Sciweavers

ASIACRYPT
2003
Springer
14 years 1 months ago
Some RSA-Based Encryption Schemes with Tight Security Reduction
In this paper, we study some RSA-based semantically secure encryption schemes (IND-CPA) in the standard model. We first derive the exactly tight one-wayness of Rabin-Paillier encr...
Kaoru Kurosawa, Tsuyoshi Takagi
ASIACRYPT
2003
Springer
14 years 1 months ago
A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems
In this paper, we introduce a conceptually very simple and demonstrative algo
Kaoru Kurosawa, Katja Schmidt-Samoa, Tsuyoshi Taka...
ASIACRYPT
2003
Springer
14 years 1 months ago
Rotations and Translations of Number Field Sieve Polynomials
We present an algorithm that finds polynomials with many roots modulo many primes by rotating candidate Number Field Sieve polynomials using the Chinese Remainder Theorem. We also...
Jason E. Gower
ASIACRYPT
2003
Springer
14 years 1 months ago
The Insecurity of Esign in Practical Implementations
Provable security usually makes the assumption that a source of perfectly random and secret data is available. However, in practical applications, and especially when smart cards a...
Pierre-Alain Fouque, Nick Howgrave-Graham, Gwena&e...
ASIACRYPT
2003
Springer
14 years 1 months ago
Tate Pairing Implementation for Hyperelliptic Curves y2 = xp-x + d
The Weil and Tate pairings have been used recently to build new schemes in cryptography. It is known that the Weil pairing takes longer than twice the running time of the Tate pair...
Iwan M. Duursma, Hyang-Sook Lee
ASIACRYPT
2003
Springer
14 years 1 months ago
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking
We introduce a new cryptographic tool: multiset hash functions. Unlike standard hash functions which take strings as input, multiset hash functions operate on multisets (or sets). ...
Dwaine E. Clarke, Srinivas Devadas, Marten van Dij...
ASIACRYPT
2003
Springer
14 years 1 months ago
On Class Group Computations Using the Number Field Sieve
The best practical algorithm for class group computations in imaginary quadratic number fields (such as group structure, class number, discrete logarithm computations) is a varian...
Mark L. Bauer, Safuat Hamdy
ASIACRYPT
2003
Springer
14 years 1 months ago
Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes
Abstract. We study two closely related primitives: Broadcast Encryption and Key Predistribution Schemes (KPS). Broadcast Encryption allows a broadcaster to broadcast an encrypted m...
Nuttapong Attrapadung, Kazukuni Kobara, Hideki Ima...
ASIACRYPT
2003
Springer
14 years 1 months ago
A Traceable Block Cipher
In this paper1 we propose a new symmetric block cipher with the following paradoxical traceability properties: it is computationally easy to derive many equivalent secret keys prov...
Olivier Billet, Henri Gilbert
CTRSA
2004
Springer
124views Cryptology» more  CTRSA 2004»
14 years 2 months ago
A Parallelizable Enciphering Mode
We describe a block-cipher mode of operation, EME, that turns an n-bit block cipher into
Shai Halevi, Phillip Rogaway