Sciweavers

108
Voted
ASIACRYPT
2015
Springer
9 years 11 months ago
Implementing Candidate Graded Encoding Schemes from Ideal Lattices
Multilinear maps have become popular tools for designing cryptographic schemes since a first approximate realisation candidate was proposed by Garg, Gentry and Halevi (GGH). This ...
Martin R. Albrecht, Catalin Cocis, Fabien Laguilla...
96
Voted
ASIACRYPT
2015
Springer
9 years 11 months ago
Multilinear and Aggregate Pseudorandom Functions: New Constructions and Improved Security
Michel Abdalla, Fabrice Benhamouda, Alain Passel&e...
107
Voted
ASIACRYPT
2015
Springer
9 years 11 months ago
Multi-party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation
Abstract. Existing protocols for non-interactive multi-party key exchange either (1) support a bounded number of users, (2) require a trusted setup, or (3) rely on knowledge-type a...
Dakshita Khurana, Vanishree Rao, Amit Sahai
103
Voted
ASIACRYPT
2015
Springer
9 years 11 months ago
Reverse-Engineering of the Cryptanalytic Attack Used in the Flame Super-Malware
In May 2012, a highly advanced malware for espionage dubbed Flame was found targeting the Middle-East. As it turned out, it used a forged signature to infect Windows machines by MI...
Max Fillinger, Marc Stevens
99
Voted
ASIACRYPT
2015
Springer
9 years 11 months ago
Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption
We provide a security analysis for full-state keyed Sponge and full-state Duplex constructions. Our results can be used for making a large class of Sponge-based authenticated encry...
Bart Mennink, Reza Reyhanitabar, Damian Vizá...