Sciweavers

CTRSA
2016
Springer
66views Cryptology» more  CTRSA 2016»
10 years 3 days ago
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs
We present the first physical side-channel attack on elliptic curve cryptography running on a PC. The attack targets the ECDH public-key encryption algorithm, as implemented in t...
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran ...
CTRSA
2016
Springer
60views Cryptology» more  CTRSA 2016»
10 years 3 days ago
Constrained PRFs for Unbounded Inputs
the full version of the extended abstract that appears in the proceedings of CT-RSA 2016. A constrained pseudorandom function F : K×X → Y for a family T ⊆ 2X of subsets of X ...
Hamza Abusalah, Georg Fuchsbauer, Krzysztof Pietrz...
CTRSA
2016
Springer
68views Cryptology» more  CTRSA 2016»
10 years 3 days ago
Strongly Leakage-Resilient Authenticated Key Exchange
Abstract. Authenticated Key Exchange (AKE) protocols have been widely deployed in many real-world applications for securing communication channels. In this paper, we make the follo...
Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fu...
CTRSA
2016
Springer
48views Cryptology» more  CTRSA 2016»
10 years 3 days ago
Short Structure-Preserving Signatures
Essam Ghadafi
CTRSA
2016
Springer
60views Cryptology» more  CTRSA 2016»
10 years 3 days ago
Side-Channel Analysis of Weierstrass and Koblitz Curve ECDSA on Android Smartphones
In this paper, we study the side-channel resistance of the implementation of the ECDSA signature scheme in Android’s standard cryptographic library. We show that, for elliptic cu...
Pierre Belgarric, Pierre-Alain Fouque, Gilles Maca...
CTRSA
2016
Springer
61views Cryptology» more  CTRSA 2016»
10 years 3 days ago
Construction of Fully CCA-Secure Predicate Encryptions from Pair Encoding Schemes
This paper presents a new framework for constructing fully CCA-secure predicate encryption schemes from pair encoding schemes. Our construction is the first in the context of pred...
Johannes Blömer, Gennadij Liske
CTRSA
2016
Springer
84views Cryptology» more  CTRSA 2016»
10 years 3 days ago
Private Large-Scale Databases with Distributed Searchable Symmetric Encryption
With the growing popularity of remote storage, the ability to outsource a large private database yet be able to search on this encrypted data is critical. Searchable symmetric encr...
Yuval Ishai, Eyal Kushilevitz, Steve Lu, Rafail Os...
CTRSA
2016
Springer
83views Cryptology» more  CTRSA 2016»
10 years 3 days ago
Short Randomizable Signatures
David Pointcheval, Olivier Sanders
107
Voted
CSSC
2016
10 years 3 days ago
On Progressively Type-II Censored Two-parameter Rayleigh Distribution
Tanujit Dey, Sanku Dey, Debasis Kundu
CSSC
2016
10 years 3 days ago
Non-parametric Sampling Approximation via Voronoi Tessellations
In this paper we propose a novel non-parametric sampling approach to estimate posterior distributions from parameters of interest. This technique is particularly suited for models...
Alejandro Villagran, Gabriel Huerta, Marina Vannuc...