Sciweavers

71 search results - page 15 / 15
» Securing Threshold Cryptosystems against Chosen Ciphertext A...
Sort
View
ASIACRYPT
2003
Springer
13 years 10 months ago
The Insecurity of Esign in Practical Implementations
Provable security usually makes the assumption that a source of perfectly random and secret data is available. However, in practical applications, and especially when smart cards a...
Pierre-Alain Fouque, Nick Howgrave-Graham, Gwena&e...