CTRSA
14 years 3 months ago
2004 Springer
We describe a block-cipher mode of operation, EME, that turns an n-bit block cipher into
CTRSA
14 years 3 months ago
2004 Springer
Abstract. In this paper, we give a first example of identity based undeniable signature using pairings over elliptic curves. We extend to the identity based setting the security m...
CTRSA
14 years 3 months ago
2004 Springer
This paper presents a scalable hardware implementation of both commonly used public key cryptosystems, RSA and Elliptic Curve Cryptosystem (ECC) on the same platform. The introduce...
CTRSA
14 years 1 months ago
2004 Springer
We present a cryptanalysis of a zero-knowledge identification protocol introduced by Naccache et al. at Eurocrypt '95. Our cryptanalysis enables a polynomial-time attacker to ...
CTRSA
14 years 1 months ago
2004 Springer
Abstract. Secure authentication frequently depends on the correct recognition of a user's public key. When there is no certificate authority, this key is obtained from other u...
|