Sciweavers

IACR
2016
33views Biometrics» more  IACR 2016»
10 years 1 months ago
Computing Private Set Operations with Linear Complexities
Private set operation (PSO) protocols provide a natural way of securely performing operations on data sets, such that crucial details of the input sets are not revealed. Such proto...
Alex Davidson, Carlos Cid
IACR
2016
38views Biometrics» more  IACR 2016»
10 years 1 months ago
3-Message Zero Knowledge Against Human Ignorance
Nir Bitansky, Zvika Brakerski, Yael Tauman Kalai, ...
IACR
2016
46views Biometrics» more  IACR 2016»
10 years 1 months ago
On the (In)security of SNARKs in the Presence of Oracles
In this work we study the feasibility of knowledge extraction for succinct non-interactive arguments of knowledge (SNARKs) in a scenario that, to the best of our knowledge, has not...
Dario Fiore, Anca Nitulescu
IACR
2016
51views Biometrics» more  IACR 2016»
10 years 1 months ago
On the division property of S-boxes
Todo introduced [20] a property of multisets of a finite field called the division property. It is then used [19] in an attack against the S7 S-box of the MISTY1 cipher. This pa...
Faruk Göloglu, Vincent Rijmen, Qingju Wang
IACR
2016
51views Biometrics» more  IACR 2016»
10 years 1 months ago
Capacity and Data Complexity in Multidimensional Linear Attack
Jialin Huang, Serge Vaudenay, Xuejia Lai, Kaisa Ny...