Sciweavers

IACR
2016
37views Biometrics» more  IACR 2016»
10 years 1 months ago
Valiant's Universal Circuit: Improvements, Implementation, and Applications
A Universal Circuit (UC) is a circuit that can simulate any circuit of a maximum size, given its description as input. In this work, we look back at Valiant’s universal circuit c...
Helger Lipmaa, Payman Mohassel, Seyed Saeed Sadegh...
IACR
2016
56views Biometrics» more  IACR 2016»
10 years 1 months ago
CacheBleed: A Timing Attack on OpenSSL Constant Time RSA
The scatter-gather technique is a commonly-implemented approach to prevent cache-based timing attacks. In this paper we show that scatter-gather is not constant-time. We implement ...
Yuval Yarom, Daniel Genkin, Nadia Heninger
IACR
2016
40views Biometrics» more  IACR 2016»
10 years 1 months ago
The Exact Round Complexity of Secure Computation
Abstract. We revisit the exact round complexity of secure computation in the multi-party and twoparty settings. For the special case of two-parties without a simultaneous message e...
Sanjam Garg, Pratyay Mukherjee, Omkant Pandey, Ant...
IACR
2016
40views Biometrics» more  IACR 2016»
10 years 1 months ago
Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13
In this work, we present a new class of polynomial-time attacks on the original multilinear maps of Garg, Gentry, and Halevi (2013). Previous polynomial-time attacks on GGH13 were...
Eric Miles, Amit Sahai, Mark Zhandry
IACR
2016
44views Biometrics» more  IACR 2016»
10 years 1 months ago
New Lattice Attacks on DSA Schemes
We prove that a system of linear congruences of a particular form has at most a unique solution below a certain bound which can be computed efficiently. Using this result we devel...
Dimitrios Poulakis