As devices everywhere increasingly communicate with each other, many security applications will require low-bandwidth signatures that can be processed quickly. Pairing …
E Bangerter, S Barzan, S Krenn, AR Sadeghi… - Security Protocols XVII …, 2013 - Springer
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many practical cryptographic applications such as identification schemes, group signatures, and …
E Bangerter, J Camenisch, S Krenn… - Cryptology ePrint …, 2008 - eprint.iacr.org
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many practical cryptographic applications such as identification schemes, group signatures, and …
E Bangerter, T Briner, W Henecka, S Krenn… - European Public Key …, 2009 - Springer
Efficient zero-knowledge proofs of knowledge (ZK-PoK) are basic building blocks of many cryptographic applications such as identification schemes, group signatures, and secure …
PG Rajeswari, K Thilagavathi - IJCSNS, 2009 - idc-online.com
Mobile Networks offer unrestricted mobility devoid of any underlying infrastructure. Typically, mobile networks are deployed in un-trusted environments. Such networks in this day and …
J McLachlan, GM Myles, J Lerouge - US Patent 9,116,765, 2015 - Google Patents
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for obfuscating data using instructions as a source of pseudorandom values …
KH Kim - Cryptology ePrint Archive, 2007 - eprint.iacr.org
Recently, the supersingular elliptic curves over ternary fields are widely used in pairing based crypto-applications since they achieve the best possible ratio between security level …
The design of cryptographic primitives such as digital signatures and public-key encryption is very often a manual process conducted by expert cryptographers. This persists despite the …
AJ Farrugia, B Chevallier-Mames, M Ciet… - US Patent …, 2013 - Google Patents
Disclosed herein are systems, computer-implemented meth ods, and computer-readable storage media for obfuscating databased on a discrete logarithm. A system practicing the …