Sciweavers

261 search results - page 47 / 53
» On the Security of Some Password-Based Key Agreement Schemes
Sort
View
INFORMATICALT
2000
110views more  INFORMATICALT 2000»
14 years 9 months ago
A Game Theoretic Analysis of Mechanisms to Induce Regional Technological Cooperation
A concept of regional technological cooperation is developed based on a cooperative game theoretic model, in which a plan of payoff distributions induces an agreement that is accep...
Hanif D. Sherali, Qing Li
EUROCRYPT
2012
Springer
12 years 12 months ago
Fully Homomorphic Encryption with Polylog Overhead
We show that homomorphic evaluation of (wide enough) arithmetic circuits can be accomplished with only polylogarithmic overhead. Namely, we present a construction of fully homomorp...
Craig Gentry, Shai Halevi, Nigel P. Smart
CRYPTO
2010
Springer
228views Cryptology» more  CRYPTO 2010»
14 years 10 months ago
On Generalized Feistel Networks
We prove beyond-birthday-bound security for most of the well-known types of generalized Feistel networks: (1) unbalanced Feistel networks, where the n-bit to m-bit round functions ...
Viet Tung Hoang, Phillip Rogaway
89
Voted
BIOSIG
2008
170views Biometrics» more  BIOSIG 2008»
14 years 11 months ago
Frontex Perspectives on Biometrics for Border Checks
: The European Union is developing new concepts for border management. Biometrics is seen is a key technology to facilitate more secure and convenient border management. Biometric ...
Erik Berglund, Rasa Karbauskaite
CRYPTO
2009
Springer
150views Cryptology» more  CRYPTO 2009»
15 years 4 months ago
Short and Stateless Signatures from the RSA Assumption
We present the first signature scheme which is “short”, stateless and secure under the RSA assumption in the standard model. Prior short, standard model signatures in the RSA...
Susan Hohenberger, Brent Waters