default search action
IACR Cryptology ePrint Archive, Volume 2011, 2011
- Bing Zeng, Xueming Tang, Peng Xu, Jiandu Jing:
Practical Frameworks For h-Out-Of-n Oblivious Transfer With Security Against Covert and Malicious Adversaries. 1 - Gunnar Kreitz:
A Zero-One Law for Secure Multi-Party Computation with Ternary Outputs (full version). 2 - Daniel J. Bernstein, Tanja Lange, Peter Schwabe:
On the correct use of the negation map in the Pollard rho method. 3 - Gaetan Bisson, Andrew V. Sutherland:
A low-memory algorithm for finding short product representations in finite groups. 4 - David Xiao:
Is privacy compatible with truthfulness? 5 - Hemanta K. Maji, Pichayoot Ouppaphan, Manoj Prabhakaran, Mike Rosulek:
Exploring the Limits of Common Coins Using Frontier Analysis of Protocols. 6 - Greg Rose:
KISS: A Bit Too Simple. 7 - Ping Wang, Fangguo Zhang:
Computing Elliptic Curve Discrete Logarithms with the Negation Map. 8 - Helger Lipmaa:
Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments. 9 - Melissa Chase, Seny Kamara:
Structured Encryption and Controlled Disclosure. 10 - Shai Halevi, Huijia Lin:
After-the-Fact Leakage in Public-Key Encryption. 11 - Jens Groth:
Minimizing Non-interactive Zero-Knowledge Proofs Using Fully Homomorphic Encryption. 12 - Shashank Agrawal, Abhinav Mehta, Kannan Srinathan:
Secure Message Transmission In Asynchronous Directed Networks. 13 - Shashank Agrawal, Abhinav Mehta, Kannan Srinathan:
Unconditionally Reliable Message Transmission in Directed Neighbour Networks. 14 - (Withdrawn) Exponential attacks on 6-round Luby-Rackoff and on 5-round Lai-Massey. 15
- Melissa Chase, Kristin E. Lauter:
An Anonymous Health Care System. 16 - Jiazhe Chen, Keting Jia, Hongbo Yu, Xiaoyun Wang:
New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256. 17 - Dan Boneh, David Mandell Freeman:
Homomorphic Signatures for Polynomial Functions. 18 - Jooyoung Lee, Deukjo Hong:
Collision Resistance of the JH Hash Function. 19 - Antoine Joux, Vanessa Vitse:
Cover and Decomposition Index Calculus on Elliptic Curves made practical. Application to a seemingly secure curve over Fp6. 20 - Jae Hong Seo, Jung Hee Cheon:
Fully Secure Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts. 21 - Farzaneh Abazari, Babak Sadeghian:
Cryptanalysis with Ternary Difference: Applied to Block Cipher PRESENT. 22 - Ming Duan, Xuejia Lai:
Improved zero-sum distinguisher for full round Keccak-f permutation. 23 - Alexander Rostovtsev, Alexey Bogdanov, Mikhail Mikhaylov:
Secure evaluation of polynomial using privacy ring homomorphisms. 24 - Mihaela Ion, Giovanni Russello, Bruno Crispo:
Supporting Publication and Subscription Confidentiality in Pub/Sub Networks. 25 - Emiliano De Cristofaro, Mark Manulis, Bertram Poettering:
Private Discovery of Common Social Contacts. 26 - Ashish Choudhury, Kaoru Kurosawa, Arpita Patra:
Simple and Efficient Single Round Almost Perfectly Secure Message Transmission Tolerating Generalized Adversary. 27 - Elena Andreeva, Bart Mennink, Bart Preneel:
The Parazoa Family: Generalizing the Sponge Hash Functions. 28 - Benjamin Gittins:
Outline of a proposal responding to E.U. and U.S. calls for trustworthy global-scale IdM and CKM designs. 29 - Vorapong Suppakitpaisarn, Masato Edahiro, Hiroshi Imai:
Fast Elliptic Curve Cryptography Using Optimal Double-Base Chains. 30 - Ashish Choudhury, Arpita Patra:
Statistical Asynchronous Weak Commitment Scheme: A New Primitive to Design Statistical Asynchronous Verifiable Secret Sharing Scheme. 31 - Piotr Mroczkowski, Janusz Szmidt:
Corrigendum to: The Cube Attack on Stream Cipher Trivium and Quadraticity Tests. 32 - Jean Marc Couveignes, Jean-Gabriel Kammerer:
The Geometry of Flex Tangents to a Cubic Curve and its Parameterizations. 33 - Niek J. Bouman, Serge Fehr:
Secure Authentication from a Weak Key, Without Leaking Information. 34 - Andrew C. Yao, Yunlei Zhao:
A New Family of Practical Non-Malleable Protocols. 35 - (Withdrawn) The Complexity Analysis of the MutantXL Family. 36
- Mario Lamberger, Florian Mendel:
Higher-Order Differential Attack on Reduced SHA-256. 37 - Martin R. Albrecht, Carlos Cid:
Cold Boot Key Recovery by Solving Polynomial Systems with Noise. 38 - Duc-Phong Le:
Fast Quadrupling of a Point in Elliptic Curve Cryptography. 39 - Hoon Hong, Eunjeong Lee, Hyang-Sook Lee, Cheol-Min Park:
Simple and Exact Formula for Minimum Loop Length in Atei Pairing based on Brezing-Weng Curves. 40 - Emiliano De Cristofaro, Anthony Durussel, Imad Aad:
Reclaiming Privacy for Smartphone Applications. 41 - Gaetan Bisson:
Computing endomorphism rings of elliptic curves under the GRH. 42 - Jayaprakash Kar:
Proxy Blind Multi-signature Scheme using ECC for handheld devices. 43 - G. N. Purohit, Asmita Singh Rawat:
Fast Scalar Multiplication in ECC using The Multi base Number System. 44 - Farshid Farhat, Somayeh Salimi, Ahmad Salahi:
Private Identification, Authentication and Key Agreement Protocol with Security Mode Setup. 45 - Rikke Bendlin, Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi:
Lower and Upper Bounds for Deniable Public-Key Encryption. 46 - Yuyin Yu, Mingsheng Wang, Yongqiang Li:
Constructing differential 4-uniform permutations from know ones. 47 - Srinath Baba, Srinivas Kotyad, Raghu Teja:
A non-Abelian factorization problem and an associated cryptosystem. 48 - Allison B. Lewko, Brent Waters:
Unbounded HIBE and Attribute-Based Encryption. 49 - (Withdrawn) Authenticated Key Exchange with Synchronized States. 50
- (Withdrawn) Towards Strong Adaptive Corruption Security of Authenticated Key Exchange. 51
- Alex Escala, Javier Herranz, Paz Morillo:
Revocable Attribute-Based Signatures with Adaptive Security in the Standard Model. 52 - Dario Catalano, Dario Fiore, Bogdan Warinschi:
Adaptive Pseudo-Free Groups and Applications. 53 - (Withdrawn) Non-Applicability of Pseudobasis for Designing Perfectly Secure Message Transmission Protocols Against Non-Threshold Adversary. 54
- Dongdai Lin, Jean-Charles Faugère, Ludovic Perret, Tianze Wang:
On Enumeration of Polynomial Equivalence Classes and Their Application to MPKC. 55 - Amine Dehbaoui, Sébastien Tiran, Philippe Maurine, François-Xavier Standaert, Nicolas Veyrat-Charvillon:
Spectral Coherence Analysis - First Experimental Results -. 56 - Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi:
Another Look at RSA Signatures With Affine Padding. 57 - Jean-Sébastien Coron, Aline Gouget, Thomas Icart, Pascal Paillier:
Supplemental Access Control (PACE v2): Security Analysis of PACE Integrated Mapping. 58 - Martin Stanek:
Extending Baby-step Giant-step algorithm for FACTOR problem. 59 - S. Dov Gordon, Jonathan Katz, Vinod Vaikuntanathan:
A Group Signature Scheme from Lattice Assumptions. 60 - Masoumeh Safkhani, Majid Naderi, Nasour Bagheri, Somitra Kumar Sanadhya:
Cryptanalysis of Some Protocols for RFID Systems. 61 - Swapnoneel Roy, Amlan K. Das, Yu Li:
Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme using Smart Cards, and a Key Agreement Scheme for Two-Party Communication. 62 - Hadi Ahmadi, Reihaneh Safavi-Naini:
Secret Keys from Channel Noise. 63 - Felix Günther, Mark Manulis, Thorsten Strufe:
Cryptographic Treatment of Private User Profiles. 64 - Carolin Lunemann, Jesper Buus Nielsen:
Fully Simulatable Quantum-Secure Coin-Flipping and Applications. 65 - Markus Dürmuth, David Mandell Freeman:
Deniable Encryption with Negligible Detection Probability: An Interactive Construction. 66 - Simon R. Blackburn, Alina Ostafe, Igor E. Shparlinski:
On the Distribution of the Subset Sum Pseudorandom Number Generator on Elliptic Curves. 67 - William K. Moses Jr., C. Pandu Rangan:
Rational Secret Sharing with Honest Players over an Asynchronous Channel. 68 - Chao Ning, Qiuliang Xu:
Constant-Rounds, Linear Multi-party Computation for Exponentiation and Modulo Reduction with Perfect Security. 69 - Long Hoang Nguyen:
Rational authentication protocols. 70 - Gilles Barthe, Boris Köpf:
Information-theoretic Bounds for Differentially Private Mechanisms. 71 - Jiali Choy, Aileen Zhang, Khoongming Khoo, Matt Henricksen, Axel Poschmann:
AES Variants Secure Against Related-Key Differential and Boomerang Attacks. 72 - Simon R. Blackburn, Carlos Cid, Ciaran Mullan:
Cryptanalysis of three matrix-based key establishment protocols. 73 - Daniel J. Bernstein, Tanja Lange, Christiane Peters, Peter Schwabe:
Really fast syndrome-based hashing. 74 - (Withdrawn) A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions. 75
- Maura B. Paterson, Douglas R. Stinson:
A Unified Approach to Combinatorial Key Predistribution Schemes for Sensor Networks. 76 - Ming Tang, Xiaorong Wang, Zhenlong Qiu, Si Gao, Huanguo Zhang, Qianhong Wu:
DPA Leakage Evaluation and Countermeasure Plug-in. 77 - Jean-Luc Beuchat, Eiji Okamoto, Teppei Yamazaki:
A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function ECHO. 78 - Debiao He, Jianhua Chen, Jin Hu:
Identity-based Digital Signature Scheme Without Bilinear Pairings. 79 - Xiao Ma:
Turbo Codes Can Be Asymptotically Information-Theoretically Secure. 80 - Tomas Toft:
Secure Datastructures based on Multiparty Computation. 81 - (Withdrawn) Does Pseudo-basis Extend to General Adversary? 82
- Natalia N. Tokareva:
On the number of bent functions: lower bounds and hypotheses. 83 - Xingwen Zhao, Fangguo Zhang:
Traitor Tracing against Public Collaboration (Full Version). 84 - (Withdrawn) Co-induction and Computational Semantics for Public-key Encryption with Key Cycles. 85
- Xin-jie Zhao, Tao Wang, Shize Guo:
Fault-propagation Pattern Based DFA on SPN Structure Block Ciphers using Bitwise Permutation, with Application to PRESENT and PRINTcipher. 86 - Yevgeniy Dodis, Iftach Haitner, Aris Tentes:
On the (In)Security of RSA Signatures. 87 - Boaz Barak, Yevgeniy Dodis, Hugo Krawczyk, Olivier Pereira, Krzysztof Pietrzak, François-Xavier Standaert, Yu Yu:
Leftover Hash Lemma, Revisited. 88 - Pantelimon Stanica, Thor Martinsen:
Octal Bent Generalized Boolean Functions. 89 - Yu Chen, Liqun Chen, Zhong Chen:
Generic Methods to Achieve Tighter Security Reductions for a Category of IBE Schemes. 90 - Jesper Buus Nielsen, Peter Sebastian Nordholt, Claudio Orlandi, Sai Sheshank Burra:
A New Approach to Practical Active-Secure Two-Party Computation. 91 - Akinori Kawachi, Christopher Portmann, Keisuke Tanaka:
Characterization of the relations between information-theoretic non-malleability, secrecy, and authenticity. 92 - Miia Hermelin, Kaisa Nyberg:
Linear Cryptanalysis Using Multiple Linear Approximations. 93 - Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik Raub:
Graceful Degradation in Multi-Party Computation. 94 - Orr Dunkelman, Nathan Keller, Adi Shamir:
ALRED Blues: New Attacks on AES-Based MAC's. 95 - Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters:
Computing on Authenticated Data. 96 - Shi Pu, Pu Duan, Jyh-Charn Liu:
Fastplay-A Parallelization Model and Implementation of SMC on CUDA based GPU Cluster Architecture. 97 - Mark Velichka, Michael J. Jacobson Jr., Andreas Stein:
Computing Discrete Logarithms in the Jacobian of High-Genus Hyperelliptic Curves over Even Characteristic Finite Fields. 98 - Antoine Amarilli, Sascha Müller, David Naccache, Daniel Page, Pablo Rauzy, Michael Tunstall:
Can Code Polymorphism Limit Information Leakage? 99 - Guangdong Yang, Shaohua Tang, Li Yang:
A Novel Group Signature Scheme Based on MPKC. 100 - Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-Reza Sadeghi, Christian Wachsmann, Johannes Winter:
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices. 101 - Charalampos Papamanthou, Roberto Tamassia:
Cryptography for Efficiency: Authenticated Data Structures Based on Lattices and Parallel Online Memory Checking. 102 - István Vajda:
Cryptographically Sound Security Proof for On-Demand Source Routing Protocol EndairA. 103 - Colleen Swanson, Douglas R. Stinson:
Unconditionally Secure Signature Schemes Revisited. 104 - Stefan Erickson, Michael J. Jacobson Jr., Andreas Stein:
Explicit Formulas for Real Hyperelliptic Curves of Genus 2 in Affine Representation. 105 - Hadi Ahmadi, Reihaneh Safavi-Naini:
Common Randomness and Secret Key Capacities of Two-way Channels. 106 - Martin Stanek:
Threshold Encryption into Multiple Ciphertexts. 107 - Jannik Dreier, Florian Kerschbaum:
Practical Secure and Efficient Multiparty Linear Programming Based on Problem Transformation. 108 - Matthew Green:
Secure Blind Decryption. 109 - (Withdrawn) Fully Homomorphic Encryption over the Binary Polynomials. 110
- Natalia N. Tokareva:
Generalizations of Bent Functions. A Survey. 111 - Debiao He, Jin Hu:
An efficient certificateless two-party authenticated key agreement scheme from pairings. 112 - Emiliano De Cristofaro, Yanbin Lu, Gene Tsudik:
Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information. 113 - Chunsheng Gu:
Fully Homomorphic Encryption, Approximate Lattice Problem and LWE. 114 - Céline Blondeau, Benoît Gérard:
Multiple Differential Cryptanalysis: Theory and Practice (Corrected). 115 - Long Hoang Nguyen, Andrew William Roscoe:
On the construction of digest functions for manual authentication protocols. 116 - Lei Wei, Scott E. Coull, Michael K. Reiter:
Bounded Vector Signatures and their Applications. 117 - Chunsheng Gu:
New Fully Homomorphic Encryption over the Integers. 118 - (Withdrawn) Multiplicative Learning with Errors and Cryptosystems. 119
- Daniel J. Bernstein, Tanja Lange, Christiane Peters, Peter Schwabe:
Faster 2-regular information-set decoding. 120 - Chunsheng Gu:
More Practical Fully Homomorphic Encryption. 121 - Kristján Valur Jónsson, Gunnar Kreitz, Misbah Uddin:
Secure Multi-Party Sorting and Applications. 122 - Andrey Bogdanov, Vincent Rijmen:
Zero-Correlation Linear Cryptanalysis of Block Ciphers. 123 - Masao Kasahara:
A New Class of Biometrics on the Basis of Forgotten Secret Recovering Scheme, KSS(I). 124 - Masao Kasahara:
A Construction of A New Class of Knapsack-Type Public Key Cryptosystem, K(III)Sigma PKC. 125 - Daniel W. Engels, Markku-Juhani O. Saarinen, Peter Schweitzer, Eric M. Smith:
The Hummingbird-2 Lightweight Authenticated Encryption Algorithm. 126 - Gideon Samid:
Integer Arithmetic without Arithmetic Addition. 127 - (Withdrawn) The Ligo Block Cipher. 128
- Cas Cremers, Kasper Bonne Rasmussen, Srdjan Capkun:
Distance Hijacking Attacks on Distance Bounding Protocols. 129 - Dongdai Lin, Tao Shi, Zifeng Yang:
Ergodic Theory Over F2[[T]]. 130 - Virendra Sule:
Trapdoor oneway functions associated with exponentiation. 131 - Siavosh Benabbas, Rosario Gennaro, Yevgeniy Vahlis:
Verifiable Delegation of Computation over Large Datasets. 132 - Nigel P. Smart, Frederik Vercauteren:
Fully Homomorphic SIMD Operations. 133 - George Danezis, Markulf Kohlweiss, Alfredo Rial:
Differentially Private Billing with Rebates. 134 - Omran Ahmadi, Robert Granger:
On isogeny classes of Edwards curves over finite fields. 135 - Gilad Asharov, Yehuda Lindell:
A Full Proof of the BGW Protocol for Perfectly-Secure Multiparty Computation. 136