Sciweavers

1834 search results - page 54 / 367
» Public Key Cryptography
Sort
View
CSE
2009
IEEE
14 years 4 months ago
A Lightweight Architecture for Secure Two-Party Mobile Payment
The evolution of wireless networks and mobile devices has resulted in increased concerns about performance and security of mobile payment systems. In this paper we propose SA2pMP,...
Yunpu Zhu, Jacqueline E. Rice
FSE
2009
Springer
189views Cryptology» more  FSE 2009»
14 years 10 months ago
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
Jean-Philippe Aumasson, Itai Dinur, Willi Meier, A...
FOCS
2010
IEEE
13 years 8 months ago
On the Insecurity of Parallel Repetition for Leakage Resilience
A fundamental question in leakage-resilient cryptography is: can leakage resilience always be amplified by parallel repetition? It is natural to expect that if we have a leakage-r...
Allison B. Lewko, Brent Waters
FC
2004
Springer
120views Cryptology» more  FC 2004»
14 years 3 months ago
Identity-Based Chameleon Hash and Applications
Chameleon signatures are non-interactive signatures based on a hash-and-sign paradigm, and similar in efficiency to regular signatures. The distinguishing characteristic of chamel...
Giuseppe Ateniese, Breno de Medeiros
AICCSA
2008
IEEE
283views Hardware» more  AICCSA 2008»
14 years 4 months ago
Performance analysis of identity management in the Session Initiation Protocol (SIP)
The Session Initiation Protocol (SIP) is a standard for managing IP multimedia sessions in the Internet. Identity management in SIP is a crucial security field that deals with id...
Yacine Rebahi, Jordi Jaen Pallares, Tuan Minh Nguy...