Sciweavers

ASIACRYPT
2010
Springer
13 years 10 months ago
A Closer Look at Anonymity and Robustness in Encryption Schemes
Abstract. In this work, we take a closer look at anonymity and robustness in encryption schemes. Roughly speaking, an anonymous encryption scheme hides the identity of the secret-k...
Payman Mohassel
ASIACRYPT
2010
Springer
13 years 10 months ago
Multiparty Computation for Modulo Reduction without Bit-Decomposition and a Generalization to Bit-Decomposition
Bit-decomposition, which is proposed by Damg
Chao Ning, Qiuliang Xu
ASIACRYPT
2010
Springer
13 years 10 months ago
Leakage Resilient ElGamal Encryption
Blinding is a popular and well-known countermeasure to protect public-key cryptosystems against side-channel attacks. The high level idea is to randomize an exponentiation in order...
Eike Kiltz, Krzysztof Pietrzak
ASIACRYPT
2010
Springer
13 years 10 months ago
Efficient Public-Key Cryptography in the Presence of Key Leakage
Yevgeniy Dodis, Kristiyan Haralambiev, Adriana L&o...
ASIACRYPT
2010
Springer
13 years 10 months ago
The World Is Not Enough: Another Look on Second-Order DPA
In a recent work, Mangard et al. showed that under certain assumptions, the (so-called) standard univariate side-channel attacks using a distance-of-means test, correlation analysi...
François-Xavier Standaert, Nicolas Veyrat-C...
ASIACRYPT
2010
Springer
13 years 10 months ago
Improved Single-Key Attacks on 8-Round AES-192 and AES-256
Abstract. AES is the most widely used block cipher today, and its security is one of the most important issues in cryptanalysis. After 13 years of analysis, related-key attacks wer...
Orr Dunkelman, Nathan Keller, Adi Shamir
ASIACRYPT
2010
Springer
13 years 10 months ago
Optimistic Concurrent Zero Knowledge
We design cryptographic protocols that recognize best case (optimistic) situations and exploit them. As a case study, we present a new concurrent zeroknowledge protocol that is exp...
Alon Rosen, Abhi Shelat