Security arguments for digital signatures and blind signatures

D Pointcheval, J Stern - Journal of cryptology, 2000 - Springer
Since the appearance of public-key cryptography in the seminal Diffie—Hellman paper,
many new schemes have been proposed and many have been broken. Thus, the simple fact …

Reflection as a mechanism for software integrity verification

D Spinellis - ACM Transactions on Information and System Security …, 2000 - dl.acm.org
The integrity verification of a device's controlling software is an important aspect of many
emerging information appliances. We propose the use of reflection, whereby the software is …

Unconditionally secure digital signature schemes admitting transferability

G Hanaoka, J Shikata, Y Zheng, H Imai - … on the Theory and Application of …, 2000 - Springer
A potentially serious problem with current digital signature schemes is that their underlying
hard problems from number theory may be solved by an innovative technique or a new …

Authentication and payment in future mobile systems

G Horn, B Preneel - Journal of Computer Security, 2000 - content.iospress.com
This article presents an efficient public-key protocol for mutual authentication and key
exchange designed for future mobile communications systems. The paper also …

[PDF][PDF] Evaluation of the encryption procedure and record linkage in the Belgian National Cancer Registry

E Van Eycken, K Haustermans, F Buntinx… - Archives of public …, 2000 - sciensano.be
Evaluation of the encryption procedure and record linkage in the Belgian national cancer
registry Page 1 Arch Public Health 2000, 58, 281-294 Evaluation of the encryption procedure …

Numerical replication of computer simulations: Some pitfalls and how to avoid them

TC Belding - arXiv preprint nlin/0001057, 2000 - arxiv.org
A computer simulation, such as a genetic algorithm, that uses IEEE standard floating-point
arithmetic may not produce exactly the same results in two different runs, even if it is rerun …

Combining Authentication and Lightweight Payment for Active Networks

R Weis, W Effelsberg, S Lucks - International Conference on Intelligence …, 2000 - Springer
Security functions are of critical importance for the acceptance of Active Networks in practice:
network nodes must be protected from malicious code, and they should account for the cost …

[PDF][PDF] UM MODO DE OPERAÇÃO DE FUNÇÕES DE HASHING PARA LOCALIZAR ALTERAÇÕES EM DADOS DIGITALMENTE ASSINADOS

V RIJMEN - lps.usp.br
Um novo modo de operação de funções de hashing para aplicações em assinaturas digitais
é apresentado. Esta técnica é capaz não só de detectar se alguma mudança foi feita em …

[PDF][PDF] 6HFXULW\LQ 3XEOLF 1 1HWZRUNV

F Moioli - 2000 - scss.tcd.ie
Wireless LAN technology offers high-speed, wireless connectivity that enables mobile
computing in many different environments. Many new services will be provided by usage of …

Development of a Hash Function and a Stream Cipher and Their Applications to the GSM Security System

BS Kim, IC Shin - The Transactions of the Korea Information …, 2000 - koreascience.kr
With the advance of wireless communications technology, mobile communications have
become more convenient than ever. Nowadays, people can communicate with each other …