Sciweavers

IACR
2016
45views Biometrics» more  IACR 2016»
10 years 1 months ago
Eliminating Decryption Failures from the Simple Matrix Encryption Scheme
The SimpleMatrix encryption scheme as proposed by Tao et al. [16] is one of the very few existing approaches to create a secure and efficient encryption scheme on the basis of mul...
Albrecht Petzoldt, Jintai Ding, Lih-chung Wang
IACR
2016
68views Biometrics» more  IACR 2016»
10 years 1 months ago
Fault-Tolerant Aggregate Signatures
Aggregate signature schemes allow for the creation of a short aggregate of multiple signatures. This feature leads to significant reductions of bandwidth and storage space in sens...
Gunnar Hartung, Björn Kaidel, Alexander Koch,...
IACR
2016
43views Biometrics» more  IACR 2016»
10 years 1 months ago
There is Wisdom in Harnessing the Strengths of your Enemy: Customized Encoding to Thwart Side-Channel Attacks - Extended Version
Abstract. Side-channel attacks are an important concern for the security of cryptographic algorithms. To counteract it, a recent line of research has investigated the use of softwa...
Houssem Maghrebi, Victor Servant, Julien Bringer
IACR
2016
44views Biometrics» more  IACR 2016»
10 years 1 months ago
On the Computation of the Optimal Ate Pairing at the 192-bit Security Level
Barreto, Lynn and Scott elliptic curves of embedding degree 12 denoted BLS12 have been proven to present fastest results on the implementation of pairings at the 192-bit security l...
Loubna Ghammam, Emmanuel Fouotsa