Sciweavers

9 search results - page 1 / 2
» cisc 2006
Sort
View
CISC
2006
Springer
95views Cryptology» more  CISC 2006»
13 years 6 months ago
A Revocation Scheme Preserving Privacy
Lukasz Krzywiecki, Przemyslaw Kubiak, Miroslaw Kut...
HPCA
2006
IEEE
14 years 5 months ago
An approach for implementing efficient superscalar CISC processors
An integrated, hardware / software co-designed CISC processor is proposed and analyzed. The objectives are high performance and reduced complexity. Although the x86 ISA is targete...
Shiliang Hu, Ilhyun Kim, Mikko H. Lipasti, James E...
CISC
2006
Springer
104views Cryptology» more  CISC 2006»
13 years 8 months ago
Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes
Abstract. A public-key cryptosystem is usually used for key management, in particular to session key management. The paper presents a method for handling a batch of concurrent keys...
Yongdong Wu, Feng Bao
CISC
2006
Springer
103views Cryptology» more  CISC 2006»
13 years 8 months ago
Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme
In this paper, we investigate the problem of increasing the threshold parameter of the Shamir (t, n)-threshold scheme without interacting with the dealer. Our construction will re...
Christophe Tartary, Huaxiong Wang
CISC
2006
Springer
131views Cryptology» more  CISC 2006»
13 years 8 months ago
Efficient Intrusion-Resilient Signatures Without Random Oracles
Intrusion-resilient signatures are key-evolving protocols that extend the concepts of forward-secure and key-insulated signatures. As in the latter schemes, time is divided into di...
Benoît Libert, Jean-Jacques Quisquater, Moti...