Sciweavers

787 search results - page 131 / 158
» Subversion-Resilient Signature Schemes
Sort
View
68
Voted
FSE
2001
Springer
116views Cryptology» more  FSE 2001»
15 years 2 months ago
NESSIE: A European Approach to Evaluate Cryptographic Algorithms
The NESSIE project (New European Schemes for Signature, Integrity and Encryption) intends to put forward a portfolio containing the next generation of cryptographic primitives. The...
Bart Preneel
ACSAC
1999
IEEE
15 years 2 months ago
Efficient Certificate Status Handling Within PKIs: An Application to Public Administration Services
Public administrations show a strong interest in digital signature technology as a mean for secure and authenticated document exchange, hoping it will help reducing paper-based tr...
Marco Prandini
67
Voted
EDCC
1999
Springer
15 years 1 months ago
Transparent Word-Oriented Memory BIST Based on Symmetric March Algorithms
Abstract. The paper presents a new approach to transparent BIST for wordoriented RAMs which is based on the transformation of March transparent test algorithms to the symmetric ver...
Vyacheslav N. Yarmolik, I. V. Bykov, Sybille Helle...
COMPSAC
2004
IEEE
15 years 1 months ago
On the Complexity of Finding Emerging Patterns
Emerging patterns have been studied as a useful type of pattern for the diagnosis and understanding of diseases based on the analysis of gene expression profiles. They are useful ...
Lusheng Wang, Hao Zhao, Guozhu Dong, Jianping Li
ENC
2004
IEEE
15 years 1 months ago
On the Hardware Design of an Elliptic Curve Cryptosystem
We present a hardware architecture for an Elliptic Curve Cryptography System performing the three basic cryptographic schemes: DH key generation, encryption and digital signature....
Miguel Morales-Sandoval, Claudia Feregrino Uribe