Sciweavers

679 search results - page 31 / 136
» Using decision problems in public key cryptography
Sort
View
ICDCS
2005
IEEE
15 years 6 months ago
Scalable, Server-Passive, User-Anonymous Timed Release Cryptography
We consider the problem of sending messages into the future, commonly known as timed release cryptography. Existing schemes for this task either solve the relative time problem wi...
Aldar C.-F. Chan, Ian F. Blake
SAMOS
2007
Springer
15 years 7 months ago
A Side-channel Attack Resistant Programmable PKC Coprocessor for Embedded Applications
—This paper describes the design of a programmable coprocessor for Public Key Cryptography (PKC) on an FPGA. The implementation provides a very broad range of functions together ...
Nele Mentens, Kazuo Sakiyama, Lejla Batina, Bart P...
CCS
2003
ACM
15 years 6 months ago
Establishing pairwise keys in distributed sensor networks
Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely with each other using cryptographic techniques. Ho...
Donggang Liu, Peng Ning
JAMIA
2010
94views more  JAMIA 2010»
14 years 8 months ago
Clinical decision support implemented with academic detailing improves prescribing of key renally cleared drugs in the hospital
Objective Lack of dose adjustment for renally cleared drugs in the presence of poor renal function is a common problem in the hospital setting. The absence of a clinical decision ...
Gregory W. Roberts, Christopher J. Farmer, Philip ...
PKC
2009
Springer
102views Cryptology» more  PKC 2009»
16 years 1 months ago
A Practical Key Recovery Attack on Basic TCHo
TCHo is a public key encryption scheme based on a stream cipher component, which is particular suitable for low cost devices like RFIDs. In its basic version, TCHo offers no IND-CC...
Mathias Herrmann, Gregor Leander