Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
IACR
2016
42views Biometrics» more  IACR 2016»
5 years 7 months ago
Open Sesame: The Password Hashing Competition and Argon2
In this document we present an overview of the background to and goals of the Password Hashing Competition (PHC) as well as the design of its winner, Argon2, and its security requi...
Jos Wetzels
IACR
2016
57views Biometrics» more  IACR 2016»
5 years 7 months ago
Characterizations of the Degraded Boolean Function and Cryptanalysis of the SAFER Family
—This paper investigates the degradation properties of Boolean functions from the aspects of the distributions of differences and linear masks, and shows two characterizations of...
Wentan Yi, Shaozhen Chen
IACR
2016
36views Biometrics» more  IACR 2016»
5 years 7 months ago
Quantum Collision-Resistance of Non-Uniformly Distributed Functions
Abstract. We study the quantum query complexity of finding a collision for a function f whose outputs are chosen according to a distribution with min-entropy k. We prove that Ω(...
Ehsan Ebrahimi Targhi, Gelo Noel Tabia, Dominique ...
IACR
2016
42views Biometrics» more  IACR 2016»
5 years 7 months ago
Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices
Abstract. In this paper we consider the fundamental question of optimizing finite field multiplications with one fixed element. Surprisingly, this question did not receive much ...
Christof Beierle, Thorsten Kranz, Gregor Leander
IACR
2016
45views Biometrics» more  IACR 2016»
5 years 7 months ago
Provably Robust Sponge-Based PRNGs and KDFs
We study the problem of devising provably secure PRNGs with input based on the sponge paradigm. Such constructions are very appealing, as efficient software/hardware implementation...
Peter Gazi, Stefano Tessaro
IACR
2016
44views Biometrics» more  IACR 2016»
5 years 7 months ago
Cryptanalysis of PRINCE with Minimal Data
We investigate two attacks on the PRINCE block cipher in the most realistic scenario, when the attacker only has a minimal amount of known plaintext available. The first attack is...
Shahram Rasoolzadeh, Håvard Raddum
IACR
2016
43views Biometrics» more  IACR 2016»
5 years 7 months ago
A trustless privacy-preserving reputation system
Reputation systems are crucial for distributed applications in which users have to be made accountable for their actions, such as ecommerce websites. However, existing systems ofte...
Alexander Schaub, Rémi Bazin, Omar Hasan, L...
IACR
2016
40views Biometrics» more  IACR 2016»
5 years 7 months ago
Refund attacks on Bitcoin's Payment Protocol
BIP70 is a community-accepted Payment Protocol standard that governs how merchants and customers perform payments in Bitcoin. This standard is supported by most major wallets and t...
Patrick McCorry, Siamak Fayyaz Shahandashti, Feng ...
IACR
2016
35views Biometrics» more  IACR 2016»
5 years 7 months ago
Cryptanalysis of ring-LWE based key exchange with key share reuse
ct This paper shows how several ring-LWE based key exchange protocols can be broken, under the assumption that the same key share is used for multiple exchanges. This indicates tha...
Scott R. Fluhrer
IACR
2016
39views Biometrics» more  IACR 2016»
5 years 7 months ago
Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond
We introduce the novel notion of a Proof of Human-work (PoH) and present the first distributed consensus protocol from hard Artificial Intelligence problems. As the name suggest...
Jeremiah Blocki, Hong-Sheng Zhou
books