Sciweavers

1769 search results - page 110 / 354
» Cryptography
Sort
View
ACNS
2007
Springer
112views Cryptology» more  ACNS 2007»
15 years 9 months ago
Merkle Signatures with Virtually Unlimited Signature Capacity
We propose GMSS, a new variant of the Merkle signature scheme. GMSS is the first Merkle-type signature scheme that allows a cryptographically unlimited (280 ) number of documents ...
Johannes Buchmann, Erik Dahmen, Elena Klintsevich,...
110
Voted
TCC
2007
Springer
146views Cryptology» more  TCC 2007»
15 years 9 months ago
Conjunctive, Subset, and Range Queries on Encrypted Data
We construct public-key systems that support comparison queries (x ≥ a) on encrypted data as well as more general queries such as subset queries (x ∈ S). These systems support...
Dan Boneh, Brent Waters
EUROCRYPT
2005
Springer
15 years 8 months ago
Partial Key Exposure Attacks on RSA up to Full Size Exponents
We present several attacks on RSA that factor the modulus in polynomial time under the condition that a fraction of the most significant bits or least significant bits of the pri...
Matthias Ernst, Ellen Jochemsz, Alexander May, Ben...
PKC
2005
Springer
93views Cryptology» more  PKC 2005»
15 years 8 months ago
On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods
Abstract. A number of papers on side-channel attacks have been published where the side-channel information was not exploited in an optimal manner, which reduced their efficiency. ...
Werner Schindler
TCC
2005
Springer
94views Cryptology» more  TCC 2005»
15 years 8 months ago
Optimal Error Correction Against Computationally Bounded Noise
For computationally bounded adversarial models of error, we construct appealingly simple, efficient, cryptographic encoding and unique decoding schemes whose error-correction capab...
Silvio Micali, Chris Peikert, Madhu Sudan, David A...