Sciweavers

27 search results - page 1 / 6
» A "proof-reading" of Some Issues in Cryptography
Sort
View
ICALP
2007
Springer
13 years 10 months ago
A "proof-reading" of Some Issues in Cryptography
Abstract. In this paper, we identify some issues in the interplay between practice and theory in cryptography, issues that have repeatedly appeared in different incarnations over ...
Ivan Damgård
PODC
2003
ACM
13 years 9 months ago
Cryptography and competition policy: issues with 'trusted computing'
The most significant strategic development in information technology over the past year has been ‘trusted computing’. This is popularly associated with Microsoft’s ‘Pallad...
Ross J. Anderson
IDTRUST
2009
ACM
13 years 11 months ago
Quantum resistant public key cryptography: a survey
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which c...
Ray A. Perlner, David A. Cooper
CCS
2007
ACM
13 years 10 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
SIGUCCS
1999
ACM
13 years 8 months ago
Who's Got the Key?
This paper attempts to illuminate several fundamental concepts used in the creation of a Public Key Infrastructure (PKI). These concepts include encryption, public key cryptograph...
David Henry