Sciweavers

362 search results - page 20 / 73
» Abstraction in Cryptography
Sort
View
PKC
2007
Springer
151views Cryptology» more  PKC 2007»
14 years 1 months ago
Cryptanalysis of HFE with Internal Perturbation
Abstract. Multivariate Cryptography has been an active line of research for almost twenty years. While most multivariate cryptosystems have been under attack, variations of the bas...
Vivien Dubois, Louis Granboulan, Jacques Stern
CISC
2009
Springer
199views Cryptology» more  CISC 2009»
13 years 5 months ago
Cryptanalysis of Certificateless Signcryption Schemes and an Efficient Construction without Pairing
Abstract. Certificateless cryptography introduced by Al-Riyami and Paterson eliminates the key escrow problem inherent in identity based cryptosystems. Even though building practic...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
SACRYPT
2009
Springer
176views Cryptology» more  SACRYPT 2009»
14 years 2 months ago
Optimization Strategies for Hardware-Based Cofactorization
Abstract. We use the specific structure of the inputs to the cofactorization step in the general number field sieve (GNFS) in order to optimize the runtime for the cofactorizatio...
Daniel Loebenberger, Jens Putzka
ACNS
2008
Springer
115views Cryptology» more  ACNS 2008»
14 years 1 months ago
Improved Conditional E-Payments
Abstract. Conditional e-cash or conditional e-payments have been introduced by Shi et al. as the means for enabling electronic payments to be based on the outcome of a certain cond...
Marina Blanton
ACNS
2007
Springer
105views Cryptology» more  ACNS 2007»
14 years 1 months ago
Analyzing an Electronic Cash Protocol Using Applied Pi Calculus
Abstract. Untraceability and unreuseability are essential security properties for electronic cash protocols. Many protocols have been proposed to meet these two properties. However...
Zhengqin Luo, Xiaojuan Cai, Jun Pang, Yuxin Deng