191
click to vote
CTRSA
15 years 10 months ago
2005 Springer
We propose a dynamic accumulator scheme from bilinear pairings, whose security is based on the Strong Diffie-Hellman assumption. We show applications of this accumulator in constru...
130
Voted
CTRSA
15 years 10 months ago
2005 Springer
HTTP session-id’s take an important role in almost any web site today. This paper presents a cryptanalysis of Java Servlet 128-bit session-id’s and an efficient practical predi...
133
Voted
CTRSA
15 years 10 months ago
2005 Springer
We present the first blind identity-based signcryption (BIBSC). We formulate its security model and define the security notions of blindness and parallel one-more unforgeability ...
120
Voted
CTRSA
15 years 10 months ago
2005 Springer
We present a new two-party identity-based key agreement that is more efficient than previously proposed schemes. It is inspired on a new identity-based key pair derivation algorith...
149
click to vote
CTRSA
15 years 10 months ago
2005 Springer
We study the feasibility of using Graphics Processing Units (GPUs) for cryptographic processing, by exploiting the ability for GPUs to simultaneously process large quantities of pi...
|