115
Voted
CTRSA
15 years 2 months ago
2008 Springer
In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their private inputs. The computation should...
98
Voted
CTRSA
15 years 2 months ago
2008 Springer
We propose two constructions of chosen-ciphertext secure identity-based encryption (IBE) schemes. Our schemes have a security proof in the standard model, yet they offer performan...
106
click to vote
CTRSA
15 years 2 months ago
2008 Springer
We present a study of several fault attacks against the block cipher IDEA. Such a study is particularly interesting because of the target cipher's specific property to employ ...
101
Voted
CTRSA
15 years 2 months ago
2008 Springer
Abstract. Camellia and MISTY1 are Feistel block ciphers. In this paper, we observe that, when conducting impossible differential cryptanalysis on Camellia and MISTY1, their round s...
107
Voted
CTRSA
15 years 2 months ago
2008 Springer
Public key based authentication and key exchange protocols are not usually designed with privacy in mind and thus involve cleartext exchanges of identities and certificates before ...
|