IACR Local SearchPossible queries include
Found 20000 results
Related key attacks (RKAs) are powerful cryptanalytic attacks where an adversary can change the secret key and observe the effect of such changes at the output. The state of the art in RKA security protects against an a-priori...last revised 18 Feb 2015
ASIACRYPT 2013 Dec 1 - 5 Bangalore, India Accepted Papers Adaptive and Concurrent Secure Computation from New Adaptive, Non-Malleable Commitments Dana Dachman-Soled, Tal Malkin, Mariana Raykova, and Muthuramakrishnan...
ASIACRYPT 2013: Kazue Sako and Palash Sarkar (Eds.): Advances in Cryptology - ASIACRYPT 2013 19th International Conference on the Theory and Application of Cryptology and Information Security Bengaluru, India, December 1-5,...
ASIACRYPT 2013 Dec 1 - 5 Bangalore, India Program at a glance Sunday, December 1 -- Reception @ JW Marriott Monday, December 2 Tuesday, December 3 Wednesday, December 4 Thursday, December 5 Session 1 Zero-Knowledge Theoretical...
Tampering attacks are cryptanalytic attacks on the implementation of cryptographic algorithms (e.g., smart cards), where an adversary introduces faults with the hope that the tampered device will reveal secret information....received 14 Jun 2011
EUROCRYPT 2014: Elisabeth Oswald and Phong Q. Nguyen (Eds.): Advances in Cryptology - EUROCRYPT 2014 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques Copenhagen,Denmark, May...
Author Index for IACR EUROCRYPT: Advances in Cryptology (EUROCRYPT) 2014 Afshar, Arash , 379 Attrapadung, Nuttapong , 547 Barak, Boaz , 217 Barbulescu, Razvan , 1 Bellare, Mihir , 487 Blondeau, Céline , 161 Boneh, Dan , 523...
TCC 2012: Ronald Cramer (Ed.): Theory of Cryptography - 9th Theory of Cryptography Conference - TCC 2012, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012 Proceedings. TCC 2012 Taormina, Sicily, Italy, March 19-21, 2012...
We revisit the question of constructing public-key encryption and signature schemes with security in the presence of bounded leakage and tampering memory attacks. For signatures we obtain the first construction in the standard...last revised 23 Aug 2016
We present a universal framework for tamper and leakage resilient computation on a von Neumann Random Access Architecture (RAM in short). The RAM has one CPU that accesses a storage, which we call the disk. The disk is...last revised 19 Feb 2015
We present a new information-theoretic result which we call the Chaining Lemma. It considers a so-called "chain" of random variables, defined by a source distribution X with high min-entropy and a number (say, t in total)...last revised 18 Feb 2015
PKC 2015: Jonathan Katz (Eds.): Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography Gaithersburg, MD, USA, March 30 - April 1, 2015 Proceedings. PKC 2015...
EUROCRYPT 2016: Marc Fischlin and Jean-Sébastien Coron (Eds.): Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques Vienna, Austria, May...