Sciweavers

1970 search results - page 30 / 394
» Security Without Firewalls
Sort
View
DCC
2008
IEEE
16 years 1 months ago
Semantic security for the McEliece cryptosystem without random oracles
In this paper, we formally prove that padding the plaintext with a random bit-string provides the semantic security against chosen plaintext attack (IND-CPA) for the McEliece (and ...
Ryo Nojima, Hideki Imai, Kazukuni Kobara, Kirill M...
FC
2004
Springer
105views Cryptology» more  FC 2004»
15 years 7 months ago
Secure Generalized Vickrey Auction without Third-party Servers
This paper presents a secure Generalized Vickrey Auction (GVA) scheme that does not require third-party servers, i.e., the scheme is executed only by an auctioneer and bidders. Com...
Makoto Yokoo, Koutarou Suzuki
IACR
2011
73views more  IACR 2011»
14 years 1 months ago
Secure Authentication from a Weak Key, Without Leaking Information
We study the problem of authentication based on a weak key in the information-theoretic setting. A key is weak if its min-entropy is an arbitrary small fraction of its bit length. ...
Niek J. Bouman, Serge Fehr
ICIP
2001
IEEE
16 years 3 months ago
Secure scalable streaming enabling transcoding without decryption
John G. Apostolopoulos, Susie J. Wee
79
Voted
SASN
2005
ACM
15 years 7 months ago
RFID security without extensive cryptography
Sindhu Karthikeyan, Mikhail Nesterenko