Sciweavers

427 search results - page 53 / 86
» Cryptanalysis of the
Sort
View
SCN
2008
Springer
103views Communications» more  SCN 2008»
13 years 7 months ago
Full Cryptanalysis of LPS and Morgenstern Hash Functions
Collisions in the LPS cryptographic hash function of Charles, Goren and Lauter have been found by Z
Christophe Petit, Kristin Lauter, Jean-Jacques Qui...
AMC
2005
147views more  AMC 2005»
13 years 7 months ago
Cryptanalysis of and improvement on the Hwang-Chen multi-proxy multi-signature schemes
Hwang and Chen recently proposed new multi-proxy multi-signature schemes that allow a group of authorized proxy signers to sign messages on behalf of a group of original signers. ...
Yuh-Dauh Lyuu, Ming-Luen Wu
JOC
2007
81views more  JOC 2007»
13 years 7 months ago
Theoretical Cryptanalysis of the Klimov-Shamir Number Generator TF-1
The internal state of the Klimov–Shamir number generator TF-1 consists of four words of size w bits each, whereas its intended strength is 22w. We exploit an asymmetry in its out...
Boaz Tsaban
COMPSEC
2002
95views more  COMPSEC 2002»
13 years 7 months ago
Cryptanalysis of a Timestamp-Based Password Authentication Scheme
Chi-Kwong Chan, Lee-Ming Cheng
INFORMATICALT
2000
123views more  INFORMATICALT 2000»
13 years 7 months ago
Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures
Recently, Harn proposed an efficient scheme that can batch verification multiple RSA digital signatures. His scheme can reduce signature verification time. However, there is a weak...
Min-Shiang Hwang, Iuon-Chang Lin, Kuo-Feng Hwang