From a3a154988fcfa68852141ab79dfc8a7cba035ce1 Mon Sep 17 00:00:00 2001 From: Michel Abdalla Date: Sat, 13 Feb 2016 00:49:11 +0100 Subject: [PATCH] 2016 ePrint entries --- changes.txt | 2 +- crypto_db.bib | 2826 ++++++++++++++++++++++++++++++++++--------------- 2 files changed, 1993 insertions(+), 835 deletions(-) diff --git a/changes.txt b/changes.txt index fa1df91..65e89cb 100755 --- a/changes.txt +++ b/changes.txt @@ -1,5 +1,5 @@ * 2016-02-11 -ISC 2013, CTRSA 2016 +ISC 2013, CTRSA 2016, EPRINT (up to 2016/118) * 2016-01-26 ACNS 2015, ITCS 2016 diff --git a/crypto_db.bib b/crypto_db.bib index 61d59f1..958ac27 100755 --- a/crypto_db.bib +++ b/crypto_db.bib @@ -13,7 +13,7 @@ % CHES: 1999 - 2015 % CQRE: 1999 - 1999 % EC: 1982 - 2015 -% EPRINT: 1996 - 2015 +% EPRINT: 1996 - 2016 % ESORICS: 1990 - 2015 % FC: 1997 - 2015 % FCW: 2010 - 2015 @@ -161241,6 +161241,16 @@ @InProceedings{NDSS:BhaDelPir15 crossref = ndss15, } +@InProceedings{NDSS:MLBHF15, + author = "Vishwath Mohan and + Per Larsen and + Stefan Brunthaler and + Kevin W. Hamlen and + Michael Franz", + title = "Opaque Control-Flow Integrity", + crossref = ndss15, +} + @InProceedings{NDSS:DLSSM15, author = "Lucas Davi and Christopher Liebchen and @@ -161268,16 +161278,6 @@ @InProceedings{NDSS:ERLM15 crossref = ndss15, } -@InProceedings{NDSS:MLBHF15, - author = "Vishwath Mohan and - Per Larsen and - Stefan Brunthaler and - Kevin W. Hamlen and - Michael Franz", - title = "Opaque Control-Flow Integrity", - crossref = ndss15, -} - @InProceedings{NDSS:DemSchZoh15, author = "Daniel Demmler and Thomas Schneider and @@ -161740,6 +161740,16 @@ @InProceedings{NDSS:GLLJ14 crossref = ndss14, } +@InProceedings{NDSS:DBCBW14, + author = "Anupam Das and + Joseph Bonneau and + Matthew Caesar and + Nikita Borisov and + XiaoFeng Wang", + title = "The Tangled Web of Password Reuse", + crossref = ndss14, +} + @InProceedings{NDSS:JanTatLer14, author = "Dongseok Jang and Zachary Tatlock and @@ -162062,16 +162072,6 @@ @InProceedings{NDSS:VPKE14 crossref = ndss14, } -@InProceedings{NDSS:DBCBW14, - author = "Anupam Das and - Joseph Bonneau and - Matthew Caesar and - Nikita Borisov and - XiaoFeng Wang", - title = "The Tangled Web of Password Reuse", - crossref = ndss14, -} - @InProceedings{NDSS:NZDWG14, author = "Muhammad Naveed and Xiao-yong Zhou and @@ -247599,6 +247599,1164 @@ @InProceedings{WISA:KooJanSon03 crossref = wisa03, } +@Misc{EPRINT:ArrBarFar16, + author = "Afonso Arriaga and + Manuel Barbosa and + Pooya Farshim", + title = "Private Functional Encryption: Indistinguishability-Based Definitions and Constructions from Obfuscation", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/018", + note = "\url{http://eprint.iacr.org/2016/018}", +} + +@Misc{EPRINT:CCLF16, + author = "Xuefei Cao and + Bo Chen and + Hui Li and + Yulong Fu", + title = "Packet Header Anomaly Detection Using Bayesian Topic Models", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/040", + note = "\url{http://eprint.iacr.org/2016/040}", +} + +@Misc{EPRINT:Daemen16, + author = "Joan Daemen", + title = "Spectral characterization of iterating lossy mappings", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/090", + note = "\url{http://eprint.iacr.org/2016/090}", +} + +@Misc{EPRINT:Mayer16, + author = "Christoph M. Mayer", + title = "Implementing a Toolkit for Ring-{LWE} Based Cryptography in Arbitrary Cyclotomic Number Fields", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/049", + note = "\url{http://eprint.iacr.org/2016/049}", +} + +@Misc{EPRINT:KulYadSha16, + author = "Gajraj Kuldeep and + Devendra Kumar Yadav and + A. K. Sharma", + title = "Weaknesses in Hadamard Based Symmetric Key Encryption Schemes", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/075", + note = "\url{http://eprint.iacr.org/2016/075}", +} + +@Misc{EPRINT:DFGS16, + author = "Benjamin Dowling and + Marc Fischlin and + Felix G{\"u}nther and + Douglas Stebila", + title = "A Cryptographic Analysis of the {TLS} 1.3 draft-10 Full and Pre-shared Key Handshake Protocol", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/081", + note = "\url{http://eprint.iacr.org/2016/081}", +} + +@Misc{EPRINT:BlaRob16, + author = "Simon R. Blackburn and + M.J.B. Robshaw", + title = "On the Security of the Algebraic Eraser Tag Authentication Protocol", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/091", + note = "\url{http://eprint.iacr.org/2016/091}", +} + +@Misc{EPRINT:AAGG16, + author = "Iris Anshel and + Derek Atkins and + Dorian Goldfeld and + Paul E. Gunnells", + title = "Defeating the {Ben-Zvi}, {Blackburn}, and {Tsaban} Attack on the Algebraic Eraser", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/044", + note = "\url{http://eprint.iacr.org/2016/044}", +} + +@Misc{EPRINT:Yagisawa16b, + author = "Masahiro Yagisawa", + title = "Fully Homomorphic Public-key Encryption Based on Discrete Logarithm Problem", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/054", + note = "\url{http://eprint.iacr.org/2016/054}", +} + +@Misc{EPRINT:Yagisawa16, + author = "Masahiro Yagisawa", + title = "Improved Fully Homomorphic Encryption with Composite Number Modulus", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/050", + note = "\url{http://eprint.iacr.org/2016/050}", +} + +@Misc{EPRINT:Piedra16, + author = "Antonio de la Piedra", + title = "Beyond the selective disclosure of {ABCs} on {RAM}-constrained devices", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/031", + note = "\url{http://eprint.iacr.org/2016/031}", +} + +@Misc{EPRINT:MorSalDan16, + author = "Amir S. Mortazavi and + Mahmoud Salmasizadeh and + Amir Daneshgar", + title = "Strong Continuous Non-malleable Encoding Schemes with Tamper-Detection", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/043", + note = "\url{http://eprint.iacr.org/2016/043}", +} + +@Misc{EPRINT:WatHanShi16, + author = "Yohei Watanabe and + Goichiro Hanaoka and + Junji Shikata", + title = "Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/064", + note = "\url{http://eprint.iacr.org/2016/064}", +} + +@Misc{EPRINT:DMAM16, + author = "Mahshid Delavar and + Sattar Mirzakuchaki and + Mohammad Hassan Ameri and + Javad Mohajeri", + title = "{PUF}-Based Solutions for Secure Communications in Advanced Metering Infrastructure {AMI})", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/009", + note = "\url{http://eprint.iacr.org/2016/009}", +} + +@Misc{EPRINT:BanCha16, + author = "Gergei Bana and + Rohit Chadha", + title = "Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/069", + note = "\url{http://eprint.iacr.org/2016/069}", +} + +@Misc{EPRINT:LSQZ16, + author = "Xi-Jun Lin and + Lin Sun and + Haipeng Qu and + Xiaoshuai Zhang", + title = "New Approaches for Secure Outsourcing Algorithm for Modular Exponentiations", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/045", + note = "\url{http://eprint.iacr.org/2016/045}", +} + +@Misc{EPRINT:Fluhrer16, + author = "Scott Fluhrer", + title = "Cryptanalysis of ring-{LWE} based key exchange with key share reuse", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/085", + note = "\url{http://eprint.iacr.org/2016/085}", +} + +@Misc{EPRINT:AtiYilSav16, + author = "Ali Can Atici and + Cemal Yilmaz and + Erkay Savas", + title = "Remote Cache-Timing Attack without Learning Phase", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/002", + note = "\url{http://eprint.iacr.org/2016/002}", +} + +@Misc{EPRINT:CarTra16, + author = "Henry Carter and + Patrick Traynor", + title = "{OPFE}: Outsourcing Computation for Private Function Evaluation", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/067", + note = "\url{http://eprint.iacr.org/2016/067}", +} + +@Misc{EPRINT:FioNit16, + author = "Dario Fiore and + Anca Nitulescu", + title = "On the (In)security of {SNARKs} in the Presence of Oracles", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/112", + note = "\url{http://eprint.iacr.org/2016/112}", +} + +@Misc{EPRINT:AshRij16, + author = "Tomer Ashur and + Vincent Rijmen", + title = "On Linear Hulls and Trails in {Simon}", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/088", + note = "\url{http://eprint.iacr.org/2016/088}", +} + +@Misc{EPRINT:BPSW16, + author = "Manuel Barbosa and + Bernardo Portela and + Guillaume Scerri and + Bogdan Warinschi", + title = "Foundations of Hardware-Based Attested Computation and Application to {SGX}", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/014", + note = "\url{http://eprint.iacr.org/2016/014}", +} + +@Misc{EPRINT:GPSZ16, + author = "Sanjam Garg and + Omkant Pandey and + Akshayaram Srinivasan and + Mark Zhandry", + title = "Breaking the Sub-Exponential Barrier in Obfustopia", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/102", + note = "\url{http://eprint.iacr.org/2016/102}", +} + +@Misc{EPRINT:Lindell16, + author = "Yehuda Lindell", + title = "How To Simulate It - {A} Tutorial on the Simulation Proof Technique", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/046", + note = "\url{http://eprint.iacr.org/2016/046}", +} + +@Misc{EPRINT:AHPW16, + author = "Yoshinori Aono and + Takuya Hayashi and + Le Trieu Phong and + Lihua Wang", + title = "Scalable and Secure Logistic Regression via Homomorphic Encryption", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/111", + note = "\url{http://eprint.iacr.org/2016/111}", +} + +@Misc{EPRINT:CleMcG16, + author = "Michael Clear and + Ciaran McGoldrick", + title = "Attribute-Based Fully Homomorphic Encryption with a Bounded Number of Inputs", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/099", + note = "\url{http://eprint.iacr.org/2016/099}", +} + +@Misc{EPRINT:BDSS16, + author = "Olivier Blazy and + David Derler and + Daniel Slamanig and + Raphael Spreitzer", + title = "Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/082", + note = "\url{http://eprint.iacr.org/2016/082}", +} + +@Misc{EPRINT:DJKKRS16, + author = "DavidChaum and + Farid Javani and + Aniket Kate and + Anna Krasnova and + Joeri de Ruiter and + Alan T. Sherman", + title = "{cMix}: Anonymization {byHigh}-Performance Scalable Mixing", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/008", + note = "\url{http://eprint.iacr.org/2016/008}", +} + +@Misc{EPRINT:BBFGKZ16, + author = "Karthikeyan Bhargavan and + Christina Brzuska and + C{\'e}dric Fournet and + Matthew Green and + Markulf Kohlweiss and + Santiago {Zanella-B{\'e}guelin}", + title = "Downgrade Resilience in Key-Exchange Protocols", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/072", + note = "\url{http://eprint.iacr.org/2016/072}", +} + +@Misc{EPRINT:Courtois16, + author = "Nicolas T. Courtois", + title = "On Splitting a Point with Summation Polynomials in Binary Elliptic Curves", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/003", + note = "\url{http://eprint.iacr.org/2016/003}", +} + +@Misc{EPRINT:CheChoWu16, + author = "Yalin Chen1 and + Jue-Sam Chou and + Hun-Sheng Wu", + title = "Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Things environment", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/001", + note = "\url{http://eprint.iacr.org/2016/001}", +} + +@Misc{EPRINT:DamTofZak16, + author = "Ivan Damg{\r a}rd and + Tomas Toft and + Rasmus Winther Zakarias", + title = "Fast Multiparty Multiplications from shared bits", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/109", + note = "\url{http://eprint.iacr.org/2016/109}", +} + +@Misc{EPRINT:GjoStr16, + author = "Kristian Gj{\o}steen and + Martin Strand", + title = "Fully homomorphic encryption must be fat or ugly?", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/105", + note = "\url{http://eprint.iacr.org/2016/105}", +} + +@Misc{EPRINT:CouSonCas16, + author = "Nicolas Courtois and + Guangyan Song and + Ryan Castellucci", + title = "Speed Optimizations in Bitcoin Key Recovery Attacks", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/103", + note = "\url{http://eprint.iacr.org/2016/103}", +} + +@Misc{EPRINT:Kluczniak16, + author = "Kamil Kluczniak", + title = "Domain-Specific Pseudonymous Signatures Revisited", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/070", + note = "\url{http://eprint.iacr.org/2016/070}", +} + +@Misc{EPRINT:LipMohSad16, + author = "Helger Lipmaa and + Payman Mohassel and + Saeed Sadeghian", + title = "Valiant's Universal Circuit: Improvements, Implementation, and Applications", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/017", + note = "\url{http://eprint.iacr.org/2016/017}", +} + +@Misc{EPRINT:ZhaZhaQia16, + author = "Jinsheng Zhang and + Wensheng Zhang and + Daji Qiao", + title = "{MU}-{ORAM}: Dealing with Stealthy Privacy Attacks in Multi-User Data Outsourcing Services", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/073", + note = "\url{http://eprint.iacr.org/2016/073}", +} + +@Misc{EPRINT:YiChe16, + author = "wentan Yi and + Shaozhen Chen", + title = "Characterizations of the Degraded Boolean Function and Cryptanalysis of the {SAFER} Family", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/036", + note = "\url{http://eprint.iacr.org/2016/036}", +} + +@Misc{EPRINT:BraVai16, + author = "Zvika Brakerski and + Vinod Vaikuntanathan", + title = "Circuit-{ABE} from {LWE}: Unbounded Attributes and Semi-Adaptive Security", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/118", + note = "\url{http://eprint.iacr.org/2016/118}", +} + +@Misc{EPRINT:HeiBalGol16, + author = "Ethan Heilman and + Foteini Baldimtsi and + Sharon Goldberg", + title = "Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/056", + note = "\url{http://eprint.iacr.org/2016/056}", +} + +@Misc{EPRINT:CEKKR16, + author = "Jan Camenisch and + Robert R. Enderlein and + Stephan Krenn and + Ralf Kuesters and + Daniel Rausch", + title = "Universal Composition with Responsive Environments", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/034", + note = "\url{http://eprint.iacr.org/2016/034}", +} + +@Misc{EPRINT:BogLauTis16, + author = "Andrey Bogdanov and + Martin M. Lauridsen and + Elmar Tischhauser", + title = "Comb to Pipeline: Fast Software Encryption Revisited", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/047", + note = "\url{http://eprint.iacr.org/2016/047}", +} + +@Misc{EPRINT:TewHug16, + author = "Hitesh Tewari and + Arthur Hughes", + title = "Fully Anonymous Transferable Ecash", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/107", + note = "\url{http://eprint.iacr.org/2016/107}", +} + +@Misc{EPRINT:JakNieOrl16, + author = "Thomas P. Jakobsen and + Jesper Buus Nielsen and + Claudio Orlandi", + title = "A Framework for Outsourcing of Secure Computation ", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/037", + note = "\url{http://eprint.iacr.org/2016/037}", +} + +@Misc{EPRINT:TanPejWan16, + author = "Qiang Tang and + Balazs Pejo and + Husen Wang", + title = "Protect both Integrity and Confidentiality in Outsourcing Collaborative Filtering Computations", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/079", + note = "\url{http://eprint.iacr.org/2016/079}", +} + +@Misc{EPRINT:BCTV16, + author = "Fabrice Benhamouda and + C{\'e}line Chevalier and + Adrian Thillard and + Damien Vergnaud", + title = "Easing {Coppersmith} Methods using Analytic Combinatorics: Applications to Public-Key Cryptography with Weak Pseudorandomness", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/007", + note = "\url{http://eprint.iacr.org/2016/007}", +} + +@Misc{EPRINT:ACKKPT16, + author = "Jo{\"e}l Alwen and + Binyi Chen and + Chethan Kamath and + Vladimir Kolmogorov and + Krzysztof Pietrzak and + Stefano Tessaro", + title = "On the Complexity of {Scrypt} and Proofs of Space in the Parallel Random Oracle Model", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/100", + note = "\url{http://eprint.iacr.org/2016/100}", +} + +@Misc{EPRINT:LPST16, + author = "Huijia Lin and + Rafael Pass and + Karn Seth and + Sidharth Telang", + title = "Indistinguishability Obfuscation with Non-trivial Efficiency", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/006", + note = "\url{http://eprint.iacr.org/2016/006}", +} + +@Misc{EPRINT:BMPv16, + author = "Remi Bricout and + Sean Murphy and + Kenneth G. Paterson and + Thyla {van der Merwe}", + title = "Analysing and Exploiting the Mantin Biases in {RC4}", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/063", + note = "\url{http://eprint.iacr.org/2016/063}", +} + +@Misc{EPRINT:PetDinWan16, + author = "Albrecht Petzoldt and + Jintai Ding and + Lih-Chung Wang", + title = "Eliminating Decryption Failures from the Simple Matrix Encryption Scheme", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/010", + note = "\url{http://eprint.iacr.org/2016/010}", +} + +@Misc{EPRINT:AMSY16, + author = "Frederik Armknecht and + Daisuke Moriyama and + Ahmad-Reza Sadeghi and + Moti Yung", + title = "Towards a Unified Security Model for Physically Unclonable Functions", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/033", + note = "\url{http://eprint.iacr.org/2016/033}", +} + +@Misc{EPRINT:SymPre16, + author = "Iraklis Symeonids and + Bart Preneel", + title = "Collateral Damage in Online Social Networks: computing the significance of information collection", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/038", + note = "\url{http://eprint.iacr.org/2016/038}", +} + +@Misc{EPRINT:QinChe16, + author = "Lingyue Qin and + Huaifeng Chen", + title = "Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-guessing Techniques", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/066", + note = "\url{http://eprint.iacr.org/2016/066}", +} + +@Misc{EPRINT:LinQuZha16, + author = "Xi-Jun Lin and + Haipeng Qu and + Xiaoshuai Zhang", + title = "New Efficient and Flexible Algorithms for Secure Outsourcing of Bilinear Pairings", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/076", + note = "\url{http://eprint.iacr.org/2016/076}", +} + +@Misc{EPRINT:HazVen16, + author = "Carmit Hazay and + Muthuramakrishnan Venkitasubramaniam", + title = "On the Power of Secure Two-Party Computation", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/074", + note = "\url{http://eprint.iacr.org/2016/074}", +} + +@Misc{EPRINT:CosDev16, + author = "Victor Costan and + Srinivas Devadas", + title = "Intel {SGX} Explained", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/086", + note = "\url{http://eprint.iacr.org/2016/086}", +} + +@Misc{EPRINT:BosFouPoi16, + author = "Raphael Bost and + Pierre-Alain Fouque and + David Pointcheval", + title = "Verifiable Dynamic Symmetric Searchable Encryption: Optimality and Forward Security", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/062", + note = "\url{http://eprint.iacr.org/2016/062}", +} + +@Misc{EPRINT:BanIso16, + author = "Subhadeep Banik and + Takanori Isobe", + title = "Cryptanalysis of the Full {Spritz} Stream Cipher", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/092", + note = "\url{http://eprint.iacr.org/2016/092}", +} + +@Misc{EPRINT:Jones16, + author = "John Jones", + title = "A Columnar Transposition cipher in a contemporary setting.", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/005", + note = "\url{http://eprint.iacr.org/2016/005}", +} + +@Misc{EPRINT:SBHB16, + author = "Alexander Schaub and + R{\'e}mi Bazin and + Omar Hasan and + Lionel Brunie", + title = "A trustless privacy-preserving reputation system", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/016", + note = "\url{http://eprint.iacr.org/2016/016}", +} + +@Misc{EPRINT:PanMisDas16, + author = "Shashi Kant Pandey and + P. R. Mishra and + B. K. Dass", + title = "A Maiorana-{McFarland} Construction of a {GBF} on Galois ring", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/097", + note = "\url{http://eprint.iacr.org/2016/097}", +} + +@Misc{EPRINT:JavWan16, + author = "khalid Javeed and + Xiaojun Wang", + title = "Speed and Area Optimized Parallel Higher-Radix Modular Multipliers", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/053", + note = "\url{http://eprint.iacr.org/2016/053}", +} + +@Misc{EPRINT:CorBonSch16, + author = "Henry {Corrigan-Gibbs} and + Dan Boneh and + Stuart Schechter", + title = "Balloon Hashing: Provably Space-Hard Hash Functions with Data-Independent Access Patterns", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/027", + note = "\url{http://eprint.iacr.org/2016/027}", +} + +@Misc{EPRINT:Neumaier16, + author = "Arnold Neumaier", + title = "Bounding basis reduction properties", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/004", + note = "\url{http://eprint.iacr.org/2016/004}", +} + +@Misc{EPRINT:GNPR16, + author = "Sharon Goldberg and + Moni Naor and + Dimitrios Papadopoulos and + Leonid Reyzin", + title = "{NSEC5} from Elliptic Curves: Provably Preventing {DNSSEC} Zone Enumeration with Shorter Responses", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/083", + note = "\url{http://eprint.iacr.org/2016/083}", +} + +@Misc{EPRINT:ChaMuk16, + author = "Abhishek Chakraborty and + Debdeep Mukhopadhyay", + title = "A Practical Template Attack on {MICKEY}-128 2.0 Using {PSO} Generated {IVs} and {LS}-{SVM}", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/026", + note = "\url{http://eprint.iacr.org/2016/026}", +} + +@Misc{EPRINT:BGPW16, + author = "Johannes Buchmann and + Florian G{\"o}pfert and + Rachel Player and + Thomas Wunderer", + title = "On the Hardness of {LWE} with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/089", + note = "\url{http://eprint.iacr.org/2016/089}", +} + +@Misc{EPRINT:ABBKM16, + author = "Sedat Akleylek and + Nina Bindel and + Johannes Buchmann and + Juliane Kr{\"a}mer and + Giorgia Azzurra Marson", + title = "An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/030", + note = "\url{http://eprint.iacr.org/2016/030}", +} + +@Misc{EPRINT:KLMR16, + author = "Stefan K{\"o}lbl and + Martin M. Lauridsen and + Florian Mendel and + Christian Rechberger", + title = "Haraka - Efficient Short-Input Hashing for Post-Quantum Applications", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/098", + note = "\url{http://eprint.iacr.org/2016/098}", +} + +@Misc{EPRINT:YeLiu16, + author = "Dingfeng Ye and + Peng Liu", + title = "Obfuscation without Multilinear Maps", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/095", + note = "\url{http://eprint.iacr.org/2016/095}", +} + +@Misc{EPRINT:WetBok16b, + author = "Jos Wetzels and + Wouter Bokslag", + title = "Simple {SIMON}: {FPGA} implementations of the {SIMON} 64/128 Block Cipher", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/029", + note = "\url{http://eprint.iacr.org/2016/029}", +} + +@Misc{EPRINT:WetBok16, + author = "Jos Wetzels and + Wouter Bokslag", + title = "Sponges and Engines: An introduction to {Keccak} and {Keyak}", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/028", + note = "\url{http://eprint.iacr.org/2016/028}", +} + +@Misc{EPRINT:GarGreMie16, + author = "Christina Garman and + Matthew Green and + Ian Miers", + title = "Accountable Privacy for Decentralized Anonymous Payments", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/061", + note = "\url{http://eprint.iacr.org/2016/061}", +} + +@Misc{EPRINT:KLPS16, + author = "Khoongming Khoo and + Eugene Lee and + Thomas Peyrin and + Siang Meng Sim", + title = "Human-readable Proof of the Related-Key Security of {AES}-128", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/025", + note = "\url{http://eprint.iacr.org/2016/025}", +} + +@Misc{EPRINT:DamHaaOrl16, + author = "Ivan Damg{\r a}rd and + Helene Haagh and + Claudio Orlandi", + title = "Access Control Encryption: Enforcing Information Flow with Cryptography", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/106", + note = "\url{http://eprint.iacr.org/2016/106}", +} + +@Misc{EPRINT:HSSVYY16, + author = "Ariel Hamlin and + Nabil Schear and + Emily Shen and + Mayank Varia and + Sophia Yakoubov and + Arkady Yerukhimovich", + title = "Cryptography for Big Data Security", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/012", + note = "\url{http://eprint.iacr.org/2016/012}", +} + +@Misc{EPRINT:GenGolNar16, + author = "Rosario Gennaro and + Steven Goldfeder and + Arvind Narayanan", + title = "Threshold-optimal {DSA}/{ECDSA} signatures and an application to Bitcoin wallet security", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/013", + note = "\url{http://eprint.iacr.org/2016/013}", +} + +@Misc{EPRINT:Kfir16, + author = "Amir Herzberg nd Yehonatan Kfir", + title = "Topology-based Plug-and-Play Key-Setup", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/060", + note = "\url{http://eprint.iacr.org/2016/060}", +} + +@Misc{EPRINT:LLMNW16, + author = "Benoit Libert and + San Ling and + Fabrice Mouhartem and + Khoa Nguyen and + Huaxiong Wang", + title = "Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/101", + note = "\url{http://eprint.iacr.org/2016/101}", +} + +@Misc{EPRINT:TarTabUnr16, + author = "Ehsan Ebrahimi Targhi and + Gelo Noel Tabia and + Dominique Unruh", + title = "Quantum Collision-Resistance of Non-Uniformly Distributed Functions", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/015", + note = "\url{http://eprint.iacr.org/2016/015}", +} + +@Misc{EPRINT:McCShaHao16, + author = "Patrick McCorry and + Siamak F. Shahandashti and + Feng Hao", + title = "Refund attacks on Bitcoin's Payment Protocol", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/024", + note = "\url{http://eprint.iacr.org/2016/024}", +} + +@Misc{EPRINT:PMHG16, + author = "Enes Pasalic and + Amela {Muratovic-Ribic} and + Samir Hodzic and + Sugata Gangopadhyay", + title = "On derivatives of polynomials over finite fields through integration", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/022", + note = "\url{http://eprint.iacr.org/2016/022}", +} + +@Misc{EPRINT:ABDP16, + author = "Michel Abdalla and + Florian Bourse and + Angelo {De Caro} and + David Pointcheval", + title = "Better Security for Functional Encryption for Inner Product Evaluations", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/011", + note = "\url{http://eprint.iacr.org/2016/011}", +} + +@Misc{EPRINT:SLGRL16, + author = "Bing Sun and + Meicheng Liu and + Jian Guo and + Vincent Rijmen and + Ruilin Li", + title = "Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/096", + note = "\url{http://eprint.iacr.org/2016/096}", +} + +@Misc{EPRINT:Wang16, + author = "Yongge Wang", + title = "Octonion Algebra and Noise-Free Fully Homomorphic Encryption ({FHE}) Schemes", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/068", + note = "\url{http://eprint.iacr.org/2016/068}", +} + +@Misc{EPRINT:BenChiSpo16, + author = "Eli Ben-Sasson and + Alessandro Chiesa and + Nicholas Spooner", + title = "Interactive Oracle Proofs", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/116", + note = "\url{http://eprint.iacr.org/2016/116}", +} + +@Misc{EPRINT:KulKum16, + author = "Preeti Kulshrestha and + Arun Kumar", + title = "A New Unlinkable Secret Handshakes Scheme Based On {ZSS}", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/041", + note = "\url{http://eprint.iacr.org/2016/041}", +} + +@Misc{EPRINT:FehFil16, + author = "Serge Fehr and + Max Fillinger", + title = "On the Composition of Two-Prover Commitments, and Applications to Multi-Round Relativistic Commitments", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/113", + note = "\url{http://eprint.iacr.org/2016/113}", +} + +@Misc{EPRINT:HVLN16, + author = "Jialin Huang and + Serge Vaudenay and + Xuejia Lai and + Kaisa Nyberg", + title = "Capacity and Data Complexity in Multidimensional Linear Attack", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/051", + note = "\url{http://eprint.iacr.org/2016/051}", +} + +@Misc{EPRINT:RasRad16b, + author = "Shahram Rasoolzadeh and + H{\r a}vard Raddum", + title = "Cryptanalysis of {PRINCE} with Minimal Data", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/080", + note = "\url{http://eprint.iacr.org/2016/080}", +} + +@Misc{EPRINT:RasRad16, + author = "Shahram Rasoolzadeh and + H{\r a}vard Raddum", + title = "Multidimensional Meet in the Middle Cryptanalysis of {KATAN}", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/077", + note = "\url{http://eprint.iacr.org/2016/077}", +} + +@Misc{EPRINT:MalGol16, + author = "Aanchal Malhotra and + Sharon Goldberg", + title = "Attacking {NTP}'s Authenticated Broadcast Mode", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/055", + note = "\url{http://eprint.iacr.org/2016/055}", +} + +@Misc{EPRINT:KopWat16, + author = "Venkata Koppula and + Brent Waters", + title = "Circular Security Counterexamples for Arbitrary Length Cycles from {LWE}", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/117", + note = "\url{http://eprint.iacr.org/2016/117}", +} + +@Misc{EPRINT:Zhandry16, + author = "Mark Zhandry", + title = "The Magic of {ELFs}", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/114", + note = "\url{http://eprint.iacr.org/2016/114}", +} + +@Misc{EPRINT:Nadeem16b, + author = "Muhammad Nadeem", + title = "Secure positioning and quantum non-local correlations", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/059", + note = "\url{http://eprint.iacr.org/2016/059}", +} + +@Misc{EPRINT:Nadeem16, + author = "Muhammad Nadeem", + title = "Standard quantum bit commitment --- an indefinite commitment time", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/039", + note = "\url{http://eprint.iacr.org/2016/039}", +} + +@Misc{EPRINT:BCGV16, + author = "Eli {Ben-Sasson} and + Alessandro Chiesa and + Ariel Gabizon and + Madars Virza", + title = "Quasi-Linear Size Zero Knowledge from Linear-Algebraic {PCPs}", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/021", + note = "\url{http://eprint.iacr.org/2016/021}", +} + +@Misc{EPRINT:BirPerUdo16, + author = "Alex Biryukov and + L{\'e}o Perrin and + Aleksei Udovenko", + title = "Reverse-Engineering the {S}-Box of Streebog, Kuznyechik and {STRIBOBr1}", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/071", + note = "\url{http://eprint.iacr.org/2016/071}", +} + +@Misc{EPRINT:Poulakis16, + author = "Dimitrios Poulakis", + title = "New Lattice Attacks on {DSA} Schemes", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/058", + note = "\url{http://eprint.iacr.org/2016/058}", +} + +@Misc{EPRINT:BrzJacSte16, + author = "Christina Brzuska and + H{\r a}kon Jacobsen and + Douglas Stebila", + title = "Safely Exporting Keys from Secure Channels: On the security of {EAP}-{TLS} and {TLS} Key Exporters", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/087", + note = "\url{http://eprint.iacr.org/2016/087}", +} + +@Misc{EPRINT:LeeLinWan16, + author = "Hyung Tae Lee and + San Ling and + Huaxiong Wang", + title = "Analysis of {Gong} et al.'s {CCA2}-Secure Homomorphic Encryption", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/019", + note = "\url{http://eprint.iacr.org/2016/019}", +} + +@Misc{EPRINT:Alawatugoda16, + author = "Janaka Alawatugoda", + title = "On the Leakage-Resilient Key Exchange", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/032", + note = "\url{http://eprint.iacr.org/2016/032}", +} + +@Misc{EPRINT:KisSch16, + author = "{\'A}gnes Kiss and + Thomas Schneider", + title = "{Valiant}'s Universal Circuit is Practical", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/093", + note = "\url{http://eprint.iacr.org/2016/093}", +} + +@Misc{EPRINT:AlaPei16, + author = "Navid Alamati and + Chris Peikert", + title = "Three's Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-){LWE}", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/110", + note = "\url{http://eprint.iacr.org/2016/110}", +} + +@Misc{EPRINT:AlwBlo16, + author = "Joel Alwen and + Jeremiah Blocki", + title = "Efficiently Computing Data-Independent Memory-Hard Functions", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/115", + note = "\url{http://eprint.iacr.org/2016/115}", +} + +@Misc{EPRINT:GHKW16, + author = "Romain Gay and + Dennis Hofheinz and + Eike Kiltz and + Hoeteck Wee", + title = "Tightly Secure {CCA}-Secure Encryption without Pairings", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/094", + note = "\url{http://eprint.iacr.org/2016/094}", +} + +@Misc{EPRINT:YHSS16, + author = "Qianqian Yang and + Lei Hu and + Siwei Sun and + Ling Song", + title = "Truncated Differential Analysis of Round-Reduced {RoadRunneR} Block Cipher", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/084", + note = "\url{http://eprint.iacr.org/2016/084}", +} + +@Misc{EPRINT:Hashimoto16, + author = "Yasufumi Hashimoto", + title = "A note on Tensor Simple Matrix Encryption Scheme", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/065", + note = "\url{http://eprint.iacr.org/2016/065}", +} + +@Misc{EPRINT:BDOX16, + author = "Ge Bai and + Ivan Damg{\r a}rd and + Claudio Orlandi and + Yu Xia", + title = "Non-Interactive Verifiable Secret Sharing For Monotone Circuits", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/078", + note = "\url{http://eprint.iacr.org/2016/078}", +} + +@Misc{EPRINT:SNCM16, + author = "Durga Prasad Sahoo and + Phuong Ha Nguyen and + Rajat Subhra Chakraborty and + Debdeep Mukhopadhyay", + title = "Architectural Bias: a Novel Statistical Metric to Evaluate Arbiter {PUF} Variants", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/057", + note = "\url{http://eprint.iacr.org/2016/057}", +} + +@Misc{EPRINT:CheChoLia16, + author = "Yalin Chen and + Jue-Sam Chou and + I-Chiung Liao", + title = "Improved on an improved remote user authentication scheme with key agreement", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/023", + note = "\url{http://eprint.iacr.org/2016/023}", +} + +@Misc{EPRINT:HaoMei16, + author = "Yonglin Hao and + Willi Meier", + title = "Truncated Differential Based Known-Key Attacks on Round-Reduced Simon", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/020", + note = "\url{http://eprint.iacr.org/2016/020}", +} + +@Misc{EPRINT:MorOrl16, + author = "Tal Moran and + Ilan Orlov", + title = "Proofs of Space-Time and Rational Proofs of Storage", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/035", + note = "\url{http://eprint.iacr.org/2016/035}", +} + +@Misc{EPRINT:BDKD16, + author = "Khushboo Bussi and + Dhananjoy Dey and + Manoj Kumar and + B. K. Dass", + title = "Neeva: {A} Lightweight Hash Function", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/042", + note = "\url{http://eprint.iacr.org/2016/042}", +} + +@Misc{EPRINT:BDTZ16, + author = "Carsten Baum and + Ivan Damg{\r a}rd and + Tomas Toft and + Rasmus Zakarias", + title = "Better Preprocessing for Secure Multiparty Computation", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/048", + note = "\url{http://eprint.iacr.org/2016/048}", +} + +@Misc{EPRINT:HKKKR16, + author = "Gunnar Hartung and + Bj{\"o}rn Kaidel and + Alexander Koch and + Jessica Koch and + Andy Rupp", + title = "Fault-Tolerant Aggregate Signatures", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/052", + note = "\url{http://eprint.iacr.org/2016/052}", +} + +@Misc{EPRINT:Wetzels16, + author = "Jos Wetzels", + title = "Open Sesame: The Password Hashing Competition and {Argon2}", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/104", + note = "\url{http://eprint.iacr.org/2016/104}", +} + +@Misc{EPRINT:DavCid16, + author = "Alex Davidson and + Carlos Cid", + title = "Computing Private Set Operations with Linear Complexities", + year = 2016, + howpublished = "Cryptology ePrint Archive, Report 2016/108", + note = "\url{http://eprint.iacr.org/2016/108}", +} + @Misc{EPRINT:BloNyb15, author = "C{\'e}line Blondeau and Kaisa Nyberg", @@ -247667,6 +248825,15 @@ @Misc{EPRINT:LimDos15 note = "\url{http://eprint.iacr.org/2015/587}", } +@Misc{EPRINT:SamSar15b, + author = "Subhabrata Samajder and + Palash Sarkar", + title = "Rigorous Upper Bounds on Data Complexities of Block Cipher Cryptanalysis", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/916", + note = "\url{http://eprint.iacr.org/2015/916}", +} + @Misc{EPRINT:Maitra15b, author = "Subhamoy Maitra", title = "The Index $j$ in {RC4} is not Pseudo-random due to Non-existence of {Finney} Cycle", @@ -247710,16 +248877,6 @@ @Misc{EPRINT:DobEicMen15e note = "\url{http://eprint.iacr.org/2015/1200}", } -@Misc{EPRINT:DobEicMen15d, - author = "Christoph Dobraunig and - Maria Eichlseder and - Florian Mendel", - title = "Analysis of the {Kupyna}-256 Hash Function", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/956", - note = "\url{http://eprint.iacr.org/2015/956}", -} - @Misc{EPRINT:GazPieTes15b, author = "Peter Ga{\v{z}}i and Krzysztof Pietrzak and @@ -247739,6 +248896,16 @@ @Misc{EPRINT:BloMin15 note = "\url{http://eprint.iacr.org/2015/141}", } +@Misc{EPRINT:DinCheEis15, + author = "A. Adam Ding and + Cong Chen and + Thomas Eisenbarth", + title = "Simpler, Faster, and More Robust {T}-test Based Leakage Detection", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/1215", + note = "\url{http://eprint.iacr.org/2015/1215}", +} + @Misc{EPRINT:AnaJai15, author = "Prabhanjan Ananth and Abhishek Jain", @@ -247821,6 +248988,14 @@ @Misc{EPRINT:BJLSY15 note = "\url{http://eprint.iacr.org/2015/677}", } +@Misc{EPRINT:Samid15b, + author = "Gideon Samid", + title = "The Ultimate Transposition Cipher ({UTC})", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/1033", + note = "\url{http://eprint.iacr.org/2015/1033}", +} + @Misc{EPRINT:SymTsoPre15, author = "Iraklis Symeonids and Pagona Tsormpatzoudi and @@ -247863,14 +249038,6 @@ @Misc{EPRINT:JNPWW15 note = "\url{http://eprint.iacr.org/2015/372}", } -@Misc{EPRINT:Wronski15, - author = "Micha{\l} Wro{\'n}ski", - title = "Faster point scalar multiplication on {NIST} elliptic curves over {GF}($p$) using (twisted) {Edwards} curves over {GF}($p^{3}$)", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/977", - note = "\url{http://eprint.iacr.org/2015/977}", -} - @Misc{EPRINT:ACGGS15, author = "Akshima and Donghoon Chang and @@ -247981,6 +249148,15 @@ @Misc{EPRINT:DFGS15 note = "\url{http://eprint.iacr.org/2015/914}", } +@Misc{EPRINT:GotShi15, + author = "Shota Goto and + Junji Shikata", + title = "A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/950", + note = "\url{http://eprint.iacr.org/2015/950}", +} + @Misc{EPRINT:CogSeu15b, author = "Beno{\^\i}t Cogliati and Yannick Seurin", @@ -248007,16 +249183,6 @@ @Misc{EPRINT:Hao15 note = "\url{http://eprint.iacr.org/2015/231}", } -@Misc{EPRINT:HesHofRup15, - author = "Julia Hesse and - Dennis Hofheinz and - Andy Rupp", - title = "Reconfigurable Cryptography: {A} flexible approach to long-term security", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/1047", - note = "\url{http://eprint.iacr.org/2015/1047}", -} - @Misc{EPRINT:KobMen15, author = "Neal Koblitz and Alfred Menezes", @@ -248436,16 +249602,6 @@ @Misc{EPRINT:KarAta15 note = "\url{http://eprint.iacr.org/2015/549}", } -@Misc{EPRINT:DinCheEis15, - author = "A. Adam Ding and - Cong Chen and - Thomas Eisenbarth", - title = "Simpler, Faster, and More Robust {T}-test Based Leakage Detection", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/1215", - note = "\url{http://eprint.iacr.org/2015/1215}", -} - @Misc{EPRINT:BGNT15, author = "Nicolas Bruneau and Sylvain Guilley and @@ -248904,6 +250060,14 @@ @Misc{EPRINT:EteKup15 note = "\url{http://eprint.iacr.org/2015/351}", } +@Misc{EPRINT:Mesnager15, + author = "Sihem Mesnager", + title = "A note on constructions of bent functions from involutions", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/982", + note = "\url{http://eprint.iacr.org/2015/982}", +} + @Misc{EPRINT:DucFauSta15, author = "Alexandre Duc and Sebastian Faust and @@ -249169,6 +250333,17 @@ @Misc{EPRINT:PagPanSak15 note = "\url{http://eprint.iacr.org/2015/243}", } +@Misc{EPRINT:BGJS15, + author = "Saikrishna Badrinarayanan and + Divya Gupta and + Abhishek Jain and + Amit Sahai", + title = "Multi-Input Functional Encryption for Unbounded Arity Functions", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/1136", + note = "\url{http://eprint.iacr.org/2015/1136}", +} + @Misc{EPRINT:LyuPre15, author = "Vadim Lyubashevsky and Thomas Prest", @@ -249240,18 +250415,6 @@ @Misc{EPRINT:SaaLeiTun15 note = "\url{http://eprint.iacr.org/2015/512}", } -@Misc{EPRINT:BKSTT15, - author = "Khodakhast Bibak and - Bruce M. Kapron and - Venkatesh Srinivasan and - Roberto Tauraso and - L{\'a}szl{\'o} T{\'o}th", - title = "Restricted linear congruences", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/1186", - note = "\url{http://eprint.iacr.org/2015/1186}", -} - @Misc{EPRINT:JXBRv15, author = "Chenglu Jin and Xiaolin Xu and @@ -249323,6 +250486,16 @@ @Misc{EPRINT:ChuPas15 note = "\url{http://eprint.iacr.org/2015/031}", } +@Misc{EPRINT:ClaFraWur15, + author = "Christophe Clavier and + Julien Francq and + Antoine Wurcker", + title = "Study of a Parity Check Based Fault-Detection Countermeasure for the {AES} Key Schedule", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/877", + note = "\url{http://eprint.iacr.org/2015/877}", +} + @Misc{EPRINT:WYHZ15, author = "Ting Wang and Jianping Yu and @@ -249379,14 +250552,6 @@ @Misc{EPRINT:CDSM15 note = "\url{http://eprint.iacr.org/2015/1195}", } -@Misc{EPRINT:Dutta15, - author = "Pranjal Dutta", - title = "Modular Inversion Hidden Number Problem- {A} Lattice Approach", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/1140", - note = "\url{http://eprint.iacr.org/2015/1140}", -} - @Misc{EPRINT:DucPre15b, author = "L{\'e}o Ducas and Thomas Prest", @@ -249730,14 +250895,6 @@ @Misc{EPRINT:MPSS15 note = "\url{http://eprint.iacr.org/2015/1009}", } -@Misc{EPRINT:Ghadafi15, - author = "Essam Ghadafi", - title = "Short Structure-Preserving Signatures", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/961", - note = "\url{http://eprint.iacr.org/2015/961}", -} - @Misc{EPRINT:DLSS15, author = "Yevgeniy Dodis and Tianren Liu and @@ -249808,6 +250965,16 @@ @Misc{EPRINT:FouVan15 note = "\url{http://eprint.iacr.org/2015/312}", } +@Misc{EPRINT:ApoFanLiu15, + author = "Daniel Apon and + Xiong Fan and + Feng-Hao Liu", + title = "Bi-Deniable Inner Product Encryption from {LWE}", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/993", + note = "\url{http://eprint.iacr.org/2015/993}", +} + @Misc{EPRINT:GueImbWin15, author = "Eleonora Guerrini and Laurent Imbert and @@ -250004,16 +251171,13 @@ @Misc{EPRINT:DNSL15b note = "\url{http://eprint.iacr.org/2015/1138}", } -@Misc{EPRINT:GCDCT15, - author = "Junqing Gong and - Jie Chen and - Xiaolei Dong and - Zhenfu Cao and - Shaohua Tang", - title = "Extended Nested Dual System Groups, Revisited", +@Misc{EPRINT:WesJun15, + author = "Benjamin Wesolowski and + Pascal Junod", + title = "Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys", year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/820", - note = "\url{http://eprint.iacr.org/2015/820}", + howpublished = "Cryptology ePrint Archive, Report 2015/836", + note = "\url{http://eprint.iacr.org/2015/836}", } @Misc{EPRINT:DamZak15, @@ -250093,15 +251257,6 @@ @Misc{EPRINT:BecGamJou15 note = "\url{http://eprint.iacr.org/2015/522}", } -@Misc{EPRINT:GotShi15, - author = "Shota Goto and - Junji Shikata", - title = "A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/950", - note = "\url{http://eprint.iacr.org/2015/950}", -} - @Misc{EPRINT:MSMHI15, author = "Hiraku Morita and Jacob C.N. Schuldt and @@ -250251,14 +251406,15 @@ @Misc{EPRINT:GuoZhaXu15 note = "\url{http://eprint.iacr.org/2015/1216}", } -@Misc{EPRINT:CorLepTib15, +@Misc{EPRINT:CFRZ15, author = "Jean-Sebastien Coron and - Tancrede Lepoint and - Mehdi Tibouchi", - title = "New Multilinear Maps over the Integers", + Jean-Charles Faugere and + Guenael Renault and + Rina Zeitoun", + title = "Factoring $N=p^r q^s$ for Large $r$ and $s$", year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/162", - note = "\url{http://eprint.iacr.org/2015/162}", + howpublished = "Cryptology ePrint Archive, Report 2015/071", + note = "\url{http://eprint.iacr.org/2015/071}", } @Misc{EPRINT:LiWan15, @@ -250327,6 +251483,16 @@ @Misc{EPRINT:LeuWan15 note = "\url{http://eprint.iacr.org/2015/070}", } +@Misc{EPRINT:CasKilTes15, + author = "David Cash and + Eike Kiltz and + Stefano Tessaro", + title = "Two-Round Man-in-the-Middle Security from {LPN}", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/1220", + note = "\url{http://eprint.iacr.org/2015/1220}", +} + @Misc{EPRINT:ChoOrl15, author = "Tung Chou and Claudio Orlandi", @@ -250767,6 +251933,15 @@ @Misc{EPRINT:ADKNO15 note = "\url{http://eprint.iacr.org/2015/311}", } +@Misc{EPRINT:ZhaTan15, + author = "Wenbin Zhang and + Chik How Tan", + title = "{MI}-{T}-{HFE}, a New Multivariate Signature Scheme", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/890", + note = "\url{http://eprint.iacr.org/2015/890}", +} + @Misc{EPRINT:HDFFSG15, author = "Ekawat Homsirikamol and William Diehl and @@ -250877,6 +252052,14 @@ @Misc{EPRINT:PatChaMuk15 note = "\url{http://eprint.iacr.org/2015/493}", } +@Misc{EPRINT:Dutta15, + author = "Pranjal Dutta", + title = "Modular Inversion Hidden Number Problem- {A} Lattice Approach", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/1140", + note = "\url{http://eprint.iacr.org/2015/1140}", +} + @Misc{EPRINT:LiWanLin15, author = "Ming Li and Mingxing Wang and @@ -250979,6 +252162,16 @@ @Misc{EPRINT:FauMasVen15 note = "\url{http://eprint.iacr.org/2015/1223}", } +@Misc{EPRINT:MazTsoMan15, + author = "Oleg Mazonka and + Nektarios Georgios Tsoutsos and + Michail Maniatakos", + title = "Cryptoleq: {A} Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/1226", + note = "\url{http://eprint.iacr.org/2015/1226}", +} + @Misc{EPRINT:SchVee15, author = "Berry Schoenmakers and Meilof Veeningen", @@ -251025,14 +252218,6 @@ @Misc{EPRINT:SmyFriCla15 note = "\url{http://eprint.iacr.org/2015/233}", } -@Misc{EPRINT:Mesnager15, - author = "Sihem Mesnager", - title = "A note on constructions of bent functions from involutions", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/982", - note = "\url{http://eprint.iacr.org/2015/982}", -} - @Misc{EPRINT:MooPer15, author = "Dustin Moody and Ray Perlner", @@ -251284,6 +252469,19 @@ @Misc{EPRINT:KraNeiSch15 note = "\url{http://eprint.iacr.org/2015/1213}", } +@Misc{EPRINT:SLNCPK15, + author = "Hwajeong Seo and + Zhe Liu and + Yasuyuki Nogami and + Jongseok Choi and + Taehwan Park and + Howon Kim", + title = "Parallel Implementation of Number Theoretic Transform", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/1024", + note = "\url{http://eprint.iacr.org/2015/1024}", +} + @Misc{EPRINT:DehRisSha15, author = "S. M. Dehnavi and A. Mahmoodi Rishakani and @@ -251403,6 +252601,16 @@ @Misc{EPRINT:DobEicMen15b note = "\url{http://eprint.iacr.org/2015/392}", } +@Misc{EPRINT:DobEicMen15d, + author = "Christoph Dobraunig and + Maria Eichlseder and + Florian Mendel", + title = "Analysis of the {Kupyna}-256 Hash Function", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/956", + note = "\url{http://eprint.iacr.org/2015/956}", +} + @Misc{EPRINT:NikWanWu15, author = "Ivica Nikoli{\'c} and Lei Wang and @@ -251436,16 +252644,6 @@ @Misc{EPRINT:BKLW15 note = "\url{http://eprint.iacr.org/2015/729}", } -@Misc{EPRINT:LiuMesChe15, - author = "Jian Liu and - Sihem Mesnager and - Lusheng Chen", - title = "On the Diffusion Property of Iterated Functions", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/873", - note = "\url{http://eprint.iacr.org/2015/873}", -} - @Misc{EPRINT:LiuMesChe15b, author = "Jian Liu and Sihem Mesnager and @@ -251654,13 +252852,16 @@ @Misc{EPRINT:LibPetYun15 note = "\url{http://eprint.iacr.org/2015/743}", } -@Misc{EPRINT:WesJun15, - author = "Benjamin Wesolowski and - Pascal Junod", - title = "Ciphertext-Policy Attribute-Based Broadcast Encryption with Small Keys", +@Misc{EPRINT:GCDCT15, + author = "Junqing Gong and + Jie Chen and + Xiaolei Dong and + Zhenfu Cao and + Shaohua Tang", + title = "Extended Nested Dual System Groups, Revisited", year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/836", - note = "\url{http://eprint.iacr.org/2015/836}", + howpublished = "Cryptology ePrint Archive, Report 2015/820", + note = "\url{http://eprint.iacr.org/2015/820}", } @Misc{EPRINT:Morawiecki15b, @@ -252037,6 +253238,16 @@ @Misc{EPRINT:SenDas15 note = "\url{http://eprint.iacr.org/2015/044}", } +@Misc{EPRINT:CaoCaoLiu15, + author = "Zhengjun Cao and + Zhenfu Cao and + Lihua Liu", + title = "Comment on Demonstrations of Shor's Algorithm in the Past Decades", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/1207", + note = "\url{http://eprint.iacr.org/2015/1207}", +} + @Misc{EPRINT:Contini15, author = "Scott Contini", title = "Method to Protect Passwords in Databases for Web Applications", @@ -252380,14 +253591,6 @@ @Misc{EPRINT:Nagao15b note = "\url{http://eprint.iacr.org/2015/985}", } -@Misc{EPRINT:Nagao15, - author = "{Koh-ichi} Nagao", - title = "Complexity of {ECDLP} under the First Fall Degree Assumption", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/984", - note = "\url{http://eprint.iacr.org/2015/984}", -} - @Misc{EPRINT:YanMa15, author = "Xiaopeng Yang and Wenping Ma", @@ -252796,15 +253999,14 @@ @Misc{EPRINT:LZFD15b note = "\url{http://eprint.iacr.org/2015/994}", } -@Misc{EPRINT:CFRZ15, +@Misc{EPRINT:CorLepTib15, author = "Jean-Sebastien Coron and - Jean-Charles Faugere and - Guenael Renault and - Rina Zeitoun", - title = "Factoring $N=p^r q^s$ for Large $r$ and $s$", + Tancrede Lepoint and + Mehdi Tibouchi", + title = "New Multilinear Maps over the Integers", year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/071", - note = "\url{http://eprint.iacr.org/2015/071}", + howpublished = "Cryptology ePrint Archive, Report 2015/162", + note = "\url{http://eprint.iacr.org/2015/162}", } @Misc{EPRINT:OdeDasGos15, @@ -252846,6 +254048,15 @@ @Misc{EPRINT:Raykov15 note = "\url{http://eprint.iacr.org/2015/352}", } +@Misc{EPRINT:TahEis15, + author = "Mostafa Taha and + Thomas Eisenbarth", + title = "Implementation Attacks on Post-Quantum Cryptographic Schemes", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/1083", + note = "\url{http://eprint.iacr.org/2015/1083}", +} + @Misc{EPRINT:DBBCB15, author = "Gaby G. Dagher and Benedikt Buenz and @@ -252991,6 +254202,14 @@ @Misc{EPRINT:MohMoh15 note = "\url{http://eprint.iacr.org/2015/815}", } +@Misc{EPRINT:Scott15, + author = "Mike Scott", + title = "{Ed3363} ({HighFive}) -- An alternative Elliptic Curve", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/991", + note = "\url{http://eprint.iacr.org/2015/991}", +} + @Misc{EPRINT:GOPTT15, author = "Esha Ghosh and Olga Ohrimenko and @@ -253195,18 +254414,6 @@ @Misc{EPRINT:ABFvY15 note = "\url{http://eprint.iacr.org/2015/1141}", } -@Misc{EPRINT:GKMPS15, - author = "Vipul Goyal and - Dakshita Khurana and - Ilya Mironov and - Omkant Pandey and - Amit Sahai", - title = "Do Distributed Differentially-Private Protocols Require Oblivious Transfer?", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/1090", - note = "\url{http://eprint.iacr.org/2015/1090}", -} - @Misc{EPRINT:BGRV15, author = "Josep Balasch and Benedikt Gierlichs and @@ -253361,6 +254568,16 @@ @Misc{EPRINT:AAGMPP15 note = "\url{http://eprint.iacr.org/2015/1063}", } +@Misc{EPRINT:LiuMesChe15, + author = "Jian Liu and + Sihem Mesnager and + Lusheng Chen", + title = "On the Diffusion Property of Iterated Functions", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/873", + note = "\url{http://eprint.iacr.org/2015/873}", +} + @Misc{EPRINT:DerPer15, author = "Patrick Derbez and L{\'e}o Perrin", @@ -253535,14 +254752,14 @@ @Misc{EPRINT:MinSeu15 note = "\url{http://eprint.iacr.org/2015/504}", } -@Misc{EPRINT:GagHulSch15, - author = "Tommaso Gagliardoni and - Andreas H{\"u}lsing and - Christian Schaffner", - title = "Semantic Security and Indistinguishability in the Quantum World", +@Misc{EPRINT:HesHofRup15, + author = "Julia Hesse and + Dennis Hofheinz and + Andy Rupp", + title = "Reconfigurable Cryptography: {A} flexible approach to long-term security", year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/355", - note = "\url{http://eprint.iacr.org/2015/355}", + howpublished = "Cryptology ePrint Archive, Report 2015/1047", + note = "\url{http://eprint.iacr.org/2015/1047}", } @Misc{EPRINT:IGIES15, @@ -253967,6 +255184,19 @@ @Misc{EPRINT:ChaSen15b note = "\url{http://eprint.iacr.org/2015/981}", } +@Misc{EPRINT:AAFGNV15, + author = "Ehsan Aerabi and + A. Elhadi Amirouche and + Houda Ferradi and + R{\'e}mi G{\'e}raud and + David Naccache and + Jean Vuillemin", + title = "The Conjoined Microprocessor", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/974", + note = "\url{http://eprint.iacr.org/2015/974}", +} + @Misc{EPRINT:SCLNPC15, author = "Hwajeong Seo and Chien-Ning Chen and @@ -254009,6 +255239,17 @@ @Misc{EPRINT:Yellapu15 note = "\url{http://eprint.iacr.org/2015/855}", } +@Misc{EPRINT:AJMR15, + author = "James Alderman and + Christian Janson and + Keith M. Martin and + Sarah Louise Renwick", + title = "Extended Functionality in Verifiable Searchable Encryption", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/975", + note = "\url{http://eprint.iacr.org/2015/975}", +} + @Misc{EPRINT:BMMRT15b, author = "Christian Badertscher and Christian Matt and @@ -254169,15 +255410,6 @@ @Misc{EPRINT:LauPan15 note = "\url{http://eprint.iacr.org/2015/322}", } -@Misc{EPRINT:SamSar15b, - author = "Subhabrata Samajder and - Palash Sarkar", - title = "Rigorous Upper Bounds on Data Complexities of Block Cipher Cryptanalysis", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/916", - note = "\url{http://eprint.iacr.org/2015/916}", -} - @Misc{EPRINT:TjuHuaWu15, author = "Ivan Tjuawinata and Tao Huang and @@ -254338,16 +255570,6 @@ @Misc{EPRINT:HazPolVen15 note = "\url{http://eprint.iacr.org/2015/887}", } -@Misc{EPRINT:CasKilTes15, - author = "David Cash and - Eike Kiltz and - Stefano Tessaro", - title = "Two-Round Man-in-the-Middle Security from {LPN}", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/1220", - note = "\url{http://eprint.iacr.org/2015/1220}", -} - @Misc{EPRINT:AlTDumYou15, author = "Riham AlTawy and Onur Duman and @@ -254515,16 +255737,6 @@ @Misc{EPRINT:DowLacNas15 note = "\url{http://eprint.iacr.org/2015/952}", } -@Misc{EPRINT:CaoCaoLiu15, - author = "Zhengjun Cao and - Zhenfu Cao and - Lihua Liu", - title = "Comment on Demonstrations of Shor's Algorithm in the Past Decades", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/1207", - note = "\url{http://eprint.iacr.org/2015/1207}", -} - @Misc{EPRINT:PanSah15, author = "Omer Paneth and Amit Sahai", @@ -254801,15 +256013,6 @@ @Misc{EPRINT:ZhaTan15b note = "\url{http://eprint.iacr.org/2015/1005}", } -@Misc{EPRINT:ZhaTan15, - author = "Wenbin Zhang and - Chik How Tan", - title = "{MI}-{T}-{HFE}, a New Multivariate Signature Scheme", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/890", - note = "\url{http://eprint.iacr.org/2015/890}", -} - @Misc{EPRINT:AysSch15, author = "Aydin Aysu and Patrick Schaumont", @@ -254943,6 +256146,14 @@ @Misc{EPRINT:LiuPat15 note = "\url{http://eprint.iacr.org/2015/010}", } +@Misc{EPRINT:Kar15, + author = "Jayaprakash Kar", + title = "Cryptanalysis of Provably Secure Certificateless Short Signature Scheme", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/933", + note = "\url{http://eprint.iacr.org/2015/933}", +} + @Misc{EPRINT:DmuDygMar15, author = "Andrey Dmukh and Denis Dygin and @@ -255021,16 +256232,6 @@ @Misc{EPRINT:DBWL15 note = "\url{http://eprint.iacr.org/2015/442}", } -@Misc{EPRINT:AsaSalAre15, - author = "Maryam Rajabzadeh Asaar and - Mahmoud Salmasizadeh and - Mohammad Reza Aref", - title = "A Provably Secure Short Signature Scheme from Coding Theory", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/948", - note = "\url{http://eprint.iacr.org/2015/948}", -} - @Misc{EPRINT:YarLiRan15, author = "Yuval Yarom and Gefei Li and @@ -255292,15 +256493,6 @@ @Misc{EPRINT:DAKMS15 note = "\url{http://eprint.iacr.org/2015/460}", } -@Misc{EPRINT:TahEis15, - author = "Mostafa Taha and - Thomas Eisenbarth", - title = "Implementation Attacks on Post-Quantum Cryptographic Schemes", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/1083", - note = "\url{http://eprint.iacr.org/2015/1083}", -} - @Misc{EPRINT:CogSeu15, author = "Beno{\^\i}t Cogliati and Yannick Seurin", @@ -255399,6 +256591,16 @@ @Misc{EPRINT:MelHas15 note = "\url{http://eprint.iacr.org/2015/622}", } +@Misc{EPRINT:RasSayFar15, + author = "Bahram Rashidi and + Sayed Masoud Sayedi and + Reza Rezaeian Farashahi", + title = "Efficient and Low-complexity Hardware Architecture of Gaussian Normal Basis Multiplication over {GF}($2^m$) for Elliptic Curve Cryptosystems", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/1109", + note = "\url{http://eprint.iacr.org/2015/1109}", +} + @Misc{EPRINT:KobMen15b, author = "N. Koblitz and A. Menezes", @@ -255438,14 +256640,6 @@ @Misc{EPRINT:AggKazObr15 note = "\url{http://eprint.iacr.org/2015/1013}", } -@Misc{EPRINT:Samid15b, - author = "Gideon Samid", - title = "The Ultimate Transposition Cipher ({UTC})", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/1033", - note = "\url{http://eprint.iacr.org/2015/1033}", -} - @Misc{EPRINT:DPSS15, author = "David Derler and Henrich C. P{\"o}hls and @@ -255501,6 +256695,14 @@ @Misc{EPRINT:ACCLL15 note = "\url{http://eprint.iacr.org/2015/1082}", } +@Misc{EPRINT:Wronski15, + author = "Micha{\l} Wro{\'n}ski", + title = "Faster point scalar multiplication on {NIST} elliptic curves over {GF}($p$) using (twisted) {Edwards} curves over {GF}($p^{3}$)", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/977", + note = "\url{http://eprint.iacr.org/2015/977}", +} + @Misc{EPRINT:DLPSV15, author = "Dana {Dachman-Soled} and Chang Liu and @@ -255545,15 +256747,6 @@ @Misc{EPRINT:DaiSte15b note = "\url{http://eprint.iacr.org/2015/1069}", } -@Misc{EPRINT:DaiSte15, - author = "Yuanxi Dai and - John Steinberger", - title = "Indifferentiability of 10-Round {Feistel} Networks", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/874", - note = "\url{http://eprint.iacr.org/2015/874}", -} - @Misc{EPRINT:BerJagSch15, author = "Florian Bergsma and Tibor Jager and @@ -255575,6 +256768,23 @@ @Misc{EPRINT:MKNK15 note = "\url{http://eprint.iacr.org/2015/266}", } +@Misc{EPRINT:ZhaCha15, + author = "Zhichao Zhao and + T-H. Hubert Chan", + title = "How to Vote Privately Using Bitcoin", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/1007", + note = "\url{http://eprint.iacr.org/2015/1007}", +} + +@Misc{EPRINT:Ryabko15, + author = "Boris Ryabko", + title = "Two-faced processes and existence of {RNG} with proven properties", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/1217", + note = "\url{http://eprint.iacr.org/2015/1217}", +} + @Misc{EPRINT:NitRac15a, author = "Abderrahmane Nitaj and Tajjeeddine Rachidi", @@ -255828,16 +257038,6 @@ @Misc{EPRINT:SamSar15 note = "\url{http://eprint.iacr.org/2015/679}", } -@Misc{EPRINT:ApoFanLiu15, - author = "Daniel Apon and - Xiong Fan and - Feng-Hao Liu", - title = "Bi-Deniable Inner Product Encryption from {LWE}", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/993", - note = "\url{http://eprint.iacr.org/2015/993}", -} - @Misc{EPRINT:ABDP15, author = "Michel Abdalla and Florian Bourse and @@ -256404,19 +257604,6 @@ @Misc{EPRINT:ChaRagRan15a note = "\url{http://eprint.iacr.org/2015/323}", } -@Misc{EPRINT:AAFGNV15, - author = "Ehsan Aerabi and - A. Elhadi Amirouche and - Houda Ferradi and - R{\'e}mi G{\'e}raud and - David Naccache and - Jean Vuillemin", - title = "The Conjoined Microprocessor", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/974", - note = "\url{http://eprint.iacr.org/2015/974}", -} - @Misc{EPRINT:CohHol15, author = "Aloni Cohen and Justin Holmgren", @@ -256571,16 +257758,6 @@ @Misc{EPRINT:NDCW15 note = "\url{http://eprint.iacr.org/2015/613}", } -@Misc{EPRINT:MazTsoMan15, - author = "Oleg Mazonka and - Nektarios Georgios Tsoutsos and - Michail Maniatakos", - title = "Cryptoleq: {A} Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/1226", - note = "\url{http://eprint.iacr.org/2015/1226}", -} - @Misc{EPRINT:BJLS15, author = "Christoph Bader and Tibor Jager and @@ -256720,6 +257897,15 @@ @Misc{EPRINT:BisHohWat15 note = "\url{http://eprint.iacr.org/2015/715}", } +@Misc{EPRINT:DaiSte15, + author = "Yuanxi Dai and + John Steinberger", + title = "Indifferentiability of 10-Round {Feistel} Networks", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/874", + note = "\url{http://eprint.iacr.org/2015/874}", +} + @Misc{EPRINT:CohGolVai15, author = "Aloni Cohen and Shafi Goldwasser and @@ -256960,6 +258146,14 @@ @Misc{EPRINT:Kolomeec15 note = "\url{http://eprint.iacr.org/2015/1203}", } +@Misc{EPRINT:Yagisawa15c, + author = "Masahiro Yagisawa", + title = "Fully Homomorphic Encryption with Composite Number Modulus", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/1040", + note = "\url{http://eprint.iacr.org/2015/1040}", +} + @Misc{EPRINT:GalWanZha15, author = "Steven D. Galbraith and Ping Wang and @@ -257104,6 +258298,25 @@ @Misc{EPRINT:GIPST15 note = "\url{http://eprint.iacr.org/2015/154}", } +@Misc{EPRINT:KocMesOzb15, + author = "Ne{\c s}e Ko{\c c}ak and + Sihem Mesnager and + Ferruh {\"O}zbudak", + title = "Bent and Semi-bent Functions via Linear Translators", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/875", + note = "\url{http://eprint.iacr.org/2015/875}", +} + +@Misc{EPRINT:ChaDas15, + author = "Payal Chaudhari and + Maniklal Das", + title = "Privacy-preserving Attribute Based Searchable Encryption", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/899", + note = "\url{http://eprint.iacr.org/2015/899}", +} + @Misc{EPRINT:BLNNOO15, author = "Sai Sheshank Burra and Enrique Larraia and @@ -257183,14 +258396,13 @@ @Misc{EPRINT:GRST15 note = "\url{http://eprint.iacr.org/2015/1003}", } -@Misc{EPRINT:KocMesOzb15, - author = "Ne{\c s}e Ko{\c c}ak and - Sihem Mesnager and - Ferruh {\"O}zbudak", - title = "Bent and Semi-bent Functions via Linear Translators", +@Misc{EPRINT:CarSir15, + author = "S. Carpov and + R. Sirdey", + title = "A compression method for homomorphic ciphertexts", year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/875", - note = "\url{http://eprint.iacr.org/2015/875}", + howpublished = "Cryptology ePrint Archive, Report 2015/1199", + note = "\url{http://eprint.iacr.org/2015/1199}", } @Misc{EPRINT:CraDamKel15, @@ -257477,6 +258689,18 @@ @Misc{EPRINT:GKTZ15 note = "\url{http://eprint.iacr.org/2015/187}", } +@Misc{EPRINT:CQZDC15, + author = "Yu Chen and + Baodong Qin and + Jiang Zhang and + Yi Deng and + Sherman S. M. Chow", + title = "Non-Malleable Functions and Their Applications", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/1253", + note = "\url{http://eprint.iacr.org/2015/1253}", +} + @Misc{EPRINT:CanKalPan15, author = "Ran Canetti and Yael Tauman Kalai and @@ -257534,14 +258758,6 @@ @Misc{EPRINT:Chunsheng15e note = "\url{http://eprint.iacr.org/2015/970}", } -@Misc{EPRINT:Chunsheng15f, - author = "Gu Chunsheng", - title = "Variation of {GGH15} Multilinear Maps", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/1245", - note = "\url{http://eprint.iacr.org/2015/1245}", -} - @Misc{EPRINT:Chunsheng15b, author = "Gu Chunsheng", title = "Ideal Multilinear Maps Based on Ideal Lattices", @@ -257713,6 +258929,24 @@ @Misc{EPRINT:FKOS15 note = "\url{http://eprint.iacr.org/2015/901}", } +@Misc{EPRINT:GagHulSch15, + author = "Tommaso Gagliardoni and + Andreas H{\"u}lsing and + Christian Schaffner", + title = "Semantic Security and Indistinguishability in the Quantum World", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/355", + note = "\url{http://eprint.iacr.org/2015/355}", +} + +@Misc{EPRINT:Ghadafi15, + author = "Essam Ghadafi", + title = "Short Structure-Preserving Signatures", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/961", + note = "\url{http://eprint.iacr.org/2015/961}", +} + @Misc{EPRINT:ReyVauViz15, author = "Reza Reyhanitabar and Serge Vaudenay and @@ -257723,18 +258957,6 @@ @Misc{EPRINT:ReyVauViz15 note = "\url{http://eprint.iacr.org/2015/302}", } -@Misc{EPRINT:CQZDC15, - author = "Yu Chen and - Baodong Qin and - Jiang Zhang and - Yi Deng and - Sherman S. M. Chow", - title = "Non-Malleable Functions and Their Applications", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/1253", - note = "\url{http://eprint.iacr.org/2015/1253}", -} - @Misc{EPRINT:AGMSY15, author = "Aydin Aysu and Ege Gulcan and @@ -257768,14 +258990,6 @@ @Misc{EPRINT:BGHR15 note = "\url{http://eprint.iacr.org/2015/452}", } -@Misc{EPRINT:Kar15, - author = "Jayaprakash Kar", - title = "Cryptanalysis of Provably Secure Certificateless Short Signature Scheme", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/933", - note = "\url{http://eprint.iacr.org/2015/933}", -} - @Misc{EPRINT:Stanica15, author = "Pantelimon Stanica", title = "On weak and strong $2^k$-Bent Boolean functions", @@ -257833,6 +259047,14 @@ @Misc{EPRINT:BerLanVre15 note = "\url{http://eprint.iacr.org/2015/221}", } +@Misc{EPRINT:Nagao15, + author = "{Koh-ichi} Nagao", + title = "Complexity of {ECDLP} under the First Fall Degree Assumption", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/984", + note = "\url{http://eprint.iacr.org/2015/984}", +} + @Misc{EPRINT:CHOR15, author = "Ran Cohen and Iftach Haitner and @@ -257899,6 +259121,16 @@ @Misc{EPRINT:NACFGH15 note = "\url{http://eprint.iacr.org/2015/563}", } +@Misc{EPRINT:AsaSalAre15, + author = "Maryam Rajabzadeh Asaar and + Mahmoud Salmasizadeh and + Mohammad Reza Aref", + title = "A Provably Secure Short Signature Scheme from Coding Theory", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/948", + note = "\url{http://eprint.iacr.org/2015/948}", +} + @Misc{EPRINT:DUWA15, author = "Nizamud Din and Arif Iqbal Umar and @@ -258199,6 +259431,18 @@ @Misc{EPRINT:ZheHu15 note = "\url{http://eprint.iacr.org/2015/1137}", } +@Misc{EPRINT:GKMPS15, + author = "Vipul Goyal and + Dakshita Khurana and + Ilya Mironov and + Omkant Pandey and + Amit Sahai", + title = "Do Distributed Differentially-Private Protocols Require Oblivious Transfer?", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/1090", + note = "\url{http://eprint.iacr.org/2015/1090}", +} + @Misc{EPRINT:Passhe15, author = "Rafael Pass and abhi shelat", @@ -258412,14 +259656,6 @@ @Misc{EPRINT:Scott15b note = "\url{http://eprint.iacr.org/2015/1247}", } -@Misc{EPRINT:Scott15, - author = "Mike Scott", - title = "{Ed3363} ({HighFive}) -- An alternative Elliptic Curve", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/991", - note = "\url{http://eprint.iacr.org/2015/991}", -} - @Misc{EPRINT:GueLin15, author = "Shay Gueron and Yehuda Lindell", @@ -258446,15 +259682,6 @@ @Misc{EPRINT:Nandi15a note = "\url{http://eprint.iacr.org/2015/414}", } -@Misc{EPRINT:CarSir15, - author = "S. Carpov and - R. Sirdey", - title = "A compression method for homomorphic ciphertexts", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/1199", - note = "\url{http://eprint.iacr.org/2015/1199}", -} - @Misc{EPRINT:JouPie15, author = "Antoine Joux and C{\'e}cile Pierrot", @@ -258547,6 +259774,20 @@ @Misc{EPRINT:CDSS15 note = "\url{http://eprint.iacr.org/2015/274}", } +@Misc{EPRINT:ABCGJR15, + author = "Frederik Armknecht and + Colin Boyd and + Christopher Carr and + Kristian Gj{\o}steen and + Angela J{\"a}schke and + Christian A. Reuter and + Martin Strand", + title = "A Guide to Fully Homomorphic Encryption", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/1192", + note = "\url{http://eprint.iacr.org/2015/1192}", +} + @Misc{EPRINT:HerKirMay15, author = "Gottfried Herold and Elena Kirshanova and @@ -258693,6 +259934,14 @@ @Misc{EPRINT:RoyDasMuk15 note = "\url{http://eprint.iacr.org/2015/1225}", } +@Misc{EPRINT:Chunsheng15f, + author = "Gu Chunsheng", + title = "Variation of {GGH15} Multilinear Maps", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/1245", + note = "\url{http://eprint.iacr.org/2015/1245}", +} + @Misc{EPRINT:EsgKar15, author = "Muhammed F. Esgin and Orhun Kara", @@ -259007,14 +260256,6 @@ @Misc{EPRINT:MMNPs15 note = "\url{http://eprint.iacr.org/2015/1062}", } -@Misc{EPRINT:Yagisawa15c, - author = "Masahiro Yagisawa", - title = "Fully Homomorphic Encryption with Composite Number Modulus", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/1040", - note = "\url{http://eprint.iacr.org/2015/1040}", -} - @Misc{EPRINT:BGJPVW15, author = "Nir Bitansky and Shafi Goldwasser and @@ -259038,6 +260279,16 @@ @Misc{EPRINT:GoyJaiKhu15 note = "\url{http://eprint.iacr.org/2015/1095}", } +@Misc{EPRINT:MoaBlaMay15, + author = "Tarik Moataz and + Erik-Oliver Blass and + Travis Mayberry", + title = "Constant Communication {ORAM} without Encryption", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/1116", + note = "\url{http://eprint.iacr.org/2015/1116}", +} + @Misc{EPRINT:Noether15, author = "Shen Noether", title = "Ring Signature Confidential Transactions for Monero", @@ -259173,16 +260424,6 @@ @Misc{EPRINT:GhaMirHag15 note = "\url{http://eprint.iacr.org/2015/936}", } -@Misc{EPRINT:ClaFraWur15, - author = "Christophe Clavier and - Julien Francq and - Antoine Wurcker", - title = "Study of a Parity Check Based Fault-Detection Countermeasure for the {AES} Key Schedule", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/877", - note = "\url{http://eprint.iacr.org/2015/877}", -} - @Misc{EPRINT:BroSch15, author = "Anne Broadbent and Christian Schaffner", @@ -259229,17 +260470,6 @@ @Misc{EPRINT:BogLee15 note = "\url{http://eprint.iacr.org/2015/1044}", } -@Misc{EPRINT:AJMR15, - author = "James Alderman and - Christian Janson and - Keith M. Martin and - Sarah Louise Renwick", - title = "Extended Functionality in Verifiable Searchable Encryption", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/975", - note = "\url{http://eprint.iacr.org/2015/975}", -} - @Misc{EPRINT:DehRisSha15b, author = "S. M. Dehnavi and A. Mahmoodi Rishakani and @@ -259289,17 +260519,6 @@ @Misc{EPRINT:TewNua15 note = "\url{http://eprint.iacr.org/2015/607}", } -@Misc{EPRINT:BGJS15, - author = "Saikrishna Badrinarayanan and - Divya Gupta and - Abhishek Jain and - Amit Sahai", - title = "Multi-Input Functional Encryption for Unbounded Arity Functions", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/1136", - note = "\url{http://eprint.iacr.org/2015/1136}", -} - @Misc{EPRINT:KurOht15, author = "Kaoru Kurosawa and Yasuhiro Ohtaki", @@ -259466,14 +260685,6 @@ @Misc{EPRINT:CarSeiWoo15 note = "\url{http://eprint.iacr.org/2015/1206}", } -@Misc{EPRINT:Ryabko15, - author = "Boris Ryabko", - title = "Two-faced processes and existence of {RNG} with proven properties", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/1217", - note = "\url{http://eprint.iacr.org/2015/1217}", -} - @Misc{EPRINT:LZFD15, author = "Pei Luo and Liwei Zhang and @@ -259508,15 +260719,6 @@ @Misc{EPRINT:DDFRSW15 note = "\url{http://eprint.iacr.org/2015/005}", } -@Misc{EPRINT:ZhaCha15, - author = "Zhichao Zhao and - T-H. Hubert Chan", - title = "How to Vote Privately Using Bitcoin", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/1007", - note = "\url{http://eprint.iacr.org/2015/1007}", -} - @Misc{EPRINT:RebMuk15, author = "Chester Rebeiro and Debdeep Mukhopadhyay", @@ -259625,6 +260827,18 @@ @Misc{EPRINT:HRvYD15 note = "\url{http://eprint.iacr.org/2015/798}", } +@Misc{EPRINT:BKSTT15, + author = "Khodakhast Bibak and + Bruce M. Kapron and + Venkatesh Srinivasan and + Roberto Tauraso and + L{\'a}szl{\'o} T{\'o}th", + title = "Restricted linear congruences", + year = 2015, + howpublished = "Cryptology ePrint Archive, Report 2015/1186", + note = "\url{http://eprint.iacr.org/2015/1186}", +} + @Misc{EPRINT:TutUzu15, author = "Seher Tutdere and Osmanbey Uzunkol", @@ -259652,15 +260866,6 @@ @Misc{EPRINT:Sidorov15 note = "\url{http://eprint.iacr.org/2015/368}", } -@Misc{EPRINT:ChaDas15, - author = "Payal Chaudhari and - Maniklal Das", - title = "Privacy-preserving Attribute Based Searchable Encryption", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/899", - note = "\url{http://eprint.iacr.org/2015/899}", -} - @Misc{EPRINT:CheBosMar15, author = "Abdelkarim Cherkaoui and Lilian Bossuet and @@ -259682,19 +260887,6 @@ @Misc{EPRINT:DDKZ15 note = "\url{http://eprint.iacr.org/2015/238}", } -@Misc{EPRINT:SLNCPK15, - author = "Hwajeong Seo and - Zhe Liu and - Yasuyuki Nogami and - Jongseok Choi and - Taehwan Park and - Howon Kim", - title = "Parallel Implementation of Number Theoretic Transform", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/1024", - note = "\url{http://eprint.iacr.org/2015/1024}", -} - @Misc{EPRINT:RouWat15, author = "Yannis Rouselakis and Brent Waters", @@ -259812,16 +261004,6 @@ @Misc{EPRINT:PopOdeGun15 note = "\url{http://eprint.iacr.org/2015/382}", } -@Misc{EPRINT:MoaBlaMay15, - author = "Tarik Moataz and - Erik-Oliver Blass and - Travis Mayberry", - title = "Constant Communication {ORAM} without Encryption", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/1116", - note = "\url{http://eprint.iacr.org/2015/1116}", -} - @Misc{EPRINT:ZhaSak15, author = "Hui Zhao and Kouichi Sakurai", @@ -259909,20 +261091,6 @@ @Misc{EPRINT:BDPA15 note = "\url{http://eprint.iacr.org/2015/389}", } -@Misc{EPRINT:ABCGJR15, - author = "Frederik Armknecht and - Colin Boyd and - Christopher Carr and - Kristian Gj{\o}steen and - Angela J{\"a}schke and - Christian A. Reuter and - Martin Strand", - title = "A Guide to Fully Homomorphic Encryption", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/1192", - note = "\url{http://eprint.iacr.org/2015/1192}", -} - @Misc{EPRINT:BraSeg15, author = "Zvika Brakerski and Gil Segev", @@ -260117,16 +261285,6 @@ @Misc{EPRINT:Gavin15 note = "\url{http://eprint.iacr.org/2015/821}", } -@Misc{EPRINT:RasSayFar15, - author = "Bahram Rashidi and - Sayed Masoud Sayedi and - Reza Rezaeian Farashahi", - title = "Efficient and Low-complexity Hardware Architecture of Gaussian Normal Basis Multiplication over {GF}($2^m$) for Elliptic Curve Cryptosystems", - year = 2015, - howpublished = "Cryptology ePrint Archive, Report 2015/1109", - note = "\url{http://eprint.iacr.org/2015/1109}", -} - @Misc{EPRINT:BKLP14, author = "Fabrice Benhamouda and Stephan Krenn and @@ -260248,21 +261406,6 @@ @Misc{EPRINT:WLVSRT14 note = "\url{http://eprint.iacr.org/2014/761}", } -@Misc{EPRINT:TDFSNH14, - author = "Shahin Tajik and - Enrico Dietz and - Sven Frohmann and - Jean-Pierre Seifert and - Dmitry Nedospasov and - Clemens Helfmeier and - Christian Boit and - Helmar Dittrich", - title = "Physical Characterization of Arbiter {PUFs}", - year = 2014, - howpublished = "Cryptology ePrint Archive, Report 2014/802", - note = "\url{http://eprint.iacr.org/2014/802}", -} - @Misc{EPRINT:MoaBlaNou14, author = "Tarik Moataz and Erik-Oliver Blass and @@ -260410,6 +261553,17 @@ @Misc{EPRINT:HolFu14 note = "\url{http://eprint.iacr.org/2014/749}", } +@Misc{EPRINT:BLMR14, + author = "Iddo Bentov and + Charles Lee and + Alex Mizrahi and + Meni Rosenfeld", + title = "Proof of Activity: Extending {Bitcoin}'s Proof of Work via Proof of Stake", + year = 2014, + howpublished = "Cryptology ePrint Archive, Report 2014/452", + note = "\url{http://eprint.iacr.org/2014/452}", +} + @Misc{EPRINT:LanVreWak14, author = "Tanja Lange and Christine van Vredendaal and @@ -261351,6 +262505,15 @@ @Misc{EPRINT:XioFan14 note = "\url{http://eprint.iacr.org/2014/003}", } +@Misc{EPRINT:AliSaf14, + author = "Mohsen Alimomeni and + Reihaneh {Safavi-Naini}", + title = "Human Assisted Randomness Generation Using Video Games", + year = 2014, + howpublished = "Cryptology ePrint Archive, Report 2014/045", + note = "\url{http://eprint.iacr.org/2014/045}", +} + @Misc{EPRINT:BelGroSta14, author = "Sonia Bela{\"{\i}}d and Vincent Grosso and @@ -261964,14 +263127,6 @@ @Misc{EPRINT:Laud14 note = "\url{http://eprint.iacr.org/2014/630}", } -@Misc{EPRINT:Jha14, - author = "Sonu Kumar Jha", - title = "Scan Based Side Channel Attack on {Grain} {v1}", - year = 2014, - howpublished = "Cryptology ePrint Archive, Report 2014/579", - note = "\url{http://eprint.iacr.org/2014/579}", -} - @Misc{EPRINT:KarCho14c, author = "Sandip Karmakar and Dipanwita Roy Chowdhury", @@ -262227,17 +263382,6 @@ @Misc{EPRINT:TesWil14 note = "\url{http://eprint.iacr.org/2014/061}", } -@Misc{EPRINT:BLMR14, - author = "Iddo Bentov and - Charles Lee and - Alex Mizrahi and - Meni Rosenfeld", - title = "Proof of Activity: Extending {Bitcoin}'s Proof of Work via Proof of Stake", - year = 2014, - howpublished = "Cryptology ePrint Archive, Report 2014/452", - note = "\url{http://eprint.iacr.org/2014/452}", -} - @Misc{EPRINT:SHSSM14, author = "Jinyong Shan and Lei Hu and @@ -262450,15 +263594,6 @@ @Misc{EPRINT:CESY14 note = "\url{http://eprint.iacr.org/2014/952}", } -@Misc{EPRINT:AliSaf14, - author = "Mohsen Alimomeni and - Reihaneh {Safavi-Naini}", - title = "Human Assisted Randomness Generation Using Video Games", - year = 2014, - howpublished = "Cryptology ePrint Archive, Report 2014/045", - note = "\url{http://eprint.iacr.org/2014/045}", -} - @Misc{EPRINT:GarPol14, author = "Sanjam Garg and Antigoni Polychroniadou", @@ -263075,6 +264210,14 @@ @Misc{EPRINT:KheGulVai14 note = "\url{http://eprint.iacr.org/2014/838}", } +@Misc{EPRINT:Jha14, + author = "Sonu Kumar Jha", + title = "Scan Based Side Channel Attack on {Grain} {v1}", + year = 2014, + howpublished = "Cryptology ePrint Archive, Report 2014/579", + note = "\url{http://eprint.iacr.org/2014/579}", +} + @Misc{EPRINT:DowNas14, author = "Rafael Dowsley and Anderson C. A. Nascimento", @@ -264900,6 +266043,21 @@ @Misc{EPRINT:DDGN14 note = "\url{http://eprint.iacr.org/2014/370}", } +@Misc{EPRINT:TDFSNH14, + author = "Shahin Tajik and + Enrico Dietz and + Sven Frohmann and + Jean-Pierre Seifert and + Dmitry Nedospasov and + Clemens Helfmeier and + Christian Boit and + Helmar Dittrich", + title = "Physical Characterization of Arbiter {PUFs}", + year = 2014, + howpublished = "Cryptology ePrint Archive, Report 2014/802", + note = "\url{http://eprint.iacr.org/2014/802}", +} + @Misc{EPRINT:GMTW14, author = "Guang Gong and Kalikinkar Mandal and @@ -268546,6 +269704,17 @@ @Misc{EPRINT:HCLKK14 note = "\url{http://eprint.iacr.org/2014/212}", } +@Misc{EPRINT:MMBC14, + author = "Tarik Moataz and + Travis Mayberry and + Erik-Oliver Blass and + Agnes Hui Chan", + title = "Resizable Tree-Based Oblivious {RAM}", + year = 2014, + howpublished = "Cryptology ePrint Archive, Report 2014/732", + note = "\url{http://eprint.iacr.org/2014/732}", +} + @Misc{EPRINT:Kircanski14, author = "Aleksandar Kircanski", title = "Analysis of Boomerang Differential Trails via a {SAT}-Based Constraint Solver {URSA}", @@ -269213,17 +270382,6 @@ @Misc{EPRINT:YuWen14 note = "\url{http://eprint.iacr.org/2014/606}", } -@Misc{EPRINT:MMBC14, - author = "Tarik Moataz and - Travis Mayberry and - Erik-Oliver Blass and - Agnes Hui Chan", - title = "Resizable Tree-Based Oblivious {RAM}", - year = 2014, - howpublished = "Cryptology ePrint Archive, Report 2014/732", - note = "\url{http://eprint.iacr.org/2014/732}", -} - @Misc{EPRINT:FMNV14b, author = "Sebastian Faust and Pratyay Mukherjee and @@ -271634,6 +272792,14 @@ @Misc{EPRINT:CZLC13b note = "\url{http://eprint.iacr.org/2013/033}", } +@Misc{EPRINT:Yoon13, + author = "Kisoon Yoon", + title = "A New Method Of Choosing Primitive Elements For {Brezing}-{Weng} Families Of Pairing Friendly Elliptic Curves", + year = 2013, + howpublished = "Cryptology ePrint Archive, Report 2013/142", + note = "\url{http://eprint.iacr.org/2013/142}", +} + @Misc{EPRINT:XuBurMur13, author = "Shiwei Xu and Sergiu Bursuc and @@ -272513,18 +273679,6 @@ @Misc{EPRINT:GKNWW13 note = "\url{http://eprint.iacr.org/2013/467}", } -@Misc{EPRINT:CLOPS13, - author = "Ashish Choudhury and - Jake Loftus and - Emmanuela Orsini and - Arpita Patra and - Nigel P. Smart", - title = "Between a Rock and a Hard Place: Interpolating Between {MPC} and {FHE}", - year = 2013, - howpublished = "Cryptology ePrint Archive, Report 2013/085", - note = "\url{http://eprint.iacr.org/2013/085}", -} - @Misc{EPRINT:CHHC13, author = "Jue-Sam Chou1* and Chun-Hui Huang2 and @@ -272623,16 +273777,6 @@ @Misc{EPRINT:BHJL13 note = "\url{http://eprint.iacr.org/2013/435}", } -@Misc{EPRINT:ChoFraZha13, - author = "Sherman S.M. Chow and - Matthew Franklin and - Haibin Zhang", - title = "Practical Dual-Receiver Encryption---Soundness, Complete Non-Malleability, and Applications", - year = 2013, - howpublished = "Cryptology ePrint Archive, Report 2013/858", - note = "\url{http://eprint.iacr.org/2013/858}", -} - @Misc{EPRINT:HeuMaz13, author = "Clemens Heuberger and Michela Mazzoli", @@ -275824,14 +276968,6 @@ @Misc{EPRINT:LeTan13 note = "\url{http://eprint.iacr.org/2013/119}", } -@Misc{EPRINT:Xu13, - author = "Jiangxiao Zhang. Hua Guo. Zhoujun Li. Chang Xu", - title = "Optimally Anonymous and Transferable Conditional E-cash", - year = 2013, - howpublished = "Cryptology ePrint Archive, Report 2013/443", - note = "\url{http://eprint.iacr.org/2013/443}", -} - @Misc{EPRINT:AdoFocLuc13, author = "Pedro Ad{\~{a}}o and Riccardo Focardi and @@ -275997,6 +277133,14 @@ @Misc{EPRINT:CheTan13 note = "\url{http://eprint.iacr.org/2013/777}", } +@Misc{EPRINT:Xu13, + author = "Jiangxiao Zhang. Hua Guo. Zhoujun Li. Chang Xu", + title = "Optimally Anonymous and Transferable Conditional E-cash", + year = 2013, + howpublished = "Cryptology ePrint Archive, Report 2013/443", + note = "\url{http://eprint.iacr.org/2013/443}", +} + @Misc{EPRINT:Antipkin13, author = "Vladimir Antipkin", title = "Smashing {MASH-1}", @@ -277511,14 +278655,6 @@ @Misc{EPRINT:RivRoc13 note = "\url{http://eprint.iacr.org/2013/636}", } -@Misc{EPRINT:Yoon13, - author = "Kisoon Yoon", - title = "A New Method Of Choosing Primitive Elements For {Brezing}-{Weng} Families Of Pairing Friendly Elliptic Curves", - year = 2013, - howpublished = "Cryptology ePrint Archive, Report 2013/142", - note = "\url{http://eprint.iacr.org/2013/142}", -} - @Misc{EPRINT:HazPat13, author = "Carmit Hazay and Arpita Patra", @@ -277685,6 +278821,18 @@ @Misc{EPRINT:Kar13a note = "\url{http://eprint.iacr.org/2013/037}", } +@Misc{EPRINT:CLOPS13, + author = "Ashish Choudhury and + Jake Loftus and + Emmanuela Orsini and + Arpita Patra and + Nigel P. Smart", + title = "Between a Rock and a Hard Place: Interpolating Between {MPC} and {FHE}", + year = 2013, + howpublished = "Cryptology ePrint Archive, Report 2013/085", + note = "\url{http://eprint.iacr.org/2013/085}", +} + @Misc{EPRINT:JouPie13, author = "Antoine Joux and C{\'e}cile Pierrot", @@ -278876,6 +280024,16 @@ @Misc{EPRINT:LCLPY13 note = "\url{http://eprint.iacr.org/2013/762}", } +@Misc{EPRINT:ChoFraZha13, + author = "Sherman S.M. Chow and + Matthew Franklin and + Haibin Zhang", + title = "Practical Dual-Receiver Encryption---Soundness, Complete Non-Malleability, and Applications", + year = 2013, + howpublished = "Cryptology ePrint Archive, Report 2013/858", + note = "\url{http://eprint.iacr.org/2013/858}", +} + @Misc{EPRINT:Patarin13, author = "Jacques Patarin", title = "Security in $O(2^n)$ for the Xor of Two Random Permutations\\ -- Proof with the standard $H$ technique--", @@ -279253,16 +280411,6 @@ @Misc{EPRINT:BBMW12 note = "\url{http://eprint.iacr.org/2012/449}", } -@Misc{EPRINT:NeuSteCor12, - author = "Kashi Neupane and - Rainer Steinwandt and - Adriana Suarez Corona", - title = "Scalable Deniable Group Key Establishment", - year = 2012, - howpublished = "Cryptology ePrint Archive, Report 2012/504", - note = "\url{http://eprint.iacr.org/2012/504}", -} - @Misc{EPRINT:TanLiu12, author = "Hongbin Tang and Xinsong Liu", @@ -279995,17 +281143,6 @@ @Misc{EPRINT:ChaShiSon12 note = "\url{http://eprint.iacr.org/2012/373}", } -@Misc{EPRINT:LNSW12, - author = "San Ling and - Khoa Nguyen and - Damien Stehl{\'e} and - Huaxiong Wang", - title = "Improved Zero-knowledge Proofs of Knowledge for the {ISIS} Problem, and Applications", - year = 2012, - howpublished = "Cryptology ePrint Archive, Report 2012/569", - note = "\url{http://eprint.iacr.org/2012/569}", -} - @Misc{EPRINT:AvoBouCar12, author = "Gildas Avoine and Adrien Bourgeois and @@ -280359,6 +281496,16 @@ @Misc{EPRINT:HaoCla12 note = "\url{http://eprint.iacr.org/2012/039}", } +@Misc{EPRINT:NeuSteCor12, + author = "Kashi Neupane and + Rainer Steinwandt and + Adriana Suarez Corona", + title = "Scalable Deniable Group Key Establishment", + year = 2012, + howpublished = "Cryptology ePrint Archive, Report 2012/504", + note = "\url{http://eprint.iacr.org/2012/504}", +} + @Misc{EPRINT:Pandey12, author = "Omkant Pandey", title = "Achieving Constant Round Leakage-Resilient Zero-Knowledge", @@ -281007,14 +282154,6 @@ @Misc{EPRINT:BDGJOR12 note = "\url{http://eprint.iacr.org/2012/579}", } -@Misc{EPRINT:Zhu12, - author = "Zhian Zhu", - title = "Cryptanalysis of pairing-free certificateless authenticated key agreement protocol", - year = 2012, - howpublished = "Cryptology ePrint Archive, Report 2012/253", - note = "\url{http://eprint.iacr.org/2012/253}", -} - @Misc{EPRINT:LiWuZha12b, author = "Liangze Li and Hongfeng Wu and @@ -283948,6 +285087,14 @@ @Misc{EPRINT:GupChaKha12 note = "\url{http://eprint.iacr.org/2012/048}", } +@Misc{EPRINT:Zhu12, + author = "Zhian Zhu", + title = "Cryptanalysis of pairing-free certificateless authenticated key agreement protocol", + year = 2012, + howpublished = "Cryptology ePrint Archive, Report 2012/253", + note = "\url{http://eprint.iacr.org/2012/253}", +} + @Misc{EPRINT:ABZS12, author = "Mehrdad Aliasgari and Marina Blanton and @@ -284847,6 +285994,17 @@ @Misc{EPRINT:BelRisTes12 note = "\url{http://eprint.iacr.org/2012/196}", } +@Misc{EPRINT:LNSW12, + author = "San Ling and + Khoa Nguyen and + Damien Stehl{\'e} and + Huaxiong Wang", + title = "Improved Zero-knowledge Proofs of Knowledge for the {ISIS} Problem, and Applications", + year = 2012, + howpublished = "Cryptology ePrint Archive, Report 2012/569", + note = "\url{http://eprint.iacr.org/2012/569}", +} + @Misc{EPRINT:KelMikRup12, author = "Marcel Keller and Gert L{\ae}ss{\o}e Mikkelsen and @@ -285006,14 +286164,6 @@ @Misc{EPRINT:GarGenHal12 note = "\url{http://eprint.iacr.org/2012/610}", } -@Misc{EPRINT:Thomae12b, - author = "Enrico Thomae", - title = "Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-Commutative Rings", - year = 2012, - howpublished = "Cryptology ePrint Archive, Report 2012/270", - note = "\url{http://eprint.iacr.org/2012/270}", -} - @Misc{EPRINT:Drylo12, author = "Robert Drylo", title = "Constructing Pairing-Friendly Genus 2 Curves with Split Jacobian", @@ -285180,14 +286330,6 @@ @Misc{EPRINT:DubGuiBre12 note = "\url{http://eprint.iacr.org/2012/370}", } -@Misc{EPRINT:withdrawn12b, - author = "--withdrawn--", - title = "--withdrawn--", - year = 2012, - howpublished = "Cryptology ePrint Archive, Report 2012/590", - note = "\url{http://eprint.iacr.org/2012/590}", -} - @Misc{EPRINT:BanMaiSar12, author = "Subhadeep Banik and Subhamoy Maitra and @@ -285946,6 +287088,14 @@ @Misc{EPRINT:Thomae12a note = "\url{http://eprint.iacr.org/2012/223}", } +@Misc{EPRINT:Thomae12b, + author = "Enrico Thomae", + title = "Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-Commutative Rings", + year = 2012, + howpublished = "Cryptology ePrint Archive, Report 2012/270", + note = "\url{http://eprint.iacr.org/2012/270}", +} + @Misc{EPRINT:DemGra12, author = "Denise Demirel and Jeroen van de Graaf", @@ -286003,6 +287153,14 @@ @Misc{EPRINT:withdrawn12a note = "\url{http://eprint.iacr.org/2012/589}", } +@Misc{EPRINT:withdrawn12b, + author = "--withdrawn--", + title = "--withdrawn--", + year = 2012, + howpublished = "Cryptology ePrint Archive, Report 2012/590", + note = "\url{http://eprint.iacr.org/2012/590}", +} + @Misc{EPRINT:HuaLiuYan12, author = "Yun-Ju Huang and Feng-Hao Liu and @@ -288317,6 +289475,17 @@ @Misc{EPRINT:DGPSZ11 note = "\url{http://eprint.iacr.org/2011/282}", } +@Misc{EPRINT:PTBW11, + author = "Albrecht Petzoldt and + Enrico Thomae and + Stanislav Bulygin and + Christopher Wolf", + title = "Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems", + year = 2011, + howpublished = "Cryptology ePrint Archive, Report 2011/294", + note = "\url{http://eprint.iacr.org/2011/294}", +} + @Misc{EPRINT:ChaChaVai11, author = "Nishanth Chandran and Melissa Chase and @@ -288653,17 +289822,6 @@ @Misc{EPRINT:GuiVer11 note = "\url{http://eprint.iacr.org/2011/604}", } -@Misc{EPRINT:PTBW11, - author = "Albrecht Petzoldt and - Enrico Thomae and - Stanislav Bulygin and - Christopher Wolf", - title = "Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems", - year = 2011, - howpublished = "Cryptology ePrint Archive, Report 2011/294", - note = "\url{http://eprint.iacr.org/2011/294}", -} - @Misc{EPRINT:HuLonXu11, author = "Zhi Hu and Patrick Longa and @@ -292019,16 +293177,6 @@ @Misc{EPRINT:CatFioWar11a note = "\url{http://eprint.iacr.org/2011/053}", } -@Misc{EPRINT:EssHenHen11, - author = "Aleksander Essex and - Christian Henrich and - Urs Hengartner", - title = "Single Layer Optical-scan Voting with Fully Distributed Trust", - year = 2011, - howpublished = "Cryptology ePrint Archive, Report 2011/568", - note = "\url{http://eprint.iacr.org/2011/568}", -} - @Misc{EPRINT:Bulygin11, author = "Stanislav Bulygin", title = "Algebraic cryptanalysis of the round-reduced and side channel analysis of the full {PRINTCipher-48}", @@ -292311,6 +293459,16 @@ @Misc{EPRINT:BisSut11 note = "\url{http://eprint.iacr.org/2011/004}", } +@Misc{EPRINT:EssHenHen11, + author = "Aleksander Essex and + Christian Henrich and + Urs Hengartner", + title = "Single Layer Optical-scan Voting with Fully Distributed Trust", + year = 2011, + howpublished = "Cryptology ePrint Archive, Report 2011/568", + note = "\url{http://eprint.iacr.org/2011/568}", +} + @Misc{EPRINT:SBSN11, author = "Masoumeh Safkhani and Nasour Bagheri and @@ -293611,6 +294769,16 @@ @Misc{EPRINT:YaoYunZha10b note = "\url{http://eprint.iacr.org/2010/107}", } +@Misc{EPRINT:CheChoLin10, + author = "Yalin Chen1 and + *Jue-Sam Chou2 and + Chi-Fong Lin3", + title = "A Novel Non-interactive Deniable Authentication Protocol with Designated Verifier on elliptic curve cryptosystem", + year = 2010, + howpublished = "Cryptology ePrint Archive, Report 2010/549", + note = "\url{http://eprint.iacr.org/2010/549}", +} + @Misc{EPRINT:GenHalVai10b, author = "Craig Gentry and Shai Halevi and @@ -293949,16 +295117,6 @@ @Misc{EPRINT:Goyal10 note = "\url{http://eprint.iacr.org/2010/487}", } -@Misc{EPRINT:CheChoLin10, - author = "Yalin Chen1 and - *Jue-Sam Chou2 and - Chi-Fong Lin3", - title = "A Novel Non-interactive Deniable Authentication Protocol with Designated Verifier on elliptic curve cryptosystem", - year = 2010, - howpublished = "Cryptology ePrint Archive, Report 2010/549", - note = "\url{http://eprint.iacr.org/2010/549}", -} - @Misc{EPRINT:LBZYW10, author = "Joseph K. Liu and Joonsang Baek and @@ -294238,16 +295396,6 @@ @Misc{EPRINT:WanBi10 note = "\url{http://eprint.iacr.org/2010/288}", } -@Misc{EPRINT:NaeNieSch10, - author = "Michael Naehrig and - Ruben Niederhagen and - Peter Schwabe", - title = "New software speed records for cryptographic pairings", - year = 2010, - howpublished = "Cryptology ePrint Archive, Report 2010/186", - note = "\url{http://eprint.iacr.org/2010/186}", -} - @Misc{EPRINT:CGHH10, author = "Jan Camenisch and Thomas Gro{\ss} and @@ -296603,15 +297751,6 @@ @Misc{EPRINT:KusLal10 note = "\url{http://eprint.iacr.org/2010/346}", } -@Misc{EPRINT:ClaHen10, - author = "Jeremy Clark and - Urs Hengartner", - title = "On the Use of Financial Data as a Random Beacon", - year = 2010, - howpublished = "Cryptology ePrint Archive, Report 2010/361", - note = "\url{http://eprint.iacr.org/2010/361}", -} - @Misc{EPRINT:DunKelSha10a, author = "Orr Dunkelman and Nathan Keller and @@ -297257,6 +298396,16 @@ @Misc{EPRINT:ZhoLai10 note = "\url{http://eprint.iacr.org/2010/583}", } +@Misc{EPRINT:NaeNieSch10, + author = "Michael Naehrig and + Ruben Niederhagen and + Peter Schwabe", + title = "New software speed records for cryptographic pairings", + year = 2010, + howpublished = "Cryptology ePrint Archive, Report 2010/186", + note = "\url{http://eprint.iacr.org/2010/186}", +} + @Misc{EPRINT:NinXu10, author = "Chao Ning and Qiuliang Xu", @@ -298924,6 +300073,15 @@ @Misc{EPRINT:BunOst10 note = "\url{http://eprint.iacr.org/2010/231}", } +@Misc{EPRINT:ClaHen10, + author = "Jeremy Clark and + Urs Hengartner", + title = "On the Use of Financial Data as a Random Beacon", + year = 2010, + howpublished = "Cryptology ePrint Archive, Report 2010/361", + note = "\url{http://eprint.iacr.org/2010/361}", +} + @Misc{EPRINT:HJKS10, author = "Kristiyan Haralambiev and Tibor Jager and @@ -299420,17 +300578,6 @@ @Misc{EPRINT:SinASaBKS09 note = "\url{http://eprint.iacr.org/2009/488}", } -@Misc{EPRINT:CMSW09, - author = "L. Chen and - P. Morrissey and - N.P. Smart and - B. Warinschi", - title = "Security Notions and Generic Constructions for Client Puzzles", - year = 2009, - howpublished = "Cryptology ePrint Archive, Report 2009/331", - note = "\url{http://eprint.iacr.org/2009/331}", -} - @Misc{EPRINT:HinLam09, author = "M. Jason Hinek and Charles C. Y. Lam", @@ -299521,17 +300668,6 @@ @Misc{EPRINT:SSMPR09 note = "\url{http://eprint.iacr.org/2009/297}", } -@Misc{EPRINT:BDFJ09, - author = "Charles Bouillaguet and - Orr Dunkelman and - Pierre-Alain Fouque and - Antoine Joux", - title = "On the Security of Iterated Hashing based on Forgery-resistant Compression Functions", - year = 2009, - howpublished = "Cryptology ePrint Archive, Report 2009/077", - note = "\url{http://eprint.iacr.org/2009/077}", -} - @Misc{EPRINT:CheHonTsu09, author = "Jung Hee Cheon and Jeongdae Hong and @@ -300301,15 +301437,14 @@ @Misc{EPRINT:MTWMM09 note = "\url{http://eprint.iacr.org/2009/185}", } -@Misc{EPRINT:BKMS09, - author = "Erik-Oliver Blass and - Anil Kurmus and - Refik Molva and - Thorsten Strufe", - title = "{PSP}: Private and Secure Payment with {RFID}", +@Misc{EPRINT:JakVenYac09, + author = "Mariusz Jakubowski and + Ramarathnam Venkatesan and + Yacov Yacobi", + title = "Quantifying Trust", year = 2009, - howpublished = "Cryptology ePrint Archive, Report 2009/181", - note = "\url{http://eprint.iacr.org/2009/181}", + howpublished = "Cryptology ePrint Archive, Report 2009/558", + note = "\url{http://eprint.iacr.org/2009/558}", } @Misc{EPRINT:BanCamKre09, @@ -301897,15 +303032,12 @@ @Misc{EPRINT:Wu09c note = "\url{http://eprint.iacr.org/2009/535}", } -@Misc{EPRINT:LSLQ09, - author = "Ruilin Li and - Bing Sun and - Chao Li and - Longjiang Qu", - title = "Cryptanalysis of a Generalized Unbalanced {Feistel} Network Structure", +@Misc{EPRINT:Wu09a, + author = "Chuan-Kun Wu", + title = "On fractional correlation immunity of majority functions", year = 2009, - howpublished = "Cryptology ePrint Archive, Report 2009/360", - note = "\url{http://eprint.iacr.org/2009/360}", + howpublished = "Cryptology ePrint Archive, Report 2009/067", + note = "\url{http://eprint.iacr.org/2009/067}", } @Misc{EPRINT:Wu09d, @@ -302125,12 +303257,15 @@ @Misc{EPRINT:Wu09b note = "\url{http://eprint.iacr.org/2009/534}", } -@Misc{EPRINT:Wu09a, - author = "Chuan-Kun Wu", - title = "On fractional correlation immunity of majority functions", +@Misc{EPRINT:LSLQ09, + author = "Ruilin Li and + Bing Sun and + Chao Li and + Longjiang Qu", + title = "Cryptanalysis of a Generalized Unbalanced {Feistel} Network Structure", year = 2009, - howpublished = "Cryptology ePrint Archive, Report 2009/067", - note = "\url{http://eprint.iacr.org/2009/067}", + howpublished = "Cryptology ePrint Archive, Report 2009/360", + note = "\url{http://eprint.iacr.org/2009/360}", } @Misc{EPRINT:TFKPSS09, @@ -303882,6 +305017,15 @@ @Misc{EPRINT:Kasahara09a note = "\url{http://eprint.iacr.org/2009/375}", } +@Misc{EPRINT:AfzMas09a, + author = "Mehreen Afzal and + Ashraf Masood", + title = "Modifications in the Design of {Trivium} to Increase its Security Level", + year = 2009, + howpublished = "Cryptology ePrint Archive, Report 2009/250", + note = "\url{http://eprint.iacr.org/2009/250}", +} + @Misc{EPRINT:Sasaki09c, author = "Yu Sasaki", title = "A Full Key Recovery Attack on {HMAC-AURORA-512}", @@ -304145,6 +305289,17 @@ @Misc{EPRINT:HalKorKor09 note = "\url{http://eprint.iacr.org/2009/456}", } +@Misc{EPRINT:BDFJ09, + author = "Charles Bouillaguet and + Orr Dunkelman and + Pierre-Alain Fouque and + Antoine Joux", + title = "On the Security of Iterated Hashing based on Forgery-resistant Compression Functions", + year = 2009, + howpublished = "Cryptology ePrint Archive, Report 2009/077", + note = "\url{http://eprint.iacr.org/2009/077}", +} + @Misc{EPRINT:BenSco09, author = "Naomi Benger and Michael Scott", @@ -304311,6 +305466,16 @@ @Misc{EPRINT:Gheorghita09 note = "\url{http://eprint.iacr.org/2009/029}", } +@Misc{EPRINT:FujSuzUst09, + author = "Atsushi Fujioka and + Koutarou Suzuki and + Berkant Ustaoglu", + title = "Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity-based key agreement protocols", + year = 2009, + howpublished = "Cryptology ePrint Archive, Report 2009/423", + note = "\url{http://eprint.iacr.org/2009/423}", +} + @Misc{EPRINT:DavDziVen09, author = "Francesco Dav{\`{\i}} and Stefan Dziembowski and @@ -304875,16 +306040,6 @@ @Misc{EPRINT:Rivain09 note = "\url{http://eprint.iacr.org/2009/165}", } -@Misc{EPRINT:FujSuzUst09, - author = "Atsushi Fujioka and - Koutarou Suzuki and - Berkant Ustaoglu", - title = "Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity-based key agreement protocols", - year = 2009, - howpublished = "Cryptology ePrint Archive, Report 2009/423", - note = "\url{http://eprint.iacr.org/2009/423}", -} - @Misc{EPRINT:Leurent09, author = "Ga{\"{e}}tan Leurent", title = "Practical Key Recovery Attack against Secret-Prefix {Edon-R}", @@ -305475,14 +306630,15 @@ @Misc{EPRINT:HSKC09 note = "\url{http://eprint.iacr.org/2009/471}", } -@Misc{EPRINT:JakVenYac09, - author = "Mariusz Jakubowski and - Ramarathnam Venkatesan and - Yacov Yacobi", - title = "Quantifying Trust", +@Misc{EPRINT:BKMS09, + author = "Erik-Oliver Blass and + Anil Kurmus and + Refik Molva and + Thorsten Strufe", + title = "{PSP}: Private and Secure Payment with {RFID}", year = 2009, - howpublished = "Cryptology ePrint Archive, Report 2009/558", - note = "\url{http://eprint.iacr.org/2009/558}", + howpublished = "Cryptology ePrint Archive, Report 2009/181", + note = "\url{http://eprint.iacr.org/2009/181}", } @Misc{EPRINT:SinBKSASa09, @@ -305542,15 +306698,6 @@ @Misc{EPRINT:TuDen09 note = "\url{http://eprint.iacr.org/2009/272}", } -@Misc{EPRINT:AfzMas09a, - author = "Mehreen Afzal and - Ashraf Masood", - title = "Modifications in the Design of {Trivium} to Increase its Security Level", - year = 2009, - howpublished = "Cryptology ePrint Archive, Report 2009/250", - note = "\url{http://eprint.iacr.org/2009/250}", -} - @Misc{EPRINT:Csirmaz09, author = "Laszlo Csirmaz", title = "On the impossibility of graph secret sharing", @@ -305577,6 +306724,17 @@ @Misc{EPRINT:GeiMatSte09 note = "\url{http://eprint.iacr.org/2009/222}", } +@Misc{EPRINT:CMSW09, + author = "L. Chen and + P. Morrissey and + N.P. Smart and + B. Warinschi", + title = "Security Notions and Generic Constructions for Client Puzzles", + year = 2009, + howpublished = "Cryptology ePrint Archive, Report 2009/331", + note = "\url{http://eprint.iacr.org/2009/331}", +} + @Misc{EPRINT:DGPV09, author = "Elke {De Mulder} and Benedikt Gierlichs and @@ -305628,14 +306786,6 @@ @Misc{EPRINT:TPLYW08 note = "\url{http://eprint.iacr.org/2008/034}", } -@Misc{EPRINT:Khayat08, - author = "Saied Hosseini Khayat", - title = "Using Commutative Encryption to Share a Secret", - year = 2008, - howpublished = "Cryptology ePrint Archive, Report 2008/356", - note = "\url{http://eprint.iacr.org/2008/356}", -} - @Misc{EPRINT:LonGeb08a, author = "Patrick Longa and Catherine Gebotys", @@ -306367,6 +307517,15 @@ @Misc{EPRINT:BCNP08 note = "\url{http://eprint.iacr.org/2008/007}", } +@Misc{EPRINT:LeeYeo08, + author = "Jooyoung Lee and + Yongjin Yeom", + title = "Efficient {RFID} authentication protocols based on pseudorandom sequence generators", + year = 2008, + howpublished = "Cryptology ePrint Archive, Report 2008/343", + note = "\url{http://eprint.iacr.org/2008/343}", +} + @Misc{EPRINT:Billings08, author = "Christopher Billings", title = "The Enigmatique Toolkit", @@ -306797,6 +307956,18 @@ @Misc{EPRINT:BarMah08b note = "\url{http://eprint.iacr.org/2008/033}", } +@Misc{EPRINT:BBDOR08, + author = "Jean-Luc Beuchat and + Nicolas Brisebarre and + J{\'e}r{\'e}mie Detrey and + Eiji Okamoto and + Francisco {Rodr{\'\i}guez-Henr{\'\i}quez}", + title = "A Comparison Between Hardware Accelerators for the Modified {Tate} Pairing over $\mathbb{F}_{2^m}$ and $\mathbb{F}_{3^m}$", + year = 2008, + howpublished = "Cryptology ePrint Archive, Report 2008/115", + note = "\url{http://eprint.iacr.org/2008/115}", +} + @Misc{EPRINT:CouGreHoh08, author = "Scott Coull and Matthew Green and @@ -307624,18 +308795,6 @@ @Misc{EPRINT:MaiPau08 note = "\url{http://eprint.iacr.org/2008/396}", } -@Misc{EPRINT:BBDOR08, - author = "Jean-Luc Beuchat and - Nicolas Brisebarre and - J{\'e}r{\'e}mie Detrey and - Eiji Okamoto and - Francisco {Rodr{\'\i}guez-Henr{\'\i}quez}", - title = "A Comparison Between Hardware Accelerators for the Modified {Tate} Pairing over $\mathbb{F}_{2^m}$ and $\mathbb{F}_{3^m}$", - year = 2008, - howpublished = "Cryptology ePrint Archive, Report 2008/115", - note = "\url{http://eprint.iacr.org/2008/115}", -} - @Misc{EPRINT:HJKLM08, author = "Jin Hong and Kyung Chul Jeong and @@ -310566,15 +311725,6 @@ @Misc{EPRINT:LonMir08a note = "\url{http://eprint.iacr.org/2008/051}", } -@Misc{EPRINT:LeeYeo08, - author = "Jooyoung Lee and - Yongjin Yeom", - title = "Efficient {RFID} authentication protocols based on pseudorandom sequence generators", - year = 2008, - howpublished = "Cryptology ePrint Archive, Report 2008/343", - note = "\url{http://eprint.iacr.org/2008/343}", -} - @Misc{EPRINT:CSHL08a, author = "Donghoon Chang and Jaechul Sung and @@ -310724,6 +311874,14 @@ @Misc{EPRINT:DYCCC08 note = "\url{http://eprint.iacr.org/2008/108}", } +@Misc{EPRINT:Khayat08, + author = "Saied Hosseini Khayat", + title = "Using Commutative Encryption to Share a Secret", + year = 2008, + howpublished = "Cryptology ePrint Archive, Report 2008/356", + note = "\url{http://eprint.iacr.org/2008/356}", +} + @Misc{EPRINT:DuWen08, author = "Hongzhen Du and Qiaoyan Wen", @@ -315447,15 +316605,6 @@ @Misc{EPRINT:ChaSar06b note = "\url{http://eprint.iacr.org/2006/203}", } -@Misc{EPRINT:ChaSar06c, - author = "Debrup Chakraborty and - Palash Sarkar", - title = "A New Mode of Encryption Providing A Tweakable Strong Pseudo-Random", - year = 2006, - howpublished = "Cryptology ePrint Archive, Report 2006/275", - note = "\url{http://eprint.iacr.org/2006/275}", -} - @Misc{EPRINT:Rogaway06, author = "Phillip Rogaway", title = "Formalizing Human Ignorance: Collision-Resistant Hashing without the Keys", @@ -316904,6 +318053,16 @@ @Misc{EPRINT:DutBar06 note = "\url{http://eprint.iacr.org/2006/119}", } +@Misc{EPRINT:LiuHorChe06, + author = "Chao-Liang Liu and + Gwoboa Horng and + Te-Yu Chen", + title = "Further Refinement of Pairing Computation Based on Miller's Algorithm", + year = 2006, + howpublished = "Cryptology ePrint Archive, Report 2006/106", + note = "\url{http://eprint.iacr.org/2006/106}", +} + @Misc{EPRINT:WDDB06, author = "Shuhong Wang and Xuhua Ding and @@ -317605,6 +318764,17 @@ @Misc{EPRINT:KKNY06 note = "\url{http://eprint.iacr.org/2006/148}", } +@Misc{EPRINT:ALYW06a, + author = "Man Ho Au and + Joseph K. Liu and + Y. H. Yuen and + Duncan S. Wong", + title = "{ID-Based} Ring Signature Scheme secure in the Standard Model", + year = 2006, + howpublished = "Cryptology ePrint Archive, Report 2006/205", + note = "\url{http://eprint.iacr.org/2006/205}", +} + @Misc{EPRINT:Schirokauer06, author = "Oliver Schirokauer", title = "The number field sieve for integers of low weight", @@ -318342,6 +319512,15 @@ @Misc{EPRINT:ChaSar06d note = "\url{http://eprint.iacr.org/2006/279}", } +@Misc{EPRINT:ChaSar06c, + author = "Debrup Chakraborty and + Palash Sarkar", + title = "A New Mode of Encryption Providing A Tweakable Strong Pseudo-Random", + year = 2006, + howpublished = "Cryptology ePrint Archive, Report 2006/275", + note = "\url{http://eprint.iacr.org/2006/275}", +} + @Misc{EPRINT:ChaSar06a, author = "Debrup Chakraborty and Palash Sarkar", @@ -318376,14 +319555,6 @@ @Misc{EPRINT:Couveignes06 note = "\url{http://eprint.iacr.org/2006/291}", } -@Misc{EPRINT:Kramer06, - author = "Simon Kramer", - title = "Logical Concepts in Cryptography", - year = 2006, - howpublished = "Cryptology ePrint Archive, Report 2006/262", - note = "\url{http://eprint.iacr.org/2006/262}", -} - @Misc{EPRINT:Lei06, author = "Duo Lei", title = "New Integrated proof Method on Iterated Hash Structure and New Structures", @@ -319022,16 +320193,6 @@ @Misc{EPRINT:GeiSte06 note = "\url{http://eprint.iacr.org/2006/403}", } -@Misc{EPRINT:LiuHorChe06, - author = "Chao-Liang Liu and - Gwoboa Horng and - Te-Yu Chen", - title = "Further Refinement of Pairing Computation Based on Miller's Algorithm", - year = 2006, - howpublished = "Cryptology ePrint Archive, Report 2006/106", - note = "\url{http://eprint.iacr.org/2006/106}", -} - @Misc{EPRINT:GPSW06, author = "Vipul Goyal and Omkant Pandey and @@ -319654,15 +320815,12 @@ @Misc{EPRINT:WZQM06 note = "\url{http://eprint.iacr.org/2006/161}", } -@Misc{EPRINT:ALYW06a, - author = "Man Ho Au and - Joseph K. Liu and - Y. H. Yuen and - Duncan S. Wong", - title = "{ID-Based} Ring Signature Scheme secure in the Standard Model", +@Misc{EPRINT:Kramer06, + author = "Simon Kramer", + title = "Logical Concepts in Cryptography", year = 2006, - howpublished = "Cryptology ePrint Archive, Report 2006/205", - note = "\url{http://eprint.iacr.org/2006/205}", + howpublished = "Cryptology ePrint Archive, Report 2006/262", + note = "\url{http://eprint.iacr.org/2006/262}", } @Misc{EPRINT:ShaKumSax06, @@ -325104,14 +326262,6 @@ @Misc{EPRINT:VasGar04 note = "\url{http://eprint.iacr.org/2004/098}", } -@Misc{EPRINT:DadonElichai04, - author = "Asnat Dadon-Elichai", - title = "{RDS}: Remote Distributed Scheme for Protecting Mobile Agents", - year = 2004, - howpublished = "Cryptology ePrint Archive, Report 2004/023", - note = "\url{http://eprint.iacr.org/2004/023}", -} - @Misc{EPRINT:Mikle04, author = "Ondrej Mikle", title = "Practical Attacks on Digital Signatures Using {MD5} Message Digest", @@ -326490,16 +327640,6 @@ @Misc{EPRINT:Wirt04 note = "\url{http://eprint.iacr.org/2004/289}", } -@Misc{EPRINT:NamKimWon04b, - author = "Junghyun Nam and - Seungjoo Kim and - Dongho Won", - title = "A Weakness in Jung-Paeng-Kim's {ID-based} Conference Key Distribution Scheme", - year = 2004, - howpublished = "Cryptology ePrint Archive, Report 2004/257", - note = "\url{http://eprint.iacr.org/2004/257}", -} - @Misc{EPRINT:NamKimWon04c, author = "Junghyun Nam and Seungjoo Kim and @@ -327016,6 +328156,16 @@ @Misc{EPRINT:LacSch04 note = "\url{http://eprint.iacr.org/2004/324}", } +@Misc{EPRINT:NamKimWon04b, + author = "Junghyun Nam and + Seungjoo Kim and + Dongho Won", + title = "A Weakness in Jung-Paeng-Kim's {ID-based} Conference Key Distribution Scheme", + year = 2004, + howpublished = "Cryptology ePrint Archive, Report 2004/257", + note = "\url{http://eprint.iacr.org/2004/257}", +} + @Misc{EPRINT:NamKimWon04a, author = "Junghyun Nam and Seungjoo Kim and @@ -327109,6 +328259,14 @@ @Misc{EPRINT:CamSet04 note = "\url{http://eprint.iacr.org/2004/147}", } +@Misc{EPRINT:DadonElichai04, + author = "Asnat Dadon-Elichai", + title = "{RDS}: Remote Distributed Scheme for Protecting Mobile Agents", + year = 2004, + howpublished = "Cryptology ePrint Archive, Report 2004/023", + note = "\url{http://eprint.iacr.org/2004/023}", +} + @Misc{EPRINT:Machado04, author = "Alexis W. Machado", title = "An Hybrid Mode of Operation", @@ -329385,6 +330543,16 @@ @Misc{EPRINT:Lindell03b note = "\url{http://eprint.iacr.org/2003/141}", } +@Misc{EPRINT:IwaYagKur03, + author = "Tetsu Iwata and + Tohru Yagi and + Kaoru Kurosawa", + title = "On the Pseudorandomness of {KASUMI} Type Permutations", + year = 2003, + howpublished = "Cryptology ePrint Archive, Report 2003/130", + note = "\url{http://eprint.iacr.org/2003/130}", +} + @Misc{EPRINT:KliPokRos03, author = "Vlastimil Klima and Ondrej Pokorny and @@ -329627,15 +330795,6 @@ @Misc{EPRINT:GolTau03 note = "\url{http://eprint.iacr.org/2003/034}", } -@Misc{EPRINT:BaeZhe03, - author = "Joonsang Baek and - Yuliang Zheng", - title = "Identity-Based Threshold Decryption", - year = 2003, - howpublished = "Cryptology ePrint Archive, Report 2003/164", - note = "\url{http://eprint.iacr.org/2003/164}", -} - @Misc{EPRINT:Gjsteen03, author = "Kristian Gj{\o}steen", title = "Homomorphic public-key systems based on subgroup membership problems", @@ -329752,16 +330911,6 @@ @Misc{EPRINT:TsaVis03 note = "\url{http://eprint.iacr.org/2003/136}", } -@Misc{EPRINT:IwaYagKur03, - author = "Tetsu Iwata and - Tohru Yagi and - Kaoru Kurosawa", - title = "On the Pseudorandomness of {KASUMI} Type Permutations", - year = 2003, - howpublished = "Cryptology ePrint Archive, Report 2003/130", - note = "\url{http://eprint.iacr.org/2003/130}", -} - @Misc{EPRINT:Wang03a, author = "Guilin Wang", title = "Security Analysis of Several Group Signature Schemes", @@ -330109,6 +331258,15 @@ @Misc{EPRINT:Nandi03b note = "\url{http://eprint.iacr.org/2003/158}", } +@Misc{EPRINT:BaeZhe03, + author = "Joonsang Baek and + Yuliang Zheng", + title = "Identity-Based Threshold Decryption", + year = 2003, + howpublished = "Cryptology ePrint Archive, Report 2003/164", + note = "\url{http://eprint.iacr.org/2003/164}", +} + @Misc{EPRINT:IPonomarenko03, author = "D.Grigoriev. I.Ponomarenko", title = "Homomorphic public-key cryptosystems and encrypting boolean circuits", @@ -330251,6 +331409,25 @@ @Misc{EPRINT:BreChePoi02 note = "\url{http://eprint.iacr.org/2002/192}", } +@Misc{EPRINT:TakShiKos02, + author = "Masahiko Takenaka and + Takeshi Shimoyama and + Takeshi Koshiba", + title = "Theoretical Analysis of ``Correlations in {RC6}''", + year = 2002, + howpublished = "Cryptology ePrint Archive, Report 2002/176", + note = "\url{http://eprint.iacr.org/2002/176}", +} + +@Misc{EPRINT:ItkRey02, + author = "Gene Itkis and + Leonid Reyzin", + title = "{SiBIR}: Signer-Base Intrusion-Resilient Signatures", + year = 2002, + howpublished = "Cryptology ePrint Archive, Report 2002/054", + note = "\url{http://eprint.iacr.org/2002/054}", +} + @Misc{EPRINT:Goldreich02a, author = "Oded Goldreich", title = "The {GGM} Construction does {NOT} yield Correlation Intractable Function Ensembles", @@ -330267,6 +331444,14 @@ @Misc{EPRINT:Goldreich02b note = "\url{http://eprint.iacr.org/2002/186}", } +@Misc{EPRINT:Fischlin02, + author = "Marc Fischlin", + title = "The Cramer-Shoup {Strong-RSA} Signature Scheme Revisited", + year = 2002, + howpublished = "Cryptology ePrint Archive, Report 2002/017", + note = "\url{http://eprint.iacr.org/2002/017}", +} + @Misc{EPRINT:CouDauFel02, author = "Nicolas T. Courtois and Magnus Daum and @@ -330512,14 +331697,6 @@ @Misc{EPRINT:Mironov02 note = "\url{http://eprint.iacr.org/2002/067}", } -@Misc{EPRINT:Fischlin02, - author = "Marc Fischlin", - title = "The Cramer-Shoup {Strong-RSA} Signature Scheme Revisited", - year = 2002, - howpublished = "Cryptology ePrint Archive, Report 2002/017", - note = "\url{http://eprint.iacr.org/2002/017}", -} - @Misc{EPRINT:LeeLeeLee02, author = "Ho-Kyu Lee and Hyang-Sook Lee and @@ -330686,15 +331863,6 @@ @Misc{EPRINT:Lynn02 note = "\url{http://eprint.iacr.org/2002/072}", } -@Misc{EPRINT:ItkRey02, - author = "Gene Itkis and - Leonid Reyzin", - title = "{SiBIR}: Signer-Base Intrusion-Resilient Signatures", - year = 2002, - howpublished = "Cryptology ePrint Archive, Report 2002/054", - note = "\url{http://eprint.iacr.org/2002/054}", -} - @Misc{EPRINT:BloSei02, author = "J.\ Bl{\"o}emer and J.-P.\ Seifert", @@ -331061,16 +332229,6 @@ @Misc{EPRINT:HopLanAhn02 note = "\url{http://eprint.iacr.org/2002/137}", } -@Misc{EPRINT:TakShiKos02, - author = "Masahiko Takenaka and - Takeshi Shimoyama and - Takeshi Koshiba", - title = "Theoretical Analysis of ``Correlations in {RC6}''", - year = 2002, - howpublished = "Cryptology ePrint Archive, Report 2002/176", - note = "\url{http://eprint.iacr.org/2002/176}", -} - @Misc{EPRINT:CopJak02, author = "Don Coppersmith and Markus Jakobsson", @@ -333028,6 +334186,15 @@ @Misc{EPRINT:PJMS00 note = "\url{http://eprint.iacr.org/2000/048}", } +@Misc{EPRINT:DesMin00, + author = "Anand Desai and + Sara Miner", + title = "Concrete Security Characterizations of {PRFs} and {PRPs}: Reductions and Applications", + year = 2000, + howpublished = "Cryptology ePrint Archive, Report 2000/029", + note = "\url{http://eprint.iacr.org/2000/029}", +} + @Misc{EPRINT:SahVad00, author = "Amit Sahai and Salil Vadhan", @@ -333082,15 +334249,6 @@ @Misc{EPRINT:SarMai00 note = "\url{http://eprint.iacr.org/2000/009}", } -@Misc{EPRINT:DesMin00, - author = "Anand Desai and - Sara Miner", - title = "Concrete Security Characterizations of {PRFs} and {PRPs}: Reductions and Applications", - year = 2000, - howpublished = "Cryptology ePrint Archive, Report 2000/029", - note = "\url{http://eprint.iacr.org/2000/029}", -} - @Misc{EPRINT:Fischlin00, author = "Marc Fischlin", title = "Implications of the Nontriviality of Entropy Approximation",