Sciweavers

488 search results - page 9 / 98
» Policy-Based Cryptography and Applications
Sort
View
CRYPTO
2004
Springer
162views Cryptology» more  CRYPTO 2004»
15 years 2 months ago
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography
We propose the first distributed discrete-log key generation (DLKG) protocol from scratch which is adaptively-secure in the non-erasure model, and at the same time completely avoi...
Masayuki Abe, Serge Fehr
DCC
2002
IEEE
15 years 9 months ago
Itoh-Tsujii Inversion in Standard Basis and Its Application in Cryptography and Codes
This contribution is concerned with a generalization of Itoh and Tsujii's algorithm for inversion in extension fields GF(qm ). Unlike the original algorithm, the method introd...
Jorge Guajardo, Christof Paar
73
Voted
ARITH
2009
IEEE
15 years 4 months ago
Hybrid Binary-Ternary Joint Form and Its Application in Elliptic Curve Cryptography
Jithra Adikari, Vassil S. Dimitrov, Laurent Imbert