Sciweavers

948 search results - page 21 / 190
» Attacking cryptographic schemes based on
Sort
View
CORR
2010
Springer
135views Education» more  CORR 2010»
13 years 8 months ago
Cryptanalysis of an Elliptic Curve-based Signcryption Scheme
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Although...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
PQCRYPTO
2010
176views Cryptology» more  PQCRYPTO 2010»
13 years 6 months ago
Practical Power Analysis Attacks on Software Implementations of McEliece
The McEliece public-key cryptosystem is based on the fact that decoding unknown linear binary codes is an NP-complete problem. The interest on implementing post-quantum cryptograph...
Stefan Heyse, Amir Moradi, Christof Paar
LATINCRYPT
2010
13 years 6 months ago
On the Impossibility of Batch Update for Cryptographic Accumulators
Abstract. A cryptographic accumulator is a scheme where a set of elements is represented by a single short value. This value, along with another value called witness, allows to pro...
Philippe Camacho, Alejandro Hevia
DCC
2006
IEEE
14 years 7 months ago
A Fuzzy Vault Scheme
We describe a simple and novel cryptographic construction that we refer to as a fuzzy vault. A player Alice may place a secret value in a fuzzy vault and "lock" it using ...
Ari Juels, Madhu Sudan
FSTTCS
2003
Springer
14 years 1 months ago
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
We prove the Needham-Schroeder-Lowe public-key protocol secure under real, active cryptographic attacks including concurrent protocol runs. This proof is based on an abstract crypt...
Michael Backes, Birgit Pfitzmann