Sciweavers

377 search results - page 53 / 76
» Factoring by Electronic Mail
Sort
View
FC
1997
Springer
86views Cryptology» more  FC 1997»
14 years 26 days ago
The SPEED Cipher
Abstract. SPEED is a private key block cipher. It supports three variable parameters: (1) data length — the length of a plaintext/ciphertext of SPEED can be 64, 128 or 256 bits. ...
Yuliang Zheng
JOC
2000
181views more  JOC 2000»
13 years 8 months ago
Security Arguments for Digital Signatures and Blind Signatures
Abstract. Since the appearance of public-key cryptography in the seminal DiffieHellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact t...
David Pointcheval, Jacques Stern
WWW
2009
ACM
14 years 9 months ago
Scrolling behaviour with single- and multi-column layout
The standard layout model used by web browsers is to lay text out in a vertical scroll using a single column. The horizontal-scroll layout model--in which text is laid out in colu...
Cameron Braganza, Kim Marriott, Peter Moulder, Mic...
WWW
2006
ACM
14 years 9 months ago
Designing ethical phishing experiments: a study of (ROT13) rOnl query features
We study how to design experiments to measure the success rates of phishing attacks that are ethical and accurate, which are two requirements of contradictory forces. Namely, an e...
Markus Jakobsson, Jacob Ratkiewicz
WWW
2005
ACM
14 years 9 months ago
The classroom sentinel: supporting data-driven decision-making in the classroom
Whereas schools typically record mounds of data regarding student performance, attendance, and other behaviors over the course of a school year, rarely is that data consulted and ...
Mark K. Singley, Richard B. Lam