Sciweavers

43 search results - page 1 / 9
» On the Impossibility of Private Key Cryptography with Weakly...
Sort
View
72
Voted
CRYPTO
1990
Springer
72views Cryptology» more  CRYPTO 1990»
15 years 4 months ago
On the Impossibility of Private Key Cryptography with Weakly Random Keys
James L. McInnes, Benny Pinkas
102
Voted
TCC
2009
Springer
153views Cryptology» more  TCC 2009»
16 years 29 days ago
On the (Im)Possibility of Key Dependent Encryption
We study the possibility of constructing encryption schemes secure under messages that are chosen depending on the key k of the encryption scheme itself. We give the following sep...
Iftach Haitner, Thomas Holenstein
139
Voted
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
15 years 6 months ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay
121
Voted
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
16 years 29 days ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...
127
Voted
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
16 years 1 months ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs