Sciweavers

1834 search results - page 56 / 367
» Public Key Cryptography
Sort
View
SP
1997
IEEE
139views Security Privacy» more  SP 1997»
14 years 1 months ago
Number Theoretic Attacks on Secure Password Schemes
Encrypted Key Exchange (EKE) [1, 2] allows two parties sharing a password to exchange authenticated information over an insecure network by using a combination of public and secre...
Sarvar Patel
STACS
2010
Springer
14 years 5 months ago
Mathematics, Cryptology, Security
Abstract. In this talk, I will review some of the work performed by the research community in cryptology and security since the invention of public key cryptography by Diffie and H...
Jacques Stern
ISCC
2009
IEEE
170views Communications» more  ISCC 2009»
14 years 4 months ago
A directly public verifiable signcryption scheme based on elliptic curves
A directly public verifiable signcryption scheme is introduced in this paper that provides the security attributes of message confidentiality, authentication, integrity, non-repud...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
ASAP
2006
IEEE
110views Hardware» more  ASAP 2006»
14 years 4 months ago
Low-Cost Elliptic Curve Digital Signature Coprocessor for Smart Cards
This paper proposes different low-cost coprocessors for public key authentication on 8-bit smart cards. Elliptic curve cryptography is used for its efficiency per bit of key and ...
Guerric Meurice de Dormale, Renaud Ambroise, David...
CORR
2008
Springer
63views Education» more  CORR 2008»
13 years 10 months ago
A Public Key Block Cipher Based on Multivariate Quadratic Quasigroups
Abstract
Danilo Gligoroski, Smile Markovski, Svein J. Knaps...