106
click to vote
ACISP
15 years 4 months ago
2007 Springer
In this note, we describe a correction to the cryptosystem proposed in [1, 2]. Although the correction is small and does not affect the performance of the protocols from [1, 2], it...
104
click to vote
ACISP
15 years 6 months ago
2007 Springer
We present a new non-interactive message authentication protocol in manual channel model (NIMAP, for short) using the weakest assumption on the manual channel (i.e. assuming the st...
100
click to vote
ACISP
15 years 4 months ago
2007 Springer
Abstract. We propose new instantiations of chosen-ciphertext secure identitybased encryption schemes with wildcards (WIBE). Our schemes outperform all existing alternatives in term...
ACISP
15 years 4 months ago
2007 Springer
This work deals with the security challenges in authentication protocols employing volatile biometric features, where the authentication is indeed a comparison between a fresh biom...
107
click to vote
ACISP
15 years 6 months ago
2007 Springer
Recent advances in hash functions cryptanalysis provide a strong impetus to explore new designs. This paper describes a new hash function mq-hash that depends for its security on t...
|