Sciweavers

128
Voted
CTRSA
2009
Springer
235views Cryptology» more  CTRSA 2009»
15 years 7 months ago
A Statistical Saturation Attack against the Block Cipher PRESENT
In this paper, we present a statistical saturation attack that combines previously introduced cryptanalysis techniques against block ciphers. As the name suggests, the attack is st...
Baudoin Collard, François-Xavier Standaert
CTRSA
2009
Springer
205views Cryptology» more  CTRSA 2009»
15 years 7 months ago
Key Insulation and Intrusion Resilience over a Public Channel
Mihir Bellare, Shanshan Duan, Adriana Palacio
CTRSA
2009
Springer
179views Cryptology» more  CTRSA 2009»
15 years 7 months ago
Adaptively Secure Two-Party Computation with Erasures
In the setting of multiparty computation a set of parties with private inputs wish to compute some joint function of their inputs, whilst preserving certain security properties (l...
Andrew Y. Lindell
CTRSA
2009
Springer
158views Cryptology» more  CTRSA 2009»
15 years 7 months ago
Square, a New Multivariate Encryption Scheme
We propose and analyze a multivariate encryption scheme that uses odd characteristic and an embedding in its construction. This system has a very simple core map F(X) = X2 , allowi...
Crystal Clough, John Baena, Jintai Ding, Bo-Yin Ya...
97
Voted
CTRSA
2009
Springer
157views Cryptology» more  CTRSA 2009»
15 years 7 months ago
Strengthening Security of RSA-OAEP
Alexandra Boldyreva
Cryptology
Top of PageReset Settings