Abstract. Authenticated Key Exchange (AKE) protocols have been widely deployed in many real-world applications for securing communication channels. In this paper, we make the follo...
Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fu...
In this paper, we study the side-channel resistance of the implementation of the ECDSA signature scheme in Android’s standard cryptographic library. We show that, for elliptic cu...
Pierre Belgarric, Pierre-Alain Fouque, Gilles Maca...
This paper presents a new framework for constructing fully CCA-secure predicate encryption schemes from pair encoding schemes. Our construction is the first in the context of pred...
With the growing popularity of remote storage, the ability to outsource a large private database yet be able to search on this encrypted data is critical. Searchable symmetric encr...
Yuval Ishai, Eyal Kushilevitz, Steve Lu, Rafail Os...
Recently, D¨ottling et al. (ASIACRYPT 2012) proposed the first chosen-ciphertext (IND-CCA) secure public-key encryption scheme from the learning parity with noise (LPN) assumptio...
—Operational processes leave trails in the information systems supporting them. Such event data are the starting point for process mining – an emerging scientific discipline r...
We describe plausible lattice-based constructions with properties that approximate the soughtafter multilinear maps in hard-discrete-logarithm groups, and show an example applicat...