Sciweavers

ASIACRYPT
2015
Springer
8 years 9 days ago
Key-Recovery Attacks on ASASA
The ASASA construction is a new design scheme introduced at Asiacrypt 2014 by Biryukov, Bouillaguet and Khovratovich. Its versatility was illustrated by building two public-key enc...
Brice Minaud, Patrick Derbez, Pierre-Alain Fouque,...
ASIACRYPT
2015
Springer
8 years 9 days ago
On the Impact of Known-Key Attacks on Hash Functions
Abstract. Hash functions are often constructed based on permutations or blockciphers, and security proofs are typically done in the ideal permutation or cipher model. However, once...
Bart Mennink, Bart Preneel
ASIACRYPT
2015
Springer
8 years 9 days ago
Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
The iterated Even-Mansour construction defines a block cipher from a tuple of public n-bit permutations (P1, . . . , Pr) by alternatively xoring some n-bit round key ki, i = 0, . ...
Benoît Cogliati, Yannick Seurin
ASIACRYPT
2015
Springer
8 years 9 days ago
Card-Based Cryptographic Protocols Using a Minimal Number of Cards
Secure multiparty computation can be done with a deck of playing cards. For example, den Boer (EUROCRYPT ’89) devised his famous “five-card trick”, which is a secure two-par...
Alexander Koch, Stefan Walzer, Kevin Härtel
ASIACRYPT
2015
Springer
8 years 9 days ago
Secret Sharing and Statistical Zero Knowledge
We show a general connection between various types of statistical zero-knowledge (SZK) proof systems and (unconditionally secure) secret sharing schemes. Viewed through the SZK le...
Vinod Vaikuntanathan, Prashant Nalini Vasudevan
ASIACRYPT
2015
Springer
8 years 9 days ago
A Provably Secure Group Signature Scheme from Code-Based Assumptions
We solve an open question in code-based cryptography by introducing the first provably secure group signature scheme from codebased assumptions. Specifically, the scheme satisfi...
Martianus Frederic Ezerman, Hyung Tae Lee, San Lin...
ASIACRYPT
2015
Springer
8 years 9 days ago
Dual-System Simulation-Soundness with Applications to UC-PAKE and More
We introduce a novel concept of dual-system simulation-sound non-interactive zero-knowledge (NIZK) proofs. Dual-system NIZK proof system can be seen as a two-tier proof system. As...
Charanjit S. Jutla, Arnab Roy 0003
ASIACRYPT
2015
Springer
8 years 9 days ago
Midori: A Block Cipher for Low Energy
In the past few years, lightweight cryptography has become a popular research discipline with a number of ciphers and hash functions proposed. The designers’ focus has been predo...
Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, ...
ASIACRYPT
2015
Springer
8 years 9 days ago
Limits of Extractability Assumptions with Distributional Auxiliary Input
Extractability, or “knowledge,” assumptions have recently gained popularity in the cryptographic community, leading to the study of primitives such as extractable one-way func...
Elette Boyle, Rafael Pass