Sciweavers

SACRYPT
2009
Springer
155views Cryptology» more  SACRYPT 2009»
14 years 2 months ago
Practical Collisions for SHAMATA-256
In this paper, we present a collision attack on the SHA-3 submission SHAMATA. SHAMATA is a stream cipher-like hash function design with components of the AES, and it is one of the ...
Sebastiaan Indesteege, Florian Mendel, Bart Prenee...
SACRYPT
2009
Springer
141views Cryptology» more  SACRYPT 2009»
14 years 2 months ago
Cryptanalysis of Dynamic SHA(2)
In this paper, we analyze the hash functions Dynamic SHA and Dynamic SHA2, which have been selected as first round candidates in the NIST hash function competition. These hash fun...
Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan ...
SACRYPT
2009
Springer
212views Cryptology» more  SACRYPT 2009»
14 years 2 months ago
Compact McEliece Keys from Goppa Codes
The classical McEliece cryptosystem is built upon the class of Goppa codes, which remains secure to this date in contrast to many other families of codes but leads to very large pu...
Rafael Misoczki, Paulo S. L. M. Barreto
SACRYPT
2009
Springer
150views Cryptology» more  SACRYPT 2009»
14 years 2 months ago
Information Theoretically Secure Multi Party Set Intersection Re-visited
We re-visit the problem of secure multiparty set intersection in information theoretic settings. In [16], Li et.al have proposed a protocol for multiparty set intersection problem...
Arpita Patra, Ashish Choudhary, C. Pandu Rangan
PAIRING
2009
Springer
119views Cryptology» more  PAIRING 2009»
14 years 2 months ago
Compact E-Cash and Simulatable VRFs Revisited
Abstract. Efficient non-interactive zero-knowledge proofs are a powerful tool for solving many cryptographic problems. We apply the recent Groth-Sahai (GS) proof system for pairing...
Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, A...
PAIRING
2009
Springer
142views Cryptology» more  PAIRING 2009»
14 years 2 months ago
Strongly Secure Certificateless Key Agreement
Georg Lippold, Colin Boyd, Juan Manuel Gonzá...
PAIRING
2009
Springer
162views Cryptology» more  PAIRING 2009»
14 years 2 months ago
On the Security of Pairing-Friendly Abelian Varieties over Non-prime Fields
Naomi Benger, Manuel Charlemagne, David Mandell Fr...
PAIRING
2009
Springer
125views Cryptology» more  PAIRING 2009»
14 years 2 months ago
Universally Composable Adaptive Priced Oblivious Transfer
Alfredo Rial, Markulf Kohlweiss, Bart Preneel
PAIRING
2009
Springer
117views Cryptology» more  PAIRING 2009»
14 years 2 months ago
Identity Based Group Signatures from Hierarchical Identity-Based Encryption
A number of previous papers explored the notion of identity-based group signature. We present a generic construction of identity-based group signatures. Our construction is based o...
Nigel P. Smart, Bogdan Warinschi