Sciweavers

FC
2010
Springer
150views Cryptology» more  FC 2010»
13 years 9 months ago
A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets
Abstract. It is becoming more common for researchers to find themselves in a position of being able to take over control of a malicious botnet. If this happens, should they use thi...
David Dittrich, Felix Leder, Tillmann Werner
FC
2010
Springer
173views Cryptology» more  FC 2010»
13 years 9 months ago
A Case Study on Measuring Statistical Data in the Tor Anonymity Network
The Tor network is one of the largest deployed anonymity networks, consisting of 1500+ volunteer-run relays and probably hundreds of thousands of clients connecting every day. Its ...
Karsten Loesing, Steven J. Murdoch, Roger Dingledi...
FC
2010
Springer
166views Cryptology» more  FC 2010»
13 years 9 months ago
Ethical Proactive Threat Research
John Aycock, John Sullins
FC
2010
Springer
166views Cryptology» more  FC 2010»
13 years 9 months ago
Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices
Daniel Engels, Xinxin Fan, Guang Gong, Honggang Hu...
FC
2010
Springer
196views Cryptology» more  FC 2010»
13 years 9 months ago
Secure Computation with Fixed-Point Numbers
Abstract. Secure computation is a promising approach to business problems in which several parties want to run a joint application and cannot reveal their inputs. Secure computatio...
Octavian Catrina, Amitabh Saxena
CRYPTO
2010
Springer
140views Cryptology» more  CRYPTO 2010»
13 years 9 months ago
Password-Authenticated Session-Key Generation on the Internet in the Plain Model
Vipul Goyal, Abhishek Jain 0002, Rafail Ostrovsky
CRYPTO
2010
Springer
188views Cryptology» more  CRYPTO 2010»
13 years 9 months ago
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves
Abstract. We provide the first construction of a hash function into ordinary elliptic curves that is indifferentiable from a random oracle, based on Icart's deterministic enco...
Eric Brier, Jean-Sébastien Coron, Thomas Ic...
CRYPTO
2010
Springer
181views Cryptology» more  CRYPTO 2010»
13 years 9 months ago
On the Efficiency of Classical and Quantum Oblivious Transfer Reductions
Due to its universality oblivious transfer (OT) is a primitive of great importance in secure multi-party computation. OT is impossible to implement from scratch in an unconditional...
Severin Winkler, Jürg Wullschleger
CRYPTO
2010
Springer
186views Cryptology» more  CRYPTO 2010»
13 years 9 months ago
Additively Homomorphic Encryption with d-Operand Multiplications
The search for encryption schemes that allow to evaluate functions (or circuits) over encrypted data has attracted a lot of attention since the seminal work on this subject by Rive...
Carlos Aguilar Melchor, Philippe Gaborit, Javier H...
CRYPTO
2010
Springer
157views Cryptology» more  CRYPTO 2010»
13 years 9 months ago
Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability - (or: Quadratic Residuosity Strikes Ba
The main results of this work are new public-key encryption schemes that, under the quadratic residuosity (QR) assumption (or Paillier's decisional composite residuosity (DCR...
Zvika Brakerski, Shafi Goldwasser