Sciweavers

CTRSA
2005
Springer
210views Cryptology» more  CTRSA 2005»
13 years 10 months ago
Hold Your Sessions: An Attack on Java Session-Id Generation
HTTP session-id’s take an important role in almost any web site today. This paper presents a cryptanalysis of Java Servlet 128-bit session-id’s and an efficient practical predi...
Zvi Gutterman, Dahlia Malkhi
CTRSA
2005
Springer
154views Cryptology» more  CTRSA 2005»
13 years 10 months ago
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings
We present the first blind identity-based signcryption (BIBSC). We formulate its security model and define the security notions of blindness and parallel one-more unforgeability ...
Tsz Hon Yuen, Victor K. Wei
CTRSA
2005
Springer
79views Cryptology» more  CTRSA 2005»
13 years 10 months ago
Malicious Cryptography: Kleptographic Aspects
Abstract. In the last few years we have concentrated our research efforts on new threats to the computing infrastructure that are the result of combining malicious software (malwar...
Adam Young, Moti Yung
CTRSA
2005
Springer
91views Cryptology» more  CTRSA 2005»
13 years 10 months ago
Design and Analysis of Password-Based Key Derivation Functions
Frances F. Yao, Yiqun Lisa Yin
CTRSA
2005
Springer
92views Cryptology» more  CTRSA 2005»
13 years 10 months ago
Update on SHA-1
Abstract. We report on the experiments we performed in order to assess the security of SHA-1 against the attack by Chabaud and Joux [5]. We present some ideas for optimizations of ...
Vincent Rijmen, Elisabeth Oswald
CTRSA
2005
Springer
88views Cryptology» more  CTRSA 2005»
13 years 10 months ago
Sub-linear Queries Statistical Databases: Privacy with Power
Abstract. We consider a statistical database in which a trusted administrator introduces noise to the query responses with the goal of maintaining privacy of individual database en...
Cynthia Dwork
CTRSA
2005
Springer
221views Cryptology» more  CTRSA 2005»
13 years 10 months ago
Accumulators from Bilinear Pairings and Applications
We propose a dynamic accumulator scheme from bilinear pairings, whose security is based on the Strong Diffie-Hellman assumption. We show applications of this accumulator in constru...
Lan Nguyen
CTRSA
2005
Springer
78views Cryptology» more  CTRSA 2005»
13 years 10 months ago
New Minimal Weight Representations for Left-to-Right Window Methods
For an integer w ≥ 2, a radix 2 representation is called a width-w nonadjacent form (w-NAF, for short) if each nonzero digit is an odd integer with absolute value less than 2w−...
James A. Muir, Douglas R. Stinson
CTRSA
2005
Springer
108views Cryptology» more  CTRSA 2005»
13 years 10 months ago
A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box
This work proposes a compact implementation of the AES S-box using composite field arithmetic in GF(((22 ) 2 ) 2 ). It describes a systematic exploration of different choices for...
Nele Mentens, Lejla Batina, Bart Preneel, Ingrid V...
CTRSA
2005
Springer
138views Cryptology» more  CTRSA 2005»
13 years 10 months ago
CryptoGraphics: Secret Key Cryptography Using Graphics Cards
We study the feasibility of using Graphics Processing Units (GPUs) for cryptographic processing, by exploiting the ability for GPUs to simultaneously process large quantities of pi...
Debra L. Cook, John Ioannidis, Angelos D. Keromyti...