Sciweavers

Share
3 search results - page 1 / 1
» Asymptotically Optimal Communication for Torus-Based Cryptog...
Sort
View
CRYPTO
2004
Springer
123views Cryptology» more  CRYPTO 2004»
11 years 10 months ago
Asymptotically Optimal Communication for Torus-Based Cryptography
Abstract. We introduce a compact and eļ¬ƒcient representation of elements of the algebraic torus. This allows us to design a new discretelog based public-key system achieving the o...
Marten van Dijk, David P. Woodruff
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
11 years 3 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
TCC
2009
Springer
132views Cryptology» more  TCC 2009»
12 years 5 months ago
Authenticated Adversarial Routing
: The aim of this paper is to demonstrate the feasibility of authenticated throughput-ecient routing in an unreliable and dynamically changing synchronous network in which the majo...
Yair Amir, Paul Bunn, Rafail Ostrovsky
books