Sciweavers

773 search results - page 3 / 155
» On Cryptographic Assumptions and Challenges
Sort
View
BIOSIG
2007
90views Biometrics» more  BIOSIG 2007»
13 years 11 months ago
Cryptographic protection of biometric templates: Chance, challenges and applications
: In this contribution a survey is presented about the possibilities and difficulties of a cryptographic protection of biometric information for the purpose of authentication. The ...
Ulrike Korte, Rainer Plaga
SCN
2004
Springer
121views Communications» more  SCN 2004»
14 years 3 months ago
ECRYPT: The Cryptographic Research Challenges for the Next Decade
Abstract. In the past thirty years, cryptology has evolved from a secret art to a modern science. Weaker algorithms and algorithms with short keys are disappearing, political contr...
Bart Preneel
FCS
2006
13 years 11 months ago
Cryptographic and Computational Challenges in Grid Computing
A computational grid is a large-scale distributed computing environment capable of providing dependable, consistent, pervasive, and inexpensive access to high-end computational re...
Song Y. Yan, Glyn James, Gongyi Wu
CIE
2008
Springer
13 years 11 months ago
Succinct NP Proofs from an Extractability Assumption
Abstract We prove, using a non-standard complexity assumption, that any language in NP has a 1-round (that is, the verifier sends a message to the prover, and the prover sends a me...
Giovanni Di Crescenzo, Helger Lipmaa
ACNS
2010
Springer
159views Cryptology» more  ACNS 2010»
14 years 2 months ago
A Message Recognition Protocol Based on Standard Assumptions
We look at the problem of designing Message Recognition Protocols (MRP) and note that all proposals available in the literature have relied on security proofs which hold in the ran...
Atefeh Mashatan, Serge Vaudenay