Sciweavers

248 search results - page 20 / 50
» Authentication Primitives and Their Compilation
Sort
View
ISW
2000
Springer
15 years 1 months ago
A Signcryption Scheme Based on Integer Factorization
Abstract. Signcryption is a public-key cryptographic primitive introduced by Zheng, which achieves both message confidentiality and nonrepudiatable origin authenticity, at a lower ...
Ron Steinfeld, Yuliang Zheng
ICCAD
2001
IEEE
91views Hardware» more  ICCAD 2001»
15 years 6 months ago
A System for Synthesizing Optimized FPGA Hardware from MATLAB
Efficient high level design tools that can map behavioral descriptions to FPGA architectures are one of the key requirements to fully leverage FPGA for high throughput computatio...
Malay Haldar, Anshuman Nayak, Alok N. Choudhary, P...
STORAGESS
2005
ACM
15 years 3 months ago
Toward securing untrusted storage without public-key operations
Adding security capabilities to shared, remote and untrusted storage file systems leads to performance degradation that limits their use. Public-key cryptographic primitives, wid...
Dalit Naor, Amir Shenhav, Avishai Wool
EUC
2008
Springer
14 years 11 months ago
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
Abstract. Signcryption is a cryptographic primitive that aims at providing confidentiality and authentication simultaneously. Recently in May 2008, a scheme for identity based thre...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
CORR
2008
Springer
141views Education» more  CORR 2008»
14 years 10 months ago
Automatic Verification of Correspondences for Security Protocols
We present a new technique for verifying correspondences in security protocols. In particular, correspondences can be used to formalize authentication. Our technique is fully auto...
Bruno Blanchet