Sciweavers

380 search results - page 61 / 76
» Time Capsule Signature
Sort
View
EUROCRYPT
2010
Springer
14 years 1 months ago
Cryptographic Agility and Its Relation to Circular Encryption
We initiate a provable-security treatment of cryptographic agility. A primitive (for example PRFs, authenticated encryption schemes or digital signatures) is agile when multiple, ...
Tolga Acar, Mira Belenkiy, Mihir Bellare, David Ca...
ASIACRYPT
2000
Springer
14 years 24 days ago
Improved Methods to Perform Threshold RSA
Abstract. A t out of n threshold scheme is such that shares are distributed to n participants so that any set of t participants can compute the secret, whereas any set of less than...
Brian King
KBSE
1997
IEEE
14 years 19 days ago
NORA/HAMMR: Making Deduction-Based Software Component Retrieval Practical
Deduction-based software component retrieval uses preand postconditions as indexes and search keys and an automated theorem prover (ATP) to check whether a component matches. This...
Johann Schumann, Bernd Fischer 0002
CCS
1994
ACM
14 years 17 days ago
The Design and Implementation of Tripwire: A File System Integrity Checker
At the heart of most computer systems is a file system. The file system contains user data, executable programs, configuration and authorization information, and (usually) the bas...
Gene H. Kim, Eugene H. Spafford
CRYPTO
1994
Springer
98views Cryptology» more  CRYPTO 1994»
14 years 16 days ago
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
Suppose we are given a proof of knowledge P in which a prover demonstrates that he knows a solution to a given problem instance. Suppose also that we have a secret sharing scheme S...
Ronald Cramer, Ivan Damgård, Berry Schoenmak...