Sciweavers

IACR
2016
147views Biometrics» more  IACR 2016»
9 years 12 months ago
Neeva: A Lightweight Hash Function
RFID technology is one of the major applications of lightweight cryptography where security and cost both are equally essential or we may say that cost friendly cryptographic tool...
Khushboo Bussi, Dhananjoy Dey, Manoj Kumar Biswas,...
IACR
2016
73views Biometrics» more  IACR 2016»
9 years 12 months ago
Algorithmic Countermeasures Against Fault Attacks and Power Analysis for RSA-CRT
Abstract. In this work, we analyze all existing RSA-CRT countermeasures against the Bellcore attack that use binary self-secure exponentiation algorithms. We test their security ag...
Ágnes Kiss, Juliane Krämer, Pablo Rauz...
IACR
2016
46views Biometrics» more  IACR 2016»
9 years 12 months ago
Fully homomorphic encryption must be fat or ugly?
In 1978, Rivest, Adleman and Dertouzos asked for algebraic systems for which useful privacy homomorphisms exist. To date, the only acknownledged result is noise based encryption co...
Kristian Gjøsteen, Martin Strand 0001
IACR
2016
45views Biometrics» more  IACR 2016»
9 years 12 months ago
A Maiorana-McFarland Construction of a GBF on Galois ring
Bent functions shows some vital properties among all combinatorial objects. Its links in combinatorics, cryptography and coding theory attract the scientific community to construc...
Shashi Kant Pandey, P. R. Mishra, B. K. Dass
IACR
2016
47views Biometrics» more  IACR 2016»
9 years 12 months ago
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels
We show that elliptic-curve cryptography implementations on mobile devices are vulnerable to electromagnetic and power side-channel attacks. We demonstrate full extraction of ECDS...
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran ...
IACR
2016
44views Biometrics» more  IACR 2016»
9 years 12 months ago
Fully-Secure Lattice-Based IBE as Compact as PKE
We construct an identity-based encryption (IBE) scheme from the standard Learning with Errors (LWE) assumption, which both has a compact public-key (with size similar to known lat...
Daniel Apon, Xiong Fan, Feng-Hao Liu
IACR
2016
53views Biometrics» more  IACR 2016»
9 years 12 months ago
Improved on an improved remote user authentication scheme with key agreement
Recently, Kumari et al. pointed out that Chang et al.’s scheme “Untraceable dynamic-identity-based remote user authentication scheme with verifiable password update” not on...
Yalin Chen, Jue-Sam Chou, I.-Ching Liao
IACR
2016
37views Biometrics» more  IACR 2016»
9 years 12 months ago
An Improvement of Both Security and Reliability for Keccak Implementations on Smart Card
As the new SHA-3 standard, the security and reliability of Keccak have attracted a lot of attentions. Previous works already show that both software and hardware implementations of...
Pei Luo, Liwei Zhang, Yunsi Fei, A. Adam Ding
102
Voted
IACR
2016
50views Biometrics» more  IACR 2016»
9 years 12 months ago
Server Notaries: A Complementary Approach to the Web PKI Trust Model
Abstract. SSL/TLS is the de facto protocol for providing secure communication over the Internet. It relies on the Web PKI model for authentication and secure key exchange. Despite ...
Emre Yüce, Ali Aydin Selçuk