Sciweavers

IMA
2001
Springer
76views Cryptology» more  IMA 2001»
14 years 4 months ago
Undetachable Threshold Signatures
Niklas Borselius, Chris J. Mitchell, Aaron Wilson
IMA
2001
Springer
79views Cryptology» more  IMA 2001»
14 years 4 months ago
On Rabin-Type Signatures
Abstract. This paper specializes the signature forgery by Coron, Naccache and Stern (1999) to Rabin-type systems. We present a variation in which the adversary may derive the priva...
Marc Joye, Jean-Jacques Quisquater
IMA
2001
Springer
79views Cryptology» more  IMA 2001»
14 years 4 months ago
A New Undeniable Signature Scheme Using Smart Cards
Lee Jongkook, Ryu Shiryong, Kim Jeungseop, Yoo Kee...
FSE
2001
Springer
190views Cryptology» more  FSE 2001»
14 years 4 months ago
ZIP Attacks with Reduced Known Plaintext
Abstract. Biham and Kocher demonstrated that the PKZIP stream cipher was weak and presented an attack requiring thirteen bytes of plaintext. The deflate algorithm “zippers” no...
Michael Stay
FSE
2001
Springer
121views Cryptology» more  FSE 2001»
14 years 4 months ago
Producing Collisions for PANAMA
PANAMA is a cryptographic module that was presented at the FSE Workshop in ’98 by Joan Daemen and Craig Clapp. It can serve both as a stream cipher and as a cryptographic hash fu...
Vincent Rijmen, Bart Van Rompay, Bart Preneel, Joo...
FSE
2001
Springer
116views Cryptology» more  FSE 2001»
14 years 4 months ago
NESSIE: A European Approach to Evaluate Cryptographic Algorithms
The NESSIE project (New European Schemes for Signature, Integrity and Encryption) intends to put forward a portfolio containing the next generation of cryptographic primitives. The...
Bart Preneel
FSE
2001
Springer
85views Cryptology» more  FSE 2001»
14 years 4 months ago
New Results on the Pseudorandomness of Some Blockcipher Constructions
In this paper, we describe new results on the security, in the Luby-Rackoff paradigm, of two modified Feistel constructions, namely the L-scheme, a construction used at various l...
Henri Gilbert, Marine Minier
FSE
2001
Springer
117views Cryptology» more  FSE 2001»
14 years 4 months ago
Differential Cryptanalysis of Q
Eli Biham, Vladimir Furman, Michal Misztal, Vincen...
FSE
2001
Springer
109views Cryptology» more  FSE 2001»
14 years 4 months ago
Bias in the LEVIATHAN Stream Cipher
We show two methods of distinguishing the LEVIATHAN stream cipher from a random stream using 236 bytes of output and proportional effort; both arise from compression within the ci...
Paul Crowley, Stefan Lucks