Sciweavers

ACNS
2009
Springer
158views Cryptology» more  ACNS 2009»
13 years 12 months ago
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack
We propose a new variant of the Cramer-Shoup KEM (key encapsulation mechanism). The proposed variant is more efficient than the original Cramer-Shoup KEM scheme in terms of public...
Joonsang Baek, Willy Susilo, Joseph K. Liu, Jianyi...
ACNS
2009
Springer
102views Cryptology» more  ACNS 2009»
13 years 12 months ago
Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches
Philip S. Hirschhorn, Jeffrey Hoffstein, Nick Howg...
ACNS
2009
Springer
109views Cryptology» more  ACNS 2009»
13 years 12 months ago
Dual-Policy Attribute Based Encryption
Nuttapong Attrapadung, Hideki Imai
ACNS
2009
Springer
152views Cryptology» more  ACNS 2009»
13 years 12 months ago
Homomorphic MACs: MAC-Based Integrity for Network Coding
Abstract. Network coding has been shown to improve the capacity and robustness in networks. However, since intermediate nodes modify packets en-route, integrity of data cannot be c...
Shweta Agrawal, Dan Boneh
ACNS
2009
Springer
162views Cryptology» more  ACNS 2009»
13 years 12 months ago
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks
Abstract. Being able to access and provide Internet services anonymously is an important mechanism to ensure freedom of speech in vast parts of the world. Offering location-hidden...
Jörg Lenhard, Karsten Loesing, Guido Wirtz
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
13 years 12 months ago
Integrity Protection for Revision Control
Abstract. Users of online-collaboration tools and network storage services place considerable trust in their providers. This paper presents a novel approach for protecting data int...
Christian Cachin, Martin Geisler
ACNS
2009
Springer
114views Cryptology» more  ACNS 2009»
13 years 12 months ago
Broadcast Attacks against Lattice-Based Cryptosystems
Thomas Plantard, Willy Susilo
ACNS
2009
Springer
143views Cryptology» more  ACNS 2009»
13 years 12 months ago
A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks
Abstract. We examine the problem of message recognition by reviewing the definitions and the security model in the literature. In particular, we examine the Jane Doe protocol, whi...
Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson
FSE
2009
Springer
143views Cryptology» more  FSE 2009»
14 years 2 days ago
New Distinguishing Attack on MAC Using Secret-Prefix Method
Xiaoyun Wang, Wei Wang, Keting Jia, Meiqin Wang
FSE
2009
Springer
107views Cryptology» more  FSE 2009»
14 years 2 days ago
Multidimensional Extension of Matsui's Algorithm 2
Matsui’s one-dimensional Alg. 2 can be used for recovering bits of the last round key of a block cipher. In this paper a truly multidimensional extension of Alg. 2 based on estab...
Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg