Sciweavers

FC
1998
Springer
164views Cryptology» more  FC 1998»
14 years 25 days ago
Robustness and Security of Digital Watermarks
Digital watermarking is a nascent but promising technology that offers protection of unencrypted digital content. This paper is a brief technical survey of the multimedia watermark...
Lesley R. Matheson, Stephen G. Mitchell, Talal Sha...
FC
1998
Springer
134views Cryptology» more  FC 1998»
14 years 25 days ago
Group Blind Digital Signatures: A Scalable Solution to Electronic Cash
In this paper we construct a practical group blind signature scheme. Our scheme combines the already existing notions of blind signatures and group signatures. It is an extension o...
Anna Lysyanskaya, Zulfikar Ramzan
FC
1998
Springer
101views Cryptology» more  FC 1998»
14 years 25 days ago
Curbing Junk E-Mail via Secure Classification
Eran Gabber, Markus Jakobsson, Yossi Matias, Alain...
FC
1998
Springer
156views Cryptology» more  FC 1998»
14 years 25 days ago
Assessment of Threats for Smart Card Based Electronic Cash
The security of smart card based electronic cash have been receiving significant attention recently. However, there has been little systematic analysis or quantification of the imp...
Kazuo J. Ezawa, Gregory Napiorkowski
FC
1998
Springer
112views Cryptology» more  FC 1998»
14 years 25 days ago
On Assurance Structures for WWW Commerce
Markus Jakobsson, Moti Yung
FC
1998
Springer
96views Cryptology» more  FC 1998»
14 years 25 days ago
Compliance Checking in the PolicyMaker Trust Management System
Emerging electronic commerce services that use public-key cryptography on a mass-market scale require sophisticated mechanisms for managing trust. For example, any service that rec...
Matt Blaze, Joan Feigenbaum, Martin Strauss
FC
1998
Springer
121views Cryptology» more  FC 1998»
14 years 25 days ago
Cryptanalysis of SPEED
Abstract. The cipher family SPEED (and an associated hashing mode) was recently proposed in Financial Cryptography '97. This paper cryptanalyzes that proposal, in two parts: F...
Chris Hall, John Kelsey, Bruce Schneier, David Wag...
FC
1998
Springer
83views Cryptology» more  FC 1998»
14 years 25 days ago
Distributed Trustees and Revocability: A Framework for Internet Payment
From von Solms and Naccache's standpoint, constructing a practical and secure e-money system implies a proper regulation of its privacy level. Furthermore, when the system ben...
David M'Raïhi, David Pointcheval
EUROCRYPT
1998
Springer
14 years 25 days ago
Auto-Recoverable Auto-Certifiable Cryptosystems
Abstract. This paper introduces a cryptographic paradigm called selfescrowed encryption, a concept initiated by kleptography. In simple words, a self-escrowed public-key cryptosyst...
Adam Young, Moti Yung
EUROCRYPT
1998
Springer
14 years 25 days ago
Securing Threshold Cryptosystems against Chosen Ciphertext Attack
For the most compelling applications of threshold cryptosystems, security against chosen ciphertext attack is a requirement. However, prior to the results presented here, there ap...
Victor Shoup, Rosario Gennaro