Sciweavers

1834 search results - page 51 / 367
» Public Key Cryptography
Sort
View
SCN
2010
Springer
145views Communications» more  SCN 2010»
13 years 7 months ago
Distributed Private-Key Generators for Identity-Based Cryptography
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG)...
Aniket Kate, Ian Goldberg
ASIACRYPT
2007
Springer
14 years 3 months ago
Symmetric Key Cryptography on Modern Graphics Hardware
Abstract. GPUs offer a tremendous amount of computational bandwidth that was until now largely unusable for cryptographic computations due to a lack of integer arithmetic and user...
Jason Yang, James Goodman
ITCC
2005
IEEE
14 years 2 months ago
Fast Parallel Table Lookups to Accelerate Symmetric-Key Cryptography
1 Table lookups are one of the most frequently-used operations in symmetric-key ciphers. Particularly in the newer algorithms such as the Advanced Encryption Standard (AES), we fr...
A. Murat Fiskiran, Ruby B. Lee
CTRSA
2003
Springer
105views Cryptology» more  CTRSA 2003»
14 years 2 months ago
Forward-Security in Private-Key Cryptography
This paper provides a comprehensive treatment of forward-security in the context of sharedkey based cryptographic primitives, as a practical means to mitigate the damage caused by...
Mihir Bellare, Bennet S. Yee
ACSW
2004
13 years 10 months ago
Secure Key Issuing in ID-based Cryptography
Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Ki...