Sciweavers

1834 search results - page 76 / 367
» Public Key Cryptography
Sort
View
79
Voted
DCC
2003
IEEE
16 years 3 months ago
A New NP-Complete Problem and Public-Key Identification
David Pointcheval, Guillaume Poupard
CTRSA
2010
Springer
200views Cryptology» more  CTRSA 2010»
15 years 10 months ago
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is c...
Scott Yilek
203
Voted
ARTCOM
2009
IEEE
15 years 10 months ago
Public Key Cryptosystems Based on Chaotic-Chebyshev Polynomials
Gnanajeyaraman Rajaram, K. Ramar, Prasadh K. K. Pi...
114
Voted
CTRSA
2009
Springer
205views Cryptology» more  CTRSA 2009»
15 years 10 months ago
Key Insulation and Intrusion Resilience over a Public Channel
Mihir Bellare, Shanshan Duan, Adriana Palacio
123
Voted
ASIACRYPT
2009
Springer
15 years 10 months ago
Efficient Public Key Encryption Based on Ideal Lattices
Damien Stehlé, Ron Steinfeld, Keisuke Tanak...