Sciweavers

38 search results - page 2 / 8
» crypto 2003
Sort
View
NSPW
2003
ACM
13 years 10 months ago
Public key distribution through "cryptoIDs"
In this paper, we argue that person-to-person key distribution is best accomplished with a key-centric approach, instead of PKI: users should distribute public key fingerprints in...
Trevor Perrin
CRYPTO
2001
Springer
134views Cryptology» more  CRYPTO 2001»
13 years 9 months ago
Identity-Based Encryption from the Weil Pairing
in SIAM J. of Computing, Vol. 32, No. 3, pp. 586-615, 2003. An extended abstract of this paper appears in the Proceedings of Crypto 2001, volume 2139 of Lecture Notes in Computer S...
Dan Boneh, Matthew K. Franklin
CRYPTO
2003
Springer
127views Cryptology» more  CRYPTO 2003»
13 years 10 months ago
Cryptanalysis of SAFER++
This paper presents several multiset and boomerang attacks on Safer++ up to 5.5 out of its 7 rounds. These are the best known attacks for this cipher and significantly improve the...
Alex Biryukov, Christophe De Cannière, Gust...
CRYPTO
2003
Springer
98views Cryptology» more  CRYPTO 2003»
13 years 10 months ago
A Message Authentication Code Based on Unimodular Matrix Groups
We present a new construction based on modular groups. A novel element of our construction is to embed each input into a sequence of matrices with determinant ±1, the product of w...
Matthew Cary, Ramarathnam Venkatesan
CRYPTO
2003
Springer
113views Cryptology» more  CRYPTO 2003»
13 years 10 months ago
Torus-Based Cryptography
We introduce the concept of torus-based cryptography, give a new public key system called CEILIDH, and compare it to other discrete log based systems including Lucas-based systems ...
Karl Rubin, Alice Silverberg