Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Zou, Xukai
Indiana University Purdue University Indianapolis
Indianapolis, Indiana
  Follow this Reviewer
 
 
 
Options:
Date Reviewed  
 
1
- 4 of 4 reviews

   
  Short signatures from Diffie-Hellman: realizing almost compact public key
Seo J. Journal of Cryptology 30(3): 735-759, 2017.  Type: Article

Seo proposes a size-reduced signature scheme, which applies the discrete logarithm principle (DLP) and relies on the computational Diffie-Hellman assumption (CDH) in the standard model. The author first introduces background knowledge,...

Dec 21 2017  
  Tightly secure signatures from lossy identification schemes
Abdalla M., Fouque P., Lyubashevsky V., Tibouchi M. Journal of Cryptology 29(3): 597-631, 2016.  Type: Article

The authors have done a great job in presenting a potentially high-impact work. The paper studies signature schemes that are secure in the random oracle model, particularly those based on the Fiat-Shamir (heuristic) technique....

Sep 7 2016  
  CipherXRay: exposing cryptographic operations and transient secrets from monitored binary execution
Li X., Wang X., Chang W. IEEE Transactions on Dependable and Secure Computing 11(2): 101-114, 2014.  Type: Article

CipherXRay is a new binary analysis framework, which, based on the execution of potentially obfuscated binary executables and one critical assumption, can automatically analyze and identify not only the cryptographic operations, but al...

Nov 7 2014  
  Practical and efficient cryptographic enforcement of interval-based access control policies
Crampton J. ACM Transactions on Information and System Security 14(1): 1-30, 2011.  Type: Article

Cryptography-based hierarchical access control has received considerable attention, particularly in recent years. Since its conception, various enforcement schemes have been proposed that address the performance issues and various acce...

Dec 12 2011  
 
 
   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy