Sciweavers

317 search results - page 5 / 64
» Certificateless Public Key Cryptography
Sort
View
IH
2009
Springer
16 years 1 days ago
Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions
Abstract. A physically unclonable function (PUF) is a multiple-input, multipleoutput, large entropy physical system that is unreproducible due to its structural complexity. A publi...
Nathan Beckmann, Miodrag Potkonjak
CRYPTO
1993
Springer
110views Cryptology» more  CRYPTO 1993»
15 years 9 months ago
Secret-Key Agreement without Public-Key Cryptography
Frank Thomson Leighton, Silvio Micali
153
Voted
CIS
2006
Springer
15 years 9 months ago
A Key Distribution Scheme Based on Public Key Cryptography for Sensor Networks
Xiaolong Li, Yaping Lin, Siqing Yang, Yeqing Yi, J...
GLOBECOM
2007
IEEE
15 years 11 months ago
Certificateless Authenticated Group Key Agreement Protocol for Dynamic Groups
A Group Key Agreement protocol is a process to establish a cryptographic key for a group of participants over an open network. In this paper, we propose a group key agreement(CAGKA...
Sungchul Heo, Zeen Kim, Kwangjo Kim
CHES
2004
Springer
104views Cryptology» more  CHES 2004»
15 years 11 months ago
Public Key Authentication with One (Online) Single Addition
Marc Girault, David Lefranc