Sciweavers

713 search results - page 79 / 143
» Dispersing Hash Functions
Sort
View
TCC
2012
Springer
226views Cryptology» more  TCC 2012»
13 years 9 months ago
On the Instantiability of Hash-and-Sign RSA Signatures
The hash-and-sign RSA signature is one of the most elegant and well known signatures schemes, extensively used in a wide variety of cryptographic applications. Unfortunately, the o...
Yevgeniy Dodis, Iftach Haitner, Aris Tentes
TOSEM
2002
69views more  TOSEM 2002»
15 years 1 months ago
Mixin layers: an object-oriented implementation technique for refinements and collaboration-based designs
A "refinement" is a functionality addition to a software project that can affect multiple dispersed implementation entities (functions, classes, etc.). In this paper, we...
Yannis Smaragdakis, Don S. Batory
BLISS
2009
IEEE
15 years 2 months ago
Autonomous Physical Secret Functions and Clone-Resistant Identification
Self configuring VLSI technology architectures offer a new environment for creating novel security functions. Two such functions for physical security architectures are proposed t...
Wael Adi
CRYPTO
2007
Springer
134views Cryptology» more  CRYPTO 2007»
15 years 7 months ago
Domain Extension of Public Random Functions: Beyond the Birthday Barrier
A public random function is a random function that is accessible by all parties, including the adversary. For example, a (public) random oracle is a public random function {0, 1}â...
Ueli M. Maurer, Stefano Tessaro
ANCS
2010
ACM
14 years 11 months ago
A new TCB cache to efficiently manage TCP sessions for web servers
TCP/IP, the most commonly used network protocol, consumes a significant portion of time in Internet servers. While a wide spectrum of studies has been done to reduce its processin...
Guangdeng Liao, Laxmi N. Bhuyan, Wei Wu, Heeyeol Y...