Sciweavers

1769 search results - page 64 / 354
» Cryptography
Sort
View
CARDIS
2004
Springer
126views Hardware» more  CARDIS 2004»
15 years 3 months ago
Anonymous Services using Smart Cards and Cryptography
More and more services provided by Internet pose a problem of privacy and anonymity. One cryptographic tool that could be used for solving this problem is the group signature [1, 5...
Sébastien Canard, Jacques Traoré
CRYPTO
2004
Springer
162views Cryptology» more  CRYPTO 2004»
15 years 3 months ago
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
We propose the first distributed discrete-log key generation (DLKG) protocol from scratch which is adaptively-secure in the non-erasure model, and at the same time completely avoi...
Masayuki Abe, Serge Fehr
CRYPTO
2004
Springer
123views Cryptology» more  CRYPTO 2004»
15 years 3 months ago
Asymptotically Optimal Communication for Torus-Based Cryptography
Abstract. We introduce a compact and efficient representation of elements of the algebraic torus. This allows us to design a new discretelog based public-key system achieving the o...
Marten van Dijk, David P. Woodruff
EUROPKI
2004
Springer
15 years 3 months ago
On the Use of Weber Polynomials in Elliptic Curve Cryptography
Abstract. In many cryptographic applications it is necessary to generate elliptic curves (ECs) with certain security properties. These curves are commonly constructed using the Com...
Elisavet Konstantinou, Yannis C. Stamatiou, Christ...
FC
2004
Springer
81views Cryptology» more  FC 2004»
15 years 3 months ago
Cryptography and the French Banking Cards: Past, Present, Future
Abstract. This is a brief summary of the invited lecture delivered during the conference. The interested reader is referred to [2] for more information.
Jacques Stern