Sciweavers

99
Voted
ASIACRYPT
2015
Springer
9 years 11 months ago
Multi-input Functional Encryption for Unbounded Arity Functions
Saikrishna Badrinarayanan, Divya Gupta 0001, Abhis...
228
Voted
ASIACRYPT
2015
Springer
9 years 11 months ago
Collision Attacks Against CAESAR Candidates - Forgery and Key-Recovery Against AEZ and Marble
In this paper we study authenticated encryption algorithms inspired by the OCB mode (Offset Codebook). These algorithms use secret offsets (masks derived from a whitening key) to...
Thomas Fuhr, Gaëtan Leurent, Valentin Suder
133
Voted
ASIACRYPT
2015
Springer
9 years 11 months ago
Counting Keys in Parallel After a Side Channel Attack
Abstract. Side channels provide additional information to skilled adversaries that reduce the effort to determine an unknown key. If sufficient side channel information is availab...
Daniel P. Martin 0001, Jonathan F. O'Connell, Elis...
120
Voted
ASIACRYPT
2015
Springer
9 years 11 months ago
Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model
We study the adaptive security of constrained PRFs in the standard model. We initiate our exploration with puncturable PRFs. A puncturable PRF family is a special class of constra...
Susan Hohenberger, Venkata Koppula, Brent Waters
118
Voted
ASIACRYPT
2015
Springer
9 years 11 months ago
On Black-Box Complexity of Universally Composable Security in the CRS Model
In this work, we study the intrinsic complexity of black-box Universally Composable (UC) secure computation based on general assumptions. We present a thorough study in various co...
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam