Sciweavers

1562 search results - page 20 / 313
» Mathematics, Cryptology, Security
Sort
View
MPC
1998
Springer
81views Mathematics» more  MPC 1998»
14 years 5 days ago
A Semantic Approach to Secure Information Flow
K. Rustan M. Leino, Rajeev Joshi
FC
2010
Springer
226views Cryptology» more  FC 2010»
13 years 11 months ago
Shoulder-Surfing Safe Login in a Partially Observable Attacker Model
Abstract. Secure login methods based on human cognitive skills can be classified into two categories based on information available to a passive attacker: (i) the attacker fully ob...
Toni Perkovic, Mario Cagalj, Nitesh Saxena
ASIACRYPT
2004
Springer
14 years 1 months ago
On the Security of MOR Public Key Cryptosystem
In-Sok Lee, Woo-Hwan Kim, Daesung Kwon, Sangil Nah...
ASIACRYPT
2003
Springer
14 years 1 months ago
A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems
In this paper, we introduce a conceptually very simple and demonstrative algo
Kaoru Kurosawa, Katja Schmidt-Samoa, Tsuyoshi Taka...
CANS
2006
Springer
106views Cryptology» more  CANS 2006»
13 years 11 months ago
Efficient Identity-Based Encryption with Tight Security Reduction
Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi,...