Sciweavers

75
Voted
PKC
2015
Springer
27views Cryptology» more  PKC 2015»
9 years 11 months ago
Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms
We study simulation-based, selective opening security against chosen-ciphertext attacks (SIM-SO-CCA security) for public key encryption (PKE). In a selective opening, chosen-cipher...
Shengli Liu, Kenneth G. Paterson
88
Voted
PKC
2015
Springer
30views Cryptology» more  PKC 2015»
9 years 11 months ago
Additively Homomorphic UC Commitments with Optimal Amortized Overhead
We propose the first UC secure commitment scheme with (amortized) computational complexity linear in the size of the string committed to. After a preprocessing phase based on obli...
Ignacio Cascudo, Ivan Damgård, Bernardo Mach...
77
Voted
PKC
2015
Springer
12views Cryptology» more  PKC 2015»
9 years 11 months ago
A Polynomial-Time Attack on the BBCRS Scheme
The BBCRS scheme is a variant of the McEliece public-key encryption scheme where the hiding phase is performed by taking the inverse of a matrix which is of the form T +R where T i...
Alain Couvreur, Ayoub Otmani, Jean-Pierre Tillich,...
ASPLOS
2015
ACM
9 years 11 months ago
Temporally Bounding TSO for Fence-Free Asymmetric Synchronization
This paper introduces a temporally bounded total store ordering (TBTSO) memory model, and shows that it enables nonblocking fence-free solutions to asymmetric synchronization prob...
Adam Morrison, Yehuda Afek
ASPLOS
2015
ACM
9 years 11 months ago
Memory Errors in Modern Systems: The Good, The Bad, and The Ugly
Several recent publications have shown that hardware faults in the memory subsystem are commonplace. These faults are predicted to become more frequent in future systems that cont...
Vilas Sridharan, Nathan DeBardeleben, Sean Blancha...