Sciweavers

132 search results - page 24 / 27
» On Public Key Encryption from Noisy Codewords
Sort
View
JOC
2007
129views more  JOC 2007»
14 years 11 months ago
Formal Proofs for the Security of Signcryption
Signcryption is a public key or asymmetric cryptographic method that provides simultaneously both message confidentiality and unforgeability at a lower computational and communica...
Joonsang Baek, Ron Steinfeld, Yuliang Zheng
97
Voted
IACR
2011
94views more  IACR 2011»
13 years 10 months ago
Practical Key-recovery For All Possible Parameters of SFLASH
In this paper we present a new practical key-recovery attack on the SFLASH signature scheme. SFLASH is a derivative of the older C∗ encryption and signature scheme that was broke...
Charles Bouillaguet, Pierre-Alain Fouque, Gilles M...
108
Voted
EUROCRYPT
2003
Springer
15 years 4 months ago
Why Provable Security Matters?
Abstract. Recently, methods from provable security, that had been developped for the last twenty years within the research community, have been extensively used to support emerging...
Jacques Stern
ELPUB
1998
ACM
15 years 3 months ago
The Library in the Card: Results from Decomate Project and Current Developments at UAB
The Library in the card is the slogan which would summarize the aims of the Univeritat Autonoma de Barcelona (UAB) Library Service in its involvement in several EC Libraries Progr...
Nuria Gallart
JCDL
2010
ACM
155views Education» more  JCDL 2010»
15 years 4 months ago
Scholarly paper recommendation via user's recent research interests
We examine the effect of modeling a researcher’s past works in recommending scholarly papers to the researcher. Our hypothesis is that an author’s published works constitute a...
Kazunari Sugiyama, Min-Yen Kan