Imperfect forward secrecy: How Diffie-Hellman fails in practice

D Adrian, K Bhargavan, Z Durumeric… - Proceedings of the …, 2015 - dl.acm.org
We investigate the security of Diffie-Hellman key exchange as used in popular Internet
protocols and find it to be less secure than widely believed. First, we present Logjam, a …

[图书][B] Introduction to modern cryptography: principles and protocols

J Katz, Y Lindell - 2007 - taylorfrancis.com
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …

[图书][B] Cryptography: theory and practice

DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …

Updating key size estimations for pairings

R Barbulescu, S Duquesne - Journal of cryptology, 2019 - Springer
Recent progress on NFS imposed a new estimation of the security of pairings. In this work
we study the best attacks against some of the most popular pairings and propose new key …

Extended tower number field sieve: A new complexity for the medium prime case

T Kim, R Barbulescu - Annual international cryptology conference, 2016 - Springer
We introduce a new variant of the number field sieve algorithm for discrete logarithms in F _
p^ n called exTNFS. The most important modification is done in the polynomial selection …

Stream ciphers: A practical solution for efficient homomorphic-ciphertext compression

A Canteaut, S Carpov, C Fontaine, T Lepoint… - Journal of …, 2018 - Springer
In typical applications of homomorphic encryption, the first step consists for Alice of
encrypting some plaintext m under Bob's public key pk pk and of sending the ciphertext c …

[图书][B] Guide to pairing-based cryptography

N El Mrabet, M Joye - 2017 - books.google.com
This book is devoted to efficient pairing computations and implementations, useful tools for
cryptographers working on topics like identity-based cryptography and the simplification of …

Enhanced lattice-based signatures on reconfigurable hardware

T Pöppelmann, L Ducas, T Güneysu - Cryptographic Hardware and …, 2014 - Springer
Abstract The recent Bimodal Lattice Signature Scheme (Bliss) showed that lattice-based
constructions have evolved to practical alternatives to RSA or ECC. Besides reasonably …

On the hardness of the decoding and the minimum distance problems for rank codes

P Gaborit, G Zémor - IEEE Transactions on Information Theory, 2016 - ieeexplore.ieee.org
We give a randomized reduction for the Rank Syndrome Decoding problem and Rank
Minimum Distance problem for rank codes over extension fields. Our results are based on …

Challenges with assessing the impact of NFS advances on the security of pairing-based cryptography

A Menezes, P Sarkar, S Singh - International Conference on Cryptology in …, 2016 - Springer
In the past two years there have been several advances in Number Field Sieve (NFS)
algorithms for computing discrete logarithms in finite fields\mathbb F _ p^ n where p is prime …