Sciweavers

2108 search results - page 22 / 422
» Encrypted
Sort
View
162
Voted
ICICS
2010
Springer
14 years 10 months ago
Manger's Attack Revisited
In this work we examine a number of different open source implementations of the RSA Optimal Asymmetric Encryption Padding (OAEP) and generally RSA with respect to the message-aime...
Falko Strenzke
CRYPTO
2010
Springer
170views Cryptology» more  CRYPTO 2010»
14 years 9 months ago
Securing Computation against Continuous Leakage
We present a general method to compile any cryptographic algorithm into one which resists side channel attacks of the only computation leaks information variety for an unbounded nu...
Shafi Goldwasser, Guy N. Rothblum
90
Voted
TCC
2009
Springer
114views Cryptology» more  TCC 2009»
16 years 1 months ago
Predicate Privacy in Encryption Systems
Predicate encryption is a new encryption paradigm which gives a master secret key owner fine-grained control over access to encrypted data. The master secret key owner can generat...
Emily Shen, Elaine Shi, Brent Waters
112
Voted
PAIRING
2009
Springer
117views Cryptology» more  PAIRING 2009»
15 years 7 months ago
Identity Based Group Signatures from Hierarchical Identity-Based Encryption
A number of previous papers explored the notion of identity-based group signature. We present a generic construction of identity-based group signatures. Our construction is based o...
Nigel P. Smart, Bogdan Warinschi
96
Voted
PAIRING
2007
Springer
134views Cryptology» more  PAIRING 2007»
15 years 6 months ago
Proxy Re-encryption Systems for Identity-Based Encryption
A proxy re-encryption system allows the proxy to transform ciphertexts encrypted under Alice’s public key into the different ciphertexts that can be decrypted by Bob’s secret ...
Toshihiko Matsuo