Sciweavers

PKC
1998
Springer
123views Cryptology» more  PKC 1998»
13 years 7 months ago
Two Efficient Algorithms for Arithmetic of Elliptic Curves Using Frobenius Map
In this paper, we present two efficient algorithms computing scalar multiplications of a point in an elliptic curve defined over a small finite field, the Frobenius map of which ha...
Jung Hee Cheon, Sung-Mo Park, Sangwoo Park, Daeho ...
PKC
1998
Springer
107views Cryptology» more  PKC 1998»
13 years 8 months ago
On the Security of ElGamal Based Encryption
The ElGamal encryption scheme has been proposed several years ago and is one of the few probabilistic encryption schemes. However, its security has never been concretely proven bas...
Yiannis Tsiounis, Moti Yung
PKC
1998
Springer
134views Cryptology» more  PKC 1998»
13 years 8 months ago
How (not) to Design RSA Signature Schemes
The concept of public-key cryptography was invented in 1976 by Diffie and Hellman [DH]. The following year, Rivest, Shamir and Adleman provided an implementation of this idea [RSA]...
Jean-François Misarsky
PKC
1998
Springer
158views Cryptology» more  PKC 1998»
13 years 8 months ago
A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation
One-way hash functions are an important tool in achieving authentication and data integrity. The aim of this paper is to propose a novel one-way hash function based on cellular aut...
Miodrag J. Mihaljevic, Yuliang Zheng, Hideki Imai
PKC
1998
Springer
126views Cryptology» more  PKC 1998»
13 years 8 months ago
Certifying Trust
A basic function of all signatures, digital or not, is to express trust and authority, explicit or implied. This is especially the case with digital signatures used in certificates...
Ilari Lehti, Pekka Nikander
PKC
1998
Springer
103views Cryptology» more  PKC 1998»
13 years 8 months ago
A Scheme for Obtaining a Message from the Digital Multisignature
A new digital multisignature scheme shall be proposed in this paper to allow some members of a group signing the same document and sending it to the receiver, who in turn shall ve...
Chin-Chen Chang, Jyh-Jong Leu, Pai-Cheng Huang, We...
PKC
1998
Springer
135views Cryptology» more  PKC 1998»
13 years 8 months ago
A Signcryption Scheme with Signature Directly Verifiable by Public Key
Signcryption, first proposed by Zheng [4,5], is a cryptographic primitive which combines both the functions of digital signature and public key encryption in a logical single step,...
Feng Bao, Robert H. Deng
PKC
1998
Springer
95views Cryptology» more  PKC 1998»
13 years 8 months ago
Overview of Elliptic Curve Cryptography
In this article, we look at the elliptic curve cryptography, which is believed to be one of the most promising candidates for the next generation cryptographic tool. The following ...
Kiyomichi Araki, Takakazu Satoh, Shinji Miura