Sciweavers

555 search results - page 31 / 111
» From ABZ to Cryptography
Sort
View
PAIRING
2007
Springer
14 years 4 months ago
On the Minimal Embedding Field
Let C be a curve of genus g, defined over a finite field Fq, where q = pm for a prime p. Let N be a large integer coprime to p, dividing the order of the Jacobian variety associ...
Laura Hitt
PKC
2007
Springer
99views Cryptology» more  PKC 2007»
14 years 4 months ago
Full-Domain Subgroup Hiding and Constant-Size Group Signatures
We give a short constant-size group signature scheme, which we prove fully secure under reasonable assumptions in bilinear groups, in the standard model. We achieve this result by ...
Xavier Boyen, Brent Waters
ACNS
2005
Springer
138views Cryptology» more  ACNS 2005»
14 years 3 months ago
Indexing Information for Data Forensics
We introduce novel techniques for organizing the indexing structures of how data is stored so that alterations from an original version can be detected and the changed values speci...
Michael T. Goodrich, Mikhail J. Atallah, Roberto T...
ASIACRYPT
2005
Springer
14 years 3 months ago
Universally Convertible Directed Signatures
Many variants of Chaum and van Antwerpen’s undeniable signatures have been proposed to achieve specific properties desired in real-world applications of cryptography. Among them...
Fabien Laguillaumie, Pascal Paillier, Damien Vergn...
CHES
2005
Springer
117views Cryptology» more  CHES 2005»
14 years 3 months ago
DPA Leakage Models for CMOS Logic Circuits
In this paper, we propose new models for directly evaluating DPA leakage from logic information in CMOS circuits. These models are based on the transition probability for each gate...
Daisuke Suzuki, Minoru Saeki, Tetsuya Ichikawa