Sciweavers

ACISP
2010
Springer
14 years 2 months ago
On Multidimensional Linear Cryptanalysis
Phuong Ha Nguyen, Lei Wei, Huaxiong Wang, San Ling
ACISP
2010
Springer
14 years 2 months ago
A Multi-trapdoor Commitment Scheme from the RSA Assumption
Ryo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka
ACISP
2010
Springer
14 years 2 months ago
Identity-Based Chameleon Hash Scheme without Key Exposure
In this paper, we propose the first identity-based chameleon hash scheme without key exposure, which gives a positive answer for the open problem introduced by Ateniese and de Mede...
Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo ...
ACISP
2010
Springer
14 years 2 months ago
Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems
Marek Klonowski, Michal Koza, Miroslaw Kutylowski
ACISP
2010
Springer
14 years 2 months ago
On Unbiased Linear Approximations
Jonathan Etrog, Matthew J. B. Robshaw
ACISP
2010
Springer
14 years 2 months ago
Additive Combinatorics and Discrete Logarithm Based Range Protocols
Rafik Chaabouni, Helger Lipmaa, Abhi Shelat
ACISP
2010
Springer
14 years 2 months ago
One-Time-Password-Authenticated Key Exchange
To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many pa...
Kenneth G. Paterson, Douglas Stebila