Sciweavers

405 search results - page 20 / 81
» Practice-Oriented Provable Security
Sort
View
CRYPTO
2001
Springer
106views Cryptology» more  CRYPTO 2001»
15 years 3 months ago
Oblivious Transfer in the Bounded Storage Model
Building on a previous important work of Cachin, Cr´epeau, and Marcil [15], we present a provably secure and more efficient protocol for 2 1 -Oblivious Transfer with a storage-bou...
Yan Zong Ding
IACR
2011
120views more  IACR 2011»
13 years 10 months ago
McOE: A Foolproof On-Line Authenticated Encryption Scheme
On-Line Authenticated Encryption (OAE) combines confidentiality with data integrity and is on-line computable. Most block cipher-based schemes for Authenticated Encryption can be ...
Ewan Fleischmann, Christian Forler, Stefan Lucks
CCS
1993
ACM
15 years 2 months ago
On Simple and Secure Key Distribution
Many recent research e orts in computer security focus on constructing provably secure authentication protocols. Although many of the resulting protocols rely on the a priori secu...
Gene Tsudik, Els Van Herreweghen
EUROCRYPT
2006
Springer
15 years 2 months ago
VSH, an Efficient and Provable Collision-Resistant Hash Function
Abstract. We introduce VSH, very smooth hash, a new S-bit hash function that is provably collision-resistant assuming the hardness of finding nontrivial modular square roots of ver...
Scott Contini, Arjen K. Lenstra, Ron Steinfeld
CCS
2009
ACM
15 years 5 months ago
Dynamic provable data possession
As storage-outsourcing services and resource-sharing networks have become popular, the problem of efficiently proving the integrity of data stored at untrusted servers has receiv...
C. Christopher Erway, Alptekin Küpç&uu...