Sciweavers

2059 search results - page 10 / 412
» A Directed Threshold - Signature Scheme
Sort
View
ADHOC
2007
134views more  ADHOC 2007»
14 years 9 months ago
Threshold password authentication against guessing attacks in Ad hoc networks
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc ne...
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
COCO
2005
Springer
92views Algorithms» more  COCO 2005»
15 years 3 months ago
Monotone Circuits for Weighted Threshold Functions
Weighted threshold functions with positive weights are a natural generalization of unweighted threshold functions. These functions are clearly monotone. However, the naive way of ...
Amos Beimel, Enav Weinreb
ASIACRYPT
2001
Springer
15 years 2 months ago
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks
Abstract. Semantic security against chosen-ciphertext attacks (INDCCA) is widely believed as the correct security level for public-key encryption scheme. On the other hand, it is o...
Pierre-Alain Fouque, David Pointcheval
CRYPTO
2007
Springer
145views Cryptology» more  CRYPTO 2007»
15 years 4 months ago
Chernoff-Type Direct Product Theorems
Consider a challenge-response protocol where the probability of a correct response is at least α for a legitimate user and at most β < α for an attacker. One example is a CAP...
Russell Impagliazzo, Ragesh Jaiswal, Valentine Kab...
JSAC
1998
136views more  JSAC 1998»
14 years 9 months ago
Concatenated Decoding with a Reduced-Search BCJR Algorithm
—We apply two reduced-computation variants of the BCJR algorithm to the decoding of serial and parallel concatenated convolutional codes. One computes its recursions at only M st...
Volker Franz, John B. Anderson