Sciweavers

SACRYPT
2015
Springer
8 years 8 months ago
Minimizing the Number of Bootstrappings in Fully Homomorphic Encryption
There has been great progress regarding efficient implementations of fully homomorphic encryption schemes since the first construction by Gentry. However, evaluating complex circu...
Marie Paindavoine, Bastien Vialla
SACRYPT
2015
Springer
8 years 8 months ago
Formal Treatment of Privacy-Enhancing Credential Systems
Privacy-enhancing attribute-based credentials (PABCs) are the core ingredient to privacy-friendly authentication systems, allowing users to obtain credentials on attributes and pro...
Jan Camenisch, Stephan Krenn, Anja Lehmann, Gert L...
SACRYPT
2015
Springer
8 years 8 months ago
Cryptanalysis of Feistel Networks with Secret Round Functions
Generic distinguishers against Feistel Network with up to 5 rounds exist in the regular setting and up to 6 rounds in a multi-key setting. We present new cryptanalyses against Feis...
Alex Biryukov, Gaëtan Leurent, Léo Per...
SACRYPT
2015
Springer
8 years 8 months ago
Forgery and Subkey Recovery on CAESAR Candidate iFeed
Abstract. iFeed is a blockcipher-based authenticated encryption design by Zhang, Wu, Sui, and Wang and a first round candidate to the CAESAR competition. iFeed is claimed to achie...
Willem Schroé, Bart Mennink, Elena Andreeva...
SACRYPT
2015
Springer
8 years 8 months ago
Construction of Lightweight S-Boxes Using Feistel and MISTY Structures
The aim of this work is to find large S-Boxes, typically operating on 8 bits, having both good cryptographic properties and a low implementation cost. Such S-Boxes are suitable bu...
Anne Canteaut, Sébastien Duval, Gaëtan...
SACRYPT
2015
Springer
8 years 8 months ago
Sandy2x: New Curve25519 Speed Records
Abstract. This paper sets speed records on well-known Intel chips for the Curve25519 ellipticcurve Diffie-Hellman scheme and the Ed25519 digital signature scheme. In particular, it...
Tung Chou
SACRYPT
2015
Springer
8 years 8 months ago
Forgery Attacks on Round-Reduced ICEPOLE-128
ICEPOLE is a family of authenticated encryptions schemes submitted to the ongoing CAESAR competition and in addition presented at CHES 2014. To justify the use of ICEPOLE, or to po...
Christoph Dobraunig, Maria Eichlseder, Florian Men...
SACRYPT
2015
Springer
8 years 8 months ago
Cryptanalysis of the Authenticated Encryption Algorithm COFFE
COFFE is a hash-based authenticated encryption scheme. In the original paper, it was claimed to have IND-CPA security and also ciphertext integrity even in nonce-misuse scenario. I...
Ivan Tjuawinata, Tao Huang, Hongjun Wu
SACRYPT
2015
Springer
8 years 8 months ago
Bit Security of the CDH Problems over Finite Fields
It is a long-standing open problem to prove the existence of (deterministic) hard-core predicates for the Computational Diffie-Hellman (CDH) problem over finite fields, without ...
Mingqiang Wang, Tao Zhan, Haibin Zhang
SACRYPT
2015
Springer
8 years 8 months ago
Related-Key Attack on Full-Round PICARO
Side-channel cryptanalysis is a very efficient class of attacks that recovers secret information by exploiting the physical leakage of a device executing a cryptographic computatio...
Anne Canteaut, Virginie Lallemand, María Na...