Sciweavers

52 search results - page 3 / 11
» On the Analysis of Cryptographic Assumptions in the Generic ...
Sort
View
CRYPTO
2009
Springer
150views Cryptology» more  CRYPTO 2009»
14 years 10 days ago
Short and Stateless Signatures from the RSA Assumption
We present the first signature scheme which is “short”, stateless and secure under the RSA assumption in the standard model. Prior short, standard model signatures in the RSA...
Susan Hohenberger, Brent Waters
TCC
2012
Springer
226views Cryptology» more  TCC 2012»
12 years 1 months ago
On the Instantiability of Hash-and-Sign RSA Signatures
The hash-and-sign RSA signature is one of the most elegant and well known signatures schemes, extensively used in a wide variety of cryptographic applications. Unfortunately, the o...
Yevgeniy Dodis, Iftach Haitner, Aris Tentes
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
14 years 10 days ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev
FOSAD
2009
Springer
14 years 9 days ago
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols
We introduce the Open-source Fixed-point Model Checker OFMC for symbolic security protocol analysis, which extends the Onthe-fly Model Checker (the previous OFMC). The native inpu...
Sebastian Mödersheim, Luca Viganò
DATE
2000
IEEE
111views Hardware» more  DATE 2000»
13 years 10 months ago
Static Timing Analysis Taking Crosstalk into Account
Capacitance coupling can have a significant impact on gate delay in today's deep submicron circuits. In this paper we present a static timing analysis tool that calculates th...
Matthias Ringe, Thomas Lindenkreuz, Erich Barke