Sciweavers

1562 search results - page 19 / 313
» Mathematics, Cryptology, Security
Sort
View
CTRSA
2007
Springer
93views Cryptology» more  CTRSA 2007»
13 years 12 months ago
Human Identification Through Image Evaluation Using Secret Predicates
Abstract. The task of developing protocols for humans to securely authenticate themselves to a remote server has been an interesting topic in cryptography as a replacement for the ...
Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungy...
CRYPTO
2009
Springer
99views Cryptology» more  CRYPTO 2009»
14 years 2 months ago
Cryptanalysis of C2
Abstract Julia Borghoff , Lars R. Knudsen, Gregor Leander, Krystian Matusiewicz Department of Mathematics Technical University of Denmark
Julia Borghoff, Lars R. Knudsen, Gregor Leander, K...
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
14 years 8 months ago
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Robin Künzler, Jörn Müller-Quade, D...