Sciweavers

103 search results - page 9 / 21
» Security of public key cryptosystems based on Chebyshev Poly...
Sort
View
APPROX
2011
Springer
272views Algorithms» more  APPROX 2011»
14 years 13 days ago
Public Key Locally Decodable Codes with Short Keys
This work considers locally decodable codes in the computationally bounded channel model. The computationally bounded channel model, introduced by Lipton in 1994, views the channe...
Brett Hemenway, Rafail Ostrovsky, Martin J. Straus...
121
Voted
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
16 years 29 days ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...
90
Voted
ASAP
2004
IEEE
127views Hardware» more  ASAP 2004»
15 years 4 months ago
A Public-Key Cryptographic Processor for RSA and ECC
We describe a general-purpose processor architecture for accelerating public-key computations on server systems that demand high performance and flexibility to accommodate large n...
Hans Eberle, Nils Gura, Sheueling Chang Shantz, Vi...
113
Voted
CARDIS
1998
Springer
103views Hardware» more  CARDIS 1998»
15 years 4 months ago
Secure Personalization Using Proxy Cryptography
In this paper we describe new secure personalization schemes using proxy cryptography. We first introduce the context of a large scale smart card application such as an electronic ...
Pierre Girard
114
Voted
COCOON
2010
Springer
15 years 5 months ago
Identity-Based Authenticated Asymmetric Group Key Agreement Protocol
In identity-based public-key cryptography, an entity’s public key can be easily derived from its identity. The direct derivation of public keys in identity-based public-key crypt...
Lei Zhang, Qianhong Wu, Bo Qin, Josep Domingo-Ferr...