Sciweavers

ACISP
2010
Springer
13 years 10 months ago
On Multidimensional Linear Cryptanalysis
Phuong Ha Nguyen, Lei Wei, Huaxiong Wang, San Ling
ACISP
2010
Springer
13 years 10 months ago
A Multi-trapdoor Commitment Scheme from the RSA Assumption
Ryo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka
ACISP
2010
Springer
13 years 10 months ago
Identity-Based Chameleon Hash Scheme without Key Exposure
In this paper, we propose the first identity-based chameleon hash scheme without key exposure, which gives a positive answer for the open problem introduced by Ateniese and de Mede...
Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo ...
ACISP
2010
Springer
13 years 10 months ago
Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems
Marek Klonowski, Michal Koza, Miroslaw Kutylowski
ACISP
2010
Springer
13 years 10 months ago
On Unbiased Linear Approximations
Jonathan Etrog, Matthew J. B. Robshaw
ACISP
2010
Springer
13 years 10 months ago
Additive Combinatorics and Discrete Logarithm Based Range Protocols
Rafik Chaabouni, Helger Lipmaa, Abhi Shelat
ACISP
2010
Springer
13 years 10 months ago
One-Time-Password-Authenticated Key Exchange
To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many pa...
Kenneth G. Paterson, Douglas Stebila