Sciweavers

IACR
2016
62views Biometrics» more  IACR 2016»
8 years 22 days ago
MEMS-based Gyroscopes as Physical Unclonable Functions
—We are at the dawn of a hyper connectivity age otherwise known as the Internet of Things (IoT). It is widely accepted that to be able to reap all benefits from the IoT promise,...
Oliver Willers, Christopher Huth, Jorge Guajardo, ...
IACR
2016
37views Biometrics» more  IACR 2016»
8 years 22 days ago
Valiant's Universal Circuit: Improvements, Implementation, and Applications
A Universal Circuit (UC) is a circuit that can simulate any circuit of a maximum size, given its description as input. In this work, we look back at Valiant’s universal circuit c...
Helger Lipmaa, Payman Mohassel, Seyed Saeed Sadegh...
IACR
2016
56views Biometrics» more  IACR 2016»
8 years 22 days ago
CacheBleed: A Timing Attack on OpenSSL Constant Time RSA
The scatter-gather technique is a commonly-implemented approach to prevent cache-based timing attacks. In this paper we show that scatter-gather is not constant-time. We implement ...
Yuval Yarom, Daniel Genkin, Nadia Heninger
IACR
2016
40views Biometrics» more  IACR 2016»
8 years 22 days ago
The Exact Round Complexity of Secure Computation
Abstract. We revisit the exact round complexity of secure computation in the multi-party and twoparty settings. For the special case of two-parties without a simultaneous message e...
Sanjam Garg, Pratyay Mukherjee, Omkant Pandey, Ant...
IACR
2016
40views Biometrics» more  IACR 2016»
8 years 22 days ago
Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
In this work, we present a new class of polynomial-time attacks on the original multilinear maps of Garg, Gentry, and Halevi (2013). Previous polynomial-time attacks on GGH13 were...
Eric Miles, Amit Sahai, Mark Zhandry
IACR
2016
44views Biometrics» more  IACR 2016»
8 years 22 days ago
New Lattice Attacks on DSA Schemes
We prove that a system of linear congruences of a particular form has at most a unique solution below a certain bound which can be computed efficiently. Using this result we devel...
Dimitrios Poulakis
IACR
2016
52views Biometrics» more  IACR 2016»
8 years 22 days ago
New Approaches for Secure Outsourcing Algorithm for Modular Exponentiations
Abstract: Outsourcing paradigm is one of the most attractive benefits of cloud computing, where computation workloads can be outsourced to cloud servers by the resourceconstrained...
Xi Jun Lin, Lin Sun, Haipeng Qu, Xiaoshuai Zhang
IACR
2016
41views Biometrics» more  IACR 2016»
8 years 22 days ago
Linguistic Cracking of Passphrases Using Markov Chains
In order to remember long passwords, it is not uncommon users are recommended to create a sentence which then is assembled to form a long password, a passphrase. However, theoretic...
Peder Sparell, Mikael Simovits
IACR
2016
36views Biometrics» more  IACR 2016»
8 years 22 days ago
Oblivious Transfer from Any Non-Trivial Elastic Noisy Channels via Secret Key Agreement
A (γ, δ)-elastic channel is a binary symmetric channel between a sender and a receiver where the error rate of an honest receiver is δ while the error rate of a dishonest recei...
Ignacio Cascudo, Ivan Damgård, Felipe Lacerd...
IACR
2016
43views Biometrics» more  IACR 2016»
8 years 22 days ago
Constant-Round Asynchronous Multi-Party Computation
Secure multi-party computation (MPC) allows several mutually distrustful parties to securely compute a joint function of their inputs and exists in two main variants: In synchrono...
Sandro Coretti, Juan A. Garay, Martin Hirt, Vassil...