-
Chapter and Conference Paper
Attacks and Security Proofs of EAX-Prime
\(\text {EAX}'\) (or EAX-prime) is an authenticated encryption (AE) specified by ANSI C12.22 as a ...
-
Chapter and Conference Paper
On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks
In the ordinary security model for signature schemes, we consider an adversary that may forge a signature on a new message using only his knowledge of other valid message and signature pairs. To take into acco...
-
Chapter and Conference Paper
Constant-Round Client-Aided Secure Comparison Protocol
We present an improved constant-round secure two-party protocol for integer comparison functionality, which is one of the most fundamental building blocks in secure computation.
-
Chapter and Conference Paper
Client-Aided Two-Party Secure Interval Test Protocol
Secure interval test protocol checks if an integer is within some interval in a privacy-preserving manner. A natural application is geological location hiding, where we can check whether a person is in a certa...