Sciweavers

CTRSA
2005
Springer
154views Cryptology» more  CTRSA 2005»
13 years 10 months ago
A New Two-Party Identity-Based Authenticated Key Agreement
We present a new two-party identity-based key agreement that is more efficient than previously proposed schemes. It is inspired on a new identity-based key pair derivation algorith...
Noel McCullagh, Paulo S. L. M. Barreto
CTRSA
2005
Springer
88views Cryptology» more  CTRSA 2005»
13 years 10 months ago
Side-Channel Leakage of Masked CMOS Gates
There are many articles and patents on the masking of logic gates. However, the existing publications assume that a masked logic gate switches its output no more than once per cloc...
Stefan Mangard, Thomas Popp, Berndt M. Gammel
CTRSA
2005
Springer
78views Cryptology» more  CTRSA 2005»
13 years 10 months ago
A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes
The Unbalanced Oil and Vinegar scheme (UOV) is a signature scheme based on multivariate quadratic equations. It uses m equations and n variables. A total of v of these are called ...
An Braeken, Christopher Wolf, Bart Preneel
CTRSA
2005
Springer
121views Cryptology» more  CTRSA 2005»
13 years 10 months ago
Time-Selective Convertible Undeniable Signatures
Undeniable signatures were introduced in 1989 by Chaum and van Antwerpen to limit the self-authenticating property of digital signatures. An extended concept – the convertible un...
Fabien Laguillaumie, Damien Vergnaud
CTRSA
2005
Springer
108views Cryptology» more  CTRSA 2005»
13 years 10 months ago
Resistance of SNOW 2.0 Against Algebraic Attacks
SNOW 2.0, a software oriented stream cipher proposed by T. Johansson and P. Ekdahl in 2002 as an enhanced version of the
Olivier Billet, Henri Gilbert
CTRSA
2005
Springer
121views Cryptology» more  CTRSA 2005»
13 years 10 months ago
Foundations of Group Signatures: The Case of Dynamic Groups
Mihir Bellare, Haixia Shi, Chong Zhang
CTRSA
2005
Springer
128views Cryptology» more  CTRSA 2005»
13 years 10 months ago
Simple Password-Based Encrypted Key Exchange Protocols
Michel Abdalla, David Pointcheval
CTRSA
2005
Springer
72views Cryptology» more  CTRSA 2005»
13 years 10 months ago
Proofs for Two-Server Password Authentication
Traditional password-based authentication and key-exchange protocols suffer from the simple fact that a single server stores the sensitive user password. In practice, when such a ...
Michael Szydlo, Burton S. Kaliski Jr.