Sciweavers

9 search results - page 2 / 2
» Enumeration Schemes for Restricted Permutations
Sort
View
CRYPTO
2005
Springer
163views Cryptology» more  CRYPTO 2005»
13 years 11 months ago
On the Generic Insecurity of the Full Domain Hash
The Full-Domain Hash (FDH) signature scheme [3] forms one the most basic usages of random oracles. It works with a family F of trapdoor permutations (TDP), where the signature of m...
Yevgeniy Dodis, Roberto Oliveira, Krzysztof Pietrz...
SYNASC
2007
IEEE
142views Algorithms» more  SYNASC 2007»
13 years 11 months ago
An Extension of the RSA Trapdoor in a KEM/DEM Framework
A trapdoor based on an extension of the RSA trapdoor is proposed. The same function as in the RSA cryptosystem is used, i.e. x modn, but there is no restriction for the exponent t...
Bogdan Groza
IVA
2010
Springer
13 years 3 months ago
Smart Events and Primed Agents
We describe a new organization for virtual human responses to dynamically occurring events. In our approach behavioral responses are enumerated in the representation of the event i...
Catherine Stocker, Libo Sun, Pengfei Huang, Wenhu ...
CORR
2008
Springer
145views Education» more  CORR 2008»
13 years 5 months ago
The Capacity Region of Large Wireless Networks
The capacity region of a wireless network with n nodes is the set of all simultaneously achievable rates between all possible n2 node pairs. In this paper, we consider the questio...
Urs Niesen, Piyush Gupta, Devavrat Shah