Sciweavers

IACR
2016
45views Biometrics» more  IACR 2016»
10 years 1 months ago
A trivial debiasing scheme for Helper Data Systems
We introduce a debiasing scheme that solves the more-noise-than-entropy problem which can occur in Helper Data Systems when the source is very biased. We perform a condensing step...
Boris Skoric
IACR
2016
52views Biometrics» more  IACR 2016»
10 years 1 months ago
An Encryption Scheme based on Random Split of St-Gen Codes
Staircase-Generator codes (St-Gen codes) have recently been introduced in the design of code-based public key schemes and for the design of steganographic matrix embedding schemes...
Simona Samardjiska, Danilo Gligoroski
IACR
2016
49views Biometrics» more  IACR 2016»
10 years 1 months ago
On the Leakage-Resilient Key Exchange
Typically, secure channels are constructed from an authenticated key exchange (AKE) protocol, which authenticates the communicating parties based on long-term public keys and esta...
Janaka Alawatugoda
IACR
2016
64views Biometrics» more  IACR 2016»
10 years 1 months ago
Revisiting Structure Graph and Its Applications to CBC-MAC and EMAC
In Crypto’05, Bellare et al. proved O( q2 /2n ) bound for the PRF (pseudorandom function) security of the CBC-MAC based on an n-bit random permutation Π, provided < 2n/3 . He...
Ashwin Jha, Mridul Nandi
IACR
2016
35views Biometrics» more  IACR 2016»
10 years 1 months ago
Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator
In this paper, we investigate a variant of the BKZ algorithm, called progressive BKZ, which performs BKZ reductions by starting with a small blocksize and gradually switching to la...
Yoshinori Aono, Yuntao Wang, Takuya Hayashi 0001, ...