Adaptive Proofs of Knowledge in the Random Oracle Model, by David Bernhard...
We formalise the notion of adaptive proofs of knowledge in the random oracle model, where the extractor has to recover witnesses for multiple, possibly adaptively chosen statements and proofs. We also...
View ArticleOn the Hardness of Proving CCA-security of Signed ElGamal, by David Bernhard...
The well-known Signed ElGamal scheme consists of ElGamal encryption with a non-interactive Schnorr proof of knowledge. While this scheme should be intuitively secure against chosen-ciphertext attacks...
View ArticleA New Encryption Standard of Ukraine: The Kalyna Block Cipher, by Roman...
The Kalyna block cipher was selected during Ukrainian National Public Cryptographic Competition (2007-2010) and its slight modification was approved as the new encryption standard of Ukraine in 2015....
View ArticleSecure Execution Architecture based on PUF-driven Instruction Level Code...
A persistent problem with program execution, despite numerous mitigation attempts, is its inherent vulnerability to the injection of malicious code. Equally unsolved is the susceptibility of firmware...
View ArticleModelling ciphersuite and version negotiation in the TLS protocol, by...
Real-world cryptographic protocols such as the widely used Transport Layer Security (TLS) protocol support many different combinations of cryptographic algorithms (called ciphersuites) and...
View ArticleHomomorphic Signature Schemes - A survey, by Giulia Traverso and Denise...
Homomorphic signature schemes are an important primitive for many applications and since their introduction numerous solutions have been presented. Thus, in this work we provide the first exhaustive,...
View ArticleRelated-Key Security for Pseudorandom Functions Beyond the Linear Barrier, by...
Related-key attacks (RKAs) concern the security of cryptographic primitives in the situation where the key can be manipulated by the adversary. In the RKA setting, the adversary's power is expressed...
View ArticleSide-Channel Leakage and Trace Compression using Normalized Inter-Class...
Security and safety critical devices must undergo penetration testing including Side-Channel Attacks (SCA) before certification. SCA are powerful and easy to mount but often need huge computation...
View ArticleOverview of the Candidates for the Password Hashing Competition - And Their...
In this work we provide an overview of the candidates of the Password Hashing Competition (PHC) regarding to their functionality, e.g., client-independent update and server relief, their security,...
View ArticleStructural Evaluation by Generalized Integral Property, by Yosuke Todo
In this paper, we show structural cryptanalyses against two popular networks, i.e., the Feistel Network and the Substitute-Permutation Network (SPN). Our cryptanalyses are distinguishing attacks by an...
View ArticleTighter, faster, simpler side-channel security evaluations beyond computing...
A Eurocrypt 2013 paper "Security evaluations beyond computing power: How to analyze side-channel attacks you cannot mount?" by Veyrat-Charvillon, Gérard, and Standaert proposed a "Rank Estimation...
View ArticleEclipse Attacks on Bitcoin's Peer-to-Peer Network, by Ethan Heilman. Alison...
We present eclipse attacks on bitcoin's peer-to-peer network. Our attack allows an adversary controlling a sufficient number of IP addresses to monopolize all connections to and from a victim bitcoin...
View ArticleDAA-TZ: An Efficient DAA Scheme for Mobile Devices using ARM TrustZone, by Bo...
Direct Anonymous Attestation (DAA) has been studied for applying to mobile devices based on ARM TrustZone. However, current solutions bring in extra performance overheads and security risks when...
View ArticleAn Efficient Multi-Message Multi-Receiver Signcryption Scheme with Forward...
Secure multicast communication has application in growing number of applications. Forward secrecy is of prime importance and insures message confidentiality even long-term private key compromised. We...
View ArticleCryptanalysis of a Markov Chain Based User Authentication Scheme, by Ruhul...
Session key agreement protocol using smart card is extremely popular in client-server environment for secure communication. Remote user authentication protocol plays a crucial role in our daily life...
View ArticleRandomizing the Montgomery Powering Ladder, by Duc-Phong Le, Chik How Tan and...
In this paper, we present novel randomized techniques to enhance Montgomery powering ladder. The proposed techniques increase the resistance against side-channel attacks and especially recently...
View ArticleSingle-Cycle Implementations of Block Ciphers, by Pieter Maene and Ingrid...
Security mechanisms to protect our systems and data from malicious adversaries have become essential. Strong encryption algorithms are an important building block of these solutions. However, each...
View ArticleDiversity and Transparency for ECC, by Jean-Pierre Flori and Jérôme Plût and...
Generating and standardizing elliptic curves to use them in a cryptographic context is a hard task. In this note, we don't make an explicit proposal for an elliptic curve, but we deal with the...
View ArticleA Hybrid Gaussian Sampler for Lattices over Rings, by Léo Ducas and Thomas Prest
Gaussian sampling over lattices is a cornerstone of lattice-based cryptography as it allows to build numerous cryptographic primitives. There are two main algorithms performing this task. The first one...
View ArticleCryptanalysis of a modern rotor machine in a multicast setting, by Shane...
At FSE '93, Anderson presented a modern byte-oriented ro- tor machine that is suitable for fast software implementation. Building on a combination of chosen ciphertexts and chosen plaintexts, we show...
View Article