Sciweavers

ASIACRYPT
2015
Springer
8 years 26 days ago
Compactly Hiding Linear Spans - Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications
Quasi-adaptive non-interactive zero-knowledge (QA-NIZK) proofs is a recent paradigm, suggested by Jutla and Roy (Asiacrypt ’13), which is motivated by the Groth-Sahai seminal tec...
Benoît Libert, Thomas Peters, Marc Joye, Mot...
ASIACRYPT
2015
Springer
8 years 26 days ago
Generic Security of NMAC and HMAC with Input Whitening
HMAC and its variant NMAC are the most popular approaches to deriving a MAC (and more generally, a PRF) from a cryptographic hash function. Despite nearly two decades of research, ...
Peter Gazi, Krzysztof Pietrzak, Stefano Tessaro
ASIACRYPT
2015
Springer
8 years 26 days ago
Analysis of SHA-512/224 and SHA-512/256
In 2012, NIST standardized SHA-512/224 and SHA-512/256, two truncated variants of SHA-512, in FIPS 180-4. These two hash functions are faster than SHA-224 and SHA-256 on 64-bit pla...
Christoph Dobraunig, Maria Eichlseder, Florian Men...
ASIACRYPT
2015
Springer
8 years 26 days ago
Solving Linear Equations Modulo Unknown Divisors: Revisited
Abstract. We revisit the problem of finding small solutions to a collection of linear equations modulo an unknown divisor p for a known composite integer N. In CaLC 2001, Howgrave...
Yao Lu, Rui Zhang 0002, Liqiang Peng, Dongdai Lin