134
Voted
CTRSA
15 years 8 months ago
2004 Springer
We describe a block-cipher mode of operation, EME, that turns an n-bit block cipher into
134
click to vote
CTRSA
15 years 7 months ago
2004 Springer
Abstract. Secure authentication frequently depends on the correct recognition of a user's public key. When there is no certificate authority, this key is obtained from other u...
132
click to vote
CTRSA
15 years 8 months ago
2004 Springer
This paper presents a scalable hardware implementation of both commonly used public key cryptosystems, RSA and Elliptic Curve Cryptosystem (ECC) on the same platform. The introduce...
128
click to vote
CTRSA
15 years 8 months ago
2004 Springer
Abstract. In this paper, we give a first example of identity based undeniable signature using pairings over elliptic curves. We extend to the identity based setting the security m...
119
click to vote
CTRSA
15 years 8 months ago
2004 Springer
We introduce a new cryptographic technique that we call universal re-encryption. A conventional cryptosystem that permits reencryption, such as ElGamal, does so only for a player w...
|