Abstract. We put forth the question of whether cryptography is fea-sible using streaming devices. We give constructions and prove lower bounds. In streaming cryptography (not to be confused with stream-ciphers) everything—the keys, the messages, and the seeds—are huge compared to the internal memory of the device. These streaming algo-rithms have small internal memory size and make a constant number of passes over big data maintained in a constant number of read/write external tapes. Typically, the internal memory size is O(log n) and we use 2 external tapes; whereas 1 tape is provably insufficient. In this set-ting we cannot compute instances of popular intractability assumptions. Nevertheless, we base cryptography on these assumptions by ...
We introduce a new construction method of diffusion layers for Substitution Permutation Network (SPN...
Recall from last lecture the simple but useful model of one-way communication complexity. Alice has ...
Side-channel attacks are one of the most dangerous threats against se-cure devices. By exploiting ph...
In the first part of the thesis we show black-box separations in public and private-key cryptography...
We study streaming algorithms in the white-box adversarial model, where the stream is chosen adaptiv...
We consider the problem of streaming verifiable computation, where both a verifier and a prover obse...
Research within the area of cryptography constitutes the core of this the- sis. In addition to crypt...
We construct a stream-cipher S whose implementation is secure even if a bounded amount of arbitrary ...
Streaming algorithms, which process very large datasets received one update at a time, are a key too...
In the setting of streaming verifiable computation, a verifier and a prover observe a stream of n el...
textabstractWe construct a stream-cipher SC whose \emph{implementation} is secure even if arbitrary ...
Modeling efficient algorithms as polynomial size circuits rather than as polynomial time Turing mach...
This paper proposes a stream cipher with the advantages of efficiency and non-linearity of a key str...
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, ...
In this thesis, we present constructions of leakage-resilient cryptographic primitives, and we give ...
We introduce a new construction method of diffusion layers for Substitution Permutation Network (SPN...
Recall from last lecture the simple but useful model of one-way communication complexity. Alice has ...
Side-channel attacks are one of the most dangerous threats against se-cure devices. By exploiting ph...
In the first part of the thesis we show black-box separations in public and private-key cryptography...
We study streaming algorithms in the white-box adversarial model, where the stream is chosen adaptiv...
We consider the problem of streaming verifiable computation, where both a verifier and a prover obse...
Research within the area of cryptography constitutes the core of this the- sis. In addition to crypt...
We construct a stream-cipher S whose implementation is secure even if a bounded amount of arbitrary ...
Streaming algorithms, which process very large datasets received one update at a time, are a key too...
In the setting of streaming verifiable computation, a verifier and a prover observe a stream of n el...
textabstractWe construct a stream-cipher SC whose \emph{implementation} is secure even if arbitrary ...
Modeling efficient algorithms as polynomial size circuits rather than as polynomial time Turing mach...
This paper proposes a stream cipher with the advantages of efficiency and non-linearity of a key str...
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, ...
In this thesis, we present constructions of leakage-resilient cryptographic primitives, and we give ...
We introduce a new construction method of diffusion layers for Substitution Permutation Network (SPN...
Recall from last lecture the simple but useful model of one-way communication complexity. Alice has ...
Side-channel attacks are one of the most dangerous threats against se-cure devices. By exploiting ph...