Sciweavers

EUROCRYPT
1997
Springer
14 years 1 months ago
Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals
We propose a concept for a worldwide information security infrastructure that protects law-abiding citizens, but not criminals, even if the latter use it fraudulently (i.e. when no...
Eric R. Verheul, Henk C. A. van Tilborg
EUROCRYPT
1997
Springer
14 years 1 months ago
A New Public-Key Cryptosystem
This paper describes a new public-key cryptosystem where the ciphertext is obtained by multiplying the public-keys indexed by the message bits and the cleartext is recovered by fac...
David Naccache, Jacques Stern
EUROCRYPT
1997
Springer
14 years 1 months ago
Distributed "Magic Ink" Signatures
Markus Jakobsson, Moti Yung
EUROCRYPT
1997
Springer
14 years 1 months ago
Cryptanalysis of Alleged A5 Stream Cipher
Jovan Dj. Golic
EUROCRYPT
1997
Springer
14 years 1 months ago
A New Paradigm for Collision-Free Hashing: Incrementality at Reduced Cost
Mihir Bellare, Daniele Micciancio
EUROCRYPT
1997
Springer
14 years 1 months ago
Round-Optimal Zero-Knowledge Arguments Based on any One-Way Function
Mihir Bellare, Markus Jakobsson, Moti Yung
EUROCRYPT
1997
Springer
14 years 1 months ago
The GCHQ Protocol and Its Problems
The UK government is fielding an architecture for secure electronic mail based on the NSA’s Message Security Protocol, with a key escrow scheme inspired by Diffie-Hellman. Attem...
Ross J. Anderson, Michael Roe
EUROCRYPT
1997
Springer
14 years 1 months ago
Two Attacks on Reduced IDEA
Johan Borst, Lars R. Knudsen, Vincent Rijmen
CRYPTO
1997
Springer
156views Cryptology» more  CRYPTO 1997»
14 years 1 months ago
Fast and Secure Hashing Based on Codes
This paper considers hash functions based on block ciphers. It presents a new attack on the compression function of the 128-bit hash function MDC-4 using DES with a complexity far ...
Lars R. Knudsen, Bart Preneel