Sciweavers

1834 search results - page 199 / 367
» Public Key Cryptography
Sort
View
139
Voted
WCC
2005
Springer
197views Cryptology» more  WCC 2005»
15 years 8 months ago
Linear Filtering of Nonlinear Shift-Register Sequences
Nonlinear n-stage feedback shift-register sequences over the finite field Fq of period qn − 1 are investigated under linear operations on sequences. We prove that all members o...
Berndt M. Gammel, Rainer Göttfert
113
Voted
WCC
2005
Springer
123views Cryptology» more  WCC 2005»
15 years 8 months ago
RSA-Based Secret Handshakes
A secret handshake mechanism allows two entities, members of a same group, to authenticate each other secretly. This primitive was introduced recently by Balfanz, Durfee, Shankar, ...
Damien Vergnaud
116
Voted
CHES
2004
Springer
182views Cryptology» more  CHES 2004»
15 years 8 months ago
Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems
In the current work we propose a pipelining scheme for implementing Elliptic Curve Cryptosystems (ECC). The scalar multiplication is the dominant operation in ECC. It is computed b...
Pradeep Kumar Mishra
124
Voted
EUROCRYPT
2004
Springer
15 years 8 months ago
Black-Box Composition Does Not Imply Adaptive Security
In trying to provide formal evidence that composition has security increasing properties, we ask if the composition of non-adaptively secure permutation generators necessarily pro...
Steven Myers
PKC
2004
Springer
112views Cryptology» more  PKC 2004»
15 years 8 months ago
Identity-Based Threshold Decryption
Abstract. In this paper, we examine issues related to the construction of identity-based threshold decryption schemes and argue that it is important in practice to design an identi...
Joonsang Baek, Yuliang Zheng