Sciweavers

IACR
2016
44views Biometrics» more  IACR 2016»
10 years 1 months ago
Pseudoentropy: Lower-bounds for Chain rules and Transformations
Computational notions of entropy have recently found many applications, including leakageresilient cryptography, deterministic encryption or memory delegation. The two main types ...
Krzysztof Pietrzak, Maciej Skorski
IACR
2016
50views Biometrics» more  IACR 2016»
10 years 1 months ago
An Alternative View of the Graph-Induced Multilinear Maps
In this paper, we view multilinear maps through the lens of “homomorphic obfuscation”. In specific, we show how to homomorphically obfuscate the kernel-test and affine subsp...
Yilei Chen
IACR
2016
32views Biometrics» more  IACR 2016»
10 years 1 months ago
Implementing a Toolkit for Ring-LWE Based Cryptography in Arbitrary Cyclotomic Number Fields
Recent research in the field of lattice-based cryptography, especially on the topic of the ring-based primitive ring-LWE, provided efficient and practical ring-based cryptographi...
Christoph M. Mayer
IACR
2016
41views Biometrics» more  IACR 2016»
10 years 1 months ago
Cryptanalysis of 6-round PRINCE using 2 Known Plaintexts
In this paper we focus on the PRINCE block cipher reduced to 6 rounds, with two known plaintext/ciphertext pairs. We develop two attacks on 6-round PRINCE based on accelerated exha...
Shahram Rasoolzadeh, Håvard Raddum