheme. 656 - Duc-Phong Le, Chik How Tan, Michael Tunstall:

Randomizing the Montgomery Powering Ladder. 657 - Pieter Maene, Ingrid Verbauwhede:

Single-Cycle Implementations of Block Ciphers. 658 - Jean-Pierre Flori, Jérôme Plût, Jean-René Reinhard, Martin Ekerå:

Diversity and Transparency for ECC. 659 - (Withdrawn) A Hybrid Gaussian Sampler for Lattices over Rings. 660

- Shane Kepley, David Russo, Rainer Steinwandt:

Cryptanalysis of a modern rotor machine in a multicast setting. 661 - Ryutaroh Matsumoto:

Strong Security of the Strongly Multiplicative Ramp Secret Sharing based on Algebraic Curves. 662 - Nahid Farhady Ghalaty, Bilgiday Yuce, Patrick Schaumont

:
Analyzing the Efficiency of Biased-Fault Based Attacks. 663 - Mahnush Movahedi, Jared Saia, Mahdi Zamani:

Secure Multi-Party Shuffling. 664 - Romain Gay, Iordanis Kerenidis, Hoeteck Wee:

Communication Complexity of Conditional Disclosure of Secrets and Attribute-Based Encryption. 665 - Huaifeng Chen, Xiaoyun Wang:

Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-guessing Techniques. 666 - Ming Li, Dongdai Lin:

De Bruijn Sequences from Nonlinear Feedback Shift Registers. 667 - Ekawat Homsirikamol, William Diehl, Ahmed Ferozpuri, Farnoud Farahmand, Malik Umar Sharif, Kris Gaj:

GMU Hardware API for Authenticated Ciphers. 669 - Bruno Robisson, Michel Agoyan, Patrick Soquet, Sébastien Le Henaff, Franck Wajsbürt, Pirouz Bazargan-Sabet, Guillaume Phan:

Smart Security Management in Secure Devices. 670 - Peeter Laud, Alisa Pankova:

Privacy-preserving Frequent Itemset Mining for Sparse and Dense Data. 671 - Allison Bishop, Abhishek Jain

, Lucas Kowalczyk:
Function-Hiding Inner Product Encryption. 672 - Mike Hamburg:

Decaf: Eliminating cofactors through point compression. 673 - Peeter Laud, Alisa Pankova:

Preprocessing-Based Verification of Multiparty Protocols with Honest Majority. 674 - Ahmed E. Kosba, Andrew Miller, Elaine Shi, Zikai Wen, Charalampos Papamanthou:

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. 675 - Scott R. Fluhrer:

Quantum Cryptanalysis of NTRU. 676 - Daniel J. Bernstein, Simon Josefsson, Tanja Lange, Peter Schwabe, Bo-Yin Yang:

EdDSA for more curves. 677 - Thomas Pornin:

Optimizing MAKWA on GPU and CPU. 678 - Subhabrata Samajder, Palash Sarkar:

Another Look at Normal Approximations in Cryptanalysis. 679 - Yevgeniy Dodis, Tianren Liu, Martijn Stam, John P. Steinberger:

Indifferentiability of Confusion-Diffusion Networks. 680 - Susan Hohenberger, Steven A. Myers, Rafael Pass, Abhi Shelat:

ANONIZE: A Large-Scale Anonymous Survey System. 681 - Yosuke Todo:

Integral Cryptanalysis on Full MISTY1. 682 - Irene Giacomelli, Ruxandra F. Olimid, Samuel Ranellucci:

Security of Linear Secret-Sharing Schemes against Mass Surveillance. 683 - Aggelos Kiayias, Yona Raekow, Alexander Russell, Narasimha K. Shashidhar:

A One-time Stegosystem and Applications to Efficient Covert Communication. 684 - Robert Granger, Thorsten Kleinjung, Jens Zumbrägel:

On the discrete logarithm problem in finite fields of fixed characteristic. 685 - Azeem Irshad, Muhammad Sher, Shahzad Ashraf, Ch. Muhammad Shahzad Faisal, Mahmood Ul Hassan:

Cryptanalysis for Secure and Efficient Smart-Card-Based Remote User Authentication Scheme for Multi-server Environment. 686 - Sean Hallgren, Adam D. Smith, Fang Song:

Classical Cryptographic Protocols in a Quantum World. 687 - Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim:

Binary Field Multiplication on ARMv8. 688 - Daniel P. Martin, Jonathan F. O'Connell, Elisabeth Oswald, Martijn Stam:

How to Enumerate Your Keys Accurately and Efficiently After a Side Channel Attack. 689 - Gorka Irazoqui Apecechea, Thomas Eisenbarth, Berk Sunar:

Systematic Reverse Engineering of Cache Slice Selection in Intel Processors. 690 - Cong Chen, Mehmet Sinan Inci, Mostafa Taha, Thomas Eisenbarth:

SpecTre: A Tiny Side-Channel Resistant Speck Core for FPGAs. 691 - Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang:

Fast and Secure Linear Regression and Biometric Authentication with Security Update. 692 - Jesper Buus Nielsen, Samuel Ranellucci:

Foundations of Reactive Garbling Schemes. 693 - Tore Kasper Frederiksen, Thomas P. Jakobsen, Jesper Buus Nielsen, Roberto Trifiletti:

On the Complexity of Additively Homomorphic UC Commitments. 694 - Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou:

Cliptography: Clipping the Power of Kleptographic Attacks. 695 - Miguel Morales-Sandoval, Arturo Diaz-Perez:

Novel algorithms and hardware architectures for Montgomery Multiplication over GF(p). 696 - Yandong Zheng, Hua Guo:

On the Security of a Self-healing Group Key Distribution Scheme. 697 - Subhamoy Maitra:

Chosen IV Cryptanalysis on Reduced Round ChaCha and Salsa. 698 - Ayantika Chatterjee, Indranil Sengupta:

FURISC: FHE Encrypted URISC Design. 699 - Jimmy Jose, Dipanwita Roy Chowdhury:

Four Neighbourhood Cellular Automata as Better Cryptographic Primitives. 700 - Sébastien Canard, Baptiste Olivier:

Differential Privacy in distribution and instance-based noise mechanisms. 701 - Loi Luu, Jason Teutsch, Raghav Kulkarni, Prateek Saxena:

Demystifying incentives in the consensus computer. 702 - Mihir Bellare, Igors Stepanovs:

Point-Function Obfuscation: A Framework and Generic Constructions. 703 - Nir Bitansky, Vinod Vaikuntanathan:

Indistinguishability Obfuscation: from Approximate to Exact. 704 - Ashish Choudhury, Emmanuela Orsini, Arpita Patra, Nigel P. Smart:

Linear Overhead Robust MPC with Honest Majority Using Preprocessing. 705 - Stefan Kölbl, Arnab Roy:

A Brief Comparison of Simon and Simeck. 706 - Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Nashad Ahmed Safa:

Reconciling User Privacy and Implicit Authentication for Mobile Devices. 707 - Jeffrey Hoffstein, Jill Pipher, John M. Schanck, Joseph H. Silverman, William Whyte, Zhenfei Zhang:

Choosing Parameters for NTRUEncrypt. 708 - Luka Malisa,



Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID