Efficient Hardware Implementation of MQ Asymmetric Cipher PMI+ on FPGAs, by...
PMI+ is a Multivariate Quadratic (MQ) public key algorithm used for encryption and decryption operations, and belongs to post quantum cryptography.We designs a hardware on FPGAs to efficiently...
View ArticleTriple and Quadruple Encryption: Bridging the Gaps, by Bart Mennink and Bart...
Triple encryption is a cascade of three block cipher evaluations with independent keys, in order to enlarge its key size. This design is proven secure up to approximately 2^{kappa+min{kappa/2,n/2}}...
View ArticleDishonest Majority Multi-Party Computation for Binary Circuits, by Enrique...
We extend the Tiny-OT two party protocol of Nielsen et al (CRYPTO 2012) to the case of $n$ parties in the dishonest majority setting. This is done by presenting a novel way of transferring pairwise...
View ArticleHow to Securely Release Unverified Plaintext in Authenticated Encryption, by...
Scenarios in which authenticated encryption schemes output decrypted plaintext before successful verification raise many security issues. These situations are sometimes unavoidable in practice, such as...
View Article``Ooh Aah... Just a Little Bit'' : A small amount of side channel can go a...
We apply the Flush-Reload side-channel attack based on cache hits/misses to extract a small amount of data from OpenSSL ECDSA signature requests. We then apply a ``standard'' lattice technique to...
View ArticleCrypto-Multimedia, by Benlcouiri Younes and Azizi Abdelmalek and Moulay Chrif...
This paper is structured on securing of storage, transmission and the traceability of digital images. It consists in the design of the cryptographic algorithms appropriate to the case of fixed and...
View ArticleFrom Input Private to Universally Composable Secure Multiparty Computation...
Secure multiparty computation systems are commonly built form a small set of primitive components. Composability of security notions has a central role in the analysis of such systems, since it allows...
View ArticleResettably Sound Zero-Knoweldge Arguments from OWFs - the (semi) Black-Box...
We show how to construct a O(1)-round resettably-sound zero-knowledge argument of knowledge based on one-way functions where additionally the construction and proof of security is black-box....
View ArticleProposing Individualization of the design of cryptographic hardware...
Side channel and fault attacks take advantage from the fact that the behavior of crypto implementations can be observed and provide hints that simplify revealing keys. These attacks are normally...
View ArticleNew Results on Solving Linear Equations Modulo Unknown Divisors and its...
We revisit the problem of finding small solutions to a collection of linear equations modulo an unknown divisor $p$ for a known composite integer $N$. In Asiacrypt'08, Herrmann and May introduced a...
View ArticleToward Robust Hidden Volumes using Write-Only Oblivious RAM, by Erik-Oliver...
With sensitive data being increasingly stored on mobile devices and laptops, hard disk encryption is more important than ever. In particular, being able to plausibly deny that a hard disk contains...
View ArticlePrivate Database Access With HE-over-ORAM Architecture, by Craig Gentry and...
Enabling private database queries is an important and challenging research problem with many real-world applications. The goal is for the client to obtain the results of its queries without learning...
View ArticleTime-Memory Trade-offs for Index Calculus in Genus 3, by Kim Laine and...
In this paper, we present a variant of Diem's $\widetilde{O}(q)$ index calculus algorithm to attack the discrete logarithm problem (DLP) in Jacobians of genus 3 non-hyperelliptic curves over a finite...
View ArticleOne-Way Functions and (Im)perfect Obfuscation, by Ilan Komargodski and Tal...
A program obfuscator takes a program and outputs an "scrambled" version of it, where the goal is that the obfuscated program will not reveal much about its structure beyond what is apparent from...
View ArticleA Simple Cast-as-Intended E-Voting Protocol by Using Secure Smart Cards, by...
We propose a simple cast-as-intended remote e-voting protocol where the security is based on the use of secure (and trusted) smart cards that incorporate incard numeric keyboards and LCD displays, and...
View ArticleZerocash: Decentralized Anonymous Payments from Bitcoin, by Eli Ben-Sasson...
Bitcoin is the first digital currency to see widespread adoption. While payments are conducted between pseudonyms, Bitcoin cannot offer strong privacy guarantees: payment transactions are recorded in a...
View ArticleDistributed Smooth Projective Hashing and its Application to Two-Server PAKE,...
Smooth projective hash functions have been used as building block for various cryptographic applications, in particular for password-based authentication. In this work we propose the extended concept...
View ArticleSecret and Verifiable Delegated Voting for Wide Representation, by Yefim Leifman
This paper combines cryptographic voting and web page ranking and proves that it is possible to hold elections so as not to limit a voter by a list of candidates, to benefit from voter's personal...
View ArticleMulti-Vendor PayWord with Payment Approval, by Andrea Huszti
One of the most well known micropayment scheme is the PayWord scheme. It is designed to be onevendor, so if we apply it for multiple vendors, it does not protect against double spending. We extended...
View ArticleFolding Alternant and Goppa Codes with Non-Trivial Automorphism Groups, by...
The main practical limitation of the McEliece public-key encryption scheme is probably the size of its key. A famous trend to overcome this issue is to focus on subclasses of alternant/Goppa codes with...
View Article