Sciweavers

50 search results - page 10 / 10
» New Partial Key Exposure Attacks on RSA
Sort
View
NDSS
2003
IEEE
13 years 10 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two partiesā€”the client and the serverā...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
PKC
2004
Springer
106views Cryptology» more  PKC 2004»
13 years 10 months ago
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
In a practical system, a message is often encrypted more than once by diļ¬€erent encryptions, here called multiple encryption, to enhance its security. Additionally, new features ...
Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, H...
MMSEC
2005
ACM
114views Multimedia» more  MMSEC 2005»
13 years 11 months ago
Watermarking of MPEG-2 video in compressed domain using VLC mapping
In this work we propose a new algorithm for fragile, high capacity yet file-size preserving watermarking of MPEG-2 streams. Watermarking is done entirely in the compressed domain,...
Bijan G. Mobasseri, Michael P. Marcinak
EUROCRYPT
2008
Springer
13 years 7 months ago
Isolated Proofs of Knowledge and Isolated Zero Knowledge
We introduce a new notion called -isolated proofs of knowledge ( -IPoK). These are proofs of knowledge where a cheating prover is allowed to exchange up to bits of communication wi...
Ivan Damgård, Jesper Buus Nielsen, Daniel Wi...
AI
2007
Springer
13 years 5 months ago
On the merging of Dung's argumentation systems
In this paper, the problem of deriving sensible information from a collection of argumentation systems coming from diļ¬€erent agents is addressed. The underlying argumentation the...
Sylvie Coste-Marquis, Caroline Devred, Séba...