Sciweavers

CTRSA
2016
Springer
68views Cryptology» more  CTRSA 2016»
8 years 1 months ago
Strongly Leakage-Resilient Authenticated Key Exchange
Abstract. Authenticated Key Exchange (AKE) protocols have been widely deployed in many real-world applications for securing communication channels. In this paper, we make the follo...
Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fu...
CTRSA
2016
Springer
48views Cryptology» more  CTRSA 2016»
8 years 1 months ago
Short Structure-Preserving Signatures
Essam Ghadafi
CTRSA
2016
Springer
60views Cryptology» more  CTRSA 2016»
8 years 1 months ago
Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones
In this paper, we study the side-channel resistance of the implementation of the ECDSA signature scheme in Android’s standard cryptographic library. We show that, for elliptic cu...
Pierre Belgarric, Pierre-Alain Fouque, Gilles Maca...
CTRSA
2016
Springer
61views Cryptology» more  CTRSA 2016»
8 years 1 months ago
Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes
This paper presents a new framework for constructing fully CCA-secure predicate encryption schemes from pair encoding schemes. Our construction is the first in the context of pred...
Johannes Blömer, Gennadij Liske
CTRSA
2016
Springer
84views Cryptology» more  CTRSA 2016»
8 years 1 months ago
Private Large-Scale Databases with Distributed Searchable Symmetric Encryption
With the growing popularity of remote storage, the ability to outsource a large private database yet be able to search on this encrypted data is critical. Searchable symmetric encr...
Yuval Ishai, Eyal Kushilevitz, Steve Lu, Rafail Os...
CTRSA
2016
Springer
83views Cryptology» more  CTRSA 2016»
8 years 1 months ago
Short Randomizable Signatures
David Pointcheval, Olivier Sanders
PKC
2014
Springer
70views Cryptology» more  PKC 2014»
9 years 1 days ago
Simple Chosen-Ciphertext Security from Low-Noise LPN
Recently, D¨ottling et al. (ASIACRYPT 2012) proposed the first chosen-ciphertext (IND-CCA) secure public-key encryption scheme from the learning parity with noise (LPN) assumptio...
Eike Kiltz, Daniel Masny, Krzysztof Pietrzak
FEDCSIS
2013
118views Cryptology» more  FEDCSIS 2013»
10 years 22 days ago
A General Divide and Conquer Approach for Process Mining
—Operational processes leave trails in the information systems supporting them. Such event data are the starting point for process mining – an emerging scientific discipline r...
Wil M. P. van der Aalst
EUROCRYPT
2013
Springer
10 years 22 days ago
Candidate Multilinear Maps from Ideal Lattices
We describe plausible lattice-based constructions with properties that approximate the soughtafter multilinear maps in hard-discrete-logarithm groups, and show an example applicat...
Sanjam Garg, Craig Gentry, Shai Halevi
CRYPTO
2013
Springer
101views Cryptology» more  CRYPTO 2013»
10 years 23 days ago
Practical Bootstrapping in Quasilinear Time
Jacob Alperin-Sheriff, Chris Peikert