The purpose of this paper is to compare side-by-side the NTRU and BGV schemes in their non-scale invariant (messages in the lower bits), and their scale invariant (message in the u...
We present the first physical side-channel attack on elliptic curve cryptography running on a PC. The attack targets the ECDH public-key encryption algorithm, as implemented in t...
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran ...
the full version of the extended abstract that appears in the proceedings of CT-RSA 2016. A constrained pseudorandom function F : K×X → Y for a family T ⊆ 2X of subsets of X ...
Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrz...
Abstract. Authenticated Key Exchange (AKE) protocols have been widely deployed in many real-world applications for securing communication channels. In this paper, we make the follo...
Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fu...