Sciweavers

CTRSA
2004
Springer
91views Cryptology» more  CTRSA 2004»
14 years 2 months ago
Periodic Properties of Counter Assisted Stream Ciphers
Abstract. This paper analyses periodic properties of counter assisted stream ciphers. In particular, we analyze constructions where the counter system also has the purpose of provi...
Ove Scavenius, Martin Boesgaard, Thomas Pedersen, ...
CTRSA
2004
Springer
59views Cryptology» more  CTRSA 2004»
14 years 2 months ago
Yet Another Sieving Device
Abstract. A compact mesh architecture for supporting the relation collection step of the number field sieve is described. Differing from TWIRL, only isolated chips without inter-...
Willi Geiselmann, Rainer Steinwandt
CTRSA
2004
Springer
87views Cryptology» more  CTRSA 2004»
14 years 2 months ago
Padding Oracle Attacks on the ISO CBC Mode Encryption Standard
Abstract. In [8] Vaudenay presented an attack on block cipher CBCmode encryption when a particular padding method is used. In this paper, we employ a similar approach to analyse th...
Kenneth G. Paterson, Arnold K. L. Yau
CTRSA
2004
Springer
96views Cryptology» more  CTRSA 2004»
14 years 2 months ago
Self-Randomized Exponentiation Algorithms
Abstract. Exponentiation is a central process in many public-key cryptosystems such as RSA and DH. This paper introduces the concept of self-randomized exponentiation as an efficie...
Benoît Chevallier-Mames
CTRSA
2004
Springer
120views Cryptology» more  CTRSA 2004»
14 years 2 months ago
Identity Based Undeniable Signatures
Abstract. In this paper, we give a first example of identity based undeniable signature using pairings over elliptic curves. We extend to the identity based setting the security m...
Benoît Libert, Jean-Jacques Quisquater
CTRSA
2004
Springer
89views Cryptology» more  CTRSA 2004»
14 years 2 months ago
Universal Re-encryption for Mixnets
We introduce a new cryptographic technique that we call universal re-encryption. A conventional cryptosystem that permits reencryption, such as ElGamal, does so only for a player w...
Philippe Golle, Markus Jakobsson, Ari Juels, Paul ...
CTRSA
2004
Springer
114views Cryptology» more  CTRSA 2004»
14 years 2 months ago
Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems
This paper presents a scalable hardware implementation of both commonly used public key cryptosystems, RSA and Elliptic Curve Cryptosystem (ECC) on the same platform. The introduce...
Lejla Batina, Geeke Bruin-Muurling, Siddika Berna ...
ASIACRYPT
2004
Springer
14 years 2 months ago
New Approaches to Password Authenticated Key Exchange Based on RSA
We investigate efficient protocols for password-authenticated key exchange based on the RSA public-key cryptosystem. To date, most of the published protocols for password-authentic...
Muxiang Zhang
ASIACRYPT
2004
Springer
14 years 2 months ago
k-Times Anonymous Authentication (Extended Abstract)
Isamu Teranishi, Jun Furukawa, Kazue Sako
ASIACRYPT
2004
Springer
14 years 2 months ago
Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes
Abstract. We consider the problem of increasing the threshold parameter of a secret-sharing scheme after the setup (share distribution) phase, without further communication between...
Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk