Sciweavers

1834 search results - page 184 / 367
» Public Key Cryptography
Sort
View
PKC
2004
Springer
150views Cryptology» more  PKC 2004»
14 years 2 months ago
Undeniable Signatures Based on Characters: How to Sign with One Bit
We present a new undeniable signature scheme which is based on the computation of characters. Our signature scheme offers the advantage of having an arbitrarily short signature. I...
Jean Monnerat, Serge Vaudenay
TCC
2004
Springer
100views Cryptology» more  TCC 2004»
14 years 2 months ago
On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes
In earlier work, we described a “pathological” example of a signature scheme that is secure in the Random Oracle Model, but for which no secure implementation exists. For that...
Ran Canetti, Oded Goldreich, Shai Halevi
SRDS
2003
IEEE
14 years 2 months ago
SNARE: A Strong Security Scheme for Network-Attached Storage
This paper presents a strong security scheme for network-attached storage (NAS) that is based on capability and uses a key distribution scheme to keep network-attached storage fro...
Yingwu Zhu, Yiming Hu
CHES
2003
Springer
247views Cryptology» more  CHES 2003»
14 years 2 months ago
Very Compact FPGA Implementation of the AES Algorithm
Abstract. In this paper a compact FPGA architecture for the AES algorithm with 128-bit key targeted for low-cost embedded applications is presented. Encryption, decryption and key ...
Pawel Chodowiec, Kris Gaj
ARITH
1999
IEEE
14 years 1 months ago
Moduli for Testing Implementations of the RSA Cryptosystem
Comprehensive testing of any implementation of the RSA cryptosystem requires the use of a number of moduli with specific properties. It is shown how to generate a sufficient varie...
Colin D. Walter