Sciweavers

CTRSA
2004
Springer
114views Cryptology» more  CTRSA 2004»
13 years 8 months ago
Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95
We present a cryptanalysis of a zero-knowledge identification protocol introduced by Naccache et al. at Eurocrypt '95. Our cryptanalysis enables a polynomial-time attacker to ...
Jean-Sébastien Coron, David Naccache
CTRSA
2004
Springer
106views Cryptology» more  CTRSA 2004»
13 years 8 months ago
Improving Robustness of PGP Keyrings by Conflict Detection
Abstract. Secure authentication frequently depends on the correct recognition of a user's public key. When there is no certificate authority, this key is obtained from other u...
Qinglin Jiang, Douglas S. Reeves, Peng Ning
CTRSA
2004
Springer
124views Cryptology» more  CTRSA 2004»
13 years 9 months ago
A Parallelizable Enciphering Mode
We describe a block-cipher mode of operation, EME, that turns an n-bit block cipher into
Shai Halevi, Phillip Rogaway
CTRSA
2004
Springer
91views Cryptology» more  CTRSA 2004»
13 years 9 months ago
Periodic Properties of Counter Assisted Stream Ciphers
Abstract. This paper analyses periodic properties of counter assisted stream ciphers. In particular, we analyze constructions where the counter system also has the purpose of provi...
Ove Scavenius, Martin Boesgaard, Thomas Pedersen, ...
CTRSA
2004
Springer
59views Cryptology» more  CTRSA 2004»
13 years 9 months ago
Yet Another Sieving Device
Abstract. A compact mesh architecture for supporting the relation collection step of the number field sieve is described. Differing from TWIRL, only isolated chips without inter-...
Willi Geiselmann, Rainer Steinwandt
CTRSA
2004
Springer
87views Cryptology» more  CTRSA 2004»
13 years 9 months ago
Padding Oracle Attacks on the ISO CBC Mode Encryption Standard
Abstract. In [8] Vaudenay presented an attack on block cipher CBCmode encryption when a particular padding method is used. In this paper, we employ a similar approach to analyse th...
Kenneth G. Paterson, Arnold K. L. Yau
CTRSA
2004
Springer
96views Cryptology» more  CTRSA 2004»
13 years 9 months ago
Self-Randomized Exponentiation Algorithms
Abstract. Exponentiation is a central process in many public-key cryptosystems such as RSA and DH. This paper introduces the concept of self-randomized exponentiation as an efficie...
Benoît Chevallier-Mames
CTRSA
2004
Springer
120views Cryptology» more  CTRSA 2004»
13 years 9 months ago
Identity Based Undeniable Signatures
Abstract. In this paper, we give a first example of identity based undeniable signature using pairings over elliptic curves. We extend to the identity based setting the security m...
Benoît Libert, Jean-Jacques Quisquater
CTRSA
2004
Springer
89views Cryptology» more  CTRSA 2004»
13 years 9 months ago
Universal Re-encryption for Mixnets
We introduce a new cryptographic technique that we call universal re-encryption. A conventional cryptosystem that permits reencryption, such as ElGamal, does so only for a player w...
Philippe Golle, Markus Jakobsson, Ari Juels, Paul ...
CTRSA
2004
Springer
114views Cryptology» more  CTRSA 2004»
13 years 9 months ago
Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems
This paper presents a scalable hardware implementation of both commonly used public key cryptosystems, RSA and Elliptic Curve Cryptosystem (ECC) on the same platform. The introduce...
Lejla Batina, Geeke Bruin-Muurling, Siddika Berna ...