Sciweavers

555 search results - page 13 / 111
» From ABZ to Cryptography
Sort
View
DSN
2007
IEEE
14 years 4 months ago
Protecting Cryptographic Keys from Memory Disclosure Attacks
Cryptography has become an indispensable mechanism for securing systems, communications and applications. While offering strong protection, cryptography makes the assumption that ...
Keith Harrison, Shouhuai Xu
CRYPTOLOGIA
2006
67views more  CRYPTOLOGIA 2006»
13 years 9 months ago
Underwater Hacker Missile Wars: A Cryptography and Engineering Contest
For a recent student conference, the authors developed a day-long design problem and competition suitable for engineering, mathematics, and science undergraduates. The competition ...
Joshua Holden, Richard Layton, Laurence D. Merkle,...
PKC
2004
Springer
146views Cryptology» more  PKC 2004»
14 years 3 months ago
Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model
Abstract. In this paper, we provide the first committed signature provably secure in the standard complexity model based on the strong RSA assumption. The idea behind the construc...
Huafei Zhu
EUROCRYPT
2007
Springer
14 years 4 months ago
General Ad Hoc Encryption from Exponent Inversion IBE
Among the three broad classes of Identity-Based Encryption schemes built from pairings, the exponent inversion paradigm tends to be the most efficient, but also the least extensibl...
Xavier Boyen
PAIRING
2009
Springer
117views Cryptology» more  PAIRING 2009»
14 years 4 months ago
Identity Based Group Signatures from Hierarchical Identity-Based Encryption
A number of previous papers explored the notion of identity-based group signature. We present a generic construction of identity-based group signatures. Our construction is based o...
Nigel P. Smart, Bogdan Warinschi