185
click to vote
CRYPTO
15 years 8 months ago
1995 Springer
We introduce a new technique for constructing a family of universal hash functions. At its center is a simple metaphor: to hash a string x, cast each of its words into a small numb...
145
click to vote
CRYPTO
15 years 8 months ago
1995 Springer
Abstract. In this paper we present an eficient protocol for “Committed Oblivious Transfer” to perform oblivious transfer on committed bits: suppose Alice is committed to bits 0...
138
click to vote
CRYPTO
15 years 8 months ago
1995 Springer
The Diffie-Hellman key exchange algorithm can be implemented using the group of points on an elliptic curve over the field F2n. A software version of this using n = 155 can be o...
122
click to vote
CRYPTO
15 years 8 months ago
1995 Springer
Abstract: We present a number of attacks, some new, on public key protocols. We also advance a number of principles which may help designers avoid many of the pitfalls, and help at...
|