Sciweavers

713 search results - page 107 / 143
» Dispersing Hash Functions
Sort
View
CSFW
2007
IEEE
15 years 4 months ago
Computationally Sound Mechanized Proofs of Correspondence Assertions
We present a new mechanized prover for showing correspondence assertions for cryptographic protocols in the computational model. Correspondence assertions are useful in particular...
Bruno Blanchet
ACNS
2007
Springer
129views Cryptology» more  ACNS 2007»
15 years 4 months ago
Gradually Convertible Undeniable Signatures
In 1990, Boyar, Chaum, Damg˚ard and Pedersen introduced convertible undeniable signatures which limit the self-authenticating property of digital signatures but can be converted b...
Laila El Aimani, Damien Vergnaud
CHES
2007
Springer
173views Cryptology» more  CHES 2007»
15 years 3 months ago
Collision Attacks on AES-Based MAC: Alpha-MAC
Message Authentication Code construction Alred and its AES-based instance Alpha-MAC were introduced by Daemen and Rijmen in 2005. We show that under certain assumptions about its i...
Alex Biryukov, Andrey Bogdanov, Dmitry Khovratovic...
ERCIMDL
2007
Springer
164views Education» more  ERCIMDL 2007»
15 years 3 months ago
MinervaDL: An Architecture for Information Retrieval and Filtering in Distributed Digital Libraries
Abstract. We present MinervaDL, a digital library architecture that supports approximate information retrieval and filtering functionality under a single unifying framework. The a...
Christian Zimmer, Christos Tryfonopoulos, Gerhard ...
FSE
2007
Springer
107views Cryptology» more  FSE 2007»
15 years 3 months ago
Message Freedom in MD4 and MD5 Collisions: Application to APOP
Abstract. In Wang’s attack, message modifications allow to deterministically satisfy certain sufficient conditions to find collisions efficiently. Unfortunately, message modi...
Gaëtan Leurent