Sciweavers

24 search results - page 2 / 5
» ctrsa 2007
Sort
View
CTRSA
2007
Springer
110views Cryptology» more  CTRSA 2007»
13 years 11 months ago
Selecting Secure Passwords
We mathematically explore a model for the shortness and security for passwords that are stored in hashed form. The model is implicitly in the NIST publication [8] and is based on c...
Eric R. Verheul
CTRSA
2007
Springer
98views Cryptology» more  CTRSA 2007»
13 years 6 months ago
Identity-Based Multi-signatures from RSA
Abstract. Multi-signatures allow multiple signers to jointly authenticate a message using a single compact signature. Many applications however require the public keys of the signe...
Mihir Bellare, Gregory Neven
CTRSA
2007
Springer
111views Cryptology» more  CTRSA 2007»
13 years 11 months ago
A Practical and Tightly Secure Signature Scheme Without Hash Function
In 1999, two signature schemes based on the flexible RSA problem (a.k.a. strong RSA problem) were independently introduced: the Gennaro-Halevi-Rabin (GHR) signature scheme and the...
Benoît Chevallier-Mames, Marc Joye
CTRSA
2007
Springer
153views Cryptology» more  CTRSA 2007»
13 years 8 months ago
Differential Power Analysis of Stream Ciphers
Side-channel attacks on block ciphers and public key algorithms have been discussed extensively. However, there is only sparse literature about side-cannel attacks on stream cipher...
Wieland Fischer, Berndt M. Gammel, O. Kniffler, J....
CTRSA
2007
Springer
112views Cryptology» more  CTRSA 2007»
13 years 11 months ago
Directed Transitive Signature Scheme
In 2002, Micali and Rivest raised an open problem as to whether directed transitive signatures exist or not. In 2003, Hohenberger formalized the necessary mathematical criteria for...
Xun Yi