191
click to vote
ASIACRYPT
9 years 8 months ago
2015 Springer
In this paper we study authenticated encryption algorithms inspired by the OCB mode (Offset Codebook). These algorithms use secret offsets (masks derived from a whitening key) to...
106
click to vote
ASIACRYPT
9 years 8 months ago
2015 Springer
Abstract. Side channels provide additional information to skilled adversaries that reduce the effort to determine an unknown key. If sufficient side channel information is availab...
101
click to vote
ASIACRYPT
9 years 8 months ago
2015 Springer
Motivated by the recent progress in improving efficiency of secure computation, we study cut-and-choose oblivious transfer—a basic building block of state-of-the-art constant rou...
100
click to vote
ASIACRYPT
9 years 8 months ago
2015 Springer
In 2012, NIST standardized SHA-512/224 and SHA-512/256, two truncated variants of SHA-512, in FIPS 180-4. These two hash functions are faster than SHA-224 and SHA-256 on 64-bit pla...
100
click to vote
ASIACRYPT
9 years 8 months ago
2015 Springer
Predicate encryption is an advanced form of public-key encryption that yield high flexibility in terms of access control. In the literature, many predicate encryption schemes hav...
|