Sciweavers

CTRSA
2007
Springer
98views Cryptology» more  CTRSA 2007»
14 years 2 months ago
Identity-Based Multi-signatures from RSA
Abstract. Multi-signatures allow multiple signers to jointly authenticate a message using a single compact signature. Many applications however require the public keys of the signe...
Mihir Bellare, Gregory Neven
CTRSA
2007
Springer
171views Cryptology» more  CTRSA 2007»
14 years 2 months ago
Compact E-Cash from Bounded Accumulator
Abstract. Known compact e-cash schemes are constructed from signature schemes with efficient protocols and verifiable random functions. In this paper, we introduce a different ap...
Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu
CTRSA
2007
Springer
147views Cryptology» more  CTRSA 2007»
14 years 4 months ago
Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement
Privacy concerns in many aspects of electronic communication trigger the need to re-examine
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
CTRSA
2007
Springer
93views Cryptology» more  CTRSA 2007»
14 years 4 months ago
Human Identification Through Image Evaluation Using Secret Predicates
Abstract. The task of developing protocols for humans to securely authenticate themselves to a remote server has been an interesting topic in cryptography as a replacement for the ...
Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungy...
CTRSA
2007
Springer
102views Cryptology» more  CTRSA 2007»
14 years 4 months ago
Improved Efficiency for Private Stable Matching
At Financial Crypto 2006, Golle presented a novel framework for the privacy preserving computation of a stable matching (stable marriage). We show that the communication complexity...
Matthew K. Franklin, Mark Gondree, Payman Mohassel
CTRSA
2007
Springer
153views Cryptology» more  CTRSA 2007»
14 years 4 months ago
Differential Power Analysis of Stream Ciphers
Side-channel attacks on block ciphers and public key algorithms have been discussed extensively. However, there is only sparse literature about side-cannel attacks on stream cipher...
Wieland Fischer, Berndt M. Gammel, O. Kniffler, J....
CTRSA
2007
Springer
110views Cryptology» more  CTRSA 2007»
14 years 6 months ago
Selecting Secure Passwords
We mathematically explore a model for the shortness and security for passwords that are stored in hashed form. The model is implicitly in the NIST publication [8] and is based on c...
Eric R. Verheul
CTRSA
2007
Springer
146views Cryptology» more  CTRSA 2007»
14 years 6 months ago
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature
Standard signature schemes are usually designed only to achieve weak unforgeability – i.e. preventing forgery of signatures on new messages not previously signed. However, most s...
Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
CTRSA
2007
Springer
184views Cryptology» more  CTRSA 2007»
14 years 6 months ago
Cryptanalysis of Reduced Variants of the FORK-256 Hash Function
FORK-256 is a hash function presented at FSE 2006. Whereas SHA-like designs process messages in one stream, FORK-256 uses four parallel streams for hashing. In this article, we pre...
Florian Mendel, Joseph Lano, Bart Preneel
CTRSA
2007
Springer
101views Cryptology» more  CTRSA 2007»
14 years 6 months ago
MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers
Nathan Keller, Stephen D. Miller, Ilya Mironov, Ra...