Sciweavers

247 search results - page 8 / 50
» A New Cryptosystem Based On Hidden Order Groups
Sort
View
EUROCRYPT
2005
Springer
14 years 26 days ago
Computational Indistinguishability Between Quantum States and Its Cryptographic Application
We introduce a computational problem of distinguishing between two specific quantum states as a new cryptographic problem to design a quantum cryptographic scheme that is “secu...
Akinori Kawachi, Takeshi Koshiba, Harumichi Nishim...
OTM
2007
Springer
14 years 1 months ago
Bittella: A Novel Content Distribution Overlay Based on Bittorrent and Social Groups
This paper presents Bittella: a new social network for content distribution based on Peer-to-Peer technologies. It exploits the common interests of the users in order to create soc...
Rubén Cuevas Rumín, Carmen Guerrero,...
WINE
2005
Springer
123views Economy» more  WINE 2005»
14 years 25 days ago
An Adaptive Group-Based Reputation System in Peer-to-Peer Networks
Abstract. As more and more P2P applications being popular in Internet, one of important problem to be solved is inspiring users to cooperate each other actively and honestly, the r...
Liang Sun, Li Jiao, Yufeng Wang, Shiduan Cheng, We...
ASIACRYPT
2001
Springer
13 years 11 months ago
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank
A Zero-knowledge protocol provides provably secure entity authentication based on a hard computational problem. Among many schemes proposed since 1984, the most practical rely on f...
Nicolas Courtois
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
14 years 1 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...