Sciweavers

490 search results - page 70 / 98
» A New Public-Key Cryptosystem
Sort
View
155
Voted
ASIACRYPT
2004
Springer
15 years 9 months ago
New Approaches to Password Authenticated Key Exchange Based on RSA
We investigate efficient protocols for password-authenticated key exchange based on the RSA public-key cryptosystem. To date, most of the published protocols for password-authentic...
Muxiang Zhang
124
Voted
PKC
1999
Springer
94views Cryptology» more  PKC 1999»
15 years 8 months ago
Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor
Public-key implementers often face strong hardware-related constraints. In particular, modular operations required in most cryptosystems generally constitute a computational bottle...
Pascal Paillier
CSREASAM
2006
15 years 5 months ago
An Enhanced Pretty Good Privacy (EPGP) System with Mutual Non-Repudiation
Enhanced Pretty Good Privacy (EPGP) is a new cryptosystem based on Pretty Good Privacy (PGP), used for the purpose of secure e-mail message communication over an open network. The...
Gregory Vert, Manaf Alfize
143
Voted
EUROCRYPT
2007
Springer
15 years 7 months ago
Batch Verification of Short Signatures
Abstract. With computer networks spreading into a variety of new environments, the need to authenticate and secure communication grows. Many of these new environments have particul...
Jan Camenisch, Susan Hohenberger, Michael Ø...
ARITH
2007
IEEE
15 years 10 months ago
Spectral Modular Exponentiation
We describe a new method to perform the modular exponentiation operation, i.e., the computation of c = me mod n, where c, m, e and n are large integers. The new method uses the di...
Gökay Saldamli, Çetin Kaya Koç