128
Voted
CTRSA
15 years 7 months ago
2009 Springer
In this paper, we present a statistical saturation attack that combines previously introduced cryptanalysis techniques against block ciphers. As the name suggests, the attack is st...
CTRSA
15 years 7 months ago
2009 Springer 107
click to vote
CTRSA
15 years 7 months ago
2009 Springer
In the setting of multiparty computation a set of parties with private inputs wish to compute some joint function of their inputs, whilst preserving certain security properties (l...
CTRSA
15 years 7 months ago
2009 Springer
We propose and analyze a multivariate encryption scheme that uses odd characteristic and an embedding in its construction. This system has a very simple core map F(X) = X2 , allowi...
97
Voted
CTRSA
15 years 7 months ago
2009 Springer |