Sciweavers

IACR
2016
47views Biometrics» more  IACR 2016»
10 years 1 months ago
Comb to Pipeline: Fast Software Encryption Revisited
Abstract. AES-NI, or Advanced Encryption Standard New Instructions, is an extension of the x86 architecture proposed by Intel in 2008. With a pipelined implementation utilizing AES...
Andrey Bogdanov, Martin M. Lauridsen, Elmar Tischh...
IACR
2016
43views Biometrics» more  IACR 2016»
10 years 1 months ago
Attribute-Based Fully Homomorphic Encryption with a Bounded Number of Inputs
The only known way to achieve Attribute-based Fully Homomorphic Encryption (ABFHE) is through indistinguishability obfsucation. The best we can do at the moment without obfuscation...
Michael Clear, Ciaran McGoldrick
IACR
2016
42views Biometrics» more  IACR 2016»
10 years 1 months ago
Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key
NTRU is a public-key cryptosystem introduced at ANTS-III. The two most used techniques in attacking the NTRU private key are meet-in-the-middle attacks and lattice-basis reduction...
Christine van Vredendaal
IACR
2016
47views Biometrics» more  IACR 2016»
10 years 1 months ago
On the Power of Secure Two-Party Computation
Ishai, Kushilevitz, Ostrovsky and Sahai (STOC 2007, SIAM JoC 2009) introduced the powerful “MPC-in-the-head” technique that provided a general transformation of information-th...
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam