Sciweavers

6574 search results - page 26 / 1315
» Current Signatures: Application
Sort
View
CTRSA
2012
Springer
273views Cryptology» more  CTRSA 2012»
12 years 6 months ago
On the Joint Security of Encryption and Signature in EMV
We provide an analysis of current and future algorithms for signature and encryption in the EMV standards in the case where a single key-pair is used for both signature and encrypt...
Jean Paul Degabriele, Anja Lehmann, Kenneth G. Pat...
PKC
1999
Springer
87views Cryptology» more  PKC 1999»
14 years 2 months ago
On the Security of RSA Screening
Since many applications require the verification of large sets of signatures, it is sometimes advantageous to perform a simultaneous verification instead of checking each signatu...
Jean-Sébastien Coron, David Naccache
IJACT
2008
102views more  IJACT 2008»
13 years 10 months ago
An optimistic fair exchange protocol and its security in the universal composability framework
: Fair exchange protocols allow both or neither of two parties to obtain the other's items, and this property is essential in e-commerce. In this paper, we construct an optimi...
Yusuke Okada, Yoshifumi Manabe, Tatsuaki Okamoto
ASPDAC
2004
ACM
79views Hardware» more  ASPDAC 2004»
14 years 2 months ago
Priority assignment optimization for minimization of current surge in high performance power efficient clock-gated microprocesso
Abstract - We propose an integrated archltectural/physicdplanning approach named priority assignment optimization to mioimize the current surge in high performance power eifkient c...
Yiran Chen, Kaushik Roy, Cheng-Kok Koh
ENVSOFT
2006
118views more  ENVSOFT 2006»
13 years 10 months ago
Database architectures: Current trends and their relationships to environmental data management
Ever increasing environmental demands from customers, authorities and governmental organizations as well as new business control functions are integrated to environmental manageme...
Jaroslav Pokorný