Sciweavers

257 search results - page 19 / 52
» On the Security of RSA Screening
Sort
View
IJNSEC
2006
75views more  IJNSEC 2006»
13 years 7 months ago
Cryptanalysis of the Secure Sessions from Weak Secrets Protocols
The Short Secret Sharing Protocols (S3P), proposed by Roe et al in 1998 [13] and revised in 2003 [14], is a family of protocols that bootstrap secure session keys from weak secret...
Jolyon Clulow
IJNSEC
2007
131views more  IJNSEC 2007»
13 years 7 months ago
On the Security of Huang-Chang Multi-signature Schemes
Recently, based on RSA and discrete logarithm with composite modulus, Huang and Chang proposed two multisignature schemes with distinguished signing authority and claimed that the...
Jianhong Zhang, Wei Zou
STACS
2010
Springer
14 years 2 months ago
Mathematics, Cryptology, Security
Abstract. In this talk, I will review some of the work performed by the research community in cryptology and security since the invention of public key cryptography by Diffie and H...
Jacques Stern
PROVSEC
2009
Springer
14 years 2 months ago
Chosen-Ciphertext Secure RSA-Type Cryptosystems
This paper explains how to design fully secure RSA-type cryptosystems from schemes only secure against passive attacks, in the standard model. We rely on instance-independence assu...
Benoît Chevallier-Mames, Marc Joye
SAINT
2003
IEEE
14 years 1 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta