Sciweavers

ASIACRYPT
2004
Springer
13 years 10 months ago
The XL-Algorithm and a Conjecture from Commutative Algebra
The “XL-algorithm” is a computational method to solve overdetermined systems of polynomial equations which is based on a generalization of the well-known method of linearizatio...
Claus Diem
ASIACRYPT
2004
Springer
13 years 10 months ago
Cryptanalysis of Bluetooth Keystream Generator Two-Level E0
Yi Lu 0002, Serge Vaudenay
ASIACRYPT
2004
Springer
13 years 10 months ago
Privacy in Non-private Environments
Markus Bläser, Andreas Jakoby, Maciej Liskiew...
ASIACRYPT
2004
Springer
13 years 10 months ago
Strong Conditional Oblivious Transfer and Computing on Intervals
We consider the problem of securely computing the Greater Than (GT) predicate and its generalization – securely determining membership in a union of intervals. We approach these ...
Ian F. Blake, Vladimir Kolesnikov
ASIACRYPT
2004
Springer
13 years 10 months ago
Towards Plaintext-Aware Public-Key Encryption Without Random Oracles
Mihir Bellare, Adriana Palacio
ASIACRYPT
2004
Springer
13 years 10 months ago
Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes
An untraceable fair network payment protocol is proposed by Wang in Asiacrypt’03, which employs the existent techniques of the offline untraceable cash and a new technique calle...
Feng Bao
ASIACRYPT
2004
Springer
13 years 10 months ago
How Far Can We Go Beyond Linear Cryptanalysis?
Abstract. Several generalizations of linear cryptanalysis have been proposed in the past, as well as very similar attacks in a statistical point of view. In this paper, we define ...
Thomas Baignères, Pascal Junod, Serge Vaude...
ASIACRYPT
2004
Springer
13 years 10 months ago
Secret Handshakes from CA-Oblivious Encryption
Secret handshakes were recently introduced [BDS+ 03] to allow members of the same group to authenticate each other secretly, in the sense that someone who is not a group member ca...
Claude Castelluccia, Stanislaw Jarecki, Gene Tsudi...
ASIACRYPT
2004
Springer
13 years 10 months ago
Sieving Using Bucket Sort
This paper proposes a new sieving algorithm that employs a bucket sort as a part of a factoring algorithm such as the number field sieve. The sieving step requires an enormous num...
Kazumaro Aoki, Hiroki Ueda