Sciweavers

2108 search results - page 172 / 422
» Encrypted
Sort
View
145
Voted
PQCRYPTO
2010
298views Cryptology» more  PQCRYPTO 2010»
15 years 7 months ago
Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes
Abstract. In this paper a new structural attack on the McEliece/Niederreiter public key cryptosystem based on subcodes of generalized ReedSolomon codes proposed by Berger and Loidr...
Christian Wieschebrink
130
Voted
AINA
2004
IEEE
15 years 7 months ago
Using the Extension Function of XSLT and DSL to Secure XML Documents
XSLT is a very popular and flexible language for transforming XML documents which provides a powerful implementation of a tree-oriented transformation language for transmuting ins...
Tao-Ku Chang, Gwan-Hwan Hwang
134
Voted
ASIACRYPT
2006
Springer
15 years 7 months ago
HIBE With Short Public Parameters Without Random Oracle
Abstract. At Eurocrypt 2005, Waters presented an identity based encryption (IBE) protocol which is secure in the full model without random oracle. In this paper, we extend Waters&#...
Sanjit Chatterjee, Palash Sarkar
114
Voted
DATE
2004
IEEE
110views Hardware» more  DATE 2004»
15 years 7 months ago
Interactive Cosimulation with Partial Evaluation
We present a technique to improve the efficiency of hardware-software cosimulation, using design information known at simulator compile-time. The generic term for such optimizatio...
Patrick Schaumont, Ingrid Verbauwhede
120
Voted
CHES
2006
Springer
119views Cryptology» more  CHES 2006»
15 years 7 months ago
NanoCMOS-Molecular Realization of Rijndael
This paper describes the implementation of the Advanced Encryption Standard Algorithm, Rijndael, in a new nanoscale technology, called CMOL. This technology consists of an array of...
Massoud Masoumi, Farshid Raissi, Mahmoud Ahmadian