Sciweavers

51 search results - page 5 / 11
» icisc 2007
Sort
View
ICISC
2003
115views Cryptology» more  ICISC 2003»
13 years 9 months ago
Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption
Bid-rigging is a dangerous attack in electronic auction. Abe and Suzuki firstly introduced the idea of receipt-free to prevent this attack. In this paper we point out that Abe and...
Xiaofeng Chen, Byoungcheon Lee, Kwangjo Kim
ICISC
2003
194views Cryptology» more  ICISC 2003»
13 years 9 months ago
New Block Cipher: ARIA
In this paper, we propose a 128-bit block cipher ARIA which is an involution substitution and permutation encryption network(SPN). We use the same S-boxes as Rijndael to eliminate ...
Daesung Kwon, Jaesung Kim, Sangwoo Park, Soo Hak S...
ICISC
2003
108views Cryptology» more  ICISC 2003»
13 years 9 months ago
On the Security of a Group Signature Scheme with Forward Security
A group signature scheme allows a group member of a given group to sign messages on behalf of the group in an anonymous and unlinkable way. In case of a dispute, however, a design...
Guilin Wang
ICISC
2000
102views Cryptology» more  ICISC 2000»
13 years 9 months ago
Micropayments for Wireless Communications
Abstract. Electronic payment systems for wireless devices need to take into account the limited computational and storage ability of such devices. Micropayment schemes seem well su...
DongGook Park, Colin Boyd, Ed Dawson
ICISC
2007
125views Cryptology» more  ICISC 2007»
13 years 9 months ago
A Cryptanalysis of the Double-Round Quadratic Cryptosystem
In the 80’s Matsumoto and Imai [8] proposed public key cryptosystems based on the difficulty of solving systems of polynomials in several variables. Although these first schemes...
Antoine Scemama