Sciweavers

IEICET
2008
119views more  IEICET 2008»
15 years 26 days ago
Universally Composable Identity-Based Encryption
Abstract-- The identity-based encryption (IBE) is one of the most important primitives in cryptography, and various security notions of IBE (e.g., IND-ID-CCA2, NM-ID-CCA2, IND-sID-...
Ryo Nishimaki, Yoshifumi Manabe, Tatsuaki Okamoto
65
Voted
IEICET
2008
83views more  IEICET 2008»
15 years 26 days ago
A High-Resolution Phase-Based Waveform Matching and Its Application to Side-Channel Attacks
Naofumi Homma, Sei Nagashima, Takeshi Sugawara, Ta...
64
Voted
IEICET
2008
72views more  IEICET 2008»
15 years 26 days ago
Birthday Paradox for Multi-Collisions
Kazuhiro Suzuki, Dongvu Tonien, Kaoru Kurosawa, Ko...
92
Voted
IEICET
2008
113views more  IEICET 2008»
15 years 26 days ago
Classification of Hash Functions Suitable for Real-Life Systems
Cryptographic hash functions have been widely studied and are used in many current systems. Though much research has been done on the security of hash functions, system designers ...
Yasumasa Hirai, Takashi Kurokawa, Shin'ichiro Mats...
46
Voted
IEICET
2008
50views more  IEICET 2008»
15 years 26 days ago
On the Equivalence of Several Security Notions of KEM and DEM
Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto