Sciweavers

EUROCRYPT
2007
Springer
14 years 3 months ago
Cryptanalysis of SFLASH with Slightly Modified Parameters
SFLASH is a signature scheme which belongs to a family of multivariate schemes proposed by Patarin et al. in 1998 [9]. The SFLASH scheme itself has been designed in 2001 [8] and ha...
Vivien Dubois, Pierre-Alain Fouque, Jacques Stern
EUROCRYPT
2007
Springer
14 years 3 months ago
Round-Efficient Secure Computation in Point-to-Point Networks
Essentially all work studying the round complexity of secure computation assumes broadcast as an atomic primitive. Protocols constructed under this assumption tend to have very poo...
Jonathan Katz, Chiu-Yuen Koo
EUROCRYPT
2007
Springer
14 years 3 months ago
An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries
We show an efficient secure two-party protocol, based on Yao's construction, which provides security against malicious adversaries. Yao's original protocol is only secur...
Yehuda Lindell, Benny Pinkas
EUROCRYPT
2007
Springer
14 years 3 months ago
A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security
Motivated by the quest for reducing assumptions in security proofs in cryptography, this paper is concerned with designing efficient symmetric encryption and authentication schemes...
Ueli M. Maurer, Johan Sjödin
EUROCRYPT
2007
Springer
14 years 3 months ago
Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy
This paper shows that Py and Pypy are practically insecure. If one key is used with about 216 IVs with special differences, with high probability two identical keystreams will appe...
Hongjun Wu, Bart Preneel
PQCRYPTO
2010
152views Cryptology» more  PQCRYPTO 2010»
14 years 3 months ago
Grover vs. McEliece
This paper shows that quantum information-set-decoding attacks are much faster than non-quantum information-set-decoding attacks.
Daniel J. Bernstein
PQCRYPTO
2010
156views Cryptology» more  PQCRYPTO 2010»
14 years 3 months ago
Selecting Parameters for the Rainbow Signature Scheme
Abstract. Multivariate public key cryptography is one of the main approaches to guarantee the security of communication in a post-quantum world. One of the most promising candidate...
Albrecht Petzoldt, Stanislav Bulygin, Johannes Buc...
FC
2010
Springer
155views Cryptology» more  FC 2010»
14 years 3 months ago
Embedded SFE: Offloading Server and Network Using Hardware Tokens
Kimmo Järvinen, Vladimir Kolesnikov, Ahmad-Re...
FC
2010
Springer
209views Cryptology» more  FC 2010»
14 years 3 months ago
Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy
We introduce the novel notion of Verifiable Encryption of Chameleon Signatures (VECS), and then use it to design a three-round abuse-free optimistic contract signing protocol. Key...
Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Qianhong...
FC
2010
Springer
191views Cryptology» more  FC 2010»
14 years 3 months ago
Using Sphinx to Improve Onion Routing Circuit Construction
This paper presents compact message formats for onion routing circuit construction using the Sphinx methodology developed for mixes. We significantly compress the circuit constru...
Aniket Kate, Ian Goldberg