Sciweavers

124
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
Structured Encryption and Controlled Disclosure
We consider the problem of encrypting structured data (e.g., a web graph or a social network) in such a way that it can be efficiently and privately queried. For this purpose, we ...
Melissa Chase, Seny Kamara
ASIACRYPT
2010
Springer
14 years 10 months ago
Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions
Emmanuel Volte, Valérie Nachef, Jacques Pat...
112
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
Short Non-interactive Zero-Knowledge Proofs
We show that probabilistically checkable proofs can be used to shorten non-interactive zero-knowledge proofs. We obtain publicly verifiable non-interactive zero-knowledge proofs fo...
Jens Groth
117
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
A Closer Look at Anonymity and Robustness in Encryption Schemes
Abstract. In this work, we take a closer look at anonymity and robustness in encryption schemes. Roughly speaking, an anonymous encryption scheme hides the identity of the secret-k...
Payman Mohassel
91
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
Multiparty Computation for Modulo Reduction without Bit-Decomposition and a Generalization to Bit-Decomposition
Bit-decomposition, which is proposed by Damg
Chao Ning, Qiuliang Xu
73
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
Finding Second Preimages of Short Messages for Hamsi-256
Thomas Fuhr
116
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
Leakage Resilient ElGamal Encryption
Blinding is a popular and well-known countermeasure to protect public-key cryptosystems against side-channel attacks. The high level idea is to randomize an exponentiation in order...
Eike Kiltz, Krzysztof Pietrzak
63
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
Efficient Public-Key Cryptography in the Presence of Key Leakage
Yevgeniy Dodis, Kristiyan Haralambiev, Adriana L&o...
106
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
The World Is Not Enough: Another Look on Second-Order DPA
In a recent work, Mangard et al. showed that under certain assumptions, the (so-called) standard univariate side-channel attacks using a distance-of-means test, correlation analysi...
François-Xavier Standaert, Nicolas Veyrat-C...