Sciweavers

ISW
1997
Springer
14 years 3 months ago
Signcryption and Its Applications in Efficient Public Key Solutions
Signcryption is a new paradigm in public key cryptography that simultaneously fulfills both the functions of digital signature and public key encryption in a logically single step,...
Yuliang Zheng
ISW
1997
Springer
14 years 3 months ago
Threshold Proxy Signature Schemes
This paper will show that Hsu and Wu’s efficient nonrepudiable threshold proxy signature scheme with known signers and Yang, Tzeng and Hwang’s efficient nonrepudiable threshol...
Kan Zhang
ISW
1997
Springer
14 years 3 months ago
Cryptanalysis of Message Authentication Codes
This paper gives a survey of attacks on Message Authentication Codes (MACs). First it defines the required security properties. Next it describes generic forgery and key recovery...
Bart Preneel
ISW
1997
Springer
14 years 3 months ago
A High-Speed Small RSA Encryption LSI with Low Power Dissipation
Akashi Satoh, Y. Kobayashi, H. Niijima, Nobuyuki O...
ISW
1997
Springer
14 years 3 months ago
A Framework for the Management of Information Security
Information security is based on access control models and cryptographic techniques. These are well established areas of research in computer security, but are not capable of supp...
Jussipekka Leiwo, Yuliang Zheng
ISW
1997
Springer
14 years 3 months ago
Secure Applications of Low-Entropy Keys
We introduce the notion of key stretching, a mechanism to convert short s-bit keys into longer keys, such that the complexity required to brute-force search a s + t-bit keyspace is...
John Kelsey, Bruce Schneier, Chris Hall, David Wag...
ISW
1997
Springer
14 years 3 months ago
High-Speed Cryptography
George I. Davida, René Peralta