Sciweavers

1825 search results - page 84 / 365
» Cryptographic Securities Exchanges
Sort
View
109
Voted
CRYPTO
2000
Springer
128views Cryptology» more  CRYPTO 2000»
15 years 8 months ago
The XTR Public Key System
This paper introduces the XTR public key system. XTR is based on a new method to represent elements of a subgroup of a multiplicative group of a finite field. Application of XTR ...
Arjen K. Lenstra, Eric R. Verheul
IMA
1997
Springer
106views Cryptology» more  IMA 1997»
15 years 7 months ago
Hash Functions and MAC Algorithms Based on Block Ciphers
This paper reviews constructions of hash functions and MAC algorithms based on block ciphers. It discusses the main requirements for these cryptographic primitives, motivates these...
Bart Preneel
160
Voted
FOCS
2010
IEEE
15 years 1 months ago
On the Computational Complexity of Coin Flipping
Coin flipping is one of the most fundamental tasks in cryptographic protocol design. Informally, a coin flipping protocol should guarantee both (1) Completeness: an honest executi...
Hemanta K. Maji, Manoj Prabhakaran, Amit Sahai
121
Voted
CSI
2004
110views more  CSI 2004»
15 years 3 months ago
A novel three-party encrypted key exchange protocol
The key exchange protocol is one of the most elegant ways of establishing secure communication between pair of users by using a session key. The passwords are of low entropy, henc...
Chin-Chen Chang, Ya-Fen Chang
120
Voted
HIKM
2006
ACM
15 years 9 months ago
A flexible approach for electronic medical records exchange
Many methodologies have been proposed in the last decade for integration and exchange of medical data. However, little progress has occurred due to the following reasons. First, p...
Vagelis Hristidis, Peter J. Clarke, Nagarajan Prab...