Sciweavers

1064 search results - page 87 / 213
» Cryptography from Anonymity
Sort
View
FC
2009
Springer
93views Cryptology» more  FC 2009»
15 years 10 months ago
Coercion Resistant End-to-end Voting
End-to-end voting schemes have shown considerable promise for allowing voters to verify that tallies are accurate. At the same time, the threat of coercion has generally been consi...
Ryan W. Gardner, Sujata Garera, Aviel D. Rubin
SAMOS
2007
Springer
15 years 10 months ago
A Side-channel Attack Resistant Programmable PKC Coprocessor for Embedded Applications
—This paper describes the design of a programmable coprocessor for Public Key Cryptography (PKC) on an FPGA. The implementation provides a very broad range of functions together ...
Nele Mentens, Kazuo Sakiyama, Lejla Batina, Bart P...
ACISP
2001
Springer
15 years 8 months ago
Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000
Abstract. At ACISP 2000, Yoo et al proposed a fast public key cryptosystem using matrices over a ring. The authors claim that the security of their system is based on the RSA probl...
Amr M. Youssef, Guang Gong
ANTS
2006
Springer
125views Algorithms» more  ANTS 2006»
15 years 7 months ago
Arithmetic of Generalized Jacobians
This paper aims at introducing generalized Jacobians as a new candidate for discrete logarithm (DL) based cryptography. The motivation for this work came from the observation that ...
Isabelle Déchène
FC
2000
Springer
83views Cryptology» more  FC 2000»
15 years 7 months ago
Secret Key Authentication with Software-Only Verification
Abstract Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secu...
Jaap-Henk Hoepman