Sciweavers

AFRICACRYPT
2009
Springer
14 years 6 months ago
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness
Michel Abdalla, Dario Catalano, Céline Chev...
AFRICACRYPT
2009
Springer
14 years 6 months ago
Fast Elliptic-Curve Cryptography on the Cell Broadband Engine
Neil Costigan, Peter Schwabe
CTRSA
2010
Springer
232views Cryptology» more  CTRSA 2010»
14 years 6 months ago
On Extended Sanitizable Signature Schemes
Sanitizable signature schemes allow a semi-trusted entity to modify some specific portions of a signed message while keeping a valid signature of the original off-line signer. In...
Sébastien Canard, Amandine Jambert
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
14 years 6 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...
CTRSA
2010
Springer
149views Cryptology» more  CTRSA 2010»
14 years 6 months ago
Usable Optimistic Fair Exchange
Fairly exchanging digital content is an everyday problem. It has been shown that fair exchange cannot be done without a trusted third party (called the Arbiter). Yet, even with a ...
Alptekin Küpçü, Anna Lysyanskaya
CTRSA
2010
Springer
257views Cryptology» more  CTRSA 2010»
14 years 6 months ago
Practical Key Recovery Attack against Secret-IV Edon-
Abstract. The SHA-3 competition has been organized by NIST to select a new hashing standard. Edon-R was one of the fastest candidates in the first round of the competition. In thi...
Gaëtan Leurent
CTRSA
2010
Springer
200views Cryptology» more  CTRSA 2010»
14 years 6 months ago
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is c...
Scott Yilek
CTRSA
2010
Springer
212views Cryptology» more  CTRSA 2010»
14 years 6 months ago
Fault Attacks Against emv Signatures
At ches 2009, Coron, Joux, Kizhvatov, Naccache and Paillier (cjknp) exhibited a fault attack against rsa signatures with partially known messages. This attack allows factoring the ...
Jean-Sébastien Coron, David Naccache, Mehdi...
CTRSA
2010
Springer
216views Cryptology» more  CTRSA 2010»
14 years 6 months ago
Speed Records for NTRU
In this paper NTRUEncrypt is implemented for the first time on a GPU using the CUDA platform. As is shown, this operation lends itself excellently for parallelization and performs...
Jens Hermans, Frederik Vercauteren, Bart Preneel
CTRSA
2010
Springer
189views Cryptology» more  CTRSA 2010»
14 years 6 months ago
Linear Cryptanalysis of Reduced-Round PRESENT
Abstract. PRESENT is a hardware-oriented block cipher suitable for resource constrained environment. In this paper we analyze PRESENT by the multidimensional linear cryptanalysis m...
Joo Yeon Cho