Sciweavers

954 search results - page 87 / 191
» On the Security of ''Golden'' Cryptography
Sort
View
ACNS
2003
Springer
131views Cryptology» more  ACNS 2003»
15 years 3 months ago
On the Security of Two Threshold Signature Schemes with Traceable Signers
A (t, n) threshold signature scheme allows t or more group members to generate signatures on behalf of a group with n members, while any t−1 or less members cannot do the same th...
Guilin Wang, Xiaoxi Han, Bo Zhu
CHES
2003
Springer
100views Cryptology» more  CHES 2003»
15 years 3 months ago
Security Evaluation of Asynchronous Circuits
Abstract. Balanced asynchronous circuits have been touted as a superior replacement for conventional synchronous circuits. To assess these claims, we have designed, manufactured an...
Jacques J. A. Fournier, Simon W. Moore, Huiyun Li,...
NSDI
2008
15 years 6 days ago
Passport: Secure and Adoptable Source Authentication
We present the design and evaluation of Passport, a system that allows source addresses to be validated within the network. Passport uses efficient, symmetric-key cryptography to ...
Xin Liu, Ang Li, Xiaowei Yang, David Wetherall
DBSEC
2007
116views Database» more  DBSEC 2007»
14 years 11 months ago
Provably-Secure Schemes for Basic Query Support in Outsourced Databases
In this paper, we take a closer look at the security of outsourced databases (aka Database-as-the-Service or DAS), a topic of emerging importance. DAS allows users to store sensit...
Georgios Amanatidis, Alexandra Boldyreva, Adam O'N...
CORR
2004
Springer
107views Education» more  CORR 2004»
14 years 9 months ago
Security of public key cryptosystems based on Chebyshev Polynomials
Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed, they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptogra...
Pina Bergamo, Paolo D'Arco, Alfredo De Santis, Lju...