Sciweavers

CRYPTO
1997
Springer
156views Cryptology» more  CRYPTO 1997»
13 years 8 months ago
Fast and Secure Hashing Based on Codes
This paper considers hash functions based on block ciphers. It presents a new attack on the compression function of the 128-bit hash function MDC-4 using DES with a complexity far ...
Lars R. Knudsen, Bart Preneel
CRYPTO
1997
Springer
207views Cryptology» more  CRYPTO 1997»
13 years 8 months ago
Public-Key Cryptosystems from Lattice Reduction Problems
We present a new proposal for a trapdoor one-way function, from which we derive public-key encryption and digital signatures. The security of the new construction is based on the ...
Oded Goldreich, Shafi Goldwasser, Shai Halevi
CRYPTO
1997
Springer
169views Cryptology» more  CRYPTO 1997»
13 years 8 months ago
Deniable Encryption
Consider a situation in which the transmission of encrypted messages is intercepted by an adversary who can later ask the sender to reveal the random choices and also the secret ...
Ran Canetti, Cynthia Dwork, Moni Naor, Rafail Ostr...
CRYPTO
1997
Springer
108views Cryptology» more  CRYPTO 1997»
13 years 8 months ago
Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack
: The McEliece public-key cryptosystem fails to protect any message which is sent to a recipient more than once using different random error vectors. In general, it fails to protec...
Thomas A. Berson
CRYPTO
1997
Springer
128views Cryptology» more  CRYPTO 1997»
13 years 8 months ago
Collision-Resistant Hashing: Towards Making UOWHFs Practical
ded abstract of this paper appears in Advances in Cryptology { Crypto 97 Proceedings, Lecture Notes in Computer Science Vol. 1294, B. Kaliski ed., Springer-Verlag, 1997. This is th...
Mihir Bellare, Phillip Rogaway