Sciweavers

859 search results - page 50 / 172
» The Changing Face of Cryptography
Sort
View
EUROCRYPT
2003
Springer
14 years 26 days ago
Fair Secure Two-Party Computation
Abstract Benny Pinkas HP Labs Abstract. We demonstrate a transformation of Yao’s protocol for secure two-party computation to a fair protocol in which neither party gains any sub...
Benny Pinkas
IJIT
2004
13 years 9 months ago
Practical Fair Anonymous Undeniable Signatures
We present a new model for undeniable signatures: fair-anonymous undeniable signatures. This protocol can not only preserve the privacy of the signer (i.e. anonymity) but also trac...
Song Han, Elizabeth Chang, Xiaotie Deng, Winson K....
CN
2007
111views more  CN 2007»
13 years 7 months ago
Advances in smart cards
Since the turn of the century, smart card technology has pushed its borders both on the high end to integrate new functionalities (e.g., networking) and on the low end to adapt to...
Josep Domingo-Ferrer, Joachim Posegga, Francesc Se...
JISE
2008
143views more  JISE 2008»
13 years 7 months ago
A Geometry-Based Secret Image Sharing Approach
This paper solves the visual cryptography problem by the Blakley scheme that is a geometry-based secret sharing strategy. We first partition the protected image into non-overlappi...
Chien-Chang Chen, Wen-Yin Fu
INFORMATICALT
2000
123views more  INFORMATICALT 2000»
13 years 7 months ago
Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures
Recently, Harn proposed an efficient scheme that can batch verification multiple RSA digital signatures. His scheme can reduce signature verification time. However, there is a weak...
Min-Shiang Hwang, Iuon-Chang Lin, Kuo-Feng Hwang