Sciweavers

317 search results - page 8 / 64
» Certificateless Public Key Cryptography
Sort
View
FI
2011
96views more  FI 2011»
14 years 4 months ago
A Distributed Public Key Infrastructure Based on Threshold Cryptography for the HiiMap Next Generation Internet Architecture
: In this article, a security extension for the HiiMap Next Generation Internet Architecture is presented. We regard a public key infrastructure which is integrated into the mappin...
Oliver Hanka, Michael Eichhorn, Martin Pfannenstei...
AAECC
2006
Springer
125views Algorithms» more  AAECC 2006»
14 years 9 months ago
Combinatorial Group Theory and Public Key Cryptography
Abstract. After some excitement generated by recently suggested public key exchange protocols due to Anshel-Anshel-Goldfeld and Ko-Lee et al., it is a prevalent opinion now that th...
Vladimir Shpilrain, Gabriel Zapata
70
Voted
FDTC
2006
Springer
80views Cryptology» more  FDTC 2006»
15 years 1 months ago
Robust Finite Field Arithmetic for Fault-Tolerant Public-Key Cryptography
We present a new approach to fault tolerant public key cryptography based on redundant arithmetic in finite rings. Redundancy is achieved by embedding non-redundant field or ring ...
Gunnar Gaubatz, Berk Sunar
DATE
2008
IEEE
140views Hardware» more  DATE 2008»
15 years 4 months ago
FPGA Design for Algebraic Tori-Based Public-Key Cryptography
Algebraic torus-based cryptosystems are an alternative for Public-Key Cryptography (PKC). It maintains the security of a larger group while the actual computations are performed i...
Junfeng Fan, Lejla Batina, Kazuo Sakiyama, Ingrid ...
STOC
2010
ACM
226views Algorithms» more  STOC 2010»
15 years 7 months ago
Public-Key Cryptography from Different Assumptions
We construct a new public key encryption based on two assumptions:
Benny Applebaum, Boaz Barak and Avi Wigderson