Sciweavers

876 search results - page 44 / 176
» Limits on the Usefulness of Random Oracles
Sort
View
125
Voted
ISCI
2008
160views more  ISCI 2008»
15 years 19 days ago
Certificateless undeniable signature scheme
In this paper, we present the first certificateless undeniable signature scheme. The scheme does not suffer from the key escrow problem, which is inherent in identity based crypto...
Shanshan Duan
EUROCRYPT
2008
Springer
15 years 2 months ago
The Twin Diffie-Hellman Problem and Applications
ded abstract of this paper appears in Advances in Cryptology -- EUROCRYPT '08, Lecture Notes in Computer Science Vol. 4965, N. Smart ed., Springer-Verlag, 2008. This is the fu...
David Cash, Eike Kiltz, Victor Shoup
125
Voted
ASE
2004
148views more  ASE 2004»
15 years 15 days ago
TestEra: Specification-Based Testing of Java Programs Using SAT
TestEra is a framework for automated specification-based testing of Java programs. TestEra requires as input a Java method (in sourcecode or bytecode), a formal specification of th...
Sarfraz Khurshid, Darko Marinov
90
Voted
SRDS
2005
IEEE
15 years 6 months ago
Database Replication Using Generalized Snapshot Isolation
Generalized snapshot isolation extends snapshot isolation as used in Oracle and other databases in a manner suitable for replicated databases. While (conventional) snapshot isolat...
Sameh Elnikety, Willy Zwaenepoel, Fernando Pedone
EUROCRYPT
2004
Springer
15 years 6 months ago
Immunizing Encryption Schemes from Decryption Errors
We provide methods for transforming an encryption scheme susceptible to decryption errors into one that is immune to these errors. Immunity to decryption errors is vital when const...
Cynthia Dwork, Moni Naor, Omer Reingold