Sciweavers

683 search results - page 79 / 137
» Unique Group Signatures
Sort
View
ACNS
2010
Springer
156views Cryptology» more  ACNS 2010»
15 years 4 months ago
Batch Groth-Sahai
Abstract. In 2008, Groth and Sahai proposed a general methodology for constructing non-interactive zeroknowledge (and witness-indistinguishable) proofs in bilinear groups. While av...
Olivier Blazy, Georg Fuchsbauer, Malika Izabach&eg...
ASIACRYPT
2000
Springer
15 years 4 months ago
Improved Methods to Perform Threshold RSA
Abstract. A t out of n threshold scheme is such that shares are distributed to n participants so that any set of t participants can compute the secret, whereas any set of less than...
Brian King
CARDIS
2000
Springer
124views Hardware» more  CARDIS 2000»
15 years 4 months ago
Elliptic Curve Cryptography on Smart Cards without Coprocessors
Abstract This contribution describes how an elliptic curve cryptosystem can be implemented on very low cost microprocessors with reasonable performance. We focus in this paper on t...
Adam D. Woodbury, Daniel V. Bailey, Christof Paar
JALC
2006
87views more  JALC 2006»
14 years 12 months ago
A Team Automaton Scenario for the Analysis of Security Properties of Communication Protocols
Formal methods are a popular means to specify and verify security properties of a variety of communication protocols. In this article we take a step towards the use of team automa...
Maurice H. ter Beek, Gabriele Lenzini, Marinella P...
68
Voted
ITICSE
2006
ACM
15 years 5 months ago
Implementing the jigsaw model in CS1 closed labs
We apply the Jigsaw cooperative learning model to our CS1 closed labs. The Jigsaw cooperative learning model assigns students into main groups in which each group member is respon...
Leen-Kiat Soh