MASCOT: faster malicious arithmetic secure computation with oblivious transfer

M Keller, E Orsini, P Scholl - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
We consider the task of secure multi-party computation of arithmetic circuits over a finite
field. Unlike Boolean circuits, arithmetic circuits allow natural computations on integers to be …

[KNIHA][B] Introduction to modern cryptography: principles and protocols

J Katz, Y Lindell - 2007 - taylorfrancis.com
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …

Detecting pedestrians using patterns of motion and appearance

Viola, Snow - … ninth IEEE international conference on computer …, 2003 - ieeexplore.ieee.org
This paper describes a pedestrian detection system that integrates image intensity
information with motion information. We use a detection style algorithm that scans a detector …

[PDF][PDF] Evaluation of Some Blockcipher Modes of Operation

P Rogaway - 2011 - cs.ucdavis.edu
1. Overview. This report analyzes the security of some 17 cryptographic modes of operation
described within some eight US or international standards. Most of the schemes are …

Research on the security criteria of hash functions in the blockchain

M Wang, M Duan, J Zhu - Proceedings of the 2nd ACM Workshop on …, 2018 - dl.acm.org
The blockchain is an emerging technology. Because of its efficiency and functionality, it is
widely considered to have revolutionary application prospects. As a supporting part of the …

Tweakable blockciphers with beyond birthday-bound security

W Landecker, T Shrimpton, RS Terashima - Annual Cryptology …, 2012 - Springer
Abstract Liskov, Rivest and Wagner formalized the tweakable blockcipher (TBC) primitive at
CRYPTO'02. The typical recipe for instantiating a TBC is to start with a blockcipher, and then …

The hash function BLAKE

JP Aumasson, W Meier, RCW Phan, L Henzen - 2014 - Springer
This book is about the cryptographic hash function BLAKE, one of the five final contenders in
the SHA3 competition, out of 64 initial submissions. The SHA3 competition was a public …

Non-uniform bounds in the random-permutation, ideal-cipher, and generic-group models

S Coretti, Y Dodis, S Guo - Advances in Cryptology–CRYPTO 2018: 38th …, 2018 - Springer
The random-permutation model (RPM) and the ideal-cipher model (ICM) are idealized
models that offer a simple and intuitive way to assess the conjectured standard-model …

Simpira v2: A family of efficient permutations using the AES round function

S Gueron, N Mouha - International Conference on the Theory and …, 2016 - Springer
This paper introduces Simpira, a family of cryptographic permutations that supports inputs of
128 * b bits, where b is a positive integer. Its design goal is to achieve high throughput on …

Security Analysis of salt|| password Hashes

P Gauravaram - 2012 International Conference on Advanced …, 2012 - ieeexplore.ieee.org
Protection of passwords used to authenticate computer systems and networks is one of the
most important application of cryptographic hash functions. Due to the application of …