Sciweavers

352 search results - page 17 / 71
» Cryptography in the Multi-string Model
Sort
View
FPL
2010
Springer
168views Hardware» more  FPL 2010»
13 years 7 months ago
Pipelined FPGA Adders
Integer addition is a universal building block, and applications such as quad-precision floating-point or elliptic curve cryptography now demand precisions well beyond 64 bits. Thi...
Florent de Dinechin, Hong Diep Nguyen, Bogdan Pasc...
SIGUCCS
1999
ACM
14 years 2 months ago
Who's Got the Key?
This paper attempts to illuminate several fundamental concepts used in the creation of a Public Key Infrastructure (PKI). These concepts include encryption, public key cryptograph...
David Henry
ACNS
2006
Springer
112views Cryptology» more  ACNS 2006»
14 years 3 months ago
Password Based Server Aided Key Exchange
We propose a new password-based 3-party protocol with a formal security proof in the standard model. Under reasonable assumptions we show that our new protocol is more efficient t...
Yvonne Cliff, Yiu Shing Terry Tin, Colin Boyd
EUROCRYPT
2010
Springer
14 years 2 months ago
Bonsai Trees, or How to Delegate a Lattice Basis
We introduce a new lattice-based cryptographic structure called a bonsai tree, and use it to resolve some important open problems in the area. Applications of bonsai trees include...
David Cash, Dennis Hofheinz, Eike Kiltz, Chris Pei...
JOC
2011
104views more  JOC 2011»
13 years 21 days ago
On the Security of Oscillator-Based Random Number Generators
Physical random number generators (a.k.a. TRNGs) appear to be critical components of many cryptographic systems. Yet, such building blocks are still too seldom provided with a form...
Mathieu Baudet, David Lubicz, Julien Micolod, Andr...