Sciweavers

IACR
2016
42views Biometrics» more  IACR 2016»
10 years 1 months ago
On the tightness of the error bound in Ring-LWE
Wouter Castryck, Ilia Iliashenko, Frederik Vercaut...
IACR
2016
48views Biometrics» more  IACR 2016»
10 years 1 months ago
Safely Exporting Keys from Secure Channels: On the security of EAP-TLS and TLS Key Exporters
We investigate how to safely export additional cryptographic keys from secure channel protocols, modelled with the authenticated and confidential channel establishment (ACCE) secu...
Christina Brzuska, Håkon Jacobsen, Douglas S...
IACR
2016
44views Biometrics» more  IACR 2016»
10 years 1 months ago
Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Thing
Recently, Farasha et al. proposed an efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environme...
Yalin Chen, Jue-Sam Chou, Hung-Shen Wu
IACR
2016
42views Biometrics» more  IACR 2016»
10 years 1 months ago
Open Sesame: The Password Hashing Competition and Argon2
In this document we present an overview of the background to and goals of the Password Hashing Competition (PHC) as well as the design of its winner, Argon2, and its security requi...
Jos Wetzels
IACR
2016
57views Biometrics» more  IACR 2016»
10 years 1 months ago
Characterizations of the Degraded Boolean Function and Cryptanalysis of the SAFER Family
—This paper investigates the degradation properties of Boolean functions from the aspects of the distributions of differences and linear masks, and shows two characterizations of...
Wentan Yi, Shaozhen Chen