Sciweavers

507 search results - page 32 / 102
» The XTR Public Key System
Sort
View
ACSAC
1999
IEEE
15 years 2 months ago
Fast Checking of Individual Certificate Revocation on Small Systems
High security network transactions require the checking of the revocation status of public key certificates. On mobile systems this may lead to excessive delays and unacceptable p...
Selwyn Russell
CRYPTO
2012
Springer
327views Cryptology» more  CRYPTO 2012»
13 years 5 days ago
Functional Encryption for Regular Languages
We provide a functional encryption system that supports functionality for regular languages. In our system a secret key is associated with a Deterministic Finite Automata (DFA) M....
Brent Waters
EUROCRYPT
1998
Springer
15 years 2 months ago
Auto-Recoverable Auto-Certifiable Cryptosystems
Abstract. This paper introduces a cryptographic paradigm called selfescrowed encryption, a concept initiated by kleptography. In simple words, a self-escrowed public-key cryptosyst...
Adam Young, Moti Yung
CRYPTO
2000
Springer
175views Cryptology» more  CRYPTO 2000»
15 years 2 months ago
A Chosen-Ciphertext Attack against NTRU
We present a chosen-ciphertext attack against the public key cryptosystem called NTRU. This cryptosystem is based on polynomial algebra. Its security comes from the interaction of ...
Éliane Jaulmes, Antoine Joux
WWW
2001
ACM
15 years 10 months ago
Establishing Persistent Identity using the Handle System
In this paper, we propose that identity reference used over distributed communication should be defined independent from any attributes and/or the public keys associated with the ...
Sam X. Sun