Sciweavers

IACR
2016
41views Biometrics» more  IACR 2016»
10 years 1 months ago
Obfuscation without Multilinear Maps
Known methods for obfuscating a circuit need to represent the circuit as a branching program and then use a multilinear map to encrypt the branching program. Multilinear maps are,...
Dingfeng Ye, Peng Liu
IACR
2016
41views Biometrics» more  IACR 2016»
10 years 1 months ago
Practical backward unlinkable revocation in FIDO, German e-ID, Idemix and U-Prove
Abstract FIDO, German e-ID, Idemix and U-Prove constitute privacyenhanced public-key infrastructures allowing users to authenticate in an anonymous way. This however hampers timely...
Eric R. Verheul
IACR
2016
36views Biometrics» more  IACR 2016»
10 years 1 months ago
Better Preprocessing for Secure Multiparty Computation
We present techniques and protocols for the preprocessing of secure multiparty computation (MPC), focusing on the so-called SPDZ MPC scheme [19] and its derivatives [16,18,1]. Thes...
Carsten Baum, Ivan Damgård, Tomas Toft, Rasm...
IACR
2016
49views Biometrics» more  IACR 2016»
10 years 1 months ago
Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series
Abstract. Since 2012, it is publicly known that the bitstream encryption feature of modern Xilinx FPGAs can be broken by side-channel analysis. Presented at CT-RSA 2012, using grap...
Amir Moradi, Tobias Schneider
IACR
2016
42views Biometrics» more  IACR 2016»
10 years 1 months ago
On Garbling Schemes With And Without Privacy
Abstract. In recent years, a lot of progress has been made on speeding up Actively-secure Twoparty Function Evaluation (SFE) using Garbled Circuits. For a given level of security, ...
Carsten Baum