Sciweavers

FC
2000
Springer
119views Cryptology» more  FC 2000»
14 years 3 months ago
Sharing Decryption in the Context of Voting or Lotteries
Abstract. Several public key cryptosystems with additional homomorphic properties have been proposed so far. They allow to perform computation with encrypted data without the knowl...
Pierre-Alain Fouque, Guillaume Poupard, Jacques St...
FC
2000
Springer
80views Cryptology» more  FC 2000»
14 years 3 months ago
Statistics and Secret Leakage
Jean-Sébastien Coron, Paul C. Kocher, David...
FC
2000
Springer
83views Cryptology» more  FC 2000»
14 years 3 months ago
Secret Key Authentication with Software-Only Verification
Abstract Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secu...
Jaap-Henk Hoepman
FC
2000
Springer
102views Cryptology» more  FC 2000»
14 years 3 months ago
Asymmetric Currency Rounding
David M'Raïhi, David Naccache, Michael Tunsta...
EUROCRYPT
2000
Springer
14 years 3 months ago
On the Security of 3GPP Networks
Michael Walker
EUROCRYPT
2000
Springer
14 years 3 months ago
Construction of Nonlinear Boolean Functions with Important Cryptographic Properties
Abstract. This paper addresses the problem of obtaining new construction methods for cryptographically significant Boolean functions. We show that for each positive integer m, ther...
Palash Sarkar, Subhamoy Maitra
EUROCRYPT
2000
Springer
14 years 3 months ago
A Composition Theorem for Universal One-Way Hash Functions
In this paper we present a new scheme for constructing universal one-way hash functions that hash arbitrarily long messages out of universal one-way hash functions that hash fixed...
Victor Shoup
EUROCRYPT
2000
Springer
14 years 3 months ago
Using Hash Functions as a Hedge against Chosen Ciphertext Attack
The cryptosystem recently proposed by Cramer and Shoup [CS98] is a practical public key cryptosystem that is secure against adaptive chosen ciphertext attack provided the Decision...
Victor Shoup
EUROCRYPT
2000
Springer
14 years 3 months ago
Practical Threshold Signatures
We present an RSA threshold signature scheme. The scheme enjoys the following properties:
Victor Shoup
EUROCRYPT
2000
Springer
14 years 3 months ago
Fair Encryption of RSA Keys
Cryptography is more and more concerned with elaborate protocols involving many participants. In some cases, it is crucial to be sure that players behave fairly especially when the...
Guillaume Poupard, Jacques Stern