Sciweavers

4340 search results - page 94 / 868
» Formal Methods and Cryptography
Sort
View
141
Voted
GMP
2003
IEEE
247views Solid Modeling» more  GMP 2003»
15 years 9 months ago
Message Recovery Signature Scheme Using Complementary Elliptic Curves
Elliptic curve cryptography is known for its complexity due to its discrete logarithm problem, and this gives advantage to the system used since the formula developed using this c...
Teo Chun Yew, Hailiza Kamarulhaili, Putra Sumari
139
Voted
AI
2008
Springer
15 years 10 months ago
Finding Topics in Email Using Formal Concept Analysis and Fuzzy Membership Functions
In this paper, we present a method to identify topics in email messages. The formal concept analysis is adopted as a semantic analysis method to group emails containing the same ke...
Liqiang Geng, Larry Korba, Yunli Wang, Xin Wang, Y...
ISOLA
2007
Springer
15 years 10 months ago
Proved Development of the Real-Time Properties of the IEEE 1394 Root Contention Protocol with the Event B Method
We present a model of the IEEE 1394 Root Contention Protocol with a proof of Safety. This model has real-time properties which are expressed in the language of the event B method: ...
Joris Rehm, Dominique Cansell
158
Voted
TCC
2005
Springer
176views Cryptology» more  TCC 2005»
15 years 9 months ago
How to Securely Outsource Cryptographic Computations
We address the problem of using untrusted (potentially malicious) cryptographic helpers. We provide a formal security definition for securely outsourcing computations from a comp...
Susan Hohenberger, Anna Lysyanskaya
ASIACRYPT
2008
Springer
15 years 5 months ago
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems
Abstract. The generic (aka. black-box) group model is a valuable methodology for analyzing the computational hardness of number-theoretic problems used in cryptography. Since the p...
Andy Rupp, Gregor Leander, Endre Bangerter, Alexan...