132
click to vote
CTRSA
15 years 6 months ago
2004 Springer
Abstract. Secure authentication frequently depends on the correct recognition of a user's public key. When there is no certificate authority, this key is obtained from other u...
131
click to vote
CTRSA
15 years 8 months ago
2004 Springer
This paper presents a scalable hardware implementation of both commonly used public key cryptosystems, RSA and Elliptic Curve Cryptosystem (ECC) on the same platform. The introduce...
129
click to vote
CTRSA
15 years 8 months ago
2004 Springer
We describe a block-cipher mode of operation, EME, that turns an n-bit block cipher into
126
click to vote
CTRSA
15 years 8 months ago
2004 Springer
Abstract. In this paper, we give a first example of identity based undeniable signature using pairings over elliptic curves. We extend to the identity based setting the security m...
117
click to vote
CTRSA
15 years 8 months ago
2004 Springer
Abstract. A compact mesh architecture for supporting the relation collection step of the number field sieve is described. Differing from TWIRL, only isolated chips without inter-...
|