Sciweavers

356 search results - page 4 / 72
» Cryptography in the Bounded-Quantum-Storage Model
Sort
View
IJACT
2008
83views more  IJACT 2008»
15 years 4 months ago
On the relation among various security models for certificateless cryptography
: Certificateless cryptography is a promising technology for solving the key escrow problem in identity-based cryptography. However, the lack of a unified set of definitions and se...
Qiong Huang, Duncan S. Wong
163
Voted
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
15 years 11 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
PATMOS
2007
Springer
15 years 10 months ago
Low Power Elliptic Curve Cryptography
Maurice Keller, William P. Marnane
114
Voted
SAFECOMP
2005
Springer
15 years 10 months ago
Public-Key Cryptography and Availability
When the safety community designs their systems to also maintain security properties, it is likely that public-key encryption will be among the tools that are applied. The security...
Tage Stabell-Kulø, Simone Lupetti