Sciweavers

51 search results - page 7 / 11
» asiacrypt 2000
Sort
View
ASIACRYPT
2000
Springer
14 years 2 months ago
Power Analysis, What Is Now Possible...
Since Power Analysis on smart-cards was introduced by Paul Kocher [KJJ98], the validity of the model used for smart-cards has not been given much attention. In this paper, we firs...
Mehdi-Laurent Akkar, Régis Bevan, Paul Disc...
ASIACRYPT
2000
Springer
14 years 2 months ago
Key Improvements to XTR
Abstract. This paper describes improved methods for XTR key representation and parameter generation (cf. [4]). If the field characteristic is properly chosen, the size of the XTR ...
Arjen K. Lenstra, Eric R. Verheul
ASIACRYPT
2000
Springer
14 years 1 months ago
Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis
In this paper we introduce a structure iterated by the rule A of Skipjack and show that this structure is provably resistant against differential or linear attacks. It is the main ...
Jaechul Sung, Sangjin Lee, Jong In Lim, Seokhie Ho...
ASIACRYPT
2000
Springer
14 years 2 months ago
Commital Deniable Proofs and Electronic Campaign Finance
In a recent Stanford Law Review article, Ayres and Bulow [1] propose a radical anonymity-based solution to disrupt the “market” for monetary influence in political campaigns. ...
Matthew K. Franklin, Tomas Sander
ASIACRYPT
2000
Springer
14 years 2 months ago
Distributed Oblivious Transfer
The mobile agent is a fundamental building block of the mobile computing paradigm. In mobile agent security, oblivious transfer (OT) from a trusted party can be used to protect th...
Moni Naor, Benny Pinkas