Sciweavers

PKC
2005
Springer
192views Cryptology» more  PKC 2005»
13 years 9 months ago
Securing RSA-KEM via the AES
RSA-KEM is a popular key encapsulation mechanism that combines the RSA trapdoor permutation with a key derivation function (KDF). Often the details of the KDF are viewed as orthogo...
Jakob Jonsson, Matthew J. B. Robshaw
PKC
2005
Springer
110views Cryptology» more  PKC 2005»
13 years 9 months ago
From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited
To sign with RSA, one usually encodes the message m as µ(m) and then raises the result to the private exponent modulo N. In Asiacrypt 2000, Coron et al. showed how to build a secu...
Julien Cathalo, Jean-Sébastien Coron, David...
PKC
2005
Springer
125views Cryptology» more  PKC 2005»
13 years 9 months ago
A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures as Short as Possible
We answer the open question of the possibility of building a digital signature scheme with proven security based on the one-wayness of a trapdoor permutation and with signatures as...
Louis Granboulan
PKC
2005
Springer
67views Cryptology» more  PKC 2005»
13 years 9 months ago
Symmetric Subgroup Membership Problems
Abstract. We define and discuss symmetric subgroup membership problems and their properties, including a relation to the Decision DiffieHellman problem. We modify the Cramer-Shoup...
Kristian Gjøsteen
PKC
2005
Springer
125views Cryptology» more  PKC 2005»
13 years 9 months ago
Breaking a Cryptographic Protocol with Pseudoprimes
The Miller-Rabin pseudo primality test is widely used in cryptographic libraries, because of its apparent simplicity. But the test is not always correctly implemented. For example ...
Daniel Bleichenbacher
PKC
2005
Springer
98views Cryptology» more  PKC 2005»
13 years 9 months ago
A Verifiable Random Function with Short Proofs and Keys
Yevgeniy Dodis, Aleksandr Yampolskiy
PKC
2005
Springer
156views Cryptology» more  PKC 2005»
13 years 9 months ago
Cryptanalysis of HFEv and Internal Perturbation of HFE
Hidden field equation (HFE) multivariable cryptosystems were first suggested by Patarin. Kipnis and Shamir showed that to make the cryptosystem secure, a special parameter D of a...
Jintai Ding, Dieter Schmidt
PKC
2005
Springer
90views Cryptology» more  PKC 2005»
13 years 9 months ago
Password-Based Authenticated Key Exchange in the Three-Party Setting
Michel Abdalla, Pierre-Alain Fouque, David Pointch...