147
Voted
CTRSA
15 years 10 months ago
2004 Springer
We describe a block-cipher mode of operation, EME, that turns an n-bit block cipher into
145
click to vote
CTRSA
15 years 8 months ago
2004 Springer
Abstract. Secure authentication frequently depends on the correct recognition of a user's public key. When there is no certificate authority, this key is obtained from other u...
143
click to vote
CTRSA
15 years 10 months ago
2004 Springer
This paper presents a scalable hardware implementation of both commonly used public key cryptosystems, RSA and Elliptic Curve Cryptosystem (ECC) on the same platform. The introduce...
143
Voted
CTRSA
15 years 10 months ago
2004 Springer
Abstract. In this paper, we give a first example of identity based undeniable signature using pairings over elliptic curves. We extend to the identity based setting the security m...
130
Voted
CTRSA
15 years 8 months ago
2004 Springer
We present a cryptanalysis of a zero-knowledge identification protocol introduced by Naccache et al. at Eurocrypt '95. Our cryptanalysis enables a polynomial-time attacker to ...
|