Sciweavers

209 search results - page 15 / 42
» A Forward-Secure Digital Signature Scheme
Sort
View
AINA
2004
IEEE
13 years 11 months ago
Generating Digital Signatures on Mobile Devices
With the explosion of the mobile communication market, more and more handheld devices act as clients in the Internet. People use these devices to purchase books, play games, recei...
Yu Lei, Deren Chen, Zhongding Jiang
ASIACRYPT
2011
Springer
12 years 7 months ago
Short Signatures from Weaker Assumptions
We provide constructions of (m, 1)-programmable hash functions (PHFs) for m ≥ 2. Mimicking certain programmability properties of random oracles, PHFs can, e.g., be plugged into ...
Dennis Hofheinz, Tibor Jager, Eike Kiltz
CHES
2000
Springer
86views Cryptology» more  CHES 2000»
14 years 4 days ago
MiniPASS: Authentication and Digital Signatures in a Constrained Environment
Abstract. We describe an implementation of the PASS polynomial authentication and signature scheme [5, 6] that is suitable for use in highly constrained environments such as SmartC...
Jeffrey Hoffstein, Joseph H. Silverman
PKC
2005
Springer
125views Cryptology» more  PKC 2005»
14 years 1 months ago
A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures as Short as Possible
We answer the open question of the possibility of building a digital signature scheme with proven security based on the one-wayness of a trapdoor permutation and with signatures as...
Louis Granboulan
ICIP
2003
IEEE
14 years 1 months ago
Joint source-channel coding scheme for image-in-image data hiding
We consider the problem of hiding images in images. In addition to the usual design constraints such as imperceptible host degradation and robustness in presence of variety of att...
Kaushal Solanki, Onkar Dabeer, B. S. Manjunath, Up...