Sciweavers

ASIACRYPT
2006
Springer
15 years 7 months ago
Finding SHA-1 Characteristics: General Results and Applications
The most efficient collision attacks on members of the SHA family presented so far all use complex characteristics which were manually constructed by Wang et al. In this report, we...
Christophe De Cannière, Christian Rechberge...
CIA
2004
Springer
15 years 7 months ago
Auction Equilibrium Strategies for Task Allocation in Uncertain Environments
Abstract. In this paper we address a model of self interested information agents competing to perform tasks. The agents are situated in an uncertain environment while different tas...
David Sarne, Meirav Hadad, Sarit Kraus
ASIACRYPT
2006
Springer
15 years 7 months ago
A Scalable Password-Based Group Key Exchange Protocol in the Standard Model
This paper presents a secure constant-round password-based group key exchange protocol in the common reference string model. Our protocol is based on the group key exchange protoco...
Michel Abdalla, David Pointcheval
ASIACRYPT
2006
Springer
15 years 7 months ago
New Cryptanalytic Results on IDEA
Eli Biham, Orr Dunkelman, Nathan Keller