Sciweavers

19 search results - page 1 / 4
» ctrsa 2008
Sort
View
CTRSA
2008
Springer
118views Cryptology» more  CTRSA 2008»
13 years 6 months ago
Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes
Pierre-Alain Fouque, Gaëtan Leurent
CTRSA
2008
Springer
97views Cryptology» more  CTRSA 2008»
13 years 5 months ago
Public-Key Encryption with Non-interactive Opening
Ivan Damgård, Dennis Hofheinz, Eike Kiltz, R...
CTRSA
2008
Springer
130views Cryptology» more  CTRSA 2008»
13 years 6 months ago
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework
ended abstract appeared in Proceedings of the Cryptographers' Track at the RSA Conference (CT-RSA '08)
Michel Abdalla, Dario Catalano, Céline Chev...
CTRSA
2008
Springer
95views Cryptology» more  CTRSA 2008»
13 years 6 months ago
Separation Results on the "One-More" Computational Problems
In 2001, Bellare, Namprempre, Pointcheval and Semanko introduced
Emmanuel Bresson, Jean Monnerat, Damien Vergnaud
CTRSA
2008
Springer
197views Cryptology» more  CTRSA 2008»
13 years 6 months ago
Legally-Enforceable Fairness in Secure Two-Party Computation
In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their private inputs. The computation should...
Andrew Y. Lindell