Sciweavers

4529 search results - page 6 / 906
» Position Based Cryptography
Sort
View
ICDCS
2008
IEEE
14 years 4 months ago
WebIBC: Identity Based Cryptography for Client Side Security in Web Applications
The growing popularity of web applications in the last few years has led users to give the management of their data to online application providers, which will endanger the securi...
Zhi Guan, Zhen Cao, Xuan Zhao, Ruichuan Chen, Zhon...
CRYPTO
2006
Springer
140views Cryptology» more  CRYPTO 2006»
14 years 1 months ago
Lattice-Based Cryptography
We describe some of the recent progress on lattice-based cryptography, starting from the seminal work of Ajtai, and ending with some recent constructions of very efficient cryptogr...
Oded Regev
FC
2005
Springer
119views Cryptology» more  FC 2005»
14 years 3 months ago
Policy-Based Cryptography and Applications
In this paper, we formulate the concept of policy-based cryptography which makes it possible to perform policy enforcement in large-scale open environments like the Internet, with ...
Walid Bagga, Refik Molva
CRYPTO
2003
Springer
113views Cryptology» more  CRYPTO 2003»
14 years 3 months ago
Torus-Based Cryptography
We introduce the concept of torus-based cryptography, give a new public key system called CEILIDH, and compare it to other discrete log based systems including Lucas-based systems ...
Karl Rubin, Alice Silverberg
PAIRING
2007
Springer
132views Cryptology» more  PAIRING 2007»
14 years 3 months ago
Instruction Set Extensions for Pairing-Based Cryptography
A series of recent algorithmic advances has delivered highly effective methods for pairing evaluation and parameter generation. However, the resulting multitude of options means m...
Tobias Vejda, Dan Page, Johann Großschä...