Sciweavers

CRYPTO
2004
Springer
112views Cryptology» more  CRYPTO 2004»
14 years 5 months ago
Feistel Schemes and Bi-linear Cryptanalysis
Abstract. In this paper we introduce the method of bi-linear cryptanalysis (BLC), designed specifically to attack Feistel ciphers. It allows to construct periodic biased character...
Nicolas Courtois
CRYPTO
2004
Springer
109views Cryptology» more  CRYPTO 2004»
14 years 5 months ago
On the Bounded Sum-of-Digits Discrete Logarithm Problem in Finite Fields
In this paper, we study the bounded sum-of-digits discrete logarithm problem in finite fields. Our results concern primarily with
Qi Cheng
CRYPTO
2004
Springer
127views Cryptology» more  CRYPTO 2004»
14 years 5 months ago
IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange
Abstract. In this paper we revisit one of the most popular passwordbased key exchange protocols, namely the OKE (for Open Key Exchange) scheme, proposed by Luck in 1997. Our result...
Dario Catalano, David Pointcheval, Thomas Pornin
CRYPTO
2004
Springer
118views Cryptology» more  CRYPTO 2004»
14 years 5 months ago
Short Group Signatures
ded abstract of this paper is to appear in Advances in Cryptology—CRYPTO 2004, Springer-Verlag. We construct a short group signature scheme. Signatures in our scheme are approxi...
Dan Boneh, Xavier Boyen, Hovav Shacham
CRYPTO
2004
Springer
138views Cryptology» more  CRYPTO 2004»
14 years 5 months ago
Secure Identity Based Encryption Without Random Oracles
We construct two efficient Identity Based Encryption (IBE) systems that are selective identity secure without the random oracle model. Selective identity secure IBE is a slightly w...
Dan Boneh, Xavier Boyen
CRYPTO
2004
Springer
128views Cryptology» more  CRYPTO 2004»
14 years 5 months ago
Faster Correlation Attack on Bluetooth Keystream Generator E0
We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correla...
Yi Lu 0002, Serge Vaudenay
CRYPTO
2004
Springer
130views Cryptology» more  CRYPTO 2004»
14 years 5 months ago
Signature Schemes and Anonymous Credentials from Bilinear Maps
Abstract. We propose a new and efficient signature scheme that is provably secure in the plain model. The security of our scheme is based on a discrete-logarithm-based assumption p...
Jan Camenisch, Anna Lysyanskaya
CRYPTO
2004
Springer
162views Cryptology» more  CRYPTO 2004»
14 years 5 months ago
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
We propose the first distributed discrete-log key generation (DLKG) protocol from scratch which is adaptively-secure in the non-erasure model, and at the same time completely avoi...
Masayuki Abe, Serge Fehr