Sciweavers

IACR
2016
41views Biometrics» more  IACR 2016»
8 years 8 months ago
ZKBoo: Faster Zero-Knowledge for Boolean Circuits
In this paper we describe ZKBoo1 , a proposal for practically efficient zero-knowledge arguments especially tailored for Boolean circuits and report on a proof-of-concept implement...
Irene Giacomelli, Jesper Madsen, Claudio Orlandi
IACR
2016
126views Biometrics» more  IACR 2016»
8 years 8 months ago
Provably Weak Instances of Ring-LWE Revisited
Abstract. In CRYPTO 2015, Elias, Lauter, Ozman and Stange described an attack on the non-dual decision version of the ring learning with errors problem (RLWE) for two special famil...
Wouter Castryck, Ilia Iliashenko, Frederik Vercaut...
IACR
2016
39views Biometrics» more  IACR 2016»
8 years 8 months ago
Fixed Point Arithmetic in SHE Scheme
Abstract. The purpose of this paper is to investigate fixed point arithmetic in ring-based Somewhat Homomorphic Encryption (SHE) schemes. We provide three main contributions: Firs...
Anamaria Costache, Nigel P. Smart, S. Vivek, A. Wa...
IACR
2016
44views Biometrics» more  IACR 2016»
8 years 8 months ago
Invariant subspaces in Simpira
Abstract. In this short note we report on invariant subspaces in Simpira in the case of four registers. In particular, we show that the whole input space (respectively output space...
Sondre Rønjom
IACR
2016
38views Biometrics» more  IACR 2016»
8 years 8 months ago
Key Derivation for Squared-Friendly Applications: Lower Bounds
Security of a cryptographic application is typically defined by a security game. The adversary, within certain resources, cannot win with probability much better than 0 (for unpr...
Maciej Skorski
IACR
2016
64views Biometrics» more  IACR 2016»
8 years 8 months ago
Downgrade Resilience in Key-Exchange Protocols
Key-exchange protocols such as TLS, SSH, IPsec, and ZRTP are highly congurable, with typical deployments supporting multiple protocol versions, cryptographic algorithms and param...
Karthikeyan Bhargavan, Christina Brzuska, Cé...
IACR
2016
50views Biometrics» more  IACR 2016»
8 years 8 months ago
New Attacks on the Concatenation and XOR Hash Combiners
We study the security of the concatenation combiner H1(M) H2(M) for two independent iterated hash functions with n-bit outputs that are built using the Merkle-Damg˚ard constructio...
Itai Dinur
IACR
2016
37views Biometrics» more  IACR 2016»
8 years 8 months ago
Randomness Complexity of Private Circuits for Multiplication
Sonia Belaïd, Fabrice Benhamouda, Alain Passe...
IACR
2016
41views Biometrics» more  IACR 2016»
8 years 8 months ago
On the nonlinearity of monotone Boolean functions
We first prove the truthfulness of a conjecture on the nonlinearity of monotone Boolean functions in even dimension, proposed in the recent paper “Cryptographic properties of mo...
Claude Carlet
IACR
2016
40views Biometrics» more  IACR 2016»
8 years 8 months ago
On low degree polynomials in 2-round AES
Recent observations on polynomial structures of AES-like round functions are analysed in this note. We present computational evidence that input/output bits of AESlike 2-round tra...
Igor A. Semaev