Sciweavers

292 search results - page 9 / 59
» Public-Key Cryptography for RFID-Tags
Sort
View
SAFECOMP
2005
Springer
14 years 1 months ago
Public-Key Cryptography and Availability
When the safety community designs their systems to also maintain security properties, it is likely that public-key encryption will be among the tools that are applied. The security...
Tage Stabell-Kulø, Simone Lupetti
AC
1998
Springer
13 years 12 months ago
Emerging Standards for Public-Key Cryptography
Burton S. Kaliski Jr.
CARDIS
1998
Springer
111views Hardware» more  CARDIS 1998»
13 years 12 months ago
Smart Card Crypto-Coprocessors for Public-Key Cryptography
This paper intends to provide information about up-to-date performances of smart-card arithmetic coprocessors regarding major public-key cryptosystems and analyze the main tendence...
Helena Handschuh, Pascal Paillier
CCS
1998
ACM
13 years 12 months ago
Public-Key Cryptography and Password Protocols
Shai Halevi, Hugo Krawczyk
CRYPTO
1993
Springer
110views Cryptology» more  CRYPTO 1993»
13 years 11 months ago
Secret-Key Agreement without Public-Key Cryptography
Frank Thomson Leighton, Silvio Micali