Survey on blockchain-based smart contracts: Technical aspects and future research

TM Hewa, Y Hu, M Liyanage, SS Kanhare… - IEEE …, 2021 - ieeexplore.ieee.org
The industrial and computing research context revolutionized in various directions during
the last decades. The blockchain-based smart contract embraced as a significant research …

Message-locked encryption and secure deduplication

M Bellare, S Keelveedhi, T Ristenpart - … on the theory and applications of …, 2013 - Springer
We formalize a new cryptographic primitive that we call Message-Locked Encryption (MLE),
where the key under which encryption and decryption are performed is itself derived from …

[PDF][PDF] Mining your Ps and Qs: Detection of widespread weak keys in network devices

N Heninger, Z Durumeric, E Wustrow… - 21st USENIX Security …, 2012 - usenix.org
RSA and DSA can fail catastrophically when used with malfunctioning random number
generators, but the extent to which these problems arise in practice has never been …

CHURP: dynamic-committee proactive secret sharing

SKD Maram, F Zhang, L Wang, A Low… - Proceedings of the …, 2019 - dl.acm.org
We introduce CHURP (CHUrn-Robust Proactive secret sharing). CHURP enables secure
secret-sharing in dynamic settings, where the committee of nodes storing a secret changes …

Honey encryption: Security beyond the brute-force bound

A Juels, T Ristenpart - Advances in Cryptology–EUROCRYPT 2014: 33rd …, 2014 - Springer
We introduce honey encryption (HE), a simple, general approach to encrypting messages
using low min-entropy keys such as passwords. HE is designed to produce a ciphertext …

Careful with composition: Limitations of the indifferentiability framework

T Ristenpart, H Shacham, T Shrimpton - … on the Theory and Applications of …, 2011 - Springer
We exhibit a hash-based storage auditing scheme which is provably secure in the random-
oracle model (ROM), but easily broken when one instead uses typical indifferentiable hash …

Message-locked encryption for lock-dependent messages

M Abadi, D Boneh, I Mironov, A Raghunathan… - Advances in Cryptology …, 2013 - Springer
Motivated by the problem of avoiding duplication in storage systems, Bellare, Keelveedhi,
and Ristenpart have recently put forward the notion of Message-Locked Encryption (MLE) …

Lossy cryptography from code-based assumptions

Q Dao, A Jain - Annual International Cryptology Conference, 2024 - Springer
Over the past few decades, we have seen a proliferation of advanced cryptographic
primitives with lossy or homomorphic properties built from various assumptions such as …

A systematic analysis of the Juniper Dual EC incident

S Checkoway, J Maskiewicz, C Garman… - Proceedings of the …, 2016 - dl.acm.org
In December 2015, Juniper Networks announced multiple security vulnerabilities stemming
from unauthorized code in ScreenOS, the operating system for their NetScreen VPN routers …

Function-private identity-based encryption: Hiding the function in functional encryption

D Boneh, A Raghunathan, G Segev - … , Santa Barbara, CA, USA, August 18 …, 2013 - Springer
We put forward a new notion, function privacy, in identity-based encryption and, more
generally, in functional encryption. Intuitively, our notion asks that decryption keys reveal …