Sciweavers

64 search results - page 7 / 13
» crypto 2006
Sort
View
CRYPTO
2012
Springer
217views Cryptology» more  CRYPTO 2012»
12 years 7 days ago
Securing Circuits against Constant-Rate Tampering
We present a compiler that converts any circuit into one that remains secure even if a constant fraction of its wires are tampered with. Following the seminal work of Ishai et al. ...
Dana Dachman-Soled, Yael Tauman Kalai
CTRSA
2007
Springer
102views Cryptology» more  CTRSA 2007»
14 years 1 months ago
Improved Efficiency for Private Stable Matching
At Financial Crypto 2006, Golle presented a novel framework for the privacy preserving computation of a stable matching (stable marriage). We show that the communication complexity...
Matthew K. Franklin, Mark Gondree, Payman Mohassel
CRYPTO
2006
Springer
129views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
New Proofs for
HMAC was proved in [3] to be a PRF assuming that (1) the underlying compression function is a PRF, and (2) the iterated hash function is weakly collision-resistant. However, recent...
Mihir Bellare
CRYPTO
2006
Springer
92views Cryptology» more  CRYPTO 2006»
14 years 1 months ago
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs
In this paper we formalize a general model of cryptanalytic time/memory tradeoffs for the inversion of a random function f : {0, 1, . . . , N - 1} {0, 1, . . . , N - 1}. The model...
Elad Barkan, Eli Biham, Adi Shamir
CRYPTO
2006
Springer
125views Cryptology» more  CRYPTO 2006»
14 years 1 months ago
On the Higher Order Nonlinearities of Algebraic Immune Functions
Abstract. One of the most basic requirements concerning Boolean functions used in cryptosystems is that they must have high algebraic degrees. This simple criterion is not always w...
Claude Carlet