Sciweavers

4340 search results - page 247 / 868
» Formal Methods and Cryptography
Sort
View
FC
2005
Springer
109views Cryptology» more  FC 2005»
15 years 10 months ago
Fraud Within Asymmetric Multi-hop Cellular Networks
At Financial Cryptography 2003, Jakobsson, Hubaux, and Butty´an suggested a lightweight micro-payment scheme aimed at encouraging routing collaboration in asymmetric multi-hop cel...
Gildas Avoine
155
Voted
PKC
2005
Springer
156views Cryptology» more  PKC 2005»
15 years 10 months ago
Cryptanalysis of HFEv and Internal Perturbation of HFE
Hidden field equation (HFE) multivariable cryptosystems were first suggested by Patarin. Kipnis and Shamir showed that to make the cryptosystem secure, a special parameter D of a...
Jintai Ding, Dieter Schmidt
151
Voted
PKC
2005
Springer
93views Cryptology» more  PKC 2005»
15 years 10 months ago
Optimizing Robustness While Generating Shared Secret Safe Primes
We develop a method for generating shared, secret, safe primes applicable to use in threshold RSA signature schemes such as the one developed by Shoup. We would like a scheme usabl...
Emil Ong, John Kubiatowicz
128
Voted
WCC
2005
Springer
122views Cryptology» more  WCC 2005»
15 years 10 months ago
Frequency/Time Hopping Sequences with Large Linear Complexities
In this paper, we discuss some methods of constructing frequency/time hopping (FH/TH) sequences over GF(pk ) by taking successive k-tuples of given sequences over GF(p). We are abl...
Yun-Pyo Hong, Hong-Yeop Song
136
Voted
CHES
2004
Springer
130views Cryptology» more  CHES 2004»
15 years 10 months ago
Switching Blindings with a View Towards IDEA
Cryptographic algorithms implemented on smart-cards must be protected against side-channel attacks. Some encryption schemes and hash functions like IDEA, RC6, MD5, SHA-1 alternate ...
Olaf Neiße, Jürgen Pulkus