Sciweavers

27 search results - page 5 / 6
» pkc 2007
Sort
View
NETWORKING
2007
13 years 7 months ago
Privacy-Aware Multi-Context RFID Infrastructure Using Public Key Cryptography
We propose a novel approach in designing an RFID infrastructure which foresees the usage of a single RFID tag within different contexts and for multiple purposes. We regard privacy...
Selim Volkan Kaya, Erkay Savas, Albert Levi, Ö...
PKC
2012
Springer
219views Cryptology» more  PKC 2012»
11 years 8 months ago
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking
We identify a potential weakness in the standard security model for dynamic group signatures which appears to have been overlooked previously. More specifically, we highlight tha...
Yusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Go...
ISCAS
2007
IEEE
132views Hardware» more  ISCAS 2007»
14 years 15 days ago
Public-Key Cryptography on the Top of a Needle
Abstract— This work describes the smallest known hardware implementation for Elliptic/Hyperelliptic Curve Cryptography (ECC/HECC). We propose two solutions for Publickey Cryptogr...
Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart P...
PKC
2007
Springer
189views Cryptology» more  PKC 2007»
14 years 10 days ago
Parallel Key-Insulated Public Key Encryption Without Random Oracles
Abstract. Key-insulated cryptography is a crucial technique for protecting private keys. To strengthen the security of key-insulated protocols, Hanaoka, Hanaoka and Imai recently i...
Benoît Libert, Jean-Jacques Quisquater, Moti...
PKC
2007
Springer
124views Cryptology» more  PKC 2007»
14 years 10 days ago
Practical and Secure Solutions for Integer Comparison
Abstract. Yao’s classical millionaires’ problem is about securely determining whether x > y, given two input values x, y, which are held as private inputs by two parties, re...
Juan A. Garay, Berry Schoenmakers, José Vil...