Sciweavers

1834 search results - page 79 / 367
» Public Key Cryptography
Sort
View
94
Voted
ASIACRYPT
2004
Springer
15 years 9 months ago
On the Security of MOR Public Key Cryptosystem
In-Sok Lee, Woo-Hwan Kim, Daesung Kwon, Sangil Nah...
98
Voted
SCN
2004
Springer
15 years 9 months ago
On the Security Notions for Public-Key Encryption Schemes
Duong Hieu Phan, David Pointcheval
113
Voted
WISA
2004
Springer
15 years 9 months ago
Public Key Encryption with Conjunctive Field Keyword Search
Dong Jin Park, Kihyun Kim, Pil Joong Lee
140
Voted
FSTTCS
2003
Springer
15 years 8 months ago
A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
We prove the Needham-Schroeder-Lowe public-key protocol secure under real, active cryptographic attacks including concurrent protocol runs. This proof is based on an abstract crypt...
Michael Backes, Birgit Pfitzmann