Automating Cryptographic Code Generation
Abstract
Index Terms
- Automating Cryptographic Code Generation
Recommendations
Cryptographic tamper evidence
CCS '03: Proceedings of the 10th ACM conference on Computer and communications securityWe propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div can determine whether one of them was generated by the forger. ...
Escrow-free encryption supporting cryptographic workflow
Since Boneh and Franklin published their seminal paper on identity based encryption (IBE) using the Weil pairing, there has been a great deal of interest in cryptographic primitives based on elliptic-curve pairings. One particularly interesting ...
New code-based cryptographic accumulator and fully dynamic group signature
AbstractA cryptographic accumulator is a cryptographic primitive which produces a succinct aggregate of a set of elements. This type of scheme allows to produce a membership proof for each element of the set. In this paper, we propose a code-based ...
Comments
Information & Contributors
Information
Published In

- General Chairs:
- Chip Hong Chang,
- Ulrich Rührmair,
- Program Chairs:
- Debdeep Mukhopadhyay,
- Domenic Forte
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Keynote
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigsac
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 55Total Downloads
- Downloads (Last 12 months)5
- Downloads (Last 6 weeks)1
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in