Sciweavers

IACR
2016
47views Biometrics» more  IACR 2016»
9 years 12 months ago
The Honey Badger of BFT Protocols
The surprising success of cryptocurrencies has led to a surge of interest in deploying large scale, highly robust, Byzantine fault tolerant (BFT) protocols for mission-critical ap...
Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, Da...
IACR
2016
70views Biometrics» more  IACR 2016»
9 years 12 months ago
Optimizing S-box Implementations for Several Criteria using SAT Solvers
Abstract. We explore the feasibility of applying SAT solvers to optimizing implementations of small functions such as S-boxes for multiple optimization criteria, e.g., the number o...
Ko Stoffelen
IACR
2016
46views Biometrics» more  IACR 2016»
9 years 12 months ago
On Negation Complexity of Injections, Surjections and Collision-Resistance in Cryptography
Goldreich and Izsak (Theory of Computing, 2012) initiated the research on understanding the role of negations in circuits implementing cryptographic primitives, notably, consideri...
Douglas Miller, Adam Scrivener, Jesse Stern, Muthu...
IACR
2016
34views Biometrics» more  IACR 2016»
9 years 12 months ago
Computing theta functions in quasi-linear time in genus 2 and above
We outline an algorithm to compute θ(z, τ) in genus 2 in quasi-optimal time, borrowing
Hugo Labrande, Emmanuel Thomé
IACR
2016
44views Biometrics» more  IACR 2016»
9 years 12 months ago
Strong Continuous Non-malleable Encoding Schemes with Tamper-Detection
Abstract—A non-malleable encoding scheme is a keyless encoding scheme which is resilient to tampering attacks. Such a scheme is said to be continuously secure if the scheme is re...
Amir S. Mortazavi, Mahmoud Salmasizadeh, Amir Dane...
IACR
2016
42views Biometrics» more  IACR 2016»
9 years 12 months ago
On the Size of Pairing-based Non-interactive Arguments
Abstract. Non-interactive arguments enable a prover to convince a verifier that a statement is true. Recently there has been a lot of progress both in theory and practice on const...
Jens Groth
IACR
2016
45views Biometrics» more  IACR 2016»
9 years 12 months ago
Cryptanalysis of the Full Spritz Stream Cipher
Spritz is a stream cipher proposed by Rivest and Schuldt at the rump session of CRYPTO 2014. It is intended to be a replacement of the popular RC4 stream cipher. In this paper we p...
Subhadeep Banik, Takanori Isobe
IACR
2016
38views Biometrics» more  IACR 2016»
9 years 12 months ago
On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model
We investigate lower bounds in terms of time and memory on the parallel complexity of an adversary A computing labels of randomly selected challenge nodes in direct acyclic graphs,...
Joël Alwen, Binyi Chen, Chethan Kamath, Vladi...
IACR
2016
44views Biometrics» more  IACR 2016»
9 years 12 months ago
Pseudoentropy: Lower-bounds for Chain rules and Transformations
Computational notions of entropy have recently found many applications, including leakageresilient cryptography, deterministic encryption or memory delegation. The two main types ...
Krzysztof Pietrzak, Maciej Skorski