Sciweavers

58 search results - page 3 / 12
» crypto 2008
Sort
View
CRYPTO
2008
Springer
109views Cryptology» more  CRYPTO 2008»
13 years 7 months ago
Adaptive One-Way Functions and Applications
Abstract. We introduce new and general complexity theoretic hardumptions. These assumptions abstract out concrete properties of a random oracle and are significantly stronger than ...
Omkant Pandey, Rafael Pass, Vinod Vaikuntanathan
CRYPTO
2008
Springer
76views Cryptology» more  CRYPTO 2008»
13 years 7 months ago
Scalable Multiparty Computation with Nearly Optimal Work and Resilience
We present the first general protocol for secure multiparty computation in which the total amount of work required by n players to compute a function f grows only polylogarithmical...
Ivan Damgård, Yuval Ishai, Mikkel Krø...
DSD
2008
IEEE
110views Hardware» more  DSD 2008»
13 years 7 months ago
VLSI Implementation of a Cryptography-Oriented Reconfigurable Array
The long-word and very long-word addition required in cryptography applications generally requires custom hardware support provided by ASICs or application-specific instructions i...
Scott Miller, Ambrose Chu, Mihai Sima, Michael McG...
CRYPTO
2008
Springer
165views Cryptology» more  CRYPTO 2008»
13 years 7 months ago
Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries
In this work we study the design of secure protocols for linear algebra problems. All current solutions to the problem are either inefficient in terms of communication complexity o...
Payman Mohassel, Enav Weinreb
CRYPTO
2008
Springer
70views Cryptology» more  CRYPTO 2008»
13 years 7 months ago
Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers
We propose a family of compression functions built from fixed-key blockciphers and investigate their collision and preimage security in the ideal-cipher model. The constructions ha...
Phillip Rogaway, John P. Steinberger