Sciweavers

IACR
2016
119views Biometrics» more  IACR 2016»
10 years 1 months ago
Per-Session Security: Password-Based Cryptography Revisited
Cryptographic security is usually defined as some form of guarantee that holds except when a bad event with negligible probability occurs, and nothing is guaranteed in that case. ...
Grégory Demay, Peter Gazi, Ueli Maurer, Bj&...
IACR
2016
42views Biometrics» more  IACR 2016»
10 years 1 months ago
Topology-based Plug-and-Play Key-Setup
Abstract. We study the use of known, well-connected network topology, to improve key setup and management. Specifically, we present the TopKeyS protocol, that uses such known-topo...
Amir Herzberg, Yehonatan Kfir
IACR
2016
44views Biometrics» more  IACR 2016»
10 years 1 months ago
Compositions of linear functions and applications to hashing
Cayley hash functions are based on a simple idea of using a pair of (semi)group elements, A and B, to hash the 0 and 1 bit, respectively, and then to hash an arbitrary bit string i...
Vladimir Shpilrain, Bianca Sosnovski
IACR
2016
57views Biometrics» more  IACR 2016»
10 years 1 months ago
On a decentralized trustless pseudo-random number generation algorithm
We construct an algorithm that permits a large group of individuals to reach consensus on a random number, without having to rely on any third parties. The algorithm works with hi...
Serguei Popov
IACR
2016
37views Biometrics» more  IACR 2016»
10 years 1 months ago
Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security
In PKC 2014, Dachman-Soled showed a construction of a chosen ciphertext (CCA) secure public key encryption (PKE) scheme based on a PKE scheme which simultaneously satisfies a secu...
Takahiro Matsuda 0002, Goichiro Hanaoka