Sciweavers

12 search results - page 1 / 3
» indocrypt 2004
Sort
View
57
Voted
INDOCRYPT
2004
Springer
15 years 2 months ago
Results on Algebraic Immunity for Cryptographically Significant Boolean Functions
Deepak Kumar Dalai, Kishan Chand Gupta, Subhamoy M...
89
Voted
INDOCRYPT
2004
Springer
15 years 2 months ago
On the Security of a Certified E-Mail Scheme
Certified e-mail is a value-added service for standard e-mail systems, in which the intended recipient gets the mail content if and only if the mail originator receives a non-repud...
Guilin Wang, Feng Bao, Jianying Zhou
82
Voted
INDOCRYPT
2004
Springer
15 years 2 months ago
Revisiting Fully Distributed Proxy Signature Schemes
In a proxy signature scheme, a potential signer delegates his capabilities to a proxy signer, who can sign documents on behalf of him. The recipient of the signature verifies both...
Javier Herranz, Germán Sáez
80
Voted
INDOCRYPT
2004
Springer
15 years 2 months ago
Information Theory and the Security of Binary Data Perturbation
Random data perturbation (RDP) has been in use for several years in statistical databases and public surveys as a means of providing privacy to individuals while collecting informa...
Poorvi L. Vora
80
Voted
INDOCRYPT
2004
Springer
15 years 2 months ago
Tripartite Key Exchange in the Canetti-Krawczyk Proof Model
A definition of secure multi-party key exchange in the Canetti-Krawczyk proof model is proposed, followed by a proof of the security of the Joux tripartite key agreement protocol...
Yvonne Hitchcock, Colin Boyd, Juan Manuel Gonz&aac...