Sciweavers

17 search results - page 1 / 4
» acisp 2004
Sort
View
ACISP
2004
Springer
14 years 4 months ago
Fault Attacks on Signature Schemes
Christophe Giraud, Erik Woodward Knudsen
ACISP
2004
Springer
14 years 4 months ago
Symmetric Key Authentication Services Revisited
Bruno Crispo, Bogdan C. Popescu, Andrew S. Tanenba...
ACISP
2004
Springer
14 years 4 months ago
Pseudorandomness of SPN-Type Transformations
Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon C...
ACISP
2010
Springer
14 years 12 days ago
Identity-Based Chameleon Hash Scheme without Key Exposure
In this paper, we propose the first identity-based chameleon hash scheme without key exposure, which gives a positive answer for the open problem introduced by Ateniese and de Mede...
Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo ...
ACISP
2004
Springer
14 years 2 months ago
Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing
Abstract. In this paper we propose an optimistic two-party fair exchange protocol which does not rely on a centralized trusted third party. Instead, the fairness of the protocol re...
Gildas Avoine, Serge Vaudenay