Sciweavers

1166 search results - page 153 / 234
» Adaptively Secure Broadcast
Sort
View
114
Voted
CODCRY
2009
Springer
111views Cryptology» more  CODCRY 2009»
15 years 7 months ago
On the Impossibility of Strong Encryption Over
We give two impossibility results regarding strong encryption over an infinite enumerable domain. The first one relates to statistically secure one-time encryption. The second on...
Raphael C.-W. Phan, Serge Vaudenay
92
Voted
ICC
2007
IEEE
103views Communications» more  ICC 2007»
15 years 7 months ago
Light-Weight Fair-Dealing Infrastructures (FADIS) for M-Commerce
Abstract— An important issue in mobile commerce (mcommerce) is to exchange digital data between two distributed parties in an efficient and fair manner. In this paper, a lightwe...
Huafei Zhu, Feng Bao
68
Voted
ICMCS
2007
IEEE
134views Multimedia» more  ICMCS 2007»
15 years 7 months ago
Cryptanalysis of a Video Scrambling Based on Space Filling Curves
In this paper, we study the security of an image scrambling algorithm based on Space-Filling Curves (SFC). A random SFC is a pixel permutation that changes the scanning order with...
Ayoub Massoudi, Frédéric Lefè...
IEEEARES
2007
IEEE
15 years 7 months ago
A Trust Overlay Architecture and Protocol for Enhanced Protection against Spam
The effectiveness of current anti-spam systems is limited by the ability of spammers to adapt to new filtering techniques and the lack of incentive for mail domains to filter outg...
Jimmy McGibney, Dmitri Botvich
113
Voted
SYNASC
2007
IEEE
142views Algorithms» more  SYNASC 2007»
15 years 6 months ago
An Extension of the RSA Trapdoor in a KEM/DEM Framework
A trapdoor based on an extension of the RSA trapdoor is proposed. The same function as in the RSA cryptosystem is used, i.e. x modn, but there is no restriction for the exponent t...
Bogdan Groza