Sciweavers

MYCRYPT
2005
Springer
123views Cryptology» more  MYCRYPT 2005»
14 years 6 months ago
Optimization of the MOVA Undeniable Signature Scheme
This article presents optimization results on the recent MOVA undeniable signature scheme presented by Monnerat and Vaudenay at PKC ’04 as well as its generalization proposed at ...
Jean Monnerat, Yvonne Anne Oswald, Serge Vaudenay
MYCRYPT
2005
Springer
157views Cryptology» more  MYCRYPT 2005»
14 years 6 months ago
Twin RSA
Arjen K. Lenstra, Benjamin M. M. de Weger
MYCRYPT
2005
Springer
187views Cryptology» more  MYCRYPT 2005»
14 years 6 months ago
Distinguishing Attacks on T-Functions
Klimov and Shamir proposed a new class of simple cryptographic primitives named T-functions. For two concrete proposals based on the squaring operation, a single word T-function an...
Simon Künzli 0002, Pascal Junod, Willi Meier
MYCRYPT
2005
Springer
189views Cryptology» more  MYCRYPT 2005»
14 years 6 months ago
An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm
In this paper we produce a practical and efficient algorithm to find a decomposition of type n = kˆ i=1 2si 3ti , si, ti ∈ N ∪ {0} with k ≤   c + o(1) ¡ log n log log n ....
Mathieu Ciet, Francesco Sica
MYCRYPT
2005
Springer
123views Cryptology» more  MYCRYPT 2005»
14 years 6 months ago
On Session Key Construction in Provably-Secure Key Establishment Protocols
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchco...
MYCRYPT
2005
Springer
248views Cryptology» more  MYCRYPT 2005»
14 years 6 months ago
A Family of Fast Syndrome Based Cryptographic Hash Functions
Recently, some collisions have been exposed for a variety of cryptographic hash functions [20,21] including some of the most widely used today. Many other hash functions using simi...
Daniel Augot, Matthieu Finiasz, Nicolas Sendrier