Sciweavers

1834 search results - page 76 / 367
» Public Key Cryptography
Sort
View
100
Voted
CTRSA
2010
Springer
200views Cryptology» more  CTRSA 2010»
15 years 6 months ago
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is c...
Scott Yilek
ARTCOM
2009
IEEE
15 years 6 months ago
Public Key Cryptosystems Based on Chaotic-Chebyshev Polynomials
Gnanajeyaraman Rajaram, K. Ramar, Prasadh K. K. Pi...
CTRSA
2009
Springer
205views Cryptology» more  CTRSA 2009»
15 years 6 months ago
Key Insulation and Intrusion Resilience over a Public Channel
Mihir Bellare, Shanshan Duan, Adriana Palacio
ASIACRYPT
2009
Springer
15 years 5 months ago
Efficient Public Key Encryption Based on Ideal Lattices
Damien Stehlé, Ron Steinfeld, Keisuke Tanak...