Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of t...
A cover-free family is a well-studied combinatorial structure that has many applications in computer science and cryptography. In this paper, we propose a new public key traitor t...
A fundamental question in leakage-resilient cryptography is: can leakage resilience always be amplified by parallel repetition? It is natural to expect that if we have a leakage-r...
Abstract. The Matsumoto-Imai (MI) cryptosystem was the ļ¬rst multivariate public key cryptosystem proposed for practical use. Though MI is now considered insecure due to Patarinā...
Adama Diene, Jintai Ding, Jason E. Gower, Timothy ...
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to...