Sciweavers

319 search results - page 7 / 64
» Cryptographic Assumptions: A Position Paper
Sort
View
CCS
2009
ACM
14 years 5 months ago
Computational soundness for key exchange protocols with symmetric encryption
Formal analysis of security protocols based on symbolic models has been very successful in finding flaws in published protocols and proving protocols secure, using automated too...
Ralf Küsters, Max Tuengerthal
ICRA
2007
IEEE
175views Robotics» more  ICRA 2007»
14 years 5 months ago
Homography Based Kalman Filter for Mosaic Building. Applications to UAV position estimation
— This paper presents a probabilistic framework where uncertainties can be considered in the mosaic building process. It is shown how can be used as an environment representation...
Fernando Caballero, Luis Merino, Joaquin Ferruz, A...
AFRICACRYPT
2008
Springer
14 years 5 months ago
A Brief History of Provably-Secure Public-Key Encryption
Public-key encryption schemes are a useful and interesting field of cryptographic study. The ultimate goal for the cryptographer in the field of public-key encryption would be th...
Alexander W. Dent
ICICS
2010
Springer
13 years 8 months ago
Proving Coercion-Resistance of Scantegrity II
By now, many voting protocols have been proposed that, among others, are designed to achieve coercion-resistance, i.e., resistance to vote buying and voter coercion. Scantegrity II...
Ralf Küsters, Tomasz Truderung, Andreas Vogt
IDTRUST
2009
ACM
14 years 5 months ago
Quantum resistant public key cryptography: a survey
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which c...
Ray A. Perlner, David A. Cooper