Sciweavers

2967 search results - page 559 / 594
» Cryptology
Sort
View
FC
2003
Springer
101views Cryptology» more  FC 2003»
15 years 2 months ago
Fully Private Auctions in a Constant Number of Rounds
Abstract. We present a new cryptographic auction protocol that prevents extraction of bid information despite any collusion of participants. This requirement is stronger than commo...
Felix Brandt
FC
2003
Springer
111views Cryptology» more  FC 2003»
15 years 2 months ago
Squealing Euros: Privacy Protection in RFID-Enabled Banknotes
Abstract. Thanks to their broad international acceptance and availability in high denominations, there is widespread concern that Euro banknotes may provide an attractive new curre...
Ari Juels, Ravikanth Pappu
FSE
2003
Springer
134views Cryptology» more  FSE 2003»
15 years 2 months ago
A New Class of Collision Attacks and Its Application to DES
Until now in cryptography the term collision was mainly associated with the surjective mapping of different inputs to an equal output of a hash function. Previous collision attack...
Kai Schramm, Thomas J. Wollinger, Christof Paar
INDOCRYPT
2003
Springer
15 years 2 months ago
Improved Cost Function in the Design of Boolean Functions Satisfying Multiple Criteria
We develop an improved cost function to be used in simulated annealing followed by hill-climbing to find Boolean functions satisfying multiple desirable criteria such as high nonli...
Selçuk Kavut, Melek D. Yücel
INDOCRYPT
2003
Springer
15 years 2 months ago
On Multiplicative Linear Secret Sharing Schemes
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC), based on the underlying linear secret sharing scheme. Our goal is to study the ...
Ventzislav Nikov, Svetla Nikova, Bart Preneel