Phone: 02 4421 5881
No Subject Area (114)
Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward ...
Faculty of Engineering - Papers (Archive) (2010)
Master key forward security is an important property for identity-based key exchange protocols. Unfortunately, most of existing identity-based key exchange ...
Enhanced security notions for dedicated-key hash functions: Definitions and relationships
17th International Workshop, FSE 2010 Fast Software Entryption, 7-10 February 2, Korea. Lecture Notes in Computer Science (2010)
In this paper, we revisit security notions for dedicated-key hash functions, considering two essential theoretical aspects; namely, formal definitions for ...
Enhanced target collision resistant hash functions revisited
O. Dunkelman In Fast Software Encryption, 16th International Workshop, FSE 2009, 22February 2009, Leuven, Belgium. Lecture Notes in Computer Science (2009)
Enhanced Target Collision Resistance (eTCR) property for a hash function was put forth by Halevi and Krawczyk in Crypto 2006, ...
New privacy results on synchronized RFID authentication protocols against tag ...
ESORICS 2009: 14th European Symposium on Research in Computer Security, LNCS 5789 (2009)
Many RFIDauthentication protocols with randomized tag response have been proposed to avoid simple tag tracing. These protocols are symmetric in ...
Publicly verifiable privacy-preserving group decryption
4th International Conference on Information Security and Cryptology, Inscrypt 2008, 14-17/12/2008, Beijing. Lecture Notes in Computer Science (2009)
Anonymity is one of the main concerns in group-oriented cryptography. However, most efforts, for instance, group signatures and ring signatures, ...