Sciweavers

Share
ASIACRYPT
2009
Springer
9 years 5 months ago
Hedged Public-Key Encryption: How to Protect against Bad Randomness
Abstract. Public-key encryption schemes rely for their IND-CPA security on per-message fresh randomness. In practice, randomness may be of poor quality for a variety of reasons, le...
Mihir Bellare, Zvika Brakerski, Moni Naor, Thomas ...
ASIACRYPT
2009
Springer
9 years 6 months ago
Proofs of Storage from Homomorphic Identification Protocols
Proofs of storage (PoS) are interactive protocols allowing a client to verify that a server faithfully stores a file. Previous work has shown that proofs of storage can be constru...
Giuseppe Ateniese, Seny Kamara, Jonathan Katz
ASIACRYPT
2009
Springer
9 years 7 months ago
PSS Is Secure against Random Fault Attacks
A fault attack consists in inducing hardware malfunctions in order to recover secrets from electronic devices. One of the most famous fault attack is Bellcore’s attack against RS...
Jean-Sébastien Coron, Avradip Mandal
ASIACRYPT
2009
Springer
9 years 7 months ago
MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners
Florian Mendel, Christian Rechberger, Martin Schl&...
ASIACRYPT
2009
Springer
9 years 7 months ago
Quantum-Secure Coin-Flipping and Applications
Ivan Damgård, Carolin Lunemann
ASIACRYPT
2009
Springer
9 years 8 months ago
Cascade Encryption Revisited
Abstract. The security of cascade blockcipher encryption is an important and well-studied problem in theoretical cryptography with practical implications. It is well-known that dou...
Peter Gazi, Ueli M. Maurer
ASIACRYPT
2009
Springer
9 years 8 months ago
On the Analysis of Cryptographic Assumptions in the Generic Ring Model
At Eurocrypt 2009 Aggarwal and Maurer proved that breaking RSA is equivalent to factoring in the generic ring model. This model captures algorithms that may exploit the full algeb...
Tibor Jager, Jörg Schwenk
ASIACRYPT
2009
Springer
9 years 8 months ago
Linearization Framework for Collision Attacks: Application to CubeHash and MD6
In this paper, an improved differential cryptanalysis framework for finding collisions in hash functions is provided. Its principle is based on linearization of compression functi...
Eric Brier, Shahram Khazaei, Willi Meier, Thomas P...
ASIACRYPT
2009
Springer
9 years 8 months ago
On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations
Abstract. Predicate encryption is a recent generalization of identitybased encryption (IBE), broadcast encryption, attribute-based encryption, and more. A natural question is wheth...
Jonathan Katz, Arkady Yerukhimovich
ASIACRYPT
2009
Springer
9 years 8 months ago
Efficient Public Key Encryption Based on Ideal Lattices
Damien Stehlé, Ron Steinfeld, Keisuke Tanak...
books