Sciweavers

2108 search results - page 239 / 422
» Encrypted
Sort
View
CORR
2010
Springer
97views Education» more  CORR 2010»
15 years 4 months ago
Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Several ...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
133
Voted
CORR
2010
Springer
135views Education» more  CORR 2010»
15 years 4 months ago
Cryptanalysis of an Elliptic Curve-based Signcryption Scheme
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Although...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
JCST
2008
128views more  JCST 2008»
15 years 4 months ago
t-Private and t-Secure Auctions
In most of the used auction systems the values of bids are known to the auctioneer. This allows him to manipulate the outcome of the auction. Hence, one is interested in hiding th...
Markus Hinkelmann, Andreas Jakoby, Peer Stechert
CRYPTOLOGIA
2007
72views more  CRYPTOLOGIA 2007»
15 years 4 months ago
Zimmermann Telegram: The Original Draft
This article presents the original draft of the Zimmermann telegram from 1917 in facsimile. Its various annotations provide interesting insights, such as the idea to promise Califo...
Joachim von zur Gathen
ENTCS
2007
96views more  ENTCS 2007»
15 years 4 months ago
Cryptographic Pattern Matching
We construct a language extension for process calculi for modelling the exchange of cryptographically composed data. More specifically, we devise a succinct syntax for terms and ...
Christoffer Rosenkilde Nielsen, Flemming Nielson, ...