Sciweavers

6 search results - page 1 / 2
» On the Joint Security of Encryption and Signature in EMV
Sort
View
CTRSA
2012
Springer
273views Cryptology» more  CTRSA 2012»
12 years 16 days ago
On the Joint Security of Encryption and Signature in EMV
We provide an analysis of current and future algorithms for signature and encryption in the EMV standards in the case where a single key-pair is used for both signature and encrypt...
Jean Paul Degabriele, Anja Lehmann, Kenneth G. Pat...
CCS
2004
ACM
13 years 10 months ago
Versatile padding schemes for joint signature and encryption
Yevgeniy Dodis, Michael J. Freedman, Stanislaw Jar...
CSFW
2008
IEEE
13 years 11 months ago
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation
Composition theorems in simulation-based approaches allow to build complex protocols from sub-protocols in a modular way. However, as first pointed out and studied by Canetti and ...
Ralf Küsters, Max Tuengerthal
CTRSA
2006
Springer
118views Cryptology» more  CTRSA 2006»
13 years 8 months ago
Stand-Alone and Setup-Free Verifiably Committed Signatures
Abstract. In this paper, we first demonstrate a gap between the security of verifiably committed signatures in the two-party setting and the security of verifiably committed signat...
Huafei Zhu, Feng Bao
CSFW
2010
IEEE
13 years 8 months ago
Impossibility Results for Secret Establishment
—Security protocol design is a creative discipline where the solution space depends on the problem to be solved and the cryptographic operators available. In this paper, we exami...
Benedikt Schmidt, Patrick Schaller, David A. Basin