Sciweavers

CRYPTO
2009
Springer
105views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Privacy-Enhancing Auctions Using Rational Cryptography
Abstract. We consider enhancing with privacy concerns a large class of auctions, which include sealed-bid single-item auctions but also general multi-item multi-winner auctions, ou...
Peter Bro Miltersen, Jesper Buus Nielsen, Nikos Tr...
CRYPTO
2009
Springer
89views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Linear Algebra with Sub-linear Zero-Knowledge Arguments
We suggest practical sub-linear size zero-knowledge arguments for statements involving linear algebra. Given commitments to matrices over a finite field, we give a sub-linear siz...
Jens Groth
CRYPTO
2009
Springer
103views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures
Jean-Sébastien Coron, David Naccache, Mehdi...
CRYPTO
2009
Springer
99views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Cryptanalysis of C2
Abstract Julia Borghoff , Lars R. Knudsen, Gregor Leander, Krystian Matusiewicz Department of Mathematics Technical University of Denmark
Julia Borghoff, Lars R. Knudsen, Gregor Leander, K...
CRYPTO
2009
Springer
106views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
The Group of Signed Quadratic Residues and Applications
Dennis Hofheinz, Eike Kiltz
CRYPTO
2009
Springer
111views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Distinguisher and Related-Key Attack on the Full AES-256
Alex Biryukov, Dmitry Khovratovich, Ivica Nikolic
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev
CRYPTO
2009
Springer
82views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Solving Hidden Number Problem with One Bit Oracle and Advice
In the Hidden Number Problem (HNP), the goal is to find a hidden number s, when given p, g and access to an oracle that on query a returns the k most significant bits of s · ga ...
Adi Akavia