Sciweavers

IACR
2016
40views Biometrics» more  IACR 2016»
8 years 7 months ago
Isogeny-based Quantum-resistant Undeniable Blind Signature Scheme
In this paper, we propose an Undeniable Blind Signature scheme (UBSS) based on isogenies between supersingular elliptic curves. The proposed UBSS is an extension of the Jao-Soukhar...
M. S. Srinath, V. Chandrasekaran
IACR
2016
43views Biometrics» more  IACR 2016»
8 years 7 months ago
Improved Integral and Zero-correlation Linear Cryptanalysis of Reduced-round CLEFIA Block Cipher
CLEFIA is a block cipher developed by Sony Corporation in 2007. It is a recommended cipher of CRYPTREC, and has been adopted as ISO/IEC international standard in lightweight crypto...
Wentan Yi, Shaozhen Chen
IACR
2016
56views Biometrics» more  IACR 2016»
8 years 7 months ago
Honey Encryption Beyond Message Recovery Security
Juels and Ristenpart introduced honey encryption (HE) and showed how to achieve message recovery security even in the face of attacks that can exhaustively try all likely keys. Th...
Joseph Jaeger, Thomas Ristenpart, Qiang Tang
IACR
2016
60views Biometrics» more  IACR 2016»
8 years 7 months ago
Packet Header Anomaly Detection Using Bayesian Topic Models
A method of network intrusion detection is proposed based on Bayesian topic models. The method employs tcpdump packets and extracts multiple features from the packet headers. A to...
Xuefei Cao, Bo Chen, Hui Li 0006, Yulong Fu
IACR
2016
45views Biometrics» more  IACR 2016»
8 years 7 months ago
Eliminating Decryption Failures from the Simple Matrix Encryption Scheme
The SimpleMatrix encryption scheme as proposed by Tao et al. [16] is one of the very few existing approaches to create a secure and efficient encryption scheme on the basis of mul...
Albrecht Petzoldt, Jintai Ding, Lih-chung Wang
IACR
2016
68views Biometrics» more  IACR 2016»
8 years 7 months ago
Fault-Tolerant Aggregate Signatures
Aggregate signature schemes allow for the creation of a short aggregate of multiple signatures. This feature leads to significant reductions of bandwidth and storage space in sens...
Gunnar Hartung, Björn Kaidel, Alexander Koch,...
IACR
2016
43views Biometrics» more  IACR 2016»
8 years 7 months ago
There is Wisdom in Harnessing the Strengths of your Enemy: Customized Encoding to Thwart Side-Channel Attacks - Extended Version
Abstract. Side-channel attacks are an important concern for the security of cryptographic algorithms. To counteract it, a recent line of research has investigated the use of softwa...
Houssem Maghrebi, Victor Servant, Julien Bringer
IACR
2016
44views Biometrics» more  IACR 2016»
8 years 7 months ago
On the Computation of the Optimal Ate Pairing at the 192-bit Security Level
Barreto, Lynn and Scott elliptic curves of embedding degree 12 denoted BLS12 have been proven to present fastest results on the implementation of pairings at the 192-bit security l...
Loubna Ghammam, Emmanuel Fouotsa