Sciweavers

9 search results - page 2 / 2
» crypto 1990
Sort
View
CRYPTO
1990
Springer
78views Cryptology» more  CRYPTO 1990»
13 years 9 months ago
How to Time-Stamp a Digital Document
The prospect of a world in which all text, audio, picture, and video documents are in digital form on easily modi able media raises the issue of how to certify when a document was...
Stuart Haber, W. Scott Stornetta
CRYPTO
2007
Springer
154views Cryptology» more  CRYPTO 2007»
13 years 11 months ago
A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than N 0.073
Wiener’s famous attack on RSA with d < N0.25 shows that using a small d for an efficient decryption process makes RSA completely insecure. As an alternative, Wiener proposed t...
Ellen Jochemsz, Alexander May
CRYPTO
1990
Springer
58views Cryptology» more  CRYPTO 1990»
13 years 9 months ago
Structural Properties of One-way Hash Functions
We study the following two kinds of one-way hash functions: universal oneway hash functions (UOHs) and collision intractable hash functions (CIHs). The main property of the former...
Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai
COMCOM
1999
91views more  COMCOM 1999»
13 years 5 months ago
Group-oriented undeniable signature schemes with a trusted center
Undeniable signature is an intriguing concept introduced by Chaum and Antwerpen at Crypto'89. In 1999, Lee and Hwang presented two group-oriented undeniable signature schemes ...
Narn-Yih Lee, Tzonelih Hwang