Sciweavers

507 search results - page 32 / 102
» The XTR Public Key System
Sort
View
84
Voted
ACSAC
1999
IEEE
15 years 5 months ago
Fast Checking of Individual Certificate Revocation on Small Systems
High security network transactions require the checking of the revocation status of public key certificates. On mobile systems this may lead to excessive delays and unacceptable p...
Selwyn Russell
149
Voted
CRYPTO
2012
Springer
327views Cryptology» more  CRYPTO 2012»
13 years 3 months ago
Functional Encryption for Regular Languages
We provide a functional encryption system that supports functionality for regular languages. In our system a secret key is associated with a Deterministic Finite Automata (DFA) M....
Brent Waters
88
Voted
EUROCRYPT
1998
Springer
15 years 5 months ago
Auto-Recoverable Auto-Certifiable Cryptosystems
Abstract. This paper introduces a cryptographic paradigm called selfescrowed encryption, a concept initiated by kleptography. In simple words, a self-escrowed public-key cryptosyst...
Adam Young, Moti Yung
92
Voted
CRYPTO
2000
Springer
175views Cryptology» more  CRYPTO 2000»
15 years 5 months ago
A Chosen-Ciphertext Attack against NTRU
We present a chosen-ciphertext attack against the public key cryptosystem called NTRU. This cryptosystem is based on polynomial algebra. Its security comes from the interaction of ...
Éliane Jaulmes, Antoine Joux
82
Voted
WWW
2001
ACM
16 years 1 months ago
Establishing Persistent Identity using the Handle System
In this paper, we propose that identity reference used over distributed communication should be defined independent from any attributes and/or the public keys associated with the ...
Sam X. Sun