Sciweavers

977 search results - page 195 / 196
» Secure Computation with Fixed-Point Numbers
Sort
View
ASIACRYPT
2010
Springer
13 years 7 months ago
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
We revisit narrow-pipe designs that are in practical use, and their security against preimage attacks. Our results are the best known preimage attacks on Tiger, MD4, and reduced SH...
Jian Guo, San Ling, Christian Rechberger, Huaxiong...
NAR
2011
233views Computer Vision» more  NAR 2011»
13 years 13 days ago
ArachnoServer 2.0, an updated online resource for spider toxin sequences and structures
ArachnoServer (www.arachnoserver.org) is a manually curated database providing information on the sequence, structure and biological activity of protein toxins from spider venoms....
Volker Herzig, David L. A. Wood, Felicity Newell, ...
SIGECOM
2004
ACM
132views ECommerce» more  SIGECOM 2004»
14 years 3 months ago
A dynamic pari-mutuel market for hedging, wagering, and information aggregation
I develop a new mechanism for risk allocation and information speculation called a dynamic pari-mutuel market (DPM). A DPM acts as hybrid between a pari-mutuel market and a contin...
David M. Pennock
ASIACRYPT
2001
Springer
14 years 2 months ago
Fully Distributed Threshold RSA under Standard Assumptions
The aim of this article is to propose a fully distributed environment for the RSA scheme. What we have in mind is highly sensitive applications and even if we are ready to pay a pr...
Pierre-Alain Fouque, Jacques Stern
EUROCRYPT
2007
Springer
14 years 1 months ago
Batch Verification of Short Signatures
Abstract. With computer networks spreading into a variety of new environments, the need to authenticate and secure communication grows. Many of these new environments have particul...
Jan Camenisch, Susan Hohenberger, Michael Ø...