Sciweavers

199 search results - page 35 / 40
» A survey of algebraic properties used in cryptographic proto...
Sort
View
114
Voted
ICTAC
2005
Springer
15 years 6 months ago
The Timer Cascade: Functional Modelling and Real Time Calculi
Case studies can significantly contribute towards improving the understanding of formalisms and thereby to their applicability in practice. One such case, namely a cascade of the ...
Raymond T. Boute, Andreas Schäfer
STOC
2006
ACM
120views Algorithms» more  STOC 2006»
16 years 26 days ago
Black-box constructions for secure computation
d abstract) Yuval Ishai Eyal Kushilevitz Yehuda Lindell Erez Petrank It is well known that the secure computation of non-trivial functionalities in the setting of no honest majori...
Yuval Ishai, Eyal Kushilevitz, Yehuda Lindell, Ere...
ASIACRYPT
2009
Springer
15 years 7 months ago
Foundations of Non-malleable Hash and One-Way Functions
Non-malleability is an interesting and useful property which ensures that a cryptographic protocol preserves the independence of the underlying values: given for example an encryp...
Alexandra Boldyreva, David Cash, Marc Fischlin, Bo...
136
Voted
CRYPTO
2011
Springer
232views Cryptology» more  CRYPTO 2011»
14 years 11 days ago
Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups
Structure-preserving signatures are signatures defined over bilinear groups that rely on generic group operations. In particular, the messages and signatures consist of group elem...
Masayuki Abe, Jens Groth, Kristiyan Haralambiev, M...
PKC
2000
Springer
166views Cryptology» more  PKC 2000»
15 years 4 months ago
Design Validations for Discrete Logarithm Based Signature Schemes
A number of signature schemes and standards have been recently designed, based on the Discrete Logarithm problem. In this paper we conduct design validation of such schemes while t...
Ernest F. Brickell, David Pointcheval, Serge Vaude...