Sciweavers

1562 search results - page 21 / 313
» Mathematics, Cryptology, Security
Sort
View
INDOCRYPT
2010
Springer
13 years 5 months ago
Speeding Up the Wide-Pipe: Secure and Fast Hashing
In this paper we propose a new sequential mode of operation
Mridul Nandi, Souradyuti Paul
CHES
2011
Springer
250views Cryptology» more  CHES 2011»
12 years 8 months ago
High-Speed High-Security Signatures
Daniel J. Bernstein, Niels Duif, Tanja Lange, Pete...
ASIACRYPT
2003
Springer
14 years 1 months ago
Almost Uniform Density of Power Residues and the Provable Security of ESIGN
Abstract. ESIGN is an efficient signature scheme that has been proposed in the early nineties (see [14]). Recently, an effort was made to lay ESIGN on firm foundations, using the...
Tatsuaki Okamoto, Jacques Stern
ACNS
2007
Springer
91views Cryptology» more  ACNS 2007»
14 years 34 min ago
Efficient Content Authentication in Peer-to-Peer Networks
ed Abstract
Roberto Tamassia, Nikos Triandopoulos
CTRSA
2007
Springer
112views Cryptology» more  CTRSA 2007»
14 years 2 months ago
Directed Transitive Signature Scheme
In 2002, Micali and Rivest raised an open problem as to whether directed transitive signatures exist or not. In 2003, Hohenberger formalized the necessary mathematical criteria for...
Xun Yi