Sciweavers

317 search results - page 56 / 64
» Certificateless Public Key Cryptography
Sort
View
FC
2009
Springer
100views Cryptology» more  FC 2009»
14 years 4 months ago
Expecting the Unexpected: Towards Robust Credential Infrastructure
Cryptographic credential infrastructures, such as Public key infrastructure (PKI), allow the building of trust relationships in electronic society and electronic commerce. At the c...
Shouhuai Xu, Moti Yung
ICDCSW
2005
IEEE
14 years 3 months ago
Defending against Sybil Attacks in Sensor Networks
Sybil attack is a harmful threat to sensor networks, in which a malicious node illegally forges an unbounded number of identities to defeat redundancy mechanisms. Digital certifi...
Qinghua Zhang, Pan Wang, Douglas S. Reeves, Peng N...
WPES
2004
ACM
14 years 3 months ago
Off-the-record communication, or, why not to use PGP
Quite often on the Internet, cryptography is used to protect private, personal communications. However, most commonly, systems such as PGP are used, which use long-lived encryptio...
Nikita Borisov, Ian Goldberg, Eric A. Brewer
IPPS
1999
IEEE
14 years 2 months ago
FPGA Implementation of Modular Exponentiation
An e cient implementations of the main building block in the RSA cryptographic scheme is achieved by mapping a bit-level systolic array for modular exponentiation onto Xilinx FPGAs...
Alexander Tiountchik, Elena Trichina
CSREASAM
2006
13 years 11 months ago
Cryptcoding - Encryption and Error-Correction Coding in a Single Step
In this paper we re-open a 25 years old question of joint encryption and error-correction coding, named here as Cryptcoding. Cryptcoding is a procedure in which encryption/decrypti...
Danilo Gligoroski, Svein J. Knapskog, Suzana Andov...