Search
Search Results
-
Scientometric dimensions of cryptographic research
Information security has been a crucial issue in modern information management; thus cryptographic techniques have become inevitable to safeguard...
-
Cryptographic Hardness of Random Local Functions
Constant parallel-time cryptography allows to perform complex cryptographic tasks at an ultimate level of parallelism, namely by local functions that...
-
The relation and transformation between hierarchical inner product encryption and spatial encryption
Hierarchical inner product encryption (HIPE) and spatial encryption (SE) are two important classes of functional encryption that have numerous...
-
Long term confidentiality: a survey
Sensitive electronic data may be required to remain confidential for long periods of time. Yet encryption under a computationally secure cryptosystem...
-
Lattice-based completely non-malleable public-key encryption in the standard model
An encryption scheme is non-malleable if giving an encryption of a message to an adversary does not increase its chances of producing an encryption...
-
A new multi-linear universal hash family
A new universal hash family is described which generalises a previously known multi-linear hash family. Messages are sequences over a finite field
... -
Cryptanalysis of the Stream Cipher LEX
Biryukov (The Design of a Stream Cipher LEX, Proceedings of Selected Areas in Cryptography, 2006 Springer, pp 67–75,
2007 ) presented a new... -
Signcryption schemes with threshold unsigncryption, and applications
The goal of a signcryption scheme is to achieve the same functionalities as encryption and signature together, but in a more efficient way than...
-
Complete tree subset difference broadcast encryption scheme and its analysis
The subset difference (SD) method proposed by Naor, Naor and Lotspiech is the most popular broadcast encryption (BE) scheme. It is suitable for...
-
Inner-product encryption under standard assumptions
Predicate encryption is a generalized notion for public key encryption that enables one to encrypt attributes as well as a message. In this paper, we...
-
Attacks on the RC4 stream cipher
In this article we present some weaknesses in the RC4 cipher and their cryptographic applications. Especially we improve the attack described by...
-
On Pseudorandom Generators with Linear Stretch in NC0
We consider the question of constructing cryptographic pseudorandom generators (PRGs) in NC 0 , namely ones in which each bit of the output depends on...
-
Low-density attack revisited
The low-density attack proposed by Lagarias and Odlyzko is a powerful algorithm against the subset sum problem. The improvement algorithm due to...
-
Distributed Ring Signatures from General Dual Access Structures
In a distributed ring signature scheme, a subset of users cooperate to compute a distributed anonymous signature on a message, on behalf of a family...
-
Distributing the Encryption and Decryption of a Block Cipher
In threshold cryptography, the goal is to distribute the computation of basic cryptographic primitives across a number of nodes in order to relax...
-
Malleability Attacks on Multi-Party Key Agreement Protocols
Multi-party key agreement protocols indirectly assume that each principal equally contributes to the final form of the key. In this paper we consider...