Sciweavers

1769 search results - page 139 / 354
» Cryptography
Sort
View
117
Voted
HIP
2005
Springer
168views Cryptology» more  HIP 2005»
15 years 9 months ago
Leveraging the CAPTCHA Problem
Efforts to defend against automated attacks on e-commerce services have led to a new security protocol known as a CAPTCHA, a challenge designed to exploit gaps in the perceptual a...
Daniel P. Lopresti
136
Voted
TCC
2005
Springer
141views Cryptology» more  TCC 2005»
15 years 9 months ago
Public-Key Steganography with Active Attacks
A complexity-theoretic model for public-key steganography with active attacks is introduced. The notion of steganographic security against adaptive chosen-covertext attacks (SS-CC...
Michael Backes, Christian Cachin
119
Voted
WCC
2005
Springer
117views Cryptology» more  WCC 2005»
15 years 9 months ago
Interpolation of Functions Related to the Integer Factoring Problem
The security of the RSA public key cryptosystem depends on the intractability of the integer factoring problem. This paper shall give some theoretical support to the assumption of ...
Clemens Adelmann, Arne Winterhof
119
Voted
WCC
2005
Springer
135views Cryptology» more  WCC 2005»
15 years 9 months ago
Open Problems Related to Algebraic Attacks on Stream Ciphers
Abstract. The recently developed algebraic attacks apply to all keystream generators whose internal state is updated by a linear transition function, including LFSR-based generator...
Anne Canteaut
ACNS
2004
Springer
104views Cryptology» more  ACNS 2004»
15 years 8 months ago
Key Agreement Using Statically Keyed Authenticators
A family of authenticators based on static shared keys is identified and proven secure. The authenticators can be used in a variety of settings, including identity-based ones. App...
Colin Boyd, Wenbo Mao, Kenneth G. Paterson