Sciweavers

1562 search results - page 75 / 313
» Mathematics, Cryptology, Security
Sort
View
ASIACRYPT
2004
Springer
14 years 1 months ago
Generic Homomorphic Undeniable Signatures
We introduce a new computational problem related to the interpolation of group homomorphisms which generalizes many famous cryptographic problems including discrete logarithm, Diļ¬...
Jean Monnerat, Serge Vaudenay
CRYPTO
2001
Springer
117views Cryptology» more  CRYPTO 2001»
14 years 19 days ago
Online Ciphers and the Hash-CBC Construction
We initiate a study of on-line ciphers. These are ciphers that can take input plaintexts of large and varying lengths and will output the ith block of the ciphertext after having p...
Mihir Bellare, Alexandra Boldyreva, Lars R. Knudse...
CRYPTO
2001
Springer
95views Cryptology» more  CRYPTO 2001»
14 years 19 days ago
Robustness for Free in Unconditional Multi-party Computation
We present a very eļ¬ƒcient multi-party computation protocol unconditionally secure against an active adversary. The security is maximal, i.e., active corruption of up to t < n/...
Martin Hirt, Ueli M. Maurer
PKC
1999
Springer
142views Cryptology» more  PKC 1999»
14 years 12 days ago
Encrypted Message Authentication by Firewalls
Firewalls typically ļ¬lter network traļ¬ƒc at several diļ¬€erent layers. At application layer, ļ¬ltering is based on various security relevant information encapsulated into proto...
Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
PKC
1998
Springer
158views Cryptology» more  PKC 1998»
14 years 10 days ago
A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation
One-way hash functions are an important tool in achieving authentication and data integrity. The aim of this paper is to propose a novel one-way hash function based on cellular aut...
Miodrag J. Mihaljevic, Yuliang Zheng, Hideki Imai