Sciweavers

Share
7 search results - page 1 / 2
» cisc 2008
Sort
View
CISC
2008
Springer
100views Cryptology» more  CISC 2008»
8 years 5 months ago
Security Analysis of Multivariate Polynomials for Hashing
Luk Bettale, Jean-Charles Faugère, Ludovic ...
CISC
2008
Springer
94views Cryptology» more  CISC 2008»
8 years 5 months ago
Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs
Debra L. Cook, Moti Yung, Angelos D. Keromytis
CISC
2008
Springer
117views Cryptology» more  CISC 2008»
8 years 5 months ago
Strong Anonymous Signatures
The notion of anonymous signatures has recently been formalized by [18], which captures an interesting property that a digital signature can sometimes hide the identity of the sign...
Rui Zhang 0002, Hideki Imai
CISC
2008
Springer
118views Cryptology» more  CISC 2008»
8 years 5 months ago
Inter-domain Identity-Based Proxy Re-encryption
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). So far, research efforts hav...
Qiang Tang, Pieter H. Hartel, Willem Jonker
CISC
2008
Springer
148views Cryptology» more  CISC 2008»
8 years 5 months ago
Publicly Verifiable Privacy-Preserving Group Decryption
Anonymity is one of the main concerns in group-oriented cryptography. However, most efforts, for instance, group signatures and ring signatures, are only made to provide anonymity ...
Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu
books