Sciweavers

FSE
2001
Springer
113views Cryptology» more  FSE 2001»
14 years 1 months ago
Optimized Self-Synchronizing Mode of Operation
Abstract. Modes of operation adapt block ciphers to many applications. Among the encryption modes, only CFB Cipher Feedback has both of the following properties: Firstly it allow...
Ammar Alkassar, Alexander Geraldy, Birgit Pfitzman...
FC
2001
Springer
123views Cryptology» more  FC 2001»
14 years 1 months ago
Optimistic Fair Exchange with Transparent Signature Recovery
In this paper, we propose a new practical fair exchange protocol allowing the exchange of an electronic item against a signature. The protocol is based on the Guillou-Quisquater s...
Olivier Markowitch, Shahrokh Saeednia
FC
2001
Springer
97views Cryptology» more  FC 2001»
14 years 1 months ago
Monotone Signatures
In many real-life situations, massive quantities of signatures have to be issued on cheap passive supports (e.g. paper-based) such as bank-notes, badges, ID cards, driving licenses...
David Naccache, David Pointcheval, Christophe Tyme...
FC
2001
Springer
91views Cryptology» more  FC 2001»
14 years 1 months ago
On the Global Content PMI: Improved Copy-Protected Internet Content Distribution
This article addresses a problem with copy-protecting a large collection of electronic content. The notion and severity of a generic attack are raised in the context of Adams and Z...
Tadayoshi Kohno, Mark McGovern
FC
2001
Springer
125views Cryptology» more  FC 2001»
14 years 1 months ago
(M+1)st-Price Auction Protocol
Abstract. This paper presents a new protocol for M + 1st-price auction, a style of auction in which the highest M bidders win and pay a uniform price, determined by the (M + 1)st p...
Hiroaki Kikuchi
FC
2001
Springer
94views Cryptology» more  FC 2001»
14 years 1 months ago
Mutual Authentication for Low-Power Mobile Devices
We propose methods for mutual authentication and key exchange. Our methods are well suited for applications with strict power consumption restrictions, such as wireless medical imp...
Markus Jakobsson, David Pointcheval
FC
2001
Springer
123views Cryptology» more  FC 2001»
14 years 1 months ago
Trust: A Collision of Paradigms
The technological challenges of securing networks are great, as recently witnessed in widespread denial of service and virus attacks. The human reaction to these attacks may be ei...
L. Jean Camp, Helen Nissenbaum, Cathleen McGrath
EUROCRYPT
2001
Springer
14 years 1 months ago
Hyper-bent Functions
Bent functions have maximal minimum distance to the set of affine functions. In other words, they achieve the maximal minimum distance to all the coordinate functions of affine mon...
Amr M. Youssef, Guang Gong
EUROCRYPT
2001
Springer
14 years 1 months ago
Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems
Abstract. We show that finding an efficiently computable injective homomorphism from the XTR subgroup into the group of points over GF(p2 ) of a particular type of supersingular e...
Eric R. Verheul