Sciweavers

13 search results - page 3 / 3
» Slide Attacks on a Class of Hash Functions
Sort
View
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
15 years 6 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev
PKC
2007
Springer
129views Cryptology» more  PKC 2007»
15 years 5 months ago
Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles
We provide a positive result about the Fiat-Shamir (FS) transform in the standard model, showing how to use it to convert threemove identification protocols into two-tier signatur...
Mihir Bellare, Sarah Shoup
JOC
2000
181views more  JOC 2000»
14 years 11 months ago
Security Arguments for Digital Signatures and Blind Signatures
Abstract. Since the appearance of public-key cryptography in the seminal DiffieHellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact t...
David Pointcheval, Jacques Stern