Sciweavers

1834 search results - page 74 / 367
» Public Key Cryptography
Sort
View
ASAP
2004
IEEE
127views Hardware» more  ASAP 2004»
15 years 2 months ago
A Public-Key Cryptographic Processor for RSA and ECC
We describe a general-purpose processor architecture for accelerating public-key computations on server systems that demand high performance and flexibility to accommodate large n...
Hans Eberle, Nils Gura, Sheueling Chang Shantz, Vi...
CRYPTO
2010
Springer
157views Cryptology» more  CRYPTO 2010»
15 years 8 days ago
Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability - (or: Quadratic Residuosity Strikes Ba
The main results of this work are new public-key encryption schemes that, under the quadratic residuosity (QR) assumption (or Paillier's decisional composite residuosity (DCR...
Zvika Brakerski, Shafi Goldwasser
EWSN
2009
Springer
15 years 11 months ago
secFleck: A Public Key Technology Platform for Wireless Sensor Networks
We describe the design and implementation of a public-key platform, secFleck, based on a commodity Trusted Platform Module (TPM) chip that extends the capability of a standard node...
Wen Hu, Peter I. Corke, Wen Chan Shih, Leslie Over...
ARTCOM
2009
IEEE
15 years 6 months ago
Sender-Side Public Key Deniable Encryption Scheme
— Consider a situation in which the transmission of encrypted message is intercepted by an adversary who can later ask the sender to reveal the random choices (and also the secre...
Jaydeep Howlader, Saikat Basu
CSFW
2008
IEEE
15 years 5 months ago
Joint State Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation
Composition theorems in simulation-based approaches allow to build complex protocols from sub-protocols in a modular way. However, as first pointed out and studied by Canetti and ...
Ralf Küsters, Max Tuengerthal