-
1
-
-
84921068804
-
Implementing public-key cryptography on passive RFID tags is practical
-
Arbit, A., Livne, Y., Oren, Y., Wool, A.: Implementing public-key cryptography on passive RFID tags is practical. Int. J. Inf. Sec. 14(1), 85-99 (2015).
-
(2015)
Int. J. Inf. Sec
, vol.14
, Issue.1
, pp. 85-99
-
-
Arbit, A.1
Livne, Y.2
Oren, Y.3
Wool, A.4
-
2
-
-
85034497704
-
Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor
-
Odlyzko, A.M. (ed.),. Springer, Heidelberg
-
Barrett, P.: Implementing the Rivest Shamir and Adleman public key encryption algorithm on a standard digital signal processor. In: Odlyzko, A. M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 311-323. Springer, Heidelberg (1987).
-
(1987)
CRYPTO 1986. LNCS
, vol.263
, pp. 311-323
-
-
Barrett, P.1
-
3
-
-
34547688845
-
Public-Key cryptography for RFID-tags
-
White Plains, New York, USA, March 19-23
-
Batina, L., Guajardo, J., Kerins, T., Mentens, N., Tuyls, P., Verbauwhede, I.: Public-Key cryptography for RFID-tags. In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications-Workshops (PerComWorkshops 2007), White Plains, New York, USA, March 19-23, pp. 217-222 (2007).
-
(2007)
Fifth Annual IEEE International Conference on Pervasive Computing and Communications-Workshops (PerComWorkshops 2007)
, pp. 217-222
-
-
Batina, L.1
Guajardo, J.2
Kerins, T.3
Mentens, N.4
Tuyls, P.5
Verbauwhede, I.6
-
4
-
-
84957610823
-
Speeding up discrete log and factoring based schemes via precomputations
-
Nyberg, K. (ed.),. Springer, Heidelberg
-
Boyko, V., Peinado, M., Venkatesan, R.: Speeding up discrete log and factoring based schemes via precomputations. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 221-235. Springer, Heidelberg (1998).
-
(1998)
EUROCRYPT 1998. LNCS
, vol.1403
, pp. 221-235
-
-
Boyko, V.1
Peinado, M.2
Venkatesan, R.3
-
5
-
-
84865597567
-
New algorithms for secure outsourcing of modular exponentiations
-
Foresti, S., Yung, M., Martinelli, F. (eds.),. Springer, Heidelberg
-
Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol. 7459, pp. 541-556. Springer, Heidelberg (2012).
-
(2012)
ESORICS 2012. LNCS
, vol.7459
, pp. 541-556
-
-
Chen, X.1
Li, J.2
Ma, J.3
Tang, Q.4
Lou, W.5
-
6
-
-
33645066370
-
Speeding Up Exponentiation using an Untrusted Computational Resource
-
Dijk, M., Clarke, D., Gassend, B., Suh, G., Devadas, S.: Speeding Up Exponentiation using an Untrusted Computational Resource. Designs, Codes and Cryptography 39(2), 253-273 (2006).
-
(2006)
Designs, Codes and Cryptography
, vol.39
, Issue.2
, pp. 253-273
-
-
Dijk, M.1
Clarke, D.2
Gassend, B.3
Suh, G.4
Devadas, S.5
-
7
-
-
77957005936
-
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
-
Rabin, T. (ed.),. Springer, Heidelberg
-
Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465-482. Springer, Heidelberg (2010).
-
(2010)
CRYPTO 2010. LNCS
, vol.6223
, pp. 465-482
-
-
Gennaro, R.1
Gentry, C.2
Parno, B.3
-
8
-
-
24144493423
-
How to securely outsource cryptographic computations
-
Kilian, J. (ed.),. Springer, Heidelberg
-
Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 264-282. Springer, Heidelberg (2005).
-
(2005)
TCC 2005. LNCS
, vol.3378
, pp. 264-282
-
-
Hohenberger, S.1
Lysyanskaya, A.2
-
9
-
-
84937432284
-
Secure server-aided signature generation
-
Kim, K. (ed.),. Springer, Heidelberg
-
Jakobsson, M., Wetzel, S.: Secure server-aided signature generation. In: Kim, K. (ed.) PKC 2001. LNCS, vol. 1992, pp. 383-401. Springer, Heidelberg (2001).
-
(2001)
PKC 2001. LNCS
, vol.1992
, pp. 383-401
-
-
Jakobsson, M.1
Wetzel, S.2
-
10
-
-
84888824020
-
Outsourcing computation of modular exponentiations in cloud computing
-
Ma, X., Li, J., Zhang, F.: Outsourcing computation of modular exponentiations in cloud computing. Cluster Computing 16, 787-796 (2013).
-
(2013)
Cluster Computing
, vol.16
, pp. 787-796
-
-
Ma, X.1
Li, J.2
Zhang, F.3
-
11
-
-
0009268999
-
Distribution of modular sums and the security of the server aided exponentiation
-
Springer
-
Nguyen, P. Q., Shparlinski, I. E., Stern, J.: Distribution of modular sums and the security of the server aided exponentiation. In: Cryptography and Computational Number Theory, pp. 331-342. Springer (2001).
-
(2001)
Cryptography and Computational Number Theory
, pp. 331-342
-
-
Nguyen, P.Q.1
Shparlinski, I.E.2
Stern, J.3
-
12
-
-
84988269540
-
Securely outsourcing exponentiations with single untrusted program for cloud storage
-
Kutyłowski, M., Vaidya, J. (eds.), Part I. LNCS,. Springer, Heidelberg
-
Wang, Y., Wu, Q., Wong, D. S., Qin, B., Chow, S. S. M., Liu, Z., Tan, X.: Securely outsourcing exponentiations with single untrusted program for cloud storage. In: Kutyłowski, M., Vaidya, J. (eds.) ICAIS 2014, Part I. LNCS, vol. 8712, pp. 326-343. Springer, Heidelberg (2014).
-
(2014)
ICAIS 2014
, vol.8712
, pp. 326-343
-
-
Wang, Y.1
Wu, Q.2
Wong, D.S.3
Qin, B.4
Chow, S.S.M.5
Liu, Z.6
Tan, X.7
|