Sciweavers

262 search results - page 35 / 53
» Proposal of a Signature Scheme Based on STS Trapdoor
Sort
View
84
Voted
EDBT
2010
ACM
138views Database» more  EDBT 2010»
15 years 2 months ago
How to authenticate graphs without leaking
Secure data sharing in multi-party environments requires that both authenticity and confidentiality of the data be assured. Digital signature schemes are commonly employed for au...
Ashish Kundu, Elisa Bertino
ICNP
1998
IEEE
15 years 1 months ago
Digital Signatures for Flows and Multicasts
We present chaining techniques for signing/verifying multiple packets using a single signing/verification operation. We then present flow signing and verification procedures based...
Chung Kei Wong, Simon S. Lam
DAM
2006
97views more  DAM 2006»
14 years 9 months ago
Entity authentication schemes using braid word reduction
Abstract. Artin's braid groups currently provide a promising background for cryptographical applications, since the first cryptosystems using braids were introduced in [2, 3, ...
Hervé Sibert, Patrick Dehornoy, Marc Giraul...
SETA
2004
Springer
122views Mathematics» more  SETA 2004»
15 years 2 months ago
New LFSR-Based Cryptosystems and the Trace Discrete Log Problem (Trace-DLP)
In order to reduce key sizes and bandwidth, cryptographic systems have been proposed using minimal polynomials to represent finite field elements. These systems are essentially e...
Kenneth J. Giuliani, Guang Gong
ESORICS
2008
Springer
14 years 11 months ago
Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough
The Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol that connects autonomous systems (ASes). Despite its importance for the Internet infrastructure, BGP...
Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X...