Sciweavers

352 search results - page 2 / 71
» Cryptography in the Multi-string Model
Sort
View
PAIRING
2007
Springer
119views Cryptology» more  PAIRING 2007»
13 years 11 months ago
Practical Time Capsule Signatures in the Standard Model from Bilinear Maps
Benoît Libert, Jean-Jacques Quisquater
EUROCRYPT
2004
Springer
13 years 10 months ago
An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem
Mihir Bellare, Alexandra Boldyreva, Adriana Palaci...
ISCI
2010
146views more  ISCI 2010»
13 years 2 months ago
Simulatable certificateless two-party authenticated key agreement protocol
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to preve...
Lei Zhang 0009, Futai Zhang, Qianhong Wu, Josep Do...
CRYPTO
2007
Springer
110views Cryptology» more  CRYPTO 2007»
13 years 11 months ago
Cryptography in the Multi-string Model
The common random string model introduced by Blum, Feldman and Micali permits the construction of cryptographic protocols that are provably impossible to realize in the standard m...
Jens Groth, Rafail Ostrovsky
ISPEC
2007
Springer
13 years 11 months ago
An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols
Denial of Service (DoS) attacks are a virulent type of attack on the availability of networks’ intended services and resources. Defense against DoS attacks has been built into th...
Zhen Cao, Zhi Guan, Zhong Chen, Jian-bin Hu, Liyon...