Numerous applications in ad hoc networks, peer-to-peer networks, and on-the-fly data sharing call for confidential broadcast without relying on a dealer. To cater for such applica...
Qianhong Wu, Bo Qin, Lei Zhang, Josep Domingo-Ferr...
In this paper we propose a new side channel attack, where exponent recodings for public key cryptosystems such as RSA and ECDSA are considered. The known side channel attacks and c...
In this paper we describe new secure personalization schemes using proxy cryptography. We first introduce the context of a large scale smart card application such as an electronic ...
Abstract. The Matsumoto-Imai (MI) cryptosystem was the ļ¬rst multivariate public key cryptosystem proposed for practical use. Though MI is now considered insecure due to Patarinā...
Adama Diene, Jintai Ding, Jason E. Gower, Timothy ...
Diļ¬erent variants of the code-based McEliece cryptosystem were proposed to reduce the size of the public key. All these variants use very structured codes, which open the door t...