Sciweavers

EUROCRYPT
1997
Springer
14 years 23 days ago
Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals
We propose a concept for a worldwide information security infrastructure that protects law-abiding citizens, but not criminals, even if the latter use it fraudulently (i.e. when no...
Eric R. Verheul, Henk C. A. van Tilborg
EUROCRYPT
1997
Springer
14 years 23 days ago
A New Public-Key Cryptosystem
This paper describes a new public-key cryptosystem where the ciphertext is obtained by multiplying the public-keys indexed by the message bits and the cleartext is recovered by fac...
David Naccache, Jacques Stern
EUROCRYPT
1997
Springer
14 years 23 days ago
Distributed "Magic Ink" Signatures
Markus Jakobsson, Moti Yung
EUROCRYPT
1997
Springer
14 years 23 days ago
Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function
Mihir Bellare, Markus Jakobsson, Moti Yung
EUROCRYPT
1997
Springer
14 years 23 days ago
The GCHQ Protocol and Its Problems
The UK government is fielding an architecture for secure electronic mail based on the NSA’s Message Security Protocol, with a key escrow scheme inspired by Diffie-Hellman. Attem...
Ross J. Anderson, Michael Roe
EUROCRYPT
1997
Springer
14 years 23 days ago
Two Attacks on Reduced IDEA
Johan Borst, Lars R. Knudsen, Vincent Rijmen
CRYPTO
1997
Springer
156views Cryptology» more  CRYPTO 1997»
14 years 23 days ago
Fast and Secure Hashing Based on Codes
This paper considers hash functions based on block ciphers. It presents a new attack on the compression function of the 128-bit hash function MDC-4 using DES with a complexity far ...
Lars R. Knudsen, Bart Preneel