Sciweavers

2237 search results - page 296 / 448
» On the Security of Random Sources
Sort
View
FC
2000
Springer
119views Cryptology» more  FC 2000»
15 years 8 months ago
Sharing Decryption in the Context of Voting or Lotteries
Abstract. Several public key cryptosystems with additional homomorphic properties have been proposed so far. They allow to perform computation with encrypted data without the knowl...
Pierre-Alain Fouque, Guillaume Poupard, Jacques St...
EUROCRYPT
2010
Springer
15 years 8 months ago
Stam's Collision Resistance Conjecture
At CRYPTO 2008 Stam [7] made the following conjecture: if an m + s-bit to s-bit compression function F makes r calls to a primitive f of n-bit input, then a collision for F can be ...
John P. Steinberger
SEC
2008
15 years 6 months ago
Robbing Banks with Their Own Software-an Exploit Against Norwegian Online Banks
Abstract The banking industry in Norway has developed a new security infrastructure for conducting commerce on the Internet. The initiative, called BankID, aims to become a nationa...
Yngve Espelid, Lars-Helge Netland, André N....
I3E
2001
114views Business» more  I3E 2001»
15 years 6 months ago
Receipt-Freeness in Large-Scale Elections without Untappable Channels
: For an electronic election to be fully democratic there is a need for security mechanisms that will assure the privacy of the voters. With receipt-free electronic voting, a voter...
Emmanouil Magkos, Mike Burmester, Vassilios Chriss...
IMAMS
2003
212views Mathematics» more  IMAMS 2003»
15 years 6 months ago
Watermarking 3D Polygonal Meshes Using the Singular Spectrum Analysis
Watermarking is to embed a structure called a watermark into the target data such as images. The watermark can be used, for example, in order to secure the copyright and detect tam...
Kohei Muratani, Kokichi Sugihara