Sciweavers

468 search results - page 58 / 94
» A Certified Digital Signature
Sort
View
DATE
2009
IEEE
118views Hardware» more  DATE 2009»
15 years 5 months ago
Variation resilient adaptive controller for subthreshold circuits
Subthreshold logic is showing good promise as a viable ultra-low-power circuit design technique for powerlimited applications. For this design technique to gain widespread adoption...
Biswajit Mishra, Bashir M. Al-Hashimi, Mark Zwolin...
CORR
2010
Springer
97views Education» more  CORR 2010»
15 years 2 months ago
Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Several ...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
CORR
2010
Springer
135views Education» more  CORR 2010»
15 years 2 months ago
Cryptanalysis of an Elliptic Curve-based Signcryption Scheme
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Although...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
JNW
2008
103views more  JNW 2008»
15 years 1 months ago
Key Revocation System for DNSSEC
Abstract-- The Domain Name System (DNS) is a distributed tree-based database largely used to translate a human readable machine name into an IP address. The DNS security extensions...
Gilles Guette
ENTCS
2007
96views more  ENTCS 2007»
15 years 1 months ago
Cryptographic Pattern Matching
We construct a language extension for process calculi for modelling the exchange of cryptographically composed data. More specifically, we devise a succinct syntax for terms and ...
Christoffer Rosenkilde Nielsen, Flemming Nielson, ...