Sciweavers

948 search results - page 133 / 190
» Attacking cryptographic schemes based on
Sort
View
ICIAP
2005
ACM
14 years 8 months ago
Security Enhancement of Visual Hashes Through Key Dependent Wavelet Transformations
Parameterized wavelet filters and wavelet packet subband structures are discussed to be used as key dependent wavelet transforms in order to enhance the security of wavelet based h...
Albert Meixner, Andreas Uhl
TCC
2005
Springer
166views Cryptology» more  TCC 2005»
14 years 1 months ago
Adaptively-Secure, Non-interactive Public-Key Encryption
Adaptively-secure encryption schemes ensure secrecy even in the presence of an adversary who can corrupt parties in an adaptive manner based on public keys, ciphertexts, and secret...
Ran Canetti, Shai Halevi, Jonathan Katz
CCS
2011
ACM
12 years 8 months ago
Proofs of ownership in remote storage systems
Cloud storage systems are becoming increasingly popular. A promising technology that keeps their cost down is deduplication, which stores only a single copy of repeating data. Cli...
Shai Halevi, Danny Harnik, Benny Pinkas, Alexandra...
AINA
2004
IEEE
13 years 11 months ago
Using IC Cards to Remotely Login Passwords without Verification Tables
A new remote password authentication scheme based on IC cards is proposed in this paper. By using the scheme, a remote password can be authenticated without either a password file...
Ching-Te Wang, Chin-Chen Chang, Chu-Hsing Lin
CTRSA
2009
Springer
127views Cryptology» more  CTRSA 2009»
14 years 2 months ago
Adaptive-ID Secure Revocable Identity-Based Encryption
Abstract. Identity-Based Encryption (IBE) offers an interesting alternative to PKI-enabled encryption as it eliminates the need for digital certificates. While revocation has bee...
Benoît Libert, Damien Vergnaud