Quantcast
Channel: Cryptology ePrint Archive
Browsing all 30146 articles
Browse latest View live

Adaptive Proofs of Knowledge in the Random Oracle Model, by David Bernhard...

We formalise the notion of adaptive proofs of knowledge in the random oracle model, where the extractor has to recover witnesses for multiple, possibly adaptively chosen statements and proofs. We also...

View Article


On the Hardness of Proving CCA-security of Signed ElGamal, by David Bernhard...

The well-known Signed ElGamal scheme consists of ElGamal encryption with a non-interactive Schnorr proof of knowledge. While this scheme should be intuitively secure against chosen-ciphertext attacks...

View Article


A New Encryption Standard of Ukraine: The Kalyna Block Cipher, by Roman...

The Kalyna block cipher was selected during Ukrainian National Public Cryptographic Competition (2007-2010) and its slight modification was approved as the new encryption standard of Ukraine in 2015....

View Article

Secure Execution Architecture based on PUF-driven Instruction Level Code...

A persistent problem with program execution, despite numerous mitigation attempts, is its inherent vulnerability to the injection of malicious code. Equally unsolved is the susceptibility of firmware...

View Article

Modelling ciphersuite and version negotiation in the TLS protocol, by...

Real-world cryptographic protocols such as the widely used Transport Layer Security (TLS) protocol support many different combinations of cryptographic algorithms (called ciphersuites) and...

View Article


Homomorphic Signature Schemes - A survey, by Giulia Traverso and Denise...

Homomorphic signature schemes are an important primitive for many applications and since their introduction numerous solutions have been presented. Thus, in this work we provide the first exhaustive,...

View Article

Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier, by...

Related-key attacks (RKAs) concern the security of cryptographic primitives in the situation where the key can be manipulated by the adversary. In the RKA setting, the adversary's power is expressed...

View Article

Side-Channel Leakage and Trace Compression using Normalized Inter-Class...

Security and safety critical devices must undergo penetration testing including Side-Channel Attacks (SCA) before certification. SCA are powerful and easy to mount but often need huge computation...

View Article


Overview of the Candidates for the Password Hashing Competition - And Their...

In this work we provide an overview of the candidates of the Password Hashing Competition (PHC) regarding to their functionality, e.g., client-independent update and server relief, their security,...

View Article


Structural Evaluation by Generalized Integral Property, by Yosuke Todo

In this paper, we show structural cryptanalyses against two popular networks, i.e., the Feistel Network and the Substitute-Permutation Network (SPN). Our cryptanalyses are distinguishing attacks by an...

View Article

Tighter, faster, simpler side-channel security evaluations beyond computing...

A Eurocrypt 2013 paper "Security evaluations beyond computing power: How to analyze side-channel attacks you cannot mount?" by Veyrat-Charvillon, Gérard, and Standaert proposed a "Rank Estimation...

View Article

Eclipse Attacks on Bitcoin's Peer-to-Peer Network, by Ethan Heilman. Alison...

We present eclipse attacks on bitcoin's peer-to-peer network. Our attack allows an adversary controlling a sufficient number of IP addresses to monopolize all connections to and from a victim bitcoin...

View Article

DAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone, by Bo...

Direct Anonymous Attestation (DAA) has been studied for applying to mobile devices based on ARM TrustZone. However, current solutions bring in extra performance overheads and security risks when...

View Article


An Efficient Multi-Message Multi-Receiver Signcryption Scheme with Forward...

Secure multicast communication has application in growing number of applications. Forward secrecy is of prime importance and insures message confidentiality even long-term private key compromised. We...

View Article

Cryptanalysis of a Markov Chain Based User Authentication Scheme, by Ruhul...

Session key agreement protocol using smart card is extremely popular in client-server environment for secure communication. Remote user authentication protocol plays a crucial role in our daily life...

View Article


Randomizing the Montgomery Powering Ladder, by Duc-Phong Le, Chik How Tan and...

In this paper, we present novel randomized techniques to enhance Montgomery powering ladder. The proposed techniques increase the resistance against side-channel attacks and especially recently...

View Article

Single-Cycle Implementations of Block Ciphers, by Pieter Maene and Ingrid...

Security mechanisms to protect our systems and data from malicious adversaries have become essential. Strong encryption algorithms are an important building block of these solutions. However, each...

View Article


Diversity and Transparency for ECC, by Jean-Pierre Flori and Jérôme Plût and...

Generating and standardizing elliptic curves to use them in a cryptographic context is a hard task. In this note, we don't make an explicit proposal for an elliptic curve, but we deal with the...

View Article

A Hybrid Gaussian Sampler for Lattices over Rings, by Léo Ducas and Thomas Prest

Gaussian sampling over lattices is a cornerstone of lattice-based cryptography as it allows to build numerous cryptographic primitives. There are two main algorithms performing this task. The first one...

View Article

Cryptanalysis of a modern rotor machine in a multicast setting, by Shane...

At FSE '93, Anderson presented a modern byte-oriented ro- tor machine that is suitable for fast software implementation. Building on a combination of chosen ciphertexts and chosen plaintexts, we show...

View Article
Browsing all 30146 articles
Browse latest View live