Sciweavers

385 search results - page 36 / 77
» Advances in smart cards
Sort
View
AINA
2005
IEEE
14 years 1 months ago
An Improved Low Computation Cost User Authentication Scheme for Mobile Communication
Most of existing user authentication schemes require high computation cost of exponentiation operations for the purpose of security. However, it is not suitable for mobile devices...
Chia-Yin Lee, Chu-Hsing Lin, Chin-Chen Chang
ANTS
2004
Springer
114views Algorithms» more  ANTS 2004»
14 years 1 months ago
Montgomery Scalar Multiplication for Genus 2 Curves
Using powerful tools on genus 2 curves like the Kummer variety, we generalize the Montgomery method for scalar multiplication to the jacobian of these curves. Previously this metho...
Sylvain Duquesne
ICDCSW
2002
IEEE
14 years 27 days ago
DBGlobe: A Data-Centric Approach to Global Computing
In the near future, there will be increasingly powerful computers in smart cards, telephones, and other information appliances. This will create a massive infrastructure composed ...
Alexandros Karakasidis, Evaggelia Pitoura
ASIACRYPT
2001
Springer
14 years 14 days ago
On the Insecurity of a Server-Aided RSA Protocol
Abstract. At Crypto ’88, Matsumoto, Kato and Imai proposed a protocol, known as RSA-S1, in which a smart card computes an RSA signature, with the help of an untrusted powerful se...
Phong Q. Nguyen, Igor Shparlinski
CHES
2000
Springer
86views Cryptology» more  CHES 2000»
14 years 9 days ago
MiniPASS: Authentication and Digital Signatures in a Constrained Environment
Abstract. We describe an implementation of the PASS polynomial authentication and signature scheme [5, 6] that is suitable for use in highly constrained environments such as SmartC...
Jeffrey Hoffstein, Joseph H. Silverman