Sciweavers

110
Voted
ASIACRYPT
2015
Springer
9 years 11 months ago
ASCA, SASCA and DPA with Enumeration: Which One Beats the Other and When?
Abstract. We describe three contributions regarding the Soft Analytical Side-Channel Attacks (SASCA) introduced at Asiacrypt 2014. First, we compare them with Algebraic Side-Channe...
Vincent Grosso, François-Xavier Standaert
105
Voted
ASIACRYPT
2015
Springer
9 years 11 months ago
The Tower Number Field Sieve
The security of pairing-based crypto-systems relies on the difficulty to compute discrete logarithms in finite fields Fpn where n is
Razvan Barbulescu, Pierrick Gaudry, Thorsten Klein...
108
Voted
ASIACRYPT
2015
Springer
9 years 11 months ago
Function-Hiding Inner Product Encryption
We extend the reach of functional encryption schemes that are provably secure under simple assumptions against unbounded collusion to include function-hiding inner product schemes...
Allison Bishop, Abhishek Jain 0002, Lucas Kowalczy...
116
Voted
ASIACRYPT
2015
Springer
9 years 11 months ago
Optimized Interpolation Attacks on LowMC
LowMC is a collection of block cipher families introduced at Eurocrypt 2015 by Albrecht et al. Its design is optimized for instantiations of multi-party computation, fully homomorp...
Itai Dinur, Yunwen Liu, Willi Meier, Qingju Wang
114
Voted
ASIACRYPT
2015
Springer
9 years 11 months ago
How to Sequentialize Independent Parallel Attacks? - Biased Distributions Have a Phase Transition
Abstract. We assume a scenario where an attacker can mount several independent attacks on a single CPU. Each attack can be run several times in independent ways. Each attack can su...
Sonia Bogos, Serge Vaudenay