Sciweavers

4529 search results - page 4 / 906
» Position Based Cryptography
Sort
View
EUROCRYPT
2004
Springer
14 years 3 months ago
Security Proofs for Identity-Based Identification and Signature Schemes
Mihir Bellare, Chanathip Namprempre, Gregory Neven
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
14 years 4 months ago
PUF-HB: A Tamper-Resilient HB Based Authentication Protocol
We propose a light-weight protocol for authentication of low-power devices. Our construction PUF-HB merges the positive qualities of two families of authentication functions. PUF ...
Ghaith Hammouri, Berk Sunar
TCC
2005
Springer
118views Cryptology» more  TCC 2005»
14 years 3 months ago
On the Relationships Between Notions of Simulation-Based Security
Several compositional forms of simulation-based security have been proposed in the literature, including universal composability, black-box simulatability, and variants thereof. Th...
Anupam Datta, Ralf Küsters, John C. Mitchell,...
CHES
2007
Springer
112views Cryptology» more  CHES 2007»
14 years 4 months ago
Arithmetic Operators for Pairing-Based Cryptography
Jean-Luc Beuchat, Nicolas Brisebarre, Jér&e...
CHES
2006
Springer
108views Cryptology» more  CHES 2006»
14 years 1 months ago
Superscalar Coprocessor for High-Speed Curve-Based Cryptography
Abstract. We propose a superscalar coprocessor for high-speed curvebased cryptography. It accelerates scalar multiplication by exploiting instruction-level parallelism (ILP) dynami...
Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid...