Sciweavers

112
Voted
ASIACRYPT
2015
Springer
9 years 11 months ago
Property Preserving Symmetric Encryption Revisited
At EUROCRYPT 2012 Pandey and Rouselakis introduced the notion of property preserving symmetric encryption which enables checking for a property on plaintexts by running a public te...
Sanjit Chatterjee, M. Prem Laxman Das
114
Voted
ASIACRYPT
2015
Springer
9 years 11 months ago
Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness
Dana Dachman-Soled, Chang Liu, Charalampos Papaman...
115
Voted
ASIACRYPT
2015
Springer
9 years 11 months ago
Idealizing Identity-Based Encryption
We formalize the standard application of identity-based encryption (IBE), namely noninteractive secure communication, as realizing an ideal system which we call delivery controlle...
Dennis Hofheinz, Christian Matt 0002, Ueli Maurer
124
Voted
ASIACRYPT
2015
Springer
9 years 11 months ago
On the Optimality of Non-Linear Computations of Length-Preserving Encryption Schemes
Abstract. It is well known that three and four rounds of balanced Feistel cipher or Luby-Rackoff (LR) encryption for two blocks messages are pseudorandom permutation (PRP) and str...
Mridul Nandi
127
Voted
ASIACRYPT
2015
Springer
9 years 11 months ago
An Inverse-Free Single-Keyed Tweakable Enciphering Scheme
In CRYPTO 2003, Halevi and Rogaway proposed CMC, a tweakable enciphering scheme (TES) based on a blockcipher. It requires two blockcipher keys and it is not inverse-free (i.e., the...
Ritam Bhaumik, Mridul Nandi