Sciweavers

ASIACRYPT
2004
Springer
14 years 6 months ago
The XL-Algorithm and a Conjecture from Commutative Algebra
The “XL-algorithm” is a computational method to solve overdetermined systems of polynomial equations which is based on a generalization of the well-known method of linearizatio...
Claus Diem
ASIACRYPT
2004
Springer
14 years 6 months ago
Cryptanalysis of Bluetooth Keystream Generator Two-Level E0
Yi Lu 0002, Serge Vaudenay
ASIACRYPT
2004
Springer
14 years 6 months ago
Privacy in Non-private Environments
Markus Bläser, Andreas Jakoby, Maciej Liskiew...
ASIACRYPT
2004
Springer
14 years 6 months ago
Strong Conditional Oblivious Transfer and Computing on Intervals
We consider the problem of securely computing the Greater Than (GT) predicate and its generalization – securely determining membership in a union of intervals. We approach these ...
Ian F. Blake, Vladimir Kolesnikov
ASIACRYPT
2004
Springer
14 years 6 months ago
Towards Plaintext-Aware Public-Key Encryption Without Random Oracles
Mihir Bellare, Adriana Palacio
ASIACRYPT
2004
Springer
14 years 6 months ago
Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes
An untraceable fair network payment protocol is proposed by Wang in Asiacrypt’03, which employs the existent techniques of the offline untraceable cash and a new technique calle...
Feng Bao
ASIACRYPT
2004
Springer
14 years 6 months ago
How Far Can We Go Beyond Linear Cryptanalysis?
Abstract. Several generalizations of linear cryptanalysis have been proposed in the past, as well as very similar attacks in a statistical point of view. In this paper, we define ...
Thomas Baignères, Pascal Junod, Serge Vaude...
ASIACRYPT
2004
Springer
14 years 6 months ago
Secret Handshakes from CA-Oblivious Encryption
Secret handshakes were recently introduced [BDS+ 03] to allow members of the same group to authenticate each other secretly, in the sense that someone who is not a group member ca...
Claude Castelluccia, Stanislaw Jarecki, Gene Tsudi...
ASIACRYPT
2004
Springer
14 years 6 months ago
Sieving Using Bucket Sort
This paper proposes a new sieving algorithm that employs a bucket sort as a part of a factoring algorithm such as the number field sieve. The sieving step requires an enormous num...
Kazumaro Aoki, Hiroki Ueda