Sciweavers

IACR
2011
106views more  IACR 2011»
12 years 11 months ago
Hash Functions Based on Three Permutations: A Generic Security Analysis
We consider the family of 2n-to-n-bit compression functions that are solely based on at most three permutation executions and on XOR-operators, and analyze its collision and preima...
Bart Mennink, Bart Preneel
IACR
2011
83views more  IACR 2011»
12 years 11 months ago
Outsourcing Multi-Party Computation
Seny Kamara, Payman Mohassel, Mariana Raykova
IACR
2011
75views more  IACR 2011»
12 years 11 months ago
Graceful Degradation in Multi-Party Computation
Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik...
IACR
2011
139views more  IACR 2011»
12 years 11 months ago
SGCM: The Sophie Germain Counter Mode
Abstract. Sophie Germain Counter Mode (SGCM) is an authenticated encryption mode of operation, to be used with 128-bit block ciphers such as AES. SGCM is a variant of the NIST stan...
Markku-Juhani O. Saarinen
IACR
2011
129views more  IACR 2011»
12 years 11 months ago
Bounded Vector Signatures and their Applications
Although malleability is undesirable in traditional digital signatures, schemes with limited malleability properties enable interesting functionalities that may be impossible to o...
Lei Wei, Scott E. Coull, Michael K. Reiter
IACR
2011
94views more  IACR 2011»
12 years 11 months ago
After-the-Fact Leakage in Public-Key Encryption
What does it mean for an encryption scheme to be leakage-resilient? Prior formulations require that the scheme remains semantically secure even in the presence of leakage, but onl...
Shai Halevi, Huijia Lin
IACR
2011
105views more  IACR 2011»
12 years 11 months ago
Leakage Tolerant Interactive Protocols
We put forth a framework for expressing security requirements from interactive protocols in the presence of arbitrary leakage. This allows capturing different levels of leakage to...
Nir Bitansky, Ran Canetti, Shai Halevi
IACR
2011
104views more  IACR 2011»
12 years 11 months ago
Collusion Resistant Obfuscation and Functional Re-encryption
Program Obfuscation is the problem of transforming a program into one which is functionally equivalent, yet whose inner workings are completely unintelligible to an adversary. Des...
Nishanth Chandran, Melissa Chase, Vinod Vaikuntana...