Sciweavers

IACR
2016
49views Biometrics» more  IACR 2016»
8 years 8 months ago
Improved Side-Channel Analysis Attacks on Xilinx Bitstream Encryption of 5, 6, and 7 Series
Abstract. Since 2012, it is publicly known that the bitstream encryption feature of modern Xilinx FPGAs can be broken by side-channel analysis. Presented at CT-RSA 2012, using grap...
Amir Moradi, Tobias Schneider
IACR
2016
42views Biometrics» more  IACR 2016»
8 years 8 months ago
On Garbling Schemes With And Without Privacy
Abstract. In recent years, a lot of progress has been made on speeding up Actively-secure Twoparty Function Evaluation (SFE) using Garbled Circuits. For a given level of security, ...
Carsten Baum
IACR
2016
48views Biometrics» more  IACR 2016»
8 years 8 months ago
A Memory Encryption Engine Suitable for General Purpose Processors
Cryptographic protection of memory is an essential ingredient for any technology that allows a closed computing system to run software in a trustworthy manner and handle secrets, ...
Shay Gueron
IACR
2016
49views Biometrics» more  IACR 2016»
8 years 8 months ago
Valiant's Universal Circuit is Practical
Universal circuits (UCs) can be programmed to evaluate any circuit of a given size k. They provide elegant solutions in various application scenarios, e.g. for private function eva...
Ágnes Kiss, Thomas Schneider 0003
23
Voted
IACR
2016
42views Biometrics» more  IACR 2016»
8 years 8 months ago
On Post-Compromise Security
In this work we study communication with a party whose secrets have already been compromised. At first sight, it may seem impossible to provide any type of security in this scena...
Katriel Cohn-Gordon, Cas Cremers, Luke Garratt
IACR
2016
40views Biometrics» more  IACR 2016»
8 years 8 months ago
MU-ORAM: Dealing with Stealthy Privacy Attacks in Multi-User Data Outsourcing Services
Outsourcing data to remote storage servers has become more and more popular, but the related security and privacy concerns have also been raised. To protect the pattern in which a...
Jinsheng Zhang, Wensheng Zhang 0001, Daji Qiao
IACR
2016
33views Biometrics» more  IACR 2016»
8 years 8 months ago
Computing Private Set Operations with Linear Complexities
Private set operation (PSO) protocols provide a natural way of securely performing operations on data sets, such that crucial details of the input sets are not revealed. Such proto...
Alex Davidson, Carlos Cid
IACR
2016
38views Biometrics» more  IACR 2016»
8 years 8 months ago
3-Message Zero Knowledge Against Human Ignorance
Nir Bitansky, Zvika Brakerski, Yael Tauman Kalai, ...
IACR
2016
46views Biometrics» more  IACR 2016»
8 years 8 months ago
On the (In)security of SNARKs in the Presence of Oracles
In this work we study the feasibility of knowledge extraction for succinct non-interactive arguments of knowledge (SNARKs) in a scenario that, to the best of our knowledge, has not...
Dario Fiore, Anca Nitulescu