Sciweavers

954 search results - page 103 / 191
» On the Security of ''Golden'' Cryptography
Sort
View
FC
2010
Springer
175views Cryptology» more  FC 2010»
14 years 11 months ago
Cryptographic Cloud Storage
We consider the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer. We...
Seny Kamara, Kristin Lauter
ENTCS
2006
138views more  ENTCS 2006»
14 years 10 months ago
Model Checking Russian Cards
We implement a specific protocol for bit exchange among card-playing agents in three different state-of-the-art epistemic model checkers and compare the results. Key words: Crypto...
Hans P. van Ditmarsch, Wiebe van der Hoek, Ron van...
INFORMATICALT
2002
69views more  INFORMATICALT 2002»
14 years 9 months ago
Improving the Information Rate of a Private-key Cryptosystem Based on Product Codes
Recently, Sun proposed a private-key encryption scheme based on the product codes with the capability of correcting a special type of structured errors. In this paper, we present a...
Hung-Min Sun
INDOCRYPT
2010
Springer
14 years 7 months ago
CyclicRainbow - A Multivariate Signature Scheme with a Partially Cyclic Public Key
Multivariate Cryptography is one of the alternatives to guarantee the security of communication in the post-quantum world. One major drawback of such schemes is the huge size of th...
Albrecht Petzoldt, Stanislav Bulygin, Johannes Buc...
IPL
2007
72views more  IPL 2007»
14 years 9 months ago
How to safely close a discussion
In the secure communication problem, we focus on safe termination. In applications such as electronic transactions, we want each party to be ensured that both sides agree on the s...
Gildas Avoine, Serge Vaudenay