102
click to vote
ASIACRYPT
15 years 6 months ago
2003 Springer
Most ancient Chinese padlocks are key-operated locks with splitting springs, and partially keyless letter-combination locks. They can be characterized based on the types of locks, ...
117
click to vote
ASIACRYPT
15 years 4 months ago
2003 Springer
This paper introduces the concept of certificateless public key cryptography (CL-PKC). In contrast to traditional public key cryptographic systems, CL-PKC does not require the use...
117
click to vote
ASIACRYPT
15 years 6 months ago
2003 Springer
In this paper1 we propose a new symmetric block cipher with the following paradoxical traceability properties: it is computationally easy to derive many equivalent secret keys prov...
ASIACRYPT
15 years 6 months ago
2003 Springer
Authenticated Key Establishment (AKE) protocols enable two entities, say a client (or a user) and a server, to share common session keys in an authentic way. In this paper, we revi...
116
click to vote
ASIACRYPT
15 years 4 months ago
2003 Springer
We propose a new public key trace and revoke scheme secure against adaptive chosen ciphertext attack. Our scheme is more efficient than the DF scheme suggested by Y. Dodis and N. F...
|