Sciweavers

2108 search results - page 51 / 422
» Encrypted
Sort
View
100
Voted
SICHERHEIT
2008
15 years 2 months ago
Efficiency Improvement for NTRU
Abstract: The NTRU encryption scheme is an interesting alternative to well-established encryption schemes such as RSA, ElGamal, and ECIES. The security of NTRU relies on the hardne...
Johannes Buchmann, Martin Döring, Richard Lin...
104
Voted
CN
2006
83views more  CN 2006»
15 years 27 days ago
A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms
This paper presents an assessment of the communication overheads of IPsec and evaluates the feasibility of deploying it on handheld devices for the UMTS architecture. A wide range...
Christos Xenakis, Nikolaos Laoutaris, Lazaros F. M...
124
Voted
CRYPTOLOGIA
2006
155views more  CRYPTOLOGIA 2006»
15 years 26 days ago
The Whirlpool Secure Hash Function
In this paper, we describe Whirlpool, which is a block-cipher-based secure hash function. Whirlpool produces a hash code of 512 bits for an input message of maximum length less tha...
William Stallings
106
Voted
JCSS
2008
96views more  JCSS 2008»
15 years 25 days ago
Stateless data concealment for distributed systems
With the growing number of Web applications and their variety, the need to prevent unauthorised access to data and to ensure data integrity in distributed systems has led to an in...
Rachid Anane, Sukhvir Dhillon, Behzad Bordbar
111
Voted
PROVSEC
2010
Springer
14 years 10 months ago
Efficient Confirmer Signatures from the "Signature of a Commitment" Paradigm
Generic constructions of designated confirmer signatures follow one of the following two strategies; either produce a digital signature on the message to be signed, then encrypt th...
Laila El Aimani