-
1
-
-
84874324906
-
Identity-Based Encryption from Weil Pairing
-
Advances in Cryptology, CRYPTO 2001, Springer Verlag
-
D. Bonh and M. Franklin, "Identity-Based Encryption from Weil Pairing," Advances in Cryptology, CRYPTO 2001, Lecture Notes in Computer Science, Vol. 2139, pp. 213-229, Springer Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 213-229
-
-
Bonh, D.1
Franklin, M.2
-
2
-
-
84955507265
-
Caches and Hash Trees for Efficient Memory Integrity Verification
-
B. Gassend, G. Suh, D. Clarke, M. Dijk, and S. Devadas, Caches and Hash Trees for Efficient Memory Integrity Verification, In Proceedings of the 9th Intl. Symposium on High-Performance Computer Architecture (HPCA), 2003.
-
(2003)
Proceedings of the 9th Intl. Symposium on High-Performance Computer Architecture (HPCA)
-
-
Gassend, B.1
Suh, G.2
Clarke, D.3
Dijk, M.4
Devadas, S.5
-
3
-
-
27544511310
-
Architecture for Protecting Critical Secrets in Microprocessors
-
R. B. Lee, P. C. S. Kwan, J. P. McGregor, J. Dwoskin, Z. Wang, Architecture for Protecting Critical Secrets in Microprocessors, In Proceedings of the 32nd International Symposium on Computer Architecture, 2005.
-
(2005)
Proceedings of the 32nd International Symposium on Computer Architecture
-
-
Lee, R.B.1
Kwan, P.C.S.2
McGregor, J.P.3
Dwoskin, J.4
Wang, Z.5
-
4
-
-
85001734032
-
A Generalized Secret Sharing Scheme with Cheater Detection
-
Springer-Verlag
-
H.-Y. Lin, L. Harn, A Generalized Secret Sharing Scheme with Cheater Detection, Advances in Cryptology-ASIACRYPT '91 Proceedings, Springer-Verlag, 1993, pp. 149-158.
-
(1993)
Advances in Cryptology-ASIACRYPT '91 Proceedings
, pp. 149-158
-
-
Lin, H.-Y.1
Harn, L.2
-
5
-
-
0005269075
-
-
M.J. Ganley, ed, Oxford: Clarendon Press
-
K.M.Martin, Untrustworthy Participants in Perfect Secret Sharing Schemes, Cryptography and Coding III, M.J. Ganley, ed., Oxford: Clarendon Press, 1993, pp. 255-264.
-
(1993)
Untrustworthy Participants in Perfect Secret Sharing Schemes, Cryptography and Coding III
, pp. 255-264
-
-
Martin, K.M.1
-
6
-
-
0000135789
-
A Threshold Cryptosystem without A Trusted Party
-
T. P. Pedersen, A Threshold Cryptosystem without A Trusted Party, In Proceedings of EUROCRYPT, 1991.
-
(1991)
Proceedings of EUROCRYPT
-
-
Pedersen, T.P.1
-
7
-
-
84982943258
-
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
-
T. P. Pederson, Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing, Lecture Notes in Computer Science, pp. 129-140, 1992.
-
(1992)
Lecture Notes in Computer Science
, pp. 129-140
-
-
Pederson, T.P.1
-
8
-
-
27544453319
-
High Efficiency Counter Mode Security Architecture via Prediction and Precomputation
-
W. Shi, H.-H. Lee, M. Ghosh, C. Lu, and A. Boldyreva, High Efficiency Counter Mode Security Architecture via Prediction and Precomputation, In Proceedings of the 32nd International Symposium on Computer Architecture, 2005.
-
(2005)
Proceedings of the 32nd International Symposium on Computer Architecture
-
-
Shi, W.1
Lee, H.-H.2
Ghosh, M.3
Lu, C.4
Boldyreva, A.5
-
10
-
-
33845900936
-
Improving Cost, Performance, and Security of Memory Encryption and Authentication
-
C. Yan, B. Rogers, D. Englender, Y. Solihin, M. Prvulovic, Improving Cost, Performance, and Security of Memory Encryption and Authentication, In Proceedings of the 33rd International Symposium On Computer Architecture, 2006.
-
(2006)
Proceedings of the 33rd International Symposium On Computer Architecture
-
-
Yan, C.1
Rogers, B.2
Englender, D.3
Solihin, Y.4
Prvulovic, M.5
|