Sciweavers

155
Voted
FODO
1998
Springer
214views Algorithms» more  FODO 1998»
15 years 7 months ago
Querying Composite Objects in Semistructured Data
In this paper, we propose an entity-based style of queries for semistructured data. First, we partition a semistructured data into subgraphs corresponding to real-world entities, ...
Keishi Tajima
89
Voted
EUROCRYPT
2000
Springer
15 years 7 months ago
A Chosen Messages Attack on the ISO/IEC 9796-1 Signature Scheme
François Grieu
115
Voted
EUROCRYPT
2000
Springer
15 years 7 months ago
A NICE Cryptanalysis
We present a chosen-ciphertext attack against both NICE cryptosystems. These two cryptosystems are based on computations in the class group of non-maximal imaginary orders. More pr...
Éliane Jaulmes, Antoine Joux
97
Voted
EUROCRYPT
2000
Springer
15 years 7 months ago
Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures
Stanislaw Jarecki, Anna Lysyanskaya
129
Voted
EUROCRYPT
2000
Springer
15 years 7 months ago
Cryptanalysis of Countermeasures Proposed for Repairing ISO 9796-1
Abstract. ISO 9796-1, published in 1991, was the first standard specifying a digital signature scheme with message recovery. In [4], Coron, Naccache and Stern described an attack o...
Marc Girault, Jean-François Misarsky