CTRSA
13 years 11 months ago
2004 Springer
We describe a block-cipher mode of operation, EME, that turns an n-bit block cipher into
CTRSA
13 years 11 months ago
2004 Springer
Abstract. In this paper, we give a first example of identity based undeniable signature using pairings over elliptic curves. We extend to the identity based setting the security m...
CTRSA
13 years 11 months ago
2004 Springer
This paper presents a scalable hardware implementation of both commonly used public key cryptosystems, RSA and Elliptic Curve Cryptosystem (ECC) on the same platform. The introduce...
CTRSA
13 years 9 months ago
2004 Springer
We present a cryptanalysis of a zero-knowledge identification protocol introduced by Naccache et al. at Eurocrypt '95. Our cryptanalysis enables a polynomial-time attacker to ...
CTRSA
13 years 9 months ago
2004 Springer
Abstract. Secure authentication frequently depends on the correct recognition of a user's public key. When there is no certificate authority, this key is obtained from other u...
|