![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Multi-instance Randomness Extraction and Security Against Bounded-Storage Mass Surveillance
Consider a state-level adversary who observes and stores large amounts of encrypted data from all users on the Internet, but does not have the capacity to store it all. Later, it may target certain “persons of...
-
Chapter and Conference Paper
A Lower Bound on the Length of Signatures Based on Group Actions and Generic Isogenies
We give the first black box lower bound for signature protocols that can be described as group actions, which include many based on isogenies. We show that, for a large class of signature schemes making black ...
-
Chapter and Conference Paper
Streaming Functional Encryption
We initiate the study of streaming functional encryption (sFE) which is designed for scenarios in which data arrives in a streaming manner and is computed on in an iterative manner as the stream arrives. Unlike i...
-
Chapter and Conference Paper
Incompressible Cryptography
Incompressible encryption allows us to make the ciphertext size flexibly large and ensures that an adversary learns nothing about the encrypted data, even if the decryption key later leaks, unless she stores esse...
-
Chapter and Conference Paper
Disappearing Cryptography in the Bounded Storage Model
In this work, we study disappearing cryptography in thebounded storage model. Here, a component of the transmission, say a ciphertext, a digital signature, or even a program, is streamed bit by bit. The stream is...
-
Article
Numerical simulation on crystallization-induced warpage of injection-molded PP/EPDM part
Prediction on crystallization-induced warpage in injection-molded semi-crystalline polymers is important in satisfying the required specifications of molded products. In this study, we chose a polypropylene (P...
-
Chapter and Conference Paper
Simple Schemes in the Bounded Storage Model
The bounded storage model promises unconditional security proofs against computationally unbounded adversaries, so long as the adversary’s space is bounded. In this work, we develop simple new constructions of...
-
Chapter and Conference Paper
Return of GGH15: Provable Security Against Zeroizing Attacks
The GGH15 multilinear maps have served as the foundation for a number of cutting-edge cryptographic proposals. Unfortunately, many schemes built on GGH15 have been explicitly broken by so-called “zeroizing att...