Sciweavers

317 search results - page 5 / 64
» Certificateless Public Key Cryptography
Sort
View
IH
2009
Springer
15 years 10 months ago
Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions
Abstract. A physically unclonable function (PUF) is a multiple-input, multipleoutput, large entropy physical system that is unreproducible due to its structural complexity. A publi...
Nathan Beckmann, Miodrag Potkonjak
CRYPTO
1993
Springer
110views Cryptology» more  CRYPTO 1993»
15 years 8 months ago
Secret-Key Agreement without Public-Key Cryptography
Frank Thomson Leighton, Silvio Micali
128
Voted
CIS
2006
Springer
15 years 7 months ago
A Key Distribution Scheme Based on Public Key Cryptography for Sensor Networks
Xiaolong Li, Yaping Lin, Siqing Yang, Yeqing Yi, J...
160
Voted
GLOBECOM
2007
IEEE
15 years 10 months ago
Certificateless Authenticated Group Key Agreement Protocol for Dynamic Groups
A Group Key Agreement protocol is a process to establish a cryptographic key for a group of participants over an open network. In this paper, we propose a group key agreement(CAGKA...
Sungchul Heo, Zeen Kim, Kwangjo Kim
CHES
2004
Springer
104views Cryptology» more  CHES 2004»
15 years 9 months ago
Public Key Authentication with One (Online) Single Addition
Marc Girault, David Lefranc