Sciweavers

PKC
1998
Springer
135views Cryptology» more  PKC 1998»
14 years 25 days ago
A Signcryption Scheme with Signature Directly Verifiable by Public Key
Signcryption, first proposed by Zheng [4,5], is a cryptographic primitive which combines both the functions of digital signature and public key encryption in a logical single step,...
Feng Bao, Robert H. Deng
PKC
1998
Springer
95views Cryptology» more  PKC 1998»
14 years 25 days ago
Overview of Elliptic Curve Cryptography
In this article, we look at the elliptic curve cryptography, which is believed to be one of the most promising candidates for the next generation cryptographic tool. The following ...
Kiyomichi Araki, Takakazu Satoh, Shinji Miura
FSE
1998
Springer
94views Cryptology» more  FSE 1998»
14 years 25 days ago
CS-Cipher
In this paper we describe our new CS2 block cipher which is an extension of the original CS-Cipher. Our new design inherits the efficiency of the original design while being upgrad...
Jacques Stern, Serge Vaudenay
FSE
1998
Springer
137views Cryptology» more  FSE 1998»
14 years 25 days ago
Differential Cryptanalysis of the ICE Encryption Algorithm
ICE is a 64-bit block cipher presented at the Fast Software Encryption Workshop in January 1997. It introduced the concept of a keyed permutation to improve the resistance against ...
Bart Van Rompay, Lars R. Knudsen, Vincent Rijmen
FSE
1998
Springer
79views Cryptology» more  FSE 1998»
14 years 25 days ago
On the Design and Security of RC2
The block cipher RC2 was designed in 1989 by Ron Rivest for RSA Data Security Inc. In this paper we describe both the cipher and preliminary attempts to use both differential and l...
Lars R. Knudsen, Vincent Rijmen, Ronald L. Rivest,...
FSE
1998
Springer
102views Cryptology» more  FSE 1998»
14 years 25 days ago
Cryptanalytic Attacks on Pseudorandom Number Generators
In this paper we discuss PRNGs: the mechanisms used by real-world secure systems to generate cryptographic keys, initialization vectors, "random" nonces, and other values...
John Kelsey, Bruce Schneier, David Wagner, Chris H...
FSE
1998
Springer
98views Cryptology» more  FSE 1998»
14 years 25 days ago
JEROBOAM
Hervé Chabanne, Emmanuel Michon
FSE
1998
Springer
131views Cryptology» more  FSE 1998»
14 years 25 days ago
Cryptanalysis of TWOPRIME
Ding et al [DNRS97] propose a stream generator based on several layers. We present several attacks. First, we observe that the non-surjectivity of a linear combination step allows ...
Don Coppersmith, David Wagner, Bruce Schneier, Joh...
FC
1998
Springer
98views Cryptology» more  FC 1998»
14 years 25 days ago
Using a High-Performance, Programmable Secure Coprocessor
Sean W. Smith, Elaine R. Palmer, Steve Weingart