Sciweavers

CTRSA
2003
Springer
96views Cryptology» more  CTRSA 2003»
14 years 1 months ago
Hardware Performance Characterization of Block Cipher Structures
In this paper, we present a general framework for evaluating the performance characteristics of block cipher structures composed of S-boxes and Maximum Distance Separable (MDS) ma...
Lu Xiao, Howard M. Heys
CTRSA
2003
Springer
114views Cryptology» more  CTRSA 2003»
14 years 1 months ago
Fractal Merkle Tree Representation and Traversal
We introduce a technique for traversal of Merkle trees, and propose an efficient algorithm that generates a sequence of leaves along with their associated authentication paths. For...
Markus Jakobsson, Frank Thomson Leighton, Silvio M...
CTRSA
2003
Springer
130views Cryptology» more  CTRSA 2003»
14 years 1 months ago
Fast Elliptic Curve Arithmetic and Improved Weil Pairing Evaluation
We present an algorithm which speeds scalar multiplication on a general elliptic curve by an estimated 3.8% to 8.5% over the best known general methods when using affine coordinate...
Kirsten Eisenträger, Kristin Lauter, Peter L....
CTRSA
2003
Springer
116views Cryptology» more  CTRSA 2003»
14 years 1 months ago
Intrusion-Resilient Public-Key Encryption
Exposure of secret keys seems to be inevitable, and may in practice represent the most likely point of failure in a cryptographic system. Recently, the notion of intrusion-resilien...
Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz...
CTRSA
2003
Springer
71views Cryptology» more  CTRSA 2003»
14 years 1 months ago
Simple Identity-Based Cryptography with Mediated RSA
Xuhua Ding, Gene Tsudik
CTRSA
2003
Springer
120views Cryptology» more  CTRSA 2003»
14 years 1 months ago
Simple Backdoors for RSA Key Generation
We present extremely simple ways of embedding a backdoor in the key generation scheme of RSA. Three of our schemes generate two genuinely random primes p and q of a given size, to...
Claude Crépeau, Alain Slakmon
CTRSA
2003
Springer
91views Cryptology» more  CTRSA 2003»
14 years 1 months ago
Two Birds One Stone: Signcryption Using RSA
John Malone-Lee, Wenbo Mao
CTRSA
2003
Springer
105views Cryptology» more  CTRSA 2003»
14 years 1 months ago
Forward-Security in Private-Key Cryptography
This paper provides a comprehensive treatment of forward-security in the context of sharedkey based cryptographic primitives, as a practical means to mitigate the damage caused by...
Mihir Bellare, Bennet S. Yee
ASIACRYPT
2003
Springer
14 years 1 months ago
The Secret and Beauty of Ancient Chinese Padlocks
Most ancient Chinese padlocks are key-operated locks with splitting springs, and partially keyless letter-combination locks. They can be characterized based on the types of locks, ...
Hong-Sen Yan, Hsing-Hui Huang
ASIACRYPT
2003
Springer
14 years 1 months ago
Accumulating Composites and Improved Group Signing
Constructing practical and provably secure group signature schemes has been a very active research topic in recent years. A group signature can be viewed as a digital signature wit...
Gene Tsudik, Shouhuai Xu