Sciweavers

PKC
2000
Springer
118views Cryptology» more  PKC 2000»
13 years 8 months ago
An Identification Scheme Based on Sparse Polynomials
This paper gives a new example of exploiting the idea of using polynomials with restricted coefficients over finite fields and rings to construct reliable cryptosystems and identif...
William D. Banks, Daniel Lieman, Igor Shparlinski
ACISP
2007
Springer
13 years 8 months ago
Efficient and Secure Comparison for On-Line Auctions
In this note, we describe a correction to the cryptosystem proposed in [1, 2]. Although the correction is small and does not affect the performance of the protocols from [1, 2], it...
Ivan Damgård, Martin Geisler, Mikkel Kr&osla...
ASIACRYPT
2000
Springer
13 years 9 months ago
Strengthening McEliece Cryptosystem
McEliece cryptosystem is a public-key cryptosystem based on error-correcting codes. It constitutes one of the few alternatives to cryptosystems relying on number theory. We present...
Pierre Loidreau
ISCC
2003
IEEE
112views Communications» more  ISCC 2003»
13 years 9 months ago
Performance Evaluation of Public-Key Cryptosystem Operations in WTLS Protocol
WTLS (Wireless Transport Layer Security) is an important standard protocol for secure wireless access to Internet services. WTLS employs public-key cryptosystems during the handsh...
Albert Levi, Erkay Savas
ACNS
2004
Springer
106views Cryptology» more  ACNS 2004»
13 years 10 months ago
On the Security of Cryptosystems with All-or-Nothing Transform
We study the data privacy of cryptosystems with All-or-Nothing transform (AONT). An AONT is an efficient computable transform with two properties: Given all the bits of its output...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
PKC
2005
Springer
156views Cryptology» more  PKC 2005»
13 years 10 months ago
Cryptanalysis of HFEv and Internal Perturbation of HFE
Hidden field equation (HFE) multivariable cryptosystems were first suggested by Patarin. Kipnis and Shamir showed that to make the cryptosystem secure, a special parameter D of a...
Jintai Ding, Dieter Schmidt
KES
2005
Springer
13 years 10 months ago
Weak Key Analysis and Micro-controller Implementation of CA Stream Ciphers
Abstract. In the paper we extend known results studying the application of CAs for stream ciphers. We illustrate the notion of weak keys in such a cryptosystem and describe the exp...
Pascal Bouvry, Gilbert Klein, Franciszek Seredynsk...
PKC
2007
Springer
100views Cryptology» more  PKC 2007»
13 years 10 months ago
Multi-bit Cryptosystems Based on Lattice Problems
Abstract. We propose multi-bit versions of several single-bit cryptosystems based on lattice problems, the error-free version of the Ajtai-Dwork cryptosystem by Goldreich, Goldwass...
Akinori Kawachi, Keisuke Tanaka, Keita Xagawa