Sciweavers

16 search results - page 2 / 4
» africacrypt 2009
Sort
View
AFRICACRYPT
2009
Springer
13 years 11 months ago
Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness
Michel Abdalla, Dario Catalano, Céline Chev...
AFRICACRYPT
2009
Springer
13 years 11 months ago
Reducing Key Length of the McEliece Cryptosystem
Thierry P. Berger, Pierre-Louis Cayrel, Philippe G...
AFRICACRYPT
2009
Springer
13 years 9 months ago
Exponent Recoding and Regular Exponentiation Algorithms
This paper describes methods of recoding exponents to allow for regular implementations of m-ary exponentiation algorithms. Recoding algorithms previously proposed in the literatur...
Marc Joye, Michael Tunstall
AFRICACRYPT
2009
Springer
13 years 11 months ago
Cryptanalysis of Vortex
Vortex is a hash function that was first presented at ISC’2008, then submitted to the NIST SHA-3 competition after some modifications. This paper describes several attacks on b...
Jean-Philippe Aumasson, Orr Dunkelman, Florian Men...
AFRICACRYPT
2009
Springer
13 years 11 months ago
Unifying Zero-Knowledge Proofs of Knowledge
Abstract. We present a simple zero-knowledge proof of knowledge protocol of which many protocols in the literature are instantiations. These include Schnorr’s protocol for provin...
Ueli M. Maurer