Sciweavers

490 search results - page 22 / 98
» A New Public-Key Cryptosystem
Sort
View
CRYPTO
2000
Springer
128views Cryptology» more  CRYPTO 2000»
15 years 8 months ago
The XTR Public Key System
This paper introduces the XTR public key system. XTR is based on a new method to represent elements of a subgroup of a multiplicative group of a finite field. Application of XTR ...
Arjen K. Lenstra, Eric R. Verheul
CRYPTO
1995
Springer
101views Cryptology» more  CRYPTO 1995»
15 years 7 months ago
Robustness Principles for Public Key Protocols
Abstract: We present a number of attacks, some new, on public key protocols. We also advance a number of principles which may help designers avoid many of the pitfalls, and help at...
Ross J. Anderson, Roger M. Needham
CTRSA
2010
Springer
200views Cryptology» more  CTRSA 2010»
15 years 11 months ago
Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine
Typical security models used for proving security of deployed cryptographic primitives do not allow adversaries to rewind or reset honest parties to an earlier state. Thus, it is c...
Scott Yilek
EUROCRYPT
2003
Springer
15 years 9 months ago
Cryptanalysis of the Public-Key Encryption Based on Braid Groups
At CRYPTO 2000, a new public-key encryption based on braid groups was introduced. This paper demonstrates how to solve its underlying problem using the Burau representation. By thi...
Eonkyung Lee, Je Hong Park
ICISC
1998
99views Cryptology» more  ICISC 1998»
15 years 5 months ago
Public key protocols for wireless communications
Abstract. Protocols for authentication and key establishment have special requirements in a wireless environment. In the next generation of wireless systems it is likely that publi...
Colin Boyd, DongGook Park