


Остановите войну!
for scientists:


default search action
IACR Cryptology ePrint Archive, Volume 2016
Volume 2016, 2016
- Yalin Chen, Jue-Sam Chou, Hung-Shen Wu:
Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment. 1 - Ali Can Atici, Cemal Yilmaz, Erkay Savas:
Remote Cache-Timing Attack without Learning Phase. 2 - Nicolas T. Courtois:
On Splitting a Point with Summation Polynomials in Binary Elliptic Curves. 3 - Arnold Neumaier:
Bounding basis reduction properties. 4 - John Jones:
A Columnar Transposition cipher in a contemporary setting. 5 - Huijia Lin, Rafael Pass, Karn Seth, Sidharth Telang:
Indistinguishability Obfuscation with Non-trivial Efficiency. 6 - Fabrice Benhamouda, Céline Chevalier, Adrian Thillard, Damien Vergnaud:
Easing Coppersmith Methods using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness. 7 - David Chaum, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter, Alan T. Sherman:
cMix: Anonymization byHigh-Performance Scalable Mixing. 8 - Mahshid Delavar, Sattar Mirzakuchaki, Mohammad Hassan Ameri, Javad Mohajeri:
Puf-Based Solutions For Secure Communications In Advanced Metering Infrastructure (AMI). 9 - Albrecht Petzoldt, Jintai Ding, Lih-Chung Wang:
Eliminating Decryption Failures from the Simple Matrix Encryption Scheme. 10 - Michel Abdalla, Florian Bourse, Angelo De Caro, David Pointcheval:
Better Security for Functional Encryption for Inner Product Evaluations. 11 - Ariel Hamlin, Nabil Schear, Emily Shen, Mayank Varia, Sophia Yakoubov, Arkady Yerukhimovich:
Cryptography for Big Data Security. 12 - Rosario Gennaro, Steven Goldfeder, Arvind Narayanan:
Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security. 13 - Manuel Barbosa, Bernardo Portela, Guillaume Scerri, Bogdan Warinschi:
Foundations of Hardware-Based Attested Computation and Application to SGX. 14 - Ehsan Ebrahimi Targhi, Gelo Noel Tabia, Dominique Unruh:
Quantum Collision-Resistance of Non-Uniformly Distributed Functions. 15 - Alexander Schaub, Rémi Bazin, Omar Hasan, Lionel Brunie:
A trustless privacy-preserving reputation system. 16 - Helger Lipmaa, Payman Mohassel, Seyed Saeed Sadeghian:
Valiant's Universal Circuit: Improvements, Implementation, and Applications. 17 - Afonso Arriaga, Manuel Barbosa, Pooya Farshim:
Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation. 18 - Hyung Tae Lee, San Ling, Huaxiong Wang:
Analysis of Gong et al.'s CCA2-Secure Homomorphic Encryption. 19 - Yonglin Hao, Willi Meier:
Truncated Differential Based Known-Key Attacks on Round-Reduced Simon. 20 - Eli Ben-Sasson, Alessandro Chiesa, Ariel Gabizon, Madars Virza:
Quasi-Linear Size Zero Knowledge from Linear-Algebraic PCPs. 21 - Enes Pasalic, Amela Muratovic-Ribic, Samir Hodzic, Sugata Gangopadhyay:
On derivatives of polynomials over finite fields through integration. 22 - Yalin Chen, Jue-Sam Chou, I-Ching Liao:
Improved on an improved remote user authentication scheme with key agreement. 23 - Patrick McCorry, Siamak Fayyaz Shahandashti, Feng Hao:
Refund attacks on Bitcoin's Payment Protocol. 24 - Khoongming Khoo, Eugene Lee, Thomas Peyrin, Siang Meng Sim:
Human-readable Proof of the Related-Key Security of AES-128. 25 - Abhishek Chakraborty, Debdeep Mukhopadhyay:
A Practical Template Attack on MICKEY-128 2.0 Using PSO Generated IVs and LS-SVM. 26 - Henry Corrigan-Gibbs, Dan Boneh, Stuart E. Schechter:
Balloon Hashing: Provably Space-Hard Hash Functions with Data-Independent Access Patterns. 27 - Jos Wetzels, Wouter Bokslag:
Sponges and Engines: An introduction to Keccak and Keyak. 28 - Jos Wetzels, Wouter Bokslag:
Simple SIMON: FPGA implementations of the SIMON 64/128 Block Cipher. 29 - Sedat Akleylek, Nina Bindel, Johannes Buchmann, Juliane Krämer, Giorgia Azzurra Marson:
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation. 30 - Antonio de la Piedra:
Beyond the selective disclosure of ABCs on RAM-constrained devices. 31 - Janaka Alawatugoda:
On the Leakage-Resilient Key Exchange. 32 - Frederik Armknecht, Daisuke Moriyama, Ahmad-Reza Sadeghi, Moti Yung:
Towards a Unified Security Model for Physically Unclonable Functions. 33 - Jan Camenisch, Robert R. Enderlein, Stephan Krenn, Ralf Küsters, Daniel Rausch:
Universal Composition with Responsive Environments. 34 - Tal Moran, Ilan Orlov:
Proofs of Space-Time and Rational Proofs of Storage. 35 - Wentan Yi, Shaozhen Chen:
Characterizations of the Degraded Boolean Function and Cryptanalysis of the SAFER Family. 36 - Thomas P. Jakobsen, Jesper Buus Nielsen, Claudio Orlandi:
A Framework for Outsourcing of Secure Computation. 37 - Iraklis Symeonidis, Bart Preneel:
Collateral Damage in Online Social Networks: computing the significance of information collection. 38 - Muhammad Nadeem:
Standard quantum bit commitment - an indefinite commitment time. 39 - (Withdrawn) Packet Header Anomaly Detection Using Bayesian Topic Models. 40
- Preeti Kulshrestha, Arun Kumar:
A NEW UNLINKABLE SECRET HANDSHAKES SCHEME BASED ON ZSS. 41 - Khushboo Bussi, Dhananjoy Dey, Manoj Kumar Biswas, B. K. Dass:
Neeva: A Lightweight Hash Function. 42 - Amir S. Mortazavi, Mahmoud Salmasizadeh, Amir Daneshgar:
Strong Continuous Non-malleable Encoding Schemes with Tamper-Detection. 43 - Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E. Gunnells:
Defeating the Ben-Zvi, Blackburn, and Tsaban Attack on the Algebraic Eraser. 44 - Xi Jun Lin, Lin Sun, Haipeng Qu, Xiaoshuai Zhang:
New Approaches for Secure Outsourcing Algorithm for Modular Exponentiations. 45 - Yehuda Lindell:
How To Simulate It - A Tutorial on the Simulation Proof Technique. 46 - Andrey Bogdanov, Martin M. Lauridsen, Elmar Tischhauser:
Comb to Pipeline: Fast Software Encryption Revisited. 47 - Carsten Baum, Ivan Damgård, Tomas Toft, Rasmus Winther Zakarias:
Better Preprocessing for Secure Multiparty Computation. 48 - Christoph M. Mayer:
Implementing a Toolkit for Ring-LWE Based Cryptography in Arbitrary Cyclotomic Number Fields. 49 - Masahiro Yagisawa:
Improved Fully Homomorphic Encryption with Composite Number Modulus. 50 - Jialin Huang, Serge Vaudenay, Xuejia Lai, Kaisa Nyberg:
Capacity and Data Complexity in Multidimensional Linear Attack. 51 - Gunnar Hartung, Björn Kaidel, Alexander Koch, Jessica Koch, Andy Rupp
:
Fault-Tolerant Aggregate Signatures. 52 - Khalid Javeed, Xiaojun Wang:
Speed and Area Optimized Parallel Higher-Radix Modular Multipliers. 53 - Masahiro Yagisawa:
Fully Homomorphic Public-key Encryption Based on Discrete Logarithm Problem. 54 - Aanchal Malhotra, Sharon Goldberg:
Attacking NTP's Authenticated Broadcast Mode. 55 - Ethan Heilman, Foteini Baldimtsi, Sharon Goldberg:
Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions. 56 - Durga Prasad Sahoo, Phuong Ha Nguyen, Rajat Subhra Chakraborty, Debdeep Mukhopadhyay:
Architectural Bias: a Novel Statistical Metric to Evaluate Arbiter PUF Variants. 57 - Dimitrios Poulakis:
New Lattice Attacks on DSA Schemes. 58 - Muhammad Nadeem:
Secure positioning and quantum non-local correlations. 59 - Amir Herzberg, Yehonatan Kfir:
Topology-based Plug-and-Play Key-Setup. 60 - Christina Garman, Matthew Green, Ian Miers:
Accountable Privacy for Decentralized Anonymous Payments. 61 - Raphael Bost, Pierre-Alain Fouque, David Pointcheval:
Verifiable Dynamic Symmetric Searchable Encryption: Optimality and Forward Security. 62 - Rémi Bricout, Sean Murphy, Kenneth G. Paterson, Thyla van der Merwe:
Analysing and Exploiting the Mantin Biases in RC4. 63 - Yohei Watanabe, Goichiro Hanaoka, Junji Shikata:
Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness. 64 - Yasufumi Hashimoto:
A note on Tensor Simple Matrix Encryption Scheme. 65 - Lingyue Qin, Huaifeng Chen:
Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-guessing Techniques. 66 - Henry Carter, Patrick Traynor:
OPFE: Outsourcing Computation for Private Function Evaluation. 67 - (Withdrawn) Octonion Algebra and Noise-Free Fully Homomorphic Encryption (FHE) Schemes. 68
- Gergei Bana, Rohit Chadha:
Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability. 69 - Kamil Kluczniak:
Domain-Specific Pseudonymous Signatures Revisited. 70 - Alex Biryukov, Léo Perrin, Aleksei Udovenko:
Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1. 71 - Karthikeyan Bhargavan, Christina Brzuska, Cédric Fournet, Matthew Green, Markulf Kohlweiss, Santiago Zanella Béguelin:
Downgrade Resilience in Key-Exchange Protocols. 72 - Jinsheng Zhang, Wensheng Zhang, Daji Qiao:
MU-ORAM: Dealing with Stealthy Privacy Attacks in Multi-User Data Outsourcing Services. 73 - Carmit Hazay, Muthuramakrishnan Venkitasubramaniam:
On the Power of Secure Two-Party Computation. 74 - Gajraj Kuldeep, Devendra Kumar Yadav, A. K. Sharma:
Weaknesses in Hadamard Based Symmetric Key Encryption Schemes. 75 - Xi Jun Lin, Haipeng Qu, Xiaoshuai Zhang:
New Efficient and Flexible Algorithms for Secure Outsourcing of Bilinear Pairings. 76 - Shahram Rasoolzadeh, Håvard Raddum:
Multidimensional Meet in the Middle Cryptanalysis of KATAN. 77 - Ge Bai, Ivan Damgård, Claudio Orlandi, Yu Xia:
Non-Interactive Verifiable Secret Sharing For Monotone Circuits. 78 - Qiang Tang
, Balazs Pejo, Husen Wang:
Protect both Integrity and Confidentiality in Outsourcing Collaborative Filtering Computations. 79 - Shahram Rasoolzadeh, Håvard Raddum:
Cryptanalysis of PRINCE with Minimal Data. 80 - Benjamin Dowling, Marc Fischlin, Felix Günther, Douglas Stebila:
A Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol. 81 - Olivier Blazy, David Derler, Daniel Slamanig, Raphael Spreitzer:
Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability. 82 - Sharon Goldberg, Moni Naor, Dimitrios Papadopoulos, Leonid Reyzin:
NSEC5 from Elliptic Curves: Provably Preventing DNSSEC Zone Enumeration with Shorter Responses. 83 - Qianqian Yang, Lei Hu, Siwei Sun, Ling Song:
Truncated Differential Analysis of Round-Reduced RoadRunneR Block Cipher. 84 - Scott R. Fluhrer:
Cryptanalysis of ring-LWE based key exchange with key share reuse. 85 - Victor Costan, Srinivas Devadas:
Intel SGX Explained. 86 - Christina Brzuska, Håkon Jacobsen, Douglas Stebila:
Safely Exporting Keys from Secure Channels: On the security of EAP-TLS and TLS Key Exporters. 87 - Tomer Ashur, Vincent Rijmen:
On Linear Hulls and Trails in Simon. 88 - Johannes Buchmann, Florian Göpfert, Rachel Player, Thomas Wunderer:
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack. 89 - Joan Daemen:
Spectral characterization of iterating lossy mappings. 90 - Simon R. Blackburn, Matthew J. B. Robshaw:
On the Security of the Algebraic Eraser Tag Authentication Protocol. 91 - Subhadeep Banik, Takanori Isobe:
Cryptanalysis of the Full Spritz Stream Cipher. 92 - Ágnes Kiss, Thomas Schneider:
Valiant's Universal Circuit is Practical. 93 - Romain Gay, Dennis Hofheinz, Eike Kiltz, Hoeteck Wee:
Tightly Secure CCA-Secure Encryption without Pairings. 94 - Dingfeng Ye, Peng Liu:
Obfuscation without Multilinear Maps. 95 - Bing Sun, Meicheng Liu, Jian Guo, Vincent Rijmen, Ruilin Li:
Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis. 96 - Shashi Kant Pandey, Prasanna Raghaw Mishra, B. K. Dass:
A Maiorana-McFarland Construction of a GBF on Galois ring. 97 - Stefan Kölbl, Martin M. Lauridsen, Florian Mendel, Christian Rechberger:
Haraka - Efficient Short-Input Hashing for Post-Quantum Applications. 98 - Michael Clear, Ciaran McGoldrick:
Attribute-Based Fully Homomorphic Encryption with a Bounded Number of Inputs. 99 - Joël Alwen, Binyi Chen, Chethan Kamath, Vladimir Kolmogorov, Krzysztof Pietrzak, Stefano Tessaro:
On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model. 100 - Benoît Libert, San Ling, Fabrice Mouhartem, Khoa Nguyen, Huaxiong Wang:
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions. 101 - Sanjam Garg
, Omkant Pandey, Akshayaram Srinivasan, Mark Zhandry:
Breaking the Sub-Exponential Barrier in Obfustopia. 102 - Nicolas T. Courtois, Guangyan Song, Ryan Castellucci:
Speed Optimizations in Bitcoin Key Recovery Attacks. 103 - Jos Wetzels:
Open Sesame: The Password Hashing Competition and Argon2. 104 - Kristian Gjøsteen, Martin Strand:
Fully homomorphic encryption must be fat or ugly? 105 - Ivan Damgård, Helene Haagh, Claudio Orlandi:
Access Control Encryption: Enforcing Information Flow with Cryptography. 106 - Hitesh Tewari, Arthur Hughes:
Fully Anonymous Transferable Ecash. 107 - Alex Davidson, Carlos Cid:
Computing Private Set Operations with Linear Complexities. 108 - Ivan Damgård, Tomas Toft, Rasmus Winther Zakarias:
Fast Multiparty Multiplications from shared bits. 109 - Navid Alamati, Chris Peikert:
Three's Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE. 110 - Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang:
Scalable and Secure Logistic Regression via Homomorphic Encryption. 111 - Dario Fiore, Anca Nitulescu:
On the (In)security of SNARKs in the Presence of Oracles. 112 - Serge Fehr, Max Fillinger:
On the Composition of Two-Prover Commitments, and Applications to Multi-Round Relativistic Commitments. 113 - Mark Zhandry:
The Magic of ELFs. 114 - Joël Alwen, Jeremiah Blocki:
Efficiently Computing Data-Independent Memory-Hard Functions. 115 - Eli Ben-Sasson, Alessandro Chiesa, Nicholas Spooner:
Interactive Oracle Proofs. 116 - Venkata Koppula, Brent Waters:
Circular Security Counterexamples for Arbitrary Length Cycles from LWE. 117 - Zvika Brakerski, Vinod Vaikuntanathan:
Circuit-ABE from LWE: Unbounded Attributes and Semi-Adaptive Security. 118 - Christof Beierle, Thorsten Kranz, Gregor Leander:
Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices. 119 - Ignacio Cascudo, Ivan Damgård, Felipe Lacerda, Samuel Ranellucci:
Oblivious Transfer from Any Non-Trivial Elastic Noisy Channels via Secret Key Agreement. 120 - (Withdrawn) Tightly-Secure Pseudorandom Functions via Work Factor Partitioning. 121
- Shay Gueron, Nicky Mouha:
Simpira v2: A Family of Efficient Permutations Using the AES Round Function. 122 - Michel Abdalla, Mario Cornejo, Anca Nitulescu, David Pointcheval:
Robust Password-Protected Secret Sharing. 123 - Pierrick Gaudry, Laurent Grémy, Marion Videau:
Collecting relations for the Number Field Sieve in GF(p6). 124 - Daniel Apon, Xiong Fan, Feng-Hao Liu:
Fully-Secure Lattice-Based IBE as Compact as PKE. 125 - Emre Yüce, Ali Aydin Selçuk:
Server Notaries: A Complementary Approach to the Web PKI Trust Model. 126 - Martin R. Albrecht, Shi Bai, Léo Ducas:
A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and Graded Encoding Schemes. 127 - Geoffroy Couteau, Thomas Peters, David Pointcheval:
Removing the Strong RSA Assumption from Arguments over the Integers. 128 - Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer:
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs. 129 - Loubna Ghammam, Emmanuel Fouotsa:
On the Computation of the Optimal Ate Pairing at the 192-bit Security Level. 130 - Itai Dinur:
New Attacks on the Concatenation and XOR Hash Combiners. 131 - Shahram Rasoolzadeh, Håvard Raddum:
Cryptanalysis of 6-round PRINCE using 2 Known Plaintexts. 132