Sciweavers

8 search results - page 1 / 2
» joc 2008
Sort
View
JOC
2008
47views more  JOC 2008»
13 years 10 months ago
Simpler Session-Key Generation from Short Random Passwords
Minh-Huyen Nguyen, Salil P. Vadhan
JOC
2008
64views more  JOC 2008»
13 years 10 months ago
Generic Constructions of Identity-Based and Certificateless KEMs
We extend the concept of key encapsulation mechanisms to the primitives of ID-based and certificateless encryption. We show that the natural combination of ID-KEMs or CL-KEMs with ...
Kamel Bentahar, Pooya Farshim, John Malone-Lee, Ni...
JOC
2008
92views more  JOC 2008»
13 years 10 months ago
Cryptanalysis of ISO/IEC 9796-1
We describe two different attacks against the iso/iec 9796-1 signature standard for RSA and Rabin. Both attacks consist in an existential forgery under a chosen-message attack: the...
Don Coppersmith, Jean-Sébastien Coron, Fran...
JOC
2008
92views more  JOC 2008»
13 years 10 months ago
Cryptanalysis of an E0-like Combiner with Memory
In this paper, we study an E0-like combiner with memory as the keystream generator. First, we formulate a systematic and simple method to compute correlations of the FSM output seq...
Yi Lu 0002, Serge Vaudenay