Sciweavers

555 search results - page 4 / 111
» From ABZ to Cryptography
Sort
View
EUROCRYPT
2009
Springer
14 years 10 months ago
Practical Chosen Ciphertext Secure Encryption from Factoring
We propose a practical public-key encryption scheme whose security against chosen-ciphertext attacks can be reduced in the standard model to the assumption that factoring is intrac...
Dennis Hofheinz, Eike Kiltz
STOC
2005
ACM
198views Algorithms» more  STOC 2005»
14 years 10 months ago
On lattices, learning with errors, random linear codes, and cryptography
Our main result is a reduction from worst-case lattice problems such as GAPSVP and SIVP to a certain learning problem. This learning problem is a natural extension of the `learnin...
Oded Regev
CRYPTO
2003
Springer
113views Cryptology» more  CRYPTO 2003»
14 years 3 months ago
Torus-Based Cryptography
We introduce the concept of torus-based cryptography, give a new public key system called CEILIDH, and compare it to other discrete log based systems including Lucas-based systems ...
Karl Rubin, Alice Silverberg
TCC
2010
Springer
188views Cryptology» more  TCC 2010»
14 years 4 months ago
Founding Cryptography on Tamper-Proof Hardware Tokens
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the ...
Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam ...
FOCS
2008
IEEE
14 years 4 months ago
Leakage-Resilient Cryptography
We construct a stream-cipher SC whose implementation is secure even if a bounded amount of arbitrary (adaptively, adversarially chosen) information about the internal state of SC ...
Stefan Dziembowski, Krzysztof Pietrzak