Sciweavers

248 search results - page 23 / 50
» Fault Attacks on Signature Schemes
Sort
View
FDTC
2007
Springer
105views Cryptology» more  FDTC 2007»
15 years 6 months ago
Tate Pairing with Strong Fault Resiliency
We present a novel non-linear error coding framework which incorporates strong adversarial fault detection capabilities into identity based encryption schemes built using Tate pai...
Erdinç Öztürk, Gunnar Gaubatz, Be...
INFORMATICALT
2007
100views more  INFORMATICALT 2007»
14 years 11 months ago
On the Proxy-Protected Property of Chen et al.'s Proxy Multisignature Schemes
Recently, Chen, Chung, and Huang proposed a traceable proxy multisignature scheme based on the elliptic curve cryptosystem. However, this paper shows that the original signers can ...
Pei-Hui Huang, Hsiang-An Wen, Chih-Hung Wang, Tzon...
PKC
1999
Springer
87views Cryptology» more  PKC 1999»
15 years 4 months ago
On the Security of RSA Screening
Since many applications require the verification of large sets of signatures, it is sometimes advantageous to perform a simultaneous verification instead of checking each signatu...
Jean-Sébastien Coron, David Naccache
EUROCRYPT
2000
Springer
15 years 3 months ago
Cryptanalysis of Countermeasures Proposed for Repairing ISO 9796-1
Abstract. ISO 9796-1, published in 1991, was the first standard specifying a digital signature scheme with message recovery. In [4], Coron, Naccache and Stern described an attack o...
Marc Girault, Jean-François Misarsky
JPDC
2006
87views more  JPDC 2006»
14 years 11 months ago
Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks
Any packet destined to a honeypot machine (that is, a decoy server machine) is most probably an attack packet. We propose honeypot back-propagation, a scheme that traces attack pa...
Sherif M. Khattab, Rami G. Melhem, Daniel Moss&eac...