• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 31,102
Next 10 →

Certificateless Public Key Cryptography

by Sattam S. Al-riyami, Kenneth G. Paterson - ASIACRYPT'03 , 2003
"... This paper introduces the concept of certificateless public key cryptography (CL-PKC). In contrast to traditional public key cryptographic systems, CL-PKC does not require the use of certificates to guarantee the authenticity of public keys. It does rely on the use of a trusted third party (TTP) who ..."
Abstract - Cited by 240 (4 self) - Add to MetaCart
This paper introduces the concept of certificateless public key cryptography (CL-PKC). In contrast to traditional public key cryptographic systems, CL-PKC does not require the use of certificates to guarantee the authenticity of public keys. It does rely on the use of a trusted third party (TTP

Multivariate public key cryptography

by Jintai Ding, Bo-yin Yang , 2009
"... A multivariate public key cryptosystem (MPKCs for short) have a set of (usually) quadratic polynomials over a finite field as its public map. Its main security assumption is backed by the NP-hardness of the problem to solve nonlinear equations over a nite eld. This family is considered as one of th ..."
Abstract - Cited by 9 (0 self) - Add to MetaCart
of the major families of PKCs that could resist potentially even the powerful quantum computers of the future. There has been fast and intensive development in Multivariate Public Key Cryptography in the last two decades. Some constructions are not as secure as was claimed initially, but others are still

Implementing Public-Key Cryptography in

by unknown authors , 2001
"... In this paper we describe how the RSA public-key cipher can be imple-mented in the functional programming language Haskell and we present a complete working implementation. This implementation serves two useful pedagogical purposes: (1) it is a very clear, high-level implementation of RSA that can e ..."
Abstract - Add to MetaCart
easily be understood and manipulated by students of cryp-tography, and (2) it is an excellent example of how a functional program-ming language such as Haskell can be used to implement real applications. While the main goal of our implementation is clarity rather than effi-ciency, no treatment of public-key

How Public Key Cryptography Influences

by Wireless Sensor Node, Krzysztof Piotrowski, Peter Langendoerfer, Steffen Peter - In Proceedings of the 4rd ACM Workshop on Security of ad hoc and Sensor Networks, SASN , 2006
"... In this paper we try to estimate the real influence of public key cryptography (PKC) to the lifetime of a sensor node in wireless sensor networks. ..."
Abstract - Add to MetaCart
In this paper we try to estimate the real influence of public key cryptography (PKC) to the lifetime of a sensor node in wireless sensor networks.

Public-key Cryptography Extensions into Kerberos

by Ian Downard , 2002
"... How can and why should the Kerberos authentication standard (RFC1510) be extended to support public-key cryptography? These are the questions which we explore in this paper. We outline three proposed extensions to integrate public-key cryptography into Kerberos, and make some basic performance comp ..."
Abstract - Add to MetaCart
How can and why should the Kerberos authentication standard (RFC1510) be extended to support public-key cryptography? These are the questions which we explore in this paper. We outline three proposed extensions to integrate public-key cryptography into Kerberos, and make some basic performance

An Overview of Public Key Cryptography

by Martin E. Hellman , 1978
"... With a public key cryptosystem, the key used to encipher a message can be made public without compromising the secrecy of a different key needed to decipher that message. ..."
Abstract - Cited by 43 (0 self) - Add to MetaCart
With a public key cryptosystem, the key used to encipher a message can be made public without compromising the secrecy of a different key needed to decipher that message.

Public-Key Cryptography

by James Nechvatal , 1991
"... ..."
Abstract - Cited by 8 (0 self) - Add to MetaCart
Abstract not found

Steganography with Public-Key Cryptography for

by Renato Portugal, Jauvane Oliveira
"... In this work, we show a model for a case where extreme security is needed. In such case steganocryptography (steganography and cryptography) is used. In this model we use Diffie-Hellman, RSA and cryptography with ir-rational numbers. We use also steganography in DCT coefficients to send a message th ..."
Abstract - Add to MetaCart
In this work, we show a model for a case where extreme security is needed. In such case steganocryptography (steganography and cryptography) is used. In this model we use Diffie-Hellman, RSA and cryptography with ir-rational numbers. We use also steganography in DCT coefficients to send a message

– Defined Public-Key Cryptography

by Shafi Goldwasser, Silvio Micali (s
"... This section comprises of an introduction to cryptography, the various problems and cryp-tographic primitives. 1.1 Brief History Cryptography is a science with a long history. Although it has recently been transformed to conform to the rigorousness of a science, its applications can be traced back t ..."
Abstract - Add to MetaCart
This section comprises of an introduction to cryptography, the various problems and cryp-tographic primitives. 1.1 Brief History Cryptography is a science with a long history. Although it has recently been transformed to conform to the rigorousness of a science, its applications can be traced back

Public Key Cryptography

by Simson L. Garfinkel - Computer, IEEE , 1996
"... S uppose you want to buy something over the Internet with your credit card, You might simply send the 16-digit Visa number and four-digit expiration date over the Net via e-mail. But this approach has its risks: A crook might break into the company's computer and learn your credit card number. ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
S uppose you want to buy something over the Internet with your credit card, You might simply send the 16-digit Visa number and four-digit expiration date over the Net via e-mail. But this approach has its risks: A crook might break into the company's computer and learn your credit card number. Using the World Wide Web isn't much better. Today, some companies are inviting customers to type their credit card numbers into forms displayed by WWW clients such as Mosaic or Lynx. But when the content of those forms is sent back over the Internet to the Web server, it can be "sniffed out " by a packet-sniffer application, placing both the buyer and the seller at financial risk. Some businesses don't worry about stolen credit card numbers-they think their bank, or credit card companies, will cover any
Next 10 →
Results 1 - 10 of 31,102
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University