Sciweavers

1302 search results - page 4 / 261
» Soundness in the Public-Key Model
Sort
View
KIVS
2007
Springer
15 years 3 months ago
A New Model for Public-Key Authentication
Reto Kohlas, Jacek Jonczy, Rolf Haenni
EUROPKI
2005
Springer
15 years 3 months ago
Modeling Public Key Infrastructures in the Real World
John Marchesini, Sean W. Smith
IJNSEC
2008
147views more  IJNSEC 2008»
14 years 9 months ago
Constructing Efficient Certificateless Public Key Encryption with Pairing
Certificateless public key cryptography was introduced to overcome the key escrow limitation of the identity-based cryptography. Recently, Yum1 and Lee have proposed a generic ser...
Yijuan Shi, Jianhua Li, Jianjun Shi
85
Voted
CTRSA
2010
Springer
200views Cryptology» more  CTRSA 2010»
15 years 4 months ago
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is c...
Scott Yilek