Sciweavers

2108 search results - page 8 / 422
» Encrypted
Sort
View
107
Voted
BIOSIG
2009
169views Biometrics» more  BIOSIG 2009»
14 years 10 months ago
Reverse Public Key Encryption
Abstract. This exposition paper suggests a new low-bandwidth publickey encryption paradigm. The construction turns a weak form of key privacy into message privacy as follows: let E...
David Naccache, Rainer Steinwandt, Moti Yung
194
Voted
CRYPTO
1997
Springer
207views Cryptology» more  CRYPTO 1997»
15 years 4 months ago
Public-Key Cryptosystems from Lattice Reduction Problems
We present a new proposal for a trapdoor one-way function, from which we derive public-key encryption and digital signatures. The security of the new construction is based on the ...
Oded Goldreich, Shafi Goldwasser, Shai Halevi
104
Voted
CSFW
2009
IEEE
15 years 7 months ago
Universally Composable Symmetric Encryption
For most basic cryptographic tasks, such as public key encryption, digital signatures, authentication, key exchange, and many other more sophisticated tasks, ideal functionalities...
Ralf Küsters, Max Tuengerthal
137
Voted
DSD
2006
IEEE
183views Hardware» more  DSD 2006»
15 years 6 months ago
Design and Implementation of Low-Area and Low-Power AES Encryption Hardware Core
The Advanced Encryption Standard (AES) algorithm has become the default choice for various security services in numerous applications. In this paper we present an AES encryption h...
Panu Hämäläinen, Timo Alho, Marko H...
103
Voted
CRYPTO
1997
Springer
169views Cryptology» more  CRYPTO 1997»
15 years 4 months ago
Deniable Encryption
Consider a situation in which the transmission of encrypted messages is intercepted by an adversary who can later ask the sender to reveal the random choices and also the secret ...
Ran Canetti, Cynthia Dwork, Moni Naor, Rafail Ostr...