Sciweavers

136 search results - page 28 / 28
» Threshold Cryptosystems Secure against Chosen-Ciphertext Att...
Sort
View
ASIACRYPT
2003
Springer
13 years 10 months ago
The Insecurity of Esign in Practical Implementations
Provable security usually makes the assumption that a source of perfectly random and secret data is available. However, in practical applications, and especially when smart cards a...
Pierre-Alain Fouque, Nick Howgrave-Graham, Gwena&e...