Sciweavers

ASIACRYPT
2005
Springer
13 years 10 months ago
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchco...
ASIACRYPT
2005
Springer
13 years 10 months ago
Spreading Alerts Quietly and the Subgroup Escape Problem
We introduce a new cryptographic primitive called the blind coupon mechanism (BCM). In effect, the BCM is an authenticated bit commitment scheme, which is AND-homomorphic. It has n...
James Aspnes, Zoë Diamadi, Kristian Gjø...
ASIACRYPT
2005
Springer
13 years 10 months ago
Privacy-Preserving Graph Algorithms in the Semi-honest Model
Abstract. We consider scenarios in which two parties, each in possession of a graph, wish to compute some algorithm on their joint graph in a privacy-preserving manner, that is, wi...
Justin Brickell, Vitaly Shmatikov
ASIACRYPT
2005
Springer
13 years 10 months ago
A Simple Threshold Authenticated Key Exchange from Short Secrets
Michel Abdalla, Olivier Chevassut, Pierre-Alain Fo...
ASIACRYPT
2005
Springer
13 years 10 months ago
A Related-Key Rectangle Attack on the Full KASUMI
Eli Biham, Orr Dunkelman, Nathan Keller