Sciweavers

334 search results - page 58 / 67
» Public Key Encryption for the Forgetful
Sort
View
IACR
2011
94views more  IACR 2011»
13 years 11 months ago
Practical Key-recovery For All Possible Parameters of SFLASH
In this paper we present a new practical key-recovery attack on the SFLASH signature scheme. SFLASH is a derivative of the older C∗ encryption and signature scheme that was broke...
Charles Bouillaguet, Pierre-Alain Fouque, Gilles M...
84
Voted
FC
2003
Springer
101views Cryptology» more  FC 2003»
15 years 4 months ago
Fully Private Auctions in a Constant Number of Rounds
Abstract. We present a new cryptographic auction protocol that prevents extraction of bid information despite any collusion of participants. This requirement is stronger than commo...
Felix Brandt
118
Voted
ACISP
2008
Springer
15 years 6 months ago
Secure Biometric Authentication with Improved Accuracy
Abstract. We propose a new hybrid protocol for cryptographically secure biometric authentication. The main advantages of the proposed protocol over previous solutions can be summar...
Manuel Barbosa, Thierry Brouard, Stéphane C...
SP
2003
IEEE
155views Security Privacy» more  SP 2003»
15 years 5 months ago
Mixminion: Design of a Type III Anonymous Remailer Protocol
We present Mixminion, a message-based anonymous remailer protocol with secure single-use reply blocks. Mix nodes cannot distinguish Mixminion forward messages from reply messages,...
George Danezis, Roger Dingledine, Nick Mathewson
109
Voted
CCS
2001
ACM
15 years 4 months ago
A new approach to DNS security (DNSSEC)
The Domain Name System (DNS) is a distributed database that allows convenient storing and retrieving of resource records. DNS has been extended to provide security services (DNSSE...
Giuseppe Ateniese, Stefan Mangard