Sciweavers

569 search results - page 47 / 114
» On the Security of the Digital Signature Algorithm
Sort
View
ESORICS
2009
Springer
16 years 14 days ago
User-Centric Handling of Identity Agent Compromise
Digital identity credentials are a key enabler for important online services, but widespread theft and misuse of such credentials poses serious risks for users. We believe that an ...
Daisuke Mashima, Mustaque Ahamad, Swagath Kannan
JSS
2006
66views more  JSS 2006»
14 years 11 months ago
On the security of the Yen-Guo's domino signal encryption algorithm (DSEA)
Recently, a new domino signal encryption algorithm (DSEA) was proposed for digital signal transmission, especially for digital images and videos. This paper analyzes the security ...
Chengqing Li, Shujun Li, Der-Chyuan Lou, Dan Zhang
ICISC
2007
100views Cryptology» more  ICISC 2007»
15 years 1 months ago
Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon's Algorithm
Pairing based cryptography is a new public key cryptographic scheme. An elliptic curve suitable for pairing based cryptography is called a “pairing-friendly” elliptic curve. Af...
Aya Comuta, Mitsuru Kawazoe, Tetsuya Takahashi
CCS
2005
ACM
15 years 5 months ago
Towards computationally sound symbolic analysis of key exchange protocols
d abstract) Prateek Gupta and Vitaly Shmatikov The University of Texas at Austin We present a cryptographically sound formal method for proving correctness of key exchange protoco...
Prateek Gupta, Vitaly Shmatikov
ACSAC
1999
IEEE
15 years 4 months ago
Efficient Certificate Status Handling Within PKIs: An Application to Public Administration Services
Public administrations show a strong interest in digital signature technology as a mean for secure and authenticated document exchange, hoping it will help reducing paper-based tr...
Marco Prandini