Sciweavers

Share
EUROCRYPT
2008
Springer
8 years 5 months ago
Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme
In the model of perfectly secure message transmission schemes (PSMTs), there are n channels between a sender and a receiver. An infinitely powerful adversary A may corrupt (observe...
Kaoru Kurosawa, Kazuhiro Suzuki
EUROCRYPT
2008
Springer
8 years 5 months ago
A New Mode of Operation for Block Ciphers and Length-Preserving MACs
Yevgeniy Dodis, Krzysztof Pietrzak, Prashant Puniy...
EUROCRYPT
2008
Springer
8 years 5 months ago
Efficient Two Party and Multi Party Computation Against Covert Adversaries
Recently, Aumann and Lindell introduced a new realistic security model for secure computation, namely, security against covert adversaries. The main motivation was to obtain secure...
Vipul Goyal, Payman Mohassel, Adam Smith
EUROCRYPT
2008
Springer
8 years 5 months ago
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
Lei Wang, Kazuo Ohta, Noboru Kunihiro
EUROCRYPT
2008
Springer
8 years 5 months ago
Isolated Proofs of Knowledge and Isolated Zero Knowledge
We introduce a new notion called -isolated proofs of knowledge ( -IPoK). These are proofs of knowledge where a cheating prover is allowed to exchange up to bits of communication wi...
Ivan Damgård, Jesper Buus Nielsen, Daniel Wi...
EUROCRYPT
2008
Springer
8 years 5 months ago
On the Indifferentiability of the Sponge Construction
Abstract. In this paper we prove that the sponge construction introduced in [4] is indifferentiable from a random oracle when being used with a random transformation or a random pe...
Guido Bertoni, Joan Daemen, Michael Peeters, Gille...
EUROCRYPT
2008
Springer
8 years 5 months ago
Proving Tight Security for Rabin-Williams Signatures
This paper proves "tight security in the random-oracle model relative to factorization" for the lowest-cost signature systems available today: every hash-generic signatur...
Daniel J. Bernstein
EUROCRYPT
2008
Springer
8 years 5 months ago
A Practical Attack on KeeLoq
Sebastiaan Indesteege, Nathan Keller, Orr Dunkelma...
EUROCRYPT
2008
Springer
8 years 5 months ago
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
Consider an abstract storage device (G) that can hold a single element x from a fixed, publicly known finite group G. Storage is private in the sense that an adversary does not hav...
Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles ...
books