default search action
IACR Cryptology ePrint Archive, Volume 2018
Volume 2018, 2018
- Benny Applebaum, Barak Arkis:
Conditional Disclosure of Secrets and d-Uniform Secret Sharing with Constant Information Rate. 1 - Çagdas Çalik, Meltem Sönmez Turan, René Peralta:
The Multiplicative Complexity of 6-variable Boolean Functions. 2 - Moni Naor, Benny Pinkas, Eyal Ronen:
How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior. 3 - Stjepan Picek, Ioannis Petros Samiotis, Annelie Heuser, Jaehun Kim, Shivam Bhasin, Axel Legay:
On the Performance of Deep Learning for Side-channel Analysis. 4 - Xiao Wang, S. Dov Gordon, Jonathan Katz:
Simple and Efficient Two-Server ORAM. 5 - Liran Lerman, Stjepan Picek, Nikita Veshchikov, Olivier Markowitch:
Higher Order Side-Channel Attacks Resilient S-boxes. 6 - Qiong Huang, Hongbo Li:
An Efficient Public-Key Searchable Encryption Scheme Secure against Inside Keyword Guessing Attacks. 7 - Yu-Ao Chen, Xiao-Shan Gao:
Quantum Algorithms for Boolean Equation Solving and Quantum Algebraic Attack on Cryptosystems. 8 - Jérôme Courtois, Lokman A. Abbas-Turki, Jean-Claude Bajard:
Evaluation of Resilience of randomized RNS implementation. 9 - Thomas Agrikola, Dennis Hofheinz:
Interactively Secure Groups from Obfuscation. 10 - Pooya Farshim, Julia Hesse, Dennis Hofheinz, Enrique Larraia:
Graded Encoding Schemes from Obfuscation. 11 - Falk Schellenberg, Dennis R. E. Gnad, Amir Moradi, Mehdi Baradaran Tahoori:
An Inside Job: Remote Power Analysis Attacks on FPGAs. 12 - Benedikt Auerbach, Bertram Poettering:
Hashing solutions instead of generating problems: On the interactive certification of RSA moduli. 13 - Kaiyan Zheng, Peng Wang, Dingfeng Ye:
Ubiquitous Weak-key Classes of BRW-polynomial Function. 14 - Christian Badertscher, Ueli Maurer, Björn Tackmann:
On Composable Security for Digital Signatures. 15 - Murali Godi, Roopa Vishwanathan:
New Techniques for Public Key Encryption with Sender Recovery. 16 - Ben Smyth:
Verifiability of Helios Mixnet. 17 - Ariel Hamlin, Abhi Shelat, Mor Weiss, Daniel Wichs:
Multi-Key Searchable Encryption, Revisited. 18 - Daniel P. Martin, Luke Mather, Elisabeth Oswald:
Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited. 19 - Haoyu Li, Renzhang Liu, Yanbin Pan, Tianyuan Xie:
Cryptanalysis of Compact-LWE Submitted to NIST PQC Project. 20 - Yu Chen, Baodong Qin, Haiyang Xue:
Regularly Lossy Functions and Their Applications. 21 - Ali El Kaafarani, Shuichi Katsumata:
Attribute-based Signatures for Unbounded Circuits in the ROM and Efficient Instantiations from Lattices. 22 - Benedikt Auerbach, Mihir Bellare, Eike Kiltz:
Public-Key Encryption Resistant to Parameter Subversion and its Realization from Efficiently-Embeddable Groups. 23 - Federico Giacon, Felix Heuer, Bertram Poettering:
KEM Combiners. 24 - Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li:
Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures. 25 - Christopher Carr, Anamaria Costache, Gareth T. Davies, Kristian Gjøsteen, Martin Strand:
Zero-Knowledge Proof of Decryption for FHE Ciphertexts. 26 - Martin Strand:
A verifiable shuffle for the GSW cryptosystem. 27 - Muslum Ozgur Ozmen, Rouzbeh Behnia, Attila A. Yavuz:
Compact Energy and Delay-aware Authentication. 28 - Johannes Blömer, Fabian Eidens, Jakob Juhnke:
Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems. 29 - Lin Lyu, Shengli Liu, Shuai Han, Dawu Gu:
Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions. 30 - Markus Jakobsson:
Secure Remote Attestation. 31 - (Withdrawn) Publicly Verifiable Proofs of Space. 32
- Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena:
Two-Factor Authentication with End-to-End Password Security. 33 - San Ling, Khoa Nguyen, Huaxiong Wang, Yanhong Xu:
Constant-size Group Signatures from Lattices. 34 - Lucas Schabhüser, Johannes Buchmann, Patrick Struck:
A Linearly Homomorphic Signature Scheme From Weaker Assumptions. 35 - Peter Scholl:
Extending Oblivious Transfer with Low Communication via Key-Homomorphic PRFs. 36 - Georg Fuchsbauer, Romain Gay:
Weakly Secure Equivalence-Class Signatures from Standard Assumptions. 37 - Yuval Ishai, Manika Mittal, Rafail Ostrovsky:
On the Message Complexity of Secure Multiparty Computation. 38 - Gregor Seiler:
Faster AVX2 optimized NTT multiplication for Ring-LWE lattice cryptography. 39 - Seb Neumayer, Mayank Varia, Ittay Eyal:
An Analysis of Acceptance Policies For Blockchain Transactions. 40 - Takahiro Matsuda, Jacob C. N. Schuldt:
Related Randomness Security for Public Key Encryption, Revisited. 41 - Charanjit S. Jutla, Miyako Ohkubo, Arnab Roy:
Improved (Almost) Tightly-Secure Structure-Preserving Signatures. 42 - Chaya Ganesh, Yashvanth Kondi, Arpita Patra, Pratik Sarkar:
Efficient Adaptively Secure Zero-knowledge from Garbled Circuits. 43 - Tadanori Teruya, Kenji Kashiwabara, Goichiro Hanaoka:
Fast Lattice Basis Reduction Suitable for Massive Parallelization and Its Application to the Shortest Vector Problem. 44 - Jonathan Bootle, Jens Groth:
Efficient Batch Zero-Knowledge Arguments for Low Degree Polynomials. 45 - Eli Ben-Sasson, Iddo Bentov, Yinon Horesh, Michael Riabzev:
Scalable, transparent, and post-quantum secure computational integrity. 46 - Boris Ryabko, Aleksandr Soskov:
The distinguishing attack on Speck, Simon, Simeck, HIGHT and LEA. 47 - Alireza Mehrdad, Farokhlagha Moazami, Hadi Soleimany:
Impossible Differential Cryptanalysis on Deoxys-BC-256. 48 - Alex Biryukov, Aleksei Udovenko:
Attacks and Countermeasures for White-box Designs. 49 - Christian Badertscher, Fabio Banfi, Ueli Maurer:
A Constructive Perspective on Signcryption Security. 50 - Eftychios Theodorakis, John C. Mitchell:
Semantic Security Invariance under Variant Computational Assumptions. 51 - Mohammad Etemad, Mohammad Mahmoody, David Evans:
Optimizing Trees for Static Searchable Encryption. 52 - Emmanuel Prouff, Rémi Strullu, Ryad Benadjila, Eleonora Cagli, Cécile Dumas:
Study of Deep Learning Techniques for Side-Channel Analysis and Introduction to ASCAD Database. 53 - Romain Gay, Dennis Hofheinz, Lisa Kohl, Jiaxin Pan:
More Efficient (Almost) Tightly Secure Structure-Preserving Signatures. 54 - Florian Unterstein, Johann Heyszl, Fabrizio De Santis, Robert Specht, Georg Sigl:
High-Resolution EM Attacks Against Leakage-Resilient PRFs Explained - And An Improved Construction. 55 - François Gérard, Keno Merckx:
Post-Quantum Signcryption From Lattice-Based Signatures. 56 - Foteini Baldimtsi, Sharon Goldberg, Leonid Reyzin, Omar Sagga:
Certifying RSA Public Keys with an Efficient NIZK. 57 - Divesh Aggarwal, Tomasz Kazana, Maciej Obremski:
Leakage-resilient Algebraic Manipulation Detection Codes with Optimal Parameters. 58 - Chen-Dong Ye, Tian Tian:
New Insights into Divide-and-Conquer Attacks on the Round-Reduced Keccak-MAC. 59 - Abhinav Aggarwal, Yue Guo:
A Simple Reduction from State Machine Replication to Binary Agreement in Partially Synchronous or Asynchronous Networks. 60 - Pratish Datta, Tatsuaki Okamoto, Junichi Tomida:
Full-Hiding (Unbounded) Multi-Input Inner Product Functional Encryption from the k-Linear Assumption. 61 - Na-Young Ahn, Dong Hoon Lee:
Countermeasures against a side-channel attack in a kernel memory. 62 - Panos Kampanakis, Peter Panburana, Ellie Daw, Daniel Van Geest:
The Viability of Post-quantum X.509 Certificates. 63 - Sukanya Saha, Krishnendu Rarhi, Abhishek Bhattacharya:
Systematization Of A 256-Bit Lightweight Block Cipher Marvin. 64 - Claude Crépeau, Nan Yang:
New Perspectives on Multi-Prover Interactive Proofs. 65 - Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Tweaking Generic OTR to Avoid Forgery Attacks. 66 - Hao Chen, Kyoohyung Han:
Homomorphic Lower Digits Removal and Improved FHE Bootstrapping. 67 - Gregory Maxwell, Andrew Poelstra, Yannick Seurin, Pieter Wuille:
Simple Schnorr Multi-Signatures with Applications to Bitcoin. 68 - Marc Beunardeau, Aisling Connolly, Houda Ferradi, Rémi Géraud, David Naccache, Damien Vergnaud:
Reusing Nonces in Schnorr Signatures. 69 - Craig Gentry, Adam O'Neill, Leonid Reyzin:
A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures. 70 - Christoph Dobraunig, Maria Eichlseder, Thomas Korak, Stefan Mangard, Florian Mendel, Robert Primas:
Exploiting Ineffective Fault Inductions on Symmetric Cryptography. 71 - Ashrujit Ghoshal, Sikhar Patranabis, Debdeep Mukhopadhyay:
Template-based Fault Injection Analysis of Block Ciphers. 72 - Chiraag Juvekar, Vinod Vaikuntanathan, Anantha P. Chandrakasan:
GAZELLE: A Low Latency Framework for Secure Neural Network Inference. 73 - Miran Kim, Yongsoo Song, Shuang Wang, Yuhou Xia, Xiaoqian Jiang:
Secure Logistic Regression based on Homomorphic Encryption. 74 - Wenquan Bi, Xiaoyang Dong, Zheng Li, Rui Zong, Xiaoyun Wang:
MILP-aided Cube-attack-like Cryptanalysis on Keccak Keyed Modes. 75 - Daniel Dinu, Ilya Kizhvatov:
EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread. 76 - Daniele Micciancio, Michael Walter:
On the Bit Security of Cryptographic Primitives. 77 - Alexander Chepurnoy, Vasily Kharin, Dmitry Meshkov:
A Systematic Approach To Cryptocurrency Fees. 78 - Thijs Laarhoven, Artur Mariano:
Progressive lattice sieving. 79 - Benjamin Dowling, Kenneth G. Paterson:
A Cryptographic Analysis of the WireGuard Protocol. 80 - Jintai Ding, Saraswathy RV, Saed Alsayigh, Crystal Clough:
How to validate the secret of a Ring Learning with Errors (RLWE) key. 81 - Susan Hohenberger, Brent Waters:
Synchronized Aggregate Signatures from the RSA Assumption. 82 - Maki Yoshida, Satoshi Obana:
Flaws in a Verifiably Multiplicative Secret Sharing Scheme from ICITS 2017. 83 - Gideon Samid:
Threat-Adjusting Security: BitFlip as an AI-Ready, Post-Quantum cipher. 84 - Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin:
Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version). 85 - Claude Carlet, Xi Chen:
Constructing low-weight dth-order correlation-immune Boolean functions through the Fourier-Hadamard transform. 86 - Alexei Zamyatin, Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar R. Weippl, William J. Knottenbelt:
(Short Paper) A Wild Velvet Fork Appears! Inclusive Blockchain Protocol Changes in Practice. 87 - Masahiro Yagisawa:
Fully homomorphic public-key encryption with small ciphertext size. 88 - Marcos A. Simplício Jr., Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Marcos V. M. Silva:
The Unified Butterfly Effect: Efficient Security Credential Management System for Vehicular Communications. 89 - Cédric Van Rompay, Refik Molva, Melek Önen:
Secure and Scalable Multi-User Searchable Encryption. 90 - Alessandro De Piccoli, Andrea Visconti, Ottavio Giulio Rizzo:
Polynomial multiplication over binary finite fields: new upper bounds. 91 - Kerem Varici, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
Constructions of S-boxes with uniform sharing. 92 - Kenneth G. Paterson, Jacob C. N. Schuldt:
Statistical Attacks on Cookie Masking for RC4. 93 - Linh Tung Vo:
Parameterization of Edwards curves on the rational field Q with given torsion subgroups. 94 - Cees-Bart Breunesse, Ilya Kizhvatov, Ruben Muijrers, Albert Spruyt:
Towards Fully Automated Analysis of Whiteboxes: Perfect Dimensionality Reduction for Perfect Leakage. 95 - Fan Zhang, Philip Daian, Iddo Bentov, Ari Juels:
Paralysis Proofs: Safe Access-Structure Updates for Cryptocurrencies and More. 96 - Andrea Visconti, Federico Gorla:
Exploiting an HMAC-SHA-1 optimization to speed up PBKDF2. 97 - Louis Goubin, Pascal Paillier, Matthieu Rivain, Junwei Wang:
How to Reveal the Secrets of an Obscure White-Box Implementation. 98 - Ignacio Cascudo, Jaron Skovsted Gundersen, Diego Ruano:
Improved Bounds on the Threshold Gap in Ramp Secret Sharing. 99 - Hart William Montgomery:
A Nonstandard Variant of Learning with Rounding with Polynomial Modulus and Unbounded Samples. 100 - Mustafa A. Mustafa, Sara Cleemput, Abdelrahaman Aly, Aysajan Abidin:
A Secure and Privacy-preserving Protocol for Smart Metering Operational Data Collection. 101 - Laurent Castelnovi, Ange Martinelli, Thomas Prest:
Grafting Trees: a Fault Attack against the SPHINCS framework. 102 - Svetla Nikova, Ventzislav Nikov, Vincent Rijmen:
Decomposition of Permutations in a Finite Field. 103 - Yonatan Sompolinsky, Aviv Zohar:
PHANTOM: A Scalable BlockDAG Protocol. 104 - Michele Ciampi, Claudio Orlandi:
Combining Private Set-Intersection with Secure Two-Party Computation. 105 - Sebastian Berndt, Maciej Liskiewicz:
On the Gold Standard for Security of Universal Steganography. 106 - Carsten Baum, Huang Lin, Sabine Oechsner:
Towards Practical Lattice-Based One-Time Linkable Ring Signatures. 107 - F. Betül Durak, Serge Vaudenay:
Generic Round-Function Recovery for Feistel Networks over Small Domains. 108 - Soda Diop, Bernard Ousmane Sané, Nafissatou Diarra, Michel Seck:
NTRU-LPR IND-CPA: A New Ideal Lattices-based Scheme. 109 - John Baena, Daniel Cabarcas, Daniel E. Escudero, Karan Khathuria, Javier A. Verbel:
Rank Analysis of Cubic Multivariate Cryptosystems. 110 - Håvard Raddum, Pavol Zajac:
MRHS Solver Based on Linear Algebra and Exhaustive Search. 111 - Benjamin Harsha, Jeremiah Blocki:
Just in Time Hashing. 112 - Lauren De Meyer, Begül Bilgin:
Classification of Balanced Quadratic Functions. 113 - Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Yao Jiang:
Offline Assisted Group Key Exchange. 114 - Itai Dinur:
An Improved Affine Equivalence Algorithm for Random Permutations. 115 - Jie Chen, Junqing Gong, Lucas Kowalczyk, Hoeteck Wee:
Unbounded ABE via Bilinear Entropy Expansion, Revisited. 116 - Shai Halevi, Yuriy Polyakov, Victor Shoup:
An Improved RNS Variant of the BFV Homomorphic Encryption Scheme. 117 - Anja Lehmann, Björn Tackmann:
Updatable Encryption with Post-Compromise Security. 118 - Daniel Genkin, Lev Pachmanov, Eran Tromer, Yuval Yarom:
Drive-by Key-Extraction Cache Attacks from Portable Code. 119 - Benny Pinkas, Thomas Schneider, Christian Weinert, Udi Wieder:
Efficient Circuit-based PSI via Cuckoo Hashing. 120 - Daniel R. L. Brown:
ECC mod 8^91+5. 121 - Massimo Bartoletti, Roberto Zunino:
BitML: a calculus for Bitcoin smart contracts. 122 - Howard M. Heys:
Distributed Time-Memory Tradeoff Attacks on Ciphers (with Application to Stream Ciphers and Counter Mode). 123 - Nguyen Tuan Anh, Nguyen Bui Cuong:
Evaluating the indistinguishability of the XTS mode in the proposed security model. 124 - Vlad-Raul Pasca, Emil Simion:
Challenges in cyber security - Ransomware Phenomenon. 125 - Phillip Rogaway, Yusi Zhang:
Onion-AE: Foundations of Nested Encryption. 126 - Robert Künnemann, Deepak Garg, Michael Backes:
Accountability in Security Protocols. 127 - Charanjit S. Jutla:
Authenticated Encryption Mode IAPM using SHA-3's Public Random Permutation. 128 - Tuyet Duong, Alexander Chepurnoy, Hong-Sheng Zhou:
Multi-mode Cryptocurrency Systems. 129 - Mojtaba Zaheri, Babak Sadeghiyan:
SMT-based Cube Attack on Simeck32/64. 130 - Ran Canetti, Yilei Chen, Leonid Reyzin, Ron D. Rothblum:
Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption. 131 - Gora Adj, Omran Ahmadi, Alfred Menezes:
On Isogeny Graphs of Supersingular Elliptic Curves over Finite Fields. 132 - Dan Boneh, Yuval Ishai, Amit Sahai, David J. Wu:
Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs. 133 - Ayan Mahalanobis, Vivek Mallick:
A Las Vegas algorithm to solve the elliptic curve discrete logarithm problem. 134 - Daniel Jost, Christian Badertscher, Fabio Banfi:
A note on the equivalence of IND-CCA & INT-PTXT and IND-CCA & INT-CTXT. 135 - Priyanka Bose, Viet Tung Hoang, Stefano Tessaro:
Revisiting AES-GCM-SIV: Multi-user Security, Faster Key Derivation, and Better Bounds. 136 - Pratik Soni, Stefano Tessaro:
Naor-Reingold Goes Public: The Complexity of Known-key Security. 137 - Christian Badertscher, Juan A. Garay, Ueli Maurer, Daniel Tschudi, Vassilis Zikas:
But Why does it Work? A Rational Protocol Design Treatment of Bitcoin. 138 - (Withdrawn) Faster Multiplication Triplet Generation from Homomorphic Encryption for Practical Privacy-Preserving Machine Learning under a Narrow Bandwidth. 139
- Tomás Fabsic, Viliam Hromada, Pavol Zajac:
A Reaction Attack on LEDApkc. 140