Sciweavers

5387 search results - page 82 / 1078
» Generating generic functions
Sort
View
CRYPTO
2005
Springer
163views Cryptology» more  CRYPTO 2005»
15 years 8 months ago
On the Generic Insecurity of the Full Domain Hash
The Full-Domain Hash (FDH) signature scheme [3] forms one the most basic usages of random oracles. It works with a family F of trapdoor permutations (TDP), where the signature of m...
Yevgeniy Dodis, Roberto Oliveira, Krzysztof Pietrz...
136
Voted
BMCBI
2010
89views more  BMCBI 2010»
15 years 2 months ago
Predictors of natively unfolded proteins: unanimous consensus score to detect a twilight zone between order and disorder in gene
Background: Natively unfolded proteins lack a well defined three dimensional structure but have important biological functions, suggesting a re-assignment of the structure-functio...
Antonio Deiana, Andrea Giansanti
PKC
2012
Springer
235views Cryptology» more  PKC 2012»
13 years 4 months ago
Improved Security for Linearly Homomorphic Signatures: A Generic Framework
ded abstract of this work will appear in Public Key Cryptography — PKC 2012. This is the full version. We propose a general framework that converts (ordinary) signature schemes ...
David Mandell Freeman
ASIACRYPT
2006
Springer
15 years 6 months ago
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding
Understanding what construction strategy has a chance to be a good hash function is extremely important nowadays. In TCC'04, Maurer et al. [13] introduced the notion of indiff...
Donghoon Chang, Sangjin Lee, Mridul Nandi, Moti Yu...
ICFP
2012
ACM
13 years 4 months ago
Functional programming with structured graphs
This paper presents a new functional programming model for graph structures called structured graphs. Structured graphs extend conventional algebraic datatypes with explicit defi...
Bruno C. d. S. Oliveira, William R. Cook