Sciweavers

468 search results - page 41 / 94
» A Certified Digital Signature
Sort
View
ACNS
2003
Springer
130views Cryptology» more  ACNS 2003»
14 years 3 months ago
Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary
Key exposures, known or inconspicuous, are a real security threat. Recovery mechanisms from such exposures are required. For digital signatures such a recovery should ideally —an...
Gene Itkis, Peng Xie
ASIACRYPT
2006
Springer
14 years 1 months ago
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
Non-interactive zero-knowledge proofs play an essential role in many cryptographic protocols. We suggest several NIZK proof systems based on prime order groups with a bilinear map...
Jens Groth
SPIESR
1998
239views Database» more  SPIESR 1998»
13 years 11 months ago
Robust Embedded Data from Wavelet Coefficients
An approach to embedding gray scale images using a discrete wavelet transform is proposed. The proposed scheme enables using signature images that could be as much as 25% of the h...
Jong Jin Chae, B. S. Manjunath
ETS
2010
IEEE
150views Hardware» more  ETS 2010»
13 years 8 months ago
Predicting dynamic specifications of ADCs with a low-quality digital input signal
— A new method is presented to test dynamic parameters of Analogue-to-Digital Converters (ADC). A noisy and nonlinear pulse is applied as the test stimulus, which is suitable for...
Xiaoqin Sheng, Vincent Kerzerho, Hans G. Kerkhoff
WISE
2000
Springer
14 years 2 months ago
Logging and Signing Document-Transfers on the WWW-A Trusted Third Party Gateway
In this work we discuss a service that aims to make quoting of online documents, „web contents“ easy and provable. For that reason we report the conception of a gateway that w...
Andreas Heuer 0002, Frank Losemann, Christoph Mein...