Sciweavers

IACR
2016
58views Biometrics» more  IACR 2016»
10 years 1 months ago
A Distinguisher on PRESENT-Like Permutations with Application to SPONGENT
At Crypto 2015, Blondeau et al. showed a known-key analysis on the full PRESENT lightweight block cipher. Based on some of the best differential distinguishers, they introduced a ...
Guoyan Zhang, Meicheng Liu
IACR
2016
43views Biometrics» more  IACR 2016»
10 years 1 months ago
A Framework for Outsourcing of Secure Computation
We study the problem of how to efficiently outsource a sensitive computation on secret inputs to a number of untrusted workers, under the assumption that at least one worker is hon...
Thomas P. Jakobsen, Jesper Buus Nielsen, Claudio O...
IACR
2016
37views Biometrics» more  IACR 2016»
10 years 1 months ago
Town Crier: An Authenticated Data Feed for Smart Contracts
Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels...
IACR
2016
44views Biometrics» more  IACR 2016»
10 years 1 months ago
More Practical and Secure History-Independent Hash Tables
Direct-recording electronic (DRE) voting systems have been used in several countries including United States, India, and the Netherlands to name a few. In the majority of those ca...
Michael T. Goodrich, Evgenios M. Kornaropoulos, Mi...
IACR
2016
41views Biometrics» more  IACR 2016»
10 years 1 months ago
How To Simulate It - A Tutorial on the Simulation Proof Technique
One of the most fundamental notions of cryptography is that of simulation. It stands behind the concepts of semantic security, zero knowledge, and security for multiparty computat...
Yehuda Lindell