Sciweavers

4529 search results - page 1 / 906
» Position Based Cryptography
Sort
View
73
Voted
CRYPTO
2009
Springer
104views Cryptology» more  CRYPTO 2009»
15 years 6 months ago
Position Based Cryptography
Nishanth Chandran, Vipul Goyal, Ryan Moriarty, Raf...
39
Voted
CORR
2010
Springer
44views Education» more  CORR 2010»
14 years 12 months ago
Position-Based Quantum Cryptography: Impossibility and Constructions
Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran ...
82
Voted
ITRUST
2004
Springer
15 years 5 months ago
The Use of Formal Methods in the Analysis of Trust (Position Paper)
Security and trust are two properties of modern computing systems that are the focus of much recent interest. They play an increasingly significant role in the requirements for mo...
Michael J. Butler, Michael Leuschel, Stépha...
CORR
2007
Springer
127views Education» more  CORR 2007»
14 years 11 months ago
Using decision problems in public key cryptography
There are several public key establishment protocols as well as complete public key cryptosystems based on allegedly hard problems from combinatorial (semi)group theory known by no...
Vladimir Shpilrain, Gabriel Zapata