Sciweavers

754 search results - page 78 / 151
» Generation of Signatures by Deformations
Sort
View
ACSAC
2003
IEEE
14 years 2 months ago
How to unwittingly sign non-repudiable documents with Java applications
Digital signatures allow us to produce documents whose integrity and authenticity, as we generated them, is verifiable by anybody who has access to our public key. Furthermore, w...
Danilo Bruschi, D. Fabris, V. Glave, Emilia Rosti
ASIACRYPT
2009
Springer
14 years 1 months ago
PSS Is Secure against Random Fault Attacks
A fault attack consists in inducing hardware malfunctions in order to recover secrets from electronic devices. One of the most famous fault attack is Bellcore’s attack against RS...
Jean-Sébastien Coron, Avradip Mandal
EUROCRYPT
1998
Springer
14 years 1 months ago
Divertible Protocols and Atomic Proxy Cryptography
Abstract. First, we introduce the notion of divertibility as a protocol property as opposed to the existing notion as a language property (see Okamoto, Ohta [OO90]). We give a defi...
Matt Blaze, Gerrit Bleumer, Martin Strauss
INCDM
2010
Springer
146views Data Mining» more  INCDM 2010»
14 years 27 days ago
Learning from Humanoid Cartoon Designs
Abstract. Character design is a key ingredient to the success of any comicbook, graphic novel, or animated feature. Artists typically use shape, size and proportion as the first de...
Md. Tanvirul Islam, Kaiser Md. Nahiduzzaman, Why Y...
CVPR
2007
IEEE
14 years 11 months ago
A Quasi-Minimal Model for Paper-Like Surfaces
Smoothly bent paper-like surfaces are developable. They are however difficult to minimally parameterize since the number of meaningful parameters is intrinsically dependent on the...
Mathieu Perriollat, Adrien Bartoli