170
click to vote
CTRSA
15 years 10 months ago
2010 Springer
Abstract. The SHA-3 competition has been organized by NIST to select a new hashing standard. Edon-R was one of the fastest candidates in the first round of the competition. In thi...
123
Voted
CTRSA
15 years 10 months ago
2010 Springer
Sanitizable signature schemes allow a semi-trusted entity to modify some specific portions of a signed message while keeping a valid signature of the original off-line signer. In...
112
click to vote
CTRSA
15 years 10 months ago
2010 Springer
In this paper NTRUEncrypt is implemented for the first time on a GPU using the CUDA platform. As is shown, this operation lends itself excellently for parallelization and performs...
127
click to vote
CTRSA
15 years 10 months ago
2010 Springer
At ches 2009, Coron, Joux, Kizhvatov, Naccache and Paillier (cjknp) exhibited a fault attack against rsa signatures with partially known messages. This attack allows factoring the ...
139
Voted
CTRSA
15 years 8 months ago
2010 Springer
A Hierarchical Identity Based Encryption (HIBE) system is anonymous if the ciphertext reveals no information about the recipient’s identity. create it. While there are multiple c...
|