Sciweavers

IACR
2016
46views Biometrics» more  IACR 2016»
10 years 1 months ago
Polytopic Cryptanalysis
Abstract. Standard differential cryptanalysis uses statistical dependencies between the difference of two plaintexts and the difference of the respective two ciphertexts to atta...
Tyge Tiessen
IACR
2016
60views Biometrics» more  IACR 2016»
10 years 1 months ago
Fault analysis and weak key-IV attack on Sprout
:- Armknecht and Mikhalev proposed a new stream cipher ‘Sprout’ based on the design specification of the stream cipher, Grain-128a. Sprout has shorter state size than Grain fa...
Dibyendu Roy, Sourav Mukhopadhyay
IACR
2016
50views Biometrics» more  IACR 2016»
10 years 1 months ago
Side-Channel Watchdog: Run-Time Evaluation of Side-Channel Vulnerability in FPGA-Based Crypto-systems
Besides security against classical cryptanalysis, its important for cryptographic implementations to have sufficient robustness against side-channel attacks. Many countermeasures h...
Souvik Sonar, Debapriya Basu Roy, Rajat Subhra Cha...
IACR
2016
39views Biometrics» more  IACR 2016»
10 years 1 months ago
On Bitcoin Security in the Presence of Broken Crypto Primitives
Digital currencies like Bitcoin rely on cryptographic primitives to operate. However, past experience shows that cryptographic primitives do not last forever: increased computatio...
Ilias Giechaskiel, Cas Cremers, Kasper Bonne Rasmu...
IACR
2016
46views Biometrics» more  IACR 2016»
10 years 1 months ago
Breaking the Sub-Exponential Barrier in Obfustopia
Indistinguishability obfuscation (iO) has emerged as a surprisingly powerful notion. Almost all known cryptographic primitives can be constructed from general purpose iO and other...
Sanjam Garg, Omkant Pandey, Akshayaram Srinivasan,...