Sciweavers

4529 search results - page 9 / 906
» Position Based Cryptography
Sort
View
IMA
2005
Springer
162views Cryptology» more  IMA 2005»
14 years 4 months ago
Pairing-Based Cryptography at High Security Levels
In recent years cryptographic protocols based on the Weil and Tate pairings on elliptic curves have attracted much attention. A notable success in this area was the elegant solutio...
Neal Koblitz, Alfred Menezes
CRYPTO
2004
Springer
123views Cryptology» more  CRYPTO 2004»
14 years 4 months ago
Asymptotically Optimal Communication for Torus-Based Cryptography
Abstract. We introduce a compact and efficient representation of elements of the algebraic torus. This allows us to design a new discretelog based public-key system achieving the o...
Marten van Dijk, David P. Woodruff
IJNSEC
2007
126views more  IJNSEC 2007»
13 years 10 months ago
Elliptic Curve Cryptography Based Wireless Authentication Protocol
Recently, Aydos et al. proposed an ECC-based wireless authentication protocol. Because their protocol is based on ECC, the protocol has significant advantage including lower comp...
Yongliang Liu, Wen Gao, Hongxun Yao, Xinghua Yu
IH
2009
Springer
14 years 5 months ago
Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions
Abstract. A physically unclonable function (PUF) is a multiple-input, multipleoutput, large entropy physical system that is unreproducible due to its structural complexity. A publi...
Nathan Beckmann, Miodrag Potkonjak
QUANTUMCOMM
2009
Springer
14 years 5 months ago
Improvement of Lattice-Based Cryptography Using CRT
Abstract. In this paper, we first critically analyze two existing latticebased cryptosystems, namely GGH and Micciancio, and identify their drawbacks. Then, we introduce a method ...
Thomas Plantard, Mike Rose, Willy Susilo