Sciweavers

39 search results - page 4 / 8
» asiacrypt 2004
Sort
View
ASIACRYPT
2004
Springer
15 years 3 months ago
The XL-Algorithm and a Conjecture from Commutative Algebra
The “XL-algorithm” is a computational method to solve overdetermined systems of polynomial equations which is based on a generalization of the well-known method of linearizatio...
Claus Diem
ASIACRYPT
2004
Springer
15 years 3 months ago
Sieving Using Bucket Sort
This paper proposes a new sieving algorithm that employs a bucket sort as a part of a factoring algorithm such as the number field sieve. The sieving step requires an enormous num...
Kazumaro Aoki, Hiroki Ueda
ASIACRYPT
2004
Springer
15 years 3 months ago
Practical Two-Party Computation Based on the Conditional Gate
Abstract. We present new results in the framework of secure multiparty computation based on homomorphic threshold cryptosystems. We introduce the conditional gate as a special type...
Berry Schoenmakers, Pim Tuyls
AINA
2004
IEEE
15 years 1 months ago
An Identity-based Ring Signature Scheme from Bilinear Pairings
At the conference Asiacrypt 2001, Rivest, Shamir and Tauman firstly addressed the concept of ring signature. In this paper we propose an identity-based ring signature scheme from ...
Chih-Yin Lin, Tzong-Chen Wu
IJISEC
2007
88views more  IJISEC 2007»
14 years 9 months ago
Secure group key establishment revisited
Abstract. We examine the popular proof models for group key establishment of Bresson et al. [BCPQ01,BCP01] and point out missing security properties addressing malicious protocol p...
Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, ...