Sciweavers

PKC
2005
Springer
110views Cryptology» more  PKC 2005»
13 years 10 months ago
From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited
To sign with RSA, one usually encodes the message m as µ(m) and then raises the result to the private exponent modulo N. In Asiacrypt 2000, Coron et al. showed how to build a secu...
Julien Cathalo, Jean-Sébastien Coron, David...
PKC
2005
Springer
125views Cryptology» more  PKC 2005»
13 years 10 months ago
A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures as Short as Possible
We answer the open question of the possibility of building a digital signature scheme with proven security based on the one-wayness of a trapdoor permutation and with signatures as...
Louis Granboulan
PKC
2005
Springer
67views Cryptology» more  PKC 2005»
13 years 10 months ago
Symmetric Subgroup Membership Problems
Abstract. We define and discuss symmetric subgroup membership problems and their properties, including a relation to the Decision DiffieHellman problem. We modify the Cramer-Shoup...
Kristian Gjøsteen
PKC
2005
Springer
125views Cryptology» more  PKC 2005»
13 years 10 months ago
Breaking a Cryptographic Protocol with Pseudoprimes
The Miller-Rabin pseudo primality test is widely used in cryptographic libraries, because of its apparent simplicity. But the test is not always correctly implemented. For example ...
Daniel Bleichenbacher
PKC
2005
Springer
98views Cryptology» more  PKC 2005»
13 years 10 months ago
A Verifiable Random Function with Short Proofs and Keys
Yevgeniy Dodis, Aleksandr Yampolskiy
PKC
2005
Springer
156views Cryptology» more  PKC 2005»
13 years 10 months ago
Cryptanalysis of HFEv and Internal Perturbation of HFE
Hidden field equation (HFE) multivariable cryptosystems were first suggested by Patarin. Kipnis and Shamir showed that to make the cryptosystem secure, a special parameter D of a...
Jintai Ding, Dieter Schmidt
PKC
2005
Springer
90views Cryptology» more  PKC 2005»
13 years 10 months ago
Password-Based Authenticated Key Exchange in the Three-Party Setting
Michel Abdalla, Pierre-Alain Fouque, David Pointch...
HIP
2005
Springer
173views Cryptology» more  HIP 2005»
13 years 10 months ago
Characters or Faces: A User Study on Ease of Use for HIPs
Web-based services designed for human users are being abused by computer programs (bots). This real-world issue has recently generated a new research area called Human Interactive...
Yong Rui, Zicheng Liu, Shannon Kallin, Gavin Janke...
HIP
2005
Springer
168views Cryptology» more  HIP 2005»
13 years 10 months ago
Leveraging the CAPTCHA Problem
Efforts to defend against automated attacks on e-commerce services have led to a new security protocol known as a CAPTCHA, a challenge designed to exploit gaps in the perceptual a...
Daniel P. Lopresti