Sciweavers

17 search results - page 1 / 4
» acisp 2004
Sort
View
ACISP
2004
Springer
13 years 10 months ago
Fault Attacks on Signature Schemes
Christophe Giraud, Erik Woodward Knudsen
ACISP
2004
Springer
13 years 10 months ago
Symmetric Key Authentication Services Revisited
Bruno Crispo, Bogdan C. Popescu, Andrew S. Tanenba...
ACISP
2004
Springer
13 years 10 months ago
Pseudorandomness of SPN-Type Transformations
Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon C...
ACISP
2010
Springer
13 years 6 months ago
Identity-Based Chameleon Hash Scheme without Key Exposure
In this paper, we propose the first identity-based chameleon hash scheme without key exposure, which gives a positive answer for the open problem introduced by Ateniese and de Mede...
Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo ...
ACISP
2004
Springer
13 years 8 months ago
Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing
Abstract. In this paper we propose an optimistic two-party fair exchange protocol which does not rely on a centralized trusted third party. Instead, the fairness of the protocol re...
Gildas Avoine, Serge Vaudenay