Sciweavers

555 search results - page 72 / 111
» From ABZ to Cryptography
Sort
View
TCC
2005
Springer
169views Cryptology» more  TCC 2005»
14 years 3 months ago
Chosen-Ciphertext Security of Multiple Encryption
Encryption of data using multiple, independent encryption schemes (“multiple encryption”) has been suggested in a variety of contexts, and can be used, for example, to protect ...
Yevgeniy Dodis, Jonathan Katz
WCC
2005
Springer
115views Cryptology» more  WCC 2005»
14 years 3 months ago
On the Weights of Binary Irreducible Cyclic Codes
This paper is devoted to the study of the weights of binary irreducible cyclic codes. We start from McEliece’s interpretation of these weights by means of Gauss sums. Firstly, a ...
Yves Aubry, Philippe Langevin
ACMICEC
2004
ACM
128views ECommerce» more  ACMICEC 2004»
14 years 3 months ago
Blind sales in electronic commerce
We start with the usual paradigm in electronic commerce: a consumer who wants to buy from a merchant. However, both parties wish to enjoy maximal privacy. In addition to remaining...
Esma Aïmeur, Gilles Brassard, Flavien Serge M...
ACNS
2004
Springer
77views Cryptology» more  ACNS 2004»
14 years 3 months ago
A Pay-per-Use DoS Protection Mechanism for the Web
Internet service providers have resisted deploying Denial-of-Service (DoS) protection mechanisms despite numerous research results in the area. This is so primarily because ISPs ca...
Angelos Stavrou, John Ioannidis, Angelos D. Keromy...
ACNS
2004
Springer
156views Cryptology» more  ACNS 2004»
14 years 3 months ago
One-Round Protocols for Two-Party Authenticated Key Exchange
Cryptographic protocol design in a two-party setting has often ignored the possibility of simultaneous message transmission by each of the two parties (i.e., using a duplex channe...
Ik Rae Jeong, Jonathan Katz, Dong Hoon Lee