Sciweavers

INDOCRYPT
2005
Springer
13 years 9 months ago
Anonymous Password-Based Authenticated Key Exchange
Duong Viet, Akihiro Yamamura, Hidema Tanaka
INDOCRYPT
2005
Springer
13 years 9 months ago
A Universally Composable Scheme for Electronic Cash
We propose a scheme for electronic cash based on symmetric primitives. The scheme is secure in the framework for universal composability assuming the existence of a symmetric CCA2-...
Mårten Trolin
INDOCRYPT
2005
Springer
13 years 9 months ago
Completion Attacks and Weak Keys of Oleshchuk's Public Key Cryptosystem
This paper revisits a public key cryptosystem which is based on finite string-rewriting systems. We consider a new approach for cryptanalysis of such proposals—the so-called com...
Heiko Stamer
INDOCRYPT
2005
Springer
13 years 9 months ago
Towards Optimal Double-Length Hash Functions
In this paper we design several double length hash functions and study their security properties in the random oracle model. We design a class of double length hash functions (and ...
Mridul Nandi
INDOCRYPT
2005
Springer
13 years 9 months ago
Cryptanalysis of the Quadratic Generator
Let p be a prime and let a and c be integers modulo p. The quadratic congruential generator (QCG) is a sequence (vn) of pseudorandom numbers defined by the relation vn+1 ≡ av2 n...
Domingo Gómez, Jaime Gutierrez, Álva...
INDOCRYPT
2005
Springer
13 years 9 months ago
MaTRU: A New NTRU-Based Cryptosystem
Abstract. In this paper, we propose a new variant of the NTRU public key cryptosystem − the MaTRU cryptosystem. MaTRU works under the same general principles as the NTRU cryptosy...
Michael Coglianese, Bok-Min Goi
INDOCRYPT
2005
Springer
13 years 9 months ago
On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks
Prouff has introduced recently, at FSE 2005, the notion of transparency order of S-boxes. This new characteristic is related to the ability of an S-box, used in a cryptosystem in ...
Claude Carlet
INDOCRYPT
2005
Springer
13 years 9 months ago
Short Undeniable Signatures Without Random Oracles: The Missing Link
Abstract. We introduce a new undeniable signature scheme which is existentially unforgeable and anonymous under chosen message attacks in the standard model. The scheme is an embed...
Fabien Laguillaumie, Damien Vergnaud
INDOCRYPT
2005
Springer
13 years 9 months ago
On the Algebraic Immunity of Symmetric Boolean Functions
In this paper, we analyse the algebraic immunity of symmetric Boolean functions. We identify a set of lowest degree annihilators for symmetric functions and propose an efficient al...
An Braeken, Bart Preneel
INDOCRYPT
2005
Springer
13 years 9 months ago
Two Algebraic Attacks Against the F-FCSRs Using the IV Mode
This article presents some new results concerning two algebraic attacks against the F-FCSR constructions proposed in [2]. We focus on the parameters of the stream ciphers proposed ...
Thierry P. Berger, Marine Minier