Sciweavers

137
Voted
CTRSA
2016
Springer
58views Cryptology» more  CTRSA 2016»
10 years 1 months ago
Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?
The purpose of this paper is to compare side-by-side the NTRU and BGV schemes in their non-scale invariant (messages in the lower bits), and their scale invariant (message in the u...
Ana Costache, Nigel P. Smart
151
Voted
CTRSA
2016
Springer
66views Cryptology» more  CTRSA 2016»
10 years 1 months ago
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs
We present the first physical side-channel attack on elliptic curve cryptography running on a PC. The attack targets the ECDH public-key encryption algorithm, as implemented in t...
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran ...
155
Voted
CTRSA
2016
Springer
60views Cryptology» more  CTRSA 2016»
10 years 1 months ago
Constrained PRFs for Unbounded Inputs
the full version of the extended abstract that appears in the proceedings of CT-RSA 2016. A constrained pseudorandom function F : K×X → Y for a family T ⊆ 2X of subsets of X ...
Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrz...
141
Voted
CTRSA
2016
Springer
68views Cryptology» more  CTRSA 2016»
10 years 1 months ago
Strongly Leakage-Resilient Authenticated Key Exchange
Abstract. Authenticated Key Exchange (AKE) protocols have been widely deployed in many real-world applications for securing communication channels. In this paper, we make the follo...
Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fu...
154
Voted
CTRSA
2016
Springer
48views Cryptology» more  CTRSA 2016»
10 years 1 months ago
Short Structure-Preserving Signatures
Essam Ghadafi