Sciweavers

362 search results - page 21 / 73
» Abstraction in Cryptography
Sort
View
EUROCRYPT
2007
Springer
14 years 1 months ago
Ate Pairing on Hyperelliptic Curves
Abstract. In this paper we show that the Ate pairing, originally defined for elliptic curves, generalises to hyperelliptic curves and in fact to arbitrary algebraic curves. It has...
Robert Granger, Florian Hess, Roger Oyono, Nicolas...
PKC
2007
Springer
165views Cryptology» more  PKC 2007»
14 years 1 months ago
Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA
Abstract. For RSA, May showed a deterministic polynomial time equivalence of computing d to factoring N(= pq). On the other hand, Takagi showed a variant of RSA such that the decry...
Noboru Kunihiro, Kaoru Kurosawa
PKC
2007
Springer
132views Cryptology» more  PKC 2007»
14 years 1 months ago
Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions
Abstract. We introduce a new approach for cryptanalysis of key agreement protocols based on noncommutative groups. Our approach uses functions that estimate the distance of a group...
Dima Ruinskiy, Adi Shamir, Boaz Tsaban
TCC
2007
Springer
125views Cryptology» more  TCC 2007»
14 years 1 months ago
Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions
Abstract. We show a new protocol for blind signatures in which security is preserved even under arbitrarily-many concurrent executions. The protocol can be based on standard crypto...
Carmit Hazay, Jonathan Katz, Chiu-Yuen Koo, Yehuda...
CHES
2005
Springer
99views Cryptology» more  CHES 2005»
14 years 1 months ago
Short Memory Scalar Multiplication on Koblitz Curves
Abstract. We present a new method for computing the scalar multiplication on Koblitz curves. Our method is as fast as the fastest known technique but requires much less memory. We ...
Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaum...