Sciweavers

IACR
2016
50views Biometrics» more  IACR 2016»
10 years 1 months ago
A Practical Template Attack on MICKEY-128 2.0 Using PSO Generated IVs and LS-SVM
—The reported power analysis attacks on hardware implementations of the MICKEY family of streams ciphers require a large number of power traces. The primary motivation of our wor...
Abhishek Chakraborty, Debdeep Mukhopadhyay
IACR
2016
46views Biometrics» more  IACR 2016»
10 years 1 months ago
Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions
Abstract. Although Bitcoin is often perceived to be an anonymous currency, research has shown that a user’s Bitcoin transactions can be linked to compromise the user’s anonymit...
Ethan Heilman, Foteini Baldimtsi, Sharon Goldberg
IACR
2016
57views Biometrics» more  IACR 2016»
10 years 1 months ago
Semantic Security and Key-Privacy With Random Split of St-Gen Codes
Recently we have defined Staircase-Generator codes (St-Gen codes) and their variant with a random split of the generator matrix of the codes. One unique property of these codes is...
Danilo Gligoroski, Simona Samardjiska
IACR
2016
39views Biometrics» more  IACR 2016»
10 years 1 months ago
Practical DRAM PUFs in Commodity Devices
A Physically Unclonable Function (PUF) is a unique and stable physical characteristic of a piece of hardware, due to variations in the fabrication processes. Prior works have demon...
Wenjie Xiong, André Schaller, Nikolaos Anag...
IACR
2016
42views Biometrics» more  IACR 2016»
10 years 1 months ago
Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness
Data stored in cloud storage sometimes requires long-term security due to its sensitivity (e.g., genome data), and therefore, it also requires flexible access control for handlin...
Yohei Watanabe, Goichiro Hanaoka, Junji Shikata