scispace - formally typeset
Open AccessBook

Advances in Cryptology - CRYPTO '98

Hugo Krawczyk
Reads0
Chats0
About
The article was published on 1998-01-01 and is currently open access. It has received 651 citations till now.

read more

Citations
More filters
Book ChapterDOI

On the minimal assumptions of group signature schemes

TL;DR: This work shows that the construction of secure group signature schemes based solely on the existence of one-way functions is unlikely, in contrast to what is known for standard signature schemes, which can be constructed from any one- way function.
Book ChapterDOI

Algebraic cryptanalysis of 58-round SHA-1

TL;DR: The aim of this article is to sophisticate and improve Wang's attack by using algebraic techniques and introduce new notions, namely semi-neutral bit and adjuster and propose then an improved message modification technique based ongebraic techniques.
Book ChapterDOI

Observability Analysis - Detecting When Improved Cryptosystems Fail

TL;DR: It is shown that, paradoxically, what looks like a "universal improvement" or a "straight-forward improvement" which enables better security and better reliability on a theoretical level, may in fact, within certain operational contexts, introduce new exposures and attacks, resulting in a weaker operational cryptosystem.
Book ChapterDOI

Confidentiality and integrity: a constructive perspective

TL;DR: This work follows the approach of constructive cryptography, questioning the justification for the existing (game-based) security definitions and finds that some are too weak, or artificially strong, such as INT-CTXT, and others appear unsuitable for symmetric encryption,such as IND-CCA.
Book ChapterDOI

On the security models of (threshold) ring signature schemes

TL;DR: This paper shows that the bilinear map based ring signature scheme of Boneh et al.