Sciweavers

ASIACRYPT
2000
Springer
14 years 1 months ago
Commital Deniable Proofs and Electronic Campaign Finance
In a recent Stanford Law Review article, Ayres and Bulow [1] propose a radical anonymity-based solution to disrupt the “market” for monetary influence in political campaigns. ...
Matthew K. Franklin, Tomas Sander
ASIACRYPT
2000
Springer
14 years 1 months ago
A Note on Security Proofs in the Generic Model
A discrete-logarithm algorithm is called generic if it does not exploit the specific representation of the cyclic group for which it is supposed to compute discrete logarithms. Su...
Marc Fischlin
ASIACRYPT
2000
Springer
14 years 1 months ago
Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99
At Asiacrypt ’99, Sun, Yang and Laih proposed three RSA variants with short secret exponent that resisted all known attacks, including the recent Boneh-Durfee attack from Eurocry...
Glenn Durfee, Phong Q. Nguyen
ASIACRYPT
2000
Springer
14 years 1 months ago
Concrete Security Characterizations of PRFs and PRPs: Reductions and Applications
Abstract. We investigate several alternate characterizations of pseudorandom functions (PRFs) and pseudorandom permutations (PRPs) in a concrete security setting. By analyzing the ...
Anand Desai, Sara K. Miner
ASIACRYPT
2000
Springer
14 years 1 months ago
Why Textbook ElGamal and RSA Encryption Are Insecure
Dan Boneh, Antoine Joux, Phong Q. Nguyen
ASIACRYPT
2000
Springer
14 years 1 months ago
Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems
Abstract. Construction of secure hyperelliptic curves is of most important yet most difficult problem in design of cryptosystems based on the discrete logarithm problems on hyperel...
Jinhui Chao, Kazuto Matsuo, Hiroto Kawashiro, Shig...
ASIACRYPT
2000
Springer
14 years 1 months ago
Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
An authenticated encryption scheme is a symmetric encryption scheme whose goal is to provide both privacy and integrity. We consider two possible notions of authenticity for such ...
Mihir Bellare, Chanathip Namprempre
ASIACRYPT
2000
Springer
14 years 1 months ago
Weil Descent of Elliptic Curves over Finite Fields of Characteristic Three
The paper shows that some of elliptic curves over finite fields of characteristic three of composite degree are attacked by a more effective algorithm than Pollard’s ρ method...
Seigo Arita
ASIACRYPT
2000
Springer
14 years 1 months ago
Power Analysis, What Is Now Possible...
Since Power Analysis on smart-cards was introduced by Paul Kocher [KJJ98], the validity of the model used for smart-cards has not been given much attention. In this paper, we firs...
Mehdi-Laurent Akkar, Régis Bevan, Paul Disc...