Sciweavers

CAU
2004
141views Cryptology» more  CAU 2004»
13 years 7 months ago
Implementation of the GBD Cryptosystem
We present our experience from implementing the public-key cryptosystem of Gonz
Jaimee Brown, Ed Dawson, Juan Manuel Gonzál...
ACNS
2010
Springer
114views Cryptology» more  ACNS 2010»
13 years 9 months ago
Two New Efficient PIR-Writing Protocols
Assume that a client outsources his database to a remote storage-provider (the server), so that for privacy reasons, the client's database is encrypted by his secret key. Duri...
Helger Lipmaa, Bingsheng Zhang
ICICS
1999
Springer
13 years 10 months ago
Reaction Attacks against several Public-Key Cryptosystems
Abstract. We present attacks against the McEliece Public-Key Cryptosystem, the Atjai-Dwork Public-Key Cryptosystem, and variants of those systems. Most of these systems base their ...
Chris Hall, Ian Goldberg, Bruce Schneier
ASIACRYPT
2000
Springer
13 years 10 months ago
Strengthening McEliece Cryptosystem
McEliece cryptosystem is a public-key cryptosystem based on error-correcting codes. It constitutes one of the few alternatives to cryptosystems relying on number theory. We present...
Pierre Loidreau
TCC
2005
Springer
141views Cryptology» more  TCC 2005»
13 years 11 months ago
Public-Key Steganography with Active Attacks
A complexity-theoretic model for public-key steganography with active attacks is introduced. The notion of steganographic security against adaptive chosen-covertext attacks (SS-CC...
Michael Backes, Christian Cachin