Sciweavers

1834 search results - page 264 / 367
» Public Key Cryptography
Sort
View
IMA
2001
Springer
79views Cryptology» more  IMA 2001»
14 years 10 days ago
On Rabin-Type Signatures
Abstract. This paper specializes the signature forgery by Coron, Naccache and Stern (1999) to Rabin-type systems. We present a variation in which the adversary may derive the priva...
Marc Joye, Jean-Jacques Quisquater
WER
2001
Springer
14 years 9 days ago
Requirements Processes: An Experience Report
Processes are certainly a key element in software management. Defining and using processes is believed to be an important factor towards quality. Our paper describes a general pro...
Julio Cesar Sampaio do Prado Leite, Soeli T. Fiori...
COCOON
2000
Springer
14 years 7 days ago
Recent Progress and Prospects for Integer Factorisation Algorithms
The integer factorisation and discrete logarithm problems are of practical importance because of the widespread use of public key cryptosystems whose security depends on the presum...
Richard P. Brent
IH
1999
Springer
14 years 4 days ago
Developments in Steganography
Abstract. This paper presents two main results. The first is a new approach to steganography in which data is encoded in correlations among the pixels in an image. Almost all prev...
Joshua R. Smith, Chris Dodge
WETICE
1998
IEEE
14 years 3 days ago
The Problem with Multiple Roots in Web Browsers - Certificate Masquerading
Much work is going into securing the public key infrastructure (PKI). Various models for trust exist; Pretty Good Privacy (PGP) and the Progressive-Constraint Trust model are exam...
James M. Hayes