Sciweavers

CRYPTO
1993
Springer
131views Cryptology» more  CRYPTO 1993»
14 years 3 months ago
Hash Functions Based on Block Ciphers: A Synthetic Approach
Constructions for hash functions based on a block cipher are studied where the size of the hashcode is equal to the block length of the block cipher and where the key size is appro...
Bart Preneel, René Govaerts, Joos Vandewall...
CRYPTO
1993
Springer
110views Cryptology» more  CRYPTO 1993»
14 years 3 months ago
Secret-Key Agreement without Public-Key Cryptography
Frank Thomson Leighton, Silvio Micali
CRYPTO
1993
Springer
110views Cryptology» more  CRYPTO 1993»
14 years 3 months ago
Secret Sharing Made Short
Hugo Krawczyk
CRYPTO
1993
Springer
137views Cryptology» more  CRYPTO 1993»
14 years 3 months ago
Broadcast Encryption
A broadcast encryption scheme allows the sender to securely distribute data to a dynamically changing set of users over an insecure channel. One of the most challenging settings fo...
Amos Fiat, Moni Naor
CRYPTO
1993
Springer
104views Cryptology» more  CRYPTO 1993»
14 years 3 months ago
Extensions of Single-term Coins
We show how the electronic cash scheme in [Fer93a] can be extended to provide n-spendable coins. Furthermore, we show how observers can be incorporated in the protocols to provide...
Niels Ferguson
CRYPTO
1993
Springer
117views Cryptology» more  CRYPTO 1993»
14 years 3 months ago
On the Factorization of RSA-120
Thomas F. Denny, Bruce Dodson, Arjen K. Lenstra, M...
CRYPTO
1993
Springer
95views Cryptology» more  CRYPTO 1993»
14 years 3 months ago
Weak Keys for IDEA
Large classes of weak keys have been found for the block cipher algorithm IDEA, previously known as IPES [2]. IDEA has a 128bit key and encrypts blocks of 64 bits. For a class of 2...
Joan Daemen, René Govaerts, Joos Vandewalle
CRYPTO
1993
Springer
130views Cryptology» more  CRYPTO 1993»
14 years 3 months ago
Discreet Solitary Games
Cryptographic techniques have been used intensively in the past to show how to play multiparty games in an adversarial scenario. We now investigate the cryptographic power of a dec...
Claude Crépeau, Joe Kilian
CRYPTO
1993
Springer
159views Cryptology» more  CRYPTO 1993»
14 years 3 months ago
Comparison of Three Modular Reduction Functions
Three modular reduction algorithms for large integers are compared with respect to their performance in portable software: the classical algorithm, Barrett’s algorithm and Montgo...
Antoon Bosselaers, René Govaerts, Joos Vand...
CRYPTO
1993
Springer
104views Cryptology» more  CRYPTO 1993»
14 years 3 months ago
Entity Authentication and Key Distribution
Mihir Bellare, Phillip Rogaway