Sciweavers

ICISC
2000
102views Cryptology» more  ICISC 2000»
13 years 6 months ago
Micropayments for Wireless Communications
Abstract. Electronic payment systems for wireless devices need to take into account the limited computational and storage ability of such devices. Micropayment schemes seem well su...
DongGook Park, Colin Boyd, Ed Dawson
ICISC
2000
73views Cryptology» more  ICISC 2000»
13 years 6 months ago
A Multi-party Optimistic Non-repudiation Protocol
In this paper we consider the optimistic approach of the non-repudiation protocols. We study a non-repudiation protocol with off-line trusted third party and we keep on with the de...
Olivier Markowitch, Steve Kremer
ICISC
2000
126views Cryptology» more  ICISC 2000»
13 years 6 months ago
Cryptographic Applications of Sparse Polynomials over Finite Rings
Abstract. This paper gives new examples that exploit the idea of using sparse polynomials with restricted coefficients over a finite ring for designing fast, reliable cryptosystems...
William D. Banks, Daniel Lieman, Igor Shparlinski,...
ICISC
1998
110views Cryptology» more  ICISC 1998»
13 years 6 months ago
The nonhomomorphicity of S-boxes
Abstract. In this paper, we introduce the concept of kth-order nonhomomorphicity of mappings or S-boxes as an alternative indicator that forecasts nonlinearity characteristics of a...
Yuliang Zheng, Xian-Mo Zhang
ICISC
1998
87views Cryptology» more  ICISC 1998»
13 years 6 months ago
Rabin and RSA analogues based on non-maximal imaginary quadratic orders
Abstract. In 14] and 21] there are proposed ElGamal-type cryptosystems based on non-maximal imaginary quadratic orders with fast trapdoor decryption. The trapdoor information is th...
Detlef Hühnlein, Andreas Meyer, Tsuyoshi Taka...
ICISC
1998
132views Cryptology» more  ICISC 1998»
13 years 6 months ago
The flood-gate principle - a hybrid approach to a high security solution
The classical role of a firewall consists in protecting a computer network against attacks from the outside world, especially the Internet. Firewalls are often expensive, hard to c...
Ernst Georg Haffner, Thomas Engel, Christoph Meine...
ICISC
1998
99views Cryptology» more  ICISC 1998»
13 years 6 months ago
Public key protocols for wireless communications
Abstract. Protocols for authentication and key establishment have special requirements in a wireless environment. In the next generation of wireless systems it is likely that publi...
Colin Boyd, DongGook Park
ICISC
2003
89views Cryptology» more  ICISC 2003»
13 years 6 months ago
Security Analysis of Some Proxy Signatures
Abstract. A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former...
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. De...
ICISC
2003
108views Cryptology» more  ICISC 2003»
13 years 6 months ago
On the Security of a Group Signature Scheme with Forward Security
A group signature scheme allows a group member of a given group to sign messages on behalf of the group in an anonymous and unlinkable way. In case of a dispute, however, a design...
Guilin Wang