Results 231 to 240 of about 105,934 (253)
Some of the next articles are maybe not open access.

Efficient Signcryption Without Random Oracles

2006
Signcryption is an asymmetric cryptographic method that simultaneously provides confidentiality and authenticity at a lower computational and communication overhead. A number of signcryption schemes have been proposed in the literature, but they are only proven to be secure in the random oracle model.
Qianhong Wu   +3 more
openaire   +1 more source

Random Oracles and Non-uniformity

2018
We revisit security proofs for various cryptographic primitives in the auxiliary-input random-oracle model (AI-ROM), in which an attacker \(\mathcal A\) can compute arbitrary S bits of leakage about the random oracle \(\mathcal O\) before attacking the system and then use additional T oracle queries to \(\mathcal O\) during the attack.
Sandro Coretti   +3 more
openaire   +1 more source

Leaky Random Oracle (Extended Abstract)

2008
This work focuses on vulnerability of hash functions due to sloppy usage or implementation in the real world. If our cryptographic research community succeeded in development of perfectly secure random function as random oracle, it might be broken in some sense by invalid uses. In this paper, we propose a new variant of the random oracle model in order
Kazuki Yoneyama   +2 more
openaire   +1 more source

Thwarting All Logic Locking Attacks: Dishonest Oracle With Truly Random Logic Locking

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2021
Nimisha Limaye   +2 more
exaly  

The Adaptive Lasso and Its Oracle Properties

Journal of the American Statistical Association, 2006
Hui Zou
exaly  

Home - About - Disclaimer - Privacy