{"title":"Homomorphic Cryptosystems Based on Subgroup Membership Problems","authors":"Kristian Gjøsteen","doi":"10.1007/11554868_22","DOIUrl":"https://doi.org/10.1007/11554868_22","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124934340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sung-Ming Yen, Wei-Chih Lien, S. Moon, JaeCheol Ha
{"title":"Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption","authors":"Sung-Ming Yen, Wei-Chih Lien, S. Moon, JaeCheol Ha","doi":"10.1007/11554868_13","DOIUrl":"https://doi.org/10.1007/11554868_13","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133117799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Twin RSA","authors":"A. Lenstra, B. Weger","doi":"10.1007/11554868_16","DOIUrl":"https://doi.org/10.1007/11554868_16","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127305169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing","authors":"Kun Peng, C. Boyd, E. Dawson","doi":"10.1007/11554868_7","DOIUrl":"https://doi.org/10.1007/11554868_7","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114165962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers","authors":"A. Kiayias, M. Yung","doi":"10.1007/11554868_11","DOIUrl":"https://doi.org/10.1007/11554868_11","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128135853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Questionable Encryption and Its Applications","authors":"Adam L. Young, M. Yung","doi":"10.1007/11554868_15","DOIUrl":"https://doi.org/10.1007/11554868_15","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"25 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114231880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Family of Fast Syndrome Based Cryptographic Hash Functions","authors":"D. Augot, M. Finiasz, N. Sendrier","doi":"10.1007/11554868_6","DOIUrl":"https://doi.org/10.1007/11554868_6","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130122020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jorge Nakahara, Daniel Santana de Freitas, R. Phan
{"title":"New Multiset Attacks on Rijndael with Large Blocks","authors":"Jorge Nakahara, Daniel Santana de Freitas, R. Phan","doi":"10.1007/11554868_20","DOIUrl":"https://doi.org/10.1007/11554868_20","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128715615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimization of the MOVA Undeniable Signature Scheme","authors":"Jean Monnerat, Y. Pignolet, S. Vaudenay","doi":"10.1007/11554868_14","DOIUrl":"https://doi.org/10.1007/11554868_14","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129771952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Structural Attack for GPT and Variants","authors":"Raphael Overbeck","doi":"10.1007/11554868_5","DOIUrl":"https://doi.org/10.1007/11554868_5","url":null,"abstract":"","PeriodicalId":268207,"journal":{"name":"International Conference on Cryptology in Malaysia","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126945619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}