Sciweavers

IACR
2016
42views Biometrics» more  IACR 2016»
8 years 8 months ago
Reduced Memory Meet-in-the-Middle Attack against the NTRU Private Key
NTRU is a public-key cryptosystem introduced at ANTS-III. The two most used techniques in attacking the NTRU private key are meet-in-the-middle attacks and lattice-basis reduction...
Christine van Vredendaal
IACR
2016
47views Biometrics» more  IACR 2016»
8 years 8 months ago
On the Power of Secure Two-Party Computation
Ishai, Kushilevitz, Ostrovsky and Sahai (STOC 2007, SIAM JoC 2009) introduced the powerful “MPC-in-the-head” technique that provided a general transformation of information-th...
Carmit Hazay, Muthuramakrishnan Venkitasubramaniam
IACR
2016
130views Biometrics» more  IACR 2016»
8 years 8 months ago
Anonymous Role-Based Access Control on E-Health Records
Electronic Health Record (EHR) system facilitates us a lot for health record management. Privacy risk of patients’ records is the dominating obstacle in the widely deployed EHRs...
Xingguang Zhou, Jianwei Liu, Weiran Liu, Qianhong ...
IACR
2016
40views Biometrics» more  IACR 2016»
8 years 8 months ago
Lightweight MDS Generalized Circulant Matrices
Abstract. In this article, we analyze the circulant structure of generalized circulant matrices to reduce the search space for finding lightweight MDS matrices. We first show tha...
Meicheng Liu, Siang Meng Sim
IACR
2016
42views Biometrics» more  IACR 2016»
8 years 8 months ago
Fast Multiparty Multiplications from shared bits
We study the question of securely multiplying N-bit integers that are stored in binary representation, in the context of protocols for dishonest majority with preprocessing. We ach...
Ivan Damgård, Tomas Toft, Rasmus Winther Zak...
IACR
2016
48views Biometrics» more  IACR 2016»
8 years 8 months ago
A New Birthday-Type Algorithm for Attacking the Fresh Re-Keying Countermeasure
The fresh re-keying scheme is a countermeasure designed to protect low-cost devices against side-channel attacks. In this paper, we present a new birthdaytype attack based on a re...
Qian Guo, Thomas Johansson 0001
IACR
2016
59views Biometrics» more  IACR 2016»
8 years 8 months ago
On Splitting a Point with Summation Polynomials in Binary Elliptic Curves
Abstract. Recent research for efficient algorithms for solving the discrete logarithm (DL) problem on elliptic curves depends on the difficult question of the feasibility of index ...
Nicolas T. Courtois
IACR
2016
41views Biometrics» more  IACR 2016»
8 years 8 months ago
Circuit Compilers with O(1/ log(n)) Leakage Rate
The goal of leakage-resilient cryptography is to construct cryptographic algorithms that are secure even if the devices on which they are implemented leak information to the advers...
Marcin Andrychowicz, Stefan Dziembowski, Sebastian...
IACR
2016
43views Biometrics» more  IACR 2016»
8 years 8 months ago
Smooth NIZK Arguments with Applications to Asymmetric UC-PAKE
Abstract. We introduce a novel notion of smooth (-verifier) non- interactive zero-knowledge proofs (NIZK) which parallel the familiar notion of smooth projective hash functions (S...
Charanjit S. Jutla, Arnab Roy 0003
IACR
2016
44views Biometrics» more  IACR 2016»
8 years 8 months ago
Key Compression for Isogeny-Based Cryptosystems
Abstract. With the impending threat of quantum computers, Post-Quantum Cryptography schemes have emerged as suitable replacements for today’s public-key cryptography schemes. We ...
Reza Azarderakhsh, David Jao, Kassem Kalach, Brian...