Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
ASIACRYPT
2015
Springer
5 years 7 months ago
Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model
We study the adaptive security of constrained PRFs in the standard model. We initiate our exploration with puncturable PRFs. A puncturable PRF family is a special class of constra...
Susan Hohenberger, Venkata Koppula, Brent Waters
ASIACRYPT
2015
Springer
5 years 7 months ago
On Black-Box Complexity of Universally Composable Security in the CRS Model
In this work, we study the intrinsic complexity of black-box Universally Composable (UC) secure computation based on general assumptions. We present a thorough study in various co...
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
ASIACRYPT
2015
Springer
5 years 7 months ago
ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
Abstract. We describe three contributions regarding the Soft Analytical Side-Channel Attacks (SASCA) introduced at Asiacrypt 2014. First, we compare them with Algebraic Side-Channe...
Vincent Grosso, François-Xavier Standaert
ASIACRYPT
2015
Springer
5 years 7 months ago
The Tower Number Field Sieve
The security of pairing-based crypto-systems relies on the difficulty to compute discrete logarithms in finite fields Fpn where n is
Razvan Barbulescu, Pierrick Gaudry, Thorsten Klein...
ASIACRYPT
2015
Springer
5 years 7 months ago
Function-Hiding Inner Product Encryption
We extend the reach of functional encryption schemes that are provably secure under simple assumptions against unbounded collusion to include function-hiding inner product schemes...
Allison Bishop, Abhishek Jain 0002, Lucas Kowalczy...
ASIACRYPT
2015
Springer
5 years 7 months ago
Optimized Interpolation Attacks on LowMC
LowMC is a collection of block cipher families introduced at Eurocrypt 2015 by Albrecht et al. Its design is optimized for instantiations of multi-party computation, fully homomorp...
Itai Dinur, Yunwen Liu, Willi Meier, Qingju Wang
ASIACRYPT
2015
Springer
5 years 7 months ago
How to Sequentialize Independent Parallel Attacks? - Biased Distributions Have a Phase Transition
Abstract. We assume a scenario where an attacker can mount several independent attacks on a single CPU. Each attack can be run several times in independent ways. Each attack can su...
Sonia Bogos, Serge Vaudenay
ASIACRYPT
2015
Springer
5 years 7 months ago
Key-Recovery Attacks on ASASA
The ASASA construction is a new design scheme introduced at Asiacrypt 2014 by Biryukov, Bouillaguet and Khovratovich. Its versatility was illustrated by building two public-key enc...
Brice Minaud, Patrick Derbez, Pierre-Alain Fouque,...
ASIACRYPT
2015
Springer
5 years 7 months ago
On the Impact of Known-Key Attacks on Hash Functions
Abstract. Hash functions are often constructed based on permutations or blockciphers, and security proofs are typically done in the ideal permutation or cipher model. However, once...
Bart Mennink, Bart Preneel
ASIACRYPT
2015
Springer
5 years 7 months ago
Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
The iterated Even-Mansour construction defines a block cipher from a tuple of public n-bit permutations (P1, . . . , Pr) by alternatively xoring some n-bit round key ki, i = 0, . ...
Benoît Cogliati, Yannick Seurin
books