Sciweavers

679 search results - page 45 / 136
» Using decision problems in public key cryptography
Sort
View
STORAGESS
2005
ACM
15 years 7 months ago
Toward securing untrusted storage without public-key operations
Adding security capabilities to shared, remote and untrusted storage file systems leads to performance degradation that limits their use. Public-key cryptographic primitives, wid...
Dalit Naor, Amir Shenhav, Avishai Wool
EGOV
2005
Springer
15 years 6 months ago
Electronic Voting: An All-Purpose Platform
It is generally considered that a key component of electronic government in the future will be electronic voting, as a means of facilitating the participation of citizens in electi...
Ricardo André Costa, Mário Jorge Lei...
FC
2010
Springer
181views Cryptology» more  FC 2010»
15 years 5 months ago
Design and Implementation of a Key-Lifecycle Management System
Key management is the Achilles’ heel of cryptography. This work presents a novel Key-Lifecycle Management System (KLMS), which addresses two issues that have not been addressed ...
Mathias Björkqvist, Christian Cachin, Robert ...
ASAP
2006
IEEE
110views Hardware» more  ASAP 2006»
15 years 7 months ago
Low-Cost Elliptic Curve Digital Signature Coprocessor for Smart Cards
This paper proposes different low-cost coprocessors for public key authentication on 8-bit smart cards. Elliptic curve cryptography is used for its efficiency per bit of key and ...
Guerric Meurice de Dormale, Renaud Ambroise, David...
CHES
2007
Springer
110views Cryptology» more  CHES 2007»
15 years 7 months ago
RFID Noisy Reader How to Prevent from Eavesdropping on the Communication?
RFID applications do not always use encryption to ensure the security as public key cryptographic algorithms that are costly in term of computing resources. We proposed to secure t...
O. Savry, F. Pebay-Peyroula, F. Dehmas, G. Robert,...