Sciweavers

IACR
2016
34views Biometrics» more  IACR 2016»
8 years 7 months ago
Computing theta functions in quasi-linear time in genus 2 and above
We outline an algorithm to compute θ(z, τ) in genus 2 in quasi-optimal time, borrowing
Hugo Labrande, Emmanuel Thomé
IACR
2016
44views Biometrics» more  IACR 2016»
8 years 7 months ago
Strong Continuous Non-malleable Encoding Schemes with Tamper-Detection
Abstract—A non-malleable encoding scheme is a keyless encoding scheme which is resilient to tampering attacks. Such a scheme is said to be continuously secure if the scheme is re...
Amir S. Mortazavi, Mahmoud Salmasizadeh, Amir Dane...
IACR
2016
42views Biometrics» more  IACR 2016»
8 years 7 months ago
On the Size of Pairing-based Non-interactive Arguments
Abstract. Non-interactive arguments enable a prover to convince a verifier that a statement is true. Recently there has been a lot of progress both in theory and practice on const...
Jens Groth
IACR
2016
45views Biometrics» more  IACR 2016»
8 years 7 months ago
Cryptanalysis of the Full Spritz Stream Cipher
Spritz is a stream cipher proposed by Rivest and Schuldt at the rump session of CRYPTO 2014. It is intended to be a replacement of the popular RC4 stream cipher. In this paper we p...
Subhadeep Banik, Takanori Isobe
IACR
2016
38views Biometrics» more  IACR 2016»
8 years 7 months ago
On the Complexity of Scrypt and Proofs of Space in the Parallel Random Oracle Model
We investigate lower bounds in terms of time and memory on the parallel complexity of an adversary A computing labels of randomly selected challenge nodes in direct acyclic graphs,...
Joël Alwen, Binyi Chen, Chethan Kamath, Vladi...
IACR
2016
44views Biometrics» more  IACR 2016»
8 years 7 months ago
Pseudoentropy: Lower-bounds for Chain rules and Transformations
Computational notions of entropy have recently found many applications, including leakageresilient cryptography, deterministic encryption or memory delegation. The two main types ...
Krzysztof Pietrzak, Maciej Skorski
IACR
2016
50views Biometrics» more  IACR 2016»
8 years 7 months ago
An Alternative View of the Graph-Induced Multilinear Maps
In this paper, we view multilinear maps through the lens of “homomorphic obfuscation”. In specific, we show how to homomorphically obfuscate the kernel-test and affine subsp...
Yilei Chen
IACR
2016
32views Biometrics» more  IACR 2016»
8 years 7 months ago
Implementing a Toolkit for Ring-LWE Based Cryptography in Arbitrary Cyclotomic Number Fields
Recent research in the field of lattice-based cryptography, especially on the topic of the ring-based primitive ring-LWE, provided efficient and practical ring-based cryptographi...
Christoph M. Mayer