|
|
|
|
|
|
Date Reviewed |
|
|
1 - 10 of 74
reviews
|
|
|
|
|
|
|
|
Quantum computing for computer scientists Yanofsky N., Mannucci M., Cambridge University Press, New York, NY, 2008. 368 pp. Type: Book (9780521879965)
Quantum computing is a new research field at the intersection of computer science (CS), mathematics, and physics. The book’s goal is to present--in a very clear way--some of the more popular topics in quantu...
|
Dec 2 2008 |
|
|
|
|
|
|
Introduction to identity-based encryption (Information Security and Privacy Series) Martin L., Artech House, Inc., Norwood, MA, 2008. 232 pp. Type: Book (9781596932388)
Identity-based encryption (IBE) is a public-key encryption technology that allows a user to calculate a public key from an arbitrary string. The original idea appears in a paper by Boneh and Franklin [1]. In fact, most of the protocols...
|
Oct 31 2008 |
|
|
|
|
|
|
Algorithmic results in list decoding Guruswami V. Foundations and Trends in Theoretical Computer Science 2(2): 107-195, 2006. Type: Article
Continuing the study of error detecting and correcting codes based on Guruswami’s list decoding [1], this paper’s idea is to obtain, as result of decoding, a small list of candidate messages that will, of course, in...
|
Sep 24 2008 |
|
|
|
|
|
|
Image retrieval: ideas, influences, and trends of the new age Datta R., Joshi D., Li J., Wang J. ACM Computing Surveys 40(2): 1-60, 2008. Type: Article
Content-based image retrieval (CBIR) refers to any technology that, in principle, helps to organize digital picture archives by their visual content. This paper presents a comprehensive survey that analyzes and quantifies almost 300 co...
|
Aug 7 2008 |
|
|
|
|
|
|
Cryptanalysis of ISO/IEC 9796-1 Coppersmith D., Coron J., Grieu F., Halevi S., Jutla C., Naccache D., Stern J. Journal of Cryptology 21(1): 27-51, 2008. Type: Article
The ISO/IEC 9796-1 signature standard is the first international standard for digital signatures. This paper describes two different attacks against it. Each of the two attacks constitutes existential forgery under a chosen message att...
|
Jun 19 2008 |
|
|
|
|
|
|
Instant ciphertext-only cryptanalysis of GSM encrypted communication Barkan E., Biham E., Keller N. Journal of Cryptology 21(3): 392-429, 2008. Type: Article
Global system for mobile communications (GSM) and general packet radio service (GPRS) use encryption and security protocols to protect the privacy and integrity of the data they transmit. In this paper, new methods for attacking this e...
|
Jun 16 2008 |
|
|
|
|
|
|
Split-ballot voting: everlasting privacy with distributed trust Moran T., Naor M. Computer and communications security (Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, Virginia, Oct 28-31, 2007) 246-255, 2007. Type: Proceedings
A universally verifiable voting protocol, which can be performed by unaided humans and distributed trust across more than one voting authority, is presented in this paper. It combines both physical and cryptographical requirements....
|
May 14 2008 |
|
|
|
|
|
|
A coercion-resistant Internet voting protocol Meng B. ICSNC 2007 (Proc. of the 2nd International Conference on Systems and Networks Communications,Aug 25-31, 2007) 672007. Type: Proceedings
An Internet voting protocol (IVP) is defined as a voting procedure that uses a computer to cast a ballot over the Internet. There are four types of Internet voting: remote IVP, kiosk IVP, polling places IVP, and precinct IVP. This pape...
|
Apr 24 2008 |
|
|
|
|
|
|
Modular proofs for key exchange: rigorous optimizations in the Canetti–Krawczyk model Hitchcock Y., Boyd C., González Nieto J. Applicable Algebra in Engineering, Communication and Computing 16(6): 405-438, 2006. Type: Article
The Canetti-Krawczyk (CK) model enables an engineering approach to the provable security of protocols. This is done by separating the proofs of authentication mechanisms from the proofs of the protocols providing the basic required fun...
|
Nov 26 2007 |
|
|
|
|
|
|
Advances in signatures, encryption, and e-cash from bilinear groupsHohenberger S. Rivest R.2006 Type: Doctoral Thesis
This doctoral thesis, written by Susan Hohenberger and supervised by Ron Rivest, uses bilinear groups defined over rational points of an elliptic curve in order to introduce the concept of re-cryptography, which is based on the coopera...
|
Nov 20 2007 |
|
|
|
|
|
|
|
|
|
|
|