Sciweavers

INDOCRYPT
2009
Springer
13 years 11 months ago
Second Preimage Attack on SHAMATA-512
We present a second preimage attack on SHAMATA-512, which is a hash function of 512bit output and one of the first round candidates of the SHA-3 competition. The attack uses di...
Kota Ideguchi, Dai Watanabe
INDOCRYPT
2009
Springer
13 years 11 months ago
Secure Parameters for SWIFFT
Johannes Buchmann, Richard Lindner
INDOCRYPT
2009
Springer
13 years 11 months ago
FSBday
This paper applies generalized birthday attacks to the FSB compression function, and shows how to adapt the attacks so that they run in far less memory. In particular, this paper p...
Daniel J. Bernstein, Tanja Lange, Ruben Niederhage...
CRYPTO
2009
Springer
127views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer
Juan A. Garay, Daniel Wichs, Hong-Sheng Zhou
CRYPTO
2009
Springer
122views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Utility Dependence in Correct and Fair Rational Secret Sharing
The problem of carrying out cryptographic computations when the participating parties are rational in a game-theoretic sense has recently gained much attention. One problem that h...
Gilad Asharov, Yehuda Lindell
CRYPTO
2009
Springer
121views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Collusion-Free Multiparty Computation in the Mediated Model
Collusion-free protocols prevent subliminal communication (i.e., covert channels) between parties running the protocol. In the standard communication model, if one-way functions ex...
Joël Alwen, Jonathan Katz, Yehuda Lindell, Gi...
CRYPTO
2009
Springer
131views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
The well-studied task of learning a linear function with errors is a seemingly hard problem and the basis for several cryptographic schemes. Here we demonstrate additional applicat...
Benny Applebaum, David Cash, Chris Peikert, Amit S...
CRYPTO
2009
Springer
104views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Position Based Cryptography
Nishanth Chandran, Vipul Goyal, Ryan Moriarty, Raf...
CRYPTO
2009
Springer
156views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
How to Hash into Elliptic Curves
Thomas Icart
CRYPTO
2009
Springer
91views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Message Authentication Codes from Unpredictable Block Ciphers
Yevgeniy Dodis, John P. Steinberger