Pub Date : 2020-10-19DOI: 10.1007/978-3-030-57808-4_6
H. V. L. Pereira
{"title":"Efficient AGCD-based homomorphic encryption for matrix and vector arithmetic","authors":"H. V. L. Pereira","doi":"10.1007/978-3-030-57808-4_6","DOIUrl":"https://doi.org/10.1007/978-3-030-57808-4_6","url":null,"abstract":"","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131336421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-19DOI: 10.1007/978-3-030-57808-4_1
Karim M. El Defrawy, Tancrède Lepoint, Antonin Leroux
{"title":"Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities","authors":"Karim M. El Defrawy, Tancrède Lepoint, Antonin Leroux","doi":"10.1007/978-3-030-57808-4_1","DOIUrl":"https://doi.org/10.1007/978-3-030-57808-4_1","url":null,"abstract":"","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123514906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-19DOI: 10.1007/978-3-030-57808-4_8
L. Kraleva, T. Ashur, V. Rijmen
{"title":"Rotational Cryptanalysis on MAC Algorithm Chaskey","authors":"L. Kraleva, T. Ashur, V. Rijmen","doi":"10.1007/978-3-030-57808-4_8","DOIUrl":"https://doi.org/10.1007/978-3-030-57808-4_8","url":null,"abstract":"","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130107439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-10-19DOI: 10.1007/978-3-030-57808-4_11
Loïs Huguenin-Dumittan, S. Vaudenay
{"title":"Classical Misuse Attacks on NIST Round 2 PQC: The Power of Rank-Based Schemes","authors":"Loïs Huguenin-Dumittan, S. Vaudenay","doi":"10.1007/978-3-030-57808-4_11","DOIUrl":"https://doi.org/10.1007/978-3-030-57808-4_11","url":null,"abstract":"","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126862392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-16DOI: 10.1007/978-3-030-89915-8_1
Joseph Gravellier, J. Dutertre, Y. Teglia, Philippe Loubet-Moundi
{"title":"SideLine: How Delay-Lines (May) Leak Secrets from your SoC","authors":"Joseph Gravellier, J. Dutertre, Y. Teglia, Philippe Loubet-Moundi","doi":"10.1007/978-3-030-89915-8_1","DOIUrl":"https://doi.org/10.1007/978-3-030-89915-8_1","url":null,"abstract":"","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122848911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-14DOI: 10.1007/978-3-030-59013-0_17
Xavier Boyen, Thomas Haines, Johannes Mueller
{"title":"A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing","authors":"Xavier Boyen, Thomas Haines, Johannes Mueller","doi":"10.1007/978-3-030-59013-0_17","DOIUrl":"https://doi.org/10.1007/978-3-030-59013-0_17","url":null,"abstract":"","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128815298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-14DOI: 10.1007/978-3-030-57990-6_25
Cody R. Freitag, Ilan Komargodski, R. Pass
{"title":"Impossibility of Strong KDM Security with Auxiliary Input","authors":"Cody R. Freitag, Ilan Komargodski, R. Pass","doi":"10.1007/978-3-030-57990-6_25","DOIUrl":"https://doi.org/10.1007/978-3-030-57990-6_25","url":null,"abstract":"","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117043873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-14DOI: 10.1007/978-3-030-57990-6_20
J. Camenisch, Manu Drijvers, Anja Lehmann, G. Neven, Patrick Towa
{"title":"Short Threshold Dynamic Group Signatures","authors":"J. Camenisch, Manu Drijvers, Anja Lehmann, G. Neven, Patrick Towa","doi":"10.1007/978-3-030-57990-6_20","DOIUrl":"https://doi.org/10.1007/978-3-030-57990-6_20","url":null,"abstract":"","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121918940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}