Learn More
RFID technology arouses great interests from both its advocates and opponents because of the promising but privacy-threatening nature of low-cost RFID tags. A main privacy concern in RFID systems results from clandestine scanning through which an adversary could conduct silent tracking and inventorying of persons carrying tagged objects. Thus, the most(More)
Consider the well-known oracle attack: Somehow one gets a certain computation result as a function of a secret key from the secret key owner and tries to extract some information on the secret key. This attacking scenario is well understood in the cryptographic community. However, there are many protocols based on the discrete logarithm problem that turn(More)
This paper investigates various security issues and provides possible improvements on server-aided RSA computation schemes, mainly fo-cused on the two-phase protocols, RSA-S1M and RSA-S2M, proposed by Matsumoto et al. 4]. We rst present new active attacks on these protocols when the nal result is not checked. A server-aided protocol is then proposed in(More)
Practical approaches to constructing public key cryptosystems secure against chosen ciphertext attacks were rst initiated by Damgard and further extended by Zheng and Seberry. In this paper we rst point out that in some cryptosystems proposed by Zheng and Seberry the method for adding authentication capability may fail just under known plaintext attacks.(More)
Elliptic curve cryptosystems have attracted much attention in recent years and one of major interests in ECC is to develop fast algorithms for elliptic curve arithmetic. In this paper we present various improvement techniques for eld arithmetic in GF(p n)(p a prime), in particular , fast eld multiplication and inversion algorithms, and provide our(More)
The block cipher CRYPTON has been proposed as a candidate algorithm for the Advanced Encryption Standard (AES). To x some minor weakness in the key schedule and to remove some undesirable properties in S-boxes, we made some changes to the AES proposal, i.e., in the S-box construction and key scheduling. This paper presents the revised version of CRYPTON and(More)