Sciweavers

ASIACRYPT
2004
Springer
14 years 2 months ago
The Davies-Murphy Power Attack
Sébastien Kunz-Jacques, Frédé...
ASIACRYPT
2004
Springer
14 years 2 months ago
Constant-Round Authenticated Group Key Exchange for Dynamic Groups
Abstract. An authenticated group key exchange (AGKE) scheme allows a group of users in a public network to share a session key which may later be used to achieve desirable cryptogr...
Hyun-Jeong Kim, Su-Mi Lee, Dong Hoon Lee
ASIACRYPT
2004
Springer
14 years 2 months ago
Eliminating Random Permutation Oracles in the Even-Mansour Cipher
Abstract. Even and Mansour [EM97] proposed a block cipher construction that takes a publicly computable random permutation oracle P and XORs different keys prior to and after appl...
Craig Gentry, Zulfikar Ramzan
ASIACRYPT
2004
Springer
14 years 2 months ago
The XL-Algorithm and a Conjecture from Commutative Algebra
The “XL-algorithm” is a computational method to solve overdetermined systems of polynomial equations which is based on a generalization of the well-known method of linearizatio...
Claus Diem
ASIACRYPT
2004
Springer
14 years 2 months ago
Cryptanalysis of Bluetooth Keystream Generator Two-Level E0
Yi Lu 0002, Serge Vaudenay
ASIACRYPT
2004
Springer
14 years 2 months ago
Privacy in Non-private Environments
Markus Bläser, Andreas Jakoby, Maciej Liskiew...
ASIACRYPT
2004
Springer
14 years 2 months ago
Strong Conditional Oblivious Transfer and Computing on Intervals
We consider the problem of securely computing the Greater Than (GT) predicate and its generalization – securely determining membership in a union of intervals. We approach these ...
Ian F. Blake, Vladimir Kolesnikov
ASIACRYPT
2004
Springer
14 years 2 months ago
Towards Plaintext-Aware Public-Key Encryption Without Random Oracles
Mihir Bellare, Adriana Palacio
ASIACRYPT
2004
Springer
14 years 2 months ago
Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes
An untraceable fair network payment protocol is proposed by Wang in Asiacrypt’03, which employs the existent techniques of the offline untraceable cash and a new technique calle...
Feng Bao