Sciweavers

SACRYPT
2001
Springer
130views Cryptology» more  SACRYPT 2001»
14 years 1 months ago
Algorithms for Multi-exponentiation
This paper compares different approaches for computing power products 1≤i≤k gei i in finite groups. We look at the conventional simultaneous exponentiation approach and prese...
Bodo Möller
PKC
2001
Springer
116views Cryptology» more  PKC 2001»
14 years 1 months ago
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures
At ISW’99, Nishioka, Hanaoka and Imai proposed a digital signature scheme on ID-based key-sharing infrastructures. That signature scheme is claimed to be secure if the discrete l...
Hongjun Wu, Feng Bao, Robert H. Deng
PKC
2001
Springer
95views Cryptology» more  PKC 2001»
14 years 1 months ago
The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes
This paper introduces a novel class of computational problems, the gap problems, which can be considered as a dual to the class of the decision problems. We show the relationship a...
Tatsuaki Okamoto, David Pointcheval
PKC
2001
Springer
163views Cryptology» more  PKC 2001»
14 years 1 months ago
Fast Irreducibility and Subgroup Membership Testing in XTR
Abstract. We describe a new general method to perform part of the setup stage of the XTR system introduced at Crypto 2000, namely finding the trace of a generator of the XTR group...
Arjen K. Lenstra, Eric R. Verheul
PKC
2001
Springer
111views Cryptology» more  PKC 2001»
14 years 1 months ago
Cryptanalysis of PKP: A New Approach
Quite recently, in [4], a new time-memory tradeoff algorithm was presented. The original goal of this algorithm was to count the number of points on an elliptic curve, however, th...
Éliane Jaulmes, Antoine Joux
PKC
2001
Springer
107views Cryptology» more  PKC 2001»
14 years 1 months ago
Efficient Revocation in Group Signatures
Emmanuel Bresson, Jacques Stern
PKC
2001
Springer
86views Cryptology» more  PKC 2001»
14 years 1 months ago
One Round Threshold Discrete-Log Key Generation without Private Channels
Pedersen designed the first scheme for generating Discrete-Log keys without
Pierre-Alain Fouque, Jacques Stern
INDOCRYPT
2001
Springer
14 years 1 months ago
Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree
In this paper, the authors analyze the Gaudry–Hess–Smart (GHS) Weil descent attack on the elliptic curve discrete logarithm problem (ECDLP) for elliptic curves defined over c...
Markus Maurer, Alfred Menezes, Edlyn Teske
INDOCRYPT
2001
Springer
14 years 1 months ago
Cryptographic Functions and Design Criteria for Block Ciphers
Most last-round attacks on iterated block ciphers provide some design criteria for the round function. Here, we focus on the links between the underlying properties. Most notably, ...
Anne Canteaut