Sciweavers

CRYPTO
2003
Springer
105views Cryptology» more  CRYPTO 2003»
14 years 5 months ago
On Memory-Bound Functions for Fighting Spam
In 1992, Dwork and Naor proposed that e-mail messages be accompanied by easy-to-check proofs of computational effort in order to discourage junk e-mail, now known as spam. They pro...
Cynthia Dwork, Andrew Goldberg, Moni Naor
CRYPTO
2003
Springer
156views Cryptology» more  CRYPTO 2003»
14 years 5 months ago
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback
Many popular stream ciphers apply a filter/combiner to the state of one or several LFSRs. Algebraic attacks on such ciphers [10, 11] are possible, if there is a multivariate relat...
Nicolas Courtois
CRYPTO
2003
Springer
124views Cryptology» more  CRYPTO 2003»
14 years 5 months ago
Primality Proving via One Round in ECPP and One Iteration in AKS
On August 2002, Agrawal, Kayal and Saxena announced the first deterministic and polynomial time primality testing algorithm. For an input n, the AKS algorithm runs in heuristic t...
Qi Cheng
CRYPTO
2003
Springer
98views Cryptology» more  CRYPTO 2003»
14 years 5 months ago
A Message Authentication Code Based on Unimodular Matrix Groups
We present a new construction based on modular groups. A novel element of our construction is to embed each input into a sequence of matrices with determinant ±1, the product of w...
Matthew Cary, Ramarathnam Venkatesan
CRYPTO
2003
Springer
90views Cryptology» more  CRYPTO 2003»
14 years 5 months ago
Password Interception in a SSL/TLS Channel
Simple password authentication is often used e.g. from an email software application to a remote IMAP server. This is frequently done in a protected peer-to-peer tunnel, e.g. by SS...
Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Ma...
CRYPTO
2003
Springer
93views Cryptology» more  CRYPTO 2003»
14 years 5 months ago
Universal Composition with Joint State
Abstract. Cryptographic systems often involve running multiple concurrent instances of some protocol, where the instances have some amount of joint state and randomness. (Examples ...
Ran Canetti, Tal Rabin
CRYPTO
2003
Springer
93views Cryptology» more  CRYPTO 2003»
14 years 5 months ago
Relaxing Chosen-Ciphertext Security
Ran Canetti, Hugo Krawczyk, Jesper Buus Nielsen
CRYPTO
2003
Springer
101views Cryptology» more  CRYPTO 2003»
14 years 5 months ago
The Impact of Decryption Failures on the Security of NTRU Encryption
NTRUEncrypt is unusual among public-key cryptosystems in that, with standard parameters, validly generated ciphertexts can fail to decrypt. This affects the provable security prop...
Nick Howgrave-Graham, Phong Q. Nguyen, David Point...
CRYPTO
2003
Springer
111views Cryptology» more  CRYPTO 2003»
14 years 5 months ago
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication
In this paper we present a very practical ciphertext-only cryptanalysis of GSM (Global System for Mobile communications) encrypted communication, and various active attacks on the ...
Elad Barkan, Eli Biham, Nathan Keller
CRYPTO
2003
Springer
92views Cryptology» more  CRYPTO 2003»
14 years 5 months ago
Derandomization in Cryptography
We give two applications of Nisan–Wigderson-type (“non-cryptographic”) pseudorandom generators in cryptography. Specifically, assuming the existence of an appropriate NW-ty...
Boaz Barak, Shien Jin Ong, Salil P. Vadhan