Sciweavers

IACR
2011
94views more  IACR 2011»
14 years 4 months ago
Secure Computation with Sublinear Amortized Work
Traditional approaches to secure computation begin by representing the function f being computed as a circuit. For any function f that depends on each of its inputs, this implies ...
S. Dov Gordon, Jonathan Katz, Vladimir Kolesnikov,...
IACR
2011
106views more  IACR 2011»
14 years 4 months ago
Unaligned Rebound Attack - Application to Keccak
We analyze the internal permutations of Keccak, one of the NIST SHA-3 competition finalists, in regard to differential properties. By carefully studying the elements composing th...
Alexandre Duc, Jian Guo 0001, Thomas Peyrin, Lei W...
IACR
2011
152views more  IACR 2011»
14 years 4 months ago
Progression-Free Sets and Sublinear Pairing-Based Non-Interactive Zero-Knowledge Arguments
Abstract. In Asiacrypt 2010, Groth constructed the only previously known sublinearcommunication NIZK argument for circuit satisfiability in the common reference string model. We p...
Helger Lipmaa
IACR
2011
106views more  IACR 2011»
14 years 4 months ago
Hash Functions Based on Three Permutations: A Generic Security Analysis
We consider the family of 2n-to-n-bit compression functions that are solely based on at most three permutation executions and on XOR-operators, and analyze its collision and preima...
Bart Mennink, Bart Preneel
IACR
2011
83views more  IACR 2011»
14 years 4 months ago
Outsourcing Multi-Party Computation
Seny Kamara, Payman Mohassel, Mariana Raykova
IACR
2011
75views more  IACR 2011»
14 years 4 months ago
Graceful Degradation in Multi-Party Computation
Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik...
IACR
2011
139views more  IACR 2011»
14 years 4 months ago
SGCM: The Sophie Germain Counter Mode
Abstract. Sophie Germain Counter Mode (SGCM) is an authenticated encryption mode of operation, to be used with 128-bit block ciphers such as AES. SGCM is a variant of the NIST stan...
Markku-Juhani O. Saarinen
IACR
2011
129views more  IACR 2011»
14 years 4 months ago
Bounded Vector Signatures and their Applications
Although malleability is undesirable in traditional digital signatures, schemes with limited malleability properties enable interesting functionalities that may be impossible to o...
Lei Wei, Scott E. Coull, Michael K. Reiter