Sciweavers

20 search results - page 3 / 4
» ctrsa 2009
Sort
View
CTRSA
2009
Springer
127views Cryptology» more  CTRSA 2009»
14 years 8 days ago
Adaptive-ID Secure Revocable Identity-Based Encryption
Abstract. Identity-Based Encryption (IBE) offers an interesting alternative to PKI-enabled encryption as it eliminates the need for digital certificates. While revocation has bee...
Benoît Libert, Damien Vergnaud
CTRSA
2009
Springer
155views Cryptology» more  CTRSA 2009»
14 years 8 days ago
Cryptanalysis of CTC2
CTC is a toy cipher designed in order to assess the strength of algebraic attacks. While the structure of CTC is deliberately weak with respect to algebraic attacks, it was claimed...
Orr Dunkelman, Nathan Keller
CTRSA
2009
Springer
235views Cryptology» more  CTRSA 2009»
14 years 8 days ago
A Statistical Saturation Attack against the Block Cipher PRESENT
In this paper, we present a statistical saturation attack that combines previously introduced cryptanalysis techniques against block ciphers. As the name suggests, the attack is st...
Baudoin Collard, François-Xavier Standaert
CTRSA
2009
Springer
112views Cryptology» more  CTRSA 2009»
13 years 9 months ago
Divisible On-Line/Off-Line Signatures
On-line/Off-line signatures are used in a particular scenario where the signer must respond quickly once the message to be signed is presented. The idea is to split the signing pro...
Chong-zhi Gao, Baodian Wei, Dongqing Xie, Chunming...
CTRSA
2009
Springer
179views Cryptology» more  CTRSA 2009»
14 years 8 days ago
Adaptively Secure Two-Party Computation with Erasures
In the setting of multiparty computation a set of parties with private inputs wish to compute some joint function of their inputs, whilst preserving certain security properties (l...
Andrew Y. Lindell