Sciweavers

1769 search results - page 87 / 354
» Cryptography
Sort
View
SCN
2004
Springer
121views Communications» more  SCN 2004»
15 years 3 months ago
ECRYPT: The Cryptographic Research Challenges for the Next Decade
Abstract. In the past thirty years, cryptology has evolved from a secret art to a modern science. Weaker algorithms and algorithms with short keys are disappearing, political contr...
Bart Preneel
ISW
1997
Springer
15 years 1 months ago
Signcryption and Its Applications in Efficient Public Key Solutions
Signcryption is a new paradigm in public key cryptography that simultaneously fulfills both the functions of digital signature and public key encryption in a logically single step,...
Yuliang Zheng
SCN
2008
Springer
147views Communications» more  SCN 2008»
14 years 9 months ago
New Anonymity Notions for Identity-Based Encryption
ded abstract of this paper appeared in Proceedings of the 6th Conference on Security and Cryptography for Networks (SCN '08)
Malika Izabachène, David Pointcheval
ICIP
1998
IEEE
15 years 11 months ago
Hiding Information in Images
In this study, a new algorithm is proposed for the cryptography and steganography of an image or text. There is a variety of steganography and cryptography tools which are commonl...
Lisa M. Marvel, Charles T. Retter, Charles G. Bonc...
EUROPKI
2005
Springer
15 years 3 months ago
Interoperation Between a Conventional PKI and an ID-Based Infrastructure
Abstract. In this paper we consider how practical interoperation between a conventional PKI and an infrastructure based on ID-based cryptography might be achieved. Major issues ari...
Geraint Price, Chris J. Mitchell