Sciweavers

16 search results - page 1 / 4
» ID-based cryptography using symmetric primitives
Sort
View
DCC
2007
IEEE
15 years 11 months ago
ID-based cryptography using symmetric primitives
A general method for deriving an identity-based public key cryptosystem from a one-way function is described. We construct both ID-based signature schemes and ID-based encryption ...
Chris J. Mitchell, Fred Piper, Peter R. Wild
FSE
2005
Springer
112views Cryptology» more  FSE 2005»
15 years 5 months ago
How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4 Processors
Abstract. This paper discusses the state-of-the-art software optimization methodology for symmetric cryptographic primitives on Pentium III and 4 processors. We aim at maximizing s...
Mitsuru Matsui, Sayaka Fukuda
ICDCSW
2007
IEEE
15 years 6 months ago
Exploring Symmetric Cryptography for Secure Network Reprogramming
Recent secure code-update protocols for sensor networks have been based on asymmetric-crypto primitives such as digital signatures. Our approach, Castor, explores the feasibility ...
Donnie H. Kim, Rajeev Gandhi, Priya Narasimhan
STOC
2009
ACM
145views Algorithms» more  STOC 2009»
16 years 6 days ago
Non-malleable extractors and symmetric key cryptography from weak secrets
We study the question of basing symmetric key cryptography on weak secrets. In this setting, Alice and Bob share an n-bit secret W, which might not be uniformly random, but the ad...
Yevgeniy Dodis, Daniel Wichs
CSFW
2004
IEEE
15 years 3 months ago
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library
Recently we showed how to justify a Dolev-Yao type model of cryptography as used in virtually all automated protocol provers under active attacks and in arbitrary protocol environ...
Michael Backes, Birgit Pfitzmann