Sciweavers

199 search results - page 35 / 40
» A survey of algebraic properties used in cryptographic proto...
Sort
View
ICTAC
2005
Springer
14 years 4 months ago
The Timer Cascade: Functional Modelling and Real Time Calculi
Case studies can significantly contribute towards improving the understanding of formalisms and thereby to their applicability in practice. One such case, namely a cascade of the ...
Raymond T. Boute, Andreas Schäfer
STOC
2006
ACM
120views Algorithms» more  STOC 2006»
14 years 11 months ago
Black-box constructions for secure computation
d abstract) Yuval Ishai Eyal Kushilevitz Yehuda Lindell Erez Petrank It is well known that the secure computation of non-trivial functionalities in the setting of no honest majori...
Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Ere...
ASIACRYPT
2009
Springer
14 years 5 months ago
Foundations of Non-malleable Hash and One-Way Functions
Non-malleability is an interesting and useful property which ensures that a cryptographic protocol preserves the independence of the underlying values: given for example an encryp...
Alexandra Boldyreva, David Cash, Marc Fischlin, Bo...
CRYPTO
2011
Springer
232views Cryptology» more  CRYPTO 2011»
12 years 10 months ago
Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups
Structure-preserving signatures are signatures defined over bilinear groups that rely on generic group operations. In particular, the messages and signatures consist of group elem...
Masayuki Abe, Jens Groth, Kristiyan Haralambiev, M...
PKC
2000
Springer
166views Cryptology» more  PKC 2000»
14 years 2 months ago
Design Validations for Discrete Logarithm Based Signature Schemes
A number of signature schemes and standards have been recently designed, based on the Discrete Logarithm problem. In this paper we conduct design validation of such schemes while t...
Ernest F. Brickell, David Pointcheval, Serge Vaude...