Sciweavers

876 search results - page 44 / 176
» Limits on the Usefulness of Random Oracles
Sort
View
ISCI
2008
160views more  ISCI 2008»
13 years 10 months ago
Certificateless undeniable signature scheme
In this paper, we present the first certificateless undeniable signature scheme. The scheme does not suffer from the key escrow problem, which is inherent in identity based crypto...
Shanshan Duan
EUROCRYPT
2008
Springer
14 years 16 days ago
The Twin Diffie-Hellman Problem and Applications
ded abstract of this paper appears in Advances in Cryptology -- EUROCRYPT '08, Lecture Notes in Computer Science Vol. 4965, N. Smart ed., Springer-Verlag, 2008. This is the fu...
David Cash, Eike Kiltz, Victor Shoup
ASE
2004
148views more  ASE 2004»
13 years 10 months ago
TestEra: Specification-Based Testing of Java Programs Using SAT
TestEra is a framework for automated specification-based testing of Java programs. TestEra requires as input a Java method (in sourcecode or bytecode), a formal specification of th...
Sarfraz Khurshid, Darko Marinov
SRDS
2005
IEEE
14 years 4 months ago
Database Replication Using Generalized Snapshot Isolation
Generalized snapshot isolation extends snapshot isolation as used in Oracle and other databases in a manner suitable for replicated databases. While (conventional) snapshot isolat...
Sameh Elnikety, Willy Zwaenepoel, Fernando Pedone
EUROCRYPT
2004
Springer
14 years 4 months ago
Immunizing Encryption Schemes from Decryption Errors
We provide methods for transforming an encryption scheme susceptible to decryption errors into one that is immune to these errors. Immunity to decryption errors is vital when const...
Cynthia Dwork, Moni Naor, Omer Reingold