Sciweavers

IACR
2016
47views Biometrics» more  IACR 2016»
9 years 12 months ago
Commutativity, Associativity, and Public Key Cryptography
In this paper, we will study some possible generalizations of the famous Diffie-Hellman algorithm. As we will see, at the end, most of these generalizations will not be secure or w...
Jacques Patarin, Valérie Nachef
IACR
2016
39views Biometrics» more  IACR 2016»
9 years 12 months ago
How to Generalize RSA Cryptanalyses
Recently, the security of RSA variants with moduli N = pr q, e.g., the Takagi RSA and the prime power RSA, have been actively studied in several papers. Due to the unusual composit...
Atsushi Takayasu, Noboru Kunihiro
IACR
2016
68views Biometrics» more  IACR 2016»
9 years 12 months ago
From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions
Universally composable multi-party computation is impossible without setup assumptions. Motivated by the ubiquitous use of secure hardware in many real world security applications...
Nico Döttling, Daniel Kraschewski, Jörn ...
IACR
2016
40views Biometrics» more  IACR 2016»
9 years 12 months ago
Isogeny-based Quantum-resistant Undeniable Blind Signature Scheme
In this paper, we propose an Undeniable Blind Signature scheme (UBSS) based on isogenies between supersingular elliptic curves. The proposed UBSS is an extension of the Jao-Soukhar...
M. S. Srinath, V. Chandrasekaran
IACR
2016
43views Biometrics» more  IACR 2016»
9 years 12 months ago
Improved Integral and Zero-correlation Linear Cryptanalysis of Reduced-round CLEFIA Block Cipher
CLEFIA is a block cipher developed by Sony Corporation in 2007. It is a recommended cipher of CRYPTREC, and has been adopted as ISO/IEC international standard in lightweight crypto...
Wentan Yi, Shaozhen Chen
IACR
2016
56views Biometrics» more  IACR 2016»
9 years 12 months ago
Honey Encryption Beyond Message Recovery Security
Juels and Ristenpart introduced honey encryption (HE) and showed how to achieve message recovery security even in the face of attacks that can exhaustively try all likely keys. Th...
Joseph Jaeger, Thomas Ristenpart, Qiang Tang
IACR
2016
60views Biometrics» more  IACR 2016»
9 years 12 months ago
Packet Header Anomaly Detection Using Bayesian Topic Models
A method of network intrusion detection is proposed based on Bayesian topic models. The method employs tcpdump packets and extracts multiple features from the packet headers. A to...
Xuefei Cao, Bo Chen, Hui Li 0006, Yulong Fu
IACR
2016
45views Biometrics» more  IACR 2016»
9 years 12 months ago
Eliminating Decryption Failures from the Simple Matrix Encryption Scheme
The SimpleMatrix encryption scheme as proposed by Tao et al. [16] is one of the very few existing approaches to create a secure and efficient encryption scheme on the basis of mul...
Albrecht Petzoldt, Jintai Ding, Lih-chung Wang