Sciweavers

1825 search results - page 117 / 365
» Cryptographic Securities Exchanges
Sort
View
107
Voted
FC
2009
Springer
95views Cryptology» more  FC 2009»
15 years 10 months ago
Secure Multiparty Computation Goes Live
In this note, we report on the first large-scale and practical application of secure multiparty computation, which took place in January 2008. We also report on the novel cryptogr...
Peter Bogetoft, Dan Lund Christensen, Ivan Damg&ar...
125
Voted
JCST
2008
128views more  JCST 2008»
15 years 3 months ago
t-Private and t-Secure Auctions
In most of the used auction systems the values of bids are known to the auctioneer. This allows him to manipulate the outcome of the auction. Hence, one is interested in hiding th...
Markus Hinkelmann, Andreas Jakoby, Peer Stechert
JCP
2010
100views more  JCP 2010»
15 years 2 months ago
Provable Secure Generalized Signcryption
Generalized signcryption which proposed by Han is a new cryptographic primitive which can work as an encryption scheme, a signature scheme or a signcryption scheme [5]. However,the...
Xu An Wang, Xiaoyuan Yang, Jindan Zhang
138
Voted
EUROCRYPT
2001
Springer
15 years 8 months ago
How Secure Are Elliptic Curves over Composite Extension Fields?
We compare the method of Weil descent for solving the ECDLP, over extensions fields of composite degree in characteristic two, against the standard method of parallelised Pollard ...
Nigel P. Smart
128
Voted
ASIACRYPT
2000
Springer
15 years 8 months ago
Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders
Abstract. In this work we investigate the difficulty of the discrete logarithm problem in class groups of imaginary quadratic orders. In particular, we discuss several strategies t...
Safuat Hamdy, Bodo Möller