Sciweavers

12637 search results - page 231 / 2528
» Security for Extensible Systems
Sort
View
USENIX
2000
15 years 4 months ago
Transparent Network Security Policy Enforcement
Angelos D. Keromytis, Jason L. Wright
131
Voted
CTRSA
2006
Springer
176views Cryptology» more  CTRSA 2006»
15 years 6 months ago
Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles
Abstract. We present a non-interactive chosen ciphertext secure threshold encryption system. The proof of security is set in the standard model and does not use random oracles. Our...
Dan Boneh, Xavier Boyen, Shai Halevi
100
Voted
EUROCRYPT
2008
Springer
15 years 4 months ago
Proving Tight Security for Rabin-Williams Signatures
This paper proves "tight security in the random-oracle model relative to factorization" for the lowest-cost signature systems available today: every hash-generic signatur...
Daniel J. Bernstein