Sciweavers

20 search results - page 2 / 4
» The Return of the Cryptographic Boomerang
Sort
View
COCO
2007
Springer
111views Algorithms» more  COCO 2007»
13 years 8 months ago
Efficient Arguments without Short PCPs
Current constructions of efficient argument systems combine a short (polynomial size) PCP with a cryptographic hashing technique. We suggest an alternative approach for this probl...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky
FC
2005
Springer
134views Cryptology» more  FC 2005»
13 years 10 months ago
Analysis of a Multi-party Fair Exchange Protocol and Formal Proof of Correctness in the Strand Space Model
Abstract. A multi-party fair exchange protocol is a cryptographic protocol allowing several parties to exchange commodities in such a way that everyone gives an item away if and on...
Aybek Mukhamedov, Steve Kremer, Eike Ritter
SP
2009
IEEE
13 years 11 months ago
The Mastermind Attack on Genomic Data
In this paper, we study the degree to which a genomic string, Q, leaks details about itself any time it engages in comparison protocols with a genomic querier, Bob, even if those ...
Michael T. Goodrich
GCC
2004
Springer
13 years 9 months ago
Distributed MD4 Password Hashing with Grid Computing Package BOINC
Distributed computing on heterogeneous nodes, or grid computing, provides a substantial increase in computational power available for many applications. This paper reports our expe...
Stephen Pellicer, Yi Pan, Minyi Guo
ICDCS
2010
IEEE
13 years 1 months ago
Secure Ranked Keyword Search over Encrypted Cloud Data
As Cloud Computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. For the protection of data privacy, sensitive data has to be encrypte...
Cong Wang, Ning Cao, Jin Li, Kui Ren, Wenjing Lou