Sciweavers

1834 search results - page 77 / 367
» Public Key Cryptography
Sort
View
87
Voted
AFRICACRYPT
2008
Springer
15 years 5 months ago
A Brief History of Provably-Secure Public-Key Encryption
Public-key encryption schemes are a useful and interesting field of cryptographic study. The ultimate goal for the cryptographer in the field of public-key encryption would be th...
Alexander W. Dent
CRYPTO
2007
Springer
86views Cryptology» more  CRYPTO 2007»
15 years 5 months ago
Public Key Encryption That Allows PIR Queries
Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, Wil...
KIVS
2007
Springer
15 years 5 months ago
A New Model for Public-Key Authentication
Reto Kohlas, Jacek Jonczy, Rolf Haenni
DATE
2005
IEEE
149views Hardware» more  DATE 2005»
15 years 4 months ago
A Public-Key Watermarking Technique for IP Designs
— Sharing IP blocks in today’s competitive market poses significant high security risks. Creators and owners of IP designs want assurances that their content will not be illeg...
Amr T. Abdel-Hamid, Sofiène Tahar, El Mosta...