Sciweavers

1970 search results - page 30 / 394
» Security Without Firewalls
Sort
View
DCC
2008
IEEE
14 years 9 months ago
Semantic security for the McEliece cryptosystem without random oracles
In this paper, we formally prove that padding the plaintext with a random bit-string provides the semantic security against chosen plaintext attack (IND-CPA) for the McEliece (and ...
Ryo Nojima, Hideki Imai, Kazukuni Kobara, Kirill M...
FC
2004
Springer
105views Cryptology» more  FC 2004»
14 years 3 months ago
Secure Generalized Vickrey Auction without Third-party Servers
This paper presents a secure Generalized Vickrey Auction (GVA) scheme that does not require third-party servers, i.e., the scheme is executed only by an auctioneer and bidders. Com...
Makoto Yokoo, Koutarou Suzuki
IACR
2011
73views more  IACR 2011»
12 years 9 months ago
Secure Authentication from a Weak Key, Without Leaking Information
We study the problem of authentication based on a weak key in the information-theoretic setting. A key is weak if its min-entropy is an arbitrary small fraction of its bit length. ...
Niek J. Bouman, Serge Fehr
ICIP
2001
IEEE
14 years 11 months ago
Secure scalable streaming enabling transcoding without decryption
John G. Apostolopoulos, Susie J. Wee
SASN
2005
ACM
14 years 3 months ago
RFID security without extensive cryptography
Sindhu Karthikeyan, Mikhail Nesterenko