Sciweavers

IACR
2016
52views Biometrics» more  IACR 2016»
8 years 1 months ago
Still Wrong Use of Pairings in Cryptography
Several pairing-based cryptographic protocols are recently proposed with a wide variety of new novel applications including the ones in emerging technologies like cloud computing, ...
Mehmet Sabir Kiraz, Osmanbey Uzunkol
IACR
2016
50views Biometrics» more  IACR 2016»
8 years 1 months ago
A Practical Template Attack on MICKEY-128 2.0 Using PSO Generated IVs and LS-SVM
—The reported power analysis attacks on hardware implementations of the MICKEY family of streams ciphers require a large number of power traces. The primary motivation of our wor...
Abhishek Chakraborty, Debdeep Mukhopadhyay
IACR
2016
46views Biometrics» more  IACR 2016»
8 years 1 months ago
Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions
Abstract. Although Bitcoin is often perceived to be an anonymous currency, research has shown that a user’s Bitcoin transactions can be linked to compromise the user’s anonymit...
Ethan Heilman, Foteini Baldimtsi, Sharon Goldberg
IACR
2016
57views Biometrics» more  IACR 2016»
8 years 1 months ago
Semantic Security and Key-Privacy With Random Split of St-Gen Codes
Recently we have defined Staircase-Generator codes (St-Gen codes) and their variant with a random split of the generator matrix of the codes. One unique property of these codes is...
Danilo Gligoroski, Simona Samardjiska
IACR
2016
39views Biometrics» more  IACR 2016»
8 years 1 months ago
Practical DRAM PUFs in Commodity Devices
A Physically Unclonable Function (PUF) is a unique and stable physical characteristic of a piece of hardware, due to variations in the fabrication processes. Prior works have demon...
Wenjie Xiong, André Schaller, Nikolaos Anag...
IACR
2016
42views Biometrics» more  IACR 2016»
8 years 1 months ago
Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness
Data stored in cloud storage sometimes requires long-term security due to its sensitivity (e.g., genome data), and therefore, it also requires flexible access control for handlin...
Yohei Watanabe, Goichiro Hanaoka, Junji Shikata
IACR
2016
58views Biometrics» more  IACR 2016»
8 years 1 months ago
A Distinguisher on PRESENT-Like Permutations with Application to SPONGENT
At Crypto 2015, Blondeau et al. showed a known-key analysis on the full PRESENT lightweight block cipher. Based on some of the best differential distinguishers, they introduced a ...
Guoyan Zhang, Meicheng Liu
IACR
2016
43views Biometrics» more  IACR 2016»
8 years 1 months ago
A Framework for Outsourcing of Secure Computation
We study the problem of how to efficiently outsource a sensitive computation on secret inputs to a number of untrusted workers, under the assumption that at least one worker is hon...
Thomas P. Jakobsen, Jesper Buus Nielsen, Claudio O...
IACR
2016
37views Biometrics» more  IACR 2016»
8 years 1 months ago
Town Crier: An Authenticated Data Feed for Smart Contracts
Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels...
IACR
2016
44views Biometrics» more  IACR 2016»
8 years 1 months ago
More Practical and Secure History-Independent Hash Tables
Direct-recording electronic (DRE) voting systems have been used in several countries including United States, India, and the Netherlands to name a few. In the majority of those ca...
Michael T. Goodrich, Evgenios M. Kornaropoulos, Mi...