Sciweavers

679 search results - page 36 / 136
» Using decision problems in public key cryptography
Sort
View
GLOBECOM
2006
IEEE
15 years 7 months ago
A Non-Commutative Generalization of ElGamal Key Exchange using Polycyclic Groups
Abstract— In this paper, we propose a non-commutative keyexchange scheme which generalizes the classical ElGamal Cipher to polycyclic groups. We will explore other classes of gro...
Delaram Kahrobaei, Bilal Khan
CSFW
2002
IEEE
15 years 6 months ago
Types and Effects for Asymmetric Cryptographic Protocols
We present the first type and effect system for proving authenticity properties of security protocols based on asymmetric cryptography. The most significant new features of our ...
Andrew D. Gordon, Alan Jeffrey
CTRSA
2010
Springer
191views Cryptology» more  CTRSA 2010»
15 years 4 months ago
Making the Diffie-Hellman Protocol Identity-Based
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
Dario Fiore, Rosario Gennaro
ICIC
2005
Springer
15 years 6 months ago
An Intelligent Assistant for Public Transport Management
This paper describes the architecture of a computer system conceived as an intelligent assistant for public transport management. The goal of the system is to help operators of a c...
Martín Molina
ITNG
2006
IEEE
15 years 7 months ago
Sequential and Parallel Cascaded Convolutional Encryption with Local Propagation: Toward Future Directions in Symmetric Cryptogr
Worldwide symmetric encryption standards such as DES (Data Encryption Standard), AES (Advanced Encryption Standard), and EES (Escrowed Encryption Standard), have been – and some...
Dragos Trinca