The Border Gateway Protocol (BGP) is a fundamental building block of the Internet infrastructure. However, due to the implicit trust assumption among networks, Internet routing re...
Ying Zhang, Zheng Zhang, Zhuoqing Morley Mao, Y. C...
We put forward a new method of constructing Fiat-Shamir-like signature schemes that yields better "exact security" than the original Fiat-Shamir method. (We also point o...
Pairings on elliptic curves have been used as cryptographic primitives for the development of new applications such as identity based schemes. For the practical applications, it is...
Tae-Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Wo...
In Crypto’93, Stefan Brands [1] proposed a very efficient off-line electronic cash. Then, the subsequent researchers such as Ernest Foo [2,3], WK Yip [4] and Yiannis [5] develop...
Three main methods with favorable security and efficiency can be considered in the design of cryptosystems. These methods are integer factorization systems (of which RSA is the be...