Sciweavers

186 search results - page 34 / 38
» Signature Schemes Based on the Strong RSA Assumption
Sort
View
CRYPTO
2004
Springer
120views Cryptology» more  CRYPTO 2004»
15 years 2 months ago
Round-Optimal Secure Two-Party Computation
Abstract. We consider the central cryptographic task of secure twoparty computation, where two parties wish to compute some function of their private inputs (each receiving possibl...
Jonathan Katz, Rafail Ostrovsky
88
Voted
TASLP
2010
103views more  TASLP 2010»
14 years 8 months ago
Percussion Synthesis Based on Models of Nonlinear Shell Vibration
—The synthesis of sound based on physical models of 2-D percussion instruments is problematic and has been approached only infrequently in the literature. Beyond the computationa...
Stefan Bilbao
96
Voted
CCS
2008
ACM
14 years 11 months ago
Efficient attributes for anonymous credentials
We extend the Camenisch-Lysyanskaya anonymous credential system such that selective disclosure of attributes becomes highly efficient. The resulting system significantly improves ...
Jan Camenisch, Thomas Groß
81
Voted
CTRSA
2008
Springer
137views Cryptology» more  CTRSA 2008»
14 years 11 months ago
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange
Public key based authentication and key exchange protocols are not usually designed with privacy in mind and thus involve cleartext exchanges of identities and certificates before ...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
MOBIQUITOUS
2005
IEEE
15 years 3 months ago
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. T...
Wensheng Zhang, Guohong Cao