Sciweavers

658 search results - page 92 / 132
» The Grindahl Hash Functions
Sort
View
AINA
2005
IEEE
15 years 3 months ago
Dynamic Key Generations for Secret Sharing in Access Structures
In a secret sharing scheme based upon access structures, each group has an authorization and only the participants who stayed in an authorized access structure can recover the sec...
Chu-Hsing Lin, Wei Lee, Chien-Sheng Chen
INDOCRYPT
2005
Springer
15 years 3 months ago
A Universally Composable Scheme for Electronic Cash
We propose a scheme for electronic cash based on symmetric primitives. The scheme is secure in the framework for universal composability assuming the existence of a symmetric CCA2-...
Mårten Trolin
IEEEMSP
2002
IEEE
138views Multimedia» more  IEEEMSP 2002»
15 years 2 months ago
A review of algorithms for audio fingerprinting
— An audio fingerprint is a content-based compact signature that summarizes an audio recording. Audio Fingerprinting technologies have recently attracted attention since they al...
Pedro Cano, Eloi Batlle, Ton Kalker, Jaap Haitsma
CCS
1999
ACM
15 years 2 months ago
Signature Schemes Based on the Strong RSA Assumption
We describe and analyze a new digital signature scheme. The new scheme is quite efficient, does not require the the signer to maintain any state, and can be proven secure against ...
Ronald Cramer, Victor Shoup
AC
1997
Springer
15 years 1 months ago
Recent Developments in the Design of Conventional Cryptographic Algorithms
Abstract. This paper examines proposals for three cryptographic primitives: block ciphers, stream ciphers, and hash functions. It provides an overview of the design principles of a...
Bart Preneel, Vincent Rijmen, Antoon Bosselaers