Sciweavers

2108 search results - page 26 / 422
» Encrypted
Sort
View
117
Voted
ASIACRYPT
2010
Springer
14 years 10 months ago
A Closer Look at Anonymity and Robustness in Encryption Schemes
Abstract. In this work, we take a closer look at anonymity and robustness in encryption schemes. Roughly speaking, an anonymous encryption scheme hides the identity of the secret-k...
Payman Mohassel
83
Voted
SIGUCCS
1999
ACM
15 years 5 months ago
Who's Got the Key?
This paper attempts to illuminate several fundamental concepts used in the creation of a Public Key Infrastructure (PKI). These concepts include encryption, public key cryptograph...
David Henry
92
Voted
FC
2010
Springer
209views Cryptology» more  FC 2010»
15 years 4 months ago
Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy
We introduce the novel notion of Verifiable Encryption of Chameleon Signatures (VECS), and then use it to design a three-round abuse-free optimistic contract signing protocol. Key...
Xiaofeng Chen, Fangguo Zhang, Haibo Tian, Qianhong...
96
Voted
EUROCRYPT
2007
Springer
15 years 4 months ago
A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security
Motivated by the quest for reducing assumptions in security proofs in cryptography, this paper is concerned with designing efficient symmetric encryption and authentication schemes...
Ueli M. Maurer, Johan Sjödin
ICIP
2006
IEEE
16 years 2 months ago
Selective Encryption of Human Skin in JPEG Images
In this study we propose a new approach for selective encryption in the Huffman coding of the Discrete Cosine Transform (DCT) coefficients using the Advanced Encryption Standard (...
Adrian G. Bors, José M. Rodrigues, William ...