Sciweavers

CRYPTO
1991
Springer
105views Cryptology» more  CRYPTO 1991»
14 years 3 days ago
Universal Hashing and Authentication Codes
In this paper, we study the application of universal hashingto the construction of unconditionally secure authentication codes without secrecy. This idea is most useful when the nu...
Douglas R. Stinson
CRYPTO
1991
Springer
150views Cryptology» more  CRYPTO 1991»
14 years 3 days ago
CM-Curves with Good Cryptographic Properties
Our purpose is to describe elliptic curves with complex multiplication which in characteristic 2 have the following useful properties for constructing Diffie-HeUman type cryptosys...
Neal Koblitz
CRYPTO
1991
Springer
144views Cryptology» more  CRYPTO 1991»
14 years 3 days ago
Interactive Proofs with Space Bounded Provers
Recent results in interactive proof systems [?][?] [?] seem to indicate that it is easier for a prover in a single prover interactive proof system to cheat the verifier than it i...
Joe Kilian, Ronitt Rubinfeld
CRYPTO
1991
Springer
87views Cryptology» more  CRYPTO 1991»
14 years 3 days ago
Practical Quantum Oblivious Transfer
Charles H. Bennett, Gilles Brassard, Claude Cr&eac...
CRYPTO
1991
Springer
98views Cryptology» more  CRYPTO 1991»
14 years 3 days ago
A Calculus for Access Control in Distributed Systems
Martín Abadi, Michael Burrows, Butler W. La...
ASIACRYPT
1991
Springer
14 years 3 days ago
Revealing Information with Partial Period Correlations (Extended Abstract)
g Information with Partial Period Correlations (extendedabstract) Andrew Klapper Mark Goresky Northeastern University, College of Computer Science, Boston, MA 02115, U.S.A.
Andrew Klapper, Mark Goresky
ASIACRYPT
1991
Springer
14 years 3 days ago
Collisions for Schnorr's Hash Function FFT-Hash Presented at Crypto '91
A method is described to generate collisions for the hash function FFT-Hash that
Joan Daemen, Antoon Bosselaers, René Govaer...
ASIACRYPT
1991
Springer
14 years 3 days ago
Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI
Lawrence Brown, Matthew Kwan, Josef Pieprzyk, Jenn...
ASIACRYPT
1991
Springer
14 years 3 days ago
Limitations of the Even-Mansour Construction
In [1] a construction of a block cipher from a single pseudorandom permutation is proposed. In a complexity theoretical setting they prove that this scheme is secure against a pol...
Joan Daemen