Charm: a framework for rapidly prototyping cryptosystems

JA Akinyele, C Garman, I Miers, MW Pagano… - Journal of Cryptographic …, 2013 - Springer
We describe Charm, an extensible framework for rapidly prototyping cryptographic systems.
Charm provides a number of features that explicitly support the development of new …

Indistinguishability obfuscation from circular security

R Gay, R Pass - Proceedings of the 53rd Annual ACM SIGACT …, 2021 - dl.acm.org
We show the existence of indistinguishability obfuscators (iO) for general circuits assuming
subexponential security of:(a) the Learning with Errors (LWE) assumption (with …

Obfuscating compute-and-compare programs under LWE

D Wichs, G Zirdelis - 2017 IEEE 58th Annual Symposium on …, 2017 - ieeexplore.ieee.org
We show how to obfuscate a large and expressive class of programs, which we call compute-
and-compare programs, under the learning-with-errors (LWE) assumption. Each such …

Implementing TLS with verified cryptographic security

K Bhargavan, C Fournet, M Kohlweiss… - … IEEE Symposium on …, 2013 - ieeexplore.ieee.org
TLS is possibly the most used protocol for secure communications, with a 18-year history of
flaws and fixes, ranging from its protocol logic to its cryptographic design, and from the …

Careful with composition: Limitations of the indifferentiability framework

T Ristenpart, H Shacham, T Shrimpton - … on the Theory and Applications of …, 2011 - Springer
We exhibit a hash-based storage auditing scheme which is provably secure in the random-
oracle model (ROM), but easily broken when one instead uses typical indifferentiable hash …

Lockable obfuscation

R Goyal, V Koppula, B Waters - 2017 IEEE 58th Annual …, 2017 - ieeexplore.ieee.org
In this paper we introduce the notion of lockable obfuscation. In a lockable obfuscation
scheme there exists an obfuscation algorithm Obf that takes as input a security parameter, a …

Key rotation for authenticated encryption

A Everspaugh, K Paterson, T Ristenpart… - Advances in Cryptology …, 2017 - Springer
A common requirement in practice is to periodically rotate the keys used to encrypt stored
data. Systems used by Amazon and Google do so using a hybrid encryption technique …

Proving the TLS handshake secure (as it is)

K Bhargavan, C Fournet, M Kohlweiss, A Pironti… - Advances in Cryptology …, 2014 - Springer
Abstract The TLS Internet Standard features a mixed bag of cryptographic algorithms and
constructions, letting clients and servers negotiate their use for each run of the handshake …

Instantiating random oracles via UCEs

M Bellare, VT Hoang, S Keelveedhi - Annual Cryptology Conference, 2013 - Springer
This paper provides a (standard-model) notion of security for (keyed) hash functions, called
UCE, that we show enables instantiation of random oracles (ROs) in a fairly broad and …

On the security of the “free-XOR” technique

SG Choi, J Katz, R Kumaresan, HS Zhou - Theory of Cryptography …, 2012 - Springer
Yao's garbled-circuit approach enables constant-round secure two-party computation of any
function. In Yao's original construction, each gate in the circuit requires the parties to perform …