Sciweavers

28 search results - page 5 / 6
» XMSS - A Practical Forward Secure Signature Scheme based on ...
Sort
View
NDSS
2003
IEEE
13 years 11 months ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two partiesā€”the client and the serverā...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
PKC
2000
Springer
166views Cryptology» more  PKC 2000»
13 years 10 months ago
Design Validations for Discrete Logarithm Based Signature Schemes
A number of signature schemes and standards have been recently designed, based on the Discrete Logarithm problem. In this paper we conduct design validation of such schemes while t...
Ernest F. Brickell, David Pointcheval, Serge Vaude...
CRYPTO
2007
Springer
162views Cryptology» more  CRYPTO 2007»
14 years 20 days ago
Universally-Composable Two-Party Computation in Two Rounds
Round complexity is a central measure of eļ¬ƒciency, and characterizing the round complexity of various cryptographic tasks is of both theoretical and practical importance. We show...
Omer Horvitz, Jonathan Katz
ASIACRYPT
2009
Springer
14 years 1 months ago
A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical
The design of cryptographic hash functions is a very complex and failure-prone process. For this reason, this paper puts forward a completely modular and fault-tolerant approach to...
Anja Lehmann, Stefano Tessaro
CTRSA
2003
Springer
116views Cryptology» more  CTRSA 2003»
13 years 11 months ago
Intrusion-Resilient Public-Key Encryption
Exposure of secret keys seems to be inevitable, and may in practice represent the most likely point of failure in a cryptographic system. Recently, the notion of intrusion-resilien...
Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz...