We present a constant-round non-malleable commitment scheme based on the existence of sub-exponential one-way functions and using a blackbox proof of security. As far as we know, t...
The paper presents the abstraction transformation which is a fundaethod for creating functions in ADATE. The use of abstraction turns out to be similar to evolution by gene duplic...
A simple method for constructing collisions for Shpilrain’s polynomial-based hash function from ICISC 2006 is presented. The attack relies on elementary linear algebra and can be...
We present an extension to a recent method for learning of nonlinear manifolds, which allows to incorporate general cost functions. We focus on the -insensitive loss and visually d...
This paper proposes candidate one-way functions constructed with a certain type of endomorphisms on non-supersingular elliptic curves and presents several pieces of evidence of the...