Sciweavers

IACR
2016
47views Biometrics» more  IACR 2016»
8 years 17 days ago
Human-readable Proof of the Related-Key Security of AES-128
Abstract. The related-key model is now considered an important scenario for block cipher security and many schemes were broken in this model, even AES-192 and AES-256. Recently wer...
Khoongming Khoo, Eugene Lee, Thomas Peyrin, Siang ...
IACR
2016
68views Biometrics» more  IACR 2016»
8 years 17 days ago
Foundations of Hardware-Based Attested Computation and Application to SGX
Exciting new capabilities of modern trusted hardware technologies allow for the execution of arbitrary code within environments completely isolated from the rest of the system and...
Manuel Barbosa, Bernardo Portela, Guillaume Scerri...
IACR
2016
42views Biometrics» more  IACR 2016»
8 years 17 days ago
A Columnar Transposition cipher in a contemporary setting
A simple cryptographic method, a type of columnar transposition cipher, is described which may be used in series with other methods to provide practical hybrid encryption. The met...
John Jones
IACR
2016
46views Biometrics» more  IACR 2016»
8 years 17 days ago
Cryptanalysis of Simpira
Simpira is a recently proposed family of permutations, based on the AES round function. The design includes recommendations for using the Simpira permutations in block ciphers, has...
Christoph Dobraunig, Maria Eichlseder, Florian Men...
IACR
2016
43views Biometrics» more  IACR 2016»
8 years 17 days ago
On Statistically Secure Obfuscation with Approximate Correctness
Goldwasser and Rothblum (TCC ’07) prove that statistical indistinguishability obfuscation (iO) cannot exist if the obfuscator must maintain perfect correctness (under a widely b...
Zvika Brakerski, Christina Brzuska, Nils Fleischha...
IACR
2016
51views Biometrics» more  IACR 2016»
8 years 17 days ago
Pseudorandom Functions in Almost Constant Depth from Low-Noise LPN
Pseudorandom functions (PRFs) play a central role in symmetric cryptography. While in principle they can be built from any one-way functions by going through the generic HILL (SIC...
Yu Yu, John P. Steinberger
IACR
2016
48views Biometrics» more  IACR 2016»
8 years 17 days ago
PrAd: Enabling Privacy-Aware Location based Advertising
Smart phones and mobile devices have become more and more ubiquitous recently. This ubiquity gives chance for mobile advertising, especially location-based advertising, to develop...
Hung Dang, Ee-Chien Chang
IACR
2016
42views Biometrics» more  IACR 2016»
8 years 17 days ago
Integrals go Statistical: Cryptanalysis of Full Skipjack Variants
Abstract. Integral attacks form a powerful class of cryptanalytic techniques that have been widely used in the security analysis of block ciphers. The integral distinguishers are b...
Meiqin Wang, Tingting Cui, Huaifeng Chen, Ling Sun...
IACR
2016
118views Biometrics» more  IACR 2016»
8 years 17 days ago
Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters
In this paper, we present two new adaptively secure identity-based encryption (IBE) schemes from lattices. The size of the public parameters, ciphertexts, and private keys are ˜O...
Shota Yamada
IACR
2016
46views Biometrics» more  IACR 2016»
8 years 17 days ago
Attribute-Based Signatures for Circuits from Bilinear Map
In attribute-based signatures, each signer receives a signing key from the authority, which is associated with the signer’s attribute, and using the signing key, the signer can i...
Yusuke Sakai, Nuttapong Attrapadung, Goichiro Hana...