Sciweavers

1094 search results - page 77 / 219
» List signature schemes
Sort
View
IJNSEC
2010
143views more  IJNSEC 2010»
13 years 4 months ago
Nonce Generation For The Digital Signature Standard
Digital Signature Algorithm (DSA) is an underlying algorithm to form a signature in the Digital Signature Standard (DSS). DSA uses a new random number (or nonce) each time a signa...
Rajendra S. Katti, Rajesh G. Kavasseri
ACISP
2006
Springer
14 years 1 months ago
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security
Efficient authentication is one of important security requirements in mobile ad hoc network (MANET) routing systems. The techniques of digital signatures are generally considered a...
Shidi Xu, Yi Mu, Willy Susilo
CRYPTO
2007
Springer
99views Cryptology» more  CRYPTO 2007»
14 years 4 months ago
Practical Cryptanalysis of SFLASH
In this paper, we present a practical attack on the signature scheme SFLASH proposed by Patarin, Goubin and Courtois in 2001 following a design they had introduced in 1998. The att...
Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Ja...
MIAR
2006
IEEE
14 years 4 months ago
List-Mode Affine Rebinning for Respiratory Motion Correction in PET Cardiac Imaging
Positron Emission Tomography (PET) is an established functional imaging modality but its practical deployment is hampered by motion artefacts. This paper proposes a method for corr...
Adrian James Chung, Paolo G. Camici, Guang-Zhong Y...
ALGORITHMICA
1998
75views more  ALGORITHMICA 1998»
13 years 9 months ago
Average Case Analyses of List Update Algorithms, with Applications to Data Compression
We study the performance of the Timestamp(0) (TS(0)) algorithm for self-organizing sequential search on discrete memoryless sources. We demonstrate that TS(0) is better than Move-...
Susanne Albers, Michael Mitzenmacher