Pub Date : 2020-09-14DOI: 10.1007/978-3-030-59013-0_19
Muhammed F. Esgin, O. Ersoy, Z. Erkin
{"title":"Post-Quantum Adaptor Signatures and Payment Channel Networks","authors":"Muhammed F. Esgin, O. Ersoy, Z. Erkin","doi":"10.1007/978-3-030-59013-0_19","DOIUrl":"https://doi.org/10.1007/978-3-030-59013-0_19","url":null,"abstract":"","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129952421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-14DOI: 10.1007/978-3-030-59013-0_11
Vladimir Sedlacek, Jan Jancar, P. Švenda
{"title":"Fooling primality tests on smartcards","authors":"Vladimir Sedlacek, Jan Jancar, P. Švenda","doi":"10.1007/978-3-030-59013-0_11","DOIUrl":"https://doi.org/10.1007/978-3-030-59013-0_11","url":null,"abstract":"","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128657966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-14DOI: 10.1007/978-3-030-58951-6_33
I. Oleynikov, Elena Pagnin, A. Sabelfeld
{"title":"Where are you Bob? Privacy-Preserving Proximity Testing with a Napping Party","authors":"I. Oleynikov, Elena Pagnin, A. Sabelfeld","doi":"10.1007/978-3-030-58951-6_33","DOIUrl":"https://doi.org/10.1007/978-3-030-58951-6_33","url":null,"abstract":"","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128235015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-14DOI: 10.1007/978-3-030-59013-0_2
Eleanor McMurtry, Olivier Pereira, Vanessa Teague
{"title":"When is a test not a proof?","authors":"Eleanor McMurtry, Olivier Pereira, Vanessa Teague","doi":"10.1007/978-3-030-59013-0_2","DOIUrl":"https://doi.org/10.1007/978-3-030-59013-0_2","url":null,"abstract":"","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114434553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-02DOI: 10.1007/978-3-030-58208-1_7
T. Sugawara, Tatsuya Onuma, Y. Li
{"title":"Signal Injection Attack on Time-to-Digital Converter and Its Application to Physically Unclonable Function","authors":"T. Sugawara, Tatsuya Onuma, Y. Li","doi":"10.1007/978-3-030-58208-1_7","DOIUrl":"https://doi.org/10.1007/978-3-030-58208-1_7","url":null,"abstract":"","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130582994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-02DOI: 10.1007/978-3-030-58208-1_1
Sumanta Sarkar, Yu Sasaki, Siang Meng Sim
{"title":"On the Design of Bit Permutation Based Ciphers - The Interplay Among S-box, Bit Permutation and Key-addition","authors":"Sumanta Sarkar, Yu Sasaki, Siang Meng Sim","doi":"10.1007/978-3-030-58208-1_1","DOIUrl":"https://doi.org/10.1007/978-3-030-58208-1_1","url":null,"abstract":"","PeriodicalId":256404,"journal":{"name":"IACR Cryptology ePrint Archive","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122509578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}