Sciweavers

1769 search results - page 130 / 354
» Cryptography
Sort
View
FC
2009
Springer
100views Cryptology» more  FC 2009»
15 years 10 months ago
Relations Among Privacy Notions
This paper presents a hierarchy of privacy notions that covers multiple anonymity and unlinkability variants. The underlying definitions, which are based on the idea of indistingu...
Jens-Matthias Bohli, Andreas Pashalidis
103
Voted
FC
2009
Springer
95views Cryptology» more  FC 2009»
15 years 10 months ago
Secure Multiparty Computation Goes Live
In this note, we report on the first large-scale and practical application of secure multiparty computation, which took place in January 2008. We also report on the novel cryptogr...
Peter Bogetoft, Dan Lund Christensen, Ivan Damg&ar...
135
Voted
FDTC
2009
Springer
191views Cryptology» more  FDTC 2009»
15 years 10 months ago
Protecting RSA against Fault Attacks: The Embedding Method
—Fault attacks constitute a major threat toward cryptographic products supporting RSA-based technologies. Most often, the public exponent is unknown, turning resistance to fault ...
Marc Joye
137
Voted
PAIRING
2009
Springer
117views Cryptology» more  PAIRING 2009»
15 years 10 months ago
Identity Based Group Signatures from Hierarchical Identity-Based Encryption
A number of previous papers explored the notion of identity-based group signature. We present a generic construction of identity-based group signatures. Our construction is based o...
Nigel P. Smart, Bogdan Warinschi
SACRYPT
2009
Springer
176views Cryptology» more  SACRYPT 2009»
15 years 10 months ago
Optimization Strategies for Hardware-Based Cofactorization
Abstract. We use the specific structure of the inputs to the cofactorization step in the general number field sieve (GNFS) in order to optimize the runtime for the cofactorizatio...
Daniel Loebenberger, Jens Putzka