Sciweavers

292 search results - page 8 / 59
» Public-Key Cryptography for RFID-Tags
Sort
View
AAECC
2006
Springer
132views Algorithms» more  AAECC 2006»
13 years 7 months ago
The Conjugacy Search Problem in Public Key Cryptography: Unnecessary and Insufficient
The conjugacy search problem in a group G is the problem of recovering an x G from given g G and h = x-1 gx. This problem is in the core of several recently suggested public key ...
Vladimir Shpilrain, Alexander Ushakov
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
14 years 8 months ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
14 years 2 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
ISSEP
2010
Springer
217views Education» more  ISSEP 2010»
14 years 4 months ago
Teaching Public-Key Cryptography in School
Lucia Keller, Dennis Komm, Giovanni Serafini, Andr...
DATE
2005
IEEE
105views Hardware» more  DATE 2005»
14 years 1 months ago
A Novel Unified Architecture for Public-Key Cryptography
Alessandro Cilardo, Antonino Mazzeo, Nicola Mazzoc...