Boneh and Venkatesan have recently proposed an approach to proving that a reasonably small portions of most significant bits of the Diffie–Hellman key modulo a prime are as secure as the whole key. Some further improvements and generalizations have been obtained by Gonzales Vasco and Shparlinski. Verheul has obtained certain analogies of these results in the case of Diffie–Hellman keys in extensions of finite fields, when an oracle is given to compute a certain polynomial function of the key, for example, the trace in the background field. Here we obtain a new result in this direction concerning the case of so-called “unreliable” oracles. The result has applications to the security of the recently proposed by Lenstra and Verheul XTR cryptos...
8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings...
Abstract—Many protocols use Diffie-Hellman key agreement, combined with certified long-term values o...
AbstractA new public key cryptosystem was introduced by Wu and Dawson at the Fourth International Co...
AbstractBoneh and Venkatesan have recently proposed an approach to proving that a reasonably small p...
D. Boneh and R. Venkatesan have recently proposed an approachto proving that a reasonably small port...
Let Fp be a finite field of p elements, where p is prime. The bit security of the Diffie-Hellman fun...
Abstract. We study the security of elliptic curve Diffie-Hellman secret keys in the presence of orac...
Abstract. Boneh and Venkatesan have recently proposed a polynomial time algorithm for recovering a “...
Boneh and Venkatesan have recently proposed a polynomial time algorithm for recovering a "hidden" el...
Boneh and Venkatesan have recently proposed a polynomial time algorithm for recovering a 'hidden' el...
Basel Alomair, Andrew Clark and Radha Poovendran Communicated by xxx Abstract. Message authenticatio...
In this work, we provide a new algebraic framework for pseudorandom functions which encompasses many...
Abstract. Let g be an element of prime order p in an abelian group and α ∈ Zp. We show that if g, gα...
The Diffie–Hellman key exchange scheme is one of the earliest and most widely used public-key primit...
This paper describes a Diffie-Hellman based encryption scheme, DHIES (formerly named DHES and DHAES...
8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings...
Abstract—Many protocols use Diffie-Hellman key agreement, combined with certified long-term values o...
AbstractA new public key cryptosystem was introduced by Wu and Dawson at the Fourth International Co...
AbstractBoneh and Venkatesan have recently proposed an approach to proving that a reasonably small p...
D. Boneh and R. Venkatesan have recently proposed an approachto proving that a reasonably small port...
Let Fp be a finite field of p elements, where p is prime. The bit security of the Diffie-Hellman fun...
Abstract. We study the security of elliptic curve Diffie-Hellman secret keys in the presence of orac...
Abstract. Boneh and Venkatesan have recently proposed a polynomial time algorithm for recovering a “...
Boneh and Venkatesan have recently proposed a polynomial time algorithm for recovering a "hidden" el...
Boneh and Venkatesan have recently proposed a polynomial time algorithm for recovering a 'hidden' el...
Basel Alomair, Andrew Clark and Radha Poovendran Communicated by xxx Abstract. Message authenticatio...
In this work, we provide a new algebraic framework for pseudorandom functions which encompasses many...
Abstract. Let g be an element of prime order p in an abelian group and α ∈ Zp. We show that if g, gα...
The Diffie–Hellman key exchange scheme is one of the earliest and most widely used public-key primit...
This paper describes a Diffie-Hellman based encryption scheme, DHIES (formerly named DHES and DHAES...
8th Theory of Cryptography Conference, TCC 2011, Providence, RI, USA, March 28-30, 2011. Proceedings...
Abstract—Many protocols use Diffie-Hellman key agreement, combined with certified long-term values o...
AbstractA new public key cryptosystem was introduced by Wu and Dawson at the Fourth International Co...