Sciweavers

2478 search results - page 19 / 496
» Message from the Chair
Sort
View
PKC
2012
Springer
212views Cryptology» more  PKC 2012»
11 years 10 months ago
Security of Blind Signatures Revisited
We revisit the deļ¬nition of unforgeability of blind signatures as proposed by Pointcheval and Stern (Journal of Cryptology 2000). Surprisingly, we show that this established deļ¬...
Dominique Schröder, Dominique Unruh
SSS
2010
Springer
13 years 6 months ago
"Slow Is Fast" for Wireless Sensor Networks in the Presence of Message Losses
Abstract. Transformations from shared memory model to wireless sensor networks (WSNs) quickly become ineļ¬ƒcient in the presence of prevalent message losses in WSNs, and this prohi...
Mahesh Arumugam, Murat Demirbas, Sandeep S. Kulkar...
PKC
2012
Springer
212views Cryptology» more  PKC 2012»
11 years 10 months ago
Public-Key Cryptography from New Multivariate Quadratic Assumptions
In this work, we study a new multivariate quadratic (MQ) assumption that can be used to construct public-key encryption schemes. In particular, we research in the following two di...
Yun-Ju Huang, Feng-Hao Liu, Bo-Yin Yang
CORR
2010
Springer
66views Education» more  CORR 2010»
13 years 7 months ago
A Simple Message-Passing Algorithm for Compressed Sensing
We consider the recovery of a nonnegative vector x from measurements y = Ax, where A {0, 1}m
Venkat Chandar, Devavrat Shah, Gregory W. Wornell
ESORICS
2008
Springer
13 years 9 months ago
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
Abstract. We propose a novel approach for quantifying a system's resistance to unknown-message side-channel attacks. The approach is based on a measure of the secret informati...
Michael Backes, Boris Köpf