Sciweavers

555 search results - page 29 / 111
» From ABZ to Cryptography
Sort
View
EUROCRYPT
2003
Springer
15 years 5 months ago
Extracting Group Signatures from Traitor Tracing Schemes
Abstract. Digital Signatures emerge naturally from Public-Key Encryption based on trapdoor permutations, and the “duality” of the two primitives was noted as early as Diffie-He...
Aggelos Kiayias, Moti Yung
ARESEC
2011
117views more  ARESEC 2011»
13 years 11 months ago
Non-Parallelizable and Non-Interactive Client Puzzles from Modular Square Roots
—Denial of Service (DoS) attacks aiming to exhaust the resources of a server by overwhelming it with bogus requests have become a serious threat. Especially protocols that rely o...
Yves Igor Jerschow, Martin Mauve
EUROCRYPT
2000
Springer
15 years 3 months ago
Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free
One of the basic problems in cryptography is the generation of a common secret key between two parties, for instance in order to communicate privately. In this paper we consider in...
Ueli M. Maurer, Stefan Wolf
ACST
2006
15 years 1 months ago
Software obfuscation from crackers' viewpoint
Various kinds of software obfuscation methods have been proposed to protect security-sensitive information involved in software implementations. This paper proposes a cracker-cent...
Hiroki Yamauchi, Yuichiro Kanzaki, Akito Monden
WWW
2001
ACM
16 years 14 days ago
XML Key Management Specification (XKMS)
The XML Key Management Specification (XKMS) is described. XKMS is a Web Service that provides an interface between an XML application and a Public Key Infrastructure (PKI). XKMS g...
Phillip M. Hallam-Baker, Warwick Ford