Sciweavers

154 search results - page 29 / 31
» rsa 2006
Sort
View
ENTCS
2006
127views more  ENTCS 2006»
13 years 11 months ago
Tool support for MOLA
The paper describes the MOLA Tool, which supports the model transformation language MOLA. MOLA Tool consists of two parts: MOLA definition environment and MOLA execution environme...
Audris Kalnins, Edgars Celms, Agris Sostaks
IJNSEC
2007
138views more  IJNSEC 2007»
13 years 10 months ago
ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings
In 2001, Rivest et al. rstly introduced the concept of ring signatures. A ring signature is a simpli ed group signature without any manager. It protects the anonymity of a signer....
Amit K. Awasthi, Sunder Lal
IJNSEC
2007
118views more  IJNSEC 2007»
13 years 10 months ago
Code-based Ring Signature Scheme
McEliece is one of the oldest known public key cryptosystems, however it was not quite as successful as RSA. One main reason is that it is widely believed that code-based cryptosy...
Dong Zheng, Xiangxue Li, Kefei Chen
PKC
2007
Springer
109views Cryptology» more  PKC 2007»
14 years 5 months ago
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems
Abstract. In the CT-track of the 2006 RSA conference, a new multivariate public key cryptosystem, which is called the Medium Field Equation (MFE) multivariate public key cryptosyst...
Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wa...
ICCD
2006
IEEE
132views Hardware» more  ICCD 2006»
14 years 7 months ago
FPGA-based Design of a Large Moduli Multiplier for Public Key Cryptographic Systems
— High secure cryptographic systems require large bit-length encryption keys which presents a challenge to their efficient hardware implementation especially in embedded devices...
Osama Al-Khaleel, Christos A. Papachristou, Franci...