Sciweavers

8644 search results - page 25 / 1729
» On the Composition of Secure Systems
Sort
View
JOC
2007
84views more  JOC 2007»
13 years 7 months ago
Concurrent Composition of Secure Protocols in the Timing Model
In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their inputs. In the stand-alone case, it ha...
Yael Tauman Kalai, Yehuda Lindell, Manoj Prabhakar...
HICSS
2005
IEEE
149views Biometrics» more  HICSS 2005»
14 years 1 months ago
Web Services Composition with Traceability Centered on Dependency
Web services composition is becoming increasingly important as organizations are now getting ready to provide more complex service-based applications. Contemporary literature on t...
Jong Woo Kim, Radhika Jain
EUROCRYPT
2000
Springer
13 years 11 months ago
Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R)
In a series of papers Patarin proposes new efficient public key systems. A very interesting proposal, called 2-Round Public Key System with S Boxes, or 2R, is based on the difficul...
Eli Biham
27
Voted
JOC
2008
86views more  JOC 2008»
13 years 7 months ago
Lower Bounds and Impossibility Results for Concurrent Self Composition
In the setting of concurrent self composition, a single protocol is executed many times concurrently by a single set of parties. In this paper, we prove lower bounds and impossibi...
Yehuda Lindell
CCS
1998
ACM
13 years 12 months ago
A New Public Key Cryptosystem Based on Higher Residues
This paper describes a new public-key cryptosystem based on the hardness of computing higher residues modulo a composite RSA integer. We introduce two versions of our scheme, one d...
David Naccache, Jacques Stern