Sciweavers

2846 search results - page 13 / 570
» Not one click for security
Sort
View
136
Voted
CHES
2006
Springer
131views Cryptology» more  CHES 2006»
15 years 7 months ago
Why One Should Also Secure RSA Public Key Elements
It is well known that a malicious adversary can try to retrieve secret information by inducing a fault during cryptographic operations. Following the work of Seifert on fault induc...
Eric Brier, Benoît Chevallier-Mames, Mathieu...
112
Voted
PKC
2000
Springer
144views Cryptology» more  PKC 2000»
15 years 7 months ago
Chosen-Ciphertext Security for Any One-Way Cryptosystem
David Pointcheval
135
Voted
WWW
2010
ACM
15 years 10 months ago
Beyond position bias: examining result attractiveness as a source of presentation bias in clickthrough data
Leveraging clickthrough data has become a popular approach for evaluating and optimizing information retrieval systems. Although data is plentiful, one must take care when interpr...
Yisong Yue, Rajan Patel, Hein Roehrig
216
Voted
UMC
2000
15 years 7 months ago
Quantum Information: The New Frontier
Quantum information and computation is the new hype in physics. It is promising, mindboggling and even already applicable in cryptography, with good prospects ahead. A brief, rathe...
Karl Svozil
PKC
2005
Springer
125views Cryptology» more  PKC 2005»
15 years 9 months ago
A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures as Short as Possible
We answer the open question of the possibility of building a digital signature scheme with proven security based on the one-wayness of a trapdoor permutation and with signatures as...
Louis Granboulan