3012
An Enciphering Scheme Based on a Card Shuffle
We introduce the swap-or-not shuffle and show that the technique gives rise to a new method to convert a pseudorandom function (PRF) into a pseudorandom permutation (PRP) (or, alternatively, to directly build a confusion/diffusion blockcipher). We then prove that swap-or-not has excellent quantitative security bounds, giving a Luby-Rackoff type result that ensures security (assuming an ideal round function) to a number of adversarial queries that is nearly the size of the construction’s domain. Swap-or-not provides a direct solution for building a small-domain cipher and achieving format-preserving encryption, yielding the best bounds known for a practical scheme for enciphering credit-card numbers. The analysis of swap-or-not is based on the theory of mixing times of Markov chains.
crypto 
26 days ago
Cryptology ePrint Archive: Report 2007/039
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
5 weeks ago
SIDH on ARM: Faster Modular Multiplications for Faster Post-Quantum Supersingular Isogeny Key Exchange
"The techniques for modular multiplication presented in this work
have broad applications to other cryptographic schemes."
montgomery  crypto  ecc  arm 
7 weeks ago
Cryptology ePrint Archive: Report 2016/154
Highly-Efficient Fully-Anonymous Dynamic Group Signatures
11 weeks ago
The Pythia PRF Service
We propose a modern PRF service called PYTHIA designed to offer a level of flexibility, security, and ease- of-deployability lacking in prior approaches. The keystone of PYTHIA is a new cryptographic primitive called a verifiable partially-oblivious PRF that reveals a portion of an input message to the service but hides the rest. We give a construction that additionally supports efficient bulk rotation of previously obtained PRF values to new keys. Performance measurements show that our construction, which relies on bilinear pairings and zero-knowledge proofs, is highly practical. We also give accompanying formal definitions and proofs of security.
crypto 
june 2018
Cryptology ePrint Archive: Report 2018/577
Fast Distributed RSA Key Generation for Semi-Honest and Malicious Adversaries
june 2018
Cryptology ePrint Archive: Report 2018/488
Wide Tweakable Block Ciphers Based on Substitution-Permutation Networks: Security Beyond the Birthday Bound
crypto 
may 2018
Cryptology ePrint Archive: Report 2016/943
Stadium: A Distributed Metadata-Private Messaging System
may 2018
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks | Dall | IACR Transactions on Cryptographic Hardware and Embedded Systems
In this work we investigate the security of the Intel implementation of the EPID protocol. We identify an implementation weakness that leaks information via a cache side channel. We show that a malicious attestation provider can use the leaked information to break the unlinkability guarantees of EPID.
crypto  sgx  epid 
may 2018
Distributed Privacy Guard
The Distributed Privacy Guard (DKGPG) implements Distributed Key Generation (DKG) and Threshold Cryptography for OpenPGP.
april 2018
AATA Front Matter
Abstract AlgebraTheory and Applications
algebra  math 
april 2018
« earlier      
advice aes agriculture ai algorithm altivec analysis apache api architecture arm art article assembler awesome beer bitcoin blog book books boost botan brewing business c c++ c++11 cache capabilities cell china code coffee compiler compilers computers concurrency conference corruption cpu crypto cuda culture database datastructures dc debugging design dht distributed diy django documentation e ecc ecdsa economics economy education electronics energy erlang essay fiction filesystem filter finance firefox food fp framework functional funny games gardening gcc gentoo google government graphics grimmeathookfuture gtd gui hardware hashfunction haskell health history hosting howto humor ibm ietf intel interesting internet interview ipod java javascript json jvm kernel language lattices law learning library lifehacks linux lisp mail management manual maple maps math mceliece memcached memory messaging military money monotone music network networking news nist nyc ocaml opensource operatingsystem optimization organization p2p pairings pake paper papers parallel parser parsing patterns paulgraham paxos people performance perl philosophy photo photography physics pir policestate politics powerpc pqcrypto prion privacy productivity programming protocol psychology python reference reviews rfc rng rsa ruby running rust scala scheme science scifi search security serialization server sgx shopping sidechannel simd singularity society software spam sql ssl standard statistics stm storage surveillance sysadmin systems tahoe technology testing theory threads tls tool toolbox tools toreview tpm travel tutorial unix usa verification vermont versioncontrol video visualization web web2.0 windows work writing x11 x509 x86

Copy this bookmark:



description:


tags: