Sciweavers

CRYPTO
1992
Springer
181views Cryptology» more  CRYPTO 1992»
14 years 3 months ago
Fair Public-Key Cryptosystems
Abstract Joseph Kilian NEC Research Princeton, NJ 08540 Tom Leighton Mathematics Department Laboratory for Computer Science MIT Cambridge, MA 02139 August 17, 1994 Fair" Publ...
Silvio Micali
CRYPTO
1992
Springer
154views Cryptology» more  CRYPTO 1992»
14 years 3 months ago
Massively Parallel Computation of Discrete Logarithms
Numerous cryptosystems have been designed to be secure under the assumption that the computation of discrete logarithms is infeasible. This paper reports on an aggressive attempt ...
Daniel M. Gordon, Kevin S. McCurley
CRYPTO
1992
Springer
138views Cryptology» more  CRYPTO 1992»
14 years 3 months ago
Designing and Detecting Trapdoors for Discrete Log Cryptosystems
Using a number field sieve, discrete logarithms modulo primes of special forms can be found faster than standard primes. This has raised concerns about trapdoors in discrete log cr...
Daniel M. Gordon
CRYPTO
1992
Springer
125views Cryptology» more  CRYPTO 1992»
14 years 3 months ago
Pricing via Processing or Combatting Junk Mail
Cynthia Dwork, Moni Naor
CRYPTO
1992
Springer
140views Cryptology» more  CRYPTO 1992»
14 years 3 months ago
Wallet Databases with Observers
David Chaum, Torben P. Pedersen
CRYPTO
1992
Springer
150views Cryptology» more  CRYPTO 1992»
14 years 3 months ago
Partially-Bent Functions
Claude Carlet
CRYPTO
1992
Springer
156views Cryptology» more  CRYPTO 1992»
14 years 3 months ago
DES is not a Group
We prove that the set of DES permutations (encryption and decryption for each DES key) is not closed under functional composition. This implies that, in general, multiple DES-encry...
Keith W. Campbell, Michael J. Wiener
CRYPTO
1992
Springer
168views Cryptology» more  CRYPTO 1992»
14 years 3 months ago
Threshold Schemes with Disenrollment
Blakley, Blakley, Chan and Massey conjectured a lower bound on the entropy of broadcast messages in threshold schemes with disenrollment. In an effort to examine the conjecture, w...
Bob Blakley, G. R. Blakley, Agnes Hui Chan, James ...
ASIACRYPT
1992
Springer
14 years 3 months ago
HAVAL - A One-Way Hashing Algorithm with Variable Length of Output
Yuliang Zheng, Josef Pieprzyk, Jennifer Seberry