Sciweavers

155 search results - page 17 / 31
» Hash Based Digital Signature Schemes
Sort
View
JOC
2006
116views more  JOC 2006»
15 years 1 months ago
On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order
Abstract. In response to the current need for fast, secure and cheap public-key cryptography, we propose an interactive zero-knowledge identification scheme and a derived signature...
Marc Girault, Guillaume Poupard, Jacques Stern
TCC
2010
Springer
324views Cryptology» more  TCC 2010»
15 years 10 months ago
Leakage-Resilient Signatures
The strongest standard security notion for digital signature schemes is unforgeability under chosen message attacks. In practice, however, this notion can be insufficient due to â€...
Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, G...
ICMCS
1999
IEEE
117views Multimedia» more  ICMCS 1999»
15 years 6 months ago
Fractal Transform Based Large Digital Watermark Embedding and Robust Full Blind Extraction
The aim of this demonstration is to present the ongoing performance of our R. and D. watermarking scheme software. The proposed illustrations cover a large panel of original image...
Jean-Luc Dugelay, S. Roche
ICNP
1998
IEEE
15 years 6 months ago
Digital Signatures for Flows and Multicasts
We present chaining techniques for signing/verifying multiple packets using a single signing/verification operation. We then present flow signing and verification procedures based...
Chung Kei Wong, Simon S. Lam
PAIRING
2010
Springer
155views Cryptology» more  PAIRING 2010»
14 years 11 months ago
Identification of Multiple Invalid Pairing-Based Signatures in Constrained Batches
Abstract. This paper describes a new method in pairing-based signature schemes for identifying the invalid digital signatures in a batch after batch verification has failed. The me...
Brian J. Matt