Sciweavers

679 search results - page 43 / 136
» Using decision problems in public key cryptography
Sort
View
JBI
2007
113views Bioinformatics» more  JBI 2007»
15 years 1 months ago
Description of a method to support public health information management: Organizational network analysis
In this case study, we describe a method that has potential to provide systematic support for public health information management. Public health agencies depend on specialized in...
Jacqueline Merrill, Suzanne Bakken, Maxine Rockoff...
CHES
2004
Springer
187views Cryptology» more  CHES 2004»
15 years 6 months ago
A New Attack with Side Channel Leakage During Exponent Recoding Computations
In this paper we propose a new side channel attack, where exponent recodings for public key cryptosystems such as RSA and ECDSA are considered. The known side channel attacks and c...
Yasuyuki Sakai, Kouichi Sakurai
FC
2004
Springer
120views Cryptology» more  FC 2004»
15 years 6 months ago
Identity-Based Chameleon Hash and Applications
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chamel...
Giuseppe Ateniese, Breno de Medeiros
IH
2001
Springer
15 years 5 months ago
Keyless Public Watermarking for Intellectual Property Authentication
Abstract. A constraint-based watermarking technique has been introduced for the protection of intellectual properties such as hardware, software, algorithms, and solutions to hard ...
Gang Qu
ANTS
2006
Springer
78views Algorithms» more  ANTS 2006»
15 years 5 months ago
Hidden Pairings and Trapdoor DDH Groups
This paper suggests a new building block for cryptographic protocols and gives two instantiations of it. The concept is to generate two descriptions of the same group: a public des...
Alexander W. Dent, Steven D. Galbraith