Sciweavers

4529 search results - page 10 / 906
» Position Based Cryptography
Sort
View
CTRSA
2003
Springer
71views Cryptology» more  CTRSA 2003»
14 years 4 months ago
Simple Identity-Based Cryptography with Mediated RSA
Xuhua Ding, Gene Tsudik
AINA
2009
IEEE
14 years 4 months ago
Identity-Based Cryptography for Securing Mobile Phone Calls
In this paper, an identity-based key agreement system for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to ...
Matthew Smith, Christian Schridde, Björn Agel...
WAIFI
2010
Springer
194views Mathematics» more  WAIFI 2010»
14 years 4 months ago
Constructing Tower Extensions of Finite Fields for Implementation of Pairing-Based Cryptography
A cryptographic pairing evaluates as an element of a finite extension field, and the evaluation itself involves a considerable amount of extension field arithmetic. It is recogn...
Naomi Benger, Michael Scott
IMA
1999
Springer
108views Cryptology» more  IMA 1999»
14 years 3 months ago
Tensor-Based Trapdoors for CVP and Their Application to Public Key Cryptography
We propose two trapdoors for the Closest-Vector-Problem in lattices (CVP) related to the lattice tensor product. Using these trapdoors we set up a lattice-based cryptosystem which ...
Roger Fischlin, Jean-Pierre Seifert