Sciweavers

1834 search results - page 81 / 367
» Public Key Cryptography
Sort
View
ICPPW
1999
IEEE
15 years 3 months ago
Performance Evaluation of Public-Key Certificate Revocation System with Balanced Hash Tree
A new method for updating certificate revocation trees (CRT) is proposed. Efficient revocation of publickey certificates is a current issue in public-key Infrastructure because a ...
Hiroaki Kikuchi, Kensuke Abe, Shohachiro Nakanishi
EUROCRYPT
1999
Springer
15 years 3 months ago
New Public Key Cryptosystems Based on the Dependent-RSA Problems
Since the Diffie-Hellman paper, asymmetric encryption has been a very important topic, and furthermore ever well studied. However, between the efficiency of RSA and the security of...
David Pointcheval
SIBGRAPI
1999
IEEE
15 years 3 months ago
Pitfalls in Public Key Watermarking
Paulo S. L. M. Barreto, Hae Yong Kim
PKC
1999
Springer
102views Cryptology» more  PKC 1999»
15 years 3 months ago
How to Enhance the Security of Public-Key Encryption at Minimum Cost
This paper presents a simple and efficient conversion from a semantically secure public-key encryption scheme against passive adversaries to a non-malleable (or semantically secure...
Eiichiro Fujisaki, Tatsuaki Okamoto