Sciweavers

318 search results - page 7 / 64
» How to Leak a Secret
Sort
View
ASIACRYPT
2009
Springer
14 years 3 months ago
Signature Schemes with Bounded Leakage Resilience
A leakage-resilient cryptosystem remains secure even if arbitrary, but bounded, information about the secret key (or possibly other internal state information) is leaked to an adv...
Jonathan Katz, Vinod Vaikuntanathan
GECCO
2003
Springer
14 years 1 months ago
Secret Agents Leave Big Footprints: How to Plant a Cryptographic Trapdoor, and Why You Might Not Get Away with It
This paper investigates whether optimisation techniques can be used to evolve artifacts of cryptographic significance which are apparently secure, but which have hidden properties...
John A. Clark, Jeremy L. Jacob, Susan Stepney
DCC
2001
IEEE
14 years 8 months ago
How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves
Recently, and contrary to the common belief, Rivest and Silverman argued that the use of strong primes is unnecessary in the RSA cryptosystem. This paper analyzes how valid this as...
Marc Joye, Jean-Jacques Quisquater, Tsuyoshi Takag...
STACS
1999
Springer
14 years 25 days ago
How to Forget a Secret
Giovanni Di Crescenzo, Niels Ferguson, Russell Imp...
CRYPTO
1995
Springer
100views Cryptology» more  CRYPTO 1995»
14 years 4 days ago
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, M...