We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 21-40 of 10,000 results
  1. On the Correlation Complexity of MPC with Cheater Identification

    Composable protocols for Multi-Party Computation that provide security with Identifiable Abort against a dishonest majority require some form of...
    Nicholas Brandt, Sven Maier, ... Jörn Müller-Quade in Financial Cryptography and Data Security
    Conference paper 2024
  2. Dynamic Security Aspects of Onion Routing

    An anonymous communication network (ACN) is designed to protect the identities of two parties communicating through it, even if an adversary controls...
    Alessandro Melloni, Martijn Stam, Øyvind Ytrehus in Cryptography and Coding
    Conference paper 2024
  3. Coset Leaders of the First Order Reed-Muller Codes in the Classes of Niho Functions and Threshold Functions

    The notion of coset leader has applications in coding theory and cryptography. It has been studied in several papers. In this paper, we extend a...
    Claude Carlet, Serge Feukoua, Ana Sălăgean in Cryptography and Coding
    Conference paper 2024
  4. Rectangle Attacks on Reduced Versions of the FBC Block Cipher

    The FBC block cipher is an award-winning algorithm of the recent Cryptographic Algorithm Design Competition in China, which has three versions:...
    Wenchang Zhou, Jiqiang Lu in Cryptography and Coding
    Conference paper 2024
  5. zk-SNARKs from Codes with Rank Metrics

    Succinct non-interactive zero-knowledge arguments of knowledge (zk-SNARKs) are a type of non-interactive proof system enabling efficient...
    Xuan-Thanh Do, Dang-Truong Mac, Quoc-Huy Vu in Cryptography and Coding
    Conference paper 2024
  6. Feistel Ciphers Based on a Single Primitive

    We consider Feistel ciphers instantiated with tweakable block ciphers (TBCs) and ideal ciphers (ICs). The indistinguishability security of the...
    Kento Tsuji, Tetsu Iwata in Cryptography and Coding
    Conference paper 2024
  7. Spatial Shrinkage Prior: A Probabilistic Approach to Model for Categorical Variables with Many Levels

    One of the most commonly used methods to prevent overfitting and select relevant variables in regression models with many predictors is the penalized...
    Conference paper 2024
  8. The Importance of Knowing the Arrival Order in Combinatorial Bayesian Settings

    We study the measure of order-competitive ratio introduced by Ezra et al. [16] for online algorithms in Bayesian combinatorial settings. In our...
    Tomer Ezra, Tamar Garbuz in Web and Internet Economics
    Conference paper 2024
  9. Nash Stability in Fractional Hedonic Games with Bounded Size Coalitions

    We consider fractional hedonic games, a natural and succinct subclass of hedonic games able to model many real-world settings in which agents have to...
    Gianpiero Monaco, Luca Moscardelli in Web and Internet Economics
    Conference paper 2024
  10. Online Nash Welfare Maximization Without Predictions

    The maximization of Nash welfare, which equals the geometric mean of agents’ utilities, is widely studied because it balances efficiency and fairness...
    Zhiyi Huang, Minming Li, ... Tianze Wei in Web and Internet Economics
    Conference paper 2024
  11. Equilibrium Analysis of Customer Attraction Games

    We introduce a game model called “customer attraction game” to demonstrate the competition among online content providers. In this model, customers...
    **aotie Deng, Ningyuan Li, ... Qi Qi in Web and Internet Economics
    Conference paper 2024
  12. Target-Oriented Regret Minimization for Satisficing Monopolists

    We study a robust monopoly pricing problem where a seller aspires to sell an item to a buyer. We assume that the seller, unaware of the buyer’s...
    Napat Rujeerapaiboon, Yize Wei, Yilin Xue in Web and Internet Economics
    Conference paper 2024
  13. The Multi-user Security of MACs via Universal Hashing in the Ideal Cipher Model

    The security of block-cipher-based hash-then-encrypt-type message authentication codes (MACs) has been proven with universal hash functions. Thus,...
    Conference paper 2024
  14. Improved Meet-in-the-Middle Attacks on Nine Rounds of the AES-192 Block Cipher

    In the single-key attack scenario, meet-in-the-middle (MitM) attack method has led to the best currently published cryptanalytic results on the AES...
    Jiqiang Lu, Wenchang Zhou in Topics in Cryptology – CT-RSA 2024
    Conference paper 2024
  15. TFHE Public-Key Encryption Revisited

    Fully homomorphic encryption allows directly processing encrypted data without having to decrypt it. The result of the computation is encrypted,...
    Conference paper 2024
  16. SoK: Parameterization of Fault Adversary Models Connecting Theory and Practice

    Since the first fault attack by Boneh et al. in 1997, various physical fault injection mechanisms have been explored to induce errors in electronic...
    Dilara Toprakhisar, Svetla Nikova, Ventzislav Nikov in Topics in Cryptology – CT-RSA 2024
    Conference paper 2024
  17. Towards Compact Identity-Based Encryption on Ideal Lattices

    Basic encryption and signature on lattices have comparable efficiency to their classical counterparts in terms of speed and key size. However,...
    Huiwen Jia, Yupu Hu, ... Lin Wang in Topics in Cryptology – CT-RSA 2024
    Conference paper 2024
  18. Cutting the GRASS: Threshold GRoup Action Signature Schemes

    Group actions are fundamental mathematical tools, with a long history of use in cryptography. Indeed, the action of finite groups at the basis of the...
    Michele Battagliola, Giacomo Borin, ... Edoardo Persichetti in Topics in Cryptology – CT-RSA 2024
    Conference paper 2024
  19. Differential Privacy for Free? Harnessing the Noise in Approximate Homomorphic Encryption

    Homomorphic Encryption (HE) is a type of cryptography that allows computing on encrypted data, enabling computation on sensitive data to be...
    Conference paper 2024
  20. Learning Markov Chain Models from Sequential Data Under Local Differential Privacy

    Markov chain models are frequently used in the analysis and modeling of sequential data such as location traces, time series, natural language, and...
    Efehan Guner, M. Emre Gursoy in Computer Security – ESORICS 2023
    Conference paper 2024
Did you find what you were looking for? Share feedback.