Sciweavers

IACR
2016
40views Biometrics» more  IACR 2016»
10 years 1 months ago
Refund attacks on Bitcoin's Payment Protocol
BIP70 is a community-accepted Payment Protocol standard that governs how merchants and customers perform payments in Bitcoin. This standard is supported by most major wallets and t...
Patrick McCorry, Siamak Fayyaz Shahandashti, Feng ...
IACR
2016
35views Biometrics» more  IACR 2016»
10 years 1 months ago
Cryptanalysis of ring-LWE based key exchange with key share reuse
ct This paper shows how several ring-LWE based key exchange protocols can be broken, under the assumption that the same key share is used for multiple exchanges. This indicates tha...
Scott R. Fluhrer
IACR
2016
39views Biometrics» more  IACR 2016»
10 years 1 months ago
Designing Proof of Human-work Puzzles for Cryptocurrency and Beyond
We introduce the novel notion of a Proof of Human-work (PoH) and present the first distributed consensus protocol from hard Artificial Intelligence problems. As the name suggest...
Jeremiah Blocki, Hong-Sheng Zhou
IACR
2016
42views Biometrics» more  IACR 2016»
10 years 1 months ago
A MAC Mode for Lightweight Block Ciphers
Lightweight cryptography strives to protect communication in constrained environments without sacrificing security. However, security often conflicts with efficiency, shown by th...
Atul Luykx, Bart Preneel, Elmar Tischhauser, Kan Y...
IACR
2016
47views Biometrics» more  IACR 2016»
10 years 1 months ago
Human-readable Proof of the Related-Key Security of AES-128
Abstract. The related-key model is now considered an important scenario for block cipher security and many schemes were broken in this model, even AES-192 and AES-256. Recently wer...
Khoongming Khoo, Eugene Lee, Thomas Peyrin, Siang ...