Sciweavers

351 search results - page 2 / 71
» Public-Key Cryptography and Availability
Sort
View
ACSAC
2000
IEEE
13 years 10 months ago
Introducing Decryption Authority into PKI
It is well-known that CA plays the central role in PKI. In this paper we introduce a new component into PKI, DA (decryption authority), which decrypts important and sensitive mess...
Feng Bao
CHES
2004
Springer
104views Cryptology» more  CHES 2004»
13 years 11 months ago
Public Key Authentication with One (Online) Single Addition
Marc Girault, David Lefranc
PERCOM
2005
ACM
14 years 5 months ago
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-bit microcontroller platform. We present a comparison of two...
Arvinderpal Wander, Nils Gura, Hans Eberle, Vipul ...
IDTRUST
2009
ACM
14 years 10 days ago
Quantum resistant public key cryptography: a survey
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which c...
Ray A. Perlner, David A. Cooper