Sciweavers

103
Voted
ASIACRYPT
2015
Springer
9 years 11 months ago
Key-Recovery Attacks on ASASA
The ASASA construction is a new design scheme introduced at Asiacrypt 2014 by Biryukov, Bouillaguet and Khovratovich. Its versatility was illustrated by building two public-key enc...
Brice Minaud, Patrick Derbez, Pierre-Alain Fouque,...
106
Voted
ASIACRYPT
2015
Springer
9 years 11 months ago
On the Impact of Known-Key Attacks on Hash Functions
Abstract. Hash functions are often constructed based on permutations or blockciphers, and security proofs are typically done in the ideal permutation or cipher model. However, once...
Bart Mennink, Bart Preneel
101
Voted
ASIACRYPT
2015
Springer
9 years 11 months ago
Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing
The iterated Even-Mansour construction defines a block cipher from a tuple of public n-bit permutations (P1, . . . , Pr) by alternatively xoring some n-bit round key ki, i = 0, . ...
Benoît Cogliati, Yannick Seurin
102
Voted
ASIACRYPT
2015
Springer
9 years 11 months ago
Card-Based Cryptographic Protocols Using a Minimal Number of Cards
Secure multiparty computation can be done with a deck of playing cards. For example, den Boer (EUROCRYPT ’89) devised his famous “five-card trick”, which is a secure two-par...
Alexander Koch, Stefan Walzer, Kevin Härtel
105
Voted
ASIACRYPT
2015
Springer
9 years 11 months ago
An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption
Takahiro Matsuda 0002, Goichiro Hanaoka