CT-RSA B

26 papers

YearTitle / Authors
2005A Fast Correlation Attack on the Shrinking Generator.
Bin Zhang, Hongjun Wu, Dengguo Feng, Feng Bao
2005A Generic Conversion with Optimal Redundancy.
Yang Cui, Kazukuni Kobara, Hideki Imai
2005A New Two-Party Identity-Based Authenticated Key Agreement.
Noel McCullagh, Paulo S. L. M. Barreto
2005A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes.
An Braeken, Christopher Wolf, Bart Preneel
2005A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box.
Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede
2005Accumulators from Bilinear Pairings and Applications.
Lan Nguyen
2005Choosing Parameter Sets forwithand.
Nick Howgrave-Graham, Joseph H. Silverman, William Whyte
2005Computing the Tate Pairing.
Michael Scott
2005CryptoGraphics: Secret Key Cryptography Using Graphics Cards.
Debra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Luck
2005Design and Analysis of Password-Based Key Derivation Functions.
Frances F. Yao, Yiqun Lisa Yin
2005Fast and Proven Secure Blind Identity-Based Signcryption from Pairings.
Tsz Hon Yuen, Victor K. Wei
2005Foundations of Group Signatures: The Case of Dynamic Groups.
Mihir Bellare, Haixia Shi, Chong Zhang
2005Hard Bits of the Discrete Log with Applications to Password Authentication.
Philip D. MacKenzie, Sarvar Patel
2005Hold Your Sessions: An Attack on Java Session-Id Generation.
Zvi Gutterman, Dahlia Malkhi
2005Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption.
Dan Boneh, Jonathan Katz
2005Malicious Cryptography: Kleptographic Aspects.
Adam L. Young, Moti Yung
2005New Minimal Weight Representations for Left-to-Right Window Methods.
James A. Muir, Douglas R. Stinson
2005On Tolerant Cryptographic Constructions.
Amir Herzberg
2005Proofs for Two-Server Password Authentication.
Michael Szydlo, Burton S. Kaliski Jr.
2005Resistance of SNOW 2.0 Against Algebraic Attacks.
Olivier Billet, Henri Gilbert
2005Side-Channel Leakage of Masked CMOS Gates.
Stefan Mangard, Thomas Popp, Berndt M. Gammel
2005Simple Password-Based Encrypted Key Exchange Protocols.
Michel Abdalla, David Pointcheval
2005Sub-linear Queries Statistical Databases: Privacy with Power.
Cynthia Dwork
2005Time-Selective Convertible Undeniable Signatures.
Fabien Laguillaumie, Damien Vergnaud
2005Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings
Alfred Menezes
2005Update on SHA-1.
Vincent Rijmen, Elisabeth Oswald