Sciweavers

CTRSA
2008
Springer
137views Cryptology» more  CTRSA 2008»
13 years 10 months ago
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange
Public key based authentication and key exchange protocols are not usually designed with privacy in mind and thus involve cleartext exchanges of identities and certificates before ...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
CTRSA
2008
Springer
150views Cryptology» more  CTRSA 2008»
13 years 10 months ago
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1
Abstract. Camellia and MISTY1 are Feistel block ciphers. In this paper, we observe that, when conducting impossible differential cryptanalysis on Camellia and MISTY1, their round s...
Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunke...
CTRSA
2008
Springer
95views Cryptology» more  CTRSA 2008»
13 years 10 months ago
Separation Results on the "One-More" Computational Problems
In 2001, Bellare, Namprempre, Pointcheval and Semanko introduced
Emmanuel Bresson, Jean Monnerat, Damien Vergnaud
CTRSA
2008
Springer
113views Cryptology» more  CTRSA 2008»
13 years 10 months ago
Aggregate Message Authentication Codes
We propose and investigate the notion of aggregate message authentication codes (MACs) which have the property that multiple MAC tags, computed by (possibly) different senders on ...
Jonathan Katz, Andrew Y. Lindell
CTRSA
2008
Springer
109views Cryptology» more  CTRSA 2008»
13 years 10 months ago
Super-Efficient Verification of Dynamic Outsourced Databases
We develop new algorithmic and cryptographic techniques for authenticating the results of queries over databases that are outsourced to an untrusted responder. We depart from previ...
Michael T. Goodrich, Roberto Tamassia, Nikos Trian...
CTRSA
2008
Springer
160views Cryptology» more  CTRSA 2008»
13 years 10 months ago
Fault Analysis Study of IDEA
We present a study of several fault attacks against the block cipher IDEA. Such a study is particularly interesting because of the target cipher's specific property to employ ...
Christophe Clavier, Benedikt Gierlichs, Ingrid Ver...
CTRSA
2008
Springer
134views Cryptology» more  CTRSA 2008»
13 years 10 months ago
An Efficient Protocol for Fair Secure Two-Party Computation
In the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withstanding semi-honest adversaries, which is based on so-called garbled circuits...
Mehmet S. Kiraz, Berry Schoenmakers
CTRSA
2008
Springer
197views Cryptology» more  CTRSA 2008»
13 years 10 months ago
Legally-Enforceable Fairness in Secure Two-Party Computation
In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their private inputs. The computation should...
Andrew Y. Lindell
CTRSA
2008
Springer
130views Cryptology» more  CTRSA 2008»
13 years 10 months ago
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework
ended abstract appeared in Proceedings of the Cryptographers' Track at the RSA Conference (CT-RSA '08)
Michel Abdalla, Dario Catalano, Céline Chev...
CTRSA
2008
Springer
118views Cryptology» more  CTRSA 2008»
13 years 10 months ago
Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes
Pierre-Alain Fouque, Gaëtan Leurent