Sciweavers

488 search results - page 67 / 98
» Policy-Based Cryptography and Applications
Sort
View
FSE
2001
Springer
113views Cryptology» more  FSE 2001»
15 years 5 months ago
Optimized Self-Synchronizing Mode of Operation
Abstract. Modes of operation adapt block ciphers to many applications. Among the encryption modes, only CFB Cipher Feedback has both of the following properties: Firstly it allow...
Ammar Alkassar, Alexander Geraldy, Birgit Pfitzman...
83
Voted
CSFW
2010
IEEE
15 years 4 months ago
A Machine-Checked Formalization of Sigma-Protocols
—Zero-knowledge proofs have a vast applicability in the domain of cryptography, stemming from the fact that they can be used to force potentially malicious parties to abide by th...
Gilles Barthe, Daniel Hedin, Santiago Zanella B&ea...
131
Voted
CIS
2006
Springer
15 years 4 months ago
A New Parallel Multiplier for Type II Optimal Normal Basis
In hardware implementation for the finite field, the use of normal basis has several advantages, especially the optimal normal basis is the most efficient to hardware implementati...
Chang Han Kim, Yongtae Kim, Sung Yeon Ji, IlWhan P...
96
Voted
PKC
2000
Springer
118views Cryptology» more  PKC 2000»
15 years 4 months ago
An Identification Scheme Based on Sparse Polynomials
This paper gives a new example of exploiting the idea of using polynomials with restricted coefficients over finite fields and rings to construct reliable cryptosystems and identif...
William D. Banks, Daniel Lieman, Igor Shparlinski
81
Voted
TEC
2008
93views more  TEC 2008»
15 years 18 days ago
An Artificial Immune System Heuristic for Generating Short Addition Chains
This paper deals with the optimal computation of finite field exponentiation, which is a well-studied problem with many important applications in the areas of error-correcting code...
Nareli Cruz Cortés, Francisco Rodríg...