


Остановите войну!
for scientists:


default search action
IACR Cryptology ePrint Archive, Volume 2017
Volume 2017, 2017
- Jorge Luis Villar:
Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems. 1 - (Withdrawn) Generalized Tweakable Even-Mansour Cipher with Strong Security Guarantee and Its Application to Authenticated Encryption. 2
- Mike Hamburg:
The STROBE protocol framework. 3 - Sungwook Kim, Jinsu Kim, Jae Hong Seo:
A New Approach for Practical Function-Private Inner Product Encryption. 4 - Bahram Rashidi, Reza Rezaeian Farashahi, Sayed Masoud Sayedi:
High-speed Hardware Implementations of Point Multiplication for Binary Edwards and Generalized Hessian Curves. 5 - Eduardo Ruiz Duarte:
Reduced Mumford divisors of a genus 2 curve through its jacobian function field. 6 - Hossein Arabnezhad-Khanoki, Babak Sadeghiyan, Josef Pieprzyk:
Algebraic Attack Efficiency versus S-box Representation. 7 - Joshua Gancher, Adam Groce, Alex Ledger:
Externally Verifiable Oblivious RAM. 8 - Georg Fuchsbauer, Romain Gay, Lucas Kowalczyk, Claudio Orlandi:
Access Control Encryption for Equality, Comparison, and More. 9 - Wutichai Chongchitmate, Rafail Ostrovsky:
Circuit-Private Multi-Key FHE. 10 - Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures. 11 - Venkata Koppula, Andrew Poelstra, Brent Waters:
Universal Samplers with Fast Verification. 12 - Meilof Veeningen:
Pinocchio-Based Adaptive zk-SNARKs and Secure/Correct Adaptive Function Evaluation. 13 - Tommaso Gagliardoni, Nikolaos P. Karvelas, Stefan Katzenbeisser:
ORAMs in a Quantum World. 14 - Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi:
Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-Malleable Codes. 15 - Yevgeniy Dodis, Jonathan Katz, John P. Steinberger, Aishwarya Thiruvengadam, Zhe Zhang:
Provable Security of Substitution-Permutation Networks. 16 - Gottfried Herold, Elena Kirshanova:
Improved Algorithms for the Approximate k-List Problem in Euclidean Norm. 17 - Nir Bitansky:
Verifiable Random Functions from Non-Interactive Witness-Indistinguishable Proofs. 18 - Loi Luu, Yaron Velner, Jason Teutsch, Prateek Saxena:
SMART POOL : Practical Decentralized Pooled Mining. 19 - Olivier Levillain, Maxence Tury, Nicolas Vivet:
concerto: A Methodology Towards Reproducible Analyses of TLS Datasets. 20 - Rishab Goyal, Susan Hohenberger, Venkata Koppula, Brent Waters:
A Generic Approach to Constructing and Proving Verifiable Random Functions. 21 - Jan Camenisch, Anja Lehmann:
Privacy for Distributed Databases via (Un)linkable Pseudonyms. 22 - Nuttapong Attrapadung:
Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits. 23 - Mohamed Ahmed Abdelraheem, Tobias Andersson, Christian Gehrmann:
Inference and Record-Injection Attacks on Searchable Encrypted Relational Databases. 24 - Charanjit S. Jutla, Arnab Roy:
Improved Structure Preserving Signatures under Standard Bilinear Assumptions. 25 - Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam:
Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model. 26 - Carmit Hazay, Muthuramakrishnan Venkitasubramaniam:
Scalable Multi-Party Private Set-Intersection. 27 - (Withdrawn) A Decentralized PKI In A Mobile Ecosystem. 28
- Gene Itkis, Emily Shen, Mayank Varia, David Wilson, Arkady Yerukhimovich:
Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions. 29 - Jonathan Katz, Samuel Ranellucci, Xiao Wang:
Authenticated Garbling and Communication-Efficient, Constant-Round, Secure Two-Party Computation. 30 - Marc Beunardeau, Houda Ferradi, Rémi Géraud, David Naccache:
Honey Encryption for Language. 31 - Mohamed Sabt, Jacques Traoré:
Cryptanalysis of GlobalPlatform Secure Channel Protocols. 32 - Peter Pessl:
Analyzing the Shuffling Side-Channel Countermeasure for Lattice-Based Signatures. 33 - Alex Biryukov, Aleksei Udovenko, Vesselin Velichkov:
Analysis of the NORX Core Permutation. 34 - Hervé Chabanne, Amaury de Wargny, Jonathan Milgram, Constance Morel, Emmanuel Prouff:
Privacy-Preserving Classification on Deep Neural Network. 35 - Benny Applebaum, Naama Haramaty, Yuval Ishai, Eyal Kushilevitz, Vinod Vaikuntanathan:
Low-Complexity Cryptographic Hash Functions. 36 - Daniel J. Bernstein, Chitchanok Chuengsatiansup, Tanja Lange:
Double-base scalar multiplication revisited. 37 - Fabrice Benhamouda, Florian Bourse, Helger Lipmaa:
CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions. 38 - Iraklis Symeonidis, Abdelrahaman Aly, Mustafa A. Mustafa, Bart Preneel:
PePTCAP: A Privacy-enhancing Protocol for(Temporary) Car Access Provision. 39 - Aggelos Kiayias, Feng-Hao Liu, Yiannis Tselekounis:
Practical Non-Malleable Codes from ℓ-more Extractable Hash Functions. 40 - Yongge Wang, Qutaibah M. Malluhi:
Reducing Garbled Circuit Size While Preserving Circuit Gate Privacy. 41 - Yuanxi Dai, Yannick Seurin, John P. Steinberger, Aishwarya Thiruvengadam:
Five Rounds are Sufficient and Necessary for the Indifferentiability of Iterated Even-Mansour. 42 - Foteini Baldimtsi, Jan Camenisch, Maria Dubovitskaya, Anna Lysyanskaya, Leonid Reyzin, Kai Samelin, Sophia Yakoubov:
Accumulators with Applications to Anonymity-Preserving Revocation. 43 - Matthew McKague, David M. Eyers:
Anonymous contribution of data. 44 - Essam Ghadafi:
Efficient Round-Optimal Blind Signatures in the Standard Model. 45 - Matthieu Giraud, Alexandre Anzala-Yamajako, Olivier Bernard, Pascal Lafourcade:
Practical Passive Leakage-Abuse Attacks Against Symmetric Searchable Encryption. 46 - Martin R. Albrecht:
On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL. 47 - Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David M. Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun:
ROTE: Rollback Protection for Trusted Execution. 48 - Rachid El Bansarkhani:
LARA - A Design Concept for Lattice-based Encryption. 49 - Peter T. Breuer:
An Obfuscating Compiler. 50 - Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai:
A note on VRFs from Verifiable Functional Encryption. 51 - Boris Skoric:
A short note on the security of Round-Robin Differential Phase-Shift QKD. 52 - Dimitar Jetchev, Benjamin Wesolowski:
Horizontal isogeny graphs of ordinary abelian varieties and the discrete logarithm problem. 53 - Javier Herranz:
Attribute-Based Encryption Implies Identity-Based Encryption. 54 - Prabhat Kushwaha, Ayan Mahalanobis:
A Probabilistic Baby-Step Giant-Step Algorithm. 55 - Feng Hao, Dylan Clarke, Brian Randell, Siamak F. Shahandashti:
Verifiable Classroom Voting in Practice. 56 - Mathias Wagner, Stefan Heyse:
Single-Trace Template Attack on the DES Round Keys of a Recent Smart Card. 57 - Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E. Gunnells:
WalnutDSA(TM): A Quantum Resistant Group Theoretic Digital Signature Algorithm. 58 - Kamalesh Acharya, Ratna Dutta:
Adaptively Secure Recipient Revocable Broadcast Encryption with Constant size Ciphertext. 59 - Jacqueline Brendel, Marc Fischlin:
Zero Round-Trip Time for the Extended Access Control Protocol. 60 - Tibor Jager, Rafael Kurek:
Continuous Collision Resistance and its Applications. 61 - Arash Afshar, Payman Mohassel, Mike Rosulek:
Efficient Maliciously Secure Two Party Computation for Mixed Programs. 62 - Chaya Ganesh, Arpita Patra:
Optimal Extension Protocols for Byzantine Broadcast and Agreement. 63 - Yin Li, Yu Zhang:
Fast Montgomery-like Square Root Computation for All Trinomials. 64 - Daniel Benarroch, Zvika Brakerski, Tancrède Lepoint:
FHE Over the Integers: Decomposed and Batched in the Post-Quantum Regime. 65 - Seiko Arita, Sari Handa:
Subring Homomorphic Encryption. 66 - Thorsten Kleinjung, Claus Diem, Arjen K. Lenstra, Christine Priplata, Colin Stahlke:
Computation of a 768-bit prime field discrete logarithm. 67 - Guy Barwell, Daniel P. Martin, Elisabeth Oswald, Martijn Stam:
Authenticated Encryption in the Face of Protocol and Side Channel Leakage. 68 - Peter Gazi, Krzysztof Pietrzak, Michal Rybár:
The Exact Security of PMAC. 69 - Charlie Jacomme, Steve Kremer, Guillaume Scerri:
Symbolic Models for Isolated Execution Environments. 70 - Seojin Kim, HyungChul Kang, Deukjo Hong, Jaechul Sung, Seokhie Hong:
Efficient Differential Trail Searching Algorithm for ARX Block Ciphers. 71 - Carmen Kempka, Ryo Kikuchi, Koutarou Suzuki:
How to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling Schemes. 72 - Ji Won Yoon, Hyoungshick Kim, Hyun-Ju Jo, Hyelim Lee, Kwangsu Lee:
Visual Honey Encryption: Application to Steganography. 73 - Joo-Im Kim, Ji Won Yoon:
Honey Chatting: A novel instant messaging system robust to eavesdropping over communication. 74 - Benjamin Lac, Marc Beunardeau, Anne Canteaut, Jacques Fournier, Renaud Sirdey:
A First DFA on PRIDE: from Theory to Practice (extended version). 75 - Benjamin Lac, Anne Canteaut, Jacques Fournier, Renaud Sirdey:
DFA on LS-Designs with a Practical Implementation on SCREAM (extended version). 76 - Martin Ekerå, Johan Håstad:
Quantum algorithms for computing short discrete logarithms and factoring RSA integers. 77 - Andre Esser, Robert Kübler, Alexander May:
LPN Decoded. 78 - Jung Hee Cheon, Kyoohyung Han, Duhyeong Kim:
Faster Bootstrapping of FHE over the Integers. 79 - Ilan Komargodski, Gil Segev:
From Minicrypt to Obfustopia via Private-Key Functional Encryption. 80 - Ivo Kubjas, Tiit Pikma, Jan Willemson
:
Estonian Voting Verification Mechanism Revisited Again. 81 - Marc Fischlin, Felix Günther:
Replay Attacks on Zero Round-Trip Time: The Case of the TLS 1.3 Handshake Candidates. 82 - Anna Johnston:
Shor's Algorithm and Factoring: Don't Throw Away the Odd Orders. 83 - Laszlo Hars:
Hardware Bit-Mixers. 84 - Laszlo Hars:
Information Security Applications of Bit-Mixers. 85 - David Derler, Sebastian Ramacher, Daniel Slamanig:
Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation. 86 - Sabyasachi Dey, Santanu Sarkar:
Cryptanalysis of full round Fruit. 87 - Subhamoy Maitra, Akhilesh Siddhanti:
A Differential Fault Attack on Plantlet. 88 - Yuri L. Borissov, Peter G. Boyvalenkov, Robert Tsenkov:
On a Linear Cryptanalysis of a Family of Modified DES Ciphers with Even Weight S-boxes. 89 - Saiyu Qi, Yichen Li, Yuanqing Zheng, Yong Qi:
Crypt-DAC: Cryptographically Enforced Dynamic Access Control in the Cloud. 90 - Vincent Herbert, Caroline Fontaine:
Software Implementation of 2-Depth Pairing-based Homomorphic Encryption Scheme. 91 - Atsushi Takayasu, Yao Lu, Liqiang Peng:
Small CRT-Exponent RSA Revisited. 92 - Vasyl Ustimenko:
On new multivariate cryptosystems based on hidden Eulerian equations over finite fields. 93 - Shalev Ben-David, Or Sattath:
Quantum Tokens for Digital Signatures. 94 - Gunnar Hartung:
Attacks on Secure Logging Schemes. 95 - Shota Yamada:
Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalized Partitioning Techniques. 96 - Claude Carlet, Pierrick Méaux, Yann Rotella:
Boolean functions with restricted input and their robustness; application to the FLIP cipher. 97 - Vanesa Daza, Nikolaos Makriyannis:
Designing Fully Secure Protocols for Secure Two-Party Computation of Constant-Domain Functions. 98 - Dimitrios Papadopoulos, Duane Wessels, Shumon Huque, Moni Naor, Jan Vcelák, Leonid Reyzin, Sharon Goldberg:
Can NSEC5 be practical for DNSSEC deployments? 99 - Dan Boneh, Sam Kim, Hart William Montgomery:
Private Puncturable PRFs From Standard Lattice Assumptions. 100 - Jérémy Jean, Thomas Peyrin, Siang Meng Sim:
Optimizing Implementations of Lightweight Building Blocks. 101 - Serge Fehr, Louis Salvail:
Quantum Authentication and Encryption with Key Recycling. 102 - Hannes Groß, Stefan Mangard:
Reconciling d+1Masking in Hardware and Software. 103 - Shai Halevi, Tzipora Halevi, Victor Shoup, Noah Stephens-Davidowitz:
Implementing BP-Obfuscation Using Graph-Induced Encoding. 104 - Ling Yang, Fuyang Fang, Xianhui Lu, Wen Tao Zhu, Qiongxiao Wang, Shen Yan, Shiran Pan:
A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem. 105 - Ivan Puddu, Alexandra Dmitrienko, Srdjan Capkun:
μchain: How to Forget without Hard Forks. 106 - Erik-Oliver Blass, Guevara Noubir:
Secure Logging with Crash Tolerance. 107 - Elad Carmon, Jean-Pierre Seifert, Avishai Wool:
Photonic Side Channel Attacks Against RSA. 108 - Yevgeniy Dodis, Dario Fiore:
Unilaterally-Authenticated Key Exchange. 109 - Patrick McCorry, Siamak F. Shahandashti, Feng Hao:
A Smart Contract for Boardroom Voting with Maximum Voter Privacy. 110 - Jonathan Burns, Daniel Moore, Katrina Ray, Ryan Speers, Brian Vohaska:
EC-OPRF: Oblivious Pseudorandom Functions using Elliptic Curves. 111 - Xavier Bultel, Pascal Lafourcade:
Zero-Knowledge Proxy Re-Identification Revisited. 112 - Pei Luo, Konstantinos Athanasiou, Yunsi Fei, Thomas Wahl:
Algebraic Fault Analysis of SHA-3. 113 - Itay Berman, Ron D. Rothblum, Vinod Vaikuntanathan:
Zero-Knowledge Proofs of Proximity. 114 - Sietse Ringers, Eric R. Verheul, Jaap-Henk Hoepman:
An efficient self-blindable attribute-based credential scheme. 115 - Vincent Grosso, François-Xavier Standaert:
Masking Proofs are Tight (and How to Exploit it in Security Evaluations). 116 - Zhaohui Cheng:
The SM9 Cryptographic Schemes. 117 - Lorenzo Grassi, Christian Rechberger, Sondre Rønjom:
A New Structural-Differential Property of 5-Round AES. 118 - Christopher Portmann:
Quantum Authentication with Key Recycling. 119 - Rishab Goyal, Venkata Koppula, Brent Waters:
Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption. 120 - David Kohel:
Twisted μ4-normal form for elliptic curves. 121 - Vadim Lyubashevsky, Gregory Neven:
One-Shot Verifiable Encryption from Lattices. 122 - Rishab Goyal, Venkata Koppula, Brent Waters:
Separating IND-CPA and Circular Security for Unbounded Length Key Cycles. 123 - Sanjam Garg
, Susumu Kiyoshima, Omkant Pandey:
On the Exact Round Complexity of Self-Composable Two-Party Computation. 124 - Payman Mohassel, Mike Rosulek:
Non-Interactive Secure 2PC in the Offline/Online and Batch Settings. 125 - Seny Kamara, Tarik Moataz:
Boolean Searchable Symmetric Encryption with Worst-Case Sub-Linear Complexity. 126 - Prabhanjan Ananth, Aayush Jain, Amit Sahai:
Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption. 127 - Kexin Qiao, Ling Song, Meicheng Liu, Jian Guo:
New Collision Attacks on Round-Reduced Keccak. 128 - Payman Mohassel, Mike Rosulek, Alessandra Scafuro:
Sublinear Zero-Knowledge Arguments for RAM Programs. 129 - Adi Akavia, Tal Moran:
Topology-Hiding Computation Beyond Logarithmic Diameter. 130 - Albrecht Petzoldt, Alan Szepieniec, Mohamed Saied Emam Mohamed:
A Practical Multivariate Blind Signature Scheme. 131 - Roel Peeters, Jens Hermans, Aysajan Abidin:
Attacks on Karlsson and Mitrokotsa's Grouping-Proof-Distance-Bounding Protocol. 132 - Christian Badertscher, Ueli Maurer:
Composable and Robust Outsourced Storage. 133 - Ryan Stanley-Oakes:
A Provably Secure PKCS\#11 Configuration Without Authenticated Attributes. 134 - Xiong Fan, Chaya Ganesh, Vladimir Kolesnikov:
Hashing Garbled Circuits for Free. 135 - Anna Johnston:
Dispersed Cryptography and the Quotient Ring Transform. 136 - Paul Grubbs, Thomas Ristenpart, Yuval Yarom:
Modifying an Enciphering Scheme after Deployment. 137 - François-Xavier Standaert:
How (not) to Use Welch's T-test in Side-Channel Security Evaluations. 138 - David Gérault, Pascal Lafourcade, Marine Minier, Christine Solnon:
Revisiting AES Related-Key Differential Attacks with Constraint Programming. 139 - Markus Schmidt, Nina Bindel:
Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples. 140 - Dario Fiore, María Isabel González Vasco, Claudio Soriente:
Partitioned Group Password-Based Authenticated Key Exchange. 141 - Jean-François Biasse, Thomas Espitau, Pierre-Alain Fouque, Alexandre Gélin, Paul Kirchner:
Computing generator in cyclotomic integer rings, A subfield algorithm for the Principal Ideal Problem in L(1/2) and application to cryptanalysis of a FHE scheme. 142 - Ran Canetti, Yilei Chen:
Constraint-hiding Constrained PRFs for NC1 from LWE. 143