Sciweavers

948 search results - page 40 / 190
» Attacking cryptographic schemes based on
Sort
View
ACISP
1998
Springer
14 years 6 days ago
On Private-Key Cryptosystems Based on Product Codes
Recently J. and R.M. Campello de Souza proposed a private-key encryption scheme based on the product codes with the capability of correcting a special type of structured errors. In...
Hung-Min Sun, Shiuh-Pyng Shieh
SACRYPT
1998
Springer
14 years 5 days ago
Mix-Based Electronic Payments
We introduce a new payment architecture that limits the power of an attacker while providing the honest user with privacy. Our proposed method defends against all known attacks on ...
Markus Jakobsson, David M'Raïhi
IDTRUST
2009
ACM
14 years 2 months ago
Quantum resistant public key cryptography: a survey
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which c...
Ray A. Perlner, David A. Cooper
IJNSEC
2006
98views more  IJNSEC 2006»
13 years 8 months ago
Comment on Improvement of the Miyazaki-Takaragi Threshold Digital Signature Scheme
To enhance applications of smart cards, Miyazaki and Takaragi proposed a (t, n) threshold digital signature scheme based on the security of elliptic curve discrete logarithm (ECDL...
Zuhua Shao
ICASSP
2009
IEEE
14 years 2 months ago
Anti-collusion fingerprinting with scalar Costa scheme (SCS) and colluder weight recovery
— An anti-collusion fingerprinting system is developed to protect media files against time-varying collusion attacks based on the scalar Costa scheme (SCS) and colluder weight ...
Byung-Ho Cha, C.-C. Jay Kuo