Sciweavers

JOC
2008
92views more  JOC 2008»
13 years 6 months ago
Cryptanalysis of ISO/IEC 9796-1
We describe two different attacks against the iso/iec 9796-1 signature standard for RSA and Rabin. Both attacks consist in an existential forgery under a chosen-message attack: the...
Don Coppersmith, Jean-Sébastien Coron, Fran...
JOC
2008
64views more  JOC 2008»
13 years 6 months ago
Generic Constructions of Identity-Based and Certificateless KEMs
We extend the concept of key encapsulation mechanisms to the primitives of ID-based and certificateless encryption. We show that the natural combination of ID-KEMs or CL-KEMs with ...
Kamel Bentahar, Pooya Farshim, John Malone-Lee, Ni...
JOC
2008
86views more  JOC 2008»
13 years 6 months ago
Lower Bounds and Impossibility Results for Concurrent Self Composition
In the setting of concurrent self composition, a single protocol is executed many times concurrently by a single set of parties. In this paper, we prove lower bounds and impossibi...
Yehuda Lindell
JOC
2008
97views more  JOC 2008»
13 years 6 months ago
Tag-KEM/DEM: A New Framework for Hybrid Encryption
This paper presents a novel framework for the generic construction of hybrid encryption schemes which produces more efficient schemes than the ones known before. A previous framew...
Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa
JOC
2008
47views more  JOC 2008»
13 years 6 months ago
Simpler Session-Key Generation from Short Random Passwords
Minh-Huyen Nguyen, Salil P. Vadhan
JOC
2008
92views more  JOC 2008»
13 years 6 months ago
Cryptanalysis of an E0-like Combiner with Memory
In this paper, we study an E0-like combiner with memory as the keystream generator. First, we formulate a systematic and simple method to compute correlations of the FSM output seq...
Yi Lu 0002, Serge Vaudenay