Sciweavers

1834 search results - page 84 / 367
» Public Key Cryptography
Sort
View
128
Voted
ESORICS
2007
Springer
15 years 7 months ago
Efficient Password-Based Authenticated Key Exchange Without Public Information
Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu
123
Voted
ASIAN
2006
Springer
103views Algorithms» more  ASIAN 2006»
15 years 7 months ago
Breaking and Fixing Public-Key Kerberos
Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov,...
138
Voted
CTRSA
2006
Springer
176views Cryptology» more  CTRSA 2006»
15 years 7 months ago
Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles
Abstract. We present a non-interactive chosen ciphertext secure threshold encryption system. The proof of security is set in the standard model and does not use random oracles. Our...
Dan Boneh, Xavier Boyen, Shai Halevi
84
Voted
ICALP
2000
Springer
15 years 7 months ago
Extended Notions of Security for Multicast Public Key Cryptosystems
Olivier Baudron, David Pointcheval, Jacques Stern
122
Voted
SACRYPT
2000
Springer
15 years 7 months ago
Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders
Detlef Hühnlein, Michael J. Jacobson Jr., Dam...