Sciweavers

CANS
2015
Springer
30views Cryptology» more  CANS 2015»
9 years 11 months ago
What Users Should Know About Full Disk Encryption Based on LUKS
Mobile devices, laptops, and USB memory usually store large amounts of sensitive information frequently unprotected. Unauthorized access to or release of such information could rev...
Simone Bossi, Andrea Visconti
SACRYPT
2015
Springer
9 years 11 months ago
Minimizing the Number of Bootstrappings in Fully Homomorphic Encryption
There has been great progress regarding efficient implementations of fully homomorphic encryption schemes since the first construction by Gentry. However, evaluating complex circu...
Marie Paindavoine, Bastien Vialla
SACRYPT
2015
Springer
9 years 11 months ago
Formal Treatment of Privacy-Enhancing Credential Systems
Privacy-enhancing attribute-based credentials (PABCs) are the core ingredient to privacy-friendly authentication systems, allowing users to obtain credentials on attributes and pro...
Jan Camenisch, Stephan Krenn, Anja Lehmann, Gert L...
SACRYPT
2015
Springer
9 years 11 months ago
Cryptanalysis of Feistel Networks with Secret Round Functions
Generic distinguishers against Feistel Network with up to 5 rounds exist in the regular setting and up to 6 rounds in a multi-key setting. We present new cryptanalyses against Feis...
Alex Biryukov, Gaëtan Leurent, Léo Per...
SACRYPT
2015
Springer
9 years 11 months ago
Forgery and Subkey Recovery on CAESAR Candidate iFeed
Abstract. iFeed is a blockcipher-based authenticated encryption design by Zhang, Wu, Sui, and Wang and a first round candidate to the CAESAR competition. iFeed is claimed to achie...
Willem Schroé, Bart Mennink, Elena Andreeva...