Sciweavers

129
Voted
ASIACRYPT
2000
Springer
15 years 7 months ago
Round-Efficient Conference Key Agreement Protocols with Provable Security
A conference key protocol allows a group of participants to establish a secret communication (conference) key so that all their communications thereafter are protected by the key. ...
Wen-Guey Tzeng, Zhi-Jia Tzeng
123
Voted
ASIACRYPT
2000
Springer
15 years 7 months ago
Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis
In this paper we introduce a structure iterated by the rule A of Skipjack and show that this structure is provably resistant against differential or linear attacks. It is the main ...
Jaechul Sung, Sangjin Lee, Jong In Lim, Seokhie Ho...
104
Voted
ASIACRYPT
2000
Springer
15 years 7 months ago
Efficient Secure Multi-party Computation
Martin Hirt, Ueli M. Maurer, Bartosz Przydatek
96
Voted
ASIACRYPT
2000
Springer
15 years 7 months ago
Attacking and Repairing Batch Verification Schemes
Colin Boyd, Chris Pavlovski