Sciweavers

352 search results - page 34 / 71
» Cryptography in the Multi-string Model
Sort
View
PKC
2004
Springer
112views Cryptology» more  PKC 2004»
14 years 3 months ago
Identity-Based Threshold Decryption
Abstract. In this paper, we examine issues related to the construction of identity-based threshold decryption schemes and argue that it is important in practice to design an identi...
Joonsang Baek, Yuliang Zheng
TCC
2004
Springer
100views Cryptology» more  TCC 2004»
14 years 3 months ago
On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes
In earlier work, we described a “pathological” example of a signature scheme that is secure in the Random Oracle Model, but for which no secure implementation exists. For that...
Ran Canetti, Oded Goldreich, Shai Halevi
FSE
2003
Springer
123views Cryptology» more  FSE 2003»
14 years 3 months ago
The Security of "One-Block-to-Many" Modes of Operation
In this paper, we investigate the security, in the Luby-Rackoff security paradigm, of blockcipher modes of operation allowing to expand a one-block input into a longer t-block ou...
Henri Gilbert
DEXAW
2002
IEEE
231views Database» more  DEXAW 2002»
14 years 2 months ago
A Cultural Heritage Forum Celebrating Technological Innovation at Station X
We aim to encourage and support public participation in heritage through the development of Cultural Heritage Forums, a kind of cultural web portal that enables active participati...
Trevor D. Collins, Paul Mulholland
EVOW
2006
Springer
14 years 1 months ago
BeeHiveGuard: A Step Towards Secure Nature Inspired Routing Algorithms
Abstract. Nature inspired routing protocols for fixed and mobile networks are becoming an active area of research. However, analyzing their security threats and countering them hav...
Horst Wedde, Constantin Timm, Muddassar Farooq