Sciweavers

490 search results - page 76 / 98
» A New Public-Key Cryptosystem
Sort
View
CTRSA
2005
Springer
79views Cryptology» more  CTRSA 2005»
15 years 9 months ago
Malicious Cryptography: Kleptographic Aspects
Abstract. In the last few years we have concentrated our research efforts on new threats to the computing infrastructure that are the result of combining malicious software (malwar...
Adam Young, Moti Yung
141
Voted
SP
2003
IEEE
15 years 9 months ago
Random Key Predistribution Schemes for Sensor Networks
Key establishment in sensor networks is a challenging problem because asymmetric key cryptosystems are unsuitable for use in resource constrained sensor nodes, and also because th...
Haowen Chan, Adrian Perrig, Dawn Xiaodong Song
CCS
2006
ACM
15 years 7 months ago
Attribute-based encryption for fine-grained access control of encrypted data
As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data, is t...
Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Wate...
144
Voted
CPA
1995
143views Cryptology» more  CPA 1995»
15 years 7 months ago
Crypto in Europe - Markets, Law and Policy
Much of the debate on cryptography has assumed that the real tension is between the state’s desire for effective policing and the privacy of the individual. We argue that this i...
Ross J. Anderson
160
Voted
ECCC
2007
123views more  ECCC 2007»
15 years 3 months ago
Lossy Trapdoor Functions and Their Applications
We propose a general cryptographic primitive called lossy trapdoor functions (lossy TDFs), and use it to develop new approaches for constructing several important cryptographic to...
Chris Peikert, Brent Waters