Sciweavers

103 search results - page 7 / 21
» Security of public key cryptosystems based on Chebyshev Poly...
Sort
View
AMC
2005
121views more  AMC 2005»
13 years 8 months ago
A new key authentication scheme for cryptosystems based on discrete logarithms
Key authentication is very important in private communication and data integrity. Recently, Peinado, Zhang and Kim showed that the LHL scheme is not secure, respectively. From pub...
Zuhua Shao
IDTRUST
2009
ACM
14 years 3 months ago
Quantum resistant public key cryptography: a survey
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which c...
Ray A. Perlner, David A. Cooper
CORR
2006
Springer
111views Education» more  CORR 2006»
13 years 8 months ago
Length-based cryptanalysis: The case of Thompson's Group
The length-based approach is a heuristic for solving randomly generated equations in groups which possess a reasonably behaved length function. We describe several improvements of ...
Dima Ruinskiy, Adi Shamir, Boaz Tsaban
EUROCRYPT
1998
Springer
14 years 24 days ago
Auto-Recoverable Auto-Certifiable Cryptosystems
Abstract. This paper introduces a cryptographic paradigm called selfescrowed encryption, a concept initiated by kleptography. In simple words, a self-escrowed public-key cryptosyst...
Adam Young, Moti Yung
ACNS
2003
Springer
193views Cryptology» more  ACNS 2003»
14 years 1 months ago
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem
Distributed key generation is one of the most challenging tasks for threshold cryptosystems. Designing such a protocol and proving its security against a malicious, adaptive adver...
Rui Zhang 0002, Hideki Imai