Sciweavers

38 search results - page 2 / 8
» asiacrypt 2005
Sort
View
ASIACRYPT
2005
Springer
13 years 10 months ago
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchco...
ASIACRYPT
2005
Springer
13 years 10 months ago
Errors in Computational Complexity Proofs for Protocols
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchco...
ASIACRYPT
2005
Springer
13 years 10 months ago
A Simple Threshold Authenticated Key Exchange from Short Secrets
Michel Abdalla, Olivier Chevassut, Pierre-Alain Fo...
ASIACRYPT
2005
Springer
13 years 10 months ago
A Failure-Friendly Design Principle for Hash Functions
Abstract. This paper reconsiders the established Merkle-Damg˚ard design principle for iterated hash functions. The internal state size w of an iterated n-bit hash function is trea...
Stefan Lucks
ASIACRYPT
2005
Springer
13 years 10 months ago
Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation
We propose Gate Evaluation Secret Sharing (GESS) – a new kind of secret sharing, designed for use in secure function evaluation (SFE) with minimal interaction. The resulting simp...
Vladimir Kolesnikov