Sciweavers

2967 search results - page 447 / 594
» Cryptology
Sort
View
FC
2004
Springer
120views Cryptology» more  FC 2004»
15 years 10 months ago
Identity-Based Chameleon Hash and Applications
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chamel...
Giuseppe Ateniese, Breno de Medeiros
FC
2004
Springer
78views Cryptology» more  FC 2004»
15 years 10 months ago
Secure Interaction Design
Abstract. The security of any computer system that is configured or operated by human beings critically depends on the information conveyed by the user interface, the decisions of...
Ka-Ping Yee
FC
2004
Springer
80views Cryptology» more  FC 2004»
15 years 10 months ago
Practical Anonymity for the Masses with MorphMix
MorphMix is a peer-to-peer circuit-based mix network to provide practical anonymous low-latency Internet access for millions of users. The basic ideas of MorphMix have been publish...
Marc Rennhard, Bernhard Plattner
FC
2004
Springer
75views Cryptology» more  FC 2004»
15 years 10 months ago
Peppercoin Micropayments
Abstract. We present the “Peppercoin” method for processing micropayments efficiently. With this method, a fraction of the micropayments received are determined, via a procedur...
Ronald L. Rivest
FSE
2004
Springer
84views Cryptology» more  FSE 2004»
15 years 10 months ago
Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines
We present a realization of an LFSM that utilizes an LFSR. This is based on a well-known fact from linear algebra. This structure is used to show that a previous attempt at using a...
Jin Hong, Dong Hoon Lee 0002, Seongtaek Chee, Pala...