Sciweavers

25 search results - page 1 / 5
» acns 2009
Sort
View
ACNS
2009
Springer
114views Cryptology» more  ACNS 2009»
13 years 11 months ago
Broadcast Attacks against Lattice-Based Cryptosystems
Thomas Plantard, Willy Susilo
ACNS
2009
Springer
109views Cryptology» more  ACNS 2009»
13 years 11 months ago
Dual-Policy Attribute Based Encryption
Nuttapong Attrapadung, Hideki Imai
ACNS
2009
Springer
102views Cryptology» more  ACNS 2009»
13 years 11 months ago
Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches
Philip S. Hirschhorn, Jeffrey Hoffstein, Nick Howg...
ACNS
2009
Springer
124views Cryptology» more  ACNS 2009»
13 years 11 months ago
Novel Precomputation Schemes for Elliptic Curve Cryptosystems
We present an innovative technique to add elliptic curve points with the form P Q± , and discuss its application to the generation of precomputed tables for the scalar multiplicat...
Patrick Longa, Catherine H. Gebotys
ACNS
2009
Springer
158views Cryptology» more  ACNS 2009»
13 years 11 months ago
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack
We propose a new variant of the Cramer-Shoup KEM (key encapsulation mechanism). The proposed variant is more efficient than the original Cramer-Shoup KEM scheme in terms of public...
Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianyi...