Sciweavers

134 search results - page 3 / 27
» ccs 2004
Sort
View
CCS
2004
ACM
13 years 10 months ago
New client puzzle outsourcing techniques for DoS resistance
Brent Waters, Ari Juels, J. Alex Halderman, Edward...
CCS
2004
ACM
13 years 10 months ago
Cryptanalysis of a provably secure CRT-RSA algorithm
We study a countermeasure proposed to protect Chinese remainder theorem (CRT) computations for RSA against fault attacks. The scheme was claimed to be provably secure. However, we...
David Wagner
CCS
2004
ACM
13 years 10 months ago
Reusable cryptographic fuzzy extractors
We show that a number of recent definitions and constructions of fuzzy extractors are not adequate for multiple uses of the same fuzzy secret—a major shortcoming in the case of...
Xavier Boyen
CCS
2004
ACM
13 years 10 months ago
Pong-cache poisoning in GUESS
This paper studies the problem of resource discovery in unstructured peer-to-peer (P2P) systems. We propose simple policies that make the discovery of resources resilient to coord...
Neil Daswani, Hector Garcia-Molina
CCS
2004
ACM
13 years 9 months ago
Group signatures with verifier-local revocation
Group signatures have recently become important for enabling privacy-preserving attestation in projects such as Microsoft's ngscb effort (formerly Palladium). Revocation is c...
Dan Boneh, Hovav Shacham