Sciweavers

20175 search results - page 118 / 4035
» Is abstraction the key to computing
Sort
View
174
Voted

Publication
640views
16 years 12 months ago
Foundations of Mechanism Design: A Tutorial - Part 1: Key Concepts and Classical Results
Foundations of Mechanism Design: A Tutorial - Part 1: Key Concepts and Classical Results
Dinesh Garg, Y Narahari, Sujit Gujar
88
Voted
PERCOM
2007
ACM
16 years 10 days ago
Public-Key Cryptography for RFID-Tags
Lejla Batina, Jorge Guajardo, Tim Kerins, Nele Men...
CRYPTO
2007
Springer
132views Cryptology» more  CRYPTO 2007»
15 years 7 months ago
Secure Hybrid Encryption from Weakened Key Encapsulation
We put forward a new paradigm for building hybrid encryption schemes from constrained chosen-ciphertext secure (CCCA) key-encapsulation mechanisms (KEMs) plus authenticated symmet...
Dennis Hofheinz, Eike Kiltz
ESAS
2007
Springer
15 years 7 months ago
Enabling Full-Size Public-Key Algorithms on 8-Bit Sensor Nodes
Abstract. In this article we present the fastest known implementation of a modular multiplication for a 160-bit standard compliant elliptic curve (secp160r1) for 8-bit micro contro...
Leif Uhsadel, Axel Poschmann, Christof Paar
97
Voted
ACISP
2005
Springer
15 years 6 months ago
Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS
Abstract. Multivariate public-key cryptosystems (sometimes polynomial-based PKC’s or just multivariates) handle polynomials of many variables over relatively small fields instea...
Bo-Yin Yang, Jiun-Ming Chen