Sciweavers

208 search results - page 17 / 42
» Variationally universal hashing
Sort
View
CRYPTO
2004
Springer
121views Cryptology» more  CRYPTO 2004»
15 years 3 months ago
A New Paradigm of Hybrid Encryption Scheme
In this paper, we show that a key encapsulation mechanism (KEM) does not have to be IND-CCA secure in the construction of hybrid encryption schemes, as was previously believed. Tha...
Kaoru Kurosawa, Yvo Desmedt
CRYPTO
2000
Springer
89views Cryptology» more  CRYPTO 2000»
15 years 2 months ago
On the Round Security of Symmetric-Key Cryptographic Primitives
We put forward a new model for understanding the security of symmetric-key primitives, such as block ciphers. The model captures the fact that many such primitives often consist of...
Zulfikar Ramzan, Leonid Reyzin
CLEF
2010
Springer
14 years 10 months ago
Exploring Fingerprinting as External Plagiarism Detection Method - Lab Report for PAN at CLEF 2010
This paper outlines the main approach and the general design of the plagiarism detection prototype application we have developed to take part in the 2nd International Plagiarism De...
Yurii Palkovskii, Alexei Belov, Irina Muzika
ICALP
2009
Springer
15 years 10 months ago
Fast FAST
We present a randomized subexponential time, polynomial space parameterized algorithm for the k-Weighted Feedback Arc Set in Tournaments (k-FAST) problem. We also show that our alg...
Noga Alon, Daniel Lokshtanov, Saket Saurabh
PKC
2000
Springer
166views Cryptology» more  PKC 2000»
15 years 1 months ago
Design Validations for Discrete Logarithm Based Signature Schemes
A number of signature schemes and standards have been recently designed, based on the Discrete Logarithm problem. In this paper we conduct design validation of such schemes while t...
Ernest F. Brickell, David Pointcheval, Serge Vaude...