Sciweavers

72
Voted
CTRSA
2006
Springer
107views Cryptology» more  CTRSA 2006»
15 years 15 days ago
A Round and Communication Efficient Secure Ranking Protocol
In this work, we initiate the study of realizing a ranking functionality (m1,
Shaoquan Jiang, Guang Gong
48
Voted
CTRSA
2006
Springer
88views Cryptology» more  CTRSA 2006»
15 years 15 days ago
On the (Im)possibility of Blind Message Authentication Codes
Michel Abdalla, Chanathip Namprempre, Gregory Neve...
75
Voted
CTRSA
2006
Springer
160views Cryptology» more  CTRSA 2006»
15 years 15 days ago
RFID-Tags for Anti-counterfeiting
RFID-tags are becoming very popular tools for identification of products. As they have a small microchip on board, they offer functionality that can be used for security purposes. ...
Pim Tuyls, Lejla Batina
CTRSA
2006
Springer
140views Cryptology» more  CTRSA 2006»
15 years 15 days ago
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators
Bellare, Canetti and Krawczyk proposed a security model (BCK-model) for authentication and key exchange protocols in 1998. The model not only reasonably captures the power of pract...
Xiaojian Tian, Duncan S. Wong
72
Voted
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
15 years 15 days ago
Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing
A series of recent papers have demonstrated collision attacks on popularly used hash functions, including the widely deployed MD5 and SHA-1 algorithm. To assess this threat, the na...
Michael Szydlo, Yiqun Lisa Yin