Sciweavers

1825 search results - page 23 / 365
» Cryptographic Securities Exchanges
Sort
View
121
Voted
IEEECIT
2010
IEEE
15 years 14 days ago
On Small Subgroup Non-confinement Attack
The small subgroup confinement attack works by confining cryptographic operations within a small subgroup, in which exhaustive search is feasible. This attack is overt and hence ca...
Feng Hao
124
Voted
IACR
2011
101views more  IACR 2011»
14 years 2 months ago
Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies
Companies, organizations, and individuals often wish to share information to realize valuable social and economic goals. Unfortunately, privacy concerns often stand in the way of ...
Emil Stefanov, Elaine Shi, Dawn Song
109
Voted
USENIX
2003
15 years 3 months ago
NCryptfs: A Secure and Convenient Cryptographic File System
Often, increased security comes at the expense of user convenience, performance, or compatibility with other systems. The right level of security depends on specific site and use...
Charles P. Wright, Michael C. Martino, Erez Zadok
ACNS
2005
Springer
97views Cryptology» more  ACNS 2005»
15 years 8 months ago
Thompson's Group and Public Key Cryptography
Recently, several public key exchange protocols based on symbolic computation in non-commutative (semi)groups were proposed as a more efficient alternative to well established prot...
Vladimir Shpilrain, Alexander Ushakov
CRYPTO
2004
Springer
123views Cryptology» more  CRYPTO 2004»
15 years 8 months ago
Asymptotically Optimal Communication for Torus-Based Cryptography
Abstract. We introduce a compact and efficient representation of elements of the algebraic torus. This allows us to design a new discretelog based public-key system achieving the o...
Marten van Dijk, David P. Woodruff