• Publications
  • Influence
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
TLDR
A new criterion for design of S-boxes in block ciphers should not be describable by a system of polynomial equations that is too small or too overdefined, and this is suggested for both Serpent and Rijndael. Expand
Universal Designated-Verifier Signatures
TLDR
A new type of signature scheme called a ‘Universal Designated-Verifier Signature’ (UDVS) can function as a standard publicly-verifiable digital signature but has additional functionality which allows any holder of a signature to designate the signature to any desired designated-verifier (using the verifier’s public key). Expand
HAVAL - A One-Way Hashing Algorithm with Variable Length of Output
TLDR
This paper proposes a one-way hashing algorithm called HAVAL, which compresses a message of arbitrary length into a fingerprint of 128, 160, 192, 224 or 256 bits, and is very efficient and particularly suited for 32-bit computers which predominate the current workstation market. Expand
Fundamentals of Computer Security
TLDR
This book examines modern developments in Cryptography starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, identification and finishing with an introduction to modern e-business systems based on digital cash. Expand
Identification of Bad Signatures in Batches
TLDR
The paper addresses the problem of bad signature identification in batch verification of digital signatures with comments about a general model for verification codes identifying t bad signatures and the design of verifiers using combinatorial structures. Expand
Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function
TLDR
This analysis covers a wide range of key recovery, MAC forgery and other types of attacks, breaking up to 9 rounds (out of the full 24) of the Keccak internal permutation much faster than exhaustive search. Expand
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures
TLDR
This work shows how to extend the classical Schnorr or RSA signature schemes into UDVS schemes, so that the existing key generation and signing implementation infrastructure for these schemes can be used without modification. Expand
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature
TLDR
A simple modification of the Boneh-Shen-Waters transform is presented, which uses two randomised trapdoor hash functions to convert any weakly unforgeable signature into a strongly unforgeability one. Expand
Database Relation Watermarking Resilient against Secondary Watermarking Attacks
TLDR
This paper proposes an improvement over the reversible and blind watermarking scheme presented in [5], identifying and eliminating a critical problem with the previous model. Expand
...
1
2
3
4
5
...