Sciweavers

CISC
2006
Springer
95views Cryptology» more  CISC 2006»
13 years 6 months ago
A Revocation Scheme Preserving Privacy
Lukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kut...
CISC
2006
Springer
104views Cryptology» more  CISC 2006»
13 years 8 months ago
Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes
Abstract. A public-key cryptosystem is usually used for key management, in particular to session key management. The paper presents a method for handling a batch of concurrent keys...
Yongdong Wu, Feng Bao
CISC
2006
Springer
103views Cryptology» more  CISC 2006»
13 years 8 months ago
Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme
In this paper, we investigate the problem of increasing the threshold parameter of the Shamir (t, n)-threshold scheme without interacting with the dealer. Our construction will re...
Christophe Tartary, Huaxiong Wang
CISC
2006
Springer
124views Cryptology» more  CISC 2006»
13 years 8 months ago
An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses
Enterprises use security equipments in order to protect their information assets from various attacks such as viruses and hacking. However, such individual equipments hardly provid...
Yoonsun Lim, Myung Kim, Kwang Hee Seo, Ho-Kun Moon...
CISC
2006
Springer
131views Cryptology» more  CISC 2006»
13 years 8 months ago
Efficient Intrusion-Resilient Signatures Without Random Oracles
Intrusion-resilient signatures are key-evolving protocols that extend the concepts of forward-secure and key-insulated signatures. As in the latter schemes, time is divided into di...
Benoît Libert, Jean-Jacques Quisquater, Moti...
CISC
2006
Springer
81views Cryptology» more  CISC 2006»
13 years 8 months ago
Return Address Randomization Scheme for Annuling Data-Injection Buffer Overflow Attacks
Buffer overflow(BOF) has been the most common form of vulnerability in software systems today, and many methods exist to defend software systems against BOF attacks. Among them, th...
Deok Jin Kim, Tae Hyung Kim, Jong Kim, Sung Je Hon...
CISC
2006
Springer
106views Cryptology» more  CISC 2006»
13 years 8 months ago
A General Construction of Tweakable Block Ciphers and Different Modes of Operations
This work builds on earlier work by Rogaway at Asiacrypt 2004 on tweakable block cipher (TBC) and modes of operations. Our first contribution is to generalize Rogaway's TBC co...
Debrup Chakraborty, Palash Sarkar