Sciweavers

92 search results - page 7 / 19
» Provable Secure Generalized Signcryption
Sort
View
BPM
2003
Springer
75views Business» more  BPM 2003»
14 years 21 days ago
Security in Business Process Engineering
We present a general methodology for integrating arbitrary security requirements in the development of business processes in a both elegant and rigorous way. We show how trust rela...
Michael Backes, Birgit Pfitzmann, Michael Waidner
CRYPTO
2010
Springer
228views Cryptology» more  CRYPTO 2010»
13 years 8 months ago
On Generalized Feistel Networks
We prove beyond-birthday-bound security for most of the well-known types of generalized Feistel networks: (1) unbalanced Feistel networks, where the n-bit to m-bit round functions ...
Viet Tung Hoang, Phillip Rogaway
PROVSEC
2009
Springer
14 years 2 months ago
GUC-Secure Set-Intersection Computation
Secure set-intersection computation is one of important problems in secure multiparty computation with various applications. We propose a general construction for secure 2-party se...
Yuan Tian, Hao Zhang
EUROCRYPT
2001
Springer
13 years 12 months ago
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Abstract. We present a formalism for the analysis of key-exchange protocols that combines previous definitional approaches and results in a definition of security that enjoys som...
Ran Canetti, Hugo Krawczyk
INFORMATIKTAGE
2008
13 years 9 months ago
Practical Secure Function Evaluation
: This thesis focuses on the practical aspects of general two-party Secure Function Evaluation (SFE). A new SFE protocol that allows free evaluation of XOR gates and is provably se...
Thomas Schneider 0003