Sciweavers

CRYPTO
2007
Springer
110views Cryptology» more  CRYPTO 2007»
14 years 6 months ago
Cryptography in the Multi-string Model
The common random string model introduced by Blum, Feldman and Micali permits the construction of cryptographic protocols that are provably impossible to realize in the standard m...
Jens Groth, Rafail Ostrovsky
CRYPTO
2007
Springer
133views Cryptology» more  CRYPTO 2007»
14 years 6 months ago
On Secure Multi-party Computation in Black-Box Groups
Abstract. We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function fG(x1, . . . , xn) = x1 · x...
Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxio...
CRYPTO
2007
Springer
109views Cryptology» more  CRYPTO 2007»
14 years 6 months ago
A Tight High-Order Entropic Quantum Uncertainty Relation with Applications
We derive a new entropic quantum uncertainty relation involving min-entropy. The relation is tight and can be applied in various quantum-cryptographic settings. Protocols for quant...
Ivan Damgård, Serge Fehr, Renato Renner, Lou...
CRYPTO
2007
Springer
129views Cryptology» more  CRYPTO 2007»
14 years 6 months ago
Rerandomizable RCCA Encryption
Manoj Prabhakaran, Mike Rosulek
CRYPTO
2007
Springer
102views Cryptology» more  CRYPTO 2007»
14 years 6 months ago
Improved Analysis of Kannan's Shortest Lattice Vector Algorithm
Guillaume Hanrot, Damien Stehlé
CRYPTO
2007
Springer
88views Cryptology» more  CRYPTO 2007»
14 years 6 months ago
Invertible Universal Hashing and the TET Encryption Mode
This work describes a mode of operation, TET, that turns a regular block cipher into a length-preserving enciphering scheme for messages of (almost) arbitrary length. When using a...
Shai Halevi
CRYPTO
2007
Springer
99views Cryptology» more  CRYPTO 2007»
14 years 6 months ago
Practical Cryptanalysis of SFLASH
In this paper, we present a practical attack on the signature scheme SFLASH proposed by Patarin, Goubin and Courtois in 2001 following a design they had introduced in 1998. The att...
Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Ja...
CRYPTO
2007
Springer
133views Cryptology» more  CRYPTO 2007»
14 years 6 months ago
Amplifying Collision Resistance: A Complexity-Theoretic Treatment
We initiate a complexity-theoretic treatment of hardness amplification for collision-resistant hash functions, namely the transformation of weakly collision-resistant hash functio...
Ran Canetti, Ronald L. Rivest, Madhu Sudan, Luca T...
CRYPTO
2007
Springer
106views Cryptology» more  CRYPTO 2007»
14 years 6 months ago
Information Security Economics - and Beyond
The economics of information security has recently become a thriving and fast-moving discipline. As distributed systems are assembled from machines belonging to principals with div...
Ross Anderson, Tyler Moore