Sciweavers

71 search results - page 15 / 15
» Securing Threshold Cryptosystems against Chosen Ciphertext A...
Sort
View
ASIACRYPT
2003
Springer
14 years 1 months ago
The Insecurity of Esign in Practical Implementations
Provable security usually makes the assumption that a source of perfectly random and secret data is available. However, in practical applications, and especially when smart cards a...
Pierre-Alain Fouque, Nick Howgrave-Graham, Gwena&e...