Sciweavers

CTRSA
2007
Springer
98views Cryptology» more  CTRSA 2007»
13 years 6 months ago
Identity-Based Multi-signatures from RSA
Abstract. Multi-signatures allow multiple signers to jointly authenticate a message using a single compact signature. Many applications however require the public keys of the signe...
Mihir Bellare, Gregory Neven
CTRSA
2007
Springer
171views Cryptology» more  CTRSA 2007»
13 years 6 months ago
Compact E-Cash from Bounded Accumulator
Abstract. Known compact e-cash schemes are constructed from signature schemes with efficient protocols and verifiable random functions. In this paper, we introduce a different ap...
Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu
CTRSA
2007
Springer
147views Cryptology» more  CTRSA 2007»
13 years 8 months ago
Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement
Privacy concerns in many aspects of electronic communication trigger the need to re-examine
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
CTRSA
2007
Springer
93views Cryptology» more  CTRSA 2007»
13 years 8 months ago
Human Identification Through Image Evaluation Using Secret Predicates
Abstract. The task of developing protocols for humans to securely authenticate themselves to a remote server has been an interesting topic in cryptography as a replacement for the ...
Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungy...
CTRSA
2007
Springer
102views Cryptology» more  CTRSA 2007»
13 years 8 months ago
Improved Efficiency for Private Stable Matching
At Financial Crypto 2006, Golle presented a novel framework for the privacy preserving computation of a stable matching (stable marriage). We show that the communication complexity...
Matthew K. Franklin, Mark Gondree, Payman Mohassel
CTRSA
2007
Springer
153views Cryptology» more  CTRSA 2007»
13 years 8 months ago
Differential Power Analysis of Stream Ciphers
Side-channel attacks on block ciphers and public key algorithms have been discussed extensively. However, there is only sparse literature about side-cannel attacks on stream cipher...
Wieland Fischer, Berndt M. Gammel, O. Kniffler, J....
CTRSA
2007
Springer
110views Cryptology» more  CTRSA 2007»
13 years 10 months ago
Selecting Secure Passwords
We mathematically explore a model for the shortness and security for passwords that are stored in hashed form. The model is implicitly in the NIST publication [8] and is based on c...
Eric R. Verheul
CTRSA
2007
Springer
146views Cryptology» more  CTRSA 2007»
13 years 10 months ago
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature
Standard signature schemes are usually designed only to achieve weak unforgeability – i.e. preventing forgery of signatures on new messages not previously signed. However, most s...
Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang
CTRSA
2007
Springer
184views Cryptology» more  CTRSA 2007»
13 years 10 months ago
Cryptanalysis of Reduced Variants of the FORK-256 Hash Function
FORK-256 is a hash function presented at FSE 2006. Whereas SHA-like designs process messages in one stream, FORK-256 uses four parallel streams for hashing. In this article, we pre...
Florian Mendel, Joseph Lano, Bart Preneel
CTRSA
2007
Springer
101views Cryptology» more  CTRSA 2007»
13 years 10 months ago
MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers
Nathan Keller, Stephen D. Miller, Ilya Mironov, Ra...