Sciweavers

1834 search results - page 8 / 367
» Public Key Cryptography
Sort
View
AAECC
2006
Springer
132views Algorithms» more  AAECC 2006»
13 years 7 months ago
The Conjugacy Search Problem in Public Key Cryptography: Unnecessary and Insufficient
The conjugacy search problem in a group G is the problem of recovering an x G from given g G and h = x-1 gx. This problem is in the core of several recently suggested public key ...
Vladimir Shpilrain, Alexander Ushakov
EUROPKI
2007
Springer
14 years 1 months ago
Applicability of Public Key Infrastructures in Wireless Sensor Networks
Abstract. Wireless Sensor Networks (WSN) are becoming a key technology in the support of pervasive and ubiquitous services. The previous notion of “PKC is too expensive for WSNâ€...
Rodrigo Roman, Cristina Alcaraz
PKC
2012
Springer
212views Cryptology» more  PKC 2012»
11 years 10 months ago
Public-Key Cryptography from New Multivariate Quadratic Assumptions
In this work, we study a new multivariate quadratic (MQ) assumption that can be used to construct public-key encryption schemes. In particular, we research in the following two di...
Yun-Ju Huang, Feng-Hao Liu, Bo-Yin Yang
AC
1998
Springer
13 years 12 months ago
Emerging Standards for Public-Key Cryptography
Burton S. Kaliski Jr.
CARDIS
1998
Springer
111views Hardware» more  CARDIS 1998»
13 years 12 months ago
Smart Card Crypto-Coprocessors for Public-Key Cryptography
This paper intends to provide information about up-to-date performances of smart-card arithmetic coprocessors regarding major public-key cryptosystems and analyze the main tendence...
Helena Handschuh, Pascal Paillier