International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR Local Search

Possible queries include homomorphic author:david.
Found 20000 results
Security of Digital Signature Schemes in Weakened Random Oracle Models
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=14411
Akira Numayama Toshiyuki Isshiki Keisuke Tanaka
Pkc 2008
Security of Encryption Schemes in Weakened Random Oracle Models
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=23418
Akinori Kawachi Akira Numayama Keisuke Tanaka Keita Xagawa
Pkc 2010
Security of Encryption Schemes in Weakened Random Oracle Models
Eprint
https://eprint.iacr.org/2010/122
Akinori Kawachi Akira Numayama Keisuke Tanaka Keita Xagawa
Liskov proposed several weakened versions of the random oracle model, called {\em weakened random oracle models} (WROMs), to capture the vulnerability of ideal compression functions, which are expected to have the standard...
received 4 Mar 2010
PKC 2008
https://iacr.org/workshops/pkc2008/accepted.html
PKC2008 Home Call for Papers Submission Accepted Papers Program Proceedings Venue Accommodation Travel Info Registration Sponsors Contact Related events List of Accepted Papers Relations Among Notions of Plaintext Awareness...
PKC 2008
https://iacr.org/workshops/pkc2008/program.html
PKC2008 Home Call for Papers Submission Accepted Papers Program Proceedings Venue Accommodation Travel Info Registration Sponsors Contact Related events Program PKC 2008, March 9-12, 2008, Barcelona, Spain Last minute changes...
IACR Public Key Cryptography, PKC 2008
https://iacr.org/archive/pkc2008/pkc2008.html
Much of the information on this web page was provided courtesy of Michael Ley and the DBLP Project PKC 2008: Barcelona, Spain Ronald Cramer (Ed.): Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and...
Author Index, IACR PKC 2008
https://iacr.org/archive/pkc2008/authors.html
Author Index, IACR PKC 2008 Birkett, James 49 Catalano, Dario 102 Cheon, Jung Hee 329 Dent, Alexander W. 49 Dent, Alexander W. 346 El-Ghazawi, Tarek 215 Faust, Sebastian 181 Fiore, Dario 102 Fouque, P. A. 1 Gaj, Kris 215...
IACR PKC 2010
https://iacr.org/archive/pkc2010/pkc2010.html
PKC 2010: David Pointcheval and Phong Q. Nguyen (Eds.): Public Key Cryptography - PKC 2010 - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010...
PKC 2010 - Program
https://iacr.org/workshops/pkc2010/index.html
Program Call for papers Program Wednesday, May 26th, 2010 12:30 Registration 13:50 Opening 14:00 Encryption I (Session chair: Duong Hieu Phan) Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the...
How to Construct Cryptosystems and Hash Functions in Weakened Random Oracle Models
Eprint
https://eprint.iacr.org/2009/550
Yusuke Naito Lei Wang Kazuo Ohta
In this paper, we discuss how to construct secure cryptosystems and secure hash functions in weakened random oracle models. ~~~~The weakened random oracle model ($\wrom$), which was introduced by Numayama et al. at PKC 2008,...
received 9 Nov 2009
PKC 2005 External Referees
https://iacr.org/archive/pkc2005/external.html
PKC 2005 External Referees Masayuki Abe Toshiyuki Isshiki Hans-Georg Rueck Ben Adida Kouichi Itoh Ryuichi Sakai Gildas Avoine Michael Jacobson Takakazu Satoh Joonsang Baek Marc Joye Katja Schmidt-Samoa Thomas Baignères Pascal...
Akira Numayama
Author
https://iacr.org/cryptodb/data/author.php?authorkey=4434
Tokyo Institute of Technology
External Reviewers, IACR Public-Key Cryptography (PKC) 2011
https://iacr.org/archive/pkc2011/external.html
External Reviewers, IACR Public-Key Cryptography (PKC) 2011 Michel Abdalla Divesh Aggarwal Joel Alwen Nuttapong Attrapadung Kfir Barhum Aurélie Bauer Rikke Bendlin Dan J. Bernstein Olivier Billet Christina Brzuska David Cash...
A New Forward-Secure Digital Signature Scheme
Eprint
https://eprint.iacr.org/2000/002
Michel Abdalla Leonid Reyzin
We improve the Bellare-Miner (Crypto '99) construction of signature schemes with forward security in the random oracle model. Our scheme has significantly shorter keys and is, therefore, more practical. By using a direct proof...
revised 14 Sep 2000
Reset Indifferentiability from Weakened Random Oracle Salvages One-pass Hash Functions
Eprint
https://eprint.iacr.org/2012/014
Yusuke Naito Kazuki Yoneyama Kazuo Ohta
Ristenpart et al. showed that the limitation of the indifferentiability theorem of Maurer et al. which does not cover all multi stage security notions but covers only single stage security notions, defined a new concept...
last revised 4 Jun 2014
On the (In)security of the Fiat-Shamir Paradigm
Eprint
https://eprint.iacr.org/2003/034
Shafi Goldwasser Yael Tauman
In 1986, Fiat and Shamir suggested a general method for transforming secure 3-round public-coin identification schemes into digital signature schemes. The significant contribution of this method is a means for designing...
last revised 2 Feb 2004
Digital Signatures from Challenge-Divided Sigma-Protocols
Eprint
https://eprint.iacr.org/2012/001
Andrew C. Yao Yunlei Zhao
Digital signature is one of the basic primitives in cryptography. A common paradigm of obtaining signatures, known as the Fiat-Shamir (FS) paradigm, is to collapse any Σ-protocol (which is 3-round public-coin...
received 2 Jan 2012
PECDSA. How to build a DL-based digital signature scheme with the best proven security
Eprint
https://eprint.iacr.org/2002/172
Louis Granboulan
Many variants of the ElGamal signature scheme have been proposed. The most famous is the DSA standard. If computing discrete logarithms is hard, then some of these schemes have been proven secure in an idealized model, either...
received 12 Nov 2002
ASIACRYPT 2009
https://iacr.org/conferences/asiacrypt2009/program/index.html
Program All sessions and welcome reception are held at Hitotsubashi Memorial Hall , 2nd floor of National Center of Sciences Building. The building opens 8:30 in the morning everyday. Please have your registration confirmation...
Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions
Eprint
https://eprint.iacr.org/2007/019
Changshe Ma Jian Weng Dong Zheng
This paper presents two fast digital signature schemes based on Diffie-Hellman assumptions. In the random oracle model, the first scheme S1 has a tight security reduction to the computational Diffie-Hellman (CDH) problem; and...
last revised 22 Jan 2007
Next ►