Sciweavers

IACR
2016
41views Biometrics» more  IACR 2016»
10 years 1 months ago
Circuit Compilers with O(1/ log(n)) Leakage Rate
The goal of leakage-resilient cryptography is to construct cryptographic algorithms that are secure even if the devices on which they are implemented leak information to the advers...
Marcin Andrychowicz, Stefan Dziembowski, Sebastian...
IACR
2016
43views Biometrics» more  IACR 2016»
10 years 1 months ago
Smooth NIZK Arguments with Applications to Asymmetric UC-PAKE
Abstract. We introduce a novel notion of smooth (-verifier) non- interactive zero-knowledge proofs (NIZK) which parallel the familiar notion of smooth projective hash functions (S...
Charanjit S. Jutla, Arnab Roy 0003
IACR
2016
44views Biometrics» more  IACR 2016»
10 years 1 months ago
Key Compression for Isogeny-Based Cryptosystems
Abstract. With the impending threat of quantum computers, Post-Quantum Cryptography schemes have emerged as suitable replacements for today’s public-key cryptography schemes. We ...
Reza Azarderakhsh, David Jao, Kassem Kalach, Brian...
IACR
2016
41views Biometrics» more  IACR 2016»
10 years 1 months ago
ZKBoo: Faster Zero-Knowledge for Boolean Circuits
In this paper we describe ZKBoo1 , a proposal for practically efficient zero-knowledge arguments especially tailored for Boolean circuits and report on a proof-of-concept implement...
Irene Giacomelli, Jesper Madsen, Claudio Orlandi
IACR
2016
126views Biometrics» more  IACR 2016»
10 years 1 months ago
Provably Weak Instances of Ring-LWE Revisited
Abstract. In CRYPTO 2015, Elias, Lauter, Ozman and Stange described an attack on the non-dual decision version of the ring learning with errors problem (RLWE) for two special famil...
Wouter Castryck, Ilia Iliashenko, Frederik Vercaut...