Sciweavers

2108 search results - page 158 / 422
» Encrypted
Sort
View
ICPR
2008
IEEE
15 years 10 months ago
A cryptosystem based on palmprint feature
Biometric cryptography is a technique using biometric features to encrypt data, which can improve the security of the encrypted data and overcome the shortcomings of the tradition...
Xiangqian Wu, Kuanquan Wang, David Zhang
AFRICACRYPT
2008
Springer
15 years 10 months ago
Implementation of the AES-128 on Virtex-5 FPGAs
Abstract. This paper presents an updated implementation of the Advanced Encryption Standard (AES) on the recent Xilinx Virtex-5 FPGAs. We show how a modified slice structure in th...
Philippe Bulens, François-Xavier Standaert,...
115
Voted
ICC
2007
IEEE
103views Communications» more  ICC 2007»
15 years 10 months ago
Light-Weight Fair-Dealing Infrastructures (FADIS) for M-Commerce
Abstract— An important issue in mobile commerce (mcommerce) is to exchange digital data between two distributed parties in an efficient and fair manner. In this paper, a lightwe...
Huafei Zhu, Feng Bao
139
Voted
SYNASC
2007
IEEE
142views Algorithms» more  SYNASC 2007»
15 years 9 months ago
An Extension of the RSA Trapdoor in a KEM/DEM Framework
A trapdoor based on an extension of the RSA trapdoor is proposed. The same function as in the RSA cryptosystem is used, i.e. x modn, but there is no restriction for the exponent t...
Bogdan Groza
113
Voted
FSE
2007
Springer
104views Cryptology» more  FSE 2007»
15 years 9 months ago
How to Enrich the Message Space of a Cipher
Abstract. Given (deterministic) ciphers E and E that can encipher messages of l and n bits, respectively, we construct a cipher E∗ = XLS[E, E] that can encipher messages of l + s...
Thomas Ristenpart, Phillip Rogaway