|
|
|
|
Zou, Xukai
Indiana University Purdue University Indianapolis
Indianapolis, Indiana
|
|
|
|
|
|
|
|
Date Reviewed |
|
|
1 - 4 of 4
reviews
|
|
|
|
|
|
|
|
Short signatures from Diffie-Hellman: realizing almost compact public key Seo J. Journal of Cryptology 30(3): 735-759, 2017. Type: Article
Seo proposes a size-reduced signature scheme, which applies the discrete logarithm principle (DLP) and relies on the computational Diffie-Hellman assumption (CDH) in the standard model. The author first introduces background knowledge,...
|
Dec 21 2017 |
|
|
|
|
|
|
Tightly secure signatures from lossy identification schemes Abdalla M., Fouque P., Lyubashevsky V., Tibouchi M. Journal of Cryptology 29(3): 597-631, 2016. Type: Article
The authors have done a great job in presenting a potentially high-impact work. The paper studies signature schemes that are secure in the random oracle model, particularly those based on the Fiat-Shamir (heuristic) technique....
|
Sep 7 2016 |
|
|
|
|
|
|
CipherXRay: exposing cryptographic operations and transient secrets from monitored binary execution Li X., Wang X., Chang W. IEEE Transactions on Dependable and Secure Computing 11(2): 101-114, 2014. Type: Article
CipherXRay is a new binary analysis framework, which, based on the execution of potentially obfuscated binary executables and one critical assumption, can automatically analyze and identify not only the cryptographic operations, but al...
|
Nov 7 2014 |
|
|
|
|
|
|
Practical and efficient cryptographic enforcement of interval-based access control policies Crampton J. ACM Transactions on Information and System Security 14(1): 1-30, 2011. Type: Article
Cryptography-based hierarchical access control has received considerable attention, particularly in recent years. Since its conception, various enforcement schemes have been proposed that address the performance issues and various acce...
|
Dec 12 2011 |
|
|
|
|
|
|
|
|
|
|
|