Sciweavers

FC
2003
Springer
133views Cryptology» more  FC 2003»
13 years 9 months ago
Secure Generalized Vickrey Auction Using Homomorphic Encryption
Combinatorial auctions have recently attracted the interest of many researchers due to their promising applications such as the spectrum auctions recently held by the FCC. In a com...
Koutarou Suzuki, Makoto Yokoo
FC
2003
Springer
125views Cryptology» more  FC 2003»
13 years 9 months ago
Economics, Psychology, and Sociology of Security
Security is not an isolated good, but just one component of a complicated economy. That imposes limitations on how effective it can be. The interactions of human society and human...
Andrew M. Odlyzko
FC
2003
Springer
140views Cryptology» more  FC 2003»
13 years 9 months ago
The Case Against Micropayments
Abstract. Micropayments are likely to continue disappointing their advocates. They are an interesting technology. However, there are many non-technological reasons why they will ta...
Andrew M. Odlyzko
FC
2003
Springer
111views Cryptology» more  FC 2003»
13 years 9 months ago
Squealing Euros: Privacy Protection in RFID-Enabled Banknotes
Abstract. Thanks to their broad international acceptance and availability in high denominations, there is widespread concern that Euro banknotes may provide an attractive new curre...
Ari Juels, Ravikanth Pappu
FC
2003
Springer
77views Cryptology» more  FC 2003»
13 years 9 months ago
A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks
We propose a micro-payment scheme for multi-hop cellular networks that encourages collaboration in packet forwarding by letting users benefit from relaying others’ packets. At t...
Markus Jakobsson, Jean-Pierre Hubaux, Levente Butt...
FC
2003
Springer
101views Cryptology» more  FC 2003»
13 years 9 months ago
Fully Private Auctions in a Constant Number of Rounds
Abstract. We present a new cryptographic auction protocol that prevents extraction of bid information despite any collusion of participants. This requirement is stronger than commo...
Felix Brandt
FC
2003
Springer
171views Cryptology» more  FC 2003»
13 years 9 months ago
Fault Based Cryptanalysis of the Advanced Encryption Standard (AES)
Abstract. In this paper we describe several fault attacks on the Advanced Encryption Standard (AES). First, using optical/eddy current fault induction attacks as recently publicly ...
Johannes Blömer, Jean-Pierre Seifert
FC
2003
Springer
104views Cryptology» more  FC 2003»
13 years 9 months ago
On the Economics of Anonymity
Decentralized anonymity infrastructures are still not in wide use today. While there are technical barriers to a secure robust design, our lack of understanding of the incentives t...
Alessandro Acquisti, Roger Dingledine, Paul F. Syv...