• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 5,398
Next 10 →

Versatile padding schemes for joint signature and encryption

by Yevgeniy Dodis, Stanislaw Jarecki, Michael J. Freedman, Shabsi Walfish - In Proceedings of Eleventh ACM Conference on Computer and Communication Security (CCS2004 , 2004
"... We propose several highly-practical and optimized constructions for joint signature and encryption primitives often referred to as signcryption. All our signcryption schemes, built directly from trapdoor permutations such as RSA, share features such as simplicity, efficiency, generality, near-optima ..."
Abstract - Cited by 9 (0 self) - Add to MetaCart
We propose several highly-practical and optimized constructions for joint signature and encryption primitives often referred to as signcryption. All our signcryption schemes, built directly from trapdoor permutations such as RSA, share features such as simplicity, efficiency, generality, near

ABSTRACT Versatile Padding Schemes for Joint Signature and Encryption

by Yevgeniy Dodis, Stanislaw Jarecki
"... We propose several highly-practical and optimized constructions for joint signature and encryption primitives often referred to as signcryption. All our signcryption schemes, built directly from trapdoor permutations such as RSA, share features such as simplicity, efficiency, generality, near-optima ..."
Abstract - Add to MetaCart
We propose several highly-practical and optimized constructions for joint signature and encryption primitives often referred to as signcryption. All our signcryption schemes, built directly from trapdoor permutations such as RSA, share features such as simplicity, efficiency, generality, near

Versatile Padding Schemes forJoint Signature and Encryption Yevgeniy DodisNew York University dodis@cs.nyu.edu

by Michael J. Freedmannew
"... ABSTRACT We propose several highly-practical and optimized constructionsfor joint signature and encryption primitives often referred to as signcryption. All our signcryption schemes, built directly fromtrapdoor permutations such as RSA, share features such as simplicity, efficiency, generality, near ..."
Abstract - Add to MetaCart
ABSTRACT We propose several highly-practical and optimized constructionsfor joint signature and encryption primitives often referred to as signcryption. All our signcryption schemes, built directly fromtrapdoor permutations such as RSA, share features such as simplicity, efficiency, generality

Wireless Communications

by Andrea Goldsmith, Anaïs Nin , 2005
"... Copyright c ○ 2005 by Cambridge University Press. This material is in copyright. Subject to statutory exception and to the provisions of relevant collective licensing agreements, no reproduction of any part may take place without the written permission of Cambridge University ..."
Abstract - Cited by 1129 (32 self) - Add to MetaCart
Copyright c ○ 2005 by Cambridge University Press. This material is in copyright. Subject to statutory exception and to the provisions of relevant collective licensing agreements, no reproduction of any part may take place without the written permission of Cambridge University

Towards an Active Network Architecture

by David L. Tennenhouse, David J. Wetherall - Computer Communication Review , 1996
"... Active networks allow their users to inject customized programs into the nodes of the network. An extreme case, in which we are most interested, replaces packets with "capsules" -- program fragments that are executed at each network router/switch they traverse. Active architectures permit ..."
Abstract - Cited by 492 (7 self) - Add to MetaCart
Active networks allow their users to inject customized programs into the nodes of the network. An extreme case, in which we are most interested, replaces packets with "capsules" -- program fragments that are executed at each network router/switch they traverse. Active architectures permit a massive increase in the sophistication of the computation that is performed within the network. They will enable new applications, especially those based on application-specific multicast, information fusion, and other services that leverage network-based computation and storage. Furthermore, they will accelerate the pace of innovation by decoupling network services from the underlying hardware and allowing new services to be loaded into the infrastructure on demand. In this paper, we describe our vision of an active network architecture, outline our approach to its design, and survey the technologies that can be brought to bear on its implementation. We propose that the research community mount a j...

Mobile Values, New Names, and Secure Communication

by Martín Abadi, Cédric Fournet , 2001
"... We study the interaction of the "new" construct with a rich but common form of (first-order) communication. This interaction is crucial in security protocols, which are the main motivating examples for our work; it also appears in other programming-language contexts. Specifically, we intro ..."
Abstract - Cited by 378 (18 self) - Add to MetaCart
We study the interaction of the "new" construct with a rich but common form of (first-order) communication. This interaction is crucial in security protocols, which are the main motivating examples for our work; it also appears in other programming-language contexts. Specifically, we introduce a simple, general extension of the pi calculus with value passing, primitive functions, and equations among terms. We develop semantics and proof techniques for this extended language and apply them in reasoning about some security protocols.

The Joint Signature and Encryption Revisited ∗

by Laila El Aimani
"... We study the Sign then Encrypt, Commit then Encrypt and Sign, and Encrypt then Sign paradigms in the context of three cryptographic primitives, namely designated confirmer signatures, signcryption, and verifiably encrypted signatures. Our study identifies weaknesses in those paradigms which impose t ..."
Abstract - Add to MetaCart
We study the Sign then Encrypt, Commit then Encrypt and Sign, and Encrypt then Sign paradigms in the context of three cryptographic primitives, namely designated confirmer signatures, signcryption, and verifiably encrypted signatures. Our study identifies weaknesses in those paradigms which impose

Multimedia Watermarking Techniques

by Frank Hartung, Martin Kutter , 1999
"... ..."
Abstract - Cited by 341 (5 self) - Add to MetaCart
Abstract not found

On the joint security of encryption and signature, revisited

by Kenneth G. Paterson, Jacob C. N. Schuldt, Martijn Stam, Susan Thomson - Advances in Cryptology – ASIACRYPT 2011, volume 7073 of Lecture Notes in Computer Science , 2011
"... Abstract. We revisit the topic of joint security for combined public key schemes, wherein a single keypair is used for both encryption and signature primitives in a secure manner. While breaking the principle of key separation, such schemes have attractive properties and are sometimes used in practi ..."
Abstract - Cited by 4 (3 self) - Add to MetaCart
Abstract. We revisit the topic of joint security for combined public key schemes, wherein a single keypair is used for both encryption and signature primitives in a secure manner. While breaking the principle of key separation, such schemes have attractive properties and are sometimes used

Mixminion: Design of a Type III Anonymous Remailer Protocol

by George Danezis, Roger Dingledine, David Hopwood, Nick Mathewson - In Proceedings of the 2003 IEEE Symposium on Security and Privacy , 2003
"... Abstract. We present Mixminion, a message-based anonymous remailer protocol that supports secure single-use reply blocks. MIX nodes cannot distinguish Mixminion forward messages from reply messages, so forward and reply messages share the same anonymity set. We add directory servers that allow users ..."
Abstract - Cited by 296 (44 self) - Add to MetaCart
users to learn public keys and performance statistics of participating remailers, and we describe nymservers that allow users to maintain long-term pseudonyms using single-use reply blocks as a primitive. Our design integrates link encryption between remailers to provide forward anonymity. Mixminion
Next 10 →
Results 1 - 10 of 5,398
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University