Sciweavers

16 search results - page 2 / 4
» africacrypt 2009
Sort
View
AFRICACRYPT
2009
Springer
14 years 2 months ago
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness
Michel Abdalla, Dario Catalano, Céline Chev...
AFRICACRYPT
2009
Springer
14 years 2 months ago
Reducing Key Length of the McEliece Cryptosystem
Thierry P. Berger, Pierre-Louis Cayrel, Philippe G...
AFRICACRYPT
2009
Springer
14 years 7 days ago
Exponent Recoding and Regular Exponentiation Algorithms
This paper describes methods of recoding exponents to allow for regular implementations of m-ary exponentiation algorithms. Recoding algorithms previously proposed in the literatur...
Marc Joye, Michael Tunstall
AFRICACRYPT
2009
Springer
14 years 2 months ago
Cryptanalysis of Vortex
Vortex is a hash function that was first presented at ISC’2008, then submitted to the NIST SHA-3 competition after some modifications. This paper describes several attacks on b...
Jean-Philippe Aumasson, Orr Dunkelman, Florian Men...
AFRICACRYPT
2009
Springer
14 years 2 months ago
Unifying Zero-Knowledge Proofs of Knowledge
Abstract. We present a simple zero-knowledge proof of knowledge protocol of which many protocols in the literature are instantiations. These include Schnorr’s protocol for provin...
Ueli M. Maurer