Sciweavers

12 search results - page 1 / 3
» indocrypt 2004
Sort
View
INDOCRYPT
2004
Springer
13 years 10 months ago
Results on Algebraic Immunity for Cryptographically Significant Boolean Functions
Deepak Kumar Dalai, Kishan Chand Gupta, Subhamoy M...
INDOCRYPT
2004
Springer
13 years 10 months ago
On the Security of a Certified E-Mail Scheme
Certified e-mail is a value-added service for standard e-mail systems, in which the intended recipient gets the mail content if and only if the mail originator receives a non-repud...
Guilin Wang, Feng Bao, Jianying Zhou
INDOCRYPT
2004
Springer
13 years 10 months ago
Revisiting Fully Distributed Proxy Signature Schemes
In a proxy signature scheme, a potential signer delegates his capabilities to a proxy signer, who can sign documents on behalf of him. The recipient of the signature verifies both...
Javier Herranz, Germán Sáez
INDOCRYPT
2004
Springer
13 years 10 months ago
Information Theory and the Security of Binary Data Perturbation
Random data perturbation (RDP) has been in use for several years in statistical databases and public surveys as a means of providing privacy to individuals while collecting informa...
Poorvi L. Vora
INDOCRYPT
2004
Springer
13 years 10 months ago
Tripartite Key Exchange in the Canetti-Krawczyk Proof Model
A definition of secure multi-party key exchange in the Canetti-Krawczyk proof model is proposed, followed by a proof of the security of the Joux tripartite key agreement protocol...
Yvonne Hitchcock, Colin Boyd, Juan Manuel Gonz&aac...