Sciweavers

1834 search results - page 223 / 367
» Public Key Cryptography
Sort
View
135
Voted
IACR
2011
94views more  IACR 2011»
14 years 2 months ago
Practical Key-recovery For All Possible Parameters of SFLASH
In this paper we present a new practical key-recovery attack on the SFLASH signature scheme. SFLASH is a derivative of the older C∗ encryption and signature scheme that was broke...
Charles Bouillaguet, Pierre-Alain Fouque, Gilles M...
143
Voted
IACR
2011
80views more  IACR 2011»
14 years 2 months ago
History-Free Sequential Aggregate Signatures
Aggregation schemes allow to combine several cryptographic values like message authentication codes or signatures into a shorter value such that, despite compression, some notion o...
Marc Fischlin, Anja Lehmann, Dominique Schröd...
127
Voted
ICIP
2005
IEEE
16 years 4 months ago
An asymmetric watermarking method for copyright protection utilizing dual bases
We present an asymmetric watermarking method for copyright protection that uses different matrix operations to embed and extract a watermark. It allows for the public release of a...
Jengnan Tzeng, Wen-Liang Hwang, I-Liang Chern
119
Voted
ASIACRYPT
2007
Springer
15 years 9 months ago
Multi-party Indirect Indexing and Applications
Abstract. We develop a new multi-party generalization of Naor-Nissim indirect indexing, making it possible for many participants to simulate a RAM machine with only poly-logarithmi...
Matthew K. Franklin, Mark Gondree, Payman Mohassel
109
Voted
CRYPTO
2007
Springer
99views Cryptology» more  CRYPTO 2007»
15 years 9 months ago
Practical Cryptanalysis of SFLASH
In this paper, we present a practical attack on the signature scheme SFLASH proposed by Patarin, Goubin and Courtois in 2001 following a design they had introduced in 1998. The att...
Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Ja...