Sciweavers

319 search results - page 19 / 64
» Cryptographic Assumptions: A Position Paper
Sort
View
AINA
2006
IEEE
15 years 3 months ago
Dual RSA Accumulators and Its Application for Private Revocation Check
This paper points out the privacy issue in the OCSP (Online Certificate Status Protocol), namely, the OCSP responder learns confidential information – who sends a message to w...
Hiroaki Kikuchi
IJACT
2008
101views more  IJACT 2008»
14 years 9 months ago
Practical key-recovery attack against APOP, an MD5-based challenge-response authentication
Abstract: Hash functions are used in many cryptographic constructions under various assumptions, and the practical impact of collision attacks is often unclear. In this paper, we s...
Gaëtan Leurent
IJNSEC
2011
143views more  IJNSEC 2011»
14 years 4 months ago
Probable Security Proof of A Blind Signature Scheme over Braid Groups
In this paper, we reinvestigate the security analysis of blind signature scheme over braid groups proposed by Verma in 2008. A blind signature scheme is a cryptographic primitive ...
Girraj Kumar Verma
TCC
2012
Springer
226views Cryptology» more  TCC 2012»
13 years 5 months ago
On the Instantiability of Hash-and-Sign RSA Signatures
The hash-and-sign RSA signature is one of the most elegant and well known signatures schemes, extensively used in a wide variety of cryptographic applications. Unfortunately, the o...
Yevgeniy Dodis, Iftach Haitner, Aris Tentes
CORR
2011
Springer
158views Education» more  CORR 2011»
14 years 4 months ago
Nonuniform Coverage Control on the Line
Abstract— This paper investigates control laws allowing mobile, autonomous agents to optimally position themselves on the line for distributed sensing in a nonuniform field. We ...
Naomi Ehrich Leonard, Alexander Olshevsky