Sciweavers

IACR
2016
32views Biometrics» more  IACR 2016»
8 years 2 months ago
Implementing a Toolkit for Ring-LWE Based Cryptography in Arbitrary Cyclotomic Number Fields
Recent research in the field of lattice-based cryptography, especially on the topic of the ring-based primitive ring-LWE, provided efficient and practical ring-based cryptographi...
Christoph M. Mayer
IACR
2016
41views Biometrics» more  IACR 2016»
8 years 2 months ago
Cryptanalysis of 6-round PRINCE using 2 Known Plaintexts
In this paper we focus on the PRINCE block cipher reduced to 6 rounds, with two known plaintext/ciphertext pairs. We develop two attacks on 6-round PRINCE based on accelerated exha...
Shahram Rasoolzadeh, Håvard Raddum
IACR
2016
43views Biometrics» more  IACR 2016»
8 years 2 months ago
Rate-1, Linear Time and Additively Homomorphic UC Commitments
We propose the first UC commitment scheme for binary strings with the optimal properties of rate approaching 1 and linear time (in the amortised sense, using a small number of see...
Ignacio Cascudo, Ivan Damgård, Bernardo Davi...
IACR
2016
44views Biometrics» more  IACR 2016»
8 years 2 months ago
Speed Optimizations in Bitcoin Key Recovery Attacks
In this paper we study and give the first detailed benchmarks on existing implementations of the secp256k1 elliptic curve used by at least hundreds of thousands of users in Bitco...
Nicolas Courtois, Guangyan Song, Ryan Castellucci
IACR
2016
49views Biometrics» more  IACR 2016»
8 years 2 months ago
Analysing and Exploiting the Mantin Biases in RC4
We explore the use of the Mantin biases (Mantin, Eurocrypt 2005) to recover plaintexts from RC4-encrypted traffic. We provide a more fine-grained analysis of these biases than in ...
Remi Bricout, Sean Murphy, Kenneth G. Paterson, Th...
IACR
2016
44views Biometrics» more  IACR 2016»
8 years 2 months ago
A NEW UNLINKABLE SECRET HANDSHAKES SCHEME BASED ON ZSS
Secret handshakes (SH) scheme is a key agreement protocol between two members of the same group. Under this scheme two members share a common key if and only if they both belong t...
Preeti Kulshrestha, Arun Kumar
IACR
2016
38views Biometrics» more  IACR 2016»
8 years 2 months ago
Balloon Hashing: Provably Space-Hard Hash Functions with Data-Independent Access Patterns
Abstract. We present the Balloon family of password hashing functions. These are the first cryptographic hash functions with proven space-hardness properties that: (i) use a passw...
Henry Corrigan-Gibbs, Dan Boneh, Stuart E. Schecht...
HIJ
2016
86views Biometrics» more  HIJ 2016»
8 years 2 months ago
Effects of electronic emergency-department whiteboards on clinicians' time distribution and mental workload
Whiteboards are a central tool at emergency departments. We investigate how the substitution of electronic for dry-erase whiteboards affects emergency department clinicians’ men...
Morten Hertzum, Jesper Simonsen
HICSS
2016
IEEE
50views Biometrics» more  HICSS 2016»
8 years 2 months ago
Observing the Materiality of Values in Information Systems Research
Research focused on values in information systems (IS) is conducted using a diversity of approaches, methods and theoretical frameworks. This paper presents a systematic literatur...
Jaime Snyder, Katie Shilton, Sara Anderson
HICSS
2016
IEEE
56views Biometrics» more  HICSS 2016»
8 years 2 months ago
Investigating Users' Reaction to Fine-Grained Data Requests: A Market Experiment
The market for smartphone applications is steadily growing. Unfortunately, along with this growth, the number of malicious applications is increasing as well. To identify this mal...
Nicole Eling, Siegfried Rasthofer, Max Kolhagen, E...