Sciweavers

19 search results - page 1 / 4
» ctrsa 2008
Sort
View
CTRSA
2008
Springer
118views Cryptology» more  CTRSA 2008»
14 years 11 months ago
Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes
Pierre-Alain Fouque, Gaëtan Leurent
CTRSA
2008
Springer
97views Cryptology» more  CTRSA 2008»
14 years 10 months ago
Public-Key Encryption with Non-interactive Opening
Ivan Damgård, Dennis Hofheinz, Eike Kiltz, R...
CTRSA
2008
Springer
130views Cryptology» more  CTRSA 2008»
14 years 11 months ago
Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework
ended abstract appeared in Proceedings of the Cryptographers' Track at the RSA Conference (CT-RSA '08)
Michel Abdalla, Dario Catalano, Céline Chev...
CTRSA
2008
Springer
95views Cryptology» more  CTRSA 2008»
14 years 11 months ago
Separation Results on the "One-More" Computational Problems
In 2001, Bellare, Namprempre, Pointcheval and Semanko introduced
Emmanuel Bresson, Jean Monnerat, Damien Vergnaud
89
Voted
CTRSA
2008
Springer
197views Cryptology» more  CTRSA 2008»
14 years 11 months ago
Legally-Enforceable Fairness in Secure Two-Party Computation
In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their private inputs. The computation should...
Andrew Y. Lindell