Sciweavers

117
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
A Closer Look at Anonymity and Robustness in Encryption Schemes
Abstract. In this work, we take a closer look at anonymity and robustness in encryption schemes. Roughly speaking, an anonymous encryption scheme hides the identity of the secret-k...
Payman Mohassel
91
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
Multiparty Computation for Modulo Reduction without Bit-Decomposition and a Generalization to Bit-Decomposition
Bit-decomposition, which is proposed by Damg
Chao Ning, Qiuliang Xu
73
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
Finding Second Preimages of Short Messages for Hamsi-256
Thomas Fuhr
118
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
Leakage Resilient ElGamal Encryption
Blinding is a popular and well-known countermeasure to protect public-key cryptosystems against side-channel attacks. The high level idea is to randomize an exponentiation in order...
Eike Kiltz, Krzysztof Pietrzak
64
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
Efficient Public-Key Cryptography in the Presence of Key Leakage
Yevgeniy Dodis, Kristiyan Haralambiev, Adriana L&o...
106
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
The World Is Not Enough: Another Look on Second-Order DPA
In a recent work, Mangard et al. showed that under certain assumptions, the (so-called) standard univariate side-channel attacks using a distance-of-means test, correlation analysi...
François-Xavier Standaert, Nicolas Veyrat-C...
93
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
Improved Single-Key Attacks on 8-Round AES-192 and AES-256
Abstract. AES is the most widely used block cipher today, and its security is one of the most important issues in cryptanalysis. After 13 years of analysis, related-key attacks wer...
Orr Dunkelman, Nathan Keller, Adi Shamir
115
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
Optimistic Concurrent Zero Knowledge
We design cryptographic protocols that recognize best case (optimistic) situations and exploit them. As a case study, we present a new concurrent zeroknowledge protocol that is exp...
Alon Rosen, Abhi Shelat
75
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
Collision Attacks against the Knudsen-Preneel Compression Functions
Onur Özen, Martijn Stam
103
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
Computationally Secure Pattern Matching in the Presence of Malicious Adversaries
Carmit Hazay, Tomas Toft