Skip to search formSkip to main contentSkip to account menu

Cryptology ePrint Archive

The Cryptology ePrint Archive is an electronic archive (eprint) of new results in the field of cryptography, maintained by the International… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
As the underlying technology of mainstream cryptocurrencies such as Bitcoin and Ethereum, blockchain builds a decentralized… 
2015
2015
RFID technology, in recent years, has gained significant momentum with increased use in supply chain management. In view of its… 
2014
2014
: In this paper we describe the design and development of a cloud computing based secure multi cloud data storage using… 
2014
2014
For a long time now, formal methods have been successfully used to analyze security protocols. Several tools have even been… 
2013
2013
This thesis proposes the Cyclic Vector Multiplication Algorithm (CVMA) for Gauss period Normal Basis (GNB). It is an e cient… 
2010
2010
Designing and installing long-term monitoring equipment in the users' home sphere often presents challenges in terms of… 
2009
2009
Often authentication and confidentiality are required as counterparts in many cryptographic applications. Both these… 
2007
2007
Password-authenticated key exchange (PAKE) protocols are designed to be secure even when the secret key used for authentication… 
Review
2006
Review
2006
By the end of 2004, the GSM Association reported that over 600 networks in more than 200 countries were serving more than 1.2… 
2005
2005
In a proxy signature scheme, a user delegates his/her signing capability to another user in such a way that the latter can sign…