148
Voted
CTRSA
15 years 10 months ago
2009 Springer
In this paper, we present a statistical saturation attack that combines previously introduced cryptanalysis techniques against block ciphers. As the name suggests, the attack is st...
130
click to vote
CTRSA
15 years 10 months ago
2009 Springer
In the setting of multiparty computation a set of parties with private inputs wish to compute some joint function of their inputs, whilst preserving certain security properties (l...
111
click to vote
CTRSA
15 years 10 months ago
2009 Springer
We propose and analyze a multivariate encryption scheme that uses odd characteristic and an embedding in its construction. This system has a very simple core map F(X) = X2 , allowi...
121
Voted
CTRSA
15 years 10 months ago
2009 Springer |