Recent research in the field of lattice-based cryptography, especially on the topic of the ring-based primitive ring-LWE, provided efficient and practical ring-based cryptographi...
In this paper we focus on the PRINCE block cipher reduced to 6 rounds, with two known plaintext/ciphertext pairs. We develop two attacks on 6-round PRINCE based on accelerated exha...
We propose the first UC commitment scheme for binary strings with the optimal properties of rate approaching 1 and linear time (in the amortised sense, using a small number of see...
In this paper we study and give the first detailed benchmarks on existing implementations of the secp256k1 elliptic curve used by at least hundreds of thousands of users in Bitco...
We explore the use of the Mantin biases (Mantin, Eurocrypt 2005) to recover plaintexts from RC4-encrypted traffic. We provide a more fine-grained analysis of these biases than in ...
Remi Bricout, Sean Murphy, Kenneth G. Paterson, Th...
Secret handshakes (SH) scheme is a key agreement protocol between two members of the same group. Under this scheme two members share a common key if and only if they both belong t...
Abstract. We present the Balloon family of password hashing functions. These are the first cryptographic hash functions with proven space-hardness properties that: (i) use a passw...
Henry Corrigan-Gibbs, Dan Boneh, Stuart E. Schecht...
Whiteboards are a central tool at emergency departments. We investigate how the substitution of electronic for dry-erase whiteboards affects emergency department clinicians’ men...
Research focused on values in information systems (IS) is conducted using a diversity of approaches, methods and theoretical frameworks. This paper presents a systematic literatur...
The market for smartphone applications is steadily growing. Unfortunately, along with this growth, the number of malicious applications is increasing as well. To identify this mal...
Nicole Eling, Siegfried Rasthofer, Max Kolhagen, E...