Sciweavers

1769 search results - page 31 / 354
» Cryptography
Sort
View
96
Voted
ISCAS
2002
IEEE
112views Hardware» more  ISCAS 2002»
15 years 2 months ago
Tradeoff analysis of FPGA based elliptic curve cryptography
FPGAs are an attractive platform for elliptic curve cryptography hardware. Since field multiplication is the most critical operation in elliptic curve cryptography, we have studi...
Marcus Bednara, M. Daldrup, Jürgen Teich, Joa...
INFORMATICALT
2010
170views more  INFORMATICALT 2010»
14 years 7 months ago
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original sign...
Hu Xiong, Fagen Li, Zhiguang Qin
SIGCSE
2004
ACM
95views Education» more  SIGCSE 2004»
15 years 3 months ago
Cryptography and computer security for undergraduates
The panel discusses solutions to the problem of computer security education. Categories and Subject Descriptors C.2.0 [Computer-Communication Networks]: security and protection. E...
Paul De Palma, Charles Frank, Suzanne E. Gladfelte...
ECSQARU
2003
Springer
15 years 2 months ago
Web of Trust: Applying Probabilistic Argumentation to Public-Key Cryptography
1 The purpose of this paper is to show how probabilistic argumentation is applicable to modern public-key cryptography as an appropriate tool to evaluate webs of trust. This is an ...
Rolf Haenni
PKC
1998
Springer
95views Cryptology» more  PKC 1998»
15 years 1 months ago
Overview of Elliptic Curve Cryptography
In this article, we look at the elliptic curve cryptography, which is believed to be one of the most promising candidates for the next generation cryptographic tool. The following ...
Kiyomichi Araki, Takakazu Satoh, Shinji Miura