Sciweavers

507 search results - page 16 / 102
» The XTR Public Key System
Sort
View
110
Voted
CORR
2011
Springer
150views Education» more  CORR 2011»
14 years 7 months ago
XMLlab : multimedia publication of simulations applets using XML and Scilab
We present an XML-based simulation authoring environment. The proposed description language allows to describe mathematical objects such as systems of ordinary differential equat...
Stéphane Mottelet, André Pauss
117
Voted
DCC
2004
IEEE
16 years 9 days ago
Towards a Uniform Description of Several Group Based Cryptographic Primitives
The public key cryptosystems MST1 and MST2 make use of certain kinds of factorizations of finite groups. We show that generalizing such factorizations to infinite groups allows a ...
Maria Isabel Gonzalez Vasco, Consuelo Martínez, R...
133
Voted
CODASPY
2012
13 years 8 months ago
Towards end-to-end secure content storage and delivery with public cloud
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin W...
106
Voted
EUROCRYPT
2000
Springer
15 years 4 months ago
Fair Encryption of RSA Keys
Cryptography is more and more concerned with elaborate protocols involving many participants. In some cases, it is crucial to be sure that players behave fairly especially when the...
Guillaume Poupard, Jacques Stern
96
Voted
PAIRING
2007
Springer
134views Cryptology» more  PAIRING 2007»
15 years 6 months ago
Proxy Re-encryption Systems for Identity-Based Encryption
A proxy re-encryption system allows the proxy to transform ciphertexts encrypted under Alice’s public key into the different ciphertexts that can be decrypted by Bob’s secret ...
Toshihiko Matsuo