Sciweavers

CANS
2010
Springer
126views Cryptology» more  CANS 2010»
14 years 12 months ago
Towards Practical and Secure Coercion-Resistant Electronic Elections
Roberto Araujo, Narjes Ben Rajeb, Riadh Robbana, J...
CANS
2010
Springer
258views Cryptology» more  CANS 2010»
15 years 17 days ago
Cryptanalysis of Reduced-Round MIBS Block Cipher
Abstract. This paper presents the first independent and systematic linear, differential and impossible-differential (ID) cryptanalyses of MIBS, a lightweight block cipher aimed at ...
Asli Bay, Jorge Nakahara, Serge Vaudenay
110
Voted
CANS
2010
Springer
159views Cryptology» more  CANS 2010»
15 years 17 days ago
Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems
Johannes Buchmann, Stanislav Bulygin, Jintai Ding,...
133
Voted
CANS
2010
Springer
197views Cryptology» more  CANS 2010»
15 years 17 days ago
Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE
The SHA-3 competition organized by NIST [1] aims to find a new hash standard as a replacement of SHA-2. Till now, 14 submissions have been selected as the second round candidates, ...
Bozhan Su, Wenling Wu, Shuang Wu, Le Dong
85
Voted
CANS
2010
Springer
118views Cryptology» more  CANS 2010»
15 years 17 days ago
Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile Devices
Johann Großschädl, Ilya Kizhvatov
84
Voted
CANS
2010
Springer
127views Cryptology» more  CANS 2010»
15 years 17 days ago
Integral Distinguishers of Some SHA-3 Candidates
Marine Minier, Raphael C.-W. Phan, Benjamin Pousse
117
Voted
CANS
2010
Springer
146views Cryptology» more  CANS 2010»
15 years 17 days ago
Anonymous Credential Schemes with Encrypted Attributes
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully di...
Jorge Guajardo, Bart Mennink, Berry Schoenmakers
120
Voted
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
15 years 17 days ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano