Sciweavers

2237 search results - page 48 / 448
» On the Security of Random Sources
Sort
View
RSA
2008
81views more  RSA 2008»
14 years 9 months ago
Analyzing linear mergers
Mergers are functions that transform k (possibly dependent) random sources into a single random source, in a way that ensures that if one of the input sources has minentropy rate ...
Zeev Dvir, Ran Raz
OOPSLA
2005
Springer
15 years 3 months ago
Scopira: an open source C++ framework for biomedical data analysis applications -- a research project report
In MRI research labs, algorithms are typically implemented in MATLAB or IDL. If performance is an issue they are ported to C and integrated with interpreted systems, not fully uti...
Aleksander B. Demko, Rodrigo A. Vivanco, Nicolino ...
WEWORC
2007
132views Cryptology» more  WEWORC 2007»
14 years 11 months ago
Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme
Abstract. Courtois, Finiasz and Sendrier proposed in 2001 a practical code-based signature scheme. We give a rigorous security analysis of a modified version of this scheme in the...
Léonard Dallot
IJNSEC
2008
103views more  IJNSEC 2008»
14 years 9 months ago
General Group Oriented ID-based Cryptosystems with Chosen Plaintext Security
A scheme for general group oriented ID-based cryptosystems is proposed. This scheme allows an authorized subset in the general access structure to cooperatively decrypt the cipher...
Chunxiang Xu, Junhui Zhou, Guozhen Xiao
PKC
2012
Springer
255views Cryptology» more  PKC 2012»
13 years 4 days ago
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Abstract. An unresolved problem in research on authenticated key exchange (AKE) is to construct a secure protocol against advanced attacks such as key compromise impersonation and ...
Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Ka...