Sciweavers

221 search results - page 14 / 45
» Unbelievable Security. Matching AES Security Using Public Ke...
Sort
View
PKC
2005
Springer
114views Cryptology» more  PKC 2005»
14 years 27 days ago
Cryptanalysis of the Tractable Rational Map Cryptosystem
In this paper, we present the cryptanalysis of a public key scheme based on a system of multivariate polynomial equations, the ”tractable rational map” cryptosystem. We show co...
Antoine Joux, Sébastien Kunz-Jacques, Fr&ea...
MUE
2007
IEEE
104views Multimedia» more  MUE 2007»
14 years 1 months ago
A Conference Key Distribution Scheme Using Interpolating Polynomials
Conference keys are secret keys used by a group of users commonly and with which they can encipher (or decipher) messages such that communications are secure. Based on the Diffie ...
Chin-Chen Chang, Chu-Hsing Lin, Chien-Yuan Chen
SAINT
2003
IEEE
14 years 20 days ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta
SP
2010
IEEE
181views Security Privacy» more  SP 2010»
13 years 5 months ago
SCiFI - A System for Secure Face Identification
Abstract--We introduce SCiFI, a system for Secure Computation of Face Identification. The system performs face identification which compares faces of subjects with a database of re...
Margarita Osadchy, Benny Pinkas, Ayman Jarrous, Bo...
ESCIENCE
2005
IEEE
14 years 1 months ago
Identity-Based Cryptography for Grid Security
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to...
Hoon Wei Lim, Kenneth G. Paterson