Sciweavers

INDOCRYPT
2007
Springer
14 years 6 months ago
Proxy Re-signature Schemes Without Random Oracles
Jun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang
INDOCRYPT
2007
Springer
14 years 6 months ago
Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses
The stream cipher TPypy has been designed by Biham and Seberry in January 2007 as the strongest member of the Py-family ciphers, after weaknesses in the other members Py, Pypy, Py...
Gautham Sekar, Souradyuti Paul, Bart Preneel
INDOCRYPT
2007
Springer
14 years 6 months ago
Improved Meet-in-the-Middle Attacks on Reduced-Round DES
Orr Dunkelman, Gautham Sekar, Bart Preneel
INDOCRYPT
2007
Springer
14 years 6 months ago
A Framework for Chosen IV Statistical Analysis of Stream Ciphers
Saarinen recently proposed a chosen IV statistical attack, called the d-monomial test, and used it to find weaknesses in several proposed stream ciphers. In this paper we generali...
Håkan Englund, Thomas Johansson, Meltem S&ou...
INDOCRYPT
2007
Springer
14 years 6 months ago
X-FCSR - A New Software Oriented Stream Cipher Based Upon FCSRs
Abstract. Feedback with Carry Shift Registers (FCSRs) are a promising alternative to LFSRs in the design of stream ciphers. The previous constructions based on FCSRs were dedicated...
François Arnault, Thierry P. Berger, C&eacu...
INDOCRYPT
2007
Springer
14 years 6 months ago
Solving Discrete Logarithms from Partial Knowledge of the Key
Abstract. For elliptic curve based cryptosystems, the discrete logarithm problem must be hard to solve. But even when this is true from a mathematical point of view, side-channel a...
K. Gopalakrishnan, Nicolas Thériault, Chui ...
INDOCRYPT
2007
Springer
14 years 6 months ago
A Meet-in-the-Middle Collision Attack Against the New FORK-256
We show that a 2112.9 collision attack exists against the FORK-256 Hash Function. The attack is surprisingly simple compared to existing published FORK-256 cryptanalysis work, yet ...
Markku-Juhani Olavi Saarinen
INDOCRYPT
2007
Springer
14 years 6 months ago
Linearization Attacks Against Syndrome Based Hashes
Abstract. In MyCrypt 2005, Augot, Finiasz, and Sendrier proposed FSB, a family of cryptographic hash functions. The security claim of the FSB hashes is based on a coding theory pro...
Markku-Juhani Olavi Saarinen
INDOCRYPT
2007
Springer
14 years 6 months ago
Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication
This paper analyzes the best speeds that can be obtained for single-scalar multiplication with variable base point by combining a huge range of options: – many choices of coordin...
Daniel J. Bernstein, Peter Birkner, Tanja Lange, C...
INDOCRYPT
2007
Springer
14 years 6 months ago
Trade-Off Traitor Tracing
Kazuto Ogawa, Go Ohtake, Goichiro Hanaoka, Hideki ...