Sciweavers

IACR
2016
42views Biometrics» more  IACR 2016»
10 years 1 months ago
Circular Security Counterexamples for Arbitrary Length Cycles from LWE
We describe a public key encryption that is IND-CPA secure under the Learning with Errors (LWE) assumption, but that is not circular secure for arbitrary length cycles. Previous s...
Venkata Koppula, Brent Waters
IACR
2016
62views Biometrics» more  IACR 2016»
10 years 1 months ago
Fully Anonymous Transferable Ecash
Numerous electronic cash schemes have been proposed over the years ranging from Ecash, Mondex to Millicent. However none of these schemes have been adopted by the financial instit...
Hitesh Tewari, Arthur Hughes
IACR
2016
154views Biometrics» more  IACR 2016»
10 years 1 months ago
Intel SGX Explained
Intel’s Software Guard Extensions (SGX) is a set of extensions to the Intel architecture that aims to provide integrity and confidentiality guarantees to securitysensitive comp...
Victor Costan, Srinivas Devadas
IACR
2016
52views Biometrics» more  IACR 2016»
10 years 1 months ago
Still Wrong Use of Pairings in Cryptography
Several pairing-based cryptographic protocols are recently proposed with a wide variety of new novel applications including the ones in emerging technologies like cloud computing, ...
Mehmet Sabir Kiraz, Osmanbey Uzunkol