Sciweavers

CTRSA
2016
Springer
84views Cryptology» more  CTRSA 2016»
7 years 12 months ago
Private Large-Scale Databases with Distributed Searchable Symmetric Encryption
With the growing popularity of remote storage, the ability to outsource a large private database yet be able to search on this encrypted data is critical. Searchable symmetric encr...
Yuval Ishai, Eyal Kushilevitz, Steve Lu, Rafail Os...
CTRSA
2016
Springer
83views Cryptology» more  CTRSA 2016»
7 years 12 months ago
Short Randomizable Signatures
David Pointcheval, Olivier Sanders
CTRSA
2016
Springer
80views Cryptology» more  CTRSA 2016»
7 years 12 months ago
From Stateless to Stateful: Generic Authentication and Authenticated Encryption Constructions with Application to TLS
Authentication and authenticated encryption with associated data (AEAD) are applied in cryptographic protocols to provide message integrity. The definitions in the literature and...
Colin Boyd, Britta Hale, Stig Frode Mjølsne...
CTRSA
2016
Springer
68views Cryptology» more  CTRSA 2016»
7 years 12 months ago
Strongly Leakage-Resilient Authenticated Key Exchange
Abstract. Authenticated Key Exchange (AKE) protocols have been widely deployed in many real-world applications for securing communication channels. In this paper, we make the follo...
Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fu...
CTRSA
2016
Springer
66views Cryptology» more  CTRSA 2016»
7 years 12 months ago
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs
We present the first physical side-channel attack on elliptic curve cryptography running on a PC. The attack targets the ECDH public-key encryption algorithm, as implemented in t...
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran ...
Cryptology
Top of PageReset Settings