Sciweavers

ACNS
2015
Springer
24views Cryptology» more  ACNS 2015»
8 years 21 days ago
Communication-Optimal Proactive Secret Sharing for Dynamic Groups
Proactive secret sharing (PSS) schemes are designed for settings where long-term confidentiality of secrets has to be guaranteed, specifically, when all participating parties ma...
Joshua Baron, Karim El Defrawy, Joshua Lampkins, R...
ACNS
2015
Springer
22views Cryptology» more  ACNS 2015»
8 years 21 days ago
Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources
Cryptographic protocols are commonly designed and their security proven under the assumption that the protocol parties have access to perfect (uniform) randomness. Physical randomn...
Michael Backes 0001, Aniket Kate, Sebastian Meiser...
ACNS
2015
Springer
18views Cryptology» more  ACNS 2015»
8 years 21 days ago
Post-Quantum Forward-Secure Onion Routing - (Future Anonymity in Today's Budget)
The onion routing (OR) network Tor provides anonymity to its users by routing their encrypted traffic through three proxies (or nodes). The key cryptographic challenge, here, is ...
Satrajit Ghosh, Aniket Kate
ACNS
2015
Springer
20views Cryptology» more  ACNS 2015»
8 years 21 days ago
Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking
Alberto Compagno, Mauro Conti, Paolo Gasti, Luigi ...
ACNS
2015
Springer
21views Cryptology» more  ACNS 2015»
8 years 21 days ago
Arithmetic Addition over Boolean Masking - Towards First- and Second-Order Resistance in Hardware
A common countermeasure to thwart side-channel analysis attacks is algorithmic masking. For this, algorithms that mix Boolean and arithmetic operations need to either apply two di...
Tobias Schneider, Amir Moradi, Tim Güneysu
ACNS
2015
Springer
21views Cryptology» more  ACNS 2015»
8 years 21 days ago
Leakage-Resilient Cryptography over Large Finite Fields: Theory and Practice
Information leakage is a major concern in modern day IT-security. In fact, a malicious user is often able to extract information about private values from the computation performe...
Marcin Andrychowicz, Daniel Masny, Edoardo Persich...
ACNS
2015
Springer
28views Cryptology» more  ACNS 2015»
8 years 21 days ago
mrPUF: A Novel Memristive Device Based Physical Unclonable Function
Physical unclonable functions (PUFs) exploit the intrinsic complexity and irreproducibility of physical systems to generate secret information. They have been proposed to provide h...
Yansong Gao, Damith Chinthana Ranasinghe, Said F. ...
ACNS
2015
Springer
17views Cryptology» more  ACNS 2015»
8 years 21 days ago
Scalable Divisible E-cash
Sébastien Canard, David Pointcheval, Olivie...
ACNS
2015
Springer
20views Cryptology» more  ACNS 2015»
8 years 21 days ago
Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information
Abstract. Search engines are the prevalently used tools to collect information about individuals on the Internet. Search results typically comprise a variety of sources that contai...
Milivoj Simeonovski, Fabian Bendun, Muhammad Rizwa...
ACNS
2015
Springer
24views Cryptology» more  ACNS 2015»
8 years 21 days ago
Robust Pseudo-Random Number Generators with Input Secure Against Side-Channel Attacks
Michel Abdalla, Sonia Belaïd, David Pointchev...