Sciweavers

4529 search results - page 4 / 906
» Position Based Cryptography
Sort
View
EUROCRYPT
2004
Springer
15 years 10 months ago
Security Proofs for Identity-Based Identification and Signature Schemes
Mihir Bellare, Chanathip Namprempre, Gregory Neven
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
15 years 11 months ago
PUF-HB: A Tamper-Resilient HB Based Authentication Protocol
We propose a light-weight protocol for authentication of low-power devices. Our construction PUF-HB merges the positive qualities of two families of authentication functions. PUF ...
Ghaith Hammouri, Berk Sunar
TCC
2005
Springer
118views Cryptology» more  TCC 2005»
15 years 10 months ago
On the Relationships Between Notions of Simulation-Based Security
Several compositional forms of simulation-based security have been proposed in the literature, including universal composability, black-box simulatability, and variants thereof. Th...
Anupam Datta, Ralf Küsters, John C. Mitchell,...
CHES
2007
Springer
112views Cryptology» more  CHES 2007»
15 years 10 months ago
Arithmetic Operators for Pairing-Based Cryptography
Jean-Luc Beuchat, Nicolas Brisebarre, Jér&e...
CHES
2006
Springer
108views Cryptology» more  CHES 2006»
15 years 8 months ago
Superscalar Coprocessor for High-Speed Curve-Based Cryptography
Abstract. We propose a superscalar coprocessor for high-speed curvebased cryptography. It accelerates scalar multiplication by exploiting instruction-level parallelism (ILP) dynami...
Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid...