Sciweavers

37 search results - page 8 / 8
» The security of a strong proxy signature scheme with proxy s...
Sort
View
STOC
1995
ACM
107views Algorithms» more  STOC 1995»
13 years 9 months ago
Incremental cryptography and application to virus protection
The goal of incremental cryptography is to design cryptographic algorithms with the property that having applied the algorithm to a document, it is possible to quickly update the ...
Mihir Bellare, Oded Goldreich, Shafi Goldwasser
CHES
2009
Springer
140views Cryptology» more  CHES 2009»
14 years 6 months ago
On Tamper-Resistance from a Theoretical Viewpoint
Tamper-proof devices are pretty powerful. They can be used to have better security in applications. In this work we observe that they can also be maliciously used in order to defea...
Paulo Mateus, Serge Vaudenay