Sciweavers

SACRYPT
2015
Springer
8 years 3 months ago
Sandy2x: New Curve25519 Speed Records
Abstract. This paper sets speed records on well-known Intel chips for the Curve25519 ellipticcurve Diffie-Hellman scheme and the Ed25519 digital signature scheme. In particular, it...
Tung Chou
SACRYPT
2015
Springer
8 years 3 months ago
Forgery Attacks on Round-Reduced ICEPOLE-128
ICEPOLE is a family of authenticated encryptions schemes submitted to the ongoing CAESAR competition and in addition presented at CHES 2014. To justify the use of ICEPOLE, or to po...
Christoph Dobraunig, Maria Eichlseder, Florian Men...
SACRYPT
2015
Springer
8 years 3 months ago
Cryptanalysis of the Authenticated Encryption Algorithm COFFE
COFFE is a hash-based authenticated encryption scheme. In the original paper, it was claimed to have IND-CPA security and also ciphertext integrity even in nonce-misuse scenario. I...
Ivan Tjuawinata, Tao Huang, Hongjun Wu
SACRYPT
2015
Springer
8 years 3 months ago
Bit Security of the CDH Problems over Finite Fields
It is a long-standing open problem to prove the existence of (deterministic) hard-core predicates for the Computational Diffie-Hellman (CDH) problem over finite fields, without ...
Mingqiang Wang, Tao Zhan, Haibin Zhang
SACRYPT
2015
Springer
8 years 3 months ago
Related-Key Attack on Full-Round PICARO
Side-channel cryptanalysis is a very efficient class of attacks that recovers secret information by exploiting the physical leakage of a device executing a cryptographic computatio...
Anne Canteaut, Virginie Lallemand, María Na...
SACRYPT
2015
Springer
8 years 3 months ago
ECC on Your Fingertips: A Single Instruction Approach for Lightweight ECC Design in GF(p)
Lightweight implementation of Elliptic Curve Cryptography on FPGA has been a popular research topic due to the boom of ubiquitous computing. In this paper we propose a novel single...
Debapriya Basu Roy, Poulami Das 0003, Debdeep Mukh...
SACRYPT
2015
Springer
8 years 3 months ago
Masking Large Keys in Hardware: A Masked Implementation of McEliece
Instantiations of the McEliece cryptosystem which are considered computationally secure even in a post-quantum era still require hardening against side channel attacks for practica...
Cong Chen, Thomas Eisenbarth, Ingo von Maurich, Ra...
SACRYPT
2015
Springer
8 years 3 months ago
Analysis of the CAESAR Candidate Silver
In this paper, we present the first third-party cryptanalysis against the authenticated encryption scheme Silver. In high-level, Silver builds a tweakable block cipher by tweaking...
Jérémy Jean, Yu Sasaki, Lei Wang 003...
SACRYPT
2015
Springer
8 years 3 months ago
Key-Recovery Attacks Against the MAC Algorithm Chaskey
Abstract. Chaskey is a Message Authentication Code (MAC) for 32bit microcontrollers proposed by Mouha et. al at SAC 2014. Its underlying blockcipher uses an Even-Mansour constructi...
Chrysanthi Mavromati
SACRYPT
2015
Springer
8 years 3 months ago
Near Collision Side Channel Attacks
Side channel collision attacks are a powerful method to exploit side channel leakage. Otherwise than a few exceptions, collision attacks usually combine leakage from distinct point...
Baris Ege, Thomas Eisenbarth, Lejla Batina