Sciweavers

341 search results - page 20 / 69
» Deniable Functional Encryption
Sort
View
IH
1998
Springer
15 years 2 months ago
On Software Protection via Function Hiding
Software piracy is a major economic problem: it leads to revenue losses, it favors big software houses that are less hurt by these losses and it prevents new software economy model...
Tomas Sander, Christian F. Tschudin
DCC
2007
IEEE
15 years 10 months ago
ID-based cryptography using symmetric primitives
A general method for deriving an identity-based public key cryptosystem from a one-way function is described. We construct both ID-based signature schemes and ID-based encryption ...
Chris J. Mitchell, Fred Piper, Peter R. Wild
SYNASC
2007
IEEE
142views Algorithms» more  SYNASC 2007»
15 years 4 months ago
An Extension of the RSA Trapdoor in a KEM/DEM Framework
A trapdoor based on an extension of the RSA trapdoor is proposed. The same function as in the RSA cryptosystem is used, i.e. x modn, but there is no restriction for the exponent t...
Bogdan Groza
CCS
2008
ACM
15 years 19 days ago
Certificateless signcryption
Certificateless cryptography achieves the best of the two worlds: it inherits from identity-based techniques a solution to the certificate management problem in public-key encrypti...
Manuel Barbosa, Pooya Farshim
IJNSEC
2011
167views more  IJNSEC 2011»
14 years 5 months ago
New Real Time Multicast Authentication Protocol
Multicast gives professional large-scale content distribution by providing an efficient transport mechanism for one-to-many and many-to-many communications. There is a number of s...
Riham Abdellatif, Heba Kamal Aslan, Salwa H. Elram...