Sciweavers

IACR
2011
106views more  IACR 2011»
14 years 8 days ago
Hash Functions Based on Three Permutations: A Generic Security Analysis
We consider the family of 2n-to-n-bit compression functions that are solely based on at most three permutation executions and on XOR-operators, and analyze its collision and preima...
Bart Mennink, Bart Preneel
64
Voted
IACR
2011
83views more  IACR 2011»
14 years 8 days ago
Outsourcing Multi-Party Computation
Seny Kamara, Payman Mohassel, Mariana Raykova
IACR
2011
75views more  IACR 2011»
14 years 8 days ago
Graceful Degradation in Multi-Party Computation
Martin Hirt, Christoph Lucas, Ueli Maurer, Dominik...
115
Voted
IACR
2011
139views more  IACR 2011»
14 years 8 days ago
SGCM: The Sophie Germain Counter Mode
Abstract. Sophie Germain Counter Mode (SGCM) is an authenticated encryption mode of operation, to be used with 128-bit block ciphers such as AES. SGCM is a variant of the NIST stan...
Markku-Juhani O. Saarinen
113
Voted
IACR
2011
129views more  IACR 2011»
14 years 8 days ago
Bounded Vector Signatures and their Applications
Although malleability is undesirable in traditional digital signatures, schemes with limited malleability properties enable interesting functionalities that may be impossible to o...
Lei Wei, Scott E. Coull, Michael K. Reiter
115
Voted
IACR
2011
94views more  IACR 2011»
14 years 8 days ago
After-the-Fact Leakage in Public-Key Encryption
What does it mean for an encryption scheme to be leakage-resilient? Prior formulations require that the scheme remains semantically secure even in the presence of leakage, but onl...
Shai Halevi, Huijia Lin
128
Voted
IACR
2011
105views more  IACR 2011»
14 years 8 days ago
Leakage Tolerant Interactive Protocols
We put forth a framework for expressing security requirements from interactive protocols in the presence of arbitrary leakage. This allows capturing different levels of leakage to...
Nir Bitansky, Ran Canetti, Shai Halevi
IACR
2011
104views more  IACR 2011»
14 years 8 days ago
Collusion Resistant Obfuscation and Functional Re-encryption
Program Obfuscation is the problem of transforming a program into one which is functionally equivalent, yet whose inner workings are completely unintelligible to an adversary. Des...
Nishanth Chandran, Melissa Chase, Vinod Vaikuntana...