Sciweavers

8644 search results - page 25 / 1729
» On the Composition of Secure Systems
Sort
View
JOC
2007
84views more  JOC 2007»
15 years 4 months ago
Concurrent Composition of Secure Protocols in the Timing Model
In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their inputs. In the stand-alone case, it ha...
Yael Tauman Kalai, Yehuda Lindell, Manoj Prabhakar...
HICSS
2005
IEEE
149views Biometrics» more  HICSS 2005»
15 years 10 months ago
Web Services Composition with Traceability Centered on Dependency
Web services composition is becoming increasingly important as organizations are now getting ready to provide more complex service-based applications. Contemporary literature on t...
Jong Woo Kim, Radhika Jain
EUROCRYPT
2000
Springer
15 years 8 months ago
Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R)
In a series of papers Patarin proposes new efficient public key systems. A very interesting proposal, called 2-Round Public Key System with S Boxes, or 2R, is based on the difficul...
Eli Biham
JOC
2008
86views more  JOC 2008»
15 years 4 months ago
Lower Bounds and Impossibility Results for Concurrent Self Composition
In the setting of concurrent self composition, a single protocol is executed many times concurrently by a single set of parties. In this paper, we prove lower bounds and impossibi...
Yehuda Lindell
CCS
1998
ACM
15 years 8 months ago
A New Public Key Cryptosystem Based on Higher Residues
This paper describes a new public-key cryptosystem based on the hardness of computing higher residues modulo a composite RSA integer. We introduce two versions of our scheme, one d...
David Naccache, Jacques Stern