Sciweavers

CTRSA
2004
Springer
124views Cryptology» more  CTRSA 2004»
14 years 3 months ago
A Parallelizable Enciphering Mode
We describe a block-cipher mode of operation, EME, that turns an n-bit block cipher into
Shai Halevi, Phillip Rogaway
CTRSA
2004
Springer
120views Cryptology» more  CTRSA 2004»
14 years 3 months ago
Identity Based Undeniable Signatures
Abstract. In this paper, we give a first example of identity based undeniable signature using pairings over elliptic curves. We extend to the identity based setting the security m...
Benoît Libert, Jean-Jacques Quisquater
CTRSA
2004
Springer
114views Cryptology» more  CTRSA 2004»
14 years 3 months ago
Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems
This paper presents a scalable hardware implementation of both commonly used public key cryptosystems, RSA and Elliptic Curve Cryptosystem (ECC) on the same platform. The introduce...
Lejla Batina, Geeke Bruin-Muurling, Siddika Berna ...
CTRSA
2004
Springer
114views Cryptology» more  CTRSA 2004»
14 years 1 months ago
Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95
We present a cryptanalysis of a zero-knowledge identification protocol introduced by Naccache et al. at Eurocrypt '95. Our cryptanalysis enables a polynomial-time attacker to ...
Jean-Sébastien Coron, David Naccache
CTRSA
2004
Springer
106views Cryptology» more  CTRSA 2004»
14 years 1 months ago
Improving Robustness of PGP Keyrings by Conflict Detection
Abstract. Secure authentication frequently depends on the correct recognition of a user's public key. When there is no certificate authority, this key is obtained from other u...
Qinglin Jiang, Douglas S. Reeves, Peng Ning
Cryptology
Top of PageReset Settings