Sciweavers

CUZA
2010
158views Cryptology» more  CUZA 2010»
13 years 6 months ago
An Algebra of Hierarchical Graphs and its Application to Structural Encoding
Roberto Bruni, Fabio Gadducci, Alberto Lluch-Lafue...
CUZA
2010
150views Cryptology» more  CUZA 2010»
13 years 6 months ago
Symbolic Synthesis of Mealy Machines from Arithmetic Bitstream Functions
In this paper, we describe a symbolic synthesis method which given an algebraic expression that specifies a bitstream function f, constructs a (minimal) Mealy machine that realise...
Helle Hvid Hansen, Jan J. M. M. Rutten
CRYPTOLOGIA
2010
13 years 6 months ago
Internet Voting Protocol Based on Improved Implicit Security
This paper presents an improved protocol for Internet voting that allows recasting of ballots to eliminate voting errors, encourages early voting and provides an opportunity for c...
Abhishek Parakh, Subhash Kak
CRYPTOLOGIA
2010
13 years 6 months ago
Secure Electronic Voting - A Framework
Abstract. We describe a single framework in which to view the endto-end-independently-verifiable (E2E) polling-place voting systems with a mixnet back-end. We use the framework to ...
Stefan Popoveniuc, Poorvi L. Vora
CRYPTO
2010
Springer
189views Cryptology» more  CRYPTO 2010»
13 years 6 months ago
Instantiability of RSA-OAEP under Chosen-Plaintext Attack
We show that the widely deployed RSA-OAEP encryption scheme of Bellare and Rogaway (Eurocrypt 1994), which combines RSA with two rounds of an underlying Feistel network whose hash...
Eike Kiltz, Adam O'Neill, Adam Smith
CANS
2010
Springer
126views Cryptology» more  CANS 2010»
13 years 6 months ago
Towards Practical and Secure Coercion-Resistant Electronic Elections
Roberto Araujo, Narjes Ben Rajeb, Riadh Robbana, J...
ASIACRYPT
2010
Springer
13 years 6 months ago
The Round Complexity of Verifiable Secret Sharing: The Statistical Case
We consider the round complexity of a basic cryptographic task: verifiable secret sharing (VSS). This well-studied primitive provides a good "test case" for our understan...
Ranjit Kumaresan, Arpita Patra, C. Pandu Rangan
ICISC
2009
184views Cryptology» more  ICISC 2009»
13 years 6 months ago
Efficient Privacy-Preserving Face Recognition
Abstract. Automatic recognition of human faces is becoming increasingly popular in civilian and law enforcement applications that require reliable recognition of humans. However, t...
Ahmad-Reza Sadeghi, Thomas Schneider 0003, Immo We...
ICISC
2009
138views Cryptology» more  ICISC 2009»
13 years 6 months ago
Efficient Certificateless KEM in the Standard Model
Abstract. We give a direct construction of a certificateless key encapsulation mechanism (KEM) in the standard model that is more efficient than the generic constructions proposed ...
Georg Lippold, Colin Boyd, Juan Manuel Gonzá...