Sciweavers

1834 search results - page 77 / 367
» Public Key Cryptography
Sort
View
120
Voted
AFRICACRYPT
2008
Springer
15 years 10 months ago
A Brief History of Provably-Secure Public-Key Encryption
Public-key encryption schemes are a useful and interesting field of cryptographic study. The ultimate goal for the cryptographer in the field of public-key encryption would be th...
Alexander W. Dent
CRYPTO
2007
Springer
86views Cryptology» more  CRYPTO 2007»
15 years 10 months ago
Public Key Encryption That Allows PIR Queries
Dan Boneh, Eyal Kushilevitz, Rafail Ostrovsky, Wil...
KIVS
2007
Springer
15 years 10 months ago
A New Model for Public-Key Authentication
Reto Kohlas, Jacek Jonczy, Rolf Haenni
DATE
2005
IEEE
149views Hardware» more  DATE 2005»
15 years 9 months ago
A Public-Key Watermarking Technique for IP Designs
— Sharing IP blocks in today’s competitive market poses significant high security risks. Creators and owners of IP designs want assurances that their content will not be illeg...
Amr T. Abdel-Hamid, Sofiène Tahar, El Mosta...