Filters








4 Hits in 2.7 sec

Decentralizing Information Technology: The Advent of Resource Based Systems [article]

Aggelos Kiayias
2021 arXiv   pre-print
The growth of the Bitcoin network during the first decade of its operation to a global scale system is a singular event in the deployment of Information Technology systems.  ...  We investigate this question by introducing the concept of resource based systems and their four fundamental characteristics: (i) resource-based operation, (ii) tokenomics, (iii) decentralized service  ...  In Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part I, pages 291–323, 2017. [19] Yossi Gilad, Rotem  ... 
arXiv:2112.09941v2 fatcat:daiiimnipfe2lhjhbwcvc2rocm

Accelerating the Search of Differential and Linear Characteristics with the SAT Method

Ling Sun, Wei Wang, Meiqin Wang
2021 IACR Transactions on Symmetric Cryptology  
With the observations and experience in the tests, a strategy on how to create the sets of bounding conditions that probably achieve extraordinary advances is proposed.  ...  Based on the newly identified 18-round distinguisher with probability 2−58, we launch a 26-round key-recovery attack with 260.96 chosen plaintexts.  ...  In Advances in Cryptology -CRYPTO 2015 -35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I, pages 95-115, 2015.  ... 
doi:10.46586/tosc.v2021.i1.269-315 fatcat:sfdtcdt3cbhdjmoozh5qjasawy

A Provably Secure PKCS#11 Configuration Without Authenticated Attributes [chapter]

Ryan Stanley-Oakes
2017 Lecture Notes in Computer Science  
(iii) We prove the security of an extension of STP that adds support for public-key encryption and digital signatures. P[U 0,i * ] = (P[U 0,i * ] − P[U 1,i * ]) + P[U 1,i * ].  ...  We give a rigorous analysis of STP, including the extension used in Caml Crush. Our contribution is as follows: (i) We show that the extension of STP used in Caml Crush is insecure.  ...  In: Robshaw, M., Katz, J. (eds.) Advances in Cryptology -CRYPTO 2016 -36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I.  ... 
doi:10.1007/978-3-319-70972-7_8 fatcat:hvspdht2hzeqvm7w2hsousif5a

Reconsidering Generic Composition: The Tag-then-Encrypt Case [chapter]

Francesco Berti, Olivier Pereira, Thomas Peters
2018 CSR und Social Enterprise  
We prove that: (i) N4 is not secure in general, (ii) A10, A11 and A12 have equivalent security, (iii) A10, A11, A12 and N4 are secure if the underlying encryption scheme is either misuse-resistant or "  ...  Authenticated Encryption (AE) achieves confidentiality and authenticity, the two most fundamental goals of cryptography, in a single scheme.  ...  Springer, 2011. 29. ogy Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I, volume 9814 of Lecture Notes in Computer Science, pages 33-63. Springer, 2016. 31.  ... 
doi:10.1007/978-3-030-05378-9_4 dblp:conf/indocrypt/BertiPP18 fatcat:5ki26ff3gbckfkx5tyj3h66ha4