Sciweavers

ASIACRYPT
2000
Springer
14 years 3 months ago
Efficient Secure Multi-party Computation
Martin Hirt, Ueli M. Maurer, Bartosz Przydatek
ASIACRYPT
2000
Springer
14 years 3 months ago
Attacking and Repairing Batch Verification Schemes
Colin Boyd, Chris Pavlovski
ASIACRYPT
2000
Springer
14 years 3 months ago
The Security of Chaffing and Winnowing
This paper takes a closer look at Rivest's chaffing-and-winnowing paradigm for data privacy. We begin with a definition which enables one to clearly determine whether a given ...
Mihir Bellare, Alexandra Boldyreva
ASIACRYPT
2000
Springer
14 years 3 months ago
Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers
In 1980 Hellman introduced a general technique for breaking arbitrary block ciphers with N possible keys in time T and memory M related by the tradeoff curve TM2 = N2 for 1 T N. ...
Alex Biryukov, Adi Shamir
CHES
2003
Springer
146views Cryptology» more  CHES 2003»
14 years 3 months ago
Efficient Implementation of Rijndael Encryption in Reconfigurable Hardware: Improvements and Design Tradeoffs
Abstract. Performance evaluation of the Advanced Encryption Standard candidates has led to intensive study of both hardware and software implementations. However, although plentifu...
François-Xavier Standaert, Gaël Rouvro...
ASIACRYPT
2003
Springer
14 years 3 months ago
Untraceable Fair Network Payment Protocols with Off-Line TTP
A fair network payment protocol plays an important role in electronic commerce. The fairness concept in payments can be illustrated as that two parties (e.g. customers and merchant...
Chih-Hung Wang
ASIACRYPT
2003
Springer
14 years 3 months ago
Universal Designated-Verifier Signatures
Motivated by privacy issues associated with dissemination of signed digital certificates, we define a new type of signature scheme called a `Universal Designated-Verifier Signatur...
Ron Steinfeld, Laurence Bull, Huaxiong Wang, Josef...
ASIACRYPT
2003
Springer
14 years 3 months ago
Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves
One of the recent thrust areas in research on hyperelliptic curve cryptography has been to obtain explicit formulae for performing arithmetic in the Jacobian of such curves. We con...
Pradeep Kumar Mishra, Palash Sarkar