Sciweavers

13 search results - page 2 / 3
» ctrsa 2003
Sort
View
CTRSA
2003
Springer
105views Cryptology» more  CTRSA 2003»
13 years 10 months ago
Forward-Security in Private-Key Cryptography
This paper provides a comprehensive treatment of forward-security in the context of sharedkey based cryptographic primitives, as a practical means to mitigate the damage caused by...
Mihir Bellare, Bennet S. Yee
CTRSA
2004
Springer
120views Cryptology» more  CTRSA 2004»
13 years 10 months ago
Identity Based Undeniable Signatures
Abstract. In this paper, we give a first example of identity based undeniable signature using pairings over elliptic curves. We extend to the identity based setting the security m...
Benoît Libert, Jean-Jacques Quisquater
CTRSA
2003
Springer
96views Cryptology» more  CTRSA 2003»
13 years 10 months ago
Hardware Performance Characterization of Block Cipher Structures
In this paper, we present a general framework for evaluating the performance characteristics of block cipher structures composed of S-boxes and Maximum Distance Separable (MDS) ma...
Lu Xiao, Howard M. Heys
CTRSA
2007
Springer
112views Cryptology» more  CTRSA 2007»
13 years 11 months ago
Directed Transitive Signature Scheme
In 2002, Micali and Rivest raised an open problem as to whether directed transitive signatures exist or not. In 2003, Hohenberger formalized the necessary mathematical criteria for...
Xun Yi
CTRSA
2008
Springer
134views Cryptology» more  CTRSA 2008»
13 years 7 months ago
An Efficient Protocol for Fair Secure Two-Party Computation
In the 1980s, Yao presented a very efficient constant-round secure two-party computation protocol withstanding semi-honest adversaries, which is based on so-called garbled circuits...
Mehmet S. Kiraz, Berry Schoenmakers