Sciweavers

ACISP
2004
Springer
13 years 8 months ago
Secure Bilinear Diffie-Hellman Bits
The Weil and Tate pairings are a popular new gadget in cryptography and have found many applications, including identity-based cryptography. In particular, the pairings have been u...
Steven D. Galbraith, Herbie J. Hopkins, Igor Shpar...
ACISP
2004
Springer
13 years 8 months ago
Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing
Abstract. In this paper we propose an optimistic two-party fair exchange protocol which does not rely on a centralized trusted third party. Instead, the fairness of the protocol re...
Gildas Avoine, Serge Vaudenay
ACISP
2004
Springer
13 years 10 months ago
Theoretical Analysis of XL over Small Fields
Abstract. XL was first introduced to solve determined or overdetermined systems of equations over a finite field as an “algebraic attack” against multivariate cryptosystems....
Bo-Yin Yang, Jiun-Ming Chen
ACISP
2004
Springer
13 years 10 months ago
Protocols with Security Proofs for Mobile Applications
The Canetti-Krawczyk (CK) model is useful for building reusable components that lead to rapid development of secure protocols, especially for engineers working outside of the secur...
Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Bo...
ACISP
2004
Springer
13 years 10 months ago
Weak Property of Malleability in NTRUSign
A new type of signature scheme, called NTRUSign, based on solving the approximately closest vector problem in a NTRU lattice was proposed at CT-RSA’03. However no security proof ...
SungJun Min, Go Yamamoto, Kwangjo Kim
ACISP
2004
Springer
13 years 10 months ago
Pseudorandomness of SPN-Type Transformations
Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon C...
ACISP
2004
Springer
13 years 10 months ago
Convertible Nominative Signatures
Abstract. A feasible solution to prevent potential misuse of signatures is to put some restrictions on their verification. Therefore S.J.Kim, S.J.Park and D.H.Won introduced the n...
Zhenjie Huang, Yumin Wang
ACISP
2004
Springer
13 years 10 months ago
Fault Attacks on Signature Schemes
Christophe Giraud, Erik Woodward Knudsen
ACISP
2004
Springer
13 years 10 months ago
Analysis and Improvement of Micali's Fair Contract Signing Protocol
In PODC 2003, Micali presented a fair electronic exchange protocol for contract signing with an invisible trusted party [17]. The protocol was filed as a US patent No 5666420 in 1...
Feng Bao, Guilin Wang, Jianying Zhou, Huafei Zhu
ACISP
2004
Springer
13 years 10 months ago
Symmetric Key Authentication Services Revisited
Bruno Crispo, Bogdan C. Popescu, Andrew S. Tanenba...