Sciweavers

IACR
2016
44views Biometrics» more  IACR 2016»
8 years 8 months ago
On the Computation of the Optimal Ate Pairing at the 192-bit Security Level
Barreto, Lynn and Scott elliptic curves of embedding degree 12 denoted BLS12 have been proven to present fastest results on the implementation of pairings at the 192-bit security l...
Loubna Ghammam, Emmanuel Fouotsa
IACR
2016
119views Biometrics» more  IACR 2016»
8 years 8 months ago
Per-Session Security: Password-Based Cryptography Revisited
Cryptographic security is usually defined as some form of guarantee that holds except when a bad event with negligible probability occurs, and nothing is guaranteed in that case. ...
Grégory Demay, Peter Gazi, Ueli Maurer, Bj&...
IACR
2016
42views Biometrics» more  IACR 2016»
8 years 8 months ago
Topology-based Plug-and-Play Key-Setup
Abstract. We study the use of known, well-connected network topology, to improve key setup and management. Specifically, we present the TopKeyS protocol, that uses such known-topo...
Amir Herzberg, Yehonatan Kfir
IACR
2016
44views Biometrics» more  IACR 2016»
8 years 8 months ago
Compositions of linear functions and applications to hashing
Cayley hash functions are based on a simple idea of using a pair of (semi)group elements, A and B, to hash the 0 and 1 bit, respectively, and then to hash an arbitrary bit string i...
Vladimir Shpilrain, Bianca Sosnovski
IACR
2016
57views Biometrics» more  IACR 2016»
8 years 8 months ago
On a decentralized trustless pseudo-random number generation algorithm
We construct an algorithm that permits a large group of individuals to reach consensus on a random number, without having to rely on any third parties. The algorithm works with hi...
Serguei Popov
IACR
2016
37views Biometrics» more  IACR 2016»
8 years 8 months ago
Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security
In PKC 2014, Dachman-Soled showed a construction of a chosen ciphertext (CCA) secure public key encryption (PKE) scheme based on a PKE scheme which simultaneously satisfies a secu...
Takahiro Matsuda 0002, Goichiro Hanaoka
IACR
2016
42views Biometrics» more  IACR 2016»
8 years 8 months ago
On the tightness of the error bound in Ring-LWE
Wouter Castryck, Ilia Iliashenko, Frederik Vercaut...
IACR
2016
48views Biometrics» more  IACR 2016»
8 years 8 months ago
Safely Exporting Keys from Secure Channels: On the security of EAP-TLS and TLS Key Exporters
We investigate how to safely export additional cryptographic keys from secure channel protocols, modelled with the authenticated and confidential channel establishment (ACCE) secu...
Christina Brzuska, Håkon Jacobsen, Douglas S...
IACR
2016
44views Biometrics» more  IACR 2016»
8 years 8 months ago
Improved on an efficient user authentication scheme for heterogeneous wireless sensor network tailored for the Internet of Thing
Recently, Farasha et al. proposed an efficient user authentication and key agreement scheme for heterogeneous wireless sensor network tailored for the Internet of Things environme...
Yalin Chen, Jue-Sam Chou, Hung-Shen Wu