Sciweavers

AFRICACRYPT
2008
Springer
14 years 6 months ago
A Brief History of Provably-Secure Public-Key Encryption
Public-key encryption schemes are a useful and interesting field of cryptographic study. The ultimate goal for the cryptographer in the field of public-key encryption would be th...
Alexander W. Dent
AFRICACRYPT
2008
Springer
14 years 6 months ago
Attribute-Based Broadcast Encryption Scheme Made Efficient
David Lubicz, Thomas Sirvent
AFRICACRYPT
2008
Springer
14 years 6 months ago
Correlated Keystreams in Moustique
Moustique is one of the sixteen finalists in the eSTREAM stream cipher project. Unlike the other finalists it is a self-synchronising cipher and therefore offers very different...
Emilia Käsper, Vincent Rijmen, Tor E. Bj&osla...
AFRICACRYPT
2008
Springer
14 years 6 months ago
Implementation of the AES-128 on Virtex-5 FPGAs
Abstract. This paper presents an updated implementation of the Advanced Encryption Standard (AES) on the recent Xilinx Virtex-5 FPGAs. We show how a modified slice structure in th...
Philippe Bulens, François-Xavier Standaert,...
AFRICACRYPT
2008
Springer
14 years 6 months ago
Robust Threshold Schemes Based on the Chinese Remainder Theorem
Kamer Kaya, Ali Aydin Selçuk
AFRICACRYPT
2008
Springer
14 years 6 months ago
Lower Bounds for Subset Cover Based Broadcast Encryption
Per Austrin, Gunnar Kreitz
AFRICACRYPT
2008
Springer
14 years 6 months ago
On Compressible Pairings and Their Computation
Abstract. In this paper we provide explicit formulæ to compute bilinear pairings in compressed form. We indicate families of curves where the proposed compressed computation metho...
Michael Naehrig, Paulo S. L. M. Barreto, Peter Sch...