Sciweavers

954 search results - page 12 / 191
» On the Security of ''Golden'' Cryptography
Sort
View
IMA
2005
Springer
162views Cryptology» more  IMA 2005»
14 years 7 days ago
Pairing-Based Cryptography at High Security Levels
In recent years cryptographic protocols based on the Weil and Tate pairings on elliptic curves have attracted much attention. A notable success in this area was the elegant solutio...
Neal Koblitz, Alfred Menezes
CTRSA
2003
Springer
105views Cryptology» more  CTRSA 2003»
13 years 12 months ago
Forward-Security in Private-Key Cryptography
This paper provides a comprehensive treatment of forward-security in the context of sharedkey based cryptographic primitives, as a practical means to mitigate the damage caused by...
Mihir Bellare, Bennet S. Yee
AINA
2009
IEEE
13 years 12 months ago
Identity-Based Cryptography for Securing Mobile Phone Calls
In this paper, an identity-based key agreement system for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to ...
Matthew Smith, Christian Schridde, Björn Agel...
SASN
2005
ACM
14 years 8 days ago
RFID security without extensive cryptography
Sindhu Karthikeyan, Mikhail Nesterenko