Sciweavers

1562 search results - page 118 / 313
» Mathematics, Cryptology, Security
Sort
View
CHES
2009
Springer
162views Cryptology» more  CHES 2009»
14 years 8 months ago
Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security
Elliptic Curve Cryptography implementations are known to be vulnerable to various side-channel attacks and fault injection attacks, and many countermeasures have been proposed. How...
Xu Guo, Junfeng Fan, Patrick Schaumont, Ingrid Ver...
ACNS
2008
Springer
115views Cryptology» more  ACNS 2008»
14 years 2 months ago
Steel, Cast Iron and Concrete: Security Engineering for Real World Wireless Sensor Networks
Abstract. What are the real security issues for a wireless sensor network (WSN) intended to monitor the structural health of a suspension bridge, a subway tunnel or a water distrib...
Frank Stajano, Daniel Cvrcek, Matt Lewis
FC
2007
Springer
138views Cryptology» more  FC 2007»
14 years 2 months ago
Cryptographic Securities Exchanges
While transparency in financial markets should enhance liquidity, its exploitation by unethical and parasitic traders discourages others from fully embracing disclosure of their o...
Christopher Thorpe, David C. Parkes
INDOCRYPT
2004
Springer
14 years 1 months ago
A Provably Secure Elliptic Curve Scheme with Fast Encryption
Abstract. We present a new elliptic curve cryptosystem with fast encryption and key generation, which is provably secure in the standard model. The scheme uses arithmetic modulo n2...
David Galindo, Sebastià Martín Molle...
INDOCRYPT
2004
Springer
14 years 1 months ago
On the Security of a Certified E-Mail Scheme
Certified e-mail is a value-added service for standard e-mail systems, in which the intended recipient gets the mail content if and only if the mail originator receives a non-repud...
Guilin Wang, Feng Bao, Jianying Zhou