Sciweavers

IACR
2016
80views Biometrics» more  IACR 2016»
10 years 1 months ago
Collaborative Multi-Authority KP-ABE for Shorter Keys and Parameters
Bilinear groups are often used to create Attribute-Based Encryption (ABE) algorithms. In our proposal, a Multiple-Authorities Key-Policy Attribute-Based Encryption scheme is const...
Riccardo Longo, Chiara Marcolla, Massimiliano Sala
IACR
2016
47views Biometrics» more  IACR 2016»
10 years 1 months ago
The Honey Badger of BFT Protocols
The surprising success of cryptocurrencies has led to a surge of interest in deploying large scale, highly robust, Byzantine fault tolerant (BFT) protocols for mission-critical ap...
Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, Da...
IACR
2016
70views Biometrics» more  IACR 2016»
10 years 1 months ago
Optimizing S-box Implementations for Several Criteria using SAT Solvers
Abstract. We explore the feasibility of applying SAT solvers to optimizing implementations of small functions such as S-boxes for multiple optimization criteria, e.g., the number o...
Ko Stoffelen
IACR
2016
46views Biometrics» more  IACR 2016»
10 years 1 months ago
On Negation Complexity of Injections, Surjections and Collision-Resistance in Cryptography
Goldreich and Izsak (Theory of Computing, 2012) initiated the research on understanding the role of negations in circuits implementing cryptographic primitives, notably, consideri...
Douglas Miller, Adam Scrivener, Jesse Stern, Muthu...
IACR
2016
34views Biometrics» more  IACR 2016»
10 years 1 months ago
Computing theta functions in quasi-linear time in genus 2 and above
We outline an algorithm to compute θ(z, τ) in genus 2 in quasi-optimal time, borrowing
Hugo Labrande, Emmanuel Thomé