Zobrazeno 1 - 10
of 52
pro vyhledávání: '"Chakraborty Suvradip"'
Publikováno v:
Journal of Mathematical Cryptology, Vol 14, Iss 1, Pp 172-201 (2020)
We present a new approach to construct several leakage-resilient cryptographic primitives, including leakage-resilient public-key encryption (PKE) schemes, authenticated key exchange (AKE) protocols and low-latency key exchange (LLKE) protocols. To t
Externí odkaz:
https://doaj.org/article/fdbe75b488f44dd6a0fa2d38f696a35e
Autor:
Baig, Mirza Ahad, Chakraborty, Suvradip, Dziembowski, Stefan, Gałązka, Małgorzata, Lizurej, Tomasz, Pietrzak, Krzysztof
Publikováno v:
Leibniz International Proceedings in Informatics (LIPIcs), 251
14th Innovations in Theoretical Computer Science Conference (ITCS 2023)
14th Innovations in Theoretical Computer Science Conference (ITCS 2023)
In this work, we put forward the notion of “efficiently testable circuits” and provide circuit compilers that transform any circuit into an efficiently testable one. Informally, a circuit is testable if one can detect tampering with the circuit b
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::59e83607fe894347c0270865d093c06c
Publikováno v:
Chakraborty, S, Magri, B, Nielsen, J B & Venturi, D 2022, Universally Composable Subversion-Resilient Cryptography . in O Dunkelman & S Dziembowski (eds), Advances in Cryptology – EUROCRYPT 2022 : 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings . Springer, Lecture Notes in Computer Science (LNCS), vol. 13275, pp. 272-302, 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2022, Trondheim, Norway, 30/05/2022 . https://doi.org/10.1007/978-3-031-06944-4_10
Subversion attacks undermine security of cryptographic protocols by replacing a legitimate honest party’s implementation with one that leaks information in an undetectable manner. An important limitation of all currently known techniques for design
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=pure_au_____::3ea694dd8b86f211682f57b8f13899d9
https://pure.au.dk/portal/da/publications/universally-composable-subversionresilient-cryptography(c1cb0eee-270d-468b-936f-a1b2a6f2c934).html
https://pure.au.dk/portal/da/publications/universally-composable-subversionresilient-cryptography(c1cb0eee-270d-468b-936f-a1b2a6f2c934).html
Autor:
Canetti, Ran, Chakraborty, Suvradip, Khurana, Dakshita, Kumar, Nishant, Poburinnaya, Oxana, Prabhakaran, Manoj
Publikováno v:
Advances in Cryptology – EUROCRYPT 2022 ISBN: 9783031069437
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – EUROCRYPT 2022
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Advances in Cryptology – EUROCRYPT 2022
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ab257d9e35de5a8f53a5914de513a29f
https://doi.org/10.1007/978-3-031-06944-4_25
https://doi.org/10.1007/978-3-031-06944-4_25
Publikováno v:
Chakraborty, S, Ganesh, C, Pancholi, M R & Sarkar, P 2021, Reverse Firewalls for Adaptively Secure MPC without Setup . in M Tibouchi & H Wang (eds), Advances in Cryptology – ASIACRYPT 2021 : 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part II . Springer, Lecture Notes in Computer Science, vol. 13091, pp. 335-364 . https://doi.org/10.1007/978-3-030-92075-3_12
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=pure_au_____::db4ba63ae2b5a02190554ae541f4de48
https://pure.au.dk/portal/da/publications/reverse-firewalls-for-adaptively-secure-mpc-without-setup(85000223-1908-430f-84cd-a048baf124fd).html
https://pure.au.dk/portal/da/publications/reverse-firewalls-for-adaptively-secure-mpc-without-setup(85000223-1908-430f-84cd-a048baf124fd).html
Publikováno v:
Chakraborty, S, Dziembowski, S & Nielsen, J B 2020, Reverse firewalls for actively secure mpcs . in D Micciancio & T Ristenpart (eds), Advances in Cryptology-CRYPTO 2020 . Springer, Cham, Lecture Notes in Computer Science, vol. 12171, pp. 732-762, 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, United States, 17/08/2020 . https://doi.org/10.1007/978-3-030-56880-1_26
Reverse firewalls were introduced at Eurocrypt 2015 by Miro-nov and Stephens-Davidowitz, as a method for protecting cryptographic protocols against attacks on the devices of the honest parties. In a nutshell: a reverse firewall is placed outside of a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=pure_au_____::433b9e45508b775d316e6d4cf9532f9d
https://pure.au.dk/portal/da/publications/reversefirewallsforactivelysecurempcs(01f3c15f-3a30-497e-b445-e885108d36dd).html
https://pure.au.dk/portal/da/publications/reversefirewallsforactivelysecurempcs(01f3c15f-3a30-497e-b445-e885108d36dd).html
Publikováno v:
International Journal of Computer Mathematics: Computer Systems Theory; October 2021, Vol. 6 Issue: 4 p313-336, 24p
Publikováno v:
Provable Security: 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings; 2015, p149-166, 18p
Publikováno v:
Provable Security: 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings; 2015, p503-504, 2p
Publikováno v:
Progress in Cryptology - INDOCRYPT 2016; 2016, pI-XVII, 17p