Sciweavers

IACR
2016
45views Biometrics» more  IACR 2016»
10 years 1 months ago
Universal Composition with Responsive Environments
In universal composability frameworks, adversaries (or environments) and protocols/ideal functionalities often have to exchange meta-information on the network interface, such as a...
Jan Camenisch, Robert R. Enderlein, Stephan Krenn,...
IACR
2016
52views Biometrics» more  IACR 2016»
10 years 1 months ago
How Fast Can Higher-Order Masking Be in Software?
It is widely accepted that higher-order masking is a sound countermeasure to protect implementations of block ciphers against side-channel attacks. The main issue while designing s...
Dahmun Goudarzi, Matthieu Rivain
IACR
2016
44views Biometrics» more  IACR 2016»
10 years 1 months ago
White-Box Cryptography in the Gray Box - A Hardware Implementation and its Side Channels
Implementations of white-box cryptography aim to protect a secret key in a white-box environment in which an adversary has full control over the execution process and the entire en...
Pascal Sasdrich, Amir Moradi, Tim Güneysu
IACR
2016
46views Biometrics» more  IACR 2016»
10 years 1 months ago
On the Hardness of LWE with Binary Error: Revisiting the Hybrid Lattice-Reduction and Meet-in-the-Middle Attack
The security of many cryptographic schemes has been based on special instances of the Learning with Errors (LWE) problem, e.g., Ring-LWE, LWE with binary secret, or LWE with ternar...
Johannes A. Buchmann, Florian Göpfert, Rachel...
IACR
2016
106views Biometrics» more  IACR 2016»
10 years 1 months ago
Cryptanalysis of the New CLT Multilinear Map over the Integers
Abstract. Multilinear maps serve as a basis for a wide range of cryptographic applications. The first candidate construction of multilinear maps was proposed by Garg, Gentry, and ...
Jung Hee Cheon, Pierre-Alain Fouque, Changmin Lee,...