Sciweavers

283 search results - page 17 / 57
» Bi-Deniable Public-Key Encryption
Sort
View
PKC
1998
Springer
135views Cryptology» more  PKC 1998»
15 years 1 months ago
A Signcryption Scheme with Signature Directly Verifiable by Public Key
Signcryption, first proposed by Zheng [4,5], is a cryptographic primitive which combines both the functions of digital signature and public key encryption in a logical single step,...
Feng Bao, Robert H. Deng
FPL
2007
Springer
154views Hardware» more  FPL 2007»
15 years 3 months ago
Physical Unclonable Functions, FPGAs and Public-Key Crypto for IP Protection
In recent years, IP protection of FPGA hardware designs has become a requirement for many IP vendors. To this end solutions have been proposed based on the idea of bitstream encry...
Jorge Guajardo, Sandeep Kumar, Geert Jan Schrijen,...
85
Voted
INFORMATICALT
2006
134views more  INFORMATICALT 2006»
14 years 9 months ago
Fast Parallel Exponentiation Algorithm for RSA Public-Key Cryptosystem
We know the necessity for information security becomes more widespread in these days, especially for hardware-based implementations such as smart cards chips for wireless applicati...
Chia-Long Wu, Der-Chyuan Lou, Jui-Chang Lai, Te-Je...
82
Voted
CORR
2010
Springer
112views Education» more  CORR 2010»
14 years 9 months ago
Little Dragon Two: An efficient Multivariate Public Key Cryptosystem
In 1998 [8], Patarin proposed an efficient cryptosystem called Little Dragon which was a variant of Matsumoto Imai cryptosystem C . However Patarin later found that Little Dragon ...
Rajesh P. Singh, Anupam Saikia, B. K. Sarma
NSPW
2003
ACM
15 years 2 months ago
Public key distribution through "cryptoIDs"
In this paper, we argue that person-to-person key distribution is best accomplished with a key-centric approach, instead of PKI: users should distribute public key fingerprints in...
Trevor Perrin