Sciweavers

Share
6 search results - page 1 / 2
» pc 2016
Sort
View
PC
2016
110views Management» more  PC 2016»
4 years 3 months ago
Writing a performance-portable matrix multiplication
There are several frameworks that, while providing functional portability of code across different platforms, do not automatically provide performance portability. As a consequen...
Jorge F. Fabeiro, Diego Andrade, Basilio B. Frague...
IACR
2016
47views Biometrics» more  IACR 2016»
4 years 3 months ago
On the Power of Secure Two-Party Computation
Ishai, Kushilevitz, Ostrovsky and Sahai (STOC 2007, SIAM JoC 2009) introduced the powerful “MPC-in-the-head” technique that provided a general transformation of information-th...
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
CTRSA
2016
Springer
66views Cryptology» more  CTRSA 2016»
4 years 3 months ago
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs
We present the first physical side-channel attack on elliptic curve cryptography running on a PC. The attack targets the ECDH public-key encryption algorithm, as implemented in t...
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran ...
ACSC
2016
IEEE
4 years 3 months ago
Finding state collisions in the authenticated encryption stream cipher ACORN
This paper analyzes the authenticated encryption algorithm ACORN, a candidate in the CAESAR cryptographic competition. We identify weaknesses in the state update function of ACORN ...
Md. Iftekhar Salam, Kenneth Koon-Ho Wong, Harry Ba...
books