Sciweavers

2967 search results - page 540 / 594
» Cryptology
Sort
View
PKC
2005
Springer
89views Cryptology» more  PKC 2005»
15 years 3 months ago
A New Related Message Attack on RSA
Coppersmith, Franklin, Patarin, and Reiter show that given two RSA cryptograms xe mod N and (ax + b)e mod N for known constants a, b ∈ ZN , one can compute x in O(e log2 e) ZN -o...
Oded Yacobi, Yacov Yacobi
SACRYPT
2005
Springer
109views Cryptology» more  SACRYPT 2005»
15 years 3 months ago
Reducing Time Complexity in RFID Systems
Radio frequency identification systems based on low-cost computing devices is the new plaything that every company would like to adopt. Its goal can be either to improve the produ...
Gildas Avoine, Etienne Dysli, Philippe Oechslin
SACRYPT
2005
Springer
112views Cryptology» more  SACRYPT 2005»
15 years 3 months ago
Pairing-Friendly Elliptic Curves of Prime Order
Previously known techniques to construct pairing-friendly curves of prime or near-prime order are restricted to embedding degree k 6. More general methods produce curves over Fp wh...
Paulo S. L. M. Barreto, Michael Naehrig
TCC
2005
Springer
139views Cryptology» more  TCC 2005»
15 years 3 months ago
The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives
Abstract. We consider the problem of password-authenticated key exchange (PAK) also known as session-key generation using passwords: constructing session-key generation protocols t...
Minh-Huyen Nguyen
73
Voted
TCC
2005
Springer
115views Cryptology» more  TCC 2005»
15 years 3 months ago
The Universal Composable Security of Quantum Key Distribution
The existing unconditional security definitions of quantum key distribution (QKD) do not apply to joint attacks over QKD and the subsequent use of the resulting key. In this paper...
Michael Ben-Or, Michal Horodecki, Debbie W. Leung,...