Sciweavers

IACR
2016
68views Biometrics» more  IACR 2016»
9 years 12 months ago
Fault-Tolerant Aggregate Signatures
Aggregate signature schemes allow for the creation of a short aggregate of multiple signatures. This feature leads to significant reductions of bandwidth and storage space in sens...
Gunnar Hartung, Björn Kaidel, Alexander Koch,...
IACR
2016
43views Biometrics» more  IACR 2016»
9 years 12 months ago
There is Wisdom in Harnessing the Strengths of your Enemy: Customized Encoding to Thwart Side-Channel Attacks - Extended Version
Abstract. Side-channel attacks are an important concern for the security of cryptographic algorithms. To counteract it, a recent line of research has investigated the use of softwa...
Houssem Maghrebi, Victor Servant, Julien Bringer
IACR
2016
44views Biometrics» more  IACR 2016»
9 years 12 months ago
On the Computation of the Optimal Ate Pairing at the 192-bit Security Level
Barreto, Lynn and Scott elliptic curves of embedding degree 12 denoted BLS12 have been proven to present fastest results on the implementation of pairings at the 192-bit security l...
Loubna Ghammam, Emmanuel Fouotsa
IACR
2016
119views Biometrics» more  IACR 2016»
9 years 12 months ago
Per-Session Security: Password-Based Cryptography Revisited
Cryptographic security is usually defined as some form of guarantee that holds except when a bad event with negligible probability occurs, and nothing is guaranteed in that case. ...
Grégory Demay, Peter Gazi, Ueli Maurer, Bj&...
IACR
2016
42views Biometrics» more  IACR 2016»
9 years 12 months ago
Topology-based Plug-and-Play Key-Setup
Abstract. We study the use of known, well-connected network topology, to improve key setup and management. Specifically, we present the TopKeyS protocol, that uses such known-topo...
Amir Herzberg, Yehonatan Kfir
IACR
2016
44views Biometrics» more  IACR 2016»
9 years 12 months ago
Compositions of linear functions and applications to hashing
Cayley hash functions are based on a simple idea of using a pair of (semi)group elements, A and B, to hash the 0 and 1 bit, respectively, and then to hash an arbitrary bit string i...
Vladimir Shpilrain, Bianca Sosnovski
IACR
2016
57views Biometrics» more  IACR 2016»
9 years 12 months ago
On a decentralized trustless pseudo-random number generation algorithm
We construct an algorithm that permits a large group of individuals to reach consensus on a random number, without having to rely on any third parties. The algorithm works with hi...
Serguei Popov
IACR
2016
37views Biometrics» more  IACR 2016»
9 years 12 months ago
Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security
In PKC 2014, Dachman-Soled showed a construction of a chosen ciphertext (CCA) secure public key encryption (PKE) scheme based on a PKE scheme which simultaneously satisfies a secu...
Takahiro Matsuda 0002, Goichiro Hanaoka
IACR
2016
42views Biometrics» more  IACR 2016»
9 years 12 months ago
On the tightness of the error bound in Ring-LWE
Wouter Castryck, Ilia Iliashenko, Frederik Vercaut...