166
click to vote
CTRSA
15 years 11 months ago
2009 Springer
In this paper, we present a statistical saturation attack that combines previously introduced cryptanalysis techniques against block ciphers. As the name suggests, the attack is st...
145
click to vote
CTRSA
15 years 11 months ago
2009 Springer
In the setting of multiparty computation a set of parties with private inputs wish to compute some joint function of their inputs, whilst preserving certain security properties (l...
125
Voted
CTRSA
15 years 11 months ago
2009 Springer
We propose and analyze a multivariate encryption scheme that uses odd characteristic and an embedding in its construction. This system has a very simple core map F(X) = X2 , allowi...
|