Sciweavers

CRYPTO
1995
Springer
140views Cryptology» more  CRYPTO 1995»
15 years 4 months ago
Bucket Hashing and its Application to Fast Message Authentication
We introduce a new technique for constructing a family of universal hash functions. At its center is a simple metaphor: to hash a string x, cast each of its words into a small numb...
Phillip Rogaway
110
Voted
CRYPTO
1995
Springer
135views Cryptology» more  CRYPTO 1995»
15 years 4 months ago
Committed Oblivious Transfer and Private Multi-Party Computation
Abstract. In this paper we present an eficient protocol for “Committed Oblivious Transfer” to perform oblivious transfer on committed bits: suppose Alice is committed to bits 0...
Claude Crépeau, Jeroen van de Graaf, Alain ...
97
Voted
CRYPTO
1995
Springer
111views Cryptology» more  CRYPTO 1995»
15 years 4 months ago
Fast Key Exchange with Elliptic Curve Systems
The Diffie-Hellman key exchange algorithm can be implemented using the group of points on an elliptic curve over the field F2n. A software version of this using n = 155 can be o...
Richard Schroeppel, Hilarie K. Orman, Sean W. O'Ma...
89
Voted
CRYPTO
1995
Springer
100views Cryptology» more  CRYPTO 1995»
15 years 4 months ago
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, M...
85
Voted
CRYPTO
1995
Springer
91views Cryptology» more  CRYPTO 1995»
15 years 4 months ago
Some Remarks on Lucas-Based Cryptosystems
We review the well-known relation between Lucas sequences and exponentiation. This leads to the observation that certain public-key cryptosystems that are based on the use of Lucas...
Daniel Bleichenbacher, Wieb Bosma, Arjen K. Lenstr...
Cryptology
Top of PageReset Settings