Skip to main content
We present the SIGMA family of key-exchange protocols and the “SIGn-and-MAc” approach to authenticated Diffie-Hellman underlying its design. The SIGMA protocols provide perfect forward secrecy via a Diffie-Hellman exchange authenticated... more
    • by 
    •   5  
      Digital SignatureCryptoDesign Rationaleperfect forward secrecy (PFS)
    • by 
    •   9  
      CryptographyAuthenticationCryptoCryptology
    • by 
    •   4  
      CryptoCryptologyOblivious TransferPublic Key Cryptosystem
    • by 
    • Crypto
    • by 
    •   3  
      CryptoBlock CodesAuthentication Protocol
    • by 
    •   5  
      Learning problemsCryptoPseudo-Random Number GeneratorCryptology
    • by 
    • Crypto
    • by 
    •   5  
      CryptoProvable SecurityCryptologyKey Distribution
    • by 
    •   5  
      CryptoTime ComplexityBlock CipherHash Function
    • by 
    •   4  
      CryptoCryptologyZero-Knowledge ProofsStandard Model
    • by 
    •   7  
      Network SecurityCryptoProvable SecurityCryptology
Background: Within the emerging field of cryptocurrencies, the sub-sector DeFi (decentralized finance) has experienced explosive growth over the last year, and its importance for crypto as a whole has grown with it. The currencies have... more
    • by  and +1
    •   13  
      EconomicsCryptoBitcoinAAVE
    • by 
    •   4  
      Computer ScienceQuantum CryptographyCryptoCryptology
    • by 
    •   2  
      CryptoLower Bound
    • by 
    •   7  
      CryptoProvable SecurityPartial InformationHigh Speed
    • by 
    •   9  
      Computer ScienceNetwork SecurityCryptoProvable Security
    • by 
    •   8  
      Computer ScienceCryptoProvable SecuritySmart Card
    • by 
    •   12  
      EconomicsTheoryCryptoVirtual Currencies
The future of currency is through crypto-currency. Every day a new crypto-currency is created (or multiple of them) and there could be no stop to it. Governments and agencies would not be able to cope-up and regulate them one by one. It... more
    • by 
    •   21  
      FinanceEconomicsFinancial EconomicsTheory
We study the natural problem of secure n-party computation (in the passive, computationally unbounded attack model) of the n-product function f G (x 1,...,x n ) = x 1 ·x 2 ⋯ x n in an arbitrary finite group (G,·), where the input of party... more
    • by 
    •   5  
      CryptoCombinatorial ProblemsProduction FunctionCommunication Complexity
In this paper we revisit one of the most popular password-based key exchange protocols, namely the OKE (for Open Key Exchange) scheme, proposed by Luck in 1997. Our results can be highlighted as follows. First we define a new primitive... more
    • by 
    •   4  
      CryptoRandom Oracle ModelInteger FactorizationKey Exchange
    • by 
    •   4  
      CryptoCryptologyUpper BoundMessage Authentication Code
    • by 
    •   12  
      EconomicsTheoryCryptoVirtual Currencies
We present data concerning the factorization of the 120-digit number RSA-120, which we factored on July 9, 1993, using the quadratic sieve method. The factorization took approximately 825 MIPS years and was completed within three months... more
    • by 
    •   3  
      CryptoCryptologyReal Time
    • by 
    •   3  
      CryptoCryptologyReal Time
Canetti and Fischlin have recently proposed the security notion <em>universal composability</em> for commitment schemes and provided two examples. This new notion is very strong. It guarantees that security is maintained even... more
    • by 
    •   10  
      MathematicsComputer ScienceCryptographyEncryption
    • by 
    •   8  
      Computer ScienceCryptoProvable SecuritySmart Card
Most public key cryptosystems have been constructed based on abelian groups up to now. We propose a new public key cryptosystem built on finite non abelian groups in this paper. It is convertible to a scheme in which the encryption and... more
    • by 
    •   4  
      Computer ScienceCryptoCryptologyPublic Key Cryptosystem
    • by 
    •   3  
      Number TheoryCryptoPolynomial Time
    • by 
    •   4  
      Knowledge SystemsSecurity and PrivacyCryptoCryptology
    • by 
    •   5  
      CryptoProvable SecurityDifferential cryptanalysisUpper Bound
    • by 
    •   13  
      EconomicsTheoryCryptoVirtual Currencies
    • by 
    •   12  
      EconomicsTheoryCryptoVirtual Currencies
    • by 
    •   4  
      CryptoCryptologyElliptic Curve CryptographyKey Exchange
KeeLoq remote keyless entry systems are widely used for access control purposes such as garage openers or car door systems. We present the first successful differential power analysis attacks on numerous commercially available products... more
    • by 
    •   10  
      Access ControlCryptoCryptologyPower Analysis
    • by 
    •   2  
      CryptoCryptology
    • by 
    •   5  
      CryptoCombinatorial ProblemsProduction FunctionCommunication Complexity
    • by 
    •   3  
      CryptoStructural PropertiesHash Function