Sciweavers

6 search results - page 1 / 2
» Optimal Asymmetric Encryption and Signature Paddings
Sort
View
89
Voted
ACNS
2005
Springer
94views Cryptology» more  ACNS 2005»
15 years 6 months ago
Optimal Asymmetric Encryption and Signature Paddings
Strong security notions often introduce strong constraints on the construction of cryptographic schemes: semantic security implies probabilistic encryption, while the resistance to...
Benoît Chevallier-Mames, Duong Hieu Phan, Da...
167
Voted
ICICS
2010
Springer
14 years 11 months ago
Manger's Attack Revisited
In this work we examine a number of different open source implementations of the RSA Optimal Asymmetric Encryption Padding (OAEP) and generally RSA with respect to the message-aime...
Falko Strenzke
94
Voted
ASIACRYPT
2003
Springer
15 years 6 months ago
Generalized Powering Functions and Their Application to Digital Signatures
This paper investigates some modular powering functions suitable for cryptography. It is well known that the Rabin encryption function is a 4-to-1 mapping and breaking its one-wayn...
Hisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Ka...
130
Voted
CJ
2006
123views more  CJ 2006»
15 years 1 months ago
Unconditionally Secure Anonymous Encryption and Group Authentication
Anonymous channels or similar techniques that can achieve sender's anonymity play important roles in many applications. However, they will be meaningless if cryptographic prim...
Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, H...