Sciweavers

1769 search results - page 29 / 354
» Cryptography
Sort
View
CARDIS
1998
Springer
103views Hardware» more  CARDIS 1998»
15 years 1 months ago
Secure Personalization Using Proxy Cryptography
In this paper we describe new secure personalization schemes using proxy cryptography. We first introduce the context of a large scale smart card application such as an electronic ...
Pierre Girard
DSD
2008
IEEE
110views Hardware» more  DSD 2008»
14 years 11 months ago
VLSI Implementation of a Cryptography-Oriented Reconfigurable Array
The long-word and very long-word addition required in cryptography applications generally requires custom hardware support provided by ASICs or application-specific instructions i...
Scott Miller, Ambrose Chu, Mihai Sima, Michael McG...
70
Voted
DAM
2008
92views more  DAM 2008»
14 years 9 months ago
Applications to cryptography of twisting commutative algebraic groups
We give an overview on twisting commutative algebraic groups and applications to discrete log based cryptography. We explain how discrete log based cryptography over extension fie...
Alice Silverberg
64
Voted
IANDC
2007
106views more  IANDC 2007»
14 years 9 months ago
Extended visual cryptography schemes
Visual cryptography schemes have been introduced in 1994 by Naor and Shamir. Their idea was to encode a secret image into n shadow images and to give exactly one such shadow image ...
Andreas Klein, Markus Wessler
GLOBECOM
2010
IEEE
14 years 7 months ago
Secure Cooperation Incentive Scheme with Limited Use of Public Key Cryptography for Multi-Hop Wireless Network
Abstract-Secure cooperation incentive schemes usually use public key cryptography, which incur too heavy overhead to be used efficiently in limited-resource nodes. In this paper, w...
Mohamed Elsalih Mahmoud, Xuemin Shen