Sciweavers

FSE
1999
Springer
87views Cryptology» more  FSE 1999»
14 years 3 months ago
Attack on Six Rounds of Crypton
Abstract. In this paper we present an attack on a reduced round version of Crypton. The attack is based on the dedicated Square attack. We explain why the attack also works on Cryp...
Carl D'Halluin, Gert Bijnens, Vincent Rijmen, Bart...
FC
1999
Springer
97views Cryptology» more  FC 1999»
14 years 3 months ago
Playing "Hide and Seek" with Stored Keys
In this paper we consider the problem of efficiently locating cryptographic keys hidden in gigabytes of data, such as the complete file system of a typical PC. We describe efficie...
Adi Shamir, Nicko van Someren
FC
1999
Springer
160views Cryptology» more  FC 1999»
14 years 3 months ago
Anonymous Authentication of Membership in Dynamic Groups
Abstract. We present a series of protocols for authenticating an individual’s membership in a group without revealing that individual’s identity and without restricting how the...
Stuart E. Schechter, Todd Parnell, Alexander J. Ha...
FC
1999
Springer
184views Cryptology» more  FC 1999»
14 years 3 months ago
Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems
Abstract. Anonymity features of electronic payment systems are important for protecting privacy in an electronic world. However, complete anonymity prevents monitoring financial t...
Tomas Sander, Amnon Ta-Shma
FC
1999
Springer
102views Cryptology» more  FC 1999»
14 years 3 months ago
Risk Management for E-Cash Systems with Partial Real-Time Audit
We analyze “coin-wallet” and “balance-wallet” under partial real-time audit, and compute upper bounds on theft due to the fact that not all the transactions are audited in ...
Yacov Yacobi
FC
1999
Springer
94views Cryptology» more  FC 1999»
14 years 3 months ago
Towards Making Broadcast Encryption Practical
Michel Abdalla, Yuval Shavitt, Avishai Wool
EUROCRYPT
1999
Springer
14 years 3 months ago
Secure Communication in Broadcast Channels: The Answer to Franklin and Wright's Question
Problems of secure communication and computation have been studied extensively in network models. Goldreich, Goldwasser, and Linial, Franklin and Yung, and Franklin and Wright have...
Yongge Wang, Yvo Desmedt
EUROCRYPT
1999
Springer
14 years 3 months ago
On the Performance of Hyperelliptic Cryptosystems
In this paper we discuss various aspects of cryptosystems based on hyperelliptic curves. In particular we cover the implementation of the group law on such curves and how to genera...
Nigel P. Smart
EUROCRYPT
1999
Springer
14 years 3 months ago
On the Concurrent Composition of Zero-Knowledge Proofs
We examine the concurrent composition of zero-knowledge proofs. By concurrent composition, we indicate a single prover that is involved in multiple, simultaneous zero-knowledge pro...
Ransom Richardson, Joe Kilian
EUROCRYPT
1999
Springer
14 years 3 months ago
New Public Key Cryptosystems Based on the Dependent-RSA Problems
Since the Diffie-Hellman paper, asymmetric encryption has been a very important topic, and furthermore ever well studied. However, between the efficiency of RSA and the security of...
David Pointcheval