Sciweavers

IACR
2016
51views Biometrics» more  IACR 2016»
8 years 7 months ago
Capacity and Data Complexity in Multidimensional Linear Attack
Jialin Huang, Serge Vaudenay, Xuejia Lai, Kaisa Ny...
IACR
2016
46views Biometrics» more  IACR 2016»
8 years 7 months ago
Polytopic Cryptanalysis
Abstract. Standard differential cryptanalysis uses statistical dependencies between the difference of two plaintexts and the difference of the respective two ciphertexts to atta...
Tyge Tiessen
IACR
2016
60views Biometrics» more  IACR 2016»
8 years 7 months ago
Fault analysis and weak key-IV attack on Sprout
:- Armknecht and Mikhalev proposed a new stream cipher ‘Sprout’ based on the design specification of the stream cipher, Grain-128a. Sprout has shorter state size than Grain fa...
Dibyendu Roy, Sourav Mukhopadhyay
IACR
2016
50views Biometrics» more  IACR 2016»
8 years 7 months ago
Side-Channel Watchdog: Run-Time Evaluation of Side-Channel Vulnerability in FPGA-Based Crypto-systems
Besides security against classical cryptanalysis, its important for cryptographic implementations to have sufficient robustness against side-channel attacks. Many countermeasures h...
Souvik Sonar, Debapriya Basu Roy, Rajat Subhra Cha...
IACR
2016
39views Biometrics» more  IACR 2016»
8 years 7 months ago
On Bitcoin Security in the Presence of Broken Crypto Primitives
Digital currencies like Bitcoin rely on cryptographic primitives to operate. However, past experience shows that cryptographic primitives do not last forever: increased computatio...
Ilias Giechaskiel, Cas Cremers, Kasper Bonne Rasmu...
IACR
2016
46views Biometrics» more  IACR 2016»
8 years 7 months ago
Breaking the Sub-Exponential Barrier in Obfustopia
Indistinguishability obfuscation (iO) has emerged as a surprisingly powerful notion. Almost all known cryptographic primitives can be constructed from general purpose iO and other...
Sanjam Garg, Omkant Pandey, Akshayaram Srinivasan,...
IACR
2016
42views Biometrics» more  IACR 2016»
8 years 7 months ago
Circular Security Counterexamples for Arbitrary Length Cycles from LWE
We describe a public key encryption that is IND-CPA secure under the Learning with Errors (LWE) assumption, but that is not circular secure for arbitrary length cycles. Previous s...
Venkata Koppula, Brent Waters
IACR
2016
62views Biometrics» more  IACR 2016»
8 years 7 months ago
Fully Anonymous Transferable Ecash
Numerous electronic cash schemes have been proposed over the years ranging from Ecash, Mondex to Millicent. However none of these schemes have been adopted by the financial instit...
Hitesh Tewari, Arthur Hughes
IACR
2016
154views Biometrics» more  IACR 2016»
8 years 7 months ago
Intel SGX Explained
Intel’s Software Guard Extensions (SGX) is a set of extensions to the Intel architecture that aims to provide integrity and confidentiality guarantees to securitysensitive comp...
Victor Costan, Srinivas Devadas