Sciweavers

193 search results - page 27 / 39
» Fair Public-Key Cryptosystems
Sort
View
PQCRYPTO
2010
176views Cryptology» more  PQCRYPTO 2010»
13 years 6 months ago
Practical Power Analysis Attacks on Software Implementations of McEliece
The McEliece public-key cryptosystem is based on the fact that decoding unknown linear binary codes is an NP-complete problem. The interest on implementing post-quantum cryptograph...
Stefan Heyse, Amir Moradi, Christof Paar
GLOBECOM
2007
IEEE
14 years 2 months ago
Certificateless Authenticated Group Key Agreement Protocol for Dynamic Groups
A Group Key Agreement protocol is a process to establish a cryptographic key for a group of participants over an open network. In this paper, we propose a group key agreement(CAGKA...
Sungchul Heo, Zeen Kim, Kwangjo Kim
WCC
2005
Springer
117views Cryptology» more  WCC 2005»
14 years 1 months ago
Interpolation of Functions Related to the Integer Factoring Problem
The security of the RSA public key cryptosystem depends on the intractability of the integer factoring problem. This paper shall give some theoretical support to the assumption of ...
Clemens Adelmann, Arne Winterhof
STOC
2003
ACM
116views Algorithms» more  STOC 2003»
14 years 26 days ago
New lattice based cryptographic constructions
We introduce the use of Fourier analysis on lattices as an integral part of a lattice based construction. The tools we develop provide an elegant description of certain Gaussian d...
Oded Regev
CRYPTO
1993
Springer
159views Cryptology» more  CRYPTO 1993»
13 years 11 months ago
Comparison of Three Modular Reduction Functions
Three modular reduction algorithms for large integers are compared with respect to their performance in portable software: the classical algorithm, Barrett’s algorithm and Montgo...
Antoon Bosselaers, René Govaerts, Joos Vand...