Sciweavers

IACR
2011
82views more  IACR 2011»
14 years 4 months ago
Collision for 75-step SHA-1: Intensive Parallelization with GPU
E. A. Grechnikov, A. V. Adinetz
IACR
2011
132views more  IACR 2011»
14 years 4 months ago
Homomorphic encryption from codes
We propose a new homomorphic encryption scheme based on the hardness of decoding under independent random noise from certain affine families of codes. Unlike in previous latticeba...
Andrej Bogdanov, Chin Ho Lee
IACR
2011
137views more  IACR 2011»
14 years 4 months ago
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Although anonymous authentication has been extensively studied, so far no scheme has been widely adopted in practice. A particular issue with fully anonymous authentication schemes...
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-R...
IACR
2011
115views more  IACR 2011»
14 years 4 months ago
Multi-Server Oblivious RAM
Secure two-party computation protocol allows two players, Alice with secret input x and Bob with secret input y, to jointly execute an arbitrary program π(x, y) such that only th...
Steve Lu, Rafail Ostrovsky
IACR
2011
142views more  IACR 2011»
14 years 4 months ago
XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions
We present the hash-based signature scheme XMSS. It is the first provably (forward) secure and practical signature scheme with minimal security requirements: a pseudorandom and a ...
Johannes Buchmann, Erik Dahmen, Andreas Hülsi...
IACR
2011
107views more  IACR 2011»
14 years 4 months ago
Identity-Based (Lossy) Trapdoor Functions and Applications
Mihir Bellare, Eike Kiltz, Chris Peikert, Brent Wa...
IACR
2011
112views more  IACR 2011»
14 years 4 months ago
A Domain Transformation for Structure-Preserving Signatures on Group Elements
We present a generic transformation that allows us to use a large class of pairing-based signatures to construct schemes for signing group elements in a structure preserving way. A...
Melissa Chase, Markulf Kohlweiss
IACR
2011
173views more  IACR 2011»
14 years 4 months ago
All-But-Many Lossy Trapdoor Functions
We put forward a generalization of lossy trapdoor functions (LTFs). Namely, all-but-many lossy trapdoor functions (ABM-LTFs) are LTFs that are parametrized with tags. Each tag can...
Dennis Hofheinz
IACR
2011
123views more  IACR 2011»
14 years 4 months ago
Hummingbird: Privacy at the time of Twitter
In the last several years, micro-blogging Online Social Networks (OSNs), such as Twitter, have taken the world by storm, now boasting over 100 million subscribers. As an unparalle...
Emiliano De Cristofaro, Claudio Soriente, Gene Tsu...
IACR
2011
128views more  IACR 2011»
14 years 4 months ago
Fault-propagation Pattern Based DFA on SPN Structure Block Ciphers using Bitwise Permutation, with Application to PRESENT and PR
—This paper proposes a novel fault-propagation pattern based differential fault analysis method - FPP-DFA, and proves its feasibility on SPN structure block ciphers using bitwise...
Xin-jie Zhao, Tao Wang, Shi-ze Guo