Sciweavers

MYCRYPT
2005
Springer
157views Cryptology» more  MYCRYPT 2005»
14 years 2 months ago
Twin RSA
Arjen K. Lenstra, Benjamin M. M. de Weger
MYCRYPT
2005
Springer
187views Cryptology» more  MYCRYPT 2005»
14 years 2 months ago
Distinguishing Attacks on T-Functions
Klimov and Shamir proposed a new class of simple cryptographic primitives named T-functions. For two concrete proposals based on the squaring operation, a single word T-function an...
Simon Künzli 0002, Pascal Junod, Willi Meier
MYCRYPT
2005
Springer
189views Cryptology» more  MYCRYPT 2005»
14 years 2 months ago
An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm
In this paper we produce a practical and efficient algorithm to find a decomposition of type n = kˆ i=1 2si 3ti , si, ti ∈ N ∪ {0} with k ≤   c + o(1) ¡ log n log log n ....
Mathieu Ciet, Francesco Sica
MYCRYPT
2005
Springer
123views Cryptology» more  MYCRYPT 2005»
14 years 2 months ago
On Session Key Construction in Provably-Secure Key Establishment Protocols
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchco...
MYCRYPT
2005
Springer
248views Cryptology» more  MYCRYPT 2005»
14 years 2 months ago
A Family of Fast Syndrome Based Cryptographic Hash Functions
Recently, some collisions have been exposed for a variety of cryptographic hash functions [20,21] including some of the most widely used today. Many other hash functions using simi...
Daniel Augot, Matthieu Finiasz, Nicolas Sendrier
CTRSA
2005
Springer
154views Cryptology» more  CTRSA 2005»
14 years 2 months ago
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings
We present the first blind identity-based signcryption (BIBSC). We formulate its security model and define the security notions of blindness and parallel one-more unforgeability ...
Tsz Hon Yuen, Victor K. Wei
CTRSA
2005
Springer
79views Cryptology» more  CTRSA 2005»
14 years 2 months ago
Malicious Cryptography: Kleptographic Aspects
Abstract. In the last few years we have concentrated our research efforts on new threats to the computing infrastructure that are the result of combining malicious software (malwar...
Adam Young, Moti Yung
CTRSA
2005
Springer
91views Cryptology» more  CTRSA 2005»
14 years 2 months ago
Design and Analysis of Password-Based Key Derivation Functions
Frances F. Yao, Yiqun Lisa Yin
CTRSA
2005
Springer
92views Cryptology» more  CTRSA 2005»
14 years 2 months ago
Update on SHA-1
Abstract. We report on the experiments we performed in order to assess the security of SHA-1 against the attack by Chabaud and Joux [5]. We present some ideas for optimizations of ...
Vincent Rijmen, Elisabeth Oswald
CTRSA
2005
Springer
88views Cryptology» more  CTRSA 2005»
14 years 2 months ago
Sub-linear Queries Statistical Databases: Privacy with Power
Abstract. We consider a statistical database in which a trusted administrator introduces noise to the query responses with the goal of maintaining privacy of individual database en...
Cynthia Dwork