Sciweavers

93
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
Improved Single-Key Attacks on 8-Round AES-192 and AES-256
Abstract. AES is the most widely used block cipher today, and its security is one of the most important issues in cryptanalysis. After 13 years of analysis, related-key attacks wer...
Orr Dunkelman, Nathan Keller, Adi Shamir
115
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
Optimistic Concurrent Zero Knowledge
We design cryptographic protocols that recognize best case (optimistic) situations and exploit them. As a case study, we present a new concurrent zeroknowledge protocol that is exp...
Alon Rosen, Abhi Shelat
75
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
Collision Attacks against the Knudsen-Preneel Compression Functions
Onur Özen, Martijn Stam
103
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
Computationally Secure Pattern Matching in the Presence of Malicious Adversaries
Carmit Hazay, Tomas Toft
ASIACRYPT
2010
Springer
14 years 10 months ago
Efficient String-Commitment from Weak Bit-Commitment
We study security amplification for weak bit-commitment schemes and improve the efficiency of (black-box) transformations in both the information-theoretic and computational setti...
Kai-Min Chung, Feng-Hao Liu, Chi-Jen Lu, Bo-Yin Ya...
89
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
Rotational Rebound Attacks on Reduced Skein
Abstract. In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competitio...
Dmitry Khovratovich, Ivica Nikolic, Christian Rech...
78
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
The Semi-Generic Group Model and Applications to Pairing-Based Cryptography
Tibor Jager, Andy Rupp
64
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
On Invertible Sampling and Adaptive Security
Yuval Ishai, Abishek Kumarasubramanian, Claudio Or...
115
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
Generic Compilers for Authenticated Key Exchange
So far, all solutions proposed for authenticated key agreement combine key agreement and authentication into a single cryptographic protocol. However, in many important applicatio...
Tibor Jager, Florian Kohlar, Sven Schäge, J&o...
ASIACRYPT
2010
Springer
14 years 10 months ago
Faster Fully Homomorphic Encryption
Abstract. We describe two improvements to Gentry's fully homomorphic scheme based on ideal lattices and its analysis: we provide a more aggressive analysis of one of the hardn...
Damien Stehlé, Ron Steinfeld