Sciweavers

6 search results - page 1 / 2
» An approach to RAID-6 based on cyclic groups of a prime orde...
Sort
View
CORR
2006
Springer
119views Education» more  CORR 2006»
13 years 4 months ago
An approach to RAID-6 based on cyclic groups of a prime order
As the size of data storing arrays of disks grows, it becomes vital to protect data against double disk failures. An economic way of providing such protection consists of adding tw...
R. Jackson, D. Rumynin, O. Zaboronski
IJAC
2011
12 years 8 months ago
Bass Cyclic Units as Factors in a Free Group in Integral Group Ring Units
Marciniak and Sehgal showed that if u is a non-trivial bicyclic unit of an integral group ring then there is a bicyclic unit v such that u and v generate a non-abelian free group. ...
Jairo Z. Gonçalves, Ángel del R&iacu...
ASIACRYPT
2000
Springer
13 years 9 months ago
Security of Signed ElGamal Encryption
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against ...
Claus-Peter Schnorr, Markus Jakobsson
STOC
2009
ACM
187views Algorithms» more  STOC 2009»
14 years 5 months ago
Artin automorphisms, cyclotomic function fields, and folded list-decodable codes
Algebraic codes that achieve list decoding capacity were recently constructed by a careful "folding" of the Reed-Solomon code. The "low-degree" nature of this f...
Venkatesan Guruswami
CTRSA
2010
Springer
191views Cryptology» more  CTRSA 2010»
13 years 8 months ago
Making the Diffie-Hellman Protocol Identity-Based
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [33]) each party uses its own identity as public key and rece...
Dario Fiore, Rosario Gennaro