Sciweavers

CTRSA
2008
Springer
160views Cryptology» more  CTRSA 2008»
13 years 9 months ago
Fault Analysis Study of IDEA
We present a study of several fault attacks against the block cipher IDEA. Such a study is particularly interesting because of the target cipher's specific property to employ ...
Christophe Clavier, Benedikt Gierlichs, Ingrid Ver...
CTRSA
2008
Springer
134views Cryptology» more  CTRSA 2008»
13 years 9 months ago
An Efficient Protocol for Fair Secure Two-Party Computation
In the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withstanding semi-honest adversaries, which is based on so-called garbled circuits...
Mehmet S. Kiraz, Berry Schoenmakers
CTRSA
2008
Springer
197views Cryptology» more  CTRSA 2008»
13 years 9 months ago
Legally-Enforceable Fairness in Secure Two-Party Computation
In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their private inputs. The computation should...
Andrew Y. Lindell
CTRSA
2008
Springer
130views Cryptology» more  CTRSA 2008»
13 years 9 months ago
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework
ended abstract appeared in Proceedings of the Cryptographers' Track at the RSA Conference (CT-RSA '08)
Michel Abdalla, Dario Catalano, Céline Chev...
CTRSA
2008
Springer
118views Cryptology» more  CTRSA 2008»
13 years 9 months ago
Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes
Pierre-Alain Fouque, Gaëtan Leurent