Sciweavers

CAU
2004
141views Cryptology» more  CAU 2004»
14 years 25 days ago
Implementation of the GBD Cryptosystem
We present our experience from implementing the public-key cryptosystem of Gonz
Jaimee Brown, Ed Dawson, Juan Manuel Gonzál...
ACNS
2010
Springer
114views Cryptology» more  ACNS 2010»
14 years 2 months ago
Two New Efficient PIR-Writing Protocols
Assume that a client outsources his database to a remote storage-provider (the server), so that for privacy reasons, the client's database is encrypted by his secret key. Duri...
Helger Lipmaa, Bingsheng Zhang
ICICS
1999
Springer
14 years 3 months ago
Reaction Attacks against several Public-Key Cryptosystems
Abstract. We present attacks against the McEliece Public-Key Cryptosystem, the Atjai-Dwork Public-Key Cryptosystem, and variants of those systems. Most of these systems base their ...
Chris Hall, Ian Goldberg, Bruce Schneier
ASIACRYPT
2000
Springer
14 years 3 months ago
Strengthening McEliece Cryptosystem
McEliece cryptosystem is a public-key cryptosystem based on error-correcting codes. It constitutes one of the few alternatives to cryptosystems relying on number theory. We present...
Pierre Loidreau
TCC
2005
Springer
141views Cryptology» more  TCC 2005»
14 years 4 months ago
Public-Key Steganography with Active Attacks
A complexity-theoretic model for public-key steganography with active attacks is introduced. The notion of steganographic security against adaptive chosen-covertext attacks (SS-CC...
Michael Backes, Christian Cachin