Sciweavers

2432 search results - page 115 / 487
» Cryptographic logical relations
Sort
View
69
Voted
AICCSA
2005
IEEE
87views Hardware» more  AICCSA 2005»
15 years 6 months ago
A XML format secure protocol - OpenSST
OpenSST (Open Simple Secure Transaction) is a free software project and aims to create an efficient, open and secure alternative to the secure proprietary transaction protocol. Op...
Xinhua Zhang, Chunyan Jiang, Wanjun Huang, Christo...
PKC
1998
Springer
135views Cryptology» more  PKC 1998»
15 years 4 months ago
A Signcryption Scheme with Signature Directly Verifiable by Public Key
Signcryption, first proposed by Zheng [4,5], is a cryptographic primitive which combines both the functions of digital signature and public key encryption in a logical single step,...
Feng Bao, Robert H. Deng
118
Voted
ISICT
2003
15 years 2 months ago
Analysis of a mobile communication security protocol
: Cryptographic protocols are used to achieve secure communication over insecure networks. Weaknesses in such protocols are hard to identify, as they can be the result of subtle de...
Tom Coffey, Reiner Dojen
85
Voted
CORR
2006
Springer
105views Education» more  CORR 2006»
15 years 20 days ago
Knowledge Flow Analysis for Security Protocols
Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of know...
Emina Torlak, Marten van Dijk, Blaise Gassend, Dan...
96
Voted
CEE
2007
105views more  CEE 2007»
15 years 19 days ago
Compact modular exponentiation accelerator for modern FPGA devices
We present a compact FPGA implementation of a modular exponentiation accelerator suited for cryptographic applications. The implementation efficiently exploits the properties of m...
Timo Alho, Panu Hämäläinen, Marko H...