Sciweavers

281 search results - page 39 / 57
» Non-black-box Techniques in Cryptography
Sort
View
ASIACRYPT
2000
Springer
14 years 2 months ago
CRYPTREC Project - Cryptographic Evaluation Project for the Japanese Electronic Government
We will describe the outline of the cryptographic technology evaluation project in Japan and those present conditions. The purpose of this project is that the cyptographic technolo...
Hideki Imai, Atsuhiro Yamagishi
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
14 years 4 months ago
Peeking Through the Cloud: DNS-Based Estimation and Its Applications
Reliable network demographics are quickly becoming a much sought-after digital commodity. However, as the need for more refined Internet demographics has grown, so too has the ten...
Moheeb Abu Rajab, Fabian Monrose, Andreas Terzis, ...
ACNS
2007
Springer
112views Cryptology» more  ACNS 2007»
14 years 4 months ago
Generic Transformation to Strongly Unforgeable Signatures
Recently, there are several generic transformation techniques proposed for converting unforgeable signature schemes (the message in the forgery has not been signed yet) into strong...
Qiong Huang, Duncan S. Wong, Yiming Zhao
CCS
2009
ACM
14 years 10 months ago
A generic construction of useful client puzzles
Denial of Service (DoS) attacks are serious threats for network societies. For dealing with DoS attacks, Jakobsson and Juels first proposed the notion of useful client puzzles (UC...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
EUROCRYPT
2009
Springer
14 years 10 months ago
Realizing Hash-and-Sign Signatures under Standard Assumptions
Currently, there are relatively few instances of "hash-and-sign" signatures in the standard model. Moreover, most current instances rely on strong and less studied assum...
Susan Hohenberger, Brent Waters