224
click to vote
SACRYPT
9 years 8 months ago
2015 Springer
There has been great progress regarding efficient implementations of fully homomorphic encryption schemes since the first construction by Gentry. However, evaluating complex circu...
209
click to vote
SACRYPT
9 years 8 months ago
2015 Springer
Privacy-enhancing attribute-based credentials (PABCs) are the core ingredient to privacy-friendly authentication systems, allowing users to obtain credentials on attributes and pro...
106
click to vote
SACRYPT
9 years 8 months ago
2015 Springer
Abstract. This paper sets speed records on well-known Intel chips for the Curve25519 ellipticcurve Diffie-Hellman scheme and the Ed25519 digital signature scheme. In particular, it...
101
click to vote
SACRYPT
9 years 8 months ago
2015 Springer
Side-channel cryptanalysis is a very efficient class of attacks that recovers secret information by exploiting the physical leakage of a device executing a cryptographic computatio...
SACRYPT
9 years 8 months ago
2015 Springer
The aim of this work is to find large S-Boxes, typically operating on 8 bits, having both good cryptographic properties and a low implementation cost. Such S-Boxes are suitable bu...
|