Sciweavers

39 search results - page 4 / 8
» asiacrypt 2004
Sort
View
109
Voted
ASIACRYPT
2004
Springer
15 years 5 months ago
The XL-Algorithm and a Conjecture from Commutative Algebra
The “XL-algorithm” is a computational method to solve overdetermined systems of polynomial equations which is based on a generalization of the well-known method of linearizatio...
Claus Diem
79
Voted
ASIACRYPT
2004
Springer
15 years 5 months ago
Sieving Using Bucket Sort
This paper proposes a new sieving algorithm that employs a bucket sort as a part of a factoring algorithm such as the number field sieve. The sieving step requires an enormous num...
Kazumaro Aoki, Hiroki Ueda
ASIACRYPT
2004
Springer
15 years 5 months ago
Practical Two-Party Computation Based on the Conditional Gate
Abstract. We present new results in the framework of secure multiparty computation based on homomorphic threshold cryptosystems. We introduce the conditional gate as a special type...
Berry Schoenmakers, Pim Tuyls
AINA
2004
IEEE
15 years 4 months ago
An Identity-based Ring Signature Scheme from Bilinear Pairings
At the conference Asiacrypt 2001, Rivest, Shamir and Tauman firstly addressed the concept of ring signature. In this paper we propose an identity-based ring signature scheme from ...
Chih-Yin Lin, Tzong-Chen Wu
98
Voted
IJISEC
2007
88views more  IJISEC 2007»
15 years 11 days ago
Secure group key establishment revisited
Abstract. We examine the popular proof models for group key establishment of Bresson et al. [BCPQ01,BCP01] and point out missing security properties addressing malicious protocol p...
Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, ...