Sciweavers

ASIACRYPT
2015
Springer
10 years 28 days ago
Compactly Hiding Linear Spans - Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications
Quasi-adaptive non-interactive zero-knowledge (QA-NIZK) proofs is a recent paradigm, suggested by Jutla and Roy (Asiacrypt ’13), which is motivated by the Groth-Sahai seminal tec...
Benoît Libert, Thomas Peters, Marc Joye, Mot...
ASIACRYPT
2015
Springer
10 years 28 days ago
Generic Security of NMAC and HMAC with Input Whitening
HMAC and its variant NMAC are the most popular approaches to deriving a MAC (and more generally, a PRF) from a cryptographic hash function. Despite nearly two decades of research, ...
Peter Gazi, Krzysztof Pietrzak, Stefano Tessaro
ASIACRYPT
2015
Springer
10 years 28 days ago
Analysis of SHA-512/224 and SHA-512/256
In 2012, NIST standardized SHA-512/224 and SHA-512/256, two truncated variants of SHA-512, in FIPS 180-4. These two hash functions are faster than SHA-224 and SHA-256 on 64-bit pla...
Christoph Dobraunig, Maria Eichlseder, Florian Men...
ASIACRYPT
2015
Springer
10 years 28 days ago
Solving Linear Equations Modulo Unknown Divisors: Revisited
Abstract. We revisit the problem of finding small solutions to a collection of linear equations modulo an unknown divisor p for a known composite integer N. In CaLC 2001, Howgrave...
Yao Lu, Rui Zhang 0002, Liqiang Peng, Dongdai Lin