Sciweavers

515 search results - page 4 / 103
» Secure Parameters for SWIFFT
Sort
View
ICICS
2010
Springer
13 years 4 months ago
Threshold Public-Key Encryption with Adaptive Security and Short Ciphertexts
Threshold public-key encryption (TPKE) allows a set of users to decrypt a ciphertext if a given threshold of authorized users cooperate. Existing TPKE schemes suffer from either lo...
Bo Qin, Qianhong Wu, Lei Zhang, Josep Domingo-Ferr...
MOC
2010
13 years 1 months ago
Global smooth solution curves using rigorous branch following
In this paper, we present a new method to rigorously compute smooth branches of zeros of nonlinear operators f : Rl1
Jan Bouwe van den Berg, Jean-Philippe Lessard, Kon...
PKC
2004
Springer
151views Cryptology» more  PKC 2004»
14 years 9 days ago
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny
The isogeny for elliptic curve cryptosystems was initially used for the efficient improvement of order counting methods. Recently, Smart proposed the countermeasure using isogeny f...
Toru Akishita, Tsuyoshi Takagi
GAMESEC
2010
119views Game Theory» more  GAMESEC 2010»
13 years 5 months ago
Uncertainty in Interdependent Security Games
Abstract. Even the most well-motivated models of information security have application limitations due to the inherent uncertainties involving risk. This paper exemplifies a formal...
Benjamin Johnson, Jens Grossklags, Nicolas Christi...
TPDS
2008
121views more  TPDS 2008»
13 years 6 months ago
Secure Collaboration in a Mediator-Free Distributed Environment
The internet and related technologies have made multidomain collaborations a reality. Collaboration enables domains to effectively share resources; however, it introduces several s...
Mohamed Shehab, Arif Ghafoor, Elisa Bertino