Sciweavers

152 search results - page 12 / 31
» On the Key Dependent Message Security of the Fujisaki-Okamot...
Sort
View
ICASSP
2011
IEEE
14 years 2 months ago
Informed secure watermarking using optimal transport
This paper presents several watermarking methods preventing the estimation of the secret key by an adversary. The constraints for secure embedding using distribution matching, whe...
Patrick Bas
MUE
2007
IEEE
104views Multimedia» more  MUE 2007»
15 years 4 months ago
A Conference Key Distribution Scheme Using Interpolating Polynomials
Conference keys are secret keys used by a group of users commonly and with which they can encipher (or decipher) messages such that communications are secure. Based on the Diffie ...
Chin-Chen Chang, Chu-Hsing Lin, Chien-Yuan Chen
SP
2006
IEEE
109views Security Privacy» more  SP 2006»
15 years 4 months ago
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a bit “0” into a bi...
Mario Cagalj, Jean-Pierre Hubaux, Srdjan Capkun, R...
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
15 years 2 months ago
Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing
A series of recent papers have demonstrated collision attacks on popularly used hash functions, including the widely deployed MD5 and SHA-1 algorithm. To assess this threat, the na...
Michael Szydlo, Yiqun Lisa Yin
IACR
2011
112views more  IACR 2011»
13 years 10 months ago
A Domain Transformation for Structure-Preserving Signatures on Group Elements
We present a generic transformation that allows us to use a large class of pairing-based signatures to construct schemes for signing group elements in a structure preserving way. A...
Melissa Chase, Markulf Kohlweiss