Sciweavers

1094 search results - page 82 / 219
» List signature schemes
Sort
View
CTRSA
2009
Springer
141views Cryptology» more  CTRSA 2009»
14 years 1 months ago
Practical Short Signature Batch Verification
In many applications, it is desirable to work with signatures that are both short, and yet where many messages from different signers be verified very quickly. RSA signatures sati...
Anna Lisa Ferrara, Matthew Green, Susan Hohenberge...
DATE
1998
IEEE
100views Hardware» more  DATE 1998»
14 years 2 months ago
Self-Adjusting Output Data Compression: An Efficient BIST Technique for RAMs
After write operations, BIST schemes for RAMs relying on signature analysis must compress the entire memory contents to update the reference signature. This paper introduces a new...
Vyacheslav N. Yarmolik, Sybille Hellebrand, Hans-J...
ICCV
1999
IEEE
14 years 12 months ago
Free-Form Surface Registration using Surface Signatures
This paper introduces a new free-form surface representation scheme for the purpose of fast and accurate registration and matching. Accurate registration of surfaces is a common t...
Sameh M. Yamany, Aly A. Farag
PKC
2010
Springer
183views Cryptology» more  PKC 2010»
14 years 1 months ago
Unlinkability of Sanitizable Signatures
Sanitizable signatures allow a designated party, called the sanitizer, to modify parts of signed data such that the immutable parts can still be verified with respect to the origi...
Christina Brzuska, Marc Fischlin, Anja Lehmann, Do...
CISC
2006
Springer
131views Cryptology» more  CISC 2006»
14 years 1 months ago
Efficient Intrusion-Resilient Signatures Without Random Oracles
Intrusion-resilient signatures are key-evolving protocols that extend the concepts of forward-secure and key-insulated signatures. As in the latter schemes, time is divided into di...
Benoît Libert, Jean-Jacques Quisquater, Moti...