Zobrazeno 1 - 10
of 30
pro vyhledávání: '"Michael Naehrig"'
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030453879
Public Key Cryptography (2)
Public Key Cryptography (2)
The main contribution of this work is an optimized implementation of the van Oorschot-Wiener (vOW) parallel collision finding algorithm. As is typical for cryptanalysis against conjectured hard problems (e. g. factoring or discrete logarithms), chall
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b1be0b9a67c755946669e9f78582978d
https://doi.org/10.1007/978-3-030-45388-6_18
https://doi.org/10.1007/978-3-030-45388-6_18
Publikováno v:
Post-Quantum Cryptography ISBN: 9783030442224
PQCrypto
PQCrypto
We present improved quantum circuits for elliptic curve scalar multiplication, the most costly component in Shor’s algorithm to compute discrete logarithms in elliptic curve groups. We optimize low-level components such as reversible integer and mo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9a5e4aa1b5290619224473f9fb9b6983
https://doi.org/10.1007/978-3-030-44223-1_23
https://doi.org/10.1007/978-3-030-44223-1_23
Publikováno v:
Advances in Cryptology – EUROCRYPT 2020 ISBN: 9783030457235
EUROCRYPT (2)
EUROCRYPT (2)
Grover’s search algorithm gives a quantum attack against block ciphers by searching for a key that matches a small number of plaintext-ciphertext pairs. This attack uses \(O(\sqrt{N})\) calls to the cipher to search a key space of size N. Previous
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f4e8e719f9c714681812fc74a3aabf84
https://doi.org/10.1007/978-3-030-45724-2_10
https://doi.org/10.1007/978-3-030-45724-2_10
Autor:
Kristin E. Lauter, Michael Naehrig, John Wernsing, Kim Laine, Nathan Dowlin, Ran Gilad-Bachrach
Publikováno v:
Proceedings of the IEEE. :1-16
Biological data science is an emerging field facing multiple challenges for hosting, sharing, computing on, and interacting with large data sets. Privacy regulations and concerns about the risks of leaking sensitive personal health and genomic data a
Autor:
Joost Renes, Michael Naehrig
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030346201
ASIACRYPT (2)
ASIACRYPT (2)
The isogeny-based protocols SIDH and SIKE have received much attention for being post-quantum key agreement candidates that retain relatively small keys. A recent line of work has proposed and further improved compression of public keys, leading to t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::90fc8ff1c0f6f904d5ff7e923d46a7d1
https://doi.org/10.1007/978-3-030-34621-8_9
https://doi.org/10.1007/978-3-030-34621-8_9
Publikováno v:
Proceedings on Privacy Enhancing Technologies, Vol 2016, Iss 4, Pp 335-355 (2016)
Decision trees and random forests are common classifiers with widespread use. In this paper, we develop two protocols for privately evaluating decision trees and random forests. We operate in the standard two-party setting where the server holds a mo
Publikováno v:
Journal of Number Theory. 161:146-174
In this paper, we compute pull-backs of Siegel theta functions to the Hilbert moduli space and consider their application to generating genus 2 curves for cryptography. We express invariants of genus 2 curves such as the Gundlach invariants and Rosen
Publikováno v:
Journal of Cryptographic Engineering. 6:259-286
We select a set of elliptic curves for cryptography and analyze our selection from a performance and security perspective. This analysis complements recent curve proposals that suggest (twisted) Edwards curves by also considering the Weierstrass mode
Publikováno v:
Guide to Pairing-Based Cryptography ISBN: 9781315370170
Guide to Pairing-Based Cryptography
Guide to Pairing-Based Cryptography
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fc2fb76040b7b778646163eec77c674c
https://doi.org/10.1201/9781315370170-6
https://doi.org/10.1201/9781315370170-6