Sciweavers

507 search results - page 16 / 102
» The XTR Public Key System
Sort
View
CORR
2011
Springer
150views Education» more  CORR 2011»
14 years 4 months ago
XMLlab : multimedia publication of simulations applets using XML and Scilab
We present an XML-based simulation authoring environment. The proposed description language allows to describe mathematical objects such as systems of ordinary differential equat...
Stéphane Mottelet, André Pauss
99
Voted
DCC
2004
IEEE
15 years 9 months ago
Towards a Uniform Description of Several Group Based Cryptographic Primitives
The public key cryptosystems MST1 and MST2 make use of certain kinds of factorizations of finite groups. We show that generalizing such factorizations to infinite groups allows a ...
Maria Isabel Gonzalez Vasco, Consuelo Martínez, R...
CODASPY
2012
13 years 5 months ago
Towards end-to-end secure content storage and delivery with public cloud
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin W...
EUROCRYPT
2000
Springer
15 years 1 months ago
Fair Encryption of RSA Keys
Cryptography is more and more concerned with elaborate protocols involving many participants. In some cases, it is crucial to be sure that players behave fairly especially when the...
Guillaume Poupard, Jacques Stern
76
Voted
PAIRING
2007
Springer
134views Cryptology» more  PAIRING 2007»
15 years 3 months ago
Proxy Re-encryption Systems for Identity-Based Encryption
A proxy re-encryption system allows the proxy to transform ciphertexts encrypted under Alice’s public key into the different ciphertexts that can be decrypted by Bob’s secret ...
Toshihiko Matsuo