Sciweavers

CODCRY
2009
Springer
93views Cryptology» more  CODCRY 2009»
14 years 6 months ago
Separation and Witnesses
We revisit two notions of difference between codewords, namely separation and the existence of small witnesses, and explore their links.
Gérard D. Cohen
CODCRY
2009
Springer
121views Cryptology» more  CODCRY 2009»
14 years 6 months ago
On Weierstrass Semigroups of Some Triples on Norm-Trace Curves
In this paper, we consider the norm-trace curves which are defined by the equation yqr−1 + yqr−2 + · · · + y = x qr−1 q−1 over IFqr where q is a power of a prime number...
Gretchen L. Matthews
CANS
2009
Springer
160views Cryptology» more  CANS 2009»
14 years 6 months ago
Short Hash-Based Signatures for Wireless Sensor Networks
We present a hash-based signature scheme customized for wireless sensor networks. For message lengths required by instructions or queries from the base station or single measuremen...
Erik Dahmen, Christoph Krauß
CANS
2009
Springer
105views Cryptology» more  CANS 2009»
14 years 6 months ago
Transferable Constant-Size Fair E-Cash
We propose an efficient blind certification protocol with interesting properties. It falls in the Groth-Sahai framework for witness-indistinguishable proofs, thus extended to a ce...
Georg Fuchsbauer, David Pointcheval, Damien Vergna...
CANS
2009
Springer
126views Cryptology» more  CANS 2009»
14 years 6 months ago
Ensuring Authentication of Digital Information Using Cryptographic Accumulators
In this paper, we study the broadcast authentication problem for both erasure and adversarial networks. Two important concerns for authentication protocols are the authentication ...
Christophe Tartary
CANS
2009
Springer
165views Cryptology» more  CANS 2009»
14 years 6 months ago
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes
Abstract. Wireless sensor networks have several useful applications in commercial and defense settings, as well as user-centric personal area networks. To establish secure (point-t...
Nitesh Saxena, Md. Borhan Uddin
CANS
2009
Springer
121views Cryptology» more  CANS 2009»
14 years 6 months ago
On Cryptographic Schemes Based on Discrete Logarithms and Factoring
Abstract. At CRYPTO 2003, Rubin and Silverberg introduced the concept of torus-based cryptography over a finite field. We extend their setting to the ring of integers modulo N. W...
Marc Joye
CANS
2009
Springer
136views Cryptology» more  CANS 2009»
14 years 6 months ago
Verifying Anonymous Credential Systems in Applied Pi Calculus
Abstract. Anonymous credentials are widely used to certify properties of a credential owner or to support the owner to demand valuable services, while hiding the user’s identity ...
Xiangxi Li, Yu Zhang, Yuxin Deng
CANS
2009
Springer
120views Cryptology» more  CANS 2009»
14 years 6 months ago
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
Abstract. We consider generic Garbled Circuit (GC)-based techniques for Secure Function Evaluation (SFE) in the semi-honest model. We describe efficient GC constructions for additi...
Vladimir Kolesnikov, Ahmad-Reza Sadeghi, Thomas Sc...