256
click to vote
CRYPTO
15 years 10 months ago
2004 Springer
In the bare public-key model (BPK in short), each verifier is assumed to have deposited a public key in a file that is accessible by all users at all times. In this model, intro...
147
click to vote
CRYPTO
15 years 10 months ago
2004 Springer
We propose the first distributed discrete-log key generation (DLKG) protocol from scratch which is adaptively-secure in the non-erasure model, and at the same time completely avoi...
142
click to vote
CRYPTO
15 years 10 months ago
2004 Springer
Abstract. In this paper we propose a new key recovery attack on irregular clocked keystream generators where the stream is filtered by a nonlinear Boolean function. We show that t...
136
click to vote
CRYPTO
15 years 10 months ago
2004 Springer
Ordinarily, RSA and Rabin ciphertexts and signatures are log N bits, where N is a composite modulus; here, we describe how to “compress” Rabin ciphertexts and signatures (among...
|