Sciweavers

248 search results - page 21 / 50
» Fault Attacks on Signature Schemes
Sort
View
WAIFI
2007
Springer
110views Mathematics» more  WAIFI 2007»
15 years 6 months ago
On Kabatianskii-Krouk-Smeets Signatures
Kabastianskii, Krouk and Smeets proposed in 1997 a digital signature scheme based on random error-correcting codes. In this paper we investigate the security and the efficiency of ...
Pierre-Louis Cayrel, Ayoub Otmani, Damien Vergnaud
ICDAR
2009
IEEE
15 years 6 months ago
Toward Resisting Forgery Attacks via Pseudo-Signatures
Recent work has shown that certain handwriting biometrics are susceptible to forgery attacks, both human- and machine-based. In this paper, we examine a new scheme for using handw...
Jin Chen, Daniel P. Lopresti, Fabian Monrose
CCS
2006
ACM
15 years 3 months ago
Ring signatures without random oracles
Since the formalization of ring signature by Rivest, Shamir and Tauman in 2001, there are lots of variations appeared in the literature. Almost all of the variations rely on the ra...
Sherman S. M. Chow, Victor K.-W. Wei, Joseph K. Li...
ICCAD
2007
IEEE
110views Hardware» more  ICCAD 2007»
15 years 8 months ago
A hybrid scheme for compacting test responses with unknown values
This paper presents a hybrid compaction scheme for test responses containing unknown values, which consists of a space compactor and an unknown-blocking Multiple Input Signature R...
Mango Chia-Tso Chao, Kwang-Ting Cheng, Seongmoon W...
IJNSEC
2006
113views more  IJNSEC 2006»
14 years 11 months ago
An Identity-based Mediated Signature Scheme from Bilinear Pairing
It has always been a critical issue to find efficient methods for fast revocation of a user's identity in identity (ID)based cryptosystems. Unfortunately, none of the previou...
Xiangguo Cheng, Lifeng Guo, Xinmei Wang