Sciweavers

184
Voted
CTRSA
2016
Springer
60views Cryptology» more  CTRSA 2016»
10 years 1 months ago
Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones
In this paper, we study the side-channel resistance of the implementation of the ECDSA signature scheme in Android’s standard cryptographic library. We show that, for elliptic cu...
Pierre Belgarric, Pierre-Alain Fouque, Gilles Maca...
251
Voted
CTRSA
2016
Springer
61views Cryptology» more  CTRSA 2016»
10 years 1 months ago
Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes
This paper presents a new framework for constructing fully CCA-secure predicate encryption schemes from pair encoding schemes. Our construction is the first in the context of pred...
Johannes Blömer, Gennadij Liske
242
Voted
CTRSA
2016
Springer
84views Cryptology» more  CTRSA 2016»
10 years 1 months ago
Private Large-Scale Databases with Distributed Searchable Symmetric Encryption
With the growing popularity of remote storage, the ability to outsource a large private database yet be able to search on this encrypted data is critical. Searchable symmetric encr...
Yuval Ishai, Eyal Kushilevitz, Steve Lu, Rafail Os...
CTRSA
2016
Springer
83views Cryptology» more  CTRSA 2016»
10 years 1 months ago
Short Randomizable Signatures
David Pointcheval, Olivier Sanders