Sciweavers

118 search results - page 15 / 24
» Going Digital
Sort
View
EUROCRYPT
2010
Springer
14 years 1 months ago
Cryptographic Agility and Its Relation to Circular Encryption
We initiate a provable-security treatment of cryptographic agility. A primitive (for example PRFs, authenticated encryption schemes or digital signatures) is agile when multiple, ...
Tolga Acar, Mira Belenkiy, Mihir Bellare, David Ca...
ASIACRYPT
2006
Springer
14 years 5 days ago
Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures
Non-interactive zero-knowledge proofs play an essential role in many cryptographic protocols. We suggest several NIZK proof systems based on prime order groups with a bilinear map...
Jens Groth
ICMLA
2007
13 years 9 months ago
Soft Failure Detection Using Factorial Hidden Markov Models
In modern business, educational, and other settings, it is common to provide a digital network that interconnects hardware devices for shared access by the users (e.g., in an of...
Guillaume Bouchard, Jean-Marc Andreoli
PICS
2003
13 years 9 months ago
Efficient Mobile Imaging Using Emphasis Image Selection
Mobile imaging helps realize "any time, anywhere" visual communication by allowing consumers to capture, review, share, and print pictures via mobile devices while "...
Jiebo Luo, Amit Singhal, Andreas E. Savakis
JCS
2010
121views more  JCS 2010»
13 years 6 months ago
Computational soundness of symbolic zero-knowledge proofs
raction of cryptographic operations by term algebras, called Dolev-Yao models, is essential in almost all tool-supported methods for proving security protocols. Recently significa...
Michael Backes, Dominique Unruh