Free ebooks ==> www.Ebook777.com LNCS 8366 Josh Benaloh (Ed.) Topics in Cryptology – CT-RSA 2014 The Cryptographer's Track at the RSA Conference 2014 San Francisco, CA, USA, February 25-28, 2014 Proceedings 123 www.Ebook777.com Free ebooks ==> www.Ebook777.com Lecture Notes in Computer Science Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen TU Dortmund University, Germany Madhu Sudan Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max Planck Institute for Informatics, Saarbruecken, Germany www.Ebook777.com 8366 Josh Benaloh (Ed.) Topics in Cryptology – CT-RSA 2014 The Cryptographer’s Track at the RSA Conference 2014 San Francisco, CA, USA, February 25-28, 2014 Proceedings 13 Volume Editor Josh Benaloh Microsoft Research Redmond, WA, USA E-mail: benaloh@microsoft.com ISSN 0302-9743 e-ISSN 1611-3349 ISBN 978-3-319-04851-2 e-ISBN 978-3-319-04852-9 DOI 10.1007/978-3-319-04852-9 Springer Cham Heidelberg New York Dordrecht London Library of Congress Control Number: 2014930761 LNCS Sublibrary: SL – Security and Cryptology © Springer International Publishing Switzerland 2014 This work is subject to copyright All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed Exempted from this legal reservation are brief excerpts in connection with reviews or scholarly analysis or material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work Duplication of this publication or parts thereof is permitted only under the provisions of the Copyright Law of the Publisher’s location, in its current version, and permission for use must always be obtained from Springer Permissions for use may be obtained through RightsLink at the Copyright Clearance Center Violations are liable to prosecution under the respective Copyright Law The use of general descriptive names, registered names, trademarks, service marks, etc in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use While the advice and information in this book are believed to be true and accurate at the date of publication, neither the authors nor the editors nor the publisher can accept any legal responsibility for any errors or omissions that may be made The publisher makes no warranty, express or implied, with respect to the material contained herein Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper Springer is part of Springer Science+Business Media (www.springer.com) Free ebooks ==> www.Ebook777.com Preface The RSA conference has been a major international event for information security experts since its inception in 1991 It is an annual event that attracts hundreds of vendors and thousands of participants from industry, government, and academia Since 2001, the RSA conference has included the Cryptographers’ Track (CT-RSA), which provides a forum for current research in cryptography CT-RSA has become a major publication venue for cryptographers This volume represents the proceedings of the 2014 RSA Conference Cryptographers’ Track which was held in San Francisco, California, February 25–28, 2014 A total of 66 submissions were received out of which 25 papers were selected As Chair of the Program Committee, I heartily thank all of the authors who contributed their innovative ideas and all of the Program Committee members and their designated assistants who carefully reviewed the submissions The evaluation process was thorough with each submission receiving at least three independent reviews (four if the submitted paper included a Program Committee member as an author) and extensive discussion to complete the selection process Antione Joux of the University of Versailles delivered an invited address on Discrete Logarithms: Recent Progress (and Open Problems) and Bart Preneel moderated a panel discussion on pseudo-random number generators featuring Dan Boneh, Paul Kocher, Adi Shamir, and Dan Shumow December 2013 Josh Benaloh www.Ebook777.com Organization The RSA Cryptographers’ Track is an independently managed component of the annual RSA Conference Steering Committee Josh Benaloh Ed Dawson Orr Dunkelman Ari Juels Ron Rivest Moti Yung Microsoft Research, USA Queensland University of Technology, Australia University of Haifa, Israel Roving Chief Scientist, USA Massachusetts Institute of Technology, USA Google, USA Program Chair Josh Benaloh Microsoft Research, USA Program Committee Josh Benaloh (Chair) Tom Berson Alex Biryukov John Black Xavier Boyen Christian Cachin Orr Dunkelman Steven D Galbraith Jens Groth Helena Handschuh Marc Joye John Kelsey Kwangjo Kim Lars Knudsen Alptekin Kă upácu ă Susan Langford Anna Lysyanskaya Microsoft Research, USA Anagram Laboratories, USA University of Luxembourg, Luxembourg University of Colorado, USA Queensland University of Technology, Australia IBM Research, Switzerland University of Haifa, Israel University of Auckland, New Zealand University College London, UK Cryptography Research, Inc., USA Technicolor, France National Institute of Standards and Technology, USA Korea Advanced Institute of Science and Technology, South Korea Technical University of Denmark, Denmark Ko¸c University, Turkey Hewlett-Packard, USA Brown University, USA VIII Organization Mitsuru Matsui Sarah Meiklejohn Daniele Micciancio Tal Moran Bart Preneel Christian Rechberger Matt Robshaw Rei Safavi-Naini Nigel Smart Vanessa Teague Eran Tromer Serge Vaudenay Hoeteck Wee Yiqun Lisa Yin Mitsubishi Electric, Japan University of California, San Diego, USA University of California, San Diego, USA Interdisciplinary Center Herzliya, Israel KU Leuven, Belgium Technical University of Denmark, Denmark Impinj, USA University of Calgary, Canada University of Bristol, UK University of Melbourne, Australia Tel Aviv University, Israel ´ Ecole Polytechnique F´ed´erale de Lausanne, Switzerland George Washington University, USA Independent Security Consultant, USA External Reviewers Hadi Ahmadi Toru Akishita Martin Albrecht Mohsen Alimomeni Giuseppe Ateniese Shi Bai Sonia Bogos Pyrros Chaidos Jie Chen Sherman Chow Craig Costello Claus Diem Patrick Derbez Alexandre Duc Leo Ducas Mohammad Etemad Sebastian Faust Benedikt Gierlichs Aurore Guillevic Mhavir Jhawar Seny Kamara Mohamed Karroumi Dmitry Khovratovich Handan Kln¸c Mark Marson Bart Mennink Gregory Neven Claudio Orlandi Ilan Orlov Ray Perlner Leo Perrin Emmanuel Prouff Pandu Rangan Reza Reyhanitabar Arnab Roy Minoru Saeki Sumanta Sarkar Sven Schăage Siamak Shahandashti Kouichi Shimizu Tom Shrimpton Daniel Smith Mario Strefler Takeshi Sugawara Daisuke Suzuki Liangfeng Zhang Table of Contents Non-integral Asymmetric Functions Efficient and Secure Algorithms for GLV-Based Scalar Multiplication and Their Implementation on GLV-GLS Curves Armando Faz-Hern´ andez, Patrick Longa, and Ana H S´ anchez An Improved Compression Technique for Signatures Based on Learning with Errors Shi Bai and Steven D Galbraith 28 Public-Key Encryption A Generic View on Trace-and-Revoke Broadcast Encryption Schemes Dennis Hofheinz and Christoph Striecks 48 Broadcast Steganography Nelly Fazio, Antonio R Nicolosi, and Irippuge Milinda Perera 64 Practical Dual-Receiver Encryption: Soundness, Complete Non-malleability, and Applications Sherman S.M Chow, Matthew Franklin, and Haibin Zhang 85 Hardware Implementations Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation Jeroen Delvaux and Ingrid Verbauwhede 106 On Increasing the Throughput of Stream Ciphers Frederik Armknecht and Vasily Mikhalev 132 On Double Exponentiation for Securing RSA against Fault Analysis Duc-Phong Le, Matthieu Rivain, and Chik How Tan 152 Side-Channel Attacks On the Practical Security of a Leakage Resilient Masking Scheme Emmanuel Prouff, Matthieu Rivain, and Thomas Roche 169 The Myth of Generic DPA and the Magic of Learning Carolyn Whitnall, Elisabeth Oswald, and Fran¸cois-Xavier Standaert 183 X Table of Contents Hardware Implementation and Side-Channel Analysis of Lapin Lubos Gaspar, Gaăetan Leurent, and Franácois-Xavier Standaert 206 Symmetric Encryption and Cryptanalysis Automatic Search for Differential Trails in ARX Ciphers Alex Biryukov and Vesselin Velichkov 227 CBEAM: Efficient Authenticated Encryption from Feebly One-Way φ Functions Markku-Juhani O Saarinen 251 Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation Markku-Juhani O Saarinen 270 Digital Signatures Group Signatures with Message-Dependent Opening in the Standard Model Benoˆıt Libert and Marc Joye 286 Practical Distributed Signatures in the Standard Model Yujue Wang, Duncan S Wong, Qianhong Wu, Sherman S.M Chow, Bo Qin, and Jianwei Liu 307 Decentralized Traceable Attribute-Based Signatures Ali El Kaafarani, Essam Ghadafi, and Dalia Khader 327 Protocols Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions Theresa Calderon, Sarah Meiklejohn, Hovav Shacham, and Brent Waters 349 P2 OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures Qiong Huang, Duncan S Wong, and Willy Susilo 367 2-Pass Key Exchange Protocols from CPA-Secure KEM Kaoru Kurosawa and Jun Furukawa 385 Hash Function Cryptanalysis Analysis of BLAKE2 Jian Guo, Pierre Karpman, Ivica Nikoli´c, Lei Wang, and Shuang Wu 402 Free ebooks ==> www.Ebook777.com Table of Contents XI An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grφstl Yu Sasaki, Yuuki Tokushige, Lei Wang, Mitsugu Iwamoto, and Kazuo Ohta 424 Practical Collision Attack on 40-Step RIPEMD-128 Gaoli Wang 444 Applications of Cryptographic Primitives KDM Security in the Hybrid Framework Gareth T Davies and Martijn Stam 461 Key Wrapping with a Fixed Permutation Dmitry Khovratovich 481 Author Index 501 www.Ebook777.com ... contained herein Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper Springer is part of Springer Science+Business... performing a linear pass over the whole precomputed table using conditional move instructions The final value si P [Ki ] is then obtained by performing a second linear pass over the points P... mapping is inexpensive in comparison to point addition, then sub-tables can be computed by simply applying the endomorphism to the first sub-table arising from the base point P0 In some instances,