165
click to vote
ASIACRYPT
15 years 10 months ago
2005 Springer
In this paper, we discuss non-interactive updating of decryption keys in identity-based encryption (IBE). IBE is a public key cryptosystem where a public key is an arbitrary strin...
166
click to vote
ASIACRYPT
15 years 10 months ago
2005 Springer
We propose Gate Evaluation Secret Sharing (GESS) – a new kind of secret sharing, designed for use in secure function evaluation (SFE) with minimal interaction. The resulting simp...
161
click to vote
ASIACRYPT
15 years 10 months ago
2005 Springer
Abstract. This paper reconsiders the established Merkle-Damg˚ard design principle for iterated hash functions. The internal state size w of an iterated n-bit hash function is trea...
114
Voted
ASIACRYPT
15 years 10 months ago
2005 Springer
The XSL “algorithm” is a method for solving systems of multivariate polynomial equations based on the linearization method. It was proposed in 2002 as a dedicated method for ex...
134
Voted
ASIACRYPT
15 years 10 months ago
2005 Springer
Stream cipher Hiji-Bij-Bij (HBB) was proposed by Sarkar at Indocrypt’03. This cipher uses cellular automata (CA). The algorithm has two modes: a basic mode (B) and a self-synchro...
|