Sciweavers

319 search results - page 17 / 64
» Cryptographic Assumptions: A Position Paper
Sort
View
66
Voted
MOC
2002
104views more  MOC 2002»
15 years 9 days ago
Numerical calculation of the density of prime numbers with a given least primitive root
In this paper the densities D(i) of prime numbers p having the least primitive root g(p) = i, where i is equal to one of the initial positive integers less than 32, have been numer...
A. Paszkiewicz, Andrzej Schinzel
93
Voted
TCC
2009
Springer
117views Cryptology» more  TCC 2009»
16 years 1 months ago
Towards a Theory of Extractable Functions
Extractable functions are functions where any adversary that outputs a point in the range of the function is guaranteed to "know" a corresponding preimage. Here, knowledg...
Ran Canetti, Ronny Ramzi Dakdouk
IACR
2011
125views more  IACR 2011»
14 years 9 days ago
On Constructing Homomorphic Encryption Schemes from Coding Theory
Abstract. Homomorphic encryption schemes are powerful cryptographic primitives that allow for a variety of applications. Consequently, a variety of proposals have been made in the ...
Frederik Armknecht, Daniel Augot, Ludovic Perret, ...
134
Voted
CRYPTO
2011
Springer
180views Cryptology» more  CRYPTO 2011»
14 years 14 days ago
Leakage-Resilient Zero Knowledge
In this paper, we initiate a study of zero knowledge proof systems in the presence of sidechannel attacks. Specifically, we consider a setting where a cheating verifier is allow...
Sanjam Garg, Abhishek Jain 0002, Amit Sahai
88
Voted
USS
2008
15 years 3 months ago
The Practical Subtleties of Biometric Key Generation
The inability of humans to generate and remember strong secrets makes it difficult for people to manage cryptographic keys. To address this problem, numerous proposals have been s...
Lucas Ballard, Seny Kamara, Michael K. Reiter