Sciweavers

1898 search results - page 11 / 380
» Weak Keys for IDEA
Sort
View
BIOSIG
2009
169views Biometrics» more  BIOSIG 2009»
13 years 6 months ago
Reverse Public Key Encryption
Abstract. This exposition paper suggests a new low-bandwidth publickey encryption paradigm. The construction turns a weak form of key privacy into message privacy as follows: let E...
David Naccache, Rainer Steinwandt, Moti Yung
IJNSEC
2008
154views more  IJNSEC 2008»
13 years 8 months ago
ID-based Weak Blind Signature From Bilinear Pairings
In a blind signature scheme, the user can get a signature sig(m) on message m generated from the signer's blind signature sig(m ) on blinded message m , but the signer can�...
Ze-mao Zhao
BMCBI
2004
90views more  BMCBI 2004»
13 years 8 months ago
Statistical monitoring of weak spots for improvement of normalization and ratio estimates in microarrays
Background: Several aspects of microarray data analysis are dependent on identification of genes expressed at or near the limits of detection. For example, regression-based normal...
Igor Dozmorov, Nicholas Knowlton, Yuhong Tang, Mic...
TCC
2009
Springer
112views Cryptology» more  TCC 2009»
14 years 9 months ago
Oblivious Transfer from Weak Noisy Channels
Various results show that oblivious transfer can be implemented using the assumption of noisy channels. Unfortunately, this assumption is not as weak as one might think, because i...
Jürg Wullschleger
ENTCS
2007
89views more  ENTCS 2007»
13 years 8 months ago
Weak Probabilistic Anonymity
Abstract. Anonymity means that the identity of the user performing a certain action is maintained secret. The protocols for ensuring anonymity often use random mechanisms which can...
Yuxin Deng, Catuscia Palamidessi, Jun Pang