Sciweavers

5387 search results - page 82 / 1078
» Generating generic functions
Sort
View
90
Voted
CRYPTO
2005
Springer
163views Cryptology» more  CRYPTO 2005»
15 years 6 months ago
On the Generic Insecurity of the Full Domain Hash
The Full-Domain Hash (FDH) signature scheme [3] forms one the most basic usages of random oracles. It works with a family F of trapdoor permutations (TDP), where the signature of m...
Yevgeniy Dodis, Roberto Oliveira, Krzysztof Pietrz...
114
Voted
BMCBI
2010
89views more  BMCBI 2010»
15 years 24 days ago
Predictors of natively unfolded proteins: unanimous consensus score to detect a twilight zone between order and disorder in gene
Background: Natively unfolded proteins lack a well defined three dimensional structure but have important biological functions, suggesting a re-assignment of the structure-functio...
Antonio Deiana, Andrea Giansanti
124
Voted
PKC
2012
Springer
235views Cryptology» more  PKC 2012»
13 years 3 months ago
Improved Security for Linearly Homomorphic Signatures: A Generic Framework
ded abstract of this work will appear in Public Key Cryptography — PKC 2012. This is the full version. We propose a general framework that converts (ordinary) signature schemes ...
David Mandell Freeman
ASIACRYPT
2006
Springer
15 years 4 months ago
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding
Understanding what construction strategy has a chance to be a good hash function is extremely important nowadays. In TCC'04, Maurer et al. [13] introduced the notion of indiff...
Donghoon Chang, Sangjin Lee, Mridul Nandi, Moti Yu...
ICFP
2012
ACM
13 years 3 months ago
Functional programming with structured graphs
This paper presents a new functional programming model for graph structures called structured graphs. Structured graphs extend conventional algebraic datatypes with explicit defi...
Bruno C. d. S. Oliveira, William R. Cook