Sciweavers

IACR
2011
113views more  IACR 2011»
12 years 11 months ago
Fully Homomorphic SIMD Operations
At PKC 2010 Smart and Vercauteren presented a variant of Gentry’s fully homomorphic public key encryption scheme and mentioned that the scheme could support SIMD style operations...
Nigel P. Smart, Frederik Vercauteren
IACR
2011
85views more  IACR 2011»
12 years 11 months ago
Random Number Generation Based on Oscillatory Metastability in Ring Circuits
: Random number generator designs are discussed, which utilize oscillatory metastability, induced  by switching between two stable states of ring‐connected di...
Laszlo Hars
IACR
2011
111views more  IACR 2011»
12 years 11 months ago
Secure Multi-Party Sorting and Applications
Sorting is among the most fundamental and well-studied problems within computer science and a core step of many algorithms. In this article, we consider the problem of constructing...
Kristján Valur Jónsson, Gunnar Kreit...
IACR
2011
94views more  IACR 2011»
12 years 11 months ago
Practical Key-recovery For All Possible Parameters of SFLASH
In this paper we present a new practical key-recovery attack on the SFLASH signature scheme. SFLASH is a derivative of the older C∗ encryption and signature scheme that was broke...
Charles Bouillaguet, Pierre-Alain Fouque, Gilles M...
IACR
2011
255views more  IACR 2011»
12 years 11 months ago
A Standard-Model Security Analysis of TLS-DHE
TLS is the most important cryptographic protocol in use today. However, up to now there is no complete cryptographic security proof in the standard model, nor in any other model. ...
Tibor Jager, Florian Kohlar, Sven Schäge, J&o...
IACR
2011
91views more  IACR 2011»
12 years 11 months ago
Improved Generalized Birthday Attack
Let r, B and w be positive integers. Let C be a linear code of length Bw and subspace of Fr 2. The k-regular-decoding problem is to find a nonzero codeword consisting of w length...
Paul Kirchner
IACR
2011
120views more  IACR 2011»
12 years 11 months ago
McOE: A Foolproof On-Line Authenticated Encryption Scheme
On-Line Authenticated Encryption (OAE) combines confidentiality with data integrity and is on-line computable. Most block cipher-based schemes for Authenticated Encryption can be ...
Ewan Fleischmann, Christian Forler, Stefan Lucks
IACR
2011
82views more  IACR 2011»
12 years 11 months ago
Collision for 75-step SHA-1: Intensive Parallelization with GPU
E. A. Grechnikov, A. V. Adinetz
IACR
2011
132views more  IACR 2011»
12 years 11 months ago
Homomorphic encryption from codes
We propose a new homomorphic encryption scheme based on the hardness of decoding under independent random noise from certain affine families of codes. Unlike in previous latticeba...
Andrej Bogdanov, Chin Ho Lee
IACR
2011
137views more  IACR 2011»
12 years 11 months ago
Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices
Although anonymous authentication has been extensively studied, so far no scheme has been widely adopted in practice. A particular issue with fully anonymous authentication schemes...
Liqun Chen, Kurt Dietrich, Hans Löhr, Ahmad-R...