Sciweavers

IMA
2005
Springer
71views Cryptology» more  IMA 2005»
14 years 5 months ago
Concrete Security of the Blum-Blum-Shub Pseudorandom Generator
Abstract. The asymptotic security of the Blum-Blum-Shub (BBS) pseudorandom generator has been studied by Alexi et al. and Vazirani and Vazirani, who proved independently that O(log...
Andrey Sidorenko, Berry Schoenmakers
IMA
2005
Springer
113views Cryptology» more  IMA 2005»
14 years 5 months ago
Exploiting Coding Theory for Collision Attacks on SHA-1
In this article we show that coding theory can be exploited efficiently for the cryptanalysis of hash functions. We will mainly focus
Norbert Pramstaller, Christian Rechberger, Vincent...
IMA
2005
Springer
52views Cryptology» more  IMA 2005»
14 years 5 months ago
Domain Expansion of MACs: Alternative Uses of the FIL-MAC
In this paper, a study of a paradigm for domain expansion of MACs is generalized. In particular, a tradeoff between the efficiency of a MAC and the tightness of its security reduc...
Ueli M. Maurer, Johan Sjödin
IMA
2005
Springer
82views Cryptology» more  IMA 2005»
14 years 5 months ago
Hash Based Digital Signature Schemes
C. Dods, Nigel P. Smart, Martijn Stam
IMA
2005
Springer
85views Cryptology» more  IMA 2005»
14 years 5 months ago
The Physically Observable Security of Signature Schemes
In recent years much research has been devoted to producing formal models of security for cryptographic primitives and to designing schemes that can be proved secure in such models...
Alexander W. Dent, John Malone-Lee
IMA
2005
Springer
111views Cryptology» more  IMA 2005»
14 years 5 months ago
An Algebraic Framework for Cipher Embeddings
In this paper we discuss the idea of block cipher embeddings and consider a natural algebraic framework for such constructions. In this approach we regard block cipher state spaces...
Carlos Cid, Sean Murphy, Matthew J. B. Robshaw
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
14 years 5 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng
IMA
2005
Springer
162views Cryptology» more  IMA 2005»
14 years 5 months ago
Pairing-Based Cryptography at High Security Levels
In recent years cryptographic protocols based on the Weil and Tate pairings on elliptic curves have attracted much attention. A notable success in this area was the elegant solutio...
Neal Koblitz, Alfred Menezes
IMA
2005
Springer
127views Cryptology» more  IMA 2005»
14 years 5 months ago
On the Automatic Construction of Indistinguishable Operations
Abstract. An increasingly important design constraint for software running on ubiquitous computing devices is security, particularly against physical methods such as side-channel a...
Manuel Barbosa, Dan Page