Sciweavers

131 search results - page 10 / 27
» Revocation Systems with Very Small Private Keys
Sort
View
IMA
2001
Springer
79views Cryptology» more  IMA 2001»
13 years 12 months ago
On Rabin-Type Signatures
Abstract. This paper specializes the signature forgery by Coron, Naccache and Stern (1999) to Rabin-type systems. We present a variation in which the adversary may derive the priva...
Marc Joye, Jean-Jacques Quisquater
CORR
2010
Springer
99views Education» more  CORR 2010»
13 years 4 months ago
How I won the "Chess Ratings - Elo vs the Rest of the World" Competition
This article discusses in detail the rating system that won the kaggle competition "Chess Ratings: Elo vs the rest of the world". The competition provided a historical d...
Yannis Sismanis
IH
1998
Springer
13 years 11 months ago
The Steganographic File System
Abstract. Users of some systems are at risk of being compelled to disclose their keys or other private data, and this risk could be mitigated if access control mechanisms supported...
Ross J. Anderson, Roger M. Needham, Adi Shamir
ACSAC
2009
IEEE
14 years 2 months ago
Enabling Secure Secret Sharing in Distributed Online Social Networks
—We study a new application of threshold-based secret sharing in a distributed online social network (DOSN), where users need a means to back up and recover their private keys in...
Le-Hung Vu, Karl Aberer, Sonja Buchegger, Anwitama...
CRYPTO
2000
Springer
175views Cryptology» more  CRYPTO 2000»
13 years 12 months ago
A Chosen-Ciphertext Attack against NTRU
We present a chosen-ciphertext attack against the public key cryptosystem called NTRU. This cryptosystem is based on polynomial algebra. Its security comes from the interaction of ...
Éliane Jaulmes, Antoine Joux