


default search action
IACR Cryptology ePrint Archive, Volume 2016
Volume 2016, 2016
- Yalin Chen, Jue-Sam Chou, Hung-Shen Wu:

Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. 1 - Ali Can Atici, Cemal Yilmaz, Erkay Savas:

Remote Cache-Timing Attack without Learning Phase. 2 - Nicolas T. Courtois:

On Splitting a Point with Summation Polynomials in Binary Elliptic Curves. 3 - Arnold Neumaier:

Bounding basis reduction properties. 4 - John Jones:

A Columnar Transposition cipher in a contemporary setting. 5 - Huijia Lin, Rafael Pass, Karn Seth, Sidharth Telang:

Indistinguishability Obfuscation with Non-trivial Efficiency. 6 - Fabrice Benhamouda, Céline Chevalier, Adrian Thillard, Damien Vergnaud:

Easing Coppersmith Methods using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness. 7 - David Chaum, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter, Alan T. Sherman:

cMix: Anonymization byHigh-Performance Scalable Mixing. 8 - Mahshid Delavar, Sattar Mirzakuchaki, Mohammad Hassan Ameri, Javad Mohajeri:

Puf-Based Solutions For Secure Communications In Advanced Metering Infrastructure (AMI). 9 - Albrecht Petzoldt, Jintai Ding, Lih-Chung Wang:

Eliminating Decryption Failures from the Simple Matrix Encryption Scheme. 10 - Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval:

Better Security for Functional Encryption for Inner Product Evaluations. 11 - Ariel Hamlin, Nabil Schear, Emily Shen, Mayank Varia, Sophia Yakoubov, Arkady Yerukhimovich:

Cryptography for Big Data Security. 12 - Rosario Gennaro, Steven Goldfeder, Arvind Narayanan:

Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security. 13 - Manuel Barbosa, Bernardo Portela, Guillaume Scerri, Bogdan Warinschi:

Foundations of Hardware-Based Attested Computation and Application to SGX. 14 - Ehsan Ebrahimi Targhi, Gelo Noel Tabia, Dominique Unruh:

Quantum Collision-Resistance of Non-Uniformly Distributed Functions. 15 - Alexander Schaub, Rémi Bazin, Omar Hasan, Lionel Brunie:

A trustless privacy-preserving reputation system. 16 - Helger Lipmaa, Payman Mohassel, Seyed Saeed Sadeghian:

Valiant's Universal Circuit: Improvements, Implementation, and Applications. 17 - Afonso Arriaga, Manuel Barbosa, Pooya Farshim:

Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation. 18 - Hyung Tae Lee, San Ling, Huaxiong Wang:

Analysis of Gong et al.'s CCA2-Secure Homomorphic Encryption. 19 - Yonglin Hao, Willi Meier:

Truncated Differential Based Known-Key Attacks on Round-Reduced Simon. 20 - Eli Ben-Sasson, Alessandro Chiesa, Ariel Gabizon, Madars Virza:

Quasi-Linear Size Zero Knowledge from Linear-Algebraic PCPs. 21 - Enes Pasalic, Amela Muratovic-Ribic, Samir Hodzic, Sugata Gangopadhyay:

On derivatives of polynomials over finite fields through integration. 22 - Yalin Chen, Jue-Sam Chou, I-Ching Liao:

Improved on an improved remote user authentication scheme with key agreement. 23 - Patrick McCorry, Siamak Fayyaz Shahandashti, Feng Hao:

Refund attacks on Bitcoin's Payment Protocol. 24 - Khoongming Khoo, Eugene Lee, Thomas Peyrin, Siang Meng Sim:

Human-readable Proof of the Related-Key Security of AES-128. 25 - Abhishek Chakraborty, Debdeep Mukhopadhyay:

A Practical Template Attack on MICKEY-128 2.0 Using PSO Generated IVs and LS-SVM. 26 - Henry Corrigan-Gibbs, Dan Boneh, Stuart E. Schechter:

Balloon Hashing: Provably Space-Hard Hash Functions with Data-Independent Access Patterns. 27 - Jos Wetzels, Wouter Bokslag:

Sponges and Engines: An introduction to Keccak and Keyak. 28 - Jos Wetzels, Wouter Bokslag:

Simple SIMON: FPGA implementations of the SIMON 64/128 Block Cipher. 29 - Sedat Akleylek, Nina Bindel, Johannes Buchmann, Juliane Krämer, Giorgia Azzurra Marson:

An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation. 30 - Antonio de la Piedra:

Beyond the selective disclosure of ABCs on RAM-constrained devices. 31 - Janaka Alawatugoda:

On the Leakage-Resilient Key Exchange. 32 - Frederik Armknecht, Daisuke Moriyama, Ahmad-Reza Sadeghi, Moti Yung:

Towards a Unified Security Model for Physically Unclonable Functions. 33 - Jan Camenisch, Robert R. Enderlein, Stephan Krenn, Ralf Küsters, Daniel Rausch:

Universal Composition with Responsive Environments. 34 - Tal Moran, Ilan Orlov:

Proofs of Space-Time and Rational Proofs of Storage. 35 - Wentan Yi, Shaozhen Chen:

Characterizations of the Degraded Boolean Function and Cryptanalysis of the SAFER Family. 36 - Thomas P. Jakobsen, Jesper Buus Nielsen, Claudio Orlandi:

A Framework for Outsourcing of Secure Computation. 37 - Iraklis Symeonidis, Bart Preneel:

Collateral Damage in Online Social Networks: computing the significance of information collection. 38 - Muhammad Nadeem:

Standard quantum bit commitment - an indefinite commitment time. 39 - (Withdrawn) Packet Header Anomaly Detection Using Bayesian Topic Models. 40

- Preeti Kulshrestha, Arun Kumar:

A NEW UNLINKABLE SECRET HANDSHAKES SCHEME BASED ON ZSS. 41 - Khushboo Bussi, Dhananjoy Dey, Manoj Kumar Biswas, Bal Kishan Dass:

Neeva: A Lightweight Hash Function. 42 - Amir S. Mortazavi, Mahmoud Salmasizadeh, Amir Daneshgar:

Strong Continuous Non-malleable Encoding Schemes with Tamper-Detection. 43 - Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E. Gunnells:

Defeating the Ben-Zvi, Blackburn, and Tsaban Attack on the Algebraic Eraser. 44 - Xi Jun Lin, Lin Sun, Haipeng Qu, Xiaoshuai Zhang:

New Approaches for Secure Outsourcing Algorithm for Modular Exponentiations. 45 - Yehuda Lindell:

How To Simulate It - A Tutorial on the Simulation Proof Technique. 46 - Andrey Bogdanov, Martin M. Lauridsen, Elmar Tischhauser:

Comb to Pipeline: Fast Software Encryption Revisited. 47 - Carsten Baum, Ivan Damgård, Tomas Toft, Rasmus Winther Zakarias:

Better Preprocessing for Secure Multiparty Computation. 48 - Christoph M. Mayer:

Implementing a Toolkit for Ring-LWE Based Cryptography in Arbitrary Cyclotomic Number Fields. 49 - Masahiro Yagisawa:

Improved Fully Homomorphic Encryption with Composite Number Modulus. 50 - Jialin Huang, Serge Vaudenay, Xuejia Lai, Kaisa Nyberg:

Capacity and Data Complexity in Multidimensional Linear Attack. 51 - Gunnar Hartung, Björn Kaidel, Alexander Koch, Jessica Koch, Andy Rupp

:
Fault-Tolerant Aggregate Signatures. 52 - Khalid Javeed, Xiaojun Wang:

Speed and Area Optimized Parallel Higher-Radix Modular Multipliers. 53 - Masahiro Yagisawa:

Fully Homomorphic Public-key Encryption Based on Discrete Logarithm Problem. 54 - Aanchal Malhotra, Sharon Goldberg:

Attacking NTP's Authenticated Broadcast Mode. 55 - Ethan Heilman, Foteini Baldimtsi, Sharon Goldberg:

Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions. 56 - Durga Prasad Sahoo, Phuong Ha Nguyen, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:

Architectural Bias: a Novel Statistical Metric to Evaluate Arbiter PUF Variants. 57 - Dimitrios Poulakis:

New Lattice Attacks on DSA Schemes. 58 - Muhammad Nadeem:

Secure positioning and quantum non-local correlations. 59 - Amir Herzberg, Yehonatan Kfir:

Topology-based Plug-and-Play Key-Setup. 60 - Christina Garman, Matthew Green, Ian Miers:

Accountable Privacy for Decentralized Anonymous Payments. 61 - Raphael Bost, Pierre-Alain Fouque, David Pointcheval:

Verifiable Dynamic Symmetric Searchable Encryption: Optimality and Forward Security. 62 - Rémi Bricout, Sean Murphy, Kenneth G. Paterson, Thyla van der Merwe:

Analysing and Exploiting the Mantin Biases in RC4. 63 - Yohei Watanabe, Goichiro Hanaoka, Junji Shikata:

Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness. 64 - Yasufumi Hashimoto:

A note on Tensor Simple Matrix Encryption Scheme. 65 - Lingyue Qin, Huaifeng Chen:

Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-guessing Techniques. 66 - Henry Carter, Patrick Traynor:

OPFE: Outsourcing Computation for Private Function Evaluation. 67 - (Withdrawn) Octonion Algebra and Noise-Free Fully Homomorphic Encryption (FHE) Schemes. 68

- Gergei Bana, Rohit Chadha:

Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability. 69 - Kamil Kluczniak:

Domain-Specific Pseudonymous Signatures Revisited. 70 - Alex Biryukov, Léo Perrin, Aleksei Udovenko:

Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1. 71 - Karthikeyan Bhargavan, Christina Brzuska, Cédric Fournet, Matthew Green, Markulf Kohlweiss, Santiago Zanella-Béguelin:

Downgrade Resilience in Key-Exchange Protocols. 72 - Jinsheng Zhang, Wensheng Zhang, Daji Qiao:

MU-ORAM: Dealing with Stealthy Privacy Attacks in Multi-User Data Outsourcing Services. 73 - Carmit Hazay, Muthuramakrishnan Venkitasubramaniam:

On the Power of Secure Two-Party Computation. 74 - Gajraj Kuldeep, Devendra Kumar Yadav, A. K. Sharma:

Weaknesses in Hadamard Based Symmetric Key Encryption Schemes. 75 - Xi Jun Lin, Haipeng Qu, Xiaoshuai Zhang:

New Efficient and Flexible Algorithms for Secure Outsourcing of Bilinear Pairings. 76 - Shahram Rasoolzadeh, Håvard Raddum:

Multidimensional Meet in the Middle Cryptanalysis of KATAN. 77 - Ge Bai, Ivan Damgård, Claudio Orlandi, Yu Xia:

Non-Interactive Verifiable Secret Sharing For Monotone Circuits. 78 - Qiang Tang

, Balazs Pejo, Husen Wang:
Protect both Integrity and Confidentiality in Outsourcing Collaborative Filtering Computations. 79 - Shahram Rasoolzadeh, Håvard Raddum:

Cryptanalysis of PRINCE with Minimal Data. 80 - Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:

A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol. 81 - Olivier Blazy, David Derler, Daniel Slamanig, Raphael Spreitzer:

Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability. 82 - Sharon Goldberg, Moni Naor, Dimitrios Papadopoulos, Leonid Reyzin:

NSEC5 from Elliptic Curves: Provably Preventing DNSSEC Zone Enumeration with Shorter Responses. 83 - Qianqian Yang, Lei Hu, Siwei Sun, Ling Song:

Truncated Differential Analysis of Round-Reduced RoadRunneR Block Cipher. 84 - Scott R. Fluhrer:

Cryptanalysis of ring-LWE based key exchange with key share reuse. 85 - Victor Costan, Srinivas Devadas:

Intel SGX Explained. 86 - Christina Brzuska, Håkon Jacobsen, Douglas Stebila:

Safely Exporting Keys from Secure Channels: On the security of EAP-TLS and TLS Key Exporters. 87 - Tomer Ashur, Vincent Rijmen:

On Linear Hulls and Trails in Simon. 88 - Johannes Buchmann, Florian Göpfert, Rachel Player, Thomas Wunderer:

On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack. 89 - Joan Daemen:

Spectral characterization of iterating lossy mappings. 90 - Simon R. Blackburn, Matthew J. B. Robshaw:

On the Security of the Algebraic Eraser Tag Authentication Protocol. 91 - Subhadeep Banik, Takanori Isobe:

Cryptanalysis of the Full Spritz Stream Cipher. 92 - Ágnes Kiss, Thomas Schneider:

Valiant's Universal Circuit is Practical. 93 - Romain Gay, Dennis Hofheinz, Eike Kiltz, Hoeteck Wee:

Tightly Secure CCA-Secure Encryption without Pairings. 94 - Dingfeng Ye, Peng Liu:

Obfuscation without Multilinear Maps. 95 - Bing Sun, Meicheng Liu, Jian Guo, Vincent Rijmen, Ruilin Li:

Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis. 96 - Shashi Kant Pandey, Prasanna Raghaw Mishra, Bal Kishan Dass:

A Maiorana-McFarland Construction of a GBF on Galois ring. 97 - Stefan Kölbl, Martin M. Lauridsen, Florian Mendel, Christian Rechberger:

Haraka - Efficient Short-Input Hashing for Post-Quantum Applications. 98 - Michael Clear, Ciaran McGoldrick:

Attribute-Based Fully Homomorphic Encryption with a Bounded Number of Inputs. 99 - Joël Alwen, Binyi Chen, Chethan Kamath, Vladimir Kolmogorov, Krzysztof Pietrzak, Stefano Tessaro:

On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model. 100 - Benoît Libert, San Ling, Fabrice Mouhartem, Khoa Nguyen, Huaxiong Wang:

Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions. 101 - Sanjam Garg

, Omkant Pandey, Akshayaram Srinivasan, Mark Zhandry:
Breaking the Sub-Exponential Barrier in Obfustopia. 102 - Nicolas T. Courtois, Guangyan Song, Ryan Castellucci:

Speed Optimizations in Bitcoin Key Recovery Attacks. 103 - Jos Wetzels:

Open Sesame: The Password Hashing Competition and Argon2. 104 - Kristian Gjøsteen, Martin Strand:

Fully homomorphic encryption must be fat or ugly? 105 - Ivan Damgård, Helene Haagh, Claudio Orlandi:

Access Control Encryption: Enforcing Information Flow with Cryptography. 106 - Hitesh Tewari, Arthur Hughes:

Fully Anonymous Transferable Ecash. 107 - Alex Davidson, Carlos Cid:

Computing Private Set Operations with Linear Complexities. 108 - Ivan Damgård, Tomas Toft, Rasmus Winther Zakarias:

Fast Multiparty Multiplications from shared bits. 109 - Navid Alamati, Chris Peikert:

Three's Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE. 110 - Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang:

Scalable and Secure Logistic Regression via Homomorphic Encryption. 111 - Dario Fiore, Anca Nitulescu:

On the (In)security of SNARKs in the Presence of Oracles. 112 - Serge Fehr, Max Fillinger:

On the Composition of Two-Prover Commitments, and Applications to Multi-Round Relativistic Commitments. 113 - Mark Zhandry:

The Magic of ELFs. 114 - Joël Alwen, Jeremiah Blocki:

Efficiently Computing Data-Independent Memory-Hard Functions. 115 - Eli Ben-Sasson, Alessandro Chiesa, Nicholas Spooner:

Interactive Oracle Proofs. 116 - Venkata Koppula, Brent Waters:

Circular Security Counterexamples for Arbitrary Length Cycles from LWE. 117 - Zvika Brakerski, Vinod Vaikuntanathan:

Circuit-ABE from LWE: Unbounded Attributes and Semi-Adaptive Security. 118 - Christof Beierle, Thorsten Kranz, Gregor Leander:

Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices. 119 - Ignacio Cascudo, Ivan Damgård, Felipe Lacerda, Samuel Ranellucci:

Oblivious Transfer from Any Non-Trivial Elastic Noisy Channels via Secret Key Agreement. 120 - (Withdrawn) Tightly-Secure Pseudorandom Functions via Work Factor Partitioning. 121

- Shay Gueron, Nicky Mouha:

Simpira v2: A Family of Efficient Permutations Using the AES Round Function. 122 - Michel Abdalla, Mario Cornejo, Anca Nitulescu, David Pointcheval:

Robust Password-Protected Secret Sharing. 123 - Pierrick Gaudry, Laurent Grémy, Marion Videau:

Collecting relations for the Number Field Sieve in GF(p6). 124 - Daniel Apon, Xiong Fan, Feng-Hao Liu:

Fully-Secure Lattice-Based IBE as Compact as PKE. 125 - Emre Yüce, Ali Aydin Selçuk:

Server Notaries: A Complementary Approach to the Web PKI Trust Model. 126 - Martin R. Albrecht, Shi Bai, Léo Ducas:

A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and Graded Encoding Schemes. 127 - Geoffroy Couteau, Thomas Peters, David Pointcheval:

Removing the Strong RSA Assumption from Arguments over the Integers. 128 - Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer:

ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs. 129 - Loubna Ghammam, Emmanuel Fouotsa:

On the Computation of the Optimal Ate Pairing at the 192-bit Security Level. 130 - Itai Dinur:

New Attacks on the Concatenation and XOR Hash Combiners. 131 - Shahram Rasoolzadeh, Håvard Raddum:

Cryptanalysis of 6-round PRINCE using 2 Known Plaintexts. 132 - Claude Carlet:

On the nonlinearity of monotone Boolean functions. 133 - Michael T. Goodrich, Evgenios M. Kornaropoulos, Michael Mitzenmacher, Roberto Tamassia:

More Practical and Secure History-Independent Hash Tables. 134 - Jung Hee Cheon, Pierre-Alain Fouque, Changmin Lee, Brice Minaud, Hansol Ryu:

Cryptanalysis of the New CLT Multilinear Map over the Integers. 135 - Emmanuel Volte, Valérie Nachef, Nicolas Marrière:

Automatic Expectation and Variance Computing for Attacks on Feistel Schemes. 136 - Ignacio Cascudo, Ivan Damgård, Bernardo David, Nico Döttling, Jesper Buus Nielsen:

Rate-1, Linear Time and Additively Homomorphic UC Commitments. 137 - Shoukat Ali, Murat Cenk:

A new algorithm for residue multiplication modulo 2521-1. 138 - Jung Hee Cheon, Jinhyuck Jeong, Changmin Lee:

An Algorithm for NTRU Problems and Cryptanalysis of the GGH Multilinear Map without an encoding of zero. 139 - Shota Yamada:

Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters. 140 - Igor A. Semaev:

On low degree polynomials in 2-round AES. 141 - Mihir Bellare, Daniel J. Bernstein, Stefano Tessaro:

Hash-Function based PRFs: AMAC and its Multi-User Security. 142 - Lilya Budaghyan, Claude Carlet, Tor Helleseth, Nian Li:

On the (non-)existence of APN (n, n)-functions of algebraic degree n. 143 - Stanislaw Jarecki, Aggelos Kiayias, Hugo Krawczyk, Jiayu Xu:

Highly-Efficient and Composable Password-Protected Secret Sharing (Or: How to Protect Your Bitcoin Wallet Online). 144 - Jeremiah Blocki, Hong-Sheng Zhou:

Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond. 145 - Yoshinori Aono, Yuntao Wang, Takuya Hayashi, Tsuyoshi Takagi:

Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator. 146 - Eric Miles, Amit Sahai, Mark Zhandry:

Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13. 147 - M. Seshadri Srinath, Venkatachalam Chandrasekaran:

Isogeny-based Quantum-resistant Undeniable Blind Signature Scheme. 148 - Wentan Yi, Shaozhen Chen:

Improved Integral and Zero-correlation Linear Cryptanalysis of Reduced-round CLEFIA Block Cipher. 149 - Carsten Baum:

On Garbling Schemes With And Without Privacy. 150 - Yu Yu, John P. Steinberger:

Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN. 151 - Oscar García Morchon, Ronald Rietman, Ludo Tolhuizen, Jose Luis Torre-Arce, Moon Sung Lee, Domingo Gómez-Pérez, Jaime Gutierrez, Berry Schoenmakers:

Attacks and parameter choices in HIMMO. 152 - Jeremiah Blocki, Anupam Datta, Joseph Bonneau:

Differentially Private Password Frequency Lists. 153 - David Derler, Daniel Slamanig:

Fully-Anonymous Short Dynamic Group Signatures Without Encryption. 154 - Jun Xu, Lei Hu, Santanu Sarkar, Xiaona Zhang, Zhangjie Huang, Liqiang Peng:

Cryptanalysis of Multi-Prime Φ-Hiding Assumption. 155 - Yehuda Lindell, Nigel P. Smart, Eduardo Soria-Vazquez:

More Efficient Constant-Round Multi-Party Computation from BMR and SHE. 156 - Maciej Skorski

:
Key Derivation for Squared-Friendly Applications: Lower Bounds. 157 - Maciej Skórski

:
A Subgradient Algorithm For Computational Distances and Applications to Cryptography. 158 - Krzysztof Pietrzak, Maciej Skorski

:
Pseudoentropy: Lower-bounds for Chain rules and Transformations. 159 - Tyge Tiessen:

Polytopic Cryptanalysis. 160 - Ashwin Jha, Mridul Nandi:

Revisiting Structure Graph and Its Applications to CBC-MAC and EMAC. 161 - Mihir Bellare, Igors Stepanovs, Brent Waters:

New Negative Results on Differing-Inputs Obfuscation. 162 - Irene Giacomelli, Jesper Madsen, Claudio Orlandi:

ZKBoo: Faster Zero-Knowledge for Boolean Circuits. 163 - Léo Ducas, Damien Stehlé:

Sanitization of FHE Ciphertexts. 164 - (Withdrawn) PrAd: Enabling Privacy-Aware Location based Advertising. 165

- Grégory Demay, Peter Gazi, Ueli Maurer, Björn Tackmann:

Per-Session Security: Password-Based Cryptography Revisited. 166 - Ilias Giechaskiel, Cas Cremers, Kasper Bonne Rasmussen:

On Bitcoin Security in the Presence of Broken Crypto Primitives. 167 - Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, Elaine Shi:

Town Crier: An Authenticated Data Feed for Smart Contracts. 168 - Peter Gazi, Stefano Tessaro:

Provably Robust Sponge-Based PRNGs and KDFs. 169 - Ran Raz:

Fast Learning Requires Good Memory: A Time-Space Lower Bound for Parity Learning. 170 - Jacques Patarin, Valérie Nachef:

Commutativity, Associativity, and Public Key Cryptography. 171 - Yupeng Zhang, Jonathan Katz, Charalampos Papamanthou:

All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption. 172 - Marcin Andrychowicz, Stefan Dziembowski, Sebastian Faust:

Circuit Compilers with O(1/ log(n)) Leakage Rate. 173 - Joseph Jaeger, Thomas Ristenpart, Qiang Tang:

Honey Encryption Beyond Message Recovery Security. 174 - Michele Ciampi, Giuseppe Persiano, Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti:

Online/Offline OR Composition of Sigma Protocols. 175 - (Withdrawn) Anonymous Role-Based Access Control on E-Health Records. 176

- Christine van Vredendaal:

Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key. 177 - Meiqin Wang, Tingting Cui, Huaifeng Chen, Ling Sun, Long Wen, Andrey Bogdanov:

Integrals go Statistical: Cryptanalysis of Full Skipjack Variants. 178 - Hugo Labrande, Emmanuel Thomé:

Computing theta functions in quasi-linear time in genus 2 and above. 179 - Dennis Hofheinz, Tibor Jager, Andy Rupp

:
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts. 180 - Souvik Sonar, Debapriya Basu Roy, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:

Side-Channel Watchdog: Run-Time Evaluation of Side-Channel Vulnerability in FPGA-Based Crypto-systems. 182 - Houssem Maghrebi, Victor Servant, Julien Bringer:

There is Wisdom in Harnessing the Strengths of your Enemy: Customized Encoding to Thwart Side-Channel Attacks - Extended Version -. 183 - Jonathan Katz, Alex J. Malozemoff, Xiao Wang:

Efficiently Enforcing Input Validity in Secure Two-party Computation. 184 - Atul Luykx, Bart Preneel, Alan Szepieniec, Kan Yasuda:

On the Influence of Message Length in PMAC's Security Bounds. 185 - Meicheng Liu, Siang Meng Sim:

Lightweight MDS Generalized Circulant Matrices. 186 - Carsten Baum, Emmanuela Orsini, Peter Scholl:

Efficient Secure Multiparty Computation with Identifiable Abort. 187 - Faruk Göloglu, Vincent Rijmen, Qingju Wang:

On the division property of S-boxes. 188 - Vladimir Shpilrain, Bianca Sosnovski:

Compositions of linear functions and applications to hashing. 189 - Atul Luykx, Bart Preneel, Elmar Tischhauser, Kan Yasuda:

A MAC Mode for Lightweight Block Ciphers. 190 - Eike Kiltz, Daniel Masny, Jiaxin Pan:

Optimal Security Proofs for Signatures from Identification Schemes. 191 - Douglas Miller, Adam Scrivener, Jesse Stern, Muthuramakrishnan Venkitasubramaniam:

On Negation Complexity of Injections, Surjections and Collision-Resistance in Cryptography. 192 - Hao Chen, Kristin E. Lauter, Katherine E. Stange:

Vulnerable Galois RLWE Families and Improved Attacks. 193 - Ilan Komargodski, Moni Naor, Eylon Yogev:

How to Share a Secret, Infinitely. 194 - Atsushi Takayasu, Noboru Kunihiro:

How to Generalize RSA Cryptanalyses. 195 - Chris Peikert, Sina Shiehian:

Multi-Key FHE from LWE, Revisited. 196 - Mayuresh Vivekanand Anand, Ehsan Ebrahimi Targhi, Gelo Noel Tabia, Dominique Unruh:

Post-quantum Security of the CBC, CFB, OFB, CTR, and XTS Modes of Operation. 197 - Ko Stoffelen:

Optimizing S-box Implementations for Several Criteria using SAT Solvers. 198 - Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, Dawn Song:

The Honey Badger of BFT Protocols. 199 - Yilei Chen:

An Alternative View of the Graph-Induced Multilinear Maps. 200 - Nico Döttling, Daniel Kraschewski, Jörn Müller-Quade, Tobias Nilges:

From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions. 201 - Simona Samardjiska, Danilo Gligoroski:

An Encryption Scheme based on Random Split of St-Gen Codes. 202 - Pascal Sasdrich, Amir Moradi, Tim Güneysu:

White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels. 203 - Shay Gueron:

A Memory Encryption Engine Suitable for General Purpose Processors. 204 - Derek Atkins, Dorian Goldfeld:

Addressing the Algebraic Eraser Diffie-Hellman Over-the-Air Protocol. 205 - Johannes Blömer, Gennadij Liske:

Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes. 206 - Dibyendu Roy, Sourav Mukhopadhyay:

Fault analysis and weak key-IV attack on Sprout. 207 - Sandro Coretti, Juan A. Garay, Martin Hirt, Vassilis Zikas:

Constant-Round Asynchronous Multi-Party Computation. 208 - Ling Song, Zhangjie Huang, Qianqian Yang:

Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA. 209 - Boaz Barak:

Hopes, Fears and Software Obfuscation: A Survey. 210 - Sonia Belaïd, Fabrice Benhamouda, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, Damien Vergnaud:

Randomness Complexity of Private Circuits for Multiplication. 211 - Vadim N. Tsypyschev:

Low Linear Complexity Estimates for Coordinate Sequences of Linear Recurrences of Maximal Period over Galois Ring. 212 - Nir Bitansky, Zvika Brakerski, Yael Tauman Kalai, Omer Paneth, Vinod Vaikuntanathan:

3-Message Zero Knowledge Against Human Ignorance. 213 - Pei Luo, Liwei Zhang, Yunsi Fei, A. Adam Ding:

An Improvement of Both Security and Reliability for Keccak Implementations on Smart Card. 214 - Steven D. Galbraith, Shishay W. Gebregiyorgis, Sean Murphy:

Algorithms for the Approximate Common Divisor Problem. 215 - Sumit Kumar Debnath, Ratna Dutta:

Fair mPSI and mPSI-CA: Efficient Constructions in Prime Order Groups with Security in the Standard Model against Malicious Adversary. 216 - Eric R. Verheul:

Practical backward unlinkable revocation in FIDO, German e-ID, Idemix and U-Prove. 217 - Danilo Gligoroski, Simona Samardjiska:

Semantic Security and Key-Privacy With Random Split of St-Gen Codes. 218 - Jörg Schwenk:

Nonce-based Kerberos is a Secure Delegated AKE Protocol. 219 - Paul Kirchner:

Algorithms on Ideal over Complex Multiplication order. 220 - Katriel Cohn-Gordon, Cas Cremers, Luke Garratt:

On Post-Compromise Security. 221 - Paul Kirchner, Pierre-Alain Fouque:

Time-Memory Trade-Off for Lattice Enumeration in a Ball. 222 - Mehmet Sabir Kiraz, Osmanbey Uzunkol:

Still Wrong Use of Pairings in Cryptography. 223 - Yuval Yarom, Daniel Genkin, Nadia Heninger:

CacheBleed: A Timing Attack on OpenSSL Constant Time RSA. 224 - Qian Guo, Thomas Johansson:

A New Birthday-Type Algorithm for Attacking the Fresh Re-Keying Countermeasure. 225 - Zvika Brakerski, Christina Brzuska, Nils Fleischhacker:

On Statistically Secure Obfuscation with Approximate Correctness. 226 - Jean-Michel Cioranesco, Houda Ferradi, Rémi Géraud, David Naccache:

Process Table Covert Channels: Exploitation and Countermeasures. 227 - Serguei Popov:

On a decentralized trustless pseudo-random number generation algorithm. 228 - Reza Azarderakhsh, David Jao, Kassem Kalach, Brian Koziel, Christopher Leonardi:

Key Compression for Isogeny-Based Cryptosystems. 229 - Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, Yuval Yarom:

ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels. 230 - Pierre Belgarric, Pierre-Alain Fouque, Gilles Macario-Rat, Mehdi Tibouchi:

Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones. 231 - Sungwook Kim, Jinsu Kim, Dongyoung Koo, Yuna Kim, Hyunsoo Yoon, Jun-Bum Shin:

Efficient Privacy-Preserving Matrix Factorization via Fully Homomorphic Encryption. 232 - Charanjit S. Jutla, Arnab Roy:

Smooth NIZK Arguments with Applications to Asymmetric UC-PAKE. 233 - Raphael Bost, Olivier Sanders:

Trick or Tweak: On the (In)security of OTR's Tweaks. 234 - Takahiro Matsuda, Goichiro Hanaoka:

Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security. 235 - Guoyan Zhang, Meicheng Liu:

A Distinguisher on PRESENT-Like Permutations with Application to SPONGENT. 236 - Shoichi Hirose:

May-Ozerov Algorithm for Nearest-Neighbor Problem over 𝔽q and Its Application to Information Set Decoding. 237 - Ágnes Kiss, Juliane Krämer, Pablo Rauzy, Jean-Pierre Seifert:

Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT. 238 - Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren:

Provably Weak Instances of Ring-LWE Revisited. 239 - Wouter Castryck, Ilia Iliashenko, Frederik Vercauteren:

On the tightness of the error bound in Ring-LWE. 240 - Boris Skoric:

A trivial debiasing scheme for Helper Data Systems. 241 - Yusuke Sakai, Nuttapong Attrapadung, Goichiro Hanaoka:

Attribute-Based Signatures for Circuits from Bilinear Map. 242 - Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:

On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions. 243 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel:

Cryptanalysis of Simpira. 244 - Peter Linder:

DEcryption Contract ENforcement Tool (DECENT): A Practical Alternative to Government Decryption Backdoors. 245 - Peder Sparell, Mikael Simovits:

Linguistic Cracking of Passphrases Using Markov Chains. 246 - (Withdrawn) Public Veri able Function Secret Sharing. 247

- Sondre Rønjom:

Invariant subspaces in Simpira. 248 - Amir Moradi, Tobias Schneider:

Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series. 249 - Anamaria Costache, Nigel P. Smart, Srinivas Vivek, Adrian Waller:

Fixed Point Arithmetic in SHE Scheme. 250 - Gilad Asharov, Moni Naor, Gil Segev, Ido Shahaf:

Searchable Symmetric Encryption: Optimal Locality in Linear Space via Two-Dimensional Balanced Allocations. 251 - Sanjam Garg

, Pratyay Mukherjee, Omkant Pandey, Antigoni Polychroniadou:
The Exact Round Complexity of Secure Computation. 252 - Wenjie Xiong, André Schaller, Nikolaos A. Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer:

Practical DRAM PUFs in Commodity Devices. 253 - Pierrick Méaux, Anthony Journault, François-Xavier Standaert, Claude Carlet:

Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts. 254 - Essam Ghadafi:

More Efficient Structure-Preserving Signatures - Or: Bypassing the Type-III Lower Bounds. 255 - Qiumao Ma, Jinsheng Zhang, Wensheng Zhang, Daji Qiao:

SE-ORAM: A Storage-Efficient Oblivious RAM for Privacy-Preserving Access to Cloud Storage. 256 - Huijia Lin:

Indistinguishability Obfuscation from Constant-Degree Graded Encoding Schemes. 257 - Olivier Blazy, Céline Chevalier:

Structure-Preserving Smooth Projective Hashing. 258 - Olivier Blazy, Céline Chevalier, Paul Germouty:

Adaptive Oblivious Transfer and Generalizations. 259 - Jens Groth:

On the Size of Pairing-based Non-interactive Arguments. 260 - Oliver Willers, Christopher Huth, Jorge Guajardo, Helmut Seidel:

MEMS-based Gyroscopes as Physical Unclonable Functions. 261 - Riccardo Longo, Chiara Marcolla, Massimiliano Sala:

Collaborative Multi-Authority KP-ABE for Shorter Keys and Parameters. 262 - Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Jens Groth, Christophe Petit:

Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting. 263 - Dahmun Goudarzi, Matthieu Rivain:

How Fast Can Higher-Order Masking Be in Software? 264 - Maura B. Paterson, Douglas R. Stinson, Jalaj Upadhyay:

Multi-prover Proof-of-Retrievability. 265 - Shin-ichi Kawamura, Tomoko Yonemura, Yuichi Komano, Hideo Shimizu:

Exact Error Bound of Cox-Rower Architecture for RNS Arithmetic. 266 - Yonglin Hao:

Improved Meet-in-the-Middle Attacks on Round-Reduced Crypton-256. 267 - Ahmad Boorghany, Siavash Bayat Sarmadi, Rasool Jalili:

Efficient Lattice-based Authenticated Encryption: A Practice-Oriented Provable Security Approach. 268 - Ming Li, Dongdai Lin:

The Adjacency Graphs of Linear Feedback Shift Registers with Primitive-like Characteristic Polynomials. 269 - Miguel Ambrona, Gilles Barthe, Benedikt Schmidt:

Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model. 270 - Sébastien Duval, Virginie Lallemand, Yann Rotella:

Cryptanalysis of the FLIP Family of Stream Ciphers. 271 - Yevgeniy Dodis, Shai Halevi, Ron D. Rothblum, Daniel Wichs:

Spooky Encryption and its Applications. 272 - Andrea Visconti, Simone Bossi, Hany Ragab, Alexandro Calò:

On the weaknesses of PBKDF2. 273 - Simone Bossi, Andrea Visconti:

What users should know about Full Disk Encryption based on LUKS. 274 - Bin Zhang, Lin Jiao, Mingsheng Wang:

Faster Algorithms for Solving LPN. 275 - Markku-Juhani O. Saarinen:

Arithmetic Coding and Blinding Countermeasures for Ring-LWE. 276 - Xi Jun Lin, Haipeng Qu, Xiaoshuai Zhang:

Public Key Encryption Supporting Equality Test and Flexible Authorization without Bilinear Pairings. 277 - Xiong Fan, Feng-Hao Liu:

Various Proxy Re-Encryption Schemes from Lattices. 278 - Hamza Abusalah, Georg Fuchsbauer:

Constrained PRFs for Unbounded Inputs with Short Keys. 279 - Pedro Maat C. Massolino, Lejla Batina, Ricardo Chaves, Nele Mentens:

Low Power Montgomery Modular Multiplication on Reconfigurable Systems. 280 - Prabhanjan Ananth, Aayush Jain, Moni Naor, Amit Sahai, Eylon Yogev:

Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security. 281 - Oscar Reparaz:

Detecting flawed masking schemes with leakage detection tests. 282 - Gunnar Hartung:

Secure Audit Logs with Verifiable Excerpts. 283 - Mehmet Sinan Inci, Berk Gülmezoglu, Thomas Eisenbarth, Berk Sunar:

Co-location detection on the Cloud. 284 - Yosuke Todo, Masakatu Morii:

Bit-Based Division Property and Application to Simon Family. 285 - Anastasiya Gorodilova:

On a remarkable property of APN Gold functions. 286 - Véronique Cortier, David Galindo, Ralf Küsters, Johannes Müller

, Tomasz Truderung:
Verifiability Notions for E-Voting Protocols. 287 - Sonia Bogos, Serge Vaudenay:

Optimization of LPN Solving Algorithms. 288 - Marc Fischlin, Amir Herzberg, Hod Bin Noon, Haya Schulmann:

Obfuscation Combiners. 289 - Mihir Bellare, Björn Tackmann:

Nonce-Based Cryptography: Retaining Security when Randomness Fails. 290 - Cynthia Dwork, Moni Naor, Guy N. Rothblum:

Spooky Interaction and its Discontents: Compilers for Succinct Two-Message Argument Systems. 291 - Yusuke Naito, Kan Yasuda:

New Bounds for Keyed Sponges with Extendable Output: Independence between Capacity and Message Length. 292 - David Nuñez, Isaac Agudo, Javier López:

A Parametric Family of Attack Models for Proxy Re-Encryption. 293 - Weijia Wang, Yu Yu, Junrong Liu, Zheng Guo, François-Xavier Standaert, Dawu Gu, Sen Xu, Rong Fu:

Evaluation and Improvement of Generic-Emulating DPA Attacks. 294 - Thomas Peyrin:

Collision Attack on GRINDAHL. 295 - Sonia Bogos, Serge Vaudenay:

How to Sequentialize Independent Parallel Attacks? 296 - Liwei Zhang, A. Adam Ding, Yunsi Fei, Pei Luo:

A Unified Metric for Quantifying Information Leakage of Cryptographic Devices under Power Analysis Attacks. 297 - Max Fillinger, Marc Stevens:

Reverse-Engineering of the Cryptanalytic Attack Used in the Flame Super-Malware. 298 - Jérémy Jean, Ivica Nikolic:

Efficient Design Strategies Based on the AES Round Function. 299 - Leon Groot Bruinderink, Andreas Hülsing, Tanja Lange, Yuval Yarom:

Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme. 300 - Apoorvaa Deshpande, Venkata Koppula, Brent Waters:

Constrained Pseudorandom Functions for Unconstrained Inputs. 301 - Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich, Valérie Gauthier-Umaña:

A Polynomial-Time Attack on the BBCRS Scheme. 302 - Yael Tauman Kalai, Guy N. Rothblum, Ron D. Rothblum:

From Obfuscation to the Security of Fiat-Shamir for Proofs. 303 - Yacov Yacobi:

A Fast Attribute Based Encryption. 304 - Jayaprakash Kar:

Certi cateless Aggregate Short Signature Scheme. 305 - Yevgeniy Dodis, Chaya Ganesh, Alexander Golovnev, Ari Juels, Thomas Ristenpart:

A Formal Treatment of Backdoored Pseudorandom Generators. 306 - Marshall Ball

, Dana Dachman-Soled, Mukul Kulkarni, Tal Malkin:
Non-Malleable Codes for Bounded Depth, Bounded Fan-in Circuits. 307 - Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo:

Strongly Leakage-Resilient Authenticated Key Exchange. 308 - Céline Chevalier, Fabien Laguillaumie, Damien Vergnaud:

Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions. 309 - Qian Guo, Thomas Johansson, Paul Stankovski:

Coded-BKW: Solving LWE Using Lattice Codes. 310 - Bin Zhang, Chao Xu, Willi Meier:

Fast Correlation Attacks over Extension Fields, Large-unit Linear Approximation and Cryptanalysis of SNOW 2.0. 311 - Ivica Nikolic, Yu Sasaki:

Refinements of the k-tree Algorithm for the Generalized Birthday Problem. 312 - Arno Mittelbach, Daniele Venturi:

Fiat-Shamir for Highly Sound Protocols is Instantiable. 313 - Santos Merino Del Pozo, François-Xavier Standaert:

Blind Source Separation from Single Measurements using Singular Spectrum Analysis. 314 - Yarkin Doröz, Berk Sunar:

Flattening NTRU for Evaluation Key Free Homomorphic Encryption. 315 - Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji, Rafael Pass, Abhi Shelat:

A Note on Black-Box Complexity of Indistinguishability Obfuscation. 316 - Rishab Goyal, Venkata Koppula, Brent Waters:

Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy. 317 - Jayaprakash Kar, Sagar Naik:

Generic Construction of Certificateless Signcryption Scheme. 318 - Brett Hemenway, Steve Lu, Rafail Ostrovsky, William Welser IV:

High-precision Secure Computation of Satellite Collision Probabilities. 319 - Linus Feiten, Matthias Sauer, Bernd Becker:

On Metrics to Quantify the Inter-Device Uniqueness of PUFs. 320 - Claude Carlet, Emmanuel Prouff, Matthieu Rivain, Thomas Roche:

Algebraic Decomposition for Probing Security. 321 - Ulrich Rührmair:

On the Security of PUF Protocols under Bad PUFs and PUFs-inside-PUFs Attacks. 322 - Chaohui Du, Guoqiang Bai:

A Family of Scalable Polynomial Multiplier Architectures for Ring-LWE Based Cryptosystems. 323 - Eli Ben-Sasson, Alessandro Chiesa, Ariel Gabizon, Michael Riabzev, Nicholas Spooner:

Short Interactive Oracle Proofs with Constant Query Complexity, via Composition and Sumcheck. 324 - Taras Stanko, Fitria Nur Andini, Boris Skoric:

Optimized quantization in Zero Leakage Helper Data Systems. 325 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel:

Square Attack on 7-Round Kiasu-BC. 326 - Le Trieu Phong, Lihua Wang, Yoshinori Aono, Manh Ha Nguyen, Xavier Boyen:

Proxy Re-Encryption Schemes with Key Privacy from LWE. 327 - Jennifer S. Balakrishnan, Sorina Ionica, Kristin E. Lauter, Christelle Vincent:

Constructing genus 3 hyperelliptic Jacobians with CM. 328 - Emmanuel Thomé:

A modified block Lanczos algorithm with fewer vectors. 329 - Michael Hutter, Jürgen Schilling, Peter Schwabe, Wolfgang Wieser:

NaCl's Crypto_Box in Hardware. 330 - Fatih Tiryakioglu, Mehmet Sabir Kiraz, Fatih Birinci, Mehmet Karahan:

TRVote: A New, Trustworthy and Robust Electronic Voting System. 331 - Rafael Pass, Abhi Shelat:

Micropayments for Decentralized Currencies. 332 - Ling Ren, Srinivas Devadas:

Proof of Space from Stacked Bipartite Graphs. 333 - Jung Hee Cheon, Duhyeong Kim:

Probability that the k-gcd of products of positive integers is B-smooth. 334 - Chunming Tang, Can Xiang, Yanfeng Qi, Keqin Feng:

Complete characterization of generalized bent and 2^k-bent Boolean functions. 335 - Margarita Osadchy, Julio C. Hernandez-Castro, Stuart J. Gibson, Orr Dunkelman, Daniel Pérez-Cabo:

No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples with Applications to CAPTCHA. 336 - Martin Gábris, Martin Stanek:

State recovery of RC4 and Spritz Revisited. 337 - Siwei Sun, Lei Hu, Peng Wang, Meiqin Wang, Danping Shi, Xiaoshuang Ma, Qianqian Yang, Kai Fu:

Mixed Integer Programming Models for Finite Automaton and Its Application to Additive Differential Patterns of Exclusive-Or. 338 - Zvika Brakerski, Renen Perlman:

Lattice-Based Fully Dynamic Multi-Key FHE with Short Ciphertexts. 339 - Eshan Chattopadhyay, Vipul Goyal, Xin Li:

Non-Malleable Extractors and Codes, with their Many Tampered Extensions. 340 - Adam L. Young, Moti Yung:

Semantically Secure Anonymity: Foundations of Re-encryption. 341 - Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge:

On the Selective Opening Security of Practical Public-Key Encryption Schemes. 342 - Eric Miles, Emanuele Viola:

On the complexity of constructing pseudorandom functions (especially when they don't exist). 343 - HeeWon Chung, Myungsun Kim:

Encoding Rational Numbers for FHE-based Applications. 344 - Satsuya Ohata, Takahiro Matsuda, Kanta Matsuura:

Provably Secure Password Reset Protocol: Model, Definition, and Generic Construction. 345 - (Withdrawn) New Framework for Secure Server-Designation Public Key Encryption with Keyword Search. 346

- Payal Chaudhari, Manik Lal Das:

Cryptanalysis of Searchable Anonymous Attribute Based Encryption. 347 - Oriol Farràs, Sebastià Martín Molleví, Carles Padró:

A Note on Non-Perfect Secret Sharing. 348 - Patrick Derbez

:
Note on Impossible Differential Attacks. 349 - Ran Cohen, Sandro Coretti, Juan A. Garay, Vassilis Zikas:

Probabilistic Termination and Composability of Cryptographic Protocols. 350 - Chris Peikert:

How (Not) to Instantiate Ring-LWE. 351 - Pascal Sasdrich, Tim Güneysu:

Closing the Gap in RFC 7748: Implementing Curve448 in Hardware. 352 - Atsushi Takayasu, Noboru Kunihiro:

General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA. 353 - Suvradip Chakraborty, Srinivasan Raghuraman, C. Pandu Rangan:

A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers. 354 - Vahid Aminghafari, Honggang Hu:

Fruit: ultra-lightweight stream cipher with shorter internal state. 355 - Somindu C. Ramanna:

More Efficient Constructions for Inner-Product Encryption. 356 - David A. McGrew, Panos Kampanakis, Scott R. Fluhrer, Stefan-Lukas Gazdag, Denis Butin, Johannes Buchmann:

State Management for Hash Based Signatures. 357 - Ari Juels, Ahmed E. Kosba, Elaine Shi:

The Ring of Gyges: Investigating the Future of Criminal Smart Contracts. 358 - Nicolas Bruneau, Sylvain Guilley, Annelie Heuser, Damien Marion

, Olivier Rioul:
Less is More - Dimensionality Reduction from a Theoretical Perspective. 359 - Sanjit Chatterjee, Neal Koblitz, Alfred Menezes, Palash Sarkar:

Another Look at Tightness II: Practical Issues in Cryptography. 360 - Shweta Agrawal, Alon Rosen:

Online-Offline Functional Encryption for Bounded Collusions. 361 - Lalitha Kiran Nemana, V. Ch. Venkaiah:

An Empirical Study towards Refining the AKS Primality Testing Algorithm. 362 - Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, David Pointcheval:

Legally Fair Contract Signing Without Keystones. 363 - (Withdrawn) Cryptographic Analysis of the 3GPP AKA Protocol. 364

- Masahiro Ishii, Jérémie Detrey, Pierrick Gaudry, Atsuo Inomata, Kazutoshi Fujikawa:

Fast Modular Arithmetic on the Kalray MPPA-256 Processor for an Energy-Efficient Implementation of ECM. 365 - Joost Renes, Peter Schwabe, Benjamin Smith, Lejla Batina:

\(\mu\)Kummer: efficient hyperelliptic signatures and key exchange on microcontrollers. 366 - Falko Strenzke:

An Analysis of OpenSSL's Random Number Generator. 367 - Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth:

Foundations of Fully Dynamic Group Signatures. 368 - Ronald Cramer, Chaoping Xing, Chen Yuan:

On Multi-Point Local Decoding of Reed-Muller Codes. 369 - Cécile Pierrot, Benjamin Wesolowski:

Malleability of the blockchain's entropy. 370 - Stéphanie Alt, Pierre-Alain Fouque, Gilles Macario-Rat, Benjamin Richard, Cristina Onete

:
A Cryptographic Analysis of UMTS/LTE AKA. 371 - Mihir Bellare, Georg Fuchsbauer, Alessandra Scafuro:

NIZKs with an Untrusted CRS: Security in the Face of Parameter Subversion. 372 - Dennis Hofheinz:

Adaptive partitioning. 373 - Christoph Dobraunig, Maria Eichlseder, Florian Mendel:

Analysis of SHA-512/224 and SHA-512/256. 374 - Alon Rosen, Gil Segev, Ido Shahaf:

Can PPAD Hardness be Based on Standard Cryptographic Assumptions? 375 - Stephen Checkoway, Shaanan Cohney, Christina Garman, Matthew Green, Nadia Heninger, Jacob Maskiewicz, Eric Rescorla, Hovav Shacham, Ralf-Philipp Weinmann:

A Systematic Analysis of the Juniper Dual EC Incident. 376 - Arka Rai Choudhuri, Subhamoy Maitra:

Differential Cryptanalysis of Salsa and ChaCha - An Evaluation with a Hybrid Model. 377 - Delaram Kahrobaei, Vladimir Shpilrain:

Using semidirect product of (semi)groups in public key cryptography. 378 - Jean Lancrenon, Marjan Skrobot, Qiang Tang

:
Two More Efficient Variants of the J-PAKE Protocol. 379 - Elena Kirshanova, Alexander May, Friedrich Wiemer:

Parallel Implementation of BDD enumeration for LWE. 380 - Florian Bourse, Rafaël Del Pino, Michele Minelli, Hoeteck Wee:

FHE Circuit Privacy Almost For Free. 381 - Daniel J. Bernstein, Susanne Engels, Tanja Lange, Ruben Niederhagen, Christof Paar, Peter Schwabe, Ralf Zimmermann:

Faster discrete logarithms on FPGAs. 382 - Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi:

Reducing the Key Size of the SRP Encryption Scheme - Extended version. 383 - Anne Canteaut, Yann Rotella:

Attacks against Filter Generators Exploiting Monomial Mappings. 384 - Guillaume Bonnoron, Caroline Fontaine:

A note on Ring-LWE security in the case of Fully Homomorphic Encryption. 385 - Vladimir Rozic, Bohan Yang, Nele Mentens, Ingrid Verbauwhede:

Canary Numbers: Design for Light-weight Online Testability of True Random Number Generators. 386 - Karim Baghery, Behzad Abdolmaleki, Mohammad Javad Emadi:

Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags. 387 - Mojahed Mohamed, Xiaofen Wang, Xiaosong Zhang:

Tightly-Secure Authenticated Key Exchange without NAXOS' approach based on Decision Linear Problem. 388 - Georg Fuchsbauer, Zahra Jafargholi, Krzysztof Pietrzak:

A Quasipolynomial Reduction for Generalized Selective Decryption on Trees. 389 - Sanjam Garg

, Pratyay Mukherjee, Akshayaram Srinivasan:
Obfuscation without the Vulnerabilities of Multilinear Maps. 390 - Danilo Gligoroski, Simona Samardjiska:

A Digital Signature Scheme Based on Random Split of St-Gen Codes. 391 - (Withdrawn) Towards a Further Understanding of Bit-Based Division Property. 392

- Ming Li, Dongdai Lin:

Adjacency Graphs, Irreducible Polynomials and Cyclotomy. 393 - Benoît Cogliati, Yannick Seurin:

Strengthening the Known-Key Security Notion for Block Ciphers. 394 - Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel:

Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch. 395 - Jérémy Jean:

Cryptanalysis of Haraka. 396 - Ronald Cramer, Ivan Damgård, Nico Döttling, Irene Giacomelli, Chaoping Xing:

Linear-Time Non-Malleable Codes in the Bit-Wise Independent Tampering Model. 397 - Léo Perrin, Aleksei Udovenko:

Algebraic Insights into the Secret Feistel Network (Full version). 398 - Houda Ferradi, Rémi Géraud, David Naccache:

Slow Motion Zero Knowledge Identifying With Colliding Commitments. 399 - Sunoo Park, Ronald L. Rivest:

Towards Secure Quadratic Voting. 400 - Palash Sarkar, Shashank Singh:

Tower Number Field Sieve Variant of a Recent Polynomial Selection Method. 401 - Seiko Arita, Shota Nakasato:

Fully Homomorphic Encryption for Point Numbers. 402 - Sanjit Chatterjee, Alfred Menezes, Francisco Rodríguez-Henríquez:

On Implementing Pairing-Based Protocols with Elliptic Curves of Embedding Degree One. 403 - Subhabrata Samajder, Palash Sarkar:

A New Test Statistic for Key Recovery Attacks Using Multiple Linear Approximations. 404 - Subhabrata Samajder, Palash Sarkar:

Multiple Differential Cryptanalysis: A Rigorous Analysis. 405 - Yongqiang Li, Mingsheng Wang:

On the Construction of Lightweight Circulant Involutory MDS Matrices. 406 - Kai Fu, Meiqin Wang, Yinghua Guo, Siwei Sun, Lei Hu:

MILP-Based Automatic Search Algorithms for Diff erential and Linear Trails for Speck. 407 - Patrick McCorry, Malte Möser, Siamak Fayyaz Shahandashti, Feng Hao:

Towards Bitcoin Payment Networks. 408 - Alex Biryukov, Vesselin Velichkov, Yann Le Corre:

Automatic Search for the Best Trails in ARX: Application to Block Cipher \textsc{Speck}. 409 - Óscar García-Morchón, Ronald Rietman, Ludo Tolhuizen, Jose Luis Torre-Arce, Sauvik Bhattacharya, Maarten P. Bodlaender:

Efficient quantum-resistant trust Infrastructure based on HIMMO. 410 - Eric R. Verheul, Bart Jacobs, Carlo Meijer, Mireille Hildebrandt, Joeri de Ruiter:

Polymorphic Encryption and Pseudonymisation for Personalised Healthcare. 411 - Chen-Mou Cheng, Tung Chou, Ruben Niederhagen, Bo-Yin Yang:

Solving Quadratic Equations with XL on Parallel Architectures - extended version. 412 - Craig Costello, Patrick Longa, Michael Naehrig:

Efficient algorithms for supersingular isogeny Diffie-Hellman. 413 - Li Lin, Wenling Wu, Yafei Zheng:

Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE (Full Version). 414 - Nina Bindel, Johannes Buchmann, Juliane Krämer:

Lattice-Based Signature Schemes and their Sensitivity to Fault Attacks. 415 - Rémi Bazin, Alexander Schaub, Omar Hasan, Lionel Brunie:

A Decentralized Anonymity-Preserving Reputation System with Constant-time Score Retrieval. 416 - Lisa Kohl:

New Tools for Multi-Party Computation. 417 - Zvika Brakerski, Or Dagmi:

Shorter Circuit Obfuscation in Challenging Security Models. 418 - Yi Lu, Yvo Desmedt:

Walsh-Hadamard Transform and Cryptographic Applications in Bias Computing. 419 - Santos Merino Del Pozo, François-Xavier Standaert:

A note on the security of threshold implementations with d+1 input shares. 420 - Jung Hee Cheon, Andrey Kim, Miran Kim, Yong Soo Song:

Floating-Point Homomorphic Encryption. 421 - Sumanta Sarkar, Siang Meng Sim:

A deeper understanding of the XOR count distribution in the context of lightweight cryptography. 422 - Pooya Farshim, Arno Mittelbach:

Modeling Random Oracles under Unpredictable Queries. 423 - Gorjan Alagic, Anne Broadbent, Bill Fefferman, Tommaso Gagliardoni, Christian Schaffner, Michael St. Jules:

Computational Security of Quantum Encryption. 424 - Michel Abdalla, Mariana Raykova, Hoeteck Wee:

Multi-Input Inner-Product Functional Encryption from Pairings. 425 - Fahad Shaon, Murat Kantarcioglu:

A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data. 426 - Varsha Bhat Kukkala, Jaspal Singh Saini, S. R. S. Iyengar:

Network Deprived SNA : An Alternative To Anonymization. 427 - Phuong Ha Nguyen, Durga Prasad Sahoo:

An Efficient and Scalable Modeling Attack on Lightweight Secure Physically Unclonable Function. 428 - Boris Ryabko:

Information-Theoretical Analysis of Two Shannon's Ciphers. 429 - Jian Liu, Lusheng Chen, Sihem Mesnager:

Partially homomorphic encryption schemes over finite fields. 430 - David Bernhard, Oksana Kulyk, Melanie Volkamer:

Security Proofs for Participation Privacy and Stronger Veri ability for Helios. 431 - Kwangsu Lee, Dong Hoon Lee:

Two-Input Functional Encryption for Inner Products from Bilinear Maps. 432 - Guillaume Scerri, Ryan Stanley-Oakes:

Analysis of Key Wrapping APIs: Generic Policies, Computational Security. 433 - Cong Chen, Mohammad Farmani, Thomas Eisenbarth:

A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile-and Why it is Not. 434 - Rafaël Del Pino, Vadim Lyubashevsky, David Pointcheval:

The Whole is Less than the Sum of its Parts: Constructing More Efficient Lattice-Based AKEs. 435 - Nasour Bagheri, Tao Huang, Keting Jia, Florian Mendel, Yu Sasaki:

Cryptanalysis of Reduced NORX. 436 - Sonia Bogos, Serge Vaudenay:

Observations on the LPN Solving Algorithm from Eurocrypt'16. 437 - Ralf Küsters, Johannes Müller

, Enrico Scapin, Tomasz Truderung:
sElect: A Lightweight Verifiable Remote Voting System. 438 - Hao Chen:

A Measure Version of Gaussian Heuristic. 439 - Sam Kim, Kevin Lewi, Avradip Mandal, Hart William Montgomery, Arnab Roy, David J. Wu:

Function-Hiding Inner Product Encryption is Practical. 440 - Durga Prasad Sahoo, Sikhar Patranabis, Debdeep Mukhopadhyay, Rajat Subhra Chakraborty:

Fault Tolerant Implementations of Delay-based Physically Unclonable Functions on FPGA. 441 - Franziskus Kiefer, Mark Manulis:

Blind Password Registration for Verifier-based PAKE. 442 - Simon Cogliani, Houda Ferradi, Rémi Géraud, David Naccache:

Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography. 443 - Roberto Avanzi:

The QARMA Block Cipher Family - Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes. 444 - Alhassan Khedr, P. Glenn Gulak:

SecureMed: Secure Medical Computation using GPU-Accelerated Homomorphic Encryption Scheme. 445 - (Withdrawn) Quantum key distribution with combined conjugate coding and information overloading. 446

- Peter Hyun-Jeen Lee, Siamak Fayyaz Shahandashti:

Theoretical Attacks on E2E Voting Systems. 447 - Zhengjun Cao, Lihua Liu:

A Note on "Outsourcing Large Matrix Inversion Computation to a Public Cloud". 448 - Thomas Espitau, Pierre-Alain Fouque, Benoît Gérard, Mehdi Tibouchi:

Loop abort Faults on Lattice-Based Fiat-Shamir & Hash'n Sign signatures. 449 - Maryam Rajabzadeh Asaar, Mahmoud Salmasizadeh, Mohammad Reza Aref:

A Provably Secure Code-based Concurrent Signature Scheme. 450 - Waclaw Banasik, Stefan Dziembowski

, Daniel Malinowski:
Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts. 451 - Benjamin Dowling, Felix Günther, Udyani Herath, Douglas Stebila:

Secure Logging Schemes and Certificate Transparency. 452 - Seny Kamara, Tarik Moataz:

SQL on Structurally-Encrypted Databases. 453 - Rafael Pass, Lior Seeman, Abhi Shelat:

Analysis of the Blockchain Protocol in Asynchronous Networks. 454 - Linus Feiten, Matthias Sauer:

Extracting the RC4 secret key of the Open Smart Grid Protocol. 455 - Yuval Ishai, Eyal Kushilevitz, Manoj Prabhakaran, Amit Sahai, Ching-Hua Yu:

Secure Protocol Transformations. 456 - Wei Yuan:

Dynamic Policy Update for Ciphertext-Policy Attribute-Based Encryption. 457 - Adam Groce, Alex Ledger, Alex J. Malozemoff, Arkady Yerukhimovich:

CompGC: Efficient Offline/Online Semi-honest Two-party Computation. 458 - Zvika Brakerski, Justin Holmgren

, Yael Tauman Kalai:
Non-Interactive RAM and Batch NP Delegation from any PIR. 459 - Kwangsu Lee, Seunghwan Park:

Revocable Hierarchical Identity-Based Encryption with Shorter Private Keys and Update Keys. 460 - Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange, Christine van Vredendaal:

NTRU Prime. 461 - Masahiro Yagisawa:

Fully Homomorphic Encryption with Isotropic Elements. 462 - Reza Reyhanitabar, Serge Vaudenay, Damian Vizár:

Authenticated Encryption with Variable Stretch. 463 - Kyle Soska, Albert Kwon, Nicolas Christin, Srinivas Devadas:

Beaver: A Decentralized Anonymous Marketplace with Secure Reputation. 464 - Subhabrata Samajder, Palash Sarkar:

Can Large Deviation Theory be Used for Estimating Data Complexity? 465 - Ania M. Piotrowska, Jamie Hayes, Nethanel Gelernter, George Danezis, Amir Herzberg:

AnoNotify: A Private Notification Service. 466 - Shay Gueron, Fabian Schlieker:

Speeding up R-LWE post-quantum key exchange. 467 - Maciej A. Czyzewski:

Chaos Machine: Different Approach to the Application and Significance of Numbers. 468 - Andrew Egbert, Brad Chun, Thomas Otte:

Identity Chains. 469 - Myungsun Kim, Hyung Tae Lee, San Ling, Shu Qin Ren, Benjamin Hong Meng Tan, Huaxiong Wang:

Better Security for Queries on Encrypted Databases. 470 - Wei Dai, John M. Schanck, Berk Sunar, William Whyte, Zhenfei Zhang:

NTRU Modular Lattice Signature Scheme on CUDA GPUs. 471 - Loubna Ghammam, Emmanuel Fouotsa:

Adequate Elliptic Curve for Computing the Product of n Pairings. 472 - Thomas Unterluggauer, Stefan Mangard:

Exploiting the Physical Disparity: Side-Channel Attacks on Memory Encryption. 473 - Gideon Samid:

T-Proof: Secure Communication via Non-Algorithmic Randomization. 474 - Hanno Böck, Aaron Zauner, Sean Devlin, Juraj Somorovsky, Philipp Jovanovic:

Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS. 475 - Keita Xagawa:

Groth-Sahai Proofs Revisited Again: A Bug in "Optimized" Randomization. 476 - Kazuma Ohara, Keita Emura, Goichiro Hanaoka, Ai Ishida, Kazuo Ohta, Yusuke Sakai:

Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology. 477 - Erman Ayday, Qiang Tang

, Arif Yilmaz:
Cryptographic Solutions for Credibility and Liability Issues of Genomic Data. 478 - Jakub Szefer:

Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses. 479 - Pierre-Alain Fouque, Cristina Onete

, Benjamin Richard:
Achieving Better Privacy for the 3GPP AKA Protocol. 480 - Amir Moradi, Tobias Schneider:

Side-Channel Analysis Protection and Low-Latency in Action - case study of PRINCE and Midori. 481 - Shashank Agrawal, David J. Wu:

Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions. 482 - Hiroaki Anada, Seiko Arita, Kouichi Sakurai:

Proof of Knowledge on Monotone Predicates and its Application to Attribute-Based Identifications and Signatures. 483 - Jung Hee Cheon, HeeWon Chung, Myungsun Kim, Kang-Won Lee:

Ghostshell: Secure Biometric Authentication using Integrity-based Homomorphic Evaluations. 484 - Palash Sarkar, Shashank Singh:

A General Polynomial Selection Method and New Asymptotic Complexities for the Tower Number Field Sieve Algorithm. 485 - Hannes Groß, Stefan Mangard, Thomas Korak:

Domain-Oriented Masking: Compact Masked Hardware Implementations with Arbitrary Protection Order. 486 - Amine Mrabet, Nadia El Mrabet, Ronan Lashermes, Jean-Baptiste Rigaud, Belgacem Bouallegue, Sihem Mesnager, Mohsen Machhout:

A Systolic Hardware Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems. 487 - Husen Wang, Qiang Tang

:
Methods for Efficient Homomorphic Integer Polynomial Evaluation based on GSW FHE. 488 - Nethanel Gelernter, Amir Herzberg, Hemi Leibowitz:

Two Cents for Strong Anonymity: The Anonymous Post-office Protocol. 489 - Cihangir Tezcan:

Truncated, Impossible, and Improbable Differential Analysis of Ascon. 490 - Daniel P. Martin, Luke Mather, Elisabeth Oswald, Martijn Stam:

Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations. 491 - Martin R. Albrecht, Lorenzo Grassi, Christian Rechberger, Arnab Roy, Tyge Tiessen:

MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity. 492 - Arnaud Bannier, Nicolas Bodin, Eric Filiol:

Partition-Based Trapdoor Ciphers. 493 - Bo Yang, Kang Yang, Zhenfeng Zhang, Yu Qin, Dengguo Feng:

AEP-M: Practical Anonymous E-Payment for Mobile Devices using ARM TrustZone and Divisible E-Cash (Full Version). 494 - Jesper Buus Nielsen, Claudio Orlandi:

Cross&Clean: Amortized Garbled Circuits with Constant Overhead. 495 - Daniel Kraschewski, Dakshita Khurana, Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai:

All Complete Functionalities are Reversible. 496 - Dakshita Khurana, Hemanta K. Maji, Amit Sahai:

Secure Computation from Elastic Noisy Channels. 497 - Xavier Boyen, Qinyi Li:

Towards Tightly Secure Short Signature and IBE. 498 - Gideon Samid:

Drone Targeted Cryptography. 499 - Jong Hwan Park, Kwangsu Lee, Dong Hoon Lee:

Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups. 500 - Libo He, Chen Yuan, Hu Xiong, Zhiguang Qin:

Certificateless Key Insulated Encryption: Cryptographic Primitive for Achieving Key-escrow free and Key-exposure Resilience. 501 - Christina Boura, Avik Chakraborti, Gaëtan Leurent, Goutam Paul, Dhiman Saha, Hadi Soleimany, Valentin Suder:

Key Recovery Attack against 2.5-round pi-Cipher. 502 - Rachid El Bansarkhani, Mohamed Saied Emam Mohamed, Albrecht Petzoldt:

MQSAS - A Multivariate Sequential Aggregate Signature Scheme. 503 - Patrick Longa, Michael Naehrig:

Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based Cryptography. 504 - Marcel Keller, Emmanuela Orsini, Peter Scholl:

MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer. 505 - Ioana-Cristina Panait, Cristian Pop, Alexandru Sirbu, Adelina Vidovici, Emil Simion:

TOR - Didactic pluggable transport. 506 - Aurore Guillevic, François Morain, Emmanuel Thomé:

Solving discrete logarithms on a 170-bit MNT curve by pairing reduction. 507 - Dominique Unruh:

Collapse-binding quantum commitments without random oracles. 508 - Xiaoyang Dong, Xiaoyun Wang:

Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes. 509 - Jean-Claude Bajard, Julien Eynard, M. Anwar Hasan, Vincent Zucca:

A Full RNS Variant of FV like Somewhat Homomorphic Encryption Schemes. 510 - Ran Canetti, Oxana Poburinnaya, Mariana Raykova:

Optimal-Rate Non-Committing Encryption in a CRS Model. 511 - Lucjan Hanzlik, Kamil Kluczniak:

Security Analysis of ePrint Report 2016/500 "Efficient Identity-Based Encryption and Public-Key Signature from Trapdoor Subgroups". 512 - Michael Tunstall, Gilbert Goodwill:

Applying TVLA to Public Key Cryptographic Algorithms. 513 - Yu Yu, Jiang Zhang:

Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN. 514 - Mihai Barbulescu, Adrian Stratulat, Vlad Traista-Popescu, Emil Simion:

RSA Weak Public Keys available on the Internet. 515 - Ferucio Laurentiu Tiplea, George Teseleanu, Sorin Iftene, Anca-Maria Nica:

Boneh-Gentry-Hamburg's Identity-based Encryption Schemes Revisited. 516 - David McCann, Carolyn Whitnall, Elisabeth Oswald:

ELMO: Emulating Leaks for the ARM Cortex-M0 without Access to a Side Channel Lab. 517 - Vladimir Kolesnikov, Hugo Krawczyk, Yehuda Lindell, Alex J. Malozemoff, Tal Rabin:

Attribute-based Key Exchange with General Policies. 518 - Benny Applebaum, Pavel Raykov:

On the Relationship between Statistical Zero-Knowledge and Statistical Randomized Encodings. 519 - Franziskus Kiefer, Mark Manulis:

Universally Composable Two-Server PAKE. 520 - Frédéric Lafitte, Liran Lerman, Olivier Markowitch, Dirk Van Heule:

SAT-based cryptanalysis of ACORN. 521 - Daisuke Fujimoto, Shivam Bhasin, Makoto Nagata, Jean-Luc Danger:

A Novel Methodology for Testing Hardware Security and Trust Exploiting On-Chip Power Noise Measurements (Extended Version). 522 - Jiang Zhang, Yu Chen, Zhenfeng Zhang:

Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes. 523 - Sanjam Garg

, Akshayaram Srinivasan:
Unifying Security Notions of Functional Encryption. 524 - Benoît Cogliati, Yannick Seurin:

EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC. 525 - Jinhyuck Jeong, Taechan Kim:

Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension Degree. 526 - Giuseppe Ateniese, Aggelos Kiayias, Bernardo Magri, Yiannis Tselekounis, Daniele Venturi:

Secure Outsourcing of Circuit Manufacturing. 527 - Thomas Espitau, Antoine Joux:

Adaptive precision LLL and Potential-LLL reductions with Interval arithmetic. 528 - Antonio Faonio

, Daniele Venturi:
Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience. 529 - Alexander Russell, Qiang Tang, Moti Yung, Hong-Sheng Zhou:

Destroying Steganography via Amalgamation: Kleptographically CPA Secure Public Key Encryption. 530 - Alexandre Gélin, Antoine Joux:

Reducing number field defining polynomials: An application to class group computations. 531 - Tomer Ashur, Achiya Bar-On, Orr Dunkelman:

Cryptanalysis of GOST2. 532 - Bing Sun, Meicheng Liu, Jian Guo, Longjiang Qu, Vincent Rijmen:

New Insights on AES-like SPN Ciphers. 533 - Tomer Ashur, Bart Mennink:

Damaging, Simplifying, and Salvaging p-OMD. 534 - (Withdrawn) Impossible Differential Cryptanalysis of Midori. 535

- Joshua Brody, Stefan Dziembowski

, Sebastian Faust, Krzysztof Pietrzak:
Position-Based Cryptography and Multiparty Communication Complexity. 536 - Palash Sarkar, Shashank Singh:

A Generalisation of the Conjugation Method for Polynomial Selection for the Extended Tower Number Field Sieve Algorithm. 537 - Carsten Baum, Ivan Damgård, Kasper Green Larsen, Michael Nielsen:

How to prove knowledge of small secrets. 538 - Léo Perrin, Aleksei Udovenko, Alex Biryukov:

Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem (Full Version). 539 - Alberto Battistello, Jean-Sébastien Coron, Emmanuel Prouff, Rina Zeitoun:

Horizontal Side-Channel Attacks and Countermeasures on the ISW Masking Scheme. 540 - Mihir Bellare, Daniel Kane, Phillip Rogaway:

Big-Key Symmetric Encryption: Resisting Key Exfiltration. 541 - Lorenzo Grassi, Christian Rechberger, Dragos Rotaru, Peter Scholl, Nigel P. Smart:

MPC-Friendly Symmetric Key Primitives. 542 - Adam J. Aviv, Seung Geol Choi, Travis Mayberry, Daniel S. Roche:

ObliviSync: Practical Oblivious File Backup and Synchronization. 543 - Geoffroy Couteau:

Efficient Secure Comparison Protocols. 544 - Aggelos Kiayias, Giorgos Panagiotakos:

On Trees, Chains and Fast Transactions in the Blockchain. 545 - Lucas Schabhüser, Denise Demirel, Johannes Buchmann:

An Unconditionally Hiding Auditing Procedure for Multi-Party Computations. 546 - Markus Kammerstetter, Markus Muellner, Daniel Burian, Christian Kudera, Wolfgang Kastner:

Efficient High-Speed WPA2 Brute Force Attacks using Scalable Low-Cost FPGA Clustering. 547 - Brent Carmer, Mike Rosulek:

Linicrypt: A Model for Practical Cryptography. 548 - Xiong Fan, Juan A. Garay, Payman Mohassel:

Short and Adjustable Signatures. 549 - Andrew D. Zonenberg, Bülent Yener:

Antikernel: A Decentralized Secure Hardware-Software Operating System Architecture. 550 - Jean-Sébastien Coron, Rina Zeitoun:

Improved Factorization of N=prqs. 551 - Jintai Ding, Saed Alsayigh, Jean Lancrenon, Saraswathy RV, Michael Snook:

Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-QuantumWorld. 552 - (Withdrawn) Storage Efficient Substring Searchable Symmetric Encryption. 553

- Christina Boura, Anne Canteaut:

Another view of the division property. 554 - Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, Srdjan Capkun:

On the Security and Performance of Proof of Work Blockchains. 555 - Martin Hirt, Ueli Maurer, Daniel Tschudi, Vassilis Zikas:

Network-Hiding Communication and Applications to Multi-Party Protocols. 556 - Dahmun Goudarzi, Matthieu Rivain:

On the Multiplicative Complexity of Boolean Functions and Bitsliced Higher-Order Masking. 557 - Nir Bitansky, Ryo Nishimaki, Alain Passelègue, Daniel Wichs:

From Cryptomania to Obfustopia through Secret-Key Functional Encryption. 558 - Yfke Dulek, Christian Schaffner, Florian Speelman:

Quantum homomorphic encryption for polynomial-sized circuits. 559 - Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:

Memory-Efficient Algorithms for Finding Needles in Haystacks. 560 - Baiyu Li, Daniele Micciancio:

Compactness vs Collusion Resistance in Functional Encryption. 561 - Daniel Apon, Xiong Fan, Feng-Hao Liu:

Deniable Attribute Based Encryption for Branching Programs from LWE. 562 - Carmen Kempka, Ryo Kikuchi, Susumu Kiyoshima, Koutarou Suzuki:

Garbling Scheme for Formulas with Constant Size of Garbled Gates. 563 - Mihir Bellare, Björn Tackmann:

The Multi-User Security of Authenticated Encryption: AES-GCM in TLS 1.3. 564 - Andrej Bogdanov, Yuval Ishai, Emanuele Viola, Christopher Williamson:

Bounded Indistinguishability and the Complexity of Recovering Secrets. 565 - Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti:

Concurrent Non-Malleable Commitments (and More) in 3 Rounds. 566 - Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:

Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli. 567 - Tobias Boelter, Rishabh Poddar, Raluca Ada Popa:

A Secure One-Roundtrip Index for Range Queries. 568 - Kimmo Järvinen, Andrea Miele, Reza Azarderakhsh, Patrick Longa:

FourQ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields. 569 - Masayuki Abe, Fumitaka Hoshino, Miyako Ohkubo:

Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion using Integer Programming. 570 - Romain Poussier, François-Xavier Standaert, Vincent Grosso:

Simple Key Enumeration (and Rank Estimation) using Histograms: an Integrated Approach. 571 - Jean-Sébastien Coron, Aurélien Greuet, Emmanuel Prouff, Rina Zeitoun:

Faster Evaluation of SBoxes via Common Shares. 572 - Stefan Dziembowski

, Sebastian Faust, Gottfried Herold, Anthony Journault, Daniel Masny, François-Xavier Standaert:
Towards Sound Fresh Re-Keying with Hard (Physical) Learning Problems. 573 - Nir Bitansky, Akshay Degwekar, Vinod Vaikuntanathan:

Structure vs Hardness through the Obfuscation Lens. 574 - Ethan Heilman, Foteini Baldimtsi, Leen Alshenibr, Alessandra Scafuro, Sharon Goldberg:

TumbleBit: An Untrusted Tumbler for Bitcoin-Compatible Anonymous Payments. 575 - (Withdrawn) Indistinguishability Obfuscation Does Not Reduce to Structured Languages. 576

- Jean Paul Degabriele, Kenneth G. Paterson, Jacob C. N. Schuldt, Joanne Woodage:

Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results. 577 - Viet Tung Hoang, Stefano Tessaro:

Key-alternating Ciphers and Key-length Extension: Exact Bounds and Multi-user Security. 578 - Patrick Derbez

, Pierre-Alain Fouque:
Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks. 579 - Akshay Degwekar, Vinod Vaikuntanathan, Prashant Nalini Vasudevan:

Fine-grained Cryptography. 580 - Jan Camenisch, Maria Dubovitskaya, Alfredo Rial:

UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens. 581 - Tanujay Saha:

TV-PUF : A Fast Lightweight Analog Physically Unclonable Function. 582 - Melissa Chase, Chaya Ganesh, Payman Mohassel:

Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials. 583 - Ranjit Kumaresan, Srinivasan Raghuraman, Adam Sealfon:

Network Oblivious Transfer. 584 - Elette Boyle, Niv Gilboa, Yuval Ishai:

Breaking the Circuit Size Barrier for Secure Computation Under DDH. 585 - Thomas Shrimpton, Martijn Stam, Bogdan Warinschi:

A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case. 586 - Sergey Agievich, Vadim Marchuk, Alexander Maslau, Vlad Semenov:

Bash-f: another LRX sponge function. 587 - Eric Miles, Amit Sahai, Mark Zhandry:

Secure obfuscation in a weak multilinear map model: A simple construction secure against all known attacks. 588 - Jacob Alperin-Sheriff, Daniel Apon:

Dimension-Preserving Reductions from LWE to LWR. 589 - Yang Xie, Ankur Srivastava:

Mitigating SAT Attack on Logic Locking. 590 - Rishabh Poddar, Tobias Boelter, Raluca Ada Popa:

Arx: A Strongly Encrypted Database System. 591 - Lorenzo Grassi, Christian Rechberger, Sondre Rønjom:

Subspace Trail Cryptanalysis and its Applications to AES. 592 - Heiko Lohrke, Shahin Tajik, Christian Boit, Jean-Pierre Seifert:

No Place to Hide: Contactless Probing of Secret Data on FPGAs. 593 - Cesar Pereida García, Billy Bob Brumley, Yuval Yarom:

"Make Sure DSA Signing Exponentiations Really are Constant-Time". 594 - Rei Ueno, Sumio Morioka, Naofumi Homma, Takafumi Aoki:

A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths - Toward Efficient CBC-Mode Implementation. 595 - Mehmet Sinan Inci, Berk Gülmezoglu, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar:

Cache Attacks Enable Bulk Key Recovery on the Cloud. 596 - Margaux Dugardin, Sylvain Guilley, Jean-Luc Danger, Zakaria Najm, Olivier Rioul:

Correlated Extra-Reductions Defeat Blinded Regular Exponentiation - Extended Version. 597 - Ryan Henry:

Polynomial Batch Codes for Efficient IT-PIR. 598 - Nico Döttling, Sanjam Garg

, Divya Gupta, Peihan Miao, Pratyay Mukherjee:
Obfuscation from Low Noise Multilinear Maps. 599 - Samaneh Ghandali, Georg T. Becker, Daniel E. Holcomb, Christof Paar:

A Design Methodology for Stealthy Parametric Trojans and Its Application to Bug Attacks. 600 - Shalabh Jain, Jorge Guajardo:

Physical Layer Group Key Agreement for Automotive Controller Area Networks. 601 - Gilad Asharov, Yehuda Lindell, Thomas Schneider, Michael Zohner:

More Efficient Oblivious Transfer Extensions. 602 - Thomaz Oliveira, Julio López, Francisco Rodríguez-Henríquez:

Software implementation of Koblitz curves over quadratic fields. 603 - Amir S. Mortazavi, Mahmoud Salmasizadeh, Amir Daneshgar:

FMNV Continuous Non-malleable Encoding Scheme is More Efficient Than Believed. 604 - Razvan Barbulescu, Pierrick Gaudry, Aurore Guillevic, François Morain:

Improving NFS for the discrete logarithm problem in non-prime finite fields. 605 - Fatemeh Ganji, Shahin Tajik, Fabian Fäßler, Jean-Pierre Seifert:

Strong Machine Learning Attack against PUFs with No Mathematical Model. 606 - Mehrad Jaberi, Hamid Mala:

Protocols for Authenticated Oblivious Transfer. 607 - Hoda Maleki, Reza Rahaeimehr, Marten van Dijk:

LightSource: Ultra Lightweight Clone Detection of RFID Tags from Software Unclonable Responses. 608 - Jake Longo, Daniel P. Martin, Luke Mather, Elisabeth Oswald, Benjamin Sach, Martijn Stam:

How low can you go? Using side-channel data to enhance brute-force key recovery. 609 - Aloni Cohen, Saleet Klein:

The GGM PRF is a Weakly One-Way Family of Functions. 610 - Robert K. Cunningham, Benjamin Fuller, Sophia Yakoubov:

Catching MPC Cheaters: Identification and Openability. 611 - Kevin Lewi, David J. Wu:

Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds. 612 - Qian Ge, Yuval Yarom, David A. Cock, Gernot Heiser:

A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware. 613 - Ran Canetti, Oxana Poburinnaya:

Better Two-Round Adaptive Multiparty Computation. 614 - Jeremias Mechler, Jörn Müller-Quade, Tobias Nilges:

Universally Composable (Non-Interactive) Two-Party Computation from Untrusted Reusable Hardware Tokens. 615 - Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Victor Lomné, Florian Mendel:

Practical Fault Attacks on Authenticated Encryption Modes for AES. 616 - Yuzhe Tang:

On the Impossibility of Merkle Merge Homomorphism. 617 - Sarani Bhattacharya, Debdeep Mukhopadhyay:

Curious case of Rowhammer: Flipping Secret Exponent Bits using Timing Analysis. 618 - Kevin Lewi, Alex J. Malozemoff, Daniel Apon, Brent Carmer, Adam Foltzer, Daniel Wagner, David W. Archer, Dan Boneh, Jonathan Katz, Mariana Raykova:

5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs. 619 - Ran Gilad-Bachrach, Kim Laine, Kristin E. Lauter, Peter Rindal, Mike Rosulek:

Secure Data Exchange: A Marketplace in the Cloud. 620 - Michele Ciampi, Rafail Ostrovsky, Luisa Siniscalchi, Ivan Visconti:

On Round-Efficient Non-Malleable Protocols. 621 - Marc Joye, Alain Passelègue:

Practical Trade-Offs for Multi-Input Functional Encryption. 622 - Dhiman Saha, Dipanwita Roy Chowdhury:

EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ. 623 - Baiyu Li, Daniele Micciancio:

Equational Security Proofs of Oblivious Transfer Protocols. 624 - Kota Kondo, Yu Sasaki, Tetsu Iwata:

On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants. 625 - Ekawat Homsirikamol, William Diehl, Ahmed Ferozpuri, Farnoud Farahmand, Panasayya Yalla, Jens-Peter Kaps, Kris Gaj:

CAESAR Hardware API. 626 - Gideon Samid:

Cyber Passport: Preventing Massive Identity Theft. 627 - Liliya R. Ahmetzyanova, Evgeny K. Alekseev, Igor B. Oshkin, Stanislav V. Smyshlyaev, Lolita A. Sonina:

On the properties of the CTR encryption mode of the Magma and Kuznyechik block ciphers with re-keying method based on CryptoPro Key Meshing. 628 - Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai:

Verifiable Functional Encryption. 629 - Ravikumar Selvam, Dillibabu Shanmugam, Suganya Annadurai, Jothi Rangasamy:

Decomposed S-Boxes and DPA Attacks: A Quantitative Case Study using PRINCE. 630 - Thomas De Cnudde, Oscar Reparaz, Begül Bilgin

, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
Masking AES with d+1 Shares in Hardware. 631 - Peter Rindal, Mike Rosulek:

Faster Malicious 2-party Secure Computation with Online/Ofine Dual Execution. 632 - Loi Luu, Duc-Hiep Chu, Hrishi Olickel, Prateek Saxena, Aquinas Hobor:

Making Smart Contracts Smarter. 633 - Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, David Naccache, Houda Ferradi:

Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing. 634 - Florian Tramèr

, Fan Zhang, Huang Lin, Jean-Pierre Hubaux, Ari Juels, Elaine Shi:
Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge. 635 - Saikrishna Badrinarayanan, Dakshita Khurana, Rafail Ostrovsky, Ivan Visconti:

New Feasibility Results in Unconditional UC-Secure Computation with (Malicious) PUFs. 636 - Wenbin Zhang, Chik How Tan:

On the Security and Key Generation of the ZHFE Encryption Scheme. 637 - Shoichi Hirose, Atsushi Yabumoto:

A Tweak for a PRF Mode of a Compression Function and Its Applications. 638 - Qiang Tang

, Balazs Pejo:
Game-Theoretic Framework for Integrity Veri cation in Computation Outsourcing. 639 - Aslí Bay, Oguzhan Ersoy, Ferhat Karakoç

:
Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm. 640 - Pawel Swierczynski, Georg T. Becker, Amir Moradi, Christof Paar:

Bitstream Fault Injections (BiFI) - Automated Fault Attacks against SRAM-based FPGAs. 641 - Pierre-Alain Fouque, Pierre Karpman, Paul Kirchner, Brice Minaud:

Efficient and Provable White-Box Primitives. 642 - Jesper Buus Nielsen, Samuel Ranellucci:

On the Computational Overhead of MPC with Dishonest Majority. 643 - David Wong:

How to Backdoor Diffie-Hellman. 644 - Patrick Longa:

FourQNEON: Faster Elliptic Curve Scalar Multiplications on ARM Processors. 645 - Eli Ben-Sasson, Iddo Bentov, Alessandro Chiesa, Ariel Gabizon, Daniel Genkin, Matan Hamilis, Evgenya Pergament, Michael Riabzev, Mark Silberstein, Eran Tromer, Madars Virza:

Computational integrity with a public random string from quasi-linear PCPs. 646 - Erik Boss, Vincent Grosso, Tim Güneysu, Gregor Leander, Amir Moradi, Tobias Schneider:

Strong 8-bit Sboxes with Efficient Masking in Hardware. 647 - Tobias Schneider, Amir Moradi, Tim Güneysu:

ParTI - Towards Combined Hardware Countermeasures against Side-Channel and Fault-Injection Attacks. 648 - Behzad Abdolmaleki, Karim Baghery, Shahram Khazaei, Mohammad Reza Aref:

Game-Based Privacy Analysis of RFID Security Schemes for Confident Au-thentication in IoT. 649 - Peeter Laud, Alisa Pankova:

Securing Multiparty Protocols against the Exposure of Data to Honest Parties. 650 - Christof Beierle:

Pen and Paper Arguments for SIMON and SIMON-like Designs. 651 - Arnaud Bannier, Nicolas Bodin, Eric Filiol:

Automatic Search for a Maximum Probability Differential Characteristic in a Substitution-Permutation Network. 652 - Masahiro Yagisawa:

Fully Homomorphic Encryption with Zero Norm Cipher Text. 653 - Shweta Agrawal:

Interpolating Predicate and Functional Encryption from Learning With Errors. 654 - Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au:

A Tag Based Encoding: An Efficient Encoding for Predicate Encoding in Prime Order Groups. 655 - Eiichiro Fujisaki:

Improving Practical UC-Secure Commitments based on the DDH Assumption. 656 - Tatiana Bradley, Sky Faber, Gene Tsudik:

Bounded Size-Hiding Private Set Intersection. 657 - Kevin Atighehchi, Alexis Bonnecaze:

On Plausible Tree Hash Modes for SHA-3. 658 - Joppe W. Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila:

Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE. 659 - Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim:

The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS. 660 - David Cash, Feng-Hao Liu, Adam O'Neill, Cong Zhang:

Reducing the Leakage in Practical Order-Revealing Encryption. 661 - Georg Fuchsbauer, Christian Hanser, Chethan Kamath, Daniel Slamanig:

Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions. 662 - Jan Camenisch, Manu Drijvers, Anja Lehmann:

Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited. 663 - Yoo-Seung Won, Dong-Guk Han:

Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices. 664 - Mikkel Lambæk:

Breaking and Fixing Private Set Intersection Protocols. 665 - Wei-Guo Zhang, Luyang Li, Enes Pasalic:

A GMM type construction for resilient S-boxes with higher-dimensional vectorial outputs and strictly almost optimal nonlinearity. 666 - Andrey Bogdanov, Elmar Tischhauser, Philip S. Vejre:

Multivariate Linear Cryptanalysis: The Past and Future of PRESENT. 667 - (Withdrawn) Analysis of a Secure and Verifiable Policy Update Outsourcing Scheme for Big Data Access Control in the Cloud. 668

- Reza Azarderakhsh, Brian Koziel, Amir Jalali, Mehran Mozaffari Kermani, David Jao:

NEON-SIDH: Effi cient Implementation of Supersingular Isogeny Diffi e-Hellman Key-Exchange Protocol on ARM. 669 - Siamak Fayyaz Shahandashti, Feng Hao:

DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities. 670 - Yongzhuang Wei, Enes Pasalic, Fengrong Zhang, Samir Hodzic:

Efficient probabilistic algorithm for estimating the algebraic properties of Boolean functions for large n. 671 - (Withdrawn) FPGA-SIDH: High-Performance Implementation of Supersingular Isogeny Diffie-Hellman Key-Exchange Protocol on FPGA. 672

- Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:

Dirichlet Product for Boolean Functions. 673 - Urbi Chatterjee, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:

A PUF-based Secure Communication Protocol for IoT. 674 - Angela Jäschke, Frederik Armknecht:

Accelerating Homomorphic Computations on Rational Numbers. 675 - Xiaoyang Dong, Yanzhao Shen:

Cryptanalysis of Reduced-Round Midori64 Block Cipher. 676 - Mohamed Sabt, Jacques Traoré:

Breaking Into the KeyStore: A Practical Forgery Attack Against Android KeyStore. 677 - Michael Backes, Amir Herzberg, Aniket Kate, Ivan Pryvalov:

Anonymous RAM. 678 - Jihoon Cho, Kyu Young Choi, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Vaidberg:

Hybrid WBC: Secure and Efficient White-Box Encryption Schemes. 679 - Colin Boyd, Christopher Carr:

Fair Client Puzzles from the Bitcoin Blockchain. 680 - Ronald Cramer, Ivan Damgård:

Amortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness Slack. 681 - Steven D. Galbraith, Joel Laity, Barak Shani:

Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations. 682 - Rasmus Dahlberg, Tobias Pulls, Roel Peeters:

Efficient Sparse Merkle Trees: Caching Strategies and Secure (Non-)Membership Proofs. 683 - Aurore Guillevic:

Faster individual discrete logarithms in non-prime finite fields with the NFS and FFS algorithms. 684 - W. Sean Kennedy, Vladimir Kolesnikov, Gordon T. Wilfong:

Overlaying Circuit Clauses for Secure Computation. 685 - Jian Bai, Dingkang Wang:

The Lightest 4x4 MDS Matrices over GL(4, 픽2). 686 - Martin R. Albrecht, Christian Rechberger, Thomas Schneider, Tyge Tiessen, Michael Zohner:

Ciphers for MPC and FHE. 687 - Antonio Marcedone, Rafael Pass, Abhi Shelat:

Bounded KDM Security from iO and OWF. 688 - Tingting Cui, Keting Jia, Kai Fu, Shiyao Chen, Meiqin Wang:

New Automatic Search Tool for Impossible Differentials and Zero-Correlation Linear Approximations. 689 - Myrto Arapinis, Véronique Cortier, Steve Kremer:

When Are Three Voters Enough for Privacy Properties? 690 - Zvika Brakerski, David Cash, Rotem Tsabary, Hoeteck Wee:

Targeted Homomorphic Attribute Based Encryption. 691 - Jiguo Li, Hong Yuan, Yichen Zhang:

Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. 692 - Sikhar Patranabis, Debdeep Mukhopadhyay:

Identity-Based Key Aggregate Cryptosystem from Multilinear Maps. 693 - Yin Li, Xingpo Ma, Yu Zhang, Chuanda Qi:

Mastrovito form of Karatsuba Multiplier for All Trinomials. 694 - Ivan Damgård, Jesper Buus Nielsen, Michael Nielsen, Samuel Ranellucci:

Gate-scrambling Revisited - or: The TinyTable protocol for 2-Party Secure Computation. 695 - Mehmet Sabir Kiraz:

Solving the Secure Storage Dilemma: An Efficient Scheme for Secure Deduplication with Privacy-Preserving Public Auditing. 696 - Damian Vizár:

Ciphertext Forgery on HANUMAN. 697 - Zhengjun Cao, Lihua Liu:

A Note on One Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud. 698 - Zhengjun Cao, Lihua Liu:

A Note on One Privacy-Preserving Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data. 699 - Sami Saab, Pankaj Rohatgi, Craig Hampel:

Side-Channel Protections for Cryptographic Instruction Set Extensions. 700 - Matthew D. Green, Ian Miers:

Bolt: Anonymous Payment Channels for Decentralized Currencies. 701 - Jacques Patarin:

Mirror Theory and Cryptography. 702 - Sebastian R. Verschoor, Tanja Lange:

(In-)Secure messaging with the Silent Circle instant messaging protocol. 703 - Nicolas T. Courtois:

High Saturation Complete Graph Approach for EC Point Decomposition and ECDL Problem. 704 - (Withdrawn) New construction of single cycle T-function families. 705




Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID