Group-based cryptography

Results: 52



#Item
31Trust Relations in a Digital Signature System Based on a Smart Card Jean-Luc Giraud & Ludovic Rousseau Gemplus, Cryptography & Security Group, B.P. 100, 13881 Gémenos Cedex, France Phone: +[removed]22, +[removed]

Trust Relations in a Digital Signature System Based on a Smart Card Jean-Luc Giraud & Ludovic Rousseau Gemplus, Cryptography & Security Group, B.P. 100, 13881 Gémenos Cedex, France Phone: +[removed]22, +[removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2000-11-03 00:00:00
32SUBMITTED TO JOURNAL OF  1 Software implementation of an Attribute-Based Encryption scheme

SUBMITTED TO JOURNAL OF 1 Software implementation of an Attribute-Based Encryption scheme

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2014-05-30 22:32:03
33Some results in group-based cryptography Ciaran Mullan Technical Report RHUL–MA–2012–1

Some results in group-based cryptography Ciaran Mullan Technical Report RHUL–MA–2012–1

Add to Reading List

Source URL: www.ma.rhul.ac.uk

Language: English - Date: 2012-01-12 06:55:53
34A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication∗ Jason Crampton, Hoon Wei Lim, Kenneth G. Paterson, and Geraint Price Information Security Group Royal Holloway, University

A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication∗ Jason Crampton, Hoon Wei Lim, Kenneth G. Paterson, and Geraint Price Information Security Group Royal Holloway, University

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2007-04-13 09:22:49
35Time-Specific Encryption? Kenneth G. Paterson and Elizabeth A. Quaglia Information Security Group, Royal Holloway, University of London, [removed], [removed]

Time-Specific Encryption? Kenneth G. Paterson and Elizabeth A. Quaglia Information Security Group, Royal Holloway, University of London, [removed], [removed]

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2010-06-25 03:14:09
36CBE from CL-PKE: A Generic Construction and Efficient Schemes Sattam S. Al-Riyami and Kenneth G. Paterson Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX,

CBE from CL-PKE: A Generic Construction and Efficient Schemes Sattam S. Al-Riyami and Kenneth G. Paterson Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX,

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2004-11-08 04:27:00
37A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication∗ Jason Crampton, Hoon Wei Lim, Kenneth G. Paterson, and Geraint Price Information Security Group Royal Holloway, University

A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication∗ Jason Crampton, Hoon Wei Lim, Kenneth G. Paterson, and Geraint Price Information Security Group Royal Holloway, University

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2007-03-15 09:46:20
38Sample or Random Security – A Security Model for Segment-Based Visual Cryptography Sebastian Pape Department of Computer Science, Technical University Dortmund, Research Group: Software Engineering for Critical Systems

Sample or Random Security – A Security Model for Segment-Based Visual Cryptography Sebastian Pape Department of Computer Science, Technical University Dortmund, Research Group: Software Engineering for Critical Systems

Add to Reading List

Source URL: fc14.ifca.ai

Language: English - Date: 2014-02-15 11:15:30
39Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting Allison Lewko ∗ The University of Texas at Austin [removed]

Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting Allison Lewko ∗ The University of Texas at Austin [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-18 02:15:43
40

PDF Document

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-06-09 15:42:02