Sciweavers

AFRICACRYPT
2009
Springer
13 years 2 months ago
Efficient Acceleration of Asymmetric Cryptography on Graphics Hardware
Graphics processing units (GPU) are increasingly being used for general purpose computing. We present implementations of large integer modular exponentiation, the core of public-ke...
Owen Harrison, John Waldron
AFRICACRYPT
2009
Springer
13 years 8 months ago
Certified Encryption Revisited
The notion of certified encryption had recently been suggested as a suitable setting for analyzing the security of encryption against adversaries that tamper with the key-registrat...
Pooya Farshim, Bogdan Warinschi
AFRICACRYPT
2009
Springer
13 years 9 months ago
Exponent Recoding and Regular Exponentiation Algorithms
This paper describes methods of recoding exponents to allow for regular implementations of m-ary exponentiation algorithms. Recoding algorithms previously proposed in the literatur...
Marc Joye, Michael Tunstall
AFRICACRYPT
2009
Springer
13 years 11 months ago
Unifying Zero-Knowledge Proofs of Knowledge
Abstract. We present a simple zero-knowledge proof of knowledge protocol of which many protocols in the literature are instantiations. These include Schnorr’s protocol for provin...
Ueli M. Maurer
AFRICACRYPT
2009
Springer
13 years 11 months ago
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps
We propose a generic modelling technique that can be used to extend existing frameworks for theoretical security analysis in order to capture the use of timestamps. We apply this t...
Manuel Barbosa, Pooya Farshim
AFRICACRYPT
2009
Springer
13 years 11 months ago
Cryptanalysis of Vortex
Vortex is a hash function that was first presented at ISC’2008, then submitted to the NIST SHA-3 competition after some modifications. This paper describes several attacks on b...
Jean-Philippe Aumasson, Orr Dunkelman, Florian Men...
AFRICACRYPT
2009
Springer
13 years 11 months ago
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini
AFRICACRYPT
2009
Springer
13 years 11 months ago
Reducing Key Length of the McEliece Cryptosystem
Thierry P. Berger, Pierre-Louis Cayrel, Philippe G...
AFRICACRYPT
2009
Springer
13 years 11 months ago
Cryptanalysis of RSA Using the Ratio of the Primes
Abderrahmane Nitaj
AFRICACRYPT
2009
Springer
13 years 11 months ago
Generic Attacks on Feistel Networks with Internal Permutations
Joana Treger, Jacques Patarin