Sciweavers

1825 search results - page 272 / 365
» Cryptographic Securities Exchanges
Sort
View
FC
2004
Springer
75views Cryptology» more  FC 2004»
15 years 5 months ago
Peppercoin Micropayments
Abstract. We present the “Peppercoin” method for processing micropayments efficiently. With this method, a fraction of the micropayments received are determined, via a procedur...
Ronald L. Rivest
IFIP
2004
Springer
15 years 5 months ago
Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards
This paper focuses on the usability of the PINPAS tool. The PINPAS tool is an instruction-level interpreter for smartcard assembler languages, augmented with facilities to study si...
Jerry den Hartog, Erik P. de Vink
PKC
2004
Springer
95views Cryptology» more  PKC 2004»
15 years 5 months ago
A Nonuniform Algorithm for the Hidden Number Problem in Subgroups
Boneh and Venkatesan have proposed a polynomial time algorithm in a non-uniform model for recovering a ”hidden” element α ∈ IFp, where p is prime, from very short strings of...
Igor Shparlinski, Arne Winterhof
TCC
2004
Springer
101views Cryptology» more  TCC 2004»
15 years 5 months ago
Implementing Oblivious Transfer Using Collection of Dense Trapdoor Permutations
Abstract. Until recently, the existence of collection of trapdoor permutations (TDP) was believed (and claimed) to imply almost all of the major cryptographic primitives, including...
Iftach Haitner
DEXAW
2003
IEEE
122views Database» more  DEXAW 2003»
15 years 5 months ago
Fairness in Wallets with Observer
We examine the interference of fairness and observers in digital coin systems. Since copying of coins cannot be prevented cryptographically in anonymous off-line coin systems, dou...
Heike Neumann, Thomas Schwarzpaul