Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,386,821 papers from all fields of science
Search
Sign In
Create Free Account
Cryptology ePrint Archive
The Cryptology ePrint Archive is an electronic archive (eprint) of new results in the field of cryptography, maintained by the International…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Bingo voting
Cryptography
Cryptologia
Electronic Colloquium on Computational Complexity
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Gnocchi : A Multiplexed Payment Channel Scheme
Chen Pan
,
Shuyang Tang
,
Zhiqiang Liu
,
Yu Long
,
Z. Liu
,
Dawu Gu
2018
Corpus ID: 53600718
As the underlying technology of mainstream cryptocurrencies such as Bitcoin and Ethereum, blockchain builds a decentralized…
Expand
2015
2015
A secure sharing design for multi-tag RFID authentication protocol
Ayad Al-Adhami
,
M. Ambroze
,
Colin Cristopher
,
I. Stengel
,
M. Tomlinson
2015
Corpus ID: 44073857
RFID technology, in recent years, has gained significant momentum with increased use in supply chain management. In view of its…
Expand
2014
2014
DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION
Prof. M. Ben Swarup
,
Chukkala Varaha
,
Sampath Pothabathula
2014
Corpus ID: 212509323
: In this paper we describe the design and development of a cloud computing based secure multi cloud data storage using…
Expand
2014
2014
Formal Verification of Advanced Families of Security Protocols: E-Voting and APIs. (Vérification formelle de familles avancées de protocoles de sécurité : vote électronique et API)
Cyrille Wiedling
2014
Corpus ID: 37820133
For a long time now, formal methods have been successfully used to analyze security protocols. Several tools have even been…
Expand
2013
2013
Proposals of Multiplication and Inversion Methods in Extension Field for Scalable Asymmetric key and Fast Symmetric key Cryptosystems
K. Nekado
2013
Corpus ID: 17815809
This thesis proposes the Cyclic Vector Multiplication Algorithm (CVMA) for Gauss period Normal Basis (GNB). It is an e cient…
Expand
2010
2010
How to Log Sleeping Trends? A Case Study on the Long-Term Capturing of User Data
H. Becker
,
Marko Borazio
,
Kristof Van Laerhoven
European Conference on Smart Sensing and Context
2010
Corpus ID: 8054631
Designing and installing long-term monitoring equipment in the users' home sphere often presents challenges in terms of…
Expand
2009
2009
Breaking and Re-Building a Certificateless Hybrid Signcryption Scheme
S. Sharmila
,
Deva Selvi
,
S. Vivek
,
Pandu Rangan
2009
Corpus ID: 18517956
Often authentication and confidentiality are required as counterparts in many cryptographic applications. Both these…
Expand
2007
2007
Group Password-Authenticated Key Exchange from Identity-Based Cryptosystem
X. Yi
,
R. Tso
,
E. Okamoto
2007
Corpus ID: 1938828
Password-authenticated key exchange (PAKE) protocols are designed to be secure even when the secret key used for authentication…
Expand
Review
2006
Review
2006
Law enforcement, forensics and mobile communications
Vanessa Gratzer
,
D. Naccache
,
D. Znaty
Fourth Annual IEEE International Conference on…
2006
Corpus ID: 10518754
By the end of 2004, the GSM Association reported that over 600 networks in more than 200 countries were serving more than 1.2…
Expand
2005
2005
Designated-Verifier Proxy Signature Schemes
Guilin Wang
IFIP International Information Security…
2005
Corpus ID: 2158379
In a proxy signature scheme, a user delegates his/her signing capability to another user in such a way that the latter can sign…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE