Sciweavers

1302 search results - page 34 / 261
» Soundness in the Public-Key Model
Sort
View
TGC
2007
Springer
15 years 8 months ago
Computational Soundness of Equational Theories (Tutorial)
Abstract. We study the link between formal and cryptographic models for security protocols in the presence of passive and adaptive adversaries. We first describe the seminal resul...
Steve Kremer
ASIACRYPT
2004
Springer
15 years 7 months ago
Secret Handshakes from CA-Oblivious Encryption
Secret handshakes were recently introduced [BDS+ 03] to allow members of the same group to authenticate each other secretly, in the sense that someone who is not a group member ca...
Claude Castelluccia, Stanislaw Jarecki, Gene Tsudi...
CRYPTO
2006
Springer
112views Cryptology» more  CRYPTO 2006»
15 years 5 months ago
On Signatures of Knowledge
In a traditional signature scheme, a signature on a message m is issued under a public key PK, and can be interpreted as follows: "The owner of the public key PK and its corr...
Melissa Chase, Anna Lysyanskaya
ISMIR
2004
Springer
112views Music» more  ISMIR 2004»
15 years 7 months ago
Perceptual Segment Clustering For Music Description And Time-axis Redundancy Cancellation
Repeating sounds and patterns are widely exploited throughout music. However, although analysis and music information retrieval applications are often concerned with processing sp...
Tristan Jehan