Sciweavers

341 search results - page 41 / 69
» Deniable Functional Encryption
Sort
View
FC
2004
Springer
112views Cryptology» more  FC 2004»
15 years 4 months ago
The Vector-Ballot e-Voting Approach
Looking at current cryptographic-based e-voting protocols, one can distinguish three basic design paradigms (or approaches): (a) Mix-Networks based, (b) Homomorphic Encryption base...
Aggelos Kiayias, Moti Yung
FSE
2003
Springer
134views Cryptology» more  FSE 2003»
15 years 4 months ago
A New Class of Collision Attacks and Its Application to DES
Until now in cryptography the term collision was mainly associated with the surjective mapping of different inputs to an equal output of a hash function. Previous collision attack...
Kai Schramm, Thomas J. Wollinger, Christof Paar
CORR
2000
Springer
83views Education» more  CORR 2000»
14 years 10 months ago
Agents of Choice: Tools that Facilitate Notice and Choice about Web Site Data Practices
A variety of tools have been introduced recently that are designed to help people protect their privacy on the Internet. These tools perform many different functions including enc...
Lorrie Faith Cranor
CSFW
2007
IEEE
15 years 5 months ago
A Formal Theory of Key Conjuring
Key conjuring is the process by which an attacker obtains an unknown, encrypted key by repeatedly calling a cryptographic API function with random values in place of keys. We prop...
Véronique Cortier, Stéphanie Delaune...
ISM
2006
IEEE
114views Multimedia» more  ISM 2006»
15 years 4 months ago
Mobile DRM-Enabled Multimedia Platform for Peer-to-Peer Applications
A mobile Digital Rights Management platform is proposed that follows the DRM reference architecture while including several important functions lacking in the OMA DRM. The platfor...
Mikko Löytynoja, Timo Koskela, Marko Brockman...