Sciweavers

75
Voted
ASIACRYPT
2006
Springer
15 years 16 days ago
Extending Scalar Multiplication Using Double Bases
Abstract. It has been recently acknowledged [4, 6, 9] that the use of double bases representations of scalars n, that is an expression of the form n = e,s,t(-1)e As Bt can speed up...
Roberto Maria Avanzi, Vassil S. Dimitrov, Christop...
74
Voted
ASIACRYPT
2006
Springer
15 years 16 days ago
Analysis of One Popular Group Signature Scheme
The group signature scheme [1], ACJT for short, is popular. In this paper we show that it is not secure. It does not satisfy exculpability. The group manager can sign on behalf of ...
Zhengjun Cao
ASIACRYPT
2006
Springer
15 years 16 days ago
Finding SHA-1 Characteristics: General Results and Applications
The most efficient collision attacks on members of the SHA family presented so far all use complex characteristics which were manually constructed by Wang et al. In this report, we...
Christophe De Cannière, Christian Rechberge...
ASIACRYPT
2006
Springer
15 years 16 days ago
A Scalable Password-Based Group Key Exchange Protocol in the Standard Model
This paper presents a secure constant-round password-based group key exchange protocol in the common reference string model. Our protocol is based on the group key exchange protoco...
Michel Abdalla, David Pointcheval
71
Voted
ASIACRYPT
2006
Springer
15 years 16 days ago
New Cryptanalytic Results on IDEA
Eli Biham, Orr Dunkelman, Nathan Keller
72
Voted
ASIACRYPT
2006
Springer
15 years 16 days ago
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
Scott Contini, Yiqun Lisa Yin