Sciweavers

590 search results - page 47 / 118
» Short Group Signatures
Sort
View
ASIACRYPT
2000
Springer
15 years 4 months ago
From Fixed-Length to Arbitrary-Length RSA Padding Schemes
A common practice for signing with RSA is to first apply a hash function or a redundancy function to the message, add some padding and exponentiate the resulting padded message us...
Jean-Sébastien Coron, François Koeun...
ICIP
2001
IEEE
16 years 1 months ago
Extraction of rotation invariant signature based on fractal geometry
In this paper, a new method of feature extraction with rotation invariant property is presented. One of the main contributions of this study is that a rotation invariant signature...
Yu Tao, Thomas R. Ioerger, Yuan Yan Tang
CJ
2006
123views more  CJ 2006»
14 years 12 months ago
Unconditionally Secure Anonymous Encryption and Group Authentication
Anonymous channels or similar techniques that can achieve sender's anonymity play important roles in many applications. However, they will be meaningless if cryptographic prim...
Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, H...
ICFP
2005
ACM
15 years 11 months ago
An expressive language of signatures
Current languages allow a programmer to describe an interface only by enumerating its parts, possibly including other interfaces wholesale. Such languages cannot express relations...
Norman Ramsey, Kathleen Fisher, Paul Govereau
ESORICS
2005
Springer
15 years 5 months ago
Machine-Checked Security Proofs of Cryptographic Signature Schemes
Abstract. Formal methods have been extensively applied to the certification of cryptographic protocols. However, most of these works make the perfect cryptography assumption, i.e....
Sabrina Tarento