Sciweavers

281 search results - page 14 / 57
» Non-black-box Techniques in Cryptography
Sort
View
IJNSEC
2008
98views more  IJNSEC 2008»
13 years 9 months ago
A New Type of Designated Confirmer Signatures for a Group of Individuals
A new concept of society-oriented designated confirmer signatures (SDCS) is introduced in this paper. SDCS is well suited to applications where the capability of the signer and th...
Baodian Wei, Fangguo Zhang, Xiaofeng Chen
IJNSEC
2010
146views more  IJNSEC 2010»
13 years 4 months ago
A Novel Digital Envelope Approach for A Secure E-Commerce Channel
Data privacy and integrity will be the crucial and significant factors in recent times for trade which will be transacted over the Internet through e-commerce and mcommerce channe...
Ramachandran Ganesan, Mohan Gobi, Kanniappan Vivek...
JDCTA
2010
250views more  JDCTA 2010»
13 years 4 months ago
A Novel Non-Expansion Visual Secret Sharing Scheme For Binary Image
In visual cryptography, the secret can be any written text, graphical representation, or picture. This technique, some time called visual secret sharing (VSS), allows visual infor...
Thekra Abbas, Zou Beiji
EUROCRYPT
2012
Springer
12 years 7 days ago
Decoding Random Binary Linear Codes in 2 n/20: How 1 + 1 = 0 Improves Information Set Decoding
Decoding random linear codes is a well studied problem with many applications in complexity theory and cryptography. The security of almost all coding and LPN/LWE-based schemes rel...
Anja Becker, Antoine Joux, Alexander May, Alexande...
GLOBECOM
2010
IEEE
13 years 7 months ago
A Distributed Public Key Caching Scheme in Large Wireless Networks
When asymmetric cryptography techniques are used in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate Authority (CA). However,...
Yuan Kong, Jing Deng, Stephen R. Tate