Abstract. We introduce a novel notion of smooth (-verifier) non- interactive zero-knowledge proofs (NIZK) which parallel the familiar notion of smooth projective hash functions (S...
Abstract. With the impending threat of quantum computers, Post-Quantum Cryptography schemes have emerged as suitable replacements for today’s public-key cryptography schemes. We ...
Reza Azarderakhsh, David Jao, Kassem Kalach, Brian...
In this paper we describe ZKBoo1 , a proposal for practically efficient zero-knowledge arguments especially tailored for Boolean circuits and report on a proof-of-concept implement...
Abstract. In CRYPTO 2015, Elias, Lauter, Ozman and Stange described an attack on the non-dual decision version of the ring learning with errors problem (RLWE) for two special famil...
Wouter Castryck, Ilia Iliashenko, Frederik Vercaut...
Abstract. The purpose of this paper is to investigate fixed point arithmetic in ring-based Somewhat Homomorphic Encryption (SHE) schemes. We provide three main contributions: Firs...
Anamaria Costache, Nigel P. Smart, S. Vivek, A. Wa...
Abstract. In this short note we report on invariant subspaces in Simpira in the case of four registers. In particular, we show that the whole input space (respectively output space...
Security of a cryptographic application is typically defined by a security game. The adversary, within certain resources, cannot win with probability much better than 0 (for unpr...
Key-exchange protocols such as TLS, SSH, IPsec, and ZRTP are highly congurable, with typical deployments supporting multiple protocol versions, cryptographic algorithms and param...
Karthikeyan Bhargavan, Christina Brzuska, Cé...
We study the security of the concatenation combiner H1(M) H2(M) for two independent iterated hash functions with n-bit outputs that are built using the Merkle-Damg˚ard constructio...