Sciweavers

6 search results - page 1 / 2
» icisc 2001
Sort
View
ICISC
2001
132views Cryptology» more  ICISC 2001»
13 years 6 months ago
Slide Attacks with a Known-Plaintext Cryptanalysis
Although many strong cryptanalytic tools exploit weaknesses in the data-randomizinig part of a block cipher, relatively few general tools for cryptanalyzing on the other part, the ...
Soichi Furuya
ICISC
2001
89views Cryptology» more  ICISC 2001»
13 years 6 months ago
An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements
In 1999, Bao et al. proposed [5] a multi-party fair exchange protocol of electronic items with an offline trusted third party. In this protocol, a coalition including the initiator...
Nicolás González-Deleito, Olivier Ma...
ICISC
2001
156views Cryptology» more  ICISC 2001»
13 years 6 months ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet
ICISC
2001
98views Cryptology» more  ICISC 2001»
13 years 6 months ago
A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks
In this paper, we propose a multi-signature scheme, in which each signer can express her intention associating with the message to be signed. Signers' intentions mean a kind o...
Kei Kawauchi, Hiroshi Minato, Atsuko Miyaji, Mitsu...