Sciweavers

20175 search results - page 72 / 4035
» Is abstraction the key to computing
Sort
View
75
Voted
DCC
2004
IEEE
16 years 5 days ago
On the Security of Two Public Key Cryptosystems Using Non-Abelian Groups
Maria Isabel Gonzalez Vasco, Dennis Hofheinz, Cons...
69
Voted
DCC
2003
IEEE
16 years 5 days ago
An Efficient Protocol for Authenticated Key Agreement
Laurie Law, Alfred Menezes, Minghua Qu, Jerome A. ...
EUROCRYPT
2003
Springer
15 years 5 months ago
A Simpler Construction of CCA2-Secure Public-Key Encryption under General Assumptions
Abstract. In this paper we present a simpler construction of a publickey encryption scheme that achieves adaptive chosen ciphertext security (CCA2), assuming the existence of trapd...
Yehuda Lindell
SAC
2009
ACM
15 years 7 months ago
Local reasoning for abstraction and sharing
Renato Cherini, Javier O. Blanco