2980
Cryptology ePrint Archive: Report 2016/154
Highly-Efficient Fully-Anonymous Dynamic Group Signatures
8 days ago
The Pythia PRF Service
We propose a modern PRF service called PYTHIA designed to offer a level of flexibility, security, and ease- of-deployability lacking in prior approaches. The keystone of PYTHIA is a new cryptographic primitive called a verifiable partially-oblivious PRF that reveals a portion of an input message to the service but hides the rest. We give a construction that additionally supports efficient bulk rotation of previously obtained PRF values to new keys. Performance measurements show that our construction, which relies on bilinear pairings and zero-knowledge proofs, is highly practical. We also give accompanying formal definitions and proofs of security.
crypto 
5 weeks ago
Cryptology ePrint Archive: Report 2018/577
Fast Distributed RSA Key Generation for Semi-Honest and Malicious Adversaries
6 weeks ago
Cryptology ePrint Archive: Report 2018/488
Wide Tweakable Block Ciphers Based on Substitution-Permutation Networks: Security Beyond the Birthday Bound
crypto 
8 weeks ago
Cryptology ePrint Archive: Report 2016/943
Stadium: A Distributed Metadata-Private Messaging System
9 weeks ago
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks | Dall | IACR Transactions on Cryptographic Hardware and Embedded Systems
In this work we investigate the security of the Intel implementation of the EPID protocol. We identify an implementation weakness that leaks information via a cache side channel. We show that a malicious attestation provider can use the leaked information to break the unlinkability guarantees of EPID.
crypto  sgx  epid 
10 weeks ago
Distributed Privacy Guard
The Distributed Privacy Guard (DKGPG) implements Distributed Key Generation (DKG) and Threshold Cryptography for OpenPGP.
april 2018
AATA Front Matter
Abstract AlgebraTheory and Applications
algebra  math 
april 2018
[1602.05973] Breaking Symmetric Cryptosystems using Quantum Period Finding
Breaking Symmetric Cryptosystems using Quantum Period Finding
march 2018
Cryptology ePrint Archive: Report 2018/244
Faster Homomorphic Linear Transformations in HElib
march 2018
Cryptology ePrint Archive: Report 2018/159
The Missing Difference Problem, and its Applications to Counter Mode Encryption
crypto 
february 2018
Cryptology ePrint Archive: Report 2018/126
Onion-AE: Foundations of Nested Encryption
crypto 
february 2018
Estimate all the {LWE, NTRU} schemes!
Complextiy estimates for running the primal-uSVP and dual attacks against all LWE-based, and the primal-uSVP attack against all NTRU-based, Round 1 schemes proposed as part of the PQC process run by NIST.
pqcrypto 
january 2018
« earlier      
actors advice aes agriculture ai algorithm altivec analysis apache api apple architecture arm art article asio asn.1 assembler awesome beer bitcoin blog book books boost botan brewing business c c# c++ c++11 cache capabilities cell china clang clojure cluster code coffee comic compiler compilers computers concurrency conference corruption cpu crypto cs cuda culture database datastructures dc debugging design dht distributed diy django documentation e ecc ecdsa economics economy education electronics emacs energy environment erlang essay farm farming fiction filesystem filter finance firefox food fp framework functional funny games gardening gcc gentoo git google government graphics grimmeathookfuture gtd gui hardware hashfunction haskell health history hosting housing howto humor ibm ietf intel interesting internet interview investing ipod java javascript json jvm kernel language lattices law learning library life lifehacks linux lisp logic mail management manual map maple maps math mceliece medicine memcached memory messaging microsoft military money monotone multicore music network networking news nist nsa nyc ocaml oil opensource operatingsystem optimization organization p2p pairings pake paper papers parallel parser parsing patterns paulgraham paxos peakoil people performance perl philosophy photo photography physics pir pki pkix policestate politics postfix powerpc pqcrypto prion privacy productivity programming protocol psychology python radio recipe reference reviews rfc rng rsa ruby running rust scala scheme science scifi search security serialization server sgx shopping sidechannel signatures simd singularity society software space spam specification sql ssl standard statistics stm storage surveillance sysadmin systems tahoe tcp technology terrorism testing theory threads tls tool toolbox tools toreview tpm travel tutorial unix usa verification vermont versioncontrol via:cryptogon video visualization web web2.0 webserver windows work writing x11 x509 x86

Copy this bookmark:



description:


tags: