Sciweavers

27 search results - page 1 / 6
» A "proof-reading" of Some Issues in Cryptography
Sort
View
116
Voted
ICALP
2007
Springer
15 years 10 months ago
A "proof-reading" of Some Issues in Cryptography
Abstract. In this paper, we identify some issues in the interplay between practice and theory in cryptography, issues that have repeatedly appeared in different incarnations over ...
Ivan Damgård
91
Voted
PODC
2003
ACM
15 years 9 months ago
Cryptography and competition policy: issues with 'trusted computing'
The most significant strategic development in information technology over the past year has been ‘trusted computing’. This is popularly associated with Microsoft’s ‘Pallad...
Ross J. Anderson
129
Voted
IDTRUST
2009
ACM
15 years 10 months ago
Quantum resistant public key cryptography: a survey
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which c...
Ray A. Perlner, David A. Cooper
127
Voted
CCS
2007
ACM
15 years 10 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
112
Voted
SIGUCCS
1999
ACM
15 years 8 months ago
Who's Got the Key?
This paper attempts to illuminate several fundamental concepts used in the creation of a Public Key Infrastructure (PKI). These concepts include encryption, public key cryptograph...
David Henry