Sciweavers

783 search results - page 64 / 157
» On security proof of McCullagh
Sort
View
CRYPTO
2007
Springer
116views Cryptology» more  CRYPTO 2007»
14 years 4 months ago
Random Oracles and Auxiliary Input
We introduce a variant of the random oracle model where oracle-dependent auxiliary input is allowed. In this setting, the adversary gets an auxiliary input that can contain informa...
Dominique Unruh
CORR
2011
Springer
180views Education» more  CORR 2011»
13 years 4 months ago
A Formalization of Polytime Functions
Abstract. We present a deep embedding of Bellantoni and Cook’s syntactic characterization of polytime functions. We prove formally that it is correct and complete with respect to...
Sylvain Heraud, David Nowak
ICWE
2005
Springer
14 years 3 months ago
Secure Web Forms with Client-Side Signatures
Abstract. The World Wide Web is evolving from a platform for information access into a platform for interactive services. The interaction of the services is provided by forms. Some...
Mikko Honkala, Petri Vuorimaa
ASIACRYPT
2001
Springer
14 years 2 months ago
Provably Secure Fair Blind Signatures with Tight Revocation
A fair blind signature scheme allows the trustee to revoke blindness so that it provides authenticity and anonymity to honest users while preventing malicious users from abusing th...
Masayuki Abe, Miyako Ohkubo
CARDIS
1998
Springer
89views Hardware» more  CARDIS 1998»
14 years 2 months ago
Implementation of a Provably Secure, Smartcard-Based Key Distribution Protocol
We describe the implementation of the Shoup-Rubin key distribution protocol. This protocol stores long-term keys on a smartcard and uses the cryptographic capability of the card t...
Rob Jerdonek, Peter Honeyman, Kevin Coffman, Jim R...