5 Hits in 8.1 sec

Decentralizing Information Technology: The Advent of Resource Based Systems [article]

Aggelos Kiayias
2021 arXiv   pre-print
The growth of the Bitcoin network during the first decade of its operation to a global scale system is a singular event in the deployment of Information Technology systems.  ...  We investigate this question by introducing the concept of resource based systems and their four fundamental characteristics: (i) resource-based operation, (ii) tokenomics, (iii) decentralized service  ...  In Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part I, pages 291–323, 2017. [19] Yossi Gilad, Rotem  ... 
arXiv:2112.09941v2 fatcat:daiiimnipfe2lhjhbwcvc2rocm

Accelerating the Search of Differential and Linear Characteristics with the SAT Method

Ling Sun, Wei Wang, Meiqin Wang
2021 IACR Transactions on Symmetric Cryptology  
With the observations and experience in the tests, a strategy on how to create the sets of bounding conditions that probably achieve extraordinary advances is proposed.  ...  Based on the newly identified 18-round distinguisher with probability 2−58, we launch a 26-round key-recovery attack with 260.96 chosen plaintexts.  ...  In Advances in Cryptology -CRYPTO 2015 -35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I, pages 95-115, 2015.  ... 
doi:10.46586/tosc.v2021.i1.269-315 fatcat:sfdtcdt3cbhdjmoozh5qjasawy

A Provably Secure PKCS#11 Configuration Without Authenticated Attributes [chapter]

Ryan Stanley-Oakes
2017 Lecture Notes in Computer Science  
(ii) We propose a strong, computational security model for configurations of PKCS#11 where the adversary can adaptively corrupt keys and prove that STP is secure in this model.  ...  We give a rigorous analysis of STP, including the extension used in Caml Crush. Our contribution is as follows: (i) We show that the extension of STP used in Caml Crush is insecure.  ...  In: Robshaw, M., Katz, J. (eds.) Advances in Cryptology -CRYPTO 2016 -36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I.  ... 
doi:10.1007/978-3-319-70972-7_8 fatcat:hvspdht2hzeqvm7w2hsousif5a

Reconsidering Generic Composition: The Tag-then-Encrypt Case [chapter]

Francesco Berti, Olivier Pereira, Thomas Peters
2018 CSR und Social Enterprise  
We prove that: (i) N4 is not secure in general, (ii) A10, A11 and A12 have equivalent security, (iii) A10, A11, A12 and N4 are secure if the underlying encryption scheme is either misuse-resistant or "  ...  Authenticated Encryption (AE) achieves confidentiality and authenticity, the two most fundamental goals of cryptography, in a single scheme.  ...  Springer, 2011. 29. ogy Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I, volume 9814 of Lecture Notes in Computer Science, pages 33-63. Springer, 2016. 31.  ... 
doi:10.1007/978-3-030-05378-9_4 dblp:conf/indocrypt/BertiPP18 fatcat:5ki26ff3gbckfkx5tyj3h66ha4

Extending Glitch-Free Multiparty Protocols to Resist Fault Injection Attacks

Okan Seker, Abraham Fernandez-Rubio, Thomas Eisenbarth, Rainer Steinwandt
2018 Transactions on Cryptographic Hardware and Embedded Systems  
The security of the new scheme is proved in the ISW probing model, using the reformulated t-SNI security notion.  ...  A new recombination operation ensures randomization of the output in the case of a fault, ensuring that nothing can be learned from the faulty output.  ...  In Matthew Robshaw and Jonathan Katz, editors, Advances in Cryptology -CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II, pages  ... 
doi:10.13154/tches.v2018.i3.394-430 dblp:journals/tches/SekerFES18 fatcat:7jfw4u2pwvbn7p4jupxi7cxmjy