Sciweavers

362 search results - page 38 / 73
» Abstraction in Cryptography
Sort
View
ACNS
2010
Springer
145views Cryptology» more  ACNS 2010»
14 years 2 days ago
A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising
Abstract. Web advertisers prefer the cost-per-action (CPA) advertisement model whereby an advertiser pays a web publisher according to the actual amount of transactions, rather tha...
Xuhua Ding
CIE
2008
Springer
13 years 10 months ago
Succinct NP Proofs from an Extractability Assumption
Abstract We prove, using a non-standard complexity assumption, that any language in NP has a 1-round (that is, the verifier sends a message to the prover, and the prover sends a me...
Giovanni Di Crescenzo, Helger Lipmaa
PQCRYPTO
2010
149views Cryptology» more  PQCRYPTO 2010»
13 years 10 months ago
Properties of the Discrete Differential with Cryptographic Applications
Abstract. Recently, the Csignature scheme has been completely broken by Dubois et al. [2, 3]. As a consequence, the security of SFLASH and other multivariate public key systems hav...
Daniel Smith-Tone
SICHERHEIT
2008
13 years 10 months ago
Efficiency Improvement for NTRU
Abstract: The NTRU encryption scheme is an interesting alternative to well-established encryption schemes such as RSA, ElGamal, and ECIES. The security of NTRU relies on the hardne...
Johannes Buchmann, Martin Döring, Richard Lin...
ICISC
2000
102views Cryptology» more  ICISC 2000»
13 years 10 months ago
Micropayments for Wireless Communications
Abstract. Electronic payment systems for wireless devices need to take into account the limited computational and storage ability of such devices. Micropayment schemes seem well su...
DongGook Park, Colin Boyd, Ed Dawson