default search action
IACR Cryptology ePrint Archive, Volume 2019
Volume 2019, 2019
- Ilia A. Lebedev, Kyle Hogan, Jules Drean, David Kohlbrenner, Dayeol Lee, Krste Asanovic, Dawn Song, Srinivas Devadas:
Sanctorum: A lightweight security monitor for secure enclaves. 1 - Jianye Huang, Qiong Huang:
Leakage-Resilient Group Signature: Definitions and Constructions. 2 - (Withdrawn) Secure and Effective Logic Locking for Machine Learning Applications. 3
- Guillaume Dabosville, Houssem Maghrebi, Alexis Lhuillery, Julien Bringer, Thanh-Ha Le:
On the Bright Side of Darkness: Side-Channel Based Authentication Protocol Against Relay Attacks. 4 - Lilas Alrahis, Muhammad Yasin, Hani H. Saleh, Baker Mohammad, Mahmoud Al-Qutayri, Ozgur Sinanoglu:
ScanSAT: Unlocking Obfuscated Scan Chains. 5 - Antonio Marcedone, Rafael Pass, Abhi Shelat:
Minimizing Trust in Hardware Wallets with Two Factor Signatures. 6 - Matthias Hamann, Matthias Krause:
Tight Security Bounds for Generic Stream Cipher Constructions. 7 - Jingyu Pan, Shivam Bhasin, Fan Zhang, Kui Ren:
One Fault is All it Needs: Breaking Higher-Order Masking with Persistent Fault Analysis. 8 - Qian Guo, Thomas Johansson, Erik Mårtensson, Paul Stankovski Wagner:
On the Asymptotics of Solving the LWE Problem Using Coded-BKW with Sieving. 9 - Rodrigo Abarzúa, Claudio Valencia Cordero, Julio López:
Survey for Performance & Security Problems of Passive Side-channel Attacks Countermeasures in ECC. 10 - Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenneth G. Paterson:
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks. 11 - Sihem Mesnager, Kwang Ho Kim, Dujin Jo, Junyop Choe, Munhyon Han, Dok Nam Lee:
A Proof of the Beierle-Kranz-Leander's Conjecture related to Lightweight Multiplication in F2n. 12 - Changhai Ou, Siew-Kei Lam:
Full Collision Attack: Pushing the Limits of Exhaustible Key Spaces. 13 - Gaurav Panwar, Satyajayant Misra, Roopa Vishwanathan:
BlAnC: Blockchain-based Anonymous and Decentralized Credit Networks. 14 - Thomas Pornin, Thomas Prest:
More Efficient Algorithms for the NTRU Key Generation using the Field Norm. 15 - Yevgeniy Dodis, Paul Grubbs, Thomas Ristenpart, Joanne Woodage:
Fast Message Franking: From Invisible Salamanders to Encryptment. 16 - Sai Krishna Deepak Maram, Fan Zhang, Lun Wang, Andrew Low, Yupeng Zhang, Ari Juels, Dawn Song:
CHURP: Dynamic-Committee Proactive Secret Sharing. 17 - Yunhua Wen, Shengli Liu, Dawu Gu:
Generic Constructions of Robustly Reusable Fuzzy Extractor. 18 - Chunning Zhou, Wentao Zhang, Tianyou Ding, Zejun Xiang:
Improving the MILP-based Security Evaluation Algorithms against Differential Cryptanalysis Using Divide-and-Conquer Approach. 19 - Michel Abdalla, Fabrice Benhamouda, Markulf Kohlweiss, Hendrik Waldner:
Decentralizing Inner-Product Functional Encryption. 20 - Ilya Aldanov:
CryptoNote+. 21 - Anthony Demeri, Thomas Conroy, Alex Nolan, William Diehl:
The BIG Cipher: Design, Security Analysis, and Hardware-Software Optimization Techniques. 22 - Joachim Breitner, Nadia Heninger:
Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies. 23 - Yalin Chen, Jue-Sam Chou, Fang-Qi Zhou:
A publicly verifiable quantum signature scheme based on asymmetric quantum cryptography. 24 - Yu Liu, Huicong Liang, Muzhou Li, Luning Huang, Kai Hu, Chenhe Yang, Meiqin Wang:
STP Models of Optimal Differential and Linear Trail for S-box Based Ciphers. 25 - Ben Smyth, Yoshikazu Hanatani:
Non-malleable encryption with proofs of plaintext knowledge and applications to voting. 26 - Lydia Garms, Anja Lehmann:
Group Signatures with Selective Linkability. 27 - Mathias Hall-Andersen, David Wong, Nick Sullivan, Alishah Chator:
nQUIC: Noise-Based QUIC Packet Protection. 28 - (Withdrawn) Upper Bound on $\lambda_1(\Lambda^{\bot}(\mathbf A))$. 29
- (Withdrawn) Analysis of Two Countermeasures against the Signal Leakage Attack. 30
- Rishab Goyal, Satyanarayana Vusirikala, Brent Waters:
Collusion Resistant Broadcast and Trace from Positional Witness Encryption. 31 - Steven D. Galbraith, Jake Massimo, Kenneth G. Paterson:
Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation. 32 - Zhedong Wang, Xiong Fan, Feng-Hao Liu:
FE for Inner Products and Its Application to Decentralized ABE. 33 - Myrto Arapinis, Andriana Gkaniatsou, Dimitris Karakostas, Aggelos Kiayias:
A Formal Treatment of Hardware Wallets. 34 - Carsten Baum, Daniele Cozzo, Nigel P. Smart:
Using TopGear in Overdrive: A more efficient ZKPoK for SPDZ. 35 - Shuichi Katsumata, Shota Yamada:
Non-Zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR. 36 - Aron Gohr:
Improving Attacks on Speck32/64 using Deep Learning. 37 - Aijun Ge, Puwen Wei:
Identity-based Broadcast Encryption with Efficient Revocation. 38 - Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Fully Invisible Protean Signatures Schemes. 39 - Vadim Lyubashevsky, Gregor Seiler:
NTTRU: Truly Fast NTRU Using NTT. 40 - Bartosz Zoltak:
Message Authentication (MAC) Algorithm For The VMPC-R (RC4-like) Stream Cipher. 41 - Lisa Kohl:
Hunting and Gathering - Verifiable Random Functions from Standard Assumptions with Short Proofs. 42 - Qian Guo, Thomas Johansson, Alexander Nilsson:
A Generic Attack on Lattice-based Schemes using Decryption Errors with Application to ss-ntru-pke. 43 - Ahmad Almorabea:
Toha Key Hardened Function. 44 - Ryo Nishimaki, Takashi Yamakawa:
Leakage-resilient Identity-based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio. 45 - Alan Szepieniec, Bart Preneel:
Block-Anti-Circulant Unbalanced Oil and Vinegar. 46 - Kanad Basu, Deepraj Soni, Mohammed Nabeel, Ramesh Karri:
NIST Post-Quantum Cryptography- A Hardware Evaluation Study. 47 - Eyal Kushilevitz, Tamer Mour:
Sub-logarithmic Distributed Oblivious RAM with Small Block Size. 48 - Lingchen Li, Wenling Wu, Yafei Zheng, Lei Zhang:
The Relationship between the Construction and Solution of the MILP Models and Applications. 49 - Takahiro Matsuda, Kenta Takahashi, Takao Murakami, Goichiro Hanaoka:
Improved Security Evaluation Techniques for Imperfect Randomness from Arbitrary Distributions. 50 - Daode Zhang, Jie Li, Bao Li, Xianhui Lu, Haiyang Xue, Dingding Jia, Yamin Liu:
Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy. 51 - Haodong Jiang, Zhenfeng Zhang, Zhi Ma:
Key Encapsulation Mechanism with Explicit Rejection in the Quantum Random Oracle Model. 52 - (Withdrawn) A New Code-based Signature Scheme with Shorter Public Key. 53
- Mathieu Carbone, Vincent Conin, Marie-Angela Cornelie, François Dassance, Guillaume Dufresne, Cécile Dumas, Emmanuel Prouff, Alexandre Venelli:
Deep Learning to Evaluate Secure RSA Implementations. 54 - Sandro Coretti, Antonio Faonio, Daniele Venturi:
Rate-Optimizing Compilers for Continuously Non-Malleable Codes. 55 - Ward Beullens, Hoeteck Wee:
Obfuscating simple functionalities from knowledge assumptions. 56 - Rafaël del Pino, Vadim Lyubashevsky, Gregor Seiler:
Short Discrete Log Proofs for FHE and Ring-LWE Ciphertexts. 57 - Roman Langrehr, Jiaxin Pan:
Tightly secure hierarchical identity-based encryption. 58 - Yuanqi Shen, You Li, Amin Rezaei, Shuyu Kong, David Dlott, Hai Zhou:
BeSAT: Behavioral SAT-based Attack on Cyclic Logic Encryption. 59 - Amin Rezaei, You Li, Yuanqi Shen, Shuyu Kong, Hai Zhou:
CycSAT-Unresolvable Cyclic Logic Encryption Using Unreachable States. 60 - Yuanqi Shen, You Li, Shuyu Kong, Amin Rezaei, Hai Zhou:
SigAttack: New High-level SAT-based Attack on Logic Encryptions. 61 - Michael Clear, Ciaran McGoldrick:
Additively Homomorphic IBE from Higher Residuosity. 62 - Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, Ivan Pryvalov:
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup. 63 - Keita Emura, Takuya Hayashi:
A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Application to Identity Management. 64 - Jan Camenisch, Manu Drijvers, Björn Tackmann:
Multi-Protocol UC and its Use for Building Modular and Efficient Protocols. 65 - Alessandra Scafuro, Luisa Siniscalchi, Ivan Visconti:
Publicly Verifiable Proofs from Blockchains. 66 - George Teseleanu:
Managing Your Kleptographic Subscription Plan. 67 - Michael Walter:
Sampling the Integers with Low Relative Error. 68 - Jan Czajkowski, Andreas Hülsing, Christian Schaffner:
Quantum Indistinguishability of Random Sponges. 69 - Sam M. Werner, Paul J. Pritz, Alexei Zamyatin, William J. Knottenbelt:
Uncle Traps: Harvesting Rewards in a Queue-based Ethereum Mining Pool. 70 - Zhilin Zhang, Ke Wang, Weipeng Lin, Ada Wai-Chee Fu, Raymond Chi-Wing Wong:
Repeatable Oblivious Shuffling of Large Outsourced Data Blocks. 71 - Alex Vazquez:
ZeroCT: Improving ZeroCoin with Confidential Transactions and more. 72 - Cristian Hristea, Ferucio Laurentiu Tiplea:
Destructive Privacy and Mutual Authentication in Vaudenay's RFID Model. 73 - Chun Guo, Jonathan Katz, Xiao Wang, Yu Yu:
Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers. 74 - Aurélie Bauer, Henri Gilbert, Guénaël Renault, Mélissa Rossi:
Assessment of the Key-Reuse Resilience of NewHope. 75 - Matthieu Rivain, Junwei Wang:
Analysis and Improvement of Differential Computation Attacks against Internally-Encoded White-Box Implementations. 76 - Michael Scott:
Pairing Implementation Revisited. 77 - Alan Kaminsky:
Testing the Randomness of Cryptographic Function Mappings. 78 - Kangquan Li, Longjiang Qu, Bing Sun, Chao Li:
New Results about the Boomerang Uniformity of Permutation Polynomials. 79 - Aner Ben-Efraim, Eran Omri:
Turbospeedz: Double Your Online SPDZ! Improving SPDZ using Function Dependent Preprocessing. 80 - Stephan Krenn, Kai Samelin, Christoph Striecks:
Practical Group-Signatures with Privacy-Friendly Openings. 81 - Nils Fleischhacker, Giulio Malavolta, Dominique Schröder:
Arithmetic Garbling from Bilinear Maps. 82 - Zhen Liu, Yanbin Pan, Zhenfei Zhang:
Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15. 83 - Peter T. Breuer:
An Information Obfuscation Calculus for Encrypted Computing. 84 - Erdem Alkim, Paulo S. L. M. Barreto, Nina Bindel, Juliane Krämer, Patrick Longa, Jefferson E. Ricardini:
The Lattice-Based Digital Signature Scheme qTESLA. 85 - George Teseleanu:
Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG. 86 - Laltu Sardar, Sushmita Ruj:
The Secure Link Prediction Problem. 87 - Nir Drucker, Shay Gueron:
Continuous Key Agreement with Reduced Bandwidth. 88 - Martin R. Albrecht, Léo Ducas, Gottfried Herold, Elena Kirshanova, Eamonn W. Postlethwaite, Marc Stevens:
The General Sieve Kernel and New Records in Lattice Reduction. 89 - Hayo Baan, Sauvik Bhattacharya, Scott R. Fluhrer, Óscar García-Morchón, Thijs Laarhoven, Ronald Rietman, Markku-Juhani O. Saarinen, Ludo Tolhuizen, Zhenfei Zhang:
Round5: Compact and Fast Post-Quantum Public-Key Encryption. 90 - Hongda Li, Dongxue Pan, Peifang Ni:
Efficient Zero-Knowledge for NP from Secure Two-Party Computation. 91 - Léo Perrin:
Partitions in the S-Box of Streebog and Kuznyechik. 92 - (Withdrawn) Key Encapsulation Mechanism From Modular Multivariate Linear Equations. 93
- Aron Gohr, Sven Jacob, Werner Schindler:
CHES 2018 Side Channel Contest CTF - Solution of the AES Challenges. 94 - Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean, Baptiste Lambin:
Variants of the AES Key Schedule for Better Truncated Differential Bounds. 95 - Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin, Brice Minaud:
On Recovering Affine Encodings in White-Box Implementations. 96 - Patrick Derbez, Pierre-Alain Fouque, Baptiste Lambin:
Linearly equivalent S-boxes and the Division Property. 97 - Pedro Branco:
A Post-Quantum UC-Commitment Scheme in the Global Random Oracle Model from Code-Based Assumptions. 98 - Mary Maller, Sean Bowe, Markulf Kohlweiss, Sarah Meiklejohn:
Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings. 99 - Wei-Lun Huang, Jiun-Peng Chen, Bo-Yin Yang:
Correlation Power Analysis on NTRU Prime and Related Countermeasures. 100 - Sergiu Carpov, Nicolas Gama, Mariya Georgieva, Juan Ramón Troncoso-Pastoriza:
Privacy-preserving semi-parallel logistic regression training with Fully Homomorphic Encryption. 101 - Hisham S. Galal, Amr M. Youssef:
Trustee: Full Privacy Preserving Vickrey Auction on top of Ethereum. 102 - Samuel Jaques, John M. Schanck:
Quantum cryptanalysis in the RAM model: Claw-finding attacks on SIKE. 103 - Naomi Farley, Robert Fitzpatrick, Duncan Jones:
BADGER - Blockchain Auditable Distributed (RSA) key GEneRation. 104 - Antonio Faonio, Daniele Venturi:
Non-Malleable Secret Sharing in the Computational Setting: Adaptive Tampering, Noisy-Leakage Resilience, and Improved Rate. 105 - Hongbing Wang, Yunlei Zhao:
Identity-Based Higncryption. 106 - Shun Li, Siwei Sun, Chaoyun Li, Zihao Wei, Lei Hu:
Constructing Low-latency Involutory MDS Matrices with Lightweight Circuit. 107 - Navid Alamati, Hart Montgomery, Sikhar Patranabis, Arnab Roy:
Minicrypt Primitives with Algebraic Structure and Applications. 108 - Ahmet Can Mert, Erdinç Öztürk, Erkay Savas:
Design and Implementation of a Fast and Scalable NTT-Based Polynomial Multiplier Architecture. 109 - Suhri Kim, Kisoon Yoon, Young-Ho Park, Seokhie Hong:
Optimized Method for Computing Odd-Degree Isogenies on Edwards Curves. 110 - Yin Li, Yu Zhang, Xingpo Ma, Chuanda Qi:
On the Complexity of non-recursive n-term Karatsuba Multiplier for Trinomials. 111 - Bjørn Møller Greve, Øyvind Ytrehus, Håvard Raddum:
Variable Elimination - a Tool for Algebraic Cryptanalysis. 112 - Ferucio Laurentiu Tiplea, Cristian Hristea:
Privacy and Reader-first Authentication in Vaudenay's RFID Model with Temporary State Disclosure. 113 - Rosario Gennaro, Steven Goldfeder:
Fast Multiparty Threshold ECDSA with Fast Trustless Setup. 114 - Nir Bitansky, Iftach Haitner, Ilan Komargodski, Eylon Yogev:
Distributional Collision Resistance Beyond One-Way Functions. 115 - Hao Chen, Ilaria Chillotti, Yongsoo Song:
Multi-Key Homomophic Encryption from TFHE. 116 - Geoffroy Couteau, Michael Reichle:
Non-Interactive Keyed-Verification Anonymous Credentials. 117 - (Withdrawn) Defeating the Hart, Kim, Micheli, Pascuel-Perez, Petit, Quek Attack on WalnutDSA(TM). 118
- Ariel Gabizon:
On the security of the BCTV Pinocchio zk-SNARK variant. 119 - Keita Xagawa:
Cryptanalysis of a New Code-based Signature Scheme with Shorter Public Key in PKC 2019. 120 - Santosh Ghosh, Andrew H. Reinders, Rafael Misoczki, Manoj R. Sastry:
Anonymous Attestation for IoT. 121 - Santosh Ghosh, Rafael Misoczki, Manoj R. Sastry:
Lightweight Post-Quantum-Secure Digital Signature Approach for IoT Motes. 122 - Liliya R. Akhmetzyanova, Evgeny K. Alekseev, Grigory Karpunin, Vladislav Nozdrunov:
Security of Multilinear Galois Mode (MGM). 123 - Douglas Wikström:
Anomalous Look at Provable Security. 124 - (Withdrawn) Combinatorial Primality Test. 125
- Amirhossein Ebrahimi Moghaddam, Zahra Ahmadian:
New Automatic search method for Truncated-differential characteristics: Application to Midori and SKINNY. 126 - Avijit Dutta, Mridul Nandi, Suprita Talnikar:
Beyond Birthday Bound Secure MAC in Faulty Nonce Model. 127 - Junichi Tomida:
Tightly Secure Inner Product Functional Encryption: Multi-Input and Function-Hiding Constructions. 128 - Elette Boyle, Lisa Kohl, Peter Scholl:
Homomorphic Secret Sharing from Lattices Without FHE. 129 - Greg Zaverucha, Dan Shumow:
Are Certificate Thumbprints Unique? 130 - Assi Barak, Daniel Escudero, Anders P. K. Dalskov, Marcel Keller:
Secure Evaluation of Quantized Neural Networks. 131 - Olivier Bronchain, Julien M. Hendrickx, Clément Massart, Alex Olshevsky, François-Xavier Standaert:
Leakage Certification Revisited: Bounding Model Errors in Side-Channel Security Evaluations. 132