Sciweavers

CTRSA
2001
Springer
87views Cryptology» more  CTRSA 2001»
14 years 1 months ago
On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC
Marc Joye, Jean-Jacques Quisquater, Moti Yung
CTRSA
2001
Springer
139views Cryptology» more  CTRSA 2001»
14 years 1 months ago
Security Weaknesses in Bluetooth
We point to three types of potential vulnerabilities in the
Markus Jakobsson, Susanne Wetzel
CTRSA
2001
Springer
120views Cryptology» more  CTRSA 2001»
14 years 1 months ago
Forward-Secure Threshold Signature Schemes
We consider the usage of forward security with threshold signature schemes. This means that even if more than the threshold number of players are compromised, some security remain...
Michel Abdalla, Sara K. Miner, Chanathip Namprempr...
CTRSA
2001
Springer
94views Cryptology» more  CTRSA 2001»
14 years 1 months ago
Secure Mobile Gambling
Markus Jakobsson, David Pointcheval, Adam Young
CRYPTO
2001
Springer
113views Cryptology» more  CRYPTO 2001»
14 years 1 months ago
OAEP Reconsidered
The OAEP encryption scheme was introduced by Bellare and Rogaway at Eurocrypt ’94. It converts any trapdoor permutation scheme into a public-key encryption scheme. OAEP is widel...
Victor Shoup
CRYPTO
2001
Springer
125views Cryptology» more  CRYPTO 2001»
14 years 1 months ago
Robust Non-interactive Zero Knowledge
Abstract. Non-Interactive Zero Knowledge (NIZK), introduced by Blum, Feldman, and Micali in 1988, is a fundamental cryptographic primitive which has attracted considerable attentio...
Alfredo De Santis, Giovanni Di Crescenzo, Rafail O...
CRYPTO
2001
Springer
162views Cryptology» more  CRYPTO 2001»
14 years 1 months ago
New Public Key Cryptosystem Using Finite Non Abelian Groups
Most public key cryptosystems have been constructed based on abelian groups up to now. We propose a new public key cryptosystem built on finite non abelian groups in this paper. I...
Seong-Hun Paeng, Kil-Chan Ha, Jae Heon Kim, Seongt...
CRYPTO
2001
Springer
97views Cryptology» more  CRYPTO 2001»
14 years 1 months ago
Two-Party Generation of DSA Signatures
d Abstract) Philip MacKenzie and Michael K. Reiter Bell Labs, Lucent Technologies, Murray Hill, NJ, USA We describe a means of sharing the DSA signature function, so that two parti...
Philip D. MacKenzie, Michael K. Reiter