Sciweavers

PKC
1999
Springer
115views Cryptology» more  PKC 1999»
14 years 26 days ago
Decision Oracles are Equivalent to Matching Oracles
One of the key directions in complexity theory which has also filtered through to cryptographic research, is the effort to classify related but seemingly distinct notions. Separa...
Helena Handschuh, Yiannis Tsiounis, Moti Yung
PKC
1999
Springer
83views Cryptology» more  PKC 1999»
14 years 26 days ago
On the Security of Random Sources
Abstract. Many applications rely on the security of their random number generator. It is therefore essential that such devices be extensively tested for malfunction. The purpose of...
Jean-Sébastien Coron
PKC
1999
Springer
211views Cryptology» more  PKC 1999»
14 years 26 days ago
Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol
This paper presents some new unknown key-share attacks on STS-MAC, the version of the STS key agreement protocol which uses a MAC algorithm to provide key confirmation. Various me...
Simon Blake-Wilson, Alfred Menezes
PKC
1999
Springer
142views Cryptology» more  PKC 1999»
14 years 26 days ago
Encrypted Message Authentication by Firewalls
Firewalls typically filter network traffic at several different layers. At application layer, filtering is based on various security relevant information encapsulated into proto...
Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
PKC
1999
Springer
102views Cryptology» more  PKC 1999»
14 years 26 days ago
How to Enhance the Security of Public-Key Encryption at Minimum Cost
This paper presents a simple and efficient conversion from a semantically secure public-key encryption scheme against passive adversaries to a non-malleable (or semantically secure...
Eiichiro Fujisaki, Tatsuaki Okamoto
PKC
1999
Springer
125views Cryptology» more  PKC 1999»
14 years 26 days ago
Anonymous Fingerprinting Based on Committed Oblivious Transfer
Abstract. Thwarting unlawful redistribution of information sold electronically is a major problem of information-based electronic commerce. Anonymous fingerprinting has appeared a...
Josep Domingo-Ferrer
IMA
1999
Springer
129views Cryptology» more  IMA 1999»
14 years 26 days ago
Some Soft-Decision Decoding Algorithms for Reed-Solomon Codes
Abstract. In this paper we introduce three soft-decision decoding algorithms for Reed-Solomon (RS) codes. We compare them in terms of performance over both the AWGN and Rayleigh Fa...
Stephan Wesemeyer, Peter Sweeney, David R. B. Burg...
IMA
1999
Springer
108views Cryptology» more  IMA 1999»
14 years 26 days ago
Tensor-Based Trapdoors for CVP and Their Application to Public Key Cryptography
We propose two trapdoors for the Closest-Vector-Problem in lattices (CVP) related to the lattice tensor product. Using these trapdoors we set up a lattice-based cryptosystem which ...
Roger Fischlin, Jean-Pierre Seifert
IMA
1999
Springer
69views Cryptology» more  IMA 1999»
14 years 26 days ago
Some Applications of Bounds for Designs to the Cryptography
Recent years have seen numerous examples when designs play an important role in the study of such topics in cryptography as secrecy and authentication codes, secret sharing scheme...
Svetla Nikova, Ventzislav Nikov