Sciweavers

IACR
2016
48views Biometrics» more  IACR 2016»
9 years 12 months ago
Safely Exporting Keys from Secure Channels: On the security of EAP-TLS and TLS Key Exporters
We investigate how to safely export additional cryptographic keys from secure channel protocols, modelled with the authenticated and confidential channel establishment (ACCE) secu...
Christina Brzuska, Håkon Jacobsen, Douglas S...
IACR
2016
44views Biometrics» more  IACR 2016»
9 years 12 months ago
Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Thing
Recently, Farasha et al. proposed an efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environme...
Yalin Chen, Jue-Sam Chou, Hung-Shen Wu
IACR
2016
42views Biometrics» more  IACR 2016»
9 years 12 months ago
Open Sesame: The Password Hashing Competition and Argon2
In this document we present an overview of the background to and goals of the Password Hashing Competition (PHC) as well as the design of its winner, Argon2, and its security requi...
Jos Wetzels
IACR
2016
57views Biometrics» more  IACR 2016»
9 years 12 months ago
Characterizations of the Degraded Boolean Function and Cryptanalysis of the SAFER Family
—This paper investigates the degradation properties of Boolean functions from the aspects of the distributions of differences and linear masks, and shows two characterizations of...
Wentan Yi, Shaozhen Chen
IACR
2016
36views Biometrics» more  IACR 2016»
9 years 12 months ago
Quantum Collision-Resistance of Non-Uniformly Distributed Functions
Abstract. We study the quantum query complexity of finding a collision for a function f whose outputs are chosen according to a distribution with min-entropy k. We prove that Ω(...
Ehsan Ebrahimi Targhi, Gelo Noel Tabia, Dominique ...
98
Voted
IACR
2016
42views Biometrics» more  IACR 2016»
9 years 12 months ago
Lightweight Multiplication in GF(2^n) with Applications to MDS Matrices
Abstract. In this paper we consider the fundamental question of optimizing finite field multiplications with one fixed element. Surprisingly, this question did not receive much ...
Christof Beierle, Thorsten Kranz, Gregor Leander
IACR
2016
45views Biometrics» more  IACR 2016»
9 years 12 months ago
Provably Robust Sponge-Based PRNGs and KDFs
We study the problem of devising provably secure PRNGs with input based on the sponge paradigm. Such constructions are very appealing, as efficient software/hardware implementation...
Peter Gazi, Stefano Tessaro
IACR
2016
44views Biometrics» more  IACR 2016»
9 years 12 months ago
Cryptanalysis of PRINCE with Minimal Data
We investigate two attacks on the PRINCE block cipher in the most realistic scenario, when the attacker only has a minimal amount of known plaintext available. The first attack is...
Shahram Rasoolzadeh, Håvard Raddum
IACR
2016
43views Biometrics» more  IACR 2016»
9 years 12 months ago
A trustless privacy-preserving reputation system
Reputation systems are crucial for distributed applications in which users have to be made accountable for their actions, such as ecommerce websites. However, existing systems ofte...
Alexander Schaub, Rémi Bazin, Omar Hasan, L...
IACR
2016
40views Biometrics» more  IACR 2016»
9 years 12 months ago
Refund attacks on Bitcoin's Payment Protocol
BIP70 is a community-accepted Payment Protocol standard that governs how merchants and customers perform payments in Bitcoin. This standard is supported by most major wallets and t...
Patrick McCorry, Siamak Fayyaz Shahandashti, Feng ...