Sciweavers

1825 search results - page 70 / 365
» Cryptographic Securities Exchanges
Sort
View
139
Voted
TCC
2007
Springer
125views Cryptology» more  TCC 2007»
15 years 9 months ago
Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions
Abstract. We show a new protocol for blind signatures in which security is preserved even under arbitrarily-many concurrent executions. The protocol can be based on standard crypto...
Carmit Hazay, Jonathan Katz, Chiu-Yuen Koo, Yehuda...
AFRICACRYPT
2008
Springer
15 years 10 months ago
A Brief History of Provably-Secure Public-Key Encryption
Public-key encryption schemes are a useful and interesting field of cryptographic study. The ultimate goal for the cryptographer in the field of public-key encryption would be th...
Alexander W. Dent
152
Voted
ASIACRYPT
2000
Springer
15 years 8 months ago
Password-Authenticated Key Exchange Based on RSA
Abstract. There have been many proposals in recent years for passwordauthenticated key exchange protocols. Many of these have been shown to be insecure, and the only ones that seem...
Philip D. MacKenzie, Sarvar Patel, Ram Swaminathan
165
Voted
ICISC
2000
126views Cryptology» more  ICISC 2000»
15 years 4 months ago
Cryptographic Applications of Sparse Polynomials over Finite Rings
Abstract. This paper gives new examples that exploit the idea of using sparse polynomials with restricted coefficients over a finite ring for designing fast, reliable cryptosystems...
William D. Banks, Daniel Lieman, Igor Shparlinski,...
125
Voted
FOSAD
2004
Springer
15 years 9 months ago
A Tutorial on Physical Security and Side-Channel Attacks
Abstract. A recent branch of cryptography focuses on the physical constraints that a real-life cryptographic device must face, and attempts to exploit these constraints (running ti...
François Koeune, François-Xavier Sta...