Sciweavers

EUROCRYPT
2008
Springer
13 years 10 months ago
Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme
In the model of perfectly secure message transmission schemes (PSMTs), there are n channels between a sender and a receiver. An infinitely powerful adversary A may corrupt (observe...
Kaoru Kurosawa, Kazuhiro Suzuki
EUROCRYPT
2008
Springer
13 years 10 months ago
A New Mode of Operation for Block Ciphers and Length-Preserving MACs
Yevgeniy Dodis, Krzysztof Pietrzak, Prashant Puniy...
EUROCRYPT
2008
Springer
13 years 10 months ago
Efficient Two Party and Multi Party Computation Against Covert Adversaries
Recently, Aumann and Lindell introduced a new realistic security model for secure computation, namely, security against covert adversaries. The main motivation was to obtain secure...
Vipul Goyal, Payman Mohassel, Adam Smith
EUROCRYPT
2008
Springer
13 years 10 months ago
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
Lei Wang, Kazuo Ohta, Noboru Kunihiro
EUROCRYPT
2008
Springer
13 years 10 months ago
Isolated Proofs of Knowledge and Isolated Zero Knowledge
We introduce a new notion called -isolated proofs of knowledge ( -IPoK). These are proofs of knowledge where a cheating prover is allowed to exchange up to bits of communication wi...
Ivan Damgård, Jesper Buus Nielsen, Daniel Wi...
EUROCRYPT
2008
Springer
13 years 10 months ago
On the Indifferentiability of the Sponge Construction
Abstract. In this paper we prove that the sponge construction introduced in [4] is indifferentiable from a random oracle when being used with a random transformation or a random pe...
Guido Bertoni, Joan Daemen, Michael Peeters, Gille...
EUROCRYPT
2008
Springer
13 years 10 months ago
Proving Tight Security for Rabin-Williams Signatures
This paper proves "tight security in the random-oracle model relative to factorization" for the lowest-cost signature systems available today: every hash-generic signatur...
Daniel J. Bernstein
EUROCRYPT
2008
Springer
13 years 10 months ago
A Practical Attack on KeeLoq
Sebastiaan Indesteege, Nathan Keller, Orr Dunkelma...
EUROCRYPT
2008
Springer
13 years 10 months ago
Efficient Sequential Aggregate Signed Data
Gregory Neven
EUROCRYPT
2008
Springer
13 years 10 months ago
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
Consider an abstract storage device (G) that can hold a single element x from a fixed, publicly known finite group G. Storage is private in the sense that an adversary does not hav...
Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles ...