Sciweavers

91 search results - page 8 / 19
» Immunizing Encryption Schemes from Decryption Errors
Sort
View
CRYPTO
2012
Springer
277views Cryptology» more  CRYPTO 2012»
13 years 7 days ago
Multiparty Computation from Somewhat Homomorphic Encryption
We propose a general multiparty computation protocol secure against an active adversary corrupting up to n−1 of the n players. The protocol may be used to compute securely arithm...
Ivan Damgård, Valerio Pastro, Nigel P. Smart...
CRYPTO
2006
Springer
108views Cryptology» more  CRYPTO 2006»
15 years 1 months ago
Inverting HFE Is Quasipolynomial
In the last ten years, multivariate cryptography has emerged as a possible alternative to public key cryptosystems based on hard computational problems from number theory. Notably,...
Louis Granboulan, Antoine Joux, Jacques Stern
FPL
2006
Springer
147views Hardware» more  FPL 2006»
15 years 1 months ago
Secure Content Distribution System Based on Run-Time Partial Hardware Reconfiguration
A secure content distribution system is prototyped based on run-time partial reconfigurability of an FPGA. The system provides a robust content protection scheme for online conten...
Yohei Hori, Hiroyuki Yokoyama, Kenji Toda
ECRA
2007
73views more  ECRA 2007»
14 years 9 months ago
An innovative revocation scheme for one-to-many E-services
E-service providers usually encrypt each E-service message to prevent unauthorized receivers from reading the content and they change the encryption keys periodically for security...
Ren-Hung Lin, Jinn-ke Jan
WWIC
2004
Springer
139views Communications» more  WWIC 2004»
15 years 3 months ago
A Scalable and Adaptive Key Management Protocol for Group Communication
Abstract. Multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet. In order to offer secrecy for multicast applic...
Yacine Challal, Hatem Bettahar, Abdelmadjid Bouabd...