Sciweavers

EUROCRYPT
2001
Springer
13 years 9 months ago
The Rectangle Attack - Rectangling the Serpent
Abstract. Serpent is one of the 5 AES finalists. The best attack published so far analyzes up to 9 rounds. In this paper we present attacks on 7-round, 8-round, and 10-round varia...
Eli Biham, Orr Dunkelman, Nathan Keller
EUROCRYPT
2001
Springer
13 years 9 months ago
Does Encryption with Redundancy Provide Authenticity?
ded abstract of this paper appears in Advances in Cryptology – EUROCRYPT ’01, Lecture
Jee Hea An, Mihir Bellare
EUROCRYPT
2001
Springer
13 years 9 months ago
Priced Oblivious Transfer: How to Sell Digital Goods
Abstract. We consider the question of protecting the privacy of customers buying digital goods. More specifically, our goal is to allow a buyer to purchase digital goods from a ve...
William Aiello, Yuval Ishai, Omer Reingold
EUROCRYPT
2001
Springer
13 years 9 months ago
A Secure Three-Move Blind Signature Scheme for Polynomially Many Signatures
Abstract. Known practical blind signature schemes whose security against adaptive and parallel attacks can be proven in the random oracle model either need five data exchanges bet...
Masayuki Abe
EUROCRYPT
2001
Springer
13 years 9 months ago
Lower Bounds for Multicast Message Authentication
Message integrity from one sender to one receiver is typically achieved by having the two parties share a secret key to compute a Message Authentication Code (MAC). We consider the...
Dan Boneh, Glenn Durfee, Matthew K. Franklin