Sciweavers

ACISP
2010
Springer
13 years 10 months ago
Second-Preimage Analysis of Reduced SHA-1
Many applications using cryptographic hash functions do not require collision resistance, but some kind of preimage resistance. That's also the reason why the widely used SHA-...
Christian Rechberger
ACISP
2010
Springer
14 years 2 months ago
Security Estimates for Quadratic Field Based Cryptosystems
Abstract. We describe implementations for solving the discrete logarithm problem in the class group of an imaginary quadratic field and in the infrastructure of a real quadratic fi...
Jean-François Biasse, Michael J. Jacobson, ...
ACISP
2010
Springer
14 years 2 months ago
Predicate-Based Key Exchange
We provide the first description of and security model for authenticated key exchange protocols with predicate-based authentication. In addition to the standard goal of session ke...
James Birkett, Douglas Stebila
ACISP
2010
Springer
14 years 2 months ago
The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key
Jun Shao, Min Feng, Bin Zhu, Zhenfu Cao, Peng Liu
ACISP
2010
Springer
14 years 2 months ago
Attribute-Based Authenticated Key Exchange
We introduce the concept of attribute-based authenticated key exchange (AB-AKE) within the framework of ciphertext policy attribute-based systems. A notion of AKE-security for AB-A...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...
ACISP
2010
Springer
14 years 2 months ago
Solving Generalized Small Inverse Problems
We introduce a "generalized small inverse problem (GSIP)" and present an algorithm for solving this problem. GSIP is formulated as finding small solutions of f(x0, x1, . ...
Noboru Kunihiro
ACISP
2010
Springer
14 years 2 months ago
Some Observations on Indifferentiability
Ewan Fleischmann, Michael Gorski, Stefan Lucks
ACISP
2010
Springer
14 years 2 months ago
Distinguishers for the Compression Function and Output Transformation of Hamsi-256
Hamsi is one of 14 remaining candidates in NIST's Hash Competition for the future hash standard SHA-3. Until now, little analysis has been published on its resistance to diffe...
Jean-Philippe Aumasson, Emilia Käsper, Lars R...
ACISP
2010
Springer
14 years 2 months ago
Adaptive and Composable Non-committing Encryptions
Huafei Zhu, Tadashi Araragi, Takashi Nishide, Koui...