Sciweavers

15 search results - page 2 / 3
» pkc 1999
Sort
View
PKC
1999
Springer
125views Cryptology» more  PKC 1999»
13 years 9 months ago
Anonymous Fingerprinting Based on Committed Oblivious Transfer
Abstract. Thwarting unlawful redistribution of information sold electronically is a major problem of information-based electronic commerce. Anonymous fingerprinting has appeared a...
Josep Domingo-Ferrer
PKC
1999
Springer
87views Cryptology» more  PKC 1999»
13 years 9 months ago
On the Security of RSA Screening
Since many applications require the verification of large sets of signatures, it is sometimes advantageous to perform a simultaneous verification instead of checking each signatu...
Jean-Sébastien Coron, David Naccache
PKC
1999
Springer
142views Cryptology» more  PKC 1999»
13 years 9 months ago
Encrypted Message Authentication by Firewalls
Firewalls typically filter network traffic at several different layers. At application layer, filtering is based on various security relevant information encapsulated into proto...
Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
PKC
1999
Springer
83views Cryptology» more  PKC 1999»
13 years 9 months ago
On the Security of Random Sources
Abstract. Many applications rely on the security of their random number generator. It is therefore essential that such devices be extensively tested for malfunction. The purpose of...
Jean-Sébastien Coron
PKC
1999
Springer
96views Cryptology» more  PKC 1999»
13 years 9 months ago
How to Copyright a Function?
This paper introduces a method for tracking different copies of functionally equivalent algorithms containing identification marks known to the attacker. Unlike all previous solu...
David Naccache, Adi Shamir, Julien P. Stern